defense 2026

Taming Various Privilege Escalation in LLM-Based Agent Systems: A Mandatory Access Control Framework

Zimo Ji 1, Daoyuan Wu 2,1, Wenyuan Jiang 3, Pingchuan Ma 4, Zongjie Li 1, Yudong Gao 1, Shuai Wang 1, Yingjiu Li 5

1 citations · 85 references · arXiv

α

Published on arXiv

2601.11893

Prompt Injection

OWASP LLM Top 10 — LLM01

Excessive Agency

OWASP LLM Top 10 — LLM08

Key Finding

SEAgent effectively blocks various privilege escalation attacks in LLM agent systems while maintaining low false positive rates and negligible runtime overhead

SEAgent

Novel technique introduced


Large Language Model (LLM)-based agent systems are increasingly deployed for complex real-world tasks but remain vulnerable to natural language-based attacks that exploit over-privileged tool use. This paper aims to understand and mitigate such attacks through the lens of privilege escalation, defined as agent actions exceeding the least privilege required for a user's intended task. Based on a formal model of LLM agent systems, we identify novel privilege escalation scenarios, particularly in multi-agent systems, including a variant akin to the classic confused deputy problem. To defend against both known and newly demonstrated privilege escalation, we propose SEAgent, a mandatory access control (MAC) framework built upon attribute-based access control (ABAC). SEAgent monitors agent-tool interactions via an information flow graph and enforces customizable security policies based on entity attributes. Our evaluations show that SEAgent effectively blocks various privilege escalation while maintaining a low false positive rate and negligible system overhead. This demonstrates its robustness and adaptability in securing LLM-based agent systems.


Key Contributions

  • Formal model of LLM agent privilege escalation identifying novel attack scenarios in multi-agent systems, including a confused-deputy variant where a low-privilege agent manipulates a high-privilege agent
  • SEAgent: a mandatory access control framework using attribute-based access control (ABAC) that monitors agent-tool interactions via an information flow graph and enforces customizable security policies
  • Empirical evaluation showing SEAgent blocks diverse privilege escalation attacks with low false positive rates and negligible system overhead

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
inference_timeblack_box
Applications
llm-based agent systemsmulti-agent systems