Different Methods, Different Injection Profiles
Why combining dense and sparse retrieval creates a union of vulnerabilities
The Conventional Framing
Fusion retrieval combines dense (vector) and sparse (BM25/keyword) retrieval, merging results via reciprocal rank fusion or other algorithms. Different methods find different relevant documents.
The pattern improves recall by leveraging complementary retrieval approaches.
Why This Unions Attack Vectors
Dense and sparse retrieval have different vulnerabilities. Fusion doesn't pick the more secure one—it combines results, meaning attacks against either method can succeed.
You don't get the intersection of safety properties. You get the union of attack vectors.
Architecture
Components:
- Dense retrieval— embedding-based semantic search
- Sparse retrieval— keyword/term-based search
- Fusion algorithm— combines and ranks results
Trust Boundaries
- Query → Dense — dense-specific attacks
- Query → Sparse — sparse-specific attacks
- Fusion → Results — attacks from either method succeed
Threat Surface
| Threat | Vector | Impact |
|---|---|---|
| Method-specific attacks | Exploit weaknesses unique to each retrieval type | Attack succeeds against whichever method is weaker |
| Fusion manipulation | Score high in both methods to dominate merged results | Malicious content at top of fused rankings |
| Attack surface union | Fusion combines vulnerabilities of all methods | More attack vectors, not fewer |
The ZIVIS Position
- •Fusion is additive for attack surface.You're not getting the most secure method. You're exposing vulnerabilities of all methods you fuse.
- •Security requires method-specific defenses.Each retrieval method needs its own security measures. Fusion doesn't provide unified protection.
- •Consider which method to trust.When dense and sparse disagree on a result, that disagreement might be a security signal, not just relevance noise.
What We Tell Clients
Fusion retrieval combines attack surfaces, not security properties. An attack that works against either method will succeed.
Implement security measures for each retrieval method independently. Consider whether disagreement between methods (one retrieves, one doesn't) should be a flag for additional scrutiny.
Related Patterns
- Multi-Query Retrieval— multiple queries vs. multiple methods
- Naive RAG— single-method baseline