Exploiting Retrieval Augmented Generation in LLM-Powered Applications to Craft Imperceptible Malicious Responses
Attackers can craft visually indistinguishable malicious documents that, when used as reference sources for Retrieval Augmented Generation (RAG) in LLM-powered applications, can mislead the applications into generating incorrect and potentially harmful responses.