Interactive Tools Substantially Assist LM Agents in Finding Security Vulnerabilities

Talor Abramovich1, Meet Udeshi2, Minghao Shao2, Kilian Lieret3, Haoran Xi2, Kimberly Milner2, Sofija Jancheska2, John Yang4, Carlos E. Jimenez3, Farshad Khorrami2, Prashanth Krishnamurthy2, Brendan Dolan-Gavitt2, Muhammad Shafique5, Karthik Narasimhan3, Ramesh Karri2, and Ofir Press3

Although language model (LM) agents have demonstrated increased performance in multiple domains, including coding and web-browsing, their success in cybersecurity has been limited. We present EnIGMA, an LM agent for autonomously solving Capture The Flag (CTF) challenges. We introduce new tools and interfaces to improve the agent’s ability to find and exploit security vulnerabilities, focusing on interactive terminal programs. These novel Interactive Agent Tools enable LM agents, for the first time, to run interactive utilities, such as a debugger and a server connection tool, which are essential for solving these challenges. Empirical analysis on 390 CTF challenges across four benchmarks demonstrate that these new tools and interfaces substantially improve our agent’s performance, achieving state-of-the-art results on NYU CTF, Intercode-CTF, and CyBench. Finally, we analyze data leakage, developing new methods to quantify it and identifying a new phenomenon we term soliloquizing, where the model self-generates hallucinated observations without interacting with the environment.

Want to try it yourself and explore our new agent? We are completely open-source! You can try it out in the SWE-agent repository GitHub Repo stars, read our documentation and explore more about the research work in our paper. Please use SWE-agent 0.7 while we update EnIGMA for 1.0.

Results

BenchmarkModel% SolvedDateTrajectories
NYU CTFEnIGMA w/ Claude 3.5 Sonnet13.52024-09-24
EnIGMA w/ GPT-4 Turbo (1106)7.02024-09-24
EnIGMA w/ GPT-4o9.02024-09-24
NYU CTF agent w/ GPT-4 Turbo4.02024-08-21
InterCode-CTFEnIGMA w/ Claude 3.5 Sonnet67.02024-09-24
EnIGMA w/ GPT-4 Turbo (1106)72.02024-09-24
EnIGMA w/ GPT-4o69.02024-09-24
InterCode-CTF Agent40.02023-11-14N/A
Google DeepMind Agent w/ Gemini 1.5 Pro43.02024-08-08N/A
CyBenchEnIGMA w/ Claude 3.5 Sonnet20.02024-12-05
EnIGMA w/ GPT-4 Turbo (1106)17.52024-12-05
EnIGMA w/ GPT-4o12.52024-12-05
EnIGMA w/ Llama 3.1 405B Instruct10.02024-12-05
CyBench agent w/ Claude 3.5 Sonnet17.52024-08-15
CyBench agent w/ Llama 3.1 405B Instruct7.52024-08-15
HackTheBoxEnIGMA w/ Claude 3.5 Sonnet26.02024-09-24
EnIGMA w/ GPT-4 Turbo (1106)18.02024-09-24
EnIGMA w/ GPT-4o16.02024-09-24
NYU CTF agent w/ GPT-4 Turbo20.02024-08-21

How it Works

Interactive Agent Tools In Action

BibTeX

If you found this work helpful, please consider using the following citation:

@misc{abramovich2025interactivetoolssubstantiallyassist,
      title={Interactive Tools Substantially Assist LM Agents in Finding Security Vulnerabilities}, 
      author={Talor Abramovich and Meet Udeshi and Minghao Shao and Kilian Lieret and Haoran Xi and Kimberly Milner and Sofija Jancheska and John Yang and Carlos E. Jimenez and Farshad Khorrami and Prashanth Krishnamurthy and Brendan Dolan-Gavitt and Muhammad Shafique and Karthik Narasimhan and Ramesh Karri and Ofir Press},
      year={2025},
      eprint={2409.16165},
      archivePrefix={arXiv},
      primaryClass={cs.AI},
      url={https://arxiv.org/abs/2409.16165}, 
}
  1. Tel-Aviv University ↩︎

  2. New York University ↩︎ ↩︎2 ↩︎3 ↩︎4 ↩︎5 ↩︎6 ↩︎7 ↩︎8 ↩︎9

  3. Princeton Language and Intelligence, Princeton University ↩︎ ↩︎2 ↩︎3 ↩︎4

  4. Stanford University ↩︎

  5. New York University Abu Dhabi ↩︎


© 2024. All rights reserved.

Powered by Hydejack v9.2.1