Skip to content

Agent to agent contamination

Malicious data or instructions propagate from one agent to another, spreading compromise.

A failure or compromise in one agent emits manipulated output that flows through orchestration, queues, or shared memory into a second agent which treats it as trusted input, turning a contained local failure into a customer-facing policy decision elsewhere in the system.

  1. Source agent fails — or is influencedManipulated — output
  2. Manipulated — outputOrchestration / — queue / shared memory
  3. Orchestration / — queue / shared memoryReceiving agent treats — input as trusted
  4. Receiving agent treats — input as trustedPolicy decision — elsewhere
  5. Policy decision — elsewhereCustomer-facing — action



Defence isolates each agent in its own zone, brokers every inter-agent message through a channel that source-labels content and preserves instruction-data separation, and stitches a single trace across boundaries so contamination cannot cross silently.

  1. Agent ASource labelling — on messages
  2. Source labelling — on messagesInstruction-data — separation
  3. Instruction-data — separationLinked — end-to-end trace
  4. Linked — end-to-end traceAgent B