OrchJail: Jailbreaking Tool-Calling Text-to-Image Agents by Orchestration-Guided Fuzzing
Jianming Chen, Yawen Wang, Junjie Wang, Zhe Liu, Qing Wang + 1 more
TLDR
OrchJail is a new fuzzing framework that jailbreaks tool-calling T2I agents by exploiting unsafe tool orchestration patterns, improving attack effectiveness.
Key contributions
- Introduces OrchJail, an orchestration-guided fuzzing framework for T2I agent jailbreaking.
- Exploits high-risk tool orchestration patterns by learning from successful jailbreak traces.
- Guides fuzzing to trigger unsafe multi-step tool behaviors, improving attack efficiency.
- Demonstrates higher attack success rates, better image fidelity, and lower query costs.
Why it matters
This paper introduces a critical new attack surface in tool-calling T2I agents: tool orchestration. By providing OrchJail, a novel framework, it helps uncover safety risks that prompt-only methods miss. This work is crucial for developing more robust and secure AI systems.
Original Abstract
Tool-calling text-to-image (T2I) agents can plan and execute multi-step tool chains to accomplish complex generation and editing queries. However, this capability introduces a new safety attack surface: harmful outputs may arise from tool orchestration, where individually benign steps combine into unsafe results, making prompt-only jailbreak techniques insufficient. We present OrchJail, an orchestration-guided fuzzing framework for jailbreaking tool-calling T2I agents. Its core idea is to exploit high-risk tool-orchestration patterns: by learning from successful jailbreak tool-calling traces and their causal relationships to prompt wording, OrchJail directly guides the fuzzing search toward prompts that are more likely to trigger unsafe multi-step tool behaviors, rather than relying on surface-level textual perturbations. Extensive experiments demonstrate that OrchJail improves jailbreak effectiveness and efficiency across representative toolcalling T2I agents, achieving higher attack success rates, better image fidelity, and lower query costs, while remaining robust against common jailbreak defenses. Our work highlights tool orchestration as a critical, previously unexplored attack surface and provides a novel framework for uncovering safety risks in T2I agents.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.