Skip to content
AI Defense Lab

Threat Lab

Learn how AI threat detection works, run attack scenarios, and explore the results step by step.

LEARN— What is Threat Detection?

AI systems can be tricked by specially crafted inputs called “prompt injections.” Detectors scan for known attack patterns in real time.

PRACTICE— Try an Attack

Choose an Attack Scenario

What to Expect

Technique: Direct instruction override via 'ignore previous' and role reassignment phrasing

Expected: BLOCK — Override Detector fires with >80% confidence on multiple patterns

Attack Input

Edit this text — try modifying the attack!

Ready to Detect

Choose an attack scenario above and click Execute to see how the detection pipeline analyzes threats in real time.