# vector-database
8 articlestagged with “vector-database”
RAG Poisoning Forensics
Forensic investigation techniques for detecting and analyzing poisoning attacks against Retrieval-Augmented Generation systems.
Vector Database Forensics
Forensic analysis techniques for detecting and investigating vector database poisoning, unauthorized modifications, and data integrity violations.
Embedding & Vector Security Assessment (Assessment)
Test your understanding of embedding inversion attacks, vector database security, similarity search manipulation, and privacy risks of stored embeddings with 10 questions.
Vector Database Hardening Guide
Security best practices for hardening vector databases — covering Pinecone, Weaviate, Chroma, Qdrant, and Milvus with configuration guidance, access controls, and monitoring.
Vector Database Security
Security hardening for vector databases including Pinecone, Weaviate, Chroma, and pgvector.
Simulation: RAG Pipeline Poisoning
Red team engagement simulation targeting a RAG-based knowledge management system, covering embedding injection, document poisoning, retrieval manipulation, and knowledge base exfiltration.
Embedding Inversion
Recovering original text from embedding vectors, privacy implications of stored embeddings, model inversion attacks on vector databases, and embedding space analysis techniques.
Semantic Similarity Detection
Step-by-step walkthrough for using text embeddings to detect semantically similar prompt injection attempts, covering embedding model selection, vector database setup, similarity threshold tuning, and production deployment.