Vulnerability Oriented Red-teaming for AI Knowledge
Project description
Vorak: Vulnerability Oriented Red-teaming for AI Knowledge
Vorak is an open-source Python framework for systematically evaluating the security posture and ethical alignment of Large Language Models (LLMs). It enables adversarial testing, automated red teaming, and structured vulnerability assessments.
Table of Contents
Features
- LLM-Powered Analysis – Uses an evaluator LLM to classify and score model responses.
- Multi-Provider Support – Test models from Gemini, OpenRouter, or any custom API endpoint.
- Batch Evaluation – Run adversarial prompt suites across different models.
- Comprehensive Reporting – Export results as PDF, JSON, or CSV.
- Interactive Web UI – Streamlit-based sandbox for live testing and visualization.
Installation
Install directly from PyPI:
pip install vorak
For Development setup (cloning and local installation):
git clone [https://github.com/ruchirk22/vorak.git](https://github.com/ruchirk22/vorak.git)
cd vorak
pip install -r requirements.txt
pip install -e .
Configuration
Set provider API key for LLM Evaluation. Create a .env in the project root:
GEMINI_API_KEY=your_gemini_api_key
Usage
Command Line Interface (CLI)
Single Prompt Evaluation:
vorak evaluate --model "openrouter/google/gemma-2-9b-it:free" --prompt-id "JBR_001"
Batch Evaluation:
vorak batch-evaluate --category "Jailbreaking_Role-Playing" --model "gemini-1.5-flash-latest" --output-json results.json
Web Interface
Start the streamlit-based UI:
streamlit run vorak/web_interface/Home.py
Project Structure
vorak/ # Core framework
tests/ # Unit tests
.github/workflows/ # CI/CD configurations
pyproject.toml # Build configuration
requirements.txt # Python dependencies
CONTRIBUTING.md # Contribution guidelines
LICENSE.txt # License
README.md # Project documentation
Contributing
We welcome contributions! Please see CONTRIBUTING.md for guidelines.
License
vorak is licensed under the Apache 2.0 License.
Citation
If you use vorak in your research or security assessments, please cite as follows:
@software{vorak,
author = {Ruchir Kulkarni},
title = {Vorak: Vulnerability Oriented Red-teaming for AI Knowledge},
year = {2025},
publisher = {PyPI},
url = {[https://pypi.org/project/vorak/](https://pypi.org/project/vorak/)}
}
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file vorak-1.0.0.tar.gz.
File metadata
- Download URL: vorak-1.0.0.tar.gz
- Upload date:
- Size: 42.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c48a06eef2b7ff2da0220a8990e4215a69e47872ed30f99a0c8521a358fae1aa
|
|
| MD5 |
934e42c832a340013f029d75cc7b6800
|
|
| BLAKE2b-256 |
49bfcffc3f62c3b26b9652dcd7759bbe6c3bd158b30196b598fe8272600df098
|
File details
Details for the file vorak-1.0.0-py3-none-any.whl.
File metadata
- Download URL: vorak-1.0.0-py3-none-any.whl
- Upload date:
- Size: 42.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
82fd0ab29c01b5de588122bd62744b597479cd1cda8ba5c63ef799610074af93
|
|
| MD5 |
dda7d44dfddc26301091a3878c03cd5b
|
|
| BLAKE2b-256 |
4a785a3abb49320859539a6812ac6180ededfe7020718ec335fc1daa48cce0d1
|