Multi-agent systems (MAS) powered by artificial intelligence (AI) are increasingly foundational to complex, distributed workflows. Yet, the security of their underlying communication protocols remains critically under-examined. This paper presents the first empirical, comparative security analysis of the official CORAL implementation and a high-fidelity, SDK-based ACP implementation, benchmarked against a literature-based evaluation of A2A. Using a 14 point vulnerability taxonomy, we systematically assess their defenses across authentication, authorization, integrity, confidentiality, and availability. Our results reveal a pronounced security dichotomy: CORAL exhibits a robust architectural design, particularly in its transport-layer message validation and session isolation, but suffers from critical implementation-level vulnerabilities, including authentication and authorization failures at its SSE gateway. Conversely, ACP's architectural flexibility, most notably its optional JWS enforcement, translates into high-impact integrity and confidentiality flaws. We contextualize these findings within current industry trends, highlighting that existing protocols remain insufficiently secure. As a path forward, we recommend a hybrid approach that combines CORAL's integrated architecture with ACP's mandatory per-message integrity guarantees, laying the groundwork for resilient, next-generation agent communications.
翻译:由人工智能驱动的多智能体系统日益成为复杂分布式工作流的基础。然而,其底层通信协议的安全性仍严重缺乏检验。本文首次对官方CORAL实现与基于SDK的高保真ACP实现进行了实证性、比较性的安全分析,并以文献中A2A的评估为基准。采用包含14个条目的漏洞分类法,我们系统评估了它们在认证、授权、完整性、机密性和可用性方面的防御能力。我们的结果揭示了一个显著的安全二分现象:CORAL展现出稳健的架构设计,特别是在其传输层消息验证和会话隔离方面,但存在关键的实现级漏洞,包括其SSE网关处的认证和授权失效。相反,ACP的架构灵活性,最显著的是其可选的JWS强制执行,导致了高影响的完整性和机密性缺陷。我们将这些发现置于当前行业趋势中加以阐释,强调现有协议的安全性仍然不足。作为前进方向,我们建议采用一种混合方法,将CORAL的集成架构与ACP的强制性每消息完整性保证相结合,为弹性的下一代智能体通信奠定基础。