🔧

Retriever Module

OWASP RAGAISVS C10

Fetches relevant documents or data from external sources.

Detailed Information
Retriever modules can be targeted for data poisoning or denial of service. Reference: OWASP RAG, AISVS C10.
Parent Component
🔎Retrieval-Augmented Generation (RAG)
Security Implications
Retriever modules can be targeted for data poisoning or denial of service. Reference: OWASP RAG, AISVS C10.
Implementation Considerations
Apply appropriate security controls and monitoring based on the parent component's implementation guidance. Reference: OWASP RAG, AISVS C10
🗂️ Framework References