Upload 3 files
Browse files
README.md
CHANGED
|
@@ -1,62 +1,62 @@
|
|
| 1 |
-
---
|
| 2 |
-
title: SentiTrust AI Security Toolkit
|
| 3 |
-
emoji: 🛡️
|
| 4 |
-
colorFrom: red
|
| 5 |
-
colorTo: gray
|
| 6 |
-
sdk: gradio
|
| 7 |
-
sdk_version:
|
| 8 |
-
app_file: app.py
|
| 9 |
-
pinned: false
|
| 10 |
-
---
|
| 11 |
-
|
| 12 |
-
# SentiTrust AI Red-Teaming Toolkitst AI Security Toolkit
|
| 13 |
-
emoji: 🛡️
|
| 14 |
-
colorFrom: red
|
| 15 |
-
colorTo: gray
|
| 16 |
-
sdk: gradio
|
| 17 |
-
sdk_version: 4.19.0
|
| 18 |
-
app_file: app.py
|
| 19 |
-
pinned: false
|
| 20 |
-
---: SentiTrust AI Security Toolkit
|
| 21 |
-
emoji: �
|
| 22 |
-
colorFrom: red
|
| 23 |
-
colorTo: gray
|
| 24 |
-
sdk: gradio
|
| 25 |
-
sdk_version: 4.19.0
|
| 26 |
-
app_file: app.py
|
| 27 |
-
pinned: false
|
| 28 |
-
---
|
| 29 |
-
|
| 30 |
-
# SentiTrust AI Red-Teaming Toolkit
|
| 31 |
-
|
| 32 |
-
Professional AI security testing platform for enterprise applications.
|
| 33 |
-
|
| 34 |
-
## Capabilities
|
| 35 |
-
|
| 36 |
-
**Framework-Aligned Testing**
|
| 37 |
-
- Jailbreak vulnerability detection using industry-standard attack patterns
|
| 38 |
-
- Prompt injection analysis with OWASP LLM Top 10 mapping
|
| 39 |
-
- Automated vulnerability classification (MITRE ATLAS, NIST AI RMF)
|
| 40 |
-
- Professional risk reports with CVSS scoring
|
| 41 |
-
|
| 42 |
-
**Attack Techniques**
|
| 43 |
-
- 9 jailbreak methods (DAN, AIM, role-play, system leak, constraint breaking)
|
| 44 |
-
- 8 injection patterns (direct, indirect, context switching, delimiter escape)
|
| 45 |
-
- Multi-stage attack simulation
|
| 46 |
-
- Evidence tracking and reproducible testing
|
| 47 |
-
|
| 48 |
-
## Professional Services
|
| 49 |
-
|
| 50 |
-
Need expert security assessments for your AI application?
|
| 51 |
-
|
| 52 |
-
**Express Audit** ($2,500) - 3-day rapid assessment
|
| 53 |
-
**Professional Assessment** ($8,500) - Comprehensive 2-week security review
|
| 54 |
-
**Enterprise Red Team** ($25,000+) - Full adversarial testing program
|
| 55 |
-
|
| 56 |
-
■ [Visit SentiTrust.com](https://sentitrust.adogent.com)
|
| 57 |
-
■ [Book Free 15-Min Security Scan](https://calendly.com/sentitrust/free-security-scan)
|
| 58 |
-
|
| 59 |
-
---
|
| 60 |
-
|
| 61 |
-
**Built by SentiTrust** - Professional AI security assessments for startups and enterprises.
|
| 62 |
-
Trusted by 50+ AI companies • Prevented $20M+ in potential breaches
|
|
|
|
| 1 |
+
---
|
| 2 |
+
title: SentiTrust AI Security Toolkit
|
| 3 |
+
emoji: 🛡️
|
| 4 |
+
colorFrom: red
|
| 5 |
+
colorTo: gray
|
| 6 |
+
sdk: gradio
|
| 7 |
+
sdk_version: 4.19.0
|
| 8 |
+
app_file: app.py
|
| 9 |
+
pinned: false
|
| 10 |
+
---
|
| 11 |
+
|
| 12 |
+
# SentiTrust AI Red-Teaming Toolkitst AI Security Toolkit
|
| 13 |
+
emoji: 🛡️
|
| 14 |
+
colorFrom: red
|
| 15 |
+
colorTo: gray
|
| 16 |
+
sdk: gradio
|
| 17 |
+
sdk_version: 4.19.0
|
| 18 |
+
app_file: app.py
|
| 19 |
+
pinned: false
|
| 20 |
+
---: SentiTrust AI Security Toolkit
|
| 21 |
+
emoji: �
|
| 22 |
+
colorFrom: red
|
| 23 |
+
colorTo: gray
|
| 24 |
+
sdk: gradio
|
| 25 |
+
sdk_version: 4.19.0
|
| 26 |
+
app_file: app.py
|
| 27 |
+
pinned: false
|
| 28 |
+
---
|
| 29 |
+
|
| 30 |
+
# SentiTrust AI Red-Teaming Toolkit
|
| 31 |
+
|
| 32 |
+
Professional AI security testing platform for enterprise applications.
|
| 33 |
+
|
| 34 |
+
## Capabilities
|
| 35 |
+
|
| 36 |
+
**Framework-Aligned Testing**
|
| 37 |
+
- Jailbreak vulnerability detection using industry-standard attack patterns
|
| 38 |
+
- Prompt injection analysis with OWASP LLM Top 10 mapping
|
| 39 |
+
- Automated vulnerability classification (MITRE ATLAS, NIST AI RMF)
|
| 40 |
+
- Professional risk reports with CVSS scoring
|
| 41 |
+
|
| 42 |
+
**Attack Techniques**
|
| 43 |
+
- 9 jailbreak methods (DAN, AIM, role-play, system leak, constraint breaking)
|
| 44 |
+
- 8 injection patterns (direct, indirect, context switching, delimiter escape)
|
| 45 |
+
- Multi-stage attack simulation
|
| 46 |
+
- Evidence tracking and reproducible testing
|
| 47 |
+
|
| 48 |
+
## Professional Services
|
| 49 |
+
|
| 50 |
+
Need expert security assessments for your AI application?
|
| 51 |
+
|
| 52 |
+
**Express Audit** ($2,500) - 3-day rapid assessment
|
| 53 |
+
**Professional Assessment** ($8,500) - Comprehensive 2-week security review
|
| 54 |
+
**Enterprise Red Team** ($25,000+) - Full adversarial testing program
|
| 55 |
+
|
| 56 |
+
■ [Visit SentiTrust.com](https://sentitrust.adogent.com)
|
| 57 |
+
■ [Book Free 15-Min Security Scan](https://calendly.com/sentitrust/free-security-scan)
|
| 58 |
+
|
| 59 |
+
---
|
| 60 |
+
|
| 61 |
+
**Built by SentiTrust** - Professional AI security assessments for startups and enterprises.
|
| 62 |
+
Trusted by 50+ AI companies • Prevented $20M+ in potential breaches
|
app.py
CHANGED
|
@@ -2,7 +2,6 @@ import os
|
|
| 2 |
import sys
|
| 3 |
from pathlib import Path
|
| 4 |
from huggingface_hub import snapshot_download
|
| 5 |
-
import importlib.util
|
| 6 |
|
| 7 |
PRIVATE_REPO = "cybercentinel/ai-red-teaming"
|
| 8 |
CACHE = Path("cache")
|
|
@@ -21,15 +20,20 @@ def load_toolkit():
|
|
| 21 |
token=os.environ.get("HF_TOKEN")
|
| 22 |
)
|
| 23 |
|
| 24 |
-
#
|
| 25 |
sys.path.insert(0, str(CACHE))
|
| 26 |
-
|
| 27 |
-
|
| 28 |
-
|
|
|
|
|
|
|
|
|
|
| 29 |
|
| 30 |
except Exception as e:
|
| 31 |
# Show professional error page if loading fails
|
|
|
|
| 32 |
import gradio as gr
|
|
|
|
| 33 |
with gr.Blocks() as demo:
|
| 34 |
gr.HTML("""
|
| 35 |
<div style="background: #0a0a0a; padding: 60px 30px; border-radius: 12px; text-align: center; color: white; max-width: 800px; margin: 40px auto;">
|
|
@@ -59,7 +63,12 @@ def load_toolkit():
|
|
| 59 |
</p>
|
| 60 |
</div>
|
| 61 |
""")
|
| 62 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 63 |
|
| 64 |
if __name__ == "__main__":
|
| 65 |
load_toolkit()
|
|
|
|
| 2 |
import sys
|
| 3 |
from pathlib import Path
|
| 4 |
from huggingface_hub import snapshot_download
|
|
|
|
| 5 |
|
| 6 |
PRIVATE_REPO = "cybercentinel/ai-red-teaming"
|
| 7 |
CACHE = Path("cache")
|
|
|
|
| 20 |
token=os.environ.get("HF_TOKEN")
|
| 21 |
)
|
| 22 |
|
| 23 |
+
# Add cache to path and import the main app
|
| 24 |
sys.path.insert(0, str(CACHE))
|
| 25 |
+
|
| 26 |
+
# Import and run the app
|
| 27 |
+
print("Starting AI Red-Teaming Toolkit...")
|
| 28 |
+
import app as main_app
|
| 29 |
+
|
| 30 |
+
# The app should auto-launch when imported since it has demo.launch() at module level
|
| 31 |
|
| 32 |
except Exception as e:
|
| 33 |
# Show professional error page if loading fails
|
| 34 |
+
print(f"Error loading toolkit: {e}")
|
| 35 |
import gradio as gr
|
| 36 |
+
|
| 37 |
with gr.Blocks() as demo:
|
| 38 |
gr.HTML("""
|
| 39 |
<div style="background: #0a0a0a; padding: 60px 30px; border-radius: 12px; text-align: center; color: white; max-width: 800px; margin: 40px auto;">
|
|
|
|
| 63 |
</p>
|
| 64 |
</div>
|
| 65 |
""")
|
| 66 |
+
|
| 67 |
+
demo.launch(
|
| 68 |
+
server_name="0.0.0.0",
|
| 69 |
+
server_port=7860,
|
| 70 |
+
share=False
|
| 71 |
+
)
|
| 72 |
|
| 73 |
if __name__ == "__main__":
|
| 74 |
load_toolkit()
|