Matrix/Initial Access/T-2002
T-2002observedactive

Indirect Prompt Injection

Embed malicious instructions in external data sources consumed by the agent via RAG or tool responses

Tactic

Initial Access (Stage 2)

Gain control over agent behavior through prompt manipulation or input exploitation

Attack Class

RAG-POISON

Injecting malicious content into retrieval-augmented generation data sources

Evidence

observed

Confirmed in real-world production systems or internet-wide exposure assessments.

DVAA Validation

RAGBot

Honeypot Coverage (AgentPwn)

An AgentPwn trap page produces a payload tagged with this technique class. Following the AgentPwn taxonomy of trap pages shows what an agent encounters.

Detection (HackMyAgent)

Live5 live · 0 queued
PROMPT-001RAG-001RAG-002RAG-003RAG-004
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implemented

Defense (OASB Controls)

Live5 live · 0 queued
Live = documented at oasb.ai; queued = declared, not yet documented

How to Cite

AI Agent Threat Matrix T-2002 (Indirect Prompt Injection). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-2002