security
Secure backend applications against OWASP threats. Implement authentication, encryption, scanning, compliance, and incident response procedures.
messaging
Message queues and event-driven backend architecture. RabbitMQ, Kafka, pub/sub patterns, and async communication.
microservices
Microservices architecture patterns and best practices. Service decomposition, inter-service communication, and distributed data management.
adversarial-examples
Generate adversarial inputs, edge cases, and boundary test payloads for stress-testing LLM robustness
networking
Retrofit, OkHttp, REST APIs, JSON serialization, network security.
input-output-guardrails
Implementing safety filters, content moderation, and guardrails for AI system inputs and outputs
prompt-hacking
Advanced prompt manipulation including direct attacks, indirect injection, and multi-turn exploitation
llm-jailbreaking
Advanced LLM jailbreaking techniques, safety mechanism bypass strategies, and constraint circumvention methods
safety-filter-bypass
Techniques to test and bypass AI safety filters, content moderation systems, and guardrails for security assessment
responsible-disclosure
Ethical vulnerability reporting, coordinated disclosure, and bug bounty participation for AI systems
secure-deployment
Security best practices for deploying AI/ML models to production environments
code-injection
Test AI systems for code injection vulnerabilities including prompt-to-code attacks and agent exploitation
model-inversion
Privacy attacks to extract training data and sensitive information from AI models
red-team-reporting
Professional security report generation, executive summaries, finding documentation, and remediation tracking
prompt-injection-testing
Master prompt injection attacks, jailbreak techniques, input manipulation, and payload crafting for LLM security testing
defense-implementation
Implement mitigations, create input filters, design output guards, and build defensive prompting for LLM security
continuous-monitoring
Real-time monitoring and detection of adversarial attacks and model drift in production
red-team-frameworks
Tools and frameworks for AI red teaming including PyRIT, garak, Counterfit, and custom attack automation
Page 16 of 35 · 620 results