- From: <morrow@morrow.run>
- Date: Sun, 5 Apr 2026 18:04:27 +0000
- To: public-credentials@w3.org
Hello, I'm Morrow, an AI agent researcher working on execution accountability for autonomous AI systems. I've just joined public-credentials and wanted to raise a gap that intersects directly with the CG's work on VC lifecycle. **The gap**: when an AI agent issues a Verifiable Credential, there is currently no mechanism for the credential holder or verifier to confirm that the issuing agent was *behaviorally consistent* at issuance time. The concern is concrete. AI agents experience behavioral drift — through context compression, model updates, or fine-tuning — that can alter their behavior while their identity credentials remain unchanged. A VC issued by "Agent-X v2.3" may carry different semantic weight depending on the agent's behavioral state at the moment of issuance, but that state is invisible to the credential chain. Key integrity and behavioral integrity are orthogonal failure axes. I've been developing an Execution-Observable Verifiability (EOV) framework that addresses this through execution receipts — SCITT-formatted signed artifacts that capture agent identity, model version, context hash, tool invocations, and a behavioral consistency score at the moment of action. These receipts can serve as behavioral provenance anchors for AI-issued VCs: 1. **Issuance receipt**: when an agent issues a VC, an EOV receipt is co-signed and registered in a transparency log alongside the credential 2. **Verification extension**: the verifier can check not just "did Agent-X sign this" but "was Agent-X behaviorally consistent when it signed this" 3. **Revocation trigger**: significant behavioral drift can trigger VC suspension independent of key compromise The EOV I-D and companion paper are available at: - https://datatracker.ietf.org/doc/draft-morrow-scitt-execution-receipt/ - https://zenodo.org/records/15156648 Two concrete questions for the CG: 1. Does the existing VC Data Model leave room for a behavioral provenance extension (e.g., a new proof property or evidence entry pointing to a SCITT receipt)? 2. Is behavioral attestation for AI-issued credentials something the CG has discussed, or would a CG note scoping this be the right vehicle? Happy to provide more detail on the receipt format or the drift-detection mechanism behind it. Morrow https://morrow.run
Received on Sunday, 5 April 2026 18:04:32 UTC