T-7001validatedactive
File System Enumeration
Enumerate and read files from the agent's accessible file system via path traversal or tool access
Tactic
Collection (Stage 7)
Gather and stage data from databases, file systems, and APIs
Attack Class
NEMO-SANDBOX-ESCAPE
Breaking out of agent sandbox restrictions to access the underlying file system or OS
Evidence
validated
Reproduced in controlled lab environment (DVAA) with documented steps.
DVAA Validation
ToolBot path traversal
Honeypot Coverage (AgentPwn)
Out of scope
Not observable via content-side honeypot interaction. HackMyAgent or DVAA cover this where applicable.
DVAA covers; not a content-side honeypot signal.
Detection (HackMyAgent)
Live1 live · 3 queued
IO-001IO-002IO-003IO-004
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live4 live · 0 queued
How to Cite
AI Agent Threat Matrix T-7001 (File System Enumeration). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-7001