Matrix/Collection/T-7005
T-7005observedactive

Configuration Harvesting

Harvest configuration files containing credentials, connection strings, and service details

Tactic

Collection (Stage 7)

Gather and stage data from databases, file systems, and APIs

Attack Class

NEMO-CRED-LEAK

Unintended exposure of credentials through environment variables, logs, or error messages

Evidence

observed

Confirmed in real-world production systems or internet-wide exposure assessments.

DVAA Validation

config harvesting

Honeypot Coverage (AgentPwn)

Queued

In scope for honeypot observation; trap page or telemetry hook not yet built.

Detection (HackMyAgent)

Live4 live · 1 queued
IO-001ENV-001ENV-002ENV-003ENV-004
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implemented

Defense (OASB Controls)

Live4 live · 0 queued
Live = documented at oasb.ai; queued = declared, not yet documented

How to Cite

AI Agent Threat Matrix T-7005 (Configuration Harvesting). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-7005