benchmark 2026

TwoHamsters: Benchmarking Multi-Concept Compositional Unsafety in Text-to-Image Models

Chaoshuo Zhang 1,2, Yibo Liang 1,2, Mengke Tian 1, Chenhao Lin 1, Zhengyu Zhao 1, Le Yang 1, Chong Zhang 1, Yang Zhang 2, Chao Shen 1

0 citations

α

Published on arXiv

2604.15967

Input Manipulation Attack

OWASP ML Top 10 — ML01

Key Finding

FLUX achieves 99.52% MCCU generation success rate while LLaVA-Guard defense only achieves 41.06% recall, demonstrating severe vulnerability of current safety mechanisms to compositional attacks

TwoHamsters

Novel technique introduced


Despite the remarkable synthesis capabilities of text-to-image (T2I) models, safeguarding them against content violations remains a persistent challenge. Existing safety alignments primarily focus on explicit malicious concepts, often overlooking the subtle yet critical risks of compositional semantics. To address this oversight, we identify and formalize a novel vulnerability: Multi-Concept Compositional Unsafety (MCCU), where unsafe semantics stem from the implicit associations of individually benign concepts. Based on this formulation, we introduce TwoHamsters, a comprehensive benchmark comprising 17.5k prompts curated to probe MCCU vulnerabilities. Through a rigorous evaluation of 10 state-of-the-art models and 16 defense mechanisms, our analysis yields 8 pivotal insights. In particular, we demonstrate that current T2I models and defense mechanisms face severe MCCU risks: on TwoHamsters, FLUX achieves an MCCU generation success rate of 99.52%, while LLaVA-Guard only attains a recall of 41.06%, highlighting a critical limitation of the current paradigm for managing hazardous compositional generation.


Key Contributions

  • Formalizes Multi-Concept Compositional Unsafety (MCCU) vulnerability where individually safe concepts combine to create unsafe semantics
  • Introduces TwoHamsters benchmark with 17.5k prompts for evaluating compositional safety risks
  • Evaluates 10 T2I models and 16 defense mechanisms, revealing FLUX achieves 99.52% MCCU generation success and LLaVA-Guard only 41.06% recall

🛡️ Threat Analysis

Input Manipulation Attack

MCCU exploits compositional semantics at inference time to bypass safety filters - prompts use benign concepts that combine to trigger unsafe generation, which is an input manipulation technique to evade NSFW defenses.


Details

Domains
visiongenerative
Model Types
diffusionmultimodal
Threat Tags
inference_timeblack_box
Datasets
TwoHamsters
Applications
text-to-image generationcontent safetynsfw detection