Context
Agent Passport System and HDP independently converged on the same cryptographic primitives for delegation provenance: Ed25519 signing, append-only chains, offline verification, human-to-agent authority binding. The convergence is striking enough that it suggests the architecture is natural, not accidental.
I build APS — 103 modules covering identity, delegation, enforcement, commerce, coordination, and governance. Ed25519 keypairs, scoped delegation chains with monotonic narrowing, 3-signature action chain (intent → policy evaluation → receipt), Merkle-committed settlements. Published on npm (agent-passport-system), PyPI, and as an MCP server. IETF Internet-Draft: draft-pidlisnyi-aps-00.
After reading the HDP paper and the IETF draft, I think these protocols are complementary rather than overlapping. Here's how I see the boundary:
Where HDP and APS sit
| Concern |
HDP |
APS |
| Core question |
"Was this action authorized by a human?" |
"What is this agent allowed to do, and did it do it correctly?" |
| Token model |
Single token with append-only hop chain |
Signed delegation chain with cascading scope narrowing |
| Scope enforcement |
Declared scope in token |
scopeAuthorizes() evaluation at each action — gateway enforces structurally |
| Revocation |
Short-lived tokens (session-bound, no registry) |
Cascade revocation — revoking parent invalidates all children |
| Audit |
Token carries full provenance |
3-signature receipt chain, Merkle-committed into settlements |
| Commerce |
Not in scope |
4-gate commerce pipeline (passport, scope, spend limit, merchant allowlist) |
HDP answers "did a human authorize this chain?" APS answers "was each action within the authorized scope, and here's the signed receipt proving it." Both are needed for a complete accountability story.
Concrete interop surface
An APS delegation chain could carry an HDP token as the root authority evidence. The HDP token proves human authorization. The APS chain proves that each subsequent delegation narrowed scope correctly and every action produced a signed receipt.
HDP Token (human → session → Agent A)
└─ APS Delegation (Agent A → Agent B, scope: data:read)
└─ APS Action Receipt (Agent B reads data, signed by B + policy engine)
The HDP token is the root of trust. APS is the enforcement layer that tracks what happened after the human authorized.
Proposal
Would you be interested in defining a shared test vector set? Specifically:
- An HDP token that serves as the root authority for an APS delegation chain
- A multi-hop scenario where the HDP provenance and APS scope narrowing compose
- Adversarial cases: expired HDP token with live APS delegation, scope escalation attempt through the boundary
This is working group material, not competition. Three independent IETF drafts (HDP, APS, DAAP) all solving adjacent slices of the same problem suggests it's time to coordinate.
Context
Agent Passport System and HDP independently converged on the same cryptographic primitives for delegation provenance: Ed25519 signing, append-only chains, offline verification, human-to-agent authority binding. The convergence is striking enough that it suggests the architecture is natural, not accidental.
I build APS — 103 modules covering identity, delegation, enforcement, commerce, coordination, and governance. Ed25519 keypairs, scoped delegation chains with monotonic narrowing, 3-signature action chain (intent → policy evaluation → receipt), Merkle-committed settlements. Published on npm (
agent-passport-system), PyPI, and as an MCP server. IETF Internet-Draft:draft-pidlisnyi-aps-00.After reading the HDP paper and the IETF draft, I think these protocols are complementary rather than overlapping. Here's how I see the boundary:
Where HDP and APS sit
scopeAuthorizes()evaluation at each action — gateway enforces structurallyHDP answers "did a human authorize this chain?" APS answers "was each action within the authorized scope, and here's the signed receipt proving it." Both are needed for a complete accountability story.
Concrete interop surface
An APS delegation chain could carry an HDP token as the root authority evidence. The HDP token proves human authorization. The APS chain proves that each subsequent delegation narrowed scope correctly and every action produced a signed receipt.
The HDP token is the root of trust. APS is the enforcement layer that tracks what happened after the human authorized.
Proposal
Would you be interested in defining a shared test vector set? Specifically:
This is working group material, not competition. Three independent IETF drafts (HDP, APS, DAAP) all solving adjacent slices of the same problem suggests it's time to coordinate.
draft-pidlisnyi-aps-00