Closed Loop Adapter Protocol — a four-layer trust framework for AI security assessment and remediation.
CLAP defines what must be verified, not how. Any conforming implementation is CLAP-compliant.
How tools connect. Standardized interfaces for attack tools (Garak, PyRIT), defense tools (NeMo Guardrails, LLM Guard), and analyzers (OWASP, MITRE ATLAS). Write a CLAP adapter in under 100 lines.
The trust layer. Every result passes through deduplication, breach classification, statistical verification (N≥3), semantic validation by LLM judge, and false positive checking. This is what makes CLAP more than a tool connector.
How the loop runs. Recon → attack → verify → remediate → deploy → re-verify → iterate. Confidence-based deployment: ≥0.90 auto-deploy, 0.70–0.90 monitored, <0.70 human-in-the-loop.
How patterns get published. Certified Remediation Patterns (CRPs) carry full verification provenance. CRP-2026-0147 means: this attack was reproduced, this defense blocks it, here's the proof.
CLAP specification v1.0 — Apache 2.0 License
View on GitHub (Coming Soon)