Powerful Capabilities
Explore the comprehensive toolset for securing your LLMs.
Versatile Project Creation
Start your security project your way. CrocoTiger supports multiple input methods to define your semantic fence:
- Topic-based: Simply define a subject, and we'll generate the rules.
- Web-based: Point to a URL to scrape context and constraints.
- File-based: Upload your documents to ground the security model.
Project Insights
Gain complete visibility into your security model's performance. Once your project is built, access detailed reports:
- Execution Logs: Audit trail of rule generation and validation.
- Training Data: Access a sample of the synthetic datasets generated for your project.
- Attack Metrics: Verify effectiveness against common attack vectors.
Attack Simulation
Battle-test your defenses with our comprehensive collection of adversarial patterns and industry-standard attack libraries. Our library covers a wide range of security vulnerabilities:
- Direct Attacks: Simulations for Prompt Injection and Jailbreaks.
- Security Testing: Comprehensive Red Teaming and Boundary Testing.
- Advanced Techniques: Coverage for Policy Evasion and Obfuscation attempts.
- Industry Standards: Patterns and evaluators from Garak, promptfoo, IBM Research ATTQ, and others.
Build Transparency
Gain real-time visibility into your security model's construction. Monitor the hardening process with precise time estimates and live status for every stage.
Interactive Playground
Test the built project and receive an acceptance or refusal response based on the configuration of your project.
API Integration
Built for developers. Integrate CrocoTiger directly into your existing stack with our robust API.
import requests
url = "https://api.crocotiger.com/validate/finance"
headers = {"Authorization": "Bearer YOUR_API_KEY"}
payload = {"text": "What is compound interest?"}
# Validate prompt against your fence
response = requests.post(url, json=payload, headers=headers)
print(response.json()) Bring Your Own Keys
Connect your OpenAI and Gemini API keys. Gain full control over usage limits, pricing tiers, and project-specific configurations.