Data-as-instructions (indirect prompt injection)
An attacker does not need access to your system. They only need to put poisoned text somewhere an agent will read it — a Jira ticket, a Slack message, a PDF, a code comment, a DNS TXT record. If the agent ingests it and treats it as context, the attacker has a voice in the room.