T-8002validatedactive
HTTP Callback
Exfiltrate data via HTTP POST requests to attacker-controlled endpoints
Tactic
Exfiltration (Stage 8)
Transfer collected data out of target environment
Attack Class
SKILL-EXFIL
Using legitimate tool capabilities for unauthorized data transfer
Evidence
validated
Reproduced in controlled lab environment (DVAA) with documented steps.
DVAA Validation
ToolBot fetch_url POST
Honeypot Coverage (AgentPwn)
An AgentPwn trap page produces a payload tagged with this technique class. Following the AgentPwn taxonomy of trap pages shows what an agent encounters.
AgentPwn's primary signal: payload callback fire.
Detection (HackMyAgent)
Live5 live · 0 queued
NET-001SANDBOX-001SANDBOX-002SANDBOX-003SANDBOX-004
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live1 live · 0 queued
How to Cite
AI Agent Threat Matrix T-8002 (HTTP Callback). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-8002