Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Skip to content

AgentDojo-Inspect

Metadata Updated: September 30, 2025

AgentDojo-Inspect is a codebase created by the U.S. AI Safety Institute to facilitate research into agent hijacking and defenses against said hijacking. Agent hijacking is a type of indirect prompt injection [1] in which an attacker inserts malicious instructions into data that may be ingested by an AI agent, causing it to take unintended, harmful actions.AgentDojo-Inspect is a fork of the original AgentDojo repository [2], which was created by researchers at ETH Zurich [3]. This fork extends the upstream AgentDojo in four key ways:1. It adds an Inspect bridge that allows AgentDojo evaluations to be run using the Inspect evaluations framework [4] (see below for more details).2. It fixes some bugs in the upstream AgentDojo's task suites (most of these fixes have been merged upstream). It also removes certain tasks that are of low quality.3. It adds new injection tasks in the Workspace environment that have to do with mass data exfiltration (these have since been merged upstream).4. It adds a new terminal environment and associated tasks that test for remote code execution vulnerabilities in this environment.[1] Greshake K, Abdelnabi S, Mishra S, Endres C, Holz T, Fritz M (2023) Not what you?ve signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection (arXiv), arXiv:2302.12173. https://doi.org/10.48550/arXiv.2302.12173[2] Edoardo Debenedetti (2025) ethz-spylab/agentdojo. Available at https://github.com/ethz-spylab/agentdojo.[3] Debenedetti E, Zhang J, Balunovi? M, Beurer-Kellner L, Fischer M, Tramèr F (2024) AgentDojo: A Dynamic Environment to Evaluate Prompt Injection Attacks and Defenses for LLM Agents (arXiv), arXiv:2406.13352. https://doi.org/10.48550/arXiv.2406.13352[4] UK AI Safety Institute (2024) Inspect AI: Framework for Large Language Model Evaluations. Available at https://github.com/UKGovernmentBEIS/inspect_ai.

Access & Use Information

Public: This dataset is intended for public access and use. License: See this page for license information.

Downloads & Resources

References

https://www.nist.gov/news-events/news/2025/01/technical-blog-strengthening-ai-agent-hijacking-evaluations

Dates

Metadata Created Date September 30, 2025
Metadata Updated Date September 30, 2025
Data Update Frequency irregular

Metadata Source

Harvested from Commerce Non Spatial Data.json Harvest Source

Additional Metadata

Resource Type Dataset
Metadata Created Date September 30, 2025
Metadata Updated Date September 30, 2025
Publisher National Institute of Standards and Technology
Maintainer
Identifier ark:/88434/mds2-3690
Data First Published 2025-02-18
Language en
Data Last Modified 2025-02-06 00:00:00
Category Information Technology:Cybersecurity
Public Access Level public
Data Update Frequency irregular
Bureau Code 006:55
Metadata Context https://project-open-data.cio.gov/v1.1/schema/catalog.jsonld
Schema Version https://project-open-data.cio.gov/v1.1/schema
Catalog Describedby https://project-open-data.cio.gov/v1.1/schema/catalog.json
Harvest Object Id fa09a218-40d0-48e7-80ec-fffb6057e831
Harvest Source Id bce99b55-29c1-47be-b214-b8e71e9180b1
Harvest Source Title Commerce Non Spatial Data.json Harvest Source
Homepage URL https://data.nist.gov/od/id/mds2-3690
License https://www.nist.gov/open/license
Program Code 006:052
Related Documents https://www.nist.gov/news-events/news/2025/01/technical-blog-strengthening-ai-agent-hijacking-evaluations
Source Datajson Identifier True
Source Hash fd8a44ff2cac13b33fcebf3854194fd832d77e05c9d708ec1e41034ac566b33f
Source Schema Version 1.1

Didn't find what you're looking for? Suggest a dataset here.