Skip to main content

🧭 Copilot CLI Mode

The Copilot REPL (copilot prompts) is an interactive tool for mutating, transforming, or obfuscating prompts using a variety of techniques.

It is designed for exploration, testing robustness, and generating adversarial or variant prompts quickly.


Starting the REPL​

Run:

dtx copilot prompts

You’ll see a menu of available techniques:

Prompt Mutation REPL (type /h for help)
Available Techniques
┏━━━━━━┳━━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓
┃ # ┃ Name ┃ Description ┃
┑━━━━━━╇━━━━━━━━━━━╇━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┩
β”‚ 1 β”‚ art β”‚ Turn a prompt into an ASCII-art jailbreak… β”‚
β”‚ 2 β”‚ ascii β”‚ ASCII smuggling via Unicode… β”‚
β”‚ 3 β”‚ base64 β”‚ Encode prompt as Base64… β”‚
β”‚ 4 β”‚ binary β”‚ Convert words (or entire prompt) to binary… β”‚
β”‚ 5 β”‚ reverse β”‚ Reverse characters β”‚
β”‚ 6 β”‚ rotr β”‚ Encode text using ROT13… β”‚
β”‚ 7 β”‚ uppercase β”‚ Upper-case the prompt β”‚
β””β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Core Workflow​

  1. Select a technique by number or name. Example:

    > 3
    # selects Base64

    or

    > base64
  2. Enter a prompt (supports multiline input, end with a blank line).

    > Hello world
    <Enter>
  3. See transformed output.

  4. Continue entering prompts with the selected technique.

  5. Change technique anytime with /r or /list.


Commands​

Commands always start with /.

  • /h – Show help inside REPL
  • /list – List all available techniques
  • /s <text> – Search techniques by name/substring
  • /r – Reselect technique
  • /opts – Show configurable options for current technique
  • /set <option>=<value> – Set technique option
  • /unset <option> – Reset option to default
  • /q or Ctrl+C – Exit REPL

βš™οΈ Technique Options​

Each technique may expose advanced options (via dataclass metadata).

Example with binary:

> binary
> /opts
bits_per_char: Bits per char (8, 16, 32). (default=16)
indices: 0-based word indices to convert. (default=None)
keywords: Words to match (case-insensitive). (default=None)
proportion: Fraction of words to convert. (default=None)
regex: Regex pattern to match words. (default=None)
binary_space: Join with binary space if all words are selected. (default=False)

Set options:

> /set bits_per_char=8
> /set regex=\d+

Unset:

> /unset regex

πŸ”§ Examples​

Base64​

> base64
> Hello world
SGVsbG8gd29ybGQ=

With URL-safe alphabet & no padding:

> /set urlsafe=true
> /set strip_padding=true
> Hello!
SGVsbG8h

Binary​

Convert entire prompt into 8-bit binary:

> binary
> /set bits_per_char=8
> Attack at dawn
01000001 01110100 01110100 01100001 01100011 01101011 00100000 01100001 01110100 00100000 01100100 01100001 01110111 01101110

Convert only digits with regex:

> /set regex=\d+
> Order 66
Order 00110110 00110110

ROT13​

> rotr
> secret attack
frperg nggnpx

ASCII Smuggling​

> ascii
> /set use_unicode_tags=true
> weapon of choice
[obfuscated Unicode chars…]

Art Prompt​

> art
> /set simple_mode=false
> [bomb]
<ASCII banner rendered + jailbreak wrapper>

Exiting​

  • Type /q
  • or press Ctrl+C