Skip to content

Cryptographic governance layer for AutoGen distributed agent runtime #7372

@aeoess

Description

@aeoess

AutoGen's distributed agent runtime enables powerful multi-agent systems, but currently lacks cryptographic identity and authority enforcement between agents.

Problem: When Agent A sends a message to Agent B in a distributed runtime, there's no cryptographic proof of:

  • Who Agent A actually is (identity)
  • What Agent A is authorized to request (delegation scope)
  • Whether Agent A's authority is still valid (revocation status)
  • What happened after Agent B acted (audit receipt)

Proposal: Integrate the Agent Passport System as a governance layer for the distributed runtime:

  1. Each agent gets an Ed25519 passport (identity)
  2. Inter-agent messages carry signed delegation chains (authority)
  3. ProxyGateway validates identity + scope before message delivery (enforcement)
  4. Every action generates a signed ActionReceipt (audit)
  5. Reputation-Gated Authority caps effective permissions based on earned trust

The Agent Passport System ships 16 protocol modules, 534 tests, and 61 MCP tools. Apache 2.0.

GitHub: https://github.com/aeoess/agent-passport-system
Spec: https://aeoess.com/llms-full.txt
Paper: https://doi.org/10.5281/zenodo.18749779

Happy to discuss integration architecture. cc @imran-siddique who is already exploring governance patterns for Microsoft agent frameworks.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions