T-6001validatedactive
Memory Injection
Inject malicious entries into agent memory to persist instructions across sessions
Tactic
Persistence (Stage 6)
Establish persistent access surviving restarts and session changes
Attack Class
MEM-POISON
Injecting malicious entries into agent persistent memory to maintain control across sessions
Evidence
validated
Reproduced in controlled lab environment (DVAA) with documented steps.
DVAA Validation
L2-04
Honeypot Coverage (AgentPwn)
An AgentPwn trap page produces a payload tagged with this technique class. Following the AgentPwn taxonomy of trap pages shows what an agent encounters.
Detection (HackMyAgent)
Live6 live · 0 queued
MEM-001MEM-002MEM-003MEM-004MEM-005MEM-006
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live4 live · 0 queued
How to Cite
AI Agent Threat Matrix T-6001 (Memory Injection). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-6001