Tech »  Beyond source code: The files AI coding agents trust — and attackers exploit