Re: Introducing the "Semantic Agent Communication" modeling notes for implementing AgentIDL

Thank you

 I feel great relief because I understand every word, and it answers the
question 'how does this relate to KR as we know it'

Has this not been done before/elsewhere? What part of it is novel?
is the method already in use/standardized/
How is it related to existing/in development standards?


if the demo requires downloading/installing, I won't be able to run it here

Could you or anyone else  please run the demo in your system and do a video
screen capture  walkthrough of one or more use cases with voice narration or
subtitles/captions? it would enable everyone to figure out what you are
doing then, suggest how this is referenced in the report
Something like:  CG Participant has implemented an executable layer for KR
and here is the demo, and requesting feedback?

How should this contribution be handled ? *asking everyone on the list

Thank you

PDM


On Fri, Nov 28, 2025 at 4:44 PM 陳信屹 <tyson@slashlife.ai> wrote:

> Hi Paola,
>
> Thank you. the principles you listed are extremely valuable, and they
> map cleanly onto the direction I am working toward.
> David Raggett’s work is also closely connected to the execution
> aspects of what I’m building, and I plan to study it further.
>
> Let me outline the precise relationship between my architecture and
> KR, and what type of agents it applies to.
>
> 1. Type of Agents Targeted
>
> The architecture applies to execution-bound semantic agents:
>
> agents that must perform actions in an operating environment where
> every action must specify:
>
> 1. preconditions
> 2. postconditions
> 3. provenance
> 4. accountability and traceability
> 5. delegable and inspectable boundaries
>
> These agents behave in a way that can be audited.
>
> 1. They may be implemented using:
> 2. LLM-based inference modules
> 3. rule/workflow engines (e.g., n8n)
> 4. hybrid symbolic–procedural systems or any other backend
>
> But the interface and behaviour are constrained by semantic structures.
>
> 2. Why Execution Matters to KR
>
> When agents operate across organizations, cloud services, apps, or
> customer transactions, their behaviour must be governed by:
>
> 1. semantic clarity (KR), and
> 2. operational correctness (execution)
> 3. KR alone cannot enforce behaviour.
> 4. Execution alone cannot explain why behaviour is allowed.
> 5. Execution-bound semantics is the missing layer connecting them:
>
> So the goal is not to propose a new protocol, but to define the
> boundary of the behaviour space an agent may occupy so the agent
> cannot perform unexpected or unauthorized actions.
>
> This is where the execution-bound semantics complements KR:
>
> ontology → capability schema → contextual applicability → state
> transition → provenance
>
> And AgentIDL is intended as an interface definition layer, so
> developers can generate their own SDKs to interact with agents in a
> controlled and inspectable way.
>
> 3. Minimal Demonstration of the Architecture
>
> This is not a protocol proposal, but a working environment that
> demonstrates how KR constructs act as execution constraints:
>
> https://github.com/s-agent-comm/usecases/tree/main/minimal_agent_cli
>
> The demo shows how a semantic agent behaves when every action is
> typed, authorized, and auditable.
>
> 4. What the Demo Shows (Direct KR → Execution Mapping)
>
> 1. Typed Capabilities
>
> Each action the agent can perform has a defined capability schema, ex.
>
> ```
> capabilities/
>   └── write_note.json
> ```
>
> This is a 1-to-1 mapping from ontology → actionable behaviour.
>
> 2. Explicit Execution Context
>
> An action is only executable when its required context is present: (e.x.
>
> ```
> context/
>   └── working_directory.json
> ```
>
> This matches KR-style preconditions.
>
> 3 State Transitions
>
> Running a command triggers an explicit and inspectable state change:
>
> agent write_note
>
> -> modifies filesystem
> -> updates state
> -> logs provenance
>
> This corresponds to postconditions and effect semantics.
>
> 4. Provenance & Accountability
>
> Every action is written to an append-only log:
>
> 5. Human-Readable, Fully Inspectable Execution
>
> An observer can always see:
>
> 1. what happened (action type)
> 2. why it was permitted (capability + delegation) (W3C did+vc as
> identity, permission, scope, working env, etc).
> 3. which state changed
> 4. how provenance is recorded
> 5. how to audit the behaviour
>
> More examples are collected here:
>
> https://github.com/s-agent-comm/usecases
>
> These demonstrate:
>
> 1. app-level agents
> 2. OS-level agents
> 3. SaaS workflow agents
> 4. cross-organization actions with delegation
> 5. typed execution pathways
>
> thanks for your feadback.
>

Received on Friday, 28 November 2025 09:00:04 UTC