Anatomy of an LLM RCE

https://www.cyberark.com/resources/threat-research-blog/anatomy-of-an-llm-rce