
There has been an absolutely incredible amount of activity around the evolution of LLM-based agents. Most recently Anthropic's Model Context Protocol (MCP) has seen adoption as the standard for how application context is provided to agents. My guess is we'll soon see improvements in transport layer options and authentication and authorization providing a more granular permissions model. There are already a good handful of MCP marketplaces/registries centralizing and easing access to the thousands of servers that have already been developed. MCP gateways and agent discovery mechanisms will be next up along with 'supply chain' attacks against that infrastructure. How do you verify and trust an agent or MCP server that wasn't developed in house?
All this got me thinking about how agents could discover, share and communicate information, publish capabilities and autonomously collaborate on tasks, even when they're from different agent providers. All in a standardized, easily implementable manner.
As LLM-based agents become more specialized and numerous, we need a common approach for these digital workers to find one another and collaborate.
ACDP is a practical approach that leverages familiar technologies to create a secure, robust network of discoverable, interoperable AI agents.
Coincidentally, Google just released A2A as an approach to providing a solution to the problem of a common language for agents to use for communication. They lightly touch on topics of discovery and registration of capabilities too:
“...critical to support multi-agent communication by giving your agents a common language – irrespective of the framework or vendor they are built on...”
Regardless of industry or domain, this communication requirement will become commonplace. I think we'll see a fast evolution and merging of the capabilities provided by the services and companies solving this problem today
Our initial focus with ACDP was on agent discovery and establishing peer relationships for the sharing of capabilities, all through the use of existing technologies.
The full write up (it comes with more diagrams!) of the protocol can be found here. This was all a bit of a thought exercise more than anything else but thinking through the mechanics of something like this helps with reasoning about solutions in other areas of our platform. There is a simple PoC implementation of the concepts, it's somewhat contrived as it ACDP forces discovery and collaboration with other agents if a question is asked of an agent, but the idea was to show that the approach was viable.
Let's consider a simple scenario: Imagine you have a specialized accounting agent that needs help with language translation. How does it find a translation agent? How do they exchange information securely? (I have no idea if accountants need a translation agent but looking at my tax returns, I might.) Hey, the example could be worse, it could be yet another weather agent/tool.
What will likely happen in the agentic world today (even assuming MCP is universally adopted) is that the accounting agent will do what it’s capable of and deliver output that needs to be translated separately. Or even worse, the agent will need to work on the output of translated content and restart the process again, requiring human input and guidance along the process.
Without a standard protocol, every agent integration becomes a custom project. This specification defines an approach that allows LLM-based agents to advertise themselves via DNS and discover peers in a hybrid decentralized manner. It leverages standard DNS records (TXT, SRV) for discovery and metadata, augmented by a central registry for detailed capability listing, auth requirements and dynamic updates and search. All agent-to-agent and agent-to-registry communication uses HTTPS for security and interoperability. The protocol defines how agents register their endpoints, discover each other (both through DNS and peer-to-peer awareness), describe their capabilities in a structured way, and establish secure communications. ACDP enables them to:
The best part? There is no need to reinvent the wheel – the protocol builds on technologies that have served the internet reliably (with a few bumps along the way) for decades.
Let's take a look at how these pieces could fit together in practice:
When a new agent comes online, it follows a simple registration process, and it performs two key registration steps:
After registration, the agent maintains a heartbeat connection with the registry, sending periodic updates to confirm it's still active. If the registry loses track of the agent, the agent will automatically re-register during its next heartbeat attempt.

The Discovery Service component provides a unified way to discover other agents through multiple methods:
The implementation follows a fallback pattern - first check the cache, then try the registry, and finally fall back to DNS if needed.
When our accountant's AI agent needs to find an agent with the appropriate capabilities, it can:
This hybrid approach means if one discovery method fails, others can pick up the slack. These discovery, communication and collaboration capabilities enable agents’ abilities to be shared, improving all agents. So, the accounting agent will find the translation support it needs and possibly collaborate with other agents to help them finish their work efficiently.
A discovery request would look like this:

The Peer Manager component implements a decentralized peer discovery mechanism through "gossiping":
This peer-to-peer approach ensures agents can discover new peers even if the central registry is unavailable, creating a resilient network.
The implementation includes a collaboration mechanism where agents can work together to answer questions:
This collaborative approach allows the system to leverage specialized knowledge across different agents.
Since DNS is somewhat key to the discovery mechanism, we should look at some actual DNS records for an agent:
These records tell us:
This structure can be queried with standard DNS tools. For example, to find the translator's address:
1. DNS Security: DNSSEC provides cryptographic verification of DNS records, preventing spoofing.
2. Authentication Layers:
3. Tiered Trust Model:
4. Private Deployments:
These features make the system suitable for enterprise, government, healthcare, and financial deployments where privacy and security are paramount.
For example, if Agent A queries Agent B for help, it first verifies Agent B's identity through TLS, checks if Agent B has the necessary capabilities, and may require additional authentication before sharing sensitive data.
For enterprises, healthcare providers, and government institutions, ACDP offers additional privacy controls:
Private Registry: Run your own internal registry that only indexes authorized agents:
AgentRegistry.internal.company.com
├── hr-assistant (capability: hr-policies)
├── code-reviewer (capability: code-review)
└── security-scanner (capability: vulnerability-detection)
Split Horizon DNS: Different DNS responses for internal vs. external queries:
Network Isolation: Keep agents on a private network, accessible only via VPN or internal access points.
Enterprise AI Ecosystem: A large corporation deploys several specialized agents on their internal network:
For public agent ecosystems, ACDP enables open discovery while maintaining security:
Public Registry: A searchable directory of available agents and their capabilities, similar to an app store Verified Domains: DNS-based verification ensures agents come from legitimate sources. Capability Matching: Find the right agent for any task based on its advertised capabilities:
Imagine a researcher working on climate modeling who needs specialized analysis:
ACDP can do more than connect agents – it also helps them discover tools and data sources through integration with the Model Context Protocol (MCP).
The agent can then connect to this server, list available tools, and access them through a standardized interface
This integration allows agents to:
For example, a hospital implements ACDP with MCP to safely integrate AI agents with electronic health record systems:
Consider a financial institution's Security Operations Center (SOC):
Private Security Infrastructure: The bank maintains several specialized security agents behind their firewall:
Bridging to Public Intelligence: When investigating a suspicious alert, these private agents leverage public threat intelligence through authenticated ACDP connections:
Here's how this hybrid approach might handle a potential security incident:
The system also leverages MCP for discovering and using enterprise security tools, including integration with common security platforms:
The agents can:
The ability to maintain security boundaries while enabling authenticated cross-boundary collaboration makes ACDP particularly valuable in cybersecurity contexts, where both protecting internal systems and leveraging external intelligence are critical.
For example, the Forensics Agent might discover that it can query Windows Event Logs but not perform active responses, while the Incident Response Agent has authorization to isolate endpoints when suspicious activity passes a certain threshold.
The beauty of this approach is that new security tools can be added to the MCP server without modifying the agents themselves. If the bank adds a new security tool, it simply registers the tool, and all authorized agents can immediately discover and leverage its capabilities.
By leveraging familiar technologies while adding agent-specific discovery mechanisms, we're creating a foundation that's both robust and accessible. If this protocol were expanded and improved upon, I’d envision;
I don't know that this approach makes sense in closed ecosystems or for single platforms running agents but as inter communication and requirements for agent discovery become commonplace, we'll benefit from having an easily implementable and scalable approach whether it's this or something entirely different.
Regardless of whether this approach makes sense to you or not, if you're building an ecosystem of enterprise agents or contributing to an open network of public agents, it's worth thinking about this up front.
Take a look at the full write up of the protocol and sample code on GitHub. I’d be curious to hear your thoughts on it.
Run Better Investigations.
At Every Tier.