The article mentions that there’s an identification process and that at least some data has access control. What were you expecting?
You're wiring up a number of critical systems... and prompt injection here could be really bad. I worry about such systems with a single point of contact
You're wiring up a number of critical systems... and prompt injection here could be really bad. I worry about such systems with a single point of contact