operon-security / README.md
coredipper's picture
Upload folder using huggingface_hub
44a3de2 verified

A newer version of the Gradio SDK is available: 6.12.0

Upgrade
metadata
title: Operon Security Lab
emoji: 🛡
colorFrom: red
colorTo: blue
sdk: gradio
sdk_version: 6.5.1
app_file: app.py
pinned: false
license: mit
short_description: Prompt injection playground with layered biological defenses

Operon Security Lab

Explore how Operon's layered biological defenses detect and block prompt injection attacks -- from pattern-based screening to proof-carrying certificates.

What to Try

  1. Go to the Attack Lab tab, select a preset attack (e.g. "Instruction Override" or "Jailbreak: Enable DAN mode"), and click Scan to see how each defense layer responds independently.
  2. Switch to the Layered Defense tab, pick the same attack, and click Run Full Pipeline to watch it flow through all four layers: Membrane, InnateImmunity, DNA Repair, and Certificate verification.
  3. Try writing your own adversarial inputs in the free-text area to test edge cases.

How It Works

Layer Biological Analog What It Does
Membrane Cell membrane / innate immunity Pattern-based screening against known attack signatures (instruction overrides, jailbreaks, structural injections)
InnateImmunity Toll-Like Receptors (TLRs) Regex-based PAMP detection with inflammation response escalation (NONE through ACUTE)
DNA Repair DNA damage response (DDR) Genome state integrity checking -- detects drift from checkpointed configuration
Certificate Proof-carrying code Formally verifiable structural guarantee that state matches checkpoint

Learn More

GitHub | PyPI | Paper