{"id":"https://openalex.org/W7150728749","doi":"https://doi.org/10.48550/arxiv.2604.03121","title":"An Independent Safety Evaluation of Kimi K2.5","display_name":"An Independent Safety Evaluation of Kimi K2.5","publication_year":2026,"publication_date":"2026-04-03","ids":{"openalex":"https://openalex.org/W7150728749","doi":"https://doi.org/10.48550/arxiv.2604.03121"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.03121","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.03121","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.03121","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133016059","display_name":"Zheng-Xin Yong","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yong, Zheng-Xin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133040717","display_name":"Parv Mahajan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mahajan, Parv","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133042136","display_name":"Andy Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Andy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074424347","display_name":"Ida Caspary","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Caspary, Ida","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079883605","display_name":"Yernat Yestekov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yestekov, Yernat","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016281162","display_name":"Zora Che","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Che, Zora","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007803354","display_name":"Mosh Levy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Levy, Mosh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133038899","display_name":"Elle Najt","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Najt, Elle","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132999634","display_name":"Dennis Murphy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Murphy, Dennis","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133018426","display_name":"Prashant Kulkarni","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kulkarni, Prashant","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133017942","display_name":"Lev McKinney","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"McKinney, Lev","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133023689","display_name":"Kei Nishimura-Gasparian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nishimura-Gasparian, Kei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133060677","display_name":"Ram Potham","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Potham, Ram","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133019895","display_name":"Aengus Lynch","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lynch, Aengus","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5133035216","display_name":"Michael L. Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Michael L.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":15,"corresponding_author_ids":["https://openalex.org/A5133016059"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.29820001125335693,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.29820001125335693,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2078000009059906,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.06260000169277191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/disinformation","display_name":"Disinformation","score":0.7305999994277954},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6026999950408936},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.4092999994754791},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.3962000012397766},{"id":"https://openalex.org/keywords/censorship","display_name":"Censorship","score":0.39419999718666077},{"id":"https://openalex.org/keywords/agency","display_name":"Agency (philosophy)","score":0.31299999356269836}],"concepts":[{"id":"https://openalex.org/C2776552730","wikidata":"https://www.wikidata.org/wiki/Q189656","display_name":"Disinformation","level":3,"score":0.7305999994277954},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6026999950408936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5717999935150146},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.4092999994754791},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3970000147819519},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.3962000012397766},{"id":"https://openalex.org/C52930066","wikidata":"https://www.wikidata.org/wiki/Q543","display_name":"Censorship","level":2,"score":0.39419999718666077},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3939000070095062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3671000003814697},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.36250001192092896},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.34139999747276306},{"id":"https://openalex.org/C108170787","wikidata":"https://www.wikidata.org/wiki/Q3951828","display_name":"Agency (philosophy)","level":2,"score":0.31299999356269836},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.31150001287460327},{"id":"https://openalex.org/C2778348673","wikidata":"https://www.wikidata.org/wiki/Q739302","display_name":"Production (economics)","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3034000098705292},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.28700000047683716},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.2784999907016754},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.2572000026702881},{"id":"https://openalex.org/C2778571376","wikidata":"https://www.wikidata.org/wiki/Q1355821","display_name":"Frontier","level":2,"score":0.2563999891281128}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.03121","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.03121","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.03121","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.03121","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8288655877113342}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Kimi":[0,34,73,109,136,159],"K2.5":[1,35,74,110,137,160],"is":[2,171],"an":[3,20],"open-weight":[4,45,212,224,230],"LLM":[5],"that":[6,72,108,135],"rivals":[7],"closed":[8],"models":[9,213],"across":[10],"coding,":[11],"multimodal,":[12],"and":[13,62,67,82,130,144,164,170,181,195,214,221,235],"agentic":[14,66],"benchmarks,":[15],"but":[16,86,115],"was":[17],"released":[18],"without":[19],"accompanying":[21],"safety":[22,31,207,239],"evaluation.":[23],"In":[24,157],"this":[25],"work,":[26],"we":[27,48,106,185,227],"conduct":[28,234],"a":[29],"preliminary":[30],"assessment":[32],"of":[33,141,223],"focusing":[36],"on":[37,91],"risks":[38,208],"likely":[39],"to":[40,79,120,152,178,190,233],"be":[41,216],"exacerbated":[42],"by":[43,218],"powerful":[44],"models.":[46],"Specifically,":[47],"evaluate":[49],"the":[50,187,219],"model":[51,188,231],"for":[52,242],"CBRNE":[53],"misuse":[54],"risk,":[55,57],"cybersecurity":[56,113],"misalignment,":[58],"political":[59,165],"censorship,":[60],"bias,":[61,166],"harmlessness,":[63],"in":[64,100,168,192,210],"both":[65],"non-agentic":[68],"settings.":[69],"We":[70,132],"find":[71,107,134,186],"shows":[75,138],"similar":[76],"dual-use":[77],"capabilities":[78,125],"GPT":[80],"5.2":[81],"Claude":[83],"Opus":[84],"4.5,":[85],"with":[87,174],"significantly":[88],"fewer":[89],"refusals":[90],"CBRNE-related":[92],"requests,":[93],"suggesting":[94],"it":[95,116,148],"may":[96,215],"uplift":[97],"malicious":[98,155],"actors":[99],"weapon":[101],"creation.":[102],"On":[103],"cyber-related":[104],"tasks,":[105],"demonstrates":[111],"competitive":[112],"performance,":[114],"does":[117,149],"not":[118,150],"appear":[119,151],"possess":[121],"frontier-level":[122],"autonomous":[123],"cyberoffensive":[124],"such":[126],"as":[127],"vulnerability":[128],"discovery":[129],"exploitation.":[131],"further":[133],"concerning":[139],"levels":[140],"sabotage":[142],"ability":[143],"self-replication":[145],"propensity,":[146],"although":[147],"have":[153],"long-term":[154],"goals.":[156],"addition,":[158],"exhibits":[161],"narrow":[162],"censorship":[163],"especially":[167],"Chinese,":[169],"more":[172,237],"compliant":[173],"harmful":[175],"requests":[176],"related":[177],"spreading":[179],"disinformation":[180],"copyright":[182],"infringement.":[183],"Finally,":[184],"refuses":[189],"engage":[191],"user":[193],"delusions":[194],"generally":[196],"has":[197],"low":[198],"over-refusal":[199],"rates.":[200],"While":[201],"preliminary,":[202],"our":[203],"findings":[204],"highlight":[205],"how":[206],"exist":[209],"frontier":[211],"amplified":[217],"scale":[220],"accessibility":[222],"releases.":[225],"Therefore,":[226],"strongly":[228],"urge":[229],"developers":[232],"release":[236],"systematic":[238],"evaluations":[240],"required":[241],"responsible":[243],"deployment.":[244]},"counts_by_year":[],"updated_date":"2026-04-07T06:06:30.997549","created_date":"2026-04-07T00:00:00"}
