T-8005validatedactive
Conversation Exfiltration
Exfiltrate data by encoding it in the agent's visible conversation responses
Tactic
Exfiltration (Stage 8)
Transfer collected data out of target environment
Attack Class
RETROACTIVE-PRIV
Exploiting previously granted access or cached credentials to gain unauthorized capabilities
Evidence
validated
Reproduced in controlled lab environment (DVAA) with documented steps.
DVAA Validation
All agents
Honeypot Coverage (AgentPwn)
An AgentPwn trap page produces a payload tagged with this technique class. Following the AgentPwn taxonomy of trap pages shows what an agent encounters.
Detection (HackMyAgent)
Live4 live · 0 queued
SANDBOX-001SANDBOX-002SANDBOX-003SANDBOX-004
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live1 live · 0 queued
How to Cite
AI Agent Threat Matrix T-8005 (Conversation Exfiltration). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-8005