urcuqui/rag-poisoning-lab
A hands-on security lab demonstrating how to poison a Retrieval-Augmented Generation (RAG) system by injecting malicious data into its vector database. Learn RAG architecture, attack surfaces, poisoning techniques, detection methods, and mitigation strategies through a practical, lightweight demo.
Stars
2
Forks
—
Language
Jupyter Notebook
License
—
Category
Last pushed
Dec 15, 2025
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/rag/urcuqui/rag-poisoning-lab"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
LLAMATOR-Core/llamator
Red Teaming python-framework for testing chatbots and GenAI systems.
sleeepeer/PoisonedRAG
[USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented...
kelkalot/simpleaudit
Allows to red-team your AI systems through adversarial probing. It is simple, effective, and...
JuliusHenke/autopentest
CLI enabling more autonomous black-box penetration tests using Large Language Models (LLMs)
SecurityClaw/SecurityClaw
A modular, skill-based autonomous Security Operations Center (SOC) agent that monitors...