This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.