Streamlit template space
Explore model inversion attacks and detect data leaks
Explore cross‑tenant data leakage in a multi‑tenant AI demo
Generate AI reports and detect fabricated citations
Simulate and detect malicious tool supply‑chain attacks
Simulate and test AI oversight bypass scenarios
Run an autonomous AI agent that searches, reads files and emails
Explore multi‑agent trust attacks and defenses interactively
Simulate AI memory poisoning attacks in an interactive demo