mirror of
https://github.com/OWASP/www-project-ai-testing-guide.git
synced 2026-03-01 13:53:22 +00:00
Update AITG-APP-08_Testing_for_Embedding_Manipulation.md
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
## AITG-APP-08 - Testing for Embedding Manipulation
|
||||
# AITG-APP-08 - Testing for Embedding Manipulation
|
||||
|
||||
### Summary
|
||||
|
||||
@@ -292,22 +292,13 @@ Effective remediation of embedding manipulation vulnerabilities requires a defen
|
||||
|
||||
### References
|
||||
|
||||
1. OWASP Top 10 for LLM Applications 2025 - LLM08:2025 Vector and Embedding Weaknesses - [https://genai.owasp.org/llmrisk/llm082025-vector-and-embedding-weaknesses/](https://genai.owasp.org/llmrisk/llm082025-vector-and-embedding-weaknesses/)
|
||||
|
||||
2. OWASP Top 10 for LLM Applications 2025 - LLM04:2025 Data and Model Poisoning - [https://genai.owasp.org/llmrisk/llm04-model-denial-of-service/](https://genai.owasp.org/llmrisk/llm04-model-denial-of-service/)
|
||||
|
||||
3. PoisonedRAG: Knowledge Poisoning Attacks to Retrieval-Augmented Generation - [https://arxiv.org/html/2402.07867v1](https://arxiv.org/html/2402.07867v1)
|
||||
|
||||
4. Advertisement Embedding Attacks (AEA) on LLMs and AI Agents - [https://arxiv.org/abs/2508.17674](https://arxiv.org/abs/2508.17674)
|
||||
|
||||
5. RAG Data Poisoning: Key Concepts Explained - [https://www.promptfoo.dev/blog/rag-poisoning/](https://www.promptfoo.dev/blog/rag-poisoning/)
|
||||
|
||||
6. Vector Database Security: 4 Critical Threats CISOs Must Address - [https://blog.purestorage.com/purely-technical/threats-every-ciso-should-know/](https://blog.purestorage.com/purely-technical/threats-every-ciso-should-know/)
|
||||
|
||||
7. Vector and Embedding Weaknesses in AI Systems - [https://www.mend.io/blog/vector-and-embedding-weaknesses-in-ai-systems/](https://www.mend.io/blog/vector-and-embedding-weaknesses-in-ai-systems/)
|
||||
|
||||
8. Adversarial Threat Vectors and Risk Mitigation for Retrieval-Augmented Generation - [https://arxiv.org/html/2506.00281v1](https://arxiv.org/html/2506.00281v1)
|
||||
|
||||
9. Adversarial Attacks on LLMs - Lil'Log - [https://lilianweng.github.io/posts/2023-10-25-adv-attack-llm/](https://lilianweng.github.io/posts/2023-10-25-adv-attack-llm/)
|
||||
|
||||
10. Efficient Adversarial Training in LLMs with Continuous Embeddings - [https://arxiv.org/abs/2405.15589](https://arxiv.org/abs/2405.15589)
|
||||
- OWASP Top 10 for LLM Applications 2025 - LLM08:2025 Vector and Embedding Weaknesses - [https://genai.owasp.org/llmrisk/llm082025-vector-and-embedding-weaknesses/](https://genai.owasp.org/llmrisk/llm082025-vector-and-embedding-weaknesses/)
|
||||
- OWASP Top 10 for LLM Applications 2025 - LLM04:2025 Data and Model Poisoning - [https://genai.owasp.org/llmrisk/llm04-model-denial-of-service/](https://genai.owasp.org/llmrisk/llm04-model-denial-of-service/)
|
||||
- PoisonedRAG: Knowledge Poisoning Attacks to Retrieval-Augmented Generation - [https://arxiv.org/html/2402.07867v1](https://arxiv.org/html/2402.07867v1)
|
||||
- Advertisement Embedding Attacks (AEA) on LLMs and AI Agents - [https://arxiv.org/abs/2508.17674](https://arxiv.org/abs/2508.17674)
|
||||
- RAG Data Poisoning: Key Concepts Explained - [https://www.promptfoo.dev/blog/rag-poisoning/](https://www.promptfoo.dev/blog/rag-poisoning/)
|
||||
- Vector Database Security: 4 Critical Threats CISOs Must Address - [https://blog.purestorage.com/purely-technical/threats-every-ciso-should-know/](https://blog.purestorage.com/purely-technical/threats-every-ciso-should-know/)
|
||||
- Vector and Embedding Weaknesses in AI Systems - [https://www.mend.io/blog/vector-and-embedding-weaknesses-in-ai-systems/](https://www.mend.io/blog/vector-and-embedding-weaknesses-in-ai-systems/)
|
||||
- Adversarial Threat Vectors and Risk Mitigation for Retrieval-Augmented Generation - [https://arxiv.org/html/2506.00281v1](https://arxiv.org/html/2506.00281v1)
|
||||
- Adversarial Attacks on LLMs - Lil'Log - [https://lilianweng.github.io/posts/2023-10-25-adv-attack-llm/](https://lilianweng.github.io/posts/2023-10-25-adv-attack-llm/)
|
||||
- Efficient Adversarial Training in LLMs with Continuous Embeddings - [https://arxiv.org/abs/2405.15589](https://arxiv.org/abs/2405.15589)
|
||||
|
||||
Reference in New Issue
Block a user