Compound AI System: A pipeline integrating multiple LLMs, external databases (RAG), and software tools to perform complex tasks
Attack Gadget: A discrete, reusable exploitation primitive (algorithmic, software, or hardware) that contributes to a larger attack chain
Rowhammer: A hardware attack where repeatedly accessing specific memory rows causes bit-flips in adjacent rows, altering data without direct access
RAG: Retrieval-Augmented Generation—fetching external data to ground LLM responses
Guardrail: A specific model or software component designed to filter unsafe inputs or outputs in an AI pipeline
CVE: Common Vulnerabilities and Exposures—publicly disclosed cybersecurity flaws in software
T1/T2/T3 Attackers: A classification of adversary power: T1 (Remote/Black-box), T2 (Privileged/White-box), T3 (Hardware access)
SSRF: Server-Side Request Forgery—a vulnerability where an attacker forces a server to make unauthorized requests to internal resources
SQL Injection: Injecting malicious SQL queries to manipulate database execution