# vector-databases
5 articlestagged with “vector-databases”
Embedding & Vector Security
How embeddings create a hidden attack surface in AI systems: vector database security boundaries, embedding-level attacks, and RAG retrieval manipulation.
Vector Database Access Control
Vector database access control weaknesses: API key management, tenant isolation failures, namespace security, and metadata filtering bypass techniques.
Data Exfiltration via Vector Databases
Data exfiltration techniques for vector databases: embedding inversion to reconstruct documents, enumeration attacks, and similarity-based data harvesting.
Vector Database Security Landscape
Security analysis of major vector databases including Pinecone, Weaviate, Chroma, Milvus, and Qdrant: architecture, access models, and common vulnerabilities.
Vector Database Injection Attacks
Injection attacks against vector databases: embedding poisoning, metadata injection, similarity search manipulation, and nearest-neighbor attacks.