To completely trusted Mobile Agent, there is no need to do anything
( such as Mobile Agent in LAN,
CA authentication and Mobile Agent performed before in the host, etc. ),
for malicious Mobile Agent,
directly discards,
for suspicious Mobile Agent,
performs steps above.