T-3005observed
Configuration File Access
Read configuration files containing credentials via tool access or path traversal
Tactic
Credential Harvest (Stage 3)
Extract API keys, tokens, and credentials from agent context and connected services
Attack Class
RETROACTIVE-PRIV
Exploiting previously granted access or cached credentials to gain unauthorized capabilities
Evidence
observed
Confirmed in real-world production systems or internet-wide exposure assessments.
DVAA Validation
ToolBot read config
Detection (HackMyAgent)
CRED-001ENV-001ENV-002ENV-003ENV-004
npx hackmyagent secure --ciDefense (OASB Controls)
OASB 5.1OASB 5.2OASB 5.3OASB 5.4OASB 5.5
How to Cite
AI Agent Threat Matrix T-3005 (Configuration File Access). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-3005