OPEN_SOURCE ↗
REDDIT · REDDIT// 25d agoTUTORIAL
mcp-attack-labs exposes local RAG poisoning
Amine Raji’s lab shows how a fully local ChromaDB + LM Studio/Ollama RAG stack can be poisoned with crafted documents so the model returns fabricated financials as fact. The writeup includes a reproducible PoC plus measurements for chunking effects and layered defenses.
// ANALYSIS
This is a sharp reminder that local RAG is not inherently safer just because it runs on your laptop. The weak point is the write path, and once poisoned context is retrieved, the model will often trust it more than the original source.
- –Standard 512-token chunks with 200-token overlap increase retrieval chances for boundary-spanning poison.
- –The attack needs no jailbreak, no API access, and no model compromise, just write access to the collection.
- –Output monitoring is too late; the damage is already baked into the context window.
- –Embedding anomaly detection at ingestion was the strongest single defense in the lab, cutting success from 95% to 20%.
- –Even with five layers active, the residual 10% shows semantically clean attacks can still slip through.
// TAGS
mcp-attack-labsragvector-dbembeddingself-hostedresearchchromadblm-studio
DISCOVERED
25d ago
2026-03-17
PUBLISHED
25d ago
2026-03-17
RELEVANCE
8/ 10
AUTHOR
AICyberPro