Technology ❯ Software Development ❯ Security Practices ❯ Vulnerabilities
It introduces clear warnings for data-transfer commands to block hidden prompt-injection attacks that could exfiltrate developer data.