AI RESEARCH
ExploitGym: Can AI Agents Turn Security Vulnerabilities into Real Attacks?
arXiv CS.AI
•
ArXi:2605.11086v1 Announce Type: cross AI agents are rapidly gaining capabilities that could significantly reshape cybersecurity, making rigorous evaluation urgent. A critical capability is exploitation: turning a vulnerability, which is not yet an attack, into a concrete security impact, such as unauthorized file access or code execution. Exploitation is a particularly challenging task because it requires low-level program reasoning (e.g., about memory layout), runtime adaptation, and sustained progress over long horizons.