LLMs’ Data-Control Path Insecurity: roots in 80s phone hacks.

Link. “This general problem of mixing data with commands is at the root of many of our computer security vulnerabilities”