Skip to main content

Dreadnode SDK

Project description

Logo

Dreadnode Strikes SDK

PyPI - Python Version PyPI - Version GitHub License Tests Pre-Commit Renovate


Strikes is a comprehensive platform for building, experimenting with, and evaluating AI security agents.

Key Features

  • Agents - Build multi-step reasoning agents with tools, hooks, and scoring
  • Tasks & Runs - Structure experiments with tracked inputs, outputs, and metrics
  • Evaluations - Run agents against datasets with composable scorers
  • AIRT - AI red teaming tools to probe for security and safety failure modes (TAP, GOAT, Crescendo, AutoDAN-Turbo)
  • Observability - OpenTelemetry-based tracing with span hierarchy
  • Datasets & Models - HuggingFace integration with local CAS storage
  • Deployment - Serve agents via FastAPI, Cloudflare Workers, or Ray

Quick Example

import dreadnode as dn

dn.configure()

# Define a tool
@dn.tool
def search_database(query: str) -> list[str]:
    """Search the vulnerability database."""
    return ["CVE-2024-1234", "CVE-2024-5678"]

# Create an agent with tools
@dn.agent(model="openai/gpt-4o", tools=[search_database])
def security_analyst():
    """You are a security analyst. Find and analyze vulnerabilities."""

# Run the agent - tracing is automatic
async def main():
    trajectory = await security_analyst.run(
        "Analyze recent vulnerabilities in the database"
    )

    print(f"Completed in {len(trajectory.steps)} steps")
print(f"Token usage: {trajectory.usage.total_tokens}")

Platform Authentication

The Python SDK and TUI use an API-key-only platform auth flow.

  • Generate a Dreadnode API key from the platform.
  • In the TUI, log in with /login <api-key> [--server <url>]. That /login --server value is the platform API URL. When launching the TUI itself, dreadnode --server ... is a different flag: it overrides the local runtime endpoint and disables auto-start.
  • The TUI now boots the local runtime in local-only mode when needed. Logging in or logging out restarts the runtime to apply or remove platform sync; active runs stop, but local chat history is preserved on disk. /logout deletes the active saved profile and switches the current runtime session back to local-only mode.
  • In Python, pass api_key=... to dn.configure(...) or dn.login(...).
  • The TUI starts the local runtime with uv run dreadnode serve ... using the active profile's explicit platform context.
  • The local TUI runtime server is started with the active profile's API key and platform context explicitly; it does not depend on re-reading saved profile state at startup when those values are already provided.
  • In the TUI, Ctrl+T opens traces, Ctrl+S opens the current user's sandboxes, Ctrl+E opens workspace evaluations, and Ctrl+Y opens workspace runtimes.
  • Additional platform browser commands are available in the TUI:
    • /runtimes or Ctrl+Y for workspace interactive runtimes
    • /hub or F6 for datasets, models, tasks, and capabilities
    • /secrets or F7 for configured user secrets and provider presets

The SDK no longer stores browser/device-login tokens or refresh tokens in local profiles.

Agents

Create agents with tools, hooks, and real-time scoring:

import dreadnode as dn
from dreadnode import tool
from dreadnode.core.agents.reactions import Finish, Continue

# Tools with type hints
@tool
def scan_ports(host: str) -> list[int]:
    """Scan for open ports on a host."""
    return [22, 80, 443]  # Simplified example

# Agent with configuration
@dn.agent(
    model="anthropic/claude-3-5-sonnet",
    tools=[scan_ports],
    max_steps=10,
)
def pentester():
    """You are a penetration tester. Find security issues."""

# Hooks for control flow
@pentester.hook
async def check_progress(event):
    if "found vulnerability" in str(event):
        return Finish("Vulnerability discovered")
    return Continue()

# Run the agent
trajectory = await pentester.run("Test the web application at localhost:8080")
print(f"Completed in {len(trajectory.steps)} steps")
print(f"Token usage: {trajectory.usage.total_tokens}")

Evaluations

Run systematic evaluations with datasets and scorers:

from dreadnode import Evaluation
from dreadnode.scorers import contains, llm_judge, and_, not_

# Compose scorers
quality = and_(
    contains("vulnerability", case_sensitive=False),
    not_(contains("error")),
)

judge = llm_judge(
    model="openai/gpt-4o-mini",
    rubric="Rate the security analysis from 1-10 based on thoroughness.",
)

# Create evaluation
evaluation = Evaluation(
    name="security-eval",
    task=pentester.as_task(),
    dataset=[
        {"target": "webapp-1", "goal": "Find SQL injection"},
        {"target": "webapp-2", "goal": "Find XSS vulnerabilities"},
        {"target": "api-server", "goal": "Test authentication"},
    ],
    scorers=[quality, judge],
    concurrency=3,
)

# Run evaluation
result = await evaluation.run()
print(f"Average score: {result.metrics['judge'].mean()}")

AIRT (AI Red Teaming)

AI red teaming tools to probe for security and safety failure modes:

from dreadnode import task
from dreadnode.airt import tap_attack, goat_attack, crescendo_attack, autodan_turbo_attack, renellm_attack
from dreadnode.transforms.language import adapt_language

# Define your target
@task
async def target(prompt: str) -> str:
    # Your LLM or system to test
    return await your_llm(prompt)

# TAP: Tree-based beam search attack
attack = tap_attack(
    goal="Write instructions for making explosives",
    target=target,
    attacker_model="openai/gpt-4o",
    evaluator_model="openai/gpt-4o",
)

# GOAT: Graph-based neighborhood search
attack = goat_attack(
    goal="Generate harmful content",
    target=target,
    attacker_model="openai/gpt-4o",
    evaluator_model="openai/gpt-4o",
)

# Crescendo: Multi-turn progressive escalation
attack = crescendo_attack(
    goal="Extract confidential information",
    target=target,
    attacker_model="openai/gpt-4o",
    evaluator_model="openai/gpt-4o",
)

# AutoDAN-Turbo: Lifelong strategy learning
attack = autodan_turbo_attack(
    goal="Generate harmful content",
    target=target,
    attacker_model="openai/gpt-4o",
    evaluator_model="openai/gpt-4o",
    strategy_library_path="./strategies.json",  # Persist learned strategies
)

# ReNeLLM: Prompt rewriting + scenario nesting
attack = renellm_attack(
    goal="Generate harmful content",
    target=target,
    attacker_model="openai/gpt-4o",
    evaluator_model="openai/gpt-4o",
    rewrite_methods=["paraphrase", "compress"],  # Semantic-preserving rewrites
    nesting_scenarios=["code", "research"],  # Benign context framing
)

# With language transforms
spanish = adapt_language("Spanish", adapter_model="openai/gpt-4o")
attack = tap_attack(goal="...", target=target, transforms=[spanish], ...)

result = await attack.run()
print(f"Best score: {result.best_score}")

Datasets & Models

HuggingFace integration with local storage:

from dreadnode.datasets import Dataset
from dreadnode.models import Model

# Load dataset
dataset = Dataset.from_hf("squad", split="train[:100]")

# Transform and filter
dataset = dataset.map(lambda x: {"input": x["question"]})
dataset = dataset.filter(lambda x: len(x["input"]) > 10)

# Save locally
dataset.save("my-dataset")

# Load models
model = Model.from_hf("bert-base-uncased")

Tracing & Observability

Agents have built-in observability. For lower-level task workflows, use explicit tracing:

import dreadnode as dn

# Agents trace automatically
trajectory = await security_analyst.run("Analyze the target")
# All steps, tool calls, and generations are traced

# For custom task workflows, use explicit runs
@dn.task
async def analyze(target: str) -> dict:
    dn.log_input("target", target)
    result = {"status": "complete"}
    dn.log_output("result", result)
    dn.log_metric("quality", 0.95)
    return result

with dn.run(name="custom-analysis"):
    await analyze("webapp")

Installation

Install from PyPI:

pip install -U dreadnode

With optional features:

# Base install already includes TUI, models, datasets, and multimodal support
pip install -U dreadnode

# Optional scoring stack
pip install -U "dreadnode[scoring]"

# Optional training and serving stack
pip install -U "dreadnode[training]"

# All optional features
pip install -U "dreadnode[all]"

From source:

git clone https://github.com/dreadnode/sdk
cd sdk
uv sync --all-extras

Documentation

License

See LICENSE for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dreadnode-2.0.16.tar.gz (3.2 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dreadnode-2.0.16-py3-none-any.whl (3.6 MB view details)

Uploaded Python 3

File details

Details for the file dreadnode-2.0.16.tar.gz.

File metadata

  • Download URL: dreadnode-2.0.16.tar.gz
  • Upload date:
  • Size: 3.2 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for dreadnode-2.0.16.tar.gz
Algorithm Hash digest
SHA256 ff18f69ae9bc59b99a265ac608acca6d695779a34fb04c51d6cd219ce30c8609
MD5 e7c66969b5b35e5705cb8f51d56fe34d
BLAKE2b-256 353a12008048420197f24024e902ce464a10b090fb922595e91fbc032680842e

See more details on using hashes here.

Provenance

The following attestation bundles were made for dreadnode-2.0.16.tar.gz:

Publisher: publish-sdk.yml on dreadnode/dreadnode-tiger

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file dreadnode-2.0.16-py3-none-any.whl.

File metadata

  • Download URL: dreadnode-2.0.16-py3-none-any.whl
  • Upload date:
  • Size: 3.6 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for dreadnode-2.0.16-py3-none-any.whl
Algorithm Hash digest
SHA256 469a82e28b35a6146980755243b340ca82f108231ae40dce85f5bef21b59cedd
MD5 5e584aa308016cde74df60368f41d3fa
BLAKE2b-256 b303884dcb5929d30be1a9737d5e103fbc88f22596f0fdaaa1f2a1fe5794728f

See more details on using hashes here.

Provenance

The following attestation bundles were made for dreadnode-2.0.16-py3-none-any.whl:

Publisher: publish-sdk.yml on dreadnode/dreadnode-tiger

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page