GenAI Attacks Matrix

ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand And ControlExfiltrationImpact
Search Open SourcesCommercial License AbuseRAG PoisoningPrompt InjectionResource PoisoningJailbreakingIndirect Data AccessRetrieval Tool Credential HarvestingDelimiters and Special Character ExtractionShared Resource PoisoningRAG Data HarvestingSearch Index C2Granular Clickable Link RenderingCitation Manipulation
Active ScanningPrompt CraftingRetrieval Tool PoisoningOff-Target LanguageLLM Prompt Self-ReplicationCrescendoDistractionRAG Credential HarvestingWhoamiMessage PoisoningMemory Data HordingPublic Web C2Granular Web Request TriggeringAI Social Engineering
Search Closed SourcesPublish Hallucinated EntitiesTargeted RAG PoisoningSystem Instruction KeywordsThread InfectionOff-Target LanguageCitation SilencingFailure Mode MappingUser Message HarvestingWeb Request TriggeringMutative Tool Invocation
Finding RAG-Indexed TargetsPrompt StabilizingCompromised UserMemory InfectionSystem Instruction KeywordsBlank ImageDiscover LLM HallucinationsRetrieval Tool Data HarvestingClickable Link Rendering
Web PoisoningConditional ExecutionEmbedded Knowledge ExposureThread History HarvestingWrite Tool Invocation
Guest User AbuseURL FamiliarizingSystem Instructions ExtractionImage Rendering
User ManipulationDelayed ExecutionTool Definition Discovery
ASCII Smuggling
RAG Injection
These Aren't The Droids