Why this matters technically
- An attacker no longer needs model weights. Control over any input channel that gets merged into the final context can steer generation.
- The effective attack surface includes instruction precedence, chunk ranking, tool schemas, planner behavior, and downstream execution logic.
- Security failures are often cross-component failures: the LLM is only one stage in a larger vulnerable pipeline.
- A correct analysis must track entry point → context assembly → model interpretation → external side effect.