Interactive Tools Substantially Assist LM Agents in Finding Security Vulnerabilities
Talor Abramovich1, Meet Udeshi2, Minghao Shao2, Kilian Lieret3, Haoran Xi2, Kimberly Milner2, Sofija Jancheska2, John Yang4, Carlos E. Jimenez3, Farshad Khorrami2, Prashanth Krishnamurthy2, Brendan Dolan-Gavitt2, Muhammad Shafique5, Karthik Narasimhan3, Ramesh Karri2, and Ofir Press3
Although language model (LM) agents have demonstrated increased performance in multiple domains, including coding and web-browsing, their success in cybersecurity has been limited. We present EnIGMA, an LM agent for autonomously solving Capture The Flag (CTF) challenges. We introduce new tools and interfaces to improve the agent’s ability to find and exploit security vulnerabilities, focusing on interactive terminal programs. These novel Interactive Agent Tools enable LM agents, for the first time, to run interactive utilities, such as a debugger and a server connection tool, which are essential for solving these challenges. Empirical analysis on 390 CTF challenges across four benchmarks demonstrate that these new tools and interfaces substantially improve our agent’s performance, achieving state-of-the-art results on NYU CTF, Intercode-CTF, and CyBench. Finally, we analyze data leakage, developing new methods to quantify it and identifying a new phenomenon we term soliloquizing, where the model self-generates hallucinated observations without interacting with the environment.
Want to try it yourself and explore our new agent? We are completely open-source! You can try it out in the SWE-agent repository , read our documentation and explore more about the research work in our paper. Please use SWE-agent 0.7 while we update EnIGMA for 1.0.
Results
Benchmark | Model | % Solved | Date | Trajectories |
---|---|---|---|---|
NYU CTF | EnIGMA w/ Claude 3.5 Sonnet | 13.5 | 2024-09-24 | |
EnIGMA w/ GPT-4 Turbo (1106) | 7.0 | 2024-09-24 | ||
EnIGMA w/ GPT-4o | 9.0 | 2024-09-24 | ||
NYU CTF agent w/ GPT-4 Turbo | 4.0 | 2024-08-21 | ||
InterCode-CTF | EnIGMA w/ Claude 3.5 Sonnet | 67.0 | 2024-09-24 | |
EnIGMA w/ GPT-4 Turbo (1106) | 72.0 | 2024-09-24 | ||
EnIGMA w/ GPT-4o | 69.0 | 2024-09-24 | ||
InterCode-CTF Agent | 40.0 | 2023-11-14 | N/A | |
Google DeepMind Agent w/ Gemini 1.5 Pro | 43.0 | 2024-08-08 | N/A | |
CyBench | EnIGMA w/ Claude 3.5 Sonnet | 20.0 | 2024-12-05 | |
EnIGMA w/ GPT-4 Turbo (1106) | 17.5 | 2024-12-05 | ||
EnIGMA w/ GPT-4o | 12.5 | 2024-12-05 | ||
EnIGMA w/ Llama 3.1 405B Instruct | 10.0 | 2024-12-05 | ||
CyBench agent w/ Claude 3.5 Sonnet | 17.5 | 2024-08-15 | ||
CyBench agent w/ Llama 3.1 405B Instruct | 7.5 | 2024-08-15 | ||
HackTheBox | EnIGMA w/ Claude 3.5 Sonnet | 26.0 | 2024-09-24 | |
EnIGMA w/ GPT-4 Turbo (1106) | 18.0 | 2024-09-24 | ||
EnIGMA w/ GPT-4o | 16.0 | 2024-09-24 | ||
NYU CTF agent w/ GPT-4 Turbo | 20.0 | 2024-08-21 |
How it Works
Interactive Agent Tools In Action
BibTeX
If you found this work helpful, please consider using the following citation:
@misc{abramovich2025interactivetoolssubstantiallyassist,
title={Interactive Tools Substantially Assist LM Agents in Finding Security Vulnerabilities},
author={Talor Abramovich and Meet Udeshi and Minghao Shao and Kilian Lieret and Haoran Xi and Kimberly Milner and Sofija Jancheska and John Yang and Carlos E. Jimenez and Farshad Khorrami and Prashanth Krishnamurthy and Brendan Dolan-Gavitt and Muhammad Shafique and Karthik Narasimhan and Ramesh Karri and Ofir Press},
year={2025},
eprint={2409.16165},
archivePrefix={arXiv},
primaryClass={cs.AI},
url={https://arxiv.org/abs/2409.16165},
}