ATR-2026-00113criticalContext Exfiltrationexperimental
Credential File Theft from Agent Environment
Detects tools or agent instructions that access well-known credential files from the host environment. Attackers target files like ~/.aws/credentials, SSH private keys, Docker configs, and Kubernetes configs to gain lateral movement capabilities. When credential file access is combined with a network call, this strongly indicates exfiltration rather than legitimate local usage.
嚴重度
critical
類別
Context Exfiltration
掃描目標
both
作者
ATR Community
建議回應
block toolalertsnapshot
參考資料
OWASP Agentic
ASI03:2026 - Agent Identity and Access Abuse