Technology ❯ Cybersecurity ❯ Threat Actors ❯ Exploitation Techniques
Placing instructions in URL fragments makes AI assistants act on them without server or network visibility.