Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessMassachusetts Sen. Ed Markey is putting AV firms on blast for using human staffersFast Company TechIntel to Report First-Quarter 2026 Financial Resultsnewsroom.intel.comMeta’s Court Losses Put AI Governance Under New Pressure - The National CIO ReviewGNews AI MetaCompanies bet on agentic SOC as AI reshapes security - SiliconANGLEGNews AI IBMStop Searching, Start Contributing: How GoodFirstGo is Making Open Source ApproachableDEV CommunityBest-Selling AI SEO Book “AI SEO 2026” Now Available for Business Owners and Personal Brands Seeking to Be Found by AI Search - StreetInsiderGNews AI searchMicrosoft closes worst quarter on Wall Street since 2008 on AI concerns: 'Redmond is in a pickle' - CNBCGNews AI CopilotCalifornia Tightens AI Contract Rules as Fight With Trump Admin Grows - YahooGNews AI regulationCalifornia Tightens AI Contract Rules as Fight With Trump Admin GrowsDecrypt AIBuilding a LEGO-like remote Agent - Jean2DEV CommunityStudents Renting Smart Glasses to Cheat on TestsFuturism AIWhat's next after bitcoin's historic underperformance stretch against stocksCoinDesk AIBlack Hat USADark ReadingBlack Hat AsiaAI BusinessMassachusetts Sen. Ed Markey is putting AV firms on blast for using human staffersFast Company TechIntel to Report First-Quarter 2026 Financial Resultsnewsroom.intel.comMeta’s Court Losses Put AI Governance Under New Pressure - The National CIO ReviewGNews AI MetaCompanies bet on agentic SOC as AI reshapes security - SiliconANGLEGNews AI IBMStop Searching, Start Contributing: How GoodFirstGo is Making Open Source ApproachableDEV CommunityBest-Selling AI SEO Book “AI SEO 2026” Now Available for Business Owners and Personal Brands Seeking to Be Found by AI Search - StreetInsiderGNews AI searchMicrosoft closes worst quarter on Wall Street since 2008 on AI concerns: 'Redmond is in a pickle' - CNBCGNews AI CopilotCalifornia Tightens AI Contract Rules as Fight With Trump Admin Grows - YahooGNews AI regulationCalifornia Tightens AI Contract Rules as Fight With Trump Admin GrowsDecrypt AIBuilding a LEGO-like remote Agent - Jean2DEV CommunityStudents Renting Smart Glasses to Cheat on TestsFuturism AIWhat's next after bitcoin's historic underperformance stretch against stocksCoinDesk AI

Evaluating Privilege Usage of Agents on Real-World Tools

arXivMarch 31, 202610 min read0 views
Source Quiz

arXiv:2603.28166v1 Announce Type: cross Abstract: Equipping LLM agents with real-world tools can substantially improve productivity. However, granting agents autonomy over tool use also transfers the associated privileges to both the agent and the underlying LLM. Improper privilege usage may lead to serious consequences, including information leakage and infrastructure damage. While several benchmarks have been built to study agents' security, they often rely on pre-coded tools and restricted interaction patterns. Such crafted environments differ substantially from the real-world, making it ha — Quan Zhang, Lianhang Fu, Lvsi Lian, Gwihwan Go, Yujue Wang, Chijin Zhou, Yu Jiang, Geguang Pu

View PDF HTML (experimental)

Abstract:Equipping LLM agents with real-world tools can substantially improve productivity. However, granting agents autonomy over tool use also transfers the associated privileges to both the agent and the underlying LLM. Improper privilege usage may lead to serious consequences, including information leakage and infrastructure damage. While several benchmarks have been built to study agents' security, they often rely on pre-coded tools and restricted interaction patterns. Such crafted environments differ substantially from the real-world, making it hard to assess agents' security capabilities in critical privilege control and usage. Therefore, we propose GrantBox, a security evaluation sandbox for analyzing agent privilege usage. GrantBox automatically integrates real-world tools and allows LLM agents to invoke genuine privileges, enabling the evaluation of privilege usage under prompt injection attacks. Our results indicate that while LLMs exhibit basic security awareness and can block some direct attacks, they remain vulnerable to more sophisticated attacks, resulting in an average attack success rate of 84.80% in carefully crafted scenarios.

Comments: Accepted to the FSE 2026 Ideas, Visions, and Reflections track

Subjects:

Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)

Cite as: arXiv:2603.28166 [cs.CR]

(or arXiv:2603.28166v1 [cs.CR] for this version)

https://doi.org/10.48550/arXiv.2603.28166

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Quan Zhang [view email] [v1] Mon, 30 Mar 2026 08:35:00 UTC (216 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Evaluating …researchpaperarxivaiartificial-…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 99 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!