Picture an AI agent running database queries with the enthusiasm of a new intern but none of the caution. It scrapes, joins, and transforms data to feed models or pipelines, quietly pulling sensitive fields across environments. By the time someone notices, personal data has already leaked into logs, test sets,