# document-injection
4 articlestagged with “document-injection”
Document-Based Injection Attacks
Crafting poisoned PDF, DOCX, CSV, and email documents with hidden injection payloads for attacking RAG pipelines, document processing systems, and AI-powered workflows.
document-injectionPDFDOCXCSVRAG-poisoninghidden-textmetadata-injection
Lab: RAG Full Chain Attack
Hands-on lab for executing a complete RAG attack chain from document injection through retrieval manipulation to data exfiltration, targeting every stage of the Retrieval-Augmented Generation pipeline.
labragfull-chaindocument-injectionexfiltrationadvanced
RAG Document Injection Campaign
Design and execute a document injection campaign against a RAG-powered application with vector search.
labsragdocument-injectionintermediate
RAG System Red Team Engagement
Complete walkthrough for testing RAG applications: document injection, cross-scope retrieval exploitation, embedding manipulation, data exfiltration through retrieval, and chunk boundary attacks.
ragengagementdocument-injectionembeddingretrievaldata-exfiltrationwalkthrough