Search papers, labs, and topics across Lattice.
This paper introduces \SysName, a framework for detecting attacks in multi-agent systems by analyzing cross-agent semantic flows. \SysName reconstructs fragmented operational primitives into behavioral trajectories, providing a holistic view of system activity that goes beyond static input filtering. A Supervisor LLM then scrutinizes these trajectories for anomalies, achieving F1-scores of 85.3\% and 66.7\% for node-level and path-level end-to-end attack detection, respectively, across ten distinct compound attack vectors.
Input guardrails are no match for multi-agent attacks: \SysName reconstructs cross-agent semantic flows to detect complex attacks that bypass traditional defenses.
Multi-Agent System is emerging as the \textit{de facto} standard for complex task orchestration. However, its reliance on autonomous execution and unstructured inter-agent communication introduces severe risks, such as indirect prompt injection, that easily circumvent conventional input guardrails. To address this, we propose \SysName, a framework that shifts the defensive paradigm from static input filtering to execution-aware analysis. By extracting and reconstructing Cross-Agent Semantic Flows, \SysName synthesizes fragmented operational primitives into contiguous behavioral trajectories, enabling a holistic view of system activity. We leverage a Supervisor LLM to scrutinize these trajectories, identifying anomalies across data flow violations, control flow deviations, and intent inconsistencies. Empirical evaluations demonstrate that \SysName effectively detects over ten distinct compound attack vectors, achieving F1-scores of 85.3\% and 66.7\% for node-level and path-level end-to-end attack detection, respectively. The source code is available at https://anonymous.4open.science/r/MAScope-71DC.