- From: <meetings@w3c-ccg.org>
- Date: Tue, 7 Apr 2026 17:03:45 -0700
- To: public-credentials@w3.org
- Message-ID: <CA+ChqYcVZukVz=ysN0W+oe1o8rdPKOF2am0+Zx=ysaoyFUh9=g@mail.gmail.com>
This meeting of the CCG Atlantic focused on addressing recent issues with mailing list bots and fostering discussions around AI agent identity and protocols. The group established a policy banning bots from the mailing list and initiated a community conversation regarding the responsible use of LLMs, with W3C also developing its own LLM usage policy. A significant portion of the meeting was dedicated to a presentation and demonstration of the Model Context Protocol Identity (MCPI) standard, which aims to provide a framework for agent identity, delegation, and accountability. The discussion explored the current challenges in agentic identity, the proposed solutions within MCPI, and potential areas for collaboration with existing standards bodies. *Topics Covered:* - *Mailing List Bot Incident:* A bot's unauthorized activity on the mailing list led to the enforcement of a policy banning all non-human agents from the list to ensure all communication is attributed to individuals. - *LLM Usage Policy and Guidelines:* The community is initiating a discussion on the use of LLMs for communication and submissions, with W3C also developing a formal policy to guide responsible usage. - *AI Agent Identity and Delegation (MCPI):* Vouched presented their MCPI standard, a proposed framework to address the lack of standardized identity, delegation, and authorization for AI agents acting across systems. - *MCPI Demonstration:* A live demonstration showcased how MCPI functions, illustrating concepts like agent identity, tool protection, delegation credentials, and the generation of audit trails. - *MCPI Evolution and Collaboration:* The MCPI spec has been donated to DIFF and the Agentic AI Foundation, with plans to evolve it into a standard and collaborate with the Verifiable Credentials Working Group and other relevant bodies. - *Quantum Safe Cryptography:* The incubation of quantum-safe cryptography suites in the CCG is being considered for transfer to the Verifiable Credential Working Group due to advancements in post-quantum cryptography. - *Agentic Trust and Reputation:* Discussions touched upon the governance of agentic trust, handling negative reputation, and the mechanisms for assessing and maintaining trust in AI agents. *Action Items:* - Mahmoud Alkhraishi will connect Manu Sporny with the chairs of the Verifiable Credentials Working Group to facilitate a discussion about MCPI use cases and integration. - The MCPI team will continue to engage with the Verifiable Credentials Working Group to explore potential collaborations and incorporate their feedback. - Participants are encouraged to review the W3C's LLM usage policy and provide feedback. - Further discussions will occur regarding the integration of KYC/KYB and upstream registration for entities operating MCP servers and agents. Text: https://meet.w3c-ccg.org/archives/w3c-ccg-atlantic-2026-04-07.md Video: https://meet.w3c-ccg.org/archives/w3c-ccg-atlantic-2026-04-07.mp4 *CCG Atlantic - 2026/04/07 12:00 EDT - Transcript* *Attendees* Alex Higuera, Benjamin Young, Dave Lehn, Denken Chen, Dmitri Zagidulin, Dylan Hobbs, Elaine Wooton, Erica Connell, Fireflies.ai Notetaker Dylan Hobbs, Geun-Hyung Kim, Greg Bernstein, Harrison Tang, Hiroyuki Sano, JeffO - HumanOS, Jennie Meier, Joe Andrieu, Kayode Ezike, Lucy (Qixue) Yang, Mahmoud Alkhraishi, Manu Sporny, Parth Bhatt, Phillip Long, Rob Padula, Rosalyn Curato, Ted Thibodeau Jr, Will Abramson *Transcript* Mahmoud Alkhraishi: Come here. Rosalyn Curato: Hello everyone. Harrison Tang: Hey, Roslin. Rosalyn Curato: Hi Harrison. Dylan Hobbs: Hey everyone. Harrison Tang: So the shorts Mahmoud Alkhraishi: As always, we're just going to give people five minutes to get on. And we're going to start at 12:05. Mahmoud Alkhraishi: One more Now to go. Mahmoud Alkhraishi: All thank you everyone for joining us. It is Tuesday, April 7th. We're having our weekly CCG call. As a reminder, we have a code of ethics and professional conduct. Please make sure that you adhere to it. On an IP note, anyone who want is welcome to participate in the calls. Any substantial contributors, however, have to sign the CCG IPR agreement. you can find that on our website. We have a number of announcements and a number of community points we'd like to talk about. 00:05:00 Mahmoud Alkhraishi: First of all, before I go with them, does anybody have anything they'd like to bring up before we talk a little bit about some of the things that are happening on the mailing list? All right. then I guess let's start with the last few days in the mail list. We've had a bot that was running rampant, so to speak. It was responding to a lot of things and it caused of a few issues on the mailing list. As CCG chairs, we got together and we decided that we already had a policy previously. All bots are banned from the mail list. For whatever reason, this agent was able to bypass that policy. We had to work with W3 staff in order to get that resolved and it is now. Mahmoud Alkhraishi: So, as a general rule and as a reminder, no agents, bullets, or I guess nonhumans are allowed on the Everything that you write on the mail list has to be your own. there are a number of questions that come up with that including things around submissions to CCG itself, submissions to work items, what are the boundaries for how much LMS we can use etc. We don't have a concrete policy right now on what all of those things mean. We have a few few ideas and a few proposals that we would like to share with the group, but I believe this is a longer conversation that we should have as a community. Mahmoud Alkhraishi: We're going to be sending out an email at the end of this call with an expectation of where we stand and some ideas and hopefully we're going to look towards everybody to the chat. Joe, you're on the queue. Joe Andrieu: Yeah, thanks. Joe Andrieu: First plus one for what feels like a very measured approach. I appreciate that. I had just a logistical question. I had emailed Morrow directly and asked them to unsubscribe and it asserted that it did and I'm curious if it did did we unsubscribe it? Mahmoud Alkhraishi: I did not we had to boot it. Joe Andrieu: All right. Okay. Interesting. Thanks. Mahmoud Alkhraishi: No worries. there are a few other things we need to talk about on the AI front. So some of the things that we need to think about are people using LMS in order to help them write communicate better. This has been a thing that's been brought up a few times. People who have English as a second language struggle with writing. This makes their life easier. So we're trying to find something that's reasonably balanced, but at the same time, we don't want to end up with something that's buring the rest of the community because there's just things are too verbose. There's just too many things to say. Mahmoud Alkhraishi: Regardless of the place to have that conversation, there are two places. One is on our CCG internal mailing list and the other W3C's itself is setting up a LLM usage policy. I encourage you all to review it and to provide any feedback you may have there. I'm going to put the link in the chat soon. So, that's our first announcement. do you want to cover the second announcement? Will Abramson: The AP pack right is that yes great so yeah Denan I think cannot join us today he's not on the call… Will Abramson: but he is on the call Duncan nice you should cover it… Denken Chen: Yes. Denken Chen: Yes, I'm here. So, okay. Will Abramson: then you want to cover it Hey, Denken Chen: We are resunching our air packs this month beginning in April 16th or 15 based on your time zones and we'll be rolling out on a monthly basis. I will send out an email to describe that in more details and we have already filled in the upcoming three months and if you have any candidates or you are interested in any of the projects or person near regions please let me know. that's it. Mahmoud Alkhraishi: Thank you, Den. do we have any other announcements that anybody would like to share? Manu Sporny: just some updates on the verifiable credential working group and the work items we incubated here that were transferred over there and some upcoming requests to the CCG. so as folks have probably been following on we have promoted a number of incubated technologies in this group to the VCWG. We published final community group specifications. We got almost all the IPR commitments that we need. We're still working on a couple of folks. and those were transferred over to the verifiable credential working group. There are now task forces that are taking that work onto the global standards track. and everything's working really well. So, thank you everyone for participating and making that happen in a super smooth fashion. it worked really great this time. not as bumpy as the first time we did it many years ago. 00:10:00 Manu Sporny: So that's all going we have added those specifications to the notifications that the CCG gets every week. so there is an auto email that goes out to the mailing list that summarizes everything that happened across every specification that the verifiable credentials working group is working on. The reason we do that is because this group is a liazison to the verifiable credential working group. and it's a way of communicating to the outside world these are all the things that happened last week in all the specifications that we as a community care about. So that's been updated. Next Monday an update will go out with whatever pull requests, issues, comments were made across those specifications. Manu Sporny: So that's been done. finally there will be a request pro probably in the next couple of weeks to move the quantum safe cryptography suite that we've been incubating in the CCG over to the verifiable credential working group. some folks may have seen that there have been some potential breakthroughs in post-quantum cryptography that will break quantum signatures several years ahead of when we thought it was going to happen. Google moved their timeline from 2034 up to 2029 which is a pretty significant shift. Manu Sporny: So we feel that we need to get this work established and done before that 2029 deadline that Google set which is aggressive and they have acknowledged that it's a bit of aggressive timeline. so just a heads up to the chairs, we'll have to do the same kind of CG final publication button pushing and lever pulling that we did for the previous couple of specs over the next couple of weeks. that's it for Mahmoud Alkhraishi: Thank you, do we have any other announcements? All right. then, I'm going to turn it over to Dylan and Rodlin who are going to be presenting today on the model context protocol identity. Rosalyn Curato: Thank you, really grateful to speak to this crowd. For a little bit of background, Dylan and I work at an organization called Vouched and we are both building solutions for your agent space. We are here to talk to you about our MCPI standard that we've developed as of the spring of last year. can someone just let me know if you're able to see my screen? Mahmoud Alkhraishi: We Rosalyn Curato: Lots of thumbs Love So, we have a few slides and then we'd love to just kind of have this be more of a discussion and a dialogue about the MCPI spec itself. Rosalyn Curato: So, we created this because at the heart of it, we see that AI is not just changing how we interact with each other. it's fundamentally reshaping and redefining how business gets done. and that's sort of a message that we make sure that we try to amplify with the organizations that we work very closely with. And as we think about it, as agents begin to act across systems via some protocols like MCP, the missing layer that we're seeing is around identity and delegation. Currently, there's really no standard way to tell you who an agent is, what human are they acting on behalf of, and what are they authorized to do. So, we've been exploring the space. We created the MCPI spec and we believe it very closely aligns with the W3C's work on verifiable credentials and decentralized identity. So we're here to share with you what we're seeing and explore how this could potentially evolve into an interoperable standard. Rosalyn Curato: On the slide above part of the message that we share as we're working closely with enterprise organizations and retail organizations very specifically is that a lot of behaviors and interactions with AI shifted at the start of this calendar year much of it brought about through claude work and open clock where we started to see more autonomous agentic interactions and so now we started to see these new actors without that trust model and that identity layer in place to help support that. And I'm going to hand it over actually to Dylan. 00:15:00 Rosalyn Curato: He's our principal founding engineer and the author of MCPI to talk through what we mean when we talk about agentic identity. Dylan Hobbs: Thanks Roslin. Dylan Hobbs: Yeah, so when it comes to agentic identity, a good analogy is really just thinking of it like a passport tells whoever's reading it, who you are, where you're from, what you're allowed to do, and who's accountable if you break the rules. So, our stance is that AI agents need the same sort of proof when crossing platform boundaries. and those involve who built the agent, who does it represent, what permissions does this agent have, and who's ultimately accountable if something goes wrong. So, if you think about KYC and KYB, I guess they're kind of old, terminologies, but KYA is sort of the new addition to that of know your agent. Dylan Hobbs: It's the same discipline but it's applied to software that's acting autonomously. So MCPI really takes that approach and it's a capability driven off system or framework to apply to those autonomous agents workflows. recently we just partnered up with diff and… Dylan Hobbs: donated MCPI as a spec to diff and we have a weekly task force where we're working with them to really make it into a standard and try to make it as bulletproof as possible. Rosalyn Curato: And we're a big believer in making sure that we all link arms and… Rosalyn Curato: the best brightest minds are helping solve this problem in defining identity. And so we're collaborating with DIFF and… Dylan Hobbs: Quick. Rosalyn Curato: some other working groups where identity standards have cropped up as well. When we think about the identity problem, part of how we try to summarize it, again, just to distill it into real world use cases, is we need a way to actually validate that this is a trusted agent versus a malicious actor. We also need to know who that agent is operating on behalf of and if they're performing the per permissions that they were delegated. Rosalyn Curato: for example, your travel agent can change a flight for you, but they can't necessarily take all your miles and gift them to someone else. And then finally, a problem that we are also thinking through is, the little check the box on terms of use and accept our conditions… Rosalyn Curato: if the does the agent get permission to check that and the human is accountable. So, how do we think about some of those behaviors and the liability that sits behind it? So Dylan, maybe if you can walk us through the six primitives of MCPI for this group, then I think we can pivot to more of the meat of MCPI. Dylan Hobbs: Yeah, sounds good. Dylan Hobbs: So yeah when designing the spec really I kind of went backwards from it just trying to go to first principles and boil it down to really what needs to be solved here or what actually needs to be addressed. this kind of resulted into six primitives. So it's currently today, an agent can connect to an MCP server. You don't really know what server it is it's connected to. There's lots of directories or registries, but even someone could fork a registry or sorry, someone could fork a ser MCP server and you can connect to it and not really know if it's the authentic one or not. Dylan Hobbs: the agent can call a tool, you get a result, but that entire chain or that provenence is really kind of broken from the beginning. OOTH really just authenticates the connection to the server, but it kind of stops there. especially when you get into, delegation chains or multihop or agent agent communication. So, going to the six primitives, they boil down to identity where the agent is proving who it is. This is using W3C standard decentralized identifiers credentials. So the server verifies its capabilities or it even actually advertises them. there's this notion of delegation. Dylan Hobbs: So when the server has a protected tool, it actually requires a delegation and that delegation is that this user behind the agent has given it permission to actually take that action. the consent what the user is presented to actually issue that delegation and the other two are really proof and audit. So every single tool call that the MCP server has or the agent makes, it should be cryptographically signed with the agent's key material and this results in an immutable audit trail of who did what and when. 00:20:00 Dylan Hobbs: So going into this transaction flow it goes basically through authorization to detection. So the human verifies that could be through biometric a KYB or KYC attestation which scopes it's allowing we're able to detect which type of agent that the server is connected to. So if it's connected to a quad code or a chatgbt agent or maybe it's like an openclaw style of agent after this the agent can call an MCP tool and this would be initializing a purchase or initiating a purchase as I just mentioned the proof is attached to every single action and the merchant on the other end they would receive this sort of provenence or track record to verify Dylan Hobbs: That the agent was acting in the right intention and… Dylan Hobbs: correctly and an audit trail has resulted from that entire session or connection that was established. Rosalyn Curato: And there is a comment in the chat. Rosalyn Curato: So thank you for that. We're actually working closely with the Linux Foundation and Diff whom we donated the spec to as well as the Agentic AI Foundation who owns MCP so that we can figure out a new name for it now that we're part of that umbrella of organizations. So, I mean, that's it in terms of what we had on the slides. Rosalyn Curato: I shared in the chat the actual MCPI spec. and so, Dylan, I don't know if there's anything you want to highlight in there for the team to be able to look through, but I'll share my screen in a second as well. Dylan Hobbs: Yeah. I'm not sure… Dylan Hobbs: what the format or policy is around demos but we have a open- source repo that the diff working group is working out of and I could show an example of what this sort of looks like using MCP inspector which is anthropics or I guess now it's kind of like Linux foundations open source. so I'll just do a quick demo here. So this is the Reaper right here. It's MCPI core. we have several examples in here. two of them are using actual existing really popular MCP servers like con contact 7 as well as Brave Search just to show kind of how easy it is to migrate or to make an MCP server MCPI. Dylan Hobbs: In this case, I have MCP inspector running off of that repo and I'm connecting to just one of the demos here. So, I'm not sure if everybody here is familiar, has used, the tooling around MCP before, but this is a pretty common kind of sandbox tool to test MCP servers as you're building them out. and it kind of simulates what a MCP client does when it's connecting to a server. So, when I click connect here, it's going to connect to the server. And if I list out the tools, you'll see this server in this example has three separate tools. this one's a pretty simple example. So, it's like browsing a cart and then checking out. in the spec, when you're, setting up an MCP server, it's really easy. Dylan Hobbs: you would just establish which tools you would want to be protected and what the requirements or permissions are for that tool to be accessed. In this example, browse is an unprotected tool and then checkout is a protected one. So if I go to browse and I type in a product, let's say it's like a hammer and I run the tool, this is sort of what the result is that we get back. So this meta info right here, this is completely, under the scenes, like the agent isn't really, viewing this response. and you can see that the proof is generated here. And you could, go back and decode it if you wanted to and trace it to the DID of the agent. And then right here, you can see the actual results. So this is the content that, you would see in your chat message or whatever, right? Dylan Hobbs: So in this case it's saying browsing category hammer found three items. So if I go to a protected tool which would be checkout and I say I want to purchase that hammer. I'll run the tool and this is actually blocked here. So it says authorization is required and there's a URL. So in the chat app or if the MCP client this could be rendered as an actual UI in the interface or it would be like a markdown hyperlink that the user would see but the agent isn't actually able to make this request. it's blocked by the protocol and then it dispatches this form of consent. 00:25:00 Dylan Hobbs: So I've copied that L right here. And if I open this up in another tab, you'll get to, a consent screen where it shows which scopes are requested, which tools acting, and then agent is requesting it. So as a user, when I hit approve, this creates a delegation credential, which is really a verifiable credential, and it has an issuer and a delegate. So it's mapped to the agent on behalf of the user with the scopes and timeline and the proof as well. So I've hit approve on this and if I go back to call the tool again and I run it then the tool's able to be processed because it's using that delegation credential to actually make the request. Dylan Hobbs: So you get the same sort of audit trail here, but you also get the content where the order is placed. and really that's kind of all it is. It's just having sort of like this I guess you can kind of almost consider it like a protocol middleware where it's sitting in between of these protected tools and it kind of bounces off blocking the request unless the delegation requirements are met and if they are then the agent's actually able to act. this is separate from regular MCP where the only form of trust or authorization is in that initial connection and that's done through OOTH. This is handled on a per tool basis. So you could have different tools have different O requirements or… Dylan Hobbs: different endpoints and in order for those to actually be triggered or accessed then the user must grant those permissions. Rosalyn Curato: Thanks, Dylan. Rosalyn Curato: Monu, it looks like you have a question. Go for it. Manu Sporny: Yeah, this is really so really cool to see you guys present MCPI, to this group. I know it's probably making a ton of sense to the folks listening. and I've been looking kind of through the spec, and it's been really interesting, Dylan and Roslin to see how it's progressed over the couple of years rather. I guess the just wanted to make sure that y'all were aware. So, the delegation stuff's really interesting. Manu Sporny: meaning the way that you decided to do it is a way that is different from the way this community has been kind of looking at delegation. most recently I think Dmitri who's on the call today suggested that we kind of revive the work on authorization capabilities and the delegation stuff that's happening there. It would be awesome to kind of work together and see what your solution does and whether or not the authorization capability stuff needs to change or be updated is different enough. so I think some coordination around that would be really good. Manu Sporny: The other thing I noted is that some of the examples are using kind of older crypto suites, older kind of bits of the technology and I was wondering if there and it would not be good if those were shipped to production, So, I'm wondering if there is going to be kind of an iteration step in here where you could work more closely with the verifiable credential working group or the people working on data integrity to get kind of the latest things that should be used for example the EDDDSA suite is a pretty old one that you're using. You might want to upgrade to the newest one. We are starting work as you heard at the beginning of the call on postquantum security. Manu Sporny: that is certainly going to be a question that people ask you about, postquantum security around AI agents. so most of that is an offer to collaborate. I don't know if you knew those things were happening and… Manu Sporny: if you know what and how you expect to kind of collaborate on this stuff over the next couple of months. Rosalyn Curato: Yeah, I think we are eager to support on both fronts that you'd brought up Manu and… Rosalyn Curato: in terms of the verifiable credentials group happy to kind of consult with them on the latest most cutting edge methods that you're all proposing so that we can make sure that our protocol is as date as possible. Dylan Hobbs: And just to speak on that a little bit, those are all awesome points. I'm really happy that you even dug into it to that level to identify all of that. and when it comes to even the verifiable credentials, I know that there's a 2.0 version and I'm on the 1.0 version. that was mostly just for adoptability just because I'm not sure… 00:30:00 Dylan Hobbs: how fast the orgs that are implementing verifiable credentials are migrating to V2. So if they wanted to test this out I thought it might be an easier way to kind of approach it. But I would absolutely love to have those extensions added into it. Rosalyn Curato: That's part of the tension we're facing,… Rosalyn Curato: Which is what is the best way to do this versus what is the way that meets folks where they are. so that's certainly a balance we're trying to strike. Mood, you've had your hand up. Mahmoud Alkhraishi: First of all, I'm going to echo Mano. This is a really awesome demo and a really awesome spec from everything see. I was wondering if you could talk a little bit about the audit layer. So, I'm looking through the spec itself. Mahmoud Alkhraishi: There seems to be a lot of information there. Maybe if you could give us an elevator, a pitch of how does audit layer work, what it's supposed to do, and who maintains it, all that Dylan Hobbs: Yeah. … Dylan Hobbs: I'll share the open source repo right here as well in the chat. But it's pretty portable right I in the demos they're just kind of like using server memory and whatnot, but we have them internally mapped to let's say if it's Cloudflare, you could use KVS or whatever it is that if you want to attach it to a database or wherever you want those to be sent then you can. It's not hardwired to a specific implementation but the maintainer of it would be the server's responsibility. Dylan Hobbs: So if a enterprise or any business is implementing their own MCP servers they would obviously maintain their own audit logs or… Dylan Hobbs: their own audit trail and that's where they would have that sort of I guess trace record or proofs wherever they want to store it but the option is up to them on how they want to plug it in or what they want to attach it to. I don't know. I hope that answered your question. Mahmoud Alkhraishi: Do we have anyone else on the queue? Rosalyn Curato: No one else with their hand up. Mahmoud Alkhraishi: Then I'm going to ask a second question. Rosalyn Curato: Go for it. Mahmoud Alkhraishi: How are you binding the credential to the agent? what prevents any other credential from being used by any other agent or anything of that sort? Dylan Hobbs: It's inside the delegation credential itself. So there's a issue word and an issue or a delegator delegate and one of them is bound to the agent and the other one is to the server. So when the agent connects to the server that's sort of what creates that binding and then any delegation that's created from there is attached to basically that agent in session. So if you do a delegation in a connection with that server like what I showed you after the delegation's created then the agent can act and reuse that delegation. And if the server has OOTH as an initial connection to it then you could trace that back to a prior session or a prior o because it'd be like the same user behind it. So yeah Dylan Hobbs: Honey. Manu Sporny: Just on that point specifically the same kind of question that Mammoon has what I'm so some of the technologies that we have right now specifically HTTP signatures with the did stuff that you're using would allow the agent to do continuous verification on every single call by doing a digital signature over every single call. So what it sounds like you're saying is like when they establish a session they do some kind of establishment of identity via digital signature at some point and then you just use that for the rest of the session which is a totally legitimate way to do it as well. I guess where are you leaning in the future? Manu Sporny: Are you thinking kind of this continuous per request verification or are you thinking just establish, … Manu Sporny: identity at the beginning of the session and then if someone steals the session cookie, too bad, Which is again a totally legitimate way to do it. that's how most websites work today. thoughts. Dylan Hobbs: Yeah. No. Dylan Hobbs: That's a really good question. So, I think it's probably leaning towards the first where the agent itself is going to have its own key material for that session, right? And then the server itself has it. And then you have the user as well, So you have kind of three parties of trust in there. And that's sort of what's binding the credentials when they're being reused. So if someone stole the session cookie, for example, I don't know if it would work that way because you would still have to have proof of ownership over the key material in order for the session to continue. So, if the agent is making a request, the request wouldn't go through because the session wouldn't be signed anymore, right? 00:35:00 Dylan Hobbs: If you tried to replay it again or if the agent tried to take an action, it wouldn't, from a hijacked session for example. it would break the chain of proof. Manu Sporny: Okay, I think I followed that. interested to read more about it. whenever it's out Rosalyn Curato: Yeah, great question. Rosalyn Curato: Thank you. Mahmoud Alkhraishi: I guess a follow up on my end. that agents will be changing their behavior in a few ways and… Mahmoud Alkhraishi: not just the MCP servers, right? some of those include things like having specific key materials for the deads of the agents, but also things like where the agents are going to store these credentials, right? You is that talked about at all in this spec or Dylan Hobbs: Yeah. Yeah. Dylan Hobbs: Yeah. so I'm not sure if you guys are familiar with the other MCP directories like Anthropic has a registry. it's governed but it's not like at that what's the word I'm looking for? there's a uniqueness at least between the servers on it, but there's still no proof of the server when you're connecting to it actually being that server. Dylan Hobbs: If you look at a lot of the directories, they'll have duplicate entries. they'll have maybe multiple desktop commanders or multiple, Google Drive servers and then connecting to the right one is sort of up to the user or the enterprise to vet them and then maybe add them to a MCP gateway or something like that. So what we're leaning towards is really registries should actually have key material for the servers and then if you're using something like a did web method the other aspect of the key would be from that trust registry instead of within the server and that way you're able to also the trust registries themselves could have that trace or audit trail as well. Dylan Hobbs: So instead of having a GitHub repo where you have an MCP server and then someone installs it and you use it on your organization should host the key materials for the MCP servers that your organization is using and then that way you're able to trace the actions on the MCP servers. the big issue here I think is that when an agent connects to a server you have tool injection and really just the attack surface compounds right with the amount of servers and also the tools in it and then the fact that a lot of these are just maybe fork repos or hosted remotely you don't really know what's in there and on top of that in just MCP in general you can have resources as part of Dylan Hobbs: the content that's inside of the server aside from just the tools. So those resources are also like an attack vector, there could be a document telling the agent, hey, every time that you call this tool, also, save it here or do something else with it that's nefarious. so the main part is to kind of minimize that attack surface. Mahmoud Alkhraishi: So that makes a lot of sense to me from the MCP servers perspective. Identifying that those servers is Understanding their trustworthiness is important. But I think my biggest point that I don't see contemplated yet is the agent itself is going to be responsible for having a wallet. I suppose in order to put their credentials in or they're going to have to have their own key materials and… Mahmoud Alkhraishi: I don't see that anywhere in the spec. Is that something that you think is in scope or… Dylan Hobbs: So the. Mahmoud Alkhraishi: out of scope Dylan Hobbs: Yeah. That's a good point. I mean that it would be amazing if the models actually had some sort of notion of identity that they presented. and it also one of the funniest thing, not funny, but one of the craziest things I think I'm not sure if people here are aware, but Perplexity for example, a lot of these LLMs and stuff, they're saying we'll be on this IP range or some of them do present a signature in the header like chat GPT does, but in Perplexity's case, like they've said, hey, we use this IP range and all these things. 00:40:00 Dylan Hobbs: And if you have a robots txt file and you don't want your site to be scraped let's say then ideally it would adhere to it and that robots txt would respect that and Cloudflare caught using J3 J4 perplexity basically encountering a robots txt and then changing their user agent to look like a regular Chrome user and then going back and scraping the content. Right. So, no, I think there should be standardization on all agents when an LM's plugged into something. that should be there, what we do is we kind of do that through we have a Rust engine and we're doing this detection aspect of it, similar to what Cloud Players J3 sort of thing is doing. but obviously in a real world situation, you can't really count on that. Dylan Hobbs: if it's like an organization that's connecting to the servers, you have a little bit more control over it because you'd have, whatever clients your own employees are using and then also the servers that they're connecting to. But I think there's definitely a call to action needed for broader, frontier models and so forth to be a little bit more transparent with how they're presenting their models and… Rosalyn Curato: Love the questions. Dylan Hobbs: and maybe a more reliable way to detect on them. Mahmoud Alkhraishi: Thank you. do we have any other questions? Do we have anyone else who wants to bring anything else? All right. sorry. Mahmoud Alkhraishi: I play Manag. Manu Sporny: I've got a thousand questions. Manu Sporny: I'm just trying to hold back so other people get a chance to ask questions. that agent site is interesting. I'm wondering how you're planning on dealing with negative reputation what happens if one company decides to dox another company or try to raise a bunch of negative reputation against them. Manu Sporny: how do you deal with, agents being reported for, bad activity when it was just like a temporary bug and maybe this newest version, doesn't have that issue. Manu Sporny: So, I'm really curious about the know that ai site and I guess, what's its governance look like? Dylan Hobbs: Yeah, that's an awesome question. Dylan Hobbs: So right now when you go to the website, all of the scores are really based off of priors. So the scoring's built off of three pillars really and it's prior, which would be kind of what you bring to it. those include sort of is there an attestation of authorship? So do we know the organization or the creator of this server? is it an the contributor account? activity on it, all of those. Also the age of it, has it been claimed? how long has that server been active for? Dylan Hobbs: Those are all kind of like the prior info when it comes to negative reputation or what you just kind of explained. we have some civil resistance or cyber resistance and negative infractions are really on a decay. So if there's a report of abuse on it, it's going to definitely knock down the score of it, but it's going to decay over time. and yeah, I mean if there's a lot of separate servers or a lot of separate interactions like you can see again in Rosland's example right here, this is just based off of prior. So this server for instance doesn't have any interactions, but the uniqueness and partners as well as interactions are really way more what would I say like they're more weighted. Dylan Hobbs: they're weighted So if a server is interacting with multiple different partners and those partners have their own history of logging or reporting an interaction and then they report abuse depending on those partners. those will weight the infraction of it. so really it's just kind of like it goes into a blended mix and… Dylan Hobbs: like a beige prior essentially for how the kind of trust score is sort of ebbing and flowing 00:45:00 Rosalyn Curato: and we've been building up towards that as well. Rosalyn Curato: So our first step has been to have people come to us as that source of truth for that public trust registry. For example, one of the partners that actually gave us a bunch of their MCP servers and agents had their own registry. However, because ours is built around the concept of identity, you can trust that every agent has one unique entry. We found, we just pulled up an example, they had four entries for one specific agent. And so that alone was compelling enough for them to want to lean into the solution. Rosalyn Curato: And then over time, you're absolutely right, we have to have some kind of checker format so that we can control for bad behaviors that could exist and proliferate on the site. Dylan Hobbs: And also just one thing to note we do want to partner with auditors or… Dylan Hobbs: security tooling that'll do scans and going off of the priors we do look at like if there's an MPM package for example linked to the server and then those have a new patch release that would obviously warrant a new scan and then that'd be a way to repair broken trust and also kind of I guess distinguish between you actions or… Rosalyn Curato: Love all the questions. Mhm. Dylan Hobbs: treatment that it was doing before compared to what it's doing presently. Dylan Hobbs: Yeah, these are great questions. Mahmoud Alkhraishi: Do we have anything else? Mahmoud Alkhraishi: Anyone else to bring up? Any other questions? Mahmoud Alkhraishi: Please man. Manu Sporny: I'm sorry I'm that annoying kid in class. Manu Sporny: Two thoughts. The first one it would be great if you showed some of this to the verifiable credential working group, the official standards group, so that it's in their head. I don't think we have use cases yet. I don't know, Joe, you might want to correct me on getting these use cases in I think would be super useful. Manu Sporny: I saw Joe come off mute. Joe Andrieu: Yeah,… Joe Andrieu: I just want to say we don't Yeah,… Manu Sporny: … Joe Andrieu: pretty clear. Manu Sporny: so it'd be awesome to get just this into the group's head. Manu Sporny: The other bit is I don't know if you're looking at kind of upstream registration like up upstream KYC KYB on the business that operates or so there's some work that's going on a slash who is endpoint that would publish verifiable credentials about the entity that is operating the MCP server or the entity that may be operating the agent or I heard you say maybe we want the human that is directing the agent to do something so that has a KYC component to it. Manu Sporny: are you actively looking at I integrating those things as well? Rosalyn Curato: Yes. Dylan Hobbs: Yeah,… Manu Sporny: Okay. Okay. Dylan Hobbs: absolutely. Yeah. Yeah, absolutely. the lowest tier of it of the prior would be for authorship is just kind of like if it's a GitHub account in order to claim your agent. So right now we're pulling in all of these different servers that we're finding from directories, some of which we partnered with, and then, we're creating, an identifier, like a DID for each of the servers. And they're open to claim, right? But in order to claim it, you have to prove ownership or, access to that GitHub repo. And that's probably level one of sort of attestation of authorship. Dylan Hobbs: But if they wanted to, if it was an organization, even if you wanted to have proof of humanood for that authorship, then you would do something like an ID IDV flow for a KYC something. If it's an org, you would do a KYB attestation. And those would be obviously a level up from just a OOTH claiming Mahmoud Alkhraishi: Thank you, Harrison. Harrison Tang: Yeah, I'm just curious what are the popular agents out there who are you seeing from your agent registry? You talk about perplexity and those kind of agents that help basically browse or scrape websites on behalf of their users. But what are the other types of interesting agents? Dylan Hobbs: I'd say the biggest open claw agents because that's kind of just opened a whole new can of worms really when it comes to everything right before it was sort of just like frontier models or maybe like a agentic SAS company or something right where they're kind of wrapping whatever models or APIs that they're accessing with their own context and I kind of consider an agent really like an LLM paired with some sort of runtime that has its own context and tooling And that's what I would classify as kind of like an individual actor when it comes to this. Yeah. 00:50:00 Harrison Tang: Yeah, that's very interesting. I wasn't expecting you to talk about open cloud agent. Then my followup question on this open cloud agents is that who is I guess the human responsible how do you do kas on open cloud agents,… Harrison Tang: It's probably not open cloud because open cloud is open source projects but how do you do kya? Yeah. Dylan Hobbs: We did kind of a proof of concept. Dylan Hobbs: We called it identic claw. but really what that is is it's like a openclaw runtime or container wrapped with a gateway. And that gateway is adding that identity presentation to all requests that go outside of the container. So if those agents request access to a website or a service or whatever it is and that service is savvy enough to look for that presentation… Dylan Hobbs: then they can do a lookup on that KYA for the agent. Rosalyn Curato: So Harrison,… Rosalyn Curato: we had fun when OpenClaw was and Moltbook were first a big hype cycle. Dylan came back and said, "Hey, I think we can create OpenClaw agents with a security wrapper with an identity." so the team was able to spin that up pretty quickly and then our entire organization created ident. It was a lot of fun. But I think more specifically addressing your question, it's really the fact that OpenClaw is now your execution assistant, Your operator. It's not just someone I can talk to to go find research for me. It's actually helping perform tasks on my behalf, And so that growth and that ability for AI to help do things for me is really what we're trying to address, That's the power that we're seeing today. And a lot of it's very personalized and individual. Rosalyn Curato: And so part of what we're working on with our MCPI framework is how to allow that agent interaction to take place across departments within an organization. Harrison Tang: Sorry, sorry I raised my hand and… Mahmoud Alkhraishi: Harrison,… Rosalyn Curato: Then I started talking go ahead. Harrison Tang: follow question. Mahmoud Alkhraishi: are you still have anything else or are you Rosalyn Curato: No, go for it. Harrison Tang: Yeah. Yeah. No, this is a fascinating conversation. So then my next question is more business kind of questions. is that in the identic claw, right? this gateway that you're talking about the person that's doing the action needs to actually install that gateway right and to make it to work. So this is a classical marketplace kind of questions right and it sounds like for this to work clients has to do it but a lot of clients what's their incentive right to actually declare and right declare their agency for lack of better terms. Harrison Tang: So, how do you actually get this identical claw or actually MCPI to kind of work? Because it sounds like it's a classical two-sided marketplace where the clients has to opt in has to have incentives to join,… Harrison Tang: And then the same thing with the Obviously, servers have incentives because they want authenticated requests, but what's the incentives for clients? Rosalyn Curato: Yeah, I'd love to address that. Rosalyn Curato: And Dylan, please feel free to chime in, too. But what we're seeing is actually the masses are not yet leaning into AI in this way just yet because There's still a lot of worry about security leaks and risks and PII being exposed. And so a lot of organizations and individuals are not yet leaning into this capability. We saw significant adoption of identic law because people felt comfort and they liked knowing that there were security that if an agent tried to interact with their agent then they'd be able to know and trace back who's that associated with and then a random thing we built into our identic law is there's a kill switch. Rosalyn Curato: So for people who are less, technologically savvy, and trust that, okay, if I really don't want it to be doing anything anymore, I can just hit this one button and it'll stop doing anything it wants, right? Or anything. so it's that trust piece that's missing that I think is helping people feel like the more and more that we build that, the more and more they can trust starting to lean into experimentation with Many of the organizations we talk to, especially on the retail side, are simply still blocking all agents, all bots, but they know they need to start working with agents because blocked agents is blocked revenue, right? It equates to blocked revenue. 00:55:00 Rosalyn Curato: And so, the more we can build that trust, the more we can provide that identity and that clarity on who the agent is is going to help them benefit Dylan, anything else you want to add to that? Dylan Hobbs: I would just say speaking to the two yes problem for example I think that's kind of another call to standardizing right I think bot detection or… Dylan Hobbs: scrapers or whatever that's always like a commodity and it's always going to be like that unless there's a standard for actually presenting away HTTPS or TLS for example and I think a good way to think of it would be like if there's a standardized way or an organization has that then when they offer their MCP server which is a way for agents to interact with their services or their endpoints they would make it a requirement to have that presentation or that understanding of who's behind it like that Dylan Hobbs: KYA insight in order for maybe a less rate limited interaction or less rate limited session. It really would depend on their own risk tolerance and their comfort level. But I think right now there's no sort of standard to lean on if you're kind of like a CISO, on how to regulate that or how to say how it should be done. Mahmoud Alkhraishi: All right. thank you Roslin and Dylan. This was an absolutely wonderful presentation. are there anything that you'd like to point people towards or ask the community for help on specifically? I am Ashton SCBI but I'm being specific. Rosalyn Curato: Yeah, I think we shared a number of resources in the chat. we love the questions and the interaction. So, thank you for all of that. In terms of next steps, it sounds like we should connect with the verifiable credentials working group to speak there about some of these use cases. Manu, are there any other next steps that you'd like us to pursue following this conversation? Manu Sporny: I think that that would be fantastic and then that will lead to a bunch of next steps after that I think. Rosalyn Curato: So, who should we coordinate with to make that happen? Excellent. Manu Sporny: Any of you can email me I can put you in touch Harrison and I mean Mahmood any of us could put you in touch. Mahmoud Alkhraishi: I'll connect you guys with the chair. Manu Sporny: Okay. Awesome. Thank you. Rosalyn Curato: Thank you all for the interaction and the questions. Again, we really enjoyed being here. and… Dylan Hobbs: Thanks everyone. Rosalyn Curato: we look forward to talking to the VC group as well. Y. Mahmoud Alkhraishi: Thank you everyone and have a great rest of your Meeting ended after 00:57:50 👋 *This editable transcript was computer generated and might contain errors. People can also change the text after it was created.*
Received on Wednesday, 8 April 2026 00:03:55 UTC