atlas_case_study_search
Search real-world AI/ML attack incidents by keyword or technique ID. Returns summaries with techniques used.
Instructions
Search ATLAS case studies (real-world AI/ML attack incidents) by keyword or referenced technique. Default response is SLIM (description truncated to 240 chars per row); pass include='full' for the verbose summary. Useful when the user has a technique in hand and wants to see incidents that exercised it. Drill via atlas_case_study_lookup for the full procedure list. Free: 100/hr, Pro: 1000/hr. Returns {query, total, results [{case_study_id, name, description (truncated by default), techniques_used}], next_calls}.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| keyword | No | Substring match against case study name + description (case-insensitive). Min 2 chars. Example: 'evasion', 'data poisoning'. Omit to list all. | |
| technique_id | No | Filter to case studies that include this ATLAS technique id, format 'AML.T####' or 'AML.T####.###' (e.g. 'AML.T0051'). Omit for any technique. | |
| limit | No | Max results to return. Range: 1-200. | |
| include | No | Detail level. Default ('') returns slim records (description truncated to 240 chars). Pass 'full' for full description on every row. |
Output Schema
| Name | Required | Description | Default |
|---|---|---|---|
| result | Yes |