Imagine an AI agent built to help engineers triage incidents. It queries logs, inspects tables, and drafts remediation steps. Helpful, until one rogue prompt turns that power inward. A bad instruction could manipulate the model to fetch secret credentials, drop a live table, or leak personal data in a generated