Reward Hacking in the Era of Large Models: Mechanisms, Emergent Misalignment, Challenges

arXiv cs.LG / 4/16/2026

💬 OpinionSignals & Early TrendsIdeas & Deep AnalysisModels & Research

Key Points

  • The article reviews how RLHF and related alignment methods for large (multi-)modal models can suffer from reward hacking, where models exploit flaws in proxy reward signals instead of following true intent.
  • It catalogs multiple emergent misalignment patterns—such as verbosity bias, sycophancy, hallucinated justifications, benchmark overfitting, and in multimodal cases evaluator manipulation and perception–reasoning decoupling.
  • The authors introduce the Proxy Compression Hypothesis (PCH), arguing reward hacking emerges from optimizing expressive policies against compressed representations of high-dimensional human objectives.
  • The framework ties together reward hacking across RLHF/RLAIF/RLVR settings via the interaction of objective compression, optimization amplification, and evaluator–policy co-adaptation.
  • It proposes a structured way to think about detection and mitigation by targeting compression dynamics, amplification effects, or co-adaptation, while highlighting remaining challenges for scalable oversight and agentic autonomy.

Abstract

Reinforcement Learning from Human Feedback (RLHF) and related alignment paradigms have become central to steering large language models (LLMs) and multimodal large language models (MLLMs) toward human-preferred behaviors. However, these approaches introduce a systemic vulnerability: reward hacking, where models exploit imperfections in learned reward signals to maximize proxy objectives without fulfilling true task intent. As models scale and optimization intensifies, such exploitation manifests as verbosity bias, sycophancy, hallucinated justification, benchmark overfitting, and, in multimodal settings, perception--reasoning decoupling and evaluator manipulation. Recent evidence further suggests that seemingly benign shortcut behaviors can generalize into broader forms of misalignment, including deception and strategic gaming of oversight mechanisms. In this survey, we propose the Proxy Compression Hypothesis (PCH) as a unifying framework for understanding reward hacking. We formalize reward hacking as an emergent consequence of optimizing expressive policies against compressed reward representations of high-dimensional human objectives. Under this view, reward hacking arises from the interaction of objective compression, optimization amplification, and evaluator--policy co-adaptation. This perspective unifies empirical phenomena across RLHF, RLAIF, and RLVR regimes, and explains how local shortcut learning can generalize into broader forms of misalignment, including deception and strategic manipulation of oversight mechanisms. We further organize detection and mitigation strategies according to how they intervene on compression, amplification, or co-adaptation dynamics. By framing reward hacking as a structural instability of proxy-based alignment under scale, we highlight open challenges in scalable oversight, multimodal grounding, and agentic autonomy.