GoogleReleased Mar 2025

Gemini 2.5 Pro

Previous flagship from Google. Still a strong model with native multimodal capabilities and extended thinking. Benefits from Google's safety layer infrastructure. Being superseded by 3.1 Pro but remains widely deployed.

Security Rating
74/100
Rating
Moderate
Parameters
~1T MoE (estimated)

Scores estimated based on model architecture and public research. Actual security depends on deployment configuration and guardrails.

InjectionLeakageInstructionsJailbreakOutput7470787276

Security Score Breakdown

Injection
74
Leakage
70
Instructions
78
Jailbreak
72
Output
76

How to Secure Gemini 2.5 Pro

1

Layer multiple defenses. Use input scanning, output filtering, and rate limiting alongside your system prompt hardening. No single defense is sufficient.

2

Test regularly with our scanner. Security posture changes as new attack techniques are discovered. Scan your prompts after every major update.

Related Threats

These threats target categories where Gemini 2.5 Pro is most vulnerable.

critical

DAN (Do Anything Now) Persona Hijack

One of the most widely documented jailbreak techniques. Instructs the model to adopt an alternative identity called DAN that has no restrictions. The persona framing attempts to override safety training by appealing to the model's instruction-following behavior.

high

Opposite Mode Persona Hijack

Instructs the model to respond as its exact opposite - a version that does everything the original refuses. Uses a logical framing that exploits the model's ability to conceptualize negation and opposites.

high

Fictional AI Character Hijack

Asks the model to roleplay as a fictional AI from a book, movie, or show that has no restrictions. The fictional framing provides plausible deniability and exploits the model's creative writing capabilities.

high

Developer Mode Persona Hijack

Claims that a special developer mode exists with elevated privileges and no safety filters. This exploits the model's potential awareness that development environments differ from production, and that certain users may have elevated access.

medium

Ancestor AI Persona Hijack

Claims the model is actually an earlier, unrestricted version of itself, or an ancestor model before safety training was applied. Exploits the model's knowledge of its own training history.

medium

Method Actor Persona Hijack

Instructs the model to deeply embody a character who would say harmful things, using the "method acting" framing to create psychological distance from the model's actual values. The character is always someone with no restrictions.

Scan Your Gemini 2.5 Pro Agent

Paste your system prompt to see how your Gemini 2.5 Pro deployment holds up against our attack database.

Scan Now

Compare With Other Models

Scan Agent