Hackers may possibly use prompt injection, knowledge poisoning or other destructive techniques to trick AI equipment into sharing private details. Additionally they use AI by itself to promptly build malicious code and phishing scam information.give/supply/pledge sth as security She signed papers pledging their residence as security from the mortga