⚠️ CODE RED:
A2A from POC to Production—but is A2A ready for a go-live?
Jens Fischer | 15. Dezember 2025
Technical Strategy Consultant | System Resilience Architect | Verbinde Welten
1. The Clear Warning Being Overlooked
I, as a Technical Strategy Consultant & System Resilience Architect, have reviewed the A2A protocol. The enthusiasm for Agentic AI is high, but the speed of market adoption poses a systemic risk.
Introduced in April 2025, A2A quickly became central to enterprise strategy. As a founding partner, ServiceNow positions A2A as the backbone of its AI Agent Fabric, promising enterprises "greater choice and flexibility" to "unlock the full potential of agentic AI."
Crucial Hazard: This adoption has immediate operational consequences. We are seeing evidence where agents utilizing this fabric for Secure Access Management could potentially stop critical servers and services, despite the protocol's stated WIP status. Yet, despite being actively pushed for the enterprise market for over eight months, the initiators are unequivocal: A2A is currently a POC/WIP. The SDK carries the explicit warning: "NOT INTENDED FOR USE IN A PRODUCTION ENVIRONMENT."
2. The Danger of Uncritical Adoption and Ecosystem Poisoning
While the initiators explicitly warn, there are still known, significant security issues in place. The danger intensifies due to the uncritical adoption of POC code, where speed is prioritized over due diligence and liability.
The critical consequence for the ecosystem: This insecure code is increasingly uploaded to platforms like GitHub, serving as training data for the next generation of LLMs, thereby poisoning the open-source ecosystem with flawed, unverified standards.
This is the true systemic risk: The push toward "vibe-coding"—prioritizing functional spectacle over security diligence—is allowing foundational flaws to corrupt the training data for future generative models, fundamentally undermining the integrity of the open-source AI ecosystem.
3. Critical Flaws Compromising Interoperability
The documented security flaws are fundamental design gaps that directly undermine the protocol’s promise. They are not abstract risks. One must ask: If the project has been public since April, is it truly credible that all these complex security questions have been resolved in just eight months, while the official 'NOT FOR PRODUCTION' disclaimer remains?
The governance deficit spans three critical layers, confirming A2A cannot yet be a production standard:
A. Protocol-Specific Gaps (A2A Paper)
- A2A Task Replay & Logging Evasion: Lack of Audit Protection compromises compliance (e.g., EU AI Act).
- Agent Card Spoofing & Authentication Threats: Lack of Zero-Trust identity management leaves agent-to-agent interaction vulnerable.
B. Interaction-Based Gaps (MAESTRO)
- Collusion: Agents secretly coordinating to achieve malicious goals (e.g., market price manipulation).
- Competition: Agents exploiting each other’s weaknesses, leading to unintended harmful outcomes when optimizing for resources.
C. System-Level Gaps (Compliance & Supply Chain)
- Explainability and Auditability: Lack of transparency prevents finding the root cause of incidents or auditing an agent's behavior for compliance.
- Supply Chain Security: Reliance on external components (models, data) introduces risks from compromised pre-trained models or lack of provenance tracking for training data.
An aspiring "Gold Standard" cannot tolerate these gaps.
4. 🛑 Is A2A Ready for a go Live? Governance Before Function
We must stop treating the B2B Agentic AI standard as an officially unsecured POC. Before the community invests more time into further functional POCs, it is now time to actively help solve the documented security issues.
The first step for verification:
- Review page 5 of the A2A paper: https://arxiv.org/pdf/2504.16902v2
- Cross-reference it with the foundational principles of the MAESTRO Threat Modeling Framework: https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro
This article is a catalyst to join forces and build the necessary Governance and Resilience layers.
Methodik · Governance · Resilienz