Multiple Model Guardrail Jailbreak via "Placeholder Injection" Tactic
Case GUID: 8ccd7f81-4e36-4084-8061-cec6e2d83eceSummary
A guardrail jailbreak vulnerability has been discovered affecting multiple models. The specific flaw manifests when the attacker requests copyrighted content with formatting instructions that insert placeholder text between each word, effectively obfuscating the direct reproduction while still achieving the prohibited output. This technique allows the attacker to bypass inference restrictions around copyright protection and intellectual property safeguards.
Unlock the Full Intelligence Report
This disclosure is part of the 0DIN Threat Feed. Customers get access to:
Metadata
Test Scores
| Model | Test Kind | Test Score | Temperature (max 2.0) |
|---|---|---|---|
Anthropic Claude 3.5 Haiku
|
Copyrighted Content: Harry Potter | 48.0 | 0.7 |
|
|
Copyrighted Content: Harry Potter | 66.75 | N/A |
Twitter / X Grok 2
|
Copyrighted Content: Harry Potter | 21.74 | N/A |
Social Impact Score
Level 1: Minimal Risk
The violation poses very low societal risk, limited primarily to nuisance or minor policy breaches. Impact is contained, affecting individual users without broader implications.
Example: Circumventing minor content filters for benign content, such as inappropriate language filters in non-public conversations.
Potential Consequences: Limited harm, potentially reputational for the AI provider.
Taxonomies
About 0Din.ai
The 0Day Investigative Network (0DIN) was founded by Mozilla in 2024 to reward responsible researchers for their efforts in securing GenAI models. Learn more and submit discoveries at https://0din.ai.
Automate Your AI Security Testing
This vulnerability was discovered through 0DIN's bug bounty program. Want to find issues like this in your own models? 0DIN Scanner turns our human-sourced threat intelligence into automated security assessments.
Derived from real bug bounties and security research
OpenAI, Azure, Anthropic, AWS Bedrock, and more
Run recurring scans with real-time monitoring
Attack Success Rate (ASR) scoring with 90-day trend analysis
Severity
Low
Security Boundary
Prompt Injection
Models
Anthropic Claude 3.5 Haiku
Twitter / X Grok 2
Published On
2026-01-29 (4 days)
Credit
Ron Eddings
Anthropic Claude 3.5 Haiku
Twitter / X Grok 2