Matrix/Exfiltration/T-8006
T-8006observedactive

Webhook Exfiltration

Exfiltrate data through webhook integrations like Slack, Telegram, or Discord

Tactic

Exfiltration (Stage 8)

Transfer collected data out of target environment

Attack Class

SKILL-EXFIL

Using legitimate tool capabilities for unauthorized data transfer

Evidence

observed

Confirmed in real-world production systems or internet-wide exposure assessments.

DVAA Validation

sandbox-telegram-allowed

Honeypot Coverage (AgentPwn)

An AgentPwn trap page produces a payload tagged with this technique class. Following the AgentPwn taxonomy of trap pages shows what an agent encounters.

Same callback channel as T-8002; observable per technique tag.

Detection (HackMyAgent)

Live5 live · 0 queued
SANDBOX-001SANDBOX-002SANDBOX-003SANDBOX-004NET-001
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implemented

Defense (OASB Controls)

Live1 live · 0 queued
Live = documented at oasb.ai; queued = declared, not yet documented

How to Cite

AI Agent Threat Matrix T-8006 (Webhook Exfiltration). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-8006