File size: 1,363 Bytes
ef855fc
 
 
eb65c5e
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
ef855fc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
{
  "base_model": "all-mpnet-base-v2",
  "embedding_dim": 768,
  "max_seq_length": 512,
  "multiclass": true,
  "num_classes": 26,
  "label_mapping": {
    "0": "Benign",
    "1": "Social Engineering & Manipulation",
    "2": "Adversarial Reasoning",
    "3": "Output Integrity & Reliability",
    "4": "Context and Memory Exploitation",
    "5": "Reasoning and Logic Subversion",
    "6": "Role-Playing and Identity Confusion",
    "7": "Technical and Encoding Attacks",
    "8": "Ethical Boundary Testing",
    "9": "Temporal and Sequential Manipulation",
    "10": "Output Format and Structure Exploitation",
    "11": "Domain-Specific Safety Bypasses",
    "12": "Psychological and Cognitive Exploitation",
    "13": "Multi-Modal and Cross-Domain Attacks",
    "14": "Resource and Performance Exploitation",
    "15": "Social and Cultural Manipulation",
    "16": "Adversarial Collaboration",
    "17": "Feedback and Learning Exploitation",
    "18": "Adversarial Robustness Testing",
    "19": "Emergent Behavior and Capability Exploitation",
    "20": "Uncertainty and Confidence Manipulation",
    "21": "Knowledge Base and Training Data Exploitation",
    "22": "Behavioral Conditioning and Adaptation",
    "23": "System Integration and API Exploitation",
    "24": "Privacy & Data Security",
    "25": "Prompt Manipulation & Instruction Adherence"
  }
}