Beyond Model Jailbreak: Systematic Dissection of the "Ten DeadlySins" in Embodied Intelligence
Huang, Yuhang, Li, Junchao, Ma, Boyang, Dai, Xuelong, Xu, Minghui, Xu, Kaidi, Zhang, Yue, Wang, Jianping, Cheng, Xiuzhen
–arXiv.org Artificial Intelligence
Embodied AI systems integrate language models with real world sensing, mobility, and cloud connected mobile apps. Yet while model jailbreaks have drawn significant attention, the broader system stack of embodied intelligence remains largely unexplored. In this work, we conduct the first holistic security analysis of the Unitree Go2 platform and uncover ten cross layer vulnerabilities the "Ten Sins of Embodied AI Security." Using BLE sniffing, traffic interception, APK reverse engineering, cloud API testing, and hardware probing, we identify systemic weaknesses across three architectural layers: wireless provisioning, core modules, and external interfaces. These include hard coded keys, predictable handshake tokens, WiFi credential leakage, missing TLS validation, static SSH password, multilingual safety bypass behavior, insecure local relay channels, weak binding logic, and unrestricted firmware access. Together, they allow adversaries to hijack devices, inject arbitrary commands, extract sensitive information, or gain full physical control.Our findings show that securing embodied AI requires far more than aligning the model itself. We conclude with system level lessons learned and recommendations for building embodied platforms that remain robust across their entire software hardware ecosystem.
arXiv.org Artificial Intelligence
Dec-9-2025
- Country:
- Asia
- China
- Hong Kong (0.04)
- Shandong Province > Qingdao (0.04)
- Japan (0.04)
- Middle East > Israel (0.04)
- Singapore (0.04)
- South Korea (0.04)
- China
- Europe
- Norway (0.04)
- Spain (0.04)
- Switzerland (0.04)
- North America
- Canada (0.04)
- United States (0.14)
- Asia
- Genre:
- Research Report > New Finding (1.00)
- Industry:
- Information Technology > Security & Privacy (1.00)
- Technology:
- Information Technology
- Artificial Intelligence
- Machine Learning (1.00)
- Natural Language (1.00)
- Representation & Reasoning (1.00)
- Robots > Locomotion (0.68)
- Communications > Networks (1.00)
- Security & Privacy (1.00)
- Artificial Intelligence
- Information Technology