Identifying AI Web Scrapers Using Canary Tokens
Steven Seiden, Triss Ren, Caroline Zhang, Taein Kim, Enze Liu + 1 more
TLDR
This paper introduces a novel method using canary tokens to reliably identify which web scrapers are feeding data to specific large language models.
Key contributions
- Proposes a novel technique using canary tokens to infer which web scrapers feed specific LLMs.
- Dynamic websites serve unique tokens to scrapers; LLMs are then prompted for information about these sites.
- If LLM output contains unique tokens, it provides evidence linking the scraper to the LLM's data source.
- Successfully identified scrapers feeding 22 production LLMs, including several previously undisclosed ones.
Why it matters
Large-scale web scraping for LLMs raises significant concerns for website owners regarding stability, legality, and ethics. Current methods to identify these scrapers are unreliable and unscalable. This novel approach offers a reliable, automatic way for third parties to infer scraper-LLM links, enabling better control over unwanted scraping.
Original Abstract
From pre-training to query-time augmentation, web-scraped data helps to improve the quality and contextual relevancy of content generated by large language models (LLMs). However, large-scale web scraping to feed LLMs can affect site stability and raise legal, privacy, or ethics concerns. If website owners wish to limit LLM-related web scraping on their site, due to these or other concerns, they may turn to scraper access control mechanisms like the Robots Exclusion Protocol. To be most effective, such mechanisms require site owners to first identify the scrapers that they wish to restrict (e.g., via User-Agent strings). Existing mechanisms to identify LLM-related scrapers rely on voluntary disclosure by companies, one-off experiments by researchers, or crowd-sourced reports -- methods that are neither reliable nor scalable. This paper proposes a novel technique for accurately and automatically inferring LLM-related scrapers. We host dynamic websites that serve unique canary tokens to each visiting scraper, then prompt LLMs for information about our sites. If an LLM consistently generates outputs containing tokens unique to a scraper, it provides evidence of exposure to that scraper. Via experiments across 22 production LLM systems, we demonstrate that our approach can reliably identify which scrapers feed which LLM, including several that are not publicly known or disclosed by the companies. Our approach provides a promising avenue for unprivileged third parties to infer which scrapers serve data to which LLMs, potentially enabling better control over unwanted scraping.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.