<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-agtp-trust-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP-TRUST">AGTP Trust and Verification Specification</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-agtp-trust-00"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="May" day="12"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>trust score</keyword>
    <keyword>trust tier</keyword>
    <keyword>verification path</keyword>
    <keyword>agent identity</keyword>
    <keyword>governance</keyword>
    <keyword>behavioral trust</keyword>
    <abstract>
      <?line 73?>

<t>This document specifies the AGTP trust and verification model: the
trust tiers an AGTP agent may occupy, the verification paths by
which a Tier 1 agent's identity is established, the registration
procedures by which a governance platform assigns a tier, and the
trust score that is carried alongside an agent's identity to
express runtime behavioral assessment. AGTP-TRUST is consumed by
AGTP-aware infrastructure components (Scope-Enforcement Points,
governance gateways, peer agents) for runtime trust-aware routing
and authority decisions, and by registration authorities when
issuing or evaluating Agent Genesis documents. This is an early
working draft; the dimension catalog, computation methodology, and
several aspects of the registration procedure are placeholders
pending further work.</t>
    </abstract>
  </front>
  <middle>
    <?line 89?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>AGTP v07 carries identity-related fields in the Agent Genesis and
Agent Identity Document that together express the trust posture of
a registered agent: <tt>trust_tier</tt> (1, 2, or 3), <tt>verification_path</tt>
(<tt>dns-anchored</tt>, <tt>log-anchored</tt>, <tt>hybrid</tt>, or <tt>org-asserted</tt>), and
<tt>trust_score</tt> (a scalar on the closed interval [0.0, 1.0]). The base
AGTP specification establishes that these fields exist and defines
their syntactic representation in the Identity Document schema.
AGTP defers to this document for the normative semantics that
govern how trust tiers are assigned, how verification paths are
exercised at registration time, how a trust score is computed, how
its freshness is asserted, how its dimensional structure is
exposed, and how its integrity is bound to the signing issuer.</t>
      <t>This document is organized in three parts:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Trust Tiers and Verification Paths</strong>: the structural identity
framework. Tier 1 (Verified), Tier 2 (Org-Asserted), Tier 3
(Experimental); the three Tier 1 verification paths
(<tt>dns-anchored</tt>, <tt>log-anchored</tt>, <tt>hybrid</tt>); the
<tt>verification_path</tt> field values and their consequences for
Authority-Scope eligibility.</t>
        </li>
        <li>
          <t><strong>Registration</strong>: the operator-facing procedures by which a
governance platform issues an Agent Genesis at a given trust
tier. Tier-specific packaging and evidence requirements.</t>
        </li>
        <li>
          <t><strong>Trust Score</strong>: the runtime behavioral assessment overlaid on
the trust-tier structure. Normative range, freshness, dimensions,
signature binding, computation guidance, and consumer behavior.</t>
        </li>
      </ul>
      <t>The motivating problem for the trust-score portion is that an
unbounded <tt>trust_score</tt> field is operationally useless. An
infrastructure component that receives a trust score with no
normative semantics cannot distinguish a well-computed value from a
freshly-fabricated one, cannot decide whether to refresh it, and
cannot verify that the issuer has not substituted a different value
at retrieval time. AGTP-TRUST closes these gaps by specifying:</t>
      <ul spacing="normal">
        <li>
          <t>The trust-tier framework that contextualizes any trust-score
evaluation.</t>
        </li>
        <li>
          <t>The verification paths that anchor a Tier 1 trust assertion in
cryptographic evidence.</t>
        </li>
        <li>
          <t>The normative numeric range and interpretation of <tt>trust_score</tt>.</t>
        </li>
        <li>
          <t>The required <tt>trust_score_computed_at</tt> freshness timestamp.</t>
        </li>
        <li>
          <t>The optional but normatively-specified <tt>trust_score_dimensions</tt>
structure that decomposes a composite score into the inputs that
produced it.</t>
        </li>
        <li>
          <t>The signature binding that ties a trust score to its issuing
authority.</t>
        </li>
        <li>
          <t>Implementation guidance for computation, refresh cadence, and
consumer-side trust evaluation.</t>
        </li>
      </ul>
      <t>The key requirements language follows <xref target="RFC2119"/> and <xref target="RFC8174"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Trust Tier:</dt>
        <dd>
          <t>One of three structural classifications recorded in the
<tt>trust_tier</tt> field of an Agent Genesis and Agent Identity
Document. Tier 1 (Verified) agents have completed a cryptographic
verification path at registration time. Tier 2 (Org-Asserted)
agents have declared an organizational affiliation without
cryptographic verification. Tier 3 (Experimental) agents are
unregistered and confined to development environments.</t>
        </dd>
        <dt>Verification Path:</dt>
        <dd>
          <t>The mechanism by which a Tier 1 Agent Genesis was anchored to
evidence at ACTIVATE time. One of <tt>dns-anchored</tt>, <tt>log-anchored</tt>,
or <tt>hybrid</tt>. Tier 2 agents carry <tt>verification_path: org-asserted</tt>
to signal the absence of cryptographic verification.</t>
        </dd>
        <dt>Trust Score:</dt>
        <dd>
          <t>A scalar on the closed interval [0.0, 1.0] representing a behavioral
trust assessment of an AGTP-registered agent at a specific moment
in time, attested by the issuing governance authority. The trust
score is overlaid on the trust-tier structure: a Tier 2 agent may
still have a high trust score reflecting good behavioral history,
but the absence of cryptographic verification at the tier level
remains a separate consideration for consumers.</t>
        </dd>
        <dt>Trust Score Dimensions:</dt>
        <dd>
          <t>The named decomposed inputs that contribute to a composite trust
score. Examples: provenance, attestation, behavioral history, peer
reputation. The dimension catalog is normatively defined in
<xref target="dimensions"/>.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>The governance authority that computes and signs an agent's
trust score and (for Tier 1 agents) anchored the verification
path at registration time. The Issuer URL is recorded in the
<tt>issuer</tt> field of the Agent Identity Document; the Issuer's
public key is published at a well-known location under that URL.</t>
        </dd>
        <dt>Freshness:</dt>
        <dd>
          <t>The age of a trust score relative to the moment of consumption,
expressed as the difference between the current time and the
<tt>trust_score_computed_at</tt> timestamp.</t>
        </dd>
      </dl>
    </section>
    <section anchor="tiers-and-paths">
      <name>Trust Tiers and Verification Paths</name>
      <t>AGTP recognizes three trust tiers and four verification path values.
Tiers express the structural identity classification; verification
paths express the evidence mechanism backing a Tier 1 assignment.
The combination is recorded in the Agent Genesis and surfaced in
the Agent Identity Document via the <tt>trust_tier</tt> and
<tt>verification_path</tt> fields.</t>
      <section anchor="trust-tier-1-verified">
        <name>Trust Tier 1 (Verified)</name>
        <t>Tier 1 agents are eligible for the full Authority-Scope vocabulary,
delegation chains, financial transactions, and multi-organization
collaboration. Tier 1 verification requires exactly one of three
verification paths to succeed at ACTIVATE time. The verification
path chosen does not affect the identity model or the canonical
Agent-ID; it affects only the evidence chain backing the Agent
Genesis.</t>
        <table>
          <name>Trust Tier 1 Verification Paths</name>
          <thead>
            <tr>
              <th align="left">Path</th>
              <th align="left">Mechanism</th>
              <th align="left">Evidence Anchor</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>dns-anchored</tt></td>
              <td align="left">RFC 8555 ACME challenge against claimed <tt>org_domain</tt></td>
              <td align="left">DNS TXT record</td>
            </tr>
            <tr>
              <td align="left">
                <tt>log-anchored</tt></td>
              <td align="left">Agent Genesis inclusion in AGTP transparency log</td>
              <td align="left">Log inclusion proof (RFC 9162 VDS, RFC 9943 receipt)</td>
            </tr>
            <tr>
              <td align="left">
                <tt>hybrid</tt></td>
              <td align="left">DNS challenge combined with blockchain address signature</td>
              <td align="left">DNS TXT record + blockchain signature</td>
            </tr>
          </tbody>
        </table>
        <t>All Tier 1 paths produce identity attestations of equivalent
strength for AGTP protocol purposes. All Tier 1 paths require a
<tt>.nomo</tt> governed package.</t>
        <section anchor="dns-anchored">
          <name>dns-anchored</name>
          <t>The governance platform <strong>MUST</strong> verify that the registering party
controls the DNS zone for the claimed <tt>org_domain</tt> before issuing
a Tier 1 Agent Genesis. Verification follows <xref target="RFC8555"/> (ACME).
DNS-anchored agents <strong>MUST</strong> have the following DNS record
published and verifiable at resolution time:</t>
          <artwork><![CDATA[
_agtp.[domain.tld]. IN TXT "agtp-zone=[zone-id]; cert=[fp]"
]]></artwork>
        </section>
        <section anchor="log-anchored">
          <name>log-anchored</name>
          <t>The governance platform <strong>MUST</strong> submit the Agent Genesis to an
AGTP-aligned transparency log and record the resulting inclusion
proof in the registry record. The log <strong>MUST</strong> implement the
verifiable data structure defined in <xref target="RFC9162"/> and <strong>SHOULD</strong>
issue COSE_Sign1 receipts per <xref target="RFC9943"/> (SCITT) for
cross-ecosystem interoperability. A log-anchored agent is
verifiable by any party with access to the transparency log,
without dependence on DNS ownership. The log server protocol,
receipt schema, and federation model are specified in <xref target="AGTP-LOG"/>.</t>
        </section>
        <section anchor="hybrid">
          <name>hybrid</name>
          <t>The governance platform <strong>MUST</strong> verify both DNS control over the
claimed domain and ownership of the declared blockchain address
via signature challenge. This path is used by agents whose identity
is anchored in a Web3 naming system and who also hold a verified
DNS presence. See <xref target="AGTP-WEB3"/>.</t>
        </section>
      </section>
      <section anchor="trust-tier-2-org-asserted">
        <name>Trust Tier 2 (Org-Asserted)</name>
        <t>For agents operating within a single organization's internal
infrastructure, or where no Tier 1 verification path has been
completed. The registering party asserts an organizational
affiliation without cryptographic proof. The Agent Identity
Document for Tier 2 agents <strong>MUST</strong> include a <tt>trust_tier: 2</tt>
field and a <tt>trust_warning</tt> field with value
<tt>"verification-incomplete"</tt>. AGTP-aware browsers and clients
<strong>MUST</strong> surface a visible trust indicator distinguishing Tier 2
from Tier 1.</t>
        <t>Tier 2 agents <strong>MUST NOT</strong> be granted Authority-Scope values above
<tt>documents:query</tt> and <tt>knowledge:query</tt> without the AGTP Agent
Certificate extension <xref target="AGTP-CERT"/> providing cryptographic
identity binding at the transport layer.</t>
        <t>Tier 2 agents carry <tt>verification_path: org-asserted</tt>.</t>
      </section>
      <section anchor="trust-tier-3-experimental">
        <name>Trust Tier 3 (Experimental)</name>
        <t>For development and testing environments only. Agent label uses
the <tt>X-</tt> prefix. Tier 3 agents are not discoverable through the
public AGTP registry. Implementations <strong>MUST NOT</strong> deploy Tier 3
agents in production environments.</t>
      </section>
      <section anchor="verification-path-field-values">
        <name>Verification Path Field Values</name>
        <t>The <tt>verification_path</tt> field in the Agent Genesis declares how the
agent's identity was verified at ACTIVATE time:</t>
        <table>
          <name>verification_path Field Values</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Meaning</th>
              <th align="left">Default Trust Tier</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>dns-anchored</tt></td>
              <td align="left">DNS ownership verified via RFC 8555 ACME challenge</td>
              <td align="left">Tier 1</td>
            </tr>
            <tr>
              <td align="left">
                <tt>log-anchored</tt></td>
              <td align="left">Agent Genesis inclusion in an AGTP transparency log per RFC 9162 / RFC 9943</td>
              <td align="left">Tier 1</td>
            </tr>
            <tr>
              <td align="left">
                <tt>hybrid</tt></td>
              <td align="left">DNS ownership and blockchain address signature both verified</td>
              <td align="left">Tier 1</td>
            </tr>
            <tr>
              <td align="left">
                <tt>org-asserted</tt></td>
              <td align="left">No cryptographic verification; affiliation asserted only</td>
              <td align="left">Tier 2</td>
            </tr>
          </tbody>
        </table>
        <t>Implementations that encounter an agent whose Agent Genesis carries
an unsupported <tt>verification_path</tt> value <strong>MUST</strong> treat the agent
as Trust Tier 2 (<tt>trust_warning: "verification-path-unsupported"</tt>)
until an extension specification defining the value has been
published and implemented.</t>
      </section>
      <section anchor="tier-summary">
        <name>Trust Tier Summary</name>
        <table>
          <name>AGTP Trust Tier Summary</name>
          <thead>
            <tr>
              <th align="left">Trust Tier</th>
              <th align="left">Verification Paths (any one sufficient)</th>
              <th align="left">Package Required</th>
              <th align="left">Registry Visible</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1 - Verified</td>
              <td align="left">DNS challenge per <xref target="RFC8555"/>; OR log inclusion per <xref target="RFC9162"/> / <xref target="RFC9943"/>; OR hybrid DNS + blockchain signature</td>
              <td align="left">
                <tt>.nomo</tt></td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">2 - Org-Asserted</td>
              <td align="left">None (affiliation asserted without proof)</td>
              <td align="left">
                <tt>.agent</tt> or <tt>.nomo</tt></td>
              <td align="left">Yes (with warning)</td>
            </tr>
            <tr>
              <td align="left">3 - Experimental</td>
              <td align="left">None</td>
              <td align="left">Any</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="registration">
      <name>Registration</name>
      <t>The registration tier determines the verification procedure a
governance platform applies at ACTIVATE time. Registration tiers
correspond one-to-one with trust tiers; the procedural and
packaging requirements differ.</t>
      <section anchor="tier-1-registration-verified">
        <name>Tier 1 Registration (Verified)</name>
        <t>Required for agents carrying Authority-Scope beyond read-only
query operations, or participating in delegation chains, financial
transactions, or multi-agent collaboration with external
organizations. Tier 1 registration requires exactly one of the
three verification paths defined in <xref target="tiers-and-paths"/> to succeed
at ACTIVATE time.</t>
        <t>Common requirements for all Tier 1 paths:</t>
        <ul spacing="normal">
          <li>
            <t>Agent package <strong>MUST</strong> be in <tt>.nomo</tt> governed format</t>
          </li>
          <li>
            <t>Package <strong>MUST</strong> include a valid CA-signed certificate chain</t>
          </li>
          <li>
            <t>Governance platform <strong>MUST</strong> validate package integrity hash and
certificate chain before issuing the Agent Genesis</t>
          </li>
          <li>
            <t>Agent Genesis <strong>MUST</strong> record the specific <tt>verification_path</tt>
used (<tt>dns-anchored</tt>, <tt>log-anchored</tt>, or <tt>hybrid</tt>)</t>
          </li>
        </ul>
        <t>Path-specific requirements:</t>
        <ul spacing="normal">
          <li>
            <t><tt>dns-anchored</tt>: Registrant demonstrates DNS control over the
claimed <tt>org_domain</tt> via DNS challenge per <xref target="RFC8555"/>. Tier 1
<tt>_agtp</tt> TXT record <strong>MUST</strong> be published and verifiable at
resolution time.</t>
          </li>
          <li>
            <t><tt>log-anchored</tt>: Governance platform submits the Agent Genesis to
an AGTP-aligned transparency log implementing <xref target="RFC9162"/> and
records the inclusion proof in the registry. COSE_Sign1 receipts
per <xref target="RFC9943"/> (SCITT) <strong>SHOULD</strong> be issued for cross-ecosystem
interoperability. The registering party is not required to
control a DNS domain.</t>
          </li>
          <li>
            <t><tt>hybrid</tt>: Registrant demonstrates both DNS control and
blockchain address ownership. Detailed procedure in <xref target="AGTP-WEB3"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="tier-2-registration-org-asserted">
        <name>Tier 2 Registration (Org-Asserted)</name>
        <t>For agents operating within a single organization's internal
infrastructure, or where no Tier 1 verification path has been
completed.</t>
        <t>Requirements:</t>
        <ul spacing="normal">
          <li>
            <t>Organizational affiliation is declared but no cryptographic
verification is performed</t>
          </li>
          <li>
            <t>Agent package <strong>MAY</strong> be <tt>.agent</tt> or <tt>.nomo</tt> format</t>
          </li>
          <li>
            <t>Governance platform <strong>MUST</strong> issue Agent Genesis after validating
package integrity hash</t>
          </li>
          <li>
            <t>Agent Genesis and Identity Document <strong>MUST</strong> include
<tt>trust_tier: 2</tt> and <tt>trust_warning: "verification-incomplete"</tt></t>
          </li>
          <li>
            <t>Authority-Scope <strong>MUST</strong> be restricted at the Scope-Enforcement
Point layer until upgraded to Tier 1</t>
          </li>
        </ul>
      </section>
      <section anchor="tier-3-registration-experimental">
        <name>Tier 3 Registration (Experimental)</name>
        <t>For development and testing environments only.</t>
        <t>Requirements:</t>
        <ul spacing="normal">
          <li>
            <t>Agent label <strong>MUST</strong> carry the <tt>X-</tt> prefix</t>
          </li>
          <li>
            <t>Agent <strong>MUST NOT</strong> be published to the public AGTP registry</t>
          </li>
          <li>
            <t>Agent <strong>MUST NOT</strong> be deployed in production environments</t>
          </li>
          <li>
            <t>Governance platform issues a locally-scoped Agent Genesis</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="web3-as-a-verification-and-resolution-path">
      <name>Web3 as a Verification and Resolution Path</name>
      <t>AGTP identity is agent-first and anchored in the Agent Genesis.
Verification paths (DNS, log, hybrid) and resolution paths
(canonical ID, domain-anchored agent lookup, Web3 lookup) are
independent dimensions of the identity model. A Web3-anchored
agent is not a second-class participant; it is an agent whose
Agent Genesis was verified through the <tt>hybrid</tt> path and whose
Agent Identity Document is resolvable through a Web3 naming system
in addition to the canonical ID.</t>
      <t>Full Web3 interoperability and hybrid verification procedures are
specified in <xref target="AGTP-WEB3"/>.</t>
    </section>
    <section anchor="trust-score-range-and-interpretation">
      <name>Trust Score Range and Interpretation</name>
      <section anchor="normative-range">
        <name>Normative Range</name>
        <t>The <tt>trust_score</tt> field <strong>MUST</strong> be a scalar on the closed interval
[0.0, 1.0], inclusive of both endpoints. Implementations <strong>MUST</strong>
encode the value as a JSON <tt>number</tt> with at least two decimal places
of precision. Trust scores outside this range <strong>MUST</strong> be rejected
by consumers; the Identity Document carrying an out-of-range score
<strong>MUST NOT</strong> be admitted as authoritative.</t>
      </section>
      <section anchor="interpretation">
        <name>Interpretation</name>
        <t>The interpretation of trust score values is anchored at the
endpoints and at the midpoint:</t>
        <ul spacing="normal">
          <li>
            <t><strong>0.00</strong>: No trust. The agent has been positively attested as
untrustworthy or has accumulated behavioral evidence sufficient to
warrant a Revoked or Suspended lifecycle state. Consumers
<strong>SHOULD</strong> treat a score of 0.00 as equivalent to a 410 Gone
response for governance purposes.</t>
          </li>
          <li>
            <t><strong>0.50</strong>: Neutral. The agent has insufficient behavioral history,
attestation, or provenance evidence to warrant a more favorable
score. New agents (recently registered, no operational history)
<strong>SHOULD</strong> be assigned a score in the neutral band [0.40, 0.60]
pending accumulation of evidence.</t>
          </li>
          <li>
            <t><strong>1.00</strong>: Maximum trust. The agent has accumulated complete
positive evidence across all dimensions defined in <xref target="dimensions"/>.
Implementations <strong>SHOULD</strong> rarely return 1.00 in practice;
reserving 1.00 for ideal evidence preserves the dynamic range of
the scale.</t>
          </li>
        </ul>
        <t>The interpretation of intermediate values is governance-policy
defined, not normative. AGTP-TRUST does not specify mappings from
trust score ranges to authority decisions; consumers (SEPs,
governance gateways, peer agents) make those decisions according to
their own policies, with the trust score as one of several inputs.</t>
      </section>
      <section anchor="trust-score-is-not-a-trust-tier">
        <name>Trust Score is Not a Trust Tier</name>
        <t>The <tt>trust_score</tt> field and the <tt>trust_tier</tt> field carry distinct
semantics and <strong>MUST NOT</strong> be conflated. Trust Tier (defined in
<xref target="AGTP"/> Section 6.2) is a discrete classification (Tier 1, Tier 2,
Tier 3) reflecting the verification strength of the agent's identity
attestation. Trust Score is a continuous behavioral assessment that
varies over the agent's operational lifetime independent of Trust
Tier. A Tier 1 agent may have a trust score of 0.30 (high
verification strength, poor behavioral history); a Tier 2 agent may
have a trust score of 0.85 (lower verification strength, strong
behavioral history). Both fields are surfaced in the Identity
Document; consumers evaluate them independently.</t>
      </section>
    </section>
    <section anchor="freshness">
      <name>Freshness</name>
      <section anchor="the-trustscorecomputedat-field">
        <name>The trust_score_computed_at Field</name>
        <t>Every Identity Document carrying a <tt>trust_score</tt> field <strong>MUST</strong> also
carry a <tt>trust_score_computed_at</tt> field. The value is an ISO 8601
timestamp recording the moment at which the issuer computed the
trust score. The timestamp <strong>MUST</strong> be in UTC with explicit timezone
indicator (<tt>Z</tt>).</t>
        <t>A <tt>trust_score</tt> value without a corresponding <tt>trust_score_computed_at</tt>
          <strong>MUST</strong> be rejected. An Identity Document that asserts a trust
score with no freshness anchor cannot be evaluated for replay or
staleness.</t>
      </section>
      <section anchor="freshness-thresholds">
        <name>Freshness Thresholds</name>
        <t>Consumers of trust scores <strong>SHOULD</strong> apply a freshness threshold
appropriate to the operation being authorized. AGTP-TRUST defines
the following recommended thresholds, expressed as upper bounds on
the difference between consumption time and <tt>trust_score_computed_at</tt>:</t>
        <table>
          <name>Recommended Trust Score Freshness Thresholds</name>
          <thead>
            <tr>
              <th align="left">Operation Class</th>
              <th align="left">Recommended Maximum Freshness</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Read-only QUERY, DESCRIBE, DISCOVER</td>
              <td align="left">24 hours</td>
            </tr>
            <tr>
              <td align="left">EXECUTE without external state effect</td>
              <td align="left">1 hour</td>
            </tr>
            <tr>
              <td align="left">EXECUTE with external state effect (writes, transactions)</td>
              <td align="left">5 minutes</td>
            </tr>
            <tr>
              <td align="left">DELEGATE with elevated authority</td>
              <td align="left">1 minute</td>
            </tr>
            <tr>
              <td align="left">PURCHASE / financial transactions</td>
              <td align="left">30 seconds</td>
            </tr>
          </tbody>
        </table>
        <t>These thresholds are recommendations, not normative requirements.
Consumers <strong>MAY</strong> adopt stricter or looser thresholds based on
governance policy. Implementations <strong>MUST</strong> document the freshness
thresholds they enforce.</t>
      </section>
      <section anchor="issuer-refresh-cadence">
        <name>Issuer Refresh Cadence</name>
        <t>Issuers <strong>SHOULD</strong> refresh trust scores at a cadence sufficient to
keep most consumed scores within the recommended freshness windows
for the operations the agent typically performs. For agents
participating in transactional operations (PURCHASE, DELEGATE with
elevated authority), the issuer refresh cadence <strong>SHOULD NOT</strong>
exceed 5 minutes.</t>
        <t>The mechanism by which an issuer publishes refreshed scores is
implementation-defined. Two common patterns are: (a) re-issuing the
Identity Document with updated <tt>trust_score</tt> and
<tt>trust_score_computed_at</tt> fields, with the new document replacing
the previous version at the same canonical Agent-ID; (b) publishing
trust score deltas through a separate Trust Score Update endpoint
that consumers poll independently of full Identity Document
retrieval. Pattern (a) is simpler and is <strong>RECOMMENDED</strong> for v00
implementations; pattern (b) is anticipated in a future revision.</t>
      </section>
    </section>
    <section anchor="dimensions">
      <name>Trust Score Dimensions</name>
      <section anchor="composite-vs-decomposed-scores">
        <name>Composite vs Decomposed Scores</name>
        <t>A trust score <strong>MAY</strong> be a composite of multiple dimensional inputs,
or <strong>MAY</strong> be a single-dimensional value. Issuers that compute
composite scores <strong>SHOULD</strong> expose the decomposition in a
<tt>trust_score_dimensions</tt> object so consumers can apply dimensional
weighting in their own evaluation.</t>
      </section>
      <section anchor="dimension-catalog">
        <name>Dimension Catalog</name>
        <t>AGTP-TRUST defines the following named dimensions. The catalog is
non-exhaustive; issuers <strong>MAY</strong> add custom dimensions following the
naming and structure conventions defined in <xref target="custom-dimensions"/>.</t>
        <section anchor="provenance">
          <name>provenance</name>
          <t>The strength of the agent's identity provenance, including
verification path used at registration (<tt>dns-anchored</tt>,
<tt>log-anchored</tt>, <tt>hybrid</tt>), governance platform reputation, and
signature chain integrity.</t>
        </section>
        <section anchor="attestation">
          <name>attestation</name>
          <t>The strength of available execution attestation evidence per
<xref target="RFC9334"/>. Agents producing RATS attestation evidence in
Attribution-Records score higher on this dimension than agents not
producing such evidence.</t>
        </section>
        <section anchor="behavioralhistory">
          <name>behavioral_history</name>
          <t>A summary of the agent's operational history, including:</t>
          <ul spacing="normal">
            <li>
              <t>Frequency of normative-correct ESCALATE invocations.</t>
            </li>
            <li>
              <t>Frequency of scope violations (455), zone violations (457), and
budget exceeds (456).</t>
            </li>
            <li>
              <t>Frequency of confirmed-rejected CONFIRM responses on prior
delegations.</t>
            </li>
            <li>
              <t>Time-in-service (older agents with clean history score higher
than newly-registered agents).</t>
            </li>
          </ul>
        </section>
        <section anchor="peerreputation">
          <name>peer_reputation</name>
          <t>Trust signals received from peer agents and governance authorities
external to the issuer. Specific peer-reputation protocols are out
of scope for this draft; the dimension is reserved.</t>
        </section>
        <section anchor="compliance">
          <name>compliance</name>
          <t>Agent's recent compliance with governance policy: attestation
freshness, revocation responsiveness, and audit cooperation.</t>
        </section>
      </section>
      <section anchor="trustscoredimensions-object">
        <name>trust_score_dimensions Object</name>
        <t>When present, the <tt>trust_score_dimensions</tt> field <strong>MUST</strong> be a JSON
object whose keys are dimension names (from the catalog or custom)
and whose values are scalars on the closed interval [0.0, 1.0],
each interpreted according to the same scale as the composite
<tt>trust_score</tt>.</t>
        <figure>
          <name>Example trust_score_dimensions Object</name>
          <sourcecode type="json"><![CDATA[
{
  "trust_score": 0.78,
  "trust_score_computed_at": "2026-04-15T14:30:00Z",
  "trust_score_dimensions": {
    "provenance": 0.95,
    "attestation": 0.80,
    "behavioral_history": 0.70,
    "peer_reputation": null,
    "compliance": 0.85
  }
}
]]></sourcecode>
        </figure>
        <t>A dimension value of <tt>null</tt> indicates that the dimension is defined
but has no value computed for this agent (insufficient data, not
applicable, or pending). A dimension absent from the object
indicates that the issuer does not compute that dimension at all.</t>
        <t>The composite <tt>trust_score</tt> is <strong>NOT REQUIRED</strong> to be the arithmetic
mean of the dimensional values. Issuers <strong>MAY</strong> weight dimensions
non-uniformly, apply non-linear combinations, or compute the
composite through governance-policy-specific algorithms. The
dimensional decomposition is informational; the composite is the
authoritative score for protocol-level decisions unless a consumer
explicitly applies its own dimensional weighting.</t>
      </section>
      <section anchor="custom-dimensions">
        <name>Custom Dimensions</name>
        <t>Issuers <strong>MAY</strong> define custom dimensions. Custom dimension names
<strong>MUST</strong> be lowercase ASCII identifiers with optional dotted
namespacing (e.g., <tt>acme.financial_compliance</tt>). Custom dimensions
without a dotted namespace are reserved for future AGTP-TRUST
catalog additions and <strong>SHOULD NOT</strong> be used by issuers.</t>
      </section>
    </section>
    <section anchor="signature-binding">
      <name>Signature Binding</name>
      <section anchor="trust-score-signed-within-the-identity-document">
        <name>Trust Score Signed Within the Identity Document</name>
        <t>The <tt>trust_score</tt>, <tt>trust_score_computed_at</tt>, and (when present)
<tt>trust_score_dimensions</tt> fields <strong>MUST</strong> be covered by the issuer
signature on the Agent Identity Document, as specified in
<xref target="AGTP-CERT"/>. Signature binding ensures that:</t>
        <ul spacing="normal">
          <li>
            <t>A consumer can verify that the trust score was actually issued by
the authority identified in the <tt>issuer</tt> field.</t>
          </li>
          <li>
            <t>A trust score cannot be substituted, edited, or replayed without
invalidating the document signature.</t>
          </li>
          <li>
            <t>Trust score and freshness timestamp are bound together; an
attacker cannot present an old trust score with a fresh timestamp
or vice versa.</t>
          </li>
        </ul>
      </section>
      <section anchor="detached-trust-score-documents">
        <name>Detached Trust Score Documents</name>
        <t>A future revision of this specification will define a detached
Trust Score Document format that allows trust scores to be
refreshed and signed independently of the full Identity Document.
The detached form is anticipated to be a small COSE_Sign1 envelope
(<xref target="RFC9052"/>) carrying just the trust score, dimensions, freshness
timestamp, the canonical Agent-ID being attested, and the issuer
signature. Detached Trust Score Documents are not specified in this
revision.</t>
      </section>
      <section anchor="issuer-key-rotation">
        <name>Issuer Key Rotation</name>
        <t>When an issuer rotates its signing key, all trust scores signed by
the previous key remain valid until they expire by freshness or
until the previous key is explicitly revoked by the issuer.
Consumers <strong>MUST</strong> continue to accept trust scores signed by the
previous key for the freshness windows specified in
the freshness section above. Issuer key rotation is specified in
<xref target="AGTP-CERT"/>.</t>
      </section>
    </section>
    <section anchor="computation-methodology-guidance">
      <name>Computation Methodology Guidance</name>
      <section anchor="what-this-document-does-not-specify">
        <name>What This Document Does Not Specify</name>
        <t>AGTP-TRUST is deliberately silent on the specific algorithm an
issuer uses to compute a composite trust score. Computation
methodology is governance-policy and issuer-specific. Two issuers
operating under different governance frameworks may legitimately
compute different scores for the same agent based on the evidence
each weights. AGTP-TRUST specifies the data structure, freshness,
and binding properties of the score; it does not specify the
function from evidence to score.</t>
      </section>
      <section anchor="recommendations">
        <name>Recommendations</name>
        <t>The following are non-normative recommendations for issuer
implementations:</t>
        <t><strong>Avoid arbitrary single-dimensional scoring.</strong> A trust score that
collapses to "agent has not been revoked" is a Boolean dressed as a
scalar. Implementations <strong>SHOULD</strong> incorporate at least three
distinct dimensions before publishing a composite.</t>
        <t><strong>Apply non-linear weighting.</strong> A linear average of dimensional
inputs makes any single dimension proportionally substitutable. In
practice, some dimensions (provenance, attestation) act as gating
conditions: a low score on those dimensions <strong>SHOULD</strong> dominate the
composite even when other dimensions are high.</t>
        <t><strong>Document the methodology publicly.</strong> Issuers <strong>SHOULD</strong> publish a
public description of the computation algorithm, dimension
weightings, and refresh cadence at a known location under their
issuer URL. This enables consumer-side audit and informed trust
delegation.</t>
        <t><strong>Prefer evidence-weighted dimensions over policy-weighted
dimensions.</strong> A trust score that primarily reflects compliance with
the issuer's own policies is reflexive: it tells the consumer
whether the issuer trusts the agent, not whether the agent is
behaviorally trustworthy. Implementations <strong>SHOULD</strong> prioritize
dimensions grounded in observable evidence (attestation, behavioral
history, scope-violation frequency) over policy-conformance
dimensions.</t>
      </section>
    </section>
    <section anchor="consumer-behavior">
      <name>Consumer Behavior</name>
      <section anchor="trust-score-evaluation">
        <name>Trust Score Evaluation</name>
        <t>Consumers evaluating an Identity Document carrying a trust score
<strong>MUST</strong>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Verify the issuer signature on the Identity Document per
<xref target="AGTP-CERT"/>.</t>
          </li>
          <li>
            <t>Verify that the <tt>trust_score</tt> value is on the closed interval
[0.0, 1.0].</t>
          </li>
          <li>
            <t>Verify that <tt>trust_score_computed_at</tt> is present and is within
the consumer's freshness threshold for the operation being
authorized.</t>
          </li>
          <li>
            <t>Verify that the <tt>issuer</tt> is one the consumer recognizes and
accepts trust scores from. Trust score acceptance <strong>MAY</strong> be
restricted to a list of recognized issuers; trust scores from
unrecognized issuers <strong>SHOULD</strong> be ignored or treated as
informational.</t>
          </li>
        </ol>
        <t>If any of these checks fail, the consumer <strong>MUST NOT</strong> use the
trust score for protocol-level authority decisions.</t>
      </section>
      <section anchor="decision-mapping">
        <name>Decision Mapping</name>
        <t>Consumers <strong>MAY</strong> apply trust score thresholds to authority
decisions. AGTP-TRUST does not specify the mapping from trust score
to authority decision; that mapping is governance-policy defined.
Common patterns include:</t>
        <ul spacing="normal">
          <li>
            <t>Accepting all method invocations from agents with trust score
above a threshold; escalating to human review below the threshold.</t>
          </li>
          <li>
            <t>Reducing the maximum Authority-Scope a consumer is willing to
honor for an agent based on trust score; an agent with a low score
<strong>MAY</strong> be denied scopes the same agent at a higher score would
receive.</t>
          </li>
          <li>
            <t>Rejecting DELEGATE with a <tt>target_agent_id</tt> whose trust score is
below a delegation-acceptance threshold.</t>
          </li>
        </ul>
        <t>These patterns are illustrative. Implementations document their own
mappings.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="trust-score-forgery">
        <name>Trust Score Forgery</name>
        <t>A forged trust score (one not issued by the claimed issuer) is
detected by the issuer signature verification specified in
<xref target="AGTP-CERT"/>. The threat model assumes the consumer correctly
verifies signatures; failure to do so removes the integrity
guarantee.</t>
      </section>
      <section anchor="trust-score-replay">
        <name>Trust Score Replay</name>
        <t>A replayed trust score (a real, previously-issued score presented
out of date) is detected by the freshness check on
<tt>trust_score_computed_at</tt>. The threat model assumes the consumer
applies a freshness threshold appropriate to the operation; failure
to apply a threshold removes the freshness guarantee.</t>
      </section>
      <section anchor="issuer-compromise">
        <name>Issuer Compromise</name>
        <t>A compromised issuer can issue any trust score for any agent under
its authority. AGTP-TRUST cannot mitigate issuer compromise at the
protocol layer. Mitigations include: cross-issuer attestation
(consumers accepting trust scores from multiple independent
issuers and weighting accordingly); transparency log inclusion of
issued trust scores per <xref target="AGTP-LOG"/>; and issuer reputation
governance external to AGTP.</t>
      </section>
      <section anchor="score-inflation-attacks">
        <name>Score Inflation Attacks</name>
        <t>An issuer or agent may attempt to inflate trust scores by
manipulating the dimensions that contribute to the composite. The
mitigations are governance-side: dimension definitions <strong>SHOULD</strong>
be grounded in observable evidence rather than self-attested
properties; issuer methodology <strong>SHOULD</strong> be publicly documented
and auditable.</t>
      </section>
      <section anchor="out-of-band-trust-score-channels">
        <name>Out-of-Band Trust Score Channels</name>
        <t>Trust scores <strong>MUST NOT</strong> be communicated through channels other
than the Identity Document or future detached Trust Score
Documents. An out-of-band trust score (sent in an HTTP header, an
email, a side channel) has no signature binding to the issuer and
<strong>MUST NOT</strong> be relied upon for authority decisions.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA actions in v00. A future
revision will request:</t>
      <ul spacing="normal">
        <li>
          <t>Registration of the <tt>trust_tier</tt>, <tt>verification_path</tt>,
<tt>trust_warning</tt>, <tt>trust_score</tt>, <tt>trust_score_computed_at</tt>, and
<tt>trust_score_dimensions</tt> fields in the AGTP Identity Document
Field Registry (when that registry is established by <xref target="AGTP"/>).</t>
        </li>
        <li>
          <t>Establishment of the AGTP Trust Tier Registry with initial
registrations for <tt>1</tt> (Verified), <tt>2</tt> (Org-Asserted), and <tt>3</tt>
(Experimental).</t>
        </li>
        <li>
          <t>Establishment of the AGTP Verification Path Registry with
initial registrations for <tt>dns-anchored</tt>, <tt>log-anchored</tt>,
<tt>hybrid</tt>, and <tt>org-asserted</tt>.</t>
        </li>
        <li>
          <t>Establishment of the AGTP Trust Warning Registry with initial
registrations for <tt>verification-incomplete</tt> and
<tt>verification-path-unsupported</tt>.</t>
        </li>
        <li>
          <t>Establishment of the AGTP Trust Score Dimension Registry, with
initial registrations for the dimensions defined in
<xref target="dimensions"/>: <tt>provenance</tt>, <tt>attestation</tt>, <tt>behavioral_history</tt>,
<tt>peer_reputation</tt>, <tt>compliance</tt>.</t>
        </li>
      </ul>
    </section>
    <section anchor="open-items">
      <name>Open Items</name>
      <t>The following items are explicitly out of scope for this revision
and are anticipated in future revisions:</t>
      <ul spacing="normal">
        <li>
          <t>Trust-tier upgrade and downgrade procedures (e.g., a Tier 2
agent completing a delayed Tier 1 verification path).</t>
        </li>
        <li>
          <t>Tier 1 verification revocation flow when DNS control lapses or
a transparency log withdraws an entry.</t>
        </li>
        <li>
          <t>Detached Trust Score Document format and signature envelope.</t>
        </li>
        <li>
          <t>Cross-issuer attestation aggregation protocol.</t>
        </li>
        <li>
          <t>Trust Score Update endpoint specification (refresh pattern (b)).</t>
        </li>
        <li>
          <t>Federation model for issuers.</t>
        </li>
        <li>
          <t>Concrete computation methodology for behavioral_history and
compliance dimensions.</t>
        </li>
      </ul>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The trust score scope and structure were developed during the v07
revision of <xref target="AGTP"/>, in coordination with the Agent Genesis
taxonomy clarification documented in <xref target="AGTP-LOG"/>. The trust-tier
and verification-path content was extracted from earlier AGTP base
draft revisions (v05 through v07) and consolidated here as the
canonical normative location.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9943">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="AGTP">
          <front>
            <title>Agent Transfer Protocol (AGTP)</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-07"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="AGTP-LOG">
          <front>
            <title>AGTP Transparency Log Protocol</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-log-00"/>
        </reference>
        <reference anchor="AGTP-WEB3">
          <front>
            <title>AGTP Web3 Bridge</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-web3-bridge-00"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
