On the Security Vulnerabilities of Text-to-SQL Models

Open in new window