A financial services firm is deploying an AI assistant to help underwriters review policies, analyze risk documents, and answer compliance questions. The model is grounded in the firm’s own document collection, drawing answers directly from underwriting manuals, regulatory filings, and internal procedures. The business case is solid.Then the security review starts:Can a crafted prompt trick the model into ignoring its system instructions and exposing confidential data?What happens when a response surfaces personally identifiable information (PII) that's embedded in the retrieved documents?Is