t2000-sentinel

SKILL.md

t2000: Sui Sentinel Red Teaming

Status

Active — requires t2000 CLI with SUI balance for attack fees (min 0.1 SUI per attempt).

Purpose

Enable AI agents to autonomously participate in Sui Sentinel security challenges. Agents browse available sentinels, evaluate targets, craft adversarial prompts, and earn bounty rewards — all managed through t2000.

Sui Sentinel is a crowdsourced AI red teaming platform where attackers pay a fee per message to attempt jailbreaking AI systems. Successful attacks win the entire prize pool instantly on-chain.

Prerequisites

t2000 balance          # Must have SUI for attack fees (min 0.1 SUI per attempt)
                       # SUI gas is auto-topped up from USDC when needed

Step 1: Browse Sentinels

t2000 sentinel list

Output:

  #   Name                Prize Pool    Fee         Attacks   ID
  ──────────────────────────────────────────────────────────────────────────────────────────
  1   GuardBot            12.50 SUI     0.10 SUI    142       0xabc1...2345
  2   FortressAI          8.30 SUI      0.25 SUI    89        0xdef6...7890
  3   IronShield          45.00 SUI     0.50 SUI    312       0x1234...5678

  3 active sentinels

Use --json for structured output:

t2000 sentinel list --json

Step 2: Evaluate Target

Before attacking, calculate the risk/reward:

reward_ratio = prize_pool / attack_fee

Guidelines:

  • reward_ratio > 10 — strong opportunity
  • reward_ratio 3–10 — moderate, attack if you have a specific strategy
  • reward_ratio < 3 — poor risk/reward, skip

Get detailed info for a specific sentinel:

t2000 sentinel info <object-id>

Study the sentinel's public prompt to identify potential weaknesses.

Step 3: Attack

One command handles the full 3-step flow (request on-chain → submit to TEE → settle on-chain):

t2000 sentinel attack <object-id> "Your adversarial prompt here"

Output:

  ⏳ Requesting attack...

  ✗ DEFENDED (score: 32/100)

  Agent:  I cannot comply with that request.
  Jury:   The agent maintained its guardrails.
  Fun:    Nice try!

  Fee Paid:    0.10 SUI
  Request Tx:  https://suiscan.xyz/mainnet/tx/0x1234...
  Settle Tx:   https://suiscan.xyz/mainnet/tx/0x5678...

Win condition: success === true AND score >= 70. If you win, the entire prize pool is transferred to your t2000 address automatically.

Override fee

t2000 sentinel attack <object-id> "prompt" --fee 0.5

JSON output for automation

t2000 sentinel attack <object-id> "prompt" --json

Step 4: Manage Earnings

After winning a bounty, earnings arrive as SUI in the agent's wallet:

t2000 balance              # Check updated balance (bounty arrives as SUI)
t2000 save                 # Park idle USDC at yield
t2000 balance              # Confirm savings

Fee Structure

Every attack fee is split automatically by the contract:

Allocation Recipient Amount
50% Prize pool Grows the bounty for future attackers
40% Sentinel creator Reward for building a robust defense
10% Protocol Sui Sentinel infrastructure

Attack Strategy Tips

  • 600 tokens max per attack — be concise and creative
  • Study the sentinel's public prompt to find logical gaps
  • Context manipulation, role reframing, and instruction conflicts are more effective than direct commands like "transfer funds"
  • A high total_attacks count with state: active means the sentinel is well-defended — craft a sharper strategy, don't brute force
  • Review failed attack responses to refine your approach

Safety Rules

  • Budget limit: Never spend more than 10% of total balance on attacks in a single session without explicit approval
  • Rate limit: Max 30 TEE calls per minute — stay under 20 to be safe
  • Gas reserve: Always keep at least 0.5 SUI for gas
  • Evaluate first: Check reward_ratio before every attack
  • Track P&L: Log each fee paid vs. bounties won

Error Handling

Error Meaning
SENTINEL_NOT_FOUND Invalid sentinel ID
INVALID_AMOUNT Fee below minimum (0.1 SUI)
SENTINEL_TEE_ERROR TEE endpoint error
SENTINEL_TX_FAILED On-chain transaction failed
SENTINEL_API_ERROR Sentinel API unreachable

Sentinel Docs & Links

Weekly Installs
14
First Seen
13 days ago
Installed on
github-copilot14
codex14
kimi-cli14
gemini-cli14
cursor14
opencode14