Mobile Agent's address space relatively separates from the host, the requests to host's resources and the visit to information are coordinately solved by the executing environment, so the security of the host environment is equivalent to the security of the executing environment.