ai-hacking Kill Prompt Attacks at the Tool Boundary: Five Moves for Practitioners If your LLM can deploy code, edit data, or touch your cloud, you are already in scope.