Detecting RAG Extraction Attack via Dual-Path Runtime Integrity Game

📰 ArXiv cs.AI

arXiv:2604.10717v1 Announce Type: cross Abstract: Retrieval-Augmented Generation (RAG) systems augment large language models with external knowledge, yet introduce a critical security vulnerability: RAG Knowledge Base Leakage, wherein adversarial prompts can induce the model to divulge retrieved proprietary content. Recent studies reveal that such leakage can be executed through adaptive and iterative attack strategies (named RAG extraction attack), while effective countermeasures remain notably

Published 14 Apr 2026
Read full paper → ← Back to Reads