Using threat modeling and prompt injection to audit Comet

(blog.trailofbits.com)

1 points | by ingve 7 hours ago ago

No comments yet.