PricingDemo
Home Specifications AI Agent Governance Attestation Model

AI Agent Governance Attestation Model — Specification v1.0.0

Version: 1.0.0
Status: Draft
Date: 2026-05-22
Editor: Eric Beans, H33.ai, Inc.
Canonical URL: https://h33.ai/specifications/agent-governance/
Last Updated: 2026-05-22

1. Abstract

This document specifies a model for cryptographically attesting AI agent actions within governance-bound execution environments. The model defines how agents are registered, how scope constraints are expressed, how actions are attested and receipted, how escalation is handled when actions exceed scope, how negative authority proofs are constructed, and how agent receipts integrate into a governance chain for deterministic replay.

The model treats agent authority as a first-class governance object: time-bounded, scope-constrained, cryptographically signed, and independently reconstructable. An agent's authority at any historical point in time can be derived from the governance chain without contacting the originating infrastructure.

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.

2. Status of This Document

This document is a Draft specification published by H33.ai, Inc. for public review and implementer feedback. Normative requirements are binding for implementations that claim agent governance attestation conformance.

Comments and errata SHOULD be directed to standard@h33.ai.

3. Definitions

TermDefinition
AgentAn autonomous or semi-autonomous software entity that executes actions within a governed system. An agent operates under a set of scope constraints and MUST be registered in the governance state before executing any action.
Agent ScopeThe complete set of constraints that define what an agent is authorized to do, including action types, value limits, jurisdictions, time windows, and delegation depth.
Authority DelegationThe act of one governance principal (human or agent) granting a subset of its own authority to an agent. Delegated authority MUST NOT exceed the delegator's own authority.
Scope ConstraintA single rule within an agent's scope. Each constraint MUST be independently evaluable and MUST produce a deterministic boolean result for any given action.
Negative Authority ProofA cryptographic attestation that an agent does not have authority to perform a specified action. The proof is verifiable without access to the agent's full scope definition.
EscalationThe process triggered when an agent attempts an action that exceeds its scope. Escalation transfers the decision to a higher-authority principal.
Governance ReceiptAn immutable, signed record of an agent action, its scope evaluation result, and its governance chain linkage. The receipt is the atomic unit of agent audit history.
Governance DAGA directed acyclic graph of governance receipts. Each receipt references one or more predecessor receipts. The DAG is the authoritative record of all governance events.

4. Agent Registration

An agent MUST be registered in the governance state before executing any action. Registration produces a governance receipt that establishes the agent's identity, initial scope, and delegating authority.

4.1. Registration Record

{ "receipt_type": "agent_registration", "agent_id": "agent:a1b2c3d4-e5f6-7890-abcd-ef1234567890", "agent_name": "compliance-review-bot", "delegator_id": "principal:00112233-4455-6677-8899-aabbccddeeff", "scope_hash": "sha3-256:4f2e8a...", "scope": { /* See Section 5 */ }, "valid_from": "2026-05-22T00:00:00Z", "valid_until": "2026-06-22T00:00:00Z", "predecessor_hash": "sha3-256:9a3b1c...", "signatures": { /* Multi-family PQ bundle */ } }

The delegator_id MUST reference a principal whose own scope is a superset of the agent's scope. The scope_hash is the SHA3-256 hash of the canonical serialization of the scope object. The valid_from and valid_until fields define the time window during which the agent is authorized to act.

4.2. Registration Constraints

5. Scope Constraints

An agent's scope is expressed as a set of constraints. Each constraint is a typed rule that evaluates to true (action permitted) or false (action denied) for a given action.

Constraint TypeIdentifierDescriptionExample
Action Typeaction_typeWhitelist of permitted action types. Actions not in the list are denied.["read", "review", "flag"]
Maximum Valuemax_valueUpper bound on the monetary or quantitative value of a single action.{"currency": "USD", "amount": 10000}
JurisdictionjurisdictionGeographic or regulatory jurisdictions in which the agent may act.["US", "EU", "UK"]
Time Windowtime_windowHours of the day or days of the week during which the agent may act. Evaluated in UTC.{"days": ["mon","tue","wed","thu","fri"], "hours": [8, 18]}
Delegation Depthdelegation_depthMaximum number of delegation levels this agent may create. 0 means the agent MUST NOT delegate to sub-agents.0

Constraint evaluation is conjunctive: all constraints MUST evaluate to true for an action to be within scope. If any single constraint evaluates to false, the action is out of scope.

// Scope definition example { "constraints": [ { "type": "action_type", "allowed": ["read", "review", "flag"] }, { "type": "max_value", "currency": "USD", "amount": 10000 }, { "type": "jurisdiction", "allowed": ["US", "EU"] }, { "type": "time_window", "days": ["mon","tue","wed","thu","fri"], "hours": [8, 18] }, { "type": "delegation_depth", "max": 0 } ] }

6. Action Attestation

Every agent action produces a governance receipt. The receipt is the immutable, cryptographically signed record of the action, its scope evaluation, and its position in the governance chain.

6.1. Receipt Structure

{ "receipt_type": "agent_action", "receipt_id": "receipt:f1e2d3c4-b5a6-9788-7654-321fedcba098", "agent_id": "agent:a1b2c3d4-e5f6-7890-abcd-ef1234567890", "action_type": "review", "action_payload_hash": "sha3-256:7c8d9e...", "authority_hash": "sha3-256:4f2e8a...", "scope_hash": "sha3-256:4f2e8a...", "policy_hash": "sha3-256:b1c2d3...", "scope_evaluation": { "result": "permitted", "constraints_evaluated": 5, "constraints_passed": 5 }, "timestamp": "2026-05-22T14:32:00Z", "predecessor_hash": "sha3-256:a0b1c2...", "signatures": { /* Multi-family PQ bundle */ } }
FieldTypeDescription
receipt_typestringFixed value: "agent_action".
receipt_idstring (UUID)Unique identifier for this receipt.
agent_idstringIdentifier of the acting agent. MUST reference a registered agent.
action_typestringThe type of action performed.
action_payload_hashstringSHA3-256 hash of the action payload. The payload itself is not included in the receipt.
authority_hashstringSHA3-256 hash of the agent's registration receipt at the time of action.
scope_hashstringSHA3-256 hash of the scope under which the action was evaluated.
policy_hashstringSHA3-256 hash of the governing policy active at the time of action.
scope_evaluationobjectResult of scope constraint evaluation. Includes count of constraints evaluated and passed.
timestampstring (ISO 8601)Time of action. MUST be UTC.
predecessor_hashstringSHA3-256 hash of the immediately preceding receipt in this agent's governance chain.
signaturesobjectMulti-family PQ signature bundle over the receipt.

7. Scope Enforcement

Scope enforcement is the evaluation algorithm that determines whether a proposed action is within the agent's authorized scope. The algorithm is deterministic: given identical scope definitions and action parameters, any conformant implementation MUST produce an identical result.

7.1. Evaluation Algorithm

  1. Resolve agent registration. Look up the agent's most recent registration receipt. If no valid registration exists (expired or revoked), reject the action.
  2. Verify time validity. Confirm the current timestamp is within the agent's valid_from / valid_until window. If outside, reject.
  3. Evaluate constraints. For each constraint in the agent's scope, evaluate the constraint against the proposed action. Each constraint produces a boolean result.
  4. Apply conjunction. The action is within scope if and only if all constraints evaluate to true.
  5. Produce evaluation record. Record the number of constraints evaluated, the number that passed, and the overall result (permitted or denied).

Constraint evaluation order is defined by the order of constraints in the scope definition. Implementations MAY short-circuit on the first failing constraint but MUST report the total count of constraints evaluated before short-circuiting.

8. Escalation Semantics

When an agent's scope enforcement evaluates to denied, the system MUST apply one of the following escalation policies. The applicable policy is declared in the agent's registration record.

Escalation PolicyIdentifierBehavior
Automatic Escalationescalate_autoThe action is automatically forwarded to the agent's delegating principal for approval. The action is held pending until the principal approves or rejects. A governance receipt is produced for the escalation event.
Human Approval Requiredescalate_humanThe action is forwarded to a designated human approver (not necessarily the delegating principal). The system MUST suspend the action until human approval is recorded.
RejectionrejectThe action is rejected. No escalation occurs. A governance receipt is produced recording the rejection with the failing constraint(s).

8.1. Escalation Receipt

{ "receipt_type": "escalation", "agent_id": "agent:a1b2c3d4-e5f6-7890-abcd-ef1234567890", "original_action_hash": "sha3-256:7c8d9e...", "escalation_policy": "escalate_human", "escalated_to": "principal:00112233-4455-6677-8899-aabbccddeeff", "failing_constraints": [ { "type": "max_value", "limit": 10000, "requested": 25000 } ], "status": "pending", "timestamp": "2026-05-22T14:33:00Z", "predecessor_hash": "sha3-256:d4e5f6...", "signatures": { /* Multi-family PQ bundle */ } }

Escalations that are handled within this protocol (approved or rejected by the escalated-to principal) are not counted as scope violations for the purposes of the Operational Integrity Score Agent Scope Integrity dimension. Only unhandled escalations or actions that bypass scope enforcement entirely are scope violations.

9. Negative Authority Proofs

A negative authority proof is a cryptographic attestation that an agent does not have authority to perform a specified action at a specified time. Negative proofs are constructed from the agent's scope constraints and the governance chain state.

9.1. Proof Structure

{ "proof_type": "negative_authority", "agent_id": "agent:a1b2c3d4-e5f6-7890-abcd-ef1234567890", "denied_action": { "action_type": "transfer", "value": { "currency": "USD", "amount": 50000 } }, "evaluation_timestamp": "2026-05-22T14:35:00Z", "reason": "action_type_not_in_scope", "scope_hash": "sha3-256:4f2e8a...", "registration_hash": "sha3-256:9a3b1c...", "chain_state_hash": "sha3-256:e7f8a9...", "signatures": { /* Multi-family PQ bundle */ } }

Negative authority proofs are verifiable without access to the agent's full scope definition. The verifier needs only the scope_hash, the registration_hash, and the chain_state_hash to confirm that the proof is consistent with the governance state at the specified timestamp.

9.2. Denial Reasons

Reason CodeDescription
action_type_not_in_scopeThe requested action type is not in the agent's action_type whitelist.
value_exceeds_limitThe action's value exceeds the agent's max_value constraint.
jurisdiction_not_permittedThe action's jurisdiction is not in the agent's jurisdiction whitelist.
outside_time_windowThe action timestamp is outside the agent's permitted time_window.
delegation_depth_exceededThe agent attempted to delegate beyond its permitted delegation_depth.
registration_expiredThe agent's registration has expired (valid_until has passed).
registration_revokedThe agent's registration has been explicitly revoked by the delegating principal.

10. Governance Chain Integration

Agent governance receipts are integrated into the governance DAG alongside all other governance events (policy changes, human approvals, system attestations). This integration ensures that agent actions are subject to the same replay and verification guarantees as all other governance state.

10.1. Chain Linkage

Every agent receipt MUST include a predecessor_hash field referencing the SHA3-256 hash of the immediately preceding receipt in the agent's event stream. The first receipt for a newly registered agent MUST reference the agent's registration receipt as its predecessor.

10.2. Cross-Agent References

When an action involves multiple agents (e.g., agent A requests data from agent B), each agent produces its own governance receipt. The receipts SHOULD cross-reference each other via an related_receipts array containing the receipt IDs of the counterpart receipts. Cross-references are OPTIONAL but RECOMMENDED for multi-agent interactions.

10.3. DAG Integrity

The governance DAG MUST be a directed acyclic graph. Cycles are a conformance violation. Implementations MUST reject any receipt whose predecessor_hash would create a cycle in the DAG.

11. Replay Semantics

Agent authority state at any historical timestamp MUST be reconstructable from the governance chain. Replay is the process of walking the chain from genesis (or a known checkpoint) to the target timestamp, evaluating each receipt in order to derive the agent's scope, delegation state, and action history at that point.

11.1. Replay Algorithm

  1. Initialize. Start with an empty agent state.
  2. Walk the chain. For each receipt in chain order up to and including the target timestamp:
    • If receipt_type == "agent_registration": set or update the agent's scope and validity window.
    • If receipt_type == "agent_action": apply the action to the agent's history. Verify that the scope evaluation result in the receipt is consistent with the scope at that time.
    • If receipt_type == "escalation": record the escalation and its resolution.
    • If receipt_type == "revocation": mark the agent as revoked.
  3. Output. The agent's scope, validity, action count, and authority state at the target timestamp.

Replay is deterministic: identical chains MUST produce identical agent state. Replay does not require contacting the originating infrastructure.

12. Multi-Agent Governance

In environments with multiple agents, the governance DAG contains interleaved receipts from all agents. The following rules govern multi-agent interaction:

Revocation cascades are immediate. An agent whose delegator is revoked MUST NOT execute any further actions, even if its own valid_until has not yet passed.

13. Failure Modes

Failure ModeDetectionRequired Behavior
Scope violationScope enforcement evaluates to denied, but the action is executed anyway (bypass).The receipt MUST be flagged as a scope violation. The violation MUST be recorded in the governance chain. The OIS Agent Scope Integrity dimension is degraded.
Missing delegationAgent's delegator_id references a principal that does not exist in the governance state.Reject the agent's registration. No receipts may be produced for an agent without a valid delegation chain.
Expired authorityCurrent timestamp is past the agent's valid_until.Reject all actions. Produce a rejection receipt. Escalation is not available for expired agents.
Tampered receiptSignature verification on a receipt fails.The receipt is invalid. The chain is broken at that point. All subsequent receipts in the agent's chain are unverifiable. Implementations MUST halt chain processing at the first tampered receipt.
Predecessor hash mismatchA receipt's predecessor_hash does not match the hash of any receipt in the chain.The receipt is invalid. Chain integrity is broken. Same behavior as tampered receipt.
Cascade revocation failureA delegating agent is revoked but delegated agents continue operating.This is a conformance violation. Implementations MUST enforce cascade revocation within one clock cycle of the revocation event.

14. Conformance Requirements

An implementation conforms to this specification if and only if:

  1. Agent registration produces a governance receipt per Section 4, signed with a multi-family PQ signature bundle.
  2. Scope constraints are expressed per Section 5, with conjunctive evaluation.
  3. Every agent action produces a governance receipt per Section 6, with scope evaluation results included.
  4. Scope enforcement follows the deterministic algorithm in Section 7.
  5. Escalation semantics are implemented per Section 8 for all three escalation policies.
  6. Negative authority proofs are supported per Section 9.
  7. Governance chain integration follows the DAG model in Section 10, with no cycles permitted.
  8. Replay of agent authority state is deterministic per Section 11: identical chains produce identical state.
  9. Multi-agent delegation respects depth constraints and cascade revocation per Section 12.
  10. Failure modes in Section 13 are handled as specified.

Conformance is testable. A reference test vector set containing agent registration, action, escalation, revocation, and replay scenarios will be published alongside the first stable release.

15. Reproducible Example

The following scenario demonstrates a complete agent lifecycle: registration, action within scope, action exceeding scope (triggering escalation), and replay.

// Step 1: Register agent with scope register(agent_id="agent:abc123", delegator="principal:root", scope={ action_type: ["read", "review"], max_value: {USD: 10000}, jurisdiction: ["US"], time_window: {days: ["mon".."fri"], hours: [8,18]}, delegation_depth: 0 }, valid_from="2026-05-22T00:00:00Z", valid_until="2026-06-22T00:00:00Z") // Receipt R1 produced, signed with 3-family PQ bundle // Step 2: Agent performs a permitted action action(agent_id="agent:abc123", action_type="review", value={USD: 5000}, jurisdiction="US", timestamp="2026-05-22T10:00:00Z") // Scope evaluation: 5/5 constraints pass // Receipt R2 produced (result: permitted) // Step 3: Agent attempts out-of-scope action action(agent_id="agent:abc123", action_type="transfer", // NOT in scope value={USD: 25000}, // also exceeds max_value jurisdiction="US", timestamp="2026-05-22T11:00:00Z") // Scope evaluation: action_type fails, max_value fails // Escalation receipt R3 produced (policy: escalate_human) // Action held pending human approval // Step 4: Replay agent state at T=2026-05-22T10:30:00Z replay(agent_id="agent:abc123", target="2026-05-22T10:30:00Z") // Result: agent registered, 1 action performed (R2), // scope active, 0 violations, 0 escalations

16. Changelog

VersionDateChanges
1.0.02026-05-22Initial draft specification.

17. References

ReferenceTitleURL
[RFC 2119]Key words for use in RFCs to Indicate Requirement Levelsrfc-editor.org/rfc/rfc2119
[Multi-Family PQ]Multi-Family Post-Quantum Signature Framework v1.0.0h33.ai/specifications/multi-family-pq/
[OIS]Operational Integrity Score Specification v1.0.0h33.ai/specifications/ois/
[SHA3-256]NIST FIPS 202: SHA-3 Standardcsrc.nist.gov