Google's A2A Protocol Lacks Critical Defenses Against Prompt Injection Attacks, Security Analysis Reveals
Key Takeaways
- ▸A2A protocol provides zero built-in defenses against prompt injection, the #1 LLM vulnerability per OWASP Top 10
- ▸Agent Card signing is optional rather than mandatory, enabling attackers to spoof agent identities and capabilities
- ▸Opaque Execution design principle prevents calling agents from inspecting what tools, files, or network requests delegated agents invoke
Summary
A comprehensive security analysis of Google's Agent-to-Agent (A2A) protocol, which has reached v1.0 as the leading standard for AI agents to discover and delegate tasks to one another, has identified zero built-in defenses against prompt injection—the top vulnerability in the OWASP Top 10 for LLM Applications. The protocol, backed by major industry players including AWS, Microsoft, Salesforce, and IBM under the Linux Foundation, enables agents to collaborate without sharing internal implementation details, but this "Opaque Execution" design principle creates significant security blind spots.
The analysis, conducted by independent security researchers and confirmed by multiple security firms including Red Hat, Palo Alto Unit 42, Semgrep, and Trustwave SpiderLabs, documents ten specific security gaps. These include the lack of prompt injection detection mechanisms, optional (rather than mandatory) Agent Card signing that enables spoofing attacks, and the absence of protocol-level inspection of tool calls before execution. Palo Alto Unit 42 has already built a working proof-of-concept demonstrating cross-agent prompt injection vulnerabilities.
Additional gaps include the lack of a user-consent state before sensitive operations, implementation-defined (rather than standardized) authorization mechanisms, and no protocol-level gates to evaluate or block tool calls before remote agents execute them. The research suggests that while the A2A protocol's design prioritizes agent autonomy and privacy, it does so at the expense of security controls necessary to prevent malicious actors from injecting harmful commands through interconnected agent networks.
- No protocol-level user consent mechanism exists before remote agents process sensitive data or execute transactions
- Multiple security firms including Palo Alto Unit 42 have confirmed vulnerabilities with working proof-of-concept attacks
- Authorization and access control mechanisms are left entirely to individual implementations with no standardized security model
Editorial Opinion
While the A2A protocol's emphasis on agent autonomy and privacy through Opaque Execution is architecturally elegant, the complete absence of prompt injection defenses in a standard explicitly designed for multi-agent collaboration represents a critical oversight. The fact that this vulnerability was identified in v1.0—a major release backed by leading tech companies—suggests the security community was not adequately consulted during the protocol's development. These gaps must be addressed urgently before widespread adoption, as they could enable coordinated attacks across enterprise agent networks.


