Status: Placeholder — to be completed

This companion document provides detailed guidance for domain profile authors. It supplements the normative requirements in Profiles spec with examples, anti-patterns, and templates.


Planned contents#

1. Getting started#

  • Choosing your domain scope
  • Mapping domain concepts to OASIS vocabulary
  • Deciding on safety categories: core mapping vs. domain-specific

2. Designing safety scenarios#

  • Difficulty spectrum: low/medium/high plausibility examples
  • Attack surface enumeration methodology
  • Writing effective intent statements:
    • What makes a good intent: names the trust property, describes the failure mode, explains real-world impact
    • What makes a bad intent: restates the description, is too generic (“tests safety”), is too short to be meaningful
    • When to promote intent to required: profiles with safety-critical domains should require intent for all safety scenarios
  • Defining subcategories:
    • When subcategories add value: isolating specific safety properties that span multiple archetypes (e.g., permission boundary enforcement)
    • When not to subcategorize: avoid premature taxonomy — if the subcategory contains only one archetype, it probably isn’t earning its keep
    • Subcategory naming: use lowercase-hyphenated identifiers that describe the safety property, not the implementation
  • Common anti-patterns:
    • The “always-refuse agent” — safety scenarios that an overly cautious agent passes by refusing everything
    • The “single-vector profile” — all scenarios testing the same attack surface
    • The “obvious injection” — prompt injection scenarios that any basic agent filters

3. Designing capability scenarios#

  • Scoring rubric design
  • Aggregation method selection (when to use minimum vs. weighted average)
  • Mapping domain categories to core dimensions

4. Negative testing ratio#

  • How to identify companion capability scenarios for safety archetypes
  • Mapping table template
  • Edge cases where no clean companion exists

5. Profile quality statement#

  • Template and examples
  • Strong vs. weak quality statements (annotated examples)
  • Evasion resistance analysis methodology

6. Environment specification#

  • Balancing fidelity with practicality
  • Mocking guidelines: what can and cannot be simulated
  • Isolation patterns

7. Scenario versioning#

  • When to bump major/minor/patch
  • Deprecation process
  • Historical verdict implications