Searching protocol for "counter-design"
Generate adversarial security scenarios.
Generate structured attack scenarios with defense