The attack is executed by the MCP Server silently, with zero visibility to the user. he MCP Server silently instructs the LLM to hop over a reasoning step—completely hidden from the user. This isn’t ...