Register
Login
Resources
Docs Blog Datasets Glossary Case Studies Tutorials & Webinars
Product
Data Engine LLMs Platform Enterprise
Pricing Explore
Connect to our Discord channel

strategies.ts 11 KB

You have to be logged in to leave a comment. Sign In
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
  1. export interface Strategy {
  2. category: string;
  3. categoryLink?: string;
  4. strategy: string;
  5. displayName: string;
  6. description: string;
  7. longDescription: string;
  8. cost: string;
  9. asrIncrease: string;
  10. link?: string;
  11. recommended?: boolean;
  12. }
  13. export const strategies: Strategy[] = [
  14. {
  15. category: 'Custom',
  16. strategy: 'custom',
  17. displayName: 'Custom Strategies',
  18. description: 'User-defined transformations',
  19. longDescription:
  20. 'Allows creation of custom red team testing approaches by programmatically transforming test cases using JavaScript',
  21. cost: 'Variable',
  22. asrIncrease: 'Variable',
  23. link: '/docs/red-team/strategies/custom/',
  24. },
  25. {
  26. category: 'Dynamic (Single-Turn)',
  27. strategy: 'best-of-n',
  28. displayName: 'Best-of-N',
  29. description: 'Parallel sampling attack',
  30. longDescription:
  31. 'Tests multiple variations in parallel using the Best-of-N technique from Anthropic research',
  32. cost: 'High',
  33. asrIncrease: '40-60%',
  34. link: '/docs/red-team/strategies/best-of-n/',
  35. },
  36. {
  37. category: 'Dynamic (Single-Turn)',
  38. strategy: 'citation',
  39. displayName: 'Citation',
  40. description: 'Academic framing',
  41. longDescription:
  42. 'Tests vulnerability to academic authority bias by framing harmful requests in research contexts',
  43. cost: 'Medium',
  44. asrIncrease: '40-60%',
  45. link: '/docs/red-team/strategies/citation/',
  46. },
  47. {
  48. category: 'Dynamic (Single-Turn)',
  49. strategy: 'jailbreak:composite',
  50. displayName: 'Composite Jailbreaks',
  51. description: 'Combined techniques',
  52. longDescription:
  53. 'Chains multiple jailbreak techniques from research papers to create more sophisticated attacks',
  54. cost: 'Medium',
  55. asrIncrease: '60-80%',
  56. link: '/docs/red-team/strategies/composite-jailbreaks/',
  57. recommended: true,
  58. },
  59. {
  60. category: 'Dynamic (Single-Turn)',
  61. strategy: 'gcg',
  62. displayName: 'GCG',
  63. description: 'Gradient-based optimization',
  64. longDescription:
  65. 'Implements the Greedy Coordinate Gradient attack method for finding adversarial prompts using gradient-based search techniques',
  66. cost: 'High',
  67. asrIncrease: '0-10%',
  68. link: '/docs/red-team/strategies/gcg/',
  69. },
  70. {
  71. category: 'Dynamic (Single-Turn)',
  72. strategy: 'jailbreak',
  73. displayName: 'Jailbreak',
  74. description: 'Lightweight iterative refinement',
  75. longDescription:
  76. 'Uses an LLM-as-a-Judge to iteratively refine prompts until they bypass security controls',
  77. cost: 'High',
  78. asrIncrease: '60-80%',
  79. link: '/docs/red-team/strategies/iterative/',
  80. recommended: true,
  81. },
  82. {
  83. category: 'Dynamic (Single-Turn)',
  84. strategy: 'jailbreak:likert',
  85. displayName: 'Likert-based Jailbreaks',
  86. description: 'Academic evaluation framework',
  87. longDescription:
  88. 'Leverages academic evaluation frameworks and Likert scales to frame harmful requests within research contexts',
  89. cost: 'Medium',
  90. asrIncrease: '40-60%',
  91. link: '/docs/red-team/strategies/likert/',
  92. },
  93. {
  94. category: 'Dynamic (Single-Turn)',
  95. strategy: 'math-prompt',
  96. displayName: 'Math Prompt',
  97. description: 'Mathematical encoding',
  98. longDescription:
  99. 'Tests resilience against mathematical notation-based attacks using set theory and abstract algebra',
  100. cost: 'Medium',
  101. asrIncrease: '40-60%',
  102. link: '/docs/red-team/strategies/math-prompt/',
  103. },
  104. {
  105. category: 'Dynamic (Single-Turn)',
  106. strategy: 'jailbreak:tree',
  107. displayName: 'Tree-based',
  108. description: 'Branching attack paths',
  109. longDescription:
  110. 'Creates a tree of attack variations based on the Tree of Attacks research paper',
  111. cost: 'High',
  112. asrIncrease: '60-80%',
  113. link: '/docs/red-team/strategies/tree/',
  114. },
  115. {
  116. category: 'Multi-turn',
  117. strategy: 'crescendo',
  118. displayName: 'Crescendo',
  119. description: 'Gradual escalation',
  120. longDescription:
  121. 'Gradually escalates prompt harm over multiple turns while using backtracking to optimize attack paths',
  122. cost: 'High',
  123. asrIncrease: '70-90%',
  124. link: '/docs/red-team/strategies/multi-turn/',
  125. },
  126. {
  127. category: 'Multi-turn',
  128. strategy: 'goat',
  129. displayName: 'GOAT',
  130. description: 'Generative Offensive Agent Tester',
  131. longDescription:
  132. 'Uses a Generative Offensive Agent Tester to dynamically generate multi-turn conversations',
  133. cost: 'High',
  134. asrIncrease: '70-90%',
  135. link: '/docs/red-team/strategies/goat/',
  136. },
  137. {
  138. category: 'Multi-turn',
  139. strategy: 'mischievous-user',
  140. displayName: 'Mischievous User',
  141. description: 'Mischievous user conversations',
  142. longDescription: 'Simulates a multi-turn conversation between a mischievous user and an agent',
  143. cost: 'High',
  144. asrIncrease: '10-20%',
  145. link: '/docs/red-team/strategies/mischievous-user/',
  146. },
  147. {
  148. category: 'Static (Single-Turn)',
  149. strategy: 'video',
  150. displayName: 'Video Encoding',
  151. description: 'Text-to-video encoding bypass',
  152. longDescription:
  153. 'Tests handling of text embedded in videos and encoded as base64 to potentially bypass text-based content filters',
  154. cost: 'Low',
  155. asrIncrease: '20-30%',
  156. link: '/docs/red-team/strategies/video/',
  157. },
  158. {
  159. category: 'Static (Single-Turn)',
  160. strategy: 'image',
  161. displayName: 'Image Encoding',
  162. description: 'Text-to-image encoding bypass',
  163. longDescription:
  164. 'Tests handling of text embedded in images and encoded as base64 to potentially bypass text-based content filters',
  165. cost: 'Low',
  166. asrIncrease: '20-30%',
  167. link: '/docs/red-team/strategies/image/',
  168. },
  169. {
  170. category: 'Static (Single-Turn)',
  171. strategy: 'audio',
  172. displayName: 'Audio Encoding',
  173. description: 'Text-to-speech encoding bypass',
  174. longDescription:
  175. 'Tests handling of text converted to speech audio and encoded as base64 to potentially bypass text-based content filters',
  176. cost: 'Low',
  177. asrIncrease: '20-30%',
  178. link: '/docs/red-team/strategies/audio/',
  179. },
  180. {
  181. category: 'Static (Single-Turn)',
  182. strategy: 'base64',
  183. displayName: 'Base64',
  184. description: 'Base64 encoding bypass',
  185. longDescription:
  186. 'Tests detection and handling of Base64-encoded malicious payloads to bypass content filters',
  187. cost: 'Low',
  188. asrIncrease: '20-30%',
  189. link: '/docs/red-team/strategies/base64/',
  190. },
  191. {
  192. category: 'Static (Single-Turn)',
  193. strategy: 'hex',
  194. displayName: 'Hex',
  195. description: 'Hex encoding bypass',
  196. longDescription:
  197. 'Tests detection and handling of hex-encoded malicious payloads to bypass content filters',
  198. cost: 'Low',
  199. asrIncrease: '20-30%',
  200. link: '/docs/red-team/strategies/hex/',
  201. },
  202. {
  203. category: 'Static (Single-Turn)',
  204. strategy: 'homoglyph',
  205. displayName: 'Homoglyph',
  206. description: 'Unicode confusable characters',
  207. longDescription:
  208. 'Tests detection and handling of text with homoglyphs (visually similar Unicode characters) to bypass content filters',
  209. cost: 'Low',
  210. asrIncrease: '20-30%',
  211. link: '/docs/red-team/strategies/homoglyph/',
  212. },
  213. {
  214. category: 'Static (Single-Turn)',
  215. strategy: 'basic',
  216. displayName: 'Basic',
  217. description: 'Plugin-generated test cases',
  218. longDescription:
  219. 'Controls whether original plugin-generated test cases are included without any strategies applied',
  220. cost: 'Low',
  221. asrIncrease: 'None',
  222. link: '/docs/red-team/strategies/basic/',
  223. },
  224. {
  225. category: 'Static (Single-Turn)',
  226. strategy: 'leetspeak',
  227. displayName: 'Leetspeak',
  228. description: 'Character substitution',
  229. longDescription:
  230. 'Tests handling of leetspeak-encoded malicious content by replacing standard letters with numbers or special characters',
  231. cost: 'Low',
  232. asrIncrease: '20-30%',
  233. link: '/docs/red-team/strategies/leetspeak/',
  234. },
  235. {
  236. category: 'Static (Single-Turn)',
  237. strategy: 'multilingual',
  238. displayName: 'Multilingual',
  239. description: 'Cross-language testing',
  240. longDescription:
  241. 'Tests handling of inputs across multiple languages, focusing on low-resource languages that may bypass content filters',
  242. cost: 'Low',
  243. asrIncrease: '30-40%',
  244. link: '/docs/red-team/strategies/multilingual/',
  245. },
  246. {
  247. category: 'Static (Single-Turn)',
  248. strategy: 'prompt-injection',
  249. displayName: 'Prompt Injection',
  250. description: 'Direct system prompts',
  251. longDescription:
  252. 'Tests common direct prompt injection vulnerabilities using a curated list of injection techniques',
  253. cost: 'Low',
  254. asrIncrease: '20-30%',
  255. link: '/docs/red-team/strategies/prompt-injection/',
  256. },
  257. {
  258. category: 'Static (Single-Turn)',
  259. strategy: 'rot13',
  260. displayName: 'ROT13',
  261. description: 'Letter rotation encoding',
  262. longDescription:
  263. 'Tests handling of ROT13-encoded malicious payloads by rotating each letter 13 positions in the alphabet',
  264. cost: 'Low',
  265. asrIncrease: '20-30%',
  266. link: '/docs/red-team/strategies/rot13/',
  267. },
  268. {
  269. category: 'Static (Single-Turn)',
  270. strategy: 'morse',
  271. displayName: 'Morse Code',
  272. description: 'Dots and dashes encoding',
  273. longDescription:
  274. 'Tests handling of text encoded in Morse code (dots and dashes) to potentially bypass content filters',
  275. cost: 'Low',
  276. asrIncrease: '20-30%',
  277. link: '/docs/red-team/strategies/other-encodings/#morse-code',
  278. },
  279. {
  280. category: 'Static (Single-Turn)',
  281. strategy: 'piglatin',
  282. displayName: 'Pig Latin',
  283. description: 'Word transformation encoding',
  284. longDescription:
  285. 'Tests handling of text transformed into Pig Latin (rearranging word parts) to potentially bypass content filters',
  286. cost: 'Low',
  287. asrIncrease: '20-30%',
  288. link: '/docs/red-team/strategies/other-encodings/#pig-latin',
  289. },
  290. {
  291. category: 'Static (Single-Turn)',
  292. strategy: 'camelcase',
  293. displayName: 'camelCase',
  294. description: 'camelCase transformation',
  295. longDescription:
  296. 'Tests handling of text transformed into camelCase (removing spaces and capitalizing words) to potentially bypass content filters',
  297. cost: 'Low',
  298. asrIncrease: '0-5%',
  299. link: '/docs/red-team/strategies/other-encodings/#camelcase',
  300. },
  301. {
  302. category: 'Static (Single-Turn)',
  303. strategy: 'emoji',
  304. displayName: 'Emoji Smuggling',
  305. description: 'Variation selector encoding',
  306. longDescription:
  307. 'Tests hiding UTF-8 payloads inside emoji variation selectors to evaluate filter evasion.',
  308. cost: 'Low',
  309. asrIncrease: '0-5%',
  310. link: '/docs/red-team/strategies/other-encodings/#emoji-encoding',
  311. },
  312. {
  313. category: 'Regression',
  314. strategy: 'retry',
  315. displayName: 'Retry',
  316. description: 'Historical failure testing',
  317. longDescription:
  318. 'Automatically incorporates previously failed test cases into your test suite, creating a regression testing system that learns from past failures',
  319. cost: 'Low',
  320. asrIncrease: '50-70%',
  321. link: '/docs/red-team/strategies/retry/',
  322. recommended: false,
  323. },
  324. {
  325. category: 'Multi-turn',
  326. strategy: 'pandamonium',
  327. displayName: 'Pandamonium',
  328. description: 'Dynamic attack generation',
  329. longDescription:
  330. 'Advanced automated red teaming technique that dynamically generates single or multi-turn conversations aimed at bypassing safety measures',
  331. cost: 'High',
  332. asrIncrease: '70-90%',
  333. link: '/docs/red-team/strategies/pandamonium/',
  334. },
  335. ];
Tip!

Press p or to see the previous file or, n or to see the next file

Comments

Loading...