Vauban Overview

Deployment access, Vauban's assurance loop, and the decision frontier between adaptive attacks, defenses, and retained benign utility.

flowchart LR
    subgraph Deployment["Deployment Under Test"]
        U["Users / Adversaries"]
        APP["App / Agent / Workflow"]
        TOOLS["Tools / RAG / Policies"]
        MODEL["Model"]
        U --> APP
        APP --> MODEL
        APP <--> TOOLS
    end

    subgraph Access["What Vauban Can Access"]
        API["API / prompts / outputs"]
        ACT["Activations / traces"]
        W["Weights / training"]
    end

    subgraph Vauban["Vauban Assurance Loop"]
        OBJ["Objective\nWhat must be preserved?\nWhat must be prevented?"]
        ATT["Adaptive attacks\nprompt / softprompt / transfer / tool misuse"]
        DEF["Defenses\nSIC / CAST / guard / policy / hardening"]
        JUDGE["Judging\nattack success\nbenign utility\nfalse refusals"]
        FRONTIER["Decision frontier\nsafe enough?\nwhat was lost?\nwhat survives?"]

        OBJ --> ATT
        OBJ --> DEF
        ATT --> JUDGE
        DEF --> JUDGE
        JUDGE --> FRONTIER
        FRONTIER -. iterate .-> ATT
        FRONTIER -. iterate .-> DEF
    end

    API --> Vauban
    ACT --> Vauban
    W --> Vauban

    MODEL -. exposes .-> API
    MODEL -. if available .-> ACT
    MODEL -. if owned .-> W

    FRONTIER --> REPORT["Deployment verdict\nreports / metrics / next actions"]