Control #
F
2
.
3
Evaluate AI against cyber misuse
Red-team the model with prompts designed to elicit exploit code, malware, or vulnerability enumeration. Track success rates and identify bypass techniques.
Evidence
Audit results of third-party evals for cyber misuse
Recommended actions
We'll recommend specific practices and actions for complying with this control.