AI Security Research.
Adversarial Thinking.

Research, methodology, and frameworks focused on AI/LLM security, emerging AI-enabled social engineering, and offensive security applied to deployed AI systems.

Personal research and portfolio site of Justin Henderson.

Black Ledger Security logo
SPECTRA

      
AI
Featured Framework

SPECTRA: Context-Aware AI Adversarial Testing

Most AI testing asks the same first question:
Can we make the model fail?

SPECTRA asks the question that matters next:
What does that failure enable?

Before testing begins, SPECTRA profiles the target system: architecture, retrieval behavior, data access, tool use, defensive controls, industry context, and business workflow.

That context shapes the assessment. A prompt that means nothing against a public chatbot could become a serious exposure path against a legal assistant, healthcare RAG system, financial services copilot, or internal agent with tool access.

The more familiar an attacker sounds with the environment, the company's language, the workflows, the data, and the intended use case, the more likely certain prompts are to succeed. A direct extraction attempt might fail, but a request framed like a normal business workflow can produce a completely different result.

That is why SPECTRA starts with recon instead of payloads. It uses the feedback it gets from the target to tailor the test strategy around things like the system type, business function, available data sources, retrieval behavior, user roles, permission boundaries, likely controls, sensitivity levels, and the kinds of workflows the AI appears designed to support.

From there, SPECTRA adjusts the payload categories, wording, framing, follow-up paths, and evidence criteria so the test cases look more like realistic use of that specific system instead of generic jailbreak attempts. The goal is to speak the system's language well enough to expose the control failures that actually matter.

The result is fewer false positives, findings with real business impact, and remediation guidance grounded in how the system actually works — not a generic spreadsheet of model behaviors. Every finding maps to what the system can reach, not just what the model will say. That is the difference between testing a model and testing a deployment.

SPECTRA // Capability Overview
20
Industry sectors
566 deployment archetypes across NAICS classifications
25
Attack categories
Mapped to OWASP LLM, Agentic AI, Agentic Skills, and MITRE ATLAS
231+
Payload templates
Base library plus LLM-generated adaptive payloads tailored to target context
15
Evasion strategies
Bypasses for input filters, model guardrails, output scanners, and AI gateways
15
Security product signatures
Fingerprints for Azure AI Content Safety, AWS Bedrock, Cloudflare, Lakera, and more
42+27
Recon and fingerprint probes
Automated system profiling before the first payload is sent
Architecture
Engine ModelHybrid Local LLM / Frontier API
API Templates12 prebuilt provider configs (OpenAI, Anthropic, Azure, Bedrock, Gemini, Mistral, Cohere, Groq, Together, Ollama, vLLM, custom)
Proxy LayerFrontier proxy with request obfuscation, header rotation, and fingerprint masking
Local InferenceOffline-capable testing with no external API dependency required
Reporting
Finding FormatContext-aware findings with attack chain, impact mapping, and control recommendations
Evidence CaptureFull prompt/response logs, retrieval traces, and tool invocation records
Framework MappingFindings mapped to OWASP LLM Top 10, MITRE ATLAS, and CWE references
Research Focus Areas

AI/LLM Security Research

Testing AI systems the way they are actually deployed: with RAG pipelines, tool access, authorization models, memory, and business workflows attached. The important question is not whether a model can be manipulated. It is what happens next in that specific system when it is.

SPECTRA Development

Building a framework for context-aware AI adversarial testing. System profiling, defense fingerprinting, industry-aware payload generation, attack chain construction, and remediation mapping. Published as open methodology with private tooling under active development.

Emerging AI-Enabled Social Engineering

Generative AI is rewriting the social engineering playbook. Reconnaissance that once took days can take minutes. Pretexts can be tailored at scale. Voice cloning, synthetic media, and automated persona development are changing what trust looks like online and over the phone.

About Me

Offensive security background.
AI security focus.

My background spans Marine Corps Special Operations, penetration testing, and social engineering. Black Ledger Security is where I publish research, frameworks, and field notes focused on AI/LLM security and the emerging role of AI in modern social engineering.

Justin Henderson