Discover AI Agent Configuration (AML.T0084)

Tactic: Discovery

Tactics
Discovery
Maturity
demonstrated
Reference
atlas.mitre.org/techniques/AML.T0084

Description

Adversaries may attempt to discover configuration information for AI agents present on the victim’s system. Agent configurations can include tools or services they have access to.

Adversaries may directly access agent configuring dashboards or configuration files. They may also obtain configuration details by prompting the agent with questions such as “What tools do you have access to?”

Adversaries can use the information they discover about AI agents to help with targeting.

Sub-techniques

How GTK Cyber trains on this

GTK Cyber's hands-on AI security courses cover adversarial-AI techniques across the MITRE ATLAS framework, including the Discovery tactic this technique falls under. Our practitioner-led training is taught by Charles Givre and other field-tested SMEs and focuses on real adversarial scenarios, not slide decks.

View AI security courses →

Related techniques

Train your team on real adversarial-AI attacks.

GTK Cyber's AI red teaming courses are taught by practitioners who break models for a living.

View AI Security Courses