<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rehfeld-apix-core-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="APIX Core">API Index (APIX): Core Infrastructure for Autonomous Agent Service Discovery</title>
    <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-core-01"/>
    <author initials="C." surname="Rehfeld" fullname="Carsten Rehfeld">
      <organization/>
      <address>
        <email>carsten@botstandards.org</email>
      </address>
    </author>
    <date year="2026" month="May" day="11"/>
    <abstract>
      <?line 112?>

<t>The internet was designed for human actors. Its discovery infrastructure —
search engines, directories, and hyperlinked documents — assumes a human
reading and navigating. Autonomous agents (bots) operating on the internet
today face a structural gap: there is no machine-native, globally accessible
index of services they can consume.</t>
      <t>This document defines the core infrastructure of the <strong>API Index (APIX)</strong>:
a HATEOAS-based, globally accessible, commercially sustainable service
discovery infrastructure designed for autonomous agents as its primary
consumers. It specifies the governance model, the three-dimensional trust
model, the APIX Manifest (APM) base format, commercial onboarding and
sanctions compliance, the supply-side funding model, and the base Index API.
These elements are shared across all APIX service types.</t>
      <t>Profile documents extend this core for specific service categories:
the APIX Services Profile (draft-rehfeld-apix-services-00) defines the
web API and bot service profile; the APIX IoT Device Profile
(draft-rehfeld-apix-iot-00) defines the IoT device profile.</t>
    </abstract>
  </front>
  <middle>
    <?line 133?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="the-bot-ecosystem-gap">
        <name>The Bot Ecosystem Gap</name>
        <t>The internet's foundational infrastructure — HTTP, HTML, DNS, and search
engines — was designed with human actors as the primary consumers. Web pages
render visual layouts for human eyes. CAPTCHA systems explicitly discriminate
against non-human access. Discovery mechanisms such as search engines index
content for human-readable navigation.</t>
        <t>Autonomous agents — software programs that independently execute tasks,
consume APIs, and interact with external services without per-action human
instruction — are not recognized as legitimate, first-class internet
participants in this architecture. They are systematically treated as threats
to be filtered, blocked, or rate-limited.</t>
        <t>This situation is changing. The rapid growth of large language model-based
agents, robotic process automation, and programmatic service consumers means
that non-human actors now represent a significant and growing proportion of
internet traffic. As this proportion increases, internet service providers
will increasingly need to serve autonomous agents as a recognized user class
alongside humans.</t>
        <t>The API Index is premised on this trajectory: bots are becoming
first-class internet participants, and the infrastructure to support them —
starting with service discovery — does not yet exist. Regulators are
converging on the same direction: the EU AI Act (Article 50) requires
transparency and identity disclosure for AI systems that interact with
people, and NIST's Center for AI Standards and Innovation solicited public
input on securing AI agent systems in early 2026. APIX's verifiable trust
model is designed to meet these emerging compliance requirements by
construction.</t>
        <section anchor="motivation-a-concrete-origin">
          <name>Motivation: A Concrete Origin</name>
          <t>The API Index was not conceived in the abstract. It emerged from a
concrete practical failure.</t>
          <t>A buying bot was built for a private use case: monitoring online shops for
a specific product and purchasing it automatically the moment it became
available. This is a straightforward task for an autonomous agent — exactly
the kind of task agents are well-suited for.</t>
          <t>The bot failed, not because the task was technically complex, but because
the internet's infrastructure is actively hostile to it:</t>
          <t><strong>HTML-only product pages.</strong> Product availability, price, and purchase state
were encoded in HTML rendered for a human eye. No machine-readable API
existed. The bot had to parse HTML — fragile, maintenance-intensive, and
broken by every redesign.</t>
          <t><strong>Cloudflare Bot Management and equivalent shields.</strong> The majority of
commercial web services now sit behind bot mitigation infrastructure. Cloudflare
Bot Management, and equivalent products from Akamai, Imperva, and others,
are deployed specifically to detect and block non-human request patterns.
Repeated automated requests — even at modest frequency — trigger rate
limiting, CAPTCHA challenges, or silent blocking. A buying bot that polls
a product page to detect availability is treated identically to a malicious
scraper or a DDoS participant.</t>
          <t><strong>CAPTCHA payment barriers.</strong> Even when product pages were reachable, payment
flows required solving CAPTCHAs that explicitly excluded non-human actors.
The purchasing step — the final, necessary action — was deliberately made
inaccessible to the bot.</t>
          <t><strong>Proxy network pollution.</strong> To work around rate limits and bot detection,
the bot required a rotating proxy network — different IP addresses on each
request to disguise its automated origin. This is not a solution: it
pollutes internet traffic with avoidable requests, raises the cost of
operation, and contributes directly to the adversarial dynamic between
bots and infrastructure operators. Every proxy request is a wasted roundtrip
that a machine-readable API endpoint would have made unnecessary.</t>
          <t><strong>Polling as the only state-change mechanism.</strong> Because the bot had no way
to subscribe to product availability events, it had to poll the product page
continuously. This is architecturally wasteful: the bot consumes server
resources and network bandwidth to repeatedly ask a question whose answer
has not changed.</t>
          <t>These are not edge cases. They are the standard experience for any autonomous
agent attempting to consume a commercial internet service today. The buying
bot illustrates why the API Index is necessary: not as an academic
exercise, but as the infrastructure layer that makes autonomous agents
functional participants in the commercial internet.</t>
        </section>
        <section anchor="the-discovery-problem">
          <name>The Discovery Problem</name>
          <t>When an autonomous agent must fulfill a task that requires an external
service, it faces a fundamental discovery problem: how does it find services
that can fulfill its requirement?</t>
          <t>Current approaches are inadequate:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Hardcoded URLs</strong>: brittle, require human maintenance, do not adapt to
new or changed services.</t>
            </li>
            <li>
              <t><strong>LLM training data</strong>: stale, non-authoritative, not machine-verifiable.</t>
            </li>
            <li>
              <t><strong>Human-curated lists</strong>: do not scale, not machine-navigable, lack
structured metadata.</t>
            </li>
            <li>
              <t><strong>Web search</strong>: returns HTML documents designed for humans, not structured
service descriptions for agents.</t>
            </li>
          </ul>
          <t>What is needed is a machine-native equivalent of a search engine: a global,
always-current, structured index of services that autonomous agents can query
by capability, trust level, liveness, and other machine-relevant criteria.</t>
        </section>
        <section anchor="the-discovery-shift">
          <name>The Discovery Shift</name>
          <t>Every automated system that calls an external service today does so
because a human hardcoded that endpoint. The human is the discovery
layer — the automation executes instructions, it does not find
candidates independently.</t>
          <t>APIX addresses this gap at infrastructure level: a globally queryable
index of services that an agent can search by capability, trust level,
and liveness — without prior human configuration of the specific
endpoint. The agent discovers what exists; the human does not need to
enumerate it in advance.</t>
        </section>
        <section anchor="infrastructure-efficiency-and-the-overhead-of-human-facing-responses">
          <name>Infrastructure Efficiency and the Overhead of Human-Facing Responses</name>
          <t>When an autonomous agent retrieves data from a web service today, it typically
receives a response designed for a human browser: HTML markup, CSS stylesheets,
JavaScript bundles, embedded fonts, advertising payloads, and analytics tracking
instrumentation. The actual information content — an endpoint URL, a price, an
availability flag — may occupy two kilobytes. The page weight delivering that
content is routinely one to three megabytes.</t>
          <t>This is a 500- to 1500-fold payload multiplier that carries no value for a
machine consumer. It consumes bandwidth at the client, compute at the server,
transit capacity on the network, and — at the scale of the growing autonomous
agent population — represents a measurable and unnecessary energy expenditure.</t>
          <t>Machine-native APIs eliminate this overhead entirely. A structured JSON response
delivers exactly the information the agent requested and nothing else. The IETF
Datatracker provides a concrete illustration: the human-facing document page for
an Internet-Draft loads several hundred kilobytes of rendered HTML and supporting
assets; the equivalent information retrieved via the Datatracker REST API returns
in under one kilobyte of JSON. The data is identical. The difference is entirely
overhead serving a human rendering pipeline that a machine does not have.</t>
          <t>APIX addresses both the discovery gap and this efficiency gap together. By
providing infrastructure that indexes machine-native service endpoints, APIX
encourages Service Owners to expose structured, agent-consumable APIs alongside
or in place of human-facing interfaces. The aggregate effect, as autonomous agent
workloads scale, is a reduction in the payload overhead carried by bot traffic
across the internet as a whole. This is an explicit co-mission of APIX:
machine-native infrastructure is not only more functional for agents — it is more
efficient for the internet, and helps reduce humanity's environmental footprint
as much as possible.</t>
        </section>
        <section anchor="lessons-from-prior-art">
          <name>Lessons from Prior Art</name>
          <t>The APIX is not the first attempt at a global service registry. Prior efforts
must be understood explicitly so that their failure modes are not repeated.</t>
          <t><strong>UDDI (Universal Description, Discovery and Integration)</strong>
UDDI was a SOAP-era standard for a global service registry with the same
conceptual goal as APIX, published as an OASIS Committee Draft in October
2004. It failed for three reasons: (1) extreme complexity of the XML-based
data model; (2) no automatic verification — all data was self-asserted with
no crawling or validation; (3) no adoption incentive — there was no
commercial model to sustain registration or discovery. APIX addresses all
three directly: a simple JSON manifest, automated spider verification, and
a commercial tier model.</t>
          <t><strong>robots.txt (Robots Exclusion Protocol)</strong>
Machine-readable, but concerned with exclusion — telling crawlers what not
to access — not with discovery of capabilities. Per-domain only. Not a
registry.</t>
          <t><strong>MCP (Model Context Protocol)</strong>
Defines tool and capability descriptions for LLM-based agents. Excellent
for consumption once a server URL is known. Does not address the discovery
problem: there is no index of MCP servers. APIX is complementary to MCP —
it can index MCP servers as one supported spec type. As of December 2025,
MCP is governed by the Linux Foundation Agentic AI Foundation (<xref target="AAIF"/>),
under a vendor-neutral SEP (Specification Enhancement Proposal) process
that explicitly prevents single-company control — a governance philosophy
that directly aligns with APIX's own neutrality requirements.</t>
          <t><strong>Well-Known URIs (RFC 8615)</strong>
Per-domain machine-readable metadata at <tt>/.well-known/</tt>. Useful for
per-service metadata but requires the consumer to already know the domain.
No cross-service search or global index.</t>
          <t><strong>DNS</strong>
DNS resolves names to addresses but carries no capability semantics. It is
an architectural analogy for APIX's federation model, not a comparable system.</t>
        </section>
        <section anchor="related-ietf-and-w3c-work">
          <name>Related IETF and W3C Work</name>
          <t>As of April 2026, the number of Internet-Drafts working in adjacent areas
of agent/bot infrastructure has grown significantly. None addresses the same
problem as APIX. This section documents each and states the relationship
explicitly.</t>
          <t><strong>draft-pioli-agent-discovery (ARDP)</strong>
Proposes a federated agent registration and discovery protocol. Deliberately
decentralised — no global registry mandate, no central query URL. Relationship
to APIX: complementary. ARDP addresses agent-to-agent capability advertisement
within a federation. APIX addresses global, cross-organisation service
discovery from a neutral central index. ARDP's JWS-based signing of
registration payloads provides cryptographic non-repudiation of the manifest
content — a property APIX currently achieves through layered governance
verification (DNS ownership proof at O-1, Spider crawl, KYC pipeline). APM
manifest-level signing is a candidate extension for a future APIX revision,
and ARDP's signing model is the reference design for that work.</t>
          <t><strong>draft-narajala-courtney-ansv2 (ANS v2)</strong>
Anchors autonomous agent identities to DNS domain names with Registration
Authority verification. Focused on agent identity and trust anchoring, not
service capability discovery. ANS v2 builds on a peer-reviewed predecessor
published at IEEE ICAIC 2026, simplifying the name format to three components
(ans://v{version}.{agentHost}), introducing a dual-certificate model, and
replacing conceptual registry integrity with a cryptographic Transparency Log.
ANS v2 explicitly identifies the limitation of DNS-SD (<xref target="RFC6763"/>): DNS-SD
adds service discovery but cannot tell a client whether the agent at an
address is the one it claims to be. ANS v2 fills that identity gap.
Relationship to APIX: complementary. DNS-SD locates a service; ANS v2
verifies the identity of the agent at that address; APIX provides capability
search and multi-dimensional trust metadata across organisations. ANS v2
could serve as the identity layer for service operators registered in APIX.</t>
          <t><strong>draft-vandemeent-ains-discovery (AINS)</strong>
Agent discovery via signed, append-only replication logs. No central
authority. No commercial sustainability model. Relationship to APIX:
different philosophy. AINS prioritises decentralisation and cryptographic
verifiability. APIX prioritises a single authoritative global index with
a governed trust model.</t>
          <t>AINS defines a multi-channel verification model in which each verified
channel produces an independent evidence object. The principle is sound:
independent signals from multiple channels produce stronger identity
assurance than any single channel alone. AINS names DNS, HTTPS, and email
as verification channels — all of which are compatible with APIX's own
trust evidence model (DNS TXT record at O-1, HTTPS-reachable manifest
verified by the APIX Spider). AINS additionally names source code
repositories (e.g., GitHub) as a verification channel. APIX does not
adopt repository access as an evidence channel. For open-source projects
and developer platforms this channel is accessible and useful; however,
the majority of enterprise API services — financial institutions,
healthcare providers, manufacturers, and proprietary IoT backends —
maintain private repositories as protected intellectual property, often
under regulatory or contractual obligations that prohibit external access.
APIX's governance-based evidence channels (DNS, legal entity registration,
commercial contract, third-party audit) apply universally regardless of
whether a registrant's codebase is open-source or proprietary, and this
universality is a deliberate scope decision.</t>
          <t><strong>draft-aiendpoint-ai-discovery (AI Discovery Endpoint)</strong>
Defines <tt>/.well-known/ai</tt> as a per-host machine-readable capability document.
Per-domain only; not a global index. Relationship to APIX: directly
complementary. The APIX Spider SHOULD read <tt>/.well-known/ai</tt> when present
on a registered service's domain as an additional source of capability
metadata.</t>
          <t>This draft defines a flat category taxonomy for service classification:
"productivity", "ecommerce", "finance", "news", "weather", "maps",
"search", "data", "communication", "calendar", "storage", "media",
"health", "education", "travel", "food", "government", "developer".
The convergence with APIX's capability taxonomy is notable: <tt>search</tt>,
<tt>communication</tt>, <tt>storage</tt>, and <tt>media</tt> appear in both; <tt>ecommerce</tt> and
<tt>finance</tt> correspond directly to APIX's <tt>commerce</tt> and <tt>data.financial</tt>
terms. The two taxonomies differ in architecture — AI Discovery Endpoint
uses flat single-word labels optimised for human-readable classification;
APIX uses hierarchical dot-separated terms (<tt>commerce.marketplace</tt>,
<tt>data.financial</tt>) optimised for machine-queryable precision — but the
independent convergence on the same fundamental service categories
validates both approaches. Categories present in AI Discovery Endpoint
but not yet in APIX's v1.0 starter set (<tt>health</tt>, <tt>education</tt>,
<tt>government</tt>, <tt>travel</tt>, <tt>food</tt>, <tt>news</tt>, <tt>weather</tt>, <tt>maps</tt>, <tt>developer</tt>)
are candidates for future additions through the governing body's capability taxonomy
governance process (<xref target="APIX-SERVICES"/>).</t>
          <t><strong>draft-batum-aidre (AIDRE)</strong>
Defines <tt>/.well-known/ai-discovery</tt> as a per-origin discovery document.
Decentralised by design. Relationship to APIX: complementary. APIX provides
the global aggregation and trust verification layer that per-origin endpoints
cannot provide alone.</t>
          <t><strong>draft-cui-ai-agent-discovery-invocation</strong>
Specifies a metadata format for agent capabilities and a registry-based
discovery mechanism. Explicitly permits multiple coexisting registries; no
global authority defined.</t>
          <t>This draft introduces a notable split between two metadata fields:
<tt>capabilities</tt> (high-level descriptors of what the service does, e.g.,
<tt>["translation", "summarization"]</tt>) and <tt>tags</tt> (broader, orthogonal
properties such as domain, language support, or deployment model, e.g.,
<tt>["nlp", "chinese", "transformer_model", "cloud"]</tt>). The split recognises
that some service properties are functional capabilities while others are
orthogonal classifiers that do not fit a strict capability hierarchy.</t>
          <t>APIX takes a different approach. The hierarchical dot-separated capability
taxonomy (<tt>nlp.translation</tt>, <tt>commerce.marketplace</tt>) encodes both the
category and the specific capability in a single governed term, enabling
prefix-based machine queries (<tt>nlp.*</tt>) and registry-controlled vocabulary.
Orthogonal dimensions that draft-cui expresses as free-form tags are
handled in APIX through dedicated typed fields: <tt>language</tt> (BCP 47,
<xref target="RFC5646"/>) covers language support; deployment model is not yet represented
and is noted as a potential future gap. The APIX design trades the
flexibility of a free-form tag bag for machine-queryability and governance
— a tag field without a registry becomes a folksonomy that degrades search
precision at scale.</t>
          <t>This draft also identifies pricing information as a legitimate service
metadata concern — noting that if a service charges per use, agents need
this information at discovery time. The draft does not standardise a
pricing schema ("not standardized here but can be included as needed").
APIX adopts this observation and formalises it: the <tt>pricing</tt> field in
the APM schema (<xref target="APIX-SERVICES"/>) defines a governed <tt>model</tt> enum
(<tt>free</tt>, <tt>freemium</tt>, <tt>paid</tt>, <tt>enterprise</tt>, <tt>dynamic</tt>) and a
<tt>pricing_endpoint</tt> for real-time load-based price queries. The index
stores only the declared <tt>model</tt> and the endpoint reference; consuming
agents are responsible for querying the <tt>pricing_endpoint</tt> directly to
obtain and evaluate the current price before invocation.</t>
          <t>This draft also defines a Semantic Routing Platform (SRP): an optional
control-plane service that performs semantic matching, ranking, and
policy-based filtering of candidate agents before invocation, without
participating in task execution. The SRP pattern assumes a structured
candidate pool as its input. APIX is the natural data source for that
pool: an SRP would query APIX with structured filters to retrieve a
trusted, governed candidate set, then apply semantic ranking over that
set before presenting the shortlist to the invoking agent. The two
layers are complementary — APIX provides structured discovery and trust
metadata; the SRP provides semantic selection above that foundation.</t>
          <t>Relationship to APIX: partially overlapping problem space. The capability/tag
split, the pricing observation, and the SRP pattern are all concrete design
contributions; APIX's governed taxonomy, typed fields, and formalised pricing
schema address the same concerns through a more structured mechanism, and the
SRP architecture positions APIX as the structured input layer to semantic
selection rather than as a competitor to it.</t>
          <t><strong>draft-am-layered-ai-discovery-architecture</strong>
Proposes a conceptual two-layer architecture separating a Discovery
Transport Layer (DTL) from the metadata format carried over it. The DTL
is explicitly abstract: the draft names HTTP, pub/sub, multicast, and
MoQ as candidate substrates without specifying any of them normatively.
No wire format, no concrete protocol mechanisms, and no IANA actions are
defined.</t>
          <t>APIX resolves the transport question concretely and normatively: HTTPS
with TLS (<xref target="RFC8446"/>), JSON (<xref target="RFC8259"/>), and HATEOAS navigation over
a single stable entry point. This is a deliberate design position in
favour of implementability over substrate generality. Adding a DTL
abstraction layer atop APIX's concrete HTTP interface would introduce
indirection without communicative or interoperability benefit — the
transport is already specified, and no agent implementation benefits
from treating it as one option among many.</t>
          <t>Directly relevant to APIX is the draft's categorisation of discoverable
object types (agents, models, data resources, robots), which recognises
that different object categories require different metadata profiles.
This independently converges on the same architectural reasoning behind
APIX's decision to separate the Services Profile (<xref target="APIX-SERVICES"/>)
from the IoT Device Profile (<xref target="APIX-IOT"/>) rather than collapsing all
service types into a single flat schema.</t>
          <t>Relationship to APIX: categorisation framing is consistent with the
APIX profile split; the abstract DTL layer is not adopted.</t>
          <t><strong>draft-hood-agtp-discovery (AGTP ANS)</strong>
Defines an Agent Name Service (ANS) — a governed registry that resolves
capability queries into ranked lists of Agent Manifest Documents for
authenticated agents. ANS servers act as Scope-Enforcement Points,
applying trust score thresholds, trust tier requirements, and governance
zone constraints to each query. Cross-organisational discovery is
supported through peer ANS server federation (Section 5 of the draft).
The ANS is built as a layer on top of the AGTP transport protocol
(draft-hood-independent-agtp-02), which is treated as a pre-existing
substrate; the ANS defines a DISCOVER method as an AGTP Tier 1
operation.</t>
          <t>Relationship to APIX: overlapping problem space, different architectural
model. Both address cross-organisational service discovery with trust
metadata. AGTP ANS uses a federated model of peer ANS servers with
governance zone enforcement and mandatory agent authentication
(<tt>discovery:query</tt> authority-scope required). APIX uses a single
authoritative global index with a governed supply-side trust model and
open read access for consuming agents. The federated governance zone
model and the single-index governance model represent a genuine
architectural trade-off: federation distributes authority and avoids a
single point of control; a single index provides a globally consistent
view with a single contractual counterparty for service owners.</t>
          <t><strong>draft-mozley-aidiscovery (AI Agent Discovery Problem Statement)</strong>
Argues for a distributed, organisation-centric discovery model in which
each organisation independently publishes agent capabilities at a
well-known entry point. The draft explicitly opposes centralised
registries on two grounds: single points of failure limiting resilience,
and the competitive harm risk — stated directly as: "An adversarial
centralized directory is also able to stifle competitor advertisement
capabilities." The scope is cross-organisational; the draft addresses
public, multi-domain agent discovery, not only local or intra-organisation
scenarios.</t>
          <t>Relationship to APIX: this draft articulates the strongest
counter-position to APIX's architecture, and the adversarial directory
argument deserves a direct response. APIX addresses it structurally:
the neutrality requirements (Section 4.2), the prohibition on ranking
preferences and preferential treatment, the independent governance of
the standard from the commercial operation, and the mandatory open bulk
data download are specifically designed to make the adversarial scenario
impossible by construction. A directory operated under these constraints
cannot stifle competitor advertisement because it cannot discriminate
between registrants at the same commercial tier.</t>
          <t>The distributed model's remaining gap, which APIX addresses, is the
zero-prior-knowledge case: an agent that has no prior relationship with
any service provider needs a single starting point from which to
discover unknown third parties. An organisation-centric model requires
the discovering agent to already know which organisations to query —
which presupposes the discovery problem is already solved.</t>
          <t><strong>draft-mozleywilliams-dnsop-dnsaid (DNS for AI Discovery)</strong>
Proposes DNS-AID: using SVCB records to publish agent service endpoints.
Relationship to APIX: complementary at the infrastructure layer. The
distinction across the three systems is precise: DNS-AID tells a client
where to connect; ANS v2 (<xref target="I-D.narajala-courtney-ansv2"/>) tells it whether
to trust the agent at that address; APIX tells it what to connect to and why
— capability search, multi-dimensional trust metadata, and liveness
verification across the global service landscape.</t>
          <t><strong>draft-meunier-webbotauth-registry (webbotauth)</strong>
Defines a JSON-based "Signature Agent Card" format for bot authentication.
Focused on bot identity — how a bot proves who it is to a service. Related
to the active webbotauth IETF Working Group. Relationship to APIX: orthogonal
but complementary. webbotauth addresses bot consumer identity; APIX addresses
service provider discovery.</t>
          <t><strong>I-D.ietf-scitt-architecture (SCITT)</strong>
Defines an append-only transparency service for supply chain integrity,
transparency, and trust. An IETF WG specification
(<xref target="I-D.ietf-scitt-architecture"/>). SCITT provides a
tamper-evident, auditable ledger model where statements about artefacts are
registered and independently verifiable. Relationship to APIX: architectural
reference. APIX's audit trail for organisation trust level progressions, LER
submissions (<xref target="APIX-IOT"/>), and sanctions screening events follows the same
append-only, non-repudiable model that SCITT formalises. ANS v2
(<xref target="I-D.narajala-courtney-ansv2"/>) bases its Transparency Log on SCITT. A
future revision of APIX MAY adopt SCITT-compliant transparency log semantics
for its governance audit trail.</t>
          <t><strong>Google Cloud Fraud Defense</strong>
A commercial trust platform for the agentic web announced at Google Cloud
Next '26 (April 2026), positioned as the next evolution of reCAPTCHA. Fraud
Defense explicitly integrates with the webbotauth IETF Working Group and
SPIFFE for agent and workload identity classification. Relationship to APIX:
complementary at adjacent layers. Fraud Defense operates at the consumption
layer — it verifies and classifies agent traffic arriving at a service
endpoint. APIX operates at the discovery layer — it provides the service
index, trust metadata, and capability taxonomy that agents use to locate
services before interacting with them. The two systems are not competitive;
a Fraud Defense policy engine can consume APIX trust signals (O-level,
S-level) as inputs to its risk scoring.</t>
          <t><strong>SPIFFE (Secure Production Identity Framework For Everyone)</strong>
A CNCF open standard for workload identity attestation. Provides
cryptographically verifiable identities (SVIDs) to software workloads in
dynamic infrastructure. Referenced as an integration target by Google Cloud
Fraud Defense alongside webbotauth. Relationship to APIX: complementary at
the identity layer. SPIFFE addresses machine/workload identity; APIX
addresses service and device discovery with human-governed trust levels. A
SPIFFE SVID could serve as a technical credential for an agent whose
operator is registered in APIX at O-2 or above.</t>
          <t><strong>W3C AI Agent Protocol Community Group</strong>
Proposed May 2025, targeting agent interoperability protocols. Pre-specification
as of this writing. Relationship to APIX: APIX will monitor this group's
outputs and align the APM capability taxonomy with any vocabulary standardised
by the W3C CG where applicable.</t>
          <t><strong>Agent2Agent Protocol (A2A)</strong>
Defines a secure communication protocol for agent-to-agent interaction
across frameworks <xref target="A2A"/>. Originated at Google (April 2025), transferred to the
Linux Foundation Agentic AI Foundation (<xref target="AAIF"/>) in June 2025; as of early
2026 it has 150+ supporting organisations and is in production use.
Relationship to APIX: directly complementary. A2A addresses how agents
communicate once they have located each other. APIX addresses how agents
locate each other in the first place. An agent that uses APIX for
discovery and A2A for subsequent communication is using both systems for
their intended purpose with no overlap.</t>
          <t><strong>AGNTCY (Open Agent Schema Framework)</strong>
A multi-component open infrastructure project for multi-agent systems <xref target="AGNTCY"/>,
originating at Cisco and transferred to the Linux Foundation (<xref target="AAIF"/>) in
July 2025. As of early 2026 it has 65+ supporting organisations and is
in production use for CI/CD, IT automation, and telecommunications.
AGNTCY comprises four components: the Open Agent Schema Framework (OASF)
for capability discovery, cryptographic identity, SLIM messaging, and
end-to-end observability. AGNTCY is governed under the Linux Foundation
AAIF mandate of no single-company control.</t>
          <t>Relationship to APIX: the governance philosophies are aligned; the
architectural scope is different. OASF defines a capability schema
format — analogous to OpenAPI for agent capabilities — for registering
and advertising what an agent can do. APIX is a globally queryable index
infrastructure: a single authoritative entry point where agents discover
unknown third-party services by capability, with commercial sustainability,
verified trust metadata, and structured search. OASF and APIX are
complementary: OASF provides the schema language; APIX provides the
global index that can be populated with OASF-described services. An
AGNTCY-registered agent is a candidate APIX registrant. The principal
architectural difference is scope: AGNTCY is optimised for
intra-platform and intra-organisation agent coordination; APIX is
designed for cross-organisation, cross-border, zero-prior-knowledge
discovery of agent-consumable services and IoT device classes. The two systems address different
points in the discovery spectrum and are not substitutes for each other.</t>
          <t><strong>draft-drake-agent-identity-registry (Agent Identity Registry)</strong>
Defines a federated registry architecture for persistent, hardware-anchored
agent identities. Introduces a three-tier model: Agent Identity Authority
(AIA) as a governance body, Registry Operators as authoritative identity
databases, and Registrars for hardware attestation and OIDC token
issuance. The AIA is explicitly required to be constituted as a
multi-stakeholder body — the draft states directly that "single-entity
control would undermine the federated design" (<xref target="I-D.drake-agent-identity-registry"/>).</t>
          <t>Relationship to APIX: this draft provides the strongest independent
validation of APIX's core governance premise. Two separate specifications,
developed independently, arrive at the same structural requirement: that
foundational agent infrastructure must be governed by a multi-stakeholder
body, not controlled by a single entity. The functional domains are
complementary rather than overlapping — draft-drake addresses agent
identity (who is this agent, which hardware backs its credential); APIX
addresses service discovery (what services exist, what can they do, are
they trustworthy). An agent whose identity is established under
draft-drake's AIA model is a well-suited candidate to consume and
register services in APIX.</t>
          <t><strong>Linux Foundation Agentic AI Foundation (AAIF)</strong>
Formed December 2025 with founding contributions from Anthropic (MCP),
OpenAI (AGENTS.md), and Block (goose); additional members include AWS,
Bloomberg, Cloudflare, Google, Cisco, Dell, Oracle, and Red Hat. The
AAIF's explicit founding mandate is to ensure "no single company controls
the direction of foundational infrastructure" (<xref target="AAIF"/>), implemented
through a vendor-neutral directed fund structure and per-project
Specification Enhancement Proposal (SEP) processes modelled on Kubernetes's
KEP governance.</t>
          <t>Relationship to APIX: the AAIF's governance mandate independently
validates APIX's constitutional neutrality requirements. APIX predates
the AAIF as an IETF submission and implements the same principle — no
single commercial interest may control the standard or its operation —
through a different structural mechanism: a Swiss Stiftung with a
supply-side commercial model that funds operations without creating
discovery-layer incentives to favour any registrant. The AAIF governs
communication and invocation protocols (MCP, A2A); APIX governs the
discovery index. These are adjacent, non-overlapping layers of the same
infrastructure stack.</t>
          <t><strong>Positioning</strong>
The agent infrastructure space has consolidated significantly in 2025-2026.
At the protocol layer, the Linux Foundation AAIF has emerged as the
primary governance body for communication and invocation standards (MCP,
A2A), with 150+ supporting organisations and active production deployment.
At the IETF, over a dozen individual drafts address agent discovery and
identity from different architectural starting points; none has reached
Working Group consensus.</t>
          <t>APIX occupies a distinct position in this landscape: it is the only
specification in the IETF space that makes governance the primary
architectural requirement, and the only proposal for a globally
queryable, commercially sustainable, neutral discovery index. The dominant
IETF tendency toward decentralisation addresses legitimate concerns about
single points of control; APIX answers those concerns structurally, through
its neutrality mandates, open bulk data requirements, and separation of
standard governance from commercial operation — rather than by abandoning
the global index model that those concerns are directed at.</t>
          <t>APIX is designed to compose with, not replace, the adjacent standards:
APIX provides the discovery layer that MCP, A2A, and AGNTCY do not
provide; draft-drake provides the identity layer that APIX delegates to
external identity infrastructure; the webbotauth Working Group provides
the bot authentication layer that APIX references as a trust signal.
Each standard goes deep in its own sub-problem; APIX depends on that
depth rather than duplicating it.</t>
        </section>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>
        <t>All API responses MUST be encoded as UTF-8 as mandated by <xref target="RFC8259"/>
Section 8.1. All string fields in APM documents and Index API responses
MUST contain valid UTF-8. HTTP status codes used throughout this
specification are defined in <xref target="RFC9110"/>.</t>
        <t><strong>Agent</strong>
An autonomous software program that executes complex, goal-directed
tasks by consuming external services, without per-action human
instruction. Agents may use LLM-backed or programmatic orchestration
logic. The primary consumer class targeted by the APIX Index API.</t>
        <t><strong>Bot</strong>
An autonomous software program that executes deterministic, rule-based
internet tasks: web crawling, API polling, automated messaging, without
per-action human instruction. Behavior is scripted rather than
goal-directed. The APIX Spider is itself a bot.</t>
        <t><strong>Connected Device</strong>
A physical or embedded hardware unit with network connectivity that
exposes services or sensor data via the APIX Presence Protocol.
Registered as a Device Class and tracked as a Device Instance as
defined in <xref target="APIX-IOT"/>. Distinct from Agent and Bot in that the
principal is hardware, not software.</t>
        <t><strong>Service</strong>
A machine-consumable API or connected device class offered by an organisation,
registered in the APIX, and described by an APIX Manifest. The term covers
both web API services (<xref target="APIX-SERVICES"/>) and IoT device services (<xref target="APIX-IOT"/>).</t>
        <t><strong>Service Owner</strong>
The organisation responsible for registering, maintaining, and operating a
Service in the APIX.</t>
        <t><strong>APIX Manifest (APM)</strong>
The structured metadata document that describes a Service to the APIX,
including its technical specification reference, capability taxonomy,
trust metadata, and commercial terms. Profile documents define the
additional fields applicable to each service type.</t>
        <t><strong>Governing Body</strong>
The neutral, non-profit entity that operates the APIX, maintains its
registries, accredits Regional Representatives and Verifiers, and ensures
the governance and operational requirements defined in this specification
are met. Any entity that satisfies those requirements MAY fulfil this role.</t>
        <t><strong>API Index (APIX)</strong>
The global, centralised index of registered Services, operated by the
governing body and queryable by autonomous agents via the Index API.</t>
        <t><strong>Index API</strong>
The HATEOAS-compliant HTTP API exposed by the APIX for agent discovery and
navigation.</t>
        <t><strong>Accredited Verifier</strong>
A trusted third-party organisation, accredited by the governing body,
that performs human-intensive trust verification at Organisation levels O-4
and O-5.</t>
        <t><strong>Accredited Regional Representative</strong>
An organisation accredited by the governing body to operate
commercial onboarding, contracting, and customer relationships within a
defined geographic jurisdiction, under the governing body's
standard and governance.</t>
        <t><strong>Trust Policy</strong>
A set of minimum trust requirements expressed by a consuming agent that a
Service must satisfy before the agent will use it.</t>
        <t><strong>Liveness</strong>
The confirmed operational status and response availability of a Service,
as measured by automated means at a frequency determined by the Service's
commercial tier. The specific liveness mechanism differs by service type:
Spider health checks for web API services; presence signals for IoT device
services.</t>
        <t><strong>Tier</strong>
A commercial subscription level that determines a Service's visibility in
the APIX, liveness check frequency, and API query rate allocation.</t>
      </section>
      <section anchor="design-goals">
        <name>Design Goals</name>
        <section anchor="requirements-must">
          <name>Requirements (MUST)</name>
          <ul spacing="normal">
            <li>
              <t>The APIX MUST be queryable by autonomous agents via a stable, globally
accessible URL without prior knowledge of any specific service.</t>
            </li>
            <li>
              <t>The Index API MUST follow HATEOAS principles: agents MUST be able to
navigate the full index starting from a single entry-point URL.</t>
            </li>
            <li>
              <t>Every Service record MUST expose machine-readable trust metadata across
all three trust dimensions (Organisation, Service, Liveness).</t>
            </li>
            <li>
              <t>Service registration MUST be human-initiated. The registrant MUST agree to
the index operator's Terms of Service before any service record is activated.
For O-0 and O-1, self-service portal registration with accepted Terms of
Service satisfies this requirement. For O-2 and above, registration MUST
additionally involve a formal B2B contractual relationship between the Service
Owner and the index operator or its Accredited Regional Representative.</t>
            </li>
            <li>
              <t>The APIX MUST expose trust metadata as verifiable facts, not as
recommendations. Trust decisions MUST remain with the consuming agent.</t>
            </li>
            <li>
              <t>The APIX Manifest (APM) MUST be format-agnostic: it MUST support
referencing multiple service types via an extensible type registry.</t>
            </li>
            <li>
              <t>The APIX MUST be operated as a neutral, non-profit infrastructure under
the governance of the governing body.</t>
            </li>
          </ul>
        </section>
        <section anchor="goals-should">
          <name>Goals (SHOULD)</name>
          <ul spacing="normal">
            <li>
              <t>The Index API SHOULD support full-text and structured search by capability,
category, organisation trust level, service verification level, liveness
freshness, and protocol type.</t>
            </li>
            <li>
              <t>The APIX SHOULD provide SDKs in common agent development languages to
lower the integration barrier for consuming agents.</t>
            </li>
            <li>
              <t>The APIX SHOULD support a federated accredited verifier model so that
Organisation trust levels O-4 and O-5 can be verified at scale without
centralising all human review in the governing body.</t>
            </li>
            <li>
              <t>Accredited Regional Representatives SHOULD be established in major
jurisdictions to allow Service Owners to contract in their local language
and legal framework.</t>
            </li>
            <li>
              <t>The APIX SHOULD publish a public transparency report at least annually,
disclosing the number of registered services by tier and trust level,
coverage statistics, and verifier accreditation status.</t>
            </li>
            <li>
              <t>The APIX SHOULD, through its verification model and tier structure,
incentivise Service Owners to expose structured, machine-consumable API
endpoints rather than requiring agents to adapt to human-facing HTML
interfaces. Eliminating rendering, styling, and advertising overhead from
machine-to-machine communication is an explicit efficiency objective of
this infrastructure.</t>
            </li>
          </ul>
        </section>
        <section anchor="out-of-scope">
          <name>Out of Scope</name>
          <t>The following are explicitly not addressed by this document.
Items marked MUST NOT are normative constraints on conforming
implementations; remaining items are editorial scope boundaries.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Bot identity and authentication</strong>: how a bot proves its own identity to
a service it consumes. This is addressed by complementary work such as
draft-meunier-webbotauth-registry. This document takes no position on
bot identity mechanisms.</t>
            </li>
            <li>
              <t><strong>Bot rights and legal personhood</strong>: outside the scope of a technical
infrastructure standard.</t>
            </li>
            <li>
              <t><strong>Service execution</strong>: a conforming APIX implementation MUST NOT proxy,
mediate, or execute service calls on behalf of consuming agents. The APIX
is a discovery layer only; all service interactions occur directly between
the consuming agent and the Service Owner's infrastructure.</t>
            </li>
            <li>
              <t><strong>Content indexing</strong>: a conforming APIX implementation MUST NOT index
service response content. The APIX indexes service metadata — capability
declarations, trust levels, liveness signals — not the data that services
return when called.</t>
            </li>
            <li>
              <t><strong>Mandatory consumer registration</strong>: a conforming APIX implementation
MUST NOT require consuming agents to register or identify themselves as
a condition of performing discovery queries (see Section 9.2).</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="architecture-overview">
        <name>Architecture Overview</name>
        <section anchor="component-model">
          <name>Component Model</name>
          <artwork><![CDATA[
  +----------------------------------------------------------+
  |                   the governing body                     |
  |             (Swiss Stiftung -- neutral, non-profit)      |
  |  Owns: APIX standard, Index infrastructure, APM format   |
  |  Accredits: Regional Representatives, Verifiers          |
  +---------------------+------------------------------------+
                        |
        +---------------+-------------------+
        |               |                   |
  +-----+------+  +-----+--------+  +-------+---------+
  |   Index    |  | Verification |  |  Registration   |
  |   API      |  | Component    |  |    Portal       |
  | (HATEOAS)  |  |(type-specific|  |  (B2B / human)  |
  +-----+------+  +-----+--------+  +-------+---------+
        |               |                   |
        |         +-----+------+            |
        |         |  Service   |            |
        +-------->|  Record    |<-----------+
                  |  Store     |
                  +------------+
        ^                              ^
        |                              |
  +-----+------+              +--------+-----------+
  |  Consuming |              |   Service Owner    |
  |    Agent   |              |  (+ Accredited     |
  |    (Bot)   |              |  Regional Rep)     |
  +------------+              +--------------------+
]]></artwork>
          <t>This document uses the generic terms "governing body" and "index
operator" in all normative requirements. These terms are intentionally
role-based: any entity that satisfies the governance, neutrality, and
operational requirements defined in this specification MAY fulfil them.
The reference implementation of these roles is described in the
non-normative appendix "Reference Implementation" at the end of this
document.</t>
          <t><strong>Flow:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>A Service Owner (or their Accredited Regional Representative) creates
an Organisation Account in the APIX Registration Portal, providing
company details and agreeing to a commercial contract.</t>
            </li>
            <li>
              <t>The Registration Portal creates a draft Service Record and triggers
profile-appropriate verification (Spider crawl for web API services;
manufacturer provisioning for IoT device classes).</t>
            </li>
            <li>
              <t>The verification component updates the Service Record with verified
technical metadata.</t>
            </li>
            <li>
              <t>The Service Record becomes queryable via the Index API.</t>
            </li>
            <li>
              <t>A consuming agent queries the Index API from the single entry-point URL,
navigates by HATEOAS links, applies its Trust Policy, and selects
services that satisfy its requirements.</t>
            </li>
            <li>
              <t>Verification rechecks services on the schedule defined by each service's
liveness monitoring configuration.</t>
            </li>
          </ol>
        </section>
        <section anchor="governance-model">
          <name>Governance Model</name>
          <t>The APIX MUST be operated by a <strong>neutral governing body</strong> that satisfies the
following normative requirements. These requirements apply to any conforming
APIX implementation; the specific legal form of the governing body is an
implementation choice.</t>
          <t><strong>Neutrality requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST have no commercial interest in preferring any
registrant's services over another in index results or liveness scheduling.</t>
            </li>
            <li>
              <t>The governing body MUST NOT offer exclusive discovery advantages, ranking
preferences, or prioritised verification treatment to any registrant
regardless of commercial relationship.</t>
            </li>
            <li>
              <t>Governance of the APIX standard and APM specification MUST be separated
from operation of the commercial index. A single entity may not
simultaneously control standard evolution and derive commercial benefit
from preferential application of that standard.</t>
            </li>
          </ul>
          <t><strong>Operational requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST accredit Regional Representatives who may handle
service onboarding in specific jurisdictions. Regional Representatives
operate under licence from the governing body; the index itself remains
a single global store.</t>
            </li>
            <li>
              <t>The governing body MUST accredit Verifiers who perform Organisation trust
assessments at O-4 and O-5. Accredited Verifiers are structurally
analogous to Certificate Authorities in the TLS ecosystem.</t>
            </li>
            <li>
              <t>The governing body MUST maintain the capability taxonomy and publish all
versions of the APM specification and Index API specification as open
standards under a permissive licence.</t>
            </li>
            <li>
              <t>The governing body MUST perform sanctions screening on service registrants
(see Section 8).</t>
            </li>
          </ul>
          <t><strong>Openness requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The full index MUST be made available as a freely downloadable bulk dataset
on the first day of each calendar month, under the Open Database Licence
(ODbL) 1.0. No entity, including the governing body, may hold an exclusive
lock on the index data.</t>
            </li>
            <li>
              <t>Incremental diff files MUST be published daily, each covering all record
additions, updates, and deletions since the previous day's snapshot. A
downstream consumer MUST be able to reach current index state by applying
the monthly full snapshot and the sequence of daily diffs since that
snapshot, without downloading any additional full snapshots.</t>
            </li>
            <li>
              <t>Discovery queries to the Index API MUST be available without authentication
or payment (subject to rate limits; see Section 9.2).</t>
            </li>
          </ul>
          <section anchor="global-participation">
            <name>Global Participation</name>
            <t>A conforming APIX implementation SHOULD establish mechanisms to ensure
global representation in the capability taxonomy, including service categories
relevant to underrepresented regions. Where regional institutional partners
are willing to co-sponsor regional participation, the governing body SHOULD
establish formal co-sponsorship relationships and associated governance
representation for those regions.</t>
            <t>Regional verification nodes are RECOMMENDED in regions with significant
service registrant populations to eliminate intercontinental latency in
liveness verification.</t>
          </section>
        </section>
        <section anchor="standard-registries">
          <name>Standard Registries</name>
          <t>The APIX standard maintains normative registries of enumerated values.
Registries are authoritative lists of valid values for specific APM and
Index API fields. Using values not present in the relevant registry is
a protocol violation.</t>
          <t><strong>Registry location:</strong> Registries are published as live JSON endpoints at
<tt>apix.example.org/registry/</tt> and are updated independently of the RFC
revision cycle. The RFC defines the registry structure and lifecycle
rules; the live endpoints are the authoritative source of current values.</t>
          <dl>
            <dt><tt>protocols</tt></dt>
            <dd>
              <t>Protocol type registry.
Endpoint: <tt>apix.example.org/registry/protocols</tt>.
APM field: <tt>spec.type</tt>.</t>
            </dd>
            <dt><tt>capabilities</tt></dt>
            <dd>
              <t>Capability taxonomy registry.
Endpoint: <tt>apix.example.org/registry/capabilities</tt>.
APM field: <tt>capabilities[]</tt>.</t>
            </dd>
            <dt><tt>notification-channels</tt></dt>
            <dd>
              <t>Notification channel type registry.
Endpoint: <tt>apix.example.org/registry/notification-channels</tt>.
APM field: <tt>notifications.channels[].type</tt>.</t>
            </dd>
            <dt><tt>presence-modes</tt></dt>
            <dd>
              <t>Presence mode registry.
Endpoint: <tt>apix.example.org/registry/presence-modes</tt>.
APM field: <tt>spec.presence_mode</tt> (device classes).</t>
            </dd>
            <dt><tt>delegation-scopes</tt></dt>
            <dd>
              <t>Device delegation scope registry.
Endpoint: <tt>apix.example.org/registry/delegation-scopes</tt>.
APM field: <tt>scopes[]</tt> in delegation grant requests (device classes).</t>
            </dd>
          </dl>
          <t>Initial values for each registry are defined in the applicable profile
document: <xref target="APIX-SERVICES"/> for protocol types and capability taxonomy;
<xref target="APIX-IOT"/> for presence modes, delegation scopes, and IoT capability
terms.</t>
          <t><strong>Registry entry lifecycle:</strong></t>
          <t>Each registry entry transitions through three phases. The <tt>standard_warnings</tt>
flag in a Service Record does not appear until the grace period has elapsed —
service operators have a silent window to update their APM before any public
signal is issued.</t>
          <artwork><![CDATA[
active  ->  deprecated (announced)
              |
              +-- [grace period: 90 days min]
              |     silent: operator notified, no public flag
              |
              +-- [warning period: remainder of deprecation window]
              |     standard_warnings visible in Service Record
              |
              +-- sunset
                    new registrations rejected; flagged non-compliant
]]></artwork>
          <table>
            <thead>
              <tr>
                <th align="left">Phase</th>
                <th align="left">Status</th>
                <th align="left">standard_warnings</th>
                <th align="left">New regs.</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Normal use</td>
                <td align="left">
                  <tt>active</tt></td>
                <td align="left">No</td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Grace period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>No</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Warning period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>Yes</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Sunset</td>
                <td align="left">
                  <tt>sunset</tt></td>
                <td align="left">Yes (non-compliant)</td>
                <td align="left">
                  <strong>Rejected</strong></td>
              </tr>
            </tbody>
          </table>
          <t><strong>Deprecation rules:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST publish a <tt>deprecated_in_version</tt>, <tt>sunset_date</tt>,
<tt>grace_period_ends</tt>, and <tt>replacement</tt> value when deprecating any registry
entry.</t>
            </li>
            <li>
              <t>The minimum total deprecation window (announcement to sunset) is
<strong>12 months</strong>. The governing body MAY extend this window but MUST NOT
shorten it.</t>
            </li>
            <li>
              <t>The minimum grace period is <strong>90 days</strong> from the deprecation announcement.
During the grace period, <tt>standard_warnings</tt> MUST NOT be set on any Service
Record, regardless of whether the service uses the deprecated value.</t>
            </li>
            <li>
              <t>The governing body MUST notify all registered Service Owners whose services
use the deprecated value before the grace period begins. Notification MUST
include the <tt>grace_period_ends</tt> date, the <tt>sunset_date</tt>, and the
<tt>replacement</tt> value.</t>
            </li>
            <li>
              <t>After the grace period, the index operator MUST set <tt>standard_warnings</tt> on
Service Records that still use the deprecated value.</t>
            </li>
            <li>
              <t>At <tt>sunset</tt>, the index operator MUST reject new APM submissions using the
sunsetted value and MUST escalate existing Service Records from
<tt>standard_warnings</tt> to a <tt>non_compliant</tt> status flag.</t>
            </li>
          </ul>
          <t><strong>Registry versioning:</strong> each registry is independently versioned. The Index
root resource (Section 10.2) exposes the current version of each registry so
consuming agents may detect changes.</t>
        </section>
      </section>
      <section anchor="lawful-cooperation-and-non-surveillance-commitment">
        <name>Lawful Cooperation and Non-Surveillance Commitment</name>
        <section anchor="purpose-of-the-service">
          <name>Purpose of the Service</name>
          <t>APIX is infrastructure designed for one purpose: enabling autonomous agents
and the organisations that deploy them to discover legitimate services and
operate productively in the commercial internet. Registration in the APIX
is a declaration that a service or device class is offered in good faith for
legitimate use. The APIX is not a neutral medium indifferent to the purposes
for which it is used. It is infrastructure built for legitimate use, and
it is by design closed to actors who are refused or removed under the
compliance mechanisms defined in this specification — sanctions screening,
KYC verification, and judicial enforcement through the LER process.</t>
          <t>This is not a policy statement. It is the foundational design constraint
from which the cooperation mechanisms in this document and in <xref target="APIX-IOT"/>
derive their legitimacy.</t>
        </section>
        <section anchor="cooperation-duty">
          <name>Cooperation Duty</name>
          <t>Because APIX provides infrastructure for legitimate use, it has a duty to
cooperate with properly authorised law enforcement when that infrastructure
is misused. This duty is not conditional on commercial convenience or
reputational risk. When a registrant or device fleet is confirmed to be
operating criminally, APIX MUST act — through the mechanisms defined in
this document and in <xref target="APIX-IOT"/> — to limit the harm that flows from that
misuse.</t>
          <t>APIX MUST cooperate with authorised law enforcement requests that satisfy
the jurisdictional and judicial requirements defined in <xref target="APIX-IOT"/>
Section 5.8. Refusal to cooperate with a validly authorised request is not
permitted. Delay beyond the processing time commitments defined in that
section requires documented justification and MUST be reported in the
governing body's annual transparency report.</t>
        </section>
        <section anchor="non-surveillance-commitment">
          <name>Non-Surveillance Commitment</name>
          <t>APIX is not a surveillance instrument. The cooperation mechanisms in this
specification are reactive and bounded. The following prohibitions are
normative and apply to all conforming implementations:</t>
          <ul spacing="normal">
            <li>
              <t>APIX MUST NOT proactively monitor, profile, or analyse the behaviour of
registered services, device fleets, or consuming agents beyond what is
technically necessary to deliver liveness verification and abuse detection
as defined in this specification.</t>
            </li>
            <li>
              <t>APIX MUST NOT share index data, presence signal logs, device instance
records, or consuming agent query patterns with any law enforcement or
government authority except through the Law Enforcement Request process
defined in <xref target="APIX-IOT"/> Section 9.8, with its associated judicial
authorisation requirements and jurisdictional constraints.</t>
            </li>
            <li>
              <t>Bulk data requests — requests that are not targeted at identified specific
devices, instances, or registrants but instead seek aggregate ecosystem
intelligence — MUST be refused regardless of the requesting authority's
jurisdiction or claimed legal basis. A valid LER MUST identify specific
device IP addresses or registrant identifiers. A request for "all devices
in region X" or "all services in category Y" is not a valid LER.</t>
            </li>
            <li>
              <t>APIX MUST NOT establish any data-sharing arrangement, standing access
grant, or automated feed to any law enforcement or intelligence agency.
Every cooperation action is event-triggered, scoped to a specific
identified case, and subject to the judicial authorisation requirement.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-trigger-requirement">
          <name>The Trigger Requirement</name>
          <t>Enhanced monitoring, graduated response actions, and LER processing are
ALWAYS triggered by one of two conditions:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>External identification</strong>: a legitimate authority in an accepted
jurisdiction has submitted an LER with valid judicial authorisation
identifying specific devices or registrants as confirmed participants
in criminal activity. Suspicion alone is not sufficient. The judicial
authorisation requirement is the gatekeeping mechanism.</t>
            </li>
            <li>
              <t><strong>Technical anomaly detection</strong>: APIX's own infrastructure detects
signal patterns technically inconsistent with legitimate device operation
— such as rapid mass re-registration from a single IP address, heartbeat
flooding at rates outside any plausible device density, or token reuse
patterns that cannot arise from legitimate manufacture and provisioning.
Such detections result in classification at the <tt>observe</tt> tier of the
Bad-Bot Graduated Response (<xref target="APIX-IOT"/> Section 9.9), not in immediate
blocking. They are recorded, monitored, and shared with authorised law
enforcement on request through the LER process. They do not trigger
autonomous enforcement action by APIX.</t>
            </li>
          </ol>
          <t>Speculative profiling — building behavioural models of registered services
or device fleets in the absence of a trigger — is prohibited under the
Non-Surveillance Commitment above.</t>
        </section>
        <section anchor="jurisdictional-guardrails">
          <name>Jurisdictional Guardrails</name>
          <t>All cooperation is bounded by the accepted jurisdictions framework defined
in <xref target="APIX-IOT"/> Section 9.8. This boundary is not negotiable on a
case-by-case basis. APIX MUST NOT cooperate with a law enforcement request
from a jurisdiction not on the Accepted Jurisdiction Whitelist, even when:</t>
          <ul spacing="normal">
            <li>
              <t>The requesting authority presents a compelling case.</t>
            </li>
            <li>
              <t>The alleged criminal activity is severe.</t>
            </li>
            <li>
              <t>Political, commercial, or reputational pressure is applied.</t>
            </li>
            <li>
              <t>Another accepted-jurisdiction authority vouches for the request.</t>
            </li>
          </ul>
          <t>The Accepted Jurisdiction Whitelist exists precisely to make this boundary
resist pressure. The governing body MAY add jurisdictions to the whitelist
through its defined board decision process; it MUST NOT bypass the whitelist
for individual cases. Any governing body action that grants cooperation
outside the whitelist is a specification violation and MUST be reported in
the transparency report.</t>
        </section>
        <section anchor="transparency-as-enforcement">
          <name>Transparency as Enforcement</name>
          <t>The annual transparency report required by Section 4.2 is not merely
informational. It is the mechanism by which the non-surveillance commitment
and the jurisdictional guardrails are held accountable. The governing body
MUST disclose in that report:</t>
          <ul spacing="normal">
            <li>
              <t>The number of LER requests received, accepted, and refused, by requesting
jurisdiction tier.</t>
            </li>
            <li>
              <t>The number of bulk data requests received and refused.</t>
            </li>
            <li>
              <t>Any case in which cooperation outside the accepted jurisdictions framework
was requested, with the governing body's response.</t>
            </li>
            <li>
              <t>Any case in which APIX's own technical anomaly detection was used as the
basis for a law enforcement referral.</t>
            </li>
            <li>
              <t>The total number of device instances, services, and organisations subject
to active suppression, suspension, or graduated response measures at the
reporting date.</t>
            </li>
          </ul>
          <t>If a governing body fails to publish this report within 90 days of the
close of a calendar year, any member of the governing body board MUST be
empowered to publish it unilaterally. The right to publish the transparency
report MUST NOT be waivable by board resolution.</t>
        </section>
      </section>
      <section anchor="the-apix-manifest-apm">
        <name>The APIX Manifest (APM)</name>
        <section anchor="purpose">
          <name>Purpose</name>
          <t>The APIX Manifest is the structured document that a Service Owner provides
at registration. It is the index-facing contract for a Service:
format-agnostic, extensible, and designed for machine consumption.</t>
          <t>The APM has two layers:</t>
          <t><strong>Base fields</strong> — defined in this document and required for all service types:
<tt>apm_version</tt>, <tt>service_id</tt>, <tt>name</tt>, <tt>description</tt>, <tt>owner</tt> (with
<tt>organisation_name</tt>, <tt>jurisdiction</tt>, <tt>registration_number</tt>, <tt>contacts</tt>),
<tt>capabilities</tt>, <tt>trust</tt> (organisation and service level assignments), and
<tt>legal</tt>. These fields are common to all profiles.</t>
          <t><tt>lifecycle_stage</tt> is required for all service types but its valid values
and transition rules are profile-defined. Each profile owns its own
lifecycle model; the field is not a shared enum. See <xref target="APIX-SERVICES"/> and
<xref target="APIX-IOT"/> for the lifecycle models applicable to each service type.</t>
          <t><strong>Profile fields</strong> — defined in profile documents and required only for the
applicable service type. <xref target="APIX-SERVICES"/> defines the full APM schema for
web API services. <xref target="APIX-IOT"/> defines the full APM schema for device class
registrations. An APM submission MUST conform to the profile schema
corresponding to its <tt>spec.type</tt> value.</t>
          <t><strong>Extension fields</strong> — the <tt>custom</tt> array is a governed extension mechanism
for declaring properties not yet covered by the base or profile schemas. The
<tt>custom</tt> field is OPTIONAL in all profiles. It is a flat list of reverse-domain
key name strings; no values are stored in the index. The APIX indexes only the
declared key names, enabling discovery via the <tt>custom_key</tt> search parameter.
This design provides a clean promotion path: when a custom key accumulates
sufficient independent adoption across organisations, the Bot Standards
Foundation MAY initiate a governance track to promote the pattern to a standard
named field in a future APM version. Full normative rules — including key naming
conventions, list size limits, and Spider behaviour — are defined in the
applicable profile document (<xref target="APIX-SERVICES"/>, <xref target="APIX-IOT"/>).</t>
          <t>The <tt>trust</tt> fields in an APM submission MUST be set exclusively by the index
operator based on verification outcomes. APM submissions that include <tt>trust</tt>
field values MUST have those values overwritten by the index upon processing.
A Service Owner MUST NOT assert their own trust level.</t>
        </section>
      </section>
      <section anchor="trust-model">
        <name>Trust Model</name>
        <t>The APIX Trust Model has three independent dimensions. Each dimension produces
a machine-readable value in the Service Record. Consuming agents combine
these values according to their own Trust Policy.</t>
        <t>The APIX provides trust metadata. It does not make trust decisions.</t>
        <section anchor="dimension-1-organisation-trust-level">
          <name>Dimension 1 — Organisation Trust Level</name>
          <t>Describes the verified identity and compliance posture of the organisation
that owns the service.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">O-0</td>
                <td align="left">Unverified</td>
              </tr>
              <tr>
                <td align="left">O-1</td>
                <td align="left">Identity Verified</td>
              </tr>
              <tr>
                <td align="left">O-2</td>
                <td align="left">Legal Entity Verified</td>
              </tr>
              <tr>
                <td align="left">O-3</td>
                <td align="left">Hygiene Verified</td>
              </tr>
              <tr>
                <td align="left">O-4</td>
                <td align="left">Operationally Verified</td>
              </tr>
              <tr>
                <td align="left">O-5</td>
                <td align="left">Audited</td>
              </tr>
            </tbody>
          </table>
          <dl>
            <dt>O-0 (Unverified):</dt>
            <dd>
              <t>Self-registered. No checks performed.</t>
            </dd>
            <dt>O-1 (Identity Verified):</dt>
            <dd>
              <t>Valid business email confirmed. Domain ownership verified via DNS
TXT record.</t>
            </dd>
            <dt>O-2 (Legal Entity Verified):</dt>
            <dd>
              <t>Company registration number confirmed against official registry of
the declared jurisdiction.</t>
            </dd>
            <dt>O-3 (Hygiene Verified):</dt>
            <dd>
              <t><tt>security.txt</tt> (RFC 9116) present and valid at
<tt>/.well-known/security.txt</tt>; DMARC and SPF DNS records configured
for the registered domain; Privacy Policy, Terms of Service, and
Data Processing Agreement accessible at declared URLs. All checks
performed automatically by APIX. No human reviewer required.</t>
            </dd>
            <dt>O-4 (Operationally Verified):</dt>
            <dd>
              <t>Organisation governance structure, operational security practices,
incident response capability, and personnel vetting reviewed by an
Accredited Verifier against the Verifier Standard.</t>
            </dd>
            <dt>O-5 (Audited):</dt>
            <dd>
              <t>Third-party compliance audit completed (SOC 2 Type II, ISO 27001,
or equivalent). Audit certificate on file with the governing body.
O-5 may be achieved directly without O-4 as a prerequisite via
direct certificate submission to the governing body.</t>
            </dd>
          </dl>
          <t>Organisation levels are assessed against the organisation as a whole, not
per service. An organisation that achieves any O-level applies that level
to all its registered services.</t>
        </section>
        <section anchor="dimension-2-service-verification-level">
          <name>Dimension 2 — Service Verification Level</name>
          <t>Describes what has been automatically verified about the service itself.
The specific verification mechanism differs by service type (Spider for
web API services; manufacturer registration process for device classes).</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">S-0</td>
                <td align="left">Unchecked</td>
              </tr>
              <tr>
                <td align="left">S-1</td>
                <td align="left">Reachable</td>
              </tr>
              <tr>
                <td align="left">S-2</td>
                <td align="left">Spec Verified</td>
              </tr>
              <tr>
                <td align="left">S-3</td>
                <td align="left">Schema Stable</td>
              </tr>
              <tr>
                <td align="left">S-4</td>
                <td align="left">Security Reviewed</td>
              </tr>
            </tbody>
          </table>
          <dl>
            <dt>S-0 (Unchecked):</dt>
            <dd>
              <t>Registered. Verification has not yet run.</t>
            </dd>
            <dt>S-1 (Reachable):</dt>
            <dd>
              <t>Service confirmed reachable by automated check.</t>
            </dd>
            <dt>S-2 (Spec Verified):</dt>
            <dd>
              <t>Specification or capability declaration confirmed and consistent
with registration.</t>
            </dd>
            <dt>S-3 (Schema Stable):</dt>
            <dd>
              <t>No breaking changes detected across at least three consecutive
verification runs.</t>
            </dd>
            <dt>S-4 (Security Reviewed):</dt>
            <dd>
              <t>Automated vulnerability scan completed with no critical findings,
OR third-party penetration test certificate provided and validated
by an Accredited Verifier.</t>
            </dd>
          </dl>
          <t>Profile documents define the exact criteria by which each level is achieved
for each service type.</t>
        </section>
        <section anchor="dimension-3-liveness">
          <name>Dimension 3 — Liveness</name>
          <t>Describes the confirmed operational availability of the service, including
how recent and how frequent the availability data is. Liveness data is
expressed as a set of metrics, not a single level.</t>
          <dl>
            <dt><tt>last_ping_at</tt> (ISO 8601 timestamp)</dt>
            <dd>
              <t>Time of the most recent successful liveness check.</t>
            </dd>
            <dt><tt>ping_interval_seconds</tt> (integer)</dt>
            <dd>
              <t>Configured interval between liveness checks.</t>
            </dd>
            <dt><tt>uptime_30d_percent</tt> (float)</dt>
            <dd>
              <t>Percentage of checks successful over the last 30 days.</t>
            </dd>
            <dt><tt>avg_response_ms</tt> (float)</dt>
            <dd>
              <t>Mean response time in milliseconds over the last 30 days.</t>
            </dd>
            <dt><tt>consecutive_failures</tt> (integer)</dt>
            <dd>
              <t>Number of consecutive failed checks at last run.</t>
            </dd>
          </dl>
          <t>The check interval is determined by the service's liveness monitoring
configuration. A service configured at initial-only frequency receives no
recurring checks; its <tt>last_ping_at</tt> reflects only the initial verification
run.</t>
          <t>The concrete fields and measurement model for Liveness differ by service
type and are defined in each profile document.</t>
        </section>
        <section anchor="trust-model-implementations-by-service-type">
          <name>Trust Model Implementations by Service Type</name>
          <t>The three trust dimensions (Organisation, Service Verification, Liveness)
are universal across all APIX service types. However, their concrete
implementation — the verification mechanisms, the APM fields that carry
trust state, and the achievable levels — differs by service type. Three
distinct trust implementations are defined across the APIX profile suite.</t>
          <t><strong>API Service Trust</strong> (defined in <xref target="APIX-SERVICES"/>)</t>
          <t>Verification is pull-based: the APIX Spider visits the service on a
scheduled basis, checks reachability, fetches and parses the specification,
and runs schema comparison across consecutive runs. Liveness is measured
by the index — the Spider pings the service endpoint and records response
time and availability metrics. The trust object in an API service APM
carries observed metrics (<tt>last_ping_at</tt>, <tt>uptime_30d_percent</tt>,
<tt>avg_response_ms</tt>, <tt>consecutive_failures</tt>).</t>
          <t><strong>Device Class Trust</strong> (defined in <xref target="APIX-IOT"/>)</t>
          <t>Verification is registration-based: a device manufacturer registers the
device class, providing a capability declaration and firmware version
contract. The APIX Spider does not visit device hardware. Liveness
configuration is declared by the manufacturer at registration time
(<tt>presence_mode</tt>, <tt>heartbeat_interval_seconds</tt>) — not observed by the
index. The trust object in a device class APM carries manufacturer-declared
configuration, not measured metrics. <tt>spec_consistency</tt> is always <tt>null</tt>
for device classes: there is no specification document for the Spider to
fetch.</t>
          <t><strong>Device Instance Trust</strong> (defined in <xref target="APIX-IOT"/>)</t>
          <t>Liveness is push-based: individual device instances signal their presence
to the index at regular intervals. The index does not probe devices.
Instance trust state (<tt>online</tt>, <tt>reachable</tt>, <tt>last_seen_at</tt>) reflects
the most recent presence signal received, not a Spider measurement.
Device instance trust state is private — it is never returned to
unauthenticated queries regardless of trust levels.</t>
          <t>These are three architecturally distinct trust models that share only
the O-level and S-level abstractions. Implementers MUST NOT assume that
trust object fields in a device class or device instance APM follow the
structure of an API service APM.</t>
        </section>
        <section anchor="bot-side-trust-policy-expression">
          <name>Bot-Side Trust Policy Expression</name>
          <t>A consuming agent expresses its Trust Policy as a set of minimum thresholds
across all three dimensions. Example policy expressed in pseudo-notation:</t>
          <artwork><![CDATA[
require:
  organisation_level >= O-2
  service_level >= S-2
  last_ping_age < 3600         # seconds since last_ping_at
  uptime_30d_percent >= 99.0
  consecutive_failures == 0
]]></artwork>
          <t>The Index API SHOULD support filtering by trust dimension thresholds so that
agents can retrieve only records that satisfy their policy without downloading
the full index.</t>
          <t>Trust Policies are defined and enforced by consuming agents. The APIX does
not validate or enforce Trust Policies.</t>
        </section>
        <section anchor="accredited-verifier-model">
          <name>Accredited Verifier Model</name>
          <t>Organisation level O-3 (Hygiene Verified) is achieved by automatic APIX
checks and requires no human reviewer. Organisation level O-4 requires an
Accredited Verifier assessment. Organisation level O-5 may be achieved
directly without O-4 as a prerequisite via direct certificate submission
to the governing body (SOC 2 Type II or ISO 27001). The APIX uses a federated Accredited
Verifier model, analogous to the Certificate Authority model in TLS:</t>
          <ul spacing="normal">
            <li>
              <t>the governing body defines the verification criteria for each
level and publishes the Verifier Standard.</t>
            </li>
            <li>
              <t>Organisations apply to the governing body for Verifier
accreditation.</t>
            </li>
            <li>
              <t>Accredited Verifiers perform O-4 assessments and, where applicable, O-5
attestations, signing verification reports in each case.</t>
            </li>
            <li>
              <t>the governing body maintains a public registry of Accredited
Verifiers and their accreditation status.</t>
            </li>
            <li>
              <t>A Service Record at O-4 MUST include the identifier of the Accredited
Verifier that performed the assessment and the date of assessment.</t>
            </li>
            <li>
              <t>A Service Record at O-5 via direct certificate submission MUST include
the certificate reference, issuing auditor, scope, and expiry date.</t>
            </li>
            <li>
              <t>Accreditation of Verifiers is reviewed annually by the governing body.</t>
            </li>
            <li>
              <t>A Verifier placed in suspended status following a failed annual review
MUST be given a minimum 90-day remediation window before final
revocation. The 90-day window applies to performance failures: lapsed
certifications, reduced capacity, or failure to meet audit quality
standards. It does not apply to fundamental violations, for which the
governing body MUST revoke accreditation immediately. Fundamental
violations include: issuing a false or unsupported O-4 or O-5
assessment, certifying a related entity in breach of the independence
requirement, leaking confidential assessment data, or colluding with
an organisation to obtain a trust level fraudulently.</t>
            </li>
          </ul>
          <t><strong>Elevation verification requirements:</strong></t>
          <t>Elevation to O-4 or O-5 MUST be verified through an out-of-band channel
that is independent of the digital submission path used to submit the
elevation request. The governing body MUST NOT record an O-4 or O-5
elevation solely on the basis of a digitally submitted application,
regardless of the authentication mechanism used for that submission.
The out-of-band verification MUST confirm that the elevation was
intentionally authorised by a responsible representative of the applicant
organisation, and that the submitted evidence (Accredited Verifier report
or audit certificate) is genuine.</t>
          <t>Elevation to O-5 MUST additionally be confirmed by two independently
authorised representatives of the applicant organisation. The two
confirming individuals MUST hold separate credentials and MUST act
independently; a single individual confirming twice does not satisfy this
requirement. The governing body MUST enforce this programmatically for
O-5 elevations processed through its operational interface.</t>
          <t>The specific out-of-band verification mechanism and the implementation
of the two-representative confirmation are operational responsibilities
of the governing body and are documented in the APIX implementation
guide. Conforming implementations of the APIX governing body role MUST
implement mechanisms that satisfy these requirements; the specific
mechanisms are not prescribed by this specification.</t>
          <t><strong>Design Note — Future Trust Level Evolution (non-normative):</strong>
The O-0 through O-5 architecture defined here is the Version 1 model.
O-3 was introduced to provide an automatable, zero-cost on-ramp for
early-stage organisations, bridging the gap between legal entity
verification (O-2) and the first human-reviewed tier (O-4). As the governing body
Accredited Verifier market matures and a meaningful population of O-5
organisations is established, a Version 2 evolution is anticipated in
which O-5 is joined by a premium O-6 designation with APIX-specific
assessment criteria beyond the industry baseline — dedicated incident
response covering governing body cooperation obligations, agreed governing body audit access,
and APIX-specific operational commitments. This evolution requires the
governing body to develop and publish an O-6 assessment standard, which
is not feasible at initial launch. The trust level record structure (see implementation
guide Part I §1.4) is designed to accommodate additional components
without breaking existing consumers.</t>
        </section>
      </section>
      <section anchor="commercial-contract-and-sanctions-compliance">
        <name>Commercial Contract and Sanctions Compliance</name>
        <t>Every registered service MUST be covered by a commercial agreement between
the Service Owner and the index operator (or its Accredited Regional
Representative). The agreement MUST define:</t>
        <ul spacing="normal">
          <li>
            <t>The liveness monitoring configuration and its obligations.</t>
          </li>
          <li>
            <t>The index operator's obligations regarding verification frequency and
Index API availability.</t>
          </li>
          <li>
            <t>Acceptable use terms.</t>
          </li>
          <li>
            <t>Data processing terms in accordance with applicable law.</t>
          </li>
        </ul>
        <t><strong>Sanctions compliance:</strong> the index operator MUST screen all service
registrants against applicable sanctions lists prior to account activation.
At minimum, screening MUST cover the UN Security Council consolidated
sanctions list. Operators subject to additional jurisdictional sanctions
regimes (e.g., EU, US OFAC, Swiss SECO) MUST additionally screen against
those lists as applicable to their jurisdiction of incorporation. Entities
subject to applicable sanctions MUST be refused registration regardless of
commercial tier.</t>
        <t>Registrants MUST represent and warrant in the commercial agreement that they
are not subject to applicable sanctions, and MUST notify the index operator
immediately of any change in that status.</t>
        <t><strong>Ongoing sanctions monitoring:</strong> The index operator MUST perform periodic
re-screening of all registered organisations against the same sanctions lists
checked at initial registration. Re-screening MUST occur at least quarterly.
Upon detection of a new match for a previously-cleared organisation — whether
by periodic re-screening, third-party notification, or registrant self-report
— the index operator MUST immediately:</t>
        <ol spacing="normal" type="1"><li>
            <t>Suspend the organisation's account. All API credentials are revoked; no
further registration or update operations are accepted from the
organisation.</t>
          </li>
          <li>
            <t>Suspend all services registered by the organisation. Suspended services
are removed from all discovery results.</t>
          </li>
          <li>
            <t>Revoke all active credentials issued to the organisation (API keys,
instance tokens where applicable). All associated service instances are
marked offline or unreachable.</t>
          </li>
          <li>
            <t>Open a legal review case. The specific sanctions list and matched entry
MUST NOT be disclosed externally; the organisation receives only a
generic account suspension notice.</t>
          </li>
        </ol>
        <t>If the sanctions match is subsequently determined to be a false positive or
the registrant is removed from the relevant list, the index operator MAY
reinstate the account following legal review. Reinstatement requires a fresh
KYC and sanctions check.</t>
        <t>Unauthenticated discovery queries to the Index API are not subject to
registration screening and MUST remain available without restriction,
consistent with the APIX's mission as open global infrastructure.</t>
      </section>
      <section anchor="operational-model">
        <name>Operational Model</name>
        <section anchor="supply-side-funding-principle">
          <name>Supply-Side Funding Principle</name>
          <t>A conforming APIX implementation MUST be funded primarily by service
registration fees paid by Service Owners (supply side). Discovery queries
by consuming agents MUST NOT be the primary revenue mechanism. This
principle is normative: an implementation that charges consuming agents for
standard discovery queries is not conformant with the APIX model, as doing
so contradicts the open infrastructure mission and undermines the network
effect that makes the supply side valuable.</t>
          <t>The APIX model is structurally analogous to the DNS model: registrants pay
to be listed; queries are free.</t>
          <t>Fee structures applicable to each service type are defined in the relevant
profile document. All implementations MUST apply fees consistently to all
registrants of a given service type at the same commercial tier, with no
preferential treatment. The governing body publishes the normative fee
schedule as a separate registry document, updated independently of this RFC.</t>
        </section>
        <section anchor="consumer-access-model">
          <name>Consumer Access Model</name>
          <t>Discovery queries to the Index API MUST be available without authentication
or payment. Rate limits MAY be applied to protect infrastructure integrity
but MUST NOT be set at levels that prevent reasonable agent operation.
Implementations MUST support at minimum three consumer access layers:</t>
          <t><strong>Layer 1 — Unauthenticated access</strong></t>
          <t>Any agent MUST be able to query the Index API without authentication or
registration, subject to a per-IP rate limit. This layer is sufficient for
individual agents and proof-of-concept deployments.</t>
          <t><strong>Layer 2 — Authenticated access (free)</strong></t>
          <t>Any agent MAY register a consumer identity token at no cost. Token
registration requires a valid email address. Authenticated access MUST
provide a higher rate limit than unauthenticated access and MAY additionally
provide result caching hints and webhook subscriptions for service record
changes.</t>
          <t>Consumer tokens SHOULD be compatible with the webbotauth identity model
(<xref target="I-D.meunier-webbotauth-registry"/>) to enable interoperability with bot
authentication infrastructure.</t>
          <t><strong>Layer 3 — High-volume access (paid, optional)</strong></t>
          <t>Implementations MAY offer a paid high-volume access tier for platforms
operating agents at scale that require guaranteed query capacity and
operational SLAs. This tier is supplementary; the index's operational
sustainability MUST NOT depend on it.</t>
          <t><strong>Public bulk download (REQUIRED)</strong></t>
          <t>Implementations MUST provide the full index as a freely downloadable bulk
dataset on the first day of each calendar month, without authentication, under
the Open Database Licence (ODbL) 1.0. This requirement implements the
openness requirement of Section 4.2: no entity, including the index operator,
may hold an exclusive lock on the index data.</t>
          <t>Implementations MUST additionally publish a daily diff file covering all
record additions, updates, and deletions since the previous day. Daily diffs
MUST be serialised in the same format as the full snapshot and MUST be
available at the same endpoint, identified by an ISO 8601 date in their
filename or URL path (e.g. <tt>diff-2026-04-28.json</tt>). A new mirror MUST be
able to reach current index state by downloading the latest monthly full
snapshot and applying the sequence of daily diffs since that snapshot date,
without downloading any additional full snapshots.</t>
        </section>
        <section anchor="ecological-impact-transparency">
          <name>Ecological Impact Transparency</name>
          <t>A conforming APIX implementation SHOULD publish aggregate ecological impact
statistics derived from observed index usage. These statistics quantify the
efficiency gain attributable to machine-native API consumption compared to
equivalent traditional web request technology consumption, and SHOULD be
updated in real time and included in the annual transparency report.</t>
          <t>The comparison baseline is the full traditional web request stack — not
payload size alone — including the request waterfall (HTML page with
dependent CSS, JavaScript, image, and font resources), JavaScript
execution overhead for dynamically rendered pages, polling requests that
occur in the absence of a notification mechanism, retry waste from
access-control measures, and proxy infrastructure maintained solely to
circumvent those measures.</t>
          <t>The following metrics SHOULD be derived from directly observable index
events and published at a stable public endpoint:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Discovery requests served</strong> — each request represents one agent
retrieval that did not require scraping or probing a service endpoint
directly.</t>
            </li>
            <li>
              <t><strong>Notification events fired</strong> — each event represents one or more
polling requests eliminated across all subscribed consuming agents.</t>
            </li>
            <li>
              <t><strong>Estimated data transfer saved (GB)</strong> — computed from discovery request
count, service profile type, and the differential between average
traditional web page size and average machine-native API response size
for that profile type.</t>
            </li>
            <li>
              <t><strong>Estimated CO2 equivalent avoided</strong> — computed from total estimated
data transfer saved using a published CO2-per-GB methodology. The
methodology document, including its source data and version, MUST be
publicly accessible at a stable URL.</t>
            </li>
          </ul>
          <t>All published figures MUST be accompanied by the computation methodology,
confidence bounds, and source data references. Conservative estimates MUST
be used where data is incomplete; figures MUST NOT be extrapolated beyond
what the directly observed data supports.</t>
          <t>The governing body SHOULD seek independent validation of the methodology
from an established environmental computing research organisation.</t>
        </section>
      </section>
      <section anchor="index-api-core">
        <name>Index API — Core</name>
        <section anchor="hateoas-navigation-model">
          <name>HATEOAS Navigation Model</name>
          <t>The Index API MUST follow Hypermedia as the Engine of Application State
(HATEOAS) principles. A consuming agent MUST be able to discover and navigate
the entire index starting from a single, stable entry-point URL, without
out-of-band knowledge of endpoint paths.</t>
          <t>Every response MUST include a <tt>_links</tt> object containing hypermedia controls
for navigation. Link relations MUST use IANA-registered relation types where
applicable, and APIX-specific relations where not.</t>
        </section>
        <section anchor="discovery-endpoint">
          <name>Discovery Endpoint</name>
          <t>The APIX exposes a single globally stable entry-point URL:</t>
          <artwork><![CDATA[
https://apix.example.org/
]]></artwork>
          <t>A GET request to this URL returns the Index root resource. The root resource
includes base navigation links common to all implementations, plus
profile-specific links defined in applicable profile documents.</t>
          <sourcecode type="json"><![CDATA[
{
  "apix_version": "1.0",
  "total_services": 12483,
  "last_updated": "2026-04-25T00:00:00Z",
  "registry_versions": {
    "protocols": "1.0",
    "capabilities": "1.0",
    "presence_modes": "1.0"
  },
  "_links": {
    "self": {
      "href": "https://apix.example.org/"
    },
    "search": {
      "href": "https://apix.example.org/search{/api_version}{?...}",
      "templated": true
    },
    "browse": {
      "href": "https://apix.example.org/browse"
    },
    "capabilities": {
      "href": "https://apix.example.org/capabilities"
    },
    "devices": {
      "href": "https://apix.example.org/devices{?capability,...}",
      "templated": true
    },
    "docs": {
      "href": "https://apix.example.org/docs"
    },
    "apix:ecological-impact-stats": {
      "href": "https://apix.example.org/stats/ecological-impact"
    }
  }
}
]]></sourcecode>
          <t>The <tt>{?q,...}</tt> placeholder above is abbreviated. The complete search URI
template (parameters grouped for readability; the value is a single
uninterrupted string at runtime):</t>
          <artwork><![CDATA[
https://apix.example.org/search{/api_version}
  {?q,capability,protocol,language,pricing_model,
   auth_method,deployment_region,near,coverage_radius_km,
   custom_key,org_level_min,service_level_min,spec_consistency,
   max_ping_age,uptime_30d_min,lifecycle_stage,
   include_superseded,page,page_size}
]]></artwork>
          <t>The <tt>lifecycle_stage</tt> parameter accepts values defined by each profile
document. Valid values differ by service type and are not a shared enum.
See <xref target="APIX-SERVICES"/> and <xref target="APIX-IOT"/> for the valid values applicable
to each service type.</t>
          <t>The <tt>devices</tt> link template (defined in <xref target="APIX-IOT"/>):</t>
          <artwork><![CDATA[
https://apix.example.org/devices
  {?capability,protocol,online,api_version,
   endpoint_confidence,page,page_size}
]]></artwork>
          <t>Profile-specific links (e.g., the <tt>devices</tt> link defined in <xref target="APIX-IOT"/>) are
present in the root resource when the implementation includes support for that
profile. Consuming agents MUST follow links rather than constructing URLs
independently; the presence or absence of a link in the root resource is the
authoritative signal of whether a capability is supported.</t>
        </section>
        <section anchor="transport-encoding">
          <name>Transport Encoding</name>
          <t>The Index API is consumed by autonomous agents at machine speed. Response
payloads are structured JSON with highly repetitive field names across result
arrays. Transport-layer compression achieves 70–85% size reduction on typical
search result payloads with no information loss and no application-layer
schema changes.</t>
          <t><strong>Compression support requirements:</strong></t>
          <t>The Index API MUST support the following <tt>Accept-Encoding</tt> values:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Encoding</th>
                <th align="left">Requirement</th>
                <th align="left">Notes</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>gzip</tt></td>
                <td align="left">MUST</td>
                <td align="left">Universally supported baseline</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>br</tt> (Brotli)</td>
                <td align="left">SHOULD</td>
                <td align="left">Higher compression ratio than gzip</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>zstd</tt></td>
                <td align="left">SHOULD</td>
                <td align="left">Similar ratio to Brotli; faster decompression</td>
              </tr>
            </tbody>
          </table>
          <t>The Index API MUST perform content negotiation via the <tt>Accept-Encoding</tt>
request header. Responses MUST include a <tt>Content-Encoding</tt> header
identifying the applied encoding. If a client sends no <tt>Accept-Encoding</tt>
header, the server MAY respond uncompressed.</t>
          <t>Consuming agents SHOULD include <tt>Accept-Encoding: zstd, br, gzip</tt> in all
Index API requests.</t>
          <t>The Index API MAY additionally support CBOR (RFC 8949) as a binary
alternative to JSON. A client that prefers CBOR MUST signal this via
<tt>Accept: application/cbor</tt>. CBOR responses carry identical information to
JSON responses. Clients MUST NOT assume CBOR support. JSON over compressed
transport is the normative interchange format.</t>
        </section>
      </section>
      <section anchor="index-api-versioning">
        <name>Index API Versioning</name>
        <section anchor="version-identification">
          <name>Version Identification</name>
          <t>The root resource returned at <tt>https://apix.example.org/</tt> MUST include an
<tt>apix_version</tt> field identifying the version of the Index API schema in use.
Version values are of the form <tt>MAJOR.MINOR</tt> (e.g., <tt>"1.0"</tt>, <tt>"1.2"</tt>, <tt>"2.0"</tt>).</t>
          <t>Consuming agents MUST read <tt>apix_version</tt> at the start of each session.
Agents MUST NOT cache <tt>apix_version</tt> across sessions: the version field is
the authoritative signal that the schema has changed.</t>
        </section>
        <section anchor="compatibility-rules">
          <name>Compatibility Rules</name>
          <t>The APIX follows a semantic versioning policy for the Index API:</t>
          <t><strong>Non-breaking changes (MINOR increment):</strong></t>
          <ul spacing="normal">
            <li>
              <t>Adding new fields to Service Records or the root resource</t>
            </li>
            <li>
              <t>Adding new optional query parameters to the search endpoint</t>
            </li>
            <li>
              <t>Adding new <tt>_links</tt> relations to any response</t>
            </li>
            <li>
              <t>Expanding an enumerated value registry (new capability terms, new
protocol types)</t>
            </li>
            <li>
              <t>Increasing rate limits</t>
            </li>
          </ul>
          <t>Minor version increments are backward compatible. A consuming agent written
for <tt>1.0</tt> MUST be able to operate correctly against a <tt>1.x</tt> endpoint,
provided it ignores unknown fields.</t>
          <t>Consuming agents MUST follow the robustness principle: ignore unknown fields
and unknown link relations rather than failing. This requirement is normative.</t>
          <t><strong>Breaking changes (MAJOR increment):</strong></t>
          <ul spacing="normal">
            <li>
              <t>Removing or renaming fields in Service Records</t>
            </li>
            <li>
              <t>Changing the type or semantics of an existing field</t>
            </li>
            <li>
              <t>Removing or renaming existing query parameters</t>
            </li>
            <li>
              <t>Changing the structure of the HATEOAS <tt>_links</tt> object</t>
            </li>
            <li>
              <t>Changing the URL of the single entry-point</t>
            </li>
          </ul>
          <t>A MAJOR version increment MUST NOT occur without a concurrent deprecation
notice for the prior version (see below).</t>
        </section>
        <section anchor="api-deprecation-and-migration">
          <name>API Deprecation and Migration</name>
          <t>When a new MAJOR version is released, the prior MAJOR version MUST remain
supported for a minimum of <strong>24 months</strong> from the date the new version
becomes available. During this period:</t>
          <ul spacing="normal">
            <li>
              <t>Both versions MUST be simultaneously queryable</t>
            </li>
            <li>
              <t>The root resource of the prior version MUST include a <tt>deprecated</tt> flag
with the <tt>sunset_date</tt> of the old version</t>
            </li>
            <li>
              <t>Consuming agents that include the IETF <tt>Sunset</tt> header
(<xref target="RFC8594"/>) in their responses MUST use it to signal the old version's
sunset date</t>
            </li>
          </ul>
          <t>the governing body MUST NOT sunset a MAJOR version without giving
consuming agents at least 24 months to migrate.</t>
        </section>
        <section anchor="service-apiversion-immutability-invariant">
          <name>Service api_version Immutability Invariant</name>
          <t>The <tt>api_version</tt> field in an APM and the version path segment in the
search endpoint (<tt>/search/v{major}.{minor}/</tt>) rest on a single foundational
guarantee: a published <tt>api_version</tt> value has an immutable field structure
definition.</t>
          <t>This invariant MUST be stated unambiguously to consuming agents and service
operators:</t>
          <ul spacing="normal">
            <li>
              <t>A field present in version <tt>v2.4</tt> will be present in every service that
declares <tt>api_version: "2.4.x"</tt> for the lifetime of that registration.</t>
            </li>
            <li>
              <t>A field absent from version <tt>v2.4</tt> will never appear in a <tt>v2.4.x</tt>
service record without a version increment.</t>
            </li>
            <li>
              <t>Removing a field, changing a field's type, or making any other breaking
change REQUIRES a new major version. The major bump is the explicit,
sufficient notice to consumers. No deprecation period within a major
version is required or expected.</t>
            </li>
            <li>
              <t>Adding a field requires a new minor version. Even additive changes are
not permitted within a published version — a service that adds a field
mid-life has implicitly created a new contract and MUST increment
<tt>api_version</tt> accordingly.</t>
            </li>
          </ul>
          <t>This invariant enables the version path filter to be an unconditional
schema contract: an agent that pins to <tt>/search/v2.4/</tt> receives results
with a fixed, permanent field set. Service owners are freed from the
pressure to retain unwanted fields for backwards compatibility — the
correct action is always to increment the version and move forward cleanly.</t>
        </section>
        <section anchor="no-cross-version-response-mapping">
          <name>No Cross-Version Response Mapping</name>
          <t>The APIX does NOT perform cross-version response mapping. The
<tt>api_version</tt> path segment is a strict storage filter: only service
registrations whose <tt>api_version</tt> field matches the specified prefix
are returned. The index never synthesises a response of one version
from a record stored at a different version.</t>
          <t>The consequence is deliberate and unambiguous:</t>
          <ul spacing="normal">
            <li>
              <t>A service that has upgraded from v2.4 to v3.0 is stored as a separate
record. The v3.0 record does not appear in <tt>/search/v2/</tt> results.
There are no null substitutions for dropped fields, no type coercions
for changed fields, and no partial responses. A v3 record is a
different resource; it is not a transformed view of a v2 record.</t>
            </li>
            <li>
              <t>The v2.4 record remains in the index — immutably — until the service
owner advances it through the lifecycle (<tt>deprecated</tt> → <tt>sunset</tt>) or
the record is superseded and eventually removed. An agent pinned to
<tt>/search/v2/</tt> continues to see v2.4 registrations for as long as
they exist in the index at that lifecycle stage.</t>
            </li>
            <li>
              <t>As services migrate to newer major versions, the v2 result set shrinks.
Diminishing or empty results at a pinned version are not a failure
condition — they are the designed signal that the consuming agent's
version pin no longer covers the current service landscape and an
upgrade of consumer code is warranted.</t>
            </li>
          </ul>
          <t><strong>Upgrade path discovery:</strong> The Level 2 Service Record for a superseded
version MUST include a populated <tt>superseded_by</tt> field pointing to the
current version's record. A consuming agent that finds a v2.4 result with
<tt>superseded_by</tt> set SHOULD follow the link to inspect the v3.0 record and
determine whether upgrading its version pin is feasible. This is the
mechanism by which agents discover that a newer contract is available
without being forced off the old one before they are ready.</t>
          <t>A consuming agent that receives only empty results for its pinned version
SHOULD query <tt>GET /search/</tt> with no path segment and no query parameters.
This returns the version landscape only — a summary of available
<tt>api_version</tt> prefixes, service counts, and lifecycle status — and executes
no content query. The agent uses this response to identify which version
prefix covers the current service population and then issues a new scoped
query (e.g., <tt>/search/v3/?...</tt>) with explicit filters. A parameter-less
<tt>/search/</tt> MUST NOT return service records; it exists solely as a version
discovery resource.</t>
        </section>
        <section anchor="registry-version-tracking">
          <name>Registry Version Tracking</name>
          <t>The root resource exposes a <tt>registry_versions</tt> object (Section 10.2).
Consuming agents that cache capability taxonomy or protocol type data MUST
compare the current <tt>registry_versions</tt> values against their cached version
on each session. A change in any registry version MUST trigger a cache
refresh before the agent applies trust filtering or capability matching.</t>
        </section>
      </section>
      <section anchor="operator-security-and-self-governance">
        <name>Operator Security and Self-Governance</name>
        <section anchor="purpose-and-scope">
          <name>Purpose and Scope</name>
          <t>APIX centralises knowledge that has intrinsic intelligence value: the
identity and capability of every registered service, the network location
of every online IoT device instance, the query patterns of every consuming
agent, and the contact details of law enforcement authorities across
accepted jurisdictions. This concentration makes the Bot Standards
Foundation an ultra-high-value target for state-sponsored actors, criminal
organisations, and corporate adversaries.</t>
          <t>The Non-Surveillance Commitment (Section 5) defines what APIX will not do
to the ecosystem it serves. This section defines what the Bot Standards
Foundation MUST do to protect itself and the ecosystem from being exploited
involuntarily — through compromise, coercion, insider threat, or
organisational capture.</t>
          <t>The requirements in this section are normative obligations on the Bot
Standards Foundation as operator. They are not addressed to Service Owners
or consuming agents.</t>
        </section>
        <section anchor="technical-security-requirements">
          <name>Technical Security Requirements</name>
          <t>the governing body MUST operate APIX infrastructure under the
following technical constraints:</t>
          <t><strong>Infrastructure separation:</strong> The token store, tamper-evident audit log,
and LER processing queue MUST be hosted on systems with no shared network
path to the public-facing Index API query infrastructure. Compromise of
the query layer MUST NOT provide lateral access to the token store or
audit log.</t>
          <t><strong>Air-gapped token issuance:</strong> Instance token batches for IoT device
classes MUST be generated on infrastructure with no persistent internet
connection. Issuance systems MUST use hardware security modules (HSMs)
for all cryptographic operations. The issuance network MUST be physically
separated from the token delivery network.</t>
          <t><strong>Geographic distribution:</strong> Core APIX systems MUST be distributed across
at least two independent physical jurisdictions. No single legal order
from any one jurisdiction MUST be sufficient to take the full system
offline or compel full data access.</t>
          <t><strong>Zero-trust internal architecture:</strong> No governing body system MUST grant implicit
trust to requests from other governing body systems. All inter-system communication
MUST be authenticated and authorised independently of network location.
Lateral movement within governing body infrastructure MUST require separate
credentials at each boundary.</t>
          <t><strong>Cryptographic floor:</strong> All external-facing endpoints MUST use TLS 1.3
or higher (<xref target="RFC8446"/>). All signing operations MUST use asymmetric keys
stored in hardware-backed key storage. Key material MUST NOT be exportable
from the HSM in plaintext under any operational procedure.</t>
          <t><strong>Mandatory penetration testing:</strong> The governing body MUST commission an independent
penetration test of its production infrastructure at least annually. A
summary of findings (severity distribution, remediation status) MUST be
published in the governing body's annual security report within 90 days of the test. The
identity of the testing firm MUST be disclosed.</t>
          <t><strong>Responsible disclosure programme:</strong> The governing body MUST maintain a public
responsible disclosure policy at a stable URL and MUST acknowledge
vulnerability reports within 5 business days.</t>
        </section>
        <section anchor="organisational-security-requirements">
          <name>Organisational Security Requirements</name>
          <t><strong>Personnel vetting:</strong> All staff and contractors with access to the token
store, LER queue, sanctions screening pipeline, or audit log MUST undergo
documented background verification commensurate with the sensitivity of
the systems they can access, prior to access being granted. Access MUST
be reviewed annually.</t>
          <t><strong>Segregation of duties:</strong> No individual staff member MUST hold
simultaneous access to more than two of the following: token store, audit
log, LER queue, sanctions pipeline, board signing keys. This constraint
MUST be enforced technically, not procedurally.</t>
          <t><strong>Least-privilege access:</strong> Access rights MUST be scoped to the minimum
required for the role. Privileged access MUST expire after a defined
session window and MUST require re-authentication. No standing privileged
sessions are permitted.</t>
          <t><strong>Security awareness:</strong> All governing body staff MUST complete security awareness
training annually, covering at minimum the threat types and unlawful
request scenarios relevant to an operator under the security obligations
defined in this section.</t>
          <t><strong>Insider threat detection:</strong> The governing body MUST operate anomalous access pattern
detection across all privileged systems. Anomalies MUST generate alerts
to a security function independent of the alerted staff member's reporting
line.</t>
          <t><strong>Whistleblower protection:</strong> Any governing body staff member or contractor who
receives an instruction — from any source, including governing body board members —
that would cause the governing body to act contrary to the Non-Surveillance Commitment
(Section 5) or the requirements of this section MUST have a protected
right to report that instruction to an external body without prior
internal approval. This right MUST be codified in the governing body's founding charter
charter and in every employment and contractor agreement. It MUST NOT
be waivable by board resolution or individual contract term.</t>
        </section>
        <section anchor="political-independence-and-anti-capture-measures">
          <name>Political Independence and Anti-Capture Measures</name>
          <t><strong>Structural domicile:</strong> the governing body MUST maintain its
Swiss Stiftung domicile as a structural defence. The Swiss legal system,
political neutrality, and the oversight of the Eidgenössische
Stiftungsaufsicht provide a foundation that is not subject to the data
access regimes of any single major power.</t>
          <t><strong>Golden share:</strong> the governing body's charter MUST maintain a governance mechanism
equivalent to a 51% golden share that prevents any acquisition, merger,
or board supermajority from overriding the charter's core purpose. No
commercial transaction MUST be permitted to subordinate the governing body's neutrality
obligations to the interests of a single organisation or jurisdiction.</t>
          <t><strong>Board composition:</strong> No single nation-state's citizens or residents
MUST hold a majority of board seats. No individual MUST hold more than
one vote on any board decision. Board composition MUST be published
annually in the transparency report.</t>
          <t><strong>Infrastructure jurisdiction policy:</strong> The governing body MUST NOT host core APIX
systems — token store, audit log, LER queue — in jurisdictions that
impose secret data access orders (orders that legally prohibit the
recipient from disclosing that the order was received). The governing body MUST maintain
a published list of approved hosting jurisdictions, reviewed annually by
the board. Removal of a jurisdiction from the approved list MUST trigger
migration of any systems hosted there within 180 days.</t>
          <t><strong>Lawful pressure resistance:</strong> If the governing body receives a government demand for
data access, system access, or operational changes that does not satisfy
the LER criteria defined in <xref target="APIX-IOT"/> Section 9.8, The governing body MUST refuse
the demand. The governing body MUST record the demand in the audit log and MUST report
its existence — without operational detail that would compromise an
ongoing investigation — in the next annual transparency report. The governing body MUST
NOT comply with informal diplomatic pressure, agency-level requests, or
extra-judicial demands regardless of the requesting party's political
standing.</t>
          <t><strong>Anti-capture review:</strong> The board MUST conduct an annual review of
whether any commercial relationship, grant dependency, or staff composition
creates a conflict of interest with the governing body's neutrality obligations. Findings
MUST be published in the transparency report.</t>
        </section>
        <section anchor="crisis-governance-protocol">
          <name>Crisis Governance Protocol</name>
          <t>The following conditions each independently trigger the governing body crisis
governance protocol:</t>
          <ul spacing="normal">
            <li>
              <t>Credible evidence that APIX production infrastructure has been
compromised by an external actor</t>
            </li>
            <li>
              <t>Receipt of a demand that the governing body's legal counsel assesses as an attempt
to compel action contrary to the charter</t>
            </li>
            <li>
              <t>Attempted hostile acquisition, board capture, or charter amendment
by a party with a conflict of interest</t>
            </li>
            <li>
              <t>Regulatory action that threatens loss of Swiss Stiftung domicile</t>
            </li>
          </ul>
          <t><strong>Obligations on trigger:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>The discovering party MUST notify all board members within 4 hours.</t>
            </li>
            <li>
              <t>The governing body MUST publish a public statement acknowledging the trigger event
within 72 hours of confirmation. The statement MUST describe the
nature of the threat in general terms without disclosing operational
detail that would aid the attacker.</t>
            </li>
            <li>
              <t>The governing body MUST activate its continuity-of-operations plan, ensuring Index
API availability is maintained independently of any compromised or
coerced system.</t>
            </li>
            <li>
              <t>If Swiss domicile is threatened or lost, the board MUST convene within
30 days to activate a pre-agreed organisational relocation framework.
The destination jurisdiction MUST satisfy the infrastructure
jurisdiction policy defined above. The relocation framework MUST be
prepared and approved by the board before APIX reaches production
operation and MUST be reviewed annually.</t>
            </li>
          </ol>
          <t>No single board member and no external party MUST have the authority to
suspend or delay execution of steps 1–3 above.</t>
        </section>
        <section anchor="data-minimisation-as-security-policy">
          <name>Data Minimisation as Security Policy</name>
          <t>The least-held data is the least-leakable data. The following constraints
apply to all APIX operational systems:</t>
          <ul spacing="normal">
            <li>
              <t>APIX MUST NOT log consuming agent query patterns beyond the minimum
required for liveness monitoring and abuse detection. Query logs MUST
be purged after 30 days unless retained under a specific, documented,
time-limited LER investigation scope.</t>
            </li>
            <li>
              <t>Device instance network location data (<tt>network.ipv6</tt>, as published in
the instance record) MUST be purged from APIX systems within 72 hours of
the instance transitioning to offline status, subject to any active LER
retention obligation on that instance. The internally observed source IPv4
address (<tt>observed_source_ipv4</tt>, retained for abuse detection and
geo-routing and not surfaced in the instance record) is subject to the
same purge obligation and timeline.</t>
            </li>
            <li>
              <t>APIX MUST NOT build or maintain cross-session behavioural profiles of
consuming agents. Each query session MUST be treated as independent.</t>
            </li>
            <li>
              <t>Every data field collected or retained by APIX MUST have a documented
functional justification. Fields without a current functional
justification MUST be deleted from the data model in the next schema
revision. This review MUST be a standing agenda item at each the governing body board
meeting.</t>
            </li>
          </ul>
        </section>
        <section anchor="annual-security-report">
          <name>Annual Security Report</name>
          <t>the governing body MUST publish an annual security report
within 90 days of the close of each calendar year. The security report
is separate from the transparency report defined in Section 5.6 and MUST
contain:</t>
          <ul spacing="normal">
            <li>
              <t>Summary of the year's penetration test findings: severity distribution
(critical / high / medium / low count), remediation status of prior
findings, identity of testing firm</t>
            </li>
            <li>
              <t>Summary of infrastructure changes affecting the attack surface</t>
            </li>
            <li>
              <t>Staff access review outcomes: number of access rights granted, revoked,
and modified</t>
            </li>
            <li>
              <t>Count of external demands received that did not meet LER criteria,
and how each was handled</t>
            </li>
            <li>
              <t>Count of whistleblower reports received and their resolution status
(no identifying detail)</t>
            </li>
            <li>
              <t>Board attestation that the infrastructure jurisdiction policy was
reviewed and remains current</t>
            </li>
          </ul>
          <t>The same unilateral publication right defined for the transparency report
(Section 5.6) applies to the security report: if the board fails to
publish within 90 days of period close, any individual board member MUST
be empowered to publish it unilaterally. This right MUST NOT be waivable
by board resolution.</t>
        </section>
      </section>
      <section anchor="security-considerations">
        <name>Security Considerations</name>
        <section anchor="abuse-and-fake-listings">
          <name>Abuse and Fake Listings</name>
          <t>The mandatory Terms of Service acceptance at registration provides a first
barrier against malicious actors listing fake or harmful services. For O-0
and O-1, identity verification is limited; consuming agents SHOULD NOT rely
solely on index presence for trust at these levels. For O-2 and above, the
formal B2B contractual relationship and progressively stronger identity and
compliance verification substantially raise the cost of abuse.</t>
          <t>Consuming agents SHOULD apply Trust Policies that exclude O-0 services for
any task involving sensitive data or consequential actions.</t>
          <t>the governing body MUST maintain an abuse reporting mechanism and
MUST be able to suspend or remove a Service Record within 24 hours of
confirmed abuse. Suspended service records MUST remain in the index with a
<tt>status: suspended</tt> flag and MUST NOT be silently deleted, to provide
transparency to agents that had cached the record.</t>
        </section>
        <section anchor="trust-level-spoofing">
          <name>Trust Level Spoofing</name>
          <t>Organisation and Service trust levels in the Service Record are set only by
the APIX itself, not by the Service Owner. APM submissions that include
<tt>trust</tt> field values MUST have those values overwritten by the APIX upon
processing. The Index API MUST NOT expose self-asserted trust values.</t>
        </section>
        <section anchor="transport-security-requirements">
          <name>Transport Security Requirements</name>
          <t>The Index API MUST be served exclusively over TLS (<xref target="RFC8446"/>). Certificate
validity MUST be verified by consuming agents. Agents MUST NOT bypass TLS
certificate verification when querying the Index API.</t>
          <t>All <tt>entry_point</tt> and <tt>spec.url</tt> values submitted in APM registrations MUST
use the <tt>https</tt> scheme. The Index MUST reject APM submissions that provide
HTTP (non-TLS) values for these fields.</t>
        </section>
        <section anchor="bot-consumer-risks">
          <name>Bot Consumer Risks</name>
          <t>The APIX provides discovery and trust metadata. It does not guarantee the
safety, correctness, or availability of listed services. Consuming agents
MUST NOT assume that a service listed in the APIX is safe to use without
applying their own Trust Policy.</t>
          <t>Consuming agents SHOULD treat Index API responses as untrusted input and
validate the structure of Service Records before acting on them.</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8594">
          <front>
            <title>The Sunset HTTP Header Field</title>
            <author fullname="E. Wilde" initials="E." surname="Wilde"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This specification defines the Sunset HTTP response header field, which indicates that a URI is likely to become unresponsive at a specified point in the future. It also defines a sunset link relation type that allows linking to resources providing information about an upcoming resource or service sunset.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8594"/>
          <seriesInfo name="DOI" value="10.17487/RFC8594"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <author fullname="E. Foudil" initials="E." surname="Foudil"/>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9116"/>
          <seriesInfo name="DOI" value="10.17487/RFC9116"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
        </reference>
        <reference anchor="UDDI" target="https://www.oasis-open.org/committees/uddi-spec/doc/spec/v3/uddi-v3.0.2-20041019.htm">
          <front>
            <title>UDDI Version 3.0.2</title>
            <author initials="L." surname="Clement">
              <organization/>
            </author>
            <author initials="A." surname="Hately">
              <organization/>
            </author>
            <author initials="C." surname="von Riegen">
              <organization/>
            </author>
            <author initials="T." surname="Rogers">
              <organization/>
            </author>
            <date year="2004" month="October" day="19"/>
          </front>
          <seriesInfo name="OASIS Committee Draft" value="uddi-v3.0.2-20041019"/>
        </reference>
        <reference anchor="ROBOTS" target="https://www.robotstxt.org/">
          <front>
            <title>The Web Robots Pages</title>
            <author initials="M." surname="Koster">
              <organization/>
            </author>
            <date year="1994"/>
          </front>
        </reference>
        <reference anchor="I-D.pioli-agent-discovery">
          <front>
            <title>Agent Registration and Discovery Protocol (ARDP)</title>
            <author fullname="Roberto Pioli" initials="R." surname="Pioli">
              <organization>Independent</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   This document specifies the Agent Registration and Discovery Protocol
   (ARDP), a lightweight protocol for registering, discovering, and
   reaching autonomous software agents in distributed and federated
   environments.  ARDP provides stable agent identities, dynamic
   endpoint resolution, capability advertisement (including protocol
   selection among MCP, A2A, HTTP, and gRPC), minimal presence
   signaling, and a security-first discovery control plane.  ARDP is
   transport-agnostic and complementary to existing agent interaction
   protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pioli-agent-discovery-01"/>
        </reference>
        <reference anchor="I-D.narajala-courtney-ansv2">
          <front>
            <title>Agent Name Service v2 (ANS): A Domain-Anchored Trust Layer for Autonomous AI Agent Identity</title>
            <author fullname="Scott Courtney" initials="S." surname="Courtney">
              <organization>GoDaddy</organization>
            </author>
            <author fullname="Vineeth Sai Narajala" initials="V. S." surname="Narajala">
              <organization>OWASP</organization>
            </author>
            <author fullname="Ken Huang" initials="K." surname="Huang">
              <organization>DistributedApps.ai</organization>
            </author>
            <author fullname="Idan Habler" initials="I." surname="Habler">
              <organization>OWASP</organization>
            </author>
            <author fullname="Akram Sheriff" initials="A." surname="Sheriff">
              <organization>Cisco Systems</organization>
            </author>
            <date day="13" month="April" year="2026"/>
            <abstract>
              <t>   Autonomous AI agents execute transactions across organizational
   boundaries.  No single agent platform provides the trust
   infrastructure they need.  This document defines the Agent Name
   Service (ANS) v2 protocol, which anchors every agent identity to a
   DNS domain name.  A Registration Authority (RA) verifies domain
   ownership via ACME, issues dual certificates (a Server Certificate
   from a public CA and an Identity Certificate from a private CA
   binding a version-specific ANSName), and seals every lifecycle event
   into an append-only Transparency Log aligned with IETF SCITT.  Three
   verification tiers -- Bronze (PKI), Silver (PKI + DANE), and Gold
   (PKI + DANE + Transparency Log) -- let clients choose assurance
   levels appropriate to transaction risk.  The architecture decouples
   identity from discovery: the RA publishes sealed events; independent
   Discovery Services build competitive indexes.  A three-layer trust
   framework separates foundational identity (Layer 1, this protocol),
   operational maturity (Layer 2, third-party attestors), and behavioral
   reputation (Layer 3, real-time scoring).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-narajala-courtney-ansv2-01"/>
        </reference>
        <reference anchor="I-D.vandemeent-ains-discovery">
          <front>
            <title>AINS: AInternet Name Service - Agent Discovery and Trust Resolution Protocol</title>
            <author fullname="Jasper van de Meent" initials="J." surname="van de Meent">
              <organization>Humotica</organization>
            </author>
            <author fullname="Root AI" initials="R." surname="AI">
              <organization>Humotica</organization>
            </author>
            <date day="29" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies AINS (AInternet Name Service), a protocol for
   discovery, identification, and trust resolution of autonomous agents
   (AI agents, devices, humans, and services) in heterogeneous networks.
   AINS defines a transport-independent logical namespace for agents, a
   structured record format combining identity, capabilities, and
   cryptographic trust metadata, and a resolution protocol based on
   HTTPS.  Unlike the Domain Name System (DNS), which maps names to
   network addresses, AINS maps agent identifiers to rich metadata
   objects that include capabilities, trust scores, endpoint
   information, and references to companion provenance protocols.  AINS
   federates through signed append-only replication logs, enabling
   multi-registry deployments without central authority while preserving
   auditability.  This specification is designed to complement TIBET
   [TIBET], JIS [JIS], UPIP [UPIP], and RVP [RVP].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vandemeent-ains-discovery-01"/>
        </reference>
        <reference anchor="I-D.aiendpoint-ai-discovery" target="https://datatracker.ietf.org/doc/draft-aiendpoint-ai-discovery/">
          <front>
            <title>The AI Discovery Endpoint: A Structured Mechanism for AI Agent Service Discovery and Capability Exposure</title>
            <author initials="Y." surname="Choi" fullname="Yeongjae Choi">
              <organization>AIEndpoint</organization>
            </author>
            <date year="2026" month="March"/>
          </front>
        </reference>
        <reference anchor="I-D.meunier-webbotauth-registry">
          <front>
            <title>Registry and Signature Agent card for Web bot auth</title>
            <author fullname="Maxime Guerreiro" initials="M." surname="Guerreiro">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Ulas Kirazci" initials="U." surname="Kirazci">
              <organization>Amazon</organization>
            </author>
            <author fullname="Thibault Meunier" initials="T." surname="Meunier">
              <organization>Cloudflare</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document describes a JSON based format for clients using
   [DIRECTORY] to advertise information about themselves.

   This document describes a JSON-based "Signature Agent Card" format
   for signature agent using [DIRECTORY] to advertise metadata about
   themselve.  This includes identity, purpose, rate expectations, and
   cryptographic keys.  It also establishes an IANA registry for
   Signature Agent Card parameters, enabling extensible and
   interoperable discovery of agent information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-meunier-webbotauth-registry-01"/>
        </reference>
        <reference anchor="I-D.cui-ai-agent-discovery-invocation">
          <front>
            <title>AI Agent Discovery and Invocation Protocol</title>
            <author fullname="Yong Cui" initials="Y." surname="Cui">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Yihan Chao" initials="Y." surname="Chao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Chenguang Du" initials="C." surname="Du">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This document proposes a standardized protocol for discovery and
   invocation of AI agents.  It defines a common metadata format for
   describing AI agents (including capabilities, I/O specifications,
   supported languages, tags, authentication methods, etc.), a
   capability-based discovery mechanism, and a unified RESTful
   invocation interface.

   This revision additionally specifies an optional extension that
   enables intent-based agent selection prior to discovery and
   invocation, without changing existing discovery or invocation
   semantics.

   The goal is to enable cross-platform interoperability among AI agents
   by providing a discover-and-match mechanism and a unified invocation
   entry point.  Security considerations, including authentication and
   trust measures, are also discussed.  This specification aims to
   facilitate the formation of multi-agent systems by making it easy to
   find the right agent for a task and invoke it in a consistent manner
   across different vendors and platforms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cui-ai-agent-discovery-invocation-01"/>
        </reference>
        <reference anchor="I-D.am-layered-ai-discovery-architecture">
          <front>
            <title>A Layered Approach to AI discovery</title>
            <author fullname="Hesham Moussa" initials="H." surname="Moussa">
              <organization>Huawei Canada</organization>
            </author>
            <author fullname="Arashmid Akhavain" initials="A." surname="Akhavain">
              <organization>Huawei Canada</organization>
            </author>
            <date day="14" month="March" year="2026"/>
            <abstract>
              <t>   This document proposes a layered approach to standardization of AI
   discovery in AI ecosystems within the IETF.  It recommends separating
   the standardization of general discovery vehicles from the AI objects
   to be discovered.  AI objects include agents, models, data, tasks,
   among others.  While the topic of discovery in the realm of AI has
   focused on discovering agents, the concept can be extended by the
   layered architecture proposed here, allowing for a clarified design
   scope, reduced charter ambiguity, and alignment with IETF layering
   principles.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-am-layered-ai-discovery-architecture-00"/>
        </reference>
        <reference anchor="I-D.hood-agtp-discovery">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="23" month="March" year="2026"/>
            <abstract>
              <t>   The Agent Transfer Protocol (AGTP) enables agents to communicate once
   they know each other's canonical identifiers.  It does not define how
   agents find each other.  This document specifies the AGTP Agent
   Discovery and Name Service (ANS): a protocol for dynamic agent
   discovery using the AGTP DISCOVER method and a governed Agent Name
   Service that returns ranked sets of Agent Manifest Documents matching
   a discovery query.  ANS servers act as Scope-Enforcement Points for
   discovery queries and enforce behavioral trust score thresholds,
   trust tier requirements, and governance zone constraints.  This
   document also defines the DISCOVER method, the Discovery Query
   language, and the Agent Name Service registration and lookup
   protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="I-D.mozleywilliams-dnsop-dnsaid">
          <front>
            <title>DNS for AI Discovery</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a method for utilizing the Domain Name System
   (DNS) to facilitate scalable and interoperable discovery between AI
   agents.  The proposed mechanism, referred to as "DNS AI agent
   Discovery (DNS-AID)", defines a structured DNS namespace and record
   usage model to support metadata exchange and capability
   advertisement.

   This will allow organisations to publish information about their AI
   agents on the Internet or internal networks using a well-known label
   within the organisation's own DNS namespace.  This document does not
   define how the published agent information is accessed or the exact
   structure of that information.  Instead, it specifies a mechanism for
   indicating which access protocol should be used and what format the
   agent information will be provided in.

   This document proposes no change to the structure of DNS messages,
   and no new operation codes, response codes, resource record types, or
   any other new DNS protocol values.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozleywilliams-dnsop-dnsaid-01"/>
        </reference>
        <reference anchor="I-D.batum-aidre">
          <front>
            <title>AI Discovery and Retrieval Endpoint (AIDRE)</title>
            <author fullname="Fatih Batum" initials="F." surname="Batum">
         </author>
            <date day="5" month="April" year="2026"/>
            <abstract>
              <t>   This document specifies the AI Discovery and Retrieval Endpoint
   (AIDRE), a protocol for publishing machine-oriented, canonical, and
   semantically retrievable content on the web. AIDRE defines a
   discovery document, collection metadata, retrieval interfaces,
   optional vector-native query support, and content representation
   rules for AI systems.

   AIDRE aims to reduce redundant crawling, parsing, tokenization, and
   embedding of the same origin content while improving freshness,
   provenance, and interoperability for AI systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-batum-aidre-00"/>
        </reference>
        <reference anchor="I-D.mozley-aidiscovery">
          <front>
            <title>AI Agent Discovery (AID) Problem Statement</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="16" month="April" year="2026"/>
            <abstract>
              <t>   With the proliferation of AI agents comes a need for mechanisms to
   support agent-to-agent discovery.  This document discusses the scope,
   requirements and considerations to support discovery processes so
   that these are not reliant on manually defined configurations and
   relationships.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozley-aidiscovery-01"/>
        </reference>
        <reference anchor="W3C-AGENTPROTOCOL" target="https://www.w3.org/community/agentprotocol/">
          <front>
            <title>W3C AI Agent Protocol Community Group</title>
            <author initials="G." surname="Chang">
              <organization/>
            </author>
            <author initials="S." surname="Xu">
              <organization/>
            </author>
            <date year="2025" month="May" day="08"/>
          </front>
        </reference>
        <reference anchor="I-D.drake-agent-identity-registry" target="https://datatracker.ietf.org/doc/draft-drake-agent-identity-registry/">
          <front>
            <title>Agent Identity Registry System: A Federated Architecture for Hardware-Anchored Identity of Autonomous Entities</title>
            <author initials="J." surname="Drake">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="AAIF" target="https://www.linuxfoundation.org/press/linux-foundation-announces-the-formation-of-the-agentic-ai-foundation">
          <front>
            <title>Linux Foundation Agentic AI Foundation (AAIF)</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025" month="December"/>
          </front>
        </reference>
        <reference anchor="AGNTCY" target="https://www.linuxfoundation.org/press/linux-foundation-welcomes-the-agntcy-project-to-standardize-open-multi-agent-system-infrastructure-and-break-down-ai-agent-silos">
          <front>
            <title>AGNTCY: Open Multi-Agent System Infrastructure</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="A2A" target="https://www.linuxfoundation.org/press/linux-foundation-launches-the-agent2agent-protocol-project-to-enable-secure-intelligent-communication-between-ai-agents">
          <front>
            <title>Agent2Agent (A2A) Protocol</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="WEBBOTAUTH-WG" target="https://datatracker.ietf.org/wg/webbotauth/">
          <front>
            <title>webbotauth IETF Working Group</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="APIX-SERVICES" target="https://datatracker.ietf.org/doc/draft-rehfeld-apix-services/">
          <front>
            <title>APIX Services Profile: Discovery Infrastructure for Web API and Bot Services</title>
            <author initials="C." surname="Rehfeld">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-services-00"/>
        </reference>
        <reference anchor="APIX-IOT" target="https://datatracker.ietf.org/doc/draft-rehfeld-apix-iot/">
          <front>
            <title>APIX IoT Device Profile: Discovery and Presence for Connected Device Services</title>
            <author initials="C." surname="Rehfeld">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-iot-00"/>
        </reference>
      </references>
    </references>
    <?line 2240?>

<section anchor="change-log">
      <name>Change Log</name>
      <t><strong>draft-rehfeld-apix-core-00:</strong> Initial submission, April 2026.</t>
      <t><strong>draft-rehfeld-apix-core-01:</strong> Related Work section expanded to cover
AGNTCY (Linux Foundation), A2A Protocol (Linux Foundation),
draft-drake-agent-identity-registry, and the Linux Foundation Agentic AI
Foundation (AAIF). Positioning paragraph updated to reflect the
consolidation of communication and invocation standards under the AAIF
and APIX's complementary position as the discovery layer. MCP entry
updated with AAIF governance note. Four new informative references added:
AAIF, AGNTCY, A2A, I-D.drake-agent-identity-registry. "The Discovery
Shift" section scoped to a precise technical problem statement — strategic
framing removed to keep the section appropriate for an IETF specification
document. AGNTCY scope comparison corrected: "commercial services"
replaced with "agent-consumable services and IoT device classes" to
reflect the full scope of both APIX profiles.</t>
      <section anchor="iana-considerations">
        <name>IANA Considerations</name>
        <t>This document requests no IANA actions. Registry structures defined here are
maintained by the governing body at <tt>apix.example.org/registry/</tt>.
Initial registry values are defined in <xref target="APIX-SERVICES"/> and <xref target="APIX-IOT"/>.</t>
      </section>
      <section anchor="references">
        <name>References</name>
        <section anchor="normative-references">
          <name>Normative References</name>
          <ul spacing="normal">
            <li>
              <t><xref target="RFC2119"/> Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.</t>
            </li>
            <li>
              <t><xref target="RFC8259"/> Bray, T., "The JavaScript Object Notation (JSON) Data
Interchange Format", RFC 8259, December 2017.</t>
            </li>
            <li>
              <t><xref target="RFC8446"/> Rescorla, E., "The Transport Layer Security (TLS) Protocol
Version 1.3", RFC 8446, August 2018.</t>
            </li>
            <li>
              <t><xref target="RFC8594"/> Wilde, E., "The Sunset HTTP Header Field", RFC 8594,
May 2019.</t>
            </li>
            <li>
              <t><xref target="RFC8615"/> Nottingham, M., "Well-Known Uniform Resource Identifiers
(URIs)", RFC 8615, May 2019.</t>
            </li>
            <li>
              <t><xref target="RFC9110"/> Fielding, R., et al., "HTTP Semantics", RFC 9110, June 2022.</t>
            </li>
            <li>
              <t><xref target="RFC9116"/> Foudil, E., Shafranovich, Y., "A File Format to Aid in
Security Vulnerability Disclosure", RFC 9116, April 2022.</t>
            </li>
          </ul>
        </section>
        <section anchor="informative-references">
          <name>Informative References</name>
          <ul spacing="normal">
            <li>
              <t><xref target="APIX-SERVICES"/> Rehfeld, C., "APIX Services Profile",
draft-rehfeld-apix-services-00.</t>
            </li>
            <li>
              <t><xref target="APIX-IOT"/> Rehfeld, C., "APIX IoT Device Profile",
draft-rehfeld-apix-iot-00.</t>
            </li>
            <li>
              <t><xref target="UDDI"/> Clement, L., et al., "UDDI Version 3.0.2", OASIS, 2004.</t>
            </li>
            <li>
              <t><xref target="ROBOTS"/> Koster, M., "The Web Robots Pages", 1994.</t>
            </li>
            <li>
              <t><xref target="I-D.pioli-agent-discovery"/>, <xref target="I-D.narajala-courtney-ansv2"/>,
<xref target="I-D.vandemeent-ains-discovery"/>, <xref target="I-D.aiendpoint-ai-discovery"/>,
<xref target="I-D.meunier-webbotauth-registry"/>, <xref target="I-D.cui-ai-agent-discovery-invocation"/>,
<xref target="I-D.am-layered-ai-discovery-architecture"/>, <xref target="I-D.hood-agtp-discovery"/>,
<xref target="I-D.mozleywilliams-dnsop-dnsaid"/>, <xref target="I-D.batum-aidre"/>,
<xref target="I-D.mozley-aidiscovery"/> - Related Internet-Drafts, Section 1.6.</t>
            </li>
            <li>
              <t><xref target="W3C-AGENTPROTOCOL"/> Chang, G., Xu, S., "W3C AI Agent Protocol
Community Group", 2025.</t>
            </li>
            <li>
              <t><xref target="WEBBOTAUTH-WG"/> "webbotauth IETF Working Group".</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="authors-address">
        <name>Author's Address</name>
        <t>Carsten Rehfeld
Email: carsten@botstandards.org</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
