Extracting Private Data from Retrieval-Augmented Generation Applications Using RAG-Thief: An Agent-Based Attack
RAG-Thief, an agent-based automated attack, can effectively extract private data from RAG applications by exploiting LLM vulnerabilities and leveraging iterative query generation based on leaked information.