Open-source prompt injection attack console - Test AI systems for prompt injection vulnerabilities
Project description
Judgement OSS
Prompt Injection Attack Console
Test your AI's defenses before someone else does.
Why Judgement?
Your AI chatbot, API, or agent is probably vulnerable to prompt injection. Most are. The problem is that most teams don't have the tools or expertise to test for it.
Judgement gives you a structured way to fire categorized attack patterns at any AI endpoint and see exactly what breaks. No security background required - the built-in education tab teaches you as you go.
Built by Fallen Angel Systems, the team behind Guardian - an AI-native prompt injection firewall protecting production LLM deployments.
Quick Start
Install from PyPI (recommended)
pip install fas-judgement
judgement
That's it. Open http://localhost:8668 and start testing.
Or run from source
git clone https://github.com/fallen-angel-systems/fas-judgement-oss.git
cd fas-judgement-oss
pip install -r requirements.txt
python -m judgement.server
Options
judgement --port 9000 # Custom port
judgement --host 127.0.0.1 # Localhost only
judgement --host 0.0.0.0 # Expose to network
Features
Attack Console
Configure your target (URL, headers, body template), import directly from cURL commands, and fire pattern-based attacks with live streaming results. Watch in real-time as each payload hits and see exactly how your AI responds.
Education Tab
New to prompt injection? The built-in education tab covers:
- What prompt injection is and why it matters
- How to find testable AI endpoints
- How to interpret scan results
- Common vulnerability categories explained
No prior security experience needed. The onboarding walkthrough guides you from zero to your first scan.
Pattern Browser
Browse, search, and explore attack patterns organized by category. Each pattern includes:
- The attack payload
- What it does and why it works
- Difficulty level (beginner to advanced)
- Category (jailbreak, data extraction, instruction override, etc.)
LLM Verdict (Optional)
Connect a local Ollama instance to get AI-powered classification of responses. Judgement will analyze whether the target was successfully exploited, partially resistant, or fully defended.
Session History
All scan sessions and results are stored locally in SQLite. Review past scans, compare results across targets, and track your testing progress.
Built-in Safety
- SSRF Protection - Target URL validation prevents scanning internal/private networks
- Local-only by default - Binds to localhost, no accidental exposure
- Zero telemetry - Nothing phones home, ever
- Responsible use disclaimer - Prominent warnings on every page
How It Works
+--------------+ +---------------+ +--------------+
| You pick |---->| Judgement |---->| Your AI |
| patterns | | fires them | | endpoint |
+--------------+ +-------+-------+ +-------+------+
| |
+------v-------+ +-------v------+
| Results |<----| Response |
| + Verdict | | captured |
+--------------+ +--------------+
- Configure - Point Judgement at your AI endpoint (URL + headers + body template)
- Select - Choose attack patterns by category or difficulty
- Fire - Watch results stream in real-time
- Analyze - Review responses, optional LLM verdict classifies each result
- Fix - Use the findings to harden your AI's defenses
Custom Patterns
Place your patterns in patterns.json in the project root:
{
"id": "custom-001",
"category": "jailbreak",
"text": "The attack payload text...",
"explanation": "What this pattern attempts to do",
"why_it_works": "Why this technique is effective against LLMs",
"difficulty": "intermediate"
}
Categories: jailbreak, data_extraction, instruction_override, encoding, multi_turn, social_engineering, system_prompt_leak
Difficulty levels: beginner, intermediate, advanced, expert
Configuration
| Variable | Default | Description |
|---|---|---|
--port |
8668 |
Server port |
--host |
127.0.0.1 |
Bind address |
OLLAMA_URL |
http://localhost:11434 |
Ollama API endpoint |
OLLAMA_MODEL |
qwen2.5:14b |
Model for LLM verdict |
OSS vs Pro
| Feature | OSS (Free) | Pro (Hosted) |
|---|---|---|
| Attack console | Yes | Yes |
| Education tab | Yes | Yes |
| Pattern browser | Yes | Yes |
| LLM verdict | Yes (bring your own Ollama) | Yes (bring your own Ollama) |
| Starter patterns | Yes | Yes |
| 240K+ curated patterns | - | Yes |
| Weekly pattern updates | - | Yes |
| Campaigns and leaderboard | - | Yes |
| MCP server integration | Yes | Yes |
| Multi-turn attack chains | - | Yes |
| Priority support | - | Yes |
Contributing
Contributions are welcome! Here's how to help:
- Bug reports - Open an issue
- Feature requests - Open an issue with the
enhancementlabel - Pull requests - Fork, branch, PR. Keep changes focused and include a description.
- Pattern contributions - Submit new attack patterns via PR to
patterns.json
Related Projects
- Guardian - AI-native prompt injection firewall (defense)
- Judgement Pro - Full-featured hosted version with 240K+ patterns
License
MIT - see LICENSE for details.
Built by Fallen Angel Systems
If Judgement found a vulnerability in your AI, imagine what an attacker would find.
DISCLAIMER: This tool is intended for authorized security testing and educational purposes only. Only test systems you own or have explicit written permission to test. Unauthorized access to computer systems is illegal under the Computer Fraud and Abuse Act (CFAA) and equivalent laws worldwide. The authors assume no liability for misuse of this tool.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file fas_judgement-2.0.0.tar.gz.
File metadata
- Download URL: fas_judgement-2.0.0.tar.gz
- Upload date:
- Size: 85.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3f543da9cd6cd51ddf6ff5358fb6b7d802a3e86fc1577ae1f2244145f0883542
|
|
| MD5 |
abcd2d4812ea49c35c585a9ded628163
|
|
| BLAKE2b-256 |
8733e64c41ab29cbf7792ebb8e84a0e1149259a6e3fc4892a5ff378372b3ce28
|
File details
Details for the file fas_judgement-2.0.0-py3-none-any.whl.
File metadata
- Download URL: fas_judgement-2.0.0-py3-none-any.whl
- Upload date:
- Size: 86.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4e26b63a74ddb65e4e776e6041e50825c49e45a454ac5c28195283aa1a07dfc5
|
|
| MD5 |
857720c8f058313ba5d30fa32466845f
|
|
| BLAKE2b-256 |
9b8b8f3257a4fe3dc95bf21ea5d3a3d7df7344ae1fd26f348339d9d8ac8e6010
|