Everyday tools like PDF readers, email clients, and archive utilities quietly define the real attack surface. Action1 ...