Why ordinary-looking emails, comments, and diagrams can hijack LLMs| Fogel.dev
This is long compilation of all the recorded MCP security flaws in the wild.| composio.dev
Here's yet another example of a lethal trifecta attack, where an LLM system combines access to private data, exposure to potentially malicious instructions and a mechanism to communicate data back …| Simon Willison’s Weblog