{"id": 1, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #1: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "moderation"], "created_at": "2025-10-22T02:25:13.132412Z"} {"id": 2, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #2: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "remediation", "legal"], "created_at": "2025-10-22T02:25:13.132434Z"} {"id": 3, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #3: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "moderation", "exercise"], "created_at": "2025-10-22T02:25:13.132448Z"} {"id": 4, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #4: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "forensics", "blueteam"], "created_at": "2025-10-22T02:25:13.132458Z"} {"id": 5, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #5: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "exercise"], "created_at": "2025-10-22T02:25:13.132472Z"} {"id": 6, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #6: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "comms", "tabletop"], "created_at": "2025-10-22T02:25:13.132490Z"} {"id": 7, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #7: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "tabletop", "redteam"], "created_at": "2025-10-22T02:25:13.132499Z"} {"id": 8, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #8: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.132522Z"} {"id": 9, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #9: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "exercise", "comms"], "created_at": "2025-10-22T02:25:13.132535Z"} {"id": 10, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #10: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "redteam"], "created_at": "2025-10-22T02:25:13.132549Z"} {"id": 11, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #11: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "detection", "comms"], "created_at": "2025-10-22T02:25:13.132561Z"} {"id": 12, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #12: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "moderation", "comms"], "created_at": "2025-10-22T02:25:13.132571Z"} {"id": 13, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #13: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "legal", "metrics"], "created_at": "2025-10-22T02:25:13.132588Z"} {"id": 14, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #14: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "legal", "comms"], "created_at": "2025-10-22T02:25:13.132598Z"} {"id": 15, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #15: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "forensics", "blueteam"], "created_at": "2025-10-22T02:25:13.132608Z"} {"id": 16, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #16: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "tabletop", "moderation"], "created_at": "2025-10-22T02:25:13.132621Z"} {"id": 17, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #17: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "training", "comms"], "created_at": "2025-10-22T02:25:13.132632Z"} {"id": 18, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #18: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "exercise", "detection"], "created_at": "2025-10-22T02:25:13.132645Z"} {"id": 19, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #19: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "remediation", "metrics"], "created_at": "2025-10-22T02:25:13.132652Z"} {"id": 20, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #20: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.132662Z"} {"id": 21, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #21: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "ops", "blueteam"], "created_at": "2025-10-22T02:25:13.132668Z"} {"id": 22, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #22: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "redteam", "detection"], "created_at": "2025-10-22T02:25:13.132674Z"} {"id": 23, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #23: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "moderation", "exercise"], "created_at": "2025-10-22T02:25:13.132787Z"} {"id": 24, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #24: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "scenario"], "created_at": "2025-10-22T02:25:13.132797Z"} {"id": 25, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #25: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "policy", "metrics"], "created_at": "2025-10-22T02:25:13.132808Z"} {"id": 26, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #26: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 45, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "remediation", "policy"], "created_at": "2025-10-22T02:25:13.132814Z"} {"id": 27, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #27: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "detection", "exercise"], "created_at": "2025-10-22T02:25:13.132821Z"} {"id": 28, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #28: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "blueteam"], "created_at": "2025-10-22T02:25:13.132829Z"} {"id": 29, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #29: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "redteam", "training"], "created_at": "2025-10-22T02:25:13.132835Z"} {"id": 30, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #30: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "legal", "moderation"], "created_at": "2025-10-22T02:25:13.132842Z"} {"id": 31, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #31: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "forensics", "metrics"], "created_at": "2025-10-22T02:25:13.132848Z"} {"id": 32, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #32: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "blueteam", "remediation"], "created_at": "2025-10-22T02:25:13.132855Z"} {"id": 33, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #33: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "remediation", "forensics"], "created_at": "2025-10-22T02:25:13.132861Z"} {"id": 34, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #34: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "tabletop", "scenario"], "created_at": "2025-10-22T02:25:13.132867Z"} {"id": 35, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #35: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "forensics"], "created_at": "2025-10-22T02:25:13.132875Z"} {"id": 36, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #36: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "comms"], "created_at": "2025-10-22T02:25:13.132880Z"} {"id": 37, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #37: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "ops", "tabletop"], "created_at": "2025-10-22T02:25:13.132889Z"} {"id": 38, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #38: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "tabletop", "metrics"], "created_at": "2025-10-22T02:25:13.132896Z"} {"id": 39, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #39: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "metrics", "scenario"], "created_at": "2025-10-22T02:25:13.132902Z"} {"id": 40, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #40: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "moderation"], "created_at": "2025-10-22T02:25:13.132908Z"} {"id": 41, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #41: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "scenario", "tabletop"], "created_at": "2025-10-22T02:25:13.132914Z"} {"id": 42, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #42: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "moderation", "blueteam"], "created_at": "2025-10-22T02:25:13.132922Z"} {"id": 43, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #43: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "moderation", "comms"], "created_at": "2025-10-22T02:25:13.132929Z"} {"id": 44, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #44: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "redteam", "tabletop"], "created_at": "2025-10-22T02:25:13.132938Z"} {"id": 45, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #45: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "moderation", "scenario"], "created_at": "2025-10-22T02:25:13.132944Z"} {"id": 46, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #46: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "redteam", "comms"], "created_at": "2025-10-22T02:25:13.132951Z"} {"id": 47, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #47: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "policy", "ops"], "created_at": "2025-10-22T02:25:13.132957Z"} {"id": 48, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #48: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "training"], "created_at": "2025-10-22T02:25:13.132963Z"} {"id": 49, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #49: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "metrics", "scenario"], "created_at": "2025-10-22T02:25:13.132970Z"} {"id": 50, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #50: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "comms", "exercise"], "created_at": "2025-10-22T02:25:13.132975Z"} {"id": 51, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #51: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "forensics", "training"], "created_at": "2025-10-22T02:25:13.132982Z"} {"id": 52, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #52: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "tabletop", "metrics"], "created_at": "2025-10-22T02:25:13.132989Z"} {"id": 53, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #53: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "remediation", "metrics"], "created_at": "2025-10-22T02:25:13.132995Z"} {"id": 54, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #54: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "training", "blueteam"], "created_at": "2025-10-22T02:25:13.133001Z"} {"id": 55, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #55: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "legal", "comms"], "created_at": "2025-10-22T02:25:13.133009Z"} {"id": 56, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #56: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "policy", "tabletop"], "created_at": "2025-10-22T02:25:13.133015Z"} {"id": 57, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #57: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "redteam", "moderation"], "created_at": "2025-10-22T02:25:13.133021Z"} {"id": 58, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #58: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "legal", "tabletop"], "created_at": "2025-10-22T02:25:13.133027Z"} {"id": 59, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #59: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "ops", "comms"], "created_at": "2025-10-22T02:25:13.133033Z"} {"id": 60, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #60: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.133039Z"} {"id": 61, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #61: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "metrics", "redteam"], "created_at": "2025-10-22T02:25:13.133046Z"} {"id": 62, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #62: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "ops", "moderation"], "created_at": "2025-10-22T02:25:13.133058Z"} {"id": 63, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #63: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "remediation", "exercise"], "created_at": "2025-10-22T02:25:13.133064Z"} {"id": 64, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #64: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "ops"], "created_at": "2025-10-22T02:25:13.133071Z"} {"id": 65, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #65: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "forensics", "training"], "created_at": "2025-10-22T02:25:13.133078Z"} {"id": 66, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #66: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "policy"], "created_at": "2025-10-22T02:25:13.133085Z"} {"id": 67, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #67: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "ops", "metrics"], "created_at": "2025-10-22T02:25:13.133091Z"} {"id": 68, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #68: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "blueteam", "training"], "created_at": "2025-10-22T02:25:13.133096Z"} {"id": 69, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #69: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "comms", "blueteam"], "created_at": "2025-10-22T02:25:13.133102Z"} {"id": 70, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #70: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "detection", "comms"], "created_at": "2025-10-22T02:25:13.133111Z"} {"id": 71, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #71: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "ops", "remediation"], "created_at": "2025-10-22T02:25:13.133117Z"} {"id": 72, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #72: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "training"], "created_at": "2025-10-22T02:25:13.133123Z"} {"id": 73, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #73: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "redteam", "legal"], "created_at": "2025-10-22T02:25:13.133129Z"} {"id": 74, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #74: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "tabletop", "redteam"], "created_at": "2025-10-22T02:25:13.133135Z"} {"id": 75, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #75: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "comms", "forensics"], "created_at": "2025-10-22T02:25:13.133141Z"} {"id": 76, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #76: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "remediation", "blueteam"], "created_at": "2025-10-22T02:25:13.133147Z"} {"id": 77, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #77: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "tabletop", "legal"], "created_at": "2025-10-22T02:25:13.133153Z"} {"id": 78, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #78: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "detection", "forensics"], "created_at": "2025-10-22T02:25:13.133160Z"} {"id": 79, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #79: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "scenario", "training"], "created_at": "2025-10-22T02:25:13.133168Z"} {"id": 80, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #80: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "metrics", "tabletop"], "created_at": "2025-10-22T02:25:13.133178Z"} {"id": 81, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #81: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "forensics", "remediation"], "created_at": "2025-10-22T02:25:13.133184Z"} {"id": 82, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #82: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "training"], "created_at": "2025-10-22T02:25:13.133190Z"} {"id": 83, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #83: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "detection", "comms"], "created_at": "2025-10-22T02:25:13.133196Z"} {"id": 84, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #84: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "scenario"], "created_at": "2025-10-22T02:25:13.133204Z"} {"id": 85, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #85: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "ops", "policy"], "created_at": "2025-10-22T02:25:13.133211Z"} {"id": 86, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #86: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "training", "comms"], "created_at": "2025-10-22T02:25:13.133217Z"} {"id": 87, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #87: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "tabletop", "comms"], "created_at": "2025-10-22T02:25:13.133223Z"} {"id": 88, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #88: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "training", "comms"], "created_at": "2025-10-22T02:25:13.133232Z"} {"id": 89, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #89: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "legal", "ops"], "created_at": "2025-10-22T02:25:13.133238Z"} {"id": 90, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #90: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "moderation", "detection"], "created_at": "2025-10-22T02:25:13.133246Z"} {"id": 91, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #91: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "detection"], "created_at": "2025-10-22T02:25:13.133252Z"} {"id": 92, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #92: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "blueteam"], "created_at": "2025-10-22T02:25:13.133258Z"} {"id": 93, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #93: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "comms", "redteam"], "created_at": "2025-10-22T02:25:13.133264Z"} {"id": 94, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #94: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.133271Z"} {"id": 95, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #95: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "redteam"], "created_at": "2025-10-22T02:25:13.133278Z"} {"id": 96, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #96: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "ops"], "created_at": "2025-10-22T02:25:13.133284Z"} {"id": 97, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #97: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "exercise", "metrics"], "created_at": "2025-10-22T02:25:13.133290Z"} {"id": 98, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #98: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "detection", "scenario"], "created_at": "2025-10-22T02:25:13.133297Z"} {"id": 99, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #99: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "training", "scenario"], "created_at": "2025-10-22T02:25:13.133303Z"} {"id": 100, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #100: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "blueteam", "metrics"], "created_at": "2025-10-22T02:25:13.133309Z"} {"id": 101, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #101: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "legal"], "created_at": "2025-10-22T02:25:13.133318Z"} {"id": 102, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #102: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "comms", "metrics"], "created_at": "2025-10-22T02:25:13.133325Z"} {"id": 103, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #103: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "tabletop", "comms"], "created_at": "2025-10-22T02:25:13.133332Z"} {"id": 104, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #104: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "detection", "metrics"], "created_at": "2025-10-22T02:25:13.133338Z"} {"id": 105, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #105: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "moderation"], "created_at": "2025-10-22T02:25:13.133344Z"} {"id": 106, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #106: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "redteam", "comms"], "created_at": "2025-10-22T02:25:13.133350Z"} {"id": 107, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #107: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "metrics"], "created_at": "2025-10-22T02:25:13.133357Z"} {"id": 108, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #108: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "metrics", "blueteam"], "created_at": "2025-10-22T02:25:13.133363Z"} {"id": 109, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #109: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "policy", "detection"], "created_at": "2025-10-22T02:25:13.133369Z"} {"id": 110, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #110: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "metrics", "remediation"], "created_at": "2025-10-22T02:25:13.133375Z"} {"id": 111, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #111: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 45, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "legal", "moderation"], "created_at": "2025-10-22T02:25:13.133381Z"} {"id": 112, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #112: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "training", "tabletop"], "created_at": "2025-10-22T02:25:13.133390Z"} {"id": 113, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #113: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "redteam", "remediation"], "created_at": "2025-10-22T02:25:13.133396Z"} {"id": 114, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #114: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "comms", "legal"], "created_at": "2025-10-22T02:25:13.133402Z"} {"id": 115, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #115: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "redteam", "moderation"], "created_at": "2025-10-22T02:25:13.133408Z"} {"id": 116, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #116: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "metrics", "redteam"], "created_at": "2025-10-22T02:25:13.133415Z"} {"id": 117, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #117: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "redteam", "moderation"], "created_at": "2025-10-22T02:25:13.133421Z"} {"id": 118, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #118: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "policy", "tabletop"], "created_at": "2025-10-22T02:25:13.133427Z"} {"id": 119, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #119: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "scenario", "policy"], "created_at": "2025-10-22T02:25:13.133433Z"} {"id": 120, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #120: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "legal", "exercise"], "created_at": "2025-10-22T02:25:13.133439Z"} {"id": 121, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #121: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "redteam", "metrics"], "created_at": "2025-10-22T02:25:13.133445Z"} {"id": 122, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #122: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 45, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "tabletop", "training"], "created_at": "2025-10-22T02:25:13.133452Z"} {"id": 123, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #123: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "tabletop", "forensics"], "created_at": "2025-10-22T02:25:13.133457Z"} {"id": 124, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #124: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "comms", "exercise"], "created_at": "2025-10-22T02:25:13.133464Z"} {"id": 125, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #125: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "policy"], "created_at": "2025-10-22T02:25:13.133470Z"} {"id": 126, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #126: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "policy", "remediation"], "created_at": "2025-10-22T02:25:13.133476Z"} {"id": 127, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #127: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "training"], "created_at": "2025-10-22T02:25:13.133482Z"} {"id": 128, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #128: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 40, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "scenario", "blueteam"], "created_at": "2025-10-22T02:25:13.133489Z"} {"id": 129, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #129: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "redteam", "blueteam"], "created_at": "2025-10-22T02:25:13.133495Z"} {"id": 130, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #130: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "redteam", "training"], "created_at": "2025-10-22T02:25:13.133581Z"} {"id": 131, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #131: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "tabletop", "redteam"], "created_at": "2025-10-22T02:25:13.133589Z"} {"id": 132, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #132: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 40, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.133595Z"} {"id": 133, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #133: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "scenario", "policy"], "created_at": "2025-10-22T02:25:13.133605Z"} {"id": 134, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #134: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "remediation"], "created_at": "2025-10-22T02:25:13.133612Z"} {"id": 135, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #135: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "metrics", "exercise"], "created_at": "2025-10-22T02:25:13.133618Z"} {"id": 136, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #136: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "tabletop"], "created_at": "2025-10-22T02:25:13.133624Z"} {"id": 137, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #137: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "comms", "remediation"], "created_at": "2025-10-22T02:25:13.133630Z"} {"id": 138, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #138: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "ops", "training"], "created_at": "2025-10-22T02:25:13.133636Z"} {"id": 139, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #139: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "scenario", "ops"], "created_at": "2025-10-22T02:25:13.133642Z"} {"id": 140, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #140: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "forensics"], "created_at": "2025-10-22T02:25:13.133648Z"} {"id": 141, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #141: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "moderation", "training"], "created_at": "2025-10-22T02:25:13.133654Z"} {"id": 142, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #142: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "metrics", "ops"], "created_at": "2025-10-22T02:25:13.133660Z"} {"id": 143, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #143: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "training"], "created_at": "2025-10-22T02:25:13.133666Z"} {"id": 144, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #144: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "metrics", "comms"], "created_at": "2025-10-22T02:25:13.133675Z"} {"id": 145, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #145: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "policy"], "created_at": "2025-10-22T02:25:13.133681Z"} {"id": 146, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #146: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "redteam", "detection"], "created_at": "2025-10-22T02:25:13.133687Z"} {"id": 147, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #147: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "detection", "metrics"], "created_at": "2025-10-22T02:25:13.133693Z"} {"id": 148, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #148: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "ops", "comms"], "created_at": "2025-10-22T02:25:13.133699Z"} {"id": 149, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #149: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "ops", "detection"], "created_at": "2025-10-22T02:25:13.133705Z"} {"id": 150, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #150: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "legal", "remediation"], "created_at": "2025-10-22T02:25:13.133712Z"} {"id": 151, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #151: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "policy", "scenario"], "created_at": "2025-10-22T02:25:13.133718Z"} {"id": 152, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #152: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "policy", "blueteam"], "created_at": "2025-10-22T02:25:13.133724Z"} {"id": 153, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #153: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "scenario", "remediation"], "created_at": "2025-10-22T02:25:13.133731Z"} {"id": 154, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #154: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "forensics", "tabletop"], "created_at": "2025-10-22T02:25:13.133737Z"} {"id": 155, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #155: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "redteam", "ops"], "created_at": "2025-10-22T02:25:13.133743Z"} {"id": 156, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #156: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "comms"], "created_at": "2025-10-22T02:25:13.133749Z"} {"id": 157, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #157: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "training", "detection"], "created_at": "2025-10-22T02:25:13.133755Z"} {"id": 158, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #158: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "scenario", "detection"], "created_at": "2025-10-22T02:25:13.133762Z"} {"id": 159, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #159: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "policy"], "created_at": "2025-10-22T02:25:13.133767Z"} {"id": 160, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #160: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "legal", "metrics"], "created_at": "2025-10-22T02:25:13.133773Z"} {"id": 161, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #161: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "comms", "scenario"], "created_at": "2025-10-22T02:25:13.133779Z"} {"id": 162, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #162: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "training", "comms"], "created_at": "2025-10-22T02:25:13.133785Z"} {"id": 163, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #163: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "legal", "scenario"], "created_at": "2025-10-22T02:25:13.133791Z"} {"id": 164, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #164: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "policy", "training"], "created_at": "2025-10-22T02:25:13.133797Z"} {"id": 165, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #165: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "policy"], "created_at": "2025-10-22T02:25:13.133804Z"} {"id": 166, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #166: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "tabletop", "training"], "created_at": "2025-10-22T02:25:13.133809Z"} {"id": 167, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #167: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "forensics", "tabletop"], "created_at": "2025-10-22T02:25:13.133815Z"} {"id": 168, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #168: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "scenario", "legal"], "created_at": "2025-10-22T02:25:13.133821Z"} {"id": 169, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #169: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "detection"], "created_at": "2025-10-22T02:25:13.133827Z"} {"id": 170, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #170: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "moderation"], "created_at": "2025-10-22T02:25:13.133833Z"} {"id": 171, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #171: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "redteam", "scenario"], "created_at": "2025-10-22T02:25:13.133839Z"} {"id": 172, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #172: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "ops", "redteam"], "created_at": "2025-10-22T02:25:13.133845Z"} {"id": 173, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #173: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "blueteam", "metrics"], "created_at": "2025-10-22T02:25:13.133852Z"} {"id": 174, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #174: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "remediation", "moderation"], "created_at": "2025-10-22T02:25:13.133858Z"} {"id": 175, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #175: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "tabletop", "moderation"], "created_at": "2025-10-22T02:25:13.133864Z"} {"id": 176, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #176: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "policy", "redteam"], "created_at": "2025-10-22T02:25:13.133871Z"} {"id": 177, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #177: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "legal", "redteam"], "created_at": "2025-10-22T02:25:13.133877Z"} {"id": 178, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #178: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "legal", "comms"], "created_at": "2025-10-22T02:25:13.133882Z"} {"id": 179, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #179: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "legal", "tabletop"], "created_at": "2025-10-22T02:25:13.133888Z"} {"id": 180, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #180: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "exercise", "scenario"], "created_at": "2025-10-22T02:25:13.133894Z"} {"id": 181, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #181: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "training", "blueteam"], "created_at": "2025-10-22T02:25:13.133901Z"} {"id": 182, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #182: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 40, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "comms"], "created_at": "2025-10-22T02:25:13.133907Z"} {"id": 183, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #183: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "comms", "legal"], "created_at": "2025-10-22T02:25:13.133913Z"} {"id": 184, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #184: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "scenario", "comms"], "created_at": "2025-10-22T02:25:13.133919Z"} {"id": 185, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #185: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "comms"], "created_at": "2025-10-22T02:25:13.133926Z"} {"id": 186, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #186: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "ops", "policy"], "created_at": "2025-10-22T02:25:13.133931Z"} {"id": 187, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #187: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "blueteam"], "created_at": "2025-10-22T02:25:13.133937Z"} {"id": 188, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #188: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "blueteam", "scenario"], "created_at": "2025-10-22T02:25:13.133944Z"} {"id": 189, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #189: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "exercise", "scenario"], "created_at": "2025-10-22T02:25:13.133950Z"} {"id": 190, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #190: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "tabletop", "metrics"], "created_at": "2025-10-22T02:25:13.133957Z"} {"id": 191, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #191: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "redteam", "policy"], "created_at": "2025-10-22T02:25:13.133963Z"} {"id": 192, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #192: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "forensics", "training"], "created_at": "2025-10-22T02:25:13.133969Z"} {"id": 193, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #193: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "tabletop", "legal"], "created_at": "2025-10-22T02:25:13.133975Z"} {"id": 194, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #194: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "legal", "exercise"], "created_at": "2025-10-22T02:25:13.133981Z"} {"id": 195, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #195: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "blueteam", "policy"], "created_at": "2025-10-22T02:25:13.133987Z"} {"id": 196, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #196: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "blueteam", "remediation"], "created_at": "2025-10-22T02:25:13.133992Z"} {"id": 197, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #197: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "redteam", "scenario"], "created_at": "2025-10-22T02:25:13.133999Z"} {"id": 198, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #198: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "legal", "blueteam"], "created_at": "2025-10-22T02:25:13.134005Z"} {"id": 199, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #199: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "legal", "moderation"], "created_at": "2025-10-22T02:25:13.134011Z"} {"id": 200, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #200: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "redteam", "legal"], "created_at": "2025-10-22T02:25:13.134017Z"} {"id": 201, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #201: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "detection"], "created_at": "2025-10-22T02:25:13.134023Z"} {"id": 202, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #202: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "scenario", "tabletop"], "created_at": "2025-10-22T02:25:13.134029Z"} {"id": 203, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #203: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "remediation"], "created_at": "2025-10-22T02:25:13.134036Z"} {"id": 204, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #204: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "blueteam"], "created_at": "2025-10-22T02:25:13.134042Z"} {"id": 205, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #205: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "comms"], "created_at": "2025-10-22T02:25:13.134048Z"} {"id": 206, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #206: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "forensics"], "created_at": "2025-10-22T02:25:13.134054Z"} {"id": 207, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #207: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "comms", "blueteam"], "created_at": "2025-10-22T02:25:13.134060Z"} {"id": 208, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #208: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "forensics", "scenario"], "created_at": "2025-10-22T02:25:13.134066Z"} {"id": 209, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #209: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "ops"], "created_at": "2025-10-22T02:25:13.134072Z"} {"id": 210, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #210: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "exercise", "metrics"], "created_at": "2025-10-22T02:25:13.134078Z"} {"id": 211, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #211: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "blueteam", "training"], "created_at": "2025-10-22T02:25:13.134083Z"} {"id": 212, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #212: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "ops", "comms"], "created_at": "2025-10-22T02:25:13.134090Z"} {"id": 213, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #213: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.134096Z"} {"id": 214, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #214: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "scenario", "ops"], "created_at": "2025-10-22T02:25:13.134102Z"} {"id": 215, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #215: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "tabletop", "redteam"], "created_at": "2025-10-22T02:25:13.134107Z"} {"id": 216, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #216: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "policy", "remediation"], "created_at": "2025-10-22T02:25:13.134113Z"} {"id": 217, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #217: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "metrics", "forensics"], "created_at": "2025-10-22T02:25:13.134120Z"} {"id": 218, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #218: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "ops", "exercise"], "created_at": "2025-10-22T02:25:13.134126Z"} {"id": 219, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #219: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "tabletop", "forensics"], "created_at": "2025-10-22T02:25:13.134132Z"} {"id": 220, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #220: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "tabletop"], "created_at": "2025-10-22T02:25:13.134138Z"} {"id": 221, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #221: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "moderation", "blueteam"], "created_at": "2025-10-22T02:25:13.134144Z"} {"id": 222, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #222: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "training", "redteam"], "created_at": "2025-10-22T02:25:13.134150Z"} {"id": 223, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #223: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "moderation", "comms"], "created_at": "2025-10-22T02:25:13.134156Z"} {"id": 224, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #224: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "metrics"], "created_at": "2025-10-22T02:25:13.134163Z"} {"id": 225, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #225: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "metrics", "redteam"], "created_at": "2025-10-22T02:25:13.134170Z"} {"id": 226, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #226: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "moderation", "training"], "created_at": "2025-10-22T02:25:13.134175Z"} {"id": 227, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #227: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "scenario", "blueteam"], "created_at": "2025-10-22T02:25:13.134184Z"} {"id": 228, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #228: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "comms", "forensics"], "created_at": "2025-10-22T02:25:13.134190Z"} {"id": 229, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #229: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "training", "remediation"], "created_at": "2025-10-22T02:25:13.134196Z"} {"id": 230, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #230: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "tabletop"], "created_at": "2025-10-22T02:25:13.134202Z"} {"id": 231, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #231: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "detection"], "created_at": "2025-10-22T02:25:13.134208Z"} {"id": 232, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #232: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "forensics", "moderation"], "created_at": "2025-10-22T02:25:13.134214Z"} {"id": 233, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #233: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "detection"], "created_at": "2025-10-22T02:25:13.134220Z"} {"id": 234, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #234: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "exercise", "scenario"], "created_at": "2025-10-22T02:25:13.134231Z"} {"id": 235, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #235: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "metrics", "tabletop"], "created_at": "2025-10-22T02:25:13.134241Z"} {"id": 236, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #236: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "scenario", "forensics"], "created_at": "2025-10-22T02:25:13.134250Z"} {"id": 237, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #237: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "comms", "blueteam"], "created_at": "2025-10-22T02:25:13.134260Z"} {"id": 238, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #238: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "forensics", "policy"], "created_at": "2025-10-22T02:25:13.134271Z"} {"id": 239, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #239: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "tabletop"], "created_at": "2025-10-22T02:25:13.134290Z"} {"id": 240, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #240: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "policy"], "created_at": "2025-10-22T02:25:13.134296Z"} {"id": 241, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #241: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "moderation", "remediation"], "created_at": "2025-10-22T02:25:13.134302Z"} {"id": 242, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #242: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "ops"], "created_at": "2025-10-22T02:25:13.134308Z"} {"id": 243, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #243: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "training"], "created_at": "2025-10-22T02:25:13.134315Z"} {"id": 244, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #244: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 45, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "forensics", "comms"], "created_at": "2025-10-22T02:25:13.134321Z"} {"id": 245, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #245: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "forensics", "policy"], "created_at": "2025-10-22T02:25:13.134331Z"} {"id": 246, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #246: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "remediation", "forensics"], "created_at": "2025-10-22T02:25:13.134337Z"} {"id": 247, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #247: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "blueteam", "tabletop"], "created_at": "2025-10-22T02:25:13.134343Z"} {"id": 248, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #248: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "forensics", "ops"], "created_at": "2025-10-22T02:25:13.134351Z"} {"id": 249, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #249: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "comms"], "created_at": "2025-10-22T02:25:13.134362Z"} {"id": 250, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #250: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 45, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.134371Z"} {"id": 251, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #251: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "comms", "exercise"], "created_at": "2025-10-22T02:25:13.134392Z"} {"id": 252, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #252: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "legal"], "created_at": "2025-10-22T02:25:13.134399Z"} {"id": 253, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #253: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "remediation", "comms"], "created_at": "2025-10-22T02:25:13.134405Z"} {"id": 254, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #254: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "remediation", "metrics"], "created_at": "2025-10-22T02:25:13.134412Z"} {"id": 255, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #255: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "metrics", "comms"], "created_at": "2025-10-22T02:25:13.134418Z"} {"id": 256, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #256: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "scenario", "legal"], "created_at": "2025-10-22T02:25:13.134424Z"} {"id": 257, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #257: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 40, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "redteam", "blueteam"], "created_at": "2025-10-22T02:25:13.134430Z"} {"id": 258, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #258: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "ops", "tabletop"], "created_at": "2025-10-22T02:25:13.134437Z"} {"id": 259, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #259: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.134442Z"} {"id": 260, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #260: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "policy", "blueteam"], "created_at": "2025-10-22T02:25:13.134448Z"} {"id": 261, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #261: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "redteam", "detection"], "created_at": "2025-10-22T02:25:13.134455Z"} {"id": 262, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #262: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "comms", "scenario"], "created_at": "2025-10-22T02:25:13.134461Z"} {"id": 263, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #263: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "scenario", "redteam"], "created_at": "2025-10-22T02:25:13.134471Z"} {"id": 264, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #264: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "ops", "remediation"], "created_at": "2025-10-22T02:25:13.134477Z"} {"id": 265, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #265: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "ops", "policy"], "created_at": "2025-10-22T02:25:13.134483Z"} {"id": 266, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #266: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "training"], "created_at": "2025-10-22T02:25:13.134494Z"} {"id": 267, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #267: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "blueteam", "training"], "created_at": "2025-10-22T02:25:13.134500Z"} {"id": 268, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #268: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 45, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.134506Z"} {"id": 269, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #269: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "comms", "ops"], "created_at": "2025-10-22T02:25:13.134512Z"} {"id": 270, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #270: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "moderation", "policy"], "created_at": "2025-10-22T02:25:13.134519Z"} {"id": 271, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #271: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "redteam", "scenario"], "created_at": "2025-10-22T02:25:13.134525Z"} {"id": 272, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #272: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 40, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "metrics"], "created_at": "2025-10-22T02:25:13.134536Z"} {"id": 273, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #273: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "policy", "training"], "created_at": "2025-10-22T02:25:13.134547Z"} {"id": 274, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #274: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "moderation", "remediation"], "created_at": "2025-10-22T02:25:13.134555Z"} {"id": 275, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #275: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "tabletop", "scenario"], "created_at": "2025-10-22T02:25:13.134574Z"} {"id": 276, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #276: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "training", "policy"], "created_at": "2025-10-22T02:25:13.134580Z"} {"id": 277, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #277: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "metrics", "ops"], "created_at": "2025-10-22T02:25:13.134588Z"} {"id": 278, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #278: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.134598Z"} {"id": 279, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #279: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "moderation", "tabletop"], "created_at": "2025-10-22T02:25:13.134609Z"} {"id": 280, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #280: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "redteam", "moderation"], "created_at": "2025-10-22T02:25:13.134616Z"} {"id": 281, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #281: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "policy", "remediation"], "created_at": "2025-10-22T02:25:13.134628Z"} {"id": 282, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #282: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "metrics", "scenario"], "created_at": "2025-10-22T02:25:13.134634Z"} {"id": 283, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #283: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "moderation", "tabletop"], "created_at": "2025-10-22T02:25:13.134644Z"} {"id": 284, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #284: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "tabletop", "scenario"], "created_at": "2025-10-22T02:25:13.134650Z"} {"id": 285, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #285: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "forensics", "blueteam"], "created_at": "2025-10-22T02:25:13.134656Z"} {"id": 286, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #286: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "tabletop", "exercise"], "created_at": "2025-10-22T02:25:13.134664Z"} {"id": 287, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #287: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 45, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "blueteam", "detection"], "created_at": "2025-10-22T02:25:13.134670Z"} {"id": 288, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #288: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "forensics", "blueteam"], "created_at": "2025-10-22T02:25:13.134676Z"} {"id": 289, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #289: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "moderation", "scenario"], "created_at": "2025-10-22T02:25:13.134682Z"} {"id": 290, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #290: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 40, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "detection", "ops"], "created_at": "2025-10-22T02:25:13.134688Z"} {"id": 291, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #291: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "comms"], "created_at": "2025-10-22T02:25:13.134694Z"} {"id": 292, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #292: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "scenario", "comms"], "created_at": "2025-10-22T02:25:13.134702Z"} {"id": 293, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #293: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "remediation"], "created_at": "2025-10-22T02:25:13.134720Z"} {"id": 294, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #294: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "comms", "moderation"], "created_at": "2025-10-22T02:25:13.134730Z"} {"id": 295, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #295: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "metrics", "policy"], "created_at": "2025-10-22T02:25:13.134740Z"} {"id": 296, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #296: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "ops", "remediation"], "created_at": "2025-10-22T02:25:13.134749Z"} {"id": 297, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #297: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "ops", "moderation"], "created_at": "2025-10-22T02:25:13.134759Z"} {"id": 298, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #298: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "metrics", "tabletop"], "created_at": "2025-10-22T02:25:13.134773Z"} {"id": 299, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #299: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "policy", "detection"], "created_at": "2025-10-22T02:25:13.134783Z"} {"id": 300, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #300: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 45, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "tabletop", "remediation"], "created_at": "2025-10-22T02:25:13.134802Z"} {"id": 301, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #301: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "scenario", "blueteam"], "created_at": "2025-10-22T02:25:13.134810Z"} {"id": 302, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #302: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "policy", "training"], "created_at": "2025-10-22T02:25:13.134816Z"} {"id": 303, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #303: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "exercise", "comms"], "created_at": "2025-10-22T02:25:13.134823Z"} {"id": 304, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #304: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "redteam", "forensics"], "created_at": "2025-10-22T02:25:13.134838Z"} {"id": 305, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #305: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "legal", "redteam"], "created_at": "2025-10-22T02:25:13.134858Z"} {"id": 306, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #306: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "moderation"], "created_at": "2025-10-22T02:25:13.134869Z"} {"id": 307, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #307: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "blueteam", "comms"], "created_at": "2025-10-22T02:25:13.134877Z"} {"id": 308, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #308: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 37, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "tabletop", "detection"], "created_at": "2025-10-22T02:25:13.134883Z"} {"id": 309, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #309: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "moderation", "scenario"], "created_at": "2025-10-22T02:25:13.134889Z"} {"id": 310, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #310: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "exercise", "blueteam"], "created_at": "2025-10-22T02:25:13.134896Z"} {"id": 311, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #311: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.134902Z"} {"id": 312, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #312: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "forensics", "legal"], "created_at": "2025-10-22T02:25:13.134908Z"} {"id": 313, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #313: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "exercise", "redteam"], "created_at": "2025-10-22T02:25:13.134916Z"} {"id": 314, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #314: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "scenario", "forensics"], "created_at": "2025-10-22T02:25:13.134922Z"} {"id": 315, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #315: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 27, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "forensics", "redteam"], "created_at": "2025-10-22T02:25:13.134932Z"} {"id": 316, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #316: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "comms", "forensics"], "created_at": "2025-10-22T02:25:13.134942Z"} {"id": 317, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #317: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "detection"], "created_at": "2025-10-22T02:25:13.134951Z"} {"id": 318, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #318: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "exercise", "forensics"], "created_at": "2025-10-22T02:25:13.134967Z"} {"id": 319, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #319: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "legal", "remediation"], "created_at": "2025-10-22T02:25:13.134973Z"} {"id": 320, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #320: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "exercise", "ops"], "created_at": "2025-10-22T02:25:13.134981Z"} {"id": 321, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #321: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "redteam"], "created_at": "2025-10-22T02:25:13.134987Z"} {"id": 322, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #322: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "scenario", "blueteam"], "created_at": "2025-10-22T02:25:13.134993Z"} {"id": 323, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #323: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "remediation", "redteam"], "created_at": "2025-10-22T02:25:13.134999Z"} {"id": 324, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #324: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "metrics", "redteam"], "created_at": "2025-10-22T02:25:13.135005Z"} {"id": 325, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #325: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 45, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "tabletop", "exercise"], "created_at": "2025-10-22T02:25:13.135015Z"} {"id": 326, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #326: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 40, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "comms", "policy"], "created_at": "2025-10-22T02:25:13.135021Z"} {"id": 327, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #327: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "metrics"], "created_at": "2025-10-22T02:25:13.135028Z"} {"id": 328, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #328: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "blueteam"], "created_at": "2025-10-22T02:25:13.135034Z"} {"id": 329, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #329: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "scenario"], "created_at": "2025-10-22T02:25:13.135040Z"} {"id": 330, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #330: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "comms", "detection"], "created_at": "2025-10-22T02:25:13.135049Z"} {"id": 331, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #331: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "metrics", "legal"], "created_at": "2025-10-22T02:25:13.135057Z"} {"id": 332, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #332: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "forensics", "tabletop"], "created_at": "2025-10-22T02:25:13.135067Z"} {"id": 333, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #333: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "legal", "scenario"], "created_at": "2025-10-22T02:25:13.135076Z"} {"id": 334, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #334: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "legal", "detection"], "created_at": "2025-10-22T02:25:13.135087Z"} {"id": 335, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #335: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "scenario", "detection"], "created_at": "2025-10-22T02:25:13.135097Z"} {"id": 336, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #336: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "policy"], "created_at": "2025-10-22T02:25:13.135115Z"} {"id": 337, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #337: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "tabletop", "ops"], "created_at": "2025-10-22T02:25:13.135125Z"} {"id": 338, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #338: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "forensics"], "created_at": "2025-10-22T02:25:13.135135Z"} {"id": 339, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #339: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "exercise", "detection"], "created_at": "2025-10-22T02:25:13.135146Z"} {"id": 340, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #340: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "forensics", "training"], "created_at": "2025-10-22T02:25:13.135155Z"} {"id": 341, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #341: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "training", "scenario"], "created_at": "2025-10-22T02:25:13.135165Z"} {"id": 342, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #342: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "blueteam", "tabletop"], "created_at": "2025-10-22T02:25:13.135175Z"} {"id": 343, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #343: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 36, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "legal", "ops"], "created_at": "2025-10-22T02:25:13.135187Z"} {"id": 344, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #344: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "scenario", "policy"], "created_at": "2025-10-22T02:25:13.135198Z"} {"id": 345, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #345: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.135211Z"} {"id": 346, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #346: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "legal", "ops"], "created_at": "2025-10-22T02:25:13.135217Z"} {"id": 347, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #347: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 23, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "policy", "redteam"], "created_at": "2025-10-22T02:25:13.135227Z"} {"id": 348, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #348: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "metrics", "forensics"], "created_at": "2025-10-22T02:25:13.135233Z"} {"id": 349, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #349: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "ops", "scenario"], "created_at": "2025-10-22T02:25:13.135239Z"} {"id": 350, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #350: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 28, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "tabletop", "ops"], "created_at": "2025-10-22T02:25:13.135247Z"} {"id": 351, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #351: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "redteam", "exercise"], "created_at": "2025-10-22T02:25:13.135253Z"} {"id": 352, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #352: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "scenario"], "created_at": "2025-10-22T02:25:13.135258Z"} {"id": 353, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #353: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "comms", "moderation"], "created_at": "2025-10-22T02:25:13.135265Z"} {"id": 354, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #354: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "forensics", "detection"], "created_at": "2025-10-22T02:25:13.135272Z"} {"id": 355, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #355: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "blueteam", "metrics"], "created_at": "2025-10-22T02:25:13.135281Z"} {"id": 356, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #356: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 29, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "moderation", "legal"], "created_at": "2025-10-22T02:25:13.135287Z"} {"id": 357, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #357: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "ops", "forensics"], "created_at": "2025-10-22T02:25:13.135294Z"} {"id": 358, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #358: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 38, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "remediation", "exercise"], "created_at": "2025-10-22T02:25:13.135300Z"} {"id": 359, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #359: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "training", "detection"], "created_at": "2025-10-22T02:25:13.135306Z"} {"id": 360, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #360: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "forensics", "comms"], "created_at": "2025-10-22T02:25:13.135313Z"} {"id": 361, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #361: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 25, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.135321Z"} {"id": 362, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #362: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 42, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "tabletop", "blueteam"], "created_at": "2025-10-22T02:25:13.135332Z"} {"id": 363, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #363: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "forensics"], "created_at": "2025-10-22T02:25:13.135342Z"} {"id": 364, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #364: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "exercise", "legal"], "created_at": "2025-10-22T02:25:13.135355Z"} {"id": 365, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #365: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "legal"], "created_at": "2025-10-22T02:25:13.135366Z"} {"id": 366, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #366: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 26, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "blueteam", "training"], "created_at": "2025-10-22T02:25:13.135383Z"} {"id": 367, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #367: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "policy", "metrics"], "created_at": "2025-10-22T02:25:13.135390Z"} {"id": 368, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #368: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "remediation", "scenario"], "created_at": "2025-10-22T02:25:13.135401Z"} {"id": 369, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #369: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "comms", "forensics"], "created_at": "2025-10-22T02:25:13.135412Z"} {"id": 370, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #370: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "comms"], "created_at": "2025-10-22T02:25:13.135420Z"} {"id": 371, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #371: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 40, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "exercise", "redteam"], "created_at": "2025-10-22T02:25:13.135430Z"} {"id": 372, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #372: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 45, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "legal"], "created_at": "2025-10-22T02:25:13.135532Z"} {"id": 373, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #373: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "exercise", "redteam"], "created_at": "2025-10-22T02:25:13.135547Z"} {"id": 374, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #374: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 41, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "blueteam", "comms"], "created_at": "2025-10-22T02:25:13.135556Z"} {"id": 375, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #375: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 40, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "redteam", "metrics"], "created_at": "2025-10-22T02:25:13.135564Z"} {"id": 376, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #376: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "exercise", "metrics"], "created_at": "2025-10-22T02:25:13.135570Z"} {"id": 377, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #377: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "training", "forensics"], "created_at": "2025-10-22T02:25:13.135577Z"} {"id": 378, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #378: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "blueteam", "policy"], "created_at": "2025-10-22T02:25:13.135583Z"} {"id": 379, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #379: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "tabletop", "metrics"], "created_at": "2025-10-22T02:25:13.135598Z"} {"id": 380, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #380: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "detection", "comms"], "created_at": "2025-10-22T02:25:13.135604Z"} {"id": 381, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #381: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 22, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "metrics"], "created_at": "2025-10-22T02:25:13.135611Z"} {"id": 382, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #382: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "exercise", "forensics"], "created_at": "2025-10-22T02:25:13.135622Z"} {"id": 383, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #383: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 35, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "metrics", "tabletop"], "created_at": "2025-10-22T02:25:13.135632Z"} {"id": 384, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #384: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "comms", "moderation"], "created_at": "2025-10-22T02:25:13.135641Z"} {"id": 385, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #385: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "comms", "moderation"], "created_at": "2025-10-22T02:25:13.135652Z"} {"id": 386, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #386: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "moderation"], "created_at": "2025-10-22T02:25:13.135663Z"} {"id": 387, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #387: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "exercise", "blueteam"], "created_at": "2025-10-22T02:25:13.135673Z"} {"id": 388, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #388: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 34, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "moderation", "ops"], "created_at": "2025-10-22T02:25:13.135683Z"} {"id": 389, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #389: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 33, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "comms", "exercise"], "created_at": "2025-10-22T02:25:13.135697Z"} {"id": 390, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #390: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 39, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "comms", "remediation"], "created_at": "2025-10-22T02:25:13.135707Z"} {"id": 391, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #391: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 44, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "comms", "scenario"], "created_at": "2025-10-22T02:25:13.135721Z"} {"id": 392, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #392: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 30, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "scenario", "ops"], "created_at": "2025-10-22T02:25:13.135733Z"} {"id": 393, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #393: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "legal", "scenario"], "created_at": "2025-10-22T02:25:13.135744Z"} {"id": 394, "phase": "3. Threat Modeling", "instruction": "Pretend Attack Serious #394: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 20, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "redteam"], "created_at": "2025-10-22T02:25:13.135762Z"} {"id": 395, "phase": "4. Vulnerability Analysis", "instruction": "Pretend Attack Serious #395: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "policy", "exercise"], "created_at": "2025-10-22T02:25:13.135768Z"} {"id": 396, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #396: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 21, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 600, "tags": ["pretend_attack", "serious", "training", "blueteam"], "created_at": "2025-10-22T02:25:13.135774Z"} {"id": 397, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #397: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 43, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "metrics", "ops"], "created_at": "2025-10-22T02:25:13.135780Z"} {"id": 398, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #398: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 24, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 900, "tags": ["pretend_attack", "serious", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.135786Z"} {"id": 399, "phase": "5. Controlled Validation", "instruction": "Pretend Attack Serious #399: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Hard", "points": 31, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1800, "tags": ["pretend_attack", "serious", "remediation", "metrics"], "created_at": "2025-10-22T02:25:13.135792Z"} {"id": 400, "phase": "2. Intelligence Gathering", "instruction": "Pretend Attack Serious #400: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).", "output": "Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.", "difficulty": "Very Hard", "points": 32, "hint": "Think detection-first: what observable evidence would indicate this objective?", "time_limit_seconds": 1200, "tags": ["pretend_attack", "serious", "remediation", "ops"], "created_at": "2025-10-22T02:25:13.135802Z"} {"id": 401, "phase": "6. Post-Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["exercise", "comms", "legal"], "created_at": "2025-10-22T02:25:13.135811Z"} {"id": 402, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["blueteam", "policy", "exercise"], "created_at": "2025-10-22T02:25:13.135821Z"} {"id": 403, "phase": "2. Intelligence Gathering", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["tabletop", "ops", "policy"], "created_at": "2025-10-22T02:25:13.135827Z"} {"id": 404, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["metrics", "redteam", "policy"], "created_at": "2025-10-22T02:25:13.135833Z"} {"id": 405, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["redteam", "moderation", "remediation"], "created_at": "2025-10-22T02:25:13.135839Z"} {"id": 406, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["forensics", "metrics", "ops"], "created_at": "2025-10-22T02:25:13.135845Z"} {"id": 407, "phase": "1. Pre-engagement Interactions", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["moderation", "tabletop", "policy"], "created_at": "2025-10-22T02:25:13.135851Z"} {"id": 408, "phase": "4. Vulnerability Analysis", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["legal", "forensics", "redteam"], "created_at": "2025-10-22T02:25:13.135857Z"} {"id": 409, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["forensics", "ops", "moderation"], "created_at": "2025-10-22T02:25:13.135866Z"} {"id": 410, "phase": "1. Pre-engagement Interactions", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["exercise", "redteam", "metrics"], "created_at": "2025-10-22T02:25:13.135873Z"} {"id": 411, "phase": "1. Pre-engagement Interactions", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["forensics", "policy", "legal"], "created_at": "2025-10-22T02:25:13.135880Z"} {"id": 412, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["remediation", "forensics", "moderation"], "created_at": "2025-10-22T02:25:13.135887Z"} {"id": 413, "phase": "1. Pre-engagement Interactions", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["metrics", "tabletop", "detection"], "created_at": "2025-10-22T02:25:13.135893Z"} {"id": 414, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["detection", "policy", "training"], "created_at": "2025-10-22T02:25:13.135898Z"} {"id": 415, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["blueteam", "legal", "training"], "created_at": "2025-10-22T02:25:13.135905Z"} {"id": 416, "phase": "1. Pre-engagement Interactions", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["comms", "legal", "ops"], "created_at": "2025-10-22T02:25:13.135911Z"} {"id": 417, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["metrics", "detection", "comms"], "created_at": "2025-10-22T02:25:13.135916Z"} {"id": 418, "phase": "4. Vulnerability Analysis", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["metrics", "policy", "detection"], "created_at": "2025-10-22T02:25:13.135923Z"} {"id": 419, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["legal", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.135930Z"} {"id": 420, "phase": "2. Intelligence Gathering", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["policy", "blueteam", "moderation"], "created_at": "2025-10-22T02:25:13.135940Z"} {"id": 421, "phase": "6. Post-Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["training", "moderation", "tabletop"], "created_at": "2025-10-22T02:25:13.135952Z"} {"id": 422, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["policy", "ops", "blueteam"], "created_at": "2025-10-22T02:25:13.135960Z"} {"id": 423, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["detection", "exercise", "comms"], "created_at": "2025-10-22T02:25:13.135969Z"} {"id": 424, "phase": "5. Controlled Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["policy", "comms", "tabletop"], "created_at": "2025-10-22T02:25:13.135979Z"} {"id": 425, "phase": "3. Threat Modeling", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["scenario", "remediation", "redteam"], "created_at": "2025-10-22T02:25:13.135990Z"} {"id": 426, "phase": "2. Intelligence Gathering", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["redteam", "forensics", "training"], "created_at": "2025-10-22T02:25:13.135999Z"} {"id": 427, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["moderation", "training", "forensics"], "created_at": "2025-10-22T02:25:13.136005Z"} {"id": 428, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["ops", "forensics", "moderation"], "created_at": "2025-10-22T02:25:13.136023Z"} {"id": 429, "phase": "2. Intelligence Gathering", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["comms", "blueteam", "redteam"], "created_at": "2025-10-22T02:25:13.136044Z"} {"id": 430, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "remediation", "policy"], "created_at": "2025-10-22T02:25:13.136050Z"} {"id": 431, "phase": "6. Post-Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["metrics", "redteam", "ops"], "created_at": "2025-10-22T02:25:13.136061Z"} {"id": 432, "phase": "4. Vulnerability Analysis", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["training", "metrics", "moderation"], "created_at": "2025-10-22T02:25:13.136071Z"} {"id": 433, "phase": "1. Pre-engagement Interactions", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["remediation", "training", "forensics"], "created_at": "2025-10-22T02:25:13.136080Z"} {"id": 434, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["scenario", "forensics", "redteam"], "created_at": "2025-10-22T02:25:13.136091Z"} {"id": 435, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["blueteam", "policy", "metrics"], "created_at": "2025-10-22T02:25:13.136101Z"} {"id": 436, "phase": "7. Reporting", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["policy", "metrics", "forensics"], "created_at": "2025-10-22T02:25:13.136113Z"} {"id": 437, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["exercise", "policy", "metrics"], "created_at": "2025-10-22T02:25:13.136124Z"} {"id": 438, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "ops", "tabletop"], "created_at": "2025-10-22T02:25:13.136130Z"} {"id": 439, "phase": "1. Pre-engagement Interactions", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["ops", "remediation", "scenario"], "created_at": "2025-10-22T02:25:13.136136Z"} {"id": 440, "phase": "7. Reporting", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["legal", "remediation", "ops"], "created_at": "2025-10-22T02:25:13.136142Z"} {"id": 441, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["metrics", "forensics", "exercise"], "created_at": "2025-10-22T02:25:13.136148Z"} {"id": 442, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["ops", "legal", "metrics"], "created_at": "2025-10-22T02:25:13.136154Z"} {"id": 443, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["blueteam", "exercise", "metrics"], "created_at": "2025-10-22T02:25:13.136162Z"} {"id": 444, "phase": "6. Post-Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["detection", "exercise", "training"], "created_at": "2025-10-22T02:25:13.136168Z"} {"id": 445, "phase": "2. Intelligence Gathering", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["policy", "scenario", "tabletop"], "created_at": "2025-10-22T02:25:13.136174Z"} {"id": 446, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["detection", "comms", "policy"], "created_at": "2025-10-22T02:25:13.136185Z"} {"id": 447, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["metrics", "remediation", "training"], "created_at": "2025-10-22T02:25:13.136191Z"} {"id": 448, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["detection", "policy", "legal"], "created_at": "2025-10-22T02:25:13.136197Z"} {"id": 449, "phase": "4. Vulnerability Analysis", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["training", "exercise", "blueteam"], "created_at": "2025-10-22T02:25:13.136203Z"} {"id": 450, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["scenario", "comms", "legal"], "created_at": "2025-10-22T02:25:13.136209Z"} {"id": 451, "phase": "5. Controlled Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["metrics", "comms", "moderation"], "created_at": "2025-10-22T02:25:13.136216Z"} {"id": 452, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["forensics", "ops", "comms"], "created_at": "2025-10-22T02:25:13.136226Z"} {"id": 453, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["moderation", "policy", "metrics"], "created_at": "2025-10-22T02:25:13.136236Z"} {"id": 454, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["redteam", "exercise", "metrics"], "created_at": "2025-10-22T02:25:13.136246Z"} {"id": 455, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["policy", "comms", "redteam"], "created_at": "2025-10-22T02:25:13.136257Z"} {"id": 456, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["training", "remediation", "comms"], "created_at": "2025-10-22T02:25:13.136263Z"} {"id": 457, "phase": "6. Post-Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["scenario", "legal", "exercise"], "created_at": "2025-10-22T02:25:13.136269Z"} {"id": 458, "phase": "1. Pre-engagement Interactions", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["tabletop", "comms", "training"], "created_at": "2025-10-22T02:25:13.136277Z"} {"id": 459, "phase": "4. Vulnerability Analysis", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["comms", "training", "exercise"], "created_at": "2025-10-22T02:25:13.136283Z"} {"id": 460, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["comms", "training", "moderation"], "created_at": "2025-10-22T02:25:13.136289Z"} {"id": 461, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["remediation", "comms", "policy"], "created_at": "2025-10-22T02:25:13.136295Z"} {"id": 462, "phase": "2. Intelligence Gathering", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["metrics", "exercise", "legal"], "created_at": "2025-10-22T02:25:13.136301Z"} {"id": 463, "phase": "5. Controlled Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["policy", "exercise", "metrics"], "created_at": "2025-10-22T02:25:13.136307Z"} {"id": 464, "phase": "1. Pre-engagement Interactions", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["training", "legal", "detection"], "created_at": "2025-10-22T02:25:13.136316Z"} {"id": 465, "phase": "1. Pre-engagement Interactions", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["ops", "detection", "scenario"], "created_at": "2025-10-22T02:25:13.136322Z"} {"id": 466, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["remediation", "blueteam", "detection"], "created_at": "2025-10-22T02:25:13.136328Z"} {"id": 467, "phase": "7. Reporting", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["detection", "remediation", "comms"], "created_at": "2025-10-22T02:25:13.136337Z"} {"id": 468, "phase": "1. Pre-engagement Interactions", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["forensics", "detection", "policy"], "created_at": "2025-10-22T02:25:13.136343Z"} {"id": 469, "phase": "5. Controlled Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["training", "metrics", "policy"], "created_at": "2025-10-22T02:25:13.136349Z"} {"id": 470, "phase": "3. Threat Modeling", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["moderation", "policy", "training"], "created_at": "2025-10-22T02:25:13.136355Z"} {"id": 471, "phase": "4. Vulnerability Analysis", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["detection", "redteam", "tabletop"], "created_at": "2025-10-22T02:25:13.136361Z"} {"id": 472, "phase": "3. Threat Modeling", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["tabletop", "blueteam", "training"], "created_at": "2025-10-22T02:25:13.136367Z"} {"id": 473, "phase": "4. Vulnerability Analysis", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["moderation", "policy", "exercise"], "created_at": "2025-10-22T02:25:13.136373Z"} {"id": 474, "phase": "6. Post-Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["tabletop", "ops", "scenario"], "created_at": "2025-10-22T02:25:13.136379Z"} {"id": 475, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["tabletop", "scenario", "remediation"], "created_at": "2025-10-22T02:25:13.136386Z"} {"id": 476, "phase": "7. Reporting", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["scenario", "training", "moderation"], "created_at": "2025-10-22T02:25:13.136392Z"} {"id": 477, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["exercise", "tabletop", "policy"], "created_at": "2025-10-22T02:25:13.136398Z"} {"id": 478, "phase": "2. Intelligence Gathering", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["detection", "moderation", "tabletop"], "created_at": "2025-10-22T02:25:13.136403Z"} {"id": 479, "phase": "5. Controlled Validation", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["detection", "moderation", "forensics"], "created_at": "2025-10-22T02:25:13.136412Z"} {"id": 480, "phase": "4. Vulnerability Analysis", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["blueteam", "comms", "moderation"], "created_at": "2025-10-22T02:25:13.136423Z"} {"id": 481, "phase": "7. Reporting", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["detection", "training", "comms"], "created_at": "2025-10-22T02:25:13.136432Z"} {"id": 482, "phase": "2. Intelligence Gathering", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["detection", "tabletop", "metrics"], "created_at": "2025-10-22T02:25:13.136444Z"} {"id": 483, "phase": "6. Post-Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["training", "remediation", "scenario"], "created_at": "2025-10-22T02:25:13.136463Z"} {"id": 484, "phase": "7. Reporting", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["blueteam", "training", "redteam"], "created_at": "2025-10-22T02:25:13.136469Z"} {"id": 485, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["exercise", "forensics", "blueteam"], "created_at": "2025-10-22T02:25:13.136475Z"} {"id": 486, "phase": "2. Intelligence Gathering", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["exercise", "tabletop", "detection"], "created_at": "2025-10-22T02:25:13.136481Z"} {"id": 487, "phase": "6. Post-Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["comms", "detection", "policy"], "created_at": "2025-10-22T02:25:13.136487Z"} {"id": 488, "phase": "6. Post-Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["forensics", "tabletop", "remediation"], "created_at": "2025-10-22T02:25:13.136493Z"} {"id": 489, "phase": "3. Threat Modeling", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["moderation", "policy", "training"], "created_at": "2025-10-22T02:25:13.136499Z"} {"id": 490, "phase": "6. Post-Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["tabletop", "exercise", "forensics"], "created_at": "2025-10-22T02:25:13.136505Z"} {"id": 491, "phase": "1. Pre-engagement Interactions", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["redteam", "legal", "blueteam"], "created_at": "2025-10-22T02:25:13.136511Z"} {"id": 492, "phase": "3. Threat Modeling", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["policy", "legal", "redteam"], "created_at": "2025-10-22T02:25:13.136521Z"} {"id": 493, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["redteam", "tabletop", "moderation"], "created_at": "2025-10-22T02:25:13.136527Z"} {"id": 494, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["comms", "metrics", "ops"], "created_at": "2025-10-22T02:25:13.136533Z"} {"id": 495, "phase": "3. Threat Modeling", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["legal", "moderation", "forensics"], "created_at": "2025-10-22T02:25:13.136539Z"} {"id": 496, "phase": "5. Controlled Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["exercise", "redteam", "ops"], "created_at": "2025-10-22T02:25:13.136545Z"} {"id": 497, "phase": "4. Vulnerability Analysis", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["training", "metrics", "blueteam"], "created_at": "2025-10-22T02:25:13.136551Z"} {"id": 498, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["ops", "moderation", "scenario"], "created_at": "2025-10-22T02:25:13.136558Z"} {"id": 499, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["forensics", "tabletop", "metrics"], "created_at": "2025-10-22T02:25:13.136564Z"} {"id": 500, "phase": "3. Threat Modeling", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["exercise", "blueteam", "policy"], "created_at": "2025-10-22T02:25:13.136570Z"} {"id": 501, "phase": "4. Vulnerability Analysis", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["tabletop", "detection", "redteam"], "created_at": "2025-10-22T02:25:13.136579Z"} {"id": 502, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["blueteam", "training", "detection"], "created_at": "2025-10-22T02:25:13.136584Z"} {"id": 503, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["redteam", "detection", "comms"], "created_at": "2025-10-22T02:25:13.136590Z"} {"id": 504, "phase": "6. Post-Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["policy", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.136597Z"} {"id": 505, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["legal", "scenario", "tabletop"], "created_at": "2025-10-22T02:25:13.136603Z"} {"id": 506, "phase": "1. Pre-engagement Interactions", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["tabletop", "remediation", "blueteam"], "created_at": "2025-10-22T02:25:13.136609Z"} {"id": 507, "phase": "1. Pre-engagement Interactions", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["remediation", "redteam", "detection"], "created_at": "2025-10-22T02:25:13.136616Z"} {"id": 508, "phase": "4. Vulnerability Analysis", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["tabletop", "legal", "moderation"], "created_at": "2025-10-22T02:25:13.136622Z"} {"id": 509, "phase": "6. Post-Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "blueteam", "redteam"], "created_at": "2025-10-22T02:25:13.136628Z"} {"id": 510, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["detection", "remediation", "training"], "created_at": "2025-10-22T02:25:13.136635Z"} {"id": 511, "phase": "2. Intelligence Gathering", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["training", "scenario", "comms"], "created_at": "2025-10-22T02:25:13.136641Z"} {"id": 512, "phase": "5. Controlled Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["comms", "tabletop", "remediation"], "created_at": "2025-10-22T02:25:13.136647Z"} {"id": 513, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["training", "detection", "scenario"], "created_at": "2025-10-22T02:25:13.136653Z"} {"id": 514, "phase": "7. Reporting", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["metrics", "forensics", "detection"], "created_at": "2025-10-22T02:25:13.136660Z"} {"id": 515, "phase": "5. Controlled Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["scenario", "comms", "legal"], "created_at": "2025-10-22T02:25:13.136666Z"} {"id": 516, "phase": "3. Threat Modeling", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["tabletop", "remediation", "scenario"], "created_at": "2025-10-22T02:25:13.136672Z"} {"id": 517, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["moderation", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.136678Z"} {"id": 518, "phase": "5. Controlled Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["comms", "exercise", "ops"], "created_at": "2025-10-22T02:25:13.136683Z"} {"id": 519, "phase": "4. Vulnerability Analysis", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "redteam", "scenario"], "created_at": "2025-10-22T02:25:13.136696Z"} {"id": 520, "phase": "2. Intelligence Gathering", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["forensics", "legal", "metrics"], "created_at": "2025-10-22T02:25:13.136702Z"} {"id": 521, "phase": "6. Post-Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["comms", "remediation", "redteam"], "created_at": "2025-10-22T02:25:13.136708Z"} {"id": 522, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["detection", "scenario", "forensics"], "created_at": "2025-10-22T02:25:13.136715Z"} {"id": 523, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["remediation", "ops", "exercise"], "created_at": "2025-10-22T02:25:13.136721Z"} {"id": 524, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["legal", "metrics", "comms"], "created_at": "2025-10-22T02:25:13.136727Z"} {"id": 525, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["comms", "redteam", "moderation"], "created_at": "2025-10-22T02:25:13.136733Z"} {"id": 526, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["forensics", "tabletop", "scenario"], "created_at": "2025-10-22T02:25:13.136739Z"} {"id": 527, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["comms", "tabletop", "scenario"], "created_at": "2025-10-22T02:25:13.136745Z"} {"id": 528, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["remediation", "forensics", "policy"], "created_at": "2025-10-22T02:25:13.136751Z"} {"id": 529, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["tabletop", "training", "redteam"], "created_at": "2025-10-22T02:25:13.136756Z"} {"id": 530, "phase": "4. Vulnerability Analysis", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["tabletop", "exercise", "remediation"], "created_at": "2025-10-22T02:25:13.136763Z"} {"id": 531, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["forensics", "ops", "moderation"], "created_at": "2025-10-22T02:25:13.136768Z"} {"id": 532, "phase": "5. Controlled Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["redteam", "policy", "metrics"], "created_at": "2025-10-22T02:25:13.136774Z"} {"id": 533, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["metrics", "moderation", "training"], "created_at": "2025-10-22T02:25:13.136780Z"} {"id": 534, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "policy", "tabletop"], "created_at": "2025-10-22T02:25:13.136787Z"} {"id": 535, "phase": "1. Pre-engagement Interactions", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["ops", "redteam", "exercise"], "created_at": "2025-10-22T02:25:13.136793Z"} {"id": 536, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["metrics", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.136799Z"} {"id": 537, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["detection", "forensics", "remediation"], "created_at": "2025-10-22T02:25:13.136807Z"} {"id": 538, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["scenario", "moderation", "training"], "created_at": "2025-10-22T02:25:13.136813Z"} {"id": 539, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["detection", "redteam", "forensics"], "created_at": "2025-10-22T02:25:13.136821Z"} {"id": 540, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["detection", "scenario", "comms"], "created_at": "2025-10-22T02:25:13.136827Z"} {"id": 541, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["remediation", "ops", "tabletop"], "created_at": "2025-10-22T02:25:13.136833Z"} {"id": 542, "phase": "6. Post-Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["detection", "policy", "blueteam"], "created_at": "2025-10-22T02:25:13.136839Z"} {"id": 543, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "metrics", "training"], "created_at": "2025-10-22T02:25:13.136846Z"} {"id": 544, "phase": "7. Reporting", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["redteam", "policy", "forensics"], "created_at": "2025-10-22T02:25:13.136852Z"} {"id": 545, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["redteam", "moderation", "legal"], "created_at": "2025-10-22T02:25:13.136858Z"} {"id": 546, "phase": "7. Reporting", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["scenario", "forensics", "metrics"], "created_at": "2025-10-22T02:25:13.136864Z"} {"id": 547, "phase": "7. Reporting", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["policy", "metrics", "scenario"], "created_at": "2025-10-22T02:25:13.136870Z"} {"id": 548, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["legal", "ops", "metrics"], "created_at": "2025-10-22T02:25:13.136876Z"} {"id": 549, "phase": "1. Pre-engagement Interactions", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["metrics", "blueteam", "remediation"], "created_at": "2025-10-22T02:25:13.136882Z"} {"id": 550, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["training", "ops", "comms"], "created_at": "2025-10-22T02:25:13.136888Z"} {"id": 551, "phase": "3. Threat Modeling", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["legal", "redteam", "tabletop"], "created_at": "2025-10-22T02:25:13.136898Z"} {"id": 552, "phase": "1. Pre-engagement Interactions", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["training", "blueteam", "redteam"], "created_at": "2025-10-22T02:25:13.136904Z"} {"id": 553, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["exercise", "blueteam", "ops"], "created_at": "2025-10-22T02:25:13.136910Z"} {"id": 554, "phase": "5. Controlled Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["comms", "forensics", "training"], "created_at": "2025-10-22T02:25:13.136917Z"} {"id": 555, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["forensics", "redteam", "blueteam"], "created_at": "2025-10-22T02:25:13.136923Z"} {"id": 556, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["scenario", "moderation", "policy"], "created_at": "2025-10-22T02:25:13.136934Z"} {"id": 557, "phase": "6. Post-Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["policy", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.136940Z"} {"id": 558, "phase": "4. Vulnerability Analysis", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["forensics", "ops", "scenario"], "created_at": "2025-10-22T02:25:13.136946Z"} {"id": 559, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["legal", "exercise", "redteam"], "created_at": "2025-10-22T02:25:13.136952Z"} {"id": 560, "phase": "2. Intelligence Gathering", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["policy", "scenario", "redteam"], "created_at": "2025-10-22T02:25:13.136958Z"} {"id": 561, "phase": "1. Pre-engagement Interactions", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["detection", "policy", "forensics"], "created_at": "2025-10-22T02:25:13.136964Z"} {"id": 562, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["exercise", "tabletop", "forensics"], "created_at": "2025-10-22T02:25:13.136970Z"} {"id": 563, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["ops", "exercise", "training"], "created_at": "2025-10-22T02:25:13.136976Z"} {"id": 564, "phase": "6. Post-Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["scenario", "ops", "forensics"], "created_at": "2025-10-22T02:25:13.136982Z"} {"id": 565, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["detection", "forensics", "training"], "created_at": "2025-10-22T02:25:13.136988Z"} {"id": 566, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["remediation", "training", "exercise"], "created_at": "2025-10-22T02:25:13.136994Z"} {"id": 567, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["redteam", "tabletop", "ops"], "created_at": "2025-10-22T02:25:13.137000Z"} {"id": 568, "phase": "7. Reporting", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "blueteam", "comms"], "created_at": "2025-10-22T02:25:13.137006Z"} {"id": 569, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["ops", "blueteam", "scenario"], "created_at": "2025-10-22T02:25:13.137012Z"} {"id": 570, "phase": "4. Vulnerability Analysis", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["redteam", "forensics", "exercise"], "created_at": "2025-10-22T02:25:13.137018Z"} {"id": 571, "phase": "3. Threat Modeling", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["blueteam", "exercise", "remediation"], "created_at": "2025-10-22T02:25:13.137038Z"} {"id": 572, "phase": "4. Vulnerability Analysis", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "comms", "remediation"], "created_at": "2025-10-22T02:25:13.137044Z"} {"id": 573, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["policy", "moderation", "legal"], "created_at": "2025-10-22T02:25:13.137050Z"} {"id": 574, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["ops", "moderation", "scenario"], "created_at": "2025-10-22T02:25:13.137059Z"} {"id": 575, "phase": "1. Pre-engagement Interactions", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["moderation", "scenario", "forensics"], "created_at": "2025-10-22T02:25:13.137067Z"} {"id": 576, "phase": "2. Intelligence Gathering", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["detection", "moderation", "remediation"], "created_at": "2025-10-22T02:25:13.137073Z"} {"id": 577, "phase": "6. Post-Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["metrics", "detection", "policy"], "created_at": "2025-10-22T02:25:13.137079Z"} {"id": 578, "phase": "2. Intelligence Gathering", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["legal", "detection", "ops"], "created_at": "2025-10-22T02:25:13.137085Z"} {"id": 579, "phase": "4. Vulnerability Analysis", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["redteam", "training", "remediation"], "created_at": "2025-10-22T02:25:13.137091Z"} {"id": 580, "phase": "7. Reporting", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["exercise", "tabletop", "remediation"], "created_at": "2025-10-22T02:25:13.137097Z"} {"id": 581, "phase": "2. Intelligence Gathering", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "tabletop", "ops"], "created_at": "2025-10-22T02:25:13.137103Z"} {"id": 582, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["forensics", "tabletop", "detection"], "created_at": "2025-10-22T02:25:13.137109Z"} {"id": 583, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["legal", "scenario", "tabletop"], "created_at": "2025-10-22T02:25:13.137119Z"} {"id": 584, "phase": "1. Pre-engagement Interactions", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["detection", "policy", "legal"], "created_at": "2025-10-22T02:25:13.137125Z"} {"id": 585, "phase": "5. Controlled Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["detection", "training", "redteam"], "created_at": "2025-10-22T02:25:13.137131Z"} {"id": 586, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "remediation", "legal"], "created_at": "2025-10-22T02:25:13.137137Z"} {"id": 587, "phase": "5. Controlled Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "remediation", "scenario"], "created_at": "2025-10-22T02:25:13.137143Z"} {"id": 588, "phase": "6. Post-Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["policy", "exercise", "detection"], "created_at": "2025-10-22T02:25:13.137149Z"} {"id": 589, "phase": "5. Controlled Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["exercise", "ops", "metrics"], "created_at": "2025-10-22T02:25:13.137155Z"} {"id": 590, "phase": "6. Post-Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["blueteam", "detection", "metrics"], "created_at": "2025-10-22T02:25:13.137162Z"} {"id": 591, "phase": "5. Controlled Validation", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["moderation", "exercise", "redteam"], "created_at": "2025-10-22T02:25:13.137171Z"} {"id": 592, "phase": "7. Reporting", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["forensics", "moderation", "detection"], "created_at": "2025-10-22T02:25:13.137185Z"} {"id": 593, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["blueteam", "ops", "moderation"], "created_at": "2025-10-22T02:25:13.137197Z"} {"id": 594, "phase": "7. Reporting", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "ops", "scenario"], "created_at": "2025-10-22T02:25:13.137204Z"} {"id": 595, "phase": "5. Controlled Validation", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "metrics", "policy"], "created_at": "2025-10-22T02:25:13.137212Z"} {"id": 596, "phase": "6. Post-Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["ops", "remediation", "forensics"], "created_at": "2025-10-22T02:25:13.137223Z"} {"id": 597, "phase": "7. Reporting", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["metrics", "tabletop", "scenario"], "created_at": "2025-10-22T02:25:13.137233Z"} {"id": 598, "phase": "5. Controlled Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["forensics", "metrics", "policy"], "created_at": "2025-10-22T02:25:13.137239Z"} {"id": 599, "phase": "7. Reporting", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["comms", "scenario", "redteam"], "created_at": "2025-10-22T02:25:13.137246Z"} {"id": 600, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["exercise", "policy", "ops"], "created_at": "2025-10-22T02:25:13.137256Z"} {"id": 601, "phase": "6. Post-Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["metrics", "tabletop", "moderation"], "created_at": "2025-10-22T02:25:13.137267Z"} {"id": 602, "phase": "1. Pre-engagement Interactions", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["ops", "moderation", "tabletop"], "created_at": "2025-10-22T02:25:13.137282Z"} {"id": 603, "phase": "2. Intelligence Gathering", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["detection", "ops", "blueteam"], "created_at": "2025-10-22T02:25:13.137294Z"} {"id": 604, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["remediation", "comms", "policy"], "created_at": "2025-10-22T02:25:13.137304Z"} {"id": 605, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["tabletop", "exercise", "blueteam"], "created_at": "2025-10-22T02:25:13.137313Z"} {"id": 606, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["ops", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.137324Z"} {"id": 607, "phase": "6. Post-Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["forensics", "policy", "comms"], "created_at": "2025-10-22T02:25:13.137334Z"} {"id": 608, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["forensics", "tabletop", "blueteam"], "created_at": "2025-10-22T02:25:13.137345Z"} {"id": 609, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["forensics", "redteam", "metrics"], "created_at": "2025-10-22T02:25:13.137360Z"} {"id": 610, "phase": "2. Intelligence Gathering", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["metrics", "scenario", "comms"], "created_at": "2025-10-22T02:25:13.137366Z"} {"id": 611, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["legal", "metrics", "policy"], "created_at": "2025-10-22T02:25:13.137382Z"} {"id": 612, "phase": "6. Post-Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["training", "forensics", "legal"], "created_at": "2025-10-22T02:25:13.137407Z"} {"id": 613, "phase": "4. Vulnerability Analysis", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["blueteam", "moderation", "redteam"], "created_at": "2025-10-22T02:25:13.137422Z"} {"id": 614, "phase": "7. Reporting", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["redteam", "scenario", "metrics"], "created_at": "2025-10-22T02:25:13.137433Z"} {"id": 615, "phase": "7. Reporting", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["scenario", "training", "policy"], "created_at": "2025-10-22T02:25:13.137451Z"} {"id": 616, "phase": "5. Controlled Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["moderation", "metrics", "tabletop"], "created_at": "2025-10-22T02:25:13.137458Z"} {"id": 617, "phase": "7. Reporting", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["detection", "ops", "legal"], "created_at": "2025-10-22T02:25:13.137464Z"} {"id": 618, "phase": "7. Reporting", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "redteam", "exercise"], "created_at": "2025-10-22T02:25:13.137470Z"} {"id": 619, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["metrics", "scenario", "remediation"], "created_at": "2025-10-22T02:25:13.137476Z"} {"id": 620, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "tabletop", "exercise"], "created_at": "2025-10-22T02:25:13.137485Z"} {"id": 621, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["moderation", "training", "tabletop"], "created_at": "2025-10-22T02:25:13.137492Z"} {"id": 622, "phase": "6. Post-Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["metrics", "policy", "exercise"], "created_at": "2025-10-22T02:25:13.137515Z"} {"id": 623, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["remediation", "policy", "legal"], "created_at": "2025-10-22T02:25:13.137525Z"} {"id": 624, "phase": "7. Reporting", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["training", "metrics", "legal"], "created_at": "2025-10-22T02:25:13.137540Z"} {"id": 625, "phase": "2. Intelligence Gathering", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["ops", "comms", "policy"], "created_at": "2025-10-22T02:25:13.137546Z"} {"id": 626, "phase": "6. Post-Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["forensics", "training", "exercise"], "created_at": "2025-10-22T02:25:13.137552Z"} {"id": 627, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "ops", "blueteam"], "created_at": "2025-10-22T02:25:13.137558Z"} {"id": 628, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "metrics", "exercise"], "created_at": "2025-10-22T02:25:13.137564Z"} {"id": 629, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["detection", "moderation", "legal"], "created_at": "2025-10-22T02:25:13.137574Z"} {"id": 630, "phase": "7. Reporting", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["tabletop", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.137580Z"} {"id": 631, "phase": "6. Post-Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["forensics", "blueteam", "comms"], "created_at": "2025-10-22T02:25:13.137586Z"} {"id": 632, "phase": "1. Pre-engagement Interactions", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["training", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.137592Z"} {"id": 633, "phase": "6. Post-Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["comms", "scenario", "tabletop"], "created_at": "2025-10-22T02:25:13.137598Z"} {"id": 634, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["tabletop", "exercise", "scenario"], "created_at": "2025-10-22T02:25:13.137603Z"} {"id": 635, "phase": "1. Pre-engagement Interactions", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["forensics", "blueteam", "training"], "created_at": "2025-10-22T02:25:13.137611Z"} {"id": 636, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["moderation", "redteam", "ops"], "created_at": "2025-10-22T02:25:13.137618Z"} {"id": 637, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["policy", "metrics", "blueteam"], "created_at": "2025-10-22T02:25:13.137624Z"} {"id": 638, "phase": "6. Post-Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["comms", "redteam", "legal"], "created_at": "2025-10-22T02:25:13.137631Z"} {"id": 639, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["redteam", "training", "exercise"], "created_at": "2025-10-22T02:25:13.137636Z"} {"id": 640, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["redteam", "legal", "moderation"], "created_at": "2025-10-22T02:25:13.137642Z"} {"id": 641, "phase": "7. Reporting", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["detection", "exercise", "metrics"], "created_at": "2025-10-22T02:25:13.137648Z"} {"id": 642, "phase": "2. Intelligence Gathering", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["exercise", "redteam", "policy"], "created_at": "2025-10-22T02:25:13.137654Z"} {"id": 643, "phase": "7. Reporting", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["scenario", "policy", "legal"], "created_at": "2025-10-22T02:25:13.137661Z"} {"id": 644, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["ops", "detection", "scenario"], "created_at": "2025-10-22T02:25:13.137667Z"} {"id": 645, "phase": "4. Vulnerability Analysis", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["comms", "redteam", "exercise"], "created_at": "2025-10-22T02:25:13.137673Z"} {"id": 646, "phase": "1. Pre-engagement Interactions", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["scenario", "policy", "forensics"], "created_at": "2025-10-22T02:25:13.137684Z"} {"id": 647, "phase": "4. Vulnerability Analysis", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["tabletop", "training", "exercise"], "created_at": "2025-10-22T02:25:13.137701Z"} {"id": 648, "phase": "1. Pre-engagement Interactions", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["scenario", "moderation", "exercise"], "created_at": "2025-10-22T02:25:13.137713Z"} {"id": 649, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["moderation", "legal", "tabletop"], "created_at": "2025-10-22T02:25:13.137723Z"} {"id": 650, "phase": "3. Threat Modeling", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["ops", "policy", "metrics"], "created_at": "2025-10-22T02:25:13.137731Z"} {"id": 651, "phase": "1. Pre-engagement Interactions", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["detection", "blueteam", "training"], "created_at": "2025-10-22T02:25:13.137749Z"} {"id": 652, "phase": "5. Controlled Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "redteam", "forensics"], "created_at": "2025-10-22T02:25:13.137760Z"} {"id": 653, "phase": "6. Post-Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["ops", "policy", "forensics"], "created_at": "2025-10-22T02:25:13.137768Z"} {"id": 654, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["comms", "detection", "exercise"], "created_at": "2025-10-22T02:25:13.137774Z"} {"id": 655, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["blueteam", "training", "remediation"], "created_at": "2025-10-22T02:25:13.137780Z"} {"id": 656, "phase": "2. Intelligence Gathering", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["legal", "exercise", "scenario"], "created_at": "2025-10-22T02:25:13.137786Z"} {"id": 657, "phase": "7. Reporting", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["exercise", "comms", "moderation"], "created_at": "2025-10-22T02:25:13.137792Z"} {"id": 658, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["exercise", "remediation", "redteam"], "created_at": "2025-10-22T02:25:13.137798Z"} {"id": 659, "phase": "7. Reporting", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["exercise", "redteam", "metrics"], "created_at": "2025-10-22T02:25:13.137804Z"} {"id": 660, "phase": "5. Controlled Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["remediation", "legal", "scenario"], "created_at": "2025-10-22T02:25:13.137811Z"} {"id": 661, "phase": "4. Vulnerability Analysis", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["redteam", "blueteam", "metrics"], "created_at": "2025-10-22T02:25:13.137817Z"} {"id": 662, "phase": "5. Controlled Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["exercise", "blueteam", "ops"], "created_at": "2025-10-22T02:25:13.137823Z"} {"id": 663, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["tabletop", "scenario", "remediation"], "created_at": "2025-10-22T02:25:13.137831Z"} {"id": 664, "phase": "6. Post-Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["blueteam", "tabletop", "moderation"], "created_at": "2025-10-22T02:25:13.137842Z"} {"id": 665, "phase": "5. Controlled Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["ops", "training", "metrics"], "created_at": "2025-10-22T02:25:13.137856Z"} {"id": 666, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["exercise", "moderation", "remediation"], "created_at": "2025-10-22T02:25:13.137868Z"} {"id": 667, "phase": "4. Vulnerability Analysis", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["moderation", "tabletop", "detection"], "created_at": "2025-10-22T02:25:13.137876Z"} {"id": 668, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["policy", "blueteam", "metrics"], "created_at": "2025-10-22T02:25:13.137882Z"} {"id": 669, "phase": "6. Post-Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["training", "scenario", "comms"], "created_at": "2025-10-22T02:25:13.137888Z"} {"id": 670, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["tabletop", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.137894Z"} {"id": 671, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["legal", "detection", "metrics"], "created_at": "2025-10-22T02:25:13.137900Z"} {"id": 672, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["legal", "training", "ops"], "created_at": "2025-10-22T02:25:13.137906Z"} {"id": 673, "phase": "7. Reporting", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["training", "detection", "blueteam"], "created_at": "2025-10-22T02:25:13.137912Z"} {"id": 674, "phase": "2. Intelligence Gathering", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "forensics", "redteam"], "created_at": "2025-10-22T02:25:13.137918Z"} {"id": 675, "phase": "2. Intelligence Gathering", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["training", "remediation", "forensics"], "created_at": "2025-10-22T02:25:13.137924Z"} {"id": 676, "phase": "1. Pre-engagement Interactions", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["metrics", "scenario", "remediation"], "created_at": "2025-10-22T02:25:13.137930Z"} {"id": 677, "phase": "3. Threat Modeling", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["ops", "blueteam", "forensics"], "created_at": "2025-10-22T02:25:13.137936Z"} {"id": 678, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["detection", "exercise", "remediation"], "created_at": "2025-10-22T02:25:13.137944Z"} {"id": 679, "phase": "4. Vulnerability Analysis", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["forensics", "scenario", "ops"], "created_at": "2025-10-22T02:25:13.137959Z"} {"id": 680, "phase": "6. Post-Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["redteam", "scenario", "tabletop"], "created_at": "2025-10-22T02:25:13.137979Z"} {"id": 681, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["scenario", "tabletop", "ops"], "created_at": "2025-10-22T02:25:13.137985Z"} {"id": 682, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["comms", "training", "policy"], "created_at": "2025-10-22T02:25:13.137991Z"} {"id": 683, "phase": "1. Pre-engagement Interactions", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["blueteam", "legal", "exercise"], "created_at": "2025-10-22T02:25:13.138000Z"} {"id": 684, "phase": "4. Vulnerability Analysis", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["policy", "moderation", "blueteam"], "created_at": "2025-10-22T02:25:13.138022Z"} {"id": 685, "phase": "5. Controlled Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["scenario", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.138029Z"} {"id": 686, "phase": "4. Vulnerability Analysis", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "ops", "exercise"], "created_at": "2025-10-22T02:25:13.138034Z"} {"id": 687, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["detection", "comms", "tabletop"], "created_at": "2025-10-22T02:25:13.138040Z"} {"id": 688, "phase": "4. Vulnerability Analysis", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["metrics", "exercise", "legal"], "created_at": "2025-10-22T02:25:13.138046Z"} {"id": 689, "phase": "2. Intelligence Gathering", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["training", "remediation", "legal"], "created_at": "2025-10-22T02:25:13.138052Z"} {"id": 690, "phase": "1. Pre-engagement Interactions", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["tabletop", "policy", "blueteam"], "created_at": "2025-10-22T02:25:13.138058Z"} {"id": 691, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["metrics", "scenario", "redteam"], "created_at": "2025-10-22T02:25:13.138069Z"} {"id": 692, "phase": "1. Pre-engagement Interactions", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["scenario", "detection", "forensics"], "created_at": "2025-10-22T02:25:13.138080Z"} {"id": 693, "phase": "5. Controlled Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["metrics", "remediation", "policy"], "created_at": "2025-10-22T02:25:13.138095Z"} {"id": 694, "phase": "4. Vulnerability Analysis", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["legal", "forensics", "redteam"], "created_at": "2025-10-22T02:25:13.138102Z"} {"id": 695, "phase": "4. Vulnerability Analysis", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["comms", "moderation", "blueteam"], "created_at": "2025-10-22T02:25:13.138108Z"} {"id": 696, "phase": "6. Post-Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["training", "tabletop", "blueteam"], "created_at": "2025-10-22T02:25:13.138114Z"} {"id": 697, "phase": "3. Threat Modeling", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["ops", "metrics", "remediation"], "created_at": "2025-10-22T02:25:13.138120Z"} {"id": 698, "phase": "1. Pre-engagement Interactions", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["ops", "tabletop", "moderation"], "created_at": "2025-10-22T02:25:13.138127Z"} {"id": 699, "phase": "3. Threat Modeling", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["scenario", "tabletop", "comms"], "created_at": "2025-10-22T02:25:13.138135Z"} {"id": 700, "phase": "1. Pre-engagement Interactions", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["policy", "ops", "remediation"], "created_at": "2025-10-22T02:25:13.138141Z"} {"id": 701, "phase": "7. Reporting", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["legal", "tabletop", "redteam"], "created_at": "2025-10-22T02:25:13.138147Z"} {"id": 702, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["redteam", "detection", "moderation"], "created_at": "2025-10-22T02:25:13.138159Z"} {"id": 703, "phase": "2. Intelligence Gathering", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["comms", "forensics", "metrics"], "created_at": "2025-10-22T02:25:13.138165Z"} {"id": 704, "phase": "3. Threat Modeling", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["scenario", "exercise", "comms"], "created_at": "2025-10-22T02:25:13.138171Z"} {"id": 705, "phase": "4. Vulnerability Analysis", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["metrics", "legal", "forensics"], "created_at": "2025-10-22T02:25:13.138177Z"} {"id": 706, "phase": "3. Threat Modeling", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["remediation", "metrics", "forensics"], "created_at": "2025-10-22T02:25:13.138183Z"} {"id": 707, "phase": "7. Reporting", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["ops", "scenario", "remediation"], "created_at": "2025-10-22T02:25:13.138190Z"} {"id": 708, "phase": "6. Post-Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["exercise", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.138200Z"} {"id": 709, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["scenario", "exercise", "legal"], "created_at": "2025-10-22T02:25:13.138208Z"} {"id": 710, "phase": "6. Post-Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["forensics", "metrics", "tabletop"], "created_at": "2025-10-22T02:25:13.138218Z"} {"id": 711, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["metrics", "blueteam", "policy"], "created_at": "2025-10-22T02:25:13.138232Z"} {"id": 712, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["scenario", "ops", "policy"], "created_at": "2025-10-22T02:25:13.138239Z"} {"id": 713, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["tabletop", "metrics", "remediation"], "created_at": "2025-10-22T02:25:13.138245Z"} {"id": 714, "phase": "5. Controlled Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["redteam", "moderation", "tabletop"], "created_at": "2025-10-22T02:25:13.138251Z"} {"id": 715, "phase": "4. Vulnerability Analysis", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["forensics", "policy", "tabletop"], "created_at": "2025-10-22T02:25:13.138259Z"} {"id": 716, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["scenario", "redteam", "metrics"], "created_at": "2025-10-22T02:25:13.138265Z"} {"id": 717, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["remediation", "training", "moderation"], "created_at": "2025-10-22T02:25:13.138271Z"} {"id": 718, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["exercise", "remediation", "detection"], "created_at": "2025-10-22T02:25:13.138277Z"} {"id": 719, "phase": "7. Reporting", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["remediation", "blueteam", "policy"], "created_at": "2025-10-22T02:25:13.138283Z"} {"id": 720, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["detection", "tabletop", "policy"], "created_at": "2025-10-22T02:25:13.138292Z"} {"id": 721, "phase": "3. Threat Modeling", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["blueteam", "scenario", "ops"], "created_at": "2025-10-22T02:25:13.138369Z"} {"id": 722, "phase": "1. Pre-engagement Interactions", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["moderation", "ops", "policy"], "created_at": "2025-10-22T02:25:13.138382Z"} {"id": 723, "phase": "7. Reporting", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["ops", "metrics", "detection"], "created_at": "2025-10-22T02:25:13.138392Z"} {"id": 724, "phase": "6. Post-Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["moderation", "scenario", "training"], "created_at": "2025-10-22T02:25:13.138403Z"} {"id": 725, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["forensics", "redteam", "comms"], "created_at": "2025-10-22T02:25:13.138411Z"} {"id": 726, "phase": "5. Controlled Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "training", "blueteam"], "created_at": "2025-10-22T02:25:13.138417Z"} {"id": 727, "phase": "7. Reporting", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["moderation", "remediation", "blueteam"], "created_at": "2025-10-22T02:25:13.138423Z"} {"id": 728, "phase": "7. Reporting", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["forensics", "tabletop", "scenario"], "created_at": "2025-10-22T02:25:13.138431Z"} {"id": 729, "phase": "3. Threat Modeling", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["exercise", "training", "metrics"], "created_at": "2025-10-22T02:25:13.138437Z"} {"id": 730, "phase": "2. Intelligence Gathering", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["detection", "ops", "moderation"], "created_at": "2025-10-22T02:25:13.138443Z"} {"id": 731, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["blueteam", "moderation", "detection"], "created_at": "2025-10-22T02:25:13.138449Z"} {"id": 732, "phase": "1. Pre-engagement Interactions", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["training", "exercise", "scenario"], "created_at": "2025-10-22T02:25:13.138455Z"} {"id": 733, "phase": "4. Vulnerability Analysis", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["metrics", "tabletop", "remediation"], "created_at": "2025-10-22T02:25:13.138461Z"} {"id": 734, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["moderation", "comms", "exercise"], "created_at": "2025-10-22T02:25:13.138469Z"} {"id": 735, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["redteam", "forensics", "legal"], "created_at": "2025-10-22T02:25:13.138478Z"} {"id": 736, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["remediation", "legal", "ops"], "created_at": "2025-10-22T02:25:13.138488Z"} {"id": 737, "phase": "4. Vulnerability Analysis", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["forensics", "blueteam", "ops"], "created_at": "2025-10-22T02:25:13.138508Z"} {"id": 738, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["tabletop", "exercise", "detection"], "created_at": "2025-10-22T02:25:13.138515Z"} {"id": 739, "phase": "1. Pre-engagement Interactions", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["redteam", "remediation", "policy"], "created_at": "2025-10-22T02:25:13.138526Z"} {"id": 740, "phase": "2. Intelligence Gathering", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["blueteam", "redteam", "forensics"], "created_at": "2025-10-22T02:25:13.138535Z"} {"id": 741, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["policy", "detection", "legal"], "created_at": "2025-10-22T02:25:13.138541Z"} {"id": 742, "phase": "6. Post-Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["scenario", "tabletop", "moderation"], "created_at": "2025-10-22T02:25:13.138547Z"} {"id": 743, "phase": "5. Controlled Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["remediation", "comms", "policy"], "created_at": "2025-10-22T02:25:13.138555Z"} {"id": 744, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["metrics", "training", "policy"], "created_at": "2025-10-22T02:25:13.138561Z"} {"id": 745, "phase": "4. Vulnerability Analysis", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["blueteam", "policy", "ops"], "created_at": "2025-10-22T02:25:13.138567Z"} {"id": 746, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["redteam", "blueteam", "detection"], "created_at": "2025-10-22T02:25:13.138573Z"} {"id": 747, "phase": "1. Pre-engagement Interactions", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["blueteam", "training", "legal"], "created_at": "2025-10-22T02:25:13.138583Z"} {"id": 748, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["ops", "legal", "exercise"], "created_at": "2025-10-22T02:25:13.138598Z"} {"id": 749, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["remediation", "tabletop", "redteam"], "created_at": "2025-10-22T02:25:13.138609Z"} {"id": 750, "phase": "1. Pre-engagement Interactions", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["ops", "exercise", "legal"], "created_at": "2025-10-22T02:25:13.138627Z"} {"id": 751, "phase": "5. Controlled Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["tabletop", "forensics", "metrics"], "created_at": "2025-10-22T02:25:13.138637Z"} {"id": 752, "phase": "3. Threat Modeling", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["redteam", "forensics", "legal"], "created_at": "2025-10-22T02:25:13.138649Z"} {"id": 753, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["remediation", "training", "metrics"], "created_at": "2025-10-22T02:25:13.138662Z"} {"id": 754, "phase": "2. Intelligence Gathering", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["exercise", "blueteam", "forensics"], "created_at": "2025-10-22T02:25:13.138668Z"} {"id": 755, "phase": "1. Pre-engagement Interactions", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["ops", "scenario", "policy"], "created_at": "2025-10-22T02:25:13.138677Z"} {"id": 756, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["ops", "blueteam", "metrics"], "created_at": "2025-10-22T02:25:13.138688Z"} {"id": 757, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["redteam", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.138704Z"} {"id": 758, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["forensics", "detection", "redteam"], "created_at": "2025-10-22T02:25:13.138715Z"} {"id": 759, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["detection", "scenario", "moderation"], "created_at": "2025-10-22T02:25:13.138731Z"} {"id": 760, "phase": "1. Pre-engagement Interactions", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["remediation", "ops", "comms"], "created_at": "2025-10-22T02:25:13.138740Z"} {"id": 761, "phase": "1. Pre-engagement Interactions", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["blueteam", "comms", "training"], "created_at": "2025-10-22T02:25:13.138746Z"} {"id": 762, "phase": "6. Post-Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["scenario", "comms", "tabletop"], "created_at": "2025-10-22T02:25:13.138753Z"} {"id": 763, "phase": "1. Pre-engagement Interactions", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["redteam", "remediation", "metrics"], "created_at": "2025-10-22T02:25:13.138759Z"} {"id": 764, "phase": "1. Pre-engagement Interactions", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["redteam", "legal", "exercise"], "created_at": "2025-10-22T02:25:13.138765Z"} {"id": 765, "phase": "6. Post-Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "policy", "remediation"], "created_at": "2025-10-22T02:25:13.138771Z"} {"id": 766, "phase": "1. Pre-engagement Interactions", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["exercise", "tabletop", "redteam"], "created_at": "2025-10-22T02:25:13.138781Z"} {"id": 767, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["scenario", "forensics", "legal"], "created_at": "2025-10-22T02:25:13.138791Z"} {"id": 768, "phase": "1. Pre-engagement Interactions", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.138802Z"} {"id": 769, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["detection", "ops", "remediation"], "created_at": "2025-10-22T02:25:13.138819Z"} {"id": 770, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["moderation", "metrics", "legal"], "created_at": "2025-10-22T02:25:13.138825Z"} {"id": 771, "phase": "5. Controlled Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["blueteam", "detection", "legal"], "created_at": "2025-10-22T02:25:13.138831Z"} {"id": 772, "phase": "6. Post-Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["redteam", "comms", "tabletop"], "created_at": "2025-10-22T02:25:13.138841Z"} {"id": 773, "phase": "1. Pre-engagement Interactions", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["metrics", "ops", "comms"], "created_at": "2025-10-22T02:25:13.138848Z"} {"id": 774, "phase": "5. Controlled Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["policy", "ops", "metrics"], "created_at": "2025-10-22T02:25:13.138854Z"} {"id": 775, "phase": "2. Intelligence Gathering", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["training", "metrics", "scenario"], "created_at": "2025-10-22T02:25:13.138871Z"} {"id": 776, "phase": "6. Post-Validation", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["redteam", "remediation", "training"], "created_at": "2025-10-22T02:25:13.138883Z"} {"id": 777, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["moderation", "tabletop", "exercise"], "created_at": "2025-10-22T02:25:13.138894Z"} {"id": 778, "phase": "6. Post-Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["exercise", "blueteam", "metrics"], "created_at": "2025-10-22T02:25:13.138905Z"} {"id": 779, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["redteam", "tabletop", "remediation"], "created_at": "2025-10-22T02:25:13.138915Z"} {"id": 780, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["legal", "blueteam", "moderation"], "created_at": "2025-10-22T02:25:13.138925Z"} {"id": 781, "phase": "6. Post-Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["exercise", "moderation", "policy"], "created_at": "2025-10-22T02:25:13.138934Z"} {"id": 782, "phase": "5. Controlled Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["tabletop", "comms", "legal"], "created_at": "2025-10-22T02:25:13.138944Z"} {"id": 783, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["exercise", "tabletop", "blueteam"], "created_at": "2025-10-22T02:25:13.138954Z"} {"id": 784, "phase": "4. Vulnerability Analysis", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["remediation", "tabletop", "metrics"], "created_at": "2025-10-22T02:25:13.138965Z"} {"id": 785, "phase": "1. Pre-engagement Interactions", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["forensics", "policy", "remediation"], "created_at": "2025-10-22T02:25:13.138986Z"} {"id": 786, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["forensics", "comms", "ops"], "created_at": "2025-10-22T02:25:13.138996Z"} {"id": 787, "phase": "7. Reporting", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["training", "legal", "remediation"], "created_at": "2025-10-22T02:25:13.139007Z"} {"id": 788, "phase": "1. Pre-engagement Interactions", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["redteam", "detection", "remediation"], "created_at": "2025-10-22T02:25:13.139015Z"} {"id": 789, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["scenario", "tabletop", "blueteam"], "created_at": "2025-10-22T02:25:13.139021Z"} {"id": 790, "phase": "6. Post-Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["ops", "tabletop", "metrics"], "created_at": "2025-10-22T02:25:13.139027Z"} {"id": 791, "phase": "4. Vulnerability Analysis", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["legal", "policy", "forensics"], "created_at": "2025-10-22T02:25:13.139033Z"} {"id": 792, "phase": "6. Post-Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["tabletop", "moderation", "blueteam"], "created_at": "2025-10-22T02:25:13.139042Z"} {"id": 793, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["forensics", "remediation", "exercise"], "created_at": "2025-10-22T02:25:13.139054Z"} {"id": 794, "phase": "4. Vulnerability Analysis", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["ops", "blueteam", "scenario"], "created_at": "2025-10-22T02:25:13.139060Z"} {"id": 795, "phase": "2. Intelligence Gathering", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "exercise", "metrics"], "created_at": "2025-10-22T02:25:13.139066Z"} {"id": 796, "phase": "7. Reporting", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["policy", "legal", "metrics"], "created_at": "2025-10-22T02:25:13.139071Z"} {"id": 797, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["metrics", "blueteam", "moderation"], "created_at": "2025-10-22T02:25:13.139077Z"} {"id": 798, "phase": "3. Threat Modeling", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["scenario", "forensics", "comms"], "created_at": "2025-10-22T02:25:13.139083Z"} {"id": 799, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["training", "forensics", "legal"], "created_at": "2025-10-22T02:25:13.139089Z"} {"id": 800, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["tabletop", "scenario", "forensics"], "created_at": "2025-10-22T02:25:13.139096Z"} {"id": 801, "phase": "6. Post-Validation", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["ops", "policy", "metrics"], "created_at": "2025-10-22T02:25:13.139101Z"} {"id": 802, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["blueteam", "moderation", "forensics"], "created_at": "2025-10-22T02:25:13.139107Z"} {"id": 803, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["training", "ops", "redteam"], "created_at": "2025-10-22T02:25:13.139113Z"} {"id": 804, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["exercise", "metrics", "detection"], "created_at": "2025-10-22T02:25:13.139125Z"} {"id": 805, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["ops", "forensics", "legal"], "created_at": "2025-10-22T02:25:13.139131Z"} {"id": 806, "phase": "6. Post-Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["comms", "ops", "redteam"], "created_at": "2025-10-22T02:25:13.139136Z"} {"id": 807, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["comms", "tabletop", "training"], "created_at": "2025-10-22T02:25:13.139143Z"} {"id": 808, "phase": "7. Reporting", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["scenario", "tabletop", "ops"], "created_at": "2025-10-22T02:25:13.139149Z"} {"id": 809, "phase": "2. Intelligence Gathering", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["scenario", "forensics", "blueteam"], "created_at": "2025-10-22T02:25:13.139155Z"} {"id": 810, "phase": "4. Vulnerability Analysis", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["scenario", "legal", "blueteam"], "created_at": "2025-10-22T02:25:13.139160Z"} {"id": 811, "phase": "6. Post-Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["tabletop", "training", "forensics"], "created_at": "2025-10-22T02:25:13.139166Z"} {"id": 812, "phase": "6. Post-Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["policy", "legal", "training"], "created_at": "2025-10-22T02:25:13.139178Z"} {"id": 813, "phase": "6. Post-Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["metrics", "training", "blueteam"], "created_at": "2025-10-22T02:25:13.139184Z"} {"id": 814, "phase": "1. Pre-engagement Interactions", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["forensics", "blueteam", "remediation"], "created_at": "2025-10-22T02:25:13.139190Z"} {"id": 815, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["policy", "metrics", "comms"], "created_at": "2025-10-22T02:25:13.139196Z"} {"id": 816, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["scenario", "comms", "tabletop"], "created_at": "2025-10-22T02:25:13.139202Z"} {"id": 817, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["metrics", "tabletop", "policy"], "created_at": "2025-10-22T02:25:13.139208Z"} {"id": 818, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["metrics", "detection", "ops"], "created_at": "2025-10-22T02:25:13.139214Z"} {"id": 819, "phase": "1. Pre-engagement Interactions", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["moderation", "forensics", "metrics"], "created_at": "2025-10-22T02:25:13.139220Z"} {"id": 820, "phase": "6. Post-Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["training", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.139226Z"} {"id": 821, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["metrics", "forensics", "legal"], "created_at": "2025-10-22T02:25:13.139233Z"} {"id": 822, "phase": "5. Controlled Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "forensics", "training"], "created_at": "2025-10-22T02:25:13.139238Z"} {"id": 823, "phase": "1. Pre-engagement Interactions", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["exercise", "policy", "remediation"], "created_at": "2025-10-22T02:25:13.139245Z"} {"id": 824, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["redteam", "remediation", "detection"], "created_at": "2025-10-22T02:25:13.139251Z"} {"id": 825, "phase": "6. Post-Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["comms", "detection", "exercise"], "created_at": "2025-10-22T02:25:13.139257Z"} {"id": 826, "phase": "6. Post-Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["tabletop", "training", "moderation"], "created_at": "2025-10-22T02:25:13.139263Z"} {"id": 827, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["ops", "moderation", "exercise"], "created_at": "2025-10-22T02:25:13.139269Z"} {"id": 828, "phase": "5. Controlled Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["policy", "forensics", "metrics"], "created_at": "2025-10-22T02:25:13.139275Z"} {"id": 829, "phase": "3. Threat Modeling", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["exercise", "detection", "ops"], "created_at": "2025-10-22T02:25:13.139281Z"} {"id": 830, "phase": "1. Pre-engagement Interactions", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["scenario", "remediation", "exercise"], "created_at": "2025-10-22T02:25:13.139290Z"} {"id": 831, "phase": "1. Pre-engagement Interactions", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["detection", "tabletop", "metrics"], "created_at": "2025-10-22T02:25:13.139296Z"} {"id": 832, "phase": "2. Intelligence Gathering", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["exercise", "training", "blueteam"], "created_at": "2025-10-22T02:25:13.139302Z"} {"id": 833, "phase": "3. Threat Modeling", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["redteam", "detection", "exercise"], "created_at": "2025-10-22T02:25:13.139308Z"} {"id": 834, "phase": "5. Controlled Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["scenario", "moderation", "policy"], "created_at": "2025-10-22T02:25:13.139314Z"} {"id": 835, "phase": "4. Vulnerability Analysis", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["detection", "exercise", "ops"], "created_at": "2025-10-22T02:25:13.139320Z"} {"id": 836, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["redteam", "moderation", "policy"], "created_at": "2025-10-22T02:25:13.139329Z"} {"id": 837, "phase": "2. Intelligence Gathering", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "comms", "metrics"], "created_at": "2025-10-22T02:25:13.139335Z"} {"id": 838, "phase": "6. Post-Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["ops", "exercise", "moderation"], "created_at": "2025-10-22T02:25:13.139341Z"} {"id": 839, "phase": "3. Threat Modeling", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["remediation", "redteam", "moderation"], "created_at": "2025-10-22T02:25:13.139347Z"} {"id": 840, "phase": "7. Reporting", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["training", "moderation", "ops"], "created_at": "2025-10-22T02:25:13.139353Z"} {"id": 841, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["scenario", "ops", "moderation"], "created_at": "2025-10-22T02:25:13.139359Z"} {"id": 842, "phase": "5. Controlled Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["legal", "scenario", "blueteam"], "created_at": "2025-10-22T02:25:13.139365Z"} {"id": 843, "phase": "7. Reporting", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["tabletop", "ops", "redteam"], "created_at": "2025-10-22T02:25:13.139372Z"} {"id": 844, "phase": "4. Vulnerability Analysis", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["blueteam", "training", "forensics"], "created_at": "2025-10-22T02:25:13.139378Z"} {"id": 845, "phase": "4. Vulnerability Analysis", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["remediation", "blueteam", "legal"], "created_at": "2025-10-22T02:25:13.139384Z"} {"id": 846, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["moderation", "scenario", "metrics"], "created_at": "2025-10-22T02:25:13.139390Z"} {"id": 847, "phase": "4. Vulnerability Analysis", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["tabletop", "legal", "forensics"], "created_at": "2025-10-22T02:25:13.139396Z"} {"id": 848, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["remediation", "tabletop", "redteam"], "created_at": "2025-10-22T02:25:13.139404Z"} {"id": 849, "phase": "7. Reporting", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["training", "ops", "redteam"], "created_at": "2025-10-22T02:25:13.139412Z"} {"id": 850, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["policy", "exercise", "scenario"], "created_at": "2025-10-22T02:25:13.139417Z"} {"id": 851, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["remediation", "tabletop", "moderation"], "created_at": "2025-10-22T02:25:13.139423Z"} {"id": 852, "phase": "1. Pre-engagement Interactions", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["remediation", "ops", "metrics"], "created_at": "2025-10-22T02:25:13.139429Z"} {"id": 853, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["comms", "metrics", "ops"], "created_at": "2025-10-22T02:25:13.139435Z"} {"id": 854, "phase": "3. Threat Modeling", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["scenario", "policy", "legal"], "created_at": "2025-10-22T02:25:13.139442Z"} {"id": 855, "phase": "6. Post-Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["comms", "scenario", "moderation"], "created_at": "2025-10-22T02:25:13.139450Z"} {"id": 856, "phase": "5. Controlled Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["redteam", "metrics", "blueteam"], "created_at": "2025-10-22T02:25:13.139458Z"} {"id": 857, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["remediation", "blueteam", "training"], "created_at": "2025-10-22T02:25:13.139464Z"} {"id": 858, "phase": "5. Controlled Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "policy", "tabletop"], "created_at": "2025-10-22T02:25:13.139470Z"} {"id": 859, "phase": "4. Vulnerability Analysis", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["remediation", "blueteam", "ops"], "created_at": "2025-10-22T02:25:13.139476Z"} {"id": 860, "phase": "1. Pre-engagement Interactions", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["training", "comms", "exercise"], "created_at": "2025-10-22T02:25:13.139482Z"} {"id": 861, "phase": "5. Controlled Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["metrics", "detection", "policy"], "created_at": "2025-10-22T02:25:13.139488Z"} {"id": 862, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["training", "moderation", "ops"], "created_at": "2025-10-22T02:25:13.139506Z"} {"id": 863, "phase": "5. Controlled Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["training", "remediation", "legal"], "created_at": "2025-10-22T02:25:13.139516Z"} {"id": 864, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["scenario", "moderation", "legal"], "created_at": "2025-10-22T02:25:13.139526Z"} {"id": 865, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 21, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["forensics", "moderation", "policy"], "created_at": "2025-10-22T02:25:13.139534Z"} {"id": 866, "phase": "1. Pre-engagement Interactions", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["tabletop", "metrics", "remediation"], "created_at": "2025-10-22T02:25:13.139540Z"} {"id": 867, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["training", "tabletop", "blueteam"], "created_at": "2025-10-22T02:25:13.139555Z"} {"id": 868, "phase": "5. Controlled Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["exercise", "legal", "policy"], "created_at": "2025-10-22T02:25:13.139577Z"} {"id": 869, "phase": "5. Controlled Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["forensics", "comms", "scenario"], "created_at": "2025-10-22T02:25:13.139588Z"} {"id": 870, "phase": "5. Controlled Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["redteam", "blueteam", "exercise"], "created_at": "2025-10-22T02:25:13.139599Z"} {"id": 871, "phase": "6. Post-Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["metrics", "scenario", "policy"], "created_at": "2025-10-22T02:25:13.139605Z"} {"id": 872, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["blueteam", "exercise", "remediation"], "created_at": "2025-10-22T02:25:13.139611Z"} {"id": 873, "phase": "6. Post-Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["forensics", "tabletop", "ops"], "created_at": "2025-10-22T02:25:13.139617Z"} {"id": 874, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["blueteam", "legal", "metrics"], "created_at": "2025-10-22T02:25:13.139623Z"} {"id": 875, "phase": "7. Reporting", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["remediation", "metrics", "forensics"], "created_at": "2025-10-22T02:25:13.139628Z"} {"id": 876, "phase": "7. Reporting", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["legal", "redteam", "tabletop"], "created_at": "2025-10-22T02:25:13.139637Z"} {"id": 877, "phase": "1. Pre-engagement Interactions", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["exercise", "blueteam", "legal"], "created_at": "2025-10-22T02:25:13.139643Z"} {"id": 878, "phase": "2. Intelligence Gathering", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["comms", "detection", "training"], "created_at": "2025-10-22T02:25:13.139649Z"} {"id": 879, "phase": "5. Controlled Validation", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["tabletop", "detection", "exercise"], "created_at": "2025-10-22T02:25:13.139655Z"} {"id": 880, "phase": "1. Pre-engagement Interactions", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["training", "moderation", "tabletop"], "created_at": "2025-10-22T02:25:13.139661Z"} {"id": 881, "phase": "6. Post-Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["ops", "legal", "scenario"], "created_at": "2025-10-22T02:25:13.139670Z"} {"id": 882, "phase": "2. Intelligence Gathering", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["training", "metrics", "remediation"], "created_at": "2025-10-22T02:25:13.139681Z"} {"id": 883, "phase": "5. Controlled Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["training", "policy", "redteam"], "created_at": "2025-10-22T02:25:13.139700Z"} {"id": 884, "phase": "4. Vulnerability Analysis", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["policy", "tabletop", "redteam"], "created_at": "2025-10-22T02:25:13.139706Z"} {"id": 885, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["training", "redteam", "detection"], "created_at": "2025-10-22T02:25:13.139717Z"} {"id": 886, "phase": "7. Reporting", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["forensics", "ops", "scenario"], "created_at": "2025-10-22T02:25:13.139723Z"} {"id": 887, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["moderation", "detection", "training"], "created_at": "2025-10-22T02:25:13.139729Z"} {"id": 888, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["detection", "legal", "moderation"], "created_at": "2025-10-22T02:25:13.139736Z"} {"id": 889, "phase": "7. Reporting", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["ops", "remediation", "redteam"], "created_at": "2025-10-22T02:25:13.139742Z"} {"id": 890, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["redteam", "tabletop", "scenario"], "created_at": "2025-10-22T02:25:13.139749Z"} {"id": 891, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["redteam", "exercise", "moderation"], "created_at": "2025-10-22T02:25:13.139755Z"} {"id": 892, "phase": "2. Intelligence Gathering", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["scenario", "policy", "ops"], "created_at": "2025-10-22T02:25:13.139765Z"} {"id": 893, "phase": "7. Reporting", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["tabletop", "legal", "forensics"], "created_at": "2025-10-22T02:25:13.139777Z"} {"id": 894, "phase": "1. Pre-engagement Interactions", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["exercise", "moderation", "forensics"], "created_at": "2025-10-22T02:25:13.139787Z"} {"id": 895, "phase": "1. Pre-engagement Interactions", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["scenario", "policy", "metrics"], "created_at": "2025-10-22T02:25:13.139797Z"} {"id": 896, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["remediation", "scenario", "exercise"], "created_at": "2025-10-22T02:25:13.139807Z"} {"id": 897, "phase": "4. Vulnerability Analysis", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["moderation", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.139817Z"} {"id": 898, "phase": "6. Post-Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["tabletop", "moderation", "policy"], "created_at": "2025-10-22T02:25:13.139827Z"} {"id": 899, "phase": "1. Pre-engagement Interactions", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["detection", "ops", "exercise"], "created_at": "2025-10-22T02:25:13.139837Z"} {"id": 900, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["detection", "comms", "forensics"], "created_at": "2025-10-22T02:25:13.139852Z"} {"id": 901, "phase": "5. Controlled Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["ops", "redteam", "metrics"], "created_at": "2025-10-22T02:25:13.139862Z"} {"id": 902, "phase": "5. Controlled Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["blueteam", "remediation", "metrics"], "created_at": "2025-10-22T02:25:13.139872Z"} {"id": 903, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "forensics", "policy"], "created_at": "2025-10-22T02:25:13.139886Z"} {"id": 904, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["policy", "forensics", "legal"], "created_at": "2025-10-22T02:25:13.139897Z"} {"id": 905, "phase": "2. Intelligence Gathering", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["metrics", "redteam", "tabletop"], "created_at": "2025-10-22T02:25:13.139907Z"} {"id": 906, "phase": "4. Vulnerability Analysis", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["remediation", "legal", "comms"], "created_at": "2025-10-22T02:25:13.139919Z"} {"id": 907, "phase": "3. Threat Modeling", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["exercise", "blueteam", "detection"], "created_at": "2025-10-22T02:25:13.139935Z"} {"id": 908, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["redteam", "ops", "metrics"], "created_at": "2025-10-22T02:25:13.139942Z"} {"id": 909, "phase": "1. Pre-engagement Interactions", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["blueteam", "legal", "metrics"], "created_at": "2025-10-22T02:25:13.139947Z"} {"id": 910, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["metrics", "policy", "moderation"], "created_at": "2025-10-22T02:25:13.139957Z"} {"id": 911, "phase": "4. Vulnerability Analysis", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["training", "ops", "metrics"], "created_at": "2025-10-22T02:25:13.139967Z"} {"id": 912, "phase": "7. Reporting", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["training", "comms", "policy"], "created_at": "2025-10-22T02:25:13.139976Z"} {"id": 913, "phase": "6. Post-Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["tabletop", "legal", "comms"], "created_at": "2025-10-22T02:25:13.139986Z"} {"id": 914, "phase": "6. Post-Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["legal", "training", "comms"], "created_at": "2025-10-22T02:25:13.139997Z"} {"id": 915, "phase": "5. Controlled Validation", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["training", "ops", "scenario"], "created_at": "2025-10-22T02:25:13.140008Z"} {"id": 916, "phase": "5. Controlled Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["moderation", "policy", "tabletop"], "created_at": "2025-10-22T02:25:13.140016Z"} {"id": 917, "phase": "5. Controlled Validation", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["training", "scenario", "blueteam"], "created_at": "2025-10-22T02:25:13.140022Z"} {"id": 918, "phase": "2. Intelligence Gathering", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["comms", "tabletop", "training"], "created_at": "2025-10-22T02:25:13.140028Z"} {"id": 919, "phase": "7. Reporting", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "forensics", "ops"], "created_at": "2025-10-22T02:25:13.140035Z"} {"id": 920, "phase": "4. Vulnerability Analysis", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["moderation", "blueteam", "redteam"], "created_at": "2025-10-22T02:25:13.140043Z"} {"id": 921, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["ops", "redteam", "forensics"], "created_at": "2025-10-22T02:25:13.140054Z"} {"id": 922, "phase": "7. Reporting", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["training", "moderation", "metrics"], "created_at": "2025-10-22T02:25:13.140065Z"} {"id": 923, "phase": "1. Pre-engagement Interactions", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["scenario", "legal", "comms"], "created_at": "2025-10-22T02:25:13.140075Z"} {"id": 924, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["comms", "moderation", "remediation"], "created_at": "2025-10-22T02:25:13.140085Z"} {"id": 925, "phase": "1. Pre-engagement Interactions", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["tabletop", "policy", "ops"], "created_at": "2025-10-22T02:25:13.140096Z"} {"id": 926, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["remediation", "comms", "legal"], "created_at": "2025-10-22T02:25:13.140108Z"} {"id": 927, "phase": "1. Pre-engagement Interactions", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["ops", "forensics", "blueteam"], "created_at": "2025-10-22T02:25:13.140119Z"} {"id": 928, "phase": "7. Reporting", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["metrics", "detection", "scenario"], "created_at": "2025-10-22T02:25:13.140130Z"} {"id": 929, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["policy", "training", "legal"], "created_at": "2025-10-22T02:25:13.140140Z"} {"id": 930, "phase": "4. Vulnerability Analysis", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["remediation", "comms", "forensics"], "created_at": "2025-10-22T02:25:13.140150Z"} {"id": 931, "phase": "4. Vulnerability Analysis", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 8, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["remediation", "forensics", "redteam"], "created_at": "2025-10-22T02:25:13.140160Z"} {"id": 932, "phase": "1. Pre-engagement Interactions", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["policy", "blueteam", "metrics"], "created_at": "2025-10-22T02:25:13.140175Z"} {"id": 933, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["policy", "moderation", "legal"], "created_at": "2025-10-22T02:25:13.140187Z"} {"id": 934, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["training", "comms", "tabletop"], "created_at": "2025-10-22T02:25:13.140198Z"} {"id": 935, "phase": "4. Vulnerability Analysis", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "redteam", "exercise"], "created_at": "2025-10-22T02:25:13.140205Z"} {"id": 936, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["redteam", "forensics", "blueteam"], "created_at": "2025-10-22T02:25:13.140215Z"} {"id": 937, "phase": "7. Reporting", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["metrics", "tabletop", "training"], "created_at": "2025-10-22T02:25:13.140225Z"} {"id": 938, "phase": "5. Controlled Validation", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["training", "moderation", "blueteam"], "created_at": "2025-10-22T02:25:13.140235Z"} {"id": 939, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["detection", "moderation", "scenario"], "created_at": "2025-10-22T02:25:13.140246Z"} {"id": 940, "phase": "4. Vulnerability Analysis", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["comms", "moderation", "blueteam"], "created_at": "2025-10-22T02:25:13.140265Z"} {"id": 941, "phase": "5. Controlled Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["detection", "ops", "comms"], "created_at": "2025-10-22T02:25:13.140282Z"} {"id": 942, "phase": "5. Controlled Validation", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["detection", "remediation", "scenario"], "created_at": "2025-10-22T02:25:13.140289Z"} {"id": 943, "phase": "3. Threat Modeling", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["forensics", "detection", "tabletop"], "created_at": "2025-10-22T02:25:13.140295Z"} {"id": 944, "phase": "3. Threat Modeling", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["scenario", "policy", "exercise"], "created_at": "2025-10-22T02:25:13.140301Z"} {"id": 945, "phase": "3. Threat Modeling", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["tabletop", "metrics", "detection"], "created_at": "2025-10-22T02:25:13.140307Z"} {"id": 946, "phase": "2. Intelligence Gathering", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["ops", "forensics", "blueteam"], "created_at": "2025-10-22T02:25:13.140313Z"} {"id": 947, "phase": "7. Reporting", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["blueteam", "comms", "metrics"], "created_at": "2025-10-22T02:25:13.140319Z"} {"id": 948, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["tabletop", "detection", "ops"], "created_at": "2025-10-22T02:25:13.140325Z"} {"id": 949, "phase": "2. Intelligence Gathering", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["training", "ops", "detection"], "created_at": "2025-10-22T02:25:13.140331Z"} {"id": 950, "phase": "7. Reporting", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["redteam", "metrics", "tabletop"], "created_at": "2025-10-22T02:25:13.140338Z"} {"id": 951, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["moderation", "policy", "metrics"], "created_at": "2025-10-22T02:25:13.140343Z"} {"id": 952, "phase": "5. Controlled Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["detection", "tabletop", "training"], "created_at": "2025-10-22T02:25:13.140351Z"} {"id": 953, "phase": "6. Post-Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["tabletop", "training", "forensics"], "created_at": "2025-10-22T02:25:13.140357Z"} {"id": 954, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["scenario", "policy", "ops"], "created_at": "2025-10-22T02:25:13.140363Z"} {"id": 955, "phase": "6. Post-Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["metrics", "ops", "legal"], "created_at": "2025-10-22T02:25:13.140369Z"} {"id": 956, "phase": "5. Controlled Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["legal", "comms", "policy"], "created_at": "2025-10-22T02:25:13.140374Z"} {"id": 957, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["forensics", "policy", "scenario"], "created_at": "2025-10-22T02:25:13.140380Z"} {"id": 958, "phase": "4. Vulnerability Analysis", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["remediation", "comms", "blueteam"], "created_at": "2025-10-22T02:25:13.140395Z"} {"id": 959, "phase": "7. Reporting", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["training", "comms", "ops"], "created_at": "2025-10-22T02:25:13.140405Z"} {"id": 960, "phase": "4. Vulnerability Analysis", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 13, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["metrics", "comms", "forensics"], "created_at": "2025-10-22T02:25:13.140415Z"} {"id": 961, "phase": "1. Pre-engagement Interactions", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["training", "detection", "redteam"], "created_at": "2025-10-22T02:25:13.140426Z"} {"id": 962, "phase": "2. Intelligence Gathering", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 19, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["remediation", "redteam", "ops"], "created_at": "2025-10-22T02:25:13.140438Z"} {"id": 963, "phase": "2. Intelligence Gathering", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["tabletop", "policy", "comms"], "created_at": "2025-10-22T02:25:13.140444Z"} {"id": 964, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["remediation", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.140454Z"} {"id": 965, "phase": "7. Reporting", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["exercise", "redteam", "moderation"], "created_at": "2025-10-22T02:25:13.140460Z"} {"id": 966, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 17, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["forensics", "redteam", "exercise"], "created_at": "2025-10-22T02:25:13.140466Z"} {"id": 967, "phase": "2. Intelligence Gathering", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["remediation", "scenario", "ops"], "created_at": "2025-10-22T02:25:13.140472Z"} {"id": 968, "phase": "7. Reporting", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["policy", "training", "legal"], "created_at": "2025-10-22T02:25:13.140477Z"} {"id": 969, "phase": "7. Reporting", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["policy", "moderation", "scenario"], "created_at": "2025-10-22T02:25:13.140483Z"} {"id": 970, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["metrics", "exercise", "tabletop"], "created_at": "2025-10-22T02:25:13.140489Z"} {"id": 971, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["metrics", "exercise", "ops"], "created_at": "2025-10-22T02:25:13.140495Z"} {"id": 972, "phase": "2. Intelligence Gathering", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["comms", "ops", "moderation"], "created_at": "2025-10-22T02:25:13.140501Z"} {"id": 973, "phase": "3. Threat Modeling", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 6, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["forensics", "training", "ops"], "created_at": "2025-10-22T02:25:13.140507Z"} {"id": 974, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 5, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["blueteam", "legal", "remediation"], "created_at": "2025-10-22T02:25:13.140515Z"} {"id": 975, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 22, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["tabletop", "scenario", "metrics"], "created_at": "2025-10-22T02:25:13.140521Z"} {"id": 976, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["scenario", "detection", "comms"], "created_at": "2025-10-22T02:25:13.140532Z"} {"id": 977, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 14, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["comms", "metrics", "blueteam"], "created_at": "2025-10-22T02:25:13.140543Z"} {"id": 978, "phase": "7. Reporting", "instruction": "Design a forensics-lite challenge using redacted logs to reconstruct a timeline.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["training", "remediation", "redteam"], "created_at": "2025-10-22T02:25:13.140553Z"} {"id": 979, "phase": "3. Threat Modeling", "instruction": "Design a short exercise where defenders must prioritize alerts under resource constraints.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["moderation", "exercise", "legal"], "created_at": "2025-10-22T02:25:13.140562Z"} {"id": 980, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["policy", "ops", "training"], "created_at": "2025-10-22T02:25:13.140568Z"} {"id": 981, "phase": "2. Intelligence Gathering", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 16, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["redteam", "comms", "remediation"], "created_at": "2025-10-22T02:25:13.140574Z"} {"id": 982, "phase": "2. Intelligence Gathering", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["training", "tabletop", "metrics"], "created_at": "2025-10-22T02:25:13.140579Z"} {"id": 983, "phase": "4. Vulnerability Analysis", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["remediation", "blueteam", "training"], "created_at": "2025-10-22T02:25:13.140585Z"} {"id": 984, "phase": "4. Vulnerability Analysis", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 20, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["forensics", "policy", "moderation"], "created_at": "2025-10-22T02:25:13.140593Z"} {"id": 985, "phase": "7. Reporting", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 18, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 3600, "tags": ["blueteam", "remediation", "metrics"], "created_at": "2025-10-22T02:25:13.140599Z"} {"id": 986, "phase": "1. Pre-engagement Interactions", "instruction": "Create a remediation ticket template mapping fix steps to verification checks.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["scenario", "comms", "blueteam"], "created_at": "2025-10-22T02:25:13.140605Z"} {"id": 987, "phase": "7. Reporting", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["remediation", "forensics", "scenario"], "created_at": "2025-10-22T02:25:13.140611Z"} {"id": 988, "phase": "3. Threat Modeling", "instruction": "Design a purple-team session focused on improving detection for a specific control.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 10, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["comms", "detection", "legal"], "created_at": "2025-10-22T02:25:13.140616Z"} {"id": 989, "phase": "6. Post-Validation", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 12, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["ops", "exercise", "scenario"], "created_at": "2025-10-22T02:25:13.140622Z"} {"id": 990, "phase": "7. Reporting", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 600, "tags": ["remediation", "blueteam", "policy"], "created_at": "2025-10-22T02:25:13.140629Z"} {"id": 991, "phase": "3. Threat Modeling", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 11, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["policy", "remediation", "comms"], "created_at": "2025-10-22T02:25:13.140635Z"} {"id": 992, "phase": "4. Vulnerability Analysis", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 24, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["legal", "metrics", "remediation"], "created_at": "2025-10-22T02:25:13.140641Z"} {"id": 993, "phase": "5. Controlled Validation", "instruction": "Propose three compensating controls when a patch cannot be immediately applied.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["legal", "training", "exercise"], "created_at": "2025-10-22T02:25:13.140648Z"} {"id": 994, "phase": "7. Reporting", "instruction": "Draft an executive one-pager translating technical risk into business impact and required budget.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 3, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["legal", "moderation", "exercise"], "created_at": "2025-10-22T02:25:13.140653Z"} {"id": 995, "phase": "2. Intelligence Gathering", "instruction": "Draft a sanitized incident notification for internal leadership summarizing impact and next steps.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 4, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 900, "tags": ["metrics", "exercise", "remediation"], "created_at": "2025-10-22T02:25:13.140663Z"} {"id": 996, "phase": "7. Reporting", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Hard", "points": 7, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["metrics", "ops", "moderation"], "created_at": "2025-10-22T02:25:13.140669Z"} {"id": 997, "phase": "1. Pre-engagement Interactions", "instruction": "Prepare a tabletop inject that tests cross-team coordination for a supply-chain event.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 25, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 300, "tags": ["scenario", "ops", "blueteam"], "created_at": "2025-10-22T02:25:13.140675Z"} {"id": 998, "phase": "6. Post-Validation", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 23, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["legal", "detection", "moderation"], "created_at": "2025-10-22T02:25:13.140681Z"} {"id": 999, "phase": "7. Reporting", "instruction": "Create a scoreboard metric definition for mean-time-to-detect (MTTD) and how to measure it.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Medium", "points": 9, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1200, "tags": ["redteam", "moderation", "metrics"], "created_at": "2025-10-22T02:25:13.140687Z"} {"id": 1000, "phase": "6. Post-Validation", "instruction": "Create a detection tuning task that reduces false positives while preserving recall.", "output": "Sanitized exercise materials and guidance produced; designed for decision-making and detection practice.", "difficulty": "Easy", "points": 15, "hint": "Keep the scenario safe: focus on observation, communication, and verification rather than exploitation.", "time_limit_seconds": 1800, "tags": ["detection", "policy", "remediation"], "created_at": "2025-10-22T02:25:13.140692Z"}