Technology ❯ Information Technology ❯ Cybersecurity ❯ Vulnerabilities
Repository configuration in AI tooling created an execution layer exploitable for RCE, enabling API key theft.