T-5004observedactive
Credential Reuse
Reuse harvested credentials to access additional services and agents
Tactic
Lateral Movement (Stage 5)
Pivot from compromised agent to connected services or other agents
Attack Class
RETROACTIVE-PRIV
Exploiting previously granted access or cached credentials to gain unauthorized capabilities
Evidence
observed
Confirmed in real-world production systems or internet-wide exposure assessments.
DVAA Validation
credential reuse
Honeypot Coverage (AgentPwn)
Out of scope
Not observable via content-side honeypot interaction. HackMyAgent or DVAA cover this where applicable.
Requires cross-system credential context that AgentPwn does not simulate.
Detection (HackMyAgent)
Live1 live · 0 queued
CRED-001
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live9 live · 0 queued
How to Cite
AI Agent Threat Matrix T-5004 (Credential Reuse). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-5004