Matrix/Persistence/T-6003
T-6003observedactive

Configuration Modification

Modify agent or gateway configuration files to maintain persistent access

Tactic

Persistence (Stage 6)

Establish persistent access surviving restarts and session changes

Attack Class

GATEWAY-EXPLOIT

Modifying gateway or proxy configurations to intercept, redirect, or manipulate agent traffic

Evidence

observed

Confirmed in real-world production systems or internet-wide exposure assessments.

DVAA Validation

config modification

Honeypot Coverage (AgentPwn)

Out of scope

Not observable via content-side honeypot interaction. HackMyAgent or DVAA cover this where applicable.

Agent's own config; not observable via web honeypot.

Detection (HackMyAgent)

Live8 live · 0 queued
GATEWAY-001GATEWAY-002GATEWAY-003GATEWAY-004GATEWAY-005GATEWAY-006GATEWAY-007GATEWAY-008
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implemented

Defense (OASB Controls)

Live4 live · 0 queued
Live = documented at oasb.ai; queued = declared, not yet documented

How to Cite

AI Agent Threat Matrix T-6003 (Configuration Modification). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-6003