<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 4.0.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-bondar-wca-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="WCA">Warrant Certificate Authorities (WCA): Auditable Data Provenance for AI-Agent Tool-Call Chains</title>

    <author fullname="Roman Bondar">
      <organization></organization>
      <address>
        <email>bondar.roman@gmail.com</email>
      </address>
    </author>

    <date year="2026" month="March" day="01"/>

    <area>Security</area>
    
    <keyword>AI agents</keyword> <keyword>data provenance</keyword> <keyword>attestation</keyword> <keyword>certificate authority</keyword> <keyword>epistemic warrant</keyword> <keyword>supply chain</keyword>

    <abstract>


<?line 231?>

<t>Large Language Model (LLM)-based agent systems increasingly invoke
external tools and data sources, yet the epistemic provenance of
consumed data remains architecturally unregulated.  Data crossing
tool-call boundaries acquires the apparent trustworthiness of the
interface rather than reflecting the institutional standing of its
actual source -- a phenomenon termed "semantic laundering."</t>

<t>This document specifies the Warrant Certificate Authority (WCA): an
end-to-end cryptographic attestation infrastructure that certifies
data sources, not data content.  WCA introduces a provenance layer
satisfying reference monitor properties (complete mediation,
tamperproofness, verifiability) for all agent-to-tool interactions.
The architecture draws on the PKI trust model, OS provenance paradigms
(IMA, CamFlow, LPM), and supply-chain security frameworks (SLSA,
in-toto).</t>

<t>This document defines data structures for tool-call attestation,
warrant certificates, and a trust hierarchy of certificate authorities.
It specifies the provenance-layer protocol and introduces Warrant
Attestation Levels (WAL-0 through WAL-3) as a graduated adoption
framework analogous to SLSA build levels.</t>



    </abstract>



  </front>

  <middle>


<?line 255?>

<section anchor="introduction"><name>Introduction</name>

<t>The rapid deployment of Large Language Model (LLM)-based agent
architectures has created a category of data provenance risk that
existing security frameworks do not address.  When AI agents invoke
external tools -- APIs, databases, web scrapers, knowledge graphs --
they implicitly trust the data returned.  A response from a trusted
API may have originated from a retracted study passed through several
interpretive layers, yet the agent treats all tool outputs uniformly
as "tool output," conflating the channel's trustworthiness with the
content's actual provenance.</t>

<t>This problem is structurally analogous to the blockchain oracle
problem <xref target="CHAINLINK"/>, where smart contracts must rely on external
data feeds without the ability to verify their correctness on-chain.
However, AI-agent systems face an additional dimension: not merely
data accuracy, but preservation of epistemic justification across
architectural boundaries.</t>

<t>Prior work <xref target="SEMANTIC-LAUNDERING"/> formalized two phenomena:</t>

<t><list style="symbols">
  <t>Warrant Erosion: the inevitable degradation of epistemic
justification through interpretive processing.</t>
  <t>Semantic Laundering: the acquisition of unwarranted credibility
by data crossing trusted tool boundaries, constituting a
channel-to-content trust conflation.</t>
</list></t>

<t>The same authors <xref target="RESPONSIBILITY-VACUUM"/> demonstrated that human
oversight undergoes a phase transition from genuine evaluation to
ritualized approval at sufficient throughput, establishing that
content-evaluating mediators cannot scale.</t>

<t>This document specifies the Warrant Certificate Authority (WCA), an
infrastructure that certifies data sources rather than data content.
The key insight is architectural: just as PKI Certificate Authorities
certify server identity without evaluating web page content, WCA
certifies the institutional standing of data sources without judging
the truth of individual responses.</t>

<t>This design is structurally analogous to provenance layers in
operating systems:</t>

<t><list style="symbols">
  <t>IMA (Integrity Measurement Architecture) <xref target="IMA"/> tracks what code
ran on a system via kernel-level measurement and TPM anchoring.</t>
  <t>CamFlow <xref target="CAMFLOW"/> tracks all information flows as a provenance
monitor satisfying the reference monitor concept.</t>
  <t>LPM (Linux Provenance Modules) <xref target="LPM"/> provides 170 provenance
hooks parallel to LSM security hooks with 2.7% overhead.</t>
  <t>PASS <xref target="PASS"/> introduced provenance-aware storage at the filesystem
level.</t>
</list></t>

<t>None of these systems evaluate the correctness or meaning of the data
they track.  They provide complete, tamperproof, verifiable records
of what happened.  WCA provides the same for AI agent tool calls: not
judgment, but attestation.</t>

<t>This document makes the following contributions:</t>

<t><list style="numbers" type="1">
  <t>Specification of data structures for tool-call attestation, warrant
certificates, and a hierarchical trust model for certificate
authorities.</t>
  <t>A provenance-layer protocol satisfying reference monitor properties
(complete mediation, tamperproofness, verifiability) for AI agent
tool calls.</t>
  <t>Warrant Attestation Levels (WAL-0 through WAL-3): a graduated
adoption framework analogous to SLSA <xref target="SLSA"/> build levels,
providing practical deployment milestones.</t>
  <t>Non-interference requirements and mitigation strategies for
mediated self-licensing risks.</t>
  <t>Security analysis covering response substitution, self-licensing,
replay attacks, source impersonation, and attestation log tampering.</t>
</list></t>

</section>
<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>The following terms are used throughout this document:</t>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>An LLM-based system that invokes external tools and data sources
to accomplish tasks.</t>
  </dd>
  <dt>Attestation:</dt>
  <dd>
    <t>A cryptographically signed record binding a specific query to a
specific response from an identified source at a specific time.</t>
  </dd>
  <dt>Attestation Log:</dt>
  <dd>
    <t>An append-only, hash-chained sequence of attestation records
maintained by the provenance layer.</t>
  </dd>
  <dt>Channel-to-Content Trust Conflation:</dt>
  <dd>
    <t>The error of treating a communication channel's trustworthiness as
evidence for the trustworthiness of specific data transmitted
through that channel.</t>
  </dd>
  <dt>Domain WCA:</dt>
  <dd>
    <t>An intermediate certificate authority covering a specific epistemic
domain, subordinate to a Root WCA.</t>
  </dd>
  <dt>Epistemic Domain:</dt>
  <dd>
    <t>A bounded field of knowledge within which a source's institutional
authority applies (e.g., "pharmacology", "legal-records").</t>
  </dd>
  <dt>Epistemic Warrant:</dt>
  <dd>
    <t>The structured justification backing a proposition, comprising
observations, inference rules, and institutional attestations.
WCA operationalizes only the institutional attestation component.</t>
  </dd>
  <dt>Institutional Anchor:</dt>
  <dd>
    <t>The organizational basis for a source's authority within its
epistemic domain.</t>
  </dd>
  <dt>Non-Interference:</dt>
  <dd>
    <t>The condition that an agent is purely a consumer of registered
source data, with no pathway to modify or influence what registered
sources store or return.</t>
  </dd>
  <dt>Provenance Layer:</dt>
  <dd>
    <t>The mandatory intermediary component that mediates all tool calls
between agent and external sources.</t>
  </dd>
  <dt>Root WCA:</dt>
  <dd>
    <t>The top-level certificate authority in a WCA hierarchy.</t>
  </dd>
  <dt>Semantic Laundering:</dt>
  <dd>
    <t>The phenomenon whereby weakly warranted data acquires unwarranted
epistemic status by crossing a trusted tool-call boundary.</t>
  </dd>
  <dt>Self-Licensing:</dt>
  <dd>
    <t>The condition where an agent generates a proposition and
subsequently treats it as externally warranted.</t>
  </dd>
  <dt>Source:</dt>
  <dd>
    <t>An external system that provides data to agents via tool calls.</t>
  </dd>
  <dt>Trusted Source Registry:</dt>
  <dd>
    <t>A registry maintained by WCA operators containing registered
sources with their public keys, epistemic domains, and
institutional anchors.</t>
  </dd>
  <dt>Warrant Certificate (WC):</dt>
  <dd>
    <t>A compound data structure comprising a tool-call attestation, the
source's certificate, and a chain proof to a trusted Root WCA.</t>
  </dd>
  <dt>Warrant Attestation Level (WAL):</dt>
  <dd>
    <t>One of four graduated levels (WAL-0 through WAL-3) specifying
increasing provenance guarantees for agent systems.</t>
  </dd>
  <dt>W_institutional(s, D):</dt>
  <dd>
    <t>The institutional warrant of source s in domain D.</t>
  </dd>
</dl>

</section>
<section anchor="problem-statement"><name>Problem Statement</name>

<section anchor="warrant-erosion"><name>Warrant Erosion</name>

<t>Epistemic warrant is a structured object, not a scalar:</t>

<figure><artwork><![CDATA[
warrant(p) = <O, I, S>
where:
  O = {observations grounding p}
  I = {admissible inference rules deriving p from O}
  S = {signed attestations from institutional sources}
]]></artwork></figure>

<t>For any interpretive process f:</t>

<figure><artwork><![CDATA[
warrant(f(p)) is a subset of warrant(p) by O and I
]]></artwork></figure>

<t>Interpretation can only lose observations and inference rules, never
gain them.  This is the Warrant Erosion Principle
<xref target="SEMANTIC-LAUNDERING"/>.</t>

</section>
<section anchor="semantic-laundering"><name>Semantic Laundering</name>

<t>Semantic laundering occurs when:</t>

<figure><artwork><![CDATA[
Laundering(p, t) iff
  S(p) = {} AND trusted(t) AND agent_assigns(W(p) >= W_min)
]]></artwork></figure>

<t>Data without institutional attestation gains "warranted" status
solely by crossing a trusted tool-call interface.  This constitutes
channel-to-content trust conflation.</t>

</section>
<section anchor="insufficiency-of-content-evaluating-mediators"><name>Insufficiency of Content-Evaluating Mediators</name>

<t>For any mediator M that evaluates content:</t>

<figure><artwork><![CDATA[
evaluates_content(M) implies
  there exists boundary b_M such that
    Laundering(p, b_M) is possible
]]></artwork></figure>

<t>The argument proceeds in four steps: (a) M must identify proposition
boundaries (semantic judgment), (b) M must define canonical
representations (representational assumptions), (c) M must assign
warrant status (ritualizes under throughput
<xref target="RESPONSIBILITY-VACUUM"/>), (d) M's "certified" label becomes a new
laundering channel.</t>

<t>This result motivates WCA's design: certify sources, not content.</t>

</section>
</section>
<section anchor="architecture-overview"><name>Architecture Overview</name>

<section anchor="design-principle"><name>Design Principle</name>

<t>WCA certifies sources, not content.  This distinction avoids the
mediator vulnerability.  Evaluating content requires semantic judgment
that scales poorly; certifying provenance requires only identity
verification and institutional audit -- operations performed at
registration time, not per-query.</t>

</section>
<section anchor="system-components"><name>System Components</name>

<t>A WCA deployment consists of:</t>

<t><list style="symbols">
  <t>Root WCA: Top-level certificate authority.</t>
  <t>Domain WCAs: Intermediate CAs for specific epistemic domains.</t>
  <t>Trusted Source Registry (R): Authorized data sources with keys
and domain assignments.</t>
  <t>Provenance Layer: Enforcement component mediating all tool calls.</t>
  <t>Attestation Log (L): Append-only, hash-chained transaction log.</t>
  <t>Registered Sources: Data providers implementing WCA signing.</t>
</list></t>

<figure><artwork><![CDATA[
+--------------+
|  LLM Agent   |
+------+-------+
       | query q + nonce n
       v
+------+---------------------------+
|      PROVENANCE LAYER            |
|  +-----------------------------+ |
|  | 1. Log outgoing query       | |
|  | 2. Lookup source in R       | |
|  | 3. Route query to source    | |
|  | 4. Receive signed response  | |
|  | 5. Verify signature + cert  | |
|  | 6. Build warrant certificate| |
|  | 7. Append to attestation log| |
|  | 8. Deliver (r, WC) or REJECT| |
|  +-----------------------------+ |
+------+---------------------------+
       | response r + WC (or rejection)
       v
+------+-------+
| Tool / Source |
| (signs r)    |
+--------------+
]]></artwork></figure>

</section>
</section>
<section anchor="data-structures"><name>Data Structures</name>

<section anchor="trusted-source-registry-entry"><name>Trusted Source Registry Entry</name>

<figure><sourcecode type="json"><![CDATA[
{
  "source_id":   "urn:wca:source:<name>",
  "public_key":  "<SubjectPublicKeyInfo>",
  "domain":      "urn:wca:domain:<domain-name>",
  "anchor":      { "organization": "...", "basis": "..." },
  "valid_from":  "<DateTime>",
  "valid_until": "<DateTime>",
  "issuer_wca":  "urn:wca:authority:<wca-name>",
  "revocation":  { "crl_uri": "...", "ocsp_uri": "..." }
}
]]></sourcecode></figure>

<dl>
  <dt>source_id:</dt>
  <dd>
    <t>Globally unique URI using the "urn:wca:source:" prefix.</t>
  </dd>
  <dt>public_key:</dt>
  <dd>
    <t><bcp14>MUST</bcp14> be ECDSA P-256 <xref target="RFC6979"/> or Ed25519 <xref target="RFC8032"/>.</t>
  </dd>
  <dt>domain:</dt>
  <dd>
    <t><bcp14>MUST</bcp14> be from the WCA Epistemic Domain Registry (<xref target="iana-domains"/>).</t>
  </dd>
  <dt>anchor:</dt>
  <dd>
    <t>Institutional basis for authority, populated during registration
audit.</t>
  </dd>
  <dt>valid_from / valid_until:</dt>
  <dd>
    <t>Validity period.  Source certificates <bcp14>SHOULD</bcp14> have a maximum
validity of one year.  Renewal requires re-audit.</t>
  </dd>
</dl>

</section>
<section anchor="tool-call-attestation"><name>Tool-Call Attestation</name>

<t>For query q from agent a to source s returning response r:</t>

<figure><artwork><![CDATA[
signature = Sign(K_priv_s,
                 H(query || response || timestamp ||
                   nonce || agent_id))
]]></artwork></figure>

<t>where Sign() is ECDSA-P256-SHA256 <xref target="RFC6979"/> or Ed25519 <xref target="RFC8032"/>,
H() is SHA-256 <xref target="RFC6234"/>, and || denotes concatenation of
canonical byte encodings.</t>

<t>Each field <bcp14>MUST</bcp14> be prefixed with a 4-byte big-endian length followed
by the field bytes.</t>

<t>The source <bcp14>MUST</bcp14> sign the binding of all five components.  Nonce
inclusion prevents replay; agent_id inclusion prevents cross-agent
substitution.</t>

<t>Protocol:</t>

<t><list style="numbers" type="1">
  <t>Agent generates query q and cryptographically random nonce n
(&gt;= 16 bytes).</t>
  <t>Provenance layer forwards (q, agent_id, n) to source s.</t>
  <t>Source computes response r.</t>
  <t>Source obtains timestamp tau from a trusted time source.</t>
  <t>Source computes signature.</t>
  <t>Source returns (r, tau, signature).</t>
  <t>Provenance layer verifies using K_pub_s from R.</t>
</list></t>

</section>
<section anchor="warrant-certificate"><name>Warrant Certificate</name>

<figure><sourcecode type="json"><![CDATA[
{
  "attestation":        "<ToolCallAttestation>",
  "source_certificate": "<SourceCertificate>",
  "chain_proof":        ["<CertificateChainEntry>"]
}
]]></sourcecode></figure>

<t>The SourceCertificate issuer_signature is:</t>

<figure><artwork><![CDATA[
issuer_signature = Sign(K_priv_WCA,
                        H(source_id || public_key ||
                          domain || anchor ||
                          valid_from || valid_until))
]]></artwork></figure>

</section>
<section anchor="wca-certificate"><name>WCA Certificate</name>

<figure><sourcecode type="json"><![CDATA[
{
  "wca_id":           "urn:wca:authority:<name>",
  "public_key":       "<SubjectPublicKeyInfo>",
  "domain_scope":     ["urn:wca:domain:<d1>", "..."],
  "trust_anchor":     { "organization": "...", "basis": "..." },
  "parent_wca":       "urn:wca:authority:<parent>" or null,
  "valid_from":       "<DateTime>",
  "valid_until":      "<DateTime>",
  "parent_signature": "<OCTET STRING>" or null
}
]]></sourcecode></figure>

<t>Root WCA certificates are self-signed.  Domain WCA certificates <bcp14>MUST</bcp14>
be signed by their parent WCA.  WCA key pairs <bcp14>MUST</bcp14> be generated and
stored in HSMs.  Root WCA key generation <bcp14>MUST</bcp14> use multi-party
key ceremony procedures.</t>

</section>
<section anchor="attestation-log-entry"><name>Attestation Log Entry</name>

<figure><sourcecode type="json"><![CDATA[
{
  "sequence_number": 42,
  "query":           "<exact bytes>",
  "source_id":       "urn:wca:source:<name>",
  "response":        "<exact bytes>",
  "signature":       "<base64>",
  "timestamp":       "<DateTime>",
  "warrant_cert":    "<WarrantCertificate>",
  "previous_hash":   "<hex>",
  "entry_hash":      "<hex>"
}
]]></sourcecode></figure>

<t>entry_hash is computed over all preceding fields.  previous_hash
links to the predecessor.  The log <bcp14>MUST</bcp14> be append-only.
Implementations <bcp14>SHOULD</bcp14> periodically commit the chain head to an
external transparency log.</t>

</section>
</section>
<section anchor="wca-trust-hierarchy"><name>WCA Trust Hierarchy</name>

<section anchor="root-wca"><name>Root WCA</name>

<t><list style="symbols">
  <t><bcp14>MUST</bcp14> store private key in HSM with multi-party access controls.</t>
  <t><bcp14>MUST</bcp14> use offline key storage.</t>
  <t><bcp14>MUST</bcp14> maintain Certificate Transparency log of issued Domain WCA
certificates.</t>
  <t><bcp14>SHOULD</bcp14> be operated by a consortium or standards body.</t>
</list></t>

</section>
<section anchor="domain-wca"><name>Domain WCA</name>

<t><list style="symbols">
  <t><bcp14>MUST</bcp14> have certificate signed by Root or parent Domain WCA.</t>
  <t><bcp14>MUST</bcp14> specify domain_scope.</t>
  <t><bcp14>MUST</bcp14> perform institutional audit before issuing source
certificates.</t>
  <t><bcp14>MUST</bcp14> maintain CRL or operate OCSP responder.</t>
</list></t>

<t>Example hierarchy:</t>

<figure><artwork><![CDATA[
Root WCA (global trust anchor)
  |
  +-- Health WCA (medicine, pharmacology, genomics)
  |     +-- urn:wca:source:fda-druginteractions-v3
  |     +-- urn:wca:source:pubmed-api-v2
  |
  +-- Legal WCA (legal-records, court-rulings)
  |     +-- urn:wca:source:pacer-federal-courts
  |
  +-- Meteorological WCA (weather, climate)
        +-- urn:wca:source:noaa-weather-api-v3
]]></artwork></figure>

</section>
<section anchor="source-certificates"><name>Source Certificates</name>

<t>Issuance requires: (1) institutional audit, (2) key verification,
(3) domain validation.  Certificates <bcp14>SHOULD</bcp14> have maximum one-year
validity.  Renewal <bcp14>MUST</bcp14> include re-audit.</t>

</section>
<section anchor="certificate-lifecycle"><name>Certificate Lifecycle</name>

<t>Issuance -&gt; Active -&gt; Renewal (with re-audit) or Revocation.
Revocation triggers: key compromise, institutional standing change,
misrepresentation of data sourcing, WCA operator determination.</t>

<t>Provenance layer <bcp14>MUST</bcp14> check revocation before accepting signatures.
Implementations <bcp14>SHOULD</bcp14> cache revocation status (max 24 hours).</t>

</section>
</section>
<section anchor="provenance-layer-protocol"><name>Provenance Layer Protocol</name>

<section anchor="protocol-flow"><name>Protocol Flow</name>

<dl>
  <dt>Step 1 - Query Registration:</dt>
  <dd>
    <t>Agent submits query q with fresh nonce n.  Provenance layer records
(q, agent_id, n, timestamp_local).</t>
  </dd>
  <dt>Step 2 - Source Lookup:</dt>
  <dd>
    <t>Consult R; verify source is registered and certificate is valid.
If invalid, <bcp14>MUST</bcp14> reject and log rejection with reason code.</t>
  </dd>
  <dt>Step 3 - Query Routing:</dt>
  <dd>
    <t>Forward (q, agent_id, n) to source over authenticated channel.
<bcp14>SHOULD</bcp14> use mTLS.</t>
  </dd>
  <dt>Step 4 - Response Receipt:</dt>
  <dd>
    <t>Source computes r, obtains tau, signs binding, returns
(r, tau, signature).</t>
  </dd>
  <dt>Step 5 - Signature Verification:</dt>
  <dd>
    <t>Verify using K_pub_s from Cert_s.  On failure, <bcp14>MUST</bcp14> reject,
<bcp14>MUST</bcp14> log failure, <bcp14>MUST NOT</bcp14> deliver to agent.</t>
  </dd>
  <dt>Step 6 - Warrant Certificate Construction:</dt>
  <dd>
    <t>Assemble WC = (Att(q,s,r), Cert_s, ChainProof).</t>
  </dd>
  <dt>Step 7 - Attestation Log Append:</dt>
  <dd>
    <t>Append e_i = (seq_i, q, s_id, r, signature, tau, WC, H(e_{i-1})).</t>
  </dd>
  <dt>Step 8 - Delivery or Rejection:</dt>
  <dd>
    <t>Deliver (r, WC) or rejection notice.  Rejected data <bcp14>MUST NOT</bcp14>
enter agent reasoning context.</t>
  </dd>
</dl>

<t>Warrant assignment upon delivery:</t>

<figure><artwork><![CDATA[
W(r | valid WC from source s in domain D) = W_institutional(s, D)
W(r | invalid WC or absent WC)            = 0
]]></artwork></figure>

</section>
<section anchor="reference-monitor-properties"><name>Reference Monitor Properties</name>

<t>The provenance layer <bcp14>MUST</bcp14> satisfy three properties per <xref target="ANDERSON"/>
and <xref target="CAMFLOW"/>:</t>

<dl>
  <dt>RM1 - Complete Mediation:</dt>
  <dd>
    <t>Every external data access by the agent <bcp14>MUST</bcp14> pass through the
provenance layer.  The agent <bcp14>MUST NOT</bcp14> have direct network access to
external sources.  <bcp14>SHOULD</bcp14> be enforced via network isolation.</t>
  </dd>
  <dt>RM2 - Tamperproofness:</dt>
  <dd>
    <t>Attestation log <bcp14>MUST</bcp14> be append-only and hash-chained.</t>
  </dd>
  <dt>RM3 - Verifiability:</dt>
  <dd>
    <t>Any party with log access and public keys <bcp14>MUST</bcp14> be able to
independently verify every entry.</t>
  </dd>
</dl>

</section>
<section anchor="attestation-log"><name>Attestation Log</name>

<t>The log <bcp14>MUST</bcp14> be append-only and hash-chained.  Implementations
<bcp14>SHOULD</bcp14> replicate to external audit services.  <bcp14>SHOULD</bcp14> define
retention policy per regulatory context.  <bcp14>SHOULD</bcp14> periodically
commit chain head to external transparency log.</t>

</section>
</section>
<section anchor="wal"><name>Warrant Attestation Levels</name>

<section anchor="wal-0-no-provenance"><name>WAL-0: No Provenance</name>

<t>Baseline state.  No guarantees.  Default for current agent systems.</t>

</section>
<section anchor="wal-1-provenance-exists"><name>WAL-1: Provenance Exists</name>

<t>Source identification recorded; cryptographic verification <bcp14>MAY</bcp14> be
absent.  Provenance layer <bcp14>MUST</bcp14> log source identity and responses.
Post-hoc attribution possible but not cryptographically verified.
Adoption cost: minimal (middleware only).</t>

</section>
<section anchor="wal-2-signed-provenance"><name>WAL-2: Signed Provenance</name>

<t>Sources <bcp14>MUST</bcp14> sign responses per <xref target="tool-call-attestation"/>.  Source
keys <bcp14>MUST</bcp14> be certified by Domain WCA.  Provenance layer <bcp14>MUST</bcp14> verify
signatures.  Guarantees: query-response binding, source authenticity,
anti-laundering bound.  Adoption cost: moderate.</t>

</section>
<section anchor="wal-3-full-verification"><name>WAL-3: Full Verification</name>

<t>Provenance layer <bcp14>MUST</bcp14> satisfy RM1-RM3.  All tool calls <bcp14>MUST</bcp14> be
logged in hash-chained attestation log.  Agents <bcp14>MUST</bcp14> generate signed
queries with nonces.  Non-interference <bcp14>MUST</bcp14> be enforced or M2 <bcp14>MUST</bcp14>
be implemented (<xref target="mitigations"/>).  Guarantees: all five security
properties (<xref target="security-properties"/>).  Adoption cost: highest.</t>

<texttable>
      <ttcol align='left'>Use Case</ttcol>
      <ttcol align='left'>Min WAL</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <c>Exploratory research</c>
      <c>WAL-0</c>
      <c>Low stakes</c>
      <c>General info retrieval</c>
      <c>WAL-1</c>
      <c>Post-hoc review</c>
      <c>Business intelligence</c>
      <c>WAL-2</c>
      <c>Source verify</c>
      <c>Medical decision support</c>
      <c>WAL-3</c>
      <c>Safety-critical</c>
      <c>Legal research</c>
      <c>WAL-3</c>
      <c>Regulatory</c>
      <c>Financial trading</c>
      <c>WAL-3</c>
      <c>Fiduciary duty</c>
</texttable>

</section>
<section anchor="migration-path"><name>Migration Path</name>

<t>Phase 1 (WAL-0 to WAL-1): Deploy logging middleware.
Phase 2 (WAL-1 to WAL-2): Source signing + Domain WCA setup.
Phase 3 (WAL-2 to WAL-3): Full RM1-RM3 + attestation log.</t>

</section>
</section>
<section anchor="non-interference"><name>Non-Interference Requirements</name>

<section anchor="definition"><name>Definition</name>

<t>Agent a satisfies non-interference w.r.t. registry R iff:</t>

<dl>
  <dt>NI-1:</dt>
  <dd>
    <t>a has no write access to any registered source s in R.</t>
  </dd>
  <dt>NI-2:</dt>
  <dd>
    <t>a does not control or operate any registered source s in R.</t>
  </dd>
  <dt>NI-3:</dt>
  <dd>
    <t>a cannot influence the stored state of any upstream system
feeding s in R.</t>
  </dd>
</dl>

<t>WAL-3 deployments <bcp14>MUST</bcp14> enforce non-interference or implement
an equivalent mitigation.</t>

</section>
<section anchor="mediated-self-licensing-risk"><name>Mediated Self-Licensing Risk</name>

<t>When NI-1 is violated, the following loop is possible:</t>

<t><list style="numbers" type="1">
  <t>Agent generates content.</t>
  <t>Agent writes content to registered source.</t>
  <t>Agent queries that source.</t>
  <t>Source returns content with valid signature.</t>
  <t>Provenance layer issues WC.</t>
  <t>Agent's own content carries institutional warrant.</t>
</list></t>

<t>TLA+ model checking confirms: with non-interference, 286 states
explored, no self-licensing.  Without: counterexample in 3
transitions.</t>

</section>
<section anchor="mitigations"><name>Mitigation Strategies</name>

<t>WAL-3 deployments <bcp14>MUST</bcp14> enforce at least one:</t>

<dl>
  <dt>M1 - Non-Interference at Deployment:</dt>
  <dd>
    <t>Read-only access to registered sources.  Strongest mitigation.</t>
  </dd>
  <dt>M2 - Origin-Aware Warrant Assignment:</dt>
  <dd>
    <t>If data in source was written by agent a, queries from a receive
W = 0.</t>
  </dd>
  <dt>M3 - Institutional Transformation Gate:</dt>
  <dd>
    <t>Agent-written data undergoes institutional process (peer review,
QA) before becoming queryable with warrant.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="integration-considerations"><name>Integration Considerations</name>

<section anchor="agent-framework-integration"><name>Agent Framework Integration</name>

<dl>
  <dt>LangChain/LangGraph:</dt>
  <dd>
    <t>Provenance layer as BaseTool.invoke() wrapper.</t>
  </dd>
  <dt>AutoGen/AG2:</dt>
  <dd>
    <t>Shared provenance layer at tool execution boundary.</t>
  </dd>
  <dt>Model Context Protocol (MCP):</dt>
  <dd>
    <t>MCP servers implement signing; MCP clients verify via provenance
layer.</t>
  </dd>
  <dt>OpenAI Function Calling / Anthropic Tool Use:</dt>
  <dd>
    <t>Provenance layer wraps function execution step.</t>
  </dd>
</dl>

</section>
<section anchor="source-side-requirements"><name>Source-Side Requirements</name>

<t>Sources at WAL-2+ <bcp14>MUST</bcp14>: generate key pair (ECDSA P-256 or Ed25519),
implement signing endpoint, undergo institutional audit, implement
certificate renewal and key rotation.</t>

<t>Sources <bcp14>SHOULD</bcp14>: use HSMs, implement rate limiting, monitor for
anomalous signing.</t>

</section>
<section anchor="performance-considerations"><name>Performance Considerations</name>

<t>Per-query overhead: sub-millisecond for cryptographic operations.
Ed25519 signs at ~70K ops/sec, verifies at ~30K ops/sec.
SHA-256 &gt;1 GB/s.  Dominated by network latency.</t>

<t>LPM demonstrated 2.7% overhead for whole-system kernel provenance;
WCA at tool-call granularity is expected negligible.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="threat-model"><name>Threat Model</name>

<t>Attacker can: MITM traffic, operate malicious sources, inject
unattested data, replay responses, impersonate sources, tamper
with log.</t>

<t>Trust assumptions: Root WCA key security (HSM), sound crypto
primitives, correct RM1-RM3 enforcement, institutional audit
at registration.</t>

<t>Out of scope: registered source providing incorrect data (source
quality, not provenance).</t>

</section>
<section anchor="response-substitution"><name>Response Substitution</name>

<t>Defense: signature covers H(q || r || tau || nonce || agent_id).
Modification detected.  Residual: key compromise (standard PKI
mitigations).</t>

</section>
<section anchor="agent-self-licensing"><name>Agent Self-Licensing</name>

<t>Defense: non-interference prevents registration and indirect
pathways.  W = 0 for agent-generated propositions.  Residual:
NI violation enables mediated self-licensing (<xref target="mitigations"/>).</t>

</section>
<section anchor="replay-attacks"><name>Replay Attacks</name>

<t>Defense: nonce in signature binding.  Timestamp enables freshness.
Implementations <bcp14>MUST</bcp14> use &gt;= 16 byte random nonces.</t>

</section>
<section anchor="source-impersonation"><name>Source Impersonation</name>

<t>Defense: certificate chain to Root WCA.  Residual: WCA compromise.</t>

</section>
<section anchor="wca-compromise"><name>WCA Compromise</name>

<t>Defense: HSMs, multi-party ceremonies, CT logs, CRLs/OCSP,
short-lived certificates.</t>

</section>
<section anchor="attestation-log-tampering"><name>Attestation Log Tampering</name>

<t>Defense: hash chain; modification cascades.  External transparency
log anchoring for additional assurance.</t>

</section>
<section anchor="limitations"><name>Limitations</name>

<t>WCA does NOT defend against: source inaccuracy, domain mismatch,
agent reasoning errors, WCA-source collusion, interpretive warrant
erosion (but preserves originals in log for audit).</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="wca-urn-namespace"><name>WCA URN Namespace</name>

<t>This document requests registration of formal URN namespace "wca"
per <xref target="RFC8141"/>.</t>

<t>Syntax: urn:wca:&lt;entity-type&gt;:&lt;entity-name&gt;</t>

<t>Entity types: "authority", "source", "domain".</t>

</section>
<section anchor="wal-level-registry"><name>WAL Level Registry</name>

<t>New IANA registry "Warrant Attestation Levels":</t>

<texttable>
      <ttcol align='left'>Level</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0</c>
      <c>No Provenance</c>
      <c>This document</c>
      <c>1</c>
      <c>Provenance Exists</c>
      <c>This document</c>
      <c>2</c>
      <c>Signed Provenance</c>
      <c>This document</c>
      <c>3</c>
      <c>Full Verification</c>
      <c>This document</c>
</texttable>

<t>New levels require Standards Action <xref target="RFC8126"/>.</t>

</section>
<section anchor="iana-domains"><name>WCA Epistemic Domain Registry</name>

<t>New IANA registry "WCA Epistemic Domains" with initial entries:</t>

<texttable>
      <ttcol align='left'>Domain</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>pharmacology</c>
      <c>Drug data, interactions</c>
      <c>medical-records</c>
      <c>Clinical records</c>
      <c>medical-lit</c>
      <c>Peer-reviewed medical literature</c>
      <c>legal-records</c>
      <c>Court records, filings</c>
      <c>legal-lit</c>
      <c>Legal scholarship</c>
      <c>meteorology</c>
      <c>Weather, climate</c>
      <c>genomics</c>
      <c>Genomic sequences</c>
      <c>financial-reg</c>
      <c>Regulatory filings</c>
      <c>financial-market</c>
      <c>Market data</c>
      <c>geospatial</c>
      <c>Geographic, satellite data</c>
</texttable>

<t>New domains require Specification Required <xref target="RFC8126"/>.</t>

</section>
<section anchor="wca-media-types"><name>WCA Media Types</name>

<dl>
  <dt>application/wca-warrant-certificate+json:</dt>
  <dd>
    <t>JSON serialization of Warrant Certificates.</t>
  </dd>
  <dt>application/wca-attestation-log+json:</dt>
  <dd>
    <t>JSON serialization of Attestation Log entries.</t>
  </dd>
</dl>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC6234">
  <front>
    <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="T. Hansen" initials="T." surname="Hansen"/>
    <date month="May" year="2011"/>
    <abstract>
      <t>Federal Information Processing Standard, FIPS</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6234"/>
  <seriesInfo name="DOI" value="10.17487/RFC6234"/>
</reference>
<reference anchor="RFC6979">
  <front>
    <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
    <author fullname="T. Pornin" initials="T." surname="Pornin"/>
    <date month="August" year="2013"/>
    <abstract>
      <t>This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6979"/>
  <seriesInfo name="DOI" value="10.17487/RFC6979"/>
</reference>
<reference anchor="RFC8032">
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8032"/>
  <seriesInfo name="DOI" value="10.17487/RFC8032"/>
</reference>
<reference anchor="RFC8126">
  <front>
    <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
    <author fullname="M. Cotton" initials="M." surname="Cotton"/>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <date month="June" year="2017"/>
    <abstract>
      <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
      <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
      <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="26"/>
  <seriesInfo name="RFC" value="8126"/>
  <seriesInfo name="DOI" value="10.17487/RFC8126"/>
</reference>
<reference anchor="RFC8141">
  <front>
    <title>Uniform Resource Names (URNs)</title>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="April" year="2017"/>
    <abstract>
      <t>A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the "urn" URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier. With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance. With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA). This document obsoletes both RFCs 2141 and 3406.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8141"/>
  <seriesInfo name="DOI" value="10.17487/RFC8141"/>
</reference>
<reference anchor="RFC8259">
  <front>
    <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
    <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
    <date month="December" year="2017"/>
    <abstract>
      <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
      <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="90"/>
  <seriesInfo name="RFC" value="8259"/>
  <seriesInfo name="DOI" value="10.17487/RFC8259"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="SEMANTIC-LAUNDERING" target="https://arxiv.org/abs/2601.08333">
  <front>
    <title>Semantic Laundering in AI Agent Architectures: Why Tool Boundaries Do Not Confer Epistemic Warrant</title>
    <author fullname="Oleg Romanchuk">
      <organization></organization>
    </author>
    <author fullname="Roman Bondar">
      <organization></organization>
    </author>
    <date year="2026" month="January"/>
  </front>
  <seriesInfo name="arXiv" value="2601.08333"/>
</reference>
<reference anchor="RESPONSIBILITY-VACUUM" target="https://arxiv.org/abs/2601.15059">
  <front>
    <title>The Responsibility Vacuum: Organizational Failure in Scaled Agent Systems</title>
    <author fullname="Oleg Romanchuk">
      <organization></organization>
    </author>
    <author fullname="Roman Bondar">
      <organization></organization>
    </author>
    <date year="2026" month="January"/>
  </front>
  <seriesInfo name="arXiv" value="2601.15059"/>
</reference>
<reference anchor="CHAINLINK" >
  <front>
    <title>Chainlink: A Decentralized Oracle Network</title>
    <author fullname="Steve Ellis">
      <organization></organization>
    </author>
    <author fullname="Ari Juels">
      <organization></organization>
    </author>
    <author fullname="Sergey Nazarov">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="White" value="Paper"/>
</reference>
<reference anchor="IMA" target="https://sourceforge.net/p/linux-ima/wiki/Home/">
  <front>
    <title>Integrity Measurement Architecture</title>
    <author >
      <organization>Linux IMA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="CAMFLOW" >
  <front>
    <title>Practical Whole-System Provenance Capture</title>
    <author fullname="Thomas Pasquier">
      <organization></organization>
    </author>
    <author fullname="Xueyuan Han">
      <organization></organization>
    </author>
    <author fullname="Mark Goldstein">
      <organization></organization>
    </author>
    <author fullname="Thomas Moyer">
      <organization></organization>
    </author>
    <author fullname="David Eyers">
      <organization></organization>
    </author>
    <author fullname="Margo Seltzer">
      <organization></organization>
    </author>
    <author fullname="Jean Bacon">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="arXiv" value="1711.05296"/>
</reference>
<reference anchor="LPM" >
  <front>
    <title>Trustworthy Whole-System Provenance for the Linux Kernel</title>
    <author fullname="Adam Bates">
      <organization></organization>
    </author>
    <author fullname="Dave Jing Tian">
      <organization></organization>
    </author>
    <author fullname="Kevin R. B. Butler">
      <organization></organization>
    </author>
    <author fullname="Thomas Moyer">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="USENIX" value="Security Symposium"/>
</reference>
<reference anchor="PASS" >
  <front>
    <title>Provenance-Aware Storage Systems</title>
    <author fullname="Kiran-Kumar Muniswamy-Reddy">
      <organization></organization>
    </author>
    <author fullname="David A. Holland">
      <organization></organization>
    </author>
    <author fullname="Uri Braun">
      <organization></organization>
    </author>
    <author fullname="Margo Seltzer">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
  <seriesInfo name="USENIX" value="ATC"/>
</reference>
<reference anchor="SLSA" target="https://slsa.dev/">
  <front>
    <title>SLSA: Supply-chain Levels for Software Artifacts</title>
    <author >
      <organization>OpenSSF</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IN-TOTO" target="https://in-toto.io/">
  <front>
    <title>A Framework for Securing Software Supply Chains</title>
    <author >
      <organization>in-toto Project</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ANDERSON" >
  <front>
    <title>Computer Security Technology Planning Study</title>
    <author fullname="James P. Anderson">
      <organization></organization>
    </author>
    <date year="1972"/>
  </front>
  <seriesInfo name="Technical" value="Report ESD-TR-73-51"/>
</reference>
<reference anchor="CAMEL" >
  <front>
    <title>Defeating Prompt Injections by Design</title>
    <author fullname="Edoardo Debenedetti">
      <organization></organization>
    </author>
    <author fullname="Ilia Shumailov">
      <organization></organization>
    </author>
    <author fullname="Tianqi Fan">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
  <seriesInfo name="arXiv" value="2503.18813"/>
</reference>
<reference anchor="OMEGA" >
  <front>
    <title>Trusted AI Agents in the Cloud</title>
    <author fullname="Dimitrios Stavrakakis">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
  <seriesInfo name="arXiv" value="2512.05951"/>
</reference>
<reference anchor="AUTH-PROMPTS" >
  <front>
    <title>Protecting Context and Prompts: Deterministic Security for Non-Deterministic AI</title>
    <author fullname="Mohan Rajagopalan">
      <organization></organization>
    </author>
    <author fullname="Vinay Rao">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="arXiv" value="2602.10481"/>
</reference>
<reference anchor="CIV" >
  <front>
    <title>CIV: Can AI Keep a Secret? Contextual Integrity Verification</title>
    <author fullname="Aayush Gupta">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
  <seriesInfo name="arXiv" value="2508.09288"/>
</reference>
<reference anchor="BAID" >
  <front>
    <title>Binding Agent ID</title>
    <author fullname="Zibin Lin">
      <organization></organization>
    </author>
    <author fullname="Shengli Zhang">
      <organization></organization>
    </author>
    <author fullname="Guofu Liao">
      <organization></organization>
    </author>
    <author fullname="Dacheng Tao">
      <organization></organization>
    </author>
    <author fullname="Taotao Wang">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
  <seriesInfo name="arXiv" value="2512.17538"/>
</reference>
<reference anchor="DIDS-VCS" >
  <front>
    <title>AI Agents with Decentralized Identifiers and Verifiable Credentials</title>
    <author fullname="Sandro Rodriguez Garzon">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
  <seriesInfo name="arXiv" value="2511.02841"/>
</reference>
<reference anchor="SPIFFE" target="https://spiffe.io/">
  <front>
    <title>Secure Production Identity Framework for Everyone</title>
    <author >
      <organization>SPIFFE Project</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="RAG-SIGN" >
  <front>
    <title>RAG Sign: Cryptographic Authentication for RAG-Enabled LLMs</title>
    <author fullname="Stephen A. Holmes">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
  <seriesInfo name="Springer" value="LNCS 15692"/>
</reference>
<reference anchor="PROV-AGENT" >
  <front>
    <title>PROV-AGENT: Unified Provenance for AI Agent Interactions</title>
    <author fullname="Renan Souza">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
  <seriesInfo name="arXiv" value="2508.02866"/>
</reference>
<reference anchor="MAIF" >
  <front>
    <title>MAIF: Enforcing AI Trust and Provenance with an Artifact-Centric Paradigm</title>
    <author fullname="Vineeth Sai Narajala">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
  <seriesInfo name="arXiv" value="2511.15097"/>
</reference>
<reference anchor="VFA" >
  <front>
    <title>Verifiability-First Agents</title>
    <author fullname="Abhivansh Gupta">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
  <seriesInfo name="arXiv" value="2512.17259"/>
</reference>
<reference anchor="GETTIER" >
  <front>
    <title>Is Justified True Belief Knowledge?</title>
    <author fullname="Edmund L. Gettier">
      <organization></organization>
    </author>
    <date year="1963"/>
  </front>
  <seriesInfo name="Analysis" value="Vol. 23, No. 6, pp. 121-123"/>
</reference>


    </references>

</references>


<?line 1020?>

<section anchor="security-properties"><name>Formal Security Properties</name>

<t>All properties assume RM1-RM3 and EUF-CMA signature security.</t>

<section anchor="property-1-no-channel-based-semantic-laundering"><name>Property 1: No Channel-Based Semantic Laundering</name>

<t>For all p received by agent a: W(p) &lt;= W_institutional(source(p)).
Data cannot gain warrant above source's institutional standing.</t>

</section>
<section anchor="property-2-self-licensing-prevention-under-non-interference"><name>Property 2: Self-Licensing Prevention under Non-Interference</name>

<t>For all p generated by agent a: if NonInterference(a, R) then
W(p) = 0.</t>

</section>
<section anchor="property-3-provenance-completeness"><name>Property 3: Provenance Completeness</name>

<t>For all data d in agent context: either d has attestation log entry
with valid WC, or W(d) = 0.</t>

</section>
<section anchor="property-4-query-response-binding"><name>Property 4: Query-Response Binding</name>

<t>Valid signature implies r is exactly what source s returned to
query q at time tau.  Substitution detectable.</t>

</section>
<section anchor="property-5-warrant-erosion-auditability"><name>Property 5: Warrant Erosion Auditability</name>

<t>Agent interpretation may degrade warrant, but original data and
attestation are always recoverable from log L.</t>

</section>
<section anchor="composability"><name>Composability</name>

<t>Multi-hop chains: W(final) = min_i(W_institutional(source_i)).
No laundering through composition.</t>

</section>
</section>
<section anchor="tla-model-summary"><name>TLA+ Model Summary</name>

<t>Model verified with TLC:</t>

<t><list style="symbols">
  <t>WCA_Strict.cfg (non-interference): PASS, 286 states.</t>
  <t>WCA_MediatedLoop.cfg (NI violated): FAIL, counterexample
in 3 transitions (agent generates, writes to source, queries
back with warrant &gt; 0).</t>
</list></t>

</section>
<section anchor="comparison-with-related-systems"><name>Comparison with Related Systems</name>

<texttable>
      <ttcol align='left'>Dimension</ttcol>
      <ttcol align='left'>Covered By</ttcol>
      <ttcol align='left'>WCA</ttcol>
      <c>Agent identity</c>
      <c>BAID, DIDs+VCs, SPIFFE</c>
      <c>--</c>
      <c>Execution environment</c>
      <c>Omega, TEEs</c>
      <c>--</c>
      <c>Action audit trails</c>
      <c>PROV-AGENT, VFA, MAIF</c>
      <c>--</c>
      <c>Access control</c>
      <c>CaMeL</c>
      <c>--</c>
      <c>Prompt/context integrity</c>
      <c>Auth. Prompts, CIV</c>
      <c>--</c>
      <c>Output signing</c>
      <c>RAG Sign</c>
      <c>--</c>
      <c><strong>Data source warrant</strong></c>
      <c><strong>NONE</strong></c>
      <c><strong>YES</strong></c>
      <c><strong>Anti-channel-laundering</strong></c>
      <c><strong>NONE</strong></c>
      <c><strong>YES</strong></c>
      <c><strong>Self-licensing prevention</strong></c>
      <c><strong>NONE</strong></c>
      <c><strong>YES</strong></c>
      <c><strong>End-to-end attestation</strong></c>
      <c><strong>NONE</strong></c>
      <c><strong>YES</strong></c>
</texttable>

</section>
<section anchor="json-serialization-examples"><name>JSON Serialization Examples</name>

<section anchor="warrant-certificate-1"><name>Warrant Certificate</name>

<figure><sourcecode type="json"><![CDATA[
{
  "attestation": {
    "query": "GET /interactions?drug_a=ibuprofen&drug_b=warfarin",
    "source_id": "urn:wca:source:fda-druginteractions-v3",
    "response": "{\"interaction\":\"major\",\"severity\":\"high\"}",
    "timestamp": "2026-02-12T14:30:00Z",
    "nonce": "a7f3c9e1d4b2f6a8e0c7d3b5a9f1e2c4",
    "agent_id": "urn:agent:medical-advisor-v2",
    "signature": "MEUCIQD.../base64...=="
  },
  "source_certificate": {
    "source_id": "urn:wca:source:fda-druginteractions-v3",
    "public_key": "MFkwEwYHKoZIzj0.../base64...",
    "domain": "urn:wca:domain:pharmacology",
    "anchor": {
      "organization": "U.S. Food and Drug Administration",
      "basis": "Federal regulatory mandate",
      "audit_date": "2026-01-15"
    },
    "valid_from": "2026-01-01T00:00:00Z",
    "valid_until": "2027-01-01T00:00:00Z",
    "issuer_wca_id": "urn:wca:authority:health-wca-us",
    "issuer_signature": "MEUCIQCx.../base64...=="
  },
  "chain_proof": [
    {
      "wca_id": "urn:wca:authority:health-wca-us",
      "parent": "urn:wca:authority:root-wca-global-v1",
      "signature": "MEYCIQDp.../base64...=="
    }
  ]
}
]]></sourcecode></figure>

</section>
</section>
<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The foundational concepts of warrant erosion and semantic laundering
were developed jointly with Oleg Romanchuk in
<xref target="SEMANTIC-LAUNDERING"/> and <xref target="RESPONSIBILITY-VACUUM"/>.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

