Beyond the Model: Securing Enterprise RAG Pipelines Against Supply Chain Injection Attacks in NWA Logistics Networks