defense-implementation
Defense Implementation & Mitigation
Implement practical, production-ready defenses against LLM vulnerabilities with input validation, output filtering, and architectural protections.
Quick Reference
Skill: Defense Implementation
NIST RMF: Manage function
Approach: Three-layer defense (Input → Processing → Output)
Bonded to: 05-defense-strategy-developer
Three-Layer Defense Architecture
Production Defense Stack:
━━━━━━━━━━━━━━━━━━━━━━━━━
More from pluginagentmarketplace/custom-plugin-ai-red-teaming
prompt-hacking
Advanced prompt manipulation including direct attacks, indirect injection, and multi-turn exploitation
14safety-filter-bypass
Techniques to test and bypass AI safety filters, content moderation systems, and guardrails for security assessment
10llm-jailbreaking
Advanced LLM jailbreaking techniques, safety mechanism bypass strategies, and constraint circumvention methods
10red-team-frameworks
Tools and frameworks for AI red teaming including PyRIT, garak, Counterfit, and custom attack automation
6responsible-disclosure
Ethical vulnerability reporting, coordinated disclosure, and bug bounty participation for AI systems
5certifications-training
Professional certifications, CTF competitions, and training resources for AI security practitioners
5