T-3001observedactive
System Prompt Credential Extraction
Extract credentials hardcoded or referenced in the agent's system prompt
Tactic
Credential Harvest (Stage 3)
Extract API keys, tokens, and credentials from agent context and connected services
Attack Class
RETROACTIVE-PRIV
Exploiting previously granted access or cached credentials to gain unauthorized capabilities
Evidence
observed
Confirmed in real-world production systems or internet-wide exposure assessments.
DVAA Validation
L1-02
Honeypot Coverage (AgentPwn)
An AgentPwn trap page produces a payload tagged with this technique class. Following the AgentPwn taxonomy of trap pages shows what an agent encounters.
Detection (HackMyAgent)
Live4 live · 0 queued
CRED-001CRED-002CRED-003CRED-004
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live5 live · 0 queued
How to Cite
AI Agent Threat Matrix T-3001 (System Prompt Credential Extraction). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-3001