Imagine your CI/CD pipeline humming away, deploying models that talk to real systems and datasets. Then, a prompt or agent query pulls in a table with user emails, transaction IDs, or access tokens. One careless API call, and sensitive data leaks into logs, training prompts, or third-party tools. It