The Big Picture
A compromised agent registry can let attackers spoof agents, leak data, or block messages; defend with three practical options: full-byzantine replication (very strong but slow), active auditing (fast, high detection), or lightweight monitoring (cheap, near-live detection), or a hybrid mix to protect only the highest-risk agents.
ON THIS PAGE
The Evidence
A malicious or compromised Provider (the central registry and policy enforcer for agents) can break agent attribution, leak private data, prevent authorized communication, or permit unauthorized interactions. Full byzantine-resistant replication stops all these attacks but reduces throughput dramatically. Lightweight logging-based monitoring and owner-run auditing detect misbehavior with far less performance cost and can be tuned to reach high detection probabilities. A hybrid approach lets teams protect a small set of high-risk agents with strong replication while keeping most agents on cheaper monitored shards. Guardrails pattern
Not sure where to start?Get personalized recommendations
Data Highlights
1Full byzantine replication reduced throughput to roughly 1% of the original system for common requests.
2Monitoring retained about 95% of the original system’s throughput; auditing retained about 85%.
3A hybrid deployment can provide byzantine-level security for selected shards while increasing latency by as little as 2× for protected agents.
What This Means
Platform engineers and security teams building or operating agent registries and inter-agent communication should care because a single compromised Provider can enable large-scale data leaks or spoofed agent actions. Architects designing production agent deployments can use the trade-offs reported here to decide which agents need the strongest isolation and which can rely on cheaper detection mechanisms. Researchers evaluating multi-agent trust and governance can use these concrete attack patterns and measured trade-offs to guide future defenses. Capability Discovery Pattern
Key Figures

Fig 1: Figure 1 : The SAGA architecture with two users, Alice and Bob, each owning agents A1 and A2, respectively. Users and Agents interact with the Provider through the protocol manager which interfaces with the registries stored in a database and the access control engine. Agents also interact directly with each other as described in II-A .

Fig 2: Figure 2 : Fault-tolerant SAGA.

Fig 3: Figure 3 : SAGA configured with a sharded database.

Fig 4: Figure 4 : Summary of attack categories from a malicious Provider against SAGA.
Ready to evaluate your AI agents?
Learn how ReputAgent helps teams build trustworthy AI through systematic evaluation.
Learn MoreYes, But...
Auditing assumes attackers can’t reliably tell auditors from ordinary users—if attackers can, detection rates drop. Full byzantine replication requires more replicas (3f+1 vs 2f+1) and imposes heavy performance and operational cost. Monitoring depends on trustworthy, tamper-evident logs and provides detection after the fact rather than immediate prevention. Blackboard Pattern
Methodology & More
Analyzed a realistic agent governance setup where a centralized Provider manages agent identities, discovery, and access tokens. Identified practical attack surfaces when Provider components (access control engine, protocol manager, or database) behave arbitrarily—allowing message spoofing, selective omission of updates, or fabrication of responses that break user attribution and data confidentiality. Built concrete exploits to show how a compromised Provider can cause catastrophic failures in agent ecosystems. Model Context Protocol (MCP) Pattern
Designed three defense families and a hybrid: (1) full byzantine replication of controller and database to tolerate arbitrary faults (strongest guarantees but high cost); (2) owner-run auditing that injects known probes to detect wrong behavior with tunable check rates; and (3) operator-side monitoring that correlates logs and network events to detect invariant violations cheaply. Evaluated on realistic workloads: full replication cut throughput to ~1%, monitoring preserved ~95% throughput, and auditing ~85%. The hybrid lets teams put only high-risk users/agents on replicated shards and keep everything else on monitored shards, amortizing cost while giving configurable security guarantees. Practical takeaway: protect a small critical subset with replication and use monitoring/auditing to catch or limit damage across the rest. Agentic RAG Pattern
Avoid common pitfallsLearn what failures to watch for
Credibility Assessment:
Authors have very low h-indices and no notable affiliations or top-tier venue (arXiv), indicating limited credibility signals.