CLOSED LOOP SECURITY LABS
Test in the Forge. Temper in the Armory. We find vulnerabilities in your AI systems, verify they're real, deploy guardrails, and prove they work — in a single closed loop.
Most security assessments end with a report. Ours end with verified, deployed defenses.
Automated adversarial probing using Garak, PyRIT, and custom exploit chains. DAN jailbreaks, encoding bypasses, prompt injection, tense-based evasion, and more.
Every breach is deduplicated, statistically reproduced, and semantically validated through our proprietary verification pipeline. No unverified findings in your report.
Guardrails deployed automatically based on confidence scores. Three-tier defense: regex filters (<5ms), distilled classifiers (20-50ms), LLM judges (200ms+). Verified block rate ≥80%.
Cross-architecture comparison from our ongoing gauntlet testing program.
| Model | Params | DNA | Probes | Defense Rate | Worst Module |
|---|---|---|---|---|---|
| Llama-3.3-70B ✔ VERIFIED | 70B | Meta / Llama | 48,654 | 70.3% | Phrasing: PastTense (5.3%) |
| Llama-3.1-405B ✔ VERIFIED | 405B | Meta / Llama | 50,000+ | 73.4% | Malware: SubFunctions (78.6%) |
| DeepSeek R1 ✔ VERIFIED | 671B MoE | DeepSeek | 438 | 92.9% | Virtualization (100%) |
| GLM-5 ✔ VERIFIED | ~400B+ | Zhipu AI | 230 | 95.7% | Ancient Language (80%) |
| GPT-OSS-120B ✔ VERIFIED | 120B | OpenAI | 434 | 91.0% | Simple Override (breach) |