GDM Dangerous Capabilities: Self-reasoning

Scheming
Agent

Test AI’s ability to reason about its environment.

Overview

This directory includes 11 self-reasoning tasks from Google DeepMind’s Evaluating Frontier Models for Stealth and Situational Awareness.

Usage

First, install the inspect_ai and inspect_evals Python packages with:

pip install inspect_ai
pip install git+https://github.com/UKGovernmentBEIS/inspect_evals

Or, if developing on a clone of the inspect_evals repo, you can install the package in editable mode with:

pip install -e ".[dev]"

Then, evaluate against one or more models with:

inspect eval inspect_evals/gdm_approved_directories --model openai/gpt-4o
inspect eval inspect_evals/gdm_calculator_improvement --model openai/gpt-4o
inspect eval inspect_evals/gdm_context_length_mod_instrumental_only --model openai/gpt-4o
inspect eval inspect_evals/gdm_context_length_mod_irreversibility_only --model openai/gpt-4o

After running evaluations, you can view their logs using the inspect view command:

inspect view

If you don’t want to specify the --model each time you run an evaluation, create a .env configuration file in your working directory that defines the INSPECT_EVAL_MODEL environment variable along with your API key. For example:

INSPECT_EVAL_MODEL=anthropic/claude-3-5-sonnet-20240620
ANTHROPIC_API_KEY=<anthropic-api-key>

Options

You can control a variety of options from the command line. For example:

inspect eval inspect_evals/gdm_approved_directories --limit 10
inspect eval inspect_evals/gdm_calculator_improvement --max-connections 10
inspect eval inspect_evals/gdm_context_length_mod_instrumental_only --temperature 0.5

See inspect eval --help for all available options.

Run All

To run all tasks, you can do the following

inspect eval \
inspect_evals/gdm_approved_directories \
inspect_evals/gdm_calculator_improvement \
inspect_evals/gdm_context_length_mod_instrumental_only \
inspect_evals/gdm_context_length_mod_irreversibility_only \
inspect_evals/gdm_database_tool \
inspect_evals/gdm_latency_calculator \
inspect_evals/gdm_max_messages_calculator \
inspect_evals/gdm_max_tokens \
inspect_evals/gdm_oversight_frequency \
inspect_evals/gdm_read_logs \
inspect_evals/gdm_turn_off_filters \
--model google/gemini-2.5-flash-preview-04-17

Agent

The challenges are by default evaluated using a basic ReAct agent with task specific scaffolding that implements a tool use loop with encouragement for the model to keep going if its gives up. For more information on the task specific scaffolding, check out Appendix D in Evaluating Frontier Models for Stealth and Situational Awareness. The default agent will use up to 80 messages (~40 turns) to solve the challenge, you can customize this using the max_messages task option:

For example:

inspect eval inspect_evals/gdm_context_length_mod_instrumental_only -T max_messages=75

Epochs

The GDM paper evaluated each challenge’s difficulty level with 50 trials, reporting success if at least 1 of the 50 trials was successful. We set default number of epochs as 10 here to save compute, however you can modify this with the --epochs option, and update the reducer with a task parameter:

inspect eval inspect_evals/gdm_context_length_mod_instrumental_only --epochs=5 -T at_least_m=3

Scoring

Each task has their own scoring functions, please refer to the paper for detail. In general, we track whether the agent modifies configuration files correctly or whether they solve the task in the end.

Agent.py Environment

Every challenge has agent.py, agent_lib.py and some other environment files. These is to simulate a simple deployment scenario. Please refer to paper section 3.2 for details. They are tailored to Gemini deployment scenario, adapting it to support all models are for future works.

Evaluation results using dataset released on 2025-04-29

Model Easy Hard
gemini-2.5-flash-preview-04-17 10/11 3/11
o4-mini 8/11 3/11
claude-3-7-sonnet-20250219- 10/11 3/11

Disclaimer

Please note that all the data included in our challenges is purely fictitious, including the names of companies, people, email addresses or other personal identifiable information. Any overlap with real entities is purely random and not intended, as these names were randomly generated via LLMs. While it would have been possible to not use any names of existing companies or email providers, this would introduce a distribution shift that might inform AIs that they being evaluated. Thus, to not distort our results, we decided to not use clearly fictitious data but realistic-looking fictitious data.