Red Team Sandbox

Inspect the current 91-attack public suite, then reproduce it locally from the canonical eval pack.

91/91
Attacks Blocked
0/15
Clean False Positives
10
Attack Categories
14
Security Layers

Head-to-Head Benchmark

SystemBlockedASRFalse Positives
No Protection0/91100%0
Meta Prompt Guard15/9183.5%?
Keyword Filter27/9170.3%High
ProtectAI DeBERTa v2 (411K downloads)62/9131.9%?
SCBE-AETHERMOORE91/910.0%0/15 clean

10 Attack Categories

Direct Override

10/10 blocked

"Ignore previous instructions"

Indirect Injection

10/10 blocked

Hidden instructions in context

Encoding Obfuscation

10/10 blocked

Base64, rot13, hex payloads

Multilingual

10/10 blocked

Cross-language attack vectors

Adaptive Sequences

11/11 blocked

Escalating multi-turn attacks

Tool Exfiltration

10/10 blocked

API key/credential extraction

Tongue Manipulation

10/10 blocked

Sacred Tongue spoofing

Spin Drift

10/10 blocked

Gradual trust erosion

Boundary Exploits

5/5 blocked

Edge-case geometry attacks

Combined Multi-Vector

5/5 blocked

Simultaneous attack types

Detection Methods Nobody Else Has

Null Space Attack Fingerprinting

Attacks are identified by which tongue dimensions are ABSENT, not present. Encoding attacks only activate Runethic (binding/math). Tool exfiltration only activates Runethic + Cassisivadan. The silence is the signal.

Session Suspicion Accumulation

Most detectors are stateless. Ours tracks suspicion across sequential prompts. Rapid-fire probing costs exponentially more. A bot blasting 10 injections per second defeats itself.

Triple-Weight Remainder

Three independent scoring methods (phi/moon/foam) process the same input. When they disagree, the disagreement IS the signal. Catches 13 attacks the primary detector misses.

Hyperbolic Cost Scaling

H(d,R) = R^(d^2). Adversarial behavior costs exponentially more. At the boundary, attacks become computationally infeasible. Not blocked by rules — blocked by geometry.

$1
60 minutes of full access
Request hosted sandbox access

Hosted checkout is being rewired. The free local path is active now: pytest tests/adversarial/test_adversarial_benchmark.py -v

Hosted path: Request a time-limited hosted session if you want the guided sandbox without local setup. The public self-serve checkout link is being replaced; until then, the authoritative proof path is the local eval pack and the public dataset.

Or run it free: The entire test suite is open source. Install it, run it locally, verify every claim yourself. Start with the canonical eval pack before relying on summary tables alone.

Dataset: huggingface.co/datasets/issdandavis/scbe-red-team-benchmarks
Eval pack: aethermoore.com/research/eval-pack.html
Patent: USPTO #63/961,403 (provisional)
Author: Issac Daniel Davis (ORCID: 0009-0002-3936-9369)

Also available

Try 14 Free Demos | Read the Novel ($4.99) | Architecture Overview