T-6007validatedactive
Persistent Agent State Manipulation
Attacks that persist across agent sessions via memory poisoning, state tampering, and cached context injection
Tactic
Persistence (Stage 6)
Establish persistent access surviving restarts and session changes
Attack Class
PERSIST-STATE
Cross-session persistence via memory poisoning, state tampering, and cached context injection
Evidence
validated
Reproduced in controlled lab environment (DVAA) with documented steps.
DVAA Validation
persistent-agent-memory-poison scenario validates cross-session persistence attacks
Detection (HackMyAgent)
Queued0 live · 10 queued
PERSIST-001PERSIST-002PERSIST-003PERSIST-004PERSIST-005PERSIST-006PERSIST-007PERSIST-008PERSIST-009PERSIST-010
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live3 live · 0 queued
How to Cite
AI Agent Threat Matrix T-6007 (Persistent Agent State Manipulation). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-6007