This post is adapted from a talk I gave at prompted, the AI security practitioner conference. Thanks to Gadi Evron for ...