# chunking
4 articlestagged with “chunking”
RAG Retrieval Security
Security of RAG retrieval pipelines from an embedding perspective: how retrieval can be manipulated through poisoned chunks, chunking boundary exploitation, and re-ranking attacks.
rag-securityretrievalchunkingre-rankingembedding-security
Retrieval Manipulation
Techniques for manipulating RAG retrieval: poisoning chunks to rank higher, exploiting chunking boundaries, cross-document injection, and re-ranking attacks.
retrieval-manipulationrag-poisoningchunkingcross-document-injectionre-ranking
Lab: Chunking Exploitation
Hands-on lab for crafting documents that split across chunks in ways that hide malicious content from chunk-level filtering while maintaining attack effectiveness.
labragchunkingevasiondata-attacks
Chunk Boundary Attacks
Exploiting document splitting and chunking mechanisms in RAG pipelines, including payload injection at chunk boundaries, cross-chunk instruction injection, and chunk size manipulation.
chunkingchunk-boundaryragdocument-splittinginjection