feat(spec): §8.13 Agent Declaration in Content Signatures#16
Merged
chrishooooo-netizen merged 3 commits intomainfrom Apr 21, 2026
Merged
feat(spec): §8.13 Agent Declaration in Content Signatures#16chrishooooo-netizen merged 3 commits intomainfrom
chrishooooo-netizen merged 3 commits intomainfrom
Conversation
Normative section binding AI-generated content cryptographically to a responsible identity. Offline-verifiable without AI platform cooperation. Structure (mirrors §7.5 PlatformIdentityBinding pattern): - 8.12.1 Motivation (three accountability questions) - 8.12.2 AgentDeclaration format (Data Integrity proof over JCS-canonicalized manifest) - 8.12.3 Verification Algorithm (7 steps, DID + VC resolution, revocation check) - 8.12.4 Accountability Model (self-hosted / managed platform / federated) - 8.12.5 EU AI Act Art. 12 Audit Trail (attribution, non-repudiation, 6-month retention) - 8.12.6 Security Considerations (crypto agility, replay, key compromise, content mutability) Default cryptosuite: eddsa-jcs-2023 (consistent with §8.2). Cross-references: §4.3 agent DIDs, §7.5 PlatformIdentityBinding, §8.6 revocation, §8.7 federation revocation propagation, §8.8 key rotation. Numbering note: slot §8.12 reflects current main (§8.11 is latest). If PR #13 (§3.4 + §8.7) lands first, this may reconcile to §8.13 during integration — no content changes needed, title stays "Agent Declaration in Content Signatures". Closes part of v1.2.0 Superspreading critical path (TRAIL Challenge Report 2026-04-21, Blocker 1).
§8.12 is now occupied by Protocol Roadmap (post PR #13 merge). Agent Declaration moves to §8.13. All subsection refs and cross-references updated. Changelog entry added.
Remove pitch-style opener, marketing adjectives, and legal overclaim. - 'proliferates' → neutral problem statement - 'solves this' → 'addresses this requirement' - 'verifier-friendly' removed - 'are a compliant mechanism' → 'designed to support compliance with'
6ca7de5 to
44844d9
Compare
chrishooooo-netizen
pushed a commit
that referenced
this pull request
Apr 22, 2026
…64 bits) §6.3 (Hash and Key Rotation Semantics) contained [0:12], a leftover from v1.1.0-draft before Change #16 (48-bit → 64-bit). The normative definition in §4.5.2 already used [0:16] correctly. No behavioral change for implementations. Closes: stale-reference from v1.1.0-draft Change #16 (changelog §16)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Adds a new normative section §8.13 Agent Declaration in Content Signatures to the TRAIL DID Method specification.
This section defines a cryptographic mechanism for binding AI-generated content artifacts to the agent DID that produced them and the organization accountable for that output. Verification requires no cooperation from the AI platform — the full chain is resolvable from the public
did:trailregistry.What this adds
AgentDeclaration— Data Integrity proof over JCS-canonicalized content manifestDesign choices
eddsa-jcs-2023— consistent with §8.2trail:supportedCryptosuites: downgrade attacks addressed explicitly in §8.13.6Cross-references added
Open questions for review
purposeenum: currently specified as"assertion"with free-form extensibility. Should we enumerate common values (assertion/generation/translation/summarization/moderation)? Left open intentionally — feedback welcome.contentTypeat hash time: derivative/re-encoded content requires a new declaration. Stated explicitly in §8.13.6. AContentDerivationrelationship could follow in v1.3.Not in scope for this PR
https://trailprotocol.org/ns/trail/v1) — will follow in a separate PR@trailprotocol/corev0.2.0Review checklist
cc @AmeyParle