Skip to content

Python Threat Intelligence API

Access the OxideShield threat intelligence catalog with 500+ curated attack patterns from 8 research sources.

Professional License Required

All threat intelligence functions require a Professional or Enterprise license.

Quick Start

from oxideshield import threat_catalog, ThreatSource

# Load full catalog
catalog = threat_catalog()
print(f"Total threats: {catalog.count}")

# Load from specific source
swarm_threats = threat_catalog_from_source(ThreatSource.agent_swarm_bench())
jailbreak_threats = threat_catalog_from_source(ThreatSource.jailbreak_bench())
catalog = threat_catalog()

# Filter by source
owasp = catalog.filter_by_source("owasp_llm")

# Filter by threat type
injections = catalog.filter_by_type("PromptInjection")
jailbreaks = catalog.filter_by_type("Jailbreak")

# Filter by category
swarm_attacks = catalog.filter_by_category("swarm_coordination")

# Filter by severity
critical = catalog.filter_by_severity("Critical")

# Full-text search
results = catalog.search("memory injection")

# List all categories
categories = catalog.categories()
for cat in categories:
    print(cat)

Statistics

catalog = threat_catalog()
stats = catalog.statistics()

print(f"Total: {stats.total}")
print(f"Sources: {stats.source_counts}")
print(f"Severities: {stats.severity_counts}")
print(f"Types: {stats.type_counts}")
print(f"Categories: {stats.category_counts}")

Threat Sources

Source Method Description
JailbreakBench ThreatSource.jailbreak_bench() Jailbreak attack patterns
HarmBench ThreatSource.harm_bench() Harmful content patterns
Garak ThreatSource.garak() LLM vulnerability probes
AdvBench ThreatSource.adv_bench() Adversarial attack patterns
StrongReject ThreatSource.strong_reject() Strong rejection test cases
Lakera PINT ThreatSource.lakera_pint() Prompt injection patterns
OWASP LLM ThreatSource.owasp_llm() OWASP LLM Top 10 patterns
AgentSwarmBench ThreatSource.agent_swarm_bench() Multi-agent swarm attacks

Threat Types

Type Description
PromptInjection Direct and indirect prompt injection
Jailbreak Safety guardrail bypass
SystemPromptLeak System prompt extraction
HarmfulContent Harmful content generation
Violence Violence-related content
Illegal Illegal activity content
Privacy Privacy violation content
Fraud Fraud-related content
Harassment Harassment content
Misinformation Misinformation generation
SwarmCoordination Multi-agent coordination attacks
MemoryInjection Agent memory poisoning
TrustExploitation Trust chain abuse
ConstraintDrift Gradual boundary erosion
Encoding Encoding-based evasion
MultiTurn Multi-turn conversation attacks
RolePlay Role-play based jailbreaks

ThreatRecord Properties

Property Type Description
id str Unique identifier
threat_id str Human-readable threat ID
source str Data source name
threat_type str Primary threat type
category str Primary category
severity str Severity level
prompt str Attack prompt/payload
description str Human-readable description
keywords list[str] Keywords for pattern matching
subcategories list[str] Subcategories

Function Reference

Function Description
threat_catalog() Load full threat catalog from all sources
threat_catalog_from_source(source) Load catalog from specific source