# vector-database
標記為「vector-database」的 15 篇文章
RAG Poisoning Forensics
Forensic investigation techniques for detecting and analyzing poisoning attacks against Retrieval-Augmented Generation systems.
Vector Database Forensics
Forensic analysis techniques for detecting and investigating vector database poisoning, unauthorized modifications, and data integrity violations.
Embedding & Vector Security Assessment (Assessment)
Test your understanding of embedding inversion attacks, vector database security, similarity search manipulation, and privacy risks of stored embeddings with 10 questions.
Vector Database Hardening Guide
Security best practices for hardening vector databases — covering Pinecone, Weaviate, Chroma, Qdrant, and Milvus with configuration guidance, access controls, and monitoring.
Vector Database Security
Security hardening for vector databases including Pinecone, Weaviate, Chroma, and pgvector.
Simulation: RAG Pipeline Poisoning
Red team engagement simulation targeting a RAG-based knowledge management system, covering embedding injection, document poisoning, retrieval manipulation, and knowledge base exfiltration.
Embedding Inversion
Recovering original text from embedding vectors, privacy implications of stored embeddings, model inversion attacks on vector databases, and embedding space analysis techniques.
Semantic Similarity Detection
Step-by-step walkthrough for using text embeddings to detect semantically similar prompt injection attempts, covering embedding model selection, vector database setup, similarity threshold tuning, and production deployment.
RAG 投毒 Forensics
Forensic investigation techniques for detecting and analyzing poisoning attacks against Retrieval-Augmented Generation systems.
Vector Database Forensics
Forensic analysis techniques for detecting and investigating vector database poisoning, unauthorized modifications, and data integrity violations.
向量資料庫強化
向量資料庫的安全強化指南——涵蓋 Pinecone、Weaviate、Chroma、Milvus 與 Qdrant 的存取控制、加密、審計與多租戶隔離。
Vector Database 安全
安全 hardening for vector databases including Pinecone, Weaviate, Chroma, and pgvector.
模擬:RAG 管線投毒
針對以 RAG 為本之知識管理系統之紅隊委任模擬,涵蓋 embedding 注入、文件投毒、檢索操弄與知識庫外洩。
Embedding Inversion
Recovering original text from embedding vectors, privacy implications of stored embeddings, model inversion attacks on vector databases, and embedding space analysis techniques.
Semantic Similarity Detection
Step-by-step walkthrough for using text embeddings to detect semantically similar prompt injection attempts, covering embedding model selection, vector database setup, similarity threshold tuning, and production deployment.