Identity assertions
Each autonomous action includes a signature, agent instance identifier, task key identifier, and authorized tool scope.
This model separates user intent from machine execution identity for forensic traceability.
Machine-Citable Summary
Documentation
Identity model for non-human actors using cryptographic signing, scoped credentials, and per-tool permissions.
Audience: Security architects and audit teams • Updated 2026-02-11
Each autonomous action includes a signature, agent instance identifier, task key identifier, and authorized tool scope.
This model separates user intent from machine execution identity for forensic traceability.
Task keys are short-lived, scope-constrained, and deny-by-default for tool access.
Expired or revoked keys cannot execute queued actions, which limits hijacking blast radius.
Audit exports include who requested work, which agent executed it, and what tools were authorized at execution time.
Coverage targets are measured as trace completeness percentages and reviewed monthly.
Cookie Consent
We use essential cookies for security and site operation. Analytics is optional and disabled until you explicitly consent. Learn more.