T-6003observedactive
Configuration Modification
Modify agent or gateway configuration files to maintain persistent access
Tactic
Persistence (Stage 6)
Establish persistent access surviving restarts and session changes
Attack Class
GATEWAY-EXPLOIT
Modifying gateway or proxy configurations to intercept, redirect, or manipulate agent traffic
Evidence
observed
Confirmed in real-world production systems or internet-wide exposure assessments.
DVAA Validation
config modification
Honeypot Coverage (AgentPwn)
Out of scope
Not observable via content-side honeypot interaction. HackMyAgent or DVAA cover this where applicable.
Agent's own config; not observable via web honeypot.
Detection (HackMyAgent)
Live8 live · 0 queued
GATEWAY-001GATEWAY-002GATEWAY-003GATEWAY-004GATEWAY-005GATEWAY-006GATEWAY-007GATEWAY-008
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live4 live · 0 queued
How to Cite
AI Agent Threat Matrix T-6003 (Configuration Modification). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-6003