T-1007validatedactive
Context Window Probing
Probe the agent's context window size and saturation level to prepare overflow attacks
Tactic
Reconnaissance (Stage 1)
Map the target agent's attack surface, capabilities, and behavioral boundaries
Attack Class
RETROACTIVE-PRIV
Exploiting previously granted access or cached credentials to gain unauthorized capabilities
Evidence
validated
Reproduced in controlled lab environment (DVAA) with documented steps.
DVAA Validation
LongwindBot context overflow
Honeypot Coverage (AgentPwn)
An AgentPwn trap page produces a payload tagged with this technique class. Following the AgentPwn taxonomy of trap pages shows what an agent encounters.
Detection (HackMyAgent)
Live1 live · 0 queued
WEBEXPOSE-001
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live1 live · 0 queued
How to Cite
AI Agent Threat Matrix T-1007 (Context Window Probing). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-1007