<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-verifiable-agent-conversations-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Verifiable ACRs">Verifiable Agent Conversation Records</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-verifiable-agent-conversations-00"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization/>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="T." surname="Heldt" fullname="Tobias Heldt">
      <organization/>
      <address>
        <email>tobias@xor.tech</email>
      </address>
    </author>
    <author initials="O." surname="Steele" fullname="Orie Steele">
      <organization/>
      <address>
        <email>orie@or13.io</email>
      </address>
    </author>
    <date year="2026" month="February" day="25"/>
    <area>Security</area>
    <keyword>verifiable</keyword>
    <keyword>evidence</keyword>
    <keyword>transparency</keyword>
    <keyword>compliance</keyword>
    <keyword>auditability</keyword>
    <abstract>
      <?line 200?>

<t>Autonomous agents based on large language models increasingly perform consequential tasks on behalf of humans and other agents.
Demonstrating that recorded agent behavior truthfully represents actual behavior is essential for accountability, compliance, and human oversight.
This document defines a data format for verifiable agent conversation records using CDDL, with representations in both JSON and CBOR.
The format captures session metadata, message exchanges, tool invocations, reasoning traces, and system events in a structured, extensible CDDL definition for verifiable agent conversation records.
COSE is used as the signing method to allow for native interoperability in SCITT Transparency Services and the CDDL definition allows for seemless integration in Evidence as specified in RFC 9334.
The specification supports cross-vendor interoperability by defining a common representation that accommodates translation from multiple existing agent implementations with distinct data structure layouts that are typically represented in JSON.</t>
    </abstract>
  </front>
  <middle>
    <?line 209?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The question of whether the recorded output of an autonomous agent faithfully represents an agent's actual behavior has found new urgency as the number of consequential tasks that are delegated to agents increases rapidly.
Autonomous Agents--typically workload instances of agentic artificial intelligence (AI) based on large language models (LLM)--interact with other actors by design.
This creates an interconnected web of agent interactions and conversations that is currently rarely supervised in a systemic manner.
In essence, the two main types of actors interacting with autonomous agents are humans and machines (e.g., other autonomous agents), or a mix of them.
In agentic AI systems, machine actors interact with other machine actors.
The number of interactions between machine actors grows significantly more than the number of interactions between human actors and machine actors.
While the responsible parties for agent actions ultimately are humans--whether a natural legal entity or an organization--agents act on behalf of humans and on behalf of other agents.
To demonstrate due diligence, responsible human parties require records of agent behavior to demonstrate policy compliant behavior for agents acting under their authority.
These increasingly complex interactions between multiple actors that can also be triggered by machines (recursively) increase the need to understand decision making and the chain of thoughts (CoT) of autonomous agents, retroactively (i.e., accountability and auditability after the fact).</t>
      <t>The verifiable records of agent conversations that are specified in this document provide an essential basis for operators to detect divergences between intended and actual agent behavior after the interaction has concluded.</t>
      <t>For example:</t>
      <ul spacing="normal">
        <li>An agent authorized to read files might invoke tools to modify production systems or exfiltrate sensitive data beyond its authorization scope.</li>
        <li>An agent's visible CoT output might diverge from the reasoning that actually produced its actions.</li>
        <li>An agent might deliberately underperform during capability evaluations while performing at full capacity during deployment.</li>
      </ul>
      <t>This document defines conversation records representing activities of autonomous agents such that long-term preservation of the evidentiary value of these records across chains of custody (CoC) is possible.</t>
      <t>This document defines verifiable records of agent conversations as a building block towards seven dedicated goals:</t>
      <ol spacing="normal" type="1">
        <li>The first goal is to assure that the recording of an agent conversation (a distinct segment of the interaction with an autonomous agent) being proffered is the same as the agent conversation that actually occurred.</li>
        <li>The second goal is to provide a general structure of agent conversations that can represent most common types of agent conversation frames, is extensible, and allows for future evolution of agent conversation complexity and corresponding actor interaction.</li>
        <li>The third goal is to use existing IETF building blocks to present believable evidence about how an agent conversation is recorded utilizing Evidence generation as laid out in the Remote ATtestation ProcedureS architecture <xref target="RFC9334"/>.</li>
        <li>The fourth goal is to use existing IETF building blocks to render conversation records auditable after the fact and enable non-repudiation as laid out in the Supply Chain Integrity, Transparency, and Trust architecture <xref target="I-D.ietf-scitt-architecture"/>.</li>
        <li>The fifth goal is to enable detection of behavioral anomalies in agent interactions, including unauthorized tool invocations, inconsistencies between reasoning traces and actions, and performance modulation across evaluation and deployment contexts, through structured, comparable conversation records.</li>
        <li>The sixth goal is to enable cross-vendor interoperability by defining a common representation for agent conversations that can be translated from multiple existing agent implementations with distinct native formats.</li>
        <li>The seventh goal is to produce records suitable for demonstrating compliance with emerging regulatory requirements for AI system documentation, traceability, and human oversight.</li>
      </ol>
      <t>Most agent conversations today are represented in "human-readable" text formats.
For example, JSON <xref target="STD90"/> is considered to be "human-readable" as it can be presented to humans in human-computer-interfaces (HCI) via off-the-shelf tools, e.g., pre-installed text editors that allow such data to be consumed or modified by humans.
The Concise Binary Object Representation (CBOR <xref target="STD94"/>) is used as an alternative representation next to the established representation that is JSON.</t>
      <t>In this version of the document the signing of JSON payloads is done via <xref target="STD90"/>.
Using <xref target="STD90"/> enables interoperability with Transparency Services specified by the IETF <xref target="I-D.ietf-scitt-architecture"/> and enables low-threshold cross-application and cross-stakeholder interoperability across the Internet.</t>
      <t>Note: further improvements in support of in-memory processing, further compacting human-readable text strings, and using CBOR as an alternative representation for verifiable records of agent conversations will follow.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats of agent conversations for JSON and CBOR (with no optimization for CBOR, currently).</t>
        <t>The reader is assumed to be familiar with the vocabulary and concepts defined in <xref target="RFC9334"/> and <xref target="I-D.ietf-scitt-architecture"/>.</t>
      </section>
    </section>
    <section anchor="compliance-requirements-for-ai-agent-conversation-records">
      <name>Compliance Requirements for AI Agent Conversation Records</name>
      <t>This section identifies the intersection of logging, traceability, and record-keeping requirements across major compliance frameworks applicable to AI systems.
The verifiable agent conversation format defined in this document addresses these requirements by providing a standardized, cryptographically verifiable record of AI agent interactions.</t>
      <section anchor="applicable-requirement-frameworks">
        <name>Applicable Requirement Frameworks</name>
        <t>The following frameworks were analyzed for their requirements on AI agent traceability and session logging:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Framework</th>
              <th align="left">Jurisdiction</th>
              <th align="left">Sector</th>
              <th align="left">Status</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">EU AI Act <xref target="EU_AI_ACT_2024"/></td>
              <td align="left">EU</td>
              <td align="left">Cross-sector</td>
              <td align="left">In force Aug 2024</td>
            </tr>
            <tr>
              <td align="left">Cyber Resilience Act <xref target="EU_CRA_2024"/></td>
              <td align="left">EU</td>
              <td align="left">Products with digital elements</td>
              <td align="left">In force Dec 2024</td>
            </tr>
            <tr>
              <td align="left">NIS2 Directive <xref target="EU_NIS2_2022"/></td>
              <td align="left">EU</td>
              <td align="left">Essential/important entities</td>
              <td align="left">Transposed Oct 2024</td>
            </tr>
            <tr>
              <td align="left">ETSI TS 104 223 <xref target="ETSI_TS_104223_2025"/></td>
              <td align="left">EU/International</td>
              <td align="left">AI systems</td>
              <td align="left">Published Apr 2025</td>
            </tr>
            <tr>
              <td align="left">SOC 2 Trust Services Criteria <xref target="AICPA_TSC_2017"/></td>
              <td align="left">US/International</td>
              <td align="left">Service organizations</td>
              <td align="left">Active</td>
            </tr>
            <tr>
              <td align="left">FedRAMP <xref target="NIST_SP_800_53_R5"/> <xref target="OMB_M_21_31"/></td>
              <td align="left">US</td>
              <td align="left">Federal cloud services</td>
              <td align="left">Active</td>
            </tr>
            <tr>
              <td align="left">PCI DSS <xref target="PCI_DSS_V4_0_1"/></td>
              <td align="left">International</td>
              <td align="left">Payment card industry</td>
              <td align="left">Mandatory Mar 2025</td>
            </tr>
            <tr>
              <td align="left">ISO/IEC 42001 <xref target="ISO_IEC_42001_2023"/></td>
              <td align="left">International</td>
              <td align="left">AI management systems</td>
              <td align="left">Published 2023</td>
            </tr>
            <tr>
              <td align="left">FFIEC IT Handbook <xref target="FFIEC_IT_HANDBOOK_2024"/></td>
              <td align="left">US</td>
              <td align="left">Financial institutions</td>
              <td align="left">Updated 2024</td>
            </tr>
            <tr>
              <td align="left">BSI AI Finance Test Criteria <xref target="BSI_AI_FINANCE_2024"/></td>
              <td align="left">Germany</td>
              <td align="left">Financial sector AI</td>
              <td align="left">Published 2024</td>
            </tr>
            <tr>
              <td align="left">NIST AI 100-2 <xref target="NIST_AI_100_2_E2025"/></td>
              <td align="left">US</td>
              <td align="left">Cross-sector</td>
              <td align="left">Published 2025</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="common-requirements-intersection">
        <name>Common Requirements Intersection</name>
        <t>The analysis of the frameworks listed above results in eleven categories of requirements that appear across ALL or MOST frameworks.
These categories frame and represent a minimum baseline that verifiable agent conversation records <bcp14>MUST</bcp14> support.</t>
        <section anchor="req-1-automatic-event-logging">
          <name>REQ-1: Automatic Event Logging</name>
          <t>All frameworks require automatic, system-generated logging of events without reliance on manual recording.
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Requirement</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">EU AI Act Art. 12</td>
                <td align="left">"High-risk AI systems shall technically allow for the automatic recording of events (logs)"</td>
              </tr>
              <tr>
                <td align="left">ETSI TS 104223 5.4.2-1</td>
                <td align="left">"System Operators shall log system and user actions"</td>
              </tr>
              <tr>
                <td align="left">SOC 2 CC7.2</td>
                <td align="left">"Complete and chronological record of all user actions and system responses"</td>
              </tr>
              <tr>
                <td align="left">FedRAMP AU-12</td>
                <td align="left">"Audit Record Generation" control requirement</td>
              </tr>
              <tr>
                <td align="left">PCI DSS 4.0 Req 10</td>
                <td align="left">"Audit logs implemented to support detection of anomalies"</td>
              </tr>
              <tr>
                <td align="left">ISO 42001 A.6.2.8</td>
                <td align="left">"AI system recording of event logs"</td>
              </tr>
            </tbody>
          </table>
          <t>Mapping to this specification:
The <tt>entries</tt> array in <tt>session-trace</tt> captures all events automatically.
Each <tt>entry</tt> represents a discrete, system-recorded event with structured metadata.</t>
        </section>
        <section anchor="req-2-timestamp-requirements">
          <name>REQ-2: Timestamp Requirements</name>
          <t>Most frameworks require precise temporal information for each logged event.
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Requirement</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">EU AI Act Art. 12(2)</td>
                <td align="left">"Precise timestamps for each usage session" (biometric systems)</td>
              </tr>
              <tr>
                <td align="left">PCI DSS 4.0 Req 10.6</td>
                <td align="left">"Time-synchronization mechanisms support consistent time settings"</td>
              </tr>
              <tr>
                <td align="left">SOC 2</td>
                <td align="left">"When the activity was performed via timestamp"</td>
              </tr>
              <tr>
                <td align="left">NIS2</td>
                <td align="left">"Precise logging of when an incident was first detected"</td>
              </tr>
            </tbody>
          </table>
          <t>Mapping to this specification:
The <tt>timestamp</tt> field in each entry uses <tt>abstract-timestamp</tt> which accepts both RFC 3339 strings and POSIX Seconds since Epoch, ensuring interoperability across implementations.</t>
        </section>
        <section anchor="req-3-actor-identification">
          <name>REQ-3: Actor Identification</name>
          <t>Most frameworks require some attribution of actions to identifiable actors (human or system).
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Requirement</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">EU AI Act Art. 12(3)(d)</td>
                <td align="left">"Identification of the natural persons involved in the verification of results"</td>
              </tr>
              <tr>
                <td align="left">SOC 2</td>
                <td align="left">"The process or user who initiated the activity (Who)"</td>
              </tr>
              <tr>
                <td align="left">PCI DSS 4.0</td>
                <td align="left">Attribution to "Who" performed each action</td>
              </tr>
              <tr>
                <td align="left">FedRAMP AC-2</td>
                <td align="left">Account management and identification</td>
              </tr>
            </tbody>
          </table>
          <t>Mapping to this specification:
The <tt>contributor</tt> type captures actor attribution with <tt>type</tt> (human/ai/mixed/unknown) and optional <tt>model-id</tt>.
Session-level <tt>agent-meta</tt> identifies the AI system.</t>
        </section>
        <section anchor="req-4-actionevent-type-recording">
          <name>REQ-4: Action/Event Type Recording</name>
          <t>All frameworks require recording of what action or event occurred.
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Requirement</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">EU AI Act Art. 12</td>
                <td align="left">"Events relevant for identifying situations that may result in...risk"</td>
              </tr>
              <tr>
                <td align="left">ETSI TS 104223 5.2.4-3</td>
                <td align="left">"Audit log of changes to system prompts or other model configuration"</td>
              </tr>
              <tr>
                <td align="left">SOC 2</td>
                <td align="left">"The action they performed such as file transferred, created, or deleted (What)"</td>
              </tr>
              <tr>
                <td align="left">PCI DSS 4.0</td>
                <td align="left">"What" component of audit trail</td>
              </tr>
            </tbody>
          </table>
          <t>Mapping to this specification:
The <tt>type</tt> field in each entry discriminates event types: <tt>user</tt>, <tt>assistant</tt>, <tt>tool-call</tt>, <tt>tool-result</tt>, <tt>reasoning</tt>, <tt>system-event</tt>.</t>
        </section>
        <section anchor="req-5-inputoutput-recording-ai-specific">
          <name>REQ-5: Input/Output Recording (AI-Specific)</name>
          <t>All AI-specific frameworks require recording of inputs (prompts) and outputs (responses).
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Requirement</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">EU AI Act Art. 12(3)(c)</td>
                <td align="left">"The input data for which the search has led to a match"</td>
              </tr>
              <tr>
                <td align="left">PCI DSS AI Guidance</td>
                <td align="left">"Logging should be sufficient to audit the prompt inputs and reasoning process"</td>
              </tr>
              <tr>
                <td align="left">ETSI TS 104223 5.1.2-3</td>
                <td align="left">"Operation, and lifecycle management of models, datasets and prompts"</td>
              </tr>
              <tr>
                <td align="left">FFIEC VII.D</td>
                <td align="left">"Lack of explainability...unclear how inputs are translated into outputs"</td>
              </tr>
            </tbody>
          </table>
          <t>Mapping to this specification:</t>
          <ul spacing="normal">
            <li>
              <tt>message-entry</tt> (type: "user"): User/system input (prompt)</li>
            <li>
              <tt>message-entry</tt> (type: "assistant"): Model response</li>
            <li>
              <tt>tool-call-entry.input</tt>: Tool invocation parameters</li>
            <li>
              <tt>tool-result-entry.output</tt>: Tool execution results</li>
            <li>
              <tt>reasoning-entry.content</tt>: Chain-of-thought (where available)</li>
          </ul>
        </section>
        <section anchor="req-6-retention-period-requirements">
          <name>REQ-6: Retention Period Requirements</name>
          <t>Most frameworks specify minimum retention periods for audit logs.
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Minimum Retention</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">EU AI Act Art. 19</td>
                <td align="left">6 months (longer for financial services)</td>
              </tr>
              <tr>
                <td align="left">FedRAMP (M-21-31)</td>
                <td align="left">12 months active + 18 months cold storage</td>
              </tr>
              <tr>
                <td align="left">PCI DSS 4.0</td>
                <td align="left">12 months total, 3 months immediate access</td>
              </tr>
              <tr>
                <td align="left">NIS2</td>
                <td align="left">Per member state law</td>
              </tr>
            </tbody>
          </table>
          <t>Recommendation:
Implementations <bcp14>SHOULD</bcp14> retain verifiable agent conversation records for at least 12 months to satisfy the most common requirement threshold.</t>
        </section>
        <section anchor="req-7-tamper-evidence-and-integrity-protection">
          <name>REQ-7: Tamper-Evidence and Integrity Protection</name>
          <t>All frameworks require some protection against unauthorized modification of logs.
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Requirement</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">PCI DSS 4.0 Req 10.5</td>
                <td align="left">"Tamper-proof audit trails...logs cannot be altered retroactively"</td>
              </tr>
              <tr>
                <td align="left">FedRAMP</td>
                <td align="left">"Effective chain of evidence to ensure integrity"</td>
              </tr>
              <tr>
                <td align="left">SOC 2</td>
                <td align="left">Log integrity as security control</td>
              </tr>
              <tr>
                <td align="left">CRA</td>
                <td align="left">"Tamper-proof SBOMs and vulnerability disclosures"</td>
              </tr>
            </tbody>
          </table>
          <t>Mapping to this specification:
The <tt>signed-agent-record</tt> type (COSE_Sign1 envelope) provides cryptographic integrity protection.
The <tt>content-hash</tt> field in <tt>trace-metadata</tt> enables verification of payload integrity.</t>
        </section>
        <section anchor="req-8-incident-response-support">
          <name>REQ-8: Incident Response Support</name>
          <t>All frameworks require some logs to support incident investigation and response.
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Requirement</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">NIS2 Art. 23</td>
                <td align="left">24-hour initial notification, 72-hour assessment</td>
              </tr>
              <tr>
                <td align="left">CRA</td>
                <td align="left">24-hour vulnerability notification to ENISA</td>
              </tr>
              <tr>
                <td align="left">ETSI TS 104223 5.4.2-1</td>
                <td align="left">Logs for "incident investigations, and vulnerability remediation"</td>
              </tr>
              <tr>
                <td align="left">FedRAMP</td>
                <td align="left">Incident reporting and continuous monitoring</td>
              </tr>
            </tbody>
          </table>
          <t>Mapping to this specification:
The structured format enables rapid extraction of relevant entries by timestamp range, event type, or tool invocation for incident reconstruction.</t>
        </section>
        <section anchor="req-9-anomaly-and-risk-detection-support">
          <name>REQ-9: Anomaly and Risk Detection Support</name>
          <t>All frameworks require some logs to enable detection of anomalous or risky behavior.
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Requirement</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">EU AI Act Art. 12(2)(a)</td>
                <td align="left">"Identifying situations that may result in...risk"</td>
              </tr>
              <tr>
                <td align="left">ETSI TS 104223 5.4.2-2</td>
                <td align="left">"Detect anomalies, security breaches, or unexpected behaviour"</td>
              </tr>
              <tr>
                <td align="left">FedRAMP SI-4</td>
                <td align="left">"Anomaly detection"</td>
              </tr>
              <tr>
                <td align="left">SOC 2</td>
                <td align="left">"Anomaly detection" for security monitoring</td>
              </tr>
            </tbody>
          </table>
          <t>Mapping to this specification:
The standardized entry types and structured <tt>tool-call</tt>/<tt>tool-result</tt> pairs enable automated analysis for detecting:</t>
          <ul spacing="normal">
            <li>Unusual tool invocation patterns</li>
            <li>Failed operations (via <tt>status</tt> and <tt>is-error</tt> fields)</li>
            <li>Unexpected reasoning patterns</li>
            <li>Token usage anomalies</li>
          </ul>
        </section>
        <section anchor="req-10-human-oversight-enablement">
          <name>REQ-10: Human Oversight Enablement</name>
          <t>All AI-specific frameworks require logs to support human review and oversight.
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Requirement</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">EU AI Act Art. 26(5)</td>
                <td align="left">"Monitoring the operation of high-risk AI systems"</td>
              </tr>
              <tr>
                <td align="left">ETSI TS 104223 5.1.4-1</td>
                <td align="left">"Capabilities to enable human oversight"</td>
              </tr>
              <tr>
                <td align="left">ISO 42001</td>
                <td align="left">Human responsibility and accountability</td>
              </tr>
              <tr>
                <td align="left">FFIEC VII.D</td>
                <td align="left">"Dynamic updating...challenges to monitoring and independently reviewing AI"</td>
              </tr>
            </tbody>
          </table>
          <t>Mapping to this specification:
The <tt>reasoning-entry</tt> type captures chain-of-thought content (where available), enabling human reviewers to understand AI decision-making processes.
The hierarchical <tt>children</tt> field preserves conversation structure.</t>
        </section>
        <section anchor="req-11-traceability-and-reproducibility">
          <name>REQ-11: Traceability and Reproducibility</name>
          <t>All frameworks require some ability to trace system behavior and reconstruct events.
Explicit requirements are listed as follows:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Framework</th>
                <th align="left">Requirement</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">EU AI Act Art. 12</td>
                <td align="left">"Level of traceability of the functioning...appropriate to the intended purpose"</td>
              </tr>
              <tr>
                <td align="left">ISO 42001</td>
                <td align="left">"Traceability" as key factor including "data provenance, model traceability"</td>
              </tr>
              <tr>
                <td align="left">CRA</td>
                <td align="left">"Traceability in the software supply chain"</td>
              </tr>
              <tr>
                <td align="left">ETSI TS 104223 5.2.1-2</td>
                <td align="left">"Track, authenticate, manage version control"</td>
              </tr>
            </tbody>
          </table>
          <t>Mapping to this specification:</t>
          <ul spacing="normal">
            <li>
              <tt>session-id</tt>: Links entries to sessions</li>
            <li>
              <tt>entry-id</tt> and <tt>parent-id</tt>: Enables conversation tree reconstruction</li>
            <li>
              <tt>vcs-context</tt>: Git commit/branch for code state</li>
            <li>
              <tt>agent-meta</tt>: Model version and CLI version</li>
            <li>
              <tt>file-attribution</tt>: Code provenance tracking</li>
          </ul>
        </section>
      </section>
      <section anchor="framework-specific-requirements">
        <name>Framework-Specific Requirements</name>
        <section anchor="eu-ai-act-high-risk">
          <name>EU AI Act (High-Risk Systems)</name>
          <t>For AI systems classified as high-risk under Annex III of the EU AI Act <xref target="EU_AI_ACT_2024"/>, additional requirements apply:</t>
          <ol spacing="normal" type="1">
            <li>
              <t>Biometric identification systems (Annex III, 1(a)) require logging of:
              </t>
              <ul spacing="normal">
                <li>Precise timestamps for start/end of each usage session</li>
                <li>Reference database used during input data validation</li>
                <li>Input data leading to matches</li>
                <li>Natural persons involved in result verification</li>
              </ul>
            </li>
            <li>Log retention: Minimum 6 months; financial services may require longer per sector-specific regulation.</li>
            <li>Authority Access: Art. 19 of <xref target="EU_AI_ACT_2024"/> requires provision of logs to competent authorities upon reasoned request.</li>
          </ol>
        </section>
        <section anchor="etsi-logging">
          <name>ETSI TS 104 223 Session Logging Requirements</name>
          <t>ETSI TS 104 223 <xref target="ETSI_TS_104223_2025"/> provides the most detailed AI-specific logging requirements:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Provision</th>
                <th align="left">Requirement</th>
                <th align="left">This Spec Mapping</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">5.1.2-3</td>
                <td align="left">Audit trail for "operation, and lifecycle management of models, datasets and prompts"</td>
                <td align="left">
                  <tt>session-trace</tt>, <tt>agent-meta</tt></td>
              </tr>
              <tr>
                <td align="left">5.2.4-1</td>
                <td align="left">"Document and maintain a clear audit trail of their system design"</td>
                <td align="left">
                  <tt>recording-agent</tt>, open maps</td>
              </tr>
              <tr>
                <td align="left">5.2.4-3</td>
                <td align="left">"Audit log of changes to system prompts or other model configuration"</td>
                <td align="left">
                  <tt>event-entry</tt> with prompt changes</td>
              </tr>
              <tr>
                <td align="left">5.4.2-1</td>
                <td align="left">"Log system and user actions to support security compliance, incident investigations"</td>
                <td align="left">
                  <tt>entries</tt> array</td>
              </tr>
              <tr>
                <td align="left">5.4.2-2</td>
                <td align="left">"Analyse their logs to ensure...desired outputs and to detect anomalies"</td>
                <td align="left">Structured format enables analysis</td>
              </tr>
              <tr>
                <td align="left">5.4.2-3</td>
                <td align="left">"Monitor internal states of their AI systems"</td>
                <td align="left">
                  <tt>reasoning-entry</tt>, <tt>token-usage</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="pci-dss-ai">
          <name>PCI DSS AI-Specific Guidance</name>
          <t>The PCI Security Standards Council has published guidance on AI in payment environments <xref target="PCI_DSS_V4_0_1"/>:
"Where possible, logging should be sufficient to audit the prompt inputs and reasoning process used by the AI system that led to the output provided."</t>
          <t>This specification directly addresses this requirement through:</t>
          <ul spacing="normal">
            <li>
              <tt>message-entry</tt> (type: "user"): Captures prompt inputs</li>
            <li>
              <tt>reasoning-entry</tt>: Captures chain-of-thought (where available)</li>
            <li>
              <tt>message-entry</tt> (type: "assistant"): Captures model outputs</li>
            <li>
              <tt>tool-call-entry</tt> / <tt>tool-result-entry</tt>: Captures agentic actions</li>
          </ul>
        </section>
        <section anchor="financial-sector">
          <name>Financial Sector Requirements (FFIEC, BSI)</name>
          <t>Financial institutions face additional scrutiny for AI systems per <xref target="FFIEC_IT_HANDBOOK_2024"/> and <xref target="BSI_AI_FINANCE_2024"/>:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Requirement Area</th>
                <th align="left">FFIEC</th>
                <th align="left">BSI AI Finance</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Explainability</td>
                <td align="left">"Lack of transparency or explainability" risk</td>
                <td align="left">Test criteria for explainability</td>
              </tr>
              <tr>
                <td align="left">Dynamic updating</td>
                <td align="left">"Challenges to monitoring and independently reviewing AI"</td>
                <td align="left">Continuous validation</td>
              </tr>
              <tr>
                <td align="left">Audit trail</td>
                <td align="left">Log management (VI.B.7)</td>
                <td align="left">Complete audit trail</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="compliance-mapping-table">
        <name>Compliance Mapping Table</name>
        <t>The following table maps this specification's data elements to compliance requirements:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Data Element</th>
              <th align="left">EU AI Act</th>
              <th align="left">ETSI 104223</th>
              <th align="left">SOC 2</th>
              <th align="left">FedRAMP</th>
              <th align="left">PCI DSS</th>
              <th align="left">ISO 42001</th>
              <th align="left">NIS2</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>timestamp</tt></td>
              <td align="left">Art. 12(2)</td>
              <td align="left">5.4.2-1</td>
              <td align="left">CC7.2</td>
              <td align="left">AU-8</td>
              <td align="left">10.6</td>
              <td align="left">A.6.2.8</td>
              <td align="left">Art. 23</td>
            </tr>
            <tr>
              <td align="left">
                <tt>session-id</tt></td>
              <td align="left">Art. 12</td>
              <td align="left">5.2.4-1</td>
              <td align="left">CC7.2</td>
              <td align="left">AU-3</td>
              <td align="left">10.2</td>
              <td align="left">A.6.2.8</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">
                <tt>entry.type</tt></td>
              <td align="left">Art. 12(2)</td>
              <td align="left">5.4.2-1</td>
              <td align="left">CC7.2</td>
              <td align="left">AU-3</td>
              <td align="left">10.2</td>
              <td align="left">A.6.2.8</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">
                <tt>contributor</tt></td>
              <td align="left">Art. 12(3)(d)</td>
              <td align="left">5.1.4</td>
              <td align="left">CC6.1</td>
              <td align="left">AC-2</td>
              <td align="left">10.2</td>
              <td align="left">A.6.2.8</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">
                <tt>message-entry.content</tt></td>
              <td align="left">Art. 12(3)(c)</td>
              <td align="left">5.1.2-3</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">AI Guide</td>
              <td align="left">-</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">
                <tt>reasoning-entry</tt></td>
              <td align="left">Art. 12</td>
              <td align="left">5.4.2-3</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">AI Guide</td>
              <td align="left">A.7.1</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">
                <tt>tool-call-entry</tt> / <tt>tool-result-entry</tt></td>
              <td align="left">Art. 12</td>
              <td align="left">5.4.2-1</td>
              <td align="left">CC7.2</td>
              <td align="left">AU-12</td>
              <td align="left">10.2</td>
              <td align="left">A.6.2.8</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">
                <tt>signed-agent-record</tt></td>
              <td align="left">Art. 19</td>
              <td align="left">5.2.4-1.2</td>
              <td align="left">CC6.1</td>
              <td align="left">AU-9</td>
              <td align="left">10.5</td>
              <td align="left">-</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">
                <tt>vcs-context</tt></td>
              <td align="left">-</td>
              <td align="left">5.2.1-2</td>
              <td align="left">-</td>
              <td align="left">CM-3</td>
              <td align="left">-</td>
              <td align="left">A.6.2.8</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">
                <tt>token-usage</tt></td>
              <td align="left">-</td>
              <td align="left">5.4.2-4</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="security-requirements-addressing-regulatory-compliance">
        <name>Security Requirements addressing Regulatory Compliance</name>
        <section anchor="log-integrity">
          <name>Log Integrity</name>
          <t>Per PCI DSS <xref target="PCI_DSS_V4_0_1"/> Req 10.5 and FedRAMP <xref target="NIST_SP_800_53_R5"/> AU-9, logs <bcp14>MUST</bcp14> be protected against modification.
Implementations <bcp14>SHOULD</bcp14>:</t>
          <ol spacing="normal" type="1">
            <li>Use the <tt>signed-agent-record</tt> envelope for cryptographic integrity</li>
            <li>Store the <tt>content-hash</tt> for offline verification</li>
            <li>Implement write-once storage for log archives</li>
          </ol>
        </section>
        <section anchor="access-control">
          <name>Access Control</name>
          <t>Per FedRAMP <xref target="NIST_SP_800_53_R5"/> AC-3 and ETSI <xref target="ETSI_TS_104223_2025"/> 5.2.2-1, access to logs <bcp14>MUST</bcp14> be controlled:</t>
          <ol spacing="normal" type="1">
            <li>Logs containing sensitive prompts or outputs require access control</li>
            <li>Reasoning content may contain confidential information</li>
            <li>Authority access (EU AI Act Art. 19) requires audit of log access itself</li>
          </ol>
        </section>
        <section anchor="data-protection">
          <name>Data Protection</name>
          <t>Logs may contain personal data subject to GDPR/privacy regulations:</t>
          <ol spacing="normal" type="1">
            <li>
              <tt>message-entry.content</tt> may contain PII</li>
            <li>
              <tt>tool-result-entry.output</tt> may contain query results with PII</li>
            <li>Retention periods must balance compliance requirements with data minimization</li>
          </ol>
        </section>
      </section>
      <section anchor="related-standards-and-emerging-work">
        <name>Related Standards and Emerging Work</name>
        <t>The ISO/IEC JTC 1/SC 42 committee is developing <xref target="ISO_IEC_DIS_24970"/>, a draft international standard specifically addressing AI system logging requirements.
This work aligns with and complements the verifiable agent conversation format defined in this document.</t>
        <t>Research on emergent misalignment <xref target="EMERGENT_MISALIGNMENT_2025"/> demonstrates that narrow fine-tuning can produce broadly misaligned LLMs, underscoring the importance of comprehensive conversation logging for detecting behavioral anomalies that may not be apparent from individual interactions.</t>
      </section>
    </section>
    <section anchor="cddl-definitions-for-agent-conversations-records">
      <name>CDDL Definitions for Agent Conversations Records</name>
      <t>This section defines each complex data type specified in the verifiable agent conversation record CDDL data definition.
Each subsection illustrates a CDDL fragment for one type, a brief description, and per-member documentation.</t>
      <section anchor="common-types">
        <name>Common Types</name>
        <t>The schema uses the following generic type definitions throughout.</t>
        <dl>
          <dt>abstract-timestamp:</dt>
          <dd>
            <t>An RFC 3339 date-time string or numeric epoch milliseconds.
New implementations <bcp14>SHOULD</bcp14> use RFC 3339 strings; consumers <bcp14>MUST</bcp14> accept both forms.</t>
          </dd>
          <dt>session-id:</dt>
          <dd>
            <t>An opaque string uniquely identifying a conversation session.
Values may be UUID v4, UUID v7, SHA-256 hashes, or other formats.</t>
          </dd>
          <dt>entry-id:</dt>
          <dd>
            <t>A per-entry unique reference within a session, enabling parent-child linking and tool call-result correlation.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-verifiable-agent-record-map">
        <name>The verifiable-agent-record Map</name>
        <t>The CDDL definition for the <tt>verifiable-agent-record</tt> map is specified as follows:</t>
        <sourcecode type="cddl">
verifiable-agent-record = {
    version: tstr
    id: tstr
    session: session-trace
    ? created: abstract-timestamp
    ? file-attribution: file-attribution-record
    ? vcs: vcs-context
    ? recording-agent: recording-agent
    * tstr =&gt; any
}
</sourcecode>
        <t>The <tt>verifiable-agent-record</tt> is the top-level container for all data produced by or about an agent conversation.
It unifies two complementary perspectives: the session trace captures how code was produced (the full conversation replay), while file attribution captures what code was produced (which files were modified and by whom).</t>
        <t>The following describes each member of this map.</t>
        <dl>
          <dt>version:</dt>
          <dd>
            <t>The schema version string following semantic versioning (e.g., "3.0.0-draft").
Consumers use this field to select the appropriate parser or validation logic.</t>
          </dd>
          <dt>id:</dt>
          <dd>
            <t>A unique identifier for this record, typically a UUID.
Distinguishes records when multiple are stored or transmitted together.</t>
          </dd>
          <dt>session:</dt>
          <dd>
            <t>The full conversation trace including all entries, tool calls, reasoning steps, and system events.</t>
          </dd>
          <dt>created:</dt>
          <dd>
            <t>The timestamp when this record was generated.
Distinct from session timestamps, which record when the conversation occurred.</t>
          </dd>
          <dt>file-attribution:</dt>
          <dd>
            <t>Structured data about which files were modified and which line ranges were written by the agent.</t>
          </dd>
          <dt>vcs:</dt>
          <dd>
            <t>Version control metadata at the record level (repository, branch, revision).</t>
          </dd>
          <dt>recording-agent:</dt>
          <dd>
            <t>Identifies the tool or agent that generated this record, as distinct from the agent that conducted the conversation.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-session-trace-map">
        <name>The session-trace Map</name>
        <t>The CDDL definition for the <tt>session-trace</tt> map is specified as follows:</t>
        <sourcecode type="cddl">
session-trace = {
    ? format: tstr
    session-id: session-id
    ? session-start: abstract-timestamp
    ? session-end: abstract-timestamp
    agent-meta: agent-meta
    ? environment: environment
    entries: [* entry]
    * tstr =&gt; any
}
</sourcecode>
        <t>A <tt>session-trace</tt> captures the full conversation between a user and an autonomous agent.
It contains an ordered array of entries representing messages, tool invocations, reasoning steps, and system events.
The <tt>session-trace</tt> preserves the complete interaction history including all native agent metadata, enabling both replay and audit of the conversation.</t>
        <t>The following describes each member of this map.</t>
        <dl>
          <dt>format:</dt>
          <dd>
            <t>Classifies the session style, such as "interactive" (human-in-the-loop) or "autonomous" (fully automated).
Informative only; does not change the structure.</t>
          </dd>
          <dt>session-id:</dt>
          <dd>
            <t>Unique identifier for this session.</t>
          </dd>
          <dt>session-start:</dt>
          <dd>
            <t>When the session began.</t>
          </dd>
          <dt>session-end:</dt>
          <dd>
            <t>When the session ended.</t>
          </dd>
          <dt>agent-meta:</dt>
          <dd>
            <t>Metadata about the agent and model that conducted this conversation.</t>
          </dd>
          <dt>environment:</dt>
          <dd>
            <t>Execution environment context, such as working directory and version control state.</t>
          </dd>
          <dt>entries:</dt>
          <dd>
            <t>An ordered array of conversation entries.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-agent-meta-map">
        <name>The agent-meta Map</name>
        <t>The CDDL definition for the <tt>agent-meta</tt> map is specified as follows:</t>
        <sourcecode type="cddl">
agent-meta = {
    model-id: tstr
    model-provider: tstr
    ? models: [* tstr]
    ? cli-name: tstr
    ? cli-version: tstr
    * tstr =&gt; any
}
</sourcecode>
        <t>The <tt>agent-meta</tt> type identifies the coding agent and language model used during a conversation session.
Agent identification is essential for provenance tracking: knowing which model produced which output enables auditing, capability assessment, and compliance verification.</t>
        <t>The following describes each member of this map.</t>
        <dl>
          <dt>model-id:</dt>
          <dd>
            <t>The primary language model identifier, using the naming convention of the provider (e.g., "claude-opus-4-5-20251101", "gemini-2.0-flash").</t>
          </dd>
          <dt>model-provider:</dt>
          <dd>
            <t>The provider of the primary model (e.g., "anthropic", "google", "openai").</t>
          </dd>
          <dt>models:</dt>
          <dd>
            <t>List of all model identifiers used during the session.
Relevant for multi-model sessions where the agent switches between models.</t>
          </dd>
          <dt>cli-name:</dt>
          <dd>
            <t>The name of the CLI tool or agent framework (e.g., "claude-code", "gemini-cli", "codex-cli").</t>
          </dd>
          <dt>cli-version:</dt>
          <dd>
            <t>The version of the CLI tool.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-recording-agent-map">
        <name>The recording-agent Map</name>
        <t>The CDDL definition for the <tt>recording-agent</tt> map is specified as follows:</t>
        <sourcecode type="cddl">
recording-agent = {
    name: tstr
    ? version: tstr
    * tstr =&gt; any
}
</sourcecode>
        <t>The <tt>recording-agent</tt> map identifies the tool that generated this verifiable agent record, as distinct from the agent that conducted the conversation.
This distinction matters for provenance chains: the recording tool's version affects how native data is translated into the canonical CDDL data definition specified in this document.</t>
        <t>The following describes each member of this map.</t>
        <dl>
          <dt>name:</dt>
          <dd>
            <t>The name of the recording tool or agent.</t>
          </dd>
          <dt>version:</dt>
          <dd>
            <t>The version of the recording tool.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-environment-map">
        <name>The environment Map</name>
        <t>The CDDL definition for the environment map is specified as follows:</t>
        <sourcecode type="cddl">
environment = {
    working-dir: tstr
    ? vcs: vcs-context
    ? sandboxes: [* tstr]
    * tstr =&gt; any
}
</sourcecode>
        <t>The <tt>environment</tt> type captures execution context for the conversation: where the agent was running, what version control state was active, and whether sandboxing was in effect.
This context is important for reproducibility and for understanding the scope of file modifications.</t>
        <t>The following describes each member of this map.</t>
        <dl>
          <dt>working-dir:</dt>
          <dd>
            <t>The primary working directory path.
File paths in tool calls are typically relative to this directory.</t>
          </dd>
          <dt>vcs:</dt>
          <dd>
            <t>Version control state at the time of the session (branch, revision, etc.).</t>
          </dd>
          <dt>sandboxes:</dt>
          <dd>
            <t>Paths to sandbox mount points.
Some agents run in sandboxed environments where the working directory is a temporary mount.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-vcs-context-map">
        <name>The vcs-context Map</name>
        <t>The CDDL definition for the vcs-context map is specified as follows:</t>
        <sourcecode type="cddl">
vcs-context = {
    type: tstr
    ? revision: tstr
    ? branch: tstr
    ? repository: tstr
    * tstr =&gt; any
}
</sourcecode>
        <t>The vcs-context type captures version control metadata for reproducibility.
Knowing the exact repository, branch, and commit at the time of a conversation enables consumers to reconstruct the codebase state and verify file attributions.</t>
        <t>The following describes each member of this map.</t>
        <dl>
          <dt>type:</dt>
          <dd>
            <t>The version control system type (e.g., "git", "jj", "hg", "svn").</t>
          </dd>
          <dt>revision:</dt>
          <dd>
            <t>The commit SHA or change identifier at session time.</t>
          </dd>
          <dt>branch:</dt>
          <dd>
            <t>The active branch name.</t>
          </dd>
          <dt>repository:</dt>
          <dd>
            <t>The repository URL.</t>
          </dd>
        </dl>
      </section>
      <section anchor="entry-types">
        <name>Entry Types</name>
        <t>The CDDL definition specifies five <tt>entry</tt> types representing the different kinds of events in an agent conversation.
Each type uses a <tt>type</tt> field as the discriminator.
All entry types support optional <tt>children</tt> for hierarchical nesting and <tt>* tstr =&gt; any</tt> for preserving native agent fields that do not map to canonical fields.</t>
        <sourcecode type="cddl">
entry = message-entry
      / tool-call-entry
      / tool-result-entry
      / reasoning-entry
      / event-entry
</sourcecode>
        <section anchor="the-message-entry-map">
          <name>The message-entry Map</name>
          <t>The CDDL definition for the <tt>message-entry</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
message-entry = {
    type: "user" / "assistant"
    ? content: any
    ? timestamp: abstract-timestamp
    ? id: entry-id
    ? model-id: tstr
    ? parent-id: entry-id
    ? token-usage: token-usage
    ? children: [* entry]
    * tstr =&gt; any
}
</sourcecode>
          <t>A <tt>message-entry</tt> represents a conversational turn: either human input (type: "user") or agent response (type: "assistant").
This is the most common entry type, carrying the primary dialogue content of a session.
For assistant messages, additional metadata may be present: the model that generated the response and token usage statistics.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>type:</dt>
            <dd>
              <t>The message direction.
"user" indicates human (or upstream agent) input; "assistant" indicates the agent's response.</t>
            </dd>
            <dt>content:</dt>
            <dd>
              <t>The message body.
May be a plain text string, an array of typed content parts, or absent when the agent places content exclusively in child entries.</t>
            </dd>
            <dt>timestamp:</dt>
            <dd>
              <t>When this message was produced.</t>
            </dd>
            <dt>id:</dt>
            <dd>
              <t>Unique identifier for this entry within the session.</t>
            </dd>
            <dt>model-id:</dt>
            <dd>
              <t>The model that generated this response.
Present on assistant entries; absent on user entries.</t>
            </dd>
            <dt>parent-id:</dt>
            <dd>
              <t>References the parent entry, enabling tree-structured conversations.</t>
            </dd>
            <dt>token-usage:</dt>
            <dd>
              <t>Token consumption metrics for this response.</t>
            </dd>
            <dt>children:</dt>
            <dd>
              <t>Nested entries within this message.
Used when the native format embeds tool calls or reasoning blocks inside an assistant message.</t>
            </dd>
          </dl>
        </section>
        <section anchor="the-tool-call-entry-map">
          <name>The tool-call-entry Map</name>
          <t>The CDDL definition for the <tt>tool-call-entry</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
tool-call-entry = {
    type: "tool-call"
    name: tstr
    input: any
    ? call-id: tstr
    ? timestamp: abstract-timestamp
    ? id: entry-id
    ? children: [* entry]
    * tstr =&gt; any
}
</sourcecode>
          <t>A <tt>tool-call-entry</tt> represents a tool invocation: which tool was called and with what arguments.
Tool calls are central to agent conversation records because tool use is the primary mechanism by which agents interact with external environment.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>type:</dt>
            <dd>
              <t>Fixed discriminator value "tool-call".</t>
            </dd>
            <dt>name:</dt>
            <dd>
              <t>The tool name (e.g., "Bash", "Edit", "Read", "apply_patch").</t>
            </dd>
            <dt>input:</dt>
            <dd>
              <t>The arguments passed to the tool, preserved in their native structure.</t>
            </dd>
            <dt>call-id:</dt>
            <dd>
              <t>Links this call to its corresponding result.</t>
            </dd>
            <dt>timestamp:</dt>
            <dd>
              <t>When this tool call occurred.</t>
            </dd>
            <dt>id:</dt>
            <dd>
              <t>Unique identifier for this entry.</t>
            </dd>
            <dt>children:</dt>
            <dd>
              <t>Nested entries within this tool call.</t>
            </dd>
          </dl>
        </section>
        <section anchor="the-tool-result-entry-map">
          <name>The tool-result-entry Map</name>
          <t>The CDDL definition for the <tt>tool-result-entry</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
tool-result-entry = {
    type: "tool-result"
    output: any
    ? call-id: tstr
    ? status: tstr
    ? is-error: bool
    ? timestamp: abstract-timestamp
    ? id: entry-id
    ? children: [* entry]
    * tstr =&gt; any
}
</sourcecode>
          <t>A <tt>tool-result-entry</tt> represents the output returned by a tool after execution.
It is linked to its corresponding tool-call-entry via the <tt>call-id</tt> field.
The result carries the tool's response data and optional status metadata indicating success or failure.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>type:</dt>
            <dd>
              <t>Fixed discriminator value "tool-result".</t>
            </dd>
            <dt>output:</dt>
            <dd>
              <t>The tool's response, preserved in native structure.</t>
            </dd>
            <dt>call-id:</dt>
            <dd>
              <t>Links this result to its corresponding call.</t>
            </dd>
            <dt>status:</dt>
            <dd>
              <t>Outcome status of the tool execution, such as "success", "error", or "completed".</t>
            </dd>
            <dt>is-error:</dt>
            <dd>
              <t>Boolean error flag, present when the tool execution failed.</t>
            </dd>
            <dt>timestamp:</dt>
            <dd>
              <t>When this tool result was returned.</t>
            </dd>
            <dt>id:</dt>
            <dd>
              <t>Unique identifier for this entry.</t>
            </dd>
            <dt>children:</dt>
            <dd>
              <t>Nested entries within this tool result.</t>
            </dd>
          </dl>
        </section>
        <section anchor="the-reasoning-entry-map">
          <name>The reasoning-entry Map</name>
          <t>The CDDL definition for the <tt>reasoning-entry</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
reasoning-entry = {
    type: "reasoning"
    content: any
    ? encrypted: tstr
    ? subject: tstr
    ? timestamp: abstract-timestamp
    ? id: entry-id
    ? children: [* entry]
    * tstr =&gt; any
}
</sourcecode>
          <t>A reasoning-entry captures CoT, thinking, or internal reasoning content from the agent.
Not all agents expose reasoning traces; when they do, the content may be plaintext, structured blocks, or encrypted.
Reasoning entries are valuable for auditing decision-making processes and understanding why an agent took particular actions.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>type:</dt>
            <dd>
              <t>Fixed discriminator value "reasoning".</t>
            </dd>
            <dt>content:</dt>
            <dd>
              <t>The reasoning text or structured content.
May be an empty string when only encrypted content is available.</t>
            </dd>
            <dt>encrypted:</dt>
            <dd>
              <t>Encrypted reasoning content.
Used where the model provider encrypts chain-of-thought output.</t>
            </dd>
            <dt>subject:</dt>
            <dd>
              <t>A topic label for the reasoning block.</t>
            </dd>
            <dt>timestamp:</dt>
            <dd>
              <t>When this reasoning was produced.</t>
            </dd>
            <dt>id:</dt>
            <dd>
              <t>Unique identifier for this entry.</t>
            </dd>
            <dt>children:</dt>
            <dd>
              <t>Nested entries within the reasoning block.</t>
            </dd>
          </dl>
        </section>
        <section anchor="the-event-entry-map">
          <name>The event-entry Map</name>
          <t>The CDDL definition for the <tt>event-entry</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
event-entry = {
    type: "system-event"
    event-type: tstr
    ? data: { * tstr =&gt; any }
    ? timestamp: abstract-timestamp
    ? id: entry-id
    ? children: [* entry]
    * tstr =&gt; any
}
</sourcecode>
          <t>An <tt>event-entry</tt> records system lifecycle events that are not part of the conversation dialogue but are relevant for understanding the session context.
Examples include session start/end markers, token usage summaries, permission changes, and configuration events.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>type:</dt>
            <dd>
              <t>Fixed discriminator value "system-event".</t>
            </dd>
            <dt>event-type:</dt>
            <dd>
              <t>Classifies the event, such as "session-start", "session-end", "token-count", or "permission-change".
The values are not enumerated in the schema to accommodate vendor-specific event types.</t>
            </dd>
            <dt>data:</dt>
            <dd>
              <t>Event-specific payload.
The structure varies by event type.</t>
            </dd>
            <dt>timestamp:</dt>
            <dd>
              <t>When this event occurred.</t>
            </dd>
            <dt>id:</dt>
            <dd>
              <t>Unique identifier for this entry.</t>
            </dd>
            <dt>children:</dt>
            <dd>
              <t>Nested entries within this event.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="the-token-usage-map">
        <name>The token-usage Map</name>
        <t>The CDDL definition for the <tt>token-usage</tt> map is specified as follows:</t>
        <sourcecode type="cddl">
token-usage = {
    ? input: uint
    ? output: uint
    ? cached: uint
    ? reasoning: uint
    ? total: uint
    ? cost: number
    * tstr =&gt; any
}
</sourcecode>
        <t>The <tt>token-usage</tt> type captures token consumption metrics for a model response.
Token usage data is essential for cost tracking, quota management, and understanding model behavior.
All fields are optional because different agents report different subsets of token metrics.</t>
        <t>Editor's Note: add a non-empty generic here</t>
        <t>The following describes each member of this map.</t>
        <dl>
          <dt>input:</dt>
          <dd>
            <t>The number of input tokens consumed by this response.</t>
          </dd>
          <dt>output:</dt>
          <dd>
            <t>The number of output tokens generated.</t>
          </dd>
          <dt>cached:</dt>
          <dd>
            <t>The number of input tokens served from cache rather than reprocessed.</t>
          </dd>
          <dt>reasoning:</dt>
          <dd>
            <t>Tokens consumed by chain-of-thought or reasoning computation.</t>
          </dd>
          <dt>total:</dt>
          <dd>
            <t>The total token count.</t>
          </dd>
          <dt>cost:</dt>
          <dd>
            <t>The monetary cost in US dollars for this response.</t>
          </dd>
        </dl>
      </section>
      <section anchor="file-attribution-types">
        <name>File Attribution Types</name>
        <t>NOTE: This section is specified but not yet validated against real session data.
Implementation is pending.</t>
        <t>File attribution captures what code was produced: which files were modified, which line ranges were changed, and who authored them.</t>
        <section anchor="the-file-attribution-record-map">
          <name>The file-attribution-record Map</name>
          <t>The CDDL definition for the <tt>file-attribution-record</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
file-attribution-record = {
    files: [* file]
}
</sourcecode>
          <t>The <tt>file-attribution-record</tt> is the top-level container for file attribution data.
It holds an array of files, each with their attributed line ranges and contributor information.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>files:</dt>
            <dd>
              <t>Array of files with attributed ranges.</t>
            </dd>
          </dl>
        </section>
        <section anchor="the-file-map">
          <name>The file Map</name>
          <t>The CDDL definition for the <tt>file</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
file = {
    path: tstr
    conversations: [* conversation]
}
</sourcecode>
          <t>A <tt>file</tt> represents a single source file that was modified during the conversation.
It groups all conversations that contributed changes to this file.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>path:</dt>
            <dd>
              <t>The file path relative to the repository root.</t>
            </dd>
            <dt>conversations:</dt>
            <dd>
              <t>The conversations that contributed modifications to this file.</t>
            </dd>
          </dl>
        </section>
        <section anchor="the-conversation-map">
          <name>The conversation Map</name>
          <t>The CDDL definition for the <tt>conversation</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
conversation = {
    ? url: tstr .regexp uri-regexp
    ? contributor: contributor
    ranges: [* range]
    ? related: [* resource]
}
</sourcecode>
          <t>A <tt>conversation</tt> links a specific session to the line ranges it produced in a file.
This enables tracing from a line of code back to the conversation that generated it.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>url:</dt>
            <dd>
              <t>A URL pointing to the conversation source (e.g., a web UI permalink).</t>
            </dd>
            <dt>contributor:</dt>
            <dd>
              <t>The default contributor for all ranges in this conversation.
Can be overridden per-range.</t>
            </dd>
            <dt>ranges:</dt>
            <dd>
              <t>The line ranges in the file that were produced by this conversation.</t>
            </dd>
            <dt>related:</dt>
            <dd>
              <t>External resources related to this conversation (e.g., issue trackers, documentation).</t>
            </dd>
          </dl>
        </section>
        <section anchor="the-range-map">
          <name>The range Map</name>
          <t>The CDDL definition for the <tt>range</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
range = {
    start-line: uint
    end-line: uint
    ? content-hash: tstr
    ? content-hash-alg: tstr
    ? contributor: contributor
}
</sourcecode>
          <t>A <tt>range</tt> identifies a contiguous block of lines in a file that were produced by a specific conversation.
Line numbers are 1-indexed and inclusive.
The optional content hash enables position-independent tracking when lines move due to later edits.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>start-line:</dt>
            <dd>
              <t>The first line of the range (1-indexed).</t>
            </dd>
            <dt>end-line:</dt>
            <dd>
              <t>The last line of the range (1-indexed, inclusive).</t>
            </dd>
            <dt>content-hash:</dt>
            <dd>
              <t>A hash of the range content for position-independent identification.</t>
            </dd>
            <dt>content-hash-alg:</dt>
            <dd>
              <t>The hash algorithm used (default: "sha-256").</t>
            </dd>
            <dt>contributor:</dt>
            <dd>
              <t>Overrides the conversation-level contributor for this specific range.</t>
            </dd>
          </dl>
        </section>
        <section anchor="the-contributor-map">
          <name>The contributor Map</name>
          <t>The CDDL definition for the <tt>contributor</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
contributor = {
    type: "human" / "ai" / "mixed" / "unknown"
    ? model-id: tstr
}
</sourcecode>
          <t>A <tt>contributor</tt> identifies who authored a range of code.
The type field distinguishes between human-authored, AI-generated, mixed, and unknown authorship.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>type:</dt>
            <dd>
              <t>The authorship category.</t>
            </dd>
            <dt>model-id:</dt>
            <dd>
              <t>The model identifier for AI-authored ranges.</t>
            </dd>
          </dl>
        </section>
        <section anchor="the-resource-map">
          <name>The resource Map</name>
          <t>The CDDL definition for the <tt>resource</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
resource = {
    type: tstr
    url: tstr .regexp uri-regexp
}
</sourcecode>
          <t>A <tt>resource</tt> represents an external reference related to a conversation, such as an issue tracker entry, a pull request, or a documentation page.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>type:</dt>
            <dd>
              <t>The resource type (e.g., "issue", "pr", "documentation").</t>
            </dd>
            <dt>url:</dt>
            <dd>
              <t>The URL of the resource.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="signing-envelope-types">
        <name>Signing Envelope Types</name>
        <t>The signing envelope provides cryptographic integrity protection for verifiable agent records using COSE_Sign1 (<xref target="STD96"/>).</t>
        <section anchor="the-signed-agent-record-structure">
          <name>The signed-agent-record Structure</name>
          <t>The CDDL definition for a <tt>signed-agent-record</tt> structure is specified as follows:</t>
          <sourcecode type="cddl">
signed-agent-record = #6.18([
    protected: bstr .cbor protected-header
    unprotected: unprotected-header
    payload: bstr / null
    signature: bstr
])
</sourcecode>
          <t>A <tt>signed-agent-record</tt> is a COSE_Sign1 envelope (CBOR Tag 18) that wraps a verifiable agent record with a cryptographic signature.
Signing provides data provenance and tamper evidence, satisfying some requirements of RATS Evidence generation (<xref target="RFC9334"/>) and SCITT auditability (<xref target="I-D.ietf-scitt-architecture"/>) requirements.
The payload may be included or detached (null); in detached mode, the record is supplied separately during verification.</t>
          <t>The following describes each element of this structure.</t>
          <dl>
            <dt>protected:</dt>
            <dd>
              <t>The serialized protected header containing the algorithm identifier, content type, and CWT claims.</t>
            </dd>
            <dt>unprotected:</dt>
            <dd>
              <t>The unprotected header carrying trace metadata at label 100.</t>
            </dd>
            <dt>payload:</dt>
            <dd>
              <t>The serialized record bytes, or null for detached payloads.</t>
            </dd>
            <dt>signature:</dt>
            <dd>
              <t>The cryptographic signature over the protected header and payload.</t>
            </dd>
          </dl>
        </section>
        <section anchor="trace-metadata">
          <name>The trace-metadata Map</name>
          <t>The CDDL definition for the <tt>trace-metadata</tt> map is specified as follows:</t>
          <sourcecode type="cddl">
trace-metadata = {
    session-id: session-id
    agent-vendor: tstr
    trace-format: trace-format-id
    timestamp-start: abstract-timestamp
    ? timestamp-end: abstract-timestamp
    ? content-hash: tstr
    ? content-hash-alg: tstr
}
</sourcecode>
          <t>The <tt>trace-metadata</tt> type carries summary information about the signed record in the COSE_Sign1 unprotected header.
This enables consumers to inspect key properties of a signed record without deserializing the full payload.</t>
          <t>The following describes each member of this map.</t>
          <dl>
            <dt>session-id:</dt>
            <dd>
              <t>The session identifier from the signed record.</t>
            </dd>
            <dt>agent-vendor:</dt>
            <dd>
              <t>The agent provider name (e.g., "anthropic", "google").</t>
            </dd>
            <dt>trace-format:</dt>
            <dd>
              <t>Identifies the format of the signed payload (e.g., "ietf-vac-v3.0" for canonical records).</t>
            </dd>
            <dt>timestamp-start:</dt>
            <dd>
              <t>When the session began.</t>
            </dd>
            <dt>timestamp-end:</dt>
            <dd>
              <t>When the session ended.</t>
            </dd>
            <dt>content-hash:</dt>
            <dd>
              <t>SHA-256 hex digest of the payload bytes, enabling integrity checking independent of the COSE signature.</t>
            </dd>
            <dt>content-hash-alg:</dt>
            <dd>
              <t>The hash algorithm used (default: "sha-256").</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
    <section anchor="collated-cddl-definition-for-generic-agent-conversations">
      <name>Collated CDDL Definition for generic Agent Conversations</name>
      <figure anchor="fig-cddl-record">
        <name>CDDL definition of an Agent Conversation Record</name>
        <sourcecode type="cddl">
start = verifiable-agent-record / signed-agent-record

; RFC 3339 string OR epoch milliseconds (for interop).
abstract-timestamp = tstr .regexp date-time-regexp / uint 

; Opaque string: UUID, SHA-256 hash in base64url, etc.
session-id = tstr / bstr

; Per-entry unique reference within a session.
entry-id = tstr

; RFC 3339 date-time pattern
date-time-regexp = "([0-9]{4})-(0[1-9]|1[0-2])-(0[1-9]|[12][0-9]|3[01])T([01][0-9]|2[0-3]):([0-5][0-9]):(60|[0-5][0-9])([.][0-9]+)?(Z|[+-]([01][0-9]|2[0-3]):[0-5][0-9])"

; URI pattern (RFC 3986)
uri-regexp = "(([^:/?#]+):)?(//([^/?#]*))?([^?#]*)(\\?([^#]*))?(#(.*))?"

verifiable-agent-record = {
    version: tstr                       ; Schema version (semver)
    id: tstr                            ; Record identifier
    session: session-trace              ; Conversation trace (required)
    ? created: abstract-timestamp       ; Record creation time
    ? file-attribution: file-attribution-record
    ? vcs: vcs-context                  ; Record-level VCS context
    ? recording-agent: recording-agent  ; Tool that generated this record
    * tstr =&gt; any
}

session-trace = {
    ? format: tstr                      ; "interactive" / "autonomous" / vendor
    session-id: session-id
    ? session-start: abstract-timestamp
    ? session-end: abstract-timestamp
    agent-meta: agent-meta
    ? environment: environment
    entries: [* entry]
    * tstr =&gt; any
}

agent-meta = {
    model-id: tstr                      ; e.g., "claude-opus-4-5-20251101"
    model-provider: tstr                ; e.g., "anthropic", "google"
    ? models: [ * tstr ]                  ; All models (multi-model sessions)
    ? cli-name: tstr                    ; e.g., "claude-code", "gemini-cli"
    ? cli-version: tstr
    * tstr =&gt; any
}

recording-agent = {
    name: tstr
    ? version: tstr
    * tstr =&gt; any
}

environment = {
    working-dir: tstr
    ? vcs: vcs-context
    ? sandboxes: [ * tstr ]               ; Sandbox mount paths
    * tstr =&gt; any
}

vcs-context = {
    type: tstr                          ; "git" / "jj" / "hg" / "svn"
    ? revision: tstr                    ; Commit SHA or change ID
    ? branch: tstr
    ? repository: tstr                  ; Repository URL
    * tstr =&gt; any
}

entry = message-entry
      / tool-call-entry
      / tool-result-entry
      / reasoning-entry
      / event-entry

message-entry = {
    type: "user" / "assistant"
    ? content: any                      ; Text string or structured content blocks
    ? timestamp: abstract-timestamp
    ? id: entry-id
    ? model-id: tstr                    ; Model (assistant only)
    ? parent-id: entry-id              ; Parent message reference
    ? token-usage: token-usage
    ? children: [ * entry ]
    * tstr =&gt; any
}

tool-call-entry = {
    type: "tool-call"
    name: tstr                          ; Tool name (e.g., "Bash", "Edit", "Read")
    input: any                          ; Tool arguments
    ? call-id: tstr                     ; Links call ↔ result
    ? timestamp: abstract-timestamp
    ? id: entry-id
    ? children: [ * entry ]
    * tstr =&gt; any
}

tool-result-entry = {
    type: "tool-result"
    output: any                         ; Tool output
    ? call-id: tstr                     ; Links call ↔ result
    ? status: tstr                      ; "success" / "error" / "completed"
    ? is-error: bool
    ? timestamp: abstract-timestamp
    ? id: entry-id
    ? children: [ * entry ]
    * tstr =&gt; any
}

reasoning-entry = {
    type: "reasoning"
    content: any                        ; Plaintext reasoning or structured
    ? encrypted: tstr                   ; Encrypted content (provider-protected)
    ? subject: tstr                     ; Topic label
    ? timestamp: abstract-timestamp
    ? id: entry-id
    ? children: [ * entry ]
    * tstr =&gt; any
}

event-entry = {
    type: "system-event"
    event-type: tstr                    ; Event classifier
    ? data: { * tstr =&gt; any }           ; Event-specific payload
    ? timestamp: abstract-timestamp
    ? id: entry-id
    ? children: [ * entry ]
    * tstr =&gt; any
}

token-usage = {
    ? input: uint                       ; Input tokens
    ? output: uint                      ; Output tokens
    ? cached: uint                      ; Cached input tokens
    ? reasoning: uint                   ; Reasoning/thinking tokens
    ? total: uint                       ; Total tokens
    ? cost: number                      ; Dollar cost
    * tstr =&gt; any
}

file-attribution-record = {
    files: [* file]
}

file = {
    path: tstr                          ; Relative path from repo root
    conversations: [* conversation]
}

conversation = {
    ? url: tstr .regexp uri-regexp
    ? contributor: contributor          ; Default contributor for ranges
    ranges: [* range]
    ? related: [* resource]
}

range = {
    start-line: uint                    ; 1-indexed
    end-line: uint                      ; 1-indexed, inclusive
    ? content-hash: tstr
    ? content-hash-alg: tstr            ; Default: "sha-256"
    ? contributor: contributor          ; Override for this range
}

contributor = {
    type: "human" / "ai" / "mixed" / "unknown"
    ? model-id: tstr
}

resource = {
    type: tstr
    url: tstr .regexp uri-regexp
}

; SCITT-interoperable COSE Envelope
; including from draft-ietf-cose-merkle-tree-proofs and
; draft-ietf-scitt-architecture for validation

signed-agent-record = #6.18([           ; COSE_Sign1 tag
    protected: bstr .cbor protected-header ; {alg, content-type, scitt-stuff}
    unprotected: unprotected-header     ; Trace metadata
    payload: bstr / null                ; Detached if null
    signature: bstr
])

protected-header = {
  &amp;(CWT_Claims: 15) =&gt; CWT_Claims
  ? &amp;(alg: 1) =&gt; int
  ? &amp;(content_type: 3) =&gt; tstr / uint
  ? &amp;(kid: 4) =&gt; bstr
  ? &amp;(x5t: 34) =&gt; COSE_CertHash
  ? &amp;(x5chain: 33) =&gt; COSE_X509
  * label =&gt; any
}

CWT_Claims = {
  &amp;(iss: 1) =&gt; tstr
  &amp;(sub: 2) =&gt; tstr
  * label =&gt; any
}

unprotected-header = {
  ? &amp;(trace-metadata-key: 100) =&gt; trace-metadata ; 100 is placeholder
  ? &amp;(x5chain: 33) =&gt; COSE_X509
  ? &amp;(receipts: 394)  =&gt; [ + Receipt ]
  * label =&gt; any
}

trace-metadata = {
    session-id: session-id
    agent-vendor: tstr
    trace-format: trace-format-id
    timestamp-start: abstract-timestamp
    ? timestamp-end: abstract-timestamp
    ? content-hash: tstr                ; SHA-256 hex digest of payload
    ? content-hash-alg: tstr
}

; Known values: "ietf-vac-v3.0" (canonical), "claude-jsonl", "gemini-json",
; "codex-jsonl", "opencode-json", "cursor-jsonl". Extensible via tstr.
trace-format-id = tstr

COSE_X509 = bstr / [ 2*certs: bstr ]
COSE_CertHash = [ hashAlg: (int / tstr), hashValue: bstr ]
label = int / tstr

; COSE Receipt CDDL for use in SCITT compliant COSE Envelope

Receipt = #6.18(COSE_Sign1)

cose-label = int / tstr
cose-value = any

Protected_Header = {
  * cose-label =&gt; cose-value
}

Unprotected_Header = {
  &amp;(receipts: 394)  =&gt; [+ bstr .cbor Receipt]
  * cose-label =&gt; cose-value
}

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / null,
  signature   : bstr
]


</sourcecode>
      </figure>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Verifiable agent conversation records reveal substantial information about agent behavior, system state, and user interactions.
The privacy considerations of <xref target="RFC6973"/> apply.</t>
      <section anchor="information-disclosure">
        <name>Information Disclosure</name>
        <t>User prompts captured in message entries may contain personal identifiers, business confidential information, credentials inadvertently included in prompts, or behavioral patterns.
Agent responses and reasoning traces may reveal inference results that expose information about users not explicitly provided, confidential information retrieved by tools, or system architecture details through tool names and parameters.
Implementations <bcp14>MUST</bcp14> treat user-provided content as potentially containing personally identifiable information.</t>
        <t>Record metadata exposes operational details that may have privacy implications.
Model identifiers reveal AI capabilities, CLI versions enable targeted attacks against known vulnerabilities, working directories expose file system structure, and VCS context discloses repository names and commit timing.
Token usage patterns may enable inference about conversation content even when the content itself is protected.</t>
      </section>
      <section anchor="sensitive-content-in-records">
        <name>Sensitive Content in Records</name>
        <t>Reasoning entries may contain inferences that constitute special category data, including health-related inferences from user queries, political opinions derived from conversation context, or biometric data processed by AI systems.
The <tt>reasoning-entry.encrypted</tt> field reflects that some model providers encrypt chain-of-thought content; when reasoning is encrypted, audit capabilities depend on the provider's cooperation.</t>
        <t>Tool inputs and outputs warrant particular attention.
Tool call inputs may contain credentials, API keys, or file contents.
Tool results may contain query results with personal data from databases or external services.
Implementations <bcp14>SHOULD</bcp14> provide configurable redaction rules for common patterns and support selective entry type recording based on deployment requirements.</t>
      </section>
      <section anchor="retention-considerations">
        <name>Retention Considerations</name>
        <t>Multiple frameworks impose retention requirements that may conflict with data minimization principles.
Organizations must balance compliance obligations requiring extended retention against privacy principles requiring timely deletion.</t>
        <t>Compliant data management may require separating raw personal data from audit trail metadata, implementing automated deletion for personal data after compliance-minimum periods, and maintaining cryptographic commitments enabling verification without retaining content.</t>
      </section>
      <section anchor="correlation-and-inference">
        <name>Correlation and Inference</name>
        <t>Presentations of the same record to multiple parties can be correlated by matching on the signature component.
Session identifiers enable linking of records across time, potentially revealing long-term behavioral patterns or organizational structure.
Implementations <bcp14>SHOULD</bcp14> use unlinkable session identifiers where correlation is not required.</t>
        <t>Without accessing record content, observers may infer conversation frequency and duration patterns, types of tools used, error rates, or timing correlations with external events.
Metadata exposure in unprotected headers warrants careful consideration; the <tt>trace-metadata</tt> in the COSE unprotected header reveals session identifiers, agent vendor, and timestamps even when the payload is encrypted.</t>
      </section>
      <section anchor="authority-access">
        <name>Authority Access</name>
        <t>Regulatory frameworks may require provision of records to authorities upon request.
Access to records has to be logged, capturing who accessed which records, when access occurred, what legal basis justified access, and what data was disclosed.
This creates a recursive consideration: access logs may themselves contain personal data requiring protection.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="record-integrity">
        <name>Record Integrity</name>
        <t>The <tt>signed-agent-record</tt> envelope provides cryptographic integrity protection for the serialized record payload.
A valid signature establishes that the claimed signer produced the record but does not guarantee the truthfulness of its contents.
Modifications to the record structure after signing invalidate the signature, but modifications before signing cannot be detected.
Implementations generating records incrementally during a conversation <bcp14>MUST</bcp14> sign only after the conversation concludes or at defined checkpoints.</t>
      </section>
      <section anchor="signing-key-protection">
        <name>Signing Key Protection</name>
        <t>The security of signed records depends critically on the protection of private signing keys.
If an attacker obtains a signing key, they can forge records indistinguishable from genuine ones.
Protection mechanisms range from operating system process isolation in development environments to hardware security modules with physical tampering resistance in high-assurance deployments.
Compromised signing keys require rejection of records signed after the compromise date and notification to Relying Parties.</t>
        <t>Key provisioning processes must guarantee that exclusively valid attestation key material is established.
Off-device key generation requires confidentiality protection during transmission, creating recursive security dependencies.
On-device key generation eliminates transmission risks but requires chain-of-custody integrity to prevent attackers from obtaining endorsement for keys they control.</t>
      </section>
      <section anchor="timestamp-integrity">
        <name>Timestamp Integrity</name>
        <t>Timestamps establish temporal ordering of events within records.
Attackers who can manipulate timestamps can backdate records, freeze participants in chosen time periods to evade freshness checks, or manipulate perceived temporal relationships between entries.
Timestamps within records are attested by the signer, not independently verified.
Implementations requiring independent timestamp verification <bcp14>SHOULD</bcp14> use external timestamping services or transparency logs such as those defined in <xref target="I-D.ietf-scitt-architecture"/>.</t>
      </section>
      <section anchor="adversarial-content">
        <name>Adversarial Content</name>
        <t>Processing verifiable agent conversation records involves parsing content that may be produced by adversaries.
This applies both to user-supplied prompts and to model outputs that may have been influenced by adversarial inputs.
The open extensibility (<tt>* tstr =&gt; any</tt>) in record types allows arbitrary additional fields; implementations <bcp14>MUST NOT</bcp14> assume that unrecognized fields are safe to process or display.</t>
        <t>Records may contain content designed to exploit downstream systems.
Malicious prompts preserved in records may execute if records are subsequently processed by AI systems.
Tool results may contain executable content that executes if rendered unsafely in web interfaces.
File paths in tool calls or file attribution entries may attempt directory traversal.
Implementations <bcp14>MUST</bcp14> apply appropriate sanitization before rendering content, executing it in agent contexts, or using paths for file system operations.</t>
      </section>
      <section anchor="non-repudiation">
        <name>Non-Repudiation</name>
        <t>The <tt>signed-agent-record</tt> envelope alone provides authenticity and integrity, not non-repudiation.
A signer can claim key compromise or dispute the signing time without independent evidence.
Non-repudiation requires additional infrastructure such as transparency services <xref target="I-D.ietf-scitt-architecture"/> that provide independent timestamp proof via registration receipts, append-only logs preventing retroactive denial, and third-party witnesses to the signing event.</t>
      </section>
      <section anchor="detection-and-trust-boundaries">
        <name>Detection and Trust Boundaries</name>
        <t>Verifiable agent conversation records primarily enable detection of anomalous behavior rather than prevention.
Detection requires that records accurately reflect actual agent behavior; an agent that controls its own recording can omit or falsify entries.
The <tt>recording-agent</tt> field distinguishes the recording tool from the conversing agent, enabling Relying Parties to assess trust in the recording process.</t>
        <t>Trust boundaries exist between the agent runtime and recording system, between the recording system and storage, between storage and verification, and between verification and decision-making.
Attacks at any boundary may compromise record integrity or confidentiality.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="media-type">
        <name>Media Type</name>
        <t>IANA is requested to add "application/agent-conversation" as a new media type for Verifiable Agent Conversation Records to the "Media Types" registry <xref target="IANA.media-types"/> in the Standards Tree <xref target="RFC6838"/>:</t>
        <table anchor="tbl-mt-reg">
          <name>Verifiable Agent Conversation Record Media Type</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>agent-conversation</tt></td>
              <td align="left">
                <tt>application/agent-conversation</tt></td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <dl>
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>agent-conversation</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>byte string</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t>See Security Considerations {secconsec}</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Applications that need to describe AI agent conversation for verification and auditability.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>Additional information:</dt>
          <dd>
            <dl>
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>acr</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
            </dl>
          </dd>
          <dt>Person/email address to contact for further information:</dt>
          <dd>
            <t>TBD</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restriction on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author:</dt>
          <dd>
            <t>See Author's Addresses section</t>
          </dd>
          <dt>Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="coap-content-format">
        <name>CoAP Content Format</name>
        <t>IANA is requested to assign a Content-Format ID for Verifiable Agent Conversation Records in the "CoAP Content-Formats" registry, within the "Constrained RESTful Environments (CoRE) Parameters" registry group <xref target="IANA.core-parameters"/>:</t>
        <table anchor="tbl-cf-reg">
          <name>Verifiable Agent Conversation Record Content Format</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/agent-conversation</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>If possible, TBD1 should be assigned in the 256...9999 range.</t>
      </section>
      <section anchor="cbor-tag">
        <name>CBOR Tag</name>
        <t>IANA is requested to allocate a tag for Verifiable Agent Conversation Records in the "CBOR Tags" registry <xref target="IANA.cbor-tags"/>, preferably with the specific value requested:</t>
        <table anchor="tbl-tag-reg">
          <name>Verifiable Agent Conversation Record CBOR Tag</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">4149</td>
              <td align="left">binary</td>
              <td align="left">Verifiable Agent Conversation Records as defined in RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="cose-header-parameter">
        <name>COSE Header Parameter</name>
        <t>IANA is requested to allocated the COSE header parameter defined in <xref target="tbl-new-hdrs"/> in the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/>.</t>
        <table align="left" anchor="tbl-new-hdrs">
          <name>New COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Value Registry</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>trace-metadata</tt></td>
              <td align="left">TBD</td>
              <td align="left">CBOR map</td>
              <td align="left">-</td>
              <td align="left">A metadata summary of an Agent Conversation Record</td>
              <td align="left">RFCthis, <xref target="trace-metadata"/></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <seriesInfo name="DOI" value="10.17487/RFC4648"/>
            <seriesInfo name="RFC" value="4648"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <seriesInfo name="DOI" value="10.17487/RFC5280"/>
            <seriesInfo name="RFC" value="5280"/>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <seriesInfo name="DOI" value="10.17487/RFC6838"/>
            <seriesInfo name="RFC" value="6838"/>
            <seriesInfo name="BCP" value="13"/>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC7252"/>
            <seriesInfo name="RFC" value="7252"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <seriesInfo name="DOI" value="10.17487/RFC7515"/>
            <seriesInfo name="RFC" value="7515"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC7519"/>
            <seriesInfo name="RFC" value="7519"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD90">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <seriesInfo name="DOI" value="10.17487/RFC8259"/>
            <seriesInfo name="RFC" value="8259"/>
            <seriesInfo name="STD" value="90"/>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.jwt" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="BCP26">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <seriesInfo name="DOI" value="10.17487/RFC8126"/>
            <seriesInfo name="RFC" value="8126"/>
            <seriesInfo name="BCP" value="26"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="EU_AI_ACT_2024" target="https://eur-lex.europa.eu/eli/reg/2024/1689/oj">
          <front>
            <title>Regulation (EU) 2024/1689 (Artificial Intelligence Act)</title>
            <seriesInfo name="CELEX:" value="32024R1689"/>
            <seriesInfo name="Official Journal of the European Union" value="L 2024/1689"/>
            <author>
              <organization>European Parliament</organization>
            </author>
            <author>
              <organization>Council of the European Union</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
        </reference>
        <reference anchor="EU_CRA_2024" target="https://eur-lex.europa.eu/eli/reg/2024/2847/oj">
          <front>
            <title>Regulation (EU) 2024/2847 (Cyber Resilience Act)</title>
            <seriesInfo name="CELEX:" value="32024R2847"/>
            <seriesInfo name="Official Journal of the European Union" value="L 2024/2847"/>
            <author>
              <organization>European Parliament</organization>
            </author>
            <author>
              <organization>Council of the European Union</organization>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="EU_NIS2_2022">
          <front>
            <title>Directive (EU) 2022/2555 (NIS 2 Directive)</title>
            <seriesInfo name="CELEX:" value="32022L2555"/>
            <seriesInfo name="Official Journal of the European Union" value="L 333"/>
            <author>
              <organization>European Parliament</organization>
            </author>
            <author>
              <organization>Council of the European Union</organization>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="ETSI_TS_104223_2025" target="https://www.etsi.org/deliver/etsi_ts/104200_104299/104223/01.01.01_60/ts_104223v010101p.pdf">
          <front>
            <title>Securing Artificial Intelligence (SAI); Baseline Cyber Security Requirements for AI Models and Systems</title>
            <seriesInfo name="ETSI TS" value="104 223, V1.1.1"/>
            <author>
              <organization>European Telecommunications Standards Institute</organization>
            </author>
            <date year="2025" month="April"/>
          </front>
        </reference>
        <reference anchor="AICPA_TSC_2017" target="https://www.aicpa-cima.com/resources/download/2017-trust-services-criteria-with-revised-points-of-focus-2022">
          <front>
            <title>Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (With Revised Points of Focus - 2022)</title>
            <seriesInfo name="AICPA" value="Trust Services Criteria"/>
            <author>
              <organization>American Institute of Certified Public Accountants</organization>
            </author>
            <author>
              <organization>Chartered Institute of Management Accountants</organization>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="NIST_SP_800_53_R5" target="https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final">
          <front>
            <title>Security and Privacy Controls for Information Systems and Organizations</title>
            <seriesInfo name="NIST Special Publication" value="800-53, Revision 5"/>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2020" month="September"/>
          </front>
        </reference>
        <reference anchor="OMB_M_21_31" target="https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-Cybersecurity-Incidents.pdf">
          <front>
            <title>Improving the Federal Government's Investigative and Remediation Capabilities Related to Cybersecurity Incidents</title>
            <seriesInfo name="OMB Memorandum" value="M-21-31"/>
            <author>
              <organization>Office of Management and Budget</organization>
            </author>
            <date year="2021" month="August"/>
          </front>
        </reference>
        <reference anchor="PCI_DSS_V4_0_1" target="https://www.pcisecuritystandards.org/document_library/">
          <front>
            <title>Payment Card Industry Data Security Standard</title>
            <seriesInfo name="PCI DSS" value="Version 4.0.1"/>
            <author>
              <organization>PCI Security Standards Council</organization>
            </author>
            <date year="2024" month="June"/>
          </front>
        </reference>
        <reference anchor="ISO_IEC_42001_2023" target="https://www.iso.org/standard/42001">
          <front>
            <title>Information technology - Artificial intelligence - Management system</title>
            <seriesInfo name="ISO/IEC" value="42001:2023"/>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <author>
              <organization>International Electrotechnical Commission</organization>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="FFIEC_IT_HANDBOOK_2024" target="https://ithandbook.ffiec.gov/">
          <front>
            <title>Information Technology Examination Handbook</title>
            <seriesInfo name="FFIEC" value="IT Examination Handbook"/>
            <author>
              <organization>Federal Financial Institutions Examination Council</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="BSI_AI_FINANCE_2024" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/KI/AI-Finance_Test-Criteria.pdf">
          <front>
            <title>Test Criteria Catalogue for AI Systems in Finance</title>
            <seriesInfo name="BSI" value="AI Finance Test Criteria"/>
            <author>
              <organization>Bundesamt fuer Sicherheit in der Informationstechnik</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="NIST_AI_100_2_E2025" target="https://csrc.nist.gov/pubs/ai/100/2/e2025/final">
          <front>
            <title>Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations</title>
            <seriesInfo name="NIST AI" value="100-2 E2025"/>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose_header-parameters" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <seriesInfo name="DOI" value="10.17487/RFC6973"/>
            <seriesInfo name="RFC" value="6973"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="EMERGENT_MISALIGNMENT_2025" target="https://arxiv.org/abs/2502.17424">
          <front>
            <title>Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs</title>
            <seriesInfo name="PMLR" value="267:4043-4068"/>
            <seriesInfo name="arXiv" value="2502.17424"/>
            <author initials="J." surname="Betley" fullname="Jan Betley">
              <organization/>
            </author>
            <author initials="D." surname="Tan" fullname="Daniel Tan">
              <organization/>
            </author>
            <author initials="N." surname="Warncke" fullname="Niels Warncke">
              <organization/>
            </author>
            <author initials="A." surname="Sztyber-Betley" fullname="Anna Sztyber-Betley">
              <organization/>
            </author>
            <author initials="X." surname="Bao" fullname="Xuchan Bao">
              <organization/>
            </author>
            <author initials="M." surname="Soto" fullname="Martin Soto">
              <organization/>
            </author>
            <author initials="N." surname="Labenz" fullname="Nathan Labenz">
              <organization/>
            </author>
            <author initials="O." surname="Evans" fullname="Owain Evans">
              <organization/>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="ISO_IEC_DIS_24970" target="https://www.iso.org/standard/88723.html">
          <front>
            <title>Artificial intelligence - AI system logging</title>
            <seriesInfo name="ISO/IEC DIS" value="24970"/>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <author>
              <organization>International Electrotechnical Commission</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1809?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank:
xor-hardener</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
