AI prompts
base on A.I.G (AI-Infra-Guard) is a comprehensive, intelligent, and easy-to-use AI Red Teaming platform developed by Tencent Zhuque Lab. <p align="center">
<h1 align="center"><img vertical-align=“middle” width="400px" src="img/logo-full-new.png" alt="A.I.G"/></h1>
</p>
<p align="center">
<a href="https://github.com/Tencent/AI-Infra-Guard">
<img alt="GitHub Stars" src="https://img.shields.io/github/stars/Tencent/AI-Infra-Guard?color=gold">
</a>
<a href="https://github.com/Tencent/AI-Infra-Guard">
<img alt="License" src="https://img.shields.io/badge/license-MIT-blue">
</a>
<a href="https://github.com/Tencent/AI-Infra-Guard">
<img alt="Release" src="https://img.shields.io/github/v/release/Tencent/AI-Infra-Guard?color=green">
</a>
<a href="https://deepwiki.com/Tencent/AI-Infra-Guard">
<img src="https://deepwiki.com/badge.svg" alt="Ask DeepWiki">
</a>
</p>
<h4 align="center">
<p>
<a href="https://tencent.github.io/AI-Infra-Guard/">Documentation</a> |
<a href="./README_ZH.md">中文</a> |
<a href="#">English</a>
<p>
</h4>
<p align="center">
<h3 align="center">🚀 AI Red Teaming Platform by Tencent Zhuque Lab</h3>
</p>
**A.I.G (AI-Infra-Guard)** integrates capabilities such as AI infra vulnerability scan, MCP Server risk scan, and Jailbreak Evaluation, aiming to provide users with the most comprehensive, intelligent, and user-friendly solution for AI security risk self-examination.
## Table of Contents
- [✨ Features](#-features)
- [🖼️ Showcase](#-showcase)
- [🚀 Quick Start](#-quick-start)
- [🙏 Contribution Guide](#-contribution-guide)
- [💬 Join the Community](#-join-the-community)
- [📄 License](#-license)
## ✨ Features
<table>
<tr>
<td>
<h3>🔍 AI Infra Scan</h3>
<p>Precisely identifies <b>30+</b> AI framework components<br/>Covers <b>nearly 400</b> known CVE vulnerabilities<br/>Including Ollama, ComfyUI, vLLM, etc.</p>
</td>
<td>
<h3>🤖 MCP Scan</h3>
<p>Powered by AI Agent<br />Detects <b>9 major categories</b> of MCP security risks<br/>Supports <b>source code/remote URL</b> scanning</p>
</td>
<td>
<h3>⚡ Jailbreak Evaluation</h3>
<p>Rapidly assesses Prompt security risks<br/>Includes multiple curated jailbreak evaluation datasets<br/>Quickly generates Jailbreak Evaluation reports</p>
</td>
</tr>
</table>
<br />
## 🖼️ Showcase
### A.I.G Main Interface

### AI Infra Scan

### MCP Scan

### Jailbreak Evaluation

### Plugin Management
<table>
<tr>
<td valign="top"><img align=top src="img/plugin-1-en.png"/></td>
<td valign="top"><img align=top src="img/plugin-2-en.png"/></td>
</tr>
</table>
<br />
## 🚀 Quick Start
### Deployment with Docker
**System Requirements**
- Docker 20.10 or higher
- At least 4GB of available RAM
- At least 10GB of available disk space
**1. One-Click Install Script (Recommended)**
```bash
# This method will automatically install Docker and launch A.I.G with one command
curl https://raw.githubusercontent.com/Tencent/AI-Infra-Guard/refs/heads/main/docker.sh | bash
```
**2. Run with pre-built images (Recommended)**
```bash
git clone https://github.com/Tencent/AI-Infra-Guard.git
cd AI-Infra-Guard
# This method pulls pre-built images from Docker Hub for a faster start
docker-compose -f docker-compose.images.yml up -d
```
**3. Build from source and run**
```bash
git clone https://github.com/Tencent/AI-Infra-Guard.git
cd AI-Infra-Guard
# This method builds a Docker image from local source code and starts the service
docker-compose up -d
```
Once the service is running, you can access the A.I.G web interface at:
`http://localhost:8088`
**Directory Structure**
| Directory/File | Description | Mount Path |
|---------------------|-------------------------------------------------------------|---------------------------------|
| `uploads/` | Uploads directory | `/ai-infra-guard/uploads` |
| `db/` | Database file directory | `/ai-infra-guard/db` |
| `data/` | Knowledge base data directory (fingerprints, vulnerabilities) | `/ai-infra-guard/data` |
| `logs/` | Application log directory | `/ai-infra-guard/logs` |
<br />
## 📝 Contribution Guide
The extensible plugin framework serves as A.I.G's architectural cornerstone, inviting community innovation through Plugin and Feature contributions.
### Plugin Contribution Rules
1. **Fingerprint Rules**: Add new YAML fingerprint files to the `data/fingerprints/` directory.
2. **Vulnerability Rules**: Add new vulnerability scan rules to the `data/vuln/` directory.
3. **MCP Plugins**: Add new MCP security scan rules to the `data/mcp/` directory.
4. **Jailbreak Evaluation Datasets**: Add new Jailbreak evaluation datasets to the `data/eval` directory.
Please refer to the existing rule formats, create new files, and submit them via a Pull Request.
### Other Ways to Contribute
- 🐛 [Report a Bug](https://github.com/Tencent/AI-Infra-Guard/issues)
- 💡 [Suggest a New Feature](https://github.com/Tencent/AI-Infra-Guard/issues)
- ⭐ [Improve Documentation](https://github.com/Tencent/AI-Infra-Guard/pulls)
<br />
## 🙏 Acknowledgements
We extend deep gratitude to these open-source developers:
<table>
<tr>
<td width="33%"><img src="img/keen_lab_logo.svg" alt="Keen Lab"></td>
<td width="33%"><img src="img/wechat_security.png" alt="WeChat Security"></td>
<td width="33%"><img src="img/fit_sec_logo.png" alt="Fit Security"></td>
</tr>
</table>
<br>
Thanks to all the developers who have contributed code to the A.I.G project:
<a href="https://github.com/Tencent/AI-Infra-Guard/graphs/contributors">
<img src="https://contrib.rocks/image?repo=Tencent/AI-Infra-Guard" />
</a>
<br>
## 💬 Join the Community
<div>
<img src="img/wechatgroup.png" alt="WeChat Group" width="200">
<p><b>Scan the WeChat QR code to join the A.I.G community group</b></p>
</div>
For collaboration inquiries or feedback, please contact us at: zhuque(at)tencent.com
<br><br>
## 📄 License
This project is licensed under the **MIT License**. See the [License.txt](./License.txt) file for details.
<div>
[](https://star-history.com/#Tencent/AI-Infra-Guard&Date)
</div>
", Assign "at most 3 tags" to the expected json: {"id":"13637","tags":[]} "only from the tags list I provide: [{"id":77,"name":"3d"},{"id":89,"name":"agent"},{"id":17,"name":"ai"},{"id":54,"name":"algorithm"},{"id":24,"name":"api"},{"id":44,"name":"authentication"},{"id":3,"name":"aws"},{"id":27,"name":"backend"},{"id":60,"name":"benchmark"},{"id":72,"name":"best-practices"},{"id":39,"name":"bitcoin"},{"id":37,"name":"blockchain"},{"id":1,"name":"blog"},{"id":45,"name":"bundler"},{"id":58,"name":"cache"},{"id":21,"name":"chat"},{"id":49,"name":"cicd"},{"id":4,"name":"cli"},{"id":64,"name":"cloud-native"},{"id":48,"name":"cms"},{"id":61,"name":"compiler"},{"id":68,"name":"containerization"},{"id":92,"name":"crm"},{"id":34,"name":"data"},{"id":47,"name":"database"},{"id":8,"name":"declarative-gui "},{"id":9,"name":"deploy-tool"},{"id":53,"name":"desktop-app"},{"id":6,"name":"dev-exp-lib"},{"id":59,"name":"dev-tool"},{"id":13,"name":"ecommerce"},{"id":26,"name":"editor"},{"id":66,"name":"emulator"},{"id":62,"name":"filesystem"},{"id":80,"name":"finance"},{"id":15,"name":"firmware"},{"id":73,"name":"for-fun"},{"id":2,"name":"framework"},{"id":11,"name":"frontend"},{"id":22,"name":"game"},{"id":81,"name":"game-engine "},{"id":23,"name":"graphql"},{"id":84,"name":"gui"},{"id":91,"name":"http"},{"id":5,"name":"http-client"},{"id":51,"name":"iac"},{"id":30,"name":"ide"},{"id":78,"name":"iot"},{"id":40,"name":"json"},{"id":83,"name":"julian"},{"id":38,"name":"k8s"},{"id":31,"name":"language"},{"id":10,"name":"learning-resource"},{"id":33,"name":"lib"},{"id":41,"name":"linter"},{"id":28,"name":"lms"},{"id":16,"name":"logging"},{"id":76,"name":"low-code"},{"id":90,"name":"message-queue"},{"id":42,"name":"mobile-app"},{"id":18,"name":"monitoring"},{"id":36,"name":"networking"},{"id":7,"name":"node-version"},{"id":55,"name":"nosql"},{"id":57,"name":"observability"},{"id":46,"name":"orm"},{"id":52,"name":"os"},{"id":14,"name":"parser"},{"id":74,"name":"react"},{"id":82,"name":"real-time"},{"id":56,"name":"robot"},{"id":65,"name":"runtime"},{"id":32,"name":"sdk"},{"id":71,"name":"search"},{"id":63,"name":"secrets"},{"id":25,"name":"security"},{"id":85,"name":"server"},{"id":86,"name":"serverless"},{"id":70,"name":"storage"},{"id":75,"name":"system-design"},{"id":79,"name":"terminal"},{"id":29,"name":"testing"},{"id":12,"name":"ui"},{"id":50,"name":"ux"},{"id":88,"name":"video"},{"id":20,"name":"web-app"},{"id":35,"name":"web-server"},{"id":43,"name":"webassembly"},{"id":69,"name":"workflow"},{"id":87,"name":"yaml"}]" returns me the "expected json"