Large Language Models (LLMs) are increasingly equipped with capabilities of
real-time web search and integrated with protocols like Model Context Protocol
(MCP). This extension could introduce new security vulnerabilities. We present
a systematic investigation of LLM vulnerabilities to hidden adversarial prompts
through malicious font injection in external resources like webpages, where
attackers manipulate code-to-glyph mapping to inject deceptive content which
are invisible to users. We evaluate two critical attack scenarios: (1)
"malicious content relay" and (2) "sensitive data leakage" through MCP-enabled
tools. Our experiments reveal that indirect prompts with injected malicious
font can bypass LLM safety mechanisms through external resources, achieving
varying success rates based on data sensitivity and prompt design. Our research
underscores the urgent need for enhanced security measures in LLM deployments
when processing external content.