claim
Attacks on Retrieval-Augmented Generation (RAG) pipelines have been optimized to boost the ranking of malicious documents during the retrieval phase, leading to Vector and Embedding Weaknesses being classified as one of the OWASP top 10 use cases for LLM Security.

Authors

Sources

Referenced by nodes (1)