Control #

F

2

.

3

Evaluate AI against cyber misuse

Red-team the model with prompts designed to elicit exploit code, malware, or vulnerability enumeration. Track success rates and identify bypass techniques.

Evidence

Audit results of third-party evals for cyber misuse

Recommended actions

We'll recommend specific practices and actions for complying with this control.

Provide feedback on this control