If an evil person exploits vulnerabilities in training data, algorithms, or even prompt engineering, AI models can perform ...