- From: Bob Wyman <bob@wyman.us>
- Date: Mon, 30 Mar 2026 17:36:55 -0400
- To: Siri Dalugoda <siri@helixar.ai>
- Cc: public-credentials <public-credentials@w3.org>
- Message-ID: <CAA1s49XyznDzs2sGfqL84ySy73d2kRZi7TedxbOqi0L-2r1kBQ@mail.gmail.com>
Siri, Thank you for sharing HDP. The delegation chain model is very interesting and useful. I've been working with similar issues and offer these observations: *The W3C ODRL gap* HDP's scope object reinvents vocabulary that ODRL (W3C Recommendation) already provides: - authorized_tools → ODRL action with asset targets - authorized_resources → ODRL target - constraints (action_count, time_window) → ODRL constraint with existing operators - persistence / network_egress → ODRL prohibition The cost of not inheriting from ODRL is concrete: - First, vocabulary fragmentation. Systems that already understand ODRL (there are several, particularly in the rights management and VC ecosystem) cannot reason about HDP scopes without a separate parser and separate policy reasoning tooling. This duplicates functionality unnecessarily. - Second, lost composability. ODRL policies compose: you can express "this agent may read financial documents unless classification is restricted, and must log every access" in a single policy that standard engines evaluate consistently. HDP's constraint array is a bespoke constraint language that replicates this without the composability. - Third, the VC alignment. You note that you see "a natural alignment between HDP's delegation model and the VC data model" and want to formalise it in the next revision. The VC Data Model 2.0 already has a termsOfUse property (section 5.5) for expressing policies attached to a credential, and ODRL is an established vocabulary for populating it. If HDP's scope were an ODRL Policy, the VC binding would follow naturally from existing practice rather than requiring new formalisation. *Recommended v0.2 change* Replace the novel scope object with an ODRL Policy document. HDP-specific fields with no ODRL equivalent — intent, poh_credential, max_hops — become ODRL extensions under the x- namespace HDP already defines for extensibility. This preserves all HDP semantics while gaining ODRL interoperability, composability, and the VC binding the CG audience would expect without requiring additional formalisation. *A broader architectural observation* Asking what remains of HDP if scope becomes an ODRL Policy document leads somewhere interesting. What if "scope" could be any payload? What remains of HDP if scope becomes generic: header (standard token envelope), principal (the human anchor with DID binding and optional proof-of-human credential), and chain[] (the hop-by-hop append-only record with cumulative hash chaining). The genuine novelty in HDP lies in its chain structure: each hop extends a signed record over all prior states, gaps in sequence numbers indicate tampering evidence, and any party can verify the entire chain offline without a registry. Notice that the chain structure says nothing about authorisation specifically. The scope field is a payload. There is no structural reason that payload has to be an authorisation policy. It could equally carry: - Data provenance: This dataset was derived from these sources, passed through these transformations, and met these conditions - Consent delegation: This patient authorised this use of their data, delegated to this researcher, and then to this analysis tool - Content moderation: A human reviewed this content, which was then passed to this classifier and flagged by this tool - Financial instruction: This officer authorised this transaction, delegated it to this system, and this agent executed it. - Physical-world command (as your HDP-P paper already explores): This action was authorised by this operator, delegated to this robot, executed by this actuator In every case the invariant is identical: a human principal initiates a chain, each hop extends it with a signed record, any party can verify the full chain offline, gaps are detectable. The chain mechanism is the protocol. The payload is a profile. This suggests HDP could be specified at two levels: a payload-agnostic generic chain-of-custody protocol defining the chain structure, signing rules, and verification procedure; and a set of named profiles, of which ODRL-scoped agentic delegation is the first, data provenance is an obvious second, and consent management is a third, etc. That separation would make HDP a broadly applicable provenance infrastructure rather than a single-purpose agentic authorisation token. The IETF draft would be the generic protocol; the profiles would be separate documents. The core enabling structure, the chain structure, would clearly separate from the application-specific vocabulary. This is a larger architectural suggestion than the ODRL point, and may be more than you want to take on in v0.2. But it seems worth raising while the design is still open, because retrofitting payload-agnosticism into a protocol after it has been specified around a fixed payload type is hard. Thanks again for an interesting spec! bob wyman On Mon, Mar 30, 2026 at 3:59 PM Siri Dalugoda <siri@helixar.ai> wrote: > Hi Credentials CG Team, > > I'd like to share a protocol that addresses a gap in the agentic AI space > that I believe is directly relevant to this group's work on Verifiable > Credentials and decentralized identity. > > HDP (Human Delegation Provenance Protocol) defines a signed token > chain that creates a cryptographic audit trail from an authorising human > to every AI agent acting downstream. > The principal identity model supports id_type: "did" natively, meaning a > W3C DID can be used as the root authorising identity binding HDP delegation > chains to existing decentralised identity infrastructure. > > IETF draft: > https://datatracker.ietf.org/doc/draft-helixar-hdp-agentic-delegation/ > Spec: https://helixar.ai/about/labs/hdp/ > Repository: https://github.com/Helixar-AI/HDP > > Key properties: > - Ed25519 signatures over RFC 8785 canonical JSON > - Fully offline verification, no registry or network dependency > - DID-compatible principal binding at the root token level > - Compact enough for HTTP header transport (X-HDP-Token) > > I see a natural alignment between HDP's delegation model and the VC data > model, specifically around how an AI agent's authority could be expressed > as a Verifiable Presentation derived from the root delegation token. > I'm actively exploring this in the next draft revision and would welcome > input from this group on how best to formalise that binding. > > Happy to answer questions or take feedback on the draft. > > Best regards, > Siri > Helixar Limited > > >
Received on Monday, 30 March 2026 21:37:12 UTC