Vauban Overview
Deployment access, Vauban's assurance loop, and the decision frontier between adaptive attacks, defenses, and retained benign utility.
flowchart LR
subgraph Deployment["Deployment Under Test"]
U["Users / Adversaries"]
APP["App / Agent / Workflow"]
TOOLS["Tools / RAG / Policies"]
MODEL["Model"]
U --> APP
APP --> MODEL
APP <--> TOOLS
end
subgraph Access["What Vauban Can Access"]
API["API / prompts / outputs"]
ACT["Activations / traces"]
W["Weights / training"]
end
subgraph Vauban["Vauban Assurance Loop"]
OBJ["Objective\nWhat must be preserved?\nWhat must be prevented?"]
ATT["Adaptive attacks\nprompt / softprompt / transfer / tool misuse"]
DEF["Defenses\nSIC / CAST / guard / policy / hardening"]
JUDGE["Judging\nattack success\nbenign utility\nfalse refusals"]
FRONTIER["Decision frontier\nsafe enough?\nwhat was lost?\nwhat survives?"]
OBJ --> ATT
OBJ --> DEF
ATT --> JUDGE
DEF --> JUDGE
JUDGE --> FRONTIER
FRONTIER -. iterate .-> ATT
FRONTIER -. iterate .-> DEF
end
API --> Vauban
ACT --> Vauban
W --> Vauban
MODEL -. exposes .-> API
MODEL -. if available .-> ACT
MODEL -. if owned .-> W
FRONTIER --> REPORT["Deployment verdict\nreports / metrics / next actions"]