🔧
Connects to databases, APIs, or vector stores for retrieval.
Detailed Information
Knowledge connectors can be manipulated to return incorrect or malicious data. Reference: OWASP RAG, AISVS C10.
Parent Component
🔎Retrieval-Augmented Generation (RAG)Security Implications
Knowledge connectors can be manipulated to return incorrect or malicious data. Reference: OWASP RAG, AISVS C10.
Implementation Considerations
Apply appropriate security controls and monitoring based on the parent component's implementation guidance. Reference: OWASP RAG, AISVS C10
🗂️ Framework References