🤖 AI Summary
Existing LLM security evaluation frameworks suffer from fragmented attack/defense/assessment modules and a trade-off between flexibility and standardization, hindering cross-model comparison and quantitative risk analysis. This paper introduces the first modular, reproducible LLM security evaluation framework, unifying 19 attack methods, 29 defense techniques, and 19 assessment metrics across 12 risk categories and 342 standardized test cases. Leveraging customized adversarial prompts and multidimensional metrics—including jailbreak success rate, defense robustness, and security-utility trade-offs—the framework systematically identifies common vulnerabilities and defense failure patterns across 14 mainstream LLMs. All code, datasets, and evaluation results are publicly released, establishing a reproducible benchmark and analytical paradigm for LLM security research.
📝 Abstract
While the deployment of large language models (LLMs) in high-value industries continues to expand, the systematic assessment of their safety against jailbreak and prompt-based attacks remains insufficient. Existing safety evaluation benchmarks and frameworks are often limited by an imbalanced integration of core components (attack, defense, and evaluation methods) and an isolation between flexible evaluation frameworks and standardized benchmarking capabilities. These limitations hinder reliable cross-study comparisons and create unnecessary overhead for comprehensive risk assessment. To address these gaps, we present TeleAI-Safety, a modular and reproducible framework coupled with a systematic benchmark for rigorous LLM safety evaluation. Our framework integrates a broad collection of 19 attack methods (including one self-developed method), 29 defense methods, and 19 evaluation methods (including one self-developed method). With a curated attack corpus of 342 samples spanning 12 distinct risk categories, the TeleAI-Safety benchmark conducts extensive evaluations across 14 target models. The results reveal systematic vulnerabilities and model-specific failure cases, highlighting critical trade-offs between safety and utility, and identifying potential defense patterns for future optimization. In practical scenarios, TeleAI-Safety can be flexibly adjusted with customized attack, defense, and evaluation combinations to meet specific demands. We release our complete code and evaluation results to facilitate reproducible research and establish unified safety baselines.