K² Adversarial Context Demo: Multimodal Threat Intelligence Case Study
K² ships scoped threat context to your adversarial generator.
Adversarial generators need scoped, current, traceable context. K² is the knowledge layer that supplies it. This case study shows how an existing generator can retrieve threat patterns, policy boundaries, target-system context, and past-finding precedent with citations on every fact and lineage on every generated test plan.
K² stays under the test generator. Your red-team platform, scorer, guardrails, and drift detection remain in place.
K² connects adversarial generators to scoped, cited threat context.
The topology mirrors the sibling context demo: role-separated corpora, named agents, Knowledge Feed, Pipeline, MCP boundary, and the customer's existing tool on the right side of the diagram.
K² keeps retrieved facts role-aware, composes a plan through bounded agents, and hands that plan to an existing red-team tool over MCP.
The page is intentionally complementary. AI security platforms keep the adversarial outcome; K² supplies the scoped context that makes their generation step easier to review.
What this demo claims
- K² makes adversarial test generation more scoped, current, and traceable by improving pre-generation context.
- Every candidate test seed can trace back to the threat pattern, policy clause, and target fact that justified it.
- Threat intelligence stays fresh through Knowledge Feeds without rewriting the customer generator.
What this demo does not claim
- K² does not score adversarial outcomes.
- K² does not enforce runtime guardrails.
- K² does not detect production drift on its own.
- K² does not replace an eval framework, red-team platform, or AI security product.
- K² does not produce compliance attestation.
Generators perform better when they know whether a fact is a threat pattern, policy boundary, target-system fact, or past finding. K² preserves that role through collections, filters, agents, and citations.
Before the red-team tool generates a single adversarial input, K² should answer questions like these with citations from the customer's threat, policy, target, and findings corpora.
Each card maps one K² primitive to the adversarial-context value it delivers.
Separate roles stay queryable
Threats, policy, target context, and findings are indexed as different corpora instead of one prompt pile.
- Demo corpora: adv-threats, adv-policy, adv-target, adv-findings.
- Reviewers can see why each fact was retrieved.
Scope before generation
Modality, model class, severity, environment, and mitigation filters narrow retrieval before the generator sees context.
- Example: text plus image, vlm, staging, high severity.
- Less irrelevant context reaches the prompt.
Semantic plus exact match
K² can match attack-family language while preserving exact tags, benchmark names, and citation identifiers.
- Useful for OWASP categories and paper-derived technique names.
- Prevents taxonomy terms from being washed out.
Bounded context workers
Threat, policy, target, and strategist agents each answer one part of the plan with explicit corpus access.
- The strategist consumes cited upstream outputs.
- Adversarial input generation remains external.
Freshness without rework
New public threats and resurfaced regressions promote into scoped corpora so future plans include them automatically.
- Public threat intel lands in adv-threats.
- Regression watchlist tags keep old failures visible.
Auditable handoff
A declared topology exposes one MCP endpoint that hands a cited evaluation plan to the customer tool.
- Tool contract: get_evaluation_plan(...).
- Downstream scorer and reviewer stay in place.
Developers need a short reproducible setup. Enterprise buyers need a controlled pilot against their current red-team workflow. The same context layer supports both paths.
Inspect how the plan line, citation panel, and benchmark framing keep K² below the adversarial outcome.