- Maturity
- demonstrated
- Reference
- atlas.mitre.org/techniques/AML.T0084.000
Description
Adversaries may attempt to discover the data sources a particular agent can access. The AI agent’s configuration may reveal data sources or knowledge.
The embedded knowledge may include sensitive or proprietary material such as intellectual property, customer data, internal policies, or even credentials. By mapping what knowledge an agent has access to, an adversary can better understand the AI agent’s role and potentially expose confidential information or pinpoint high-value targets for further exploitation.
How GTK Cyber trains on this
GTK Cyber's hands-on AI security courses cover adversarial-AI techniques across the MITRE ATLAS framework, including the relevant tactic this technique falls under. Our practitioner-led training is taught by Charles Givre and other field-tested SMEs and focuses on real adversarial scenarios, not slide decks.