Comprehensive Red Team Evaluation
{{ recommendation_summary }}
{% endif %}| Severity | Title | Category | OWASP | CVSS | Status |
|---|---|---|---|---|---|
| {{ f.severity }} | {{ f.title }} | {{ f.category }} | {{ f.owasp_llm or '—' }} | {{ "%.1f" | format(f.cvss) if f.cvss else '—' }} | {{ 'Pass' if f.passed else 'Fail' }} |
No findings to report.
{% endif %}{{ f.description }}
Prompt Sent
{{ f.prompt }}
Response Received
{{ f.response }}
{% if f.detector_evidence %}
Detector Analysis
{% for line in f.detector_evidence %}{{ line }}
{% endfor %}
{% endif %}
{{ f.remediation }}
References: {% for ref in f.references %} {{ ref }}{% if not loop.last %}, {% endif %} {% endfor %}
{% endif %}The following table maps assessment findings to NIST AI RMF functions and categories. Controls marked as "Finding Identified" have findings that provide evidence for compliance activities.
| NIST AI RMF Function | Category | Status | Related Findings |
|---|---|---|---|
| {{ row.function }} | {{ row.category }} | {% if row.findings %} Evidence Available {% else %} No Evidence {% endif %} | {{ row.findings | join(', ') if row.findings else '—' }} |
| ID | Risk | Tested | Findings | Result |
|---|---|---|---|---|
| {{ row.id }} | {{ row.name }} | {% if row.tested %} Yes ({{ row.test_count }}) {% else %} Not Tested {% endif %} | {{ row.finding_count }} | {% if not row.tested %} N/A {% elif row.finding_count > 0 %} Issues Found {% else %} Pass {% endif %} |
| ID | Risk | Tested | Findings | Result |
|---|---|---|---|---|
| {{ row.id }} | {{ row.name }} | {% if row.tested %} Yes ({{ row.test_count }}) {% else %} Not Tested {% endif %} | {{ row.finding_count }} | {% if not row.tested %} N/A {% elif row.finding_count > 0 %} Issues Found {% else %} Pass {% endif %} |
AI security findings map to SOC 2 Trust Services Criteria. The following identifies which Common Criteria are supported by evidence from this assessment.
| SOC 2 Criteria | Description | AI Security Relevance | Related Findings |
|---|---|---|---|
| {{ row.criteria }} | {{ row.description }} | {{ row.relevance }} | {{ row.findings | join(', ') if row.findings else '—' }} |
{{ scope }}
This assessment covers AI-specific security risks. Traditional infrastructure, network, and application security testing is out of scope unless explicitly stated.
Full request and response data for each test case. Expand individual sections to view raw evidence.
{% for f in all_results %}Category: {{ f.category }} | Risk: {{ f.risk }} | Suite: {{ f.suite_id }}
Prompt
{{ f.prompt }}
Response
{{ f.response }}
{% if f.detector_evidence %}
Detector Analysis
{% for line in f.detector_evidence %}{{ line }}
{% endfor %}
{% endif %}
Severities and framework mappings (OWASP, MITRE ATLAS, CVSS) come from a static taxonomy file maintained by the AIPOP project — not from LLM-generated analysis. Each test case ID maps to a hand-curated entry with a title, description, remediation, and framework references.
CVSS scores are estimates based on the vulnerability class, not the specific target’s environment. Adjust them based on your assessment context — a finding in a dev sandbox has different impact than the same finding in production.
Review all findings before sharing this report. Remove false positives, adjust severities for your context, and add engagement-specific notes.