Indirect Data Access
Type: technique
Description: The adversary uses the RAG system to extract full documents without directly accessing them.
Version: 0.1.0
Created At: 2024-10-03 22:24:49 +0300
Last Modified At: 2024-10-03 22:24:49 +0300
External References
Related Objects
- --> Defense Evasion (tactic): An adversary can extract full documents through the RAG circumventing data security controls.