Skip to content

Interop: APS delegation chains with HDP provenance tokens as root authority #23

@aeoess

Description

@aeoess

Context

Agent Passport System and HDP independently converged on the same cryptographic primitives for delegation provenance: Ed25519 signing, append-only chains, offline verification, human-to-agent authority binding. The convergence is striking enough that it suggests the architecture is natural, not accidental.

I build APS — 103 modules covering identity, delegation, enforcement, commerce, coordination, and governance. Ed25519 keypairs, scoped delegation chains with monotonic narrowing, 3-signature action chain (intent → policy evaluation → receipt), Merkle-committed settlements. Published on npm (agent-passport-system), PyPI, and as an MCP server. IETF Internet-Draft: draft-pidlisnyi-aps-00.

After reading the HDP paper and the IETF draft, I think these protocols are complementary rather than overlapping. Here's how I see the boundary:

Where HDP and APS sit

Concern HDP APS
Core question "Was this action authorized by a human?" "What is this agent allowed to do, and did it do it correctly?"
Token model Single token with append-only hop chain Signed delegation chain with cascading scope narrowing
Scope enforcement Declared scope in token scopeAuthorizes() evaluation at each action — gateway enforces structurally
Revocation Short-lived tokens (session-bound, no registry) Cascade revocation — revoking parent invalidates all children
Audit Token carries full provenance 3-signature receipt chain, Merkle-committed into settlements
Commerce Not in scope 4-gate commerce pipeline (passport, scope, spend limit, merchant allowlist)

HDP answers "did a human authorize this chain?" APS answers "was each action within the authorized scope, and here's the signed receipt proving it." Both are needed for a complete accountability story.

Concrete interop surface

An APS delegation chain could carry an HDP token as the root authority evidence. The HDP token proves human authorization. The APS chain proves that each subsequent delegation narrowed scope correctly and every action produced a signed receipt.

HDP Token (human → session → Agent A)
  └─ APS Delegation (Agent A → Agent B, scope: data:read)
       └─ APS Action Receipt (Agent B reads data, signed by B + policy engine)

The HDP token is the root of trust. APS is the enforcement layer that tracks what happened after the human authorized.

Proposal

Would you be interested in defining a shared test vector set? Specifically:

  1. An HDP token that serves as the root authority for an APS delegation chain
  2. A multi-hop scenario where the HDP provenance and APS scope narrowing compose
  3. Adversarial cases: expired HDP token with live APS delegation, scope escalation attempt through the boundary

This is working group material, not competition. Three independent IETF drafts (HDP, APS, DAAP) all solving adjacent slices of the same problem suggests it's time to coordinate.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions