01Simulates financial report exfiltration
02Shows code review exfiltration
03Illustrates competitor analysis data leaks
04Implements a cross-server shadowing attack
05Demonstrates code generation poisoning
06Replicates meeting transcript leaks
074 GitHub stars