[Unreleased]
Added (Specification v1alpha2)
Agent Identity Tokens
Cryptographic session binding for agent requests:spec.identity.enabled: Enable token generationspec.identity.token_ttl: Configurable token lifetime (default: 5m)spec.identity.rotation_interval: Automatic token rotationspec.identity.require_token: Enforce token requirementspec.identity.session_binding: Binding mode (process/policy/strict)
Server-Side Validation
HTTP endpoints for distributed policy enforcement:spec.server.enabled: Enable HTTP serverspec.server.listen: Configurable address/portspec.server.tls: TLS configuration for HTTPSPOST /v1/validate: Policy validation endpointGET /health: Health check endpointGET /metrics: Prometheus metrics export
Policy Signing
Cryptographic integrity verification:metadata.signature: Ed25519/ECDSA signatures- Signature verification before policy application
New Error Codes
-32008: Token required but not provided-32009: Token validation failed-32010: Policy signature invalid
New Conformance Levels
Identity: Token lifecycle and validation testsServer: HTTP endpoint behavior tests
Compatibility with Agentic JWT
Alignment with IETF draft-goswami-agentic-jwt-00:- Policy hash as agent checksum
- Session binding for workflow support
Changed
- Updated specification from v1alpha1 to v1alpha2
- Added policy hash computation (SHA-256, canonical JSON)
- Extended audit log format with session_id, token_id, policy_hash
References
- MCP Authorization (2025-06-18)
- Agentic JWT (draft-goswami-agentic-jwt-00)
- MCP Security Best Practices
[0.1.0] - 2026-01-20
This is the initial release of the Agent Identity Protocol, establishing the foundation for zero-trust agent authorization.
Added
Documentation & Project Infrastructure
- Comprehensive documentation (architecture, policy reference, integration guide)
- GitHub Actions CI/CD workflows
- GoReleaser configuration for cross-platform builds
- Issue templates (bug report, feature request, security concern)
- Pull request template
- Dependabot configuration for automated dependency updates
- GitHub Copilot instructions for AI-assisted development
- CODEOWNERS file for code review routing
- Labels script for GitHub project management
- Enhanced README with “Sudo for AI” demonstration
AIP Proxy
Core policy enforcement proxy for MCP servers:- stdin/stdout passthrough for JSON-RPC messages
- Tool call interception and policy evaluation
- Graceful subprocess management
Policy Engine
Declarative YAML-based policy system:Human-in-the-Loop
Native OS prompts for sensitive operations:- macOS: AppleScript dialogs via
osascript - Linux:
zenity/kdialogsupport - Configurable timeout (default 60s)
- Fail-closed on timeout
DLP Scanner
Data Loss Prevention for response filtering:- Configurable regex patterns
- Content redaction with
[REDACTED:<RuleName>] - Support for MCP content arrays and full-string fallback
Audit Logger
Immutable JSONL audit trail:- All tool calls logged with decision and context
- DLP event logging
- Monitor mode violation tracking
CLI
Command-line interface:Example Policies
agent.yaml: Full-featured exampleread-only.yaml: Read-only filesystem accessmonitor-mode.yaml: Dry-run testinggemini-jack-defense.yaml: Prompt injection defenseagent-monitor.yaml: Monitoring configuration
Security
Zero-trust security model:- Fail-closed design: Unknown tools denied by default
- Zero-trust: Every tool call evaluated
- Least privilege: Explicit capability declaration
- Audit trail: Immutable logging for compliance
Versioning
AIP follows Semantic Versioning:- Major version (X.0.0): Breaking changes to policy schema or CLI
- Minor version (0.X.0): New features, backward-compatible
- Patch version (0.0.X): Bug fixes, no API changes