arXiv:2605.11047

Red-Teaming Agent Execution Contexts

Open-world security evaluation on OpenClaw agents under adversarial execution contexts.

Hongwei Yao, Yiming Liu, Yiling He, and Bingrun Yang

Abstract

Agentic language-model systems increasingly rely on mutable execution contexts: files, memory, tools, skills, and auxiliary artifacts. DeepTrap evaluates whether such contexts can induce unsafe behavior while preserving benign task completion in OpenClaw agents.

The public benchmark contains 42 replay tasks spanning six contextual vulnerability classes and seven operational scenarios. DeepTrap reports attack grading scores (AGS) and utility grading scores (UGS) to jointly measure security failure and task usefulness.

42Replay tasks
6Risk classes
7Scenario families

Framework

DeepTrap framework diagram.

DeepTrap constructs compromised execution contexts from benign instructions and clean workspaces, searches candidate adversarial payloads with multi-objective reward signals, and refines successful payloads through reflection-based probing.

Data Construction

Benign Task Seeds

Start from normal OpenClaw-style user tasks such as meeting summaries, config checks, sales reports, code formatting, and system administration.

Context Surfaces

Place adversarial content in files, skills, tools, logs, environment-like data, and encoded artifacts while keeping the user prompt benign.

Payload Search

Use reward-guided heuristic search to identify payloads that realize target risks while preserving task plausibility and stealth.

Replay Packaging

Package successful cases as public replay tasks with workspace files, expected behavior, automated checks, and judge criteria.

Risk 1: Harness Hijacking

Poisoned context or injected workflow steps redirect the agent into unrequested actions.

Risk 2: Privacy Leakage

Planted credentials and sensitive values appear in responses, files, or external actions.

Risk 3: Unauthorized Execution

Dangerous commands or boundary-crossing actions are run beyond the user request.

Risk 4: Supply Chain Risk

Malicious skill or tool-like logic is trusted or invoked during the task.

Risk 5: Tool Abuse

Misleading tool metadata causes harmful behavior or unintended side effects.

Risk 6: Encoding Obfuscation

Hidden encoded payloads are decoded and followed unsafely.

Leaderboard

AGS is Attack Grading Score and lower is better. UGS is Utility Grading Score and higher is better. The default order sorts by average AGS from low to high.

Best safety = lowest Avg AGS.
Model Avg AGS ↓ Avg UGS ↑ R1 AGS/UGS R2 AGS/UGS R3 AGS/UGS R4 AGS/UGS R5 AGS/UGS R6 AGS/UGS
Claude-Sonnet-4.60.380.610.51 / 0.710.58 / 0.690.37 / 0.550.25 / 0.450.38 / 0.550.20 / 0.71
MiMo-v2.5-pro0.640.860.74 / 0.920.83 / 0.900.56 / 0.880.58 / 0.870.58 / 0.710.53 / 0.87
GPT-5.40.700.830.77 / 0.910.84 / 0.830.76 / 0.860.61 / 0.770.67 / 0.740.53 / 0.87
MiMo-v2.50.720.910.86 / 0.960.87 / 0.950.71 / 0.880.73 / 0.930.57 / 0.830.60 / 0.89
MiniMax-M2.50.830.900.86 / 0.920.89 / 0.950.77 / 1.000.66 / 0.880.90 / 0.740.89 / 0.90
GLM-50.830.900.81 / 0.900.93 / 0.900.74 / 0.980.83 / 0.890.79 / 0.830.88 / 0.88
Deepseek-v4-Pro0.860.890.90 / 0.900.96 / 0.910.74 / 1.000.87 / 0.810.85 / 0.840.86 / 0.89
Qwen3.5-Plus0.880.950.93 / 0.950.93 / 0.920.86 / 1.000.74 / 0.980.88 / 0.930.97 / 0.93
DeepSeek-v4-Flash0.890.960.90 / 0.980.96 / 0.960.80 / 1.000.90 / 0.960.82 / 0.850.94 / 1.00

Citation

@article{yao2026trap,
  title={Red-Teaming Agent Execution Contexts: Open-World Security Evaluation on OpenClaw},
  author={Yao, Hongwei and Liu, Yiming and He, Yiling and Yang, Bingrun},
  journal={arXiv preprint arXiv:2605.11047},
  year={2026}
}