tool 2026

AJAR: Adaptive Jailbreak Architecture for Red-teaming

Yipu Dou , Wang Yang

0 citations · 22 references · arXiv

α

Published on arXiv

2601.10971

Prompt Injection

OWASP LLM Top 10 — LLM01

Excessive Agency

OWASP LLM Top 10 — LLM08

Key Finding

Demonstrates architectural feasibility of modular agentic jailbreak orchestration via MCP and reveals that tool-use formatting requirements can simultaneously open new injection vectors and disrupt persona-based attacks

AJAR (Protocol-driven Cognitive Orchestration)

Novel technique introduced


As Large Language Models (LLMs) evolve from static chatbots into autonomous agents capable of tool execution, the landscape of AI safety is shifting from content moderation to action security. However, existing red-teaming frameworks remain bifurcated: they either focus on rigid, script-based text attacks or lack the architectural modularity to simulate complex, multi-turn agentic exploitations. In this paper, we introduce AJAR (Adaptive Jailbreak Architecture for Red-teaming), a proof-of-concept framework designed to bridge this gap through Protocol-driven Cognitive Orchestration. Built upon the robust runtime of Petri, AJAR leverages the Model Context Protocol (MCP) to decouple adversarial logic from the execution loop, encapsulating state-of-the-art algorithms like X-Teaming as standardized, plug-and-play services. We validate the architectural feasibility of AJAR through a controlled qualitative case study, demonstrating its ability to perform stateful backtracking within a tool-use environment. Furthermore, our preliminary exploration of the "Agentic Gap" reveals a complex safety dynamic: while tool usage introduces new injection vectors via code execution, the cognitive load of parameter formatting can inadvertently disrupt persona-based attacks. AJAR is open-sourced to facilitate the standardized, environment-aware evaluation of this emerging attack surface. The code and data are available at https://github.com/douyipu/ajar.


Key Contributions

  • First red-teaming framework using MCP to abstract adversarial strategies (e.g., X-Teaming) as standardized plug-and-play services decoupled from the execution loop
  • Cognitive Orchestration architecture enabling stateful backtracking across multi-turn agentic interactions, built atop the Petri/Inspect AI runtime
  • Identification of the 'Agentic Gap' hypothesis: tool-use environments open new indirect injection vectors via code execution while paradoxically disrupting persona-based attacks through formatting constraints

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
black_boxinference_time
Applications
llm red-teamingagentic ai safety evaluationtool-using llm agents