Section 01
[Introduction] Core and Panoramic Review of Security Protection for Retrieval-Augmented Generation (RAG)
This article focuses on the security issues of Retrieval-Augmented Generation (RAG). The core viewpoint is that the essence of RAG security is the safety of the external knowledge access pipeline. The article establishes operational boundaries to distinguish between inherent LLM risks and RAG-specific risks, systematically organizes attack and defense techniques across the six stages of the RAG workflow, three trust boundaries, and four main attack surfaces, and proposes directions for layered, boundary-aware full-lifecycle protection as well as practical recommendations for developers.