Hail to the Thief: Exploring Attacks and Defenses in Decentralised GRPO