Introduction| www.pillar.security
Why ordinary-looking emails, comments, and diagrams can hijack LLMs| Fogel.dev