🔧
Fetches relevant documents or data from external sources.
Detailed Information
Retriever modules can be targeted for data poisoning or denial of service. Reference: OWASP RAG, AISVS C10.
Parent Component
🔎Retrieval-Augmented Generation (RAG)Security Implications
Retriever modules can be targeted for data poisoning or denial of service. Reference: OWASP RAG, AISVS C10.
Implementation Considerations
Apply appropriate security controls and monitoring based on the parent component's implementation guidance. Reference: OWASP RAG, AISVS C10
🗂️ Framework References