For AI agents: a documentation index is available at the root level at /llms.txt and /llms-full.txt. Append /llms.txt to any URL for a page-level index, or .md for the markdown version of any page.
Trust CenterStatusSupportGet a demoPlatform
DocumentationEvals API ReferenceIntegrations & OTELPlatform SettingsSelf-HostingChangelog
DocumentationEvals API ReferenceIntegrations & OTELPlatform SettingsSelf-HostingChangelog
  • Get Started
    • Introduction
    • Setup and Installation
  • LLM Evaluation
    • Introduction
    • Experiments
  • Metrics
    • Introduction
    • Metric Collections
    • Custom Metrics
  • LLM Tracing
    • Introduction
    • Signals
    • Troubleshooting
  • Human-in-the-Loop
    • Introduction
    • Collect Feedback
  • Reporting & Analytics
    • Dashboards
    • Executive Insights
  • Red Teaming
    • Introduction
    • Quickstart
    • Frameworks & Policies
    • Risk Profiles
    • Red Team Using DeepTeam
  • Resources
    • Why Confident AI
    • Support
    • Data Handling
    • LLM Use Cases
LogoLogo
Trust CenterStatusSupportGet a demoPlatform
On this page
  • Overview
  • How it works
  • Run your first risk assessment
  • Next steps
Red Teaming

Red Teaming Quickstart (No-Code)

Run your first risk assessment in the platform UI — no code required.

Was this page helpful?
Previous

Frameworks & Policies

Next
Built with

Overview

This quickstart walks you through running your first no-code risk assessment on Confident AI. By the end of this guide, you’ll have:

  • Connected your AI app to Confident AI
  • Configured your first security framework
  • Run a risk assessment on your AI application and viewed it on the dashboard

No-code risk assessments let any team member analyze an AI application for security and compliance issues directly in the Confident AI platform.

How it works

Risk assessments follow a simple 4-step process:

  1. Connect your AI application — configure an AI Connection so Confident AI can communicate with your system.
  2. Define a security framework — select or create a framework (e.g., OWASP Top 10 for LLMs, MITRE ATLAS) that contains vulnerabilities and attacks of your choice.
  3. Generate and execute attacks — automatically generate adversarial inputs and send them to your AI application.
  4. Evaluate and assess risk — Confident AI analyzes responses, detects successful exploitations, and generates a structured risk assessment report.

Your AI app can be any application reachable over the internet — Confident AI communicates with it directly through your configured AI Connection.

Here’s a visual representation of the data flow during a risk assessment:

Run your first risk assessment

You’ll need a Confident AI account to follow along. Sign up here if you haven’t already.

1

Connect Your AI App

First, set up an AI Connection so Confident AI can communicate with your app.

Setup AI Connection
  1. Navigate to Project Settings → AI Connections
  2. Click New AI Connection
  3. Give it a unique identifying name
  4. Configure the endpoint, payload, and output key path
  5. Click Save
2

Create a Framework

A framework defines the vulnerabilities and attacks that will be used in your assessment.

Add a Framework on Confident AI
  1. Navigate to the Frameworks tab
  2. Click Add Framework
  3. Select a template (e.g., OWASP, NIST, MITRE ATLAS) or create a custom framework
  4. Click Save

You can edit vulnerabilities, attacks, and priorities anytime from the framework configuration page.

3

Run the Assessment

From your framework configuration page, click Run Assessment and select the AI Connection you want to test.

Create a risk assessment

Confident AI will generate adversarial inputs from your framework and send them to your app.

Name your assessments descriptively (e.g., “compliance-test-feb-11”) so they’re easy to find later.

4

View Results

Once the assessment completes, your report will be available in the risk profile section.

Viewing risk assessment results

The report includes:

  • Executive Summary — overall pass rate, vulnerability coverage, and critical issues
  • Test Cases — every adversarial input and your AI’s response
  • CVSS Score & Overview — risk score distribution and exploitability breakdown by vulnerability

Done ✅. You’ve run your first no-code risk assessment. You can also download a PDF report with the full breakdown and remediation recommendations.

Next steps

Now that you’ve run your first risk assessment, dive deeper into the platform:

Frameworks & Policies

Customize frameworks, add vulnerabilities, and configure attack priorities for your use case.

Risk Profiles

Understand CVSS scores, vulnerability coverage, and exploitability breakdowns across your assessments.