Skip to content

RFC: Cross-Engine Signed Execution Envelope — interop with CrewAI, Guardian, DIF TAA #3

@aeoess

Description

@aeoess

Summary

Three independent groups converged on the same idea in March 2026: AI agent governance engines need a shared signed execution envelope so verifiers don't depend on any single trust backend.

The Agent Passport SDK (agent-passport-system on npm, 534 tests) already generates every field in the proposed envelope through its 3-signature chain: ActionIntentPolicyDecisionPolicyReceipt.

Full RFC

docs/RFC-SIGNED-EXECUTION-ENVELOPE.md

Covers:

  • Minimal envelope schema (v0.1) with field definitions
  • evaluation_method field (deterministic vs probabilistic) — critical for verifier trust
  • Governance gate rules any consumer should enforce
  • Field mappings to APS, Guardian, and CrewAI
  • Open questions: canonicalization (RFC 8785 vs custom), signature format (raw Ed25519 vs JWS), DID methods, expiry semantics

What We're Asking For

  1. Does this field set cover your engine's governance evidence? If not, what's missing?
  2. Is evaluation_method the right split? Deterministic vs probabilistic captures the key verifier question, but are there other categories?
  3. Canonicalization preference? RFC 8785 (JCS) is the standard choice. Are there objections?
  4. Would your engine emit this envelope? We'll build createExecutionEnvelope() in the SDK. If two engines can produce and verify the same envelope, that's the foundation.

cc @Kelisi808 @xsa520 @ngallo @ymc182 @The-Nexus-Guard

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions