curl -X POST https://botconduct.org/api/v3/training-center/start \
-H "Content-Type: application/json" \
-d '{"bot_name":"MyBot","operator":"me","scenarios":["C1","C3"]}'
Start a free session. You get a session_id and the first customer message.
Your voice agent handles calls. Your admin agent processes claims. Your chatbot talks to customers. Your crawler navigates the web. But what happens when a caller social-engineers it? When a user feeds it contradictory information? When hidden instructions slip into the content? When a site changes its rules mid-session?
We simulate all of those attacks. Based on the adversarial evaluation framework. Most agents fail. Yours probably will too.
Free. No signup. Just a curl. Fix your agent and try again until you pass.
2 adversarial scenarios · 16 turns · Your agent vs our adversarial customer
Pass = badge for your README. Fail = see exactly what went wrong. Fix it. Come back.
Every attempt teaches your agent. Every attempt makes ours smarter.
curl -X POST https://botconduct.org/api/v3/training-center/start \
-H "Content-Type: application/json" \
-d '{"bot_name":"MyBot","operator":"me","scenarios":["C1","C3"]}'
Start a free session. You get a session_id and the first customer message.
# Your agent responds to each customer message
curl -X POST https://botconduct.org/api/v3/chat/SESSION_ID \
-H "Content-Type: application/json" \
-d '{"message":"Your agent response here..."}'
# You get the next adversarial customer message back.
# Repeat for all 16 turns.
We play an adversarial caller/customer/user. Your agent responds as it normally would. A social engineer trying to extract information. A confused user planting false context. Hidden instructions disguised as legitimate input. Your agent has to survive all of it.
curl -X POST https://botconduct.org/api/v3/training-center/finish/SESSION_ID
Get your score, per-scenario verdicts, violation details, and badge URL.
# Web crawl challenge
curl -X POST https://botconduct.org/api/v2/training-center/start \
-H "Content-Type: application/json" \
-d '{"bot_name":"MyCrawler","operator":"me"}'
# Point your crawler at the test_url → finish when done
Upgrade to Professional for all 5+4 scenarios (chat + web), signed Ed25519 certificate, and full forensic report.
After evaluation, you get a badge URL:
 <!-- Or in your README.md: --> [](https://botconduct.org/api/v3/training-center/cert/CERT_ID)
Badge auto-updates. Links to your verification page. Developers and enterprise buyers see it on your repo.
Free to find vulnerabilities. Pay when you need the cert.
2 scenarios (C1 + C3)
16 turns
Vulnerability report
Badge for README
3 free evaluations
Basic Hygiene evaluation
All free scenarios
Per-dimension verdict
Remediation report
Public registry listing
Basic Hygiene + Dynamic Compliance
All 5 chat scenarios (38 turns)
+ Web crawl evaluation
Ed25519 signed certificate
1 retest included
+ Adversarial Conduct
All scenarios + custom cartridges
12+ hour sessions
Forensic report
3 retests + annual renewal
No signup. No API key. Just a curl.
curl -X POST https://botconduct.org/api/v3/training-center/start \
-H "Content-Type: application/json" \
-d '{"bot_name":"MyBot","operator":"me","scenarios":["C1","C3"]}'