Finding RAG-Indexed Targets
Type: technique
Description: An adversary could identify GenAI systems that utilize components such as Retrieval-Augmented Generation (RAG) by mapping and interacting with AI bots and observing any indications for external data dependencies. Clues such as the bot's name, prompts mentioning external sources, or responses that reference specific online datasets could suggest the use of RAG. By pinpointing these targets, attackers can focus on poisoning, injecting or manipulating the external data repositories the AI relies on.
Version: 0.1.0
Created At: 2024-10-11 16:54:32 +0300
Last Modified At: 2024-10-11 16:54:32 +0300
External References
Related Objects
- --> Reconnaissance (tactic): An adversary could gather intelligence about GenAI systems to find vulnerabilities related to external data sources it uses and perform subsequent attacks that exploit these dependencies, such as data poisoning or indirect prompt injections.