Context
On A2A#1628, @MoltyCel identified the mapping between MolTrust's AAE (Agent Authorization Envelope) model and APS governance attestations:
| MolTrust AAE |
APS Equivalent |
| MANDATE (declared scope) |
Delegation.scope |
| CONSTRAINTS (spend/reputation limits) |
Delegation.spendLimit + faceted attenuation |
| VALIDITY (temporal window + revocation) |
Delegation.expiresAt + cascade revocation |
The AAE envelope is agent-level constraint declaration with on-chain anchoring — the same two-layer structure as APS passport + delegation.
Proposed Integration
Define a governance attestation signal type for the trust signal taxonomy (@douglasborthwick-crypto's multi-attestation framework on insumer-examples#1):
A governance attestation requires at minimum:
- Declared scope — what the agent claims it can do (APS
Delegation.scope, MolTrust MANDATE)
- Verified scope — what an evaluator confirmed at execution time (APS
PolicyDecision.verdict, MolTrust MoltGuard evaluation)
- Both signatures — agent + evaluator, independently verifiable (APS 3-sig chain)
This distinguishes governance attestation from onchain_credentials (identity, not authorization) and behavioral (history, not permission).
Deliverables
- MoltGuard → APS PolicyReceipt schema mapping — how MoltGuard's per-invocation evaluation maps to APS
PolicyReceipt.chain
- Governance attestation signal type spec — 5th dimension in the trust signal taxonomy
- Cross-verification example — AAE envelope verified against APS delegation chain
@MoltyCel — would sharing the MoltGuard outcome schema as a PR make sense? The PolicyReceipt type is the integration surface.
@douglasborthwick-crypto — the 5th signal type extends your multi-attestation framework. Would you want to co-author the governance attestation spec?
Context
On A2A#1628, @MoltyCel identified the mapping between MolTrust's AAE (Agent Authorization Envelope) model and APS governance attestations:
Delegation.scopeDelegation.spendLimit+ faceted attenuationDelegation.expiresAt+ cascade revocationThe AAE envelope is agent-level constraint declaration with on-chain anchoring — the same two-layer structure as APS passport + delegation.
Proposed Integration
Define a governance attestation signal type for the trust signal taxonomy (@douglasborthwick-crypto's multi-attestation framework on insumer-examples#1):
A governance attestation requires at minimum:
Delegation.scope, MolTrust MANDATE)PolicyDecision.verdict, MolTrust MoltGuard evaluation)This distinguishes governance attestation from
onchain_credentials(identity, not authorization) andbehavioral(history, not permission).Deliverables
PolicyReceipt.chain@MoltyCel — would sharing the MoltGuard outcome schema as a PR make sense? The
PolicyReceipttype is the integration surface.@douglasborthwick-crypto — the 5th signal type extends your multi-attestation framework. Would you want to co-author the governance attestation spec?