Graph Structure Can Be Poisoned Too
Why knowledge graph traversal combined with vector search has unique injection vectors
The Conventional Framing
Graph RAG combines knowledge graph traversal with vector search. The graph captures entity relationships; vector search finds relevant content. Together they enable structured reasoning over connected knowledge.
The pattern excels at multi-hop questions requiring relationship understanding.
Why Graph Structure Is Attack Surface
The knowledge graph itself is attack surface. Edges can be added or modified to create paths to malicious nodes. Entity properties can contain injections. Graph traversal follows the structure—if the structure is poisoned, traversal leads to poison.
Attackers who can influence the graph have persistent influence over all queries that traverse affected nodes.
Architecture
Components:
- Entity extractor— identifies entities in query
- Graph store— knowledge graph with relationships
- Traverser— navigates graph from entities
- Vector search— finds content related to nodes
Trust Boundaries
- Query → Entity extraction — injection in query
- Graph structure → Traversal — poisoned edges or nodes
- Traversal → Results — malicious nodes returned
Threat Surface
| Threat | Vector | Impact |
|---|---|---|
| Graph poisoning | Add malicious nodes or edges to graph | Traversal reaches attacker content |
| Entity hijacking | Manipulate entity extraction to reference attacker nodes | Queries start from wrong nodes |
| Traversal path manipulation | Create edges that route traversal through malicious nodes | Clean queries hit poisoned content |
| Property injection | Store injections in node properties | Injection enters via graph data, not documents |
The ZIVIS Position
- •Graph structure is first-class attack surface.Nodes, edges, and properties are all injection vectors. Graph integrity is a security requirement.
- •Validate graph mutations.How are nodes and edges added? Who can modify the graph? Graph write access is high-value capability.
- •Audit traversal paths.Log which paths were traversed for each query. Anomalous traversal patterns may indicate graph poisoning.
What We Tell Clients
Graph RAG adds the knowledge graph as attack surface alongside documents. Edges, nodes, and properties can all be poisoned. An attacker with graph write access has persistent influence over queries.
Treat graph integrity as critical. Control who can modify structure, validate graph updates, and monitor for unusual traversal patterns.
Related Patterns
- Recursive Retrieval— following references without explicit graph
- Entity Memory— entities tracked in memory vs. graph