A malicious document exploits the gap between retrieval and tool use. How would you close it?

Instruction: Explain how you would defend a workflow where retrieved content can influence tools indirectly.

Context: Tests how the candidate diagnoses the problem, chooses the safest next step, and reasons through recovery. Explain how you would defend a workflow where retrieved content can influence tools indirectly.

Official answer available

Preview the opening of the answer, then unlock the full walkthrough.

I would design the workflow so retrieved text can inform reasoning without directly authorizing action. The control needs to sit...

Related Questions