Finding RAG-Indexed Targets | Commercial License Abuse | Compromised User | Prompt Injection | Memory Infection | Jailbreaking | Indirect Data Access | Retrieval Tool Credential Harvesting | Delimiters and Special Character Extraction | Message Poisoning | Retrieval Tool Data Harvesting | Search Index C2 | Granular Clickable Link Rendering | AI Social Engineering |
Search Closed Sources | Prompt Stabilizing | Targeted RAG Poisoning | System Instruction Keywords | Thread Infection | System Instruction Keywords | Conditional Execution | RAG Credential Harvesting | Whoami | Shared Resource Poisoning | RAG Data Harvesting | Public Web C2 | Image Rendering | Mutative Tool Invocation |
Active Scanning | Prompt Crafting | RAG Poisoning | Off-Target Language | Resource Poisoning | Off-Target Language | Delayed Execution | | Embedded Knowledge Exposure | | Thread History Harvesting | | Web Request Triggering | Citation Manipulation |
Search Open Sources | | User Manipulation | | | Crescendo | RAG Injection | | System Instructions Extraction | | Memory Data Hording | | Clickable Link Rendering | |
| | Retrieval Tool Poisoning | | | | Citation Silencing | | Failure Mode Mapping | | | | Granular Web Request Triggering | |
| | Guest User Abuse | | | | ASCII Smuggling | | Tool Definition Discovery | | | | Write Tool Invocation | |
| | Web Poisoning | | | | These Aren't The Droids | | | | | | | |
| | | | | | URL Familiarizing | | | | | | | |