The indirect prompt injection vulnerability allows an attacker to weaponize Google invites to circumvent privacy controls and ...
Vulnerabilities in Chainlit could be exploited without user interaction to exfiltrate environment variables, credentials, ...