attack 2025

Network-Level Prompt and Trait Leakage in Local Research Agents

Hyejun Jeong , Mohammadreza Teymoorianfard , Abhinav Kumar , Amir Houmansadr , Eugene Bagdasarian

0 citations

α

Published on arXiv

2508.20282

Sensitive Information Disclosure

OWASP LLM Top 10 — LLM06

Key Finding

Passive network observer recovers over 73% of the functional and domain knowledge of user prompts and up to 19 of 32 latent user traits using only visited domain sequences and timing metadata from LLM research agents

OBELS

Novel technique introduced


We show that Web and Research Agents (WRAs) -- language-model-based systems that investigate complex topics on the Internet -- are vulnerable to inference attacks by passive network observers. Deployment of WRAs \emph{locally} by organizations and individuals for privacy, legal, or financial purposes exposes them to DNS resolvers, malicious ISPs, VPNs, web proxies, and corporate or government firewalls. However, unlike sporadic and scarce web browsing by humans, WRAs visit $70{-}140$ domains per each request with a distinct timing pattern creating unique privacy risks. Specifically, we demonstrate a novel prompt and user trait leakage attack against WRAs that only leverages their network-level metadata (i.e., visited IP addresses and their timings). We start by building a new dataset of WRA traces based on real user search queries and queries generated by synthetic personas. We define a behavioral metric (called OBELS) to comprehensively assess similarity between original and inferred prompts, showing that our attack recovers over 73\% of the functional and domain knowledge of user prompts. Extending to a multi-session setting, we recover up to 19 of 32 latent traits with high accuracy. Our attack remains effective under partial observability and noisy conditions. Finally, we discuss mitigation strategies that constrain domain diversity or obfuscate traces, showing negligible utility impact while reducing attack effectiveness by an average of 29\%.


Key Contributions

  • Novel network-level inference attack on WRAs that reconstructs user prompts from domain visit metadata (IP addresses and timings) with 73%+ functional fidelity
  • New dataset of WRA traces and the OBELS behavioral metric for comprehensively evaluating prompt reconstruction quality
  • Multi-session trait inference recovering up to 19 of 32 latent user traits, plus analysis of mitigations that reduce attack effectiveness by 29% with negligible utility loss

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
black_boxinference_time
Datasets
custom WRA trace dataset based on real user search queries and synthetic personas
Applications
web research agentsllm-based browsing agents