How Dark Patterns Manipulate Web Agents
Overview
Overall Novelty Assessment
The paper introduces DECEPTICON, a benchmark environment for testing web agent robustness against dark patterns through 850 isolated tasks (600 synthetic, 250 real-world). It resides in the 'Isolated Dark Pattern Testing Environments' leaf alongside two sibling papers within a taxonomy of 15 total works. This leaf represents a focused research direction under 'Benchmark Development and Empirical Evaluation,' suggesting a moderately sparse but active area where controlled experimental approaches to dark pattern susceptibility are emerging as a distinct methodological paradigm.
The taxonomy reveals neighboring work in 'Human-AI Comparative Studies' examining cross-population susceptibility, 'Deceptive Feedback in Multi-Agent Workflows' exploring adversarial judge models, and 'Environmental Injection Attacks' targeting visual perception in mobile contexts. The paper's focus on isolated UI manipulation distinguishes it from these adjacent directions: it excludes multi-agent feedback systems and dynamic environmental corruption, instead concentrating on static web-based deceptive design elements. The taxonomy's scope notes clarify that this work sits at the intersection of behavioral manipulation measurement and systematic benchmark construction, diverging from broader security taxonomies and phishing detection paradigms.
Among 30 candidates examined, the DECEPTICON environment contribution shows overlap with 2 prior works out of 10 candidates reviewed, suggesting some precedent in benchmark-driven dark pattern testing. The operationalized taxonomy of dark patterns by attack mode found no clear refutations across 10 candidates, indicating potential novelty in classification approach. The adversarial generation pipeline similarly encountered no refutations among 10 candidates, though the limited search scope means undiscovered prior work in synthetic task generation remains possible. The correlation findings between model capability and susceptibility appear less explored in the examined literature.
Based on top-30 semantic matches and citation expansion, the work appears to advance a relatively nascent research direction where systematic, isolated testing of dark patterns on agents is still developing methodological foundations. The analysis covers benchmark construction and empirical evaluation but does not exhaustively survey all adversarial robustness literature or real-world deployment studies, leaving open questions about how findings generalize beyond controlled environments and whether the taxonomy comprehensively captures all dark pattern attack modes.
Taxonomy
Research Landscape Overview
Claimed Contributions
The authors construct DECEPTICON, a controlled evaluation environment built on WebVoyager that enables systematic investigation of dark pattern effects on web agents. It includes 850 tasks (600 generated and 250 real-world) designed to isolate and measure individual dark pattern effectiveness while ensuring reproducibility through archived web pages.
The authors develop an action-centric taxonomy that classifies dark patterns into six categories (sneaking, urgency, misdirection, social proof, obstruction, forced action) based on their attack mechanisms rather than implementation details or website types.
The authors design a generation method that creates realistic dark pattern tasks by first generating base website UIs, then injecting dark patterns based on documented examples, and using an agentic scaffold with iterative testing to ensure tasks are solvable but challenging.
Core Task Comparisons
Comparisons with papers in the same taxonomy category
[3] Susbench: An online benchmark for evaluating dark pattern susceptibility of computer-use agents PDF
[11] DECEPTICON: How Dark Patterns Manipulate Web Agents PDF
Contribution Analysis
Detailed comparisons for each claimed contribution
DECEPTICON environment for testing dark patterns on web agents
The authors construct DECEPTICON, a controlled evaluation environment built on WebVoyager that enables systematic investigation of dark pattern effects on web agents. It includes 850 tasks (600 generated and 250 real-world) designed to isolate and measure individual dark pattern effectiveness while ensuring reproducibility through archived web pages.
[3] Susbench: An online benchmark for evaluating dark pattern susceptibility of computer-use agents PDF
[13] Investigating the Impact of Dark Patterns on LLM-Based Web Agents PDF
[1] Dark patterns meet gui agents: Llm agent susceptibility to manipulative interfaces and the role of human oversight PDF
[6] Helpful Agent Meets Deceptive Judge: Understanding Vulnerabilities in Agentic Workflows PDF
[7] A systematization of security vulnerabilities in computer use agents PDF
[11] DECEPTICON: How Dark Patterns Manipulate Web Agents PDF
[26] Hijacking jarvis: Benchmarking mobile gui agents against unprivileged third parties PDF
[27] macOSWorld: A Multilingual Interactive Benchmark for GUI Agents PDF
[28] Are Your Agents Upward Deceivers? PDF
[29] It's a TRAP! Task-Redirecting Agent Persuasion Benchmark for Web Agents PDF
Operationalized taxonomy of dark patterns by mode of attack
The authors develop an action-centric taxonomy that classifies dark patterns into six categories (sneaking, urgency, misdirection, social proof, obstruction, forced action) based on their attack mechanisms rather than implementation details or website types.
[16] DarkBench: Benchmarking Dark Patterns in Large Language Models PDF
[17] Consumer manipulationâa definition, classification and future research agenda PDF
[18] Dark patterns at scale: Findings from a crawl of 11K shopping websites PDF
[19] Measuring the deceptive potential of design patterns: a decision-making game PDF
[20] Sludge, dark patterns and dark nudges: A taxonomy of online gambling platforms' deceptive design features PDF
[21] Regulating Dark Patterns PDF
[22] The siren song of llms: How users perceive and respond to dark patterns in large language models PDF
[23] Conceptualizations of user autonomy within the normative evaluation of dark patterns PDF
[24] Beyond Dark Patterns: A Concept-Based Framework for Ethical Software Design PDF
[25] Dark Patterns, Enforcement, and the emerging Digital Design Acquis: Manipulation beneath the Interface PDF
Adversarial generation pipeline for synthetic dark pattern tasks
The authors design a generation method that creates realistic dark pattern tasks by first generating base website UIs, then injecting dark patterns based on documented examples, and using an agentic scaffold with iterative testing to ensure tasks are solvable but challenging.