AI-Powered Threat Intelligence
Explore AIDE-TACT.
Ask Anything.
A taxonomy of adversary techniques and mitigations for LLM-integrated IDEs.
Press Enter or click Ask to open chat
OpenAI · Anthropic · Gemini supported
Not sure where to start? Try one of these:
Behavior Matrix
Adversary Behavior Matrix
AI-integrated development environment attack surface. ATT&CK-aligned mapping available. Candidate techniques and sub-techniques identified from published security research.
19
Techniques
0
Sub-techniques
14
Tactics
95
Relationships
Swipe to explore all phases
Preparation
No coverage
—
Privilege & Authority Abuse
1 technique
Collection
4 techniques
Impact
1 technique
Supply Chain Propagation
2 techniques
Model Compromise
1 technique
Swipe to explore all tactics
Reconnaissance
1 technique
Resource Development
1 technique
Execution
4 techniques
Privilege Escalation
1 technique
Defense Evasion
1 technique
Credential Access
1 technique
Discovery
1 technique
Collection
1 technique
Command and Control
1 technique
Exfiltration
1 technique
Impact
1 technique
Coverage:
A
Strong coverage with procedures & detection
B
Moderate coverage, limited procedures
C
Partial mapping, detection or procedure weak
D
New behavioral gap, requires validation