Spaces:
Runtime error
Runtime error
File size: 1,755 Bytes
a2b5e7e 44a3de2 a2b5e7e 44a3de2 a2b5e7e 44a3de2 a2b5e7e 44a3de2 a2b5e7e 44a3de2 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 | ---
title: Operon Security Lab
emoji: "\U0001F6E1"
colorFrom: red
colorTo: blue
sdk: gradio
sdk_version: "6.5.1"
app_file: app.py
pinned: false
license: mit
short_description: Prompt injection playground with layered biological defenses
---
# Operon Security Lab
Explore how Operon's layered biological defenses detect and block prompt injection attacks -- from pattern-based screening to proof-carrying certificates.
## What to Try
1. Go to the **Attack Lab** tab, select a preset attack (e.g. "Instruction Override" or "Jailbreak: Enable DAN mode"), and click **Scan** to see how each defense layer responds independently.
2. Switch to the **Layered Defense** tab, pick the same attack, and click **Run Full Pipeline** to watch it flow through all four layers: Membrane, InnateImmunity, DNA Repair, and Certificate verification.
3. Try writing your own adversarial inputs in the free-text area to test edge cases.
## How It Works
| Layer | Biological Analog | What It Does |
|-------|------------------|--------------|
| **Membrane** | Cell membrane / innate immunity | Pattern-based screening against known attack signatures (instruction overrides, jailbreaks, structural injections) |
| **InnateImmunity** | Toll-Like Receptors (TLRs) | Regex-based PAMP detection with inflammation response escalation (NONE through ACUTE) |
| **DNA Repair** | DNA damage response (DDR) | Genome state integrity checking -- detects drift from checkpointed configuration |
| **Certificate** | Proof-carrying code | Formally verifiable structural guarantee that state matches checkpoint |
## Learn More
[GitHub](https://github.com/coredipper/operon) | [PyPI](https://pypi.org/project/operon-ai/) | [Paper](https://github.com/coredipper/operon/tree/main/article)
|