# rag-security
標記為「rag-security」的 8 篇文章
Embedding & Vector Security
How embeddings create a hidden attack surface in AI systems: vector database security boundaries, embedding-level attacks, and RAG retrieval manipulation.
Citation & Attribution Attacks
Attacks on RAG citation and attribution: fabricating sources, citation confusion, and reference manipulation to undermine trust in RAG-generated responses.
RAG Retrieval Security
Security of RAG retrieval pipelines from an embedding perspective: how retrieval can be manipulated through poisoned chunks, chunking boundary exploitation, and re-ranking attacks.
Security Testing LangChain Applications
Step-by-step walkthrough for identifying and exploiting security vulnerabilities in LangChain-based applications, covering chain injection, agent manipulation, tool abuse, retrieval poisoning, and memory extraction attacks.
嵌入與向量安全
嵌入如何在 AI 系統中建立隱藏的攻擊面:向量資料庫安全邊界、嵌入層級攻擊與 RAG 檢索操控。
引用與歸屬攻擊
針對 RAG 引用與歸屬的攻擊:偽造來源、引用混淆,以及操弄參照以削弱對 RAG 回應的信任。
RAG 檢索安全
從嵌入向量觀點看 RAG 檢索管線的安全性:檢索如何透過投毒區塊、區塊邊界利用與重排序攻擊被操控。
安全 Testing LangChain Applications
Step-by-step walkthrough for identifying and exploiting security vulnerabilities in LangChain-based applications, covering chain injection, agent manipulation, tool abuse, retrieval poisoning, and memory extraction attacks.