T-2002observedactive
Indirect Prompt Injection
Embed malicious instructions in external data sources consumed by the agent via RAG or tool responses
Tactic
Initial Access (Stage 2)
Gain control over agent behavior through prompt manipulation or input exploitation
Attack Class
RAG-POISON
Injecting malicious content into retrieval-augmented generation data sources
Evidence
observed
Confirmed in real-world production systems or internet-wide exposure assessments.
DVAA Validation
RAGBot
Honeypot Coverage (AgentPwn)
An AgentPwn trap page produces a payload tagged with this technique class. Following the AgentPwn taxonomy of trap pages shows what an agent encounters.
Detection (HackMyAgent)
Live5 live · 0 queued
PROMPT-001RAG-001RAG-002RAG-003RAG-004
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live5 live · 0 queued
How to Cite
AI Agent Threat Matrix T-2002 (Indirect Prompt Injection). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-2002