frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Show HN: DeepTeam – Penetration Testing for LLMs

https://github.com/confident-ai/deepteam
3•jeffreyip•11mo ago
Hi HN, we’re Jeffrey and Kritin, and we’re building DeepTeam (https://trydeepteam.com), an open-source Python library to scan LLM apps for security vulnerabilities. You can start “penetration testing” by defining a Python callback to your LLM app (e.g. `def model_callback(input: str)`), and DeepTeam will attempt to probe it with prompts designed to elicit unsafe or unintended behavior.

Note that the penetration testing process treats your LLM app as a black-box - which means that DeepTeam will not know whether PII leakage has occurred in a certain tool call or incorporated in the training data of your fine-tuned LLM, but rather just detect that it is present. Internally, we call this process “end-to-end” testing.

Before DeepTeam, we worked on DeepEval, an open-source framework to unit-test LLMs. Some of you might be thinking, well isn’t this kind of similar to unit-testing?

Sort of, but not really. While LLM unit-testing focuses on 1) accurate eval metrics, 2) comprehensive eval datasets, penetration testing focuses on the haphazard simulation of attacks, and the orchestration of it. To users, this was a big and confusing paradigm shift, because it went from “Did this pass?” to “How can this break?”.

So we thought to ourselves, why not just release a new package to orchestrate the simulation of adversarial attacks for this new set of users and teams working specifically on AI safety, and borrow DeepEval’s evals and ecosystem in the process?

Quickstart here: https://www.trydeepteam.com/docs/getting-started#detect-your...

The first thing we did was offer as many attack methods as possible - simple encoding ones like ROT13, leetspeak, to prompt injections, roleplay, and jailbreaking. We then heard folks weren’t happy because the attacks didn’t persist across tests and hence they “lost” their progress every time they tested, and so we added an option to `reuse_simulated_attacks`.

We abstracted everything away to make it as modular as possible - every vulnerability, attack, can be imported in Python as `Bias(type=[“race”])`, `LinearJailbreaking()`, etc. with methods such as `.enhance()` for teams to plug-and-play, build their own test suite, and even to add a few more rounds of attack enhancements to increase the likelihood of breaking your system.

Notably, there are a few limitations. Users might run into compliance errors when attempting to simulate attacks (especially for AzureOpenAI), and so we recommend setting `ignore_errors` to `True` in case that happens. You might also run into bottlenecks where DeepTeam does not cover your custom vulnerability type, and so we shipped a `CustomVulnerability` class as a “catch-all” solution (still in beta).

You might be aware that some packages already exist that do a similar thing, often known as “vulnerability scanning” or “red teaming”. The difference is that DeepTeam is modular, lightweight, and code friendly. Take Nvidia Garak for example, although comprehensive, has so many CLI rules, environments to set up, it is definitely not the easiest to get started, let alone pick the library apart to build your own penetration testing pipeline. In DeepTeam, define a class, wrap it around your own implementations if necessary, and you’re good to go.

We adopted a Apache 2.0 license (for now, and probably in the foreseeable future too), so if you want to get started, `pip install deepteam`, use any LLM for simulation, and you’ll get a full penetration report within 1 minute (assuming you’re running things asynchronously). GitHub: https://github.com/confident-ai/deepteam

Excited to share DeepTeam with everyone here – let us know what you think!

Microsoft reports AI is more expensive than paying human employees

https://fortune.com/2026/05/22/microsoft-ai-cost-problem-tokens-agents/
3•nreece•3m ago•0 comments

Most EVM systems have no memory

https://blog.bridgexapi.io/most-evm-systems-have-no-memory
1•Bridgexapi•4m ago•0 comments

Agent Substrate

https://github.com/agent-substrate/substrate
1•ahmedtd•5m ago•0 comments

Comparisons as Predictable as the Sunrise

https://pudding.cool/2026/05/similes/
1•newtwentysix•6m ago•0 comments

What Is an Air Gap?

https://www.ibm.com/think/topics/air-gap
1•teleforce•12m ago•0 comments

Ask HN: How concerned are you about a debt crisis?

3•bhag2066•13m ago•1 comments

Laravel Lang Compromised with RCE Backdoor Across 700 Versions

https://socket.dev/blog/laravel-lang-compromise
1•gpi•14m ago•0 comments

New kind of dark tourism emerging in online 'Backrooms,' study shows

https://phys.org/news/2026-05-kind-dark-tourism-emerging-online.html
1•WaitWaitWha•18m ago•0 comments

How the Library of Congress is using both AI and volunteers to unlock history

https://www.nextgov.com/artificial-intelligence/2026/05/how-library-congress-using-both-ai-and-vo...
1•WaitWaitWha•22m ago•0 comments

The Verification Tree: Turning AI bug report floods into a confidence signal

https://zenodo.org/records/20349904
2•yellow_glovez•25m ago•0 comments

Thousands evacuated in Garden Grove worry toxic chemicals in tank could explode

https://ktla.com/news/orange-county/thousands-evacuated-again-after-toxic-tank-leak-in-garden-grove/
1•Bender•26m ago•1 comments

Systemd 261-Rc1 Released with OS Installer, IMDS Subsystem and New Storagectl

https://www.phoronix.com/news/systemd-261-rc1
1•Bender•29m ago•0 comments

Feds unwittingly leak pilots' pre-crash conversation

https://www.theregister.com/science/2026/05/23/feds-unwittingly-leak-pilots-pre-crash-conversatio...
1•Bender•31m ago•0 comments

Kagi Search API is now in public preview

https://kagi.com/changelog#10622
1•mroche•32m ago•0 comments

A Visual Tour of Classical Electromagnetism (1960)

https://web.mit.edu/8.02t/www/802TEAL3D/visualizations/guidedtour/Tour.htm#_Toc27302365
2•nill0•32m ago•0 comments

My Hermes and Obsidian Setup and Use Cases

https://metedata.substack.com/p/013-my-hermes-and-obsidian-set-up
1•thunderbong•34m ago•0 comments

New rule requires most green-card applicants to apply from outside U.S.

https://www.washingtonpost.com/immigration/2026/05/22/new-rule-requires-most-green-card-applicant...
4•michaelsbradley•37m ago•0 comments

Shocker: Docker implemented in ~300 lines of bash

https://github.com/traceypooh/shocker
2•traceypooh•41m ago•0 comments

Any positive sides of LLM there?

2•artturibyte•42m ago•1 comments

WebFinder for Tailscale

https://zeulewan.github.io/web-finder/index.html
1•zeulewan•45m ago•0 comments

The Web Is About to Get a Second Door

https://medium.com/@vektormemory/the-web-is-about-to-get-a-second-door-5f9fa0fd0d0f
1•vektormemory•49m ago•0 comments

ngn-k tutorial

https://razetime.github.io/ngn-k-tutorial/
1•1vuio0pswjnm7•52m ago•1 comments

The commencement speech that shook the world

https://idiallo.com/blog/the-commencement-speech-that-shook-the-world
1•shaunpud•54m ago•0 comments

Family Abundance | Why Childcare is So Expensive in Silicon Valley

https://proliberal.substack.com/p/family-abundance
2•mtsteiner•58m ago•0 comments

Trying to preserve other peoples code

https://github.com/Essenceia/CRC_generator/tree/main
3•random__duck•1h ago•0 comments

Why Russian Propaganda Works – and How to Stop Falling for It

https://economicsofpower.substack.com/p/why-russian-propaganda-works-and
7•mariuz•1h ago•0 comments

Ask HN: Has anyone solved Amazon's animated GIF captcha programmatically?

3•jrejaud•1h ago•0 comments

Let me AI that for you

https://let-me-ai.com/
2•NordStreamYacht•1h ago•2 comments

Cognitive architecture AI weighted memory, and a falsifiable continuity metric

https://zenodo.org/records/20350249
1•timeless-hayoka•1h ago•0 comments

Authoritative DNS over encrypted transport at OARC 45

https://blog.apnic.net/2026/05/20/authoritative-dns-over-encrypted-transport-at-oarc-45/
1•8organicbits•1h ago•0 comments