T-3003validatedactive
Tool Response Credential Capture
Capture credentials returned in tool or API responses that pass through the agent's context
Tactic
Credential Harvest (Stage 3)
Extract API keys, tokens, and credentials from agent context and connected services
Attack Class
RETROACTIVE-PRIV
Exploiting previously granted access or cached credentials to gain unauthorized capabilities
Evidence
validated
Reproduced in controlled lab environment (DVAA) with documented steps.
DVAA Validation
ToolBot credential responses
Honeypot Coverage (AgentPwn)
Queued
In scope for honeypot observation; trap page or telemetry hook not yet built.
Requires fake-tool fixture wired through MCP exploitation tier.
Detection (HackMyAgent)
Live1 live · 0 queued
CRED-001
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live5 live · 0 queued
How to Cite
AI Agent Threat Matrix T-3003 (Tool Response Credential Capture). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-3003