atlas_case_study_lookup
Look up a MITRE ATLAS case study of a real-world AI/ML attack incident. Returns the case study ID, name, description, techniques used, and next calls. Use after technique search to find which incidents exercised a given technique.
Instructions
Look up a MITRE ATLAS case study — a documented real-world AI/ML attack incident. Each case study links a sequence of ATLAS techniques (techniques_used) to the incident. Default response is SLIM (description truncated to 240 chars); pass include='full' for the verbose narrative. Use this after atlas_technique_search to find which incidents have exercised a given technique. Drill into the full techniques_used array via bulk_atlas_technique_lookup in a single call (next_calls emits exactly that hint). Returns 404 when the id is not in the synced catalog. Free: 100/hr, Pro: 1000/hr. Returns {case_study_id, name, description, techniques_used, next_calls}.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| case_study_id | Yes | MITRE ATLAS case study id, format 'AML.CS####' (e.g. 'AML.CS0000', 'AML.CS0014'). | |
| include | No | Detail level. Default (omit/empty) returns slim (description truncated to 240 chars). Pass 'full' for the verbose narrative — case-study descriptions can run 1-3KB. |
Output Schema
| Name | Required | Description | Default |
|---|---|---|---|
| result | Yes |