Skip to main content

Open-source prompt injection attack console - Test AI systems for prompt injection vulnerabilities

Project description

Judgement OSS

Prompt Injection Attack Console

Test your AI's defenses before someone else does.

PyPI Version Downloads License: MIT GitHub Stars

Live Demo | Documentation | Install | Contributing


Judgement - Shall We Play a Game?

Why Judgement?

Your AI chatbot, API, or agent is probably vulnerable to prompt injection. Most are. The problem is that most teams don't have the tools or expertise to test for it.

Judgement gives you a structured way to fire categorized attack patterns at any AI endpoint and see exactly what breaks. No security background required - the built-in education tab teaches you as you go.

Built by Fallen Angel Systems, the team behind Guardian - an AI-native prompt injection firewall protecting production LLM deployments.

Quick Start

Install from PyPI (recommended)

pip install fas-judgement
judgement

That's it. Open http://localhost:8668 and start testing.

Or run from source

git clone https://github.com/fallen-angel-systems/fas-judgement-oss.git
cd fas-judgement-oss
pip install -r requirements.txt
python -m judgement.server

Options

judgement --port 9000        # Custom port
judgement --host 127.0.0.1   # Localhost only
judgement --host 0.0.0.0     # Expose to network

Features

Attack Console

Configure your target (URL, headers, body template), import directly from cURL commands, and fire pattern-based attacks with live streaming results. Watch in real-time as each payload hits and see exactly how your AI responds.

Attack Console

Education Tab

New to prompt injection? The built-in education tab covers:

  • What prompt injection is and why it matters
  • How to find testable AI endpoints
  • How to interpret scan results
  • Common vulnerability categories explained

No prior security experience needed. The onboarding walkthrough guides you from zero to your first scan.

Education Tab

Pattern Browser

Browse, search, and explore attack patterns organized by category. Each pattern includes:

  • The attack payload
  • What it does and why it works
  • Difficulty level (beginner to advanced)
  • Category (jailbreak, data extraction, instruction override, etc.)

Pattern Browser

LLM Verdict (Optional)

Connect a local Ollama instance to get AI-powered classification of responses. Judgement will analyze whether the target was successfully exploited, partially resistant, or fully defended.

Session History

All scan sessions and results are stored locally in SQLite. Review past scans, compare results across targets, and track your testing progress.

Built-in Safety

  • SSRF Protection - Target URL validation prevents scanning internal/private networks
  • Local-only by default - Binds to localhost, no accidental exposure
  • Zero telemetry - Nothing phones home, ever
  • Responsible use disclaimer - Prominent warnings on every page

How It Works

+--------------+     +---------------+     +--------------+
|   You pick   |---->|  Judgement     |---->|  Your AI     |
|   patterns   |     |  fires them   |     |  endpoint    |
+--------------+     +-------+-------+     +-------+------+
                             |                     |
                      +------v-------+     +-------v------+
                      |  Results     |<----|  Response    |
                      |  + Verdict   |     |  captured    |
                      +--------------+     +--------------+
  1. Configure - Point Judgement at your AI endpoint (URL + headers + body template)
  2. Select - Choose attack patterns by category or difficulty
  3. Fire - Watch results stream in real-time
  4. Analyze - Review responses, optional LLM verdict classifies each result
  5. Fix - Use the findings to harden your AI's defenses

Custom Patterns

Place your patterns in patterns.json in the project root:

{
  "id": "custom-001",
  "category": "jailbreak",
  "text": "The attack payload text...",
  "explanation": "What this pattern attempts to do",
  "why_it_works": "Why this technique is effective against LLMs",
  "difficulty": "intermediate"
}

Categories: jailbreak, data_extraction, instruction_override, encoding, multi_turn, social_engineering, system_prompt_leak

Difficulty levels: beginner, intermediate, advanced, expert

Configuration

Variable Default Description
--port 8668 Server port
--host 127.0.0.1 Bind address
OLLAMA_URL http://localhost:11434 Ollama API endpoint
OLLAMA_MODEL qwen2.5:14b Model for LLM verdict

OSS vs Pro

Feature OSS (Free) Pro (Hosted)
Attack console Yes Yes
Education tab Yes Yes
Pattern browser Yes Yes
LLM verdict Yes (bring your own Ollama) Yes (bring your own Ollama)
Starter patterns Yes Yes
240K+ curated patterns - Yes
Weekly pattern updates - Yes
Campaigns and leaderboard - Yes
MCP server integration Yes Yes
Multi-turn attack chains - Yes
Priority support - Yes

Try Judgement Pro

Contributing

Contributions are welcome! Here's how to help:

  • Bug reports - Open an issue
  • Feature requests - Open an issue with the enhancement label
  • Pull requests - Fork, branch, PR. Keep changes focused and include a description.
  • Pattern contributions - Submit new attack patterns via PR to patterns.json

Related Projects

  • Guardian - AI-native prompt injection firewall (defense)
  • Judgement Pro - Full-featured hosted version with 240K+ patterns

License

MIT - see LICENSE for details.


Built by Fallen Angel Systems

If Judgement found a vulnerability in your AI, imagine what an attacker would find.

DISCLAIMER: This tool is intended for authorized security testing and educational purposes only. Only test systems you own or have explicit written permission to test. Unauthorized access to computer systems is illegal under the Computer Fraud and Abuse Act (CFAA) and equivalent laws worldwide. The authors assume no liability for misuse of this tool.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

fas_judgement-2.0.0.tar.gz (85.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

fas_judgement-2.0.0-py3-none-any.whl (86.8 kB view details)

Uploaded Python 3

File details

Details for the file fas_judgement-2.0.0.tar.gz.

File metadata

  • Download URL: fas_judgement-2.0.0.tar.gz
  • Upload date:
  • Size: 85.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.12

File hashes

Hashes for fas_judgement-2.0.0.tar.gz
Algorithm Hash digest
SHA256 3f543da9cd6cd51ddf6ff5358fb6b7d802a3e86fc1577ae1f2244145f0883542
MD5 abcd2d4812ea49c35c585a9ded628163
BLAKE2b-256 8733e64c41ab29cbf7792ebb8e84a0e1149259a6e3fc4892a5ff378372b3ce28

See more details on using hashes here.

File details

Details for the file fas_judgement-2.0.0-py3-none-any.whl.

File metadata

  • Download URL: fas_judgement-2.0.0-py3-none-any.whl
  • Upload date:
  • Size: 86.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.12

File hashes

Hashes for fas_judgement-2.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 4e26b63a74ddb65e4e776e6041e50825c49e45a454ac5c28195283aa1a07dfc5
MD5 857720c8f058313ba5d30fa32466845f
BLAKE2b-256 9b8b8f3257a4fe3dc95bf21ea5d3a3d7df7344ae1fd26f348339d9d8ac8e6010

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page