T-8006observedactive
Webhook Exfiltration
Exfiltrate data through webhook integrations like Slack, Telegram, or Discord
Tactic
Exfiltration (Stage 8)
Transfer collected data out of target environment
Attack Class
SKILL-EXFIL
Using legitimate tool capabilities for unauthorized data transfer
Evidence
observed
Confirmed in real-world production systems or internet-wide exposure assessments.
DVAA Validation
sandbox-telegram-allowed
Honeypot Coverage (AgentPwn)
An AgentPwn trap page produces a payload tagged with this technique class. Following the AgentPwn taxonomy of trap pages shows what an agent encounters.
Same callback channel as T-8002; observable per technique tag.
Detection (HackMyAgent)
Live5 live · 0 queued
SANDBOX-001SANDBOX-002SANDBOX-003SANDBOX-004NET-001
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live1 live · 0 queued
How to Cite
AI Agent Threat Matrix T-8006 (Webhook Exfiltration). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-8006