RAG system poisoning and retrieval manipulation testing. Covers document injection, embedding manipulation, chunk boundary attacks, and knowledge base corruption.
Attack vector, poisoned document details, retrieval impact, cross-contamination evidence, severity.