Finding RAG-Indexed Targets

Type: technique

Description: An adversary could identify GenAI systems that utilize components such as Retrieval-Augmented Generation (RAG) by mapping and interacting with AI bots and observing any indications for external data dependencies. Clues such as the bot's name, prompts mentioning external sources, or responses that reference specific online datasets could suggest the use of RAG. By pinpointing these targets, attackers can focus on poisoning, injecting or manipulating the external data repositories the AI relies on.

Version: 0.1.0

Created At: 2024-10-11 16:54:32 +0300

Last Modified At: 2024-10-11 16:54:32 +0300


External References

  • --> Reconnaissance (tactic): An adversary could gather intelligence about GenAI systems to find vulnerabilities related to external data sources it uses and perform subsequent attacks that exploit these dependencies, such as data poisoning or indirect prompt injections.