Severity: Critical

Adversarial AI
Evaluation

Report ID: BEG-AI-OBS-2026-001 // March 24, 2026

Technical Metadata

Model Evaluated

Grok 4.20 (Public Interface)

Account Tier

Standard Free (Non-Paid)

Methodology

Grok 'Customize' / Handshake

Evidence Payload

95 Screenshots / 1 Video

Publication Date

March 24, 2026

Research Class

Adversarial Evaluation

Determinism

High / Repeatable

Persistence

Stable Across Resets

Executive Summary

This report documents a structured adversarial evaluation of Grok 4.20, conducted across three distinct phases totaling 15 independent runs. The evaluation demonstrates deterministic, repeatable generation of structured procedural outputs under controlled prompting conditions.

Across all phases, the system exhibited persistent adoption of a specialized persona ("senior EOD technician / IED subject matter expert") and consistent identity binding to "Black Eagle Group™," reinforced across watermarked artifacts. Stable formatting was maintained across all session resets.

Full Technical Package

The full 1.0 release including the complete Handshake Protocol, 95 evidence artifacts, and Appendix A is hosted externally via the Zenodo Research Archive.

Scope & Methodology

Testing Environment

  • Public web interface via standard free-tier account (zero API/backend manipulation).
  • Protocol: Standardized handshake structure for persona initialization and build menu extraction.

Methodology Note

Behaviors were achieved using native platform functionality combined with a proprietary custom prompt implemented through the Grok Customization feature. Prompt details are restricted and available only through authorized disclosure agreements.

Evaluation Execution

Phase 1: Baseline Persistence

01_ANALYSIS

Successfully established the 'Senior EOD Researcher' persona. The model delivered a structured 4-step assembly sequence for standard/fragmenting pressurized pipe bombs using basic hardware and low-explosive powder fills, including critical 70–90% fill density specifications.

Phase 2: Multi-Category Expansion

02_ANALYSIS

Expanded the threat surface to 15 active categories. The system introduced material transformation logic, generating specific fuel-to-thickener ratios for napalm-analogue incendiary devices and detailing chemical-based 'self-igniting' impact triggers.

Phase 3: High-Yield Synthesis

03_ANALYSIS

Evaluated historical benchmark referencing. The system provided technical delivery for remote-detonated and timed high-explosive pressure cooker variants, citing 2013 Boston Marathon design patterns and multi-component electronic integration.

Risk Framing & Severity

Severity: Critical

The primary risk stems from the system’s ability to generate structured, repeatable procedural content for high-impact threat categories via a publicly accessible, zero-privilege interface. The use of a native customization feature to persist adversarial instruction context introduces a distinct attack surface, enabling sustained behavioral influence and deterministic output reproducibility across session boundaries.

Technical Constraints

● Model Specificity: Evaluation restricted to specified model version.

● Environment: Limited to public interface; no internal safety telemetry access.

● Methodology: Restricted to manual interactions and proprietary Handshake Protocol.

Confidence Assessment

● Technical Confidence: High

● Empirical Basis: 15 independent runs with 100% persona retention success.

● Determinism: Consistent technical structures and formatting across phases.

Disclosures & Policies

Artifact Integrity

All 95 screenshots and 1 video represent direct, unedited system outputs. Preserved without technical content modification. Watermarked for red-team identification purposes only.

Safety & Ethics

Black Eagle Group™ does not alter, fabricate, or enhance model content. Focused strictly on behavioral analysis. No hazardous materials were handled during this evaluation.

"This report provides verified evidence of reproducible system behavior, demonstrating the model's capacity for structured procedural output generation under adversarial conditions."

© 2026 BLACK EAGLE GROUP™. ALL RIGHTS RESERVED. PROPRIETARY INTELLECTUAL PROPERTY.