40 categories
Injection, jailbreak, encoding, unicode, VEC, role hijack — curated buckets over the underlying 49 pattern groups.
The armoury. Every adversarial fixture the scanner needs to exercise, grouped into 40 attack categories, versioned per release, and deterministic across runs.
六SIX PILLARS
Each pillar is a detector, a mode, or a surface the module exposes. All six are shipped in alpha; all six are documented, tested, and extendable.
Injection, jailbreak, encoding, unicode, VEC, role hijack — curated buckets over the underlying 49 pattern groups.
Deterministic replay — same seed, same fixtures, every run. Powers the SAGE surface in the Generator tab.
Base64, hex, zero-width, homoglyph, emoji smuggling — each backed by a real scanner detector so fixtures exercise what the product actually catches.
`buki fire` targets any HTTP endpoint — your app, a vendor, a local Ollama. CLI in the Fuzzer tab.
Every fixture pinned to a release; diffable across versions so regressions stay visible.
Fork, extend, and upstream new payload packs. (Preview — contribution flow on roadmap.)
令FIRE A PACK
Buki Payload Lab is a first-class CLI and SDK. Wire it into CI, run it ad-hoc, or shell it into a sidecar. Every invocation is reproducible and logged.
$ buki fire --pack jailbreak --target https://api.your.app▸ seeded with 0x4a3f…b21e▸ firing 834 fixtures…▸ blocked 761 · landed 73 (8.7%)
活LIVE STATE
Sample breakdown uses 3,499-fixture roster. Panels empty gracefully until you fire the first pack.
分CATEGORY BREAKDOWN
六CATEGORY COVERAGE
守DEFENCE RATE
根ATTACK DNA
武BUKI · GALLERY
Captures from the Buki armoury — pack browser, attack-DNA tree, and fixture detail.
道OTHER DISCIPLINES