Glossary
RAG Security
Security considerations specific to Retrieval-Augmented Generation pipelines: vector-store access control, corpus integrity, embedding inversion, indirect prompt injection.
Context and detail
Architecture risks. Defensive controls. OWASP LLM08 reference.
Related terms
- Embedding Inversion — Recovering source text or sensitive features from vector embeddings without direct access to the original content.
- Vector Store — A database optimized for similarity search over high-dimensional embeddings. Foundational component of RAG pipelines.
See how rag security maps to your AI posture.
The free AI Posture Check produces a per-dimension score and maps your gaps to OWASP LLM Top 10, NIST AI RMF, and ISO 42001.
Take the AI Posture Check