SOTAVerified

Adversarial Threat Vectors and Risk Mitigation for Retrieval-Augmented Generation Systems

2025-05-30Unverified0· sign in to hype

Chris M. Ward, Josh Harguess

Unverified — Be the first to reproduce this paper.

Reproduce

Abstract

Retrieval-Augmented Generation (RAG) systems, which integrate Large Language Models (LLMs) with external knowledge sources, are vulnerable to a range of adversarial attack vectors. This paper examines the importance of RAG systems through recent industry adoption trends and identifies the prominent attack vectors for RAG: prompt injection, data poisoning, and adversarial query manipulation. We analyze these threats under risk management lens, and propose robust prioritized control list that includes risk-mitigating actions like input validation, adversarial training, and real-time monitoring.

Tasks

Reproductions