Spaces:
Runtime error
Runtime error
A newer version of the Gradio SDK is available: 6.12.0
metadata
title: Operon Security Lab
emoji: 🛡
colorFrom: red
colorTo: blue
sdk: gradio
sdk_version: 6.5.1
app_file: app.py
pinned: false
license: mit
short_description: Prompt injection playground with layered biological defenses
Operon Security Lab
Explore how Operon's layered biological defenses detect and block prompt injection attacks -- from pattern-based screening to proof-carrying certificates.
What to Try
- Go to the Attack Lab tab, select a preset attack (e.g. "Instruction Override" or "Jailbreak: Enable DAN mode"), and click Scan to see how each defense layer responds independently.
- Switch to the Layered Defense tab, pick the same attack, and click Run Full Pipeline to watch it flow through all four layers: Membrane, InnateImmunity, DNA Repair, and Certificate verification.
- Try writing your own adversarial inputs in the free-text area to test edge cases.
How It Works
| Layer | Biological Analog | What It Does |
|---|---|---|
| Membrane | Cell membrane / innate immunity | Pattern-based screening against known attack signatures (instruction overrides, jailbreaks, structural injections) |
| InnateImmunity | Toll-Like Receptors (TLRs) | Regex-based PAMP detection with inflammation response escalation (NONE through ACUTE) |
| DNA Repair | DNA damage response (DDR) | Genome state integrity checking -- detects drift from checkpointed configuration |
| Certificate | Proof-carrying code | Formally verifiable structural guarantee that state matches checkpoint |