RAG Security and Privacy: Formalizing the Threat Model and Attack Surface

Open in new window