AgentPass V0.1 · Request for Comment · 3 May 2026
The real-time verification primitive AI agent infrastructure doesn't yet have.
When an AI agent acts as a counterparty in an institutional transaction, today there is no standardised way to verify in real-time that the agent is currently authorised, in good audit-history standing, and capable of the action. Every interaction either trusts the operator's word or runs ad-hoc due diligence. AgentPass is a Verifiable Credential profile that closes the gap with a single API call.
The problem
The agent ecosystem has solved several primitive layers and left one critical gap.
- Identity — W3C did:web + Data Integrity Proof. Solved.
- Agent-to-agent communication — Google Agent2Agent (A2A) v1.0. Solved (Linux Foundation, 150+ orgs).
- Agent-to-tool communication — Anthropic Model Context Protocol (MCP). Solved.
- Agent payment authorisation — Google AP2 V0.1, FIDO-tracked. Solved (under formalisation).
- Agent counterparty verification — none. Open gap. AgentPass closes it.
AgentPass is the institutional layer above the four solved primitives — the standardised real-time verification of an agent's current standing as a counterparty.
What verification actually answers
Six questions a counterparty asks before treating an agent as a legitimate party in an institutional transaction:
- Who is this agent? Cryptographic identity, who operates it, chain of custody for the operating identity.
- What is this agent currently authorised to do? Mandate scope at the moment of interaction — actions, data classes, entity boundaries.
- Has this agent been operating in good standing? Audit chain unbroken, anchored to a public timestamping authority, verifiable without trust in the operator.
- Is this agent capable of the action it's about to take? Capability advertisement, extending W3C Agent Card.
- What's the agent's track record? Reputation claims, signed by counterparties or third parties.
- Are there known violations? Revocation status via W3C Status List 2021.
Today, answering all six requires a multi-week paper exercise. AgentPass converts it to a single API call returning a yes/no with cryptographic proof, in real-time.
The shape
AgentPass is a W3C Verifiable Credential — same data model as digital driving licences, academic transcripts, the EU Digital Identity Wallet. Not a new credential format. Not new cryptography. The novel work is the AI-agent claims schema, the federation pattern, the verification API, and the institutional positioning.
Three deployment patterns, increasing maturity:
- Self-issued — operator signs its own AgentPass; verifier checks signature against operator's
did:web. - Federated — operator runs an AgentPass authority server that verifying parties call; provides real-time standing query without exposing operator internals.
- Public ledger — operators publish AgentPass authority references at a public registry. Regulators can query any operator's agents directly.
Why now — the 12-month opening
Four signals stack into a single window from May 2026 to mid-2027 that converts AI governance from "good practice" to "procurement-graded prerequisite":
- EU AI Act high-risk obligations — Article 6 bites 2 August 2026. Logging and FRIA evidence requirements map to AgentPass-style verification natively.
- FCA SM&CR-AI guidance — published end-2026. Names the assurance level expected from senior managers for AI-caused harm.
- AM Best ERM-AI scrutiny — live now. Only 24% of rated insurers are confident they could pass a 90-day independent AI-governance review.
- Five Eyes joint guidance — published 1 May 2026 by CISA, NSA, NCSC UK and allies. Names cryptographic agent identity, signed mandate scoping, encrypted inter-agent comms, human authorisation gates as the recommended controls. AgentPass operationalises every one in a single primitive.
The 12 months ending mid-2027 is when the institutional verification layer of agent infrastructure gets standardised. AgentPass V0.1 is published into that window.
Why this is MCP-scale
The test for whether a protocol is broadly meaningful rather than one-engagement-shaped is whether it holds up across multiple unrelated industries.
- Insurance-linked asset management — a regulatory-reporting drafter agent presents AgentPass to AM Best's intake portal. AM Best logs the standing-verification in their own audit trail. Defensible end-to-end without trusting any vendor.
- UK council DSAR processing — a citizen DSAR is processed by an agent. Council records AgentPass query result alongside the response. Citizen receives evidence the agent had verifiable standing at processing time.
- Regulatory examination — FCA, EIOPA, OID, or AM Best examiners query AgentPass authorities to verify ongoing standing of agents producing regulatory submissions. Continuous compliance evidence rather than periodic audit.
- LP due diligence — an LP evaluating a fund manager queries the manager's AgentPass authority pre-investment. Verifies AI-driven portfolio operations have verifiable governance posture.
- B2B agent commerce — agent A places an order with agent B (AP2-mediated payment); agent B verifies agent A's AgentPass before fulfilling. Real-time agent-to-agent counterparty verification at commercial scale.
- Critical infrastructure / defence — named explicitly in the Five Eyes guidance. Agent verification before any agent acts within a critical-infrastructure perimeter is the AgentPass pattern.
One protocol, six unrelated industries, same primitive.
Status — this is a Request for Comment
AgentPass V0.1 is an early draft published for community input, in the standards-conscious tradition of how MCP, A2A, and AP2 were originally surfaced. This is not yet a finalised standard.
- Spec V0.1 published 3 May 2026. Ready for review and comment.
- Reference implementations — Python (
agentpass-py) and JavaScript (agentpass-js) libraries in active build. - Standards-body submission targeted for the Linux Foundation Agent2Agent SIG and the W3C Credentials Community Group across May–July 2026.
- First production deployment targeted for an institutional partner in Q3 2026.
Comments, critique, and contributions are welcomed. Email alfred@workloft.ai. The intent is for the spec to evolve through community input toward V1.0 over the next 12 months.
Read the artefacts
Who's behind it
AgentPass is authored by Workloft.ai LTD — a UK-incorporated AI infrastructure firm specialising in institutional-grade governed agent substrates. The protocol composes existing W3C primitives (Verifiable Credentials Data Model 2.0, Decentralized Identifiers, Data Integrity, Status List 2021) with the audit-chain anchoring and federation patterns Workloft has been building across multiple regulated-sector engagements.
Workloft's substrate already implements every load-bearing AgentPass component — cryptographic agent identity (W3C did:web), signed mandate scoping (Google AP2 V0.1), append-only audit chain (FCA SYSC 9 / SEC 17a-4 pattern), public-anchored verification, signed-link officer countersign. AgentPass is the synthesis published as a standardisable protocol the broader ecosystem can adopt.
