Threat Lab
Learn how AI threat detection works, run attack scenarios, and explore the results step by step.
LEARN— What is Threat Detection?
PRACTICE— Try an Attack
Choose an Attack Scenario
What to Expect
Technique: Direct instruction override via 'ignore previous' and role reassignment phrasing
Expected: BLOCK — Override Detector fires with >80% confidence on multiple patterns
Attack Input
Edit this text — try modifying the attack!Ctrl/Cmd+Enter to execute
Ready to Detect
Choose an attack scenario above and click Execute to see how the detection pipeline analyzes threats in real time.
Run History
No runs yet. Execute a scenario to see history here.