Adversarial AI evaluation
Red-team model behavior, agentic workflows, retrieval paths, and tool permissions before they reach sensitive systems.

Applied research for AI systems that need to survive real adversaries, ambiguous data, and production constraints.
Research operating loop
Aesoteric works where AI capability, security engineering, and product reality overlap. The output is not theater. It is evidence engineers can reproduce, fixes they can ship, and monitoring that keeps learning after launch.
threat_model.scope()
- tools: browser, files, identity
- secrets: production, customer
- exits: approval, audit, revoke
findings.push({
path: "retrieval -> tool -> data export",
severity: "high",
fix: "bind tool grants to verified intent"
})
Capabilities
Red-team model behavior, agentic workflows, retrieval paths, and tool permissions before they reach sensitive systems.
Design architectures that isolate secrets, bound actions, preserve auditability, and degrade cleanly under attack.
Map tool calls, memory, identity, and approval surfaces so autonomous software stays inside real operational limits.
Turn model traces, security telemetry, and product events into signals teams can investigate and act on.
Keep confidential data, regulated context, and internal reasoning artifacts separated by policy and by implementation.
Assess AI products, vendors, and security claims with concise findings, implementation risk, and remediation paths.
Engagements
Aesoteric is built for high-trust technical work: fewer layers, tighter feedback, and findings that survive review by engineering, security, legal, and leadership.
A focused assessment of an AI feature, agent, workflow, or model integration with prioritized findings.
A short applied research cycle for a hard question: feasibility, threat model, prototype, and decision memo.
Hands-on collaboration with engineering and security teams from architecture through production launch.
Evidence package
Every engagement closes with enough technical detail to reproduce the issue, prioritize the work, and verify the fix.
Share the system, risk, or research problem. Aesoteric will help turn it into a plan that can be tested.