frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Show HN: DeepTeam – Penetration Testing for LLMs

https://github.com/confident-ai/deepteam
3•jeffreyip•6mo ago
Hi HN, we’re Jeffrey and Kritin, and we’re building DeepTeam (https://trydeepteam.com), an open-source Python library to scan LLM apps for security vulnerabilities. You can start “penetration testing” by defining a Python callback to your LLM app (e.g. `def model_callback(input: str)`), and DeepTeam will attempt to probe it with prompts designed to elicit unsafe or unintended behavior.

Note that the penetration testing process treats your LLM app as a black-box - which means that DeepTeam will not know whether PII leakage has occurred in a certain tool call or incorporated in the training data of your fine-tuned LLM, but rather just detect that it is present. Internally, we call this process “end-to-end” testing.

Before DeepTeam, we worked on DeepEval, an open-source framework to unit-test LLMs. Some of you might be thinking, well isn’t this kind of similar to unit-testing?

Sort of, but not really. While LLM unit-testing focuses on 1) accurate eval metrics, 2) comprehensive eval datasets, penetration testing focuses on the haphazard simulation of attacks, and the orchestration of it. To users, this was a big and confusing paradigm shift, because it went from “Did this pass?” to “How can this break?”.

So we thought to ourselves, why not just release a new package to orchestrate the simulation of adversarial attacks for this new set of users and teams working specifically on AI safety, and borrow DeepEval’s evals and ecosystem in the process?

Quickstart here: https://www.trydeepteam.com/docs/getting-started#detect-your...

The first thing we did was offer as many attack methods as possible - simple encoding ones like ROT13, leetspeak, to prompt injections, roleplay, and jailbreaking. We then heard folks weren’t happy because the attacks didn’t persist across tests and hence they “lost” their progress every time they tested, and so we added an option to `reuse_simulated_attacks`.

We abstracted everything away to make it as modular as possible - every vulnerability, attack, can be imported in Python as `Bias(type=[“race”])`, `LinearJailbreaking()`, etc. with methods such as `.enhance()` for teams to plug-and-play, build their own test suite, and even to add a few more rounds of attack enhancements to increase the likelihood of breaking your system.

Notably, there are a few limitations. Users might run into compliance errors when attempting to simulate attacks (especially for AzureOpenAI), and so we recommend setting `ignore_errors` to `True` in case that happens. You might also run into bottlenecks where DeepTeam does not cover your custom vulnerability type, and so we shipped a `CustomVulnerability` class as a “catch-all” solution (still in beta).

You might be aware that some packages already exist that do a similar thing, often known as “vulnerability scanning” or “red teaming”. The difference is that DeepTeam is modular, lightweight, and code friendly. Take Nvidia Garak for example, although comprehensive, has so many CLI rules, environments to set up, it is definitely not the easiest to get started, let alone pick the library apart to build your own penetration testing pipeline. In DeepTeam, define a class, wrap it around your own implementations if necessary, and you’re good to go.

We adopted a Apache 2.0 license (for now, and probably in the foreseeable future too), so if you want to get started, `pip install deepteam`, use any LLM for simulation, and you’ll get a full penetration report within 1 minute (assuming you’re running things asynchronously). GitHub: https://github.com/confident-ai/deepteam

Excited to share DeepTeam with everyone here – let us know what you think!

Business SLOs

https://haagwee.medium.com/business-slos-4992d7435ff9
1•dunyakirkali•1m ago•1 comments

Malicious extensions in Chrome Web store steal user credentials

https://www.bleepingcomputer.com/news/security/malicious-extensions-in-chrome-web-store-steal-use...
1•fleahunter•5m ago•0 comments

Google Taps More Performance Out of AMD Zen CPUs with BPF-CCX Scheduling

https://www.phoronix.com/news/Google-AMD-BPF-CCX
2•speckx•5m ago•0 comments

Penn/Michigan 0.2mm autonomous microrobots:CMOS compute, light power, no tethers

https://scienceclock.com/worlds-smallest-programmable-autonomous-robots/
1•ashishgupta2209•5m ago•0 comments

Show HN: Postastiq – A single-binary, SQLite-backed blogging platform

https://postastiq.com/
1•selfhost•9m ago•1 comments

Transformational Health Discoveries of 2025

https://www.scientificamerican.com/article/10-transformational-health-discoveries-of-2025/
1•quapster•9m ago•0 comments

Show HN: Praqtor – AI intelligence platform for ML engineers

https://www.praqtor.com/
1•AiStyl•10m ago•0 comments

Xkcd: All Adobe Updates

https://xkcd.com/1197/
2•9woc•12m ago•0 comments

Show HN: Superapp – Native Swift iOS App Builder

https://www.superappp.com/
1•thekotik•14m ago•0 comments

Advice for Individual Contributors

https://staysaasy.com/management/2025/12/20/ic-advice.html
2•thisismytest•17m ago•0 comments

Ask HN: Can You Patent Prompts?

1•rcarmo•17m ago•0 comments

Circumflex – It's Hacker News in your terminal

https://github.com/bensadeh/circumflex
1•keepamovin•17m ago•0 comments

Show HN: Mysti – Claude, Codex, and Gemini debate your code, then synthesize

https://github.com/DeepMyst/Mysti
2•bahaAbunojaim•18m ago•0 comments

The case to be made for AI etiquette

https://pranavmanoj.info/essays/ai%20etiquette.html
2•pranavmanoj1•19m ago•0 comments

She Fell in Love with ChatGPT. Then She Ghosted It

https://www.nytimes.com/2025/12/22/business/media/cbs-news-bari-weiss-60-minutes.html
1•thelastgallon•20m ago•0 comments

Codedoc – A Code Documentation Utility

https://www.msweet.org/codedoc/
1•smartmic•24m ago•0 comments

Ask HN: Dear Cloud Providers

1•krautburglar•24m ago•0 comments

Most dApps are just UIs stapled to a mempool and that's why they keep failing

https://paragraph.com/@defibagholder/intentfull
2•namanbajpai•25m ago•1 comments

Wax Figure of Idris Elba Unlocks Face ID

https://www.complex.com/pop-culture/a/treyalston/idris-elba-wax-figure-unlocks-face-id
3•svenfaw•25m ago•0 comments

Attackers exploit WhatsApp's device-linking to attach browser to victim account

https://www.techradar.com/pro/whatsapp-user-warning-hackers-are-hijacking-accounts-without-any-ne...
1•fortran77•25m ago•0 comments

Show HN: Runiq – I gave Claude 'hands' to control my OS (Go Binary)

https://github.com/qaysSE/runiq
2•QaysHajibrahim•29m ago•1 comments

Web Programmer Considering a Reskill

1•gspanos•29m ago•0 comments

Show HN: Khaos – Kafka traffic simulator for observability and chaos engineering

https://github.com/aleksandarskrbic/khaos
1•skrbic_a•33m ago•1 comments

Many Epstein files can be unredacted

https://twitter.com/doggintrump/status/2003287012556853735
4•svenfaw•33m ago•1 comments

Roman soldiers defending Hadrian's Wall infected by parasites, study finds

https://www.cam.ac.uk/research/news/roman-soldiers-defending-hadrians-wall-infected-by-parasites-...
1•wjSgoWPm5bWAhXB•34m ago•0 comments

Show HN: Entangle, AI powered service agent for your website

1•rukshn•40m ago•0 comments

Test, Don't (Just) Verify

https://alperenkeles.com/posts/test-dont-verify/
9•alpaylan•40m ago•0 comments

A New K in America

https://paulkrugman.substack.com/p/a-new-k-in-america
2•rbanffy•42m ago•0 comments

Show HN: I've open-sourced my habit tracker app built with React Native

https://gethabittracker.vercel.app
1•hasibhaque•43m ago•0 comments

Bring Back the Yugoslav Basketball Team

https://jacobin.com/2025/11/bring-back-the-yugoslav-basketball-team/
1•PaulHoule•44m ago•0 comments