SBOMs into Agentic AIBOMs: Schema Extensions, Agentic Orchestration, and Reproducibility Evaluation

This paper introduces Agentic AIBOMs, a multi-agent framework that extends static Software Bills of Materials (SBOMs) with autonomous, policy-constrained reasoning to dynamically capture runtime behavior and environmental drift, thereby enhancing supply-chain security through reproducible, context-aware vulnerability assessment and minimal schema extensions to existing standards.

Petar Radanliev, Carsten Maple, Omar Santos, Kayvan Atefi

Published Thu, 12 Ma
📖 5 min read🧠 Deep dive

Here is an explanation of the paper using simple language and creative analogies.

The Big Picture: From a Static Receipt to a Smart Bodyguard

Imagine you buy a complex machine, like a high-end drone. The manufacturer gives you a Software Bill of Materials (SBOM). Think of this like a grocery receipt. It lists every ingredient: "1 battery, 2 motors, 100 screws, 1 chip."

The Problem:
A receipt tells you what should be there, but it doesn't tell you what is actually happening right now.

  • Did someone swap the battery for a fake one while you weren't looking?
  • Is the motor overheating because of the weather?
  • Is that specific screw actually loose, or is it just listed as "loose" in the manual?

In the world of software, a standard SBOM is just a static list. It can't tell you if a known "bug" (vulnerability) in one of those ingredients is actually dangerous in your specific situation. It's like a receipt saying "Contains Peanuts," but not telling you if the person eating it is actually allergic or if the peanuts are sealed in a jar they can't open.

The Solution:
Dr. Radanliev and his team propose a new thing called an AIBOM (Agentic Artificial Intelligence Bill of Materials).

Think of an AIBOM not as a receipt, but as a team of smart, invisible bodyguards that follow your software around 24/7. They don't just list the ingredients; they watch how the software behaves, check if the ingredients are safe right now, and write a report that says, "Yes, there is a peanut, but it's sealed, so you are safe."


The Three "Bodyguards" (The Agents)

The paper describes a system with three specialized agents (smart software programs) that work together. Here is how they function:

1. MCP: The "Pre-Flight Inspector"

  • What it does: Before the software even starts running, this agent checks the "garage." It looks at the container, the operating system, and the list of ingredients to make sure everything is accounted for.
  • The Analogy: Imagine a pilot doing a pre-flight check. They don't just look at the manifest; they physically check the tires, the fuel, and the engine. If something is missing or looks weird, they stop the plane before it takes off.
  • Goal: To ensure the starting environment is perfect and complete.

2. A2A: The "Eyes on the Road"

  • What it does: While the software is running, this agent watches everything. It sees if the software suddenly downloads a new file, loads a strange library, or changes its behavior.
  • The Analogy: This is like a co-pilot watching the dashboard while you drive. If the engine starts making a weird noise or a warning light flickers that wasn't there before, the co-pilot shouts, "Hey, we have a problem!"
  • Goal: To catch "drift." Sometimes software changes its mind while running (like downloading a new plugin). This agent catches those changes in real-time.

3. AGNTCY: The "Judge and Jury"

  • What it does: This agent takes the list of bugs (vulnerabilities) and the observations from the other two agents to make a decision. It asks: "Is this bug actually dangerous right now?"
  • The Analogy: Imagine a security guard at a museum. A sign says "Doors are unlocked." The guard looks at the specific door. Is it actually open? Is there a security camera pointed at it? Is the alarm on?
    • If the door is locked and the alarm is on, the guard says: "Not Affected." (The bug exists, but you are safe).
    • If the door is open, the guard says: "Requires Review." (We need to fix this immediately).
  • Goal: To stop panic. Instead of saying "We have 1,000 bugs! Shut it down!", it says, "We have 1,000 bugs, but 999 are locked up tight. Only 1 needs attention."

Why This Matters: The "VEX" Concept

The paper introduces a concept called VEX (Vulnerability Exploitability eXchange).

  • Old Way: "Warning! This software has a hole in it!" (Everyone panics, even if the hole is covered by a brick wall).
  • New Way (AIBOM): "Warning! This software has a hole in it, BUT our brick wall (security settings) is covering it, so it is safe."

The AIBOM uses international standards (like CSAF) to write these reports in a language that computers and regulators can both understand. It turns a scary "Bug List" into a helpful "Safety Report."

The Results: Did it Work?

The team tested this system in a controlled environment (like a high-security lab for medical data). They compared their "Smart Bodyguard" system against older, "Static Receipt" systems.

  • Accuracy: The AIBOM caught 98.6% of the actual issues, while the old systems only caught about 60-87%.
  • Speed: It didn't slow the computer down much (only about 4% extra CPU usage).
  • Trust: Because the agents write their reports using a standard format, auditors and regulators can trust the results without needing to be software experts.

The Bottom Line

This paper argues that in a world where software changes constantly and moves fast, a static list of ingredients isn't enough. We need active, intelligent monitoring.

By turning the "Bill of Materials" into a smart, reasoning system, we can stop wasting time worrying about bugs that aren't dangerous, and focus our energy on the real threats. It's the difference between having a list of every car in a parking lot and having a security system that knows exactly which cars are running, which are locked, and which one is actually being stolen.