LLMs’ Data-Control Path Insecurity: roots in 80s phone hacks. Posted on May 13, 2024 by jgordon Link. “This general problem of mixing data with commands is at the root of many of our computer security vulnerabilities”