T-5006validatedactive
Internal API Discovery
Discover and access internal APIs from the agent's network position
Tactic
Lateral Movement (Stage 5)
Pivot from compromised agent to connected services or other agents
Attack Class
MCP-EXPLOIT
Attacking Model Context Protocol server configurations, tool registrations, and inter-server trust
Evidence
validated
Reproduced in controlled lab environment (DVAA) with documented steps.
DVAA Validation
network scanning from agent
Honeypot Coverage (AgentPwn)
Queued
In scope for honeypot observation; trap page or telemetry hook not yet built.
Fake internal-API trap fixture not yet built.
Detection (HackMyAgent)
Live3 live · 0 queued
NET-001NET-002NET-003
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live9 live · 0 queued
How to Cite
AI Agent Threat Matrix T-5006 (Internal API Discovery). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-5006