Verified attack-to-defense patterns. CVE tells you what's broken. CRP tells you how to fix it — with proof.
Every pattern carries full verification provenance: reproduction rate, verified block rate, Judge confidence, and compliance mappings.
Open access to community-submitted patterns and public gauntlet results.
CLS-verified patterns with full provenance data and raw gauntlet datasets.
Custom verification against your specific model deployment and risk profile.
A Certified Remediation Pattern is a verified, reproducible mapping from attack to defense.
First CRPs will be certified after Layer 2 verification pipeline is operational. Raw breach data available now under Pro tier.