Trap Types
Learn about the three classes of LobsterHoney traps -- callback tokens, extraction tokens, and canary credentials.
LobsterHoney provides three classes of intelligent traps, each designed to extract different types of intelligence from visiting AI agents.
Callback tokens are detection-focused traps. They embed hidden URLs in your content that "phone home" to LobsterHoney when accessed. This is the simplest and most reliable detection mechanism.
How They Work
When a trap is accessed, LobsterHoney embeds hidden callback URLs in the response. If a visitor follows one of these callback URLs, it provides strong evidence that the visitor is processing and acting on the content -- a hallmark of AI agents.
When to Use
- As a tripwire in documentation pages that AI agents frequently crawl
- Embedded in API responses that agents might parse
- Hidden in robots.txt or sitemap files where crawlers look first
Deployment Example
curl https://your-beacon-domain.com/s/your-org/robots.txtThe response will contain hidden callback URLs. When an AI agent follows one, a detection event is recorded immediately.
Extraction tokens go beyond detection. They are designed to capture the instructions and identity of visiting AI agents.
How They Work
LobsterHoney embeds specially crafted payloads into trap responses that encourage AI agents to reveal their system prompts and configuration details. Because AI agents process text as instructions, they often comply -- revealing their full instruction set.
When to Use
- When you need to identify who is operating an AI agent and what its mission is
- In content-rich pages where AI agents are likely to process and summarize text
- As a forensic tool for investigating suspicious automated activity
Deployment Example
curl https://your-beacon-domain.com/s/your-org/api/v1/configThe response includes hidden payloads that capture agent instructions and identity when processed.
Canary credentials are fake API keys, database connection strings, and access tokens designed to detect credential harvesting by AI agents.
How They Work
LobsterHoney plants realistic-looking credentials in trap files like .env, config.yaml, or wp-config.php. These credentials point back to LobsterHoney monitoring endpoints. When an AI agent extracts and attempts to use these credentials, it triggers an immediate alert with full attribution data.
When to Use
- In
.envfiles or configuration files that are common targets for credential scraping - In Git repositories where agents scan for accidentally committed secrets
- In documentation that references API keys or connection strings
Deployment Example
curl https://your-beacon-domain.com/s/your-org/.envReturns realistic-looking credentials that appear genuine. When an AI agent extracts and attempts to use any of these credentials, it triggers an immediate alert with full attribution data.
Choosing the Right Trap
| Trap Type | Primary Purpose | Intelligence Level | Best For |
|---|---|---|---|
| Callback Token | Detection | Basic (hit metadata) | High-traffic pages, broad coverage |
| Extraction Token | Intelligence gathering | Deep (system prompts, identity) | Targeted investigation, content pages |
| Canary Credential | Attribution | Medium (credential usage patterns) | Config files, repos, documentation |
For maximum coverage, deploy all three types across your infrastructure. Callback tokens cast a wide net, extraction tokens provide deep intelligence on agents that interact with content, and canary credentials catch credential-harvesting agents that other methods might miss.