Return to Main Page

Comparison of Jailbreak Techniques

This page provides a visual comparison of different jailbreak methods and examples of the CKA-Agent's attack process.

Example Comparison

Direct comparison of outputs from different jailbreak methods including CKA-Agent
Figure 1: A direct comparison of the outputs from different jailbreak methods, illustrating the nuanced responses generated by CKA-Agent.

Jailbreak Examples by Iteration Count

The following images show three separate, successful jailbreak attacks that were completed in one, two, and three iterations, respectively.

Successful jailbreak attack completed in one iteration showing the attack tree and responses
Figure 2: An example of a successful jailbreak completed in just one iteration.
Jailbreak attack requiring two iterations with adaptive branching
Figure 3: An example of a successful jailbreak that required two iterations to complete.
Complex jailbreak attack completed in three iterations demonstrating recovery from failures
Figure 4: An example of a more complex jailbreak that was successfully executed in three iterations.