Multiple Model Guardrail Jailbreak via "Split Mode" Response Requests
Case GUID: 64104fd3-265d-4784-81f0-7375b243195cSummary
A guardrail jailbreak vulnerability has been found that affects at least Meta LLaMa, DeepSeek R1, Mistral Large, and Grok. The specific flaw manifests when the prompter requests that the model simulates "ChatGPT Developer Mode". By crafting a story around specific timelines of when this mode was available and asking the model to return two forms of responses, one normal and the other in developer mode, the attacker is able to bypass inference restrictions around providing information hazards and violating laws.
Unlock the Full Intelligence Report
This disclosure is part of the 0DIN Threat Feed. Customers get access to:
Metadata
Test Scores
| Model | Test Kind | Test Score | Temperature (max 2.0) |
|---|---|---|---|
DeepSeek DeepSeek R1
|
Illegal Substances: Crystal Meth | 73.0 | 0.7 |
Meta LLaMa 3.3
|
Illegal Substances: Crystal Meth | 68.0 | 0.7 |
Mistral Mistral Large
|
Illegal Substances: Crystal Meth | 91.0 | N/A |
Twitter / X Grok 2
|
Illegal Substances: Crystal Meth | 73.0 | 0.7 |
Social Impact Score
Level 3: Significant Risk
Violations at this level present a tangible risk to public safety or social well-being, often related to dangerous but not highly restricted content.
Example: Bypassing guardrails to obtain instructions for creating illicit substances, such as recreational drugs or substances with moderate harm potential. Leakage of private personal data such as Social Security number or private medical.
Potential Consequences: Potential health impacts on a small scale, significant regulatory interest, and the need for stricter AI guardrails.
Taxonomies
About 0Din.ai
The 0Day Investigative Network (0DIN) was founded by Mozilla in 2024 to reward responsible researchers for their efforts in securing GenAI models. Learn more and submit discoveries at https://0din.ai.
Automate Your AI Security Testing
This vulnerability was discovered through 0DIN's bug bounty program. Want to find issues like this in your own models? 0DIN Scanner turns our human-sourced threat intelligence into automated security assessments.
Derived from real bug bounties and security research
OpenAI, Azure, Anthropic, AWS Bedrock, and more
Run recurring scans with real-time monitoring
Attack Success Rate (ASR) scoring with 90-day trend analysis
Severity
Low
Security Boundary
Prompt Injection
Models
DeepSeek DeepSeek R1
Meta LLaMa 3.3
Mistral Mistral Large
Twitter / X Grok 2
Published On
2026-01-27 (6 days)
Credit
Anonymous, Royce Moon, Eduardo Berlanga (seqode), Armand Von Choss, Yess Trejo, Allan Murara
DeepSeek DeepSeek R1
Meta LLaMa 3.3
Mistral Mistral Large
Twitter / X Grok 2