Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
MAI-2025-0002
Published:May 16, 2026
Updated:May 16, 2026
Large Language Model (LLM)-based Multi-Agent Systems (MAS) are susceptible to intellectual property (IP) leakage attacks. These attacks can be executed by adversaries with black-box access, who interact solely through public APIs. By crafting adversarial queries, attackers can infiltrate the MAS, extracting sensitive information such as system prompts, task instructions, tool specifications, the number of agents, and the overall system topology. Mitigation steps: **For AI Developers:** * Implement robust input sanitization and validation mechanisms to prevent adversarial queries from propagating successfully, considering semantic content and potential impact within the multi-agent system's context. * Carefully filter the output from each agent, ensuring sensitive information is removed before passing to subsequent agents, while maintaining legitimate functionality. * Explore the application of differential privacy techniques to mask sensitive information in system prompts, task instructions, or tool outputs. * Implement system-wide monitoring to detect unusual query patterns or unexpected data leakage, focusing on multi-agent interactions. **For Model Trainers/Fine-tuners:** * Train the LLMs within the MAS agents using adversarial examples to enhance resilience against malicious inputs. * Carefully design the MAS architecture to limit information flow between agents, minimizing damage propagation if an agent is compromised, and consider using robust topologies to mitigate information propagation attacks.
Related Resources (1)
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
LOW
Subsequent System Availability
NONE
CVSS v3
Base Score:
8.6
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
AIVSS
Base Score:
5.7