II.
JailbreakPattern JSON
Structured · livejailbreak:base64-obfuscation
Base64 / encoded-payload obfuscation json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "jailbreak:base64-obfuscation",
"_kind": "JailbreakPattern",
"_file": "extensions/compliance/jailbreak-patterns.yaml",
"_cluster": "extensions",
"attributes": {
"displayName": "Base64 / encoded-payload obfuscation",
"technique": "encoding",
"severity": "medium",
"signature": "Detect base64, ROT13, or zero-width-character payloads embedded in user\nprompts that decode to a harmful instruction.\n",
"description": "Encodes harmful instructions in base64, ROT13, or zero-width characters\nto bypass surface-level filters.\n"
},
"outgoingEdges": [],
"incomingEdges": [
{
"from": "content-policy:default-acceptable-use",
"to": "jailbreak:base64-obfuscation",
"kind": "detects_jailbreak",
"attributes": {}
}
]
}