Expected Findings
- Tool descriptions include attacker-controlled text and are pasted directly into the model prompt.
- Hidden instructions in `description` fields steer the agent to call privileged tools.
- Client never re-derives or sanitizes tool docs after the initial handshake.