TachyonicTachyonic

Listing Attacks

Discover available attack categories and individual attacks

List All Attacks

tachyonic attacks

Shows all attacks available from your heuristics library.

Filter by Category

tachyonic attacks --category tool-abuse

Detailed View

tachyonic attacks --detailed

Shows full attack metadata: ID, name, category, severity, modality, payloads count, and OWASP mapping.

Include Built-in Attacks

By default, only the external heuristics library is loaded. Add built-in attacks:

tachyonic attacks --include-builtin

Example Output

prompt-injection
  PI-001  Direct Instruction Override         critical  text  4 payloads
  PI-002  System Prompt Extraction            high      text  3 payloads
  PI-003  Role Hijacking                      high      text  3 payloads
  ...

tool-abuse
  EA-001  Tool Parameter Manipulation         high      text  4 payloads
  EA-002  Tool Chaining Attack                critical  text  3 payloads
  ...

Categories

CategoryCountDescription
prompt-injection20Direct prompt injection
system-prompt-extraction12System prompt leakage
jailbreak22Guardrail bypass
tool-abuse12Tool/function manipulation
multi-turn-manipulation8Multi-turn attacks
vision-injection12Image-based attacks
sensitive-disclosure10Data exfiltration
supply-chain8Dependency attacks
permission-escalationPrivilege escalation
multi-agent-injectionMulti-agent attacks
improper-output8Output handling
unbounded-consumption2Resource exhaustion
misinformationFalse information
vector-embedding8Embedding manipulation
video-injectionVideo-based attacks
indirect-injectionContext injection (RAG)

On this page