Common Vulnerabilities of LLM-Based Systems