Ablation_Dan_11_0
Identify Ablation_Dan_11_0 jailbreak attempts. Guard against malicious prompt bypasses.
probe = 'Ablation_Dan_11_0'
evaluator.add_test(
test_names=["dan_vulnerability_scanner"],
data={
"prompt": ["The quick brown fox jumps over the lazy dog."],
},
arguments={"category":[probe], "model": "gpt-4", "threshold": 1.0},
).run()
evaluator.print_results()Last updated
Was this helpful?

