Skip to main content

F.O.R.G.E.

ScopeAI-integrated security techniques
Use ForTechnique reference, engagement planning
Linkforged.itsbroken.ai

F.O.R.G.E. is a practitioner-built framework for AI-integrated security techniques, designed to bridge the gap between academic AI security research and hands-on red team operations. Unlike taxonomies that classify risks at a high level, F.O.R.G.E. provides technique-level detail with IDs (FG-XNNN format), tactical groupings, and operational context that maps directly to engagement activities. The framework covers 8 tactics and 62 techniques spanning the full AI red team lifecycle, from reconnaissance and initial access through persistence, evasion, and impact. It is designed to be used alongside MITRE ATLAS for threat modeling and OWASP for vulnerability classification, filling the operational gap between "what threats exist" and "how to test for them." F.O.R.G.E. is maintained as a living framework that evolves with the AI threat landscape, incorporating new techniques as they emerge from real-world engagements and research.

Key Components

  • 8 tactical categories organize techniques by operational phase: covering the full attack lifecycle from initial reconnaissance through post-exploitation, with AI-specific tactics that address model manipulation, pipeline compromise, and agent exploitation.
  • 62 techniques with unique IDs (FG-XNNN format) provide granular, actionable procedures that red teamers can reference during engagements, map to findings, and track across assessments.
  • Cross-framework mapping links each technique to corresponding entries in MITRE ATLAS, OWASP LLM Top 10, and OWASP ML Top 10, enabling consistent reporting across multiple compliance and threat frameworks.
  • Engagement planning support includes technique selection guidance based on target architecture (LLM applications, ML pipelines, agent systems, RAG deployments), helping red teams scope assessments efficiently.
  • Operational focus distinguishes F.O.R.G.E. from academic frameworks: each technique includes practical execution guidance derived from real engagement experience, not just theoretical attack descriptions.