- From: Daniel Ramos <capitain_jack@yahoo.com>
- Date: Sat, 28 Feb 2026 10:24:25 -0300
- To: paoladimaio10@googlemail.com, public-webagents <public-webagents@w3.org>, W3C AIKR CG <public-aikr@w3.org>
- Cc: public-pm-kr@w3.org, public-webmachinelearning@w3.org
- Message-ID: <b4bb05d1-a383-4df0-9556-137985f4a495@yahoo.com>
Dear Paola and W3C AI/ML Community, Thank you, Paola, for raising these critical concerns about WebMCP's security, privacy, and accessibility gaps. Your rigorous scrutiny is exactly what W3C standardization needs — and it's what led to PM-KR's creation when you challenged our initial AI-KR proposals. **Your core concern resonates deeply:** > "The security implications of exposing website functionality to autonomous agents through a browser API without a defined consent model, permission framework, or threat analysis have not been resolved by the standards body. Selling security tooling for a threat model that does not yet exist is not responsible engineering." This is the right standard to hold W3C work to. **Define security/privacy BEFORE deployment, not after commercialization.** ## PM-KR's Security-First Approach (Potential Lessons for WebMCP) The **PM-KR Community Group** (launched Feb 20, 2026) designed security, privacy, and provenance **from day 1** — before any implementation or commercialization. I'd like to share our approach as potential patterns for WebMCP's missing sections. **PM-KR Mission:** Procedural knowledge representation that AI agents can consume with **transparent provenance, inspectable execution, and user sovereignty**. ### 1. **Security: Sovereignty Firewall** **PM-KR's approach:** - **Sovereign execution:** All knowledge execution happens in user-controlled environments (local GPU, no external API calls in hot path) - **Inspectable procedures:** Every RPN program is human-readable (users see EXACTLY what AI agents execute) - **Explicit permissions:** Users approve which procedural knowledge sources AI agents can access **Parallel to WebMCP:** - WebMCP exposes website functions to AI agents → **Who verifies the function is safe?** - PM-KR exposes procedural knowledge to AI agents → **User inspects RPN programs before agent executes** **Potential lesson:** Define **user consent model** before agents invoke website tools. What does "permission" look like for WebMCP tool registration? ### 2. **Privacy: Verifiable Credentials for Provenance** **PM-KR's approach:** - **Verifiable Credentials integration:** Every procedural knowledge source has cryptographic provenance (who created it, who validated it, delegation chains) - **Audit trails:** AI agents record which knowledge sources they queried (inspectable, verifiable) - **Public/private separation:** Users control what knowledge AI agents can access **Parallel to WebMCP:** - WebMCP tools execute on user's behalf → **Who audits what the tool did?** - PM-KR procedures execute on user's behalf → **Verifiable Credentials provide audit trail** **Potential lesson:** Define **provenance model** for WebMCP tool invocations. How do users verify that an agent invoked the right tool with the right parameters? ### 3. **Accessibility: Multi-Modal Rendering (Not an Afterthought)** **PM-KR's approach:** - **Design principle:** Procedural knowledge MUST render in multiple modalities (visual, audio, tactile) - **Same source, multiple modalities:** ONE RPN program → visual rendering, audio pronunciation, tactile 3D print - **Accessibility = core feature, not separate section** **Parallel to WebMCP:** - WebMCP tools described as JSON schemas → **How do screen readers interpret tool descriptions?** - PM-KR knowledge described as RPN + metadata → **Audio/tactile rendering rules included** **Potential lesson:** Define **accessibility contract** for WebMCP. How do assistive technologies interpret tool schemas? What's the screen reader experience when an agent registers a tool? ### 4. **Premature Commercialization Prevention** **PM-KR's approach:** - **Apache 2.0 license, no patents:** Public prior art prevents patent trolling - **Specifications BEFORE products:** PM-KR Core Spec v1.0 target = Q4 2026 (9 months of community review BEFORE declaring "ready") - **No fear-based marketing:** PM-KR complements declarative standards (RDF/OWL/JSON-LD), doesn't claim "implement or die" **Parallel to WebMCP:** - Commercial products selling "WebMCP readiness audits" before spec defines security → **Classic premature commercialization** - PM-KR: Reference implementation exists (Knowledge3D), but NO commercial products until specs finalize **Potential lesson:** W3C should clarify that **Draft ≠ Production-Ready**. Chrome's feature flag preview is for experimentation, not deployment. ## Invitation: Cross-CG Collaboration on Security Patterns **WebMCP and PM-KR address different layers:** - **WebMCP:** Browser API for AI agents to invoke website functions - **PM-KR:** Knowledge representation for AI agents to consume procedural knowledge **But both need:** - ✅ Security model (who can do what?) - ✅ Privacy/provenance (audit trail for agent actions) - ✅ Accessibility (how do assistive technologies interact?) - ✅ User consent (what permissions are needed?) **Proposal:** Could PM-KR and WebMCP CGs collaborate on shared security patterns? **Example collaboration:** 1. PM-KR's Verifiable Credentials approach → Adapted for WebMCP tool provenance 2. PM-KR's Sovereignty Firewall → Adapted for WebMCP cross-origin tool isolation 3. PM-KR's multi-modal accessibility → Adapted for WebMCP tool description rendering **Benefit:** Both CGs solve security/privacy/accessibility together, faster than separately. ## Supporting Paola's Recommendations **I endorse Paola's guidance:** 1. ✅ **Developers:** Experiment with Chrome preview, but **DO NOT deploy WebMCP tools on production sites** until security model is defined 2. ✅ **Buyers:** No commercial product can deliver "WebMCP security compliance" because **the spec has not defined what compliance means** 3. ✅ **Standards participants:** The window for meaningful input is NOW (next W3C Web ML CG meeting: March 5, 2026) **Additional recommendation:** 4. ✅ **W3C leadership:** Consider holding a joint security workshop (WebMCP + PM-KR + Verifiable Credentials WG) to define shared patterns for AI agent security/privacy/provenance ## PM-KR as Complementary (Not Competitive) **PM-KR does NOT compete with WebMCP:** - WebMCP: "How do AI agents invoke website functions?" - PM-KR: "How do AI agents consume procedural knowledge?" **But PM-KR's security-first design could inform WebMCP:** - Sovereignty Firewall → User-controlled execution environments - Verifiable Credentials → Cryptographic provenance for agent actions - Inspectable procedures → Transparency (users see what agents execute) - Multi-modal accessibility → Assistive technology integration from day 1 **We're happy to share PM-KR's security patterns with WebMCP CG.** ## Closing Thoughts **Paola's critique is a gift to W3C standardization.** Premature commercialization undermines trust in W3C standards. When businesses sell "compliance" for specs that haven't defined compliance requirements, it creates: - ❌ False sense of security (customers think they're protected) - ❌ Vendor lock-in (proprietary "compliance tools" before open standards exist) - ❌ Reputation damage (W3C associated with premature products) **The right sequence:** 1. Define security/privacy/accessibility model (W3C CG community work) 2. Publish candidate spec with normative requirements (not TODOs) 3. Implement reference implementations (validate spec is implementable) 4. THEN commercialize (after compliance requirements are clear) **PM-KR committed to this sequence.** We hope WebMCP CG does the same. Thank you, Paola, for holding us to high standards. 🙏 Best regards, **Daniel Campos Ramos** PM-KR Co-Chair Brazilian Registered Electrical Engineer W3C PM-KR Community Group capitain_jack@yahoo.com **Milton Ponson** PM-KR Co-Chair (Mathematical Foundations) W3C PM-KR Community Group rwiciamsd@gmail.com **Links:** - PM-KR Community Group: https://www.w3.org/community/pm-kr/ - PM-KR Security Approach: https://github.com/danielcamposramos/Knowledge3D/blob/main/docs/vocabulary/KNOWLEDGEVERSE_SPECIFICATION.md (Section 3: Sovereignty Firewall) - PM-KR Provenance: Verifiable Credentials integration (collaboration with W3C VC WG) - WebMCP Spec (referenced by Paola): https://webmachinelearning.github.io/webmcp/ - WebMCP Security Issues: https://github.com/webmachinelearning/webmcp/issues **P.S. To WebMCP CG:** This is NOT criticism — it's an offer to collaborate. PM-KR spent significant effort designing security/privacy/provenance from day 1. If our patterns can help WebMCP fill the empty Security/Privacy/Accessibility sections faster, we're happy to contribute. **Invitation:** Join PM-KR's March 5 discussion on Verifiable Credentials for AI agent provenance (same day as WebMCP CG meeting). Perhaps we can find synergies. On 2/28/26 9:39 AM, Paola Di Maio wrote: > > Anssi and everyone > > thanks in advance for handling concerns with diligence and patience > > Just venting some concerns for discussion, before catastrophic > failures may accidentally occur > > I may or may not be able to flag these in Github (.....) > > PDM > > > *Technical Note* *28 February 2026 * > > *FROM PDM W3C AI KR CG * > > *TO ALL* > > ------------------------------------------------------------------------ > > WebMCP is a draft specification with empty security and accessibility > sections. It is not a W3C Standard. Commercial products and services > are already available > > WebMCP is a proposed browser API being incubated by the W3C Web > Machine Learning Community Group. It allows websites to expose > JavaScript functions as structured tools that AI agents can discover > and invoke. Chrome 146 ships an early preview behind a feature flag. > The draft is dated 27 February 2026. > > The spec itself states: "It is not a W3C Standard nor is it on the W3C > Standards Track." (Source: https://webmachinelearning.github.io/webmcp/) > > > Security and Privacy? > > The specification's Security and Privacy section is empty. It contains > only a TODO comment linking to a separate document. The Accessibility > section is completely empty -- no text at all. All four core API > method definitions say "TODO: fill this out." > > This means there is currently no normative guidance on how browsers > should handle prompt injection through tool descriptions, how users > should be informed when tools are registered on a page, how > cross-origin tool data should be isolated, what consent model should > govern agent-to-tool interaction, or how WebMCP tools relate to the > existing accessibility tree. > > (Source: https://github.com/webmachinelearning/webmcp/blob/main/index.bs) > > > Already on the Market? > > Multiple commercial ventures have launched products and services > around WebMCP within days of the Chrome preview. These include paid > "Agent Readiness" assessments, enterprise security scanners, CLI audit > tools, CMS plugins, and partner programs -- all built on a > specification that has not defined its own security model. > > Businesses are being told to annotate their forms with WebMCP > attributes so AI agents can submit them programmatically. > Fear-of-missing-out marketing frames this as "SEO for AI" and warns > that companies who do not implement WebMCP will be "skipped by agents." > > This is premature. The security implications of exposing website > functionality to autonomous agents through a browser API without a > defined consent model, permission framework, or threat analysis have > not been resolved by the standards body. Selling security tooling for > a threat model that does not yet exist is not responsible engineering. > > > What WebMCP Is Not > > WebMCP is not the Model Context Protocol (MCP). > > It does not implement the MCP wire protocol (JSON-RPC 2.0). It is not > interoperable with MCP client libraries. It borrows the tool > abstraction -- functions with schemas and descriptions -- but > implements everything through browser-native mechanisms. > > The name creates confusion that is being commercially exploited. > > (See Technical Note 3: > https://github.com/Starborn/webmcp/blob/main/WebMCnotMCP.md) > > > What You Should Do > > If you are a developer: contribute and experiment with the Chrome > preview, but do not deploy WebMCP tools on production sites until the > security model is defined. > > If you are buying services: no commercial product can deliver WebMCP > security compliance because the spec has not defined what compliance > means. > > If you are a standards participant: the W3C Web Machine Learning > Community Group meets next on 5 March 2026. Comments can also be > submitted via the public mailing list > (public-webmachinelearning@w3.org) or as GitHub issues > (https://github.com/webmachinelearning/webmcp/issues). The window for > meaningful input is now. > > > References > > * W3C Draft Spec: https://webmachinelearning.github.io/webmcp/ > * Spec Source (index.bs <http://index.bs>): > https://github.com/webmachinelearning/webmcp/blob/main/index.bs > * Security/Privacy Doc (separate, not in spec): > https://github.com/webmachinelearning/webmcp/blob/main/docs/security-privacy-considerations.md > * Technical Notes 1-3: https://github.com/Starborn/webmcp/ > * W3C CG Mailing List: public-webmachinelearning@w3.org > * Issue Tracker: https://github.com/webmachinelearning/webmcp/issues > > ------------------------------------------------------------------------ > > /. Corrections and discussion welcome./ > >
Received on Saturday, 28 February 2026 13:24:41 UTC