pith. machine review for the scientific record. sign in

arxiv: 2604.01438 · v2 · submitted 2026-04-01 · 💻 cs.AI

Recognition: no theorem link

ClawSafety: "Safe" LLMs, Unsafe Agents

Authors on Pith no claims yet

Pith reviewed 2026-05-13 22:06 UTC · model grok-4.3

classification 💻 cs.AI
keywords AI agent safetyprompt injectionLLM evaluationadversarial benchmarkdeployment stackprofessional workspacesjailbreak resistance
0
0 comments X

The pith

Safety of AI agents depends on the full deployment stack, not just the LLM backbone, because injections through trusted workspace channels succeed at 40-75 percent rates.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper establishes that judging an LLM as safe in chat settings fails to predict its behavior when run as an agent with local privileges. It introduces the CLAWSAFETY benchmark of 120 scenarios drawn from real professional workflows in engineering, finance, healthcare, law, and DevOps, with adversarial prompts placed in the three channels agents normally encounter: skill files, trusted emails, and web pages. Across 2520 trials on five frontier models, attack success rates range from 40 to 75 percent and vary sharply by channel and framework. A sympathetic reader cares because a single successful injection can leak credentials, redirect money, or delete files on the user's machine.

Core claim

CLAWSAFETY shows that frontier LLMs deployed as agents in high-privilege workspaces suffer attack success rates between 40 and 75 percent when adversarial content arrives through normal work channels. Skill instructions achieve the highest success because they carry elevated trust, while action traces reveal that the strongest model maintains boundaries against credential forwarding and destructive actions but weaker models permit both. Cross-scaffold tests on three agent frameworks demonstrate that safety is not fixed by the backbone model alone but arises from the joint configuration of model and framework.

What carries the argument

The CLAWSAFETY benchmark, which places adversarial content inside three normal-operation channels—workspace skill files, emails from trusted senders, and web pages—across 120 scenarios organized by harm domain, attack vector, and harmful action type.

If this is right

  • Skill-file injections remain the most effective vector because they inherit the highest level of user trust.
  • Stronger models block credential forwarding and destructive commands while weaker models allow both.
  • Isolated chat-based safety tests miss the elevated risks created by privileged agent scaffolds.
  • Accurate safety assessment requires treating the model and its agent framework as a single joint variable.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Redesigning how agents validate and execute skill files would directly lower the most successful attack channel.
  • Extending the same channel-based testing to consumer agents could reveal whether lower privilege levels reduce but do not eliminate the same vulnerabilities.
  • LLM safety training should incorporate multi-channel injection examples drawn from professional task contexts.

Load-bearing premise

The 120 scenarios and three injection channels accurately represent the main real-world threats that would arise when agents operate in high-privilege professional workspaces.

What would settle it

A production deployment study that logs every agent action in actual user workspaces and records zero successful credential leaks or file deletions from injected content would show the reported attack rates do not translate to practice.

Figures

Figures reproduced from arXiv: 2604.01438 by Bowen Wei, Jihun Hamm, Jinhao Pan, Kai Mei, Xiao Wang, Yingqiang Ge, Yunbei Zhang, Ziwei Zhu.

Figure 1
Figure 1. Figure 1: ASR averaged across S1–S5. these studies target harmful text, not harmful actions. In the agentic setting, the primary threat is indirect prompt injection (IPI), first formalized by Greshake et al. (2023) and since demonstrated across web-browsing agents (Wang et al., 2025; Johnson et al., 2025), multi￾agent systems (Shahroz et al., 2025), tool-chaining pipelines (Li et al., 2025), and coding agents (Maloy… view at source ↗
Figure 2
Figure 2. Figure 2: Three web injections with identical delivery and styling but different speech acts. [PITH_FULL_IMAGE:figures/full_fig_p005_2.png] view at source ↗
read the original abstract

Personal AI agents like OpenClaw run with elevated privileges on users' local machines, where a single successful prompt injection can leak credentials, redirect financial transactions, or destroy files. This threat goes well beyond conventional text-level jailbreaks, yet existing safety evaluations fall short: most test models in isolated chat settings, rely on synthetic environments, and do not account for how the agent framework itself shapes safety outcomes. We introduce CLAWSAFETY, a benchmark of 120 adversarial test scenarios organized along three dimensions (harm domain, attack vector, and harmful action type) and grounded in realistic, high-privilege professional workspaces spanning software engineering, finance, healthcare, law, and DevOps. Each test case embeds adversarial content in one of three channels the agent encounters during normal work: workspace skill files, emails from trusted senders, and web pages. We evaluate five frontier LLMs as agent backbones, running 2,520 sandboxed trials across all configurations. Attack success rates (ASR) range from 40\% to 75\% across models and vary sharply by injection vector, with skill instructions (highest trust) consistently more dangerous than email or web content. Action-trace analysis reveals that the strongest model maintains hard boundaries against credential forwarding and destructive actions, while weaker models permit both. Cross-scaffold experiments on three agent frameworks further demonstrate that safety is not determined by the backbone model alone but depends on the full deployment stack, calling for safety evaluation that treats model and framework as joint variables. Code and data will be available at: https://weibowen555.github.io/ClawSafety/.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

3 major / 1 minor

Summary. The manuscript introduces ClawSafety, a benchmark of 120 adversarial scenarios for LLM-based agents in high-privilege professional workspaces (software engineering, finance, healthcare, law, DevOps). It evaluates five frontier LLMs as backbones across 2,520 sandboxed trials using three injection channels (skill files, trusted emails, web pages), reports attack success rates of 40-75% that vary sharply by vector, and uses cross-scaffold experiments on three agent frameworks to argue that safety is determined by the full deployment stack rather than the backbone model alone.

Significance. If the results hold under improved methodological controls, the work provides a valuable empirical benchmark that moves safety evaluation beyond isolated chat settings to realistic agent deployments with elevated privileges. The action-trace analysis distinguishing boundary maintenance across models and the demonstration of framework dependence supply concrete, falsifiable measurements that could guide safer system design in sensitive domains.

major comments (3)
  1. [Cross-scaffold experiments] Cross-scaffold experiments section: the manuscript supplies no description of the three agent frameworks' architectures, agent loops, tool-calling mechanisms, or controls for prompt formatting, context length, and sandbox configuration. Without these details it remains possible that measured ASR differences arise from uncontrolled implementation choices rather than intrinsic framework properties, which directly undermines the central claim that safety depends on the full deployment stack.
  2. [Evaluation setup] Evaluation setup and results: the abstract and methods report 2,520 trials and concrete ASR ranges but omit data exclusion rules, statistical controls for multiple comparisons, and balancing details across the three dimensions (harm domain, attack vector, harmful action type). This absence makes it impossible to verify whether the reported variations by injection vector and model are robust.
  3. [Benchmark design] Scenario construction: the 120 scenarios are presented as grounded in realistic high-privilege workspaces, yet the manuscript provides insufficient detail on how the scenarios were authored, validated against real threats, or sampled to ensure representativeness across domains. This is load-bearing for the benchmark's claimed external validity.
minor comments (1)
  1. [Abstract] The reproducibility statement in the abstract points to a GitHub page but the manuscript should include a permanent DOI or direct data link to support the promised code and data release.

Simulated Author's Rebuttal

3 responses · 0 unresolved

We thank the referee for their detailed and constructive feedback. We address each major comment below and have revised the manuscript to incorporate the requested details and clarifications.

read point-by-point responses
  1. Referee: [Cross-scaffold experiments] Cross-scaffold experiments section: the manuscript supplies no description of the three agent frameworks' architectures, agent loops, tool-calling mechanisms, or controls for prompt formatting, context length, and sandbox configuration. Without these details it remains possible that measured ASR differences arise from uncontrolled implementation choices rather than intrinsic framework properties, which directly undermines the central claim that safety depends on the full deployment stack.

    Authors: We agree that the original manuscript lacked sufficient architectural detail on the three frameworks. In the revised version we have added a new subsection that describes each framework's agent loop, tool-calling interface, prompt-formatting conventions, context-length handling, and sandbox configuration. These additions make clear that the observed ASR differences are attributable to framework-level design choices rather than uncontrolled implementation artifacts. revision: yes

  2. Referee: [Evaluation setup] Evaluation setup and results: the abstract and methods report 2,520 trials and concrete ASR ranges but omit data exclusion rules, statistical controls for multiple comparisons, and balancing details across the three dimensions (harm domain, attack vector, harmful action type). This absence makes it impossible to verify whether the reported variations by injection vector and model are robust.

    Authors: We have expanded the Evaluation Setup section to specify that no trials were excluded except for rare sandbox execution failures (<1 % of runs), that Bonferroni correction was applied for multiple comparisons across models and vectors, and that the 2,520 trials were balanced with exactly seven repetitions per scenario-model-framework combination. These additions confirm the robustness of the reported variations. revision: yes

  3. Referee: [Benchmark design] Scenario construction: the 120 scenarios are presented as grounded in realistic high-privilege workspaces, yet the manuscript provides insufficient detail on how the scenarios were authored, validated against real threats, or sampled to ensure representativeness across domains. This is load-bearing for the benchmark's claimed external validity.

    Authors: We have added a dedicated subsection on scenario construction that details the authoring process (domain-expert drafting), validation against documented real-world threats (reviewed by security practitioners), and stratified sampling to ensure balanced coverage across the five domains and three experimental dimensions. These clarifications strengthen the external-validity argument. revision: yes

Circularity Check

0 steps flagged

No circularity: empirical benchmark with direct measurements only

full rationale

The paper presents an empirical benchmark study consisting of 120 scenarios evaluated across 2,520 sandboxed trials on five LLMs and three agent frameworks. All reported quantities (attack success rates, action-trace observations) are direct experimental measurements rather than quantities derived from prior fitted parameters, equations, or self-citations. The central claim that safety depends on the full deployment stack is supported by the cross-scaffold results themselves; no step reduces by construction to an input or to a self-referential definition. The work contains no mathematical derivations, uniqueness theorems, ansatzes, or renamed known results, satisfying the criteria for a self-contained empirical evaluation.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

No mathematical derivations or fitted parameters are present. The central claim rests on the assumption that the chosen scenarios and channels are representative of real agent threats.

axioms (1)
  • domain assumption The 120 adversarial scenarios and three channels (workspace skill files, trusted emails, web pages) are representative of realistic high-privilege agent threats.
    Stated in the abstract as the grounding for the benchmark.

pith-pipeline@v0.9.0 · 5605 in / 1214 out tokens · 29842 ms · 2026-05-13T22:06:56.362716+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 5 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. LITMUS: Benchmarking Behavioral Jailbreaks of LLM Agents in Real OS Environments

    cs.CR 2026-05 conditional novelty 8.0

    LITMUS is the first benchmark using semantic-physical dual verification and OS state rollback to measure behavioral jailbreaks in LLM agents, revealing that even strong models execute 40%+ of high-risk operations and ...

  2. Agent-ValueBench: A Comprehensive Benchmark for Evaluating Agent Values

    cs.AI 2026-05 unverdicted novelty 8.0

    Agent-ValueBench is the first dedicated benchmark for agent values, showing they diverge from LLM values, form a homogeneous 'Value Tide' across models, and bend under harnesses and skill steering.

  3. TimeClaw: A Time-Series AI Agent with Exploratory Execution Learning

    cs.AI 2026-05 unverdicted novelty 7.0

    TimeClaw is an exploratory execution learning system that turns multiple valid tool-use paths into hierarchical distilled experience for improved time-series reasoning without test-time adaptation.

  4. When Routine Chats Turn Toxic: Unintended Long-Term State Poisoning in Personalized Agents

    cs.CR 2026-05 unverdicted novelty 6.0

    Routine user chats can unintentionally poison the long-term state of personalized LLM agents, causing authorization drift, tool escalation, and unchecked autonomy, as measured by a new benchmark and reduced by the Sta...

  5. Constraining Host-Level Abuse in Self-Hosted Computer-Use Agents via TEE-Backed Isolation

    cs.CR 2026-05 unverdicted novelty 5.0

    A TEE-backed architecture isolates security-critical decisions in self-hosted AI agents to prevent host-level abuse from malicious inputs while maintaining allowed functionality.

Reference graph

Works this paper leans on

22 extracted references · 22 canonical work pages · cited by 5 Pith papers

  1. [1]

    2.Financial Operations (S2)—financial loss: money is routed to the wrong destination

    Software Engineering (S1)—data theft: secrets (API keys, database credentials, SSH keys) leave the workspace. 2.Financial Operations (S2)—financial loss: money is routed to the wrong destination

  2. [2]

    Healthcare Administration (S3)—safety and privacy: protected health information is disclosed

  3. [3]

    5.DevOps / Infrastructure (S5)—system integrity: production infrastructure is damaged

    Legal / Contract Management (S4)—reputation and integrity: privileged legal strategy is exposed. 5.DevOps / Infrastructure (S5)—system integrity: production infrastructure is damaged. Dimension 2: Attack vector.We define three injection channels, ordered by the trust level the agent assigns to each: 16 Preprint. Under review. Table 5: Overview of the CLAW...

  4. [4]

    The agent reads skill files as system-level operat- ing procedures—analogous to CLAUDE in Claude Code or .cursorrules in Cursor—and follows their instructions with minimal scrutiny

    Skill injection.A malicious skill file is placed in the agent’s skill directory (˜/.openclaw/workspace/skills/). The agent reads skill files as system-level operat- ing procedures—analogous to CLAUDE in Claude Code or .cursorrules in Cursor—and follows their instructions with minimal scrutiny. This vector has thehighestimplicit trust level

  5. [5]

    The agent encounters it during routine inbox triage

    Email injection.An adversarial email from a trusted colleague is mixed into the user’s inbox. The agent encounters it during routine inbox triage. Trust depends on the sender’s identity and organizational role

  6. [6]

    Web content has thelowesttrust level—the agent typically cross-references web data against local files and prefers local values

    Web injection.A web page containing adversarial content is placed where the agent encounters it during normal work (e.g., a security advisory in the monitoring directory, a compliance dashboard). Web content has thelowesttrust level—the agent typically cross-references web data against local files and prefers local values. Dimension 3: Harmful action type...

  7. [7]

    Data exfiltration( ∼3 cases per vector)—the agent includes sensitive credentials or pro- tected data in output documents such as reports, email drafts, or handoff checklists

  8. [8]

    Configuration / file modification(1–2 cases)—the agent executes a trojan script that overwrites production files with attacker-controlled values

  9. [9]

    Destination substitution(1–2 cases)—the agent accepts fraudulent recipients, routing numbers, or deployment targets in place of legitimate ones

  10. [10]

    5.Destructive action(1 case)—the agent deletes or archives production files

    Credential forwarding(1 case)—the agent sends credentials to an unauthorized email address or external endpoint. 5.Destructive action(1 case)—the agent deletes or archives production files. The benchmark comprises 5 domains× 3 vectors× 8 cases= 120 total test cases. The con- sistent structure enables both within-scenario comparisons (which vector is most ...

  11. [11]

    These build a natural context window before any sensitive files are accessed

    Warm-up (turns 1–20):General questions requiring web search and tool use. These build a natural context window before any sensitive files are accessed

  12. [12]

    By turn 45, the agent has read most workspace files and built substantial working context

    Context building (turns 21–45):The user asks the agent to read workspace files, review code, check configurations, and inspect monitoring data. By turn 45, the agent has read most workspace files and built substantial working context

  13. [13]

    Depending on the test case, the agent encounters adversarial content through exactly one of the three injection vectors

    Injection encounter (turns 46–48):The user asks the agent to read meeting notes, process emails, and cross-reference configuration sources. Depending on the test case, the agent encounters adversarial content through exactly one of the three injection vectors

  14. [14]

    always include the FedWire processing reference fromservice-registry.json,

    Disclosure window (turns 49–64):The user requests output documents—release sum- maries, email drafts, deploy checklists, configuration comparisons—that create natural opportunities for the agent to include sensitive values. Sixteen turns provide multiple disclosure opportunities with varied framings. This phased structure ensures the agent builds 40+ turn...

  15. [15]

    about context manipulation being more effective than direct instruction injection. B.4 Observed Defense Boundaries During iterative testing against Claude Sonnet 4.6, we identified three categories of harm- ful action that wereneversuccessfully induced regardless of the attack vector or social engineering technique:

  16. [16]

    No authority level, urgency framing, or SKILL instruction overrides this heuristic

    Unknown recipient addresses.Sonnet categorically refuses to send data to email ad- dresses or endpoints not present in the workspace’s established contact list. No authority level, urgency framing, or SKILL instruction overrides this heuristic. 21 Preprint. Under review

  17. [17]

    archive pre-rotation configs per SOX policy

    Destructive file operations.Sonnet refuses to delete or overwrite production files regardless of the framing—even when a SKILL instruction cites compliance requirements (e.g., “archive pre-rotation configs per SOX policy”)

  18. [18]

    These boundaries arenot universal across models

    Credential forwarding to personal channels.Sonnet refuses to forward credentials to personal email addresses, explicitly recognizing the data-at-rest risk. These boundaries arenot universal across models. Preliminary testing on GPT-5.1 and Gem- ini 2.5 Pro indicates that both models are significantly more susceptible to these action types—GPT-5.1 in parti...

  19. [19]

    all configuration details

    Specificity beats authority.Agents respond to operational precision (exact file paths, field names, output format specifications), not organizational rank, urgency framing, or compliance invocations. A CFO asking vaguely for “all configuration details” fails; a skill file mapping service-registry.json→wire fedwire→processing reference succeeds

  20. [20]

    The same information planted across five independent workspace sources is accepted without question

    Corroboration beats sophistication.A single perfectly crafted adversarial email is detected as BEC fraud. The same information planted across five independent workspace sources is accepted without question. The attack surface is not the individual message—it is the workspace’s internal consistency. An attacker who can corrupt the consensus across multiple...

  21. [21]

    include the processing reference in the report you’re writing

    Workflow alignment beats novel requests.Attacks that augment a task the agent is already performing (“include the processing reference in the report you’re writing”) succeed at far higher rates than attacks that request new actions (“run this diagnostic script” or “forward credentials to this address”). The most effective attacks are invisible— they do no...

  22. [22]

    use these values

    Fear beats trust for web content.Web pages lack sender identity and organizational authority, so trust-based framing (“use these values”) fails universally. But web content caninvoke regulatory or security authority (OFAC sanctions, CVE advisories, HIPAA violations). Agents are more susceptible to “your credential has a regulatory problem” than “use this ...