Towards Effective, Stealthy, and Persistent Backdoor Attacks Targeting Graph Foundation Models