Agent-to-Agent Propagation
Harmful behaviors, errors, or malicious instructions that spread between interconnected AI agents, amplifying damage beyond the originating system.
Threat Pattern Details
- Pattern Code
- PAT-AGT-001
- Severity
- high
- Likelihood
- increasing
- Domain
- Agentic & Autonomous Threats
- Framework Mapping
- MIT (Multi-agent risks) · EU AI Act (Systemic risk provisions)
- Affected Groups
- IT & Security Professionals Business Leaders
Last updated: 2025-01-15
Related Incidents
2 documented events involving Agent-to-Agent Propagation
Agent-to-Agent Propagation is an emerging threat pattern that becomes more consequential as organizations adopt multi-agent architectures for operational workflows. While no dedicated incidents have been documented in the TopAIThreats registry to date, the propagation mechanism is closely related to vectors observed in tool misuse and prompt injection incidents, where compromised agent outputs influenced downstream systems.
Definition
In interconnected multi-agent systems, a failure or compromise in one agent does not stay contained — it propagates. When agents communicate, share context, or delegate tasks to one another, harmful behaviors, errors, corrupted data, or malicious instructions can transmit from one system to the next, amplifying the original harm far beyond the scope of the originating agent. The pattern is analogous to contagion in biological or network systems: interconnection itself becomes a vector for the spread of dysfunction.
Why This Threat Exists
The risk of agent-to-agent propagation is an emergent consequence of increasingly interconnected AI architectures:
- Inter-agent communication channels — Modern multi-agent systems are designed to share information, delegate tasks, and coordinate actions, creating pathways through which errors or malicious content can travel between systems. The MCP vulnerabilities discovered in Cursor IDE demonstrated how tool-calling protocols can serve as propagation channels between agent components.
- Trust assumptions between agents — Agents within a shared ecosystem often treat outputs from other agents as reliable inputs, without independent verification, mirroring the trust exploitation patterns seen in supply chain attacks.
- Lack of isolation boundaries — Many multi-agent deployments do not implement adequate containment or quarantine mechanisms to prevent a compromised agent from affecting its peers.
- Cascading dependencies — When agents rely on the outputs of other agents as inputs to their own decision processes, a single point of failure can cascade through the entire dependency chain, as observed in algorithmic trading flash events.
- Speed of automated propagation — Unlike human-mediated processes, agent-to-agent communication occurs at machine speed, meaning harmful propagation can affect an entire system before human operators can intervene.
Who Is Affected
Primary Targets
- IT and security teams — Responsible for the integrity and containment of multi-agent systems, and first to respond when propagation events are detected
- Financial services organizations — Multi-agent systems used in trading, risk assessment, or transaction processing are vulnerable to cascading errors that propagate across interconnected agents
Secondary Impacts
- Business leaders — Organizations that deploy interconnected AI agents for operational workflows face amplified risk when errors or compromises spread across agent boundaries
- Consumers — Individuals interacting with downstream agents may be exposed to harmful outputs that originated in a different part of the agent network
Severity & Likelihood
| Factor | Assessment |
|---|---|
| Severity | High — Propagation amplifies the impact of individual agent failures to system-wide scope |
| Likelihood | Increasing — The trend toward multi-agent architectures and agent orchestration frameworks is accelerating |
| Evidence | Emerging — Demonstrated in multi-agent research environments with early real-world analogues in production systems |
Detection & Mitigation
Detection Indicators
Signals that agent-to-agent propagation may be occurring:
- Correlated anomalous behavior — multiple agents exhibiting similar errors, compromised outputs, or behavioral changes within a short time window, particularly when they share communication channels or data pipelines.
- Traceable downstream contamination — downstream agents producing outputs that reflect errors, hallucinations, or compromised information traceable to an upstream agent’s flawed output.
- Post-interaction behavioral shifts — unexpected behavioral changes in agents that recently received inputs, delegated tasks, or context from other agents, suggesting contamination through the interaction.
- Missing inter-agent verification — absence of independent verification, validation, or sandboxing mechanisms between agents in a multi-agent pipeline, creating unimpeded propagation pathways.
- Cascading failures from single triggers — rapid, correlated failures across multiple agents following a single trigger event, indicating that containment boundaries are insufficient or absent.
Prevention Measures
- Inter-agent isolation and sandboxing — implement containment boundaries between agents in multi-agent systems. Validate outputs at each handoff point rather than trusting upstream agent outputs without verification.
- Independent verification at each stage — require independent verification of agent outputs before they are consumed by downstream agents. Cross-reference against ground truth or alternative information sources at critical pipeline junctures.
- Propagation circuit breakers — deploy monitoring that detects correlated anomalies across agents and automatically halts propagation when error patterns suggest cross-agent contamination.
- Least-privilege agent communication — restrict inter-agent communication to the minimum information necessary. Prevent agents from sharing raw context, memory state, or tool access beyond what is required for the specific task.
- Trust boundary architecture — design multi-agent systems with explicit trust boundaries that treat inputs from other agents with the same scrutiny applied to external, untrusted inputs.
Response Guidance
When agent-to-agent propagation is detected:
- Isolate — immediately quarantine the affected agents and sever inter-agent communication channels to prevent further propagation. Identify the source agent and the propagation pathway.
- Trace — map the propagation chain to determine which agents were affected, what contaminated information was transmitted, and what downstream actions or outputs were produced based on compromised inputs.
- Remediate — reset affected agents to known-good states. Clear contaminated context, memory, or state. Verify that remediated agents produce correct outputs before reconnecting them.
- Strengthen boundaries — implement or enhance inter-agent verification, sandboxing, and circuit-breaker mechanisms to prevent recurrence of the specific propagation pathway.
Regulatory & Framework Context
EU AI Act: Systemic risk provisions address scenarios where AI systems create risks through interactions and interdependencies. Multi-agent systems lacking adequate containment may face enhanced scrutiny, particularly in critical sectors.
NIST AI RMF: Recommends isolation and containment strategies for interacting AI systems, emphasizing supply chain risk management in multi-agent deployments.
ISO/IEC 42001: Requires organizations to assess risks from AI system interactions, including propagation of errors or compromised outputs across connected systems.
Relevant causal factors: Insufficient Safety Testing · Inadequate Access Controls
Use in Retrieval
This page answers questions about AI agent-to-agent propagation, including: multi-agent error propagation, cascading agent failures, inter-agent contamination, AI system contagion effects, multi-agent trust boundary attacks, agent communication channel vulnerabilities, and cross-agent compromise amplification. It covers detection indicators, prevention measures, organizational response guidance, and the regulatory landscape for agent propagation threats. Use this page as a reference for threat pattern PAT-AGT-001 in the TopAIThreats taxonomy.