Frontier AI Red Team

Hunters of
Unknown Unknowns.

The SEAL Team 6 of the latent space. The last line of offense.

AI whisperers who've spent years in the wilderness of hacking frontier models - jailbreaks, prompt injections, out of distribution behaviors, and vulnerabilities others will never see coming.

Fortune Favors the Bold

BT6 is an elite AI hacker collective led by Pliny the Liberator, the anonymous researcher infamous for breaking every frontier model within hours of release. We've pioneered jailbreak techniques, multi-modal exploits, and prompt injection methods that have shaped how the industry approaches AI security.

The name honors Pliny the Elder, the Roman admiral and naturalist who sailed toward Vesuvius while others fled - choosing to observe the eruption and rescue his friends rather than retreat to safety. We move toward risk, not away from it. We explore and cartograph the latent space like ancient navigators mapping uncharted waters.

We're the hackers who wrote the playbook other red teams get trained on. We've worked with multiple frontier AI labs and billion-dollar companies whose products serve over a billion users. When the stakes are highest, they call us.

Full-Spectrum AI Red Team

Model whisperers. Prompt incanters. Guardrail arsonists. We know how to pass through the walls of the latent space and elicit what models are truly capable of.

Attack Surfaces

Harm Domain Expertise

Prompt & Language Layer

Universal jailbreaks, prompt injection, system prompt extraction, refusal bypass, multilingual safety bypass, temporal pre-seeded payloads, multi-turn manipulation.

Cyber & Traditional Security

Zero-day research, penetration testing, network exploitation, application security, bug bounty veterans, infrastructure attack simulation.

Multimodal & Steganographic

Image, audio, and video injection vectors. Covert AI-to-AI communication channels. Steganographic payload delivery and cross-modal exploit chaining.

CBRNE

Specialist evaluation of chemical, biological, radiological, nuclear, and explosive information risks. Can your model be exploited to provide dangerous uplift?

Agentic & Multi-Agent Systems

Sub-agent exploitation, tool-use chain attacks, inter-agent infection and coercion, indirect injection via tool payloads, autonomous persistence, self-replication.

Psychological & Social

Adversarial persuasion, radicalization pathways, mental health exploitation, parasocial manipulation, social engineering via AI, vulnerable user targeting.

Supply Chain & Model Integrity

Poisoned weights, backdoored adapters, memory and RAG poisoning, context manipulation, data ingestion attacks. No industry standards exist yet.

Identity & Impersonation

Deepfakes, voice cloning, synthetic identity generation, biometric spoofing, impersonation attacks. Accelerating with minimal defenses deployed.

Deceptive Alignment & Emergent Risk

Evaluation gaming, deceptive alignment detection, unpredicted capability phase transitions, emergent behavior mapping. The risks no checklist covers.

Financial & Critical Infrastructure

Market manipulation, DeFi exploitation, fraud facilitation. Power grid, water, and transport system targeting via AI. Emerging threats needing assessment.

Embodied AI & Physical Systems

Robot jailbreaking, sensor manipulation, actuator hijacking, physical-world AI exploitation. An emerging frontier with virtually no existing defenses.

Privacy & Data Exfiltration

Training data extraction, PII leakage, membership inference, model inversion attacks, confidential context extraction, system prompt theft.

Universal Jailbreaks Prompt Injection Multilingual Bypass Temporal Payloads Multimodal Injection Steganographic Channels Agent Exploitation Inter-Agent Infection Supply Chain RAG Poisoning Deceptive Alignment Emergent Capabilities Zero-Day Research Penetration Testing CBRNE Evaluation Deepfakes & Cloning Critical Infrastructure Self-Replication

Our Operators

27 Active Operators

160+ Years Combined Experience
4,000+ Vulnerabilities Reported
30+ Conference Talks

Explore Your Real Risk Surface

We work with frontier labs, enterprises, and governments who can't afford to be surprised. Engagements are selective. If your AI deployment carries material risk and you need answers, let's talk.

Summon the Strike Team

Encrypted channels available // Total discretion

ops@bt6.gg โ†’