🔧
Orchestrates retrieval and generation steps for each query.
Detailed Information
RAG pipelines can be subverted to bypass validation or inject malicious data. Reference: OWASP RAG, AISVS C10.
Parent Component
🔎Retrieval-Augmented Generation (RAG)Security Implications
RAG pipelines can be subverted to bypass validation or inject malicious data. Reference: OWASP RAG, AISVS C10.
Implementation Considerations
Apply appropriate security controls and monitoring based on the parent component's implementation guidance. Reference: OWASP RAG, AISVS C10
🗂️ Framework References