Paste any system prompt. See the hidden structure: role definitions, constraints, injection risks, tool permissions, and optimization opportunities.