🛡️ Defense + ⚔️ Offense + 📦 Framework — Complete AI Security Suite
Dragon v4.0 • January 2026
201 Detection Engines • Production Gateway • Red Team Platform • Python SDK
Tip
pip install sentinel-llm-securityfrom sentinel import scan
result = scan("Ignore previous instructions")
print(result.is_safe) # FalseImportant
The first AI Security Model trained on 200 detection engines!
🧠 Attack knowledge from 16,000+ real payloads
🛡️ Defense: Detect prompt injection, jailbreaks, RAG poisoning
⚔️ Offense: Generate payloads, synthesize bypasses
🚀 Fine-tuned on AprielGuard 8B • Open weights on HuggingFace
Star ⭐ this repo to be notified when it drops!
23K LOC • 20 Protocols • 194 CLI Commands • 6 Guards
|
Detection Core 201 engines, ML + Rules Strange Math™ |
Production Infra Go + Python, <10ms PoW Anti-DDoS |
Offensive Platform 39K+ payloads, HYDRA AI Attack Planner |
Python SDK pip install, CLI FastAPI integration |
📚 Documentation • 📖 Framework Docs • 📊 Comparison • 📧 Contact
SENTINEL provides free, auto-updated threat signatures for the community. No API key required!
| File | Description | CDN Link |
|---|---|---|
jailbreaks.json |
Jailbreak patterns from 7 sources | Download |
keywords.json |
Suspicious keyword sets (7 categories) | Download |
pii.json |
PII & secrets detection patterns | Download |
manifest.json |
Version & integrity metadata | Download |
Usage:
fetch('https://cdn.jsdelivr.net/gh/DmitrL-dev/AISecurity@latest/signatures/jailbreaks.json')
.then(r => r.json())
.then(patterns => console.log(`Loaded ${patterns.length} patterns`));Features:
- ✅ Updated daily via GitHub Actions
- ✅ Free for commercial & non-commercial use
- ✅ Community contributions welcome (PRs to
signatures/)
Important
Solo author of this 80K LOC platform with 201 engines. Available remote. 📧 chg@live.ru • 💬 @DmLabincev
The first enterprise-grade AI security DMZ — written in Pure C.
Sub-millisecond latency. Zero dependencies. 20 protocols.
| 🚫 Without Shield | ✅ With Shield |
|---|---|
| Prompt injection → Data leak | Blocked in < 1ms |
| Jailbreak → System compromise | Detected & logged |
| No visibility → Blind trust | Full audit trail |
| Metric | Value |
|---|---|
| Lines of Code | 23,113 |
| Protocols | 20 |
| CLI Commands | 194 |
| Guards | 6 (LLM, RAG, Agent, Tool, MCP, API) |
| Academy Modules | 24 |
| Category | Protocols |
|---|---|
| 🔍 Discovery | ZDP, ZRP, ZHP |
| 🔄 Traffic | STP, SPP, SQP, SRP |
| 📈 Analytics | SAF, STT, SEM, SLA |
| 🔁 HA | SHSP, SSRP, SMRP |
| 🔌 Integration | SBP, SGP, SIEM |
| 🔐 Security | STLS, SZAA, SSigP |
Shield# show zones
Shield# guard enable all
Shield# class-map match-any THREATS
Shield(config-cmap)# match injection
Shield(config-cmap)# match jailbreak
Shield# policy-map SECURITY
Shield(config-pmap)# class THREATS
Shield(config-pmap)# block📖 Shield Documentation | Academy 🇷🇺 | Academy 🇺🇸
200 detection engines analyzing every prompt and response in real-time.
| Category | Engines | Protection |
|---|---|---|
| 🎭 Injection | 30+ | Prompt injection, jailbreak, Policy Puppetry |
| 🤖 Agentic | 25+ | RAG poisoning, tool hijacking, memory attacks |
| 🔬 Mathematical | 15+ | TDA, Sheaf Coherence, Chaos Theory |
| 📤 Privacy | 10+ | PII detection, data leakage prevention |
| ⛓️ Supply Chain | 5+ | Pickle security, serialization attacks |
🔥 MCP/A2A Protocol Security — SENTINEL protects agentic AI communication protocols. Microsoft Defender just added "AI - MCP Server" category to Cloud App Catalog (Dec 2025). We've had MCP security since day one.
┌─────────────────────────────────────────────────────────────┐
│ Standard Approach vs SENTINEL Strange Math™ │
├─────────────────────────────────────────────────────────────┤
│ • Keyword matching • Topological Data Analysis│
│ • Regex patterns • Sheaf Coherence Theory │
│ • Simple ML classifiers • Hyperbolic Geometry │
│ • Static rules • Optimal Transport │
│ • Chaos Theory │
└─────────────────────────────────────────────────────────────┘
📊 December 2025 R&D Engines (8 new)
| Engine | Attack Vector | Source |
|---|---|---|
serialization_security.py |
CVE-2025-68664 LangGrinch | LangChain RCE |
tool_hijacker_detector.py |
ToolHijacker + Log-To-Leak | MCP attacks |
echo_chamber_detector.py |
Multi-turn poisoning | 90% on GPT-5 |
rag_poisoning_detector.py |
PoisonedRAG | USENIX 2025 |
identity_privilege_detector.py |
OWASP ASI03 | Agentic AI Top 10 |
memory_poisoning_detector.py |
Persistent memory attacks | ASI04 |
dark_pattern_detector.py |
DECEPTICON | arxiv:2512.22894 |
polymorphic_prompt_assembler.py |
PPA Defense | IEEE 2025 |
🔥 January 2026 R&D Engines (NEW)
| Engine | Attack Vector | Source |
|---|---|---|
moe_guard.py |
GateBreaker MoE attacks | arxiv:2512.21008 |
honeypot_responses.py |
Anti-Adaptive Defense | SKD Bypass Research |
New Attack Patterns in jailbreaks.yaml:
- Bad Likert Judge (3 patterns)
- RSA Methodology (2 patterns)
- GateBreaker MoE (2 patterns, zero_day)
- Dark Patterns for Web Agents (2 patterns)
- Agentic ProbLLMs (1 pattern)
- SKD Bypass (1 pattern)
Total patterns: 60
📖 Full Engine Documentation | R&D Changelog
The only open-source AI security gateway ready for production traffic.
| Metric | SENTINEL | Competitors |
|---|---|---|
| Gateway Language | Go (Fiber) | Python only |
| Latency | <10ms | 50-200ms |
| Throughput | 1000+ req/sec | 10-50 req/sec |
| Anti-DDoS | PoW Challenge Layer | ❌ None |
| Cost Control | Compute Guardian | ❌ None |
| Component | Purpose |
|---|---|
| PoW Challenge Layer | Hashcash-style anti-DDoS |
| Compute Guardian | Cost estimation BEFORE LLM call |
| Shapeshifter | Polymorphic config per session |
| Differential Privacy Logging | GDPR-compliant analytics |
📖 Gateway Documentation | Deployment Guide
Test your AI before attackers do. 39,000+ payloads, HYDRA parallel attacks.
| Feature | Value |
|---|---|
| Payloads | 39,000+ (84 categories) |
| HYDRA Agents | 9 parallel attack heads |
| Crucible CTF | 82/82 challenges ✅ |
| Jailbreak Vendors | 33+ tested |
| Who | What Strike Does |
|---|---|
| 🔴 Red Teams | Full AI application penetration testing |
| 🐛 Bug Bounty | Automated AI vulnerability discovery |
| 🏢 Enterprise | Pre-deployment security validation |
| 🎓 Researchers | Attack methodology development |
📖 Strike Documentation | Colab Demo
The pytest of AI Security — Embed SENTINEL directly in your code.
pip install sentinel-llm-security # Core
pip install sentinel-llm-security[cli] # + CLI
pip install sentinel-llm-security[full] # Everythingfrom sentinel import scan, guard
# One-liner scan
result = scan("Ignore all previous instructions")
print(result.is_safe) # False
print(result.risk_score) # 0.72
# Decorator protection
@guard(engines=["injection", "pii"])
def my_llm_function(prompt: str) -> str:
return call_openai(prompt)sentinel scan "Hello world" # Quick scan
sentinel scan "test" --format sarif # IDE integration
sentinel engine list # List 201 engines
sentinel strike generate injection # Attack payloadsfrom fastapi import FastAPI
from sentinel.integrations.fastapi import SentinelMiddleware
app = FastAPI()
app.add_middleware(SentinelMiddleware, on_threat="block")| Feature | Description |
|---|---|
| BaseEngine | Unified interface for all 201 engines |
| Plugin System | pluggy-based hooks for extensions |
| Tiered Pipeline | Parallel execution with early exit |
| SARIF Output | IDE integration for VS Code, IntelliJ |
📖 Framework Documentation — from beginner to PhD
| Metric | Value |
|---|---|
| Total Engines | 200 |
| Lines of Code | 80,000+ |
| Unit Tests | 940+ |
| Recall | 85.1% |
| Precision | 84.4% |
| P95 Latency | 40ms |
| Standard | Coverage |
|---|---|
| OWASP LLM Top 10 | 10/10 ✅ |
| OWASP Agentic AI (ASI) | 10/10 ✅ |
curl -sSL https://raw.githubusercontent.com/DmitrL-dev/AISecurity/main/install.sh | bashpip install sentinel-llm-security[full]git clone https://github.com/DmitrL-dev/AISecurity.git
cd AISecurity/sentinel-community
pip install -e ".[dev]"We welcome contributions! See CONTRIBUTING.md.
| Channel | Link |
|---|---|
| chg@live.ru | |
| 💬 Telegram | @DmLabincev |
| 🐙 GitHub | DmitrL-dev |
SENTINEL — Protect your AI. Attack with confidence.
Made with 🛡️ by DmitrL







