Record summary
A quick snapshot of what this page covers.
Attack context
How this AI attack works in practice.
Adversaries may attempt to discover configuration information for AI agents present on the victim's system. Agent configurations can include tools or services they have access to.
Adversaries may directly access agent configuring dashboards or configuration files. They may also obtain configuration details by prompting the agent with questions such as "What tools do you have access to?"
Adversaries can use the information they discover about AI agents to help with targeting.
- ATLAS ID
- AML.T0084
- Priority score
- 20
Mitigations
Defenses that may help against this attack.
Case studies
Examples from public reports and exercises.
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.