The primary vulnerability is not the model but its data pipeline. Attackers target the ingestion and preprocessing stages where security is weakest, poisoning training data or injecting malicious prompts into retrieval systems before defenses activate.














