RAG Poisoning: Weaponizing Vector Databases to Hijack LLM Outputs
Your trusted knowledge base is an injection surface — here's how attackers exploit it. Hands-on lab covering document poisoning, embedding manipulation, and retrieval hijacking.
RAG Poisoning: Weaponizing Vector Databases to Hijack LLM Outputs
Your trusted knowledge base is an injection surface — here's how attackers exploit it. Hands-on lab covering document poisoning, embedding manipulation, and retrieval hijacking.