FlashRT: Towards Computationally and Memory Efficient Red-Teaming for Prompt Injection and Knowledge Corruption
Yanting Wang , Chenlong Yin , Ying Chen , Jinyuan Jia
Published on arXiv
2604.28157
Prompt Injection
OWASP LLM Top 10 — LLM01
Red-Team Agents
LLMs for Security — LS06
Benchmarks & Evaluation
LLMs for Security — LS10
Key Finding
Reduces runtime from one hour to less than ten minutes and GPU memory from 264.1 GB to 65.7 GB for 32K token context attacks
FlashRT
Novel technique introduced
Long-context large language models (LLMs)-for example, Gemini-3.1-Pro and Qwen-3.5-are widely used to empower many real-world applications, such as retrieval-augmented generation, autonomous agents, and AI assistants. However, security remains a major concern for their widespread deployment, with threats such as prompt injection and knowledge corruption. To quantify the security risks faced by LLMs under these threats, the research community has developed heuristic-based and optimization-based red-teaming methods. Optimization-based methods generally produce stronger attacks than heuristic attacks and thus provide a more rigorous assessment of LLM security risks. However, they are often resource-intensive, requiring significant computation and GPU memory, especially for long context scenarios. The resource-intensive nature poses a major obstacle for the community (especially academic researchers) to systematically evaluate the security risks of long-context LLMs and assess the effectiveness of defense strategies at scale. In this work, we propose FlashRT, the first framework to improve the efficiency (in terms of both computation and memory) for optimization-based prompt injection and knowledge corruption attacks under long-context LLMs. Through extensive evaluations, we find that FlashRT consistently delivers a 2x-7x speedup (e.g., reducing runtime from one hour to less than ten minutes) and a 2x-4x reduction in GPU memory consumption (e.g., reducing from 264.1 GB to 65.7 GB GPU memory for a 32K token context) compared to state-of-the-art baseline nanoGCG. FlashRT can be broadly applied to black-box optimization methods, such as TAP and AutoDAN. We hope FlashRT can serve as a red-teaming tool to enable systematic evaluation of long-context LLM security. The code is available at: https://github.com/Wang-Yanting/FlashRT
Key Contributions
- First framework to improve efficiency of optimization-based prompt injection and knowledge corruption attacks for long-context LLMs
- Achieves 2-7x speedup and 2-4x reduction in GPU memory consumption compared to nanoGCG
- Broadly applicable to black-box optimization methods like TAP and AutoDAN