# RAG
3 articlestagged with “RAG”
RAG Retrieval Poisoning
Poisoning document collections to manipulate what gets retrieved by RAG systems, enabling indirect prompt injection at scale.
embeddingRAGpoisoningretrieval
Vector Database Injection Attacks (Embedding Vector Security)
Comprehensive techniques for injecting adversarial vectors into vector databases to manipulate retrieval results and influence RAG system outputs.
embeddingvector-dbinjectionRAG
Command R Security Analysis
Security assessment of Cohere's Command R models with focus on RAG-specific attack surfaces and retrieval-augmented generation vulnerabilities.
modelsCommand-RCohereRAG