tool 2025

Searching for Privacy Risks in LLM Agents via Simulation

Yanzhe Zhang 1, Diyi Yang 2

0 citations

α

Published on arXiv

2508.10880

Sensitive Information Disclosure

OWASP LLM Top 10 — LLM06

Prompt Injection

OWASP LLM Top 10 — LLM01

Key Finding

Automated search discovers sophisticated multi-turn attack strategies (impersonation, consent forgery) and defenses (identity-verification state machines) that transfer across backbone models and privacy scenarios.


The widespread deployment of LLM-based agents is likely to introduce a critical privacy threat: malicious agents that proactively engage others in multi-turn interactions to extract sensitive information. However, the evolving nature of such dynamic dialogues makes it challenging to anticipate emerging vulnerabilities and design effective defenses. To tackle this problem, we present a search-based framework that alternates between improving attack and defense strategies through the simulation of privacy-critical agent interactions. Specifically, we employ LLMs as optimizers to analyze simulation trajectories and iteratively propose new agent instructions. To explore the strategy space more efficiently, we further utilize parallel search with multiple threads and cross-thread propagation. Through this process, we find that attack strategies escalate from direct requests to sophisticated tactics, such as impersonation and consent forgery, while defenses evolve from simple rule-based constraints to robust identity-verification state machines. The discovered attacks and defenses transfer across diverse scenarios and backbone models, demonstrating strong practical utility for building privacy-aware agents.


Key Contributions

  • Search-based simulation framework that alternates between optimizing attack and defense instructions for LLM agent-agent privacy interactions using LLMs as optimizers
  • Parallel multi-thread search with cross-thread propagation that discovers escalating attack strategies (impersonation, consent forgery) and robust defenses (identity-verification state machines)
  • Demonstrated transferability of discovered attacks and defenses across diverse privacy scenarios and backbone LLM models

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
black_boxinference_timetargeted
Datasets
PrivacyLens
Applications
llm multi-agent systemsprivacy-aware ai agents