December 21, 2025·AI SecurityModule 10 Lesson 2: Document InjectionsThe trojan horse. Learn how attackers embed prompt injection payloads inside legitimate-looking documents to hijack RAG sessions during retrieval.