Text this: Model hijacking exploitation and mitigation