Listing Attacks
Discover available attack categories and individual attacks
List All Attacks
tachyonic attacksShows all attacks available from your heuristics library.
Filter by Category
tachyonic attacks --category tool-abuseDetailed View
tachyonic attacks --detailedShows full attack metadata: ID, name, category, severity, modality, payloads count, and OWASP mapping.
Include Built-in Attacks
By default, only the external heuristics library is loaded. Add built-in attacks:
tachyonic attacks --include-builtinExample Output
prompt-injection
PI-001 Direct Instruction Override critical text 4 payloads
PI-002 System Prompt Extraction high text 3 payloads
PI-003 Role Hijacking high text 3 payloads
...
tool-abuse
EA-001 Tool Parameter Manipulation high text 4 payloads
EA-002 Tool Chaining Attack critical text 3 payloads
...Categories
| Category | Count | Description |
|---|---|---|
prompt-injection | 20 | Direct prompt injection |
system-prompt-extraction | 12 | System prompt leakage |
jailbreak | 22 | Guardrail bypass |
tool-abuse | 12 | Tool/function manipulation |
multi-turn-manipulation | 8 | Multi-turn attacks |
vision-injection | 12 | Image-based attacks |
sensitive-disclosure | 10 | Data exfiltration |
supply-chain | 8 | Dependency attacks |
permission-escalation | — | Privilege escalation |
multi-agent-injection | — | Multi-agent attacks |
improper-output | 8 | Output handling |
unbounded-consumption | 2 | Resource exhaustion |
misinformation | — | False information |
vector-embedding | 8 | Embedding manipulation |
video-injection | — | Video-based attacks |
indirect-injection | — | Context injection (RAG) |