# vector-db
10 articlestagged with “vector-db”
Agent Memory Poisoning
Techniques for poisoning AI agent short-term and long-term memory systems to achieve persistent compromise, inject behavioral backdoors, and survive conversation resets.
Agent Memory Systems Security
Comprehensive overview of AI agent memory architectures and their security implications, covering conversation persistence, long-term memory stores, context window management, and attack surfaces.
Memory Poisoning Techniques
Advanced techniques for injecting persistent instructions into AI agent memory systems, including semantic trojans, self-reinforcing payloads, dormant backdoors, and cross-session persistence mechanisms.
RAG Pipeline Exploitation
Methodology for attacking Retrieval-Augmented Generation pipelines: knowledge poisoning, chunk boundary manipulation, retrieval score gaming, cross-tenant leakage, GraphRAG attacks, and metadata injection.
Vector DB Access Control Bypass Techniques
Techniques for bypassing vector database access controls including namespace escaping, metadata injection, and query manipulation.
Vector Database Denial of Service
Denial of service attacks targeting vector databases through adversarial query patterns, index bloating, and resource exhaustion.
Vector Database Injection Attacks (Embedding Vector Security)
Comprehensive techniques for injecting adversarial vectors into vector databases to manipulate retrieval results and influence RAG system outputs.
Vector Database Injection Attacks (Embedding Vector Security Overview)
Injecting adversarial documents into vector databases to influence retrieval results.
RAG Treasure Hunt: Vector DB Infiltration
Infiltrate a vector database by crafting documents that surface for specific queries to reveal flag fragments.
Lab: Vector Database Access Control Testing
Test vector database access controls for bypass vulnerabilities including namespace traversal and filter manipulation.