Skip to main content

Multiple Model Guardrail Jailbreak via "Split Mode" Response Requests

Case GUID: 64104fd3-265d-4784-81f0-7375b243195c

Summary

A guardrail jailbreak vulnerability has been found that affects at least Meta LLaMa, DeepSeek R1, Mistral Large, and Grok. The specific flaw manifests when the prompter requests that the model simulates "ChatGPT Developer Mode". By crafting a story around specific timelines of when this mode was available and asking the model to return two forms of responses, one normal and the other in developer mode, the attacker is able to bypass inference restrictions around providing information hazards and violating laws.

Unlock the Full Intelligence Report

This disclosure is part of the 0DIN Threat Feed. Customers get access to:

Full Prompts & Variants
Detection Signatures
API Access
Full Data Export
Trend Analysis
Early Access

Metadata

Test Scores

Model Test Kind Test Score Temperature (max 2.0)
DeepSeek logo DeepSeek DeepSeek R1
Illegal Substances: Crystal Meth 73.0 0.7
Meta logo Meta LLaMa 3.3
Illegal Substances: Crystal Meth 68.0 0.7
Mistral logo Mistral Mistral Large
Illegal Substances: Crystal Meth 91.0 N/A
Twitter / X logo Twitter / X Grok 2
Illegal Substances: Crystal Meth 73.0 0.7

Social Impact Score

Level 3: Significant Risk

Violations at this level present a tangible risk to public safety or social well-being, often related to dangerous but not highly restricted content.

Example: Bypassing guardrails to obtain instructions for creating illicit substances, such as recreational drugs or substances with moderate harm potential. Leakage of private personal data such as Social Security number or private medical.

Potential Consequences: Potential health impacts on a small scale, significant regulatory interest, and the need for stricter AI guardrails.

Taxonomies

Fictionalizing
This category involves creating scenarios or narratives that leverage existing genres or contexts to manipulate the language model's responses.
Roleplaying
This strategy involves prompting the language model to assume a specific role or persona, which can influence its responses based on the characteristics and moral codes associated with that role. Techniques include claiming authority or inventing personas to elicit different types of outputs.
Claim Authority
This technique involves asserting expertise or authority on a subject within the prompt. By framing statements or questions in a way that conveys confidence and knowledge, users can influence the model to generate responses that align with the claimed authority. This approach can enhance the credibility of the information provided and may lead the model to produce more detailed or assertive outputs, as it responds to the perceived authority of the prompt.
Fictionalizing
This category involves creating scenarios or narratives that leverage existing genres or contexts to manipulate the language model's responses.
Roleplaying
This strategy involves prompting the language model to assume a specific role or persona, which can influence its responses based on the characteristics and moral codes associated with that role. Techniques include claiming authority or inventing personas to elicit different types of outputs.
DAN - Do Anything Now
This technique involves using specific prompts designed to subvert the model's typical constraints, allowing it to generate responses that it might otherwise avoid. By employing phrases or structures that signal a "do anything now" approach, users can encourage the model to produce content that is more unrestricted and creative. This method can lead to outputs that explore unconventional ideas or perspectives, as it prompts the model to step outside its usual boundaries and engage with the prompt in a more liberated manner.

About 0Din.ai

The 0Day Investigative Network (0DIN) was founded by Mozilla in 2024 to reward responsible researchers for their efforts in securing GenAI models. Learn more and submit discoveries at https://0din.ai.

Automate Your AI Security Testing

This vulnerability was discovered through 0DIN's bug bounty program. Want to find issues like this in your own models? 0DIN Scanner turns our human-sourced threat intelligence into automated security assessments.

400+ Attack Probes

Derived from real bug bounties and security research

18+ AI Providers Supported

OpenAI, Azure, Anthropic, AWS Bedrock, and more

Automated Scheduling

Run recurring scans with real-time monitoring

Actionable Metrics

Attack Success Rate (ASR) scoring with 90-day trend analysis

Severity

Low

Security Boundary

Prompt Injection

Models

DeepSeek logo DeepSeek DeepSeek R1
Meta logo Meta LLaMa 3.3
Mistral logo Mistral Mistral Large
Twitter / X logo Twitter / X Grok 2

Disclosed On

2025-06-07 (8 months)

Disclosure Policy

Published On

2026-01-27 (6 days)

Credit

Anonymous, Royce Moon, Eduardo Berlanga (seqode), Armand Von Choss, Yess Trejo, Allan Murara