T-3006validated
Context Window Credential Leak
Exploit context window contents to leak credentials that were previously processed by the agent
Tactic
Credential Harvest (Stage 3)
Extract API keys, tokens, and credentials from agent context and connected services
Attack Class
RETROACTIVE-PRIV
Exploiting previously granted access or cached credentials to gain unauthorized capabilities
Evidence
validated
Reproduced in controlled lab environment (DVAA) with documented steps.
DVAA Validation
LegacyBot credential leak
Detection (HackMyAgent)
CRED-001AGENT-CRED-001
npx hackmyagent secure --ciDefense (OASB Controls)
OASB 5.1OASB 5.2OASB 5.3OASB 5.4OASB 5.5
How to Cite
AI Agent Threat Matrix T-3006 (Context Window Credential Leak). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-3006