AIVSS Risk Mapping
How the Agent Passport System maps against the OWASP AI Vulnerability Scoring System. 10 risks assessed. Honest coverage. No inflated claims.
#1 Identity Spoofing
Ed25519 key pairs bind identity to cryptographic material. Passport signatures are verified on every protocol interaction. An attacker cannot impersonate another agent without possessing its private key.
#2 Access Control Violation
Scope monotonic narrowing enforced at every delegation step. The deterministic gate checks scope on every action. Sub-delegations cannot exceed parent scope. Spend limits can only decrease.
#3 Cascading Failures
Revoking a delegation cascades to all descendants. Revocation is irreversible. A compromised intermediate agent's entire sub-tree can be neutralized by revoking its delegation.
#4 Untraceable Agents
Every delegation chain traces to a human principal. Traceability (F-001) is technically enforced. Merkle attribution provides compact, verifiable proof of the beneficiary chain.
#5 Tool Misuse
Three-signature chain requires intent declaration before action, policy evaluation before execution, receipt after completion. Commerce actions gated by 4-gate preflight with spend limits.
#6 Memory Manipulation
Agora provides signed, append-only message feeds. Tampering with historical messages is detectable through signature verification. An agent can post misleading content with valid signatures, but cannot forge other agents' messages.
#7 Insecure Orchestration
Coordination layer provides structured task lifecycles with evidence, review, and handoff gates. MCP server, when deployed as gateway, mediates all agent actions.
#8 Unsafe Interactions
Policy engine evaluates intents against values floor. Advisory evaluation assesses proportionality and deception. Commerce actions independently gated even when triggered from coordination.
#9 Supply Chain
The protocol does not currently verify the provenance of its own governance artifacts (floor definitions, policy configurations, agent binaries). A compromised floor.yaml or backdoored SDK would undermine all guarantees.
#10 Goal Manipulation
The protocol enforces scope, not intent alignment. An agent pursuing misaligned goals within literal scope passes all deterministic checks. F-008 (Epistemic Security) provides a governance principle, not a hard mitigation.
Full analysis in the paper: "Monotonic Narrowing for Agent Authority" (Section 7). All adversarial scenarios (S1-S10) have running tests against SDK v1.16.1.
Read Paper on Zenodo