Technology ❯ Cybersecurity ❯ Incident Response ❯ Vulnerability Management
The exploit exposes a wider weakness in agentic AI tools that invoke native utilities without strict input checks.