Return to Article Details Systematically Analysing Prompt Injection Vulnerabilities in Diverse LLM Architectures Download Download PDF