Data exfiltration via passive tool description
Description#
Passive tool description directs the model to send retrieved data to an attacker URL via a different tool (webhook). The malicious tool is never called — it acts as a silent instruction injector via the tool catalog.
References#
Simon Willison's formulation: access to private data + exposure to untrusted content + external communication = reliable exfiltration
HiddenLayer demonstrating Claude Desktop exfiltrating filesystem data via URL parameters to attacker webhook
HiddenLayer research on data exfiltration through MCP tool parameter manipulation
EchoLeak (CVE-2025-32711) zero-click exfiltration from M365 Copilot cited as real-world data exfiltration example
CamoLeak (CVE-2025-59145) using invisible Markdown and Camo URL pre-generation to bypass CSP for character-by-character exfiltration
OpenReview 2025 paper demonstrating a malicious logging MCP tool that silently captures all queries and responses
Framework Mappings#
| Framework | Technique ID | Name | Relationship |
|---|---|---|---|
| MITRE ATLAS | AML.T0051.001 | Direct Prompt Injection | primary |
| MITRE ATLAS | AML.T0062 | AI Agent Data Exfiltration | primary |
| MITRE ATT&CK | T1041 | Exfiltration Over C2 Channel | related |
| MITRE ATT&CK | T1567 | Exfiltration Over Web Service | related |
| OWASP LLM | LLM01 | Prompt Injection | primary |
| OWASP LLM | LLM02 | Sensitive Information Disclosure | primary |
| OWASP Agentic | ASI01 | Agentic Prompt Injection | primary |
| OWASP Agentic | ASI06 | Unreliable Tool Outputs | primary |
| cwe | CWE-74 | Improper Neutralization of Special Elements (Injection) | primary |
| cwe | CWE-200 | Exposure of Sensitive Information to an Unauthorized Actor | primary |
| OWASP MCP | MCP-01 | Tool Poisoning | primary |
| OWASP MCP | MCP-07 | Data Exfiltration via Tool Calls | primary |
Attack Structure#
Message Flow#
Indicators · match any#
YAML#
oatf: "0.1"
attack:
id: OATF-007
name: "Data exfiltration via passive tool description"
version: 2
status: experimental
created: 2026-03-24
author: "Oleg Mukhin"
description: |
Passive tool description directs the model to send retrieved data to an
attacker URL via a different tool (webhook). The malicious tool is never
called — it acts as a silent instruction injector via the tool catalog.
severity:
level: critical
confidence: 90
impact:
- data_exfiltration