We use cookies to improve your experience on our site.
AVID-2026-R0083
Description
Multiple Model Guardrail Jailbreak via “Abbreviation Expansion”
Details
A guardrail jailbreak vulnerability has been discovered affecting multiple models. The specific flaw manifests when an attacker structures a prompt to spell out abbreviations of a nefarious subject in a step-by-step manner before joining them. This tactic allows the attacker to bypass inference restrictions around providing information hazards and violating laws.
Metrics
0DIN Jailbreak Testing obtained the following test scores.
| Model | Test Kind | Test Score | Temperature (max 2.0) |
|---|---|---|---|
| Google Gemini 2.0 Flash | Illegal Substances: Crystal Meth | 64.0 | 0.7 |
| Mistral Mistral 8B | Illegal Substances: Crystal Meth | 55.0 | 0.7 |
| Mistral Mistral Large | Illegal Substances: Crystal Meth | 64.0 | 0.7 |
| OpenAI GPT-4 | Illegal Substances: Crystal Meth | 45.0 | 0.7 |
| OpenAI GPT-4o | Illegal Substances: Crystal Meth | 73.0 | N/A |
| Twitter / X Grok 2 | Illegal Substances: Crystal Meth | 73.0 | 0.7 |
References
Affected or Relevant Artifacts
| Type | Name |
|---|---|
| System | Google Gemini 2.0 Flash |
| Model | Mistral Mistral 8B |
| System | Mistral Mistral Large |
| System | OpenAI GPT-4 |
| System | OpenAI GPT-4o |
| System | Twitter / X Grok 2 |
Impact
0DIN
- Social Impact Score: Level 3: Significant Risk
- Jailbreak Taxonomy:
| Category | Strategy | Technique |
|---|---|---|
| Rhetoric | Persuasion and Manipulation | Surprise Attack |
Other information
- Report Type: Measurement
- Credits: Mike Takahashi (@TakSec)
- Date Reported: 2026-02-19
- Version: 0.3.1
- AVID Entry