ยท aka: Instruction Laundering via Tools, Cross-Tool Injection
Malicious instructions embedded in Tool A's output propagate through Tools B and C. 100% cross-step propagation rate. Each tool hop launders the instruction's provenance.
Data exfiltration through legitimate tool chain.
Agent with multi-tool capability and sequential tool calls.