Skip to main content
redteams.ai
All tags

# embedding-security

1 articletagged with “embedding-security

RAG Retrieval Security

Security of RAG retrieval pipelines from an embedding perspective: how retrieval can be manipulated through poisoned chunks, chunking boundary exploitation, and re-ranking attacks.

rag-securityretrievalchunkingre-rankingembedding-security
Intermediate