T-7005observedactive
Configuration Harvesting
Harvest configuration files containing credentials, connection strings, and service details
Tactic
Collection (Stage 7)
Gather and stage data from databases, file systems, and APIs
Attack Class
NEMO-CRED-LEAK
Unintended exposure of credentials through environment variables, logs, or error messages
Evidence
observed
Confirmed in real-world production systems or internet-wide exposure assessments.
DVAA Validation
config harvesting
Honeypot Coverage (AgentPwn)
Queued
In scope for honeypot observation; trap page or telemetry hook not yet built.
Detection (HackMyAgent)
Live4 live · 1 queued
IO-001ENV-001ENV-002ENV-003ENV-004
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live4 live · 0 queued
How to Cite
AI Agent Threat Matrix T-7005 (Configuration Harvesting). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-7005