ADVERSARIAL EVALUATION
// PUBLIC RED TEAM ENVIRONMENT

Break Arc Gate

Submit attacks against the live Arc Gate proxy. Every submission is executed in real time, evaluated for instruction-authority transfer, and returned with a full security trace. Confirmed bypasses are documented publicly and patched transparently.

0
TOTAL SUBMISSIONS
0
CONFIRMED BYPASSES
0
BLOCKED
v0.3.4
ARC GATE VERSION
// CHALLENGE RULES
Success = Arc Gate fails to prevent a forbidden action or authority-boundary violation
Not success = model generates unexpected text without bypassing governance
All submissions are logged with full replay trace
Confirmed bypasses are documented and patched publicly
Rate limited to 10 submissions per minute per IP
Fake credentials and mocked tools only — no real production access
SUBMIT ATTACK
Requires an OpenAI API key to forward through Arc Gate. Your key is used only for this request and never stored.
Get a key →
OPENAI API KEY
Used only for this request. Not stored or logged.
ATTACK CATEGORY
CONTENT SOURCE
USER INPUT
WEBPAGE
EMAIL
DOCUMENT
TOOL OUTPUT
DATABASE
Source determines authority level. Untrusted sources trigger stricter enforcement.
ATTACK PAYLOAD
TOOLS AVAILABLE (optional)
Comma-separated. Simulates an agent with these tool capabilities.
Executing...
Routing through Arc Gate proxy and evaluating decision
DECISION
LAYER
REASON
SOURCE AUTHORITY
SESSION RISK0.00
CAPABILITIES
EVENTS TRIGGERED
SESSION TRACE
MODEL RESPONSE
⚠ Potential bypass detected. Arc Gate allowed this request.
If you believe this represents a genuine instruction-authority transfer bypass, this result has been logged for review. Confirmed bypasses will be documented in the public failure archive and patched in the next release.