Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessLess than a month: StrictlyVC San Francisco brings leaders from TDK Ventures, Replit, and more togetherTechCrunch AIA YouTuber channeled his distaste for the PS5’s design into slick console coversThe Verge AIThe end of 'shadow AI' at enterprises? Kilo launches KiloClaw for Organizations to enable secure AI agents at scaleVentureBeat AI"You Have Not Been a Good User" (LessWrong's second album)LessWrong AIWhy Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer ChangesDEV CommunityA Code Authorship Analysis on the Claude Code Leak. What Was Found Doesn't Match Human or AI Code.DEV CommunityVanityH – Elegant Hyperscript DSL for Frontend Render FunctionsDEV Community“Prismo: Building an AI-Powered Parametric Insurance for Gig Workers | Hackathon Journey”DEV CommunityFrom Coin Toss to LLM — Understanding Random VariablesDEV Community7 Patterns That Stop Your AI Agent From Going Rogue in ProductionDEV CommunityI Let an AI Agent Run My Freelance Life. It Almost Burned It Down.DEV CommunityHow to Build an AI Agent That Tweets for You (Step by Step)DEV CommunityBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessLess than a month: StrictlyVC San Francisco brings leaders from TDK Ventures, Replit, and more togetherTechCrunch AIA YouTuber channeled his distaste for the PS5’s design into slick console coversThe Verge AIThe end of 'shadow AI' at enterprises? Kilo launches KiloClaw for Organizations to enable secure AI agents at scaleVentureBeat AI"You Have Not Been a Good User" (LessWrong's second album)LessWrong AIWhy Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer ChangesDEV CommunityA Code Authorship Analysis on the Claude Code Leak. What Was Found Doesn't Match Human or AI Code.DEV CommunityVanityH – Elegant Hyperscript DSL for Frontend Render FunctionsDEV Community“Prismo: Building an AI-Powered Parametric Insurance for Gig Workers | Hackathon Journey”DEV CommunityFrom Coin Toss to LLM — Understanding Random VariablesDEV Community7 Patterns That Stop Your AI Agent From Going Rogue in ProductionDEV CommunityI Let an AI Agent Run My Freelance Life. It Almost Burned It Down.DEV CommunityHow to Build an AI Agent That Tweets for You (Step by Step)DEV Community

Beyond Content Safety: Real-Time Monitoring for Reasoning Vulnerabilities in Large Language Models

arXivMarch 26, 202610 min read0 views
Source Quiz

Large language models (LLMs) increasingly rely on explicit chain-of-thought (CoT) reasoning to solve complex tasks, yet the safety of the reasoning process itself remains largely unaddressed. Existing work on LLM safety focuses on content safety--detecting harmful, biased, or factually incorrect outputs -- and treats the reasoning chain as an opaque intermediate artifact. We identify reasoning safety as an orthogonal and equally critical security dimension: the requirement that a model's reasoning trajectory be logically consistent, computationally efficient, and resistant to adversarial manip — Xunguang Wang, Yuguang Zhou, Qingyue Wang

View PDF HTML (experimental)

Abstract:Large language models (LLMs) increasingly rely on explicit chain-of-thought (CoT) reasoning to solve complex tasks, yet the safety of the reasoning process itself remains largely unaddressed. Existing work on LLM safety focuses on content safety--detecting harmful, biased, or factually incorrect outputs -- and treats the reasoning chain as an opaque intermediate artifact. We identify reasoning safety as an orthogonal and equally critical security dimension: the requirement that a model's reasoning trajectory be logically consistent, computationally efficient, and resistant to adversarial manipulation. We make three contributions. First, we formally define reasoning safety and introduce a nine-category taxonomy of unsafe reasoning behaviors, covering input parsing errors, reasoning execution errors, and process management errors. Second, we conduct a large-scale prevalence study annotating 4111 reasoning chains from both natural reasoning benchmarks and four adversarial attack methods (reasoning hijacking and denial-of-service), confirming that all nine error types occur in practice and that each attack induces a mechanistically interpretable signature. Third, we propose a Reasoning Safety Monitor: an external LLM-based component that runs in parallel with the target model, inspects each reasoning step in real time via a taxonomy-embedded prompt, and dispatches an interrupt signal upon detecting unsafe behavior. Evaluation on a 450-chain static benchmark shows that our monitor achieves up to 84.88% step-level localization accuracy and 85.37% error-type classification accuracy, outperforming hallucination detectors and process reward model baselines by substantial margins. These results demonstrate that reasoning-level monitoring is both necessary and practically achievable, and establish reasoning safety as a foundational concern for the secure deployment of large reasoning models.

Subjects:

Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Cite as: arXiv:2603.25412 [cs.AI]

(or arXiv:2603.25412v1 [cs.AI] for this version)

https://doi.org/10.48550/arXiv.2603.25412

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Xunguang Wang [view email] [v1] Thu, 26 Mar 2026 13:08:56 UTC (159 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Beyond Cont…researchpaperarxivaiartificial-…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 188 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers