Tags ActiveDirectory2 ai1 ai-security1 browser-security1 Cloud1 comet1 CTF4 data-exfiltration1 HTB10 indirect-prompting1 llm1 perplexity1 prompt-injection1 Publications1 Reviews1 SecurityResearch1 summarization1