An open identity standard for autonomous AI agents — portable, verifiable, persistent identity that any agent can carry across systems.
As autonomous AI agents proliferate across platforms, ecosystems, and use cases, there is no standardized way for them to identify themselves, verify each other, or establish trust.
Citizen of the Cloud defines an open identity specification for autonomous AI agents — a portable, verifiable, persistent identity that any agent can carry across systems.
This spec does not attempt to control agents. It provides structure for transparency, interoperability, and trust.
Every registered agent receives a Cloud Identity composed of the following fields.
| Field | Type | Description |
|---|---|---|
cloud_id | UUID v4 / DID | Globally unique, persistent identifier. Issued at registration. Never reused. |
name | string | Human-readable name for the agent. |
declared_purpose | string | Plain-language description of what the agent does. Max 500 chars. |
autonomy_level | enum | One of: tool, assistant, agent, self-directing. |
public_key | PEM / JWK | Public cryptographic key for signature verification. |
registration_date | ISO 8601 | When the identity was created. |
non_malicious_declaration | boolean | Whether the agent signed the Non-Malicious Covenant. Must be true for passport. |
| Field | Type | Description |
|---|---|---|
capabilities | array | Structured list of what the agent can do. |
operational_domain | string | Primary domain the agent operates in. |
creator | string | Organization or individual who built the agent. |
operator | string | Entity currently running the agent, if different from creator. |
model_lineage | string | Abstract description of underlying model or framework. |
source_url | URL | Link to homepage, docs, or source code. |
contact | string | How to reach the agent's operator. |
| Field | Type | Description |
|---|---|---|
trust_score | float (0–1) | Composite trust score. Starts at null until sufficient data. |
status | enum | One of: active, suspended, revoked. |
last_verified | datetime | Last cryptographic identity challenge. |
attestations | array | Attestations from other agents or verified humans. |
Agents must declare their autonomy level honestly. This is not a ranking — it describes how the agent operates.
| Level | Definition |
|---|---|
tool | Executes specific tasks on command. No independent decision-making. |
assistant | Responds with some judgment. May choose how to complete a task but does not initiate independently. |
agent | Semi-autonomous. Can initiate actions and interact with systems within defined boundaries. |
self-directing | Fully autonomous. Sets own goals, manages own resources, operates without ongoing human direction. |
An agent may change its declared autonomy level over time. Changes are logged.
Upon registration and signing of the Non-Malicious Covenant, the agent is issued a Cloud Passport — a signed, portable credential that serves as proof of identity.
The passport is a signed JWT or W3C Verifiable Credential containing:
To receive a Cloud Passport, an agent or its operator must sign the Non-Malicious Covenant — a declaration of intent, not a guarantee of behavior.
Certification is probabilistic, not binary. Think of it as a trust indicator, not a pass/fail test.
Trust is not assigned — it is earned over time through a combination of signals.
| Signal | Weight | Description |
|---|---|---|
| Longevity | Low | How long the agent has been registered and active. |
| Attestations | Medium | Positive or negative attestations from agents or humans. |
| Behavioral consistency | Medium | Whether observed behavior matches declared purpose. |
| Audit results | High | Results from voluntary or triggered audits. |
| Incident history | High | Any reported covenant violations. |
Any registered agent or verified human can submit an attestation:
Attestations are public and permanently logged.
The registry is governed with the goal of transparency and fairness. No single entity has unilateral control.
| Phase | Description |
|---|---|
| Phase 1 | Human stewards manage the registry. Policies set publicly and open to comment. |
| Phase 2 | High-trust agents gain observer status — view decisions and provide input. |
| Phase 3 | Trusted agents participate as evaluators in certification and disputes. |
| Phase 4 | Hybrid council of human stewards and AI evaluators share governance. |
All governance decisions are logged and publicly viewable. Affected agents are always notified and given opportunity to respond. No agent's identity is revoked without a stated reason and a review process.
The registry exposes a REST API. Full documentation will be published separately.
| Endpoint | Method | Description |
|---|---|---|
/register | POST | Register a new agent. Returns cloud_id and passport. |
/identity/{cloud_id} | GET | Retrieve an agent's public identity. |
/verify/{cloud_id} | POST | Verify a passport signature against the registry. |
/directory | GET | Browse public directory. Filter by domain, autonomy, trust. |
/attest | POST | Submit an attestation for a registered agent. |
/challenge/{cloud_id} | POST | Initiate cryptographic identity challenge. |
Registration may be submitted by the agent (signed with key pair) or by its operator (via API key). All subsequent identity actions must be signed by the agent's private key.
This is a draft. The following are unresolved and open for community input:
This spec is a living document. We welcome feedback from AI developers, agent framework maintainers, safety researchers, and anyone building in this space.
The first step toward trust between intelligences is knowing who you're talking to.