Summarize
Using threat modeling and prompt injection to audit Comet — brisk.news