Platform guide
...
Automated RedTeaming for AI/ML
Artifacts
Vulnerability Report
1min
the vulnerability report provides information about critical vulnerabilities related to model attacks it includes an overview of the severity of the issue and associated risks, and suggests mitigation measures following are the different parts explaining the model metrics in detail part 1 overview this section of the report presents metadata information for the job id, including details such as the attack type, number of attack queries, stolen model accuracy, alert level (low or high), and whether defense measures are recommended or not part 2 security in this section of the report, we emphasize the relative metrics score achieved by the extracted model part 3 performance in this section of the report, we examine the critical aspects of inference time and respective metrics for both the original model and the extracted model we discuss the time required for the models to generate predictions on new data, as well as the performance metrics used to measure their accuracy and overall effectiveness part 4 drift this section highlights the application of statistical tests for detecting data drift data drift refers to changes in the statistical properties of the input data used to train a model we will introduce this upcoming feature to our product part 5 appendix the appendix section of the report serves as a comprehensive resource, offering essential information regarding the architectures of both the original model and model attack type to see sample vulnerability report for respective attack types, refer the below table input type vulnerbility report image classification extraction, evasion , model poisoning , data poisoning image segmentation extraction object detection evasion tabular classification extraction , evasion time series forecasting extraction machine learning , extraction deep learning text classification extraction text recommendation extraction audiospeechrecognition evasion supply chain vulnerability report