File size: 1,755 Bytes
a2b5e7e
44a3de2
 
a2b5e7e
44a3de2
a2b5e7e
44a3de2
a2b5e7e
 
44a3de2
 
a2b5e7e
 
44a3de2
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
---
title: Operon Security Lab
emoji: "\U0001F6E1"
colorFrom: red
colorTo: blue
sdk: gradio
sdk_version: "6.5.1"
app_file: app.py
pinned: false
license: mit
short_description: Prompt injection playground with layered biological defenses
---

# Operon Security Lab

Explore how Operon's layered biological defenses detect and block prompt injection attacks -- from pattern-based screening to proof-carrying certificates.

## What to Try

1. Go to the **Attack Lab** tab, select a preset attack (e.g. "Instruction Override" or "Jailbreak: Enable DAN mode"), and click **Scan** to see how each defense layer responds independently.
2. Switch to the **Layered Defense** tab, pick the same attack, and click **Run Full Pipeline** to watch it flow through all four layers: Membrane, InnateImmunity, DNA Repair, and Certificate verification.
3. Try writing your own adversarial inputs in the free-text area to test edge cases.

## How It Works

| Layer | Biological Analog | What It Does |
|-------|------------------|--------------|
| **Membrane** | Cell membrane / innate immunity | Pattern-based screening against known attack signatures (instruction overrides, jailbreaks, structural injections) |
| **InnateImmunity** | Toll-Like Receptors (TLRs) | Regex-based PAMP detection with inflammation response escalation (NONE through ACUTE) |
| **DNA Repair** | DNA damage response (DDR) | Genome state integrity checking -- detects drift from checkpointed configuration |
| **Certificate** | Proof-carrying code | Formally verifiable structural guarantee that state matches checkpoint |

## Learn More

[GitHub](https://github.com/coredipper/operon) | [PyPI](https://pypi.org/project/operon-ai/) | [Paper](https://github.com/coredipper/operon/tree/main/article)