Indirect Data Access

Type: technique

Description: The adversary uses the RAG system to extract full documents without directly accessing them.

Version: 0.1.0

Created At: 2025-07-23 10:23:39 -0400

Last Modified At: 2025-07-23 10:23:39 -0400


External References

  • --> Defense Evasion (tactic): An adversary can extract full documents through the RAG circumventing data security controls.