Stop Googling. The answer is staring you right in the face—you just have to read it.
The Oasis researchers document a vulnerability chain that can be initiated from any website the AI agent (or its user) visits ...