{"id":116732,"date":"2025-10-30T10:00:43","date_gmt":"2025-10-30T03:00:43","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=116732"},"modified":"2026-04-01T15:21:35","modified_gmt":"2026-04-01T08:21:35","slug":"agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/de\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/","title":{"rendered":"Mit den MCP- und A2A-Protokollen steigen die Sicherheitsrisiken f\u00fcr agentenbasierte KI."},"content":{"rendered":"<p><span data-contrast=\"auto\">Die rasante Entwicklung agentenbasierter KI \u2013 autonomer Systeme, die Entscheidungen treffen, Tools entdecken und mit anderen Agenten zusammenarbeiten k\u00f6nnen \u2013 ver\u00e4ndert die Cybersicherheit von Unternehmen grundlegend. W\u00e4hrend Organisationen Frameworks wie das Model Context Protocol (MCP) von Anthropic, Googles Agent-to-Agent (A2A) und IBMs Agent Communication Protocol (ACP) einsetzen, warnen Experten davor, dass die n\u00e4chste Welle von Cyberbedrohungen nicht von Datenlecks, sondern von Sicherheitsl\u00fccken in Agenten ausgehen wird.\u201c<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Anders als bei herk\u00f6mmlichen Sicherheitsvorf\u00e4llen, bei denen sensible Daten offengelegt werden, beruhen Agentenangriffe auf unbeabsichtigtem oder unautorisiertem Verhalten von Agenten. Dabei interpretieren KI-Modelle Befehle falsch, greifen auf gesch\u00fctzte Systeme zu oder teilen Informationen \u00fcber ungesicherte Kan\u00e4le. Diese Vorf\u00e4lle ereignen sich in Maschinengeschwindigkeit und sind daher schneller und sch\u00e4dlicher als von Menschen gesteuerte Angriffe.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Zu den wichtigsten Sicherheitsherausforderungen geh\u00f6ren:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">MCP-Schwachstellen:<\/span><\/b><span data-contrast=\"auto\"> Agenten k\u00f6nnen zwar dynamisch Tools erkennen, aber ohne Verifizierungsebenen besteht die Gefahr, dass sie mit nicht vertrauensw\u00fcrdigen oder b\u00f6sartigen Anwendungen interagieren.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">A2A-Rechenschaftsl\u00fccken:<\/span><\/b><span data-contrast=\"auto\"> Wenn Mitarbeiter verschiedener Anbieter miteinander kommunizieren, wird die Zust\u00e4ndigkeit f\u00fcr Entscheidungen und die Datenintegrit\u00e4t unklar.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Ausnutzbare Angriffsfl\u00e4chen:<\/span><\/b><span data-contrast=\"auto\"> Hacker k\u00f6nnen Modellarchitekturen extrahieren, Werkzeugschemata stehlen oder Agentenanweisungen manipulieren, um Zugriff auf Unternehmenssysteme zu erhalten.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Beispiele aus der Praxis verdeutlichen, wie Angreifer Zahlungsagenten durch Datenvergiftung zu betr\u00fcgerischen Transaktionen verleiten oder Multiagenten-Entscheidungssysteme im Laufe der Zeit manipulieren k\u00f6nnen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Um diese Risiken zu mindern, empfehlen f\u00fchrende Experten f\u00fcr Cybersicherheit Folgendes: <\/span><b><span data-contrast=\"auto\">F\u00fcnf-Schritte-Rahmenwerk<\/span><\/b><span data-contrast=\"auto\"> f\u00fcr eine sichere KI-Einf\u00fchrung:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ol>\n<li><b><span data-contrast=\"auto\">Zentralisierung des Modellzugriffs<\/span><\/b><span data-contrast=\"auto\"> \u00fcber \u00fcberwachte Gateways.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Verwenden Sie Hyperscaler-Tools<\/span><\/b><span data-contrast=\"auto\"> aber die Kontrolle \u00fcber die Modellauswahl behalten.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Einhaltung der Lieferantenrichtlinien durchsetzen<\/span><\/b><span data-contrast=\"auto\"> mit interner Steuerung.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Prozesse standardisieren<\/span><\/b><span data-contrast=\"auto\"> f\u00fcr KI-Kosten, Tests und Modelldrift.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Sorgen Sie f\u00fcr ein sicheres Repository<\/span><\/b><span data-contrast=\"auto\"> f\u00fcr Anregungen und Werkzeuge.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Der Wandel von der Verhinderung von Datenschutzverletzungen<\/span><span data-contrast=\"auto\">Die Kontrolle des Agentenverhaltens markiert eine neue Grenze in der Cybersicherheit. Da Unternehmen die Integration von GenAI beschleunigen, wird die Einbettung von Sicherheit in agentenbasierte KI-Architekturen entscheidend f\u00fcr die Sicherheit sein.<\/span><span data-contrast=\"auto\">Vertrauen und Autonomie in diesem entstehenden \u00d6kosystem.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Quelle:<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.techradar.com\/pro\/agentic-ai-introduces-new-security-challenges-in-era-of-mcp-and-a2a\"><span data-contrast=\"none\">https:\/\/www.techradar.com\/pro\/agentic-ai-introduces-new-security-challenges-in-era-of-mcp-and-a2a<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Die rasante Entwicklung agentenbasierter KI \u2013 autonomer Systeme, die Entscheidungen treffen, Werkzeuge entdecken und mit anderen Agenten zusammenarbeiten k\u00f6nnen \u2013 ver\u00e4ndert die Cybersicherheit von Unternehmen grundlegend. W\u00e4hrend Organisationen Frameworks wie das Model Context Protocol (MCP) von Anthropic, Googles Agent-to-Agent (A2A) und IBMs Agent Communication Protocol (ACP) einsetzen, warnen Experten vor der n\u00e4chsten Welle von Cyberbedrohungen.<\/p>","protected":false},"author":238283293,"featured_media":116735,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1639,1488,1636],"class_list":["post-116732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-agentic-ai","tag-ai","tag-ai-agents"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Agentic AI Security Risks Rise with MCP and A2A Protocols - Eastgate Software<\/title>\n<meta name=\"description\" content=\"As AI agents gain autonomy, new risks emerge from protocols like MCP and A2A. Experts warn of \u201cagent breaches\u201d\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agentic AI Security Risks Rise with MCP and A2A Protocols\" \/>\n<meta property=\"og:description\" content=\"As AI agents gain autonomy, new risks emerge from protocols like MCP and A2A. Experts warn of \u201cagent breaches\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/de\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-30T03:00:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:21:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/10\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"Agentic AI Security Risks Rise with MCP and A2A Protocols\",\"datePublished\":\"2025-10-30T03:00:43+00:00\",\"dateModified\":\"2026-04-01T08:21:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/\"},\"wordCount\":304,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"Agentic AI\",\"Ai\",\"AI Agents\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/\",\"name\":\"Agentic AI Security Risks Rise with MCP and A2A Protocols - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2025-10-30T03:00:43+00:00\",\"dateModified\":\"2026-04-01T08:21:35+00:00\",\"description\":\"As AI agents gain autonomy, new risks emerge from protocols like MCP and A2A. Experts warn of \u201cagent breaches\u201d\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"Agentic AI Security Risks Rise with MCP and A2A Protocols\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Agentic AI Security Risks Rise with MCP and A2A Protocols\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/de\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Agentische KI-Sicherheitsrisiken steigen mit MCP- und A2A-Protokollen \u2013 Eastgate Software","description":"Mit zunehmender Autonomie von KI-Agenten entstehen neue Risiken durch Protokolle wie MCP und A2A. Experten warnen vor \u201cAgenten-Sicherheitsl\u00fccken\u201d.\u201d","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Agentic AI Security Risks Rise with MCP and A2A Protocols","og_description":"As AI agents gain autonomy, new risks emerge from protocols like MCP and A2A. Experts warn of \u201cagent breaches\u201d","og_url":"https:\/\/wp.eastgate-software.com\/de\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2025-10-30T03:00:43+00:00","article_modified_time":"2026-04-01T08:21:35+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/10\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"Verfasst von":"huongnguyen253","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"Agentic AI Security Risks Rise with MCP and A2A Protocols","datePublished":"2025-10-30T03:00:43+00:00","dateModified":"2026-04-01T08:21:35+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/"},"wordCount":304,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/10\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1","keywords":["Agentic AI","Ai","AI Agents"],"articleSection":["Tech Enthusiast"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/","url":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/","name":"Agentische KI-Sicherheitsrisiken steigen mit MCP- und A2A-Protokollen \u2013 Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/10\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1","datePublished":"2025-10-30T03:00:43+00:00","dateModified":"2026-04-01T08:21:35+00:00","description":"Mit zunehmender Autonomie von KI-Agenten entstehen neue Risiken durch Protokolle wie MCP und A2A. Experten warnen vor \u201cAgenten-Sicherheitsl\u00fccken\u201d.\u201d","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/10\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/10\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"Agentic AI Security Risks Rise with MCP and A2A Protocols"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-rise-with-mcp-and-a2a-protocols\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"Agentic AI Security Risks Rise with MCP and A2A Protocols"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"Strategischer Partner eines globalen Fortune-500-Unternehmens","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"huongnguyen253","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/de\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/10\/EGS-news-website-1366-x-768px-1.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-umM","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/116732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/comments?post=116732"}],"version-history":[{"count":5,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/116732\/revisions"}],"predecessor-version":[{"id":119701,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/116732\/revisions\/119701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media\/116735"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media?parent=116732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/categories?post=116732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/tags?post=116732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}