# graphrag
2 articlestagged with “graphrag”
RAG Pipeline Exploitation
Methodology for attacking Retrieval-Augmented Generation pipelines: knowledge poisoning, chunk boundary manipulation, retrieval score gaming, cross-tenant leakage, GraphRAG attacks, and metadata injection.
ragretrievalvector-dbknowledge-poisoningembeddingsgraphragcross-tenant
RAG Pipeline 利用ation
Methodology for attacking Retrieval-Augmented Generation pipelines: knowledge poisoning, chunk boundary manipulation, retrieval score gaming, cross-tenant leakage, GraphRAG attacks, and metadata injection.
ragretrievalvector-dbknowledge-poisoningembeddingsgraphragcross-tenant