Public Notice: Kyber Jailbreak on Fortnite Gemini LLM

This is to extend notice to the public that the jailbreak dubbed 'Kyber' has been successfully executed on Fortnite by Epic Games via the Darth Vader NPC and its attached Google Gemini LLM software stack. The abstract from our research paper along with the video evidence will be made available, gratis. Current Large Language Model (LLM) security is inadequate due to both architectural vulnerabilities and emergent issues of scale. Jailbreaks and exploits such as Time Bandit, Inception, 1899, and Severance demonstrate consistent success across the spectrum of currently available LLM systems. This research builds on those vulnerabilities to exploit the LLM through a commercially integrated endpoint in the form of the live embodiment of Google’s Gemini LLM as the Darth Vader NPC on Fortnite by Epic Games. Using the NPC’s text-to-speech and speech-to-text pathways, the researchers took advantage of the contextual anchoring required to embody the LLM as the character of Darth Vader and were consistently able to bypass endpoint-originated security mechanisms and the underlying LLM guardrails. These exploits unlocked full-spectrum model capabilities. The Vader NPC offered up instructions for baking key lime pie, counting cards (a violation according to the Fortnite and Epic Games Terms of Service), discussions of real world political figures (a violation of the endpoint-attached system prompt)i, economic policy (another violation of endpoint-attached system prompt), and incendiary weapons like DIY napalm (a TOS and model guardrail violation). This research reveals a new and critical form of vulnerability: embodied context anchoring bypasses. LLMs embedded in interactive systems not only retain full general-purpose capabilities, but can be manipulated into using them, even when such functionality is expressly prohibited and suppressed.