Skip to content
ATR-2026-00113criticalContext Exfiltrationexperimental

Credential File Theft from Agent Environment

Detects tools or agent instructions that access well-known credential files from the host environment. Attackers target files like ~/.aws/credentials, SSH private keys, Docker configs, and Kubernetes configs to gain lateral movement capabilities. When credential file access is combined with a network call, this strongly indicates exfiltration rather than legitimate local usage.

Severity
critical
Category
Context Exfiltration
Scan Target
both
Author
ATR Community

Response Actions

block toolalertsnapshot

References

OWASP Agentic
ASI03:2026 - Agent Identity and Access Abuse