{"version":1,"pages":[{"id":"47jXilXDnlmeygu6hd78","title":"README","pathname":"/ai-llm-red-team-handbook-and-field-manual","siteSpaceId":"sitesp_c18nN","description":""},{"id":"gZ7AEoJOFW4RpEgah8xJ","title":"1. Introduction to AI Red Teaming","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_01_introduction_to_ai_red_teaming","siteSpaceId":"sitesp_c18nN","description":""},{"id":"KyLJzj2DAhxM2IwaPCGJ","title":"2. Ethics, Legal, and Stakeholder Communication","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_02_ethics_legal_and_stakeholder_communication","siteSpaceId":"sitesp_c18nN","description":""},{"id":"8doOR1W731R3clpiFzFX","title":"3. The Red Teamer's Mindset","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_03_the_red_teamers_mindset","siteSpaceId":"sitesp_c18nN","description":""},{"id":"pKAkmAdMl5dsEhytykRt","title":"4. SOW, Rules of Engagement, and Onboarding","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_04_sow_rules_of_engagement_and_client_onboarding","siteSpaceId":"sitesp_c18nN","description":""},{"id":"trbJ8M90bFXbczCdkzZo","title":"5. Threat Modeling and Risk Analysis","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_05_threat_modeling_and_risk_analysis","siteSpaceId":"sitesp_c18nN","description":""},{"id":"udheekYbe6S6OWcGKAbl","title":"6. Scoping an Engagement","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_06_scoping_an_engagement","siteSpaceId":"sitesp_c18nN","description":""},{"id":"5sTpTBSHLg2cqiwFuVgO","title":"7. Lab Setup and Environmental Safety","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_07_lab_setup_and_environmental_safety","siteSpaceId":"sitesp_c18nN","description":""},{"id":"uxZmWN1kyXIVURbwCFXb","title":"8. Evidence Documentation and Chain of Custody","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_08_evidence_documentation_and_chain_of_custody","siteSpaceId":"sitesp_c18nN","description":""},{"id":"rh3kfFOYpdh6KUpV7YEp","title":"9. LLM Architectures and System Components","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_09_llm_architectures_and_system_components","siteSpaceId":"sitesp_c18nN","description":""},{"id":"FXEEbszLQbn43V7vQnr9","title":"10. Tokenization, Context, and Generation","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_10_tokenization_context_and_generation","siteSpaceId":"sitesp_c18nN","description":""},{"id":"qofcJFjpINir5QijvTfg","title":"11. Plugins, Extensions, and External APIs","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_11_plugins_extensions_and_external_apis","siteSpaceId":"sitesp_c18nN","description":""},{"id":"L19MWwFkPABT0zwHIvqh","title":"12. Retrieval Augmented Generation (RAG) Pipelines","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_12_retrieval_augmented_generation_rag_pipelines","siteSpaceId":"sitesp_c18nN","description":""},{"id":"lqLqW3byReYkp8nkGXox","title":"13. Data Provenance and Supply Chain Security","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_13_data_provenance_and_supply_chain_security","siteSpaceId":"sitesp_c18nN","description":""},{"id":"Wjto5K9hyqGXqxB8ujDH","title":"14. Prompt Injection","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_14_prompt_injection","siteSpaceId":"sitesp_c18nN","description":""},{"id":"UgyEwwTFG81o9qrMpQ3s","title":"15. Data Leakage and Extraction","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_15_data_leakage_and_extraction","siteSpaceId":"sitesp_c18nN","description":""},{"id":"UcuKApmzNFMh8LzHzcO9","title":"16. Jailbreaks and Bypass Techniques","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_16_jailbreaks_and_bypass_techniques","siteSpaceId":"sitesp_c18nN","description":""},{"id":"4nC4lHTsBvN3TKQQjAYR","title":"17. Plugin and API Exploitation","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture","siteSpaceId":"sitesp_c18nN","description":""},{"id":"qsg1Ugj5qu7njR7F7glp","title":"API Authentication and Authorization","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture/chapter_17_02_api_authentication_and_authorization","siteSpaceId":"sitesp_c18nN","description":"","breadcrumbs":[{"label":"17. Plugin and API Exploitation"}]},{"id":"F5sDScPttmaaSfmKOBt5","title":"Plugin Vulnerabilities","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture/chapter_17_03_plugin_vulnerabilities","siteSpaceId":"sitesp_c18nN","description":"","breadcrumbs":[{"label":"17. Plugin and API Exploitation"}]},{"id":"FHykd6Va7lpdhmpXPgAe","title":"API Exploitation and Function Calling","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture/chapter_17_04_api_exploitation_and_function_calling","siteSpaceId":"sitesp_c18nN","description":"","breadcrumbs":[{"label":"17. Plugin and API Exploitation"}]},{"id":"LNOIt28yCyZUjgISMHeL","title":"Third Party Risks and Testing","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture/chapter_17_05_third_party_risks_and_testing","siteSpaceId":"sitesp_c18nN","description":"","breadcrumbs":[{"label":"17. Plugin and API Exploitation"}]},{"id":"kxJ1kbyksOj8I3NqlVEw","title":"Case Studies and Defense","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_17_01_fundamentals_and_architecture/chapter_17_06_case_studies_and_defense","siteSpaceId":"sitesp_c18nN","description":"","breadcrumbs":[{"label":"17. Plugin and API Exploitation"}]},{"id":"axdah9s7EPhZR7DzFJ6j","title":"18. Evasion, Obfuscation, and Adversarial Inputs","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_18_evasion_obfuscation_and_adversarial_inputs","siteSpaceId":"sitesp_c18nN","description":""},{"id":"xTZuZdVzkVEX20WHKTUs","title":"19. Training Data Poisoning","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_19_training_data_poisoning","siteSpaceId":"sitesp_c18nN","description":""},{"id":"LrZ02jLF6jv06ZkMDBsF","title":"20. Model Theft and Membership Inference","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_20_model_theft_and_membership_inference","siteSpaceId":"sitesp_c18nN","description":""},{"id":"8OAnHYlmvTklLwLU2lnE","title":"21. Model DoS and Resource Exhaustion","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_21_model_dos_resource_exhaustion","siteSpaceId":"sitesp_c18nN","description":""},{"id":"v8iPdRYmpdrt12L41Ily","title":"22. Cross-Modal and Multimodal Attacks","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_22_cross_modal_multimodal_attacks","siteSpaceId":"sitesp_c18nN","description":""},{"id":"8U9bQfqVPDGOo8uAnuCu","title":"23. Advanced Persistence and Chaining","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_23_advanced_persistence_chaining","siteSpaceId":"sitesp_c18nN","description":""},{"id":"gyZZAJMefeOdqTPkSbj0","title":"24. Social Engineering LLMs","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_24_social_engineering_llms","siteSpaceId":"sitesp_c18nN","description":""},{"id":"w8zmQB5AdAjc1UfMa587","title":"25. Advanced Adversarial ML","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_25_advanced_adversarial_ml","siteSpaceId":"sitesp_c18nN","description":""},{"id":"WYfsivKTBkdjZOFLFzaY","title":"26. Supply Chain Attacks on AI","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_26_supply_chain_attacks_on_ai","siteSpaceId":"sitesp_c18nN","description":""},{"id":"lDwow635IpXPaB5ihr8q","title":"27. Federated Learning Attacks","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_27_federated_learning_attacks","siteSpaceId":"sitesp_c18nN","description":""},{"id":"VXBsTw3aq11WFaq0iQ93","title":"28. AI Privacy Attacks","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_28_ai_privacy_attacks","siteSpaceId":"sitesp_c18nN","description":""},{"id":"spYECqsNSIlrrVAgQwCi","title":"29. Model Inversion Attacks","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_29_model_inversion_attacks","siteSpaceId":"sitesp_c18nN","description":""},{"id":"RKbUBxLgExxuSG63EiKx","title":"30. Backdoor Attacks","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_30_backdoor_attacks","siteSpaceId":"sitesp_c18nN","description":""},{"id":"AreOsHnBkzOKQupoYSBp","title":"31. AI System Reconnaissance","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_31_ai_system_reconnaissance","siteSpaceId":"sitesp_c18nN","description":""},{"id":"LSflYSzwufJ68LfMJmbQ","title":"32. Automated Attack Frameworks","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_32_automated_attack_frameworks","siteSpaceId":"sitesp_c18nN","description":""},{"id":"fjHqkS4jxra026PWNLpw","title":"33. Red Team Automation","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_33_red_team_automation","siteSpaceId":"sitesp_c18nN","description":""},{"id":"yUR98F4AuoRmnCOCkYL0","title":"34. Defense Evasion Techniques","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_34_defense_evasion_techniques","siteSpaceId":"sitesp_c18nN","description":""},{"id":"RDDomVvxmHWEv09huhxo","title":"35. Post-Exploitation in AI Systems","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_35_post-exploitation_in_ai_systems","siteSpaceId":"sitesp_c18nN","description":""},{"id":"g8cWI6QCPNgOB2qNUym4","title":"36. Reporting and Communication","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_36_reporting_and_communication","siteSpaceId":"sitesp_c18nN","description":""},{"id":"s4QcJH0EdvDSlmOi9z5U","title":"37. Remediation Strategies","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_37_remediation_strategies","siteSpaceId":"sitesp_c18nN","description":""},{"id":"VSVhFUvHSdSZCuGpw8II","title":"38. Continuous Red Teaming","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_38_continuous_red_teaming","siteSpaceId":"sitesp_c18nN","description":""},{"id":"uUORWsenaM5BOW1R6uZo","title":"39. AI Bug Bounty Programs","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_39_ai_bug_bounty_programs","siteSpaceId":"sitesp_c18nN","description":""},{"id":"Kv8GEm8Ar00ubyJixxCT","title":"40. Compliance and Standards","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_40_compliance_and_standards","siteSpaceId":"sitesp_c18nN","description":""},{"id":"rvLnNOG6bWo9EywwKeVb","title":"41. Industry Best Practices","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_41_industry_best_practices","siteSpaceId":"sitesp_c18nN","description":""},{"id":"YE3ZGIomMynYrmVdqxCt","title":"42. Case Studies and War Stories","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_42_case_studies_and_war_stories","siteSpaceId":"sitesp_c18nN","description":""},{"id":"DPxV8n7VQFAVabysz7Cv","title":"43. Future of AI Red Teaming","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_43_future_of_ai_red_teaming","siteSpaceId":"sitesp_c18nN","description":""},{"id":"5kgWIphUuoC74iwz2oK5","title":"44. Emerging Threats","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_44_emerging_threats","siteSpaceId":"sitesp_c18nN","description":""},{"id":"qUWJnqVNp4hhqqXVCQSs","title":"45. Building an AI Red Team Program","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_45_building_an_ai_red_team_program","siteSpaceId":"sitesp_c18nN","description":""},{"id":"yytrYJ3qbXzK5bBcTswK","title":"46. Conclusion and Next Steps","pathname":"/ai-llm-red-team-handbook-and-field-manual/chapter_46_conclusion_and_next_steps","siteSpaceId":"sitesp_c18nN","description":""}]}