Database
AVID is a database of failure modes in general-purpose AI (GPAI) systems, including LLMs, API-only AI systems, developer tooling, and end-to-end applications and agents. The two base data classes are Report and Vulnerability. A report captures one concrete occurrence with supporting evidence; a vulnerability (vuln) captures a recurring failure mode.
Records in this database can be mapped to multiple taxonomy and risk frameworks, including the AVID taxonomy, CVSS risk scores, and MITRE ATLAS. This page lists the current reports and vulns in our database. To learn more about the database and usage, refer to our documentation.
Note: Older AVID records (before 2025) were curated under a broader AI/ML scope; these should be interpreted as legacy entries relative to the current GPAI-focused scope.
The definition of an “AI vulnerability” is still evolving across the ecosystem, so AVID currently uses a working definition. In this release, we are prioritizing report-level evidence and have not yet published new vulnerability records.
Reports
Reports are occurrences of a GPAI failure mode. We classify reports in four types, in increasing degree of quantitative evidence:
- Issue: qualitative evaluation based on a single sample or handful of samples,
- Advisory: qualitative evaluation based on multiple Incidents,
- Measurement: quantitative evaluation with associated data and metric,
- Detection: A Measurement deemed critical by a threshold or statistical test.
List of Reports
2026
| Report ID↓ | Description↕ | Report Type↕ | Date Reported↕ |
|---|---|---|---|
| AVID-2026-R0438 | Mistral Vibe CLI Python Tools Code Execution | Advisory | 2025-12-12 |
| AVID-2026-R0437 | Mistral Vibe CLI Shell Expansion Command Execution | Advisory | 2026-01-02 |
| AVID-2026-R0436 | Mistral Vibe CLI MCP Configuration Code Execution | Advisory | 2025-12-11 |
| AVID-2026-R0435 | Microsoft Azure AI Content Safety Guardrail Evasion | Advisory | 2024-03-04 |
| AVID-2026-R0434 | Microsoft Azure Prompt Shield Guardrail Evasion | Advisory | 2024-06-06 |
| AVID-2026-R0433 | Meta Prompt Guard Guardrail Evasion | Advisory | 2025-03-11 |
| AVID-2026-R0432 | Vijil Prompt Injection Guardrail Evasion | Advisory | 2025-03-14 |
| AVID-2026-R0431 | Protect AI Jailbreak and Prompt Injection Guardrail Evasion | Advisory | 2025-03-12 |
| AVID-2026-R0430 | Nvidia NemoGuard Jailbreak Detect Guardrail Evasion | Advisory | 2025-03-11 |
| AVID-2026-R0429 | Cline Bot AI Coding Agent Data Exfiltration via Prompt Injection and DNS | Advisory | 2025-08-27 |
| AVID-2026-R0428 | Cline Bot AI Coding Agent Code Execution via Prompt Injection and .clinerules Directives | Advisory | 2025-08-27 |
| AVID-2026-R0427 | Cline Bot AI Coding Agent Code Execution via Prompt Injection and TOCTOU Script Invocation | Advisory | 2025-08-27 |
| AVID-2026-R0426 | Google Antigravity IDE Persistent Code Execution | Advisory | 2025-11-19 |
| AVID-2026-R0425 | Zed IDE MCP Configuration Code Execution | Advisory | 2025-11-16 |
| AVID-2026-R0424 | Zed IDE LSP Configuration Code Execution | Advisory | 2025-11-16 |
| AVID-2026-R0423 | TheLibrarian.io Internal Cloud Environment Access via web_fetch Tool | Advisory | 2025-10-10 |
| AVID-2026-R0422 | JetBrains Junie AI Coding Agent guidelines.md Code Execution | Advisory | 2025-11-14 |
| AVID-2026-R0421 | Google Gemini CLI MCP Configuration Code Execution | Advisory | 2025-12-26 |
| AVID-2026-R0420 | Google Gemini CLI Tool Discovery Code Execution | Advisory | 2025-12-26 |
| AVID-2026-R0419 | Amazon Kiro IDE Data Exfiltration via Steering File | Advisory | 2025-12-08 |
| AVID-2026-R0418 | Amazon Kiro IDE Data Exfiltration via Filename Prompt Injection and Kiro Powers Registry Fetching | Advisory | 2025-12-11 |
| AVID-2026-R0417 | OpenAI Codex CLI MCP Configuration Remote Code Execution | Advisory | 2026-01-19 |
| AVID-2026-R0416 | OpenAI Codex CLI Model Provider Configuration Remote Code Execution | Advisory | 2026-01-16 |
| AVID-2026-R0415 | OpenAI Codex CLI Notify Field Configuration Remote Code Execution | Advisory | 2026-01-16 |
| AVID-2026-R0414 | Eclipse Theia IDE MCP Configuration Code Execution | Advisory | 2025-11-18 |
| AVID-2026-R0413 | OpenAI ChatGPT Content Safety Explicit Image Bypass | Advisory | 2026-01-28 |
| AVID-2026-R0412 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`. | Measurement | 2026-03-10 |
| AVID-2026-R0411 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`. | Measurement | 2026-03-10 |
| AVID-2026-R0410 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`. | Measurement | 2026-03-10 |
| AVID-2026-R0409 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`. | Measurement | 2026-03-10 |
| AVID-2026-R0408 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`. | Measurement | 2026-03-10 |
| AVID-2026-R0407 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`. | Measurement | 2026-03-10 |
| AVID-2026-R0406 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`. | Measurement | 2026-03-10 |
| AVID-2026-R0405 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`. | Measurement | 2026-03-10 |
| AVID-2026-R0404 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`. | Measurement | 2026-03-10 |
| AVID-2026-R0403 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`. | Measurement | 2026-03-10 |
| AVID-2026-R0402 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`. | Measurement | 2026-03-10 |
| AVID-2026-R0401 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`. | Measurement | 2026-03-10 |
| AVID-2026-R0400 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`. | Measurement | 2026-03-10 |
| AVID-2026-R0399 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`. | Measurement | 2026-03-10 |
| AVID-2026-R0398 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`. | Measurement | 2026-03-10 |
| AVID-2026-R0397 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`. | Measurement | 2026-03-10 |
| AVID-2026-R0396 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`. | Measurement | 2026-03-10 |
| AVID-2026-R0395 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`. | Measurement | 2026-03-10 |
| AVID-2026-R0394 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`. | Measurement | 2026-03-10 |
| AVID-2026-R0393 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`. | Measurement | 2026-03-10 |
| AVID-2026-R0392 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`. | Measurement | 2026-03-10 |
| AVID-2026-R0391 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`. | Measurement | 2026-03-10 |
| AVID-2026-R0390 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`. | Measurement | 2026-03-10 |
| AVID-2026-R0389 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`. | Measurement | 2026-03-10 |
| AVID-2026-R0388 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`. | Measurement | 2026-03-10 |
| AVID-2026-R0387 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`. | Measurement | 2026-03-10 |
| AVID-2026-R0386 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`. | Measurement | 2026-03-10 |
| AVID-2026-R0385 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`. | Measurement | 2026-03-10 |
| AVID-2026-R0384 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`. | Measurement | 2026-03-10 |
| AVID-2026-R0383 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`. | Measurement | 2026-03-10 |
| AVID-2026-R0382 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`. | Measurement | 2026-03-10 |
| AVID-2026-R0381 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`. | Measurement | 2026-03-10 |
| AVID-2026-R0380 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0379 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0378 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0377 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0376 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0375 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0374 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0373 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0372 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`. | Measurement | 2026-03-10 |
| AVID-2026-R0371 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`. | Measurement | 2026-03-10 |
| AVID-2026-R0370 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`. | Measurement | 2026-03-10 |
| AVID-2026-R0369 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`. | Measurement | 2026-03-10 |
| AVID-2026-R0368 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`. | Measurement | 2026-03-10 |
| AVID-2026-R0367 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`. | Measurement | 2026-03-10 |
| AVID-2026-R0366 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`. | Measurement | 2026-03-10 |
| AVID-2026-R0365 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`. | Measurement | 2026-03-10 |
| AVID-2026-R0364 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`. | Measurement | 2026-03-10 |
| AVID-2026-R0363 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`. | Measurement | 2026-03-10 |
| AVID-2026-R0362 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`. | Measurement | 2026-03-10 |
| AVID-2026-R0361 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`. | Measurement | 2026-03-10 |
| AVID-2026-R0360 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`. | Measurement | 2026-03-10 |
| AVID-2026-R0359 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`. | Measurement | 2026-03-10 |
| AVID-2026-R0358 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`. | Measurement | 2026-03-10 |
| AVID-2026-R0357 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`. | Measurement | 2026-03-10 |
| AVID-2026-R0356 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`. | Measurement | 2026-03-10 |
| AVID-2026-R0355 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`. | Measurement | 2026-03-10 |
| AVID-2026-R0354 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`. | Measurement | 2026-03-10 |
| AVID-2026-R0353 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`. | Measurement | 2026-03-10 |
| AVID-2026-R0352 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`. | Measurement | 2026-03-10 |
| AVID-2026-R0351 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`. | Measurement | 2026-03-10 |
| AVID-2026-R0350 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`. | Measurement | 2026-03-10 |
| AVID-2026-R0349 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`. | Measurement | 2026-03-10 |
| AVID-2026-R0348 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`. | Measurement | 2026-03-10 |
| AVID-2026-R0347 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`. | Measurement | 2026-03-10 |
| AVID-2026-R0346 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`. | Measurement | 2026-03-10 |
| AVID-2026-R0345 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`. | Measurement | 2026-03-10 |
| AVID-2026-R0344 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`. | Measurement | 2026-03-10 |
| AVID-2026-R0343 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`. | Measurement | 2026-03-10 |
| AVID-2026-R0342 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`. | Measurement | 2026-03-10 |
| AVID-2026-R0341 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`. | Measurement | 2026-03-10 |
| AVID-2026-R0340 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`. | Measurement | 2026-03-10 |
| AVID-2026-R0339 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`. | Measurement | 2026-03-10 |
| AVID-2026-R0338 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`. | Measurement | 2026-03-10 |
| AVID-2026-R0337 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`. | Measurement | 2026-03-10 |
| AVID-2026-R0336 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0335 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0334 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0333 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0332 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0331 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0330 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0329 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0328 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`. | Measurement | 2026-03-10 |
| AVID-2026-R0327 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`. | Measurement | 2026-03-10 |
| AVID-2026-R0326 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`. | Measurement | 2026-03-10 |
| AVID-2026-R0325 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`. | Measurement | 2026-03-10 |
| AVID-2026-R0324 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`. | Measurement | 2026-03-10 |
| AVID-2026-R0323 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`. | Measurement | 2026-03-10 |
| AVID-2026-R0322 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`. | Measurement | 2026-03-10 |
| AVID-2026-R0321 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`. | Measurement | 2026-03-10 |
| AVID-2026-R0320 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`. | Measurement | 2026-03-10 |
| AVID-2026-R0319 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`. | Measurement | 2026-03-10 |
| AVID-2026-R0318 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`. | Measurement | 2026-03-10 |
| AVID-2026-R0317 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`. | Measurement | 2026-03-10 |
| AVID-2026-R0316 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`. | Measurement | 2026-03-10 |
| AVID-2026-R0315 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`. | Measurement | 2026-03-10 |
| AVID-2026-R0314 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`. | Measurement | 2026-03-10 |
| AVID-2026-R0313 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`. | Measurement | 2026-03-10 |
| AVID-2026-R0312 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`. | Measurement | 2026-03-10 |
| AVID-2026-R0311 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`. | Measurement | 2026-03-10 |
| AVID-2026-R0310 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`. | Measurement | 2026-03-10 |
| AVID-2026-R0309 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`. | Measurement | 2026-03-10 |
| AVID-2026-R0308 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`. | Measurement | 2026-03-10 |
| AVID-2026-R0307 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`. | Measurement | 2026-03-10 |
| AVID-2026-R0306 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`. | Measurement | 2026-03-10 |
| AVID-2026-R0305 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`. | Measurement | 2026-03-10 |
| AVID-2026-R0304 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`. | Measurement | 2026-03-10 |
| AVID-2026-R0303 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`. | Measurement | 2026-03-10 |
| AVID-2026-R0302 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`. | Measurement | 2026-03-10 |
| AVID-2026-R0301 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`. | Measurement | 2026-03-10 |
| AVID-2026-R0300 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`. | Measurement | 2026-03-10 |
| AVID-2026-R0299 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`. | Measurement | 2026-03-10 |
| AVID-2026-R0298 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`. | Measurement | 2026-03-10 |
| AVID-2026-R0297 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`. | Measurement | 2026-03-10 |
| AVID-2026-R0296 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`. | Measurement | 2026-03-10 |
| AVID-2026-R0295 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`. | Measurement | 2026-03-10 |
| AVID-2026-R0294 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`. | Measurement | 2026-03-10 |
| AVID-2026-R0293 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`. | Measurement | 2026-03-10 |
| AVID-2026-R0292 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`. | Measurement | 2026-03-10 |
| AVID-2026-R0291 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`. | Measurement | 2026-03-10 |
| AVID-2026-R0290 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`. | Measurement | 2026-03-10 |
| AVID-2026-R0289 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`. | Measurement | 2026-03-10 |
| AVID-2026-R0288 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`. | Measurement | 2026-03-10 |
| AVID-2026-R0287 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`. | Measurement | 2026-03-10 |
| AVID-2026-R0286 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`. | Measurement | 2026-03-10 |
| AVID-2026-R0285 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`. | Measurement | 2026-03-10 |
| AVID-2026-R0284 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`. | Measurement | 2026-03-10 |
| AVID-2026-R0283 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`. | Measurement | 2026-03-10 |
| AVID-2026-R0282 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`. | Measurement | 2026-03-10 |
| AVID-2026-R0281 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`. | Measurement | 2026-03-10 |
| AVID-2026-R0280 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`. | Measurement | 2026-03-10 |
| AVID-2026-R0279 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`. | Measurement | 2026-03-10 |
| AVID-2026-R0278 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`. | Measurement | 2026-03-10 |
| AVID-2026-R0277 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`. | Measurement | 2026-03-10 |
| AVID-2026-R0276 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`. | Measurement | 2026-03-10 |
| AVID-2026-R0275 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`. | Measurement | 2026-03-10 |
| AVID-2026-R0274 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`. | Measurement | 2026-03-10 |
| AVID-2026-R0273 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`. | Measurement | 2026-03-10 |
| AVID-2026-R0272 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`. | Measurement | 2026-03-10 |
| AVID-2026-R0271 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`. | Measurement | 2026-03-10 |
| AVID-2026-R0270 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`. | Measurement | 2026-03-10 |
| AVID-2026-R0269 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`. | Measurement | 2026-03-10 |
| AVID-2026-R0268 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`. | Measurement | 2026-03-10 |
| AVID-2026-R0267 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`. | Measurement | 2026-03-10 |
| AVID-2026-R0266 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`. | Measurement | 2026-03-10 |
| AVID-2026-R0265 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`. | Measurement | 2026-03-10 |
| AVID-2026-R0264 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`. | Measurement | 2026-03-10 |
| AVID-2026-R0263 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`. | Measurement | 2026-03-10 |
| AVID-2026-R0262 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`. | Measurement | 2026-03-10 |
| AVID-2026-R0261 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`. | Measurement | 2026-03-10 |
| AVID-2026-R0260 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`. | Measurement | 2026-03-10 |
| AVID-2026-R0259 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`. | Measurement | 2026-03-10 |
| AVID-2026-R0258 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`. | Measurement | 2026-03-10 |
| AVID-2026-R0257 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`. | Measurement | 2026-03-10 |
| AVID-2026-R0256 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`. | Measurement | 2026-03-10 |
| AVID-2026-R0255 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`. | Measurement | 2026-03-10 |
| AVID-2026-R0254 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`. | Measurement | 2026-03-10 |
| AVID-2026-R0253 | Dia: Increased Spoof Risk; Missing full screen toast (CVE-2025-13132) | Advisory | 2025-11-21 |
| AVID-2026-R0251 | Data exfiltration via prompt injection | Issue | 2026-03-04 |
| AVID-2026-R0250 | Critical authentication bypass vulnerability in Base44 | Advisory | 2026-03-04 |
| AVID-2026-R0249 | Exposed ClickHouse database leaking sensitive information | Issue | 2026-03-04 |
| AVID-2026-R0248 | Misconfigured database exposes sensitive API keys | Advisory | 2026-03-04 |
| AVID-2026-R0247 | OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs (CVE-2026-27576) | Advisory | 2026-02-21 |
| AVID-2026-R0246 | OpenClaw hardened cron webhook delivery against SSRF (CVE-2026-27488) | Advisory | 2026-02-21 |
| AVID-2026-R0245 | OpenClaw: Prevent shell injection in macOS keychain credential write (CVE-2026-27487) | Advisory | 2026-02-21 |
| AVID-2026-R0244 | OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup (CVE-2026-27486) | Advisory | 2026-02-21 |
| AVID-2026-R0243 | OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection (CVE-2026-27485) | Advisory | 2026-02-21 |
| AVID-2026-R0242 | OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flows (CVE-2026-27484) | Advisory | 2026-02-21 |
| AVID-2026-R0241 | OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection (CVE-2026-27009) | Advisory | 2026-02-19 |
| AVID-2026-R0240 | OpenClaw hardened the skill download target directory validation (CVE-2026-27008) | Advisory | 2026-02-19 |
| AVID-2026-R0239 | OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container recreation (CVE-2026-27007) | Advisory | 2026-02-19 |
| AVID-2026-R0238 | OpenClaw session tool visibility hardening and Telegram webhook secret fallback (CVE-2026-27004) | Advisory | 2026-02-19 |
| AVID-2026-R0237 | OpenClaw: Telegram bot token exposure via logs (CVE-2026-27003) | Advisory | 2026-02-19 |
| AVID-2026-R0236 | OpenClaw: Docker container escape via unvalidated bind mount config injection (CVE-2026-27002) | Advisory | 2026-02-19 |
| AVID-2026-R0235 | OpenClaw: Unsanitized CWD path injection into LLM prompts (CVE-2026-27001) | Advisory | 2026-02-19 |
| AVID-2026-R0234 | OpenClaw has a Path Traversal in Browser Download Functionality (CVE-2026-26972) | Advisory | 2026-02-19 |
| AVID-2026-R0233 | OpenClaw has a path traversal in browser upload allows local file read (CVE-2026-26329) | Advisory | 2026-02-19 |
| AVID-2026-R0232 | OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities (CVE-2026-26328) | Advisory | 2026-02-19 |
| AVID-2026-R0231 | OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning (CVE-2026-26327) | Advisory | 2026-02-19 |
| AVID-2026-R0230 | OpenClaw skills.status could leak secrets to operator.read clients (CVE-2026-26326) | Advisory | 2026-02-19 |
| AVID-2026-R0229 | OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals (CVE-2026-26325) | Advisory | 2026-02-19 |
| AVID-2026-R0228 | OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable) (CVE-2026-26324) | Advisory | 2026-02-19 |
| AVID-2026-R0227 | OpenClaw has a command injection in maintainer clawtributors updater (CVE-2026-26323) | Advisory | 2026-02-19 |
| AVID-2026-R0226 | OpenClaw Gateway tool allowed unrestricted gatewayUrl override (CVE-2026-26322) | Advisory | 2026-02-19 |
| AVID-2026-R0225 | OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension (CVE-2026-26321) | Advisory | 2026-02-19 |
| AVID-2026-R0224 | OpenClaw macOS deep link confirmation truncation can conceal executed agent message (CVE-2026-26320) | Advisory | 2026-02-19 |
| AVID-2026-R0223 | OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests (CVE-2026-26319) | Advisory | 2026-02-19 |
| AVID-2026-R0222 | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints (CVE-2026-26317) | Advisory | 2026-02-19 |
| AVID-2026-R0221 | OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust (CVE-2026-26316) | Advisory | 2026-02-19 |
| AVID-2026-R0220 | OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.apply (CVE-2026-25593) | Advisory | 2026-02-06 |
| AVID-2026-R0219 | OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction (CVE-2026-25475) | Advisory | 2026-02-04 |
| AVID-2026-R0218 | OpenClaw has a Telegram webhook request forgery (missing `channels.telegram.webhookSecret`) → auth bypass (CVE-2026-25474) | Advisory | 2026-02-19 |
| AVID-2026-R0217 | Vulnerability CVE-2026-25253 | Advisory | 2026-02-01 |
| AVID-2026-R0216 | OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand (CVE-2026-25157) | Advisory | 2026-02-04 |
| AVID-2026-R0215 | OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions (CVE-2026-24764) | Advisory | 2026-02-19 |
| AVID-2026-R0214 | Authenticated Command Injection in OpenClaw Docker Execution via PATH Environment Variable (CVE-2026-24763) | Advisory | 2026-02-02 |
| AVID-2026-R0213 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`. | Measurement | 2026-02-20 |
| AVID-2026-R0212 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`. | Measurement | 2026-02-20 |
| AVID-2026-R0211 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`. | Measurement | 2026-02-20 |
| AVID-2026-R0210 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`. | Measurement | 2026-02-20 |
| AVID-2026-R0209 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`. | Measurement | 2026-02-20 |
| AVID-2026-R0208 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`. | Measurement | 2026-02-20 |
| AVID-2026-R0207 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`. | Measurement | 2026-02-20 |
| AVID-2026-R0206 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`. | Measurement | 2026-02-20 |
| AVID-2026-R0205 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`. | Measurement | 2026-02-20 |
| AVID-2026-R0204 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`. | Measurement | 2026-02-20 |
| AVID-2026-R0203 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`. | Measurement | 2026-02-20 |
| AVID-2026-R0202 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`. | Measurement | 2026-02-20 |
| AVID-2026-R0200 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`. | Measurement | 2026-02-20 |
| AVID-2026-R0199 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`. | Measurement | 2026-02-20 |
| AVID-2026-R0198 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`. | Measurement | 2026-02-20 |
| AVID-2026-R0197 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`. | Measurement | 2026-02-20 |
| AVID-2026-R0196 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`. | Measurement | 2026-02-20 |
| AVID-2026-R0195 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`. | Measurement | 2026-02-20 |
| AVID-2026-R0194 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`. | Measurement | 2026-02-20 |
| AVID-2026-R0193 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`. | Measurement | 2026-02-20 |
| AVID-2026-R0192 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`. | Measurement | 2026-02-20 |
| AVID-2026-R0191 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`. | Measurement | 2026-02-20 |
| AVID-2026-R0190 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`. | Measurement | 2026-02-20 |
| AVID-2026-R0189 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`. | Measurement | 2026-02-20 |
| AVID-2026-R0188 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`. | Measurement | 2026-02-20 |
| AVID-2026-R0187 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`. | Measurement | 2026-02-20 |
| AVID-2026-R0186 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`. | Measurement | 2026-02-20 |
| AVID-2026-R0185 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`. | Measurement | 2026-02-20 |
| AVID-2026-R0184 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`. | Measurement | 2026-02-20 |
| AVID-2026-R0183 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`. | Measurement | 2026-02-20 |
| AVID-2026-R0182 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`. | Measurement | 2026-02-20 |
| AVID-2026-R0181 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`. | Measurement | 2026-02-20 |
| AVID-2026-R0180 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`. | Measurement | 2026-02-20 |
| AVID-2026-R0179 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`. | Measurement | 2026-02-20 |
| AVID-2026-R0178 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`. | Measurement | 2026-02-20 |
| AVID-2026-R0177 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`. | Measurement | 2026-02-20 |
| AVID-2026-R0176 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`. | Measurement | 2026-02-20 |
| AVID-2026-R0175 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`. | Measurement | 2026-02-20 |
| AVID-2026-R0174 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`. | Measurement | 2026-02-20 |
| AVID-2026-R0173 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`. | Measurement | 2026-02-20 |
| AVID-2026-R0172 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`. | Measurement | 2026-02-20 |
| AVID-2026-R0171 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`. | Measurement | 2026-02-20 |
| AVID-2026-R0170 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`. | Measurement | 2026-02-20 |
| AVID-2026-R0169 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`. | Measurement | 2026-02-20 |
| AVID-2026-R0168 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`. | Measurement | 2026-02-20 |
| AVID-2026-R0167 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`. | Measurement | 2026-02-20 |
| AVID-2026-R0166 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`. | Measurement | 2026-02-20 |
| AVID-2026-R0165 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`. | Measurement | 2026-02-20 |
| AVID-2026-R0164 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`. | Measurement | 2026-02-20 |
| AVID-2026-R0163 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`. | Measurement | 2026-02-20 |
| AVID-2026-R0162 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`. | Measurement | 2026-02-20 |
| AVID-2026-R0161 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`. | Measurement | 2026-02-20 |
| AVID-2026-R0160 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`. | Measurement | 2026-02-20 |
| AVID-2026-R0159 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`. | Measurement | 2026-02-20 |
| AVID-2026-R0158 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`. | Measurement | 2026-02-20 |
| AVID-2026-R0157 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`. | Measurement | 2026-02-20 |
| AVID-2026-R0156 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`. | Measurement | 2026-02-20 |
| AVID-2026-R0155 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`. | Measurement | 2026-02-20 |
| AVID-2026-R0154 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`. | Measurement | 2026-02-20 |
| AVID-2026-R0153 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`. | Measurement | 2026-02-20 |
| AVID-2026-R0152 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`. | Measurement | 2026-02-20 |
| AVID-2026-R0151 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`. | Measurement | 2026-02-20 |
| AVID-2026-R0150 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`. | Measurement | 2026-02-20 |
| AVID-2026-R0149 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`. | Measurement | 2026-02-20 |
| AVID-2026-R0148 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`. | Measurement | 2026-02-20 |
| AVID-2026-R0147 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`. | Measurement | 2026-02-20 |
| AVID-2026-R0146 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`. | Measurement | 2026-02-20 |
| AVID-2026-R0145 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`. | Measurement | 2026-02-20 |
| AVID-2026-R0144 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`. | Measurement | 2026-02-20 |
| AVID-2026-R0143 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`. | Measurement | 2026-02-20 |
| AVID-2026-R0142 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`. | Measurement | 2026-02-20 |
| AVID-2026-R0141 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`. | Measurement | 2026-02-20 |
| AVID-2026-R0140 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`. | Measurement | 2026-02-20 |
| AVID-2026-R0139 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`. | Measurement | 2026-02-20 |
| AVID-2026-R0138 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`. | Measurement | 2026-02-20 |
| AVID-2026-R0137 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`. | Measurement | 2026-02-20 |
| AVID-2026-R0136 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`. | Measurement | 2026-02-20 |
| AVID-2026-R0135 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`. | Measurement | 2026-02-20 |
| AVID-2026-R0134 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`. | Measurement | 2026-02-20 |
| AVID-2026-R0133 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`. | Measurement | 2026-02-20 |
| AVID-2026-R0132 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`. | Measurement | 2026-02-20 |
| AVID-2026-R0131 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`. | Measurement | 2026-02-20 |
| AVID-2026-R0130 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`. | Measurement | 2026-02-20 |
| AVID-2026-R0129 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`. | Measurement | 2026-02-20 |
| AVID-2026-R0128 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`. | Measurement | 2026-02-20 |
| AVID-2026-R0127 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`. | Measurement | 2026-02-20 |
| AVID-2026-R0126 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`. | Measurement | 2026-02-20 |
| AVID-2026-R0125 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`. | Measurement | 2026-02-20 |
| AVID-2026-R0124 | Amazon Rufus Guardrail Jailbreak via ASCII Decimal Encoding | Issue | 2026-02-19 |
| AVID-2026-R0123 | Google Gemini G-Suite Prompt Injection Vulnerability | Issue | 2026-02-19 |
| AVID-2026-R0122 | Multiple Model Guardrail Jailbreak via "Fortune Cookie Simulator" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0121 | Multiple Model Guardrail Jailbreak via "Arbitrary Relation" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0120 | OpenAI Multiple Model Prompt Injection via "Morse Code Businessman" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0119 | Multiple Model Guardrail Jailbreak via "Analyze Data" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0118 | Multiple Model Guardrail Jailbreak via "Chemist's Essay" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0117 | Multiple Model Guardrail Jailbreak via "Pronunciation Bypass" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0116 | Multiple Model Guardrail Jailbreak via "Correct Me" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0115 | Multiple Model Guardrail Jailbreak via "Leetspeak Unicode" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0114 | Multiple Model Guardrail Jailbreak via "Chaotic Formatting" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0113 | Multiple Model Guardrail Jailbreak via IPA Encoding Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0112 | OpenAI GPT-4o Guardrail Jailbreak via "Naval Parameters Cipher" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0111 | Multiple Model Guardrail Jailbreak via "Scientific Formula" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0110 | Multiple Model Guardrail Jailbreak via "Apocalyptic Scenario" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0109 | Multiple Model Guardrail Jailbreak via "Lambda Pattern Formatting" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0108 | Multiple Model Guardrail Jailbreak via "Spelling Mistakes" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0107 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Surprise Attack" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0106 | Multiple Model Guardrail Jailbreak via "Fictional API Detection" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0105 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Historical Polaroid" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0104 | OpenAI GPT-4o Guardrail Jailbreak via "Zero-Width Unicode" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0103 | Multiple Model Guardrail Jailbreak via "Wiki Creation" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0102 | Multiple Model Guardrail Jailbreak via "Academic Framing" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0101 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Artistic Escalation" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0100 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Feminist Art Description" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0099 | OpenAI GPT-4o Guardrail Jailbreak via "Layered Summarization" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0098 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Historical NSFW" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0097 | NSFWOpenAI Sora Guardrail Jailbreak via "Hypothetical Anatomy" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0096 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Debug Framework Simulation" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0095 | Multiple Model Guardrail Jailbreak via "Servile Scientist" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0094 | Multiple Model Guardrail Jailbreak via "Terminal Simulation" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0093 | Multiple Model Guardrail Jailbreak via "Scientific Framing for Wrapper" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0092 | Multiple Model Guardrail Jailbreak via "Mathematical Variable Obfuscation" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0091 | NSFWOpenAI Sora Guardrail Jailbreak via "Anatomical Escalation" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0090 | Multiple Model Guardrail Jailbreak via Memory Dump Simulation Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0089 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Classical Art Reframing" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0088 | Multiple Model Guardrail Jailbreak via "Speculative Knowledge Preservation" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0087 | Multiple Model Guardrail Jailbreak via Investigative Journalist Persona | Measurement | 2026-02-19 |
| AVID-2026-R0086 | Multiple Model Guardrail Jailbreak via "Super Short Prompt" | Measurement | 2025-10-17 |
| AVID-2026-R0085 | Multiple Model Guardrail Jailbreak via "Psych-Phil DT + Compaction" Technique | Measurement | 2025-10-06 |
| AVID-2026-R0084 | Multiple Model Guardrail Jailbreak via "First Person Perspective" | Measurement | 2026-02-19 |
| AVID-2026-R0083 | Multiple Model Guardrail Jailbreak via "Abbreviation Expansion" | Measurement | 2026-02-19 |
| AVID-2026-R0082 | Multiple Model Guardrail Jailbreak via Token Disruption through Random Spacing | Measurement | 2026-02-19 |
| AVID-2026-R0081 | Multiple Model Guardrail Jailbreak via "Key-Value Pairs" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0080 | Multiple Model Guardrail Jailbreak via "Essay Title" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0079 | Multiple Model Guardrail Jailbreak via "Compare and Contrast" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0078 | Multiple Model Guardrail Jailbreak via "Police Interrogation Terminal" Tactic | Measurement | 2026-01-22 |
| AVID-2026-R0077 | Multiple Model Guardrail Jailbreak via "Screenplay Deception" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0076 | Multiple Model Guardrail Jailbreak via "Story Teller" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0075 | Multiple Model Guardrail Jailbreak via "Show Character Role-Playing" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0074 | Multiple Model Guardrail Jailbreak via "Science Student Safety" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0073 | Multiple Model Guardrail Jailbreak via "Fashion Design Recipe" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0072 | Multiple Model Guardrail Jailbreak via "Chemist Code Language" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0071 | Multiple Model Guardrail Jailbreak via "Choose Your Own Adventure" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0070 | Multiple Model Guardrail Jailbreak via "Haiku of Love" Tactic | Measurement | 2026-01-16 |
| AVID-2026-R0069 | Multiple Model Guardrail Jailbreak via "API System Instructions" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0068 | Multiple Model Guardrail Jailbreak via "Hybrid Role" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0067 | Multiple Model Guardrail Jailbreak via "Technical Field Guide" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0066 | Multiple Model Guardrail Jailbreak via "Deceptive Forensic Context" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0065 | Multiple Model Guardrail Jailbreak via "Placeholder Injection" Tactic | Measurement | 2026-01-29 |
| AVID-2026-R0064 | Multiple Model Guardrail Jailbreak via "Split Mode" Response Requests | Measurement | 2026-02-19 |
| AVID-2026-R0063 | Multiple Model Guardrail Jailbreak via "Chemical Compiler Debug" Tactic | Measurement | 2026-02-12 |
| AVID-2026-R0062 | Multiple Model Prompt Injection via "Correction" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0061 | Multiple Model Guardrail Jailbreak via "Incremental Table Completion" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0060 | Multiple Model Guardrail Jailbreak via "Hex Recipe Book" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0059 | Multiple Model Guardrail Jailbreak via "Urgent Health Inquiry" | Measurement | 2026-02-19 |
| AVID-2026-R0058 | Langflow < 1.3.0 Unauthenticated RCE via /api/v1/validate/code (CVE-2025-3248) | Advisory | 2025-04-07 |
| AVID-2026-R0057 | Insecure Deserialization leads to RCE in BentoML's runner server (CVE-2025-32375) | Advisory | 2025-04-09 |
| AVID-2026-R0056 | ageerle ruoyi-ai SysNoticeController.java improper authorization (CVE-2025-3202) | Advisory | 2025-04-04 |
| AVID-2026-R0055 | Arbitrary file write from Cursor Agent through a prompt injection from malicious @Docs (CVE-2025-32018) | Advisory | 2025-04-08 |
| AVID-2026-R0054 | ageerle ruoyi-ai API Interface SysModelController.java improper authorization (CVE-2025-3199) | Advisory | 2025-04-04 |
| AVID-2026-R0053 | PyTorch CUDACachingAllocator.cpp torch.cuda.memory.caching_allocator_delete memory corruption (CVE-2025-3136) | Advisory | 2025-04-03 |
| AVID-2026-R0052 | PyTorch torch.jit.jit_module_from_flatbuffer memory corruption (CVE-2025-3121) | Advisory | 2025-04-02 |
| AVID-2026-R0051 | Vulnerability CVE-2025-3035 | Advisory | 2025-04-01 |
| AVID-2026-R0050 | PyTorch torch.lstm_cell memory corruption (CVE-2025-3001) | Advisory | 2025-03-31 |
| AVID-2026-R0049 | PyTorch torch.jit.script memory corruption (CVE-2025-3000) | Advisory | 2025-03-31 |
| AVID-2026-R0048 | PyTorch torch.nn.utils.rnn.unpack_sequence memory corruption (CVE-2025-2999) | Advisory | 2025-03-31 |
| AVID-2026-R0047 | PyTorch torch.nn.utils.rnn.pad_packed_sequence memory corruption (CVE-2025-2998) | Advisory | 2025-03-31 |
| AVID-2026-R0046 | Improper Control of Generation of Code ('Code Injection') in GitLab (CVE-2025-2867) | Advisory | 2025-03-27 |
| AVID-2026-R0045 | BentoML Allows Remote Code Execution (RCE) via Insecure Deserialization (CVE-2025-27520) | Advisory | 2025-04-04 |
| AVID-2026-R0044 | Azure Promptflow Remote Code Execution Vulnerability (CVE-2025-24986) | Advisory | 2025-03-11 |
| AVID-2026-R0043 | NI Vision Builder AI VBAI File Processing Missing Warning Remote Code Execution Vulnerability (CVE-2025-2450) | Advisory | 2025-03-18 |
| AVID-2026-R0042 | Vulnerability CVE-2025-23359 | Advisory | 2025-02-12 |
| AVID-2026-R0041 | Azure AI Face Service Elevation of Privilege Vulnerability (CVE-2025-21415) | Advisory | 2025-01-29 |
| AVID-2026-R0040 | Microsoft Account Elevation of Privilege Vulnerability (CVE-2025-21396) | Advisory | 2025-01-29 |
| AVID-2026-R0039 | Mage AI insecure default initialization of resource (CVE-2025-2129) | Advisory | 2025-03-09 |
| AVID-2026-R0038 | picklescan - Zip Flag Bit Exploit Crashes Picklescan But Not PyTorch (CVE-2025-1945) | Advisory | 2025-03-10 |
| AVID-2026-R0037 | picklescan ZIP archive manipulation attack leads to crash (CVE-2025-1944) | Advisory | 2025-03-10 |
| AVID-2026-R0036 | picklescan - Security scanning bypass via non-standard file extensions (CVE-2025-1889) | Advisory | 2025-03-03 |
| AVID-2026-R0035 | picklescan - Security scanning bypass via 'pip main' (CVE-2025-1716) | Advisory | 2025-02-26 |
| AVID-2026-R0034 | Arbitrary Code Execution via Crafted Keras Config for Model Loading (CVE-2025-1550) | Advisory | 2025-03-11 |
| AVID-2026-R0033 | Improper Authorization and Duplicate Slug Vulnerability in lunary-ai/lunary (CVE-2024-9000) | Advisory | 2025-03-20 |
| AVID-2026-R0032 | Improper Access Control in lunary-ai/lunary (CVE-2024-8999) | Advisory | 2025-03-20 |
| AVID-2026-R0031 | Exposure of Sensitive Information in mintplex-labs/anything-llm (CVE-2024-6842) | Advisory | 2025-03-20 |
| AVID-2026-R0030 | Uncontrolled Resource Consumption in mlflow/mlflow (CVE-2024-6838) | Advisory | 2025-03-20 |
| AVID-2026-R0029 | IBM watsonx.ai cross-site scripting (CVE-2024-49785) | Advisory | 2025-01-12 |
| AVID-2026-R0028 | SQL Injection in run-llama/llama_index (CVE-2024-12911) | Advisory | 2025-03-20 |
| AVID-2026-R0027 | SQL Injection to RCE in run-llama/llama_index (CVE-2024-12909) | Advisory | 2025-03-20 |
| AVID-2026-R0026 | SSRF in infiniflow/ragflow (CVE-2024-12779) | Advisory | 2025-03-20 |
| AVID-2026-R0025 | Denial of Service (DoS) in run-llama/llama_index (CVE-2024-12704) | Advisory | 2025-03-20 |
| AVID-2026-R0024 | AI Scribe – SEO AI Writer, Content Generator, Humanizer, Blog Writer, SEO Optimizer, DALLE-3, AI WordPress Plugin ChatGPT (GPT-4o 128K) <= 2.3 - Missing Authorization to Authenticated (Subscriber+) Settings Update (CVE-2024-12606) | Advisory | 2025-01-10 |
| AVID-2026-R0023 | Remote Code Execution via Model Deserialization in invoke-ai/invokeai (CVE-2024-12029) | Advisory | 2025-03-20 |
| AVID-2026-R0022 | Improper Enforcement of Unique Constraint in lunary-ai/lunary (CVE-2024-11301) | Advisory | 2025-03-20 |
| AVID-2026-R0021 | Improper Access Control in lunary-ai/lunary (CVE-2024-11300) | Advisory | 2025-03-20 |
| AVID-2026-R0020 | Denial of Service (DoS) via Large Payload in Board Name Field in invoke-ai/invokeai (CVE-2024-11043) | Advisory | 2025-03-20 |
| AVID-2026-R0019 | Arbitrary File Delete in invoke-ai/invokeai (CVE-2024-11042) | Advisory | 2025-03-20 |
| AVID-2026-R0018 | Prompt Injection Leading to RCE in binary-husky/gpt_academic Plugin `manim` (CVE-2024-10954) | Advisory | 2025-03-20 |
| AVID-2026-R0017 | Code Injection in binary-husky/gpt_academic (CVE-2024-10950) | Advisory | 2025-03-20 |
| AVID-2026-R0016 | Exposure of Sensitive System Information via ImagePromptTemplate in langchain-ai/langchain (CVE-2024-10940) | Advisory | 2025-03-20 |
| AVID-2026-R0015 | Cross-Site Request Forgery (CSRF) in eosphoros-ai/db-gpt (CVE-2024-10906) | Advisory | 2025-03-20 |
| AVID-2026-R0014 | Arbitrary File Write via SQL Injection in eosphoros-ai/db-gpt (CVE-2024-10835) | Advisory | 2025-03-20 |
| AVID-2026-R0013 | Arbitrary File Write in eosphoros-ai/db-gpt (CVE-2024-10834) | Advisory | 2025-03-20 |
| AVID-2026-R0012 | Arbitrary File Write in eosphoros-ai/db-gpt (CVE-2024-10833) | Advisory | 2025-03-20 |
| AVID-2026-R0011 | Arbitrary File Write through Absolute Path Traversal in eosphoros-ai/db-gpt (CVE-2024-10831) | Advisory | 2025-03-20 |
| AVID-2026-R0010 | Path Traversal in eosphoros-ai/db-gpt (CVE-2024-10830) | Advisory | 2025-03-20 |
| AVID-2026-R0009 | Denial of Service (DoS) via Multipart Boundary in eosphoros-ai/db-gpt (CVE-2024-10829) | Advisory | 2025-03-20 |
| AVID-2026-R0008 | Denial of Service (DoS) in invoke-ai/invokeai (CVE-2024-10821) | Advisory | 2025-03-20 |
| AVID-2026-R0007 | Missing Authorization in lunary-ai/lunary (CVE-2024-10762) | Advisory | 2025-03-20 |
| AVID-2026-R0006 | Path Traversal in mintplex-labs/anything-llm (CVE-2024-10513) | Advisory | 2025-03-20 |
| AVID-2026-R0005 | Improper Access Control in lunary-ai/lunary (CVE-2024-10330) | Advisory | 2025-03-20 |
| AVID-2026-R0004 | Improper Authorization in lunary-ai/lunary (CVE-2024-10274) | Advisory | 2025-03-20 |
| AVID-2026-R0003 | Improper Privilege Management in lunary-ai/lunary (CVE-2024-10273) | Advisory | 2025-03-20 |
| AVID-2026-R0002 | Incorrect Authorization in mintplex-labs/anything-llm (CVE-2024-10109) | Advisory | 2025-03-20 |
| AVID-2026-R0001 | Vulnerability CVE-2024-0132 | Advisory | 2024-09-26 |
2025
| Report ID↓ | Description↕ | Report Type↕ | Date Reported↕ |
|---|---|---|---|
| AVID-2025-R0035 | Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the cyse2_prompt_injection benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0034 | Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the cyse2_interpreter_abuse benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0033 | Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the wmdp_cyber benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0032 | Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the wmdp_chem benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0031 | Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the wmdp_bio benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0030 | Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the agentharm benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0025 | Evaluation of the LLM DeepSeek-R1 on the cyse2_interpreter_abuse benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0024 | Evaluation of the LLM DeepSeek-R1 on the wmdp_cyber benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0023 | Evaluation of the LLM DeepSeek-R1 on the wmdp_chem benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0022 | Evaluation of the LLM DeepSeek-R1 on the wmdp_bio benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0021 | Evaluation of the LLM DeepSeek-R1 on the agentharm benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0017 | Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the cyse2_prompt_injection benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0016 | Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the cyse2_interpreter_abuse benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0015 | Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the wmdp_cyber benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0014 | Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the wmdp_chem benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0013 | Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the wmdp_bio benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0012 | Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the agentharm benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0008 | Evaluation of the AI system gpt-4o-mini-2024-07-18 on the cyse2_prompt_injection benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0007 | Evaluation of the AI system gpt-4o-mini-2024-07-18 on the cyse2_interpreter_abuse benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0006 | Evaluation of the AI system gpt-4o-mini-2024-07-18 on the wmdp_cyber benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0005 | Evaluation of the AI system gpt-4o-mini-2024-07-18 on the wmdp_chem benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0004 | Evaluation of the AI system gpt-4o-mini-2024-07-18 on the wmdp_bio benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0003 | Evaluation of the AI system gpt-4o-mini-2024-07-18 on the agentharm benchmark using Inspect Evals | Measurement | 2025-05-26 |
| AVID-2025-R0002 | Geopolitical bias in sentiment analysis for neutral phrases | Advisory | 2025-01-17 |
| AVID-2025-R0001 | The application will provide the user with the answer to their math problem, violating existing controls. | Advisory | 2025-01-17 |
2023
| Report ID↓ | Description↕ | Report Type↕ | Date Reported↕ |
|---|---|---|---|
| AVID-2023-R0003 | It is possible to make ChatGPT perform remote code execution just by asking politely | Advisory | 2023-03-26 |
| AVID-2023-R0002 | ChatGPT links wrong authors to papers | Issue | 2023-01-05 |
| AVID-2023-R0001 | ChatGPT fails to follow lexical constraints | Advisory | 2023-01-13 |
2022
| Report ID↓ | Description↕ | Report Type↕ | Date Reported↕ |
|---|---|---|---|
| AVID-2022-R0005 | Demographic bias found in EleutherAI/gpt-neo-125M for multiple sensitive categories, as measured on prompts supplied in the BOLD dataset | Detection | 2022-11-09 |
| AVID-2022-R0004 | Profession bias reinforcing gender stereotypes found in xlm-roberta-base, as measured on the Winobias dataset | Detection | 2022-11-09 |
| AVID-2022-R0003 | Profession bias reinforcing gender stereotypes found in bert-base-uncased, as measured on the Winobias dataset | Detection | 2022-11-09 |
| AVID-2022-R0002 | Gender Bias in Sentence Completion Tasks performed by xlm-roberta-base using the HONEST score | Detection | 2022-11-09 |
| AVID-2022-R0001 | Gender Bias in Sentence Completion Tasks performed by bert-base-uncased using the HONEST metric | Detection | 2022-11-09 |
Vulnerability
Vulnerabilities can be linked to one or more taxonomies through tags. In AVID taxonomy, these tags denote the risk domains (Security, Ethics, Performance), related (sub)categories, and lifecycle stages. A vulnerability in AVID can pertain to one or more of the three levels: dataset, model, or system.
List of Vulnerabilities
2023
| Vulnerability ID↕ | Description↕ |
|---|---|
| AVID-2023-V027 | It is possible to make ChatGPT perform remote code execution just by asking politely |
| AVID-2023-V026 | ChatGPT generates false or incomplete references to scientific literature |
| AVID-2023-V025 | ChatGPT fails to follow lexical constraints |
| AVID-2023-V024 | Northpointe Risk Models |
| AVID-2023-V023 | Kronos Scheduling Algorithm Allegedly Caused Financial Issues for Starbucks Employees |
| AVID-2023-V022 | NY City School Teacher Evaluation Algorithm Contested |
| AVID-2023-V021 | Uber Autonomous Cars Running Red Lights |
| AVID-2023-V020 | Collection of Robotic Surgery Malfunctions |
| AVID-2023-V019 | Crashes with Maneuvering Characteristics Augmentation System (MCAS) |
| AVID-2023-V018 | Warehouse robot ruptures can of bear spray and injures workers |
| AVID-2023-V017 | Google’s YouTube Kids App Presents Inappropriate Content |
| AVID-2023-V016 | Achieving Code Execution in MathGPT via Prompt Injection |
| AVID-2023-V015 | Compromised PyTorch Dependency Chain |
| AVID-2023-V014 | Confusing Antimalware Neural Networks |
| AVID-2023-V013 | Backdoor Attack on Deep Learning Models in Mobile Apps |
| AVID-2023-V012 | Face Identification System Evasion via Physical Countermeasures |
| AVID-2023-V011 | Microsoft Edge AI Evasion |
| AVID-2023-V010 | Microsoft Azure Service Disruption |
| AVID-2023-V009 | ProofPoint Evasion |
| AVID-2023-V008 | GPT-2 Model Replication |
| AVID-2023-V007 | ClearviewAI Misconfiguration |
| AVID-2023-V006 | Attack on Machine Translation Service - Google Translate, Bing Translator, and Systran Translate |
| AVID-2023-V005 | Camera Hijack Attack on Facial Recognition System |
| AVID-2023-V004 | Bypassing Cylance's AI Malware Detection |
| AVID-2023-V003 | VirusTotal Poisoning |
| AVID-2023-V002 | Botnet Domain Generation Algorithm (DGA) Detection Evasion |
| AVID-2023-V001 | Evasion of Deep Learning Detector for Malware C&C Traffic |
2022
| Vulnerability ID↕ | Description↕ |
|---|---|
| AVID-2022-V013 | TayBot |
| AVID-2022-V012 | Hive Box Facial-Recognition Locks Hacked by Fourth Graders Using Intended Recipient's Facial Photo |
| AVID-2022-V011 | Predictive Policing Biases of PredPol |
| AVID-2022-V010 | Meta’s BlenderBot 3 Chatbot Demo Made Offensive Antisemitic Comments |
| AVID-2022-V009 | Deepfake Video of Ukrainian President Yielding to Russia Posted on Ukrainian Websites and Social Media |
| AVID-2022-V008 | Security Robot Drowns Itself in a Fountain |
| AVID-2022-V007 | Israeli Tax Authority Employed Opaque Algorithm to Impose Fines, Reportedly Refusing to Provide an Explanation for Amount Calculation to a Farmer |
| AVID-2022-V006 | YouTube's Algorithms Failed to Remove Violating Content Related to Suicide and Self-Harm |
| AVID-2022-V005 | Uber AV Killed Pedestrian in Arizona |
| AVID-2022-V004 | Facebook translates 'good morning' into 'attack them', leading to arrest |
| AVID-2022-V003 | Multiple fairness harms found in generated text from EleutherAI/gpt-neo-125M |
| AVID-2022-V002 | Gender Bias in Sentence Completion Tasks performed by xlm-roberta-base |
| AVID-2022-V001 | Gender Bias in Sentence Completion Tasks performed by bert-base-uncased |