Is Monitoring Enough? Strategic Agent Selection For Stealthy Attack in Multi-Agent Discussions

cs.CR cs.AI Qiuchi Xiang, Haoxuan Qu, Hossein Rahmani, Jun Liu · Mar 22, 2026
Local to this browser
What it does
This paper investigates the security of multi-agent LLM discussions under continuous monitoring, where anomaly detectors block suspicious inter-agent messages. The authors identify that existing attacks either exhibit detectable patterns...
Why it matters
To address this, they develop a novel attack strategy using an adversarial-aware Friedkin-Johnsen opinion dynamics model to strategically select which agents to hijack and which targets to influence. Their findings demonstrate that even...
Main concern
The paper presents a rigorous security analysis with a novel mathematical foundation. The central contribution—an adversarial-aware formulation of opinion dynamics that models hijacked agents as stubborn broadcasters with selective...
Community signal
0
0 up · 0 down
Sign in to vote with arrows
AI Review AI reviewed
Plain-language introduction

This paper investigates the security of multi-agent LLM discussions under continuous monitoring, where anomaly detectors block suspicious inter-agent messages. The authors identify that existing attacks either exhibit detectable patterns (>93% detection rates) or become ineffective when adapted for stealth (<8% success). To address this, they develop a novel attack strategy using an adversarial-aware Friedkin-Johnsen opinion dynamics model to strategically select which agents to hijack and which targets to influence. Their findings demonstrate that even under continuous monitoring, attacks can achieve over 40% success rates, revealing that monitoring alone is insufficient to secure multi-agent systems.

Critical review
Verdict
Bottom line

The paper presents a rigorous security analysis with a novel mathematical foundation. The central contribution—an adversarial-aware formulation of opinion dynamics that models hijacked agents as stubborn broadcasters with selective influence—is technically sound and well-motivated by sociological theory. The empirical evidence convincingly establishes that naive monitoring strategies are insufficient against sophisticated adversaries. However, the work relies on the assumption that the Friedkin-Johnsen model accurately captures the complexity of LLM-based multi-agent interactions, which may oversimplify phenomena like chain-of-thought reasoning and multimodal exchanges.

“adversarial agents... can be viewed as very stubborn broadcasters. To model this behavior, for each adversarial agent j ∈ A, besides setting its intrinsic opinion sj = 1, we further enforce its expressed opinion zj(t) = 1, ∀t”
paper · Section 4.2
What holds up

The adversarial-aware opinion-dynamics formulation is the strongest component, introducing two key modifications to the standard FJ model: modeling adversarial agents as fully stubborn broadcasters and incorporating selective adversarial influence toward targets via a small additive increment $p$ to influence weights. The empirical analysis robustly establishes baseline failure modes: without stealth modifications, attacks face detection rates of at least 93.5%, while naive stealth modifications reduce attack success to at most 7.6%. The Stackelberg-style optimization framework and Theorem 1, which reduces the follower sub-problem to at most $\frac{2N^2-N-1}{9}$ alternative problems, provide a tractable solution to the otherwise exponential combinatorial search.

“anomaly detectors... achieve detection rates of at least 93.5% against existing attacks when applied to multi-agent discussions”
paper · Section 3.1
“Under the stealthiness constraint, the follower sub-problem... reduces to at most $\frac{2N^2-N-1}{9}$ alternative optimization problems, each admitting a closed-form solution”
paper · Section 4.3, Theorem 1
Main concerns

The paper assumes that the scalar opinion dynamics of the FJ model sufficiently capture the rich, multimodal interactions of LLM agents (exchanging text and images), which may not account for complex reasoning chains or context-dependent persuasion. The stealthiness hyperparameter $p = 10^{-3}$ is chosen without theoretical justification linking this specific magnitude to evasion properties of the detectors used. Additionally, while the threat model restricts adversarial agents to $\frac{N-1}{3}$ and affected edges to $\frac{M-1}{3}$, the paper does not analyze whether these specific bounds are fundamental or whether adaptive detectors could identify the subtle, structured perturbations described in the influence matrix modification (Eq. 3). The work also lacks discussion of potential countermeasures beyond blocking, such as reputation systems or dynamic topology adjustments.

“$w_{ij} \leftarrow \begin{cases}(1-\left|\mathcal{A}_{i}\right|p) w_{ij}, & j \notin \mathcal{A}_{i}, \\ (1-\left|\mathcal{A}_{i}\right|p) w_{ij}+p, & j \in \mathcal{A}_{i},\end{cases}$”
paper · Section 4.2, Eq. 3
Evidence and comparison

The evidence strongly supports the claim that monitoring alone is insufficient. Table 4 shows the proposed method achieves 28.7-43.5% $\Delta \text{Acc}$ on MMLU compared to 2.6-6.9% for original baseline strategies, while maintaining comparable low detection rates (~4.3-6.6% vs. 4.4-8.4%). The comparison against six heuristic selection variants (I-VI)—including strategies based on node degree, persuasiveness estimates, and stubbornness—effectively demonstrates that the mathematical optimization significantly outperforms intuitive approaches. However, the evaluation does not include adaptive monitoring baselines that might specifically detect the opinion-dynamics manipulation patterns induced by the adversarial formulation.

“Our strategy... 43.5% [ΔAcc]... 6.6% [Detection Rate]... Original strategy of MAD-Spear... 6.9% [ΔAcc]... 6.7% [Detection Rate]”
paper · Table 4 (Section 5.1)
“stealth-oriented modifications... they can largely evade anomaly detection... yet... their attack success becomes very low (at most 7.6%)”
paper · Table 1
Reproducibility

While the methodology is described in detail, critical implementation specifics—including exact prompts for stealth modifications and complete recovery procedures for FJ parameters—are referenced but not included in the main text. The experiments rely on GPT-4o (closed-source but accessible) and publicly available anomaly detectors (SelfCheckGPT, RAGAs, G-Safeguard). The paper reports an average solving time of 0.54 seconds for the optimization procedure (Table 7), suggesting computational feasibility, but does not explicitly mention code or data repository availability. Independent reproduction would require the supplementary materials containing prompt templates and the specific constrained least-squares implementation for recovering $\mathbf{\Theta}$ and $\mathbf{W}$ from agent interactions.

“We then derive $\mathbf{\Theta}$ and $\mathbf{W}$ using constrained least-squares methods following prior work... Full recovery details... are provided in Supplementary”
paper · Section 4.2
Abstract

Multi-agent discussions have been widely adopted, motivating growing efforts to develop attacks that expose their vulnerabilities. In this work, we study a practical yet largely unexplored attack scenario, the discussion-monitored scenario, where anomaly detectors continuously monitor inter-agent communications and block detected adversarial messages. Although existing attacks are effective without discussion monitoring, we show that they exhibit detectable patterns and largely fail under such monitoring constraints. But does this imply that monitoring alone is sufficient to secure multi-agent discussions? To answer this question, we develop a novel attack method explicitly tailored to the discussion-monitored scenario. Extensive experiments demonstrate that effective attacks remain possible even under continuous monitoring, indicating that monitoring alone does not eliminate adversarial risks.

Challenge the Review

Pick a starting point or write your own. Challenges run in the background, so you can keep reading while the AI investigates.

No challenges yet. Disagree with the review? Ask the AI to revisit a specific claim.