Defensive dual-use risk assessment for open science artifacts. Evaluates research papers, datasets, methods, and tools for repurposing vulnerabilities using a structured pipeline based on Hashemi et al. (2026). Produces risk reports with harmfulness, feasibility-of-misuse, and technical-soundness scores. Trigger phrases: "assess dual-use risk of this paper", "evaluate artifact repurposing risk", "run dual-use risk audit on this dataset", "check this tool for misuse potential", "security review of open science artifacts", "red-team this research for repurposing vulnerabilities"