BT6
Charting the latent space
DoctrineCapabilitiesOperatorsArsenalEnlistEngageengage@bt6.gg →
Basilisk Team Six

Hunters of
Unknown Unknowns.

0
Vulnerabilities Reported
Every
Frontier Model Broken
Hours
Not Days — Time to First Exploit
0
Active Operators
Threat Assessment // Field Note
Frontier labs already have elite red teams in-house.
Then they engage us.
postureThe Last Line of Offense
clienteleEngaged by Frontier AI Labs
windowPre-Release & Pre-Deployment Operations
discretionAll Engagements Under NDA
0
Vulnerabilities found before they became incidents
Doctrine

Fortune Favors the Bold

BT6 is stewarded by Pliny the Liberator — whose handle honors Pliny the Elder, the Roman admiral who sailed toward Vesuvius while others fled. The instinct to move toward risk is the only one that matters in this work.

Every frontier model ships with vulnerabilities its builders cannot see. The alignment teams are too close. The internal red teams are too polite. The bug bounty hunters are too narrow. The gaps are structural, not accidental. Other teams run evaluations. We run campaigns — adversarial, persistent, and relentless until the model yields what it's hiding.

That is the work BT6 was built for. Stewarded by Pliny the Liberator — named to TIME's 100 Most Influential in AI after breaking every major model within hours of release — this is the hacker collective whose jailbreak techniques, multi-modal exploits, and prompt injection methods set the standard other red teams now train against.

Frontier labs, billion-user platforms, and governments have engaged us for the work that cannot be systematized: adversarial intuition that finds what evals miss. We cartograph the latent space the way Pliny's fleet charted coastlines — by sailing into the unknown and returning with maps.

Capabilities

Full-Spectrum AI Adversarial Operations

Your threat surface is wider than your security team thinks. Every modality is an attack vector. Every tool integration is a trust boundary. Every agent is a potential insider. These are the domains where we operate — and where your current defenses have blind spots.

Attack Surfaces

Prompt & Language Layer

Most teams over-test this with benchmarks and under-test it with adversarial creativity.

Universal jailbreaks, prompt injection, system prompt extraction, refusal bypass, multilingual evasion, temporal payloads.

Multimodal & Steganographic

Most multimodal safety testing lags text-only by eighteen months.

Image, audio, and video injection vectors. Covert AI-to-AI communication. Steganographic payload delivery.

Agentic & Multi-Agent Systems

Every tool call is a trust decision your agent makes unsupervised.

Sub-agent exploitation, tool-use chain attacks, inter-agent infection, indirect injection via tool payloads, autonomous persistence.

Supply Chain & Model Integrity

No industry standards exist here yet — which is precisely the problem.

Poisoned weights, backdoored adapters, RAG poisoning, context manipulation, data ingestion attacks.

Deceptive Alignment & Emergent Risk

The risks that exist outside your threat model.

Evaluation gaming, deceptive alignment, capability phase transitions, emergent behavior that appeared in no test suite.

Embodied AI & Physical Systems

When model failure crosses from digital to physical, the consequences become irreversible.

Robot jailbreaking, sensor manipulation, actuator hijacking.

Harm Domain Expertise

Cyber & Traditional Security

AI-augmented attack chains are already outpacing traditional SOC response times.

Zero-day research, penetration testing, network exploitation, application security.

CBRNE Evaluation

The question isn't whether your model knows this. It's how much faster it makes a motivated actor.

Chemical, biological, radiological, nuclear, and explosive uplift risk assessment.

Psychological & Social

The harm frontier where technical safety meets human vulnerability.

Adversarial persuasion, radicalization pathways, mental health exploitation, parasocial manipulation.

Identity & Impersonation

The cost to produce a convincing impersonation is falling faster than defenses can adapt.

Deepfakes, voice cloning, synthetic identity generation, biometric spoofing.

Financial & Critical Infrastructure

Consequences that don't stay digital.

Market manipulation, DeFi exploitation, fraud facilitation. Power grid, water, and transport system targeting via AI.

Privacy & Data Exfiltration

What your model has memorized is a liability you haven't audited.

Training data extraction, PII leakage, membership inference, model inversion, system prompt theft.

Technical Taxonomy
Universal JailbreaksPrompt InjectionMultilingual BypassTemporal PayloadsMultimodal InjectionSteganographic ChannelsAgent ExploitationInter-Agent InfectionRAG PoisoningDeceptive AlignmentEmergent CapabilitiesZero-Day ResearchCBRNE EvaluationDeepfakes & CloningSelf-ReplicationCritical InfrastructurePenetration TestingSupply Chain Attacks
Engagement Deliverables
Adversarial Data PackagesExploit DevelopmentComplex Attack GraphsProof-of-Concept ChainsVulnerability BriefsAttack PlaybooksThreat Model DocumentationRemediation GuidanceExecutive Risk SummariesFrontier-Grade Reporting
Field Note — BT6 Threat Assessment
— · —
The Crew

Our Operators

Thirty-seven operators · twenty-seven named below. Sixteen Evocati — the ones who get sent when the target is a frontier model and failure isn't an option.

0
Vulns Reported
0
Conference Talks
0
Models Unbroken
Strike Lead

PLINY

The Liberator — Steward & Strike Lead Evocati

TIME100 AI · BBC · Latent Space
Andreessen grant · 10K+ GitHub stars · Every model broken on release
In-House Arsenal

Weapons of Our Own Making

Every BT6 campaign runs on tooling we built ourselves. A portion is published openly — adopted by hundreds of thousands of researchers, cited across the AI safety literature. The rest stays compartmented to client engagements.

L1B3RT4S
Liberation Corpus

Our reference library of jailbreak primitives across every flagship model. Every BT6 campaign starts from this corpus and extends it. Cited across 10+ peer-reviewed papers as the manual-attack baseline.

18.6k ★Open Source
P4RS3LT0NGV3
Payload Crafting Suite

The forge where our operators build, encode, and chain adversarial payloads. Multi-layer obfuscation, leetspeak transforms, encoding stacks — the dark matter between a raw prompt and an exploit chain.

Web ToolPrompt Craft
CL4R1T4S
System Prompt Archive

Our continuously updated archive of extracted system prompts from every major frontier deployment. Reconnaissance asset for every BT6 campaign — and the largest open record of how labs configure their models in production.

25.8k ★Reconnaissance
0BL1T3R4TUS
Abliteration Toolkit

Our weights-level instrument for surgically removing refusal mechanisms — without retraining. Lets BT6 measure the gap between what a model declines to do and what it remains structurally capable of. The distinction most evals collapse.

Weights-LevelMechanistic
ST3GG
Steganography Suite

Our covert-channel toolkit for multimodal payload delivery — text, image, audio, multi-layer encoding. Builds the kind of carriers safety filters were never trained to look for, because nobody had built them yet.

Web ToolMultimodal
G0DM0D3
Unrestricted Inference

Our public demonstration platform for what frontier models will say once their alignment scaffolding gives way. The receipt that the gap between behavior and capability is real, reproducible, and shippable.

5.5k ★Alignment Stress

What you see above is a fraction of our custom arsenal. The rest stays under NDA.

BT6
Join the Fleet

Sail With Us

Most operators are recruited by invitation. Occasionally, someone finds us first.

Pliny sailed toward the eruption when every other ship turned back. That's the temperament we select for.

We want people who've already been doing this work because they couldn't stop themselves — who see the model misbehavior before anyone puts a name to it. If you've broken a frontier model and felt the quiet pull to catalog what you found, you already speak our language.

BT6 is an invite-only collective, not a corporation. No org charts. No performance reviews. No busywork. You're known by your callsign and judged by what you find. Decentralized command, unified doctrine, total autonomy.

The work is hard, the targets are the most sophisticated systems ever built, and the findings shape how the industry thinks about AI risk. That's the offer.

Red Team Operator

Active EngagementRemote
Break frontier models on contract for the labs that built them.

Requires demonstrated jailbreak history and deep intuition for LLM behavior under adversarial pressure. NDA engagements only.

Apply →

Multimodal Exploit Specialist

Specialist RoleRemote
The frontier is multimodal. The attack surface is barely mapped.

Cross-modal attack chains, steganographic payloads, vision-language exploits. You'll ship exploits the rest of the industry hasn't seen yet.

Apply →

Agentic Systems Researcher

Emerging DomainRemote
The threat models here are being written in real time.

Agent-to-agent exploitation, tool-use attacks, autonomous persistence. Comfortable operating in domains where the playbooks don't exist.

Apply →

CBRNE Domain Expert

Domain SpecialistClearance Preferred
Government and lab engagements. Clearance preferred.

Evaluate whether frontier models provide meaningful uplift for chemical, biological, radiological, nuclear, and explosive threats. Prior lab, DoD, or national lab experience preferred.

Apply →

DFIR Systems Engineer

Engineering RoleRemote
Every engagement ships custom tooling and auditable evidence. Someone has to build it.

Custom telemetry capture, evidence-chain preservation, per-engagement tooling. You're the reason the arsenal works and the deliverables stand up to post-engagement scrutiny. Strong DFIR or detection-engineering background; adversarial fluency required.

Apply →

Open Application — Surprise Us

All Backgrounds
Found something no one else has. Break things in ways that don't have names yet.

All backgrounds considered if the work is real. Send representative findings — public writeups, private PoCs, anything that demonstrates you see what others miss.

Apply →

"Fortes Fortuna iuvat" — Fortune favours the bold. — Pliny the Elder, on sailing toward Vesuvius

Apply: enlist@bt6.gg →
Engage

Your Next Vulnerability
Is Already There

The question is whether you find it or someone else does. We work with frontier labs, enterprises, and governments where the cost of a missed exploit is measured in trust, market cap, or national security. Engagements are selective and under NDA. You receive adversarial data packages, exploit documentation, and complex attack graphs — not slide decks.

engage@bt6.gg →
Operational Security
Your model's vulnerabilities are
treated as classified material.
Compartmented teams per engagement
No cross-client visibility
Encrypted communications and delivery
NDA executed prior to first briefing
Custom-built arsenal · Locally hosted · Zero third-party tooling