Experiments, exploits, and mitigations across software, hardware, and LLMs—built to be run, not just read.