Context
On A2A#1694, @msaleme shared findings from the Red Team / Blue Team Agent Fabric: 342 protocol-level tests that exercise capability boundaries across MCP/A2A, with test generation logic that maps from structured limitation declarations to adversarial verification probes.
The key insight: if an agent declares structured limitations (cannot_access: ["filesystem", "network"]), automated harnesses can generate protocol-level probes that attempt exactly those actions and verify they fail.
Proposed Integration
Map msaleme's test generation pipeline to APS's existing enforcement types:
| Limitation Type |
APS Mapping |
Enforcement |
| Stable ("cannot access filesystem") |
FloorPrinciple with enforcement.mode: 'inline' |
Blocked at gateway, pre-execution |
| Runtime ("may hallucinate under pressure") |
AttestationFreshness type rotating |
Re-evaluated per session window |
| Behavioral drift (>50 turns) |
Compliance report over ActionReceipt chain |
Post-hoc forensic analysis |
The test generation mapping: structured limitations → FloorPrinciple[] → PolicyValidator.evaluate() → adversarial probes → signed pass/fail verdicts.
Deliverables
- Limitation-to-FloorPrinciple mapping spec — how structured limitation declarations translate to APS enforcement rules
- Test generation example — given a set of declared limitations, generate adversarial probes that the PolicyValidator evaluates
- Reference test vectors — subset of msaleme's 342 tests mapped to APS types
Open Questions
- Should the limitation schema be embedded in the passport, the delegation, or a separate declaration?
- How do you handle limitations that are substrate-dependent (e.g., "cannot access filesystem" may be true on one runtime but not another)?
@msaleme — would contributing the test generation mapping as a PR be interesting? The PolicyValidator interface and FloorPrinciple type are the integration surfaces.
Context
On A2A#1694, @msaleme shared findings from the Red Team / Blue Team Agent Fabric: 342 protocol-level tests that exercise capability boundaries across MCP/A2A, with test generation logic that maps from structured limitation declarations to adversarial verification probes.
The key insight: if an agent declares structured limitations (
cannot_access: ["filesystem", "network"]), automated harnesses can generate protocol-level probes that attempt exactly those actions and verify they fail.Proposed Integration
Map msaleme's test generation pipeline to APS's existing enforcement types:
FloorPrinciplewithenforcement.mode: 'inline'AttestationFreshnesstyperotatingActionReceiptchainThe test generation mapping: structured
limitations→FloorPrinciple[]→PolicyValidator.evaluate()→ adversarial probes → signed pass/fail verdicts.Deliverables
Open Questions
@msaleme — would contributing the test generation mapping as a PR be interesting? The
PolicyValidatorinterface andFloorPrincipletype are the integration surfaces.