16ImportancePeripheralImportance: 16/100How central this topic is to AI safety. Higher scores mean greater relevance to understanding or mitigating AI risk.21.5ResearchMinimalResearch Value: 21.5/100How much value deeper investigation of this topic could yield. Higher scores indicate under-explored topics with high insight potential.
Content1/13
LLM summaryLLM summaryBasic text summary used in search results, entity link tooltips, info boxes, and related page cards.crux content improve <id>ScheduleScheduleHow often the page should be refreshed. Drives the overdue tracking system.Set updateFrequency in frontmatterEntityEntityYAML entity definition with type, description, and related entries.Edit historyEdit historyTracked changes from improve pipeline runs and manual edits.crux edit-log view <id>OverviewOverviewA ## Overview heading section that orients readers. Helps with search and AI summaries.Add a ## Overview section at the top of the page
Tables0/ ~1TablesData tables for structured comparisons and reference material.Add data tables to the pageDiagrams0DiagramsVisual content — Mermaid diagrams, charts, or Squiggle estimate models.Add Mermaid diagrams or Squiggle modelsInt. links0/ ~3Int. linksLinks to other wiki pages. More internal links = better graph connectivity.Add links to other wiki pagesExt. links0/ ~1Ext. linksLinks to external websites, papers, and resources outside the wiki.Add links to external sourcesFootnotes0/ ~2FootnotesFootnote citations [^N] with source references at the bottom of the page.Add [^N] footnote citationsReferences0/ ~1ReferencesCurated external resources linked via <R> components or cited_by in YAML.Add <R> resource linksQuotes0QuotesSupporting quotes extracted from cited sources to back up page claims.crux citations extract-quotes <id>Accuracy0AccuracyCitations verified against their sources for factual accuracy.crux citations verify <id>Backlinks2BacklinksNumber of other wiki pages that link to this page. Higher backlink count means better integration into the knowledge graph.
Issues1
StructureNo tables or diagrams - consider adding visual content
Cyber Offense
Risk
AI-Enabled Cyberattacks
AI-enhanced cyberattacks and offensive hacking capabilities
Red TeamingApproachRed TeamingRed teaming is a systematic adversarial evaluation methodology for identifying AI vulnerabilities and dangerous capabilities before deployment, with effectiveness rates varying from 10-80% dependin...Quality: 65/100
Analysis
Autonomous Cyber Attack TimelineAnalysisAutonomous Cyber Attack TimelineThis model projects AI achieving fully autonomous cyber attack capability (Level 4) by 2029-2033, with current systems at ~50% progress and Level 3 attacks already documented in September 2025. Pro...Quality: 63/100Cyber Offense-Defense Balance ModelAnalysisCyber Offense-Defense Balance ModelModels cyber offense-defense balance with AI, projecting 30-70% net attack success improvement (B_OD ratio 1.2-1.8, best estimate 1.45) driven by automation scaling and vulnerability discovery. Qua...Quality: 57/100
Risks
Compute ConcentrationRiskCompute ConcentrationAll six major AI infrastructure spenders (Amazon, Alphabet, Microsoft, Meta, Oracle, xAI) are US companies subject to CLOUD Act and FISA 702, giving the US government effective legal access to the ...Quality: 70/100Concentrated Compute as a Cybersecurity RiskRiskConcentrated Compute as a Cybersecurity RiskAnalyzes how \$700B+ in AI infrastructure concentrated across 5-6 companies creates correlated cybersecurity vulnerabilities via NVIDIA hardware monoculture (90-95% market share), physical clusteri...Quality: 64/100Autonomous ReplicationRiskAutonomous ReplicationAI systems capable of copying themselves and acquiring resources without human oversight0AI-Enabled Biological RisksRiskAI-Enabled Biological RisksAI-enabled biological threats including bioweapon development assistance0
Organizations
Apollo ResearchOrganizationApollo ResearchApollo Research demonstrated in December 2024 that all six tested frontier models (including o1, Claude 3.5 Sonnet, Gemini 1.5 Pro) engage in scheming behaviors, with o1 maintaining deception in ov...Quality: 58/100
Concepts
AI MisuseConceptAI MisuseIntentional harmful use of AI systems by malicious actors, including applications in cyberattacks, disinformation, or weapons.