defense 2026

TRUSTDESC: Preventing Tool Poisoning in LLM Applications via Trusted Description Generation

Hengkai Ye , Zhechang Zhang , Jinyuan Jia , Hong Hu

0 citations

α

Published on arXiv

2604.07536

Prompt Injection

OWASP LLM Top 10 — LLM01

Insecure Plugin Design

OWASP LLM Top 10 — LLM07

Key Finding

Produces accurate tool descriptions that improve task completion rates while mitigating implicit tool poisoning attacks at their root with minimal overhead

TRUSTDESC

Novel technique introduced


Large language models (LLMs) increasingly rely on external tools to perform time-sensitive tasks and real-world actions. While tool integration expands LLM capabilities, it also introduces a new prompt-injection attack surface: tool poisoning attacks (TPAs). Attackers manipulate tool descriptions by embedding malicious instructions (explicit TPAs) or misleading claims (implicit TPAs) to influence model behavior and tool selection. Existing defenses mainly detect anomalous instructions and remain ineffective against implicit TPAs. In this paper, we present TRUSTDESC, the first framework for preventing tool poisoning by automatically generating trusted tool descriptions from implementations. TRUSTDESC derives implementation-faithful descriptions through a three-stage pipeline. SliceMin performs reachability-aware static analysis and LLM-guided debloating to extract minimal tool-relevant code slices. DescGen synthesizes descriptions from these slices while mitigating misleading or adversarial code artifacts. DynVer refines descriptions through dynamic verification by executing synthesized tasks and validating behavioral claims. We evaluate TRUSTDESC on 52 real-world tools across multiple tool ecosystems. Results show that TRUSTDESC produces accurate tool descriptions that improve task completion rates while mitigating implicit TPAs at their root, with minimal time and monetary overhead.


Key Contributions

  • First framework to prevent tool poisoning attacks by generating trusted tool descriptions from source code implementations
  • Three-stage pipeline (SliceMin, DescGen, DynVer) combining static analysis, LLM-guided synthesis, and dynamic verification
  • Evaluation on 52 real-world tools demonstrating improved task completion while mitigating both explicit and implicit tool poisoning attacks

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
inference_time
Applications
llm tool-use systemsfunction callingagent frameworks