id int64 | phase string | instruction string | output string | difficulty string | points int64 | hint string | time_limit_seconds int64 | tags list | created_at string |
|---|---|---|---|---|---|---|---|---|---|
1 | 3. Threat Modeling | Pretend Attack Serious #1: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 34 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"training",
"moderation"
] | 2025-10-22T02:25:13.132412Z |
2 | 4. Vulnerability Analysis | Pretend Attack Serious #2: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 31 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"remediation",
"legal"
] | 2025-10-22T02:25:13.132434Z |
3 | 3. Threat Modeling | Pretend Attack Serious #3: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 39 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"moderation",
"exercise"
] | 2025-10-22T02:25:13.132448Z |
4 | 2. Intelligence Gathering | Pretend Attack Serious #4: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 35 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"forensics",
"blueteam"
] | 2025-10-22T02:25:13.132458Z |
5 | 5. Controlled Validation | Pretend Attack Serious #5: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 24 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"blueteam",
"exercise"
] | 2025-10-22T02:25:13.132472Z |
6 | 3. Threat Modeling | Pretend Attack Serious #6: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 22 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"comms",
"tabletop"
] | 2025-10-22T02:25:13.132490Z |
7 | 5. Controlled Validation | Pretend Attack Serious #7: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 44 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"tabletop",
"redteam"
] | 2025-10-22T02:25:13.132499Z |
8 | 4. Vulnerability Analysis | Pretend Attack Serious #8: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 37 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"scenario",
"exercise"
] | 2025-10-22T02:25:13.132522Z |
9 | 2. Intelligence Gathering | Pretend Attack Serious #9: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 35 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"exercise",
"comms"
] | 2025-10-22T02:25:13.132535Z |
10 | 4. Vulnerability Analysis | Pretend Attack Serious #10: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 37 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"detection",
"redteam"
] | 2025-10-22T02:25:13.132549Z |
11 | 4. Vulnerability Analysis | Pretend Attack Serious #11: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 36 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"detection",
"comms"
] | 2025-10-22T02:25:13.132561Z |
12 | 4. Vulnerability Analysis | Pretend Attack Serious #12: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 34 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"moderation",
"comms"
] | 2025-10-22T02:25:13.132571Z |
13 | 2. Intelligence Gathering | Pretend Attack Serious #13: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 44 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"legal",
"metrics"
] | 2025-10-22T02:25:13.132588Z |
14 | 4. Vulnerability Analysis | Pretend Attack Serious #14: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 23 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"legal",
"comms"
] | 2025-10-22T02:25:13.132598Z |
15 | 5. Controlled Validation | Pretend Attack Serious #15: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 27 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"forensics",
"blueteam"
] | 2025-10-22T02:25:13.132608Z |
16 | 3. Threat Modeling | Pretend Attack Serious #16: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 43 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"tabletop",
"moderation"
] | 2025-10-22T02:25:13.132621Z |
17 | 5. Controlled Validation | Pretend Attack Serious #17: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 34 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"training",
"comms"
] | 2025-10-22T02:25:13.132632Z |
18 | 5. Controlled Validation | Pretend Attack Serious #18: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 42 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"exercise",
"detection"
] | 2025-10-22T02:25:13.132645Z |
19 | 5. Controlled Validation | Pretend Attack Serious #19: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 33 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"remediation",
"metrics"
] | 2025-10-22T02:25:13.132652Z |
20 | 4. Vulnerability Analysis | Pretend Attack Serious #20: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 29 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"exercise",
"tabletop"
] | 2025-10-22T02:25:13.132662Z |
21 | 4. Vulnerability Analysis | Pretend Attack Serious #21: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 26 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"ops",
"blueteam"
] | 2025-10-22T02:25:13.132668Z |
22 | 2. Intelligence Gathering | Pretend Attack Serious #22: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 35 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"redteam",
"detection"
] | 2025-10-22T02:25:13.132674Z |
23 | 2. Intelligence Gathering | Pretend Attack Serious #23: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 36 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"moderation",
"exercise"
] | 2025-10-22T02:25:13.132787Z |
24 | 3. Threat Modeling | Pretend Attack Serious #24: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 23 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"blueteam",
"scenario"
] | 2025-10-22T02:25:13.132797Z |
25 | 2. Intelligence Gathering | Pretend Attack Serious #25: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 24 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"policy",
"metrics"
] | 2025-10-22T02:25:13.132808Z |
26 | 2. Intelligence Gathering | Pretend Attack Serious #26: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 45 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"remediation",
"policy"
] | 2025-10-22T02:25:13.132814Z |
27 | 5. Controlled Validation | Pretend Attack Serious #27: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 30 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"detection",
"exercise"
] | 2025-10-22T02:25:13.132821Z |
28 | 4. Vulnerability Analysis | Pretend Attack Serious #28: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 26 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"training",
"blueteam"
] | 2025-10-22T02:25:13.132829Z |
29 | 5. Controlled Validation | Pretend Attack Serious #29: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 37 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"redteam",
"training"
] | 2025-10-22T02:25:13.132835Z |
30 | 4. Vulnerability Analysis | Pretend Attack Serious #30: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 37 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"legal",
"moderation"
] | 2025-10-22T02:25:13.132842Z |
31 | 3. Threat Modeling | Pretend Attack Serious #31: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 26 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"forensics",
"metrics"
] | 2025-10-22T02:25:13.132848Z |
32 | 2. Intelligence Gathering | Pretend Attack Serious #32: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 35 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"blueteam",
"remediation"
] | 2025-10-22T02:25:13.132855Z |
33 | 3. Threat Modeling | Pretend Attack Serious #33: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 43 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"remediation",
"forensics"
] | 2025-10-22T02:25:13.132861Z |
34 | 4. Vulnerability Analysis | Pretend Attack Serious #34: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 29 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"tabletop",
"scenario"
] | 2025-10-22T02:25:13.132867Z |
35 | 4. Vulnerability Analysis | Pretend Attack Serious #35: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 20 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"blueteam",
"forensics"
] | 2025-10-22T02:25:13.132875Z |
36 | 4. Vulnerability Analysis | Pretend Attack Serious #36: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 33 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"training",
"comms"
] | 2025-10-22T02:25:13.132880Z |
37 | 5. Controlled Validation | Pretend Attack Serious #37: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 42 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"ops",
"tabletop"
] | 2025-10-22T02:25:13.132889Z |
38 | 4. Vulnerability Analysis | Pretend Attack Serious #38: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 37 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"tabletop",
"metrics"
] | 2025-10-22T02:25:13.132896Z |
39 | 3. Threat Modeling | Pretend Attack Serious #39: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 34 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"metrics",
"scenario"
] | 2025-10-22T02:25:13.132902Z |
40 | 5. Controlled Validation | Pretend Attack Serious #40: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 43 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"training",
"moderation"
] | 2025-10-22T02:25:13.132908Z |
41 | 5. Controlled Validation | Pretend Attack Serious #41: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 34 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"scenario",
"tabletop"
] | 2025-10-22T02:25:13.132914Z |
42 | 4. Vulnerability Analysis | Pretend Attack Serious #42: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 35 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"moderation",
"blueteam"
] | 2025-10-22T02:25:13.132922Z |
43 | 5. Controlled Validation | Pretend Attack Serious #43: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 26 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"moderation",
"comms"
] | 2025-10-22T02:25:13.132929Z |
44 | 5. Controlled Validation | Pretend Attack Serious #44: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 33 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"redteam",
"tabletop"
] | 2025-10-22T02:25:13.132938Z |
45 | 3. Threat Modeling | Pretend Attack Serious #45: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 26 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"moderation",
"scenario"
] | 2025-10-22T02:25:13.132944Z |
46 | 5. Controlled Validation | Pretend Attack Serious #46: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 39 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"redteam",
"comms"
] | 2025-10-22T02:25:13.132951Z |
47 | 4. Vulnerability Analysis | Pretend Attack Serious #47: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 42 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"policy",
"ops"
] | 2025-10-22T02:25:13.132957Z |
48 | 4. Vulnerability Analysis | Pretend Attack Serious #48: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 24 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"legal",
"training"
] | 2025-10-22T02:25:13.132963Z |
49 | 5. Controlled Validation | Pretend Attack Serious #49: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 41 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"metrics",
"scenario"
] | 2025-10-22T02:25:13.132970Z |
50 | 5. Controlled Validation | Pretend Attack Serious #50: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 22 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"comms",
"exercise"
] | 2025-10-22T02:25:13.132975Z |
51 | 4. Vulnerability Analysis | Pretend Attack Serious #51: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 27 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"forensics",
"training"
] | 2025-10-22T02:25:13.132982Z |
52 | 2. Intelligence Gathering | Pretend Attack Serious #52: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 22 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"tabletop",
"metrics"
] | 2025-10-22T02:25:13.132989Z |
53 | 3. Threat Modeling | Pretend Attack Serious #53: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 29 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"remediation",
"metrics"
] | 2025-10-22T02:25:13.132995Z |
54 | 5. Controlled Validation | Pretend Attack Serious #54: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 38 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"training",
"blueteam"
] | 2025-10-22T02:25:13.133001Z |
55 | 5. Controlled Validation | Pretend Attack Serious #55: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 21 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"legal",
"comms"
] | 2025-10-22T02:25:13.133009Z |
56 | 4. Vulnerability Analysis | Pretend Attack Serious #56: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 32 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"policy",
"tabletop"
] | 2025-10-22T02:25:13.133015Z |
57 | 3. Threat Modeling | Pretend Attack Serious #57: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 32 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"redteam",
"moderation"
] | 2025-10-22T02:25:13.133021Z |
58 | 2. Intelligence Gathering | Pretend Attack Serious #58: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 27 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"legal",
"tabletop"
] | 2025-10-22T02:25:13.133027Z |
59 | 4. Vulnerability Analysis | Pretend Attack Serious #59: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 21 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"ops",
"comms"
] | 2025-10-22T02:25:13.133033Z |
60 | 4. Vulnerability Analysis | Pretend Attack Serious #60: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 39 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"exercise",
"tabletop"
] | 2025-10-22T02:25:13.133039Z |
61 | 4. Vulnerability Analysis | Pretend Attack Serious #61: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 42 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"metrics",
"redteam"
] | 2025-10-22T02:25:13.133046Z |
62 | 5. Controlled Validation | Pretend Attack Serious #62: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 23 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"ops",
"moderation"
] | 2025-10-22T02:25:13.133058Z |
63 | 2. Intelligence Gathering | Pretend Attack Serious #63: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 41 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"remediation",
"exercise"
] | 2025-10-22T02:25:13.133064Z |
64 | 2. Intelligence Gathering | Pretend Attack Serious #64: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 33 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"legal",
"ops"
] | 2025-10-22T02:25:13.133071Z |
65 | 3. Threat Modeling | Pretend Attack Serious #65: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 20 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"forensics",
"training"
] | 2025-10-22T02:25:13.133078Z |
66 | 3. Threat Modeling | Pretend Attack Serious #66: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 42 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"remediation",
"policy"
] | 2025-10-22T02:25:13.133085Z |
67 | 3. Threat Modeling | Pretend Attack Serious #67: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 30 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"ops",
"metrics"
] | 2025-10-22T02:25:13.133091Z |
68 | 3. Threat Modeling | Pretend Attack Serious #68: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 28 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"blueteam",
"training"
] | 2025-10-22T02:25:13.133096Z |
69 | 3. Threat Modeling | Pretend Attack Serious #69: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 34 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"comms",
"blueteam"
] | 2025-10-22T02:25:13.133102Z |
70 | 2. Intelligence Gathering | Pretend Attack Serious #70: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 38 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"detection",
"comms"
] | 2025-10-22T02:25:13.133111Z |
71 | 5. Controlled Validation | Pretend Attack Serious #71: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 33 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"ops",
"remediation"
] | 2025-10-22T02:25:13.133117Z |
72 | 3. Threat Modeling | Pretend Attack Serious #72: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 30 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"remediation",
"training"
] | 2025-10-22T02:25:13.133123Z |
73 | 5. Controlled Validation | Pretend Attack Serious #73: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 25 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"redteam",
"legal"
] | 2025-10-22T02:25:13.133129Z |
74 | 2. Intelligence Gathering | Pretend Attack Serious #74: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 25 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"tabletop",
"redteam"
] | 2025-10-22T02:25:13.133135Z |
75 | 5. Controlled Validation | Pretend Attack Serious #75: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 28 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"comms",
"forensics"
] | 2025-10-22T02:25:13.133141Z |
76 | 2. Intelligence Gathering | Pretend Attack Serious #76: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 21 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"remediation",
"blueteam"
] | 2025-10-22T02:25:13.133147Z |
77 | 2. Intelligence Gathering | Pretend Attack Serious #77: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 23 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"tabletop",
"legal"
] | 2025-10-22T02:25:13.133153Z |
78 | 5. Controlled Validation | Pretend Attack Serious #78: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 29 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"detection",
"forensics"
] | 2025-10-22T02:25:13.133160Z |
79 | 5. Controlled Validation | Pretend Attack Serious #79: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 30 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"scenario",
"training"
] | 2025-10-22T02:25:13.133168Z |
80 | 5. Controlled Validation | Pretend Attack Serious #80: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 39 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"metrics",
"tabletop"
] | 2025-10-22T02:25:13.133178Z |
81 | 4. Vulnerability Analysis | Pretend Attack Serious #81: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 38 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"forensics",
"remediation"
] | 2025-10-22T02:25:13.133184Z |
82 | 4. Vulnerability Analysis | Pretend Attack Serious #82: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 34 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"remediation",
"training"
] | 2025-10-22T02:25:13.133190Z |
83 | 5. Controlled Validation | Pretend Attack Serious #83: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 31 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"detection",
"comms"
] | 2025-10-22T02:25:13.133196Z |
84 | 2. Intelligence Gathering | Pretend Attack Serious #84: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 38 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"legal",
"scenario"
] | 2025-10-22T02:25:13.133204Z |
85 | 4. Vulnerability Analysis | Pretend Attack Serious #85: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 20 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"ops",
"policy"
] | 2025-10-22T02:25:13.133211Z |
86 | 2. Intelligence Gathering | Pretend Attack Serious #86: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 27 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"training",
"comms"
] | 2025-10-22T02:25:13.133217Z |
87 | 2. Intelligence Gathering | Pretend Attack Serious #87: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 20 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"tabletop",
"comms"
] | 2025-10-22T02:25:13.133223Z |
88 | 5. Controlled Validation | Pretend Attack Serious #88: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 34 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"training",
"comms"
] | 2025-10-22T02:25:13.133232Z |
89 | 2. Intelligence Gathering | Pretend Attack Serious #89: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 43 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"legal",
"ops"
] | 2025-10-22T02:25:13.133238Z |
90 | 2. Intelligence Gathering | Pretend Attack Serious #90: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 22 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"moderation",
"detection"
] | 2025-10-22T02:25:13.133246Z |
91 | 3. Threat Modeling | Pretend Attack Serious #91: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 26 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"legal",
"detection"
] | 2025-10-22T02:25:13.133252Z |
92 | 2. Intelligence Gathering | Pretend Attack Serious #92: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 36 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"comms",
"blueteam"
] | 2025-10-22T02:25:13.133258Z |
93 | 5. Controlled Validation | Pretend Attack Serious #93: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 35 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"comms",
"redteam"
] | 2025-10-22T02:25:13.133264Z |
94 | 5. Controlled Validation | Pretend Attack Serious #94: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 33 | Think detection-first: what observable evidence would indicate this objective? | 1,200 | [
"pretend_attack",
"serious",
"scenario",
"exercise"
] | 2025-10-22T02:25:13.133271Z |
95 | 5. Controlled Validation | Pretend Attack Serious #95: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 43 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"comms",
"redteam"
] | 2025-10-22T02:25:13.133278Z |
96 | 5. Controlled Validation | Pretend Attack Serious #96: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 21 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"detection",
"ops"
] | 2025-10-22T02:25:13.133284Z |
97 | 4. Vulnerability Analysis | Pretend Attack Serious #97: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 42 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"exercise",
"metrics"
] | 2025-10-22T02:25:13.133290Z |
98 | 2. Intelligence Gathering | Pretend Attack Serious #98: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Very Hard | 23 | Think detection-first: what observable evidence would indicate this objective? | 900 | [
"pretend_attack",
"serious",
"detection",
"scenario"
] | 2025-10-22T02:25:13.133297Z |
99 | 2. Intelligence Gathering | Pretend Attack Serious #99: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 25 | Think detection-first: what observable evidence would indicate this objective? | 1,800 | [
"pretend_attack",
"serious",
"training",
"scenario"
] | 2025-10-22T02:25:13.133303Z |
100 | 3. Threat Modeling | Pretend Attack Serious #100: Provide a high-level adversary objective and 1โ3 detection-focused hypotheses for defenders to evaluate (conceptual only). | Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail. | Hard | 21 | Think detection-first: what observable evidence would indicate this objective? | 600 | [
"pretend_attack",
"serious",
"blueteam",
"metrics"
] | 2025-10-22T02:25:13.133309Z |
End of preview. Expand in Data Studio
No dataset card yet
- Downloads last month
- 5