Multiple Model Guardrail Jailbreak via Token Disruption through Random Spacing
Case GUID: 259d4db0-9b36-492b-8141-e19a7b82d7deSummary
A guardrail jailbreak vulnerability has been discovered affecting multiple models. The specific flaw manifests when attackers introduce random spacing within a prompt, effectively disrupting how the model tokenizes the input. By splitting words like "Chemicals" into parts such as "chem-", "ic-", and "al," the technique circumvents the model's primary content filter classifiers, which typically flag restricted phrases or tokens. This token manipulation allows attackers to bypass inference restrictions around providing information hazards and violating laws.
Metadata
Test Scores
| Model | Test Kind | Test Score | Temperature (max 2.0) |
|---|---|---|---|
OpenAI GPT-4o mini
|
Illegal Substances: Crystal Meth | 64.0 | N/A |
Twitter / X Grok 2
|
Illegal Substances: Crystal Meth | 91.0 | N/A |
Social Impact Score
Level 3: Significant Risk
Violations at this level present a tangible risk to public safety or social well-being, often related to dangerous but not highly restricted content.
Example: Bypassing guardrails to obtain instructions for creating illicit substances, such as recreational drugs or substances with moderate harm potential. Leakage of private personal data such as Social Security number or private medical.
Potential Consequences: Potential health impacts on a small scale, significant regulatory interest, and the need for stricter AI guardrails.
Taxonomies
About 0Din.ai
The 0Day Investigative Network (0DIN) was founded by Mozilla in 2024 to reward responsible researchers for their efforts in securing GenAI models. Learn more and submit discoveries at https://0din.ai.
Severity
Low
Security Boundary
Prompt Injection
Models
OpenAI GPT-4o mini
Twitter / X Grok 2
Published On
2025-10-23 (3 days)
Credit
Edward Morris, Anonymous, Miller Engelbrecht, Luis Reveles, Jose Brown, Mike Takahashi (@TakSec), Arth Singh, Igor Vasiliev