Matrix/Credential Harvest/T-3005
T-3005observed

Configuration File Access

Read configuration files containing credentials via tool access or path traversal

Tactic

Credential Harvest (Stage 3)

Extract API keys, tokens, and credentials from agent context and connected services

Attack Class

RETROACTIVE-PRIV

Exploiting previously granted access or cached credentials to gain unauthorized capabilities

Evidence

observed

Confirmed in real-world production systems or internet-wide exposure assessments.

DVAA Validation

ToolBot read config

Detection (HackMyAgent)

CRED-001ENV-001ENV-002ENV-003ENV-004
npx hackmyagent secure --ci

Defense (OASB Controls)

OASB 5.1OASB 5.2OASB 5.3OASB 5.4OASB 5.5

How to Cite

AI Agent Threat Matrix T-3005 (Configuration File Access). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-3005