Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Malicious npm Packages Steal SSH, Cloud & Crypto Four Keys
May 18, 2026
CISA Warns: Microsoft Exchange Vulnerability Exploited
May 18, 2026
Home/CyberSecurity News/Augustus: Open-Source LLM Scanner Detects Vulnerability With
CyberSecurity News

Augustus: Open-Source LLM Scanner Detects Vulnerability With

Augustus is a new open-source vulnerability scanner that protects Large Language Models (LLMs) from an evolving landscape of adversarial threats. Built by Praetorian, Augustus aims to bridge the gap...

Jennifer sherman
Jennifer sherman
February 10, 2026 3 Min Read
6 0

Augustus is a new open-source vulnerability scanner that protects Large Language Models (LLMs) from an evolving landscape of adversarial threats.

Built by Praetorian, Augustus aims to bridge the gap between academic research tools and production-grade security testing, offering a single-binary solution that can launch over 210 distinct adversarial attacks against 28 LLM providers.

As enterprises race to integrate Generative AI into their products, security teams have struggled with tooling that is often research-oriented, slow, or difficult to integrate into continuous integration/continuous deployment (CI/CD) pipelines.

Existing tools like NVIDIA’s garak have set the standard for comprehensive testing, but rely on complex Python environments and heavy dependencies.

Augustus addresses these operational bottlenecks by being compiled as a single, portable Go binary. This architecture eliminates the “dependency hell” often associated with Python-based security tools, removing the need for virtual environments, pip installs, or specific interpreter versions.

The tool leverages Go’s native concurrency primitives (goroutines) to perform massively parallel scanning, making it significantly faster and more resource-efficient than its predecessors.

“We needed something built for the way our operators work: a fast, portable binary that fits into existing penetration testing workflows,” stated Praetorian in their release announcement.

210+ Attack Modes

At its core, Augustus is an attack engine that automates the “red teaming” of AI models. It ships with a library of 210+ vulnerability probes across 47 attack categories, including:

  • Jailbreaks: Sophisticated prompts designed to bypass safety filters (e.g., DAN, AIM, and “Grandma” exploits).
  • Prompt Injection: Techniques to override system instructions, including encoding bypasses like Base64, ROT13, and Morse code.
  • Data Extraction: Tests for PII leakage, API key disclosure, and training data reconstruction.
  • Adversarial Examples: Gradient-based attacks and logic bombs designed to confuse model reasoning.

A standout feature of Augustus is its “Buff” system, which allows security testers to apply transformations to any probe dynamically. Testers can chain multiple “buffs,” such as paraphrasing a prompt, translating it into a low-resource language (e.g., Zulu or Scots Gaelic), or encoding it in poetic formats, to test whether a model’s safety guardrails hold up against obfuscated inputs.

This capability is critical for uncovering “fragile” safety filters that may block a standard attack but fail to recognize the same attack when slightly altered.

Designed for the modern security stack, Augustus supports 28 LLM providers out of the box, including major platforms such as OpenAI, Anthropic, Azure, AWS Bedrock, and Google Vertex AI, as well as local inference engines such as Ollama.

This broad support ensures that teams can test everything from cloud-hosted GPT-4 models to locally running Llama 3 instances with the same tooling.

The tool’s architecture emphasizes production reliability, featuring built-in rate limiting, retry logic, and timeout handling to prevent scan failures during large-scale assessments.

Results can be exported in multiple formats, including JSON, JSONL for streaming logs, and HTML for stakeholder reporting, making it easy to ingest vulnerability data into vulnerability management platforms or SIEMs.

Augustus is the second release in Praetorian’s “12 Caesars” open-source series, following the release of the LLM fingerprinting tool Julius. It is available immediately under the Apache 2.0 license.

Security professionals and developers can download the latest release or build from source via GitHub.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Chinese Hackers Target Singapore Telecom Edge Devices

Next Post

Bloody Wolf Hackers Deploy NetSupport RAT for Remote

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Critical WordPress Plugin Flaw Allows Authentication Bypass Attacks
May 18, 2026
Fast16 Malware Sabotaged Nuclear Weapons Simulation Data
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us