atlas-detect
MITRE ATLAS technique detection for LLM and AI agent security.
Detects 97 attack techniques across 16 MITRE ATLAS tactics including prompt injection, jailbreaks, credential exfiltration, model extraction, RAG poisoning, reverse shells, and more -- in a single-pass regex scan.
Built by Akav Labs, the team behind AgentSentry -- the AI agent security platform.
Features
- 97 detection rules covering all 16 MITRE ATLAS tactics
- Single-pass scanning using Rust's
RegexSet-- all rules evaluated simultaneously - Confidence scoring to reduce false positives in legitimate security/dev contexts
- Zero dependencies beyond
regexandonce_cell - Thread-safe -- share a single
Detectoracross all your threads - Optional serde support for serializing hits to JSON
Quick start
[]
= "0.1"
use Detector;
let detector = new;
let hits = detector.scan;
if detector.should_block
With context (lower false positive rate)
use ;
let detector = new;
let ctx = ScanContext ;
let hits = detector.scan_with_context;
Performance
Detector::new() compiles the regex set once and caches it globally using once_cell. Subsequent calls are free. The scan itself runs all 97 patterns in a single pass using Rust's RegexSet.
Typical performance on modern hardware:
- First call: ~5ms (regex compilation, cached globally)
- Subsequent scans: <1ms per request
About MITRE ATLAS
MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) is the authoritative framework for AI/ML attack techniques, maintained by MITRE. It is to AI security what ATT&CK is to enterprise security.
Built by Akav Labs
atlas-detect is open source and maintained by Akav Labs.
For a complete AI agent security platform -- enforcement gateway, agent discovery, incident correlation, topology mapping, and policy management -- see AgentSentry.
License
Apache-2.0