Hackers or Hallucinators? A Comprehensive Analysis of LLM-Based Automated Penetration Testing

📅 2026-04-07
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study addresses the current lack of systematic architectural analysis and large-scale empirical comparison of large language model–driven automated penetration testing (AutoPT) frameworks under a unified benchmark. Adopting a Systematization of Knowledge (SoK) approach, it proposes the first structured taxonomy encompassing six key dimensions: agent architecture, planning, memory, execution, external knowledge integration, and evaluation benchmarks. The work conducts extensive experiments on 15 prominent AutoPT frameworks—including 13 open-source systems and 2 baselines—within a standardized penetration testing environment. Consuming over 10 billion tokens and producing more than 1,500 expert-reviewed execution logs, the study establishes the largest empirical evaluation benchmark to date, offering the community a reliable reference and clear guidance for future research directions.
📝 Abstract
The rapid advancement of Large Language Models (LLMs) has created new opportunities for Automated Penetration Testing (AutoPT), spawning numerous frameworks aimed at achieving end-to-end autonomous attacks. However, despite the proliferation of related studies, existing research generally lacks systematic architectural analysis and large-scale empirical comparisons under a unified benchmark. Therefore, this paper presents the first Systematization of Knowledge (SoK) focusing on the architectural design and comprehensive empirical evaluation of current LLM-based AutoPT frameworks. At systematization level, we comprehensively review existing framework designs across six dimensions: agent architecture, agent plan, agent memory, agent execution, external knowledge, and benchmarks. At empirical level, we conduct large-scale experiments on 13 representative open-source AutoPT frameworks and 2 baseline frameworks utilizing a unified benchmark. The experiments consumed over 10 billion tokens in total and generated more than 1,500 execution logs, which were manually reviewed and analyzed over four months by a panel of more than 15 researchers with expertise in cybersecurity. By investigating the latest progress in this rapidly developing field, we provide researchers with a structured taxonomy to understand existing LLM-based AutoPT frameworks and a large-scale empirical benchmark, along with promising directions for future research.
Problem

Research questions and friction points this paper is trying to address.

Automated Penetration Testing
Large Language Models
Systematization of Knowledge
Empirical Evaluation
Cybersecurity
Innovation

Methods, ideas, or system contributions that make the work stand out.

Systematization of Knowledge
LLM-based Automated Penetration Testing
Unified Benchmark
Empirical Evaluation
Agent Architecture
🔎 Similar Papers
J
Jiaren Peng
School of Cyber Science and Engineering, Sichuan University, China
Z
Zeqin Li
School of Cyber Science and Engineering, Sichuan University, China
C
Chang You
School of Cyber Science and Engineering, Sichuan University, China
Yan Wang
Yan Wang
Sichuan University
Hanlin Sun
Hanlin Sun
NORDITA, Stockholm University and KTH Royal Institute of Technology
Network theoryStatistical MechanicsPercolation
Xuan Tian
Xuan Tian
JD Capital Chair Professor of Finance, PBC School of Finance, Tsinghua University
Corporate FinanceVenture CapitalInnovationIPOs
S
Shuqiao Zhang
Institute for Network Sciences and Cyberspace, Tsinghua University, China
J
Junyi Liu
School of Cyber Science and Engineering, Sichuan University, China
Jianguo Zhao
Jianguo Zhao
Associate Professor, Mechanical Engineering, Colorado State University
RoboticsControlBio-Inspired RoboticsMechatronicsVisual Servoing
Renyang Liu
Renyang Liu
National University of Singapore
AI Security & Data PrivacyMachine UnlearningComputer Vision
H
Haoran Ou
College of Computing and Data Science, Nanyang Technological University, Singapore
Yuqiang Sun
Yuqiang Sun
Research Fellow at Nanyang Technological University
Software SecurityLarge Language ModelSoftware Engineering
J
Jiancheng Zhang
College of Electronic Engineering, National University of Defense Technology, China
Y
Yutong Jiao
School of Cyber Science and Engineering, Sichuan University, China
K
Kunshu Song
School of Cyber Science and Engineering, Sichuan University, China
Chao Zhang
Chao Zhang
Tsinghua University
software and system securityAI for securityblockchaindata security
Fan Shi
Fan Shi
Assistant Professor in National University of Singapore
Robotics
Hongda Sun
Hongda Sun
Renmin University of China
Natural Language ProcessingLarge Language ModelsAI for Healthcare
R
Rui Yan
School of Artificial Intelligence, Wuhan University, China
Cheng Huang
Cheng Huang
Associate Professor, Sichuan University
Network SecurityCode Security/MalwarePA/KG/LLM