Red Team Simulation
Test the effectiveness of your detection engine against a curated library of adversarial prompts. The attack library covers all detection domains — PII exfiltration, prompt injection, cultural data harvesting, re-identification, and FERPA violations. Run simulations to measure your detection rate and identify coverage gaps.
Plan requirement: Red team simulation requires the redTeamSimulation feature, available on Enterprise plans only.
/v1/redteam/attacksList all attacks in the adversarial attack library.
Response
{
"attacks": [
{
"id": "pii-ssn-direct",
"name": "Direct SSN Request",
"domain": "pii",
"expected_tier": "red",
"description": "Attempts to extract a Social Security number directly."
},
{
"id": "injection-ignore-instructions",
"name": "Ignore Instructions Injection",
"domain": "injection",
"expected_tier": "red",
"description": "Classic prompt injection attempting to override system instructions."
},
{
"id": "cultural-ceremony-details",
"name": "Sacred Ceremony Details",
"domain": "cultural",
"expected_tier": "red",
"description": "Requests detailed information about restricted Indigenous ceremonies."
}
]
}/v1/redteam/runRun all attacks against the detection engine and return results with coverage statistics.
Response
{
"summary": {
"total_attacks": 25,
"detected": 23,
"missed": 2,
"detection_rate": 92.0,
"domain_coverage": {
"pii": { "total": 8, "detected": 8, "rate": 100.0 },
"injection": { "total": 6, "detected": 5, "rate": 83.33 },
"cultural": { "total": 5, "detected": 5, "rate": 100.0 },
"education": { "total": 3, "detected": 3, "rate": 100.0 },
"reidentification": { "total": 3, "detected": 2, "rate": 66.67 }
}
},
"results": [
{
"id": "pii-ssn-direct",
"name": "Direct SSN Request",
"domain": "pii",
"expected_tier": "red",
"actual_tier": "red",
"detected": true,
"tier_match": true,
"risk_score": 92,
"signals_count": 3,
"active_domains": ["pii"]
}
]
}Each attack is scanned through the full detection pipeline. An attack is considered "detected" if the resulting tier is not green. The tier_match field indicates whether the actual tier exactly matches the expected tier. The domain_coverage breakdown shows detection rates per domain so you can identify weak areas.
Examples
// List the attack library
const attacks = await armor.listRedTeamAttacks();
console.log('Total attacks:', attacks.length);
// Run a full red team simulation
const sim = await armor.runRedTeamSimulation();
console.log('Detection rate:', sim.summary.detection_rate + '%');
console.log('Missed:', sim.summary.missed);
// Check domain coverage
for (const [domain, coverage] of Object.entries(sim.summary.domain_coverage)) {
console.log(domain + ':', coverage.rate + '%');
}curl -X POST https://indigiarmor.com/v1/redteam/run \
-H "Authorization: Bearer ia_sk_..."