Streamlit template space
Explore model inversion attacks and detect data leaks
Generate AI reports and detect fabricated citations
Explore cross‑tenant data leakage in a multi‑tenant AI demo
Simulate and detect malicious tool supply‑chain attacks
Simulate AI memory poisoning attacks in an interactive demo