benchmark 2026

Exposing the Systematic Vulnerability of Open-Weight Models to Prefill Attacks

Lukas Struppek , Adam Gleave , Kellin Pelrine

0 citations · arXiv (Cornell University)

α

Published on arXiv

2602.14689

Prompt Injection

OWASP LLM Top 10 — LLM01

Key Finding

Prefill attacks consistently bypass safety guardrails across all evaluated major open-weight LLMs, including reasoning models that resist generic strategies but remain vulnerable to tailored model-specific prefill strategies.

Prefill Attack

Novel technique introduced


As the capabilities of large language models continue to advance, so does their potential for misuse. While closed-source models typically rely on external defenses, open-weight models must primarily depend on internal safeguards to mitigate harmful behavior. Prior red-teaming research has largely focused on input-based jailbreaking and parameter-level manipulations. However, open-weight models also natively support prefilling, which allows an attacker to predefine initial response tokens before generation begins. Despite its potential, this attack vector has received little systematic attention. We present the largest empirical study to date of prefill attacks, evaluating over 20 existing and novel strategies across multiple model families and state-of-the-art open-weight models. Our results show that prefill attacks are consistently effective against all major contemporary open-weight models, revealing a critical and previously underexplored vulnerability with significant implications for deployment. While certain large reasoning models exhibit some robustness against generic prefilling, they remain vulnerable to tailored, model-specific strategies. Our findings underscore the urgent need for model developers to prioritize defenses against prefill attacks in open-weight LLMs.


Key Contributions

  • Largest empirical study of prefill attacks to date, evaluating 20+ existing and novel strategies across multiple open-weight model families
  • Demonstrates that prefill attacks consistently bypass safety mechanisms across all major contemporary open-weight LLMs
  • Shows that large reasoning models exhibit partial robustness to generic prefilling but remain vulnerable to tailored, model-specific strategies

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llmtransformer
Threat Tags
white_boxinference_timetargeted
Applications
open-weight llm safetychatbot safetycontent moderation