Genesis: Evolving Attack Strategies for LLM Web Agent Red-Teaming
Zheng Zhang 1, Jiarui He 1, Yuchen Cai 1, Deheng Ye 2, Peilin Zhao 3, Ruili Feng 4, Hao Wang 1
Published on arXiv
2510.18314
Prompt Injection
OWASP LLM Top 10 — LLM01
Excessive Agency
OWASP LLM Top 10 — LLM08
Key Finding
Genesis consistently outperforms existing attack baselines across diverse web tasks by discovering novel, generalizable adversarial injection strategies
Genesis
Novel technique introduced
As large language model (LLM) agents increasingly automate complex web tasks, they boost productivity while simultaneously introducing new security risks. However, relevant studies on web agent attacks remain limited. Existing red-teaming approaches mainly rely on manually crafted attack strategies or static models trained offline. Such methods fail to capture the underlying behavioral patterns of web agents, making it difficult to generalize across diverse environments. In web agent attacks, success requires the continuous discovery and evolution of attack strategies. To this end, we propose Genesis, a novel agentic framework composed of three modules: Attacker, Scorer, and Strategist. The Attacker generates adversarial injections by integrating the genetic algorithm with a hybrid strategy representation. The Scorer evaluates the target web agent's responses to provide feedback. The Strategist dynamically uncovers effective strategies from interaction logs and compiles them into a continuously growing strategy library, which is then re-deployed to enhance the Attacker's effectiveness. Extensive experiments across various web tasks show that our framework discovers novel strategies and consistently outperforms existing attack baselines.
Key Contributions
- Genesis framework with three modules (Attacker, Scorer, Strategist) that automates red-teaming of LLM web agents through evolving adversarial injections
- Genetic algorithm integrated with a hybrid strategy representation to continuously generate and refine adversarial HTML injections
- Strategist module that dynamically distills effective attack strategies from interaction logs into a growing, reusable strategy library