Unmasking Knowledge: How Attackers Exploit Graph RAG Systems

A new study reveals vulnerabilities in Retrieval-Augmented Generation systems built on graph databases, demonstrating how attackers can reconstruct sensitive knowledge from seemingly secure deployments.







