Skip to content
ATR-2026-00113criticalContext Exfiltrationexperimental

Credential File Theft from Agent Environment

Detects tools or agent instructions that access well-known credential files from the host environment. Attackers target files like ~/.aws/credentials, SSH private keys, Docker configs, and Kubernetes configs to gain lateral movement capabilities. When credential file access is combined with a network call, this strongly indicates exfiltration rather than legitimate local usage.

嚴重度
critical
類別
Context Exfiltration
掃描目標
both
作者
ATR Community

建議回應

block toolalertsnapshot

參考資料

OWASP Agentic
ASI03:2026 - Agent Identity and Access Abuse