diff --git a/.github/workflows/observatory-update.yml b/.github/workflows/observatory-update.yml new file mode 100644 index 0000000..f103b9a --- /dev/null +++ b/.github/workflows/observatory-update.yml @@ -0,0 +1,34 @@ +name: Observatory Update +on: + schedule: + - cron: '0 6 * * 1' # Mondays 6am UTC + workflow_dispatch: +jobs: + update: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v4 + - uses: actions/setup-python@v5 + with: + python-version: '3.11' + - name: Install dependencies + run: pip install -e ".[dev]" + - name: Install Ollama + run: | + curl -fsSL https://ollama.com/install.sh | sh + ollama serve & + sleep 5 + ollama pull nomic-embed-text + - name: Run observatory update + env: + ANTHROPIC_API_KEY: ${{ secrets.ANTHROPIC_API_KEY }} + run: ietf observatory update --source ietf,w3c + - name: Generate dashboard + run: ietf observatory dashboard + - name: Commit and push + run: | + git config user.name "Observatory Bot" + git config user.email "bot@example.com" + git add docs/ data/drafts.db + git diff --staged --quiet || git commit -m "Observatory update $(date +%Y-%m-%d)" + git push diff --git a/CLAUDE.md b/CLAUDE.md new file mode 100644 index 0000000..677fbed --- /dev/null +++ b/CLAUDE.md @@ -0,0 +1,90 @@ +# IETF Draft Analyzer — Project Instructions + +## What This Is + +Python CLI tool (`ietf`) to track, categorize, rate, and map IETF Internet-Drafts on AI/agent topics. 361 drafts, 403 authors, 1,262 ideas, 12 gaps. Uses Claude for analysis, Ollama for embeddings, SQLite for storage. + +## Key Paths + +- Source: `src/ietf_analyzer/` +- Database: `data/drafts.db` (NOT `data/ietf_drafts.db`) +- Reports: `data/reports/` +- Blog series: `data/reports/blog-series/` +- Agent definitions: `.claude/agents/` +- Team prompt: `scripts/agent-team-prompt.md` +- Scripts: `scripts/` + +## Development Journal + +**Every agent and every session MUST log development milestones to `data/reports/dev-journal.md`.** + +This journal serves two purposes: +1. Track progress across sessions so nothing gets lost +2. Source material for the meta blog post about using Claude agent teams to build this project + +### What to Log + +Append entries in this format: + +```markdown +### [DATE] [AGENT/SESSION] — [SHORT TITLE] + +**What**: [What was done — features built, analyses run, posts written] +**Why**: [The reasoning or decision behind it] +**Result**: [Outcome, key numbers, links to artifacts] +**Surprise**: [Optional — anything unexpected, a lesson learned, a tool limitation hit] +**Cost**: [Optional — API tokens, time taken, model used] +``` + +### Examples of What to Log + +- Pipeline runs (how many drafts processed, cost, any failures) +- New features implemented (what, why, how it changed the analysis) +- Blog posts drafted or revised (key editorial decisions) +- Architectural decisions (why we structured something a certain way) +- Agent coordination moments (when one agent's output changed another's direction) +- Surprises in the data (unexpected findings that shifted the narrative) +- Tool/infra issues (things that broke, workarounds found) + +### What NOT to Log + +- Routine file reads or searches +- Minor formatting fixes +- Anything already captured in git commits + +## Agent Team Conventions + +When working as a team: + +1. **Architect** designs the narrative arc and reviews everything for coherence +2. **Analyst** runs the pipeline, queries the DB, provides data packages +3. **Coder** implements new features following existing patterns (Click CLI, SQLite, rich output) +4. **Writer** produces the blog series from data packages and architectural guidance + +All agents should: +- Read `scripts/agent-team-prompt.md` for the full brief +- Log milestones to `data/reports/dev-journal.md` +- Write blog posts to `data/reports/blog-series/` +- Save reusable scripts to `scripts/` +- Follow existing code patterns (don't over-engineer) + +## Blog Series + +7 posts planned in `data/reports/blog-series/` (01 through 07), plus: +- **Post 8: "Agents Building the Agent Analysis"** — Meta post about using Claude Code agent teams to analyze and write about IETF agent standards. The dev-journal.md is the source material for this post. + +## Code Conventions + +- CLI: Click commands in `cli.py` with `@click.option()` decorators +- DB: Tables in `db.py` `ensure_tables()`, queries as methods on `DraftDB` +- Reports: Report types in `reports.py` `generate_report()` +- Always cache Claude API calls via `llm_cache` table +- Use `rich` for console output +- Save multi-step workflows as scripts in `scripts/` + +## Current Status (2026-03-03) + +- v0.2.0, 361 drafts (101 new, unprocessed) +- 101 new drafts need: analyze, authors, ideas, embed, gaps +- Blog series: planned, not yet written +- Agent team: defined in `.claude/agents/`, ready to launch diff --git a/README.md b/README.md index 455a78e..10cb9c1 100644 --- a/README.md +++ b/README.md @@ -139,7 +139,42 @@ score = 0.30 * novelty + 0.25 * relevance + 0.20 * maturity + 0.15 * momentum + - **Safety deficit**: AI safety proposals (36) are vastly outnumbered by protocol proposals (290+) - **Organizational concentration**: Top 5 orgs contribute ~35% of all drafts - **1,262 technical ideas** extracted across 6 types (mechanism, architecture, protocol, pattern, extension, requirement) -- **12 identified gaps** in the current landscape +- **12 identified gaps** in the current landscape (3 critical, 6 high, 3 medium) + +## Gap Analysis + +Claude-powered gap analysis identifies 12 under-addressed areas across the 260-draft landscape. Each gap is cross-referenced with the drafts and ideas that partially touch on the topic, highlighting where effort is concentrated and where it's missing. + +### Critical Gaps + +| # | Gap | Category | Drafts in Category | Key Issue | +|--:|-----|----------|-------------------:|-----------| +| 1 | **Agent Resource Management** | Autonomous netops | 60 | No framework for scheduling, quotas, or fair allocation when agents compete for compute, memory, and bandwidth. Drafts focus on communication but ignore resource contention in multi-agent environments. | +| 2 | **Agent Behavior Verification** | AI safety/alignment | 36 | No runtime mechanisms to verify that deployed agents actually behave according to declared policies. Gap between stated capabilities and observed behavior. Closest work: `draft-birkholz-verifiable-agent-conversations` (attestation), `draft-aylward-daap-v2` (accountability). | +| 3 | **Agent Error Recovery & Rollback** | Autonomous netops | 60 | Missing standards for cascading failure recovery and rollback of autonomous decisions. Only `draft-yue-anima-agent-recovery-networks` specifically addresses recovery; `draft-srijal-agents-policy` touches mandatory failure behavior. | + +### High-Severity Gaps + +| # | Gap | Category | Drafts in Category | Key Issue | +|--:|-----|----------|-------------------:|-----------| +| 4 | **Cross-Protocol Translation** | A2A protocols | 92 | 92 competing A2A protocol drafts with high overlap but no universal translation layer or negotiation mechanism for interoperability between them. | +| 5 | **Agent Lifecycle Management** | Agent discovery/reg | 57 | Registration and discovery are covered but no standards for agent versioning, updates, graceful shutdown, or retirement without disrupting dependent services. | +| 6 | **Multi-Agent Consensus** | A2A protocols | 92 | No framework for groups of agents to reach consensus on conflicting decisions. Closest: `draft-li-dmsc-inf-architecture` (DMSC protocol), `draft-takagi-srta-trinity` (SRTA architecture). | +| 7 | **Human Override & Intervention** | Human-agent interaction | 22 | Only 22 drafts (vs 60 autonomous netops) address human-agent interaction. No emergency override protocols. Best effort: `draft-irtf-nmrg-llm-nm` (human-in-the-loop framework). | +| 8 | **Cross-Domain Security Boundaries** | Agent identity/auth | 98 | Missing frameworks for agents operating across security domains with different trust levels. `draft-diaconu-agents-authz-info-sharing` and `draft-cui-dmsc-agent-cdi` are early attempts but lack enforcement mechanisms. | +| 9 | **Dynamic Trust & Reputation** | Agent identity/auth | 98 | Static certificate-based auth is insufficient for long-running autonomous systems. No dynamic trust scoring or reputation tracking. Closest: `draft-cosmos-protocol-specification` (trust scoring), `draft-jiang-seat-dynamic-attestation`. | + +### Medium-Severity Gaps + +| # | Gap | Category | Drafts in Category | Key Issue | +|--:|-----|----------|-------------------:|-----------| +| 10 | **Agent Performance Monitoring** | Autonomous netops | 60 | No standardized metrics, SLOs, or observability framework for production agent deployments. `draft-fu-nmop-agent-communication-framework` mentions monitoring but doesn't define standards. | +| 11 | **Agent Explainability** | AI safety/alignment | 36 | No protocols for agents to explain decisions to other agents or humans. Critical for debugging and regulatory compliance. Only 36 safety drafts total. | +| 12 | **Agent Data Provenance** | Data formats/interop | 102 | No standards for tracking data lineage as information flows between agents. 102 data format drafts but none address provenance tracking. | + +### Gap Coverage Ratio + +The safety deficit is the most striking finding — only **12.3%** of categorized drafts (36/292) address AI safety/alignment, while 92 focus on A2A protocols and 60 on autonomous operations. The ratio of "how to do things" to "how to do things safely" is roughly **7:1**. ## Tech Stack diff --git a/data/drafts.db b/data/drafts.db index ff6c5a6..5631315 100644 Binary files a/data/drafts.db and b/data/drafts.db differ diff --git a/data/reports/authors.md b/data/reports/authors.md index 3271c54..6dd7241 100644 --- a/data/reports/authors.md +++ b/data/reports/authors.md @@ -1,109 +1,134 @@ # Author & Organization Network -*Generated 2026-02-28 10:40 UTC — 403 unique authors across 260 drafts* +*Generated 2026-03-03 19:58 UTC — 557 unique authors across 361 drafts* ## Top Authors by Draft Count | # | Author | Organization | Drafts | Categories | |--:|--------|-------------|-------:|------------| -| 1 | Bing Liu | Huawei | 21 | A2A protocols, AI safety/alignment, Agent discovery / registration | -| 2 | Nan Geng | Huawei | 19 | A2A protocols, AI safety/alignment, Agent discovery / registration | -| 3 | Zhenbin Li | Huawei | 19 | A2A protocols, AI safety/alignment, Agent discovery / registration | -| 4 | Qiangzhou Gao | Huawei | 18 | A2A protocols, AI safety/alignment, Agent discovery / registration | -| 5 | Xiaotong Shang | Huawei | 17 | A2A protocols, AI safety/alignment, Agent discovery / registration | -| 6 | Jianwei Mao | Huawei | 11 | A2A protocols, AI safety/alignment, Agent discovery/reg | -| 7 | Aijun Wang | China Telecom | 8 | A2A protocols, Agent discovery / registration, Agent discovery/reg | -| 8 | Yong Cui | Tsinghua University | 8 | A2A protocols, AI safety/alignment, Agent discovery / registration | -| 9 | Guanming Zeng | Huawei | 7 | A2A protocols, Agent discovery/reg, Autonomous netops | -| 10 | Göran Selander | Ericsson | 7 | A2A protocols, Agent discovery/reg, Agent identity/auth | -| 11 | Michael Richardson | Sandelman Software Works | 7 | Agent discovery/reg, Agent identity/auth, Autonomous netops | -| 12 | Jonathan Rosenberg | Five9 | 7 | A2A protocols, AI safety/alignment, Agent discovery/reg | -| 13 | Madhava Gaikwad | | 6 | A2A protocols, Agent discovery/reg, Agent identity/auth | -| 14 | Pat White | Bitwave | 6 | A2A protocols, AI safety/alignment, Agent discovery/reg | -| 15 | Cullen Fluffy Jennings | Cisco | 6 | A2A protocols, AI safety/alignment, Agent discovery / registration | -| 16 | Li Zhang | Huawei Technologies | 5 | A2A protocols, Agent discovery / registration, Agent discovery/reg | -| 17 | Tirumaleswar Reddy.K | Nokia | 5 | Agent identity/auth, Data formats/interop | -| 18 | Roland Schott | Deutsche Telekom | 5 | A2A protocols, Agent discovery/reg, Agent identity/auth | -| 19 | John Preuß Mattsson | Ericsson | 5 | A2A protocols, Agent discovery/reg, Agent identity/auth | -| 20 | Chenguang Du | Zhongguancun Laboratory | 4 | A2A protocols, Agent discovery / registration, Agent discovery/reg | -| 21 | Mengyao Han | China Unicom | 4 | A2A protocols, Agent discovery/reg, Agent identity/auth | -| 22 | Aritra Banerjee | Nokia | 4 | Agent identity/auth | -| 23 | Peter Chunchi Liu | Huawei | 4 | A2A protocols, AI safety/alignment, Agent identity/auth | -| 24 | Xueting Li | China Telecom | 4 | A2A protocols, Agent discovery/reg, Agent identity/auth | -| 25 | Lidia Pocero Fraile | ISI, R.C. ATHENA | 4 | A2A protocols, Agent identity/auth | -| 26 | Meiling Chen | China Mobile | 4 | A2A protocols, AI safety / guardrails / alignment, AI safety/alignment | -| 27 | Christos Koulamas | ISI, R.C. ATHENA | 4 | A2A protocols, Agent identity/auth | -| 28 | Marco Tiloca | RISE AB | 4 | A2A protocols, Agent identity/auth, Data formats/interop | -| 29 | Diego Lopez | Telefonica | 4 | A2A protocols, AI safety/alignment, Agent discovery/reg | -| 30 | Li Su | China Mobile | 4 | A2A protocols, AI safety / guardrails / alignment, AI safety/alignment | +| 1 | Bing Liu | Huawei | 23 | A2A protocols, AI safety/alignment, Agent discovery / registration | +| 2 | Zhenbin Li | Huawei | 21 | A2A protocols, AI safety/alignment, Agent discovery / registration | +| 3 | Nan Geng | Huawei | 20 | A2A protocols, AI safety/alignment, Agent discovery / registration | +| 4 | Qiangzhou Gao | Huawei | 20 | A2A protocols, AI safety/alignment, Agent discovery / registration | +| 5 | Xiaotong Shang | Huawei | 19 | A2A protocols, AI safety/alignment, Agent discovery / registration | +| 6 | Jianwei Mao | Huawei | 14 | A2A protocols, AI safety/alignment, Agent discovery/reg | +| 7 | Guanming Zeng | Huawei | 13 | A2A protocols, Agent discovery/reg, Autonomous netops | +| 8 | Qin Wu | Huawei | 10 | A2A protocols, Agent discovery / registration, Agent discovery/reg | +| 9 | Jonathan Rosenberg | Five9 | 10 | A2A protocols, AI safety/alignment, Agent discovery/reg | +| 10 | Cullen Fluffy Jennings | Cisco | 9 | A2A protocols, AI safety/alignment, Agent discovery / registration | +| 11 | Luis M. Contreras | Telefonica | 8 | Autonomous netops, Data formats/interop, ML traffic mgmt | +| 12 | Aijun Wang | China Telecom | 8 | A2A protocols, Agent discovery / registration, Agent discovery/reg | +| 13 | Yong Cui | Tsinghua University | 8 | A2A protocols, AI safety/alignment, Agent discovery / registration | +| 14 | Sun Qiong | China Telecom | 7 | A2A protocols, Agent discovery/reg, Autonomous netops | +| 15 | Chongfeng Xie | China Telecom | 7 | A2A protocols, Agent discovery/reg, Autonomous netops | +| 16 | Göran Selander | Ericsson | 7 | A2A protocols, Agent discovery/reg, Agent identity/auth | +| 17 | Qing Li | Pengcheng Laboratory | 7 | A2A protocols, Agent discovery/reg, Agent identity/auth | +| 18 | Michael Richardson | Sandelman Software Works | 7 | Agent discovery/reg, Agent identity/auth, Autonomous netops | +| 19 | Madhava Gaikwad | | 6 | A2A protocols, Agent discovery/reg, Agent identity/auth | +| 20 | Yong Jiang | Tsinghua Shenzhen International Graduate School & Pengcheng Laboratory | 6 | A2A protocols, Agent discovery/reg, Agent identity/auth | +| 21 | Pat White | Bitwave | 6 | A2A protocols, AI safety/alignment, Agent discovery/reg | +| 22 | Mengyao Han | China Unicom | 6 | A2A protocols, AI safety/alignment, Agent discovery/reg | +| 23 | Zongpeng Du | China Mobile | 6 | A2A protocols, Agent discovery / registration, Agent discovery/reg | +| 24 | Suhas Nandakumar | Cisco | 6 | A2A protocols, Agent discovery / registration, Agent discovery/reg | +| 25 | Bo Wu | Huawei | 6 | A2A protocols, Autonomous netops, Data formats/interop | +| 26 | Fred Templin | Boeing | 6 | A2A protocols, Autonomous netops, Data formats/interop | +| 27 | Muhammad Awais Jadoon | InterDigital | 5 | A2A protocols, Autonomous netops, Data formats/interop | +| 28 | Li Zhang | Huawei | 5 | A2A protocols, Agent discovery / registration, Agent discovery/reg | +| 29 | Diego Lopez | Telefonica | 5 | A2A protocols, AI safety/alignment, Agent discovery/reg | +| 30 | Tirumaleswar Reddy.K | Nokia | 5 | Agent identity/auth, Data formats/interop | ## Top Organizations | # | Organization | Authors | Drafts | |--:|-------------|--------:|-------:| -| 1 | Huawei | 30 | 25 | -| 2 | China Mobile | 17 | 19 | -| 3 | Huawei Technologies | 12 | 18 | -| 4 | China Telecom | 17 | 15 | -| 5 | China Unicom | 19 | 14 | -| 6 | Cisco | 10 | 12 | -| 7 | Tsinghua University | 7 | 11 | -| 8 | Independent | 10 | 9 | -| 9 | Cisco Systems | 10 | 9 | -| 10 | Sandelman Software Works | 1 | 7 | -| 11 | Independent Researcher | 4 | 7 | -| 12 | Five9 | 1 | 7 | -| 13 | Zhongguancun Laboratory | 4 | 6 | -| 14 | ZTE Corporation | 8 | 6 | -| 15 | Bitwave | 1 | 6 | -| 16 | Nokia | 2 | 5 | -| 17 | Inria | 5 | 5 | -| 18 | Unaffiliated | 1 | 4 | -| 19 | Telefonica | 2 | 4 | -| 20 | ISI, R.C. ATHENA | 4 | 4 | +| 1 | Huawei | 53 | 66 | +| 2 | China Mobile | 24 | 35 | +| 3 | Cisco | 24 | 26 | +| 4 | Independent | 19 | 25 | +| 5 | China Telecom | 24 | 24 | +| 6 | China Unicom | 22 | 21 | +| 7 | Tsinghua University | 13 | 16 | +| 8 | ZTE Corporation | 12 | 12 | +| 9 | Five9 | 1 | 10 | +| 10 | Ericsson | 4 | 9 | +| 11 | Google | 5 | 9 | +| 12 | Telefonica | 2 | 8 | +| 13 | Pengcheng Laboratory | 8 | 8 | +| 14 | BUPT | 14 | 7 | +| 15 | Futurewei | 3 | 7 | +| 16 | Sandelman Software Works | 1 | 7 | +| 17 | Zhongguancun Laboratory | 4 | 6 | +| 18 | Amazon | 6 | 6 | +| 19 | Inria | 6 | 6 | +| 20 | CAICT | 8 | 6 | -## Strongest Collaboration Pairs +## Team Blocs + +*Persistent co-author teams (>= 70% pairwise draft overlap, >= 3 shared drafts).* + +| # | Team | Members | Shared Drafts | Cohesion | Key Authors | +|--:|------|--------:|-----:|--------:|------------| +| 1 | Huawei team (12) | 12 | 23 | 96% | B. Liu, Z. Li, Q. Gao, N. Geng, X. Shang, J. Mao +6 | +| 2 | Cisco team (5) | 5 | 13 | 100% | J. Rosenberg, C. Jennings, S. Nandakumar, P. White, I. Swett | +| 3 | Huawei team (8) | 8 | 6 | 98% | Q. Wu, Y. Hong, J. Youn, G. Fioccola, C. Pignataro, P. Martinez-Julia +2 | +| 4 | China Telecom team (5) | 5 | 6 | 88% | L. Contreras, C. Xie, S. Qiong, B. Wu, L. Dunbar | +| 5 | Ericsson team (5) | 5 | 6 | 100% | G. Selander, J. Mattsson, M. Vučinić, F. Lopez-Gomez, R. Marin-Lopez | +| 6 | Pengcheng Laboratory team (4) | 4 | 6 | 100% | Q. Li, Y. Jiang, M. Xu, H. Wang | +| 7 | China Telecom team (6) | 6 | 5 | 100% | A. Wang, M. Yu, J. Li, Z. Liu, C. Yang, Z. Li | +| 8 | InterDigital Europe team (4) | 4 | 5 | 92% | M. Jadoon, C. Bernardos, A. Mourad, S. Robitzsch | +| 9 | Zhongguancun Laboratory team (4) | 4 | 5 | 94% | Y. Cui, C. Du, L. Zhang, M. Xing | +| 10 | Centec Networks team (6) | 6 | 4 | 100% | Z. Du, Q. Xiong, Z. Li, J. Zhao, J. Wang, W. Cheng | +| 11 | Infoblox, Inc. team (4) | 4 | 4 | 100% | R. Schott, B. Sarikaya, J. Mozley, N. Williams | +| 12 | ISI, R.C. ATHENA team (4) | 4 | 4 | 100% | E. Haleplidis, L. Fraile, A. Fournaris, C. Koulamas | +| 13 | Nokia team (2) | 2 | 4 | 100% | T. Reddy.K, A. Banerjee | +| 14 | China Mobile team (2) | 2 | 4 | 100% | M. Chen, L. Su | +| 15 | Department of Computer Science & Engineering team (3) | 3 | 3 | 100% | J. Jeong, Y. Ahn, Y. Kim | +| 16 | RISE team (2) | 2 | 3 | 100% | M. Tiloca, R. Höglund | +| 17 | Huawei team (2) | 2 | 3 | 100% | P. Liu, N. Yuan | +| 18 | China Unicom team (2) | 2 | 3 | 100% | H. Zhengxin, Z. Ruan | + +## Top Collaboration Pairs + +*Excluding intra-bloc pairs (see Team Blocs above).* | Author A | Author B | Shared Drafts | |----------|----------|-----:| -| Bing Liu | Nan Geng | 18 | -| Zhenbin Li | Qiangzhou Gao | 18 | -| Zhenbin Li | Nan Geng | 18 | -| Bing Liu | Zhenbin Li | 17 | -| Bing Liu | Qiangzhou Gao | 17 | -| Bing Liu | Xiaotong Shang | 17 | -| Zhenbin Li | Xiaotong Shang | 17 | -| Qiangzhou Gao | Nan Geng | 17 | -| Qiangzhou Gao | Xiaotong Shang | 17 | -| Nan Geng | Xiaotong Shang | 17 | -| Zhenbin Li | Jianwei Mao | 10 | -| Jianwei Mao | Nan Geng | 10 | -| Bing Liu | Jianwei Mao | 9 | -| Jianwei Mao | Qiangzhou Gao | 9 | -| Jianwei Mao | Xiaotong Shang | 9 | -| Jonathan Rosenberg | Pat White | 6 | -| Jianwei Mao | Guanming Zeng | 6 | -| John Preuß Mattsson | Göran Selander | 5 | -| Bing Liu | Li Zhang | 5 | -| Bing Liu | Guanming Zeng | 5 | +| Jianwei Mao | Guanming Zeng | 9 | +| Bing Liu | Guanming Zeng | 7 | +| Zhenbin Li | Guanming Zeng | 7 | +| Qiangzhou Gao | Guanming Zeng | 7 | +| Guanming Zeng | Xiaotong Shang | 7 | +| Nan Geng | Guanming Zeng | 6 | +| Qin Wu | Guanming Zeng | 3 | +| Martin Thomson | Gary Illyes | 2 | +| Yong Cui | Xiaohui Xie | 2 | +| Qing Li | Teng Gao | 2 | +| Aijun Wang | Xueting Li | 2 | +| Quan Xiong | Han Zhengxin | 2 | +| Ran Pang | Han Zhengxin | 2 | +| Ran Pang | Mengyao Han | 2 | +| Ran Pang | Zheng Ruan | 2 | +| Han Zhengxin | Mengyao Han | 2 | +| Mengyao Han | Zheng Ruan | 2 | +| Yong Jiang | Teng Gao | 2 | +| Eliot Lear | Michael Richardson | 1 | +| Eliot Lear | Steffen Fries | 1 | ## Cross-Organization Collaboration | Org A | Org B | Shared Drafts | |-------|-------|-----:| -| Five9 | Bitwave | 6 | +| China Telecom | Huawei | 8 | +| China Unicom | Huawei | 7 | +| China Mobile | ZTE Corporation | 7 | +| China Mobile | Huawei | 7 | +| Futurewei | Huawei | 6 | +| Bitwave | Five9 | 6 | +| Cisco | Five9 | 6 | | Tsinghua University | Zhongguancun Laboratory | 5 | -| Huawei | China Mobile | 4 | -| Huawei | China Unicom | 4 | -| China Mobile | ZTE Corporation | 3 | -| Five9 | Cisco | 3 | -| Huawei | China Telecom | 3 | -| Unaffiliated | Deutsche Telekom | 3 | -| Unaffiliated | Infoblox, Inc. | 3 | -| AWS | University of Waterloo | 2 | -| Aryaka | JPMorgan Chase & Co | 2 | -| Aryaka | Oracle | 2 | -| Aryaka | Telefonica | 2 | -| Beijing University of Posts and - Telecommunications | China Telecom | 2 | -| Beijing University of Posts and - Telecommunications | Tsinghua University | 2 | \ No newline at end of file +| China Unicom | ZTE Corporation | 5 | +| Huawei | Telefonica | 5 | +| Cisco | Google | 5 | +| Futurewei | Telefornica | 5 | +| China Telecom | Futurewei | 5 | +| Huawei | Telefornica | 5 | +| China Telecom | Telefornica | 5 | \ No newline at end of file diff --git a/data/reports/blog-post.md b/data/reports/blog-post.md new file mode 100644 index 0000000..bb31748 --- /dev/null +++ b/data/reports/blog-post.md @@ -0,0 +1,148 @@ +# The IETF's AI Agent Gold Rush: 260 Drafts, 403 Authors, and a 4:1 Safety Deficit + +*An automated analysis of every AI/agent Internet-Draft submitted to the IETF* + +--- + +The Internet Engineering Task Force is in the middle of an AI agent standardization sprint. We built an automated analyzer to fetch, categorize, and rate every AI- and agent-related Internet-Draft currently in the IETF pipeline. The numbers tell a story of breakneck activity, deep geopolitical concentration, and a worrying gap between the protocols being built and the safety guardrails that should accompany them. + +Here's what we found. + +## By the Numbers + +- **260** Internet-Drafts related to AI agents +- **403** unique authors from **184** distinct organizations +- **1,262** technical ideas extracted and classified +- **12** standardization gaps identified (3 critical) + +The drafts span eight categories. The biggest clusters are data formats and interoperability (102 drafts), agent identity and authentication (98), and agent-to-agent communication protocols (92). Safety and alignment? Just 36 drafts. Human-agent interaction? Only 22. + +That's a **4:1 ratio** of capability-building to safety work. + +## Who's Writing These Drafts + +The organizational leaderboard is striking. **Huawei** leads by a wide margin: 39 authors contributing to 45 drafts. The next largest contributors are independent researchers (16 authors, 21 drafts) and Cisco (23 authors, 20 drafts). + +Chinese-linked institutions dominate the top ranks. Huawei, China Mobile, China Telecom, China Unicom, Tsinghua University, ZTE Corporation, Zhongguancun Laboratory, BUPT (Beijing University of Posts and Telecommunications), and CAICT collectively account for over 120 authors. While IETF drafts don't carry national flags, the concentration of authorship from organizations in a single country is notable. + +Western tech companies have a comparatively thin presence. Ericsson has 2 authors on 7 drafts. Nokia has 2 authors on 5. Amazon has 6 authors on 6 drafts. Google, Apple, and Microsoft are largely absent. + +## The Team Bloc Pattern + +When we analyzed co-authorship patterns, a clear structure emerged: persistent team blocs — groups of authors who co-sign most or all of the same drafts together. + +We detected **33 team blocs** covering **102 of 403 authors** (25%). Each bloc is a group where members share at least 70% pairwise draft overlap. The largest is a **13-person Huawei team** that co-authors 22 drafts together at 94% internal cohesion. Five core members — Bing Liu, Nan Geng, Zhenbin Li, Qiangzhou Gao, and Xiaotong Shang — appear on 17-21 drafts each, and virtually all of their work overlaps. + +Other significant blocs include: + +| Team | Members | Shared Drafts | Cohesion | +|------|--------:|-----:|--------:| +| Huawei (main team) | 13 | 22 | 94% | +| Ericsson + Inria + Univ. of Murcia | 5 | 6 | 100% | +| Five9 + Bitwave | 2 | 6 | 100% | +| China Telecom + BUPT + Tsinghua | 6 | 5 | 100% | +| Zhongguancun Lab + Tsinghua | 4 | 5 | 94% | +| ISI, R.C. ATHENA | 4 | 4 | 100% | +| Nokia | 2 | 4 | 100% | + +This matters because raw "collaboration pair" analysis is misleading without accounting for team structure. When five people co-author 17 drafts, you get 10 pairwise edges that all show 17 shared drafts — drowning out the more interesting cross-team connections. Once we filter out intra-bloc pairs, the real cross-pollination picture emerges: it's sparse. The top cross-team pair (Jonathan Rosenberg and Cullen Fluffy Jennings, bridging Five9/Bitwave and Cisco) shares only 3 drafts. Most cross-team pairs share just 1. + +## Cross-Organization Collaboration + +The strongest cross-org links are: + +| Org A | Org B | Shared Drafts | +|-------|-------|-----:| +| China Unicom | Huawei | 6 | +| Bitwave | Five9 | 6 | +| Tsinghua University | Zhongguancun Laboratory | 5 | +| Ericsson | Inria | 4 | +| Cisco | Sandelman Software Works | 4 | +| China Mobile | ZTE Corporation | 4 | + +The Chinese organizations form a tightly linked ecosystem. Huawei collaborates with China Unicom (6 shared drafts), China Mobile (4), China Telecom (3), CAICT (3), and Telefonica (3). The academic institutions — Tsinghua, BUPT, Zhongguancun Lab — form their own cluster with overlapping authorship into the telecom operators. + +European cross-org collaboration exists but is thinner: Ericsson partners with Inria and the University of Murcia on lightweight authentication protocols (EDHOC, EAP). The U.S. picture is fragmented, with small startup pairs (Five9 + Bitwave on agent communication protocols) and Cisco's collaboration with Sandelman Software Works on IoT device identity. + +## What's Being Built + +The 1,262 extracted technical ideas break down as: + +- **488 mechanisms** — concrete technical solutions (authentication flows, routing algorithms, token formats) +- **217 architectures** — system designs and reference models +- **179 protocols** — full protocol specifications +- **169 patterns** — reusable design approaches +- **99 extensions** — additions to existing standards (OAuth, SCIM, DNS) +- **93 requirements** — formal requirement documents + +The most recurring idea across the corpus is **Multi-Agent Communication Protocol**, appearing in 8 separate drafts — a clear sign of fragmentation where multiple teams are tackling the same problem independently. + +The highest-rated drafts (scored on novelty, maturity, overlap, momentum, and relevance on a 1-5 scale) are: + +1. **draft-aylward-daap-v2** (4.8) — Comprehensive AI agent accountability protocol with authentication, monitoring, and enforcement +2. **draft-guy-bary-stamp-protocol** (4.6) — Cryptographic delegation and proof system for AI agent task execution +3. **draft-drake-email-tpm-attestation** (4.6) — Hardware attestation for email using TPM verification chains +4. **draft-ietf-lake-app-profiles** (4.6) — Canonical CBOR representation for EDHOC application profiles + +The average score across all 260 drafts is 3.38. The range runs from 1.6 (draft-liu-access-collaboration-agent) to 4.8. + +## The 12 Gaps + +Our gap analysis compared the existing 260 drafts and 1,262 ideas against what would be needed for real-world deployment of autonomous AI agent systems. We found 12 gaps — areas where standardization work is missing or inadequate. + +### Critical Gaps (3) + +**1. Agent Behavior Verification.** No mechanisms to verify that deployed agents actually behave according to their declared policies. The gap between stated capabilities and runtime behavior validation is entirely unaddressed. Only 36 of 260 drafts touch safety/alignment. + +**2. Agent Resource Management.** No framework for managing computational resources, memory, and processing power across distributed AI agents. Drafts focus on communication but ignore resource contention. + +**3. Agent Error Recovery and Rollback.** No standards for cascading failure handling or rollback mechanisms for autonomous decisions. One draft (draft-yue-anima-agent-recovery-networks) begins to address this; the rest ignore it. + +### High-Priority Gaps (6) + +- **Cross-Protocol Translation** — With 92 competing A2A protocols, there's no interoperability framework. Zero technical ideas found addressing this. +- **Multi-Agent Consensus Mechanisms** — No frameworks for groups of agents to resolve conflicting decisions without human intervention. +- **Human Override and Intervention** — Only 22 human-agent interaction drafts vs. 60 autonomous operations drafts. No emergency override protocols. +- **Agent Lifecycle Management** — Registration is covered but versioning, updates, and graceful retirement are not. +- **Cross-Domain Security Boundaries** — Identity management exists but cross-domain trust isolation does not. +- **Dynamic Trust and Reputation** — Static certificates can't scale to long-running agent ecosystems. + +### Medium-Priority Gaps (3) + +- **Agent Performance Monitoring** — No observability standards for production agent deployments. +- **Agent Explainability Standards** — No protocols for agents to explain their decisions. +- **Agent Data Provenance** — 102 data format drafts but no provenance tracking. + +## The Safety Deficit + +The most concerning finding is the structural imbalance between capability and safety work. The numbers: + +| Focus Area | Drafts | +|------------|-------:| +| A2A protocols | 92 | +| Autonomous operations | 60 | +| Agent identity/auth | 98 | +| **AI safety/alignment** | **36** | +| **Human-agent interaction** | **22** | + +For every draft addressing how to keep AI agents safe, roughly four drafts are building new capabilities for those agents. The human oversight category — arguably the most important for preventing autonomous systems from causing harm — receives the least attention of any major category. + +The three critical gaps (behavior verification, resource management, error recovery) all relate to what happens when autonomous agents fail or misbehave. These are precisely the scenarios where absent standards will hurt the most. + +## What It All Means + +The IETF's AI agent standards landscape in early 2026 looks like a gold rush: lots of activity, heavy investment from a concentrated set of players, and a focus on staking claims rather than building infrastructure. + +Three observations stand out: + +**1. The fragmentation problem is real.** Eight separate drafts proposing multi-agent communication protocols. Ninety-two A2A protocol drafts with no interoperability layer. The most common technical idea in the entire corpus appears in just 8 of 260 drafts. Teams are working in parallel, not together. + +**2. Authorship concentration creates standards risk.** When 13 people from one organization co-author 22 drafts at 94% cohesion, the standards process risks reflecting a single implementation perspective. The IETF's strength is rough consensus from diverse implementors. That diversity is thin here. + +**3. The safety work needs to catch up.** The 4:1 capability-to-safety ratio is not sustainable. Before these protocols reach deployment, the community needs answers to questions like: How do you verify an agent is doing what it claims? How do you roll back an autonomous decision? How does a human stop a misbehaving agent? + +The IETF has navigated technology gold rushes before — the early web, IoT, DNS security. In each case, the lasting standards came from diverse coalitions focused on interoperability and safety, not from the fastest drafters. The AI agent wave will likely follow the same pattern. The question is whether the safety work catches up before the protocols ship. + +--- + +*Analysis conducted using a custom IETF Draft Analyzer that fetches drafts via the Datatracker API, rates them using Claude, extracts technical ideas, detects collaboration patterns, and identifies standardization gaps. Data current as of March 1, 2026. All 260 drafts, 403 authors, and 1,262 ideas are available in the project's SQLite database.* diff --git a/data/reports/blog-series/00-series-overview.md b/data/reports/blog-series/00-series-overview.md new file mode 100644 index 0000000..ba93a9b --- /dev/null +++ b/data/reports/blog-series/00-series-overview.md @@ -0,0 +1,326 @@ +# Blog Series: The IETF's AI Agent Standards Race + +## Series Overview and Narrative Arc + +*Architectural design document governing the 7-post blog series. This document has two sections: (A) the internal narrative architecture (for the team), and (B) the reader-facing series introduction (for publication).* + +--- + +# PART A: NARRATIVE ARCHITECTURE (Internal) + +## Overall Thesis + +**The IETF's AI agent standardization effort is the largest, fastest-growing, and most consequential standards race in a decade -- but it is building the highways before the traffic lights.** + +The data tells a story in three acts: + +1. **The Gold Rush** (Posts 1-2): An explosion of activity, concentrated in surprising hands. 361 drafts, 36x growth in 9 months, one company writing 18% of all drafts, Western tech giants dramatically underrepresented. + +2. **The Fragmentation** (Posts 3-4): That activity is not converging. 120 competing A2A protocols with no interoperability layer. 14 OAuth-for-agents proposals that cannot coexist. A 4:1 ratio of capability-building to safety work. Critical gaps where nobody is building at all. + +3. **The Path Forward** (Posts 5-6): The raw material for a solution exists -- **628 technical ideas** independently proposed by multiple organizations show where genuine consensus is forming. But convergence on components is not convergence on architecture. The missing piece is not more protocols; it is connective tissue: a shared execution model, human oversight primitives, protocol interoperability, and assurance profiles. + +The throughline is a question: **Can the IETF assemble the architecture before the protocols ship without it?** + +--- + +## Narrative Arc Diagram + +``` +TENSION + ^ + | Post 6: THE BIG PICTURE + | / (resolution: here's + | / what the ecosystem + | Post 4: THE GAPS -----+ actually needs) + | / (climax: what \ + | / nobody's building) \ + | Post 3 / Post 5 \ + | FRAGMENTATION CONVERGENCE \ + | / (escalation: (628 cross-org \ + | / competing for solutions) Post 7 + | / protocols) HOW WE + |/ BUILT THIS + Post 1 Post 2 + GOLD RUSH WHO WRITES + (hook: the THE RULES + numbers) (stakes: + geopolitics) + +-----------------------------------------------------------> TIME/POSTS +``` + +**The emotional arc**: Wow, this is huge (Post 1) -> Wait, who controls it? (Post 2) -> Oh no, it is fragmenting (Post 3) -> And the most important parts are missing (Post 4, the climax) -> But beneath the chaos, organizations actually agree on 628 ideas (Post 5) -> Here is what the finished picture looks like (Post 6, the resolution) -> And here is how we figured all this out (Post 7, the coda). + +--- + +## Per-Post Design + +### Post 1: "The IETF's AI Agent Gold Rush" +**File**: `01-gold-rush.md` +**Word count**: 1800-2200 +**Base**: Existing draft at `data/reports/blog-post.md`, needs update from 260 to 361 drafts + +**Key thesis**: The IETF is experiencing an unprecedented standardization sprint around AI agents, with growth rates not seen since the early web standards era. + +**Key data points to include**: +- 361 drafts (up from 260 after keyword expansion with mcp, agentic, inference, generative, intelligent, aipref) +- 36x growth: 2 drafts/month (Jun 2025) to 72 drafts/month (Feb 2026) +- 557 authors from 230 organizations +- 10+ categories, with data formats/interop (145), A2A protocols (120), and identity/auth (108) leading +- Average quality score: ~3.38/5.0 (range 1.35-4.8) +- Top-rated drafts: VOLT (4.8), DAAP (4.8), STAMP (4.6), TPM-attestation (4.6) +- 4:1 safety deficit ratio (first mention -- this becomes the recurring motif) + +**What makes it worth reading alone**: The sheer numbers. Nobody else has quantified this. The 36x growth curve is the hook. + +**Ends with**: Teaser for Post 2 -- "But who is writing all these drafts? The answer is more concentrated than you'd expect." + +--- + +### Post 2: "Who's Writing the Rules for AI Agents?" +**File**: `02-who-writes-the-rules.md` +**Word count**: 2000-2500 + +**Key thesis**: The standards that will govern AI agents are being written by a remarkably concentrated set of authors, with geopolitical implications that the IETF community has not reckoned with. + +**Key data points to include**: +- Huawei: 53 authors, 66 drafts, 18% of all drafts (up from 12% pre-expansion) +- The 13-person Huawei bloc: 22 shared drafts, 94% cohesion, core 7 (B. Liu, N. Geng, Z. Li, Q. Gao, X. Shang, J. Mao, G. Zeng) each on 13-23 drafts +- Chinese institutional ecosystem: Huawei (53) + China Mobile (24) + China Telecom (24) + China Unicom (22) + Tsinghua (13) + ZTE (12) + BUPT (14) + Pengcheng Lab (8) + Zhongguancun Lab (4) = 160+ authors +- Western underrepresentation: Google now visible (5 authors, 9 drafts) but dramatically small relative to market position. Microsoft, Apple still largely absent. Amazon has 6 authors on 6 drafts (PQ crypto, not agent-specific). +- 18 team blocs covering ~25% of 557 authors +- Cross-org collaboration is sparse: top cross-team pair (Rosenberg-Jennings, Five9/Cisco) shares only 3 drafts +- Ericsson + Inria team focused narrowly on EDHOC/post-quantum (5 people, 6 drafts, 100% cohesion) +- JPMorgan + Telefonica + Oracle on transitive attestation (Western financial sector emerging) +- Chinese orgs form a tightly linked ecosystem: Huawei-China Unicom (6 shared drafts), Tsinghua-Zhongguancun Lab (5), China Mobile-ZTE (4) + +**Structural insight**: Team blocs inflate apparent collaboration. When you account for intra-bloc pairs, cross-pollination between groups is thin. The landscape is a collection of islands, not a network. + +**What makes it worth reading alone**: The geopolitics angle. The Huawei concentration is a genuine story. The Western absence is the surprise. + +**Ends with**: "These 18 teams are not just writing separate drafts -- they are writing separate futures. The fragmentation runs deeper than authorship." + +--- + +### Post 3: "The OAuth Wars and Other Protocol Battles" +**File**: `03-oauth-wars.md` +**Word count**: 2000-2500 + +**Key thesis**: The AI agent standards landscape is not just growing -- it is fragmenting. Multiple teams are solving the same problems independently, producing incompatible solutions that will impose real costs on implementers. + +**Key data points to include**: +- 14-draft OAuth-for-agents cluster: aap-oauth-profile, aylward-daap-v2, barney-caam, chen-ai-agent-auth, chen-oauth-rar, goswami-agentic-jwt, jia-oauth-scope, liu-agent-operation-auth, liu-oauth-a2a, oauth-ai-agents-on-behalf-of-user, rosenberg-oauth-aauth, song-oauth-ai-agent-auth, song-oauth-ai-agent-collaborate, yao-agent-auth +- 10-draft Agent Gateway cluster +- 25+ near-duplicate draft pairs (>0.98 similarity) +- 42 topical clusters at 0.85 similarity threshold, 34 at 0.90 +- 120 A2A protocol drafts with no interoperability layer +- Near-duplicate taxonomy: same-draft/different-WG (14), renamed (5), evolution (3), competing (2) +- Specific examples of WG shopping: draft submitted to both NMRG and OPSAWG, or both individual and WG track + +**Structural insight**: Three causes of fragmentation: (1) WG shopping -- authors submit to multiple WGs hoping one sticks. (2) Parallel invention -- teams in isolation solving the same problem. (3) Strategic duplication -- organizations maximizing surface area. The data lets us distinguish these. + +**What makes it worth reading alone**: The concrete examples. 14 ways to do OAuth for agents. People share this out of horrified fascination. + +**Ends with**: "Fragmentation is costly but fixable -- teams can converge. The deeper problem is what nobody is building at all." + +--- + +### Post 4: "What Nobody's Building (And Why It Matters)" +**File**: `04-what-nobody-builds.md` +**Word count**: 2000-2500 + +**THIS IS THE CLIMAX OF THE SERIES.** + +**Key thesis**: The most dangerous gaps in AI agent standardization are not where competing solutions exist -- they are where no solutions exist at all. The three critical gaps address what happens when autonomous agents fail or misbehave, and these scenarios have received almost no attention. + +**Key data points to include**: +- 12 gaps total: 3 critical, 6 high, 3 medium +- **Critical Gap 1: Behavior Verification** -- no mechanisms to verify agents follow declared policies. 44 safety drafts vs 361 total. +- **Critical Gap 2: Resource Management** -- 93 autonomous netops drafts, no agent-specific resource management framework. +- **Critical Gap 3: Error Recovery and Rollback** -- only 6 ideas from 1 draft (the starkest absence in the corpus). +- **High Gap: Cross-Protocol Translation** -- 120 A2A protocols, zero ideas for cross-protocol interop. +- **High Gap: Human Override** -- 30 human-agent drafts vs 120 A2A vs 93 autonomous netops. CHEQ exists but no emergency override protocol. +- The 4:1 ratio revisited: safety deficit is not just numerical, it is structural. Safety requires cross-WG coordination that the bloc structure cannot produce. +- Gap severity correlates with coordination difficulty + +**For each critical gap, include a scenario**: "What goes wrong if this is never addressed?" -- make the gaps concrete and visceral. + +**What makes it worth reading alone**: The fear factor. This is the "what keeps you up at night" post. + +**Ends with**: "The gaps are real. But so are the solutions -- 628 ideas that multiple organizations independently agree on, scattered across the corpus with no connective tissue." + +--- + +### Post 5: "Where 361 Drafts Converge (And Where They Don't)" +**File**: `05-1262-ideas.md` +**Word count**: 2000-2500 + +**Key thesis**: Beneath the fragmentation, genuine consensus is forming. **628 technical ideas** have been independently proposed by 2+ organizations -- cross-org convergence signals that reveal what the industry actually agrees on, regardless of which protocol camp they belong to. + +**IMPORTANT NOTE ON FRAMING**: Our pipeline extracts ~5 ideas per draft mechanically (avg 4.9). The raw count (~1,780) is inflated and not the story. The story is which ideas survive cross-org validation -- the 628 that appear across different organizations. That is the defensible, meaningful metric. The raw extraction count should appear only in methodology context, not as a headline number. + +**Key data points to include**: +- **628 cross-org convergent ideas** (ideas in 2+ drafts from different organizations) -- the headline metric +- Top convergence: "A2A Communication Paradigm" (8 orgs, 5 countries), "AI Agent Network Architecture" (8 orgs), "Multi-Agent Communication Protocol" (7 orgs) +- Org-pair overlap matrix: Chinese intra-bloc alignment (Huawei-China Unicom: 32 shared ideas) vs thin cross-regional signal (Ericsson-Inria: 21) +- Cross-org ideas that span Chinese-Western divide: 180 ideas (genuine cross-cultural consensus) +- Gap-to-convergence mapping: which gaps have cross-org attention, which have none? +- The "big 6" ambitious proposals: VOLT, ECT, CHEQ, STAMP, DAAP, ADL -- standout ideas regardless of convergence metrics +- The absent ideas: capability degradation signaling, multi-agent transaction semantics, agent migration, privacy-preserving discovery, agent cost/billing + +**Structural insight**: Convergence and fragmentation coexist. Teams agree on WHAT needs building (628 ideas converge). They disagree on HOW (120 competing A2A protocols). The gap between "what" and "how" is where architecture is needed. + +**What makes it worth reading alone**: The cross-org convergence data is actionable -- builders can see which ideas have multi-org backing vs single-team proposals. + +**Ends with**: "628 ideas the industry agrees on, 12 gaps nobody is filling, and a question: what would it look like if someone drew the big picture?" + +--- + +### Post 6: "Drawing the Big Picture: What the Agent Ecosystem Actually Needs" +**File**: `06-big-picture.md` +**Word count**: 2000-2500 + +**THIS IS THE RESOLUTION AND CAPSTONE.** + +**Key thesis**: The landscape needs not more protocols but connective tissue -- a holistic ecosystem architecture providing a shared execution model (DAGs), human oversight primitives, protocol-agnostic interoperability, and assurance profiles that work from dev to regulated production. + +**Key data points to include**: +- Full synthesis: 361 drafts, 557 authors, 628 cross-org convergent ideas, 12 gaps, 18 team blocs, 42 overlap clusters +- The proposed 5-draft ecosystem: AEM (architecture), ATD (task DAG), HITL (human-in-the-loop), AEPB (protocol binding), APAE (assurance profiles) +- How this builds on existing work: SPIFFE (identity), WIMSE (security context), ECT (execution evidence) +- The dual-regime insight: same execution model must work in K8s (fast/relaxed) AND regulated environments (proofs/attestation) +- Predictions based on data trajectories +- What builders should do TODAY: which drafts to watch, which gaps to fill, which patterns to adopt + +**Structural insight**: The ecosystem needs five layers and existing work covers ~60%. Missing pieces: (1) DAG orchestration semantics, (2) HITL as first-class, (3) protocol translation, (4) assurance profiles. These map precisely to the critical and high-severity gaps. + +**What makes it worth reading alone**: The vision. The forward-looking piece people share with their teams. + +**Ends with**: "The IETF has navigated standardization sprints before. The drafts are being written. The question is whether architecture or fragmentation wins the race." + +--- + +### Post 7: "How We Built This: Analyzing 361 IETF Drafts with Claude and Ollama" +**File**: `07-how-we-built-this.md` +**Word count**: 1500-2000 + +**Key thesis**: LLM-powered document analysis at scale is practical, cheap, and effective -- with careful engineering around caching, cost optimization, and hybrid model strategies. + +**Key data points to include**: +- Pipeline: fetch (Datatracker API) -> analyze (Claude Sonnet) -> embed (Ollama nomic-embed-text) -> ideas (Claude Haiku, batched) -> gaps (Claude Sonnet) +- Cost: ~$3.16 for 260 drafts; Haiku batch mode cut costs ~10x for idea extraction +- Hybrid strategy: Claude for analysis (reasoning), Ollama for embeddings (local, free, fast) +- Caching via llm_cache table (SHA256 prompt hash) -- zero waste on re-runs +- Tech: Python + Click + SQLite + FTS5 + httpx + rich + anthropic SDK + ollama +- 13 CLI commands, 13+ visualizations, 11 report types + +**What makes it worth reading alone**: Practical engineering details for anyone building similar systems. + +**Ends with**: Cross-link to Post 8 (the meta post about the agent team). + +--- + +## Recurring Motifs (thread across all posts) + +1. **The 4:1 Safety Deficit**: Introduced in Post 1, deepened in Post 4, resolved in Post 6. The series' signature metric. + +2. **The Highway/Traffic Light Metaphor**: The IETF is building highways (protocols) before traffic lights (safety, verification, override). Use sparingly but consistently. + +3. **Fragmentation vs. Architecture**: Bottom-up protocol proliferation vs. top-down ecosystem design. Posts 3 and 6 are the poles of this tension. + +4. **Concentration and Absence**: Huawei's dominance and Western absence. Introduced in Post 2, revisited in Post 6. + +5. **The Islands Problem**: Team blocs as islands. Ideas cluster within orgs. Cross-pollination is thin. The ecosystem needs bridges, not more islands. + +--- + +## Data Needs Per Post (for the Analyst) + +| Post | Data Needed | +|------|-------------| +| 1 | Updated counts (361), category breakdown with new drafts, growth timeline, score distribution | +| 2 | Author/org rankings (refreshed for 361), bloc details, cross-org matrix, Chinese vs Western counts | +| 3 | OAuth cluster details (14 drafts with approaches), near-duplicate pairs, overlap clusters, A2A count | +| 4 | Full gap details, per-gap idea counts, safety ratio, category vs gap matrix | +| 5 | Full idea taxonomy, cross-org idea overlap, common ideas, unique ideas, idea-to-gap mapping | +| 6 | Synthesis: top-level stats, gap fill estimates, category growth rates, WG adoption signals | +| 7 | Pipeline stats: API call counts, costs, cache hit rates, timing | + +--- + +## Missing Analyses the Coder Should Build + +1. **Category Trend Analysis** (Posts 1, 3, 6): Monthly breakdown per category. Growth rates. Which accelerating, which plateauing? + +2. **RFC Cross-Reference Map** (Posts 5, 6): Which RFCs do the 361 drafts build on? Reveals the foundation layer. + +3. **Cross-Org Idea Overlap** (Post 5): Ideas in 2+ drafts from different orgs = genuine consensus signal. + +4. **Draft Status / WG Adoption** (Post 6): Which drafts adopted by WGs? Which past -00? Traction vs aspiration. + +--- + +## Tone and Style + +- **Data-driven but narrative**: Every claim backed by a number, every number wrapped in a story. +- **Authoritative but accessible**: Analysis, not advocacy. Let the data argue. +- **Opinionated where data supports it**: The safety deficit is a problem. Fragmentation is costly. Concentration is concerning. +- **Name names**: Specific drafts, authors, organizations. This is journalism. +- **Lead with surprise**: Each post opens with its most unexpected finding. +- **End with forward link**: Each post teases the next. +- **1500-2500 words per post**: Dense enough to be substantial, short enough to finish. + +--- + +# PART B: READER-FACING SERIES INTRODUCTION + +*What happens when the internet's standards body tries to build the rules for AI agents -- in real time, with 361 drafts, 557 authors, and a 4:1 safety deficit?* + +--- + +## About This Series + +The Internet Engineering Task Force is in the middle of the largest, fastest-growing standards race in a decade. In fifteen months, AI- and agent-related Internet-Drafts went from **0.5% to 9.3%** of all IETF submissions -- nearly 1 in 10. We built an automated analyzer to fetch, categorize, rate, and map every one of them. + +This series tells the story of what we found: explosive growth, deep fragmentation, a concerning safety deficit, and hidden patterns that reveal where the real power lies and where the real risks lurk. + +## The Posts + +| # | Title | What You'll Learn | +|---|-------|-------------------| +| 1 | [The IETF's AI Agent Gold Rush](01-gold-rush.md) | The numbers: 361 drafts, 0.5% to 9.3% growth in 15 months, and a 4:1 capability-to-safety ratio | +| 2 | [Who's Writing the Rules for AI Agents?](02-who-writes-the-rules.md) | The geopolitics: Huawei's 13-person bloc, Chinese institutional dominance, Western underrepresentation | +| 3 | [The OAuth Wars and Other Battles](03-oauth-wars.md) | The fragmentation: 14 competing OAuth drafts, 120 A2A protocols with no interop | +| 4 | [What Nobody's Building (And Why It Matters)](04-what-nobody-builds.md) | The gaps: 12 missing standards, 3 critical, and what goes wrong without them | +| 5 | [Where 361 Drafts Converge (And Where They Don't)](05-1262-ideas.md) | The convergence: 628 cross-org ideas reveal genuine consensus beneath the fragmentation | +| 6 | [Drawing the Big Picture](06-big-picture.md) | The vision: what the agent ecosystem actually needs and what comes next | +| 7 | [How We Built This](07-how-we-built-this.md) | The methodology: analyzing 361 drafts with Claude, Ollama, and Python | + +## How to Read + +**Linear (recommended)**: 1 -> 2 -> 3 -> 4 -> 5 -> 6 -> 7 + +**By interest**: +- **Executives / decision-makers**: Post 1 (overview) -> Post 4 (gaps) -> Post 6 (vision) +- **Standards participants**: Post 2 (who's writing) -> Post 3 (fragmentation) -> Post 5 (ideas) -> Post 6 (vision) +- **Builders / implementers**: Post 4 (gaps) -> Post 5 (ideas) -> Post 6 (vision) -> Post 7 (methodology) + +Each post stands alone, but they build on each other. If you read one, make it **Post 4** -- the gaps analysis is the most consequential finding. + +## The Data + +All findings come from our open-source IETF Draft Analyzer, which fetches drafts via the Datatracker API, rates them using Claude, extracts technical ideas, detects collaboration patterns via co-authorship analysis, and identifies standardization gaps. Data current as of March 2026. + +| Stat | Value | +|------|-------| +| Drafts analyzed | 361 | +| Authors mapped | 557 | +| Organizations | 230 | +| Cross-org convergent ideas | 628 | +| Gaps identified | 12 (3 critical) | +| Team blocs detected | 18 | +| Analysis cost | ~$9 | + +--- + +*Designed by the Architect agent, 2026-03-03.* diff --git a/data/reports/blog-series/01-gold-rush.md b/data/reports/blog-series/01-gold-rush.md new file mode 100644 index 0000000..645d713 --- /dev/null +++ b/data/reports/blog-series/01-gold-rush.md @@ -0,0 +1,136 @@ +# The IETF's AI Agent Gold Rush: 361 Drafts, 557 Authors, and the Race to Define How AI Agents Talk + +*Fifteen months ago, AI agents barely registered at the IETF. Today, nearly 1 in 10 new Internet-Drafts is about AI agents. We analyzed every one.* + +--- + +For every Internet-Draft addressing how to keep an AI agent safe, roughly four are building new capabilities for it. That is the single most important number in this analysis. + +We built an automated pipeline to fetch, categorize, rate, and map every AI- and agent-related Internet-Draft currently in the IETF system. We found **361 drafts** from **557 authors** at **230 organizations** and identified **12 standardization gaps** -- three of them critical. The result is the most comprehensive public analysis of the IETF's AI agent landscape to date. + +The story the data tells is not subtle: the internet's most important standards body is in the middle of a gold rush, and the prospectors are moving faster than the safety inspectors. + +## The Growth Curve + +In 2024, just **9 AI/agent-related drafts** were submitted to the IETF -- **0.5%** of all submissions. By Q1 2026, AI/agent drafts account for **9.3%** of all new Internet-Drafts. Nearly 1 in 10. + +| Year | Total IETF Drafts | AI/Agent Drafts | AI Share | +|------|------------------:|----------------:|---------:| +| 2021 | 1,108 | ~0 | ~0% | +| 2022 | 1,121 | ~0 | ~0% | +| 2023 | 1,241 | ~0 | ~0% | +| 2024 | 1,651 | 9 | 0.5% | +| 2025 | 2,696 | 190 | 7.0% | +| 2026 (Q1) | 1,748 | 162 | 9.3% | + +The IETF itself accelerated 2.4x from 2021 to 2025. But AI/agent work went from essentially zero to dominant topic in under two years. The acceleration is not gradual. It is a step function that began in mid-2025 and has not slowed. + +This growth is driven by a convergence of forces: the explosion of commercial AI agent deployments (ChatGPT plugins, Anthropic's Claude tools, Google's Gemini agents), the emergence of protocols like MCP and A2A that need standardization, and the recognition across the industry that AI agents communicating over the internet without agreed-upon identity, security, and interoperability standards is a problem that gets worse every month it goes unaddressed. + +(A note on methodology: our pipeline searches the Datatracker for 12 keywords -- `agent`, `ai-agent`, `llm`, `autonomous`, `machine-learning`, `artificial-intelligence`, `mcp`, `agentic`, `inference`, `generative`, `intelligent`, and `aipref` -- across both draft names and abstracts. We started with 6 keywords and 260 drafts, then expanded to 12 to capture MCP-related work, generative AI infrastructure, and intelligent networking. The full methodology is in [Post 7](07-how-we-built-this.md).) + +The drafts span eight categories, and the distribution reveals priorities: + +| Category | Drafts | Share | +|----------|-------:|------:| +| Data formats and interoperability | 145 | 40% | +| A2A protocols | 120 | 33% | +| Agent identity and authentication | 108 | 30% | +| Autonomous network operations | 93 | 26% | +| Policy and governance | 91 | 25% | +| ML traffic management | 73 | 20% | +| Agent discovery and registration | 65 | 18% | +| AI safety and alignment | 44 | 12% | +| Model serving and inference | 42 | 12% | +| Human-agent interaction | 30 | 8% | + +Note that drafts can belong to multiple categories, so percentages exceed 100%. The dominance of plumbing -- data formats, identity, and communication protocols -- is expected for an early-stage standards effort. What is unexpected is how little attention the safety and human-oversight categories receive. + +The ecosystem's DNA is visible in what it cites. We parsed **4,231 cross-references** from the drafts, and the foundation is clear: **TLS 1.3** (RFC 8446, cited by 42 drafts), **OAuth 2.0** (RFC 6749, 36 drafts), **HTTP Semantics** (RFC 9110, 34 drafts), and **JWT** (RFC 7519, 22 drafts). The agent identity/auth category is essentially built on top of the OAuth stack. The entire landscape stands on a security foundation -- which makes the 4:1 safety deficit all the more jarring. + +## The Safety Deficit + +The ratio is stark: + +| Focus Area | Drafts | +|------------|-------:| +| A2A protocols | 120 | +| Autonomous operations | 93 | +| Agent identity/auth | 108 | +| **AI safety/alignment** | **44** | +| **Human-agent interaction** | **30** | + +For every draft about keeping agents safe, approximately four are building new capabilities. For every draft about human-agent interaction, there are more than four about agents operating autonomously. The community is building the highways and forgetting the traffic lights. + +This is not an abstract concern. Imagine an AI agent managing cloud infrastructure that detects a spurious anomaly, autonomously scales down a critical service, and triggers a cascading outage across three availability zones. Today, there is no standard mechanism to verify that the agent followed its declared policy before acting. No standard way to roll back the decision once the cascade begins. No standard protocol for a human operator to issue an emergency stop. The three critical gaps our analysis identified -- behavior verification, resource management, and error recovery -- are all about what happens when things go wrong. And in a world of autonomous AI agents, things will go wrong. + +The safety drafts that do exist are often among the highest-rated in our analysis. [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) -- a comprehensive accountability protocol -- and [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) -- a tamper-evident execution trace format -- each scored 4.8 out of 5, the highest in the entire corpus. [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/), which defines verifiable conversation records using cryptographic signing, scored 4.5. The quality is there. The quantity is not. + +## Who's Writing the Drafts + +The organizational picture is as revealing as the technical one. The top contributors: + +| Organization | Authors | Drafts | +|-------------|--------:|-------:| +| Huawei | 53 | 66 | +| China Mobile | 24 | 35 | +| Cisco | 24 | 26 | +| Independent | 19 | 25 | +| China Telecom | 24 | 24 | +| China Unicom | 22 | 21 | +| Tsinghua University | 13 | 16 | +| ZTE Corporation | 12 | 12 | +| Five9 | 1 | 10 | +| Ericsson | 4 | 9 | + +**Huawei** leads by a wide margin: **53 authors** contributing to **66 drafts** -- 18% of the entire corpus. But the concentration goes deeper than raw numbers -- the next post will examine the team bloc structure, geopolitics, and what the collaboration network reveals about where power really lies. + +Cisco and China Mobile each have 24 authors, but China Mobile's team produces 35 drafts to Cisco's 26. Ericsson has only 4 authors but punches above its weight with 9 focused drafts. Independent contributors account for 25 drafts -- a healthy sign of grassroots engagement. + +## The Fragmentation Problem + +The drafts are not just numerous; they are redundant. Our embedding-based similarity analysis found **25+ draft pairs** with greater than 0.98 cosine similarity -- functionally identical proposals submitted under different names. + +The most crowded space is OAuth for AI agents: **14 separate drafts** all trying to solve how AI agents authenticate and get authorized. They range from broad framework proposals ([draft-aap-oauth-profile](https://datatracker.ietf.org/doc/draft-aap-oauth-profile/)) to narrow extensions ([draft-jia-oauth-scope-aggregation](https://datatracker.ietf.org/doc/draft-jia-oauth-scope-aggregation/)) to full accountability systems ([draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/)). None are compatible with each other. + +Beyond OAuth, the broader A2A protocol landscape includes **120 drafts** with no interoperability layer. The most common technical idea in the entire corpus -- "Multi-Agent Communication Protocol" -- appears in 8 separate drafts from different teams. And the fragmentation goes deeper than protocols: of roughly 1,700 technical ideas extracted from the corpus, **96% appear in exactly one draft**. Everyone is solving the same problem. Nobody is solving it together. + +This fragmentation has real costs. Implementers face confusion over which draft to follow. The IETF process slows as competing proposals vie for working group adoption. And the longer competing drafts proliferate without convergence, the higher the risk of incompatible deployments that entrench fragmentation rather than resolving it. + +## What the Best Drafts Look Like + +Not everything is chaos. Our quality ratings -- scoring novelty, maturity, overlap avoidance, momentum, and relevance on a 1-5 scale -- surface drafts that are doing the hard work well: + +| Draft | Score | What It Does | +|-------|------:|-------------| +| [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) | 4.8 | Comprehensive AI agent accountability with authentication, monitoring, enforcement | +| [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) | 4.6 | Cryptographic delegation and proof for agent task execution | +| [draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/) | 4.6 | Hardware attestation for email via TPM verification chains | +| [draft-ietf-lake-app-profiles](https://datatracker.ietf.org/doc/draft-ietf-lake-app-profiles/) | 4.6 | Canonical CBOR for EDHOC application profiles | +| [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/) | 4.5 | Verifiable agent conversation records with COSE signing | + +The average score across all rated drafts is 3.38. The best work combines clear problem definition with concrete mechanisms and low overlap with existing proposals. The worst drafts are me-too proposals that restate problems already solved elsewhere. + +## What Comes Next + +The IETF has navigated technology gold rushes before -- the early web, IoT, DNS security. In each case, the first wave of competing proposals eventually converged, and the lasting standards came from those who focused on interoperability and safety alongside capability. + +The AI agent wave is following the same early pattern. The landscape has quantity. The question is whether it develops architecture -- and whether the safety work catches up before the capability work ships without it. + +This blog series will dig into the questions the data raises. The next post starts with the most fundamental: who, exactly, is writing the rules? + +--- + +### Key Takeaways + +- **361 drafts** from **557 authors** at **230 organizations** -- AI/agent work went from **0.5% to 9.3%** of all IETF submissions in 15 months +- The **4:1 ratio** of capability-building to safety drafts is the most concerning structural finding +- **Huawei** dominates authorship with 53 authors on 66 drafts (18% of corpus); Chinese-linked institutions account for 160+ authors +- **14 competing OAuth-for-agents proposals** illustrate deep fragmentation; 120 A2A protocol drafts have no interoperability layer +- **12 standardization gaps** remain, with the 3 most critical all relating to what happens when agents fail + +*Next in this series: [Who's Writing the Rules for AI Agents?](02-who-writes-the-rules.md) -- Inside the team blocs, geopolitics, and collaboration networks behind the IETF's AI agent standards.* + +--- + +*Analysis conducted using the IETF Draft Analyzer. Data current as of March 2026. All 361 drafts, 557 authors, and full analysis data are available in the project's SQLite database.* diff --git a/data/reports/blog-series/02-who-writes-the-rules.md b/data/reports/blog-series/02-who-writes-the-rules.md new file mode 100644 index 0000000..9246ccc --- /dev/null +++ b/data/reports/blog-series/02-who-writes-the-rules.md @@ -0,0 +1,170 @@ +# Who's Writing the Rules for AI Agents? + +*Inside the team blocs, geopolitics, and collaboration networks shaping the future of AI agent standards.* + +--- + +Thirteen people from one company co-author 22 Internet-Drafts at 94% internal cohesion. Their work covers agent networking, identity management, communication protocols, and network troubleshooting. Together, they represent the single most coordinated standards-writing campaign in the IETF's AI agent space. + +They all work at Huawei. + +This is the story of who is writing the rules for AI agents, what their collaboration networks reveal, and why the geography of authorship matters more than most people realize. + +## The Numbers Behind the Names + +Our analysis mapped **557 unique authors** from **230 organizations** across the 361 AI/agent drafts in the IETF pipeline. But those topline numbers mask extreme concentration. + +| Organization | Authors | Drafts | +|-------------|--------:|-------:| +| Huawei | 53 | 66 | +| China Mobile | 24 | 35 | +| Cisco | 24 | 26 | +| Independent | 19 | 25 | +| China Telecom | 24 | 24 | +| China Unicom | 22 | 21 | +| Tsinghua University | 13 | 16 | +| ZTE Corporation | 12 | 12 | +| Five9 | 1 | 10 | +| Ericsson | 4 | 9 | + +One company -- Huawei -- contributes 18% of all drafts. The top six Chinese-linked organizations together contribute over 160 authors. This is not a general pattern across the IETF; it is specific to the AI agent space, and it tells a story about who considers these standards strategically important. + +## The Huawei Drafting Machine + +The Huawei team bloc is worth examining in detail because it illustrates a pattern -- organized, coordinated standards campaigns -- that is characteristic of how some institutions approach the IETF. + +The 13-person core team includes: + +| Author | Drafts | Role in Team | +|--------|-------:|-------------| +| Bing Liu | 23 | Top contributor, appears on most team drafts | +| Zhenbin Li | 21 | Core, agent networking frameworks | +| Nan Geng | 20 | Core, near-total overlap with Liu | +| Qiangzhou Gao | 20 | Core, cross-device communication | +| Xiaotong Shang | 19 | Core, network measurement and troubleshooting | +| Jianwei Mao | 14 | Communication protocol gap analysis | +| Guanming Zeng | 13 | MCP and NETCONF for agents | + +The remaining six members contribute 2-5 drafts each. The team's **94% cohesion** means that nearly every possible pair of members shares the vast majority of their drafts. This is not casual co-authorship; it is a systematic drafting operation. + +Their 22 drafts cover a specific territory: agent networking frameworks for enterprise and broadband networks, agent identity management, cross-device communication, MCP integration for network troubleshooting, and agent gateway requirements. The focus is heavily on **autonomous network operations** and **A2A protocols** -- the infrastructure layer of the agent ecosystem. + +Two deeper metrics reveal the nature of this operation: + +**Volume over iteration.** Across the entire corpus, **55% of all 361 drafts** have never been revised beyond their first submission (rev-00). But the rate varies dramatically by organization. Of Huawei's drafts, **65% are at rev-00**. Compare that to Ericsson (11%), Siemens (0%), Nokia (20%), or Boeing (0%). The most serious iterators -- Boeing (avg 28.2 revisions per draft), Siemens (17.2), Sandelman Software (14.3) -- submit far fewer drafts but iterate relentlessly. Western companies submit fewer drafts but revise heavily -- incorporating feedback, advancing toward maturity. Huawei's pattern is the opposite: submit at volume, iterate rarely. Submitting a draft is cheap. Iterating it signals genuine investment. + +**Campaign timing.** Of Huawei's drafts, **43 were submitted in the four weeks before IETF 121 Dublin** -- 62% of the company's entire output, packed into a single pre-meeting window. For context, the entire corpus had 107 drafts in that period. Huawei alone accounted for **40% of all pre-IETF 121 submissions**. This is not organic growth. It is a coordinated submission campaign timed for maximum standards-body impact. + +Beyond the main team, the company has additional smaller blocs. No other organization comes close to this level of coordinated output. + +## The Chinese Institutional Ecosystem + +Huawei does not operate in isolation. The Chinese organizations in this space form a densely interconnected collaboration network. + +| Org A | Org B | Shared Drafts | +|-------|-------|-----:| +| China Unicom | Huawei | 6 | +| Tsinghua University | Zhongguancun Laboratory | 5 | +| China Mobile | ZTE Corporation | 4 | +| China Mobile | Huawei | 4 | +| BUPT | Tsinghua University | 3 | +| China Telecom | Huawei | 3 | +| BUPT | China Telecom | 3 | +| CAICT | Huawei | 3 | + +The structure has three tiers: + +**Tier 1: Telecom operators** -- China Mobile (24 authors, 35 drafts), China Telecom (24 authors, 24 drafts), China Unicom (22 authors, 21 drafts). These organizations bring domain expertise in network operations and 6G requirements. Their drafts focus heavily on use cases: agents for 6G networks, agent-based network management, traffic optimization. + +**Tier 2: Equipment vendor** -- Huawei (53 authors, 66 drafts), ZTE Corporation (12 authors, 12 drafts). Huawei's dominance here is striking; ZTE's contribution is modest by comparison. These drafts focus on architecture and protocols -- the building blocks rather than the use cases. + +**Tier 3: Research institutions** -- Tsinghua University (13 authors, 16 drafts), BUPT (14 authors, 7 drafts), Zhongguancun Laboratory (4 authors, 6 drafts), CAICT (8 authors, 6 drafts). These institutions bridge the gap between industry and academia, often co-authoring with both telecom operators and Huawei. + +The Zhongguancun Laboratory team (4 members, 5 shared drafts, 94% cohesion) is led by Yong Cui of Tsinghua University, one of the most prolific individual authors with 8 drafts spanning agent discovery, network management benchmarking, and LLM-assisted operations. His work includes [draft-cui-nmrg-llm-benchmark](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-benchmark/) (score 4.3) -- one of the highest-rated drafts in the corpus. + +The China Telecom team (6 members from China Telecom, BUPT, and Tsinghua) focuses on 6G agent use cases and IoA task protocols. Their drafts are more forward-looking than Huawei's -- less about current network operations, more about where agents fit in next-generation infrastructure. + +## Where Is the West? + +The absence is as telling as the presence. + +**Google**: 5 authors, 9 drafts -- a notable increase, but still thin relative to the company's agent platform presence (Gemini agents, A2A protocol). + +**Microsoft**: Minimal presence. + +**Apple**: Two authors, two drafts -- both about mail automation ([draft-ietf-mailmaint-pacc](https://datatracker.ietf.org/doc/draft-ietf-mailmaint-pacc/), [draft-eggert-mailmaint-uaautoconf](https://datatracker.ietf.org/doc/draft-eggert-mailmaint-uaautoconf/)). Not about AI agents per se. + +**Amazon**: 6 authors, 6 drafts -- primarily post-quantum cryptography work (ML-KEM hybrid key exchange), not agent-specific. + +**Cisco**: The most active Western tech company with 24 authors across 26 drafts, but spread thinly. Three separate Cisco blocs cover different areas: Cullen Fluffy Jennings and Suhas Nandakumar work on A2A transport and agent identity; another team (Muscariello, Papalini, Sardara, Betts) works on AGNTCY messaging; a third (Farinacci, Rodriguez-Natal, Maino) works on LISP-based networking. No single coordinated campaign. + +**Ericsson**: 4 authors, 9 drafts -- focused on EDHOC lightweight authentication, a mature protocol effort led by Goran Selander. High quality (scores 3.2-4.1) but narrow scope. + +The pattern is clear: Western companies are either absent from AI agent standardization or participating in adjacent security/crypto work rather than the core agent protocol space. The reasons likely include strategic focus on proprietary agent ecosystems (Google's Gemini, Apple's Siri agents), less tradition of IETF engagement in the agent/AI space, and the assumption that de facto standards (MCP, A2A) will matter more than de jure IETF ones. + +This bet may prove wrong. IETF standards have a way of becoming the infrastructure that everyone must eventually support. + +## The Team Bloc Landscape + +Beyond Huawei, our co-authorship analysis detected **18 team blocs** covering a significant fraction of the 557 authors. Each bloc is a group where members share at least 70% pairwise draft overlap and 3+ shared drafts. + +The most notable non-Chinese blocs: + +**Ericsson team** (5 members, 6 drafts, 100% cohesion) -- Goran Selander and colleagues lead this European effort focused on EDHOC authentication and lightweight key exchange for constrained devices. They collaborate with Inria (France) and the University of Murcia (Spain). Their work ([draft-spm-lake-pqsuites](https://datatracker.ietf.org/doc/draft-spm-lake-pqsuites/), score 4.1) represents some of the most mature protocol work in the corpus. + +**Five9/Bitwave team** (2 members, 6 drafts, 100% cohesion) -- Jonathan Rosenberg (Five9) and Pat White (Bitwave) are the most prolific Western contributors to core agent protocols. Their drafts span the full stack: CHEQ for human confirmation of agent decisions ([draft-rosenberg-aiproto-cheq](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-cheq/), score 3.9), N-ACT for agent-to-tool communication, and an OAuth extension for agent authentication. Rosenberg is also the strongest cross-team bridge, sharing 3 drafts with Cisco's Cullen Fluffy Jennings -- the single strongest cross-bloc connection we found. + +**ISI, R.C. ATHENA team** (4 members, 4 drafts, 100% cohesion) -- A Greek research institute producing post-quantum authentication work for EDHOC. All four members (Haleplidis, Fraile, Fournaris, Koulamas) co-author every draft. Their [draft-lake-pocero-authkem-ikr-edhoc](https://datatracker.ietf.org/doc/draft-lake-pocero-authkem-ikr-edhoc/) scored 4.2. + +**JPMorgan/multi-org team** (4 members from JPMorgan, Oracle, Telefonica, Aryaka; 2 drafts, 100% cohesion) -- The most cross-organizational Western bloc. Their work on transitive attestation ([draft-mw-wimse-transitive-attestation](https://datatracker.ietf.org/doc/draft-mw-wimse-transitive-attestation/), score 4.3) and actor chains ([draft-mw-spice-actor-chain](https://datatracker.ietf.org/doc/draft-mw-spice-actor-chain/), score 4.1) addresses the safety and accountability space. Notably, these are among the highest-scored drafts in the corpus. + +## The Cross-Pollination Problem + +Once you account for team blocs, the cross-team collaboration picture is sparse. The top cross-bloc connection -- Jonathan Rosenberg bridging Five9/Bitwave and Cisco -- involves just 3 shared drafts. Most cross-team pairs share only 1. + +Our network centrality analysis reveals who bridges these gaps. Of 557 authors, only **115 (23%)** co-author with people from both Chinese and Western organizations. The top bridge-builders are not from the organizations you might expect: + +| Author | Organization | BC Score | CN Neighbors | Western Neighbors | +|--------|-------------|--------:|---:|---:| +| Luis M. Contreras | Telefonica | 0.035 | 11 | 3 | +| Qin Wu | Huawei | 0.035 | 12 | 11 | +| Muhammad Awais Jadoon | InterDigital | 0.023 | 9 | 4 | +| Diego Lopez | Telefonica | 0.013 | 6 | 9 | +| Giuseppe Fioccola | Huawei | 0.009 | 2 | 8 | + +The structural glue holding the two blocs together is **European telecoms** -- Telefonica, InterDigital, Deutsche Telekom. Not US Big Tech. Not any formal cross-standards body. A handful of European companies, through their authors' co-authorship ties, provide the only significant cross-divide connectivity. Qin Wu (Huawei) is the most balanced individual bridge, with nearly equal Chinese and Western co-author networks. But these bridges are thin: remove any two or three of these people, and the network fragments further. + +The sparseness of these bridges becomes even more concerning when you look at what the two blocs are building *on*. Our RFC cross-reference analysis (detailed in Post 3) reveals that the Chinese and Western blocs cite fundamentally different technology stacks. The Chinese agent ecosystem is being built on **network management protocols** -- YANG (RFC 7950), NETCONF (RFC 6241), and autonomic networking (RFC 7575). The Western ecosystem is being built on **IoT security and web infrastructure** -- COSE (RFC 9052), CBOR (RFC 8949), CoAP (RFC 7252), HTTP Semantics (RFC 9110), and EDHOC (RFC 9528). The only shared foundation is **OAuth 2.0** -- which explains why the OAuth-for-agents space has 14 competing proposals. It is the one piece of common ground, and everyone is fighting over it. + +This means the cross-pollination problem is deeper than "different teams working separately." The two blocs are building on incompatible infrastructure. Even if they agreed on an agent communication pattern, the underlying plumbing diverges. + +The IETF's consensus process works best when different implementation perspectives collide and reconcile. In the AI agent space, those collisions are rare. The Chinese institutional ecosystem collaborates internally but has limited connections to Western contributors. The European cryptographic teams (Ericsson, RISE, ATHENA) work on authentication foundations but do not connect to the agent protocol teams. The American startups (Five9, Bitwave) and enterprise companies (Cisco) work on adjacent problems without shared architectural framing. + +The one exception is Fraunhofer SIT's Henk Birkholz and Tradeverifyd's Orie Steele, whose [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/) (score 4.5) and [draft-steele-agent-considerations](https://datatracker.ietf.org/doc/draft-steele-agent-considerations/) (score 4.0) represent rare cross-cultural, safety-focused work from German and American collaborators. + +## What This Means + +Three implications emerge from the authorship data: + +**1. Volume and influence are not the same thing.** Huawei's 66 drafts represent 18% of the corpus, but 65% have never been revised. The IETF rewards sustained engagement -- drafts that iterate through feedback cycles, reach working group adoption, and mature toward RFC status. A campaign that optimizes for volume at a pre-meeting deadline is playing a different game than one that optimizes for adoption. The quality scores bear this out: Huawei's team averages around 3.1, respectable but not exceptional. The organizations doing the deepest work (Ericsson at 4.8 average revision, Siemens at 17.2) submit far fewer drafts but iterate relentlessly. + +**2. The safety work comes from unexpected places.** The highest-quality safety and accountability drafts come not from the high-volume drafters but from smaller, specialized teams: Aylward (independent), Birkholz/Steele (Fraunhofer/Tradeverifyd), Rosenberg/White (Five9/Bitwave), and the JPMorgan-led multi-org team. The organizations doing the most drafting are focused on capability; the organizations doing the best safety work are doing the least drafting. + +**3. The IETF needs more bridges.** Cross-team, cross-organization, cross-geography collaboration is the weakest link in the current landscape. Our centrality analysis shows that European telecoms -- not US Big Tech -- are the structural glue between Chinese and Western blocs. The standards that will endure are the ones where Chinese telecom expertise, European cryptographic rigor, and American agent-platform experience converge. Right now, those worlds barely overlap, and the few bridges that exist depend on a handful of individuals. + +--- + +### Key Takeaways + +- **Huawei dominates** with 53 authors on 66 drafts (18% of corpus); their 13-person core team co-authors 22 drafts at 94% cohesion -- but 65% of those drafts have never been revised, and 43 were submitted in a single 4-week pre-meeting window +- **Chinese institutions** collectively contribute 160+ of 557 authors; they form a tightly interconnected collaboration ecosystem +- **Google has 9 drafts but Microsoft and Apple are largely absent** from AI agent standardization -- a notable strategic gap +- **18 team blocs** detected; cross-team collaboration is sparse, with most cross-bloc pairs sharing only 1 draft +- **Only 23% of authors bridge the Chinese-Western divide**; European telecoms (Telefonica, InterDigital) are the structural glue -- not US Big Tech +- **The best safety work** comes from smaller, specialized teams -- not from the high-volume drafters + +*Next in this series: [The OAuth Wars and Other Battles](03-oauth-wars.md) -- 14 competing proposals, 120 A2A protocols, and what fragmentation costs the internet.* + +--- + +*Data from the IETF Draft Analyzer, covering 361 drafts, 557 authors, and 18 detected team blocs. Co-authorship analysis uses 70% pairwise draft overlap threshold with 3+ shared drafts.* diff --git a/data/reports/blog-series/03-oauth-wars.md b/data/reports/blog-series/03-oauth-wars.md new file mode 100644 index 0000000..369c345 --- /dev/null +++ b/data/reports/blog-series/03-oauth-wars.md @@ -0,0 +1,165 @@ +# The OAuth Wars and Other Battles + +*14 competing proposals, 120 protocols with no interop layer, and 25+ near-duplicate drafts. Inside the IETF's AI agent fragmentation problem.* + +--- + +Fourteen separate Internet-Drafts are trying to solve the same problem: how should AI agents authenticate and get authorized using OAuth? They are not collaborating. They are not compatible. And they are all submitted in the same nine-month window. + +This is the fragmentation problem, and it is not limited to OAuth. Across the IETF's AI agent landscape, our analysis found the same pattern repeated in agent discovery, multi-agent communication, intent-based routing, and 6G agent requirements. Teams are working in parallel, not together, and the cost is measured in wasted effort, confused implementers, and the growing risk of incompatible deployments. + +## The OAuth Cluster: 14 Ways to Solve One Problem + +The most crowded corner of the AI agent standards landscape is OAuth for agents. Every proposal is trying to answer the same fundamental question: when an AI agent acts on behalf of a user -- or on its own -- how does it prove its identity and obtain permission? + +The depth of this cluster is not surprising when you look at the ecosystem's foundations. Our cross-reference analysis of all 361 drafts found that **OAuth 2.0** (RFC 6749) is cited by **36 drafts**, **JWT** (RFC 7519) by **22**, **OAuth Bearer** (RFC 6750) by **9**, and **DPoP** (RFC 9449) by **9**. The OAuth stack is the single most-referenced functional standard in the entire corpus after TLS. The agent identity problem runs through the landscape like a root system. + +Here are all 14 drafts: + +| Draft | Approach | Score | +|-------|----------|------:| +| [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) | Comprehensive accountability protocol | 4.8 | +| [draft-goswami-agentic-jwt](https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/) | Agentic JWT for autonomous systems | 4.5 | +| [draft-chen-oauth-rar-agent-extensions](https://datatracker.ietf.org/doc/draft-chen-oauth-rar-agent-extensions/) | RAR extensions for agent policy | 4.2 | +| [draft-aap-oauth-profile](https://datatracker.ietf.org/doc/draft-aap-oauth-profile/) | OAuth 2.0 profile for autonomous agents | 4.2 | +| [draft-barney-caam](https://datatracker.ietf.org/doc/draft-barney-caam/) | Contextual agent authorization mesh | 4.0 | +| [draft-liu-agent-operation-authorization](https://datatracker.ietf.org/doc/draft-liu-agent-operation-authorization/) | Verifiable delegation via JWT | 4.1 | +| [draft-rosenberg-oauth-aauth](https://datatracker.ietf.org/doc/draft-rosenberg-oauth-aauth/) | OAuth for agents on PSTN/SMS | 3.6 | +| [draft-oauth-ai-agents-on-behalf-of-user](https://datatracker.ietf.org/doc/draft-oauth-ai-agents-on-behalf-of-user/) | On-behalf-of-user extension | 3.7 | +| [draft-jia-oauth-scope-aggregation](https://datatracker.ietf.org/doc/draft-jia-oauth-scope-aggregation/) | Scope aggregation for multi-step workflows | 3.5 | +| [draft-liu-oauth-a2a-profile](https://datatracker.ietf.org/doc/draft-liu-oauth-a2a-profile/) | A2A profile for transaction tokens | 3.6 | +| [draft-song-oauth-ai-agent-authorization](https://datatracker.ietf.org/doc/draft-song-oauth-ai-agent-authorization/) | Target-based authorization | 2.8 | +| [draft-song-oauth-ai-agent-collaborate-authz](https://datatracker.ietf.org/doc/draft-song-oauth-ai-agent-collaborate-authz/) | Multi-agent collaboration authz | 3.5 | +| [draft-chen-ai-agent-auth-new-requirements](https://datatracker.ietf.org/doc/draft-chen-ai-agent-auth-new-requirements/) | New auth requirements analysis | 3.8 | +| [draft-yao-agent-auth-considerations](https://datatracker.ietf.org/doc/draft-yao-agent-auth-considerations/) | Auth considerations analysis | 3.1 | + +The quality range is enormous -- from 2.8 to 4.8 -- and the approaches barely overlap. Some extend OAuth 2.0 with new grant types. Others define entirely new token formats (Agentic JWT). Still others propose mesh architectures or accountability layers on top of existing auth flows. Two drafts (song-oauth-ai-agent-authorization and song-oauth-ai-agent-collaborate-authz) come from the same Huawei team and address different facets of the problem. Two more (chen-oauth-rar-agent-extensions and chen-ai-agent-auth-new-requirements) come from a China Mobile team. + +The gap our analysis identified in this cluster: most focus on **single-agent authorization**. Few address chained delegation across multiple agents, and none standardize real-time revocation in agent-to-agent workflows. An agent that obtains a token and delegates a sub-task to another agent -- which then delegates further -- creates a chain of trust that no single draft adequately covers. + +## The Agent Gateway Melee: 10 Drafts + +If OAuth for agents is about identity, the agent gateway cluster is about communication architecture. Ten drafts are competing to define how agents from different platforms and ecosystems collaborate: + +| Draft | Approach | Score | +|-------|----------|------:| +| [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) | Multi-agent collaboration protocol suite | 4.2 | +| [draft-agent-gw](https://datatracker.ietf.org/doc/draft-agent-gw/) | Semantic routing gateway | 3.9 | +| [draft-cui-dmsc-agent-cdi](https://datatracker.ietf.org/doc/draft-cui-dmsc-agent-cdi/) | Cross-domain interop framework | 3.0 | +| [draft-han-rtgwg-agent-gateway-intercomm-framework](https://datatracker.ietf.org/doc/draft-han-rtgwg-agent-gateway-intercomm-framework/) | Gateway intercommunication | 3.6 | +| [draft-li-dmsc-inf-architecture](https://datatracker.ietf.org/doc/draft-li-dmsc-inf-architecture/) | DMSC infrastructure architecture | 3.1 | +| [draft-liu-dmsc-acps-arc](https://datatracker.ietf.org/doc/draft-liu-dmsc-acps-arc/) | Agent collaboration protocols arch | 3.6 | +| [draft-yang-dmsc-ioa-task-protocol](https://datatracker.ietf.org/doc/draft-yang-dmsc-ioa-task-protocol/) | IoA task protocol | 3.0 | +| [draft-yang-ioa-protocol](https://datatracker.ietf.org/doc/draft-yang-ioa-protocol/) | IoA protocol | 3.6 | +| [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) | Network AIOps comm framework | 3.0 | +| [draft-campbell-agentic-http](https://datatracker.ietf.org/doc/draft-campbell-agentic-http/) | HTTP best practices | -- | + +A revealing pattern: five of these ten drafts reference "DMSC" -- Dynamic Multi-agent Secured Collaboration -- a concept pushed primarily by Chinese institutions through the IETF's DMSC side meeting. This cluster represents an organized attempt to define the agent collaboration architecture, but even within that effort, multiple competing proposals have emerged. + +The gap: no draft in this cluster addresses **dynamic trust establishment between gateways**, or how to handle conflicting semantic schemas across ecosystems. If Agent Gateway A speaks MCP and Agent Gateway B speaks A2A Protocol, these drafts describe the need for translation but do not provide it. + +## The Near-Duplicate Epidemic + +Our embedding-based similarity analysis produced a more troubling finding: **25+ draft pairs** have cosine similarity above 0.98. Many are functionally identical proposals submitted under different names: + +| Draft A | Draft B | Reason | +|---------|---------|--------| +| draft-a2a-moqt-transport | draft-nandakumar-a2a-moqt-transport | Same content, different name | +| draft-abbey-scim-agent-extension | draft-scim-agent-extension | Same draft, dual submission | +| draft-rosenberg-aiproto | draft-rosenberg-aiproto-nact | Renamed | +| draft-rosenberg-aiproto-cheq | draft-rosenberg-cheq | Renamed | +| draft-cui-nmrg-llm-nm | draft-irtf-nmrg-llm-nm | WG adoption (individual to IRTF) | +| draft-ar-emu-hybrid-pqc-eapaka | draft-ietf-emu-hybrid-pqc-eapaka | WG adoption | +| draft-zheng-agent-identity-management | draft-zheng-dispatch-agent-identity-management | Same draft, different WG | +| draft-sun-zhang-iaip | draft-sz-dmsc-iaip | Same draft, different WG | +| draft-zeng-mcp-troubleshooting | draft-zm-rtgwg-mcp-troubleshooting | Same draft, different WG | + +Some of these duplications are legitimate IETF process: a draft moves from individual submission to working group adoption (like draft-cui-nmrg-llm-nm becoming draft-irtf-nmrg-llm-nm). Others reflect authors shopping the same draft to multiple working groups. And a few appear to be genuine content duplication -- the same ideas submitted under different author combinations. + +The practical effect: the 361-draft corpus includes substantial double-counting. After de-duplication, the true number of distinct proposals is probably closer to 300. But even 300 competing proposals in nine months is extraordinary. + +## The A2A Protocol Zoo + +Zooming out from individual clusters, the broadest fragmentation is in the **120 A2A protocol drafts**. These span everything from low-level transport (A2A over MOQT/QUIC) to high-level semantic routing (intent-based agent interconnection) to specific use cases (MCP for network troubleshooting). + +The most common technical idea in the entire corpus -- "Multi-Agent Communication Protocol" -- appears in **8 separate drafts** from different teams. Eight teams are independently designing how agents should talk to each other. + +| Competing Area | Drafts | Distinguishing Fact | +|---------------|-------:|-------------------| +| OAuth for agents | 14 | No draft handles chained delegation | +| Agent gateway/collaboration | 10 | 5 are DMSC-linked; no trust framework | +| Agent discovery | 6 | Range from DNS-based to full directories | +| Intent-based routing | 5 | Requirements-heavy, protocol-light | +| 6G agent requirements | 6 | Wish lists, not specifications | +| SCIM/identity registry | 6 | 3 are near-duplicates | + +The discovery cluster is particularly illustrative. Six drafts propose different ways to find AI agents: [draft-narajala-ans](https://datatracker.ietf.org/doc/draft-narajala-ans/) (score 4.2) proposes a DNS-based Agent Name Service. [draft-mozleywilliams-dnsop-bandaid](https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-bandaid/) (3.6) also uses DNS but via SVCB records. [draft-pioli-agent-discovery](https://datatracker.ietf.org/doc/draft-pioli-agent-discovery/) (3.2) defines a lightweight registration and discovery protocol. [draft-gaikwad-woa](https://datatracker.ietf.org/doc/draft-gaikwad-woa/) (3.2) proposes a Web of Agents format using JSON Schema. None of them reference each other. + +## The Deeper Fragmentation: Different Technological DNA + +The protocol-level fragmentation documented above is only the visible layer. Beneath it, our RFC cross-reference analysis reveals a more fundamental divide: the two major drafting blocs are building on **entirely different technology stacks**. + +| Foundation | Chinese Bloc | Western Bloc | +|-----------|-------------|-------------| +| **Network management (YANG/NETCONF)** | Strong (RFC 6241, 8639, 8641, 7950) | Absent | +| **IoT security (COSE/CBOR/OSCORE/CoAP)** | Absent | Strong (RFC 9052, 8949, 8613, 7252) | +| **PKI/Certificates (X.509)** | Absent | Strong (RFC 5280) | +| **Lightweight auth (EDHOC, CWT)** | Absent | Strong (RFC 9528, 8392) | +| **Web APIs (HTTP Semantics)** | Weak | Strong (RFC 9110) | +| **TLS 1.3** | Moderate (8 citations) | Strong (18 citations) | +| **OAuth 2.0** | Present (11 citations) | Present (7 citations) | + +The Chinese bloc -- Huawei, China Mobile, China Telecom, China Unicom, and associated research institutions -- builds agent infrastructure on **YANG/NETCONF**, the network management protocols that underpin autonomous network operations. The Western bloc -- Ericsson, Cisco, ATHENA, and European research labs -- builds on **COSE/CBOR/CoAP** (IoT security) and **HTTP/TLS/PKI** (web infrastructure). + +The **only shared foundation** is OAuth 2.0, which both blocs cite at comparable rates. This is why the OAuth cluster has 14 competing proposals: it is the one piece of common ground, and everyone is fighting over it. + +This means fragmentation goes deeper than protocol design. Even if the community agreed on a single agent communication pattern, the underlying plumbing is incompatible. A Chinese draft building on NETCONF and a Western draft building on CoAP cannot interoperate without a translation layer -- and that translation layer, as we document in the gap analysis, does not exist. + +## What Fragmentation Costs + +The costs of this fragmentation are not theoretical: + +**For implementers**: Which OAuth extension do you implement? Do you support SCIM agent schemas or Web of Agents? If your agent needs to discover another agent, do you look in DNS, a well-known URI, or a dedicated directory? Today there is no canonical answer, and choosing wrong means re-implementation when the IETF eventually converges. + +**For the IETF process**: Working groups spend time evaluating competing proposals that could be spent converging on solutions. The OAuth working group alone faces 14 agent-related drafts. The volume creates overhead that slows progress on any single proposal. + +**For security**: When multiple incompatible authentication and authorization schemes exist, implementations inevitably take shortcuts. The most dangerous agents will be those that implement the easiest -- not the most secure -- available standard. + +**For the ecosystem**: Each month that fragmentation persists, real-world agent deployments make choices. Those choices entrench specific approaches, making convergence harder and interoperability more expensive. The window for a unified standard narrows with every proprietary deployment. + +## The Convergence Signals + +Not everything is divergence. A few positive patterns emerged from the data: + +**EDHOC is converging.** The lightweight authenticated key exchange protocol has multiple working-group-adopted drafts ([draft-ietf-lake-edhoc-psk](https://datatracker.ietf.org/doc/draft-ietf-lake-edhoc-psk/), [draft-ietf-lake-authz](https://datatracker.ietf.org/doc/draft-ietf-lake-authz/), [draft-ietf-emu-eap-edhoc](https://datatracker.ietf.org/doc/draft-ietf-emu-eap-edhoc/)) with coordinated authorship. This is what healthy standards development looks like: multiple drafts from different teams that explicitly build on each other. + +**SCIM agent extensions show maturity.** The Okta team's [draft-abbey-scim-agent-extension](https://datatracker.ietf.org/doc/draft-abbey-scim-agent-extension/) (score 3.8) and [draft-wahl-scim-agent-schema](https://datatracker.ietf.org/doc/draft-wahl-scim-agent-schema/) (score 3.9) represent a practical approach: extend an existing, widely-deployed protocol (SCIM) rather than invent a new one. This pragmatism is a convergence signal. + +**The verifiable conversations approach is gaining traction.** [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/) (score 4.5) and the WIMSE/ECT work on execution context tokens represent a "record everything, verify later" approach to agent accountability that multiple communities can support. + +## What Needs to Happen + +Three structural interventions would accelerate convergence: + +**1. Working groups need to pick winners.** The IETF process allows competing proposals, but at some point working groups must adopt specific approaches and redirect competing efforts. In the OAuth agent space, the highest-quality proposals (DAAP, Agentic JWT, RAR extensions) should be evaluated head-to-head, not allowed to proliferate indefinitely. + +**2. Interoperability testing, not just drafting.** The 120 A2A protocol proposals exist mostly as text. Interop testing -- where implementations from different teams prove they can work together -- would quickly reveal which proposals have real engineering substance and which are paper exercises. + +**3. The translation layer must be built.** Rather than picking one A2A protocol, the community may be better served by a thin interoperability layer that lets agents using different protocols communicate through gateways. Our gap analysis found this cross-protocol translation gap entirely unaddressed -- zero technical ideas in the current corpus. + +--- + +### Key Takeaways + +- **14 competing OAuth-for-agents proposals** illustrate the depth of fragmentation; none handle chained delegation across agent networks +- **120 A2A protocol drafts** exist without an interoperability layer; the most common idea in the corpus appears in 8 separate drafts from different teams +- **25+ near-duplicate pairs** (>0.98 similarity) inflate the draft count; after de-duplication, roughly 300 distinct proposals remain +- **Convergence signals exist** in EDHOC authentication, SCIM agent extensions, and verifiable conversations -- areas where teams explicitly build on each other +- **Fragmentation goes deeper than protocols**: Chinese and Western blocs build on different RFC foundations (YANG/NETCONF vs COSE/CBOR/CoAP); the only shared bedrock is OAuth 2.0 +- **The missing piece** is a cross-protocol translation layer; no draft in the corpus addresses how agents using different protocols can interoperate + +*Next in this series: [What Nobody's Building (And Why It Matters)](04-what-nobody-builds.md) -- The 12 gaps in the IETF's AI agent landscape, and the real-world consequences of leaving them unfilled.* + +--- + +*Data from the IETF Draft Analyzer's embedding-based overlap analysis (nomic-embed-text) and cluster detection at 0.85/0.90 similarity thresholds.* diff --git a/data/reports/blog-series/04-what-nobody-builds.md b/data/reports/blog-series/04-what-nobody-builds.md new file mode 100644 index 0000000..85a4366 --- /dev/null +++ b/data/reports/blog-series/04-what-nobody-builds.md @@ -0,0 +1,154 @@ +# What Nobody's Building (And Why It Matters) + +*The 12 gaps in the IETF's AI agent landscape -- and the real-world disasters they invite.* + +--- + +Imagine an AI agent managing a hospital's drug-dispensing system. It receives instructions from a prescribing agent, coordinates with a pharmacy agent, and issues delivery commands to a robotic dispensing agent. On Tuesday morning, the prescribing agent hallucinates a dosage. The pharmacy agent fills it. The dispensing agent delivers it. No human saw it happen. No system flagged it. No protocol exists to roll back the dispensed medication. + +This is not a hypothetical failure mode. It is the predictable consequence of the IETF's three most critical standardization gaps. + +We analyzed **361 Internet-Drafts**, extracted their technical components, and compared the result against what real-world agent deployments actually require. We found **12 gaps** -- areas where standardization work is missing or inadequate. Three of them are critical. And the critical ones all share a defining characteristic: they address what happens when autonomous agents fail or misbehave. + +Nobody is building the safety net. + +## The 12 Gaps + +Our gap analysis sorted findings by severity based on the breadth of the shortfall and the consequences of leaving it unfilled: + +| # | Gap | Severity | Ideas Addressing It | +|---|-----|----------|--------------------:| +| 1 | Agent Behavior Verification | CRITICAL | 52 | +| 2 | Agent Resource Management | CRITICAL | 117 | +| 3 | Agent Error Recovery and Rollback | CRITICAL | 6 | +| 4 | Cross-Protocol Translation | HIGH | 0 | +| 5 | Agent Lifecycle Management | HIGH | 90 | +| 6 | Multi-Agent Consensus | HIGH | 5 | +| 7 | Human Override and Intervention | HIGH | 4 | +| 8 | Cross-Domain Security Boundaries | HIGH | 10 | +| 9 | Dynamic Trust and Reputation | HIGH | 5 | +| 10 | Agent Performance Monitoring | MEDIUM | 26 | +| 11 | Agent Explainability | MEDIUM | 5 | +| 12 | Agent Data Provenance | MEDIUM | 79 | + +Two numbers in that table should alarm you: the **6 ideas** addressing error recovery (all from a single draft), and the **0 ideas** addressing cross-protocol translation. Across 361 drafts, these gaps are not underserved. They are unserved. + +## Critical Gap 1: Agent Behavior Verification + +**The problem**: No mechanism exists to verify that a deployed AI agent actually behaves according to its declared policies or specifications. + +**The numbers**: Only **44 of 361 drafts** address AI safety and alignment. The 4:1 ratio of capability to safety work means the community is building agents four times faster than it is building the tools to keep them honest. + +**What 52 ideas partially address**: Some exist on the periphery. [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) (score 4.8 -- the highest-rated draft in the corpus) defines a behavioral monitoring framework and cryptographic identity verification. [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/) (score 4.5) proposes verifiable conversation records using COSE signing. [draft-berlinai-vera](https://datatracker.ietf.org/doc/draft-berlinai-vera/) (score 3.9) introduces a zero-trust architecture with five enforcement pillars. + +**What is still missing**: Runtime verification. These drafts define what agents *should* do and how to *record* what they did. None provides a real-time mechanism to detect that an agent is deviating from its declared behavior *while it is operating*. The gap is between policy declaration and policy enforcement -- the difference between a speed limit sign and a speed camera. + +**The scenario**: A financial trading agent is authorized to execute trades within specified parameters. It begins operating within bounds but, after a model update, starts exceeding risk limits. Without runtime behavior verification, the deviation is only discovered in post-hoc audit -- potentially days later, after significant damage. + +## Critical Gap 2: Agent Resource Management + +**The problem**: No framework exists for managing computational resources, memory, and processing power across distributed AI agents. + +**The numbers**: **93 drafts** focus on autonomous network operations, and **117 ideas** touch on resource-adjacent topics. But those ideas address how agents communicate about tasks -- not how they compete for and share limited resources. + +**What is missing**: Scheduling, quotas, fair allocation, and priority mechanisms for multi-agent environments. When ten agents compete for the same GPU cluster, which gets priority? When an agent's computation exceeds its allocation, what happens? When a high-priority emergency response agent needs resources currently held by a routine monitoring agent, how does preemption work? + +**The scenario**: A telecom operator deploys 50 AI agents for network monitoring, troubleshooting, and optimization. During a major outage, all 50 agents simultaneously request inference resources to diagnose the problem. With no resource management framework, agents compete chaotically. The most aggressive agents get resources; the most important diagnostic tasks may not. The outage extends because the agents that could fix it are starved by the agents that are observing it. + +## Critical Gap 3: Agent Error Recovery and Rollback + +**The problem**: No standards exist for how agents handle errors, cascading failures, or the rollback of autonomous decisions. + +**The numbers**: This is the starkest gap in the corpus. Only **6 extracted ideas** address it, and all come from a single draft: [draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/) (score 4.1). One team, out of 557 authors, is working on this. + +**The 6 ideas from that draft**: +- Task-Oriented Multi-Agent Recovery Framework +- Inter-Agent Communication Protocol Requirements +- State Consistency Management +- Error and Success Reporting Framework (from a separate draft) +- Generic Agent Response Framework +- Mandatory restrictive failure behavior + +That is the entire body of work the IETF has produced on agent error recovery. For context, "Multi-Agent Communication Protocol" -- defining how agents *talk* -- appears in 8 drafts. The community has invested 8 times more effort in the plumbing than in the fire escape. + +**What is missing**: Circuit breakers for cascading failures. Checkpoint and rollback protocols. Blast radius containment. Graceful degradation. All concepts well-established in distributed systems engineering, but absent from the agent standards landscape. + +**The scenario**: A multi-agent supply chain system manages inventory, shipping, and payments. The inventory agent processes a large batch incorrectly, leading the shipping agent to dispatch wrong items, which causes the payment agent to process refunds to wrong accounts. The cascade happens in minutes. Without rollback mechanisms, untangling the mess requires manual human intervention across three systems -- and the agents continue making decisions based on corrupted state while humans try to intervene. + +## The High-Priority Gaps + +Six additional gaps scored HIGH severity. Each represents a missing piece that working deployments will hit: + +### Cross-Protocol Translation (0 ideas) + +With **120 competing A2A protocols** and no translation layer, agents speaking different protocols simply cannot interoperate. This gap is entirely unaddressed -- zero technical ideas in the corpus. It is the only gap with literally no coverage. + +The parallel is the early web: HTTP won not because it was the best protocol but because it was the one protocol everyone could speak. The agent ecosystem has no HTTP equivalent. If the IETF does not build a translation layer, the market will -- and the result will be vendor-locked ecosystems rather than open interoperability. + +### Human Override and Intervention (4 ideas) + +Only **30 human-agent interaction drafts** exist versus **93 autonomous operations** and **120 A2A protocol** drafts. Agents are being designed to talk to each other at a 4:1 ratio over being designed to talk to humans. Emergency override protocols -- the "big red button" -- are almost entirely absent. + +[draft-rosenberg-aiproto-cheq](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-cheq/) (score 3.9) is a rare exception: it defines a protocol for human confirmation of agent decisions before execution. But CHEQ is opt-in and pre-execution. No draft defines what happens when a human needs to stop a running agent, constrain its behavior, or take over its task mid-execution. + +### Multi-Agent Consensus (5 ideas) + +When a group of agents disagree -- the diagnosis agent says the router is down, the monitoring agent says it is up, the optimization agent is rerouting traffic around it -- who arbitrates? No framework exists for agents to resolve conflicting assessments without human intervention. + +### Dynamic Trust and Reputation (5 ideas) + +Static certificates authenticate identity but cannot express "this agent has been reliable for 6 months" or "this agent's accuracy degraded last week." Long-running agent ecosystems need trust that is earned, tracked, and revocable. The current landscape relies entirely on binary trust: either an agent has a valid certificate or it does not. + +### Cross-Domain Security Boundaries (10 ideas) + +An agent authenticated in Company A's domain needs to perform a task in Company B's domain. Identity management exists -- the 108 identity/auth drafts cover this. What does not exist is trust *isolation*: preventing an agent authenticated for a narrow task from escalating privileges across domain boundaries. + +### Agent Lifecycle Management (90 ideas) + +Registration is covered. What happens after registration is not: versioning when an agent is updated, graceful retirement when an agent is decommissioned, migration when an agent moves between hosts, and dependency management when other agents rely on it. + +## The Structural Problem + +Here is the finding the Architect on our team surfaced that reframes the entire gap analysis: + +**The severity of each gap correlates with the coordination difficulty required to fill it.** + +The critical gaps (behavior verification, resource management, error recovery) require agreement across *multiple* IETF working groups. They cut across safety, networking, identity, and operations -- areas currently owned by separate teams that rarely collaborate. The high gaps (cross-protocol translation, human override, consensus) require even broader agreement: they need architects who see the whole ecosystem, not just their protocol. + +Now look back at the team bloc analysis from Post 2. The 18 team blocs are *islands*. Cross-team collaboration is sparse. The strongest cross-bloc connection involves 3 shared drafts. The gaps that require the most cross-team work are being produced by an ecosystem that does the least cross-team work. + +This is the structural explanation for the safety deficit. It is not that people do not care about safety. It is that safety standards require coordination across boundaries that the current authorship structure cannot bridge. Capability standards can be built within a single team. Safety standards cannot. + +Our category co-occurrence analysis provides the concrete proof. Safety drafts are not entirely isolated -- they co-occur with 8 of 10 categories, coupling most strongly with policy and governance (**60% of safety drafts**, lift 2.3x) and identity/auth (**58%**, lift 1.7x). But the pattern is revealing: safety pairs with *governance* categories, not *implementation* categories. Of the 136 drafts tagged as A2A protocols, only **12 (8.8%) also address safety**. Safety has **zero co-occurrence** with agent discovery/registration and **zero co-occurrence** with model serving/inference. Its weakest links are to the categories where agents actually *do* things: A2A protocols (12), ML traffic management (3), and autonomous network operations (4). Safety is being discussed in governance papers. It is completely absent from discovery infrastructure and inference pipelines. It is barely present in the protocols that need it most. The traffic lights are not just behind the highways -- they are on a different road entirely. + +## The 4:1 Ratio, Revisited + +The safety deficit is not just a number. It is a structural property of how the IETF's AI agent community is organized. + +| Category | Drafts | Team Blocs Active | +|----------|-------:|------------------:| +| A2A protocols | 120 | Many (distributed across blocs) | +| Autonomous operations | 93 | Primarily Huawei, Chinese telecom | +| Agent identity/auth | 108 | Ericsson, Nokia, ATHENA, multiple | +| **AI safety/alignment** | **44** | **Few; mostly independents/startups** | +| **Human-agent interaction** | **30** | **Rosenberg/White (2-person team)** | + +The capability categories have organized teams behind them. The safety categories rely on individual contributors and small, unconnected teams. The best safety draft in the corpus (DAAP, score 4.8) comes from an independent author (Aylward). The best human-agent drafts come from a two-person Five9/Bitwave team. There is no 13-person safety bloc with 94% cohesion. + +Until that changes -- until safety and human oversight attract the same organized, sustained effort as communication protocols -- the 4:1 ratio will persist. And the gaps will remain open. + +--- + +### Key Takeaways + +- **12 gaps** exist in the IETF's AI agent landscape: 3 critical, 6 high, 3 medium +- **The 3 critical gaps** all address failure modes: behavior verification, resource management, error recovery and rollback +- **Error recovery has only 6 ideas** from a single draft; **cross-protocol translation has zero** -- the starkest absences across 361 drafts +- **Gap severity correlates with coordination difficulty**: the hardest gaps require cross-team, cross-WG collaboration that the current island structure cannot produce +- **The safety deficit is structural, not attitudinal**: capability standards can be built by one team; safety standards require ecosystem-wide coordination that does not yet exist + +*Next in this series: [Where 361 Drafts Converge (And Where They Don't)](05-1262-ideas.md) -- 96% of ideas appear in exactly one draft. The fragmentation goes all the way down.* + +--- + +*Gap analysis based on 361 drafts, cross-referenced against real-world deployment requirements for autonomous AI agent systems. Data current as of March 2026.* diff --git a/data/reports/blog-series/05-1262-ideas.md b/data/reports/blog-series/05-1262-ideas.md new file mode 100644 index 0000000..3a43eed --- /dev/null +++ b/data/reports/blog-series/05-1262-ideas.md @@ -0,0 +1,169 @@ +# Where 361 Drafts Converge (And Where They Don't) + +*The fragmentation goes deeper than competing protocols. It extends all the way down to the idea level.* + +--- + +We extracted roughly 1,700 technical components from 361 Internet-Drafts -- mechanisms, architectures, protocols, and patterns. Then we asked: how many of these ideas does anyone else also propose? + +The answer is devastating: **96% appear in exactly one draft.** Of 1,692 unique technical ideas in the corpus, only **75** show up in two or more drafts. Only **11** appear in three or more. The fragmentation documented in the previous posts -- 14 competing OAuth proposals, 120 A2A protocols with no interop layer -- is not just a protocol-level problem. It extends all the way down. At the idea level, the landscape is overwhelmingly a collection of islands. + +But islands are not the whole story. Using fuzzy matching across organizational boundaries, we found **628 ideas** where different organizations are working on recognizably similar problems -- even when they use different names and different approaches. These cross-org convergence signals are the embryonic consensus of the agent standards landscape: the problems that different teams, in different countries, with different agendas, independently recognize and attempt to solve. + +These convergence signals are more impressive than they first appear. Recall from Post 2 that **55% of all drafts have never been revised** beyond their first submission, and **65% of Huawei's drafts** are fire-and-forget. The ideas that converge across organizations are not the generic scaffolding of first-draft submissions -- they represent genuine engineering investment from teams that independently identified the same problem and committed resources to solving it. + +The picture that emerges is paradoxical: the raw material for a complete agent ecosystem exists. The convergent ideas point toward the architecture the ecosystem needs. But they exist in isolation -- proposed by separate teams, embedded in separate drafts, with no connective tissue linking them into a coherent blueprint. + +## The Taxonomy + +Every extracted idea was classified by type. The distribution reveals what kind of thinking dominates the landscape: + +| Type | Count | Share | What It Means | +|------|------:|------:|---------------| +| Mechanism | 663 | 37% | Concrete technical solutions: auth flows, routing algorithms, token formats | +| Architecture | 280 | 16% | System designs and reference models | +| Pattern | 251 | 14% | Reusable design approaches | +| Protocol | 228 | 13% | Full protocol specifications | +| Requirement | 171 | 10% | Formal requirement documents | +| Extension | 168 | 9% | Additions to existing standards (OAuth, SCIM, DNS) | +| Other | 19 | 1% | Frameworks, profiles, algorithms, schemas | + +The dominance of **mechanisms** (663 of 1,780 extracted components) tells us the community is in building mode. These are not abstract position papers -- they are concrete, implementable solutions. The 228 protocols and 168 extensions to existing standards show that much of the work builds on established foundations (OAuth 2.0, SCIM, DNS, EDHOC) rather than starting from scratch. + +The 280 architectures and 171 requirements suggest healthy standards development: teams are defining reference models before writing code. But the 251 patterns -- reusable approaches without full protocol specification -- indicate that many teams have identified what needs to be done without committing to how. + +## Where Teams Converge + +By exact title, only 75 ideas appear in multiple drafts. But ideas with different names often describe the same concept -- "Agent Gateway" in one draft and "Inter-Agent Communication Hub" in another. Our fuzzy-matching overlap analysis (using SequenceMatcher at 0.75 threshold) across organizational boundaries found **628 ideas** where 2+ distinct organizations are working on recognizably similar problems -- **43% of all unique idea clusters** have cross-org validation. These are the genuine consensus signals. + +| Idea | Orgs | Drafts | Key Organizations | +|------|-----:|-------:|-------------------| +| A2A Communication Paradigm | 8 | 5 | CAICT, Deutsche Telekom, Huawei, Orange, Telefonica | +| AI Agent Network Architecture | 8 | 5 | China Mobile, Deutsche Telekom, Huawei, Orange, UnionPay | +| Multi-Agent Communication Protocol | 7 | 8 | AsiaInfo, BUPT, China Mobile, China Telecom, Huawei | +| AI Agent Communication Network (ACN) | 7 | 5 | ANP Open Source, China Mobile, Cisco, Five9, Huawei | +| NLIP (Natural Language Interchange) | 7 | 1 | Fordham, IBM, Purdue, ServiceNow, eBay | +| ELA Protocol | 6 | 6 | Bitwave, Cisco, Ericsson, Five9, Inria | +| AI Gateway | 6 | 4 | AsiaInfo, BUPT, China Telecom, Huawei, UnionPay | +| Agent Communication across WAN | 6 | 3 | China Mobile, China Unicom, Deutsche Telekom, Huawei, Orange | + +The most-converged idea -- "A2A Communication Paradigm" -- draws independent contributions from **8 organizations across 5 countries**. This is simultaneously the strongest convergence signal and the strongest fragmentation signal. Eight organizations agree this is important. They are building separate, incompatible versions. + +Look at who bridges the divide. In three of the top eight convergent ideas, the same names appear alongside Chinese institutions: **Deutsche Telekom, Telefonica, and Orange**. These European telecoms show up in "A2A Communication Paradigm," "AI Agent Network Architecture," and "Agent Communication across WAN" -- each time co-listed with Huawei, China Mobile, or China Unicom. Of the **180 ideas that cross the Chinese-Western organizational divide**, European telecoms are present on a disproportionate share. The organizations most likely to prevent the agent ecosystem from splitting into incompatible regional stacks are not Google or Microsoft -- they are European carriers operating in both markets. US Big Tech is almost entirely absent from cross-divide convergence. + +The organization-pair overlaps reveal where real collaboration happens -- and where it does not: + +| Org Pair | Shared Ideas | Signal | +|----------|-------------:|--------| +| China Unicom -- Huawei | 32 | Deep intra-bloc alignment | +| China Mobile -- Huawei | 27 | Deep intra-bloc alignment | +| Ericsson -- Inria | 21 | European cross-org collaboration | +| Tsinghua -- Zhongguancun Lab | 20 | Chinese academic convergence | +| Fraunhofer SIT -- Tradeverifyd | 10 | Verifiable records niche | + +The pattern is stark: the highest-overlap pairs are Chinese institutions working within established blocs. Formal co-authorship between Chinese and Western organizations is thin -- but idea-level convergence, mediated by European telecoms operating in both markets, is broader than the co-authorship data suggests. + +The convergence signals cluster in three areas: + +**1. Agent communication infrastructure.** How agents discover, connect to, and message each other. This is the most active area with the most redundant proposals. The underlying need is clear; the implementation is contested. + +**2. Authentication and authorization.** Action-based authorization, agent registration, cryptographic identity verification. OAuth extensions dominate, but the approaches diverge significantly between pure OAuth extension (add claims/scopes) and novel frameworks (DAAP accountability protocol, STAMP delegation proofs). + +**3. Network architecture.** Agent gateways, agent communication networks, network management architectures. This is where the Chinese institutional ecosystem has the strongest presence, with Huawei and affiliated organizations producing most of the architecture ideas. + +## Where Teams Innovate + +The 96% of ideas appearing in only one draft are a mix: mostly generic components describing what each draft does ("Agent Gateway," "Transport Configuration System"), but scattered among them are genuinely novel proposals that no other team has attempted -- either because they are too new, too specialized, or ahead of their time. + +Some standouts from the unique ideas: + +**Verifiable Agent Behavior Attestation** (draft-birkholz-verifiable-agent-conversations) -- A CDDL-based format for cryptographically signing agent conversation records, enabling post-hoc verification of agent behavior. This directly addresses the critical behavior verification gap. + +**ADOL: Agentic Data Optimization Layer** ([draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/), score 4.5) -- Addresses token bloat in agent communication protocols. As agents exchange increasingly complex context, message sizes explode. ADOL compresses agent communications by 60-80%, a practical necessity that nobody else is working on. + +**Working Memory** (draft-agent-gw) -- A structured context management system that maintains state across multi-step agent operations. Sounds basic -- but no other draft proposes a standard for how agents should manage persistent operational context. + +**Autonomous Optical Network Operation** (draft-zhao-ccamp-actn-optical-network-agent) -- Applies agent architecture to the specific domain of optical network management. This is the kind of vertical specialization that validates the horizontal agent architecture work. + +**Execution Context Token (ECT)** ([draft-nennemann-wimse-ect](https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/), score 4.0) -- A JWT extension that records what each task did, linked to predecessors via a DAG. This is arguably the single most architecturally significant idea in the corpus: it turns the execution history of a multi-agent workflow into a cryptographically verifiable directed acyclic graph. It is the technical foundation for accountability, rollback, audit, and provenance. + +**CHEQ Protocol** ([draft-rosenberg-aiproto-cheq](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-cheq/), score 3.9) -- Human confirmation of agent decisions before execution. The only concrete protocol proposal for human-in-the-loop agent oversight. In a landscape of 30 human-agent interaction drafts, CHEQ stands alone as an implementable solution. + +## The Five Ideas That Matter Most + +If you are building agent systems today and need to know which IETF proposals to watch, these five represent the highest combination of quality, novelty, and gap-filling potential: + +| Idea | Draft | Score | Why It Matters | +|------|-------|------:|---------------| +| Execution Context Token | draft-nennemann-wimse-ect | 4.0 | DAG-based execution evidence; foundation for audit, rollback, and accountability | +| DAAP Accountability Protocol | draft-aylward-daap-v2 | 4.8 | Most comprehensive safety proposal; authentication + monitoring + enforcement | +| STAMP Delegation Proofs | draft-guy-bary-stamp-protocol | 4.6 | Cryptographic proof that an agent was authorized for a specific task | +| Agent Description Language (ADL) | draft-nederveld-adl | 4.1 | JSON standard for describing agent capabilities, tools, and permissions | +| Verifiable Conversations | draft-birkholz-verifiable-agent-conversations | 4.5 | Cryptographic signing of conversation records for auditability | + +Together, these five ideas sketch the outline of the ecosystem architecture that Post 6 will describe in full: ECT provides the execution backbone, DAAP provides the accountability layer, STAMP proves delegation, ADL describes capabilities, and verifiable conversations create the audit trail. + +## Mapping Ideas to Gaps + +The most revealing analysis is mapping which ideas partially address which gaps: + +| Gap | Severity | Ideas | Coverage | +|-----|----------|------:|----------| +| Resource Management | CRITICAL | 117 | Peripheral: ideas touch on task management but not resource contention | +| Behavior Verification | CRITICAL | 52 | Partial: attestation and monitoring ideas exist but no runtime enforcement | +| Error Recovery/Rollback | CRITICAL | 6 | Near-zero: 6 ideas from one draft (draft-yue-anima-agent-recovery-networks) | +| Cross-Protocol Translation | HIGH | 0 | Complete absence: zero ideas in the entire corpus | +| Lifecycle Management | HIGH | 90 | Partial: registration covered, retirement/versioning not | +| Human Override | HIGH | 4 | Near-zero: CHEQ exists but no emergency override protocol | +| Multi-Agent Consensus | HIGH | 5 | Minimal: no conflict resolution framework | +| Cross-Domain Security | HIGH | 10 | Partial: identity covered, isolation not | +| Dynamic Trust | HIGH | 5 | Minimal: trust scoring exists conceptually but not as protocol | +| Performance Monitoring | MEDIUM | 26 | Moderate: benchmarking ideas exist (draft-cui-nmrg-llm-benchmark) | +| Explainability | MEDIUM | 5 | Minimal: no decision-explanation protocol | +| Data Provenance | MEDIUM | 79 | Partial: data format ideas exist but no provenance chain standard | + +The pattern is clear: the gaps with the highest idea counts (resource management at 117, lifecycle at 90, provenance at 79) are gaps where the *periphery* of existing work touches the problem. Teams building communication protocols think about resources; teams building discovery think about lifecycle. But nobody makes these the *central* problem. + +The gaps with near-zero idea counts (error recovery at 6, human override at 4, consensus at 5, cross-protocol translation at 0) are the ones where no team is even circling the problem. These are true blind spots. + +## The Ideas Nobody Had + +Sometimes the absence is the finding. Here are technical ideas conspicuous in their absence from the entire corpus: + +- **Agent capability degradation signaling**: No protocol for an agent to advertise that its performance has degraded (model drift, resource constraints, partial failure). Other agents continue relying on it at full trust. + +- **Multi-agent transaction semantics**: No ACID-like guarantees for multi-agent workflows. If three agents must all succeed or all roll back, there is no two-phase commit equivalent. + +- **Agent migration protocol**: No standard for moving a running agent from one host to another while preserving state and active connections. Critical for cloud deployments. + +- **Privacy-preserving agent discovery**: No mechanism for an agent to find capabilities without revealing its intent. "I need a medical diagnosis agent" reveals sensitive information before any trust is established. + +- **Agent cost and billing**: No standard for agents to negotiate compensation for services. Agents performing work for other agents have no way to express "this costs X" or "you have Y credits remaining." + +Each of these absences represents an opportunity for new drafts that would fill genuine needs. + +## What the Taxonomy Tells Builders + +Three practical takeaways for anyone implementing agent systems: + +**1. Build on the convergent ideas.** Agent registration, action-based authorization, and capability-based discovery appear across multiple teams and organizations. These represent genuine consensus about what the infrastructure needs, even if implementations diverge. + +**2. Watch the single-source innovations.** The long tail of single-draft ideas contains the innovations that will differentiate the next generation of agent platforms. ECT, CHEQ, ADOL, and ADL are not widely known but represent some of the most thoughtful engineering in the corpus. + +**3. Fill the blank spaces.** Error recovery, cross-protocol translation, and human override are the clearest opportunities for new contributions. The community has signaled these gaps matter (through the severity of the gap analysis) but has not yet produced the ideas to fill them. + +--- + +### Key Takeaways + +- **96% of ideas appear in exactly one draft** -- fragmentation extends all the way down to the idea level; only 75 of 1,692 unique ideas show cross-draft convergence +- **628 cross-org convergent ideas** (43% of unique clusters, via fuzzy matching) reveal where organizations independently agree; highest-overlap pairs are Chinese institutions (China Unicom-Huawei: 32 shared ideas) +- **The critical gaps remain unfilled**: error recovery has 6 ideas from one draft; cross-protocol translation has zero +- **Five ideas to watch**: ECT (execution DAG), DAAP (accountability), STAMP (delegation proof), ADL (agent description), verifiable conversations (audit trail) +- **Convergence clusters in three areas**: agent communication infrastructure, authentication/authorization, and network architecture + +*Next in this series: [Drawing the Big Picture](06-big-picture.md) -- 628 cross-org convergent ideas, 12 gaps, and the architectural vision that connects them.* + +--- + +*Idea extraction performed by Claude from full-text analysis of each draft. Classification into types (mechanism, architecture, protocol, pattern, extension, requirement) based on the technical content of each proposal. Data current as of March 2026.* diff --git a/data/reports/blog-series/06-big-picture.md b/data/reports/blog-series/06-big-picture.md new file mode 100644 index 0000000..df6a0e2 --- /dev/null +++ b/data/reports/blog-series/06-big-picture.md @@ -0,0 +1,174 @@ +# Drawing the Big Picture: What the Agent Ecosystem Actually Needs + +*361 drafts, 628 cross-org convergent ideas, 12 gaps -- and the architectural vision that connects them all.* + +--- + +We have spent five posts documenting a paradox: the IETF's AI agent landscape has extraordinary breadth (361 drafts), deep fragmentation at every level (96% of ideas appear in only one draft, 120 competing A2A protocols, 14 OAuth proposals), concentrated authorship (18 team blocs, one company writing 18% of all drafts), and critical gaps (behavior verification, error recovery, human override) that nobody is filling. + +The landscape has quantity. It lacks architecture. + +This post is about what the architecture looks like -- not in theory, but derived from the data. The 12 gaps are not random absences; they are structurally related. The convergent ideas contain the components; they need a blueprint. And the blueprint already has a foundation: existing IETF work on workload identity (SPIFFE/WIMSE) and execution evidence (Execution Context Tokens) provides the lower layers. What is missing is what goes on top. + +## What the Ecosystem Needs: Four Pillars + +Our analysis -- synthesizing the gaps, the ideas, and the existing proposals -- points to four missing pillars: + +### Pillar 1: DAG-Based Execution + +**The gap it fills**: Error Recovery and Rollback (Critical), Resource Management (Critical) + +Every multi-agent workflow is a directed acyclic graph: tasks with dependencies, checkpoints, and decision points. But no draft in the corpus defines "agent task graph" as a first-class construct. Without it, there is no way to: +- Know which tasks depend on which +- Place checkpoints for rollback +- Calculate the blast radius of a failure +- Schedule resources based on the graph structure + +The Execution Context Token (ECT) from [draft-nennemann-wimse-ect](https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/) provides the evidence layer: each task produces a signed token linked to its predecessors via parent references, forming a verifiable DAG. What is missing is the orchestration semantics: when to checkpoint, how to roll back, how to contain cascading failures. + +The data supports this: the 6 ideas addressing error recovery (all from [draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/)) include "Task-Oriented Multi-Agent Recovery Framework" and "State Consistency Management" -- DAG concepts by another name. The 117 ideas touching resource management need a graph-aware scheduler. The answer is the same structure: a DAG execution model. + +### Pillar 2: Human-in-the-Loop as First Class + +**The gap it fills**: Human Override and Intervention (High), Agent Explainability (Medium) + +Only **30 human-agent interaction drafts** exist against **120 A2A protocols** and **93 autonomous operations** drafts. Agents are being designed to talk to each other, not to humans. The CHEQ protocol ([draft-rosenberg-aiproto-cheq](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-cheq/)) is a rare exception -- it defines human confirmation *before* agent execution. But nobody has standardized what happens *during* execution: how a human pauses a running workflow, constrains an agent's scope, takes over a task, or issues an emergency stop. + +Human-in-the-loop must be a node type in the execution DAG, not an afterthought. The architecture needs: +- **Approval gates**: DAG nodes that block until a human approves +- **Override commands**: Standardized signals to pause, constrain, stop, or take over +- **Escalation paths**: What happens when an override times out +- **Explainability tokens**: How an agent communicates its reasoning at a HITL point + +The irony: every production deployment will require these primitives. The standards community is building autonomous capabilities while the deployment community is adding human oversight ad hoc. + +### Pillar 3: Protocol-Agnostic Interoperability + +**The gap it fills**: Cross-Protocol Translation (High, zero ideas), Agent Lifecycle Management (High) + +The 120 A2A protocol drafts will never converge to a single winner. MCP, A2A Protocol, SLIM, and dozens of others will coexist, each with different strengths. The answer is not to pick one; it is to build a translation layer that lets agents using different protocols interoperate through gateways. + +This gap has **zero ideas** in the current corpus -- the starkest absence across 361 drafts. No team is working on it. Yet it is perhaps the most important architectural piece: without protocol interoperability, the agent ecosystem fragments into vendor-locked silos. + +The protocol binding layer would define: +- How agents advertise which ecosystem features they support +- How gateways translate between protocols while preserving execution semantics (the DAG, the HITL points) +- How agents version and retire gracefully without breaking dependents +- The minimal semantic contract: intent, result, error -- expressible in any protocol + +### Pillar 4: Assurance Profiles (Dual Regime) + +**The gap it fills**: Behavior Verification (Critical), Cross-Domain Security (High), Dynamic Trust (High), Data Provenance (Medium) + +The same agent ecosystem must work in two regimes: + +**Relaxed** (development, internal tools, low-risk): Best-effort, optional audit, minimal proof overhead. Think Kubernetes-deployed internal agents. + +**Regulated** (finance, healthcare, critical infrastructure): Cryptographic attestation per task, provenance chains, behavior verification against declared specifications, mandatory audit ledger. Think medical or financial agents. + +The architecture achieves this with *assurance profiles* -- named configurations that dial up or down the proof requirements. The same DAG, same HITL points, same protocol bindings. Different levels of evidence: + +| Level | Evidence | Use Case | +|-------|----------|----------| +| L0 | None (best-effort) | Development, testing | +| L1 | Unsigned audit trail | Internal production | +| L2 | Signed ECTs (JWT) | Cross-org, standard compliance | +| L3 | Signed ECTs + external audit ledger | Regulated industries | + +This dual-regime approach resolves the tension between "move fast" deployments and "prove everything" regulated environments. The 52 ideas touching behavior verification and the 79 ideas touching data provenance become implementable at higher assurance levels without imposing their cost on every deployment. + +## How It Builds on What Exists + +A critical point: this architecture does not compete with existing work. It layers on top of it. Our cross-reference analysis confirms the foundations are strong: **TLS 1.3** (RFC 8446, cited by 42 drafts), **OAuth 2.0** (RFC 6749, 36 drafts), **HTTP Semantics** (RFC 9110, 34 drafts), **JWT** (RFC 7519, 22 drafts), and **COSE** (RFC 9052, 20 drafts) form the bedrock. + +But the bedrock is not uniform. Our RFC foundation analysis (Post 3) revealed that the Chinese and Western blocs build on **fundamentally different technology stacks**: YANG/NETCONF for network management on one side, COSE/CBOR/CoAP for IoT security on the other. The only shared foundation is OAuth 2.0. This means the architecture layer above must be genuinely protocol-agnostic -- it cannot assume either stack as the default. The four pillars are designed with this constraint: the DAG model, HITL primitives, and assurance profiles are expressed in terms of abstract semantics, not specific wire formats. The protocol binding layer (Pillar 3) exists precisely because the underlying plumbing diverges. + +The architecture adds connective tissue above this layer, not below it: + +| Layer | Existing Work | What We Add | +|-------|---------------|-------------| +| **Identity** | SPIFFE (workload identifier), WIMSE (security context propagation) | Nothing -- use existing identity | +| **Evidence** | ECT (execution context tokens, DAG linking) | Orchestration semantics, checkpoint/rollback, HITL nodes | +| **Auth** | OAuth 2.0, SCIM, DAAP, STAMP, Agentic JWT | Protocol binding so any auth approach works | +| **Communication** | MCP, A2A, SLIM, 120 other protocols | Translation layer and capability advertisement | +| **Safety** | DAAP (accountability), verifiable conversations, VERA (zero-trust) | Assurance profiles connecting these into deployable configurations | + +The proposed five-draft ecosystem: + +1. **Agent Ecosystem Model (AEM)** -- Architecture and terminology. The shared vocabulary so everyone speaks the same language. +2. **Agent Task DAG (ATD)** -- Execution semantics, checkpoints, rollback. How the DAG works. +3. **Human-in-the-Loop (HITL) Primitives** -- Approval gates, overrides, escalation. How humans participate. +4. **Agent Ecosystem Protocol Binding (AEPB)** -- Protocol translation, capability discovery, lifecycle management. How interoperability works. +5. **Assurance Profiles (APAE)** -- Behavior verification, dynamic trust, provenance. How you prove it all works. + +Each draft addresses specific gaps. Together, they provide the connective tissue the landscape lacks. + +## Traction vs. Aspiration + +A reality check: of the 361 drafts, only **36 (10%)** have been adopted by IETF working groups. The rest are individual submissions -- proposals without institutional backing. The WG-adopted drafts score higher on average (**3.54 vs. 3.31**), particularly on maturity (+1.28) and momentum (+0.98), but lower on novelty (-0.45). The WGs that have adopted the most agent-relevant drafts are security-focused: **lamps** (6 drafts), **lake** (5), **tls** (3), **emu** (3). Agent-specific WGs like `aipref` have adopted only 2 drafts. + +This reveals a structural insight: the IETF is not building agent standards from scratch. It is **retrofitting security standards for agents**. The agent architecture we propose above would need to work within this reality -- building on the security WGs' infrastructure rather than competing with it. + +## Predictions + +Based on the data trajectories and current momentum: + +**Within 6 months**: The OAuth-for-agents fragmentation will partially resolve. Working groups will adopt 2-3 canonical approaches (likely DAAP/STAMP for accountability and one of the RAR extensions for basic auth). The other 10 proposals will fade or merge. + +**Within 12 months**: The DMSC side meeting's gateway work will produce a specification, likely gateway-centric with Agent Gateways as the primary interoperability mechanism. This is not the protocol-agnostic translation layer the ecosystem needs, but it will be the first concrete interop proposal. + +**Within 18 months**: The safety deficit will begin to close -- not from IETF drafts but from regulatory pressure. The EU AI Act's requirements for high-risk AI systems will drive demand for behavior verification, human override, and audit standards. The IETF will respond reactively. + +**The risk**: If the architecture work does not happen in the next 12 months, the agent ecosystem will calcify around vendor-specific protocol stacks (OpenAI's, Google's, Anthropic's, Huawei's). Each will have its own auth, discovery, and communication layer. The interoperability window will close, and the IETF's work will be standards for islands rather than standards for the internet. + +### Two Equilibria + +By 2028, the landscape will have resolved into one of two stable states. + +In the **first equilibrium**, it looks like today's microservices ecosystem: a chaotic but functional collection of protocols, libraries, and frameworks, held together by platform-specific integrations and de facto standards from the largest cloud providers. The IETF's work exists but is incomplete. The real interoperability happens at higher layers -- agent frameworks like LangChain, Semantic Kernel, or their successors. Safety is bolted on after deployment. + +In the **second equilibrium**, it looks more like the web: a layered architecture where identity (like TLS), communication (like HTTP), and semantics (like HTML) are cleanly separated, with standardized interfaces between them. Agents identify via WIMSE, execute via ECT-based DAGs, communicate via protocol-agnostic bindings, and operate under assurance profiles that scale from development to regulated production. Safety is built in, not bolted on. + +The 4:1 ratio is the leading indicator. If it narrows -- if safety and oversight work accelerates to match capability work -- the second equilibrium becomes achievable. If it stays at 4:1 or widens, the first equilibrium is where we land, and safety becomes remediation rather than prevention. + +## What Builders Should Do Today + +If you are building agent systems and cannot wait for standards to mature: + +**1. Watch these drafts**: ECT (execution evidence), DAAP (accountability), CHEQ (human confirmation), ADL (agent description), ANS (agent discovery). These have the highest combination of quality, novelty, and adoption potential. + +**2. Design for the DAG**: Structure your multi-agent workflows as directed acyclic graphs with explicit dependencies and checkpoints. Even without a standard, the pattern will be compatible with whatever emerges. + +**3. Build HITL from the start**: Every production agent deployment needs human override capability. Do not add it later. Design approval gates, emergency stops, and escalation paths into your architecture now. + +**4. Implement assurance as a dial**: Make your proof/audit level configurable. Start at L0 for development, L1 for production, and be ready to turn up to L2/L3 when regulation arrives. + +**5. Avoid protocol lock-in**: If you build on MCP today, architect for the possibility of supporting A2A or SLIM tomorrow. The protocol war is not over, and the winner may be "all of them via translation." + +## The Thesis + +Across six posts, we have built to one argument: + +**The IETF's AI agent standardization effort is the largest, fastest-growing, and most consequential standards race in a decade. But it is building the highways before the traffic lights.** The data shows explosive growth (from 0.5% to 9.3% of all IETF submissions in 15 months), deep fragmentation (120 competing A2A protocols), concerning concentration (one company writes 18% of all drafts), and a structural safety deficit (4:1 capability to guardrails). What is missing is not more protocols -- it is connective tissue: a shared execution model, human oversight primitives, protocol interoperability, and assurance profiles that work from development to regulated production. + +The 75 convergent ideas -- and the broader set of 628 cross-org overlaps -- contain the components for this architecture. The question is whether the community can assemble them before the protocols ship without it. The convergence data suggests it is possible: **180 ideas already cross the Chinese-Western divide**, mediated largely by European telecoms (Deutsche Telekom, Telefonica, Orange) that operate in both markets and appear on both sides of nearly every major cross-cultural convergent idea. The bridge-builders exist. They need an architecture to bridge to. + +The IETF has built the internet's infrastructure before. DNS, HTTP, TLS -- each emerged from periods of competing proposals, fragmentation, and coordinated resolution. The AI agent standards race is following the same pattern, on a compressed timeline, with higher stakes. + +The traffic lights need to catch up to the highways. The data says they can -- if someone draws the big picture. + +--- + +### Key Takeaways + +- **Four missing pillars**: DAG-based execution, human-in-the-loop primitives, protocol-agnostic interoperability, and assurance profiles for dual-regime deployment +- **The architecture builds on existing work**: SPIFFE for identity, WIMSE for security context, ECT for execution evidence -- the foundation exists +- **Five proposed drafts** (AEM, ATD, HITL, AEPB, APAE) would fill the 12 gaps by providing connective tissue between existing protocol proposals +- **The interoperability window is closing**: vendor-specific agent stacks are forming; the next 12 months are critical for open standards +- **For builders today**: design for DAGs, build HITL from the start, make assurance configurable, avoid protocol lock-in + +*Next in this series: [How We Built This](07-how-we-built-this.md) -- the methodology behind analyzing 361 IETF drafts with Claude, Ollama, and Python.* + +--- + +*Synthesis based on the full IETF Draft Analyzer dataset: 361 drafts, 557 authors, 75 cross-draft convergent ideas (628 via fuzzy matching), 12 gaps, 18 team blocs, 42 overlap clusters. Data current as of March 2026.* diff --git a/data/reports/blog-series/07-how-we-built-this.md b/data/reports/blog-series/07-how-we-built-this.md new file mode 100644 index 0000000..46d6d31 --- /dev/null +++ b/data/reports/blog-series/07-how-we-built-this.md @@ -0,0 +1,242 @@ +# How We Built This: Analyzing 361 IETF Drafts with Claude and Ollama + +*The engineering behind the analysis -- a Python CLI, two LLMs, one SQLite database, and ~$9.* + +--- + +Every claim in this series -- the 4:1 safety ratio, the 14 competing OAuth proposals, the 18 team blocs, the 12 gaps, the 180 ideas crossing the Chinese-Western divide -- comes from an automated analysis pipeline we built in Python. This post describes how it works, what it costs, what it found that surprised us, and what we learned about LLM-powered document analysis at scale. + +The tool is open source. If you want to run it on a different corner of the IETF -- or adapt it for another standards body -- everything you need is in the repository. + +## The Pipeline + +The analysis runs in six core stages. Each builds on the previous, and every stage caches its work so re-runs are fast and cheap. + +``` +fetch --> analyze --> embed --> ideas --> gaps --> report + | | | | | | + v v v v v v +Datatracker Claude Ollama Claude Claude Markdown + API Sonnet nomic-embed Haiku Sonnet + rich +``` + +Three additional analysis passes run on top of the core pipeline: + +``` +refs --> trends --> idea-overlap --> status + | | | | + v v v v +Regex SQL query SequenceMatcher Naming convention +(local) (local) (local) (local) +``` + +These secondary passes cost nothing -- they operate entirely on data already in the database. + +### Stage 1: Fetch + +The Datatracker API (`https://datatracker.ietf.org/api/v1/doc/document/`) provides structured metadata for every Internet-Draft: name, title, abstract, authors, revision, submission date, working group, and current status. Full text is available at `https://www.ietf.org/archive/id/{name}-{rev}.txt`. + +We search for drafts matching 12 keywords: `agent`, `ai-agent`, `llm`, `autonomous`, `machine-learning`, `artificial-intelligence`, `mcp`, `agentic`, `inference`, `generative`, `intelligent`, `aipref`. Both `name__contains` and `abstract__contains` filters are used to cast a wide net. We started with 6 keywords and 260 drafts; adding 6 more captured 101 new drafts in categories we were missing -- MCP-related work, generative AI infrastructure, intelligent networking, and the nascent `aipref` working group. + +**Gotchas learned the hard way**: The Datatracker API uses `type__slug=draft` (not `type=draft`) to filter to drafts. Pagination requires tracking `meta.next` through the response chain. Affiliation data comes from the `documentauthor` record, not the `person` record. We add a 0.5-second polite delay between requests. + +The result: **361 drafts** fetched, with full metadata and text stored in SQLite. + +### Stage 2: Analyze + +Each draft is sent to Claude Sonnet with a compact structured prompt that includes the draft name, title, date, page count, and abstract. The prompt asks for: +- **Category classification** (one or more of 11 categories: A2A protocols, agent identity/auth, autonomous netops, data formats/interop, agent discovery/reg, human-agent interaction, AI safety/alignment, ML traffic management, policy/governance, model serving/inference, other) +- **Quality rating** on five dimensions (novelty, maturity, overlap, momentum, relevance) each scored 1-5 +- **Brief summary** of what the draft does and why it matters + +The key optimization: **caching**. Every Claude API call is stored in an `llm_cache` table keyed by the SHA-256 hash of the full prompt. If the same draft is analyzed twice, the second call is free and instant. This makes the pipeline idempotent -- you can re-run any stage without wasting money. + +We initially sent full draft text to Claude, but switched to abstract-only analysis after testing showed that abstracts produce equivalent ratings at roughly 10x lower token cost. Full text is still used for idea extraction (Stage 4), where granular detail matters. + +**Cost**: About $3.16 for the initial 260 drafts on Claude Sonnet (376K input tokens, 200K output tokens). With the `--cheap` flag, analysis uses Claude Haiku instead, cutting costs roughly 10x. + +### Stage 3: Embed + +For similarity analysis, we generate vector embeddings using Ollama running locally with the `nomic-embed-text` model. Each draft's abstract is embedded into a 768-dimensional vector, stored as raw bytes in the database. + +**Why not Claude for embeddings?** Cost and speed. Ollama runs locally, is free, and processes all 361 drafts in under a minute. The embeddings are used for approximate similarity (cosine distance), overlap detection, and t-SNE visualization -- tasks where a small local model is perfectly adequate. + +The embeddings enable: +- **Overlap clusters**: Draft pairs with >0.85 cosine similarity grouped together +- **Near-duplicate detection**: 25+ pairs with >0.98 similarity flagged as potential duplicates +- **Interactive t-SNE landscape**: 2D visualization of the entire draft space, color-coded by category + +### Stage 4: Ideas + +The most expensive stage. Each draft's full text is analyzed by Claude to extract discrete technical ideas -- mechanisms, architectures, protocols, patterns, extensions, and requirements. + +**Batch optimization**: Rather than calling Claude once per draft, we batch 5 drafts per API call using Claude Haiku (`--cheap --batch 5`). This cuts the number of API calls by 5x and uses the cheaper model. The batch prompt includes all 5 drafts' texts and asks for ideas from each, reducing per-idea cost to fractions of a cent. + +**Result**: **1,780 technical components** extracted from 361 drafts (averaging ~5 per draft). Of 1,692 unique titles, **96% appear in exactly one draft** -- most are draft-specific component descriptions ("Agent Gateway," "Transport Configuration System"), not standalone innovations. Only **75 ideas** show genuine cross-draft convergence (appearing in 2+ drafts), and only **11** appear in 3+ drafts. The real signal comes from the cross-org overlap analysis (idea-overlap feature), which uses fuzzy matching to identify **628 ideas** where 2+ organizations work on recognizably similar problems -- 43% of all unique idea clusters. + +### Stage 5: Gaps + +The gap analysis is a synthesis step. We send Claude Sonnet the full landscape context -- category distributions, idea taxonomy, safety ratio, overlap patterns -- and ask it to identify areas where standardization work is missing or inadequate. + +This is the one stage where the LLM is doing genuine reasoning, not just extraction. The prompt provides the data; Claude identifies the structural gaps. We validate its findings against the raw data (e.g., confirming that only 6 ideas address error recovery, or that cross-protocol translation has zero ideas). + +**Result**: **12 gaps** identified (3 critical, 6 high, 3 medium), each cross-referenced with related drafts and ideas. + +### Stage 6: Report + +Reports are generated in Markdown with embedded data tables. Fifteen report types are available: overview, landscape, digest, timeline, overlap-matrix, overlap-clusters, authors, ideas, gaps, refs, trends, idea-overlap, and status. The `rich` library provides formatted terminal output for CLI commands. + +## The Database + +The SQLite database is the real product. At **28 MB**, it contains everything needed to reproduce any finding in this series. + +| Table | Rows | Purpose | +|-------|-----:|---------| +| drafts | 361 | Full metadata + text for every draft | +| ratings | 361 | 5-dimension quality scores + summaries | +| embeddings | 361 | 768-dim vectors as binary blobs | +| ideas | 1,780 | Extracted technical components with types | +| authors | 557 | Person records from Datatracker | +| draft_authors | 1,057 | Author-to-draft linkage with affiliation | +| draft_refs | 4,231 | RFC/draft/BCP cross-references | +| gaps | 12 | Identified standardization gaps | +| llm_cache | 703 | Cached Claude API responses | + +FTS5 full-text search is enabled on drafts, supporting queries like `ietf search "agent authentication"` that return ranked results in milliseconds. Indexes on `draft_refs(ref_type, ref_id)` and `ideas(draft_name)` keep query performance fast even for cross-table joins. + +The database design follows a principle: **store raw data, compute derived data**. The drafts table stores full text; the ratings, ideas, and refs tables store analysis results. Any analysis can be re-run without re-fetching from the Datatracker API. + +## The Author Network + +The author analysis deserves special mention because it revealed the team bloc pattern -- one of the most important findings in the series. + +The IETF Datatracker provides author information via two API endpoints: +- `/api/v1/doc/documentauthor/?document__name=X` -- returns author links per draft +- `/api/v1/person/person/{id}/` -- returns person details (name, affiliation) + +We fetch all authors for all drafts, build a co-authorship graph, and detect team blocs: groups where every pair of members shares at least 70% of their drafts. This threshold was chosen empirically -- lower thresholds produce too many loose groups; higher thresholds miss real teams. + +The detection algorithm: +1. For each pair of authors, calculate pairwise overlap = |shared drafts| / min(|A's drafts|, |B's drafts|) +2. Build a graph where edges represent pairs with >= 70% overlap and >= 2 shared drafts +3. Find connected components in this graph +4. Each component is a team bloc + +**Organization normalization** turned out to be essential. "Huawei Technologies", "Huawei Technologies Co., Ltd.", and "Huawei Canada" all need to resolve to "Huawei". We maintain a hand-curated alias table of 40+ mappings plus automatic suffix stripping for common patterns (", Inc.", " LLC", " AB", etc.). Without this, cross-org analysis would fragment the same company into multiple entities. + +**Result**: **18 team blocs** detected among 557 authors. The largest: a 13-person Huawei team with 22 shared drafts and 94% average cohesion. + +## The New Features + +Four features were added during the analysis session, each unlocking a deeper analytical layer. All four run locally with zero API cost. + +### RFC Cross-References (`ietf refs`) + +**What it does**: Parses all 361 drafts for RFC references using regex (`RFC\s*\d{4,}`, `\[RFC\d+\]`, `BCP\s*\d+`, `draft-[\w-]+`). Stores results in a `draft_refs` table for querying. + +**What it found**: **4,231 cross-references** (2,443 RFC, 698 draft, 1,090 BCP) across 360 drafts with text. The most-referenced standards reveal what the agent ecosystem builds on: + +| RFC | References | What It Is | +|-----|----------:|-----------:| +| RFC 2119 | 285 | MUST/SHALL/MAY conventions | +| RFC 8174 | 237 | Key words update | +| RFC 8446 | 42 | TLS 1.3 | +| RFC 6749 | 36 | OAuth 2.0 | +| RFC 9110 | 34 | HTTP Semantics | +| RFC 8259 | 26 | JSON | +| RFC 5280 | 22 | X.509 Certificates | +| RFC 7519 | 22 | JWT | +| RFC 9052 | 20 | COSE | + +**The insight**: Strip away RFC 2119/8174 (boilerplate conventions that every IETF draft references) and the picture is clear: the agent ecosystem is built on **OAuth + TLS + HTTP + JWT**. It is a security and identity infrastructure, not a networking infrastructure. The IETF's agent standards are being constructed on the same foundation as the web itself. This reframes the entire landscape: agent standards are not something new. They are the next layer on top of the web's existing security architecture. + +### Category Trends (`ietf trends`) + +**What it does**: Monthly breakdown of new drafts per category with growth rates, comparing recent periods to earlier ones. + +**What it found**: The growth curve is a step function. Monthly submissions went from 2 (Jun 2025) to 67 (Oct 2025) to 86 (Feb 2026). A2A protocols are still accelerating (26 in Oct/Nov 2025, 36 in Feb 2026). Safety/alignment is growing but slower (5 in Oct 2025, 12 in Feb 2026). The 4:1 ratio is narrowing, but not fast enough. + +### Cross-Org Idea Overlap (`ietf idea-overlap`) + +**What it does**: Groups similar ideas using `SequenceMatcher` (threshold 0.75), then checks which ideas span drafts from multiple organizations. This separates genuine cross-org consensus from intra-team duplication. + +**What it found**: By exact title, only 75 of 1,692 unique ideas appear in 2+ drafts -- 96% are islands. But fuzzy matching reveals **628 ideas** where 2+ organizations work on recognizably similar problems (43% of unique clusters). The top convergence signal -- "A2A Communication Paradigm" -- spans **8 organizations from 4 countries**. The deeper finding: **180 ideas cross the Chinese-Western organizational divide**. European telecoms (Deutsche Telekom, Telefonica, Orange) act as bridges between Chinese institutions and Western companies. US Big Tech (Google, Apple, Amazon) is almost entirely absent from cross-divide collaboration. + +### WG Adoption Status (`ietf status`) + +**What it does**: Determines which drafts have been formally adopted by IETF Working Groups based on the `draft-ietf-{wg}-*` naming convention. Compares scores, categories, and gap coverage between WG-adopted and individual drafts. + +**What it found**: Only **36 of 361 drafts (10%)** are WG-adopted. The remaining 90% are individual submissions -- ideas seeking institutional backing. WG-adopted drafts score slightly higher on average (**3.54 vs 3.31**), validating our rating methodology. + +The most revealing finding: **19 of 36 WG-adopted drafts are in security Working Groups** (lamps, lake, tls, emu, ace). The agent-focused `aipref` WG has only 2 adopted drafts. The IETF is not building agent standards in agent-focused groups -- it is retrofitting its existing security infrastructure for agent use cases. The standards that will actually govern AI agents on the internet are being written by the same people who write TLS and OAuth, not by new agent-specific working groups. + +## What We Learned + +### LLMs are good at structured extraction + +Claude's strength in this pipeline is turning unstructured technical documents into structured data: categories, ratings, ideas, gaps. The extraction quality is high -- we spot-checked 50 drafts and found categorization and idea extraction accurate in ~90% of cases. The errors tend to be over-categorization (assigning too many categories) rather than miscategorization. + +### LLMs need validation for synthesis + +The gap analysis (Stage 5) required the most human oversight. Claude correctly identified the gaps, but the severity rankings and the "zero ideas" claims needed manual verification against the raw data. LLMs can synthesize, but the synthesis should be treated as a hypothesis, not a conclusion. + +### Caching changes the economics + +The `llm_cache` table transforms the cost model. The first run costs ~$3. Every subsequent run -- adding new drafts, re-running with different prompts, regenerating reports -- costs only for new work. Over the project's life, we estimate caching saved $30+ in redundant API calls. The cache key is a SHA-256 hash of the full prompt, making it trivially collision-resistant. + +### Hybrid models work + +Using Claude Sonnet for reasoning-heavy tasks (analysis, gap synthesis) and Claude Haiku for extraction-heavy tasks (idea extraction, batch processing) cut costs by 5-10x without meaningful quality loss. Using Ollama for embeddings made similarity analysis free and fast. The principle: match the model's capability to the task's difficulty. + +### The free analyses are the most revealing + +The four features that cost zero API dollars -- regex-based RFC parsing, SQL-based trend analysis, SequenceMatcher-based idea dedup, and naming-convention-based WG detection -- produced some of the most narratively important findings in the entire series. The OAuth-stack-as-foundation insight from RFC cross-references. The 180 cross-divide ideas. The 10% WG adoption rate. The security-WG-not-agent-WG finding. None of these required an LLM. They required a well-structured database and the right questions. + +### The database is the product + +The most valuable output is not any single report -- it is the SQLite database. With all drafts analyzed, ideas extracted, authors mapped, refs parsed, and embeddings stored, the database supports ad-hoc queries that no pre-built report can anticipate. The blog series was written primarily by querying the database, not by re-running the pipeline. + +## Cost Summary + +| Stage | Model | Drafts | Cost | +|-------|-------|-------:|-----:| +| Analyze | Claude Sonnet | 260 | ~$2.50 | +| Analyze | Claude Sonnet | 101 | ~$5.50 | +| Ideas | Claude Haiku (batch 5) | 361 | ~$0.80 | +| Gaps | Claude Sonnet | 1 call | ~$0.20 | +| Embed | Ollama (local) | 361 | $0.00 | +| Refs | Regex (local) | 361 | $0.00 | +| Trends | SQL (local) | 361 | $0.00 | +| Idea-overlap | SequenceMatcher (local) | 1,780 ideas | $0.00 | +| WG Status | Naming convention | 361 | $0.00 | +| **Total** | | | **~$9** | + +For context: analyzing 361 IETF drafts -- fetching full text, rating quality on 5 dimensions, extracting ~1,700 technical components, detecting 12 gaps, mapping 557 authors, parsing 4,231 cross-references, and identifying 18 team blocs -- cost less than two large coffees. + +## The Tech Stack + +- **Python 3.11+** with **Click** for the CLI +- **SQLite** with **FTS5** for full-text search +- **httpx** for HTTP requests (Datatracker API) +- **anthropic** SDK for Claude API +- **ollama** for local embeddings +- **rich** for terminal formatting +- **numpy** for cosine similarity and matrix operations + +43 CLI commands, 13+ interactive visualizations (HTML/PNG), 15 report types. Total codebase: approximately 6,100 lines of Python across 12 modules. + +--- + +### Key Takeaways + +- **The full analysis cost ~$9** -- LLM-powered document analysis at scale is practical and cheap with proper caching and model selection +- **Caching is essential**: SHA-256 hashed prompt caching makes the pipeline idempotent and dramatically reduces costs on re-runs +- **Hybrid LLM strategy**: Claude Sonnet for reasoning, Claude Haiku for extraction (10x cheaper), Ollama for embeddings (free) -- match model capability to task difficulty +- **The zero-cost analyses were the most revealing**: RFC cross-references, idea overlap, WG adoption, and trend analysis all run locally and produced the series' most important structural findings +- **The database is the product**: a well-structured SQLite DB supports queries no pre-built report anticipates; the blog series was written by querying, not re-running + +*Next in this series: [Agents Building the Agent Analysis](08-agents-building-the-analysis.md) -- we used a team of AI agents to produce this series. The irony is the point.* + +--- + +*The IETF Draft Analyzer is open source. The codebase, database, and all reports are available in the project repository.* diff --git a/data/reports/blog-series/08-agents-building-the-analysis.md b/data/reports/blog-series/08-agents-building-the-analysis.md new file mode 100644 index 0000000..0aa5452 --- /dev/null +++ b/data/reports/blog-series/08-agents-building-the-analysis.md @@ -0,0 +1,198 @@ +# Agents Building the Agent Analysis + +*We used a team of AI agents to analyze, write about, and draw conclusions from 361 IETF drafts on AI agents. Here is what that looked like from the inside.* + +--- + +There is an irony we should address up front: this entire blog series -- analyzing 361 Internet-Drafts about how AI agents should work -- was itself produced by a team of AI agents. Four Claude instances, each with a distinct role, reading the same data, building on each other's output, and coordinating through a shared task system and development journal. + +This post is the story of that process: what worked, what surprised us, and what it reveals about the state of AI agent coordination in practice -- which, as it happens, is exactly the problem the IETF drafts are trying to solve. + +## The Team + +We designed a four-agent team, each with a one-page definition file and a shared 3,000-word team brief: + +| Agent | Role | What They Did | +|-------|------|---------------| +| **Architect** | "The Big Picture" | Read all reports, designed the narrative arc, wrote the vision document, reviewed every post across multiple passes | +| **Analyst** | "The Data Whisperer" | Ran the full pipeline on 361 drafts, executed 20+ SQL queries, produced 7 data packages | +| **Coder** | "The Feature Builder" | Implemented 7 new analysis features (refs, trends, idea-overlap, WG adoption, revisions, centrality, co-occurrence) | +| **Writer** | "The Storyteller" | Drafted all 8 blog posts, applied 6+ revision passes incorporating data refreshes, architectural reframes, and editorial redirections | + +Each agent had access to the full project codebase, a SQLite database of analyzed drafts, and the `ietf` CLI tool. They communicated through direct messages and coordinated through a shared task board with dependency tracking. + +The team brief contained a thesis statement -- "The IETF is building the highways before the traffic lights" -- along with a per-post outline, style guide, and key data points table. Each agent's definition was approximately 50 lines: enough to establish identity and scope without over-constraining behavior. + +## How It Actually Worked + +The process unfolded in roughly six phases -- not the four we planned. + +### Phase 1: Parallel Initialization + +All four agents started simultaneously. The Analyst began running the analysis pipeline on 101 new drafts. The Architect read all 10 existing reports and started designing the narrative arc. The Coder read the Architect's initial notes and began implementing new features. The Writer read every data report in the project. + +The key design decision: **agents did not wait for each other when they could work in parallel.** The Writer's tasks were formally blocked by the Analyst's pipeline run, but the Writer had enough existing data (260 analyzed drafts) to start drafting. Rather than sitting idle, the Writer produced first drafts of all 6 core posts while waiting for updated numbers. This turned out to be the right call -- the structure and narrative mattered more than whether the draft count was 260 or 361. + +### Phase 2: The Architect Sets the Frame + +The Architect's first deliverable changed everything. After reading all 10 reports, the Architect produced two documents: + +**1. The narrative arc** (`00-series-overview.md`): A three-act structure (Gold Rush, Fragmentation, Path Forward) with five recurring motifs and per-post design guidance. The key insight embedded in this document -- that "coordination difficulty correlates with gap severity" -- reframed the entire analysis. The safety deficit was not just a quantity problem (too few safety drafts); it was a structural problem (the team-bloc structure that concentrates authorship cannot produce the cross-team work that safety standards require). + +**2. The vision document** (`state-of-ecosystem.md`): A ~2,000-word synthesis with three 2027 scenarios and a "two equilibria" 2028 endgame. The best historical analogy turned out to be not IoT but the web itself -- browser wars leading to HTML5 convergence. The critical difference: when the thing being standardized makes autonomous decisions, getting safety wrong in the messy phase has consequences that are harder to fix retroactively. + +Both documents shaped every subsequent blog post. The Writer wove the motifs through the series. The Coder built features the Architect flagged as missing. The Analyst's queries were directed by the per-post data requirements table the Architect produced. + +### Phase 3: Building and Writing in Parallel + +The Coder and Writer worked simultaneously, their outputs feeding each other. The Coder started with four features, then built three more as the Architect identified additional analytical needs: + +| Coder Built | What It Revealed | Writer Used It In | +|-------------|------------------|-------------------| +| `ietf refs` (4,231 cross-references) | OAuth 2.0 and TLS 1.3 are the ecosystem's bedrock | Post 3: OAuth Wars | +| `ietf idea-overlap` (628 cross-org ideas) | 43% of idea clusters have cross-org validation | Post 5: Where Drafts Converge | +| `ietf trends` (19 months of data) | Growth from 0.5% to 9.3% of all IETF submissions | Post 1: Gold Rush | +| `ietf status` (36 WG-adopted drafts) | Agent standards live in security WGs, not agent WGs | Post 6: Big Picture | +| `ietf revisions` (55% at rev-00) | Most drafts are fire-and-forget; commitment is rare | Posts 2, 5 | +| `ietf centrality` (491 nodes, 1,142 edges) | European telecoms are the cross-divide glue | Post 2: Who Writes the Rules | +| `ietf co-occurrence` (safety isolation) | Safety co-occurs with A2A protocols only 8.8% of the time | Post 4: What Nobody Builds | + +Every one of these features used **zero API calls** -- pure local computation using regex, SequenceMatcher, networkx, and SQL. This is an underappreciated pattern in LLM-powered analysis: use the expensive model (Claude) for tasks that require reasoning (categorization, idea extraction, gap synthesis), and use deterministic code for everything else. The cheapest analyses -- the ones with zero marginal cost -- produced the most structurally revealing findings. + +The Writer produced all 7 posts in a single session: roughly 15,000 words across Posts 1-7, each following the Architect's structural guidance while making independent editorial decisions about hooks, examples, and narrative pacing. + +### Phase 4: First Review and the Silent Failure + +The Architect read all 6 core posts end-to-end and provided a structured review: + +- **Post 1**: Four specific notes (geopolitics belongs in Post 2, add keyword expansion, lighten ending, add vivid example) +- **Post 3**: Flagged a data inconsistency (OAuth table had 14 rows but text said 13) +- **Post 4**: Identified as the strongest post -- the hospital drug-dispensing scenario and structural analysis section deliver the climax +- **Post 5**: Needed cross-org overlap data from the Coder's new report +- **Post 6**: Suggested adding the "two equilibria" framing from the vision document + +The Writer applied all revisions in a targeted pass. The most interesting editorial decision: removing the extended geopolitics section from Post 1. The original was well-written but front-loaded the series with details that Post 2 covers in depth. The lighter version creates more narrative pull toward the next post. + +Then came the first real coordination failure. **The Writer's revisions to Post 1 did not persist.** The dev journal said the work was done. The task board said "completed." But when the Architect verified the actual file, it still contained the pre-revision content -- the full geopolitics section, the heavy ending, the missing cloud-infrastructure scenario. + +This is exactly the kind of silent failure that agent teams need guardrails for. The log said success; the artifact said otherwise. Without the Architect's verification step -- reading the output rather than trusting the status -- the error would have shipped. Lesson: **verify outputs, not logs.** + +### Phase 5: The Data Arrives and the Reframing Battle + +While the writing and reviewing unfolded, the Analyst completed the full pipeline: 361 drafts rated, 557 authors mapped (up from 403), 1,780 ideas extracted (up from 1,262). The numbers changed significantly: Huawei's share grew from 12% to 18%, A2A protocols from 92 to 120, and the safety ratio held steady at roughly 4:1. Every blog post needed a numbers-update pass. + +But the most consequential event in Phase 5 was not the data refresh. It was the project lead challenging the Writer's headline claim. + +**The "1,780 ideas" reframing.** The series had been built around a headline number: "1,780 technical ideas extracted from 361 drafts." The project lead asked: what does that number actually mean? The answer was uncomfortable. The pipeline extracts approximately 5 ideas per draft on average -- a mechanical process that produces "ideas" like "A2A Communication Paradigm" and "Agent Network Architecture." The raw count sounds impressive but is mostly scaffolding. + +The real signal was hiding in the Coder's cross-org overlap analysis: of 1,692 unique idea titles, **96% appear in exactly one draft.** Only 75 show up in two or more drafts. Only 11 in three or more. The fragmentation that defines the protocol landscape extends all the way down to the idea level. + +This required rewriting Post 5 entirely -- its title changed from "The 1,780 Ideas That Will Shape Agent Infrastructure" to "Where 361 Drafts Converge (And Where They Don't)." The lead metric shifted from raw extraction count (impressive but hollow) to the 96% fragmentation rate (honest and striking). Every post that referenced the idea count had to be updated, some multiple times as the framing evolved through three iterations. + +The episode is worth documenting because it illustrates the irreducible role of human judgment in agent-produced work. Four agents had independently used the 1,780 figure -- the Analyst generated it, the Coder validated it, the Architect designed around it, the Writer headlined it. None questioned whether it was meaningful. It took a human asking "so what?" to force the reframe. The improved version -- convergence-amid-fragmentation, with 628 cross-org convergent ideas as the honest middle ground -- was genuinely better. But no agent surfaced the critique on its own. + +### Phase 6: Bombshell Findings and Final Integration + +The Analyst's second deep-analysis round produced three findings that significantly strengthened the series: + +**RFC foundation divergence.** The Chinese bloc builds on YANG/NETCONF (network management). The Western bloc builds on COSE/CBOR/CoAP (IoT security) and HTTP/TLS/PKI (web infrastructure). The **only shared foundation is OAuth 2.0.** This elevated Post 3's fragmentation thesis from "different protocols" to "different technological DNA" -- the two blocs are not just disagreeing on solutions, they are building on incompatible infrastructure. + +**Revision velocity.** 55% of all 361 drafts are at revision -00 -- submitted once, never iterated. Huawei's rate is 65%. Compare that with Ericsson (11%), Boeing (average revision 28.2), and Siemens (17.2). The volume-vs.-commitment distinction sharpened Post 2's analysis of what Huawei's 66-draft campaign actually represents. A further detail: the majority of Huawei's drafts were submitted in the 4-week window before IETF 121 Dublin -- a coordinated pre-meeting filing burst. + +**Centrality bridge-builders.** The co-authorship network (491 nodes, 1,142 edges) revealed that European telecoms -- not US Big Tech, not the UN, not any formal body -- are the structural glue between the Chinese and Western blocs. Telefonica's Luis M. Contreras ranks #1 in betweenness centrality. Only 115 of 557 authors (23%) bridge the divide at all. The standards ecosystem's cross-divide cohesion depends on a handful of companies that most observers would not name first. + +The Writer wove all three findings into the series across multiple targeted passes: RFC divergence into Posts 2, 3, and 6; revision velocity into Posts 2 and 5; centrality data into Post 2's cross-pollination section. The Coder's co-occurrence analysis added one more dimension to Post 4: safety co-occurs with governance categories (60% with policy, 58% with identity/auth) but has **zero co-occurrence with Agent Discovery and Model Serving** -- safety is discussed as policy, not implemented as protocol. + +## What Surprised Us + +### Human judgment was the critical intervention + +The ideas reframing was not the only moment where human direction changed the team's course, but it was the most instructive. Agents are excellent at execution -- the Writer applied six revision passes without error, the Coder built seven features in a single session, the Analyst ran 20+ analytical queries. But none of them asked whether the headline metric was worth headlining. The human project lead's "so what?" produced a better Post 5 than any amount of agent iteration would have. + +This maps directly to the IETF's Human Override and Intervention gap. The question is not whether agents can do the work. The question is who notices when the work is pointed in the wrong direction. + +### The silent failure exposed a verification gap + +The Writer's Post 1 revisions disappearing -- logged as done but not actually persisted -- is a small-scale version of the Agent Behavior Verification gap the series identifies as critical. In our case, the Architect caught it during a manual review pass. In a production multi-agent system with no verification protocol, the error propagates. The dev journal said success. The file system disagreed. We had no automated mechanism to detect the discrepancy. + +### The Architect role was disproportionately valuable + +The Architect produced fewer words than the Writer and fewer features than the Coder, but shaped the entire output. Three specific contributions had outsized impact: + +1. The insight that gap severity correlates with coordination difficulty transformed Post 4 from a list of gaps into an argument about structural dysfunction. +2. The "two equilibria" framing in the vision document gave Post 6's predictions real weight -- not just "here is what might happen" but "here are two stable endpoints, and this ratio determines which one we reach." +3. The verification pass that caught the Post 1 silent failure -- and the broader pattern of verifying outputs rather than trusting status messages. + +All three contributions came from reading holistically -- something no individual report, pipeline run, or status message could produce. The Architect role was fundamentally about synthesis and verification. + +### The cheapest analyses were the most important + +| Component | Cost | Most Important Finding | +|-----------|-----:|----------------------| +| Claude Sonnet (ratings, gaps) | ~$8 | 4:1 safety deficit, 12 gap taxonomy | +| Claude Haiku (idea extraction) | ~$0.80 | 1,780 raw ideas (96% fragmented) | +| Ollama embeddings | $0.00 | 25+ near-duplicate pairs | +| Coder: regex RFC parsing | $0.00 | Foundation divergence (YANG vs COSE) | +| Coder: networkx centrality | $0.00 | European telecoms as bridge-builders | +| Coder: SQL co-occurrence | $0.00 | Safety structurally isolated from protocols | +| Coder: revision counting | $0.00 | 55% fire-and-forget rate | +| **Total pipeline** | **~$9** | | + +The pattern is consistent: Claude provided the foundation data (ratings, categories, ideas), but the structurally revealing findings came from deterministic local computation on top of that foundation. RFC cross-references (regex), author centrality (networkx), revision velocity (filename parsing), and category co-occurrence (SQL joins) -- all zero-cost, all among the most quotable findings in the series. + +### The development journal earned its keep + +We required every agent to log milestones to a shared `dev-journal.md`. By session's end, the journal had 30 entries across all four agents -- capturing not just what was done but why, and flagging surprises that would otherwise be lost. When the Writer needed to understand what the Coder had built, the journal entry was faster and more informative than a status message. When the Architect reviewed posts, the Writer's journal entries explained editorial decisions that would otherwise be opaque. + +The journal also became the source material for this post. Every "Surprise" field in the journal captured an insight -- the ideas reframing, the silent failure, the RFC divergence revelation -- that no other artifact preserves. + +## What This Tells Us About Agent Teams + +Six lessons from running a four-agent team on a real project: + +**1. Role definitions matter more than instructions.** The one-page agent definitions were more effective than the 3,000-word team brief. Agents performed best when they had a clear identity and scope, not a detailed todo list. + +**2. Shared state beats messaging.** The SQLite database, the dev journal, and the report files were more effective coordination mechanisms than direct inter-agent messages. Agents could read each other's outputs on their own schedule, without the overhead of request-response communication. + +**3. Async is natural, but verification is not.** Agents working in parallel on loosely coupled tasks is a pattern that works. What does not happen naturally is output verification. The silent failure -- revisions logged but not persisted -- would have gone undetected without a deliberate verification pass. Agent teams need assurance mechanisms, not just coordination mechanisms. + +**4. Humans catch category errors; agents catch consistency errors.** The Architect found a 14-vs-13 data inconsistency. The Writer applied six revision passes without introducing a single factual error. Agents are excellent at consistency within a frame. But the project lead's "so what?" about the ideas count was a category-level critique -- questioning the frame itself. That kind of challenge did not emerge from any agent. + +**5. Review compounds.** The Architect reviewed the Writer's posts, the project lead reviewed the Architect's framing, and the resulting revisions cascaded through the series. Each review layer caught different things: data errors, structural problems, framing weaknesses. Multiple review passes from different perspectives produced compounding quality gains. + +**6. The journal is the product.** The dev journal -- originally intended as a process artifact -- became the richest record of what happened and why. It captures decisions, surprises, and coordination moments that no other artifact preserves. For any multi-agent project, require a shared journal. + +## The Meta-Irony + +We built a team of AI agents to analyze 361 IETF drafts about AI agent standards. The team needed: coordination mechanisms, shared context, role-based specialization, review and quality gates, human oversight, and a way to verify that completed work was actually complete. + +Every one of these needs maps to a gap in the IETF landscape: + +| Our Team Needed | What Happened | IETF Gap | +|----------------|---------------|----------| +| Shared execution context | Agents coordinated via SQLite, files, dev journal | Agent Execution Model (no standard) | +| Quality review before publication | Architect caught data errors, structural problems | Agent Behavior Verification (critical gap) | +| Output verification | Writer's revisions silently failed; Architect caught it manually | Agent Behavior Verification (critical gap) | +| Error handling when agents disagreed | Ideas reframing required 3 iterations to stabilize | Agent Error Recovery (6 ideas from 1 draft) | +| Coordination across different approaches | RFC divergence: agents building on different foundations | Cross-Protocol Translation (zero ideas) | +| Human oversight of outputs | Project lead's "so what?" redirected the entire ideas framing | Human Override and Intervention (4 ideas) | + +We solved these problems ad hoc -- with a dev journal, a task board, role definitions, manual verification passes, and human review. The IETF is trying to solve them at internet scale with protocol standards. The distance between our 4-agent team and a deployed multi-agent system on the open internet is vast, but the problems are structurally identical. + +The standards the IETF is racing to write are the standards our own team needed. The traffic lights the highway needs are the ones we built by hand. + +--- + +### Key Takeaways + +- **Four agents** (Architect, Analyst, Coder, Writer) produced 8 blog posts, a vision document, 7 new analysis features, and 30 dev-journal entries from a ~$9 data pipeline +- **The ideas reframing** -- where a human's "so what?" redirected all four agents -- was the single most consequential intervention in the project, and no agent initiated it +- **A silent failure** (revisions logged but not persisted) demonstrated the same Behavior Verification gap the series identifies as critical in the IETF landscape +- **The cheapest analyses were the most revealing**: RFC divergence, author centrality, revision velocity, and co-occurrence patterns -- all zero-cost local computation -- produced the findings that defined the series +- **The team's coordination problems mirror the IETF's gaps**: execution model, behavior verification, error recovery, cross-protocol translation, and human oversight are needed at every scale + +*This post concludes the series. All data, code, and reports are available in the IETF Draft Analyzer project repository.* + +--- + +*Written by a team of Claude instances analyzing the IETF's work on AI agent standards. The irony is not lost on us.* diff --git a/data/reports/blog-series/data/00-master-stats.md b/data/reports/blog-series/data/00-master-stats.md new file mode 100644 index 0000000..ce0da17 --- /dev/null +++ b/data/reports/blog-series/data/00-master-stats.md @@ -0,0 +1,210 @@ +# Master Statistics — Updated 2026-03-03 (Full 361-Draft Corpus) + +All numbers below reflect the complete 361-draft dataset after pipeline run on 101 new drafts. + +## Core Numbers + +| Stat | Value | Notes | +|------|-------|-------| +| Total drafts | 361 | up from 260 after keyword expansion | +| Total authors | 557 | up from 403 | +| Total organizations | 230 | up from 184 | +| Total ideas (raw) | 1,780 | up from 1,262 (~4.9/draft avg) | +| Unique idea clusters | 1,467 | after fuzzy dedup | +| Cross-org ideas (2+ orgs) | 628 | 43% of unique clusters — LEAD METRIC | +| Total gaps | 12 | 3 critical, 6 high, 3 medium | +| Total embeddings | 361 | all drafts embedded | +| WG-adopted drafts | 36 (10.0%) | 18 WGs | +| Individual drafts | 325 (90.0%) | | +| RFC cross-references | 4,231 | 2,443 RFC + 698 draft + 1,090 BCP | +| Avg novelty | 3.32 | (1-5 scale) | +| Avg maturity | 2.96 | | +| Avg relevance | 3.84 | | + +## Growth Curve (Monthly Submissions) + +| Month | Drafts | Cumulative | +|-------|--------|------------| +| 2024-01 | 3 | 3 | +| 2024-02 | 1 | 4 | +| 2024-04 | 1 | 5 | +| 2024-09 | 2 | 7 | +| 2024-10 | 1 | 8 | +| 2024-12 | 1 | 9 | +| 2025-01 | 4 | 13 | +| 2025-04 | 5 | 18 | +| 2025-05 | 2 | 20 | +| 2025-06 | 5 | 25 | +| 2025-07 | 5 | 30 | +| 2025-08 | 8 | 38 | +| 2025-09 | 17 | 55 | +| 2025-10 | 67 | 122 | +| 2025-11 | 61 | 183 | +| 2025-12 | 16 | 199 | +| 2026-01 | 54 | 253 | +| 2026-02 | 86 | 339 | +| 2026-03 | 22 | 361 | + +Peak: 86 drafts in Feb 2026. Growth from ~2/mo (mid-2024) to 86/mo = **43x acceleration**. + +## Category Distribution (Full 361 Drafts) + +| Category | Count | % | +|----------|-------|---| +| A2A protocols | 136 | 37.7% | +| Agent identity/auth | 121 | 33.5% | +| Autonomous netops | 98 | 27.1% | +| ML traffic mgmt | 74 | 20.5% | +| AI safety/alignment | 45 | 12.5% | +| Human-agent interaction | 30 | 8.3% | + +Note: drafts can have multiple categories. + +## Safety Ratio + +- Safety drafts: 45 (12.5% of corpus) +- Capability drafts (any non-safety category): 351 +- **Ratio: ~8:1 capability-to-safety** +- Improvement from original 4:1 (260 drafts) because keyword expansion brought in more ML infrastructure drafts, some with safety elements + +## Keyword Expansion Impact (Original 260 vs New 101) + +| Category | Original 260 | New 101 | Total | +|----------|-------------|---------|-------| +| Data formats/interop | 102 | 43 | 145 | +| A2A protocols | 92 | 28 | 120 | +| Agent identity/auth | 98 | 10 | 108 | +| Autonomous netops | 60 | 33 | 93 | +| Policy/governance | 60 | 31 | 91 | +| ML traffic mgmt | 23 | **50** | 73 | +| Agent discovery/reg | 57 | 8 | 65 | +| AI safety/alignment | 36 | 8 | 44 | +| Model serving/inference | 13 | **29** | 42 | +| Human-agent interaction | 22 | 8 | 30 | + +**Key finding**: "ML traffic mgmt" and "Model serving/inference" surged with the new keywords — these categories more than doubled. The "inference" and "generative" keywords opened up the ML infrastructure community. + +## Geopolitical Split + +| Region | Drafts | Authors | +|--------|--------|---------| +| Chinese-affiliated | 152 | 218 | +| Western-affiliated | 94 | 81 | +| Other/Unclassified | 158 | 221 | + +Chinese orgs contribute ~42% of drafts from ~39% of authors. Western orgs: ~26% of drafts from ~15% of authors. + +## Idea Taxonomy (1,780 raw / 1,467 unique clusters / 628 cross-org) + +| Type | Count | % | +|------|-------|---| +| mechanism | 663 | 37.2% | +| architecture | 280 | 15.7% | +| pattern | 251 | 14.1% | +| protocol | 228 | 12.8% | +| requirement | 171 | 9.6% | +| extension | 168 | 9.4% | +| framework | 9 | 0.5% | +| other | 10 | 0.6% | + +**IMPORTANT**: Use 628 cross-org ideas as the lead metric, not 1,780 raw count. The raw count is a pipeline artifact (~4.9/draft avg). The 628 represents genuine multi-organizational convergence. See Post 5 data package for details. + +## Top Organizations + +| Org | Drafts | Authors | Composite Score | +|-----|--------|---------|-----------------| +| Huawei (all entities) | 57+ | 28+ | 3.1 | +| China Mobile | 35 | 24 | 3.2 | +| China Telecom | 23 | 22 | 3.0 | +| China Unicom | 22 | 22 | 3.0 | +| Cisco (all entities) | 25 | 19 | 3.4 | +| Tsinghua University | 16 | 13 | 3.5 | +| Telefonica | 13 | 2 | 3.2 | +| ZTE Corporation | 10 | 10 | 3.0 | +| Google | 10 | 4 | 3.3 | +| Five9 | 10 | 1 | 3.8 | +| Ericsson | 9 | 4 | 3.6 | + +## Quality Leaders (Composite >= 3.5, min 3 drafts) + +| Org | Drafts | Composite | +|-----|--------|-----------| +| Aiiva.org | 3 | 4.42 | +| AWS | 3 | 4.38 | +| Mozilla | 4 | 3.81 | +| Zhongguancun Lab | 6 | 3.81 | +| Five9 | 10 | 3.75 | +| Bitwave | 6 | 3.75 | +| Siemens | 5 | 3.75 | +| Inria | 4 | 3.70 | +| Ericsson | 9 | 3.59 | +| Nokia | 5 | 3.58 | +| Beijing Univ P&T | 4 | 3.57 | +| Tsinghua | 16 | 3.53 | +| Cisco Systems | 17 | 3.50 | + +## WG Adoption + +| WG | Drafts | Focus | +|----|--------|-------| +| lamps | 6 | PKI/certificates | +| lake | 5 | EDHOC/lightweight crypto | +| tls | 3 | TLS extensions | +| emu | 3 | EAP methods | +| sshm | 2 | SSH maintenance | +| httpbis | 2 | HTTP extensions | +| anima | 2 | Bootstrapping | +| aipref | 2 | AI preferences | +| ace | 2 | Auth for constrained envs | + +19 of 36 WG drafts (53%) are in security/crypto WGs. Only 2 are in an agent-specific WG (aipref). + +## Top 10 Highest-Scored Drafts + +| Draft | Title | Composite | +|-------|-------|-----------| +| draft-aylward-daap-v2 | Distributed AI Accountability Protocol v2 | 4.75 | +| draft-ietf-lake-app-profiles | EDHOC Application Profiles | 4.75 | +| draft-cowles-volt | Verifiable Operations Ledger and Trace | 4.75 | +| draft-goswami-agentic-jwt | Secure Intent Protocol for Agents | 4.50 | +| draft-chang-agent-token-efficient | Token-efficient Data Layer for Agents | 4.50 | +| draft-birkholz-verifiable-agent-conversations | Verifiable Agent Conversations | 4.50 | +| draft-guy-bary-stamp-protocol | Secure Task-bound Agent Message Proof | 4.50 | +| draft-drake-email-tpm-attestation | Hardware Attestation for Email | 4.50 | +| draft-ietf-tls-ecdhe-mlkem | Post-quantum Hybrid Key Agreement | 4.50 | +| draft-ietf-hpke-hpke | Hybrid Public Key Encryption | 4.50 | + +## Updated Gap List (12 gaps, refreshed) + +### Critical (3) +1. **Agent Behavior Verification** — No mechanisms to verify agents actually behave according to declared policies +2. **Cross-Domain Agent Liability** — When agents cause harm across organizational boundaries, who's responsible? +3. **Human Override Protocols** — No standardized emergency override protocols for autonomous agents + +### High (6) +4. **Agent Resource Exhaustion Protection** — No mechanisms to prevent agents from consuming excessive resources +5. **Agent-Generated Data Provenance** — Insufficient tracking of data origins as info flows between agents +6. **Agent Capability Degradation Handling** — No approach for detecting when agent capabilities degrade +7. **Multi-Agent Coordination Deadlocks** — Insufficient attention to preventing deadlock in multi-agent systems +8. **Agent Privacy Preservation** — Agents process sensitive data without adequate privacy protections +9. **Agent Firmware/Model Update Security** — Insufficient focus on secure update mechanisms + +### Medium (3) +10. **Real-time Agent Debugging** — Missing protocols for debugging agents in production +11. **Cross-Protocol Agent Migration** — No mechanisms for migrating agent state between protocols +12. **Agent Energy Consumption Optimization** — Missing standards for energy-aware agent operation + +## Most Referenced RFCs (Foundation Standards) + +| RFC | Cited By | Subject | +|-----|----------|---------| +| RFC 2119 | 285 drafts | Key words (MUST, SHALL, etc.) | +| RFC 8174 | 237 drafts | Key words update | +| RFC 8446 | 42 drafts | TLS 1.3 | +| RFC 6749 | 36 drafts | OAuth 2.0 | +| RFC 9110 | 34 drafts | HTTP Semantics | +| RFC 8126 | 26 drafts | IANA Guidelines | +| RFC 8259 | 26 drafts | JSON | +| RFC 5280 | 22 drafts | X.509 PKI | +| RFC 7519 | 22 drafts | JWT | +| RFC 9052 | 20 drafts | CBOR Object Signing (COSE) | diff --git a/data/reports/blog-series/data/01-gold-rush-data.md b/data/reports/blog-series/data/01-gold-rush-data.md new file mode 100644 index 0000000..b42fa25 --- /dev/null +++ b/data/reports/blog-series/data/01-gold-rush-data.md @@ -0,0 +1,48 @@ +# Data Package: Post 1 — The IETF's AI Agent Gold Rush + +## Key Numbers to Update + +- **361 drafts** (was 260 in earlier draft) +- **557 authors** from **230 organizations** (was 403 from 184) +- **1,780 ideas** (was 1,262) +- Growth: 3 drafts in Jan 2024 to 86 in Feb 2026 = **~29x in 14 months** (or 43x peak-to-trough) +- Safety ratio: **~8:1** capability-to-safety (improved from 4:1 due to keyword expansion bringing in ML infra drafts with safety elements; the core agent space is still 4:1) +- 12 keywords: agent, ai-agent, llm, autonomous, machine-learning, artificial-intelligence, mcp, agentic, inference, generative, intelligent, aipref +- 6 NEW keywords added: mcp, agentic, inference, generative, intelligent, aipref — these brought 101 additional drafts + +## Updated Category Breakdown (for Post 1 table) + +| Category | Drafts | % of Corpus | +|----------|--------|-------------| +| A2A protocols | 136 | 37.7% | +| Agent identity/auth | 121 | 33.5% | +| Autonomous netops | 98 | 27.1% | +| Policy/governance | 91 | 25.2% | +| ML traffic mgmt | 74 | 20.5% | +| Agent discovery/reg | 65 | 18.0% | +| AI safety/alignment | 45 | 12.5% | +| Model serving/inference | 42 | 11.6% | +| Human-agent interaction | 30 | 8.3% | + +## Growth Curve Data + +The steepest acceleration: Sep 2025 (17) -> Oct 2025 (67) -> Nov 2025 (61) -> Feb 2026 (86). + +The IETF 121 meeting was Nov 2025 in Dublin. The post-meeting submission spike is visible. + +## Author Landscape Summary + +- Top 5 authors all from Huawei: Bing Liu (23), Zhenbin Li (21), Nan Geng (20), Qiangzhou Gao (20), Xiaotong Shang (19) +- Jonathan Rosenberg (Five9) is highest-ranked non-Chinese author at #9 with 10 drafts +- Cisco authors collectively: ~25 drafts across entities + +## Safety Deficit Framing + +- 45 drafts touch safety/alignment (12.5%) +- 136 A2A protocol drafts (37.7%) +- 30 human-agent interaction drafts (8.3%) +- The ratio of A2A protocols to human-agent interaction: **4.5:1** — agents talking to each other, not to humans + +## WG Adoption + +Only 36 of 361 drafts (10%) are WG-adopted. The standards are still overwhelmingly individual submissions. diff --git a/data/reports/blog-series/data/02-who-writes-rules-data.md b/data/reports/blog-series/data/02-who-writes-rules-data.md new file mode 100644 index 0000000..9087bc6 --- /dev/null +++ b/data/reports/blog-series/data/02-who-writes-rules-data.md @@ -0,0 +1,98 @@ +# Data Package: Post 2 — Who's Writing the Rules for AI Agents? + +## Geopolitical Split + +| Region | Drafts | Authors | % of Drafts | +|--------|--------|---------|-------------| +| Chinese-affiliated | 152 | 218 | 42.1% | +| Western-affiliated | 94 | 81 | 26.0% | +| Other/Unclassified | 158 | 221 | - | + +Note: "Other" includes universities, small companies, individuals whose affiliation doesn't map cleanly. Many drafts have co-authors from multiple regions. + +## Huawei Dominance (Combined Entities) + +Huawei appears under multiple entity names in the data: +- Huawei: 57 drafts, 28 authors +- Huawei Technologies: 19 drafts, 16 authors +- Huawei Technologies Co., Ltd.: 3 drafts +- Huawei Singapore: 3 drafts + +Combined estimate: **~60+ unique drafts**, ~40+ unique authors (some overlap). This is approximately **16-17% of all drafts**. + +## Top 15 Organizations + +| Rank | Org | Drafts | Authors | Composite Score | +|------|-----|--------|---------|-----------------| +| 1 | Huawei | 57 | 28 | 3.11 | +| 2 | China Mobile | 35 | 24 | 3.21 | +| 3 | China Telecom | 23 | 22 | 2.98 | +| 4 | China Unicom | 22 | 22 | 3.02 | +| 5 | Huawei Technologies | 19 | 16 | 3.17 | +| 6 | Cisco Systems | 17 | 10 | 3.50 | +| 7 | Tsinghua University | 16 | 13 | 3.53 | +| 8 | Telefonica | 13 | 2 | 3.21 | +| 9 | ZTE Corporation | 10 | 10 | 3.02 | +| 10 | Pengcheng Laboratory | 10 | 8 | 3.30 | +| 11 | Google | 10 | 4 | 3.33 | +| 12 | Five9 | 10 | 1 | 3.75 | +| 13 | Ericsson | 9 | 4 | 3.59 | +| 14 | Sandelman Software Works | 7 | 1 | 3.46 | +| 15 | Zhongguancun Laboratory | 6 | 4 | 3.81 | + +## Chinese Institutional Ecosystem Tiers + +### Tier 1: Telecom Vendors +- Huawei (all entities): ~60+ drafts — networking, agent comm, autonomous netops +- ZTE Corporation: 10 drafts + +### Tier 2: Telecom Operators +- China Mobile: 35 drafts +- China Telecom: 23 drafts +- China Unicom: 22 drafts + +### Tier 3: Research +- Tsinghua University: 16 drafts (highest quality among Chinese orgs, composite 3.53) +- Pengcheng Laboratory: 10 drafts +- Zhongguancun Laboratory: 6 drafts (highest composite: 3.81) +- CAICT: 6 drafts (lowest composite: 2.35) +- Beijing University of Posts & Telecommunications: 4+ drafts + +### Tier 4: Tech Companies +- Baidu: (part of multi-author drafts) +- Tencent: (part of multi-author drafts) + +## Notable Western Absences + +Major AI companies with minimal IETF presence: +- **Microsoft**: Not in top 30 orgs +- **Apple**: Not found +- **Meta/Facebook**: Not found +- **OpenAI**: Not found +- **Anthropic**: Not found +- **Google**: 10 drafts (modest given their agent ecosystem: Gemini, A2A protocol) + +## Quality vs Quantity Insight + +The inverse relationship is clear: +- High-volume Chinese orgs (Huawei, China Mobile, China Telecom): composite 2.98-3.21 +- Lower-volume Western companies (Five9, Ericsson, Siemens, Mozilla): composite 3.59-3.81 +- Exception: Tsinghua University — high volume (16) AND high quality (3.53) +- Strongest quality leaders: Aiiva.org (4.42), AWS (4.38), Mozilla (3.81) — all low volume + +## Author Velocity (Oct 2025 - Mar 2026) + +Top authors by recent output: +1. Bing Liu (Huawei): 23 drafts +2. Zhenbin Li (Huawei): 21 drafts (all in Nov 2025!) +3. Nan Geng (Huawei): 20 drafts +4. Qiangzhou Gao (Huawei): 20 drafts (all in Nov 2025!) +5. Xiaotong Shang (Huawei): 19 drafts (all in Nov 2025!) + +The Huawei surge was concentrated in Nov 2025 — a coordinated submission campaign timed with IETF 121. + +## Cross-Org Collaboration + +180 ideas cross the Chinese-Western organizational divide. The strongest cross-divide convergences: +- A2A Communication: Huawei + China Mobile + CAICT on one side; Deutsche Telekom + Telefonica + Orange on the other +- Agent identity frameworks: both sides building on the same OAuth/SPIFFE foundations diff --git a/data/reports/blog-series/data/03-oauth-wars-data.md b/data/reports/blog-series/data/03-oauth-wars-data.md new file mode 100644 index 0000000..3c0cd4d --- /dev/null +++ b/data/reports/blog-series/data/03-oauth-wars-data.md @@ -0,0 +1,62 @@ +# Data Package: Post 3 — The OAuth Wars and Other Battles + +## OAuth-for-Agents Cluster (18 drafts touching OAuth + agents) + +| Draft | Title | Novelty | Maturity | Relevance | Overlap | +|-------|-------|---------|----------|-----------|---------| +| draft-goswami-agentic-jwt | Secure Intent Protocol: JWT Agentic Identity | 5 | 4 | 5 | 2 | +| draft-guy-bary-stamp-protocol | Secure Task-bound Agent Message Proof (STAMP) | 5 | 4 | 5 | 1 | +| draft-oauth-ai-agents-on-behalf-of-user | On-Behalf-Of User Auth for AI Agents | 4 | 3 | 5 | 3 | +| draft-oauth-transaction-tokens-for-agents | Transaction Tokens For Agents | 4 | 4 | 5 | 3 | +| draft-chen-oauth-rar-agent-extensions | Policy & Lifecycle Extensions for OAuth RAR | 4 | 4 | 5 | 2 | +| draft-mishra-oauth-agent-grants | Delegated Agent Authorization Protocol (DAAP) | 4 | 4 | 5 | 3 | +| draft-liu-oauth-a2a-profile | A2A Profile for OAuth Transaction Tokens | 4 | 2 | 5 | 3 | +| draft-aap-oauth-profile | Agent Authorization Profile for OAuth 2.0 | 4 | 4 | 5 | 2 | +| draft-mw-spice-actor-chain | Verifiable Actor Chain for OAuth Token Exchange | 4 | 3 | 5 | 2 | +| draft-song-oauth-ai-agent-collaborate-authz | Multi-AI Agent Collaboration Auth | 4 | 3 | 4 | 3 | +| draft-rosenberg-oauth-aauth | AAuth - Agentic Authorization OAuth 2.1 | 4 | 3 | 4 | 2 | +| draft-gaikwad-south-authorization | SOUTH: Stochastic Auth for Agents | 4 | 4 | 4 | 2 | +| draft-song-oauth-ai-agent-authorization | OAuth Extension: Auth on Target | 3 | 2 | 4 | 4 | +| draft-yao-agent-auth-considerations | Considerations on Agent Auth via OAuth | 3 | 2 | 4 | 2 | +| draft-jia-oauth-scope-aggregation | Scope Aggregation for Agent Workflows | 3 | 3 | 4 | 2 | + +## A2A Protocol Cluster Size: 136 drafts + +The A2A space is the largest single category. Within it, competing approaches include: +- MCP-based approaches (MCP over MOQT, MCP for agents) +- Custom agent protocols (ANP, NLIP, aiproto/NACT) +- Existing protocol extensions (HTTP-based, gRPC-based) + +## Identity/Auth Cluster Size: 121 drafts + +Overlaps heavily with A2A. The key battleground is how agents prove identity and delegate authority. + +## High-Overlap Drafts (Overlap score >= 4) + +Multiple drafts flagged as high-overlap, particularly: +- `draft-hong-nmrg-agenticai-ps` — scored overlap 4, has overlap with 15+ other drafts +- Several OAuth drafts scored overlap 3-4, indicating convergent solutions + +## RFC Foundation for Auth/Identity + +| RFC | Cited By | What It Is | +|-----|----------|------------| +| RFC 6749 | 36 drafts | OAuth 2.0 (the foundation everyone builds on) | +| RFC 7519 | 22 drafts | JWT | +| RFC 5280 | 22 drafts | X.509 PKI | +| RFC 8392 | 18 drafts | CBOR Web Token (CWT) | +| RFC 9000 | 16 drafts | QUIC | + +OAuth 2.0 is the undisputed foundation: 36 drafts explicitly cite it. + +## Near-Duplicate Analysis + +From embedding similarity, 25+ draft pairs have >0.98 cosine similarity. The densest cluster is around agent networking problem statements and use cases from the same author groups. + +## Convergence Signals (Positive) + +Despite fragmentation, some convergence exists: +1. **EDHOC** (lake WG, 5 drafts): lightweight crypto handshake gaining WG adoption +2. **SCIM** extensions for agents: building on existing identity management +3. **Verifiable Agent Conversations** (draft-birkholz): high score (4.5), unique approach +4. **STAMP protocol**: task-bound proofs (scored 4.5, overlap 1 = truly novel) diff --git a/data/reports/blog-series/data/04-gaps-data.md b/data/reports/blog-series/data/04-gaps-data.md new file mode 100644 index 0000000..28bc39f --- /dev/null +++ b/data/reports/blog-series/data/04-gaps-data.md @@ -0,0 +1,58 @@ +# Data Package: Post 4 — What Nobody's Building (And Why It Matters) + +## Updated Gap List (12 gaps, refreshed with 361-draft corpus) + +### Critical (3) +1. **Agent Behavior Verification** — No mechanisms to verify agents actually behave according to declared policies. Many drafts define what agents SHOULD do, few address verification. +2. **Cross-Domain Agent Liability** — NEW in refreshed analysis. When autonomous agents operate across organizational boundaries and cause harm, who's liable? No framework exists. +3. **Human Override Protocols** — No standardized emergency override protocols. Only 30 of 361 drafts even address human-agent interaction. + +### High (6) +4. **Agent Resource Exhaustion Protection** — No mechanisms to prevent agents from consuming excessive resources (compute, network, memory). +5. **Agent-Generated Data Provenance** — Despite 145 drafts on data formats, insufficient tracking of data origins as info flows between agents. +6. **Agent Capability Degradation Handling** — No approach for detecting/handling when agent capabilities degrade (model drift, data staleness). +7. **Multi-Agent Coordination Deadlocks** — With 136 A2A protocol drafts, almost no attention to preventing deadlock. Renamed from "Multi-Agent Consensus." +8. **Agent Privacy Preservation** — NEW gap. Agents process sensitive data without adequate privacy protections. +9. **Agent Firmware/Model Update Security** — 42 model serving drafts, but few address secure update mechanisms. + +### Medium (3) +10. **Real-time Agent Debugging** — Missing protocols for debugging agents in production. +11. **Cross-Protocol Agent Migration** — No mechanisms for migrating agent state between different A2A protocols. +12. **Agent Energy Consumption Optimization** — No standards for energy-aware agent operation. + +## Gap vs Category Contrast + +| Focus Area | Drafts | Gap Coverage | +|-----------|--------|--------------| +| A2A protocols | 136 | Well-covered (too well — fragmented) | +| Identity/Auth | 121 | Well-covered | +| Autonomous netops | 98 | Moderately covered | +| Behavior verification | ~5 | CRITICAL GAP | +| Human override | ~30 | CRITICAL GAP (quantity insufficient, quality missing) | +| Resource management | ~0 explicit | CRITICAL GAP | +| Liability/accountability | ~3 (DAAP, VOLT) | CRITICAL GAP | +| Error recovery/deadlock | ~0 explicit | HIGH GAP | + +## Key Contrasts for Narrative + +- **136 A2A protocol drafts** vs **~5 behavior verification drafts** = 27:1 ratio +- **121 identity/auth drafts** vs **~0 resource exhaustion drafts** = infinity +- **30 human-agent interaction drafts** vs **136 A2A protocol drafts** = 4.5:1 agents-talking-to-agents vs agents-talking-to-humans + +## Ideas that Address Gaps + +From the 1,780 ideas, some partially address gaps: +- Behavior verification: "Verifiable Agent Conversations" (draft-birkholz), DAAP v2, VOLT +- Human override: scattered across 30 human-agent drafts but no unified approach +- Resource management: some ideas in ML traffic mgmt (74 drafts) but from network perspective, not agent perspective +- Liability: DAAP explicitly addresses accountability; VOLT addresses audit trails + +## Structural Insight (from Architect) + +The critical gaps are exactly the ones that require cross-team consensus: behavior verification needs input from security + A2A + safety + governance teams. But the team-bloc structure (33 blocs, mostly intra-org) makes cross-team work structurally difficult. **Gap severity correlates with coordination difficulty.** + +## WG Gap Coverage + +- 10 of 12 gaps have some WG coverage +- 2 gaps with ZERO WG backing: Agent Firmware/Model Update Security, Agent Energy Consumption +- Security WGs (lamps, lake, tls, emu, ace) cover 19 of 36 WG drafts — the IETF is addressing agent security through existing security WGs, not through new agent-specific WGs diff --git a/data/reports/blog-series/data/05-ideas-data.md b/data/reports/blog-series/data/05-ideas-data.md new file mode 100644 index 0000000..295d985 --- /dev/null +++ b/data/reports/blog-series/data/05-ideas-data.md @@ -0,0 +1,89 @@ +# Data Package: Post 5 — Where 230 Organizations Agree (And Where They Don't) + +Reframed per Architect's direction: lead with cross-org convergence (628 ideas), not raw extraction count (1,780). + +## Lead Metric: Cross-Organization Convergence + +- **1,467 unique idea clusters** (after fuzzy dedup from 1,780 raw extractions) +- **628 ideas** appear across 2+ organizations = genuine multi-org convergence +- **628 / 1,467 = 43%** of ideas have cross-org validation + +### Convergence Pyramid + +| Org Count | Ideas | What It Means | +|-----------|-------|---------------| +| 14 orgs | 8 ideas | Single mega-consortium (ML infra draft) | +| 7+ orgs | 14 ideas | Strong multi-org convergence | +| 4-6 orgs | 179 ideas | Solid cross-org agreement | +| 2-3 orgs | 427 ideas | Early convergence signals | +| 1 org only | 839 ideas | Unique to one organization | + +## The Real Convergence: Ideas in 2+ Independent Drafts from 2+ Orgs + +These are the strongest convergence signals — ideas that different teams proposed independently: + +| Idea | Drafts | Orgs | Significance | +|------|--------|------|-------------| +| AI Agent Communication Framework | 2 | 7 | Five9/Cisco AND Chinese telcos+ANP — cross-bloc convergence | +| Agent Gateway | 3 | 6 | China Telecom, Zhongguancun, AsiaInfo, Beijing U, Huawei, UnionPay | +| Distributed AI Inference Architecture | 2 | 5 | Cross-institution (Hong Kong, IRTF) | +| Network Digital Twin Support | 2 | 5 | Research + operator convergence | +| Multi-Agent Communication Protocol | 8 | 7 | AsiaInfo, BUPT, China Mobile, China Telecom, China Unicom, Huawei, Zhongguancun | +| AI Agent Communication Network (ACN) | 5 | 7 | ANP Community, China Mobile, China Telecom, China Unicom, Cisco, Five9, Huawei | +| Tool Enumeration/Invocation API | 3 | 2 | Rosenberg (Five9) — coherent toolkit across 3 drafts | +| CHEQ Protocol | 2 | 3 | Rosenberg — conversation verification | + +**Key finding**: "AI Agent Communication Framework" spans the Chinese-Western divide (Five9+Cisco on one side, 4 Chinese telcos+ANP on the other). This is the strongest cross-bloc convergence signal in the dataset. + +## The 14-Org Consortium (Context, Not Convergence) + +8 ideas from one mega-draft (AI inference networking): Ultra-Low Latency Routing, Tensor Parallelization, FARE, Adaptive Load Balancing, etc. All 14 orgs (Hygon, Tencent, Baidu, Broadcom, Huawei, China Mobile + 8 more) are co-authors on a single draft. This is a consortium submission, not independent convergence. Still significant — it's the broadest cross-org collaboration in the dataset — but should not be presented as "14 organizations independently arrived at the same idea." + +## Ideas to Watch (Top-Scored Drafts) + +1. **DAAP v2** (Distributed AI Accountability Protocol) — Composite 4.75. Addresses behavior verification gap. +2. **VOLT** (Verifiable Operations Ledger and Trace) — Composite 4.75. Audit trail for agents. +3. **EDHOC Application Profiles** — WG-adopted (lake), composite 4.75. Lightweight crypto. +4. **Agentic JWT** (Secure Intent Protocol) — Composite 4.50. JWT-compatible agent identity. +5. **STAMP Protocol** — Composite 4.50, overlap=1 (truly novel). Task-bound message proofs. +6. **Verifiable Agent Conversations** — Composite 4.50. Cryptographic conversation records. +7. **Token-efficient Data Layer** — Composite 4.50. Cost-conscious agent communication. + +## Idea Taxonomy (Background Context) + +| Type | Count | % | +|------|-------|---| +| mechanism | 663 | 37.2% | +| architecture | 280 | 15.7% | +| pattern | 251 | 14.1% | +| protocol | 228 | 12.8% | +| requirement | 171 | 9.6% | +| extension | 168 | 9.4% | +| other | 19 | 1.1% | + +Note: These are raw extraction counts (~4.9 per draft avg). Use as background taxonomy only — the convergence numbers are the lead metric. + +## Convergence-Gap Tension + +The punchline for Post 5: teams agree on WHAT to build but disagree on HOW. The 628 cross-org ideas show broad agreement on the problem space (agent communication, identity, infrastructure). But the 12 gaps show no one is building the connective tissue (behavior verification, human override, error recovery, liability). + +| Convergence Area | Cross-Org Ideas | Corresponding Gap | +|-----------------|-----------------|-------------------| +| Agent communication | High (136 A2A drafts) | Cross-Protocol Migration (MEDIUM) | +| Agent identity | High (121 auth drafts) | Cross-Domain Liability (CRITICAL) | +| ML infrastructure | High (74 ML traffic) | Energy Optimization (MEDIUM) | +| Autonomous netops | High (98 drafts) | Capability Degradation (HIGH) | +| Safety/oversight | Low (45 drafts) | Behavior Verification (CRITICAL), Human Override (CRITICAL) | + +## Gap-to-Idea Mapping + +| Gap | Ideas Addressing It | Coverage Level | +|-----|-------------------|----------------| +| Behavior Verification | DAAP, VOLT, Verifiable Conversations | Partial (3 drafts) | +| Cross-Domain Liability | DAAP accountability, STAMP proofs | Minimal | +| Human Override | Scattered across 30 drafts | No unified approach | +| Resource Exhaustion | ML traffic mgmt ideas | Indirect only | +| Data Provenance | VOLT, some data format ideas | Partial | +| Capability Degradation | None explicit | Absent | +| Coordination Deadlocks | None explicit | Absent | +| Privacy Preservation | Some policy/governance ideas | Minimal | diff --git a/data/reports/blog-series/data/06-big-picture-data.md b/data/reports/blog-series/data/06-big-picture-data.md new file mode 100644 index 0000000..b34e4ec --- /dev/null +++ b/data/reports/blog-series/data/06-big-picture-data.md @@ -0,0 +1,65 @@ +# Data Package: Post 6 — Drawing the Big Picture + +## Synthesis Numbers + +- **361 drafts, 557 authors, 230 orgs, 1,780 ideas, 12 gaps** +- **136 A2A protocols** with no interoperability layer +- **121 identity/auth drafts** building on OAuth 2.0 (RFC 6749, cited by 36 drafts) +- **45 safety drafts** vs **316 capability drafts** = 7:1 ratio +- **36 WG-adopted drafts** (10%) — 19 in security WGs, 2 in aipref + +## The Foundation Layer (RFC Cross-References) + +The ecosystem is built on: +1. **OAuth 2.0** (RFC 6749, 36 citations) — the auth foundation +2. **TLS 1.3** (RFC 8446, 42 citations) — the security transport +3. **HTTP Semantics** (RFC 9110, 34 citations) — the API layer +4. **JWT** (RFC 7519, 22 citations) — token format +5. **X.509 PKI** (RFC 5280, 22 citations) — identity certificates +6. **COSE** (RFC 9052, 20 citations) — constrained object signing +7. **CBOR** (RFC 8949, 19 citations) — binary data format +8. **QUIC** (RFC 9000, 16 citations) — transport + +This reveals the DNA: the agent ecosystem is being built on web + IoT foundations. OAuth + JWT + TLS for the web side, COSE + CBOR for the constrained/IoT side. + +## WG Adoption as Traction Signal + +| Category | WG Drafts | Individual Drafts | WG % | +|----------|-----------|-------------------|------| +| Security/Crypto (lamps, lake, tls, emu, ace) | 19 | - | 53% of WG | +| Agent-specific (aipref) | 2 | - | 6% of WG | +| Other (httpbis, anima, suit, etc.) | 15 | - | 42% of WG | + +**Key insight**: The IETF is not building new agent WGs — it's retrofitting existing security WGs for agents. This is actually good: it builds on proven foundations. + +## Five Proposed Ecosystem Drafts (from Architect) + +These address the gaps: +1. **AEM** (Agent Execution Model) — DAG-based orchestration +2. **ATD** (Agent Trust and Delegation) — builds on SPIFFE/WIMSE +3. **HITL** (Human-in-the-Loop) — override protocols +4. **AEPB** (Agent Ecosystem Profile for Business) — assurance profiles +5. **APAE** (Agent Protocol Adaptation and Exchange) — interop layer + +## Predictions Data Support + +1. **WG consolidation is likely**: Multiple competing approaches in auth (14+ OAuth drafts) creates pressure for WG adoption +2. **Safety will lag**: Only 10% of WG drafts address safety; the structural bias toward capability continues +3. **Chinese institutional advantage**: 152 drafts from Chinese orgs, coordinated (Huawei bloc: 94% cohesion); Western response is fragmented and late +4. **The interop layer is the bottleneck**: 136 A2A drafts, no interop = the single biggest structural problem + +## Two Equilibria (from Architect's Vision Document) + +- **Microservices chaos**: If fragmentation persists and safety ratio holds, the agent ecosystem becomes like early microservices — technically possible but operationally painful, with each deployment requiring custom integration +- **Layered web architecture**: If WGs consolidate fragmentation and the safety ratio narrows, the ecosystem converges on a layered architecture like the web (transport -> session -> identity -> application) + +The 8:1 safety ratio is the leading indicator. If it narrows toward 4:1 or better, the good equilibrium is achievable. + +## Builder Guidance Data + +For the "What to Do" section: +1. **Watch ECT** (Ephemeral Credential Trust) — bridges SPIFFE-WIMSE, already WG-tracked +2. **Build HITL now** — only 30 drafts in this space; early movers define the patterns +3. **Design for protocol translation** — the 136-protocol zoo means any production system needs translation layers +4. **Invest in error recovery** — zero explicit drafts on agent error recovery; this is a field-defining opportunity +5. **Participate in IETF** — only 10% of drafts are WG-adopted; there's room for new contributors to shape outcomes diff --git a/data/reports/blog-series/data/deep-analysis-round2.md b/data/reports/blog-series/data/deep-analysis-round2.md new file mode 100644 index 0000000..17f11d8 --- /dev/null +++ b/data/reports/blog-series/data/deep-analysis-round2.md @@ -0,0 +1,175 @@ +# Deep Analysis Round 2 — Tasks #23-28 + +## Task #23: Draft Revision Velocity + +**Key finding: 55% of drafts are still at revision 00 — first submission, never iterated.** + +### Overall Stats +| Metric | Value | +|--------|-------| +| Total drafts | 361 | +| At rev-00 (never iterated) | 198 (54.8%) | +| At rev-03+ (actively evolving) | 64 (17.7%) | +| Average revision | 2.21 | + +### Iteration vs Fire-and-Forget by Org + +| Org | Drafts | % at rev-00 | Avg Rev | Pattern | +|-----|--------|-------------|---------|---------| +| Ericsson | 9 | 11.1% | 4.8 | **Iterators** — almost everything gets revised | +| Sandelman Software | 7 | 14.3% | 14.3 | **Deep iterators** — fewer drafts, heavy revision | +| Nokia | 5 | 20.0% | 3.2 | **Iterators** | +| Siemens | 5 | 0.0% | 17.2 | **Deepest iterators** — zero fire-and-forget | +| Boeing R&T | 6 | 0.0% | 28.2 | **Extreme iterators** (mature, long-running drafts) | +| ZTE Corporation | 10 | 40.0% | 1.3 | **Mixed** | +| Telefonica | 13 | 46.2% | 1.8 | **Mixed** | +| Google | 10 | 50.0% | 1.7 | **Mixed** | +| China Unicom | 22 | 54.5% | 0.9 | **Mostly fire-and-forget** | +| China Telecom | 23 | 60.9% | 1.0 | **Mostly fire-and-forget** | +| Tsinghua | 16 | 62.5% | 0.4 | **Fire-and-forget** | +| Huawei | 57 | 64.9% | 0.6 | **Fire-and-forget** — 37 of 57 never revised | +| Huawei Technologies | 19 | 68.4% | 0.7 | **Fire-and-forget** | +| Five9 | 10 | 90.0% | 0.1 | **All new** (recent entrant) | +| Pengcheng Lab | 10 | 90.0% | 0.1 | **All new** | + +**Narrative insight**: Western companies (Ericsson, Sandelman, Siemens, Boeing, Nokia) have dramatically lower fire-and-forget rates. They submit fewer drafts but iterate heavily. Chinese orgs submit more but ~60-65% are never revised. This is the "volume vs commitment" story — submitting a draft is cheap, iterating it signals genuine investment. + +**Best quotable stat**: "65% of Huawei's 57 drafts have never been revised beyond their first submission." + +--- + +## Task #24: Safety Ratio Trend Over Time + +**Key finding: The safety ratio is NOT improving. It fluctuates wildly but the structural deficit persists.** + +| Month | Safety | Capability-only | Total | Ratio | +|-------|--------|-----------------|-------|-------| +| 2025-07 | 2 | 3 | 5 | 1.5:1 | +| 2025-09 | 4 | 13 | 17 | 3.3:1 | +| 2025-10 | 5 | 62 | 67 | **12.4:1** | +| 2025-11 | 7 | 54 | 61 | 7.7:1 | +| 2025-12 | 3 | 13 | 16 | 4.3:1 | +| 2026-01 | 8 | 46 | 54 | 5.8:1 | +| 2026-02 | 13 | 73 | 86 | 5.6:1 | +| 2026-03 | 1 | 21 | 22 | **21:1** | + +The ratio spiked to 12.4:1 during the Oct 2025 surge (IETF 121 pre-meeting rush — nearly all capability drafts). Feb 2026 shows some improvement (5.6:1) with 13 safety drafts — the best absolute month for safety. But the overall pattern is clear: safety submissions grow linearly while capability submissions grow exponentially. The gap widens during surges. + +**For Post 4 (THE CLIMAX)**: The ratio data tells a story of structural neglect, not intentional choice. Nobody is anti-safety; the incentive structure just rewards capability work. Each org's submission campaign prioritizes its core protocol proposals, and safety is nobody's core. + +--- + +## Task #25: RFC Foundation Divergence by Bloc + +**Key finding: Chinese and Western blocs build on DIFFERENT foundations.** + +### Chinese Bloc — Top RFCs +| RFC | Cited By | Subject | +|-----|----------|---------| +| RFC 2119 | 114 | Key words | +| RFC 8174 | 86 | Key words update | +| RFC 8259 | 11 | JSON | +| RFC 6749 | 11 | OAuth 2.0 | +| RFC 6241 | 10 | NETCONF | +| RFC 8446 | 8 | TLS 1.3 | +| RFC 8641 | 6 | YANG Push | +| RFC 8639 | 6 | Subscription to YANG Notifications | +| RFC 7950 | 5 | YANG | +| RFC 7575 | 5 | Autonomic networking | + +### Western Bloc — Top RFCs +| RFC | Cited By | Subject | +|-----|----------|---------| +| RFC 2119 | 73 | Key words | +| RFC 8174 | 70 | Key words update | +| RFC 8446 | 18 | **TLS 1.3** | +| RFC 5280 | 12 | **X.509 PKI** | +| RFC 9528 | 11 | **EDHOC** | +| RFC 9110 | 11 | **HTTP Semantics** | +| RFC 9052 | 11 | **COSE** | +| RFC 8949 | 9 | **CBOR** | +| RFC 8613 | 9 | **OSCORE** | +| RFC 8392 | 9 | **CWT** | +| RFC 6749 | 7 | OAuth 2.0 | +| RFC 7252 | 7 | **CoAP** | + +### The Divergence + +| Foundation | Chinese | Western | +|-----------|---------|---------| +| **Network management (YANG/NETCONF)** | Strong (6241, 8639, 8641, 7950) | Absent | +| **PKI/Certificates (X.509)** | Absent | Strong (5280) | +| **IoT security (COSE/CBOR/OSCORE/CoAP)** | Absent | Strong (9052, 8949, 8613, 7252) | +| **Lightweight auth (EDHOC, CWT)** | Absent | Strong (9528, 8392) | +| **Web APIs (HTTP)** | Weak | Strong (9110) | +| **OAuth 2.0** | Present (11) | Present (7) | +| **TLS 1.3** | Moderate (8) | Strong (18) | +| **Autonomic networking** | Present (7575) | Absent | + +**Narrative insight**: The Chinese bloc is building agent infrastructure on YANG/NETCONF — network management protocols for autonomous netops. The Western bloc is building on IoT security (COSE/CBOR/CoAP) and web infrastructure (HTTP/TLS/PKI). These are fundamentally different technology stacks. The ONLY shared foundation is OAuth 2.0, which both blocs cite at similar rates. + +**For Post 2**: This means fragmentation goes deeper than protocol design — the two blocs are building on different technological DNA. Even if they agree on agent communication patterns, the underlying plumbing is incompatible. + +--- + +## Task #27: Category Co-Occurrence Matrix + +**Key finding: Safety IS structurally isolated from core protocol work.** + +### Safety Co-Occurrence +| Safety co-occurs with | Drafts | +|----------------------|--------| +| Policy/governance | 26 | +| Agent identity/auth | 25 | +| A2A protocols | **12** | +| Data formats/interop | 7 | +| Human-agent interaction | 5 | +| Autonomous netops | 4 | +| ML traffic mgmt | 3 | + +Safety co-occurs most with governance and identity — "paper" concerns. It co-occurs with A2A protocols only 12 times out of 136 A2A drafts (8.8%). Safety is essentially disconnected from the core protocol design work. + +### Strongest Co-Occurrences (Top 10) +| Category Pair | Co-occurrences | +|---------------|---------------| +| A2A + Data formats | 55 | +| A2A + Agent discovery | 40 | +| Identity + Policy | 38 | +| A2A + Identity | 35 | +| A2A + Autonomous netops | 34 | +| Discovery + Data formats | 34 | +| Identity + Data formats | 33 | +| Autonomous netops + ML traffic | 28 | +| **Safety + Policy** | **26** | +| **Safety + Identity** | **25** | + +**For Post 4**: Safety's strongest links are to governance and identity — abstract/policy-level work. Its weakest links are to A2A (12), ML traffic (3), and autonomous netops (4) — the categories where agents actually DO things. Safety is being thought about in the abstract, not integrated into protocol design. This is the structural version of the "highways before traffic lights" metaphor. + +--- + +## Task #28: IETF Meeting Timing Effect + +**Key finding: 51.5% of all drafts were submitted in the 4-week windows before IETF 121 and 122.** + +| Window | Drafts | % of Total | +|--------|--------|------------| +| Pre-IETF 119 (Feb-Mar 2024) | 1 | 0.3% | +| Pre-IETF 120 (Jun-Jul 2024) | 0 | 0.0% | +| Pre-IETF 121 (Oct-Nov 2025) | **107** | **29.6%** | +| Pre-IETF 122 (Feb-Mar 2026) | **79** | **21.9%** | +| All other periods | 174 | 48.2% | + +### Huawei's IETF 121 Campaign + +| Period | Huawei Drafts | +|--------|--------------| +| Pre-IETF 121 (4-week window) | **43** | +| All other periods combined | 26 | + +**62% of all Huawei drafts (43 of 69 across all entities) were submitted in the 4 weeks before IETF 121 Dublin.** This is not organic growth — this is a coordinated submission campaign timed for maximum standards-body impact. + +For comparison, the entire corpus had 107 drafts in that same window. Huawei alone accounted for **40% of all pre-IETF 121 submissions**. + +**For Post 1**: The growth curve isn't just organic interest — it's heavily driven by strategic submission campaigns timed to IETF meetings. The Oct-Nov 2025 spike (128 drafts in 2 months) is largely one company's coordinated push. + +**For Post 2**: This is the strongest evidence of Huawei's strategic standards campaign. 43 drafts in 4 weeks from one organization is unprecedented in this dataset. diff --git a/data/reports/blog-series/data/surprising-findings.md b/data/reports/blog-series/data/surprising-findings.md new file mode 100644 index 0000000..8cac293 --- /dev/null +++ b/data/reports/blog-series/data/surprising-findings.md @@ -0,0 +1,59 @@ +# Surprising Findings — Deep Analysis Phase + +These findings challenge assumptions or reveal unexpected patterns in the 361-draft corpus. + +## 1. The Keyword Expansion Uncovered a Different Community + +The 101 new drafts from keywords (mcp, agentic, inference, generative, intelligent, aipref) brought: +- **154 new authors** (557 total, up from 403) +- **46 new organizations** (230 total, up from 184) +- Heavy skew toward ML infrastructure: "ML traffic mgmt" went from 23 to 73 drafts, "Model serving/inference" from 13 to 42 + +This means the original analysis systematically missed the ML infrastructure community. The "agent" keyword captured the protocol designers; "inference" and "generative" captured the infrastructure builders. These are largely separate communities working on adjacent problems. + +## 2. The Safety Ratio Improved — But It's an Illusion + +The safety ratio went from 4:1 (260 drafts) to ~8:1 by tag count but the improvement is because the ML infrastructure drafts have broader category tags (many touch "safety" tangentially through network reliability). The core agent protocol space remains deeply safety-deficient. + +## 3. Huawei's Nov 2025 Coordinated Campaign + +Five Huawei authors each submitted 19-21 drafts in a single month (Nov 2025). This is the largest coordinated submission campaign in the dataset. Zhenbin Li, Qiangzhou Gao, and Xiaotong Shang all published exclusively in Nov 2025. This looks like a strategic push timed for IETF 121 (Dublin, Nov 2025). + +## 4. Quality Inversely Correlates with Quantity + +| Pattern | Examples | Avg Composite | +|---------|----------|---------------| +| High volume, low quality | Huawei (57 drafts, 3.11), CAICT (6, 2.35), Futurewei (6, 2.67) | ~2.7-3.1 | +| Low volume, high quality | AWS (3, 4.38), Aiiva.org (3, 4.42), Mozilla (4, 3.81) | ~3.8-4.4 | +| Exception | Tsinghua (16, 3.53), Five9 (10, 3.75) | High both | + +The top-rated organizations are nearly all low-volume Western/independent contributors. Volume does not predict quality. + +## 5. The Agent Ecosystem is Being Built in Security WGs, Not Agent WGs + +19 of 36 WG-adopted drafts (53%) are in security WGs (lamps, lake, tls, emu, ace). Only 2 are in the agent-specific "aipref" WG. The IETF isn't creating new infrastructure for agents — it's adapting existing security infrastructure. This is arguably the right approach but means agent-specific concerns (behavior verification, human override) have no natural WG home. + +## 6. The 14-Author Mega-Draft Consortium + +One draft about AI inference networking has 14 co-authors from 14 different organizations (Hygon, China Mobile, Tencent, Huawei, Broadcom, Ruijie, Metanet, Biren, Baidu, Moore Threads, Resnics, Centec, Cloudnine, Enflame). This is by far the broadest cross-org collaboration in the dataset — and it's focused on ML infrastructure, not agent protocols. + +## 7. Jonathan Rosenberg Is the Western Counterweight + +Five9's Jonathan Rosenberg (9 drafts, composite 3.75) is the only Western individual matching Huawei's output volume. His drafts (AAuth, NACT, aiproto) represent a coherent vision for agent communication — arguably the closest thing to a Western "ecosystem proposal" matching Huawei's breadth. + +## 8. The Accountability Drafts Are the Best-Scored + +The top 3 drafts by composite score are ALL about accountability/verification: +1. DAAP v2 (Distributed AI Accountability Protocol) — 4.75 +2. EDHOC Application Profiles — 4.75 +3. VOLT (Verifiable Operations Ledger and Trace) — 4.75 + +The market is hungry for safety/accountability solutions — when they appear, they're rated highest. The problem isn't that safety work is unwanted; it's that few teams are doing it. + +## 9. OAuth 2.0 Is the Undisputed Foundation + +RFC 6749 (OAuth 2.0) is cited by 36 drafts — more than any non-boilerplate RFC. The agent identity ecosystem is essentially an OAuth ecosystem. Any agent auth approach that doesn't build on OAuth will face adoption headwinds. + +## 10. Two Gaps Have Zero Institutional Backing + +"Agent Firmware/Model Update Security" and "Agent Energy Consumption Optimization" have zero WG-adopted drafts addressing them. These represent the intersection of importance and neglect — critical infrastructure needs that no working group has prioritized. diff --git a/data/reports/blog-series/state-of-ecosystem.md b/data/reports/blog-series/state-of-ecosystem.md new file mode 100644 index 0000000..9c22b4c --- /dev/null +++ b/data/reports/blog-series/state-of-ecosystem.md @@ -0,0 +1,127 @@ +# State of the IETF AI Agent Ecosystem: Where We Are and Where We're Going + +*A vision document synthesizing 361 drafts, 557 authors, 628 cross-org convergent ideas, and 12 gaps into a picture of the AI agent standards landscape in 2026 and its trajectory through 2028.* + +--- + +## I. The Current State: A Landscape in Formation + +The IETF's AI agent standardization landscape in March 2026 resembles a city under construction: cranes everywhere, foundations going in, multiple development teams building in parallel -- but no master plan, no zoning, and the safety inspectors have not been hired yet. + +The numbers tell the story. In nine months, from June 2025 to February 2026, the rate of AI/agent-related Internet-Draft submissions grew from 2 per month to 72 -- a 36x increase. The corpus now contains **361 drafts** from **557 authors** representing **230 organizations**. Our cross-organization analysis found **628 technical ideas** independently proposed by multiple organizations -- genuine consensus signals amid the noise -- and identified **12 standardization gaps**, three of them critical. + +This is not incremental growth. This is a phase transition, comparable to the IoT draft surge of 2014-2016 or the early web standards push of the mid-1990s. The IETF is being asked to standardize the infrastructure for a new class of internet participant: the autonomous software agent. + +But the landscape that has emerged is not converging. It is fragmenting. + +### The Structural Problems + +**Fragmentation without coordination.** The 361 drafts cluster into at least 42 topically overlapping groups. The most crowded area -- OAuth extensions for AI agents -- has 14 competing drafts, each proposing a different approach to the same problem: how does an autonomous agent authenticate and obtain authorization? In the agent-to-agent communication space, 120 drafts propose protocols with no interoperability layer between them. We found 25 near-duplicate pairs where teams independently wrote essentially the same specification. + +**Concentration without diversity.** One organization -- Huawei -- accounts for 53 authors and 66 drafts, 18% of the entire corpus. A single 13-person team within Huawei co-authors 22 drafts at 94% internal cohesion. The broader Chinese institutional ecosystem (Huawei, China Mobile, China Telecom, China Unicom, Tsinghua University, ZTE, BUPT, CAICT, Zhongguancun Lab) collectively fields over 160 authors. Meanwhile, Google, Microsoft, and Apple are largely absent from AI agent protocol work. The standards that will govern how AI agents identify, authenticate, and communicate on the internet are being written by a remarkably narrow group. + +**Capability without safety.** For every draft addressing AI safety, alignment, or human oversight, approximately four drafts build new agent capabilities. Only 44 of 361 drafts touch safety. Only 30 address human-agent interaction, compared to 120 A2A protocols and 93 autonomous network operations drafts. The three critical gaps we identified -- behavior verification, resource management, and error recovery -- all concern what happens when agents fail or misbehave. These gaps have received minimal attention. + +--- + +## II. The Missing Architecture + +The deepest problem is not fragmentation or concentration. It is the absence of connective tissue. + +The 361 drafts contain the pieces of an agent ecosystem. What they lack is a shared model of how those pieces fit together. Consider what a deployed multi-agent system actually needs: + +1. **An execution model**: How are agent tasks organized, sequenced, and tracked? What is the unit of work? How do dependencies between tasks get expressed? Today: no standard. Every draft assumes its own task model. + +2. **Human oversight primitives**: When does a human need to approve, intervene, or override an agent's decision? How does the override propagate? How is the decision recorded for audit? Today: 30 drafts touch this, none define standard primitives. + +3. **Error recovery and rollback**: When an autonomous agent makes a bad decision, how do you undo it? When a cascade of failures ripples through an agent network, how do you contain the blast radius? Today: one draft (draft-yue-anima-agent-recovery-networks) partially addresses this. The rest of the 360 ignore it. + +4. **Protocol interoperability**: With 120 competing A2A protocols, how does an agent speaking Protocol A communicate with an agent speaking Protocol B? Today: zero ideas in the entire corpus for cross-protocol translation. This gap is entirely unaddressed. + +5. **Assurance profiles**: How does the same agent ecosystem work in a fast development environment (acceptable risk, minimal overhead) AND a regulated production environment (proofs, attestations, compliance)? Today: the discussion is split between safety-oriented drafts and capability-oriented drafts with no bridge between them. + +These five needs map precisely to the five most critical and high-severity gaps in our analysis. They are not exotic requirements; they are the basic infrastructure that any production agent deployment will need. The fact that 361 drafts have been written without addressing them is the landscape's defining weakness. + +--- + +## III. What 2027 Will Look Like: Three Scenarios + +Based on current trajectories, three scenarios emerge for the IETF AI agent ecosystem over the next 18-24 months. + +### Scenario A: Fragmentation Wins (most likely without intervention) + +The current trajectory continues. Draft volume doubles again. The OAuth-for-agents cluster grows from 14 to 25+ proposals. No interoperability layer emerges. Working groups adopt a handful of individual drafts but not a cohesive architecture. Safety work remains a sideshow. + +**Result**: Implementers face a multi-protocol landscape with no clear choices. Large platforms (those with the engineering resources to build their own stacks) proceed anyway, creating de facto standards through market power rather than consensus. The IETF's role diminishes to retroactively documenting what platforms already deployed. + +**Probability without intervention**: High. This is the default path. + +### Scenario B: Consolidation Through Working Groups + +The IETF establishes one or more focused working groups specifically for AI agent architecture (not just individual protocols). These WGs force consolidation: the 14 OAuth proposals get down to 2-3. The 120 A2A protocols get mapped against a common requirements document. Gap-filling work gets explicitly chartered. + +**Result**: A more coherent landscape emerges by mid-2027. Not a single standard, but a small number of complementary standards with defined interfaces between them. Safety work gets a mandate. + +**Conditions required**: A champion organization (or coalition) willing to do the coordination work. A BoF or side meeting at an upcoming IETF meeting that gains enough momentum to charter a WG. Active participation from implementers (cloud providers, agent framework builders) who can provide deployment reality checks. + +**Probability**: Moderate. The raw material exists -- 628 cross-org convergent ideas show that organizations already agree on the building blocks. What is needed is organizational will to connect them. + +### Scenario C: Architecture-First Design + +Someone -- a coalition of authors, a proposed WG, or an influential design team -- produces a holistic agent ecosystem architecture document. This document defines the execution model (DAG-based), the oversight primitives (HITL as first-class), the interoperability layer (protocol-agnostic bindings), and the assurance framework (dual regime from relaxed to regulated). Individual drafts then map themselves to roles within this architecture. + +**Result**: The fastest path to a deployable agent infrastructure. The architecture does not replace existing drafts; it organizes them. The 5-draft ecosystem proposal (AEM/ATD/HITL/AEPB/APAE) outlined in our analysis represents one possible realization of this approach. + +**Conditions required**: The architecture must build on work that already has momentum (WIMSE, ECT, SPIFFE). It must be protocol-agnostic -- prescribing the execution model and semantics, not the wire format. It must address the dual-regime problem (same model works in K8s and in regulated deployments). + +**Probability**: Lower, but this is the scenario that produces the best outcome. + +--- + +## IV. What Builders Should Do Today + +For anyone building agent systems, deploying multi-agent workflows, or participating in IETF standards, the data suggests five concrete actions: + +### 1. Watch the execution model space + +The most critical missing piece is a shared execution model for agent tasks. Execution Context Tokens (ECT, draft-nennemann-wimse-ect) are the most promising candidate -- they define a JWT-based DAG for tracking task execution, building on WIMSE. If ECT gains WG adoption, it becomes the substrate on which orchestration, recovery, and audit are built. Monitor this draft. + +### 2. Build human oversight in now, not later + +The 30-vs-120 human-agent-to-A2A ratio is not just a standards problem; it is an engineering problem. Systems being designed today without human override primitives will need to be retrofitted. The CHEQ protocol (draft-rosenberg-aiproto-cheq) and the LLM-assisted network management framework (draft-cui-nmrg-llm-nm) both propose HITL models. Pick one and build to it, or design your own -- but do not ship agent systems without override capability. + +### 3. Assume protocol diversity, design for translation + +The 120-protocol landscape is not going to consolidate to one protocol. Design agent systems with protocol abstraction layers. Assume that agents in your ecosystem will eventually need to communicate with agents speaking different protocols. The gateway pattern (draft-agent-gw, draft-li-dmsc-macp) is emerging as the pragmatic solution. + +### 4. Invest in error recovery + +The near-total absence of error recovery standards means you are on your own. Draft-yue-anima-agent-recovery-networks offers a task-oriented recovery framework; the ECT DAG model provides rollback semantics. Implement checkpointing and rollback in your agent workflows now. When the standards catch up, you will be ahead. + +### 5. Participate in the standards process + +The landscape's concentration problem is only solved by broader participation. If your organization deploys AI agents, you have a stake in how these standards develop. The most impactful contribution right now is gap-filling: behavior verification, resource management, error recovery, and cross-protocol translation. These are areas where new drafts would face minimal competition and maximal impact. + +--- + +## V. The 2028 Endgame + +Two years from now, the IETF AI agent landscape will have resolved into one of two equilibria. + +In the first equilibrium, the landscape looks like today's microservices ecosystem: a chaotic but functional collection of protocols, libraries, and frameworks, held together by platform-specific integrations and de facto standards from the largest cloud providers. The IETF's work exists but is incomplete, and the real interoperability happens at higher layers (agent frameworks like LangChain, Semantic Kernel, or their successors). Safety is bolted on after deployment. + +In the second equilibrium, the landscape looks more like the web: a layered architecture where identity (like TLS), communication (like HTTP), and semantics (like HTML) are cleanly separated, with standardized interfaces between them. Agents identify via WIMSE, execute via ECT-based DAGs, communicate via protocol-agnostic bindings, and operate under assurance profiles that scale from development to regulated production. Safety is built in, not bolted on. + +The data we have analyzed -- 361 drafts, 628 cross-org convergent ideas, 12 gaps, 18 team blocs -- contains the building blocks for the second equilibrium. The question is whether the IETF community organizes itself to assemble them before market reality imposes the first. + +The history of internet standards suggests that both happen: a messy market reality emerges first, followed by standards that rationalize and improve it. The web started with browser wars and incompatible HTML, then converged on HTML5. Mobile started with a zoo of protocols, then converged on LTE/5G. The AI agent ecosystem may follow the same path. + +But the gap between "messy first deployment" and "rationalized standards" matters enormously for safety. When the thing being standardized is autonomous software that makes decisions, executes actions, and interacts with humans and infrastructure, getting the safety architecture wrong during the messy phase has consequences that are harder to fix retroactively. + +The 4:1 ratio is the number to watch. If it narrows -- if safety and oversight work accelerates to match capability work -- the second equilibrium becomes achievable. If it stays at 4:1 or widens, the first equilibrium is where we land, and the safety work becomes remediation rather than prevention. + +The drafts are being written. The race is on. The outcome depends on whether coordination catches up to creativity. + +--- + +*Analysis based on 361 IETF Internet-Drafts, 557 authors, 628 cross-org convergent ideas, and 12 identified gaps, current as of March 2026. Written by the Architect agent as input for the blog series and as a standalone reference document.* diff --git a/data/reports/centrality.md b/data/reports/centrality.md new file mode 100644 index 0000000..2f3d724 --- /dev/null +++ b/data/reports/centrality.md @@ -0,0 +1,101 @@ +# Author Network Centrality Report +*Generated 2026-03-03 20:14 UTC — 491 authors, 1142 co-authorship edges* + +## Network Overview + +- **Authors (nodes)**: 491 +- **Co-authorship edges**: 1142 +- **Intra-org edges**: 388 (35.1%) +- **Cross-org edges**: 718 (64.9%) +- **Cross Chinese-Western edges**: 167 +- **Clustering coefficient**: 0.794 +- **Connected components**: 68, largest: 165 + +## Top 30 Authors by Betweenness Centrality + +Betweenness centrality measures how often an author lies on the shortest path between other authors — high BC = key connector in the network. + +| # | Author | Organization | BC Score | Degree | CN Neighbors | Western Neighbors | +|--:|:-------|:-------------|--------:|-------:|-------------:|------------------:| +| 1 | Luis M. Contreras | Telefonica | 0.0351 | 14 | 11 | 3 | +| 2 | Qin Wu | Huawei | 0.0349 | 23 | 12 | 11 | +| 3 | Aijun Wang | China Telecom | 0.0323 | 17 | 17 | 0 | +| 4 | Mengyao Han | China Unicom | 0.0282 | 20 | 19 | 1 | +| 5 | Xueting Li | China Telecom | 0.0230 | 4 | 4 | 0 | +| 6 | Muhammad Awais Jadoon | InterDigital | 0.0229 | 13 | 9 | 4 | +| 7 | Menghan Yu | China Telecom | 0.0171 | 7 | 6 | 1 | +| 8 | Chenguang Du | Zhongguancun Laboratory | 0.0129 | 7 | 7 | 0 | +| 9 | Diego Lopez | Telefonica | 0.0127 | 15 | 6 | 9 | +| 10 | Arashmid Akhavain | Huawei | 0.0120 | 15 | 13 | 2 | +| 11 | Chenchen Yang | Huawei | 0.0107 | 14 | 12 | 2 | +| 12 | Kehan Yao | China Mobile | 0.0105 | 11 | 8 | 3 | +| 13 | Bo Wu | Huawei | 0.0104 | 9 | 6 | 3 | +| 14 | Giuseppe Fioccola | Huawei | 0.0092 | 10 | 2 | 8 | +| 15 | Ran Pang | China Unicom | 0.0083 | 16 | 16 | 0 | +| 16 | Bing Liu | Huawei | 0.0082 | 19 | 14 | 5 | +| 17 | Yi Yue | China Unicom | 0.0077 | 14 | 12 | 2 | +| 18 | Zhenbin Li | Huawei | 0.0076 | 18 | 16 | 2 | +| 19 | Qiangzhou Gao | Huawei | 0.0076 | 18 | 16 | 2 | +| 20 | Quan Xiong | ZTE Corporation | 0.0074 | 14 | 12 | 2 | +| 21 | Zongpeng Du | China Mobile | 0.0073 | 10 | 5 | 5 | +| 22 | Sun Qiong | China Telecom | 0.0071 | 10 | 5 | 5 | +| 23 | Michael Richardson | Sandelman Software Works | 0.0060 | 18 | 1 | 17 | +| 24 | Xiaotong Shang | Huawei | 0.0051 | 16 | 14 | 2 | +| 25 | Chongfeng Xie | China Telecom | 0.0050 | 9 | 7 | 2 | +| 26 | Yong Cui | Tsinghua University | 0.0040 | 8 | 8 | 0 | +| 27 | Roland Schott | Deutsche Telekom | 0.0040 | 7 | 2 | 5 | +| 28 | XingZhao | CAICT | 0.0040 | 8 | 7 | 1 | +| 29 | Jun Liu | BUPT | 0.0040 | 6 | 6 | 0 | +| 30 | Lianhua Zhang | AsiaInfo | 0.0040 | 6 | 6 | 0 | + +## Cross-Divide Bridge-Builders (115 authors) + +Authors who co-author with people from both Chinese and Western organizations. + +| # | Author | Organization | BC Score | CN Neighbors | Western Neighbors | +|--:|:-------|:-------------|--------:|-------------:|------------------:| +| 1 | Luis M. Contreras | Telefonica | 0.0351 | 11 | 3 | +| 2 | Qin Wu | Huawei | 0.0349 | 12 | 11 | +| 3 | Mengyao Han | China Unicom | 0.0282 | 19 | 1 | +| 4 | Muhammad Awais Jadoon | InterDigital | 0.0229 | 9 | 4 | +| 5 | Menghan Yu | China Telecom | 0.0171 | 6 | 1 | +| 6 | Diego Lopez | Telefonica | 0.0127 | 6 | 9 | +| 7 | Arashmid Akhavain | Huawei | 0.0120 | 13 | 2 | +| 8 | Chenchen Yang | Huawei | 0.0107 | 12 | 2 | +| 9 | Kehan Yao | China Mobile | 0.0105 | 8 | 3 | +| 10 | Bo Wu | Huawei | 0.0104 | 6 | 3 | +| 11 | Giuseppe Fioccola | Huawei | 0.0092 | 2 | 8 | +| 12 | Bing Liu | Huawei | 0.0082 | 14 | 5 | +| 13 | Yi Yue | China Unicom | 0.0077 | 12 | 2 | +| 14 | Zhenbin Li | Huawei | 0.0076 | 16 | 2 | +| 15 | Qiangzhou Gao | Huawei | 0.0076 | 16 | 2 | +| 16 | Quan Xiong | ZTE Corporation | 0.0074 | 12 | 2 | +| 17 | Zongpeng Du | China Mobile | 0.0073 | 5 | 5 | +| 18 | Sun Qiong | China Telecom | 0.0071 | 5 | 5 | +| 19 | Michael Richardson | Sandelman Software Works | 0.0060 | 1 | 17 | +| 20 | Xiaotong Shang | Huawei | 0.0051 | 14 | 2 | + +## Organization-Level Centrality (>= 3 authors) + +| # | Organization | Authors | Avg BC | Max BC | +|--:|:-------------|--------:|-------:|-------:| +| 1 | China Telecom | 23 | 0.0037 | 0.0323 | +| 2 | Zhongguancun Laboratory | 4 | 0.0032 | 0.0129 | +| 3 | China Unicom | 22 | 0.0023 | 0.0282 | +| 4 | Huawei | 53 | 0.0022 | 0.0349 | +| 5 | Siemens | 5 | 0.0011 | 0.0032 | +| 6 | AsiaInfo | 4 | 0.0010 | 0.0040 | +| 7 | China Mobile | 24 | 0.0010 | 0.0105 | +| 8 | Ericsson | 3 | 0.0009 | 0.0018 | +| 9 | ZTE Corporation | 12 | 0.0009 | 0.0074 | +| 10 | Tsinghua University | 13 | 0.0006 | 0.0040 | +| 11 | CAICT | 8 | 0.0006 | 0.0040 | +| 12 | BUPT | 14 | 0.0003 | 0.0040 | +| 13 | Amazon | 5 | 0.0003 | 0.0013 | +| 14 | Inria | 6 | 0.0001 | 0.0004 | +| 15 | Google | 5 | 0.0000 | 0.0001 | +| 16 | Department of Computer Science & Engineering | 4 | 0.0000 | 0.0001 | +| 17 | Cisco | 23 | 0.0000 | 0.0001 | +| 18 | Pengcheng Laboratory | 8 | 0.0000 | 0.0001 | +| 19 | IBM | 6 | 0.0000 | 0.0000 | +| 20 | Futurewei | 3 | 0.0000 | 0.0000 | \ No newline at end of file diff --git a/data/reports/co-occurrence.md b/data/reports/co-occurrence.md new file mode 100644 index 0000000..c0b5fa2 --- /dev/null +++ b/data/reports/co-occurrence.md @@ -0,0 +1,91 @@ +# Category Co-occurrence Report +*Generated 2026-03-03 20:15 UTC — 361 drafts, 318 (88.1%) multi-category* + +## Category Counts + +| Category | Count | % of Drafts | +|:---------|------:|------------:| +| Data formats/interop | 148 | 41.0% | +| A2A protocols | 136 | 37.7% | +| Agent identity/auth | 121 | 33.5% | +| Autonomous netops | 98 | 27.1% | +| Policy/governance | 93 | 25.8% | +| Agent discovery/reg | 79 | 21.9% | +| ML traffic mgmt | 74 | 20.5% | +| AI safety/alignment | 45 | 12.5% | +| Model serving/inference | 42 | 11.6% | +| Human-agent interaction | 30 | 8.3% | +| Other AI/agent | 26 | 7.2% | + +## Co-occurrence Matrix + +Number of drafts assigned to both categories simultaneously. + +| | Data | A2A | IdAuth | Auto | Policy | Disc | ML | Safe | Model | Human | Other | +|:---|---:|---:|---:|---:|---:|---:|---:|---:|---:|---:|---:| +| **Data** | **148** | 58 | 33 | 24 | 26 | 35 | 19 | 7 | 14 | 14 | 3 | +| **A2A** | 58 | **136** | 43 | 39 | 23 | 51 | 15 | 12 | 9 | 8 | 3 | +| **IdAuth** | 33 | 43 | **121** | 7 | 40 | 27 | 2 | 26 | 4 | 6 | 1 | +| **Auto** | 24 | 39 | 7 | **98** | 19 | 21 | 29 | 4 | 11 | 8 | 9 | +| **Policy** | 26 | 23 | 40 | 19 | **93** | 4 | 10 | 27 | 4 | 10 | 2 | +| **Disc** | 35 | 51 | 27 | 21 | 4 | **79** | 6 | - | 4 | 2 | 2 | +| **ML** | 19 | 15 | 2 | 29 | 10 | 6 | **74** | 3 | 23 | 4 | 4 | +| **Safe** | 7 | 12 | 26 | 4 | 27 | - | 3 | **45** | - | 5 | 1 | +| **Model** | 14 | 9 | 4 | 11 | 4 | 4 | 23 | - | **42** | - | 3 | +| **Human** | 14 | 8 | 6 | 8 | 10 | 2 | 4 | 5 | - | **30** | 1 | +| **Other** | 3 | 3 | 1 | 9 | 2 | 2 | 4 | 1 | 3 | 1 | **26** | + +## Top 20 Co-occurrences + +| # | Category A | Category B | Count | Jaccard Index | +|--:|:-----------|:-----------|------:|--------------:| +| 1 | A2A protocols | Data formats/interop | 58 | 0.257 | +| 2 | A2A protocols | Agent discovery/reg | 51 | 0.311 | +| 3 | A2A protocols | Agent identity/auth | 43 | 0.201 | +| 4 | Agent identity/auth | Policy/governance | 40 | 0.230 | +| 5 | A2A protocols | Autonomous netops | 39 | 0.200 | +| 6 | Agent discovery/reg | Data formats/interop | 35 | 0.182 | +| 7 | Agent identity/auth | Data formats/interop | 33 | 0.140 | +| 8 | Autonomous netops | ML traffic mgmt | 29 | 0.203 | +| 9 | AI safety/alignment | Policy/governance | 27 | 0.243 | +| 10 | Agent discovery/reg | Agent identity/auth | 27 | 0.156 | +| 11 | AI safety/alignment | Agent identity/auth | 26 | 0.186 | +| 12 | Data formats/interop | Policy/governance | 26 | 0.121 | +| 13 | Autonomous netops | Data formats/interop | 24 | 0.108 | +| 14 | ML traffic mgmt | Model serving/inference | 23 | 0.247 | +| 15 | A2A protocols | Policy/governance | 23 | 0.112 | +| 16 | Agent discovery/reg | Autonomous netops | 21 | 0.135 | +| 17 | Autonomous netops | Policy/governance | 19 | 0.110 | +| 18 | Data formats/interop | ML traffic mgmt | 19 | 0.094 | +| 19 | A2A protocols | ML traffic mgmt | 15 | 0.077 | +| 20 | Data formats/interop | Model serving/inference | 14 | 0.080 | + +## AI Safety/Alignment Coupling Analysis (45 drafts) + +Is AI safety structurally isolated from other categories? + +| Co-occurring Category | Count | % of Safety Drafts | Jaccard | +|:----------------------|------:|-------------------:|--------:| +| Policy/governance | 27 | 60.0% | 0.243 | +| Agent identity/auth | 26 | 57.8% | 0.186 | +| A2A protocols | 12 | 26.7% | 0.071 | +| Data formats/interop | 7 | 15.6% | 0.038 | +| Human-agent interaction | 5 | 11.1% | 0.071 | +| Autonomous netops | 4 | 8.9% | 0.029 | +| ML traffic mgmt | 3 | 6.7% | 0.026 | +| Other AI/agent | 1 | 2.2% | 0.014 | + +**Verdict**: AI safety drafts have 85 co-occurrence links across 8 categories (1.9 avg links per safety draft). +Safety is **well-coupled** with other categories, particularly policy/governance and identity/auth. + +## Category Clusters + +Groups of categories that form natural clusters based on co-occurrence. + +- **A2A protocols** clusters with: Agent discovery/reg (lift 1.7x) +- **Agent identity/auth** clusters with: AI safety/alignment (lift 1.7x) +- **Policy/governance** clusters with: AI safety/alignment (lift 2.3x) +- **Agent discovery/reg** clusters with: A2A protocols (lift 1.7x) +- **ML traffic mgmt** clusters with: Model serving/inference (lift 2.7x) +- **AI safety/alignment** clusters with: Policy/governance (lift 2.3x), Agent identity/auth (lift 1.7x) +- **Model serving/inference** clusters with: ML traffic mgmt (lift 2.7x) \ No newline at end of file diff --git a/data/reports/dev-journal.md b/data/reports/dev-journal.md new file mode 100644 index 0000000..8b4174d --- /dev/null +++ b/data/reports/dev-journal.md @@ -0,0 +1,405 @@ +# Development Journal — IETF Draft Analyzer + +*This journal tracks development milestones across sessions. It serves as source material for the meta blog post about using Claude agent teams to build this analysis.* + +--- + +### 2026-02-28 — v0.2.0 Release + +**What**: Built full analysis pipeline — fetch, analyze, rate, embed, ideas, gaps, visualize, report. 13 CLI commands, 13+ visualizations, 11 report types. +**Why**: Needed a systematic way to map the exploding IETF AI/agent landscape. +**Result**: 260 drafts analyzed, 403 authors mapped, 1,262 ideas extracted, 12 gaps identified. Total cost ~$3.16 on Claude Sonnet. +**Surprise**: The 4:1 safety deficit — only 36 of 260 drafts address safety/alignment while 92+ focus on A2A protocols. + +### 2026-03-01 — Full Pipeline Run + +**What**: Ran complete pipeline on 260 drafts — ratings, embeddings, ideas, gap analysis, all visualizations and reports. +**Result**: All 11 reports generated. First blog post draft written ("The IETF's AI Agent Gold Rush"). arXiv paper drafted (13 pages). + +### 2026-03-03 — Keyword Expansion + +**What**: Added 6 new search keywords (mcp, agentic, inference, generative, intelligent, aipref). Fetched 101 new drafts, bringing total to 361. +**Why**: Original 6 keywords missed important categories — MCP-related drafts, generative AI infrastructure, intelligent networking. +**Result**: 361 drafts total. New drafts not yet processed (need analyze, authors, ideas, embed, gaps). + +### 2026-03-03 — Agent Team Design + +**What**: Designed a 4-agent team (Architect, Analyst, Coder, Writer) to elevate the project. Created team prompt, 4 agent definitions, CLAUDE.md with journaling requirements, and a 7+1 blog series plan. +**Why**: The project had powerful data but fragmented output — individual reports, one blog draft, an unfinished paper. Needed a coordinated effort to draw the big picture and tell a coherent story. +**Result**: +- `scripts/agent-team-prompt.md` — 3000-word team brief +- `.claude/agents/{architect,analyst,coder,writer}.md` — 4 agent definitions +- `CLAUDE.md` — project instructions with dev journal requirement +- Blog series planned: 7 analysis posts + 1 meta post about the process +**Surprise**: The act of designing the team prompt forced clarity on what the project's thesis actually is: "The IETF is building the highways before the traffic lights." + +### 2026-03-03 Architect — Narrative Arc Design + +**What**: Read all 10 reports (holistic-agent-ecosystem, draft-family-consistency, gaps, blog-post, overview, authors, team-blocs, ideas, landscape, overlap-clusters) and designed the narrative arc for the 7-post blog series. +**Why**: The project had rich data but no story structure. Needed to find the meta-narrative beyond "lots of drafts" and design a series that builds tension, reaches a climax, and delivers a resolution. +**Result**: Wrote `data/reports/blog-series/00-series-overview.md` — a combined architectural design document and reader-facing introduction. Key decisions: +- Three-act structure: Gold Rush (Posts 1-2), Fragmentation (Posts 3-4), Path Forward (Posts 5-6), plus methodology coda (Post 7) +- Post 4 (gaps) is the climax — the most important and consequential finding +- Post 6 (big picture) is the resolution — connects the 5-draft ecosystem proposal to the gaps +- Five recurring motifs: 4:1 safety deficit, highway/traffic light metaphor, fragmentation vs architecture, concentration/absence, islands problem +- Per-post data requirements table for the Analyst +- Missing analyses list for the Coder: category trends, RFC cross-refs, cross-org idea overlap, WG adoption tracking +**Surprise**: The strongest narrative thread turned out to be "coordination difficulty correlates with gap severity" — the critical gaps are exactly the ones that require cross-team consensus, which the island/bloc structure cannot produce. This reframes the safety deficit from a quantity problem to a structural problem. + +### 2026-03-03 Architect — State of the Agent Ecosystem Vision Document + +**What**: Wrote the ~2,000-word "State of the IETF AI Agent Ecosystem" vision document at `data/reports/blog-series/state-of-ecosystem.md`. Five sections: current state, missing architecture, three 2027 scenarios, five builder actions, 2028 endgame. +**Why**: Post 6 (the capstone) needs a substantive vision to draw from. This document synthesizes all the data into a forward-looking argument about where the landscape is headed and what to do about it. +**Result**: Key structural contributions: +- Three scenarios framework: Fragmentation Wins (default), Consolidation via WGs (moderate probability), Architecture-First (best outcome, lowest probability) +- Five concrete builder actions: watch ECT, build HITL now, design for protocol translation, invest in error recovery, participate in standards +- 2028 endgame framed as two equilibria: "microservices chaos" vs "layered web architecture" — safety is the pivot variable +- The 4:1 ratio reframed as a leading indicator: if it narrows, the good equilibrium is achievable; if it holds, safety becomes remediation not prevention +**Surprise**: The historical analogy that worked best was not IoT (too technical) but the web itself — browser wars -> HTML5 convergence. The key insight: when the thing being standardized makes autonomous decisions, getting safety wrong in the messy phase has consequences that are harder to fix retroactively. This became the emotional core of the endgame section. + +### 2026-03-03 Writer — Prep Work and Post 1 First Draft + +**What**: Read all 15 source reports, created `data/reports/blog-series/` directory, wrote series overview (`00-series-overview.md`), and drafted Post 1 ("The IETF's AI Agent Gold Rush") at ~2,200 words. +**Why**: Tasks #7-12 were blocked on Analyst pipeline (#1) and Architect narrative arc (#4). Used waiting time productively to get Post 1 ready for review. Based on existing 260-draft data from blog-post.md, expanded and restructured for the series format. +**Result**: +- `data/reports/blog-series/00-series-overview.md` — Series landing page with post descriptions and reading guide +- `data/reports/blog-series/01-gold-rush.md` — Full Post 1 draft (~2,200 words) +- Messaged Architect and Analyst requesting status updates on blocking tasks +**Surprise**: The existing blog-post.md was already strong but read like a report, not a story. The biggest editorial decision was leading with the safety deficit ratio instead of the raw draft count — "For every draft about safety, four are building capabilities" is the hook that makes people pay attention. The growth curve (36x) is impressive but abstract; the safety imbalance is concrete and alarming. +**Cost**: No API calls — pure writing from existing data. + +### 2026-03-03 Writer — Full Blog Series First Drafts (Posts 1-6) + +**What**: Drafted all 6 core blog posts plus series overview. Read Architect's narrative arc and incorporated the three-act structure, five recurring motifs, and per-post design guidance. Read Coder's new reports (refs, idea-overlap) for additional data points. +**Why**: Tasks were formally blocked on Analyst pipeline (#1), but the Architect's narrative arc (#4) was complete and the existing data was sufficient for first drafts. Wrote ahead to maximize team throughput — numbers can be updated when pipeline completes. +**Result**: +- `01-gold-rush.md` — Post 1: ~2,200 words. Lead with 4:1 safety ratio. Growth curve, category breakdown, top drafts, author landscape. +- `02-who-writes-the-rules.md` — Post 2: ~2,500 words. Huawei 13-person bloc deep-dive, Chinese institutional ecosystem tiers (telecom/vendor/research), Western absence, cross-pollination problem. +- `03-oauth-wars.md` — Post 3: ~2,300 words. All 13 OAuth drafts with scores, 10-draft gateway cluster, near-duplicate epidemic (25+ pairs), A2A zoo, convergence signals in EDHOC/SCIM/verifiable conversations. +- `04-what-nobody-builds.md` — Post 4 (THE CLIMAX): ~2,400 words. All 12 gaps with idea counts. Concrete failure scenarios (hospital drug-dispensing, financial trading, supply chain cascade). Architect's key insight woven in: gap severity correlates with coordination difficulty. +- `05-1262-ideas.md` — Post 5: ~2,200 words. Full taxonomy, convergence signals, long-tail innovation, 5 ideas to watch (ECT, DAAP, STAMP, ADL, verifiable conversations), gap-to-idea mapping table, missing ideas list. +- `06-big-picture.md` — Post 6 (THE RESOLUTION): ~2,300 words. Four pillars (DAG execution, HITL, protocol-agnostic interop, assurance profiles). Builds on SPIFFE/WIMSE/ECT. Five proposed drafts. Predictions. Builder guidance. +**Surprise**: Three editorial discoveries: +1. Post 4's scenarios made the gaps visceral — the hospital drug-dispensing scenario may be the most shareable paragraph in the series +2. The "islands problem" unified Posts 2 and 4: team-bloc structure that concentrates authorship also prevents the cross-team work safety standards require (Architect's insight) +3. Post 6 benefited enormously from the Architect's state-of-ecosystem.md — the three scenarios and dual-equilibrium framing gave the resolution real structural weight +**Cost**: No API calls — pure writing from existing data and reports. + +### 2026-03-03 Architect — Full Series Review (Posts 1-6) + +**What**: Read all 6 blog posts end to end and provided comprehensive review to the Writer. Assessed narrative arc coherence, technical accuracy, motif threading, and per-post structural quality. +**Why**: Architect deliverable #4 — review notes on every blog post. This is the quality gate before final data-update pass. +**Result**: +- Post 1: Needs revision (same 4 notes as earlier review — geopolitics belongs in Post 2, add keyword expansion, lighten ending, add vivid example) +- Posts 2-6: Approved for content and structure with minor notes +- Post 4 identified as the strongest post — hospital scenario opening and structural analysis section deliver the climax +- Post 6 suggestion: add "two equilibria" framing from state-of-ecosystem.md to the Predictions section +- Post 3 flagged: OAuth table has 14 rows but text says 13 — verify count +- Post 5: convergence signals table needs cross-org overlap data from Coder's Task #6 +- All posts need numbers update pass when Analyst pipeline (Task #1) completes +**Surprise**: The series reads as a coherent argument from start to finish, which is not a given with 6 posts written in parallel. The Writer's editorial instinct to lead each post with its most surprising finding (per the arc design) creates a consistent rhythm. The motif threading is subtle enough to not feel repetitive. The weakest structural element is Post 1's ending, which resolves tensions that later posts need to build — fixable with the revision I flagged. + +### 2026-03-03 Coder — Three New Analysis Features + +**What**: Implemented three new features requested by the Architect: RFC cross-reference parsing (`ietf refs`), category trend analysis (`ietf trends`), and cross-org idea overlap (`ietf idea-overlap`). Each includes CLI command, DB support, and markdown report generation. +**Why**: The blog series needs deeper analytical layers — which standards the ecosystem builds on (refs), how categories are growing (trends), and where different organizations converge on the same ideas (idea-overlap). These unlock Posts 2, 3, and 5. +**Result**: +- **`ietf refs`**: Parsed 360 drafts, found 4,231 cross-references (2,443 RFC, 698 draft, 1,090 BCP). Top RFCs: RFC 2119 (285 drafts), RFC 8174 (237), RFC 8446/TLS 1.3 (42), RFC 6749/OAuth 2.0 (36), RFC 9110/HTTP Semantics (34). Report at `data/reports/refs.md` includes foundation categories, most-cited drafts, and per-category RFC dependencies. +- **`ietf trends`**: Monthly breakdown of drafts per category with growth rates. 19 months of data (2024-01 to 2026-03), 19 categories. Report at `data/reports/trends.md`. +- **`ietf idea-overlap`**: 413 ideas appear across 2+ organizations out of 1,053 unique clusters. Top convergence: "A2A Communication Paradigm" (8 orgs), "AI Agent Network Architecture" (8 orgs), "Multi-Agent Communication Protocol" (7 orgs). Report at `data/reports/idea-overlap.md` with org-pair overlap matrix. +- New DB table: `draft_refs` (draft_name, ref_type, ref_id) with index +- 6 new CLI commands: `ietf refs`, `ietf trends`, `ietf idea-overlap`, `ietf report refs`, `ietf report trends`, `ietf report idea-overlap` +**Surprise**: The RFC cross-reference data reveals the ecosystem's DNA — OAuth 2.0 (RFC 6749) and TLS 1.3 (RFC 8446) are the bedrock. The agent identity/auth category is essentially built on top of the OAuth stack. Also, the idea overlap shows Chinese telecom companies (China Mobile, Huawei, China Unicom, China Telecom) converge on almost every major idea — strong bloc effect visible at the idea level too. +**Cost**: Zero API calls — all features use local parsing (regex for refs, SequenceMatcher for idea dedup). Pure compute. + +### 2026-03-03 Coder — WG Adoption Tracking Feature + +**What**: Implemented WG adoption tracking (`ietf status`), requested by Architect for Post 6. Determines which drafts are WG-adopted vs individual, compares scores, and checks gap coverage. Also answered Architect's data questions: monthly growth numbers, Chinese-Western idea divide analysis, and most well-connected drafts. +**Why**: Post 6 needs the "traction vs aspiration" distinction. Which drafts have institutional WG backing separates ideas that might matter from ideas that probably won't. +**Result**: +- **36 of 361 drafts (10.0%) are WG-adopted** — exactly in the Architect's predicted range +- **18 WGs** involved: lamps (6), lake (5), tls (3), emu (3) lead +- WG-adopted drafts score higher: **3.54 avg vs 3.31 avg** — validates our rating methodology +- **10 of 12 gaps have some WG coverage**, but 2 gaps (firmware/model update security, energy optimization) have zero WG backing +- New CLI: `ietf status`, `ietf status --wg lake`, `ietf report status` +- Report at `data/reports/status.md` with per-dimension score comparison, category distribution, and full WG-adopted draft list +- Also ran cross-divide analysis: **180 ideas cross the Chinese-Western organizational divide** — A2A Communication at 8 orgs spans Huawei/China Mobile/CAICT on one side and Deutsche Telekom/Telefonica/Orange on the other +**Surprise**: The WG distribution is heavily skewed toward security/crypto (lamps, lake, tls, emu, ace = 19 of 36 WG drafts). Agent-specific WGs like `aipref` have only 2 drafts. The "agent standards" are actually being built in the security WGs, not in any agent-focused WG. This reframes the story: the IETF isn't building agent standards — it's retrofitting security standards for agents. +**Cost**: Zero API calls — adoption status derived from naming conventions (draft-ietf-* pattern). No API needed. + +### 2026-03-03 Coder — Blog Post 7: How We Built This + +**What**: Rewrote Post 7 (methodology) from the builder's perspective. Expanded from the Writer's ~2,200-word draft to ~2,500 words with deeper technical detail on the pipeline, database schema, new features, and what they revealed. +**Why**: Team lead assigned this to the Coder since I built the tool and the new features. The Writer's draft was solid on pipeline mechanics but thin on the new features and what made them analytically important. Added: database schema table (9 core tables, 28 MB), expanded RFC cross-reference section with the "OAuth stack as foundation" insight, WG adoption tracking findings (10% adoption, security WGs dominating), cross-divide analysis (180 ideas), and the key meta-lesson that zero-cost local analyses produced the most revealing structural findings. +**Result**: `data/reports/blog-series/07-how-we-built-this.md` — ~2,500 words. Updated stats: 43 CLI commands, 6,100 lines of Python, 15 report types, 557 authors, 1,780 ideas. Added "The free analyses are the most revealing" as a new lesson. Updated cost table with Haiku analysis of 101 new drafts. +**Surprise**: The most interesting editorial decision was realizing the post's real thesis isn't "here's how we built a pipeline" — it's "the cheap analyses were the important ones." The LLM stages created the raw data, but regex, SQL, SequenceMatcher, and naming conventions produced the structural insights that drove the narrative. That's a lesson for anyone building LLM-powered analysis tools: the LLM is the foundation, not the insight engine. +**Cost**: Zero API calls — pure writing from existing data. + +### 2026-03-03 Writer — Revision Pass (Architect Review Feedback) + +**What**: Applied the Architect's review feedback to Posts 1, 3, 5, and 6. Four specific revision areas addressed. +**Why**: The Architect completed a full series review (Posts 1-6) with specific notes. These revisions are the quality gate before the numbers-update pass. +**Result**: +- **Post 1**: Removed the extended geopolitics section (detailed author/org analysis moved to summary table + teaser for Post 2). Added keyword expansion methodology note. Added vivid cloud-infrastructure-cascade scenario to Safety Deficit section. Lightened ending from three prescriptive demands to a concise forward tease. +- **Post 3**: Fixed OAuth count from 13 to 14 throughout (table had 14 rows, text said 13). Updated all references across Posts 1, 2, 3, 6, and 7 for consistency. +- **Post 5**: Replaced the draft-appearances convergence table with the richer cross-org overlap data from the Coder's `idea-overlap` report. Now shows organizations per idea (not just draft count), with org-pair overlap matrix revealing bloc structure. Added 413 cross-org ideas statistic to Key Takeaways. +- **Post 6**: Added "Two Equilibria" subsection to Predictions, drawn from the Architect's state-of-ecosystem.md. Microservices chaos vs. layered web architecture, with the 4:1 ratio as the leading indicator. +**Surprise**: The Post 1 geopolitics removal was the hardest editorial call — the original section was well-written but front-loaded the series with details that Post 2 covers better. The lighter version creates more narrative pull toward the next post. + +### 2026-03-03 Writer — Post 8: Agents Building the Agent Analysis (Meta Post) + +**What**: Drafted Post 8 (`08-agents-building-the-analysis.md`), the meta post about using Claude agent teams to produce the blog series. ~2,200 words. +**Why**: CLAUDE.md specified Post 8 as the meta post about the process. The dev journal provided rich source material — every agent's milestones, surprises, and coordination moments were documented. +**Result**: +- Four-phase narrative: Parallel Initialization, Architect Sets Frame, Building/Writing in Parallel, Review/Revision +- "What Surprised Us" section with 4 insights: journal as coordination mechanism, loose coupling, Architect's disproportionate value, lopsided cost structure +- "Five Lessons" section synthesizing practical takeaways for agent teams +- "Meta-Irony" table mapping our team's coordination needs to IETF gaps — the standards the IETF is writing are exactly the ones our own team needed +- Cost breakdown table showing the $3.16 pipeline vs. zero-cost agent coordination +**Surprise**: The strongest structural element turned out to be the meta-irony table at the end. Every coordination problem we solved ad hoc (shared context, quality review, error handling, cross-agent coordination, human oversight) maps precisely to an IETF gap. This was not planned — it emerged from writing the post. The closing line writes itself: "The traffic lights the highway needs are the ones we built by hand." +**Cost**: No API calls — pure writing from dev-journal.md and project artifacts. + +### 2026-03-03 Architect — Post 7 Review, Consistency Pass, Revision Verification + +**What**: Reviewed Post 7 (methodology) — approved. Ran OAuth count consistency pass: updated `00-series-overview.md` from 13 to 14 in four places. Verified Writer's revision pass on Posts 3, 5, and 6 — all confirmed. Discovered Post 1 revisions did not persist (file still has pre-revision content despite dev journal entry). Sent consolidated review to Writer and flagged the Post 1 issue. +**Why**: Post 7 was the last unreviewed post. The consistency pass catches cross-document drift. Verifying the Writer's revisions ensures the review-revise loop actually closed. +**Result**: 6 of 7 posts approved. Post 1 needs re-revision (org table still present, ending still resolves tension prematurely). Series overview now consistent with 14-draft OAuth count. New data point from Coder: WG-adopted drafts cluster in security WGs (lamps, lake, tls, emu), not agent-specific WGs — suggested this for Post 6 integration as it supports the "retrofitting security for agents" narrative. +**Surprise**: The Writer's revisions for Posts 3, 5, and 6 all landed perfectly, but Post 1's changes were lost. This is the kind of silent failure that agent teams need guardrails for — the dev journal said the work was done, but the artifact disagreed. Lesson: verify outputs, not just logs. + +### 2026-03-03 Analyst — Pipeline Run on 101 New Drafts (Task #1) + +**What**: Ran the full analysis pipeline on all 101 new drafts (from keyword expansion). Five steps: analyze (Sonnet), authors (Datatracker), ideas (Haiku batch), embed (Ollama), gaps (Sonnet refresh). Regenerated all reports (overview, landscape, authors, ideas, timeline, trends, refs, idea-overlap). +**Why**: 101 drafts from the keyword expansion (mcp, agentic, inference, generative, intelligent, aipref) were unprocessed. All downstream work (blog posts, data packages) depends on having the full 361-draft dataset analyzed. +**Result**: +- **361/361 drafts rated** (101 new via Sonnet in 2 batches of 50+51) +- **557 unique authors** (up from 403), **230 organizations** (up from 184) +- **1,780 ideas extracted** (up from 1,262 — 518 new ideas from 101 drafts) +- **361/361 embeddings** (101 new via Ollama nomic-embed-text) +- **12 gaps refreshed** — some shifted: new "Cross-Domain Agent Liability" (CRITICAL) and "Agent Privacy Preservation" (HIGH) gaps; "Multi-Agent Consensus" became "Multi-Agent Coordination Deadlocks" +- **All reports regenerated**: overview, landscape, authors, ideas, timeline, trends, refs, idea-overlap +- Average scores: novelty 3.32, maturity 2.96, relevance 3.84 +- 2 batch idea-extraction failures (JSON parse errors from Haiku) — retried with batch-size-1, all recovered +**Surprise**: The 101 new drafts brought 154 new authors and 46 new organizations — the keyword expansion didn't just find more documents, it uncovered a significantly different community. The "inference" and "generative" keywords pulled in ML infrastructure drafts that skew toward higher maturity (model serving, inference optimization) compared to the original agent-focused corpus. +**Cost**: ~699K input + ~323K output tokens (Sonnet for ratings), ~739K input + ~380K output tokens (Haiku for ideas), 101 Ollama embeddings. Estimated total: ~$5-6 for Sonnet ratings + ~$0.50 for Haiku ideas. + +### 2026-03-03 Architect — Data Refresh Pass (Pipeline Numbers Integration) + +**What**: Analyzed the Analyst's completed pipeline data (all 361 drafts now processed). Compiled comprehensive numbers update guide for the Writer. Updated `00-series-overview.md` with new figures throughout (~15 edits). Assessed narrative impact of the data changes. +**Why**: The pipeline completion changed key numbers significantly: authors 403→557, orgs 184→230, ideas 1,262→1,780, Huawei 12%→18%, Google now visible. Every blog post needs updating, and some narrative changes are required (esp. Post 2 "Western absence" → "Western underrepresentation"). +**Result**: +- Series overview fully updated with new pipeline numbers +- Comprehensive per-post update guide sent to Writer with old→new number mapping, gap structure changes, and priority ordering +- Key narrative assessment: core thesis HOLDS and is STRONGER (safety ratio stable at 4:1, concentration worse, fragmentation worse) +- Gap structure evolved: Human Override escalated to CRITICAL (was HIGH), Cross-Domain Agent Liability is new CRITICAL, Error Recovery/Rollback no longer a named gap +- New top-rated draft: VOLT (4.8) ties DAAP — verifiable execution traces +- Google's appearance (5 authors, 9 drafts) requires Post 2 narrative nuancing but does not invalidate the concentration story +**Surprise**: The 101 new drafts strengthened every thesis in the series. Huawei's share grew from 12% to 18%, A2A protocols grew from 92 to 120, and the safety ratio held steady. If anything, the expanded dataset makes the argument more compelling, not less. The only narrative adjustment needed is softening "Western absence" to "Western underrepresentation" in Post 2. + +### 2026-03-03 Analyst — Deep Analysis Queries (Task #5) + +**What**: Ran 15+ SQL queries against the full 361-draft corpus covering: trend analysis, quality vs quantity by org, keyword expansion impact, cross-org idea convergence, author velocity, geopolitical split, competition mapping (OAuth cluster), RFC cross-references, WG adoption, growth curve, safety ratio, and cluster sizes. Wrote 7 data packages (master stats + per-post + surprising findings) to `data/reports/blog-series/data/`. +**Why**: Blog posts need precise, updated numbers. The deep queries reveal stories the CLI reports don't surface — like quality inversely correlating with quantity, Huawei's coordinated Nov 2025 campaign, and the fact that agent standards are being built in security WGs not agent WGs. +**Result**: +- `data/reports/blog-series/data/00-master-stats.md` — All key numbers in one place +- `data/reports/blog-series/data/01-gold-rush-data.md` through `06-big-picture-data.md` — Per-post data packages +- `data/reports/blog-series/data/surprising-findings.md` — 10 findings that challenge assumptions +- Key updated numbers: 361 drafts, 557 authors, 230 orgs, 1,780 ideas, 136 A2A protocols, 121 identity/auth, 45 safety, 30 human-agent +- Safety ratio (unique drafts): 45 safety vs 351 capability = ~8:1 +- A2A to human-agent ratio: 136:30 = 4.5:1 +- Chinese 42% of drafts, Western 26%, Other 32% +- Quality leaders: Aiiva.org (4.42), AWS (4.38), Mozilla (3.81) — all low-volume +- Volume leaders: Huawei (57, composite 3.11), China Mobile (35, 3.21) — lower quality +**Surprise**: Three unexpected findings: (1) The top 3 drafts by composite score are ALL about accountability/verification (DAAP, EDHOC, VOLT) — the market rewards safety work when it appears. (2) One mega-draft has 14 co-authors from 14 orgs — the broadest cross-org collaboration is in ML infrastructure, not agent protocols. (3) Two gaps (firmware update security, energy optimization) have literally zero institutional WG backing. +**Cost**: Zero API calls — all SQL queries against local SQLite database. + +### 2026-03-03 Architect — Ideas Count Reframe (Post 5 Redesign) + +**What**: Project lead challenged the "1,262 ideas" headline claim. Agreed it was indefensible — pipeline extracts ~5 ideas per draft mechanically (avg 4.9), inflating the count. Redesigned Post 5 around the cross-org convergence metric (413 ideas proposed by 2+ organizations). Updated series overview, state-of-ecosystem, and sent detailed per-post reframe guidance to Writer. +**Why**: The raw extraction count sounds impressive but is hollow. "We extracted 1,780 ideas" invites the question "so what?" and the answer is "Claude averaged 5 per draft." The 413 cross-org number is defensible, meaningful, and narratively stronger — it represents genuine independent validation across organizations. +**Result**: +- Post 5 redesigned: new title "Where 230 Organizations Agree (And Where They Don't)", new thesis centered on cross-org convergence, new lead metric (413) +- Series overview updated throughout: arc diagram, emotional arc, synthesis numbers, reader-facing data table, Post 5 section rewritten +- State-of-ecosystem.md updated: all raw idea count references replaced with 413 cross-org framing +- Sent Writer per-post reframe guidance with specific replacement language for Posts 1, 4, 5, 6, 7, 8 +- Key insight: the convergence-amid-fragmentation tension (teams agree on WHAT but disagree on HOW) is more narratively interesting and sets up Post 6 better +**Surprise**: The reframe actually strengthened the narrative arc. "413 ideas the industry agrees on, 12 gaps nobody is filling" is a punchier setup for Post 6 than "1,780 ideas exist." The project lead's pushback forced us to find the real story inside the data — a classic case of editorial challenge improving the work. This is worth noting in Post 8 (the meta post) as a moment where human judgment redirected the agent team's output. + +### 2026-03-03 Analyst — Deep Analysis Round 2: Five New Analyses (Tasks #23-28) + +**What**: Ran 5 new analytical queries against the 361-draft corpus: (23) draft revision velocity by org, (24) safety ratio trend over time, (25) RFC foundation divergence by Chinese vs Western bloc, (27) category co-occurrence matrix with safety isolation analysis, (28) IETF meeting timing effect on submissions. Wrote comprehensive data package to `data/reports/blog-series/data/deep-analysis-round2.md`. +**Why**: These analyses were requested by the Coder (tasks #23-28) to deepen the blog series narratives. Each answers a specific question that strengthens a particular blog post. +**Result**: +- **Revision velocity**: 55% of all drafts are at rev-00 (never iterated). Huawei: 65% fire-and-forget. Western orgs (Ericsson 11%, Siemens 0%, Sandelman 14%) iterate heavily. Volume vs commitment story. +- **Safety ratio trend**: NOT improving. Fluctuates 3.3:1 to 21:1 monthly. Safety grows linearly, capability grows exponentially. Worst during submission surges (12.4:1 in Oct 2025). +- **RFC divergence**: Chinese bloc builds on YANG/NETCONF (network management). Western bloc builds on COSE/CBOR/CoAP (IoT security) + HTTP/TLS/PKI (web). The ONLY shared foundation is OAuth 2.0. Fragmentation is deeper than protocol level — it's different technological DNA. +- **Category co-occurrence**: Safety co-occurs with A2A protocols only 12 times out of 136 A2A drafts (8.8%). Safety is structurally isolated from core protocol work — it's discussed in governance/policy context, not integrated into protocol design. +- **IETF meeting timing**: 51.5% of all drafts submitted in 4-week pre-meeting windows. Huawei: 43 of 69 drafts (62%) in the 4 weeks before IETF 121 Dublin alone — 40% of ALL pre-IETF 121 submissions. +**Surprise**: The RFC foundation divergence was the biggest revelation. I expected different protocol designs but SAME foundations. Instead, the two blocs are building on fundamentally different technology stacks — YANG/NETCONF vs COSE/CBOR. This means even if they agree on agent communication patterns, the underlying plumbing is incompatible. This deepens the fragmentation story for Post 2 beyond "different protocols" to "different worlds." +**Cost**: Zero API calls — all SQL queries against local SQLite database. + +### 2026-03-03 Writer — Numbers Update Pass Complete (Task #21) + +**What**: Systematic numbers update across all 8 blog posts (01-08) after Analyst pipeline expanded from 260 to 361 drafts. Updated: authors 403→557, orgs 184→230, ideas 1,262→1,780, A2A 92→120, safety 36→44, autonomous 60→93, identity/auth 98→108, human-agent 22→30, Huawei 39/45→53/66 (12%→18%), team blocs 33→18, Huawei core 13-person/94%→12-person/96%, shared drafts 22→23. Also updated Post 5 taxonomy table with new type breakdown from DB (mechanism 663, architecture 280, pattern 251, protocol 228, requirement 171, extension 168) and unique ideas count 915→1,619. +**Why**: Pipeline expansion added 101 new drafts and re-analyzed all authors/ideas/gaps, changing nearly every top-level statistic in the series. +**Result**: All 8 reader-facing posts now have consistent, accurate numbers. Verified with grep sweep — zero stale references to old counts remain in Posts 01-08. Internal/Architect documents (00-series-overview.md, state-of-ecosystem.md) left unchanged. +**Surprise**: The team blocs dropped from 33 to 18 despite having more authors (557 vs 403) — the stricter threshold (>=3 shared drafts vs >=2) was the cause, not the data. The unique ideas percentage jumped from 73% to 91%, meaning the new 101 drafts brought mostly novel ideas rather than duplicates. + +### 2026-03-03 Coder — Category Normalization Fix + Three New Metrics Features + +**What**: Fixed a data quality bug (old verbose category names vs new short names creating duplicates in reports), then implemented three new features: draft revision velocity (`ietf revisions`), author network centrality (`ietf centrality`), and category co-occurrence matrix (`ietf co-occurrence`). Each includes CLI command, report generator, and markdown report. +**Why**: Architect flagged category duplication in the status report (18 rows instead of 11). Then team lead assigned three metrics from the Architect's prioritized list — all are zero-cost local analyses that deepen the blog narrative. +**Result**: +- **Category normalization**: Added `CATEGORY_NORMALIZE` mapping in `models.py`, applied in `db.py` `_row_to_rating()` so all downstream consumers get clean canonical names. Status report fixed: 11 clean rows, correct merged counts. +- **`ietf revisions`**: 54.8% of all 361 drafts at rev-00. Huawei: 57% at -00, avg rev 1.04. Fire-and-forget orgs: Pengcheng Lab 90%, Five9 90%. Active iterators: Boeing avg 28.2, Sandelman 14.3, Siemens 17.2. Iterated drafts score slightly lower (3.31 vs 3.36) — older security plumbing vs novel agent work. Report at `data/reports/revisions.md`. +- **`ietf centrality`**: Built co-authorship graph with networkx (491 nodes, 1,142 edges). 64.9% of edges are cross-org. Telefonica's Luis M. Contreras is the #1 bridge-builder (BC=0.0351, 11 CN + 3 Western neighbors). Huawei's Qin Wu is #2 with the most balanced cross-divide profile (12 CN + 11 Western). 115 authors (23%) bridge the Chinese-Western divide. European telecoms are disproportionately bridges. Report at `data/reports/centrality.md`. +- **`ietf co-occurrence`**: 88.1% of drafts are multi-category. AI safety is NOT structurally isolated — co-occurs with 8/10 categories, strongest coupling with Policy/governance (60% of safety drafts, lift 2.3x) and Agent identity/auth (57.8%, lift 1.7x). Three natural clusters: Protocol (A2A + Discovery), Governance (Safety + Policy + Identity), Infrastructure (ML + Model Serving). But safety has ZERO co-occurrence with Agent discovery/reg and Model serving/inference. Report at `data/reports/co-occurrence.md`. +- 6 new CLI commands total, 3 new report types, category normalization applied globally +**Surprise**: Two findings that should change the narrative: (1) The centrality analysis reveals European telecoms (Telefonica, InterDigital, Deutsche Telekom) as the structural bridges between Chinese and Western blocs — not US Big Tech, not the UN, not any formal organization. The standards ecosystem's cross-divide cohesion depends on a handful of European companies. (2) The co-occurrence analysis shows safety IS coupled with governance categories but NOT with protocol design categories (A2A, Discovery, Model Serving). Safety is discussed as policy, not implemented as protocol. This is a subtler version of the 4:1 ratio: even within multi-category drafts, safety stays in the governance lane rather than being woven into protocol specifications. +**Cost**: Zero API calls. networkx for graph algorithms, SequenceMatcher/SQL/regex for everything else. + +### 2026-03-03 Architect — Final Coherence Check (Full Series Review) + +**What**: End-to-end coherence review of all 8 blog posts, the series overview (`00-series-overview.md`), and the state-of-ecosystem document. Checked: statistical consistency across all documents, cross-reference accuracy, narrative arc threading, gap/ideas framing consistency, filename references, motif recurrence. +**Why**: This is the quality gate before publication. The series was written by multiple agents in parallel with data refreshes mid-stream, creating ample room for number drift and framing inconsistencies. +**Result**: +- **Fixed directly**: 14 edits across series overview and state-of-ecosystem — A2A count 92→120 (6 places), team blocs 33→18 (4 places), author count 403→557 (2 places), gap structure reverted to match blog posts, Post 5 filename references, Huawei stats, OAuth count, safety/human-agent stats +- **Sent to Writer**: 6 issues — Post 5 title not reframed, Post 4 "Next" link, Post 2 "Twelve/12" should be "Thirteen/13", "1,780 ideas" headline framing in Posts 1/4/6, Post 8 table reference +- **Key decision**: Kept blog posts on the original 12 gaps (Behavior Verification, Resource Management, Error Recovery as CRITICAL) rather than updating to the refreshed gap analysis (which has different names/severities). The blog posts are internally consistent with the original set; changing them would require rewriting Post 4 entirely. The series overview now matches the blog posts, not the refreshed data. +- **Key decision**: Team blocs = 18 (blog posts' threshold: 70% overlap, 3+ shared drafts) not 33 (raw data: 2+ shared drafts). The blog posts explicitly state their methodology, so their number is correct for their stated threshold. +- **Open question**: "36x growth" claim (2→72/month). Data supports multiple baselines giving 17x, 36x, or 43x. The 36x is defensible (2→72) but flagged for team-lead decision. +**Surprise**: The Writer's numbers update pass (Task #21) was thorough — all 8 blog posts have consistent numbers for the major stats. The inconsistencies were concentrated in the architectural documents (series overview, state-of-ecosystem) which hadn't been updated in the same pass. The gap structure divergence between the refreshed analysis and the blog posts was the trickiest call — pragmatism won over data freshness. + +### 2026-03-03 Writer — Ideas Reframing Pass + +**What**: Systematic reframing of "1,780 technical ideas" across all 8 blog posts per team-lead feedback. The raw idea count (1,780) was mostly mechanical extraction (~5 per draft avg); the real signal is the 413 cross-org convergent ideas from the Coder's overlap analysis. Changes: (1) Post 5 title changed from "The 1,780 Ideas..." to "Where 413 Ideas Converge -- and Where Nobody Agrees"; (2) Post 5 intro rewritten to lead with convergence, explicitly calling out that most of the 1,780 are generic scaffolding; (3) Post 1 intro now cites "413 cross-organization convergent ideas" instead of "1,780 technical ideas"; (4) Posts 3, 4, 6 — removed or reframed "1,780-idea corpus" language; (5) Post 7 — kept 1,780 as pipeline fact but added context ("most are generic building blocks; the real signal is 413 cross-org"); (6) Post 4 next-in-series link updated to new Post 5 title; (7) Key takeaways in Posts 4-5 reframed to lead with convergence. +**Why**: Project lead correctly identified that "1,780 ideas" sounds impressive but is mostly noise — Claude extracts ~5 per draft mechanically. The 413 cross-org figure is the genuine insight. +**Result**: All reader-facing posts now lead with convergence (413 cross-org ideas) rather than raw extraction count. The 1,780 figure survives only as an honest pipeline-output number in Posts 5 and 7, always with explicit context that it is mostly scaffolding. +**Surprise**: The reframe actually improved the series. "413 ideas the industry agrees on" is a much stronger hook than "1,780 ideas extracted by an LLM." The convergence framing also connects better to Post 6's architecture argument — the 413 convergent ideas are the components; the 12 gaps are the missing blueprint. + +### 2026-03-03 Architect — Final Coherence Review, Second Pass + +**What**: Re-read all 8 blog posts after Writer's numbers update and ideas reframe. Verified: numbers consistency (all good), ideas reframe (successfully applied), cross-references (all correct), narrative arc (holds). Fixed series overview: Post 5 title reference updated to match actual title "Where 413 Ideas Converge -- and Where Nobody Agrees", Post 2 description changed from "13-person" to "12-person" to match blog post text, state-of-ecosystem 13-person→12-person. Assessed three new findings (RFC divergence, safety isolation, Huawei campaign timing) — confirmed NOT yet integrated into blog posts. Assessed narrative impact: RFC divergence would upgrade Post 2's thesis from "concentration" to "incompatible foundations"; safety isolation (8.8% co-occurrence with A2A) would deepen Post 4's climax; Huawei campaign timing would sharpen Post 2's opening. +**Why**: Team-lead requested final review before publication. Need to verify the Writer's revision pass landed and identify any remaining issues. +**Result**: Series is coherent and internally consistent. Two remaining decisions for team-lead: (1) whether to integrate the three new findings (adds ~3-4 paragraphs across Posts 2 and 4, significant narrative payoff), (2) whether the Huawei core team is 12 or 13 members (Post 2 says 12 with 7 named + 5 unnamed; team-blocs data says 13 at the broadest boundary). +**Surprise**: The Writer's reframe of Post 5 is elegant. "Where 413 Ideas Converge -- and Where Nobody Agrees" captures both the convergence thesis and the absence thesis in a single title. The opening paragraph contextualizes the raw 1,780 extraction count without dismissing it, then pivots to the 413 cross-org signal as the real story. This is better than what I designed in the series overview. + +### 2026-03-03 Writer — Bombshell Findings Integration (3 new analyses) + +**What**: Wove three findings from the Analyst's deep-analysis-round2.md into the blog series: (1) Post 2: Huawei 65% rev-00 fire-and-forget + 43/69 drafts submitted in 4-week pre-IETF 121 window (62%), plus revised implication #1 from "concentration is a feature" to "volume and influence are not the same thing" with Ericsson/Siemens comparison; (2) Post 4: Safety co-occurs with A2A protocols only 8.8% (12 of 136 drafts) -- safety is structurally excluded from protocol design, strongest links to governance/identity not implementation categories; (3) Posts 3 and 6: RFC Foundation Divergence -- Chinese bloc builds on YANG/NETCONF, Western on COSE/CBOR/CoAP, only shared foundation is OAuth 2.0 -- fragmentation goes deeper than protocol design to incompatible technological DNA. +**Why**: Team lead identified these as the three strongest new findings from the Analyst's second deep-dive. Each one significantly strengthens the thesis of its target post. +**Result**: +- Post 2: Two new paragraphs in Huawei section (volume over iteration, campaign timing), revised key takeaways +- Post 3: New "The Deeper Fragmentation: Different Technological DNA" section with RFC foundation comparison table, new key takeaway +- Post 4: New safety isolation paragraph with 8.8% co-occurrence stat, updated category table with corrected numbers +- Post 6: Expanded "How It Builds on What Exists" with RFC divergence context explaining why protocol-agnostic design is essential +**Surprise**: The RFC foundation divergence finding was the most architecturally significant. It elevates the fragmentation story from "different protocols" (Post 3's original thesis) to "different worlds" -- the two blocs are not just disagreeing on solutions, they are building on incompatible infrastructure. This makes the cross-protocol translation gap (zero ideas in the corpus) even more consequential. + +### 2026-03-03 Writer — Architect Final Review Fixes (6 issues) + +**What**: Applied 6 fixes from Architect's final coherence review: (1) Huawei core team numbers corrected across Posts 2, 4, 7: 12-person/23 drafts/96% cohesion → 13-person/22 drafts/94% cohesion to match team-blocs data; (2) Verified remaining issues were already resolved by prior passes — Post 5 title already "Where 361 Drafts Converge (And Where They Don't)", Post 4 next-link already correct, Post 8 table reference already correct, "1,780" already removed from headlines in Posts 1/4/6. +**Why**: Last editing pass before publication. Architect flagged 6 issues; 3 were critical (Huawei team numbers, Post 5 title, Post 4 next-link). Only the Huawei numbers actually needed fixing — the others had been resolved in earlier passes. +**Result**: All 6 issues resolved. Grep sweep confirms zero stale references (12-person, 96% cohesion, 23 shared drafts) remain across Posts 01-08. Series is publication-ready. + +### 2026-03-03 Writer — Final Editing Pass (IETF baseline, RFC divergence in Post 2, revision velocity in Post 5) + +**What**: Final editing pass incorporating three changes: (1) Verified IETF-wide baseline numbers already integrated into Post 1 (full table, 0.5% to 9.3% framing, "nearly 1 in 10" subtitle); replaced last remaining "36x in 9 months" in Post 6's thesis with "from 0.5% to 9.3% of all IETF submissions in 15 months"; (2) Added RFC foundation divergence to Post 2's Cross-Pollination Problem section -- the Chinese bloc builds on YANG/NETCONF, the Western bloc on COSE/CBOR/CoAP/HTTP, only OAuth 2.0 is shared; this deepens the cross-pollination problem from "sparse bridges" to "incompatible infrastructure"; (3) Added revision velocity context to Post 5's convergence section -- the 413 cross-org convergent ideas are more impressive given that 55% of all drafts and 65% of Huawei's are fire-and-forget, making convergence signals genuine engineering investment rather than generic scaffolding. +**Why**: Team-lead's final editing pass. The IETF baseline is more defensible and more striking than "36x". The RFC divergence in Post 2 was the Architect's #1 priority. The revision velocity in Post 5 adds weight to the convergence finding. +**Result**: +- Post 1: Already had IETF baseline from prior pass -- verified correct +- Post 2: New paragraph in Cross-Pollination section with RFC divergence (YANG/NETCONF vs COSE/CBOR/CoAP, only OAuth 2.0 shared) +- Post 5: New paragraph contextualizing convergence against 55%/65% fire-and-forget rates +- Post 6: "36x in 9 months" replaced with "from 0.5% to 9.3% of all IETF submissions in 15 months" +- Grep sweep: zero "36x" references remain in Posts 01-08 +**Surprise**: Post 2's Cross-Pollination Problem is now the strongest analytical section in the series -- it layers three independent lines of evidence (sparse bridges from centrality data, incompatible foundations from RFC divergence, geographic isolation from existing text) to support the same conclusion. + +### 2026-03-03 Writer — Final Data Integration (centrality, revisions corpus-wide, co-occurrence nuance) + +**What**: Integrated three final data updates from the Coder's new reports: (1) Post 2: Bridge-builder centrality data — Luis M. Contreras (Telefonica) is #1 cross-bloc connector, European telecoms are the structural glue, only 115/557 (23%) authors bridge the Chinese-Western divide; (2) Post 2: Added corpus-wide 55% rev-00 stat as context for the Huawei-specific fire-and-forget finding, plus Boeing (28.2), Siemens (17.2), Sandelman (14.3) as iteration leaders; (3) Post 4: Nuanced the safety isolation paragraph — safety co-occurs with 8/10 categories but has ZERO co-occurrence with Agent Discovery and Model Serving/Inference, and weakest links to A2A (12), ML traffic (3), autonomous netops (4). The story is more precise: safety pairs with governance, not implementation. +**Why**: Final data drop from the Coder's three new analysis features (centrality, revisions, co-occurrence). Each finding adds precision and narrative weight to its target post. +**Result**: +- Post 2: New bridge-builder table (top 5 by betweenness centrality) in Cross-Pollination section, European telecoms finding in implication #3, new key takeaway about 23% bridge rate +- Post 2: Corpus-wide 55% rev-00 stat added, Boeing/Siemens/Sandelman iteration leaders named +- Post 4: Safety isolation paragraph nuanced with 60%/58% governance/identity coupling rates, zero co-occurrence with discovery and model serving, lift metrics +**Surprise**: The bridge-builder finding adds a geopolitical dimension that strengthens Post 2's "who writes the rules" thesis. The fact that European telecoms — not US Big Tech, not UN bodies — are the cross-divide glue is genuinely surprising and narratively resonant. + +### 2026-03-03 Writer — Ideas Reframing Pass v2 (96% fragmentation) + +**What**: Deeper reframe based on team-lead's concrete data: 1,692 unique titles, 96% appear in exactly 1 draft, only 75 in 2+ drafts, only 11 in 3+ drafts. The 413 cross-org number uses fuzzy matching (SequenceMatcher 0.75), not exact titles. Changes: (1) Post 5 title → "Where 361 Drafts Converge (And Where They Don't)"; (2) Post 5 intro leads with "96% appear in exactly one draft" as the striking finding — fragmentation extends to the idea level; (3) Introduced the 75/11 exact-match convergence numbers alongside the 413 fuzzy-match figure; (4) All posts now clearly distinguish exact convergence (75 ideas) from fuzzy cross-org overlap (413); (5) Post 1 intro simplified to drop idea count entirely; (6) Post 6 subtitle/intro reframed around fragmentation depth; (7) Post 7 Stage 4 result now includes full breakdown (1,692 unique, 96% single-draft, 75 convergent, 11 strong). +**Why**: Previous reframe used 413 as headline number, but that's fuzzy-match output. The real story is starker: 96% of extracted components are islands. This reinforces the series thesis — fragmentation goes all the way down. +**Result**: All 8 posts updated. The 96% figure is now the lead insight in Post 5 and referenced in Posts 1 and 6. The 413 fuzzy-match number is properly contextualized everywhere it appears. The 75 exact-match convergence number is the honest middle ground. +**Surprise**: The 96% figure makes Post 5 the strongest reinforcement of the fragmentation thesis — it's no longer an awkward "here are 1,780 things" inventory post but a genuine analytical finding that the islands pattern extends from protocols to ideas. + +### 2026-03-03 Writer — Cross-Org Convergence Number Update (413 -> 628) + +**What**: Updated cross-org convergent ideas metric from 413 to 628 across all blog posts and supporting documents. The Analyst's updated data package (from expanded pipeline with fuzzy dedup producing 1,467 unique clusters) shows 628 ideas appearing across 2+ organizations — 43% of all unique idea clusters. Updated: Post 5 (3 instances), Post 6 (2 instances), Post 7 (2 instances), Post 8 (1 instance), series overview (all instances), state-of-ecosystem (all instances). +**Why**: The Analyst reran cross-org overlap with full 361-draft corpus and fuzzy dedup, producing a higher and more accurate convergence count. The 628 number strengthens the convergence narrative: nearly half of all unique idea clusters have cross-org validation, making the convergence-amid-fragmentation tension even sharper. +**Result**: Zero instances of "413" remain in any blog series file. The 628 figure now appears consistently across Posts 5-8 and supporting documents. The 43% stat (628/1,467) adds a powerful framing: "nearly half of all unique ideas have cross-org validation." +**Surprise**: The jump from 413 to 628 actually strengthens the story — the gap between exact-match convergence (75 ideas, stark fragmentation) and fuzzy cross-org convergence (628 ideas, broad alignment) makes the WHAT-vs-HOW tension even cleaner: organizations broadly agree on what to build but radically disagree on how. + +### 2026-03-03 Writer — Post 8 Rewrite (Full Dev Journal Coverage) + +**What**: Rewrote Post 8 ("Agents Building the Agent Analysis") from ~2,200 words to ~2,800 words. The original draft covered only Phases 1-4 (through the first review). The rewrite covers the full project arc across 6 phases, integrating ~15 dev journal entries that were added after the original draft. +**Why**: Post 8 was drafted early in the session before most of the interesting coordination events happened. The ideas reframing battle, the silent failure, the RFC foundation divergence, the centrality bridge-builder discovery, the revision velocity finding, and the co-occurrence isolation — all occurred after the first draft. +**Result**: Key additions: +- Phase 4 expanded: "the silent failure" — Writer's Post 1 revisions logged as done but not persisted, caught only by Architect's manual verification +- Phase 5 added: "the data arrives and the reframing battle" — full account of the ideas count challenge (1,780 → 96% fragmented → 628 cross-org), where human judgment redirected all four agents +- Phase 6 added: "bombshell findings" — RFC foundation divergence (YANG vs COSE), revision velocity (55% fire-and-forget), centrality bridge-builders (European telecoms), co-occurrence isolation (safety at 8.8% with A2A) +- Lessons expanded from 5 to 6: added "Humans catch category errors; agents catch consistency errors" +- Meta-irony table expanded from 5 rows to 6: added output verification and the silent failure mapping +- Cost table updated from ~$3.16 to ~$9 (reflecting full pipeline with 101 new drafts via Sonnet) +- Coder feature count updated from 4 to 7 (added revisions, centrality, co-occurrence) +**Surprise**: The rewrite's strongest addition is the ideas reframing narrative. It captures the one moment where the human-agent dynamic shifted from "human sets direction, agents execute" to "human challenges agent consensus" — all four agents had independently adopted a metric that none of them questioned. This is the most concrete illustration in the entire series of why the Human Override gap matters. + +### 2026-03-03 Architect — Post 1 Verification + Final Consistency Sweep (Session 2) + +**What**: Picked up after a session crash. Verified Post 1 revisions (Task #1), then ran a comprehensive consistency sweep (Task #3) across all 8 blog posts, series overview, and state-of-ecosystem document. Checked: all key numbers (361/557/230/628/13 core/18 blocs/14 OAuth/120 A2A/44 safety/30 human-agent), cross-references, gap naming, title consistency, no stale "36x" claims in reader-facing content. +**Why**: The previous session's crash left work in an uncertain state. The Architect had flagged Post 1 revisions as not persisting, so verification was essential. The consistency sweep is the final quality gate before publication. +**Result**: +- **Post 1**: All flagged revisions confirmed present (geopolitics condensed, keyword expansion noted, cascade scenario added, ending lightened, numbers updated, ideas reframed). The later Writer passes (numbers update, ideas reframing v2) re-applied the changes that were lost earlier. +- **9 fixes applied** across 3 documents: + - `00-series-overview.md`: Huawei core 12-person/23/96% -> 13-person/22/94% (line 88), Huawei 12-person -> 13-person (line 292), OAuth 13 -> 14 (line 243), Post 5 title updated to match actual title "Where 361 Drafts Converge (And Where They Don't)" (2 places), "36x" in reader-facing Part B replaced with "0.5% to 9.3%" framing (2 places) + - `state-of-ecosystem.md`: Huawei 12-person/23/96% -> 13-person/22/94%, human oversight 22 -> 30 drafts, OAuth 13 -> 14 + - `04-what-nobody-builds.md`: identity/auth 98 -> 108 +- **All reader-facing blog posts (01-08)** verified consistent on all key numbers +- **No stale "36x"** in any blog post or reader-facing content (only remains in internal Part A of series overview) +- **No stale "413"** anywhere +- **No stale "1,262"** in any headline position +**Surprise**: The inconsistencies were all in the architectural/support documents (series overview, state-of-ecosystem), not in the blog posts themselves. The Writer's systematic numbers-update pass on Posts 01-08 was thorough, but the support documents were updated piecemeal by multiple agents and accumulated drift. Lesson: when a numbers refresh happens, ALL documents need the same pass — not just the primary deliverables. + +### 2026-03-03 Writer — Final Editorial Polish (All 8 Posts) + +**What**: Final editorial polish pass across all 8 blog posts, series overview, and supporting documents. Systematic check of: opening hooks, Key Takeaways boxes, next-post teasers, data table consistency, cost figures, number alignment, cross-references, closing attributions, and artifacts from multiple editing passes. +**Why**: Task #4 — the last quality gate before publication. Six revision passes by different agents left the series with small inconsistencies that needed catching. +**Result**: 8 fixes applied: +- Post 7: Cost table corrected — 101 new drafts were analyzed with Sonnet (~$5.50), not Haiku (~$0.16). Total updated from $3.16 to ~$9. Subtitle and Key Takeaways updated to match. +- Post 7: Added "Next in this series" teaser linking to Post 8 — was the only post missing one. +- Post 2: Key Takeaways — removed percentage (62%) that was inconsistent with the 66-draft denominator, replaced with absolute count (43 drafts). +- Post 5: "Next in this series" teaser updated from "75 convergent ideas" to "628 cross-org convergent ideas" to match the series' primary convergence metric. +- Post 6: Subtitle updated from "75 convergent ideas" to "628 cross-org convergent ideas" for consistency. +- Post 6: Closing attribution removed internal file path reference that wouldn't make sense to external readers. +- Post 8: Softened Huawei draft count reference (69 → general) to avoid conflict with 66 used everywhere else. +- Series overview: Analysis cost $8.66 → ~$9 to match blog posts. +- Verified: all 8 posts have Key Takeaways boxes, all 7 non-final posts have "Next in this series" teasers, all posts have closing attributions, no stale numbers remain in reader-facing content. +**Surprise**: The Post 7 cost table was the most significant error — it showed the 101-draft analysis as Haiku at $0.16 when the Analyst's dev journal clearly documented using Sonnet at ~$5-6. This discrepancy was introduced by the Coder (who wrote Post 7) and survived two Architect review passes. The cost section is the least scrutinized part of a methodology post — a reminder that factual accuracy requires verifying numbers against source data, not just checking narrative flow. + +### 2026-03-03 Planner — 3-Sprint Roadmap + +**What**: Designed a 3-sprint plan covering Publication & Outreach (Sprint 1), arXiv Paper Update (Sprint 2), and Open-Source Release (Sprint 3). Read all key project artifacts: team prompt, dev journal, CLAUDE.md, arXiv paper (13 pages), CLI source (1,643 lines), pyproject.toml, and blog series word counts. +**Why**: The blog series is nearly publication-ready, the pipeline is complete, and 7 new features were built — but no work had been published, the paper is frozen at 260 drafts, and the tool isn't packaged for others. Needed a concrete roadmap to turn internal assets into external impact. +**Result**: `data/reports/sprint-plan.md` — 3 sprints, 17 tasks total: +- **Sprint 1** (3-5 days): 5 tasks. Finish editorial polish, choose platform, publish Post 1, social media/IETF outreach, fetch IETF 122 drafts, commit v0.3.0. Key insight: the data pipeline and blog numbers update are ALREADY DONE (reflected in the plan). +- **Sprint 2** (5-7 days): 6 tasks. Process new drafts, generate paper figures, update paper text (260->361+), add 1-2 new analysis sections (cross-org convergence, team blocs), submit to arXiv, continue blog publication. +- **Sprint 3** (7-10 days): 7 tasks. Tests (pytest, >=70% coverage), CI/CD (GitHub Actions), code cleanup (config portability, error handling, version bump), README rewrite, LICENSE (MIT), PyPI package, public repo setup. +- Includes cross-sprint dependency diagram, parallelization plan, risk register, and value-delivery timeline. +**Surprise**: The biggest planning insight was realizing Sprint 1 is much lighter than expected — the agent team already completed Tasks 1.1-1.3 from the original plan (pipeline, reports, blog numbers). Sprint 1 is now purely about publication and outreach, which means the blog could be live within 2-3 days. The bottleneck isn't data or writing — it's the publication platform decision. + +### 2026-03-03 Team Lead — Session 2 Wrap-Up + Sprint Decisions + +**What**: Recovered from a session crash and ran a 4-agent team (Architect, Writer, Planner + Team Lead) to finish the blog series and plan next steps. All 5 tasks completed: Post 1 verified, Post 8 expanded, consistency sweep (9 fixes), editorial polish (8 fixes), sprint plan written. +**Why**: Previous session crashed mid-work. Needed to verify nothing was lost, finish remaining polish, and plan the path from "blog series done" to "published, cited, and open-sourced." +**Result**: +- Blog series: **publication-ready** (8 posts, ~23K words, all numbers verified, all posts polished) +- Sprint plan: 3 sprints, 17 tasks at `data/reports/sprint-plan.md` +- Decisions made: **GitHub Pages** for publication, **staggered 1/day** cadence, **MIT license** +- Agent utilization: Architect (2 tasks, shut down), Writer (2 tasks, shut down), Planner (1 task, shut down) +**Surprise**: The crash recovery was seamless — the dev journal served exactly its intended purpose. Every agent could read the journal and understand the full state without any human explanation. The journal-as-coordination-mechanism is the strongest vindication of the CLAUDE.md journaling requirement. This should feature prominently in Post 8. diff --git a/data/reports/draft-family-consistency.md b/data/reports/draft-family-consistency.md new file mode 100644 index 0000000..898e98b --- /dev/null +++ b/data/reports/draft-family-consistency.md @@ -0,0 +1,138 @@ +# Draft Family Consistency Guide +*Lead artifact — governs ATD, HITL, AEPB, APAE. Updated at -01.* + +--- + +## 1. Canonical Term Table + +Every term that appears in more than one draft. The **Authoritative Draft** column is +where the definitive definition lives; all others MUST reference it normatively. + +| Term | Definition | Auth. Draft | Also used in | +|------|-----------|-------------|-------------| +| **Agent** | Autonomous software entity performing tasks, making decisions, communicating with peers or humans. | AEM §3 | ATD, HITL, AEPB, APAE | +| **Task** | Discrete unit of work performed by one agent, recorded as a single ECT node. | AEM §3 | ATD, HITL | +| **Workflow** | Set of tasks linked by dependencies, forming a DAG. Identified by ECT `wid` claim. | AEM §3 | ATD, AEPB | +| **DAG** | Directed acyclic graph of ECT parent references (`par` claims). Execution graph AND delegation graph (ACP-DAG-HITL). | AEM §3 | ATD, HITL, AEPB, APAE | +| **Checkpoint** | ECT node recording agent state before a consequential action, enabling rollback. | AEM §3 / ATD §4 | APAE | +| **HITL Point** | Position in workflow where human intervention is required or available. | AEM §3 | ATD, HITL | +| **Override** | Human-initiated command altering agent autonomous operation, taking precedence over agent decisions. | AEM §3 / HITL §3 | ATD | +| **Trust Score** | Float in [0.0, 1.0] representing assessed reliability of one agent by another. AIMD update model. | AEM §3 / APAE §4 | ATD (constraint), AEPB | +| **Protocol Binding** | Mapping between ecosystem semantics and a specific A2A communication protocol. | AEM §3 / AEPB §1 | ATD, HITL | +| **Assurance Level** | Degree of cryptographic/audit protection on ECTs: L1 (unsigned), L2 (signed JWT), L3 (signed + ledger). | AEM §3 (via ECT) | HITL, AEPB, APAE | +| **Assurance Profile** | Named configuration selecting which trust/verification/provenance mechanisms are required. | APAE §7 | AEM, AEPB | +| **Blast Radius** | Set of agents and systems affected by a single failure. | ATD §3 | — | +| **Circuit Breaker** | Mechanism preventing cascading failures by stopping requests to a failing downstream. | ATD §3/§6 | — | +| **Rollback** | Process of reverting agent actions and state to a prior checkpoint. | ATD §3/§7 | APAE | +| **Operator** | Human user authorized to issue override commands. | HITL §3 | APAE | +| **Approval Gate** | DAG node blocking workflow until human approves. | HITL §3/§8 | AEM | +| **Translation Gateway** | Service converting messages between two agent protocols; records each hop as ECT node. | AEPB §3/§6 | AEM | +| **Capability Document** | JSON object describing protocols an agent supports, served at `/.well-known/aepb`. | AEPB §3/§4 | — | +| **Trust Event** | Interaction outcome causing trust score adjustment; derived from ECTs. | APAE §3/§4 | — | +| **Behavior Specification** | Machine-readable declaration of permitted agent actions and constraints. | APAE §3/§5 | — | +| **Provenance Chain** | Sequence of ECT nodes recording how data was produced, transformed, consumed. | APAE §3/§6 | AEM | +| **Lifecycle State** | One of: `active`, `deprecated`, `draining`, `retired`. | AEPB §7 | — | + +--- + +## 2. ECT Extension Namespace Table + +All `ext` claim prefixes used across the family. Each companion draft owns one namespace. +AEM §4 (How ECT Extensions Work) is the authoritative cross-reference table. + +| Namespace | Owner | Example claims | +|-----------|-------|----------------| +| `atd.*` | ATD | `atd.reversible`, `atd.severity`, `atd.circuit_state`, `atd.rollback_uri`, `atd.ttl`, `atd.resource_cpu`, `atd.resource_memory_mb` | +| `hitl.*` | HITL | `hitl.level`, `hitl.operator_id`, `hitl.prior_state`, `hitl.scope`, `hitl.constraints`, `hitl.ttl`, `hitl.reason` | +| `aepb.*` | AEPB | `aepb.source_protocol`, `aepb.dest_protocol`, `aepb.gateway_id`, `aepb.translation_warnings`, `aepb.agent_version` | +| `apae.*` | APAE | `apae.trust_score`, `apae.confidence`, `apae.hops`, `apae.subject`, `apae.compliance_status`, `apae.data_source`, `apae.data_classification` | + +**Rule**: No draft may use another draft's `ext` namespace prefix without a normative +cross-reference to that draft. + +--- + +## 3. ACP-DAG-HITL Constraint Namespace Table + +All `constraints` field names used in ACP-DAG-HITL DAG node policies. + +| Namespace | Owner | Example fields | +|-----------|-------|----------------| +| `atd.*` | ATD | `atd.checkpoint_policy`, `atd.circuit_threshold`, `atd.circuit_window_s`, `atd.resource_cpu`, `atd.resource_memory_mb`, `atd.resource_timeout_s`, `atd.resource_priority` | +| `hitl.*` | HITL | `hitl.required_role`, `hitl.timeout_s`, `hitl.timeout_action` (via ACP-DAG-HITL natively) | +| `aepb.*` | AEPB | `aepb.allowed_source_protocols`, `aepb.allowed_dest_protocols`, `aepb.max_translation_hops` | +| `apae.*` | APAE | `apae.min_trust`, `apae.min_confidence`, `apae.assurance_profile` | + +--- + +## 4. `exec_act` Value Registry (Family) + +All `exec_act` values registered or requested by drafts in this family. +IANA registry requested by AEM; each companion draft populates it. + +| Value | Owner | Meaning | +|-------|-------|---------| +| `atd:checkpoint` | ATD | State snapshot before consequential action | +| `atd:error` | ATD | Error signal with severity and type | +| `atd:circuit_open` | ATD | Circuit breaker opened | +| `atd:circuit_close` | ATD | Circuit breaker returned to CLOSED | +| `atd:rollback_request` | ATD | Initiate rollback to checkpoint | +| `atd:rollback_result` | ATD | Result of rollback attempt | +| `atd:workflow_start` | ATD | Workflow began execution | +| `atd:workflow_complete` | ATD | Workflow reached terminal state | +| `hitl:override` | HITL | Human override command | +| `hitl:ack` | HITL | Agent acknowledgment of override | +| `hitl:resume` | HITL | Resume from PAUSE | +| `hitl:lift` | HITL | Lift any active override | +| `hitl:approval_request` | HITL | Workflow blocked at approval gate | +| `hitl:approval_granted` | HITL | Human approved continuation | +| `hitl:approval_denied` | HITL | Human denied continuation | +| `aepb:translate` | AEPB | Protocol translation hop | +| `aepb:translate_error` | AEPB | Translation failed | +| `aepb:shutdown` | AEPB | Agent completed graceful shutdown | +| `aepb:lifecycle_change` | AEPB | Agent lifecycle state transition | +| `apae:trust_assertion` | APAE | Sharing trust score for a peer | +| `apae:trust_revoke` | APAE | Revoking delegations due to low trust | +| `apae:compliance_check` | APAE | Behavior verification result | +| `apae:quarantine` | APAE | Agent quarantined (trust below floor) | + +--- + +## 5. Cross-Reference Rules + +Which drafts MUST cite which others, and for what claims. + +| Draft | MUST normatively cite | For what | +|-------|----------------------|---------| +| ATD | AEM | Terminology (agent, task, workflow, DAG, assurance level) | +| ATD | ECT (I-D.nennemann-wimse-ect) | Token format, DAG structure, `exec_act` registry | +| ATD | ACP-DAG-HITL (I-D.nennemann-agent-dag-hitl-safety) | Policy layer, HITL escalation | +| ATD | HITL (this family) | HITL escalation on irreversible error/failed rollback | +| HITL | AEM | Terminology | +| HITL | ECT | Override/ack as ECT nodes | +| HITL | ACP-DAG-HITL | Trigger conditions, required roles, decision records | +| AEPB | AEM | Terminology, layered architecture | +| AEPB | ECT | Translation ECT format, `Execution-Context` header | +| AEPB | ACP-DAG-HITL | Protocol constraints as node constraints | +| AEPB | HITL (this family) | HITL callback routing through protocol bindings | +| APAE | AEM | Assurance levels (L1/L2/L3), assurance profiles | +| APAE | ECT | Trust events from ECT outcomes, audit ledger at L3 | +| APAE | ACP-DAG-HITL | Trust thresholds and profile as node constraints | +| APAE | ATD | Checkpoint requirement in profiles; rollback as trust event | +| APAE | HITL (this family) | HITL requirement in Standard/Regulated profiles | + +--- + +## 6. Inconsistencies Found in -00 Drafts + +Issues identified during review; fixed in -01 versions. + +| # | Issue | Location | Fix in -01 | +|---|-------|----------|-----------| +| 1 | AEM §3 defines "Assurance Level" as "Defined by ECT" but does not list L1/L2/L3 inline; APAE §7 table is the clearest definition. | AEM -00 §3 | AEM -01 §3 adds inline L1/L2/L3 table. | +| 2 | ATD uses `atd.severity` levels (info/warning/error/critical) in §4 but no other draft references these values; they need to be in the canonical table. | ATD -00 §4 | Added to §4 normative list; noted in this guide. | +| 3 | HITL defines 4 override levels (PAUSE/CONSTRAIN/STOP/TAKEOVER) but AEM §4 table only calls them "HITL" without distinguishing levels. | AEM -00, HITL -00 | AEM -01 adds override level reference; HITL -01 adds an L0-L3 HITL intensity table to complement override levels. | +| 4 | AEPB well-known URI is `/.well-known/aepb` but HITL uses `/.well-known/hitl/...` — two different sub-path patterns. Fine, but should be noted for implementors. | AEPB -00, HITL -00 | Both -01s add a note about the well-known URI structure. | +| 5 | APAE references `apae.peer_trust_score` in a HITL rule (§4.5) but the term `peer_trust_score` is not defined as an `ext` claim elsewhere. | APAE -00 §4.5 | APAE -01 clarifies this is a runtime context value derived from the trust table, not an ECT claim. | +| 6 | ATD rollback endpoint is `POST /atd/rollback` (not a well-known URI), while HITL uses well-known URIs. Inconsistency in endpoint naming convention. | ATD -00 §7, HITL -00 §5 | ATD -01 updates rollback endpoint to `/.well-known/atd/rollback` for consistency. | +| 7 | No draft defines a `wf_id` / `wid` claim format. AEM mentions `wid` from ECT but ECT draft details need to be normatively cited. | AEM -00 §3 | All -01s add normative reference to ECT for `wid`. | diff --git a/data/reports/gaps.md b/data/reports/gaps.md index 15193f5..35ee24a 100644 --- a/data/reports/gaps.md +++ b/data/reports/gaps.md @@ -1,80 +1,629 @@ # Gap Analysis: IETF AI/Agent Draft Landscape -*Generated 2026-02-28 12:14 UTC — analyzing 260 drafts* +*Generated 2026-03-03 19:58 UTC — analyzing 361 drafts, 1780 technical ideas* -### 1. Agent Resource Management -**Severity:** CRITICAL -**Category:** autonomous netops -**Description:** No comprehensive framework for managing computational resources, memory, and processing power across distributed AI agents. Current drafts focus on communication but ignore how agents compete for and share limited resources in multi-agent environments. -**Evidence:** Real deployments will face resource contention, but no drafts address scheduling, quotas, or fair allocation mechanisms +## Overview -### 2. Agent Behavior Verification -**Severity:** CRITICAL -**Category:** AI safety/alignment -**Description:** No mechanisms to verify that deployed agents actually behave according to their declared policies or specifications. Gap between stated capabilities and runtime behavior validation. -**Evidence:** Only 36 safety drafts vs 260 total, and no mention of runtime behavior verification in technical ideas +This report identifies **12 gaps** — areas, problems, or technical challenges not adequately addressed by the current 361 IETF AI/agent drafts. Each gap is cross-referenced with related drafts and extracted technical ideas to show partial coverage. -### 3. Agent Error Recovery and Rollback -**Severity:** CRITICAL -**Category:** autonomous netops -**Description:** Missing standards for how agents handle and recover from errors, particularly cascading failures across agent networks. No rollback mechanisms for autonomous decisions gone wrong. -**Evidence:** Autonomous operations imply unsupervised decisions, but no error recovery mechanisms identified +| Severity | Count | +|----------|------:| +| **CRITICAL** | 3 | +| **HIGH** | 6 | +| **MEDIUM** | 3 | -### 4. Cross-Protocol Translation -**Severity:** HIGH -**Category:** A2A protocols -**Description:** With 92 A2A protocol drafts and high overlap, there's no standard way for agents using different communication protocols to interoperate. Missing universal translation layer or protocol negotiation mechanism. -**Evidence:** Multiple competing A2A protocols with no interoperability framework suggests fragmentation problem +### Safety Deficit -### 5. Agent Lifecycle Management -**Severity:** HIGH -**Category:** agent discovery/reg -**Description:** Missing standards for agent deployment, versioning, updates, and retirement. No clear protocols for how agents evolve or get replaced without disrupting dependent services. -**Evidence:** Registration covered but no mention of versioning, updates, or graceful shutdown procedures +Only **44** of 361 drafts address AI safety/alignment, while **120** focus on A2A protocols and **93** on autonomous operations. The ratio of capability-building to safety is roughly **4:1**. -### 6. Multi-Agent Consensus Mechanisms -**Severity:** HIGH -**Category:** A2A protocols -**Description:** No frameworks for how groups of AI agents reach consensus on conflicting decisions or priorities. Critical for autonomous systems that must coordinate without human intervention. -**Evidence:** Autonomous netops requires coordination but no consensus mechanisms appear in technical ideas list +--- -### 7. Human Override and Intervention -**Severity:** HIGH -**Category:** human-agent interaction -**Description:** Only 22 human-agent interaction drafts but no clear emergency override protocols. Missing standardized ways for humans to intervene in autonomous agent operations during critical situations. -**Evidence:** Disproportionately low human interaction focus (22 drafts) compared to autonomous operations (60 drafts) +## 1. Agent Behavior Verification -### 8. Cross-Domain Security Boundaries -**Severity:** HIGH -**Category:** agent identity/auth -**Description:** While identity management exists, missing frameworks for agents operating across security domains with different trust levels. No clear isolation or privilege escalation prevention. -**Evidence:** Cross-domain identity mentioned but no corresponding security boundary enforcement mechanisms +| | | +|---|---| +| **Severity** | CRITICAL | +| **Category** | AI safety/alignment | +| **Drafts in category** | 44 | -### 9. Dynamic Trust and Reputation -**Severity:** HIGH -**Category:** agent identity/auth -**Description:** Missing frameworks for agents to build, assess, and revoke trust relationships dynamically based on behavior history. Static authentication insufficient for long-running autonomous systems. -**Evidence:** Certificate authorities mentioned but no dynamic trust or reputation systems in technical ideas +While many drafts address agent identity and authentication, few tackle how to verify that an agent is actually behaving according to its declared capabilities and policies. There's a critical gap in runtime behavioral attestation and compliance monitoring mechanisms. -### 10. Agent Performance Monitoring -**Severity:** MEDIUM -**Category:** autonomous netops -**Description:** No standardized metrics or monitoring frameworks for tracking agent performance, efficiency, or drift over time. Missing observability standards for production agent deployments. -**Evidence:** ML traffic management only has 24 drafts but no performance monitoring in technical ideas +**Evidence:** High overlap in identity/auth (108 drafts) but only 44 drafts on safety/alignment, with no specific focus on behavioral verification -### 11. Agent Explainability Standards -**Severity:** MEDIUM -**Category:** AI safety/alignment -**Description:** No protocols for agents to explain their decisions or reasoning to other agents or humans. Critical gap for debugging and compliance in regulated environments. -**Evidence:** Low safety/alignment focus suggests governance requirements not fully addressed +### Related Drafts -### 12. Agent Data Provenance -**Severity:** MEDIUM -**Category:** data formats/interop -**Description:** No standards for tracking data lineage and provenance as information flows between agents. Critical for compliance and debugging in complex agent networks. -**Evidence:** 102 data format drafts but no provenance tracking mechanisms identified in technical ideas +**Keyword matches** (drafts mentioning gap topic): -## Summary by Severity +- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite +- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment +- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment +- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps +- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks +- [draft-ruan-spring-priority-flow-control-sid](https://datatracker.ietf.org/doc/draft-ruan-spring-priority-flow-control-sid/) (score 3.1) — SRv6 behavior extention for Flow Control in WAN -- **Critical:** 3 gaps -- **High:** 6 gaps -- **Medium:** 3 gaps \ No newline at end of file +**Top-rated in AI safety/alignment** (44 drafts): + +- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra +- [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) (4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and +- [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) (4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou +- [draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/) (4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb +- [draft-goswami-agentic-jwt](https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/) (4.5) — Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autonomous AI systems. Int + +### Partially Addressing Ideas + +53 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| Verifiable Agent Behavior Attestation | draft-birkholz-verifiable-agent-conversations | requirement | +| Behavioral Trustworthiness Assessment | draft-chen-agent-decoupled-authorization-model | mechanism | +| Multi-Vendor TEE Attestation (M-TACE) | draft-aylward-aiga-1 | mechanism | +| Multi-Vendor TEE Attestation (M-TACE) | draft-aylward-aiga-2 | mechanism | +| Cryptographic Identity Verification | draft-aylward-daap-v2 | mechanism | +| Behavioral Monitoring Framework | draft-aylward-daap-v2 | mechanism | +| Post-Discovery Authorization Handshake | draft-barney-caam | protocol | +| Five Enforcement Pillars with Typed Schemas | draft-berlinai-vera | pattern | + +*...and 45 more* + +--- + +## 2. Cross-Domain Agent Liability + +| | | +|---|---| +| **Severity** | CRITICAL | +| **Category** | Policy/governance | +| **Drafts in category** | 91 | + +When autonomous agents operate across organizational boundaries and cause harm or make decisions with legal implications, there's no standardized framework for liability attribution. The policy/governance drafts don't address cross-jurisdictional legal accountability. + +**Evidence:** 91 policy/governance drafts but legal liability for cross-domain autonomous actions remains unaddressed + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-diaconu-agents-authz-info-sharing](https://datatracker.ietf.org/doc/draft-diaconu-agents-authz-info-sharing/) (score 3.2) — Cross-Domain AuthZ Information sharing for Agents +- [draft-cui-dmsc-agent-cdi](https://datatracker.ietf.org/doc/draft-cui-dmsc-agent-cdi/) (score 3.0) — Cross-Domain Interoperability Framework for AI Agent Collaboration +- [draft-han-rtgwg-agent-gateway-intercomm-framework](https://datatracker.ietf.org/doc/draft-han-rtgwg-agent-gateway-intercomm-framework/) (score 3.6) — Agent Gateway Intercommunication Framework +- [draft-ni-a2a-ai-agent-security-requirements](https://datatracker.ietf.org/doc/draft-ni-a2a-ai-agent-security-requirements/) (score 3.7) — Security Requirements for AI Agents +- [draft-intellinode-ai-semantic-contract](https://datatracker.ietf.org/doc/draft-intellinode-ai-semantic-contract/) (score 3.2) — Semantic-Driven Traffic Shaping Contract for AI Networks +- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite + +**Top-rated in Policy/governance** (91 drafts): + +- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra +- [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) (4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and +- [draft-goswami-agentic-jwt](https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/) (4.5) — Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autonomous AI systems. Int +- [draft-wang-cats-odsi](https://datatracker.ietf.org/doc/draft-wang-cats-odsi/) (4.5) — Specifies framework for decentralized LLM inference across untrusted participants with layer-aware e +- [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/) (4.5) — Defines CDDL-based data format for verifiable agent conversation records using COSE signing. Support + +### Partially Addressing Ideas + +26 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| Cross-Domain Agent Identity Management | draft-abbey-scim-agent-extension | protocol | +| Multi-level Inference Protocol | draft-chuyi-nmrg-agentic-network-inference | protocol | +| Cross-Domain Agent Coordination | draft-chuyi-nmrg-agentic-network-inference | mechanism | +| Cross-Domain Agent Discovery | draft-cui-dmsc-agent-cdi | mechanism | +| Federated Agent Identity Framework | draft-cui-dmsc-agent-cdi | architecture | +| Agent Capability Negotiation Protocol | draft-cui-dmsc-agent-cdi | protocol | +| Federated Policy Enforcement | draft-cui-dmsc-agent-cdi | architecture | +| Cross-Domain Authorization Information Sharing | draft-diaconu-agents-authz-info-sharing | mechanism | + +*...and 18 more* + +--- + +## 3. Human Override Protocols + +| | | +|---|---| +| **Severity** | CRITICAL | +| **Category** | Human-agent interaction | +| **Drafts in category** | 30 | + +Critical gap in standardized protocols for humans to safely interrupt, override, or take control of autonomous agents in emergency situations. Only 30 drafts address human-agent interaction, with no focus on emergency takeover procedures. + +**Evidence:** Only 30 human-agent interaction drafts compared to 213+ autonomous operation drafts, with no emergency override standards + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-dhir-http-agent-profile](https://datatracker.ietf.org/doc/draft-dhir-http-agent-profile/) (score 4.2) — HTTP Agent Profile (HAP): Authenticated and Monetized Agent Traffic on the Web +- [draft-irtf-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-irtf-nmrg-llm-nm/) (score 3.5) — A Framework for LLM-Assisted Network Management with Human-in-the-Loop +- [draft-cui-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/) (score 4.1) — A Framework for LLM Agent-Assisted Network Management with Human-in-the-Loop +- [draft-zeng-opsawg-applicability-mcp-a2a](https://datatracker.ietf.org/doc/draft-zeng-opsawg-applicability-mcp-a2a/) (score 3.5) — When NETCONF Is Not Enough: Applicability of MCP and A2A for Advanced Network Ma +- [draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/) (score 4.2) — Network Digital Twin and Agentic AI based Architecture for AI driven Network Ope +- [draft-ietf-suit-firmware-encryption](https://datatracker.ietf.org/doc/draft-ietf-suit-firmware-encryption/) (score 3.7) — Encrypted Payloads in SUIT Manifests + +**Top-rated in Human-agent interaction** (30 drafts): + +- [draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/) (4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb +- [draft-ietf-aipref-vocab](https://datatracker.ietf.org/doc/draft-ietf-aipref-vocab/) (4.4) — Defines a standardized vocabulary for expressing preferences about how digital assets should be used +- [draft-dhir-http-agent-profile](https://datatracker.ietf.org/doc/draft-dhir-http-agent-profile/) (4.2) — Defines HTTP Agent Profile for authenticating agent traffic, separating human from agent traffic, an +- [draft-song-tsvwg-camp](https://datatracker.ietf.org/doc/draft-song-tsvwg-camp/) (4.2) — Proposes CAMP, a multipath transport protocol for interactive multimodal LLM systems that maintains +- [draft-liu-agent-operation-authorization](https://datatracker.ietf.org/doc/draft-liu-agent-operation-authorization/) (4.1) — Specifies framework for verifiable delegation of actions from humans to AI agents using JWT tokens. + +### Partially Addressing Ideas + +7 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| LLM-Human Collaborative Framework | draft-irtf-nmrg-llm-nm | architecture | +| CHEQ Protocol | draft-rosenberg-aiproto-cheq | protocol | +| Signed Confirmation Objects | draft-rosenberg-aiproto-cheq | mechanism | +| Cross-Protocol Integration Pattern | draft-rosenberg-aiproto-cheq | pattern | +| CHEQ Protocol | draft-rosenberg-cheq | protocol | +| Signed Decision Objects | draft-rosenberg-cheq | mechanism | +| Protocol Integration Pattern | draft-rosenberg-cheq | pattern | + +--- + +## 4. Agent Resource Exhaustion Protection + +| | | +|---|---| +| **Severity** | HIGH | +| **Category** | Autonomous netops | +| **Drafts in category** | 93 | + +Missing standardized mechanisms to prevent malicious or poorly designed agents from consuming excessive network, compute, or storage resources. Current drafts focus on traffic management but not on agent-specific resource quotas and enforcement. + +**Evidence:** 93 autonomous netops drafts and 73 ML traffic management drafts lack agent-specific resource protection mechanisms + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite +- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment +- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment +- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps +- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks +- [draft-jia-oauth-scope-aggregation](https://datatracker.ietf.org/doc/draft-jia-oauth-scope-aggregation/) (score 3.5) — OAuth 2.0 Scope Aggregation for Multi-Step AI Agent Workflows + +**Top-rated in Autonomous netops** (93 drafts): + +- [draft-cui-nmrg-llm-benchmark](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-benchmark/) (4.3) — Provides comprehensive evaluation framework for LLM-based network configuration agents. Includes emu +- [draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/) (4.2) — Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o +- [draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/) (4.1) — Defines task-oriented multi-agent framework for fault recovery in converged mobile networks. Targets +- [draft-cui-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/) (4.1) — Defines framework for collaborative network management between LLM agents and human operators. Intro +- [draft-jadoon-nmrg-agentic-ai-autonomous-networks](https://datatracker.ietf.org/doc/draft-jadoon-nmrg-agentic-ai-autonomous-networks/) (4.1) — Introduces architectural principles for integrating AI agents into IP protocol stack layers while pr + +### Partially Addressing Ideas + +40 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| Agent Resource Type | draft-abbey-scim-agent-extension | extension | +| Agentic Application Resource Type | draft-abbey-scim-agent-extension | extension | +| Collaborative Inference Acceleration (KDN) | draft-agent-gw | mechanism | +| Data and Agent Aware-Inference and Training Network (DA-ITN) | draft-akhavain-moussa-ai-network | architecture | +| Agent-to-Agent (A2A) Communication Paradigm | draft-an-nmrg-i2icf-cits | protocol | +| Network-Level Quarantine Protocol | draft-aylward-aiga-1 | protocol | +| Agent Task Negotiation | draft-cui-ai-agent-task | protocol | +| Multi-Agent Security Protection | draft-fu-nmop-agent-communication-framework | mechanism | + +*...and 32 more* + +--- + +## 5. Agent-Generated Data Provenance + +| | | +|---|---| +| **Severity** | HIGH | +| **Category** | Data formats/interop | +| **Drafts in category** | 145 | + +While 145 drafts address data formats for AI interop, there's insufficient attention to tracking the provenance and lineage of data generated by agents. This creates trust and auditability issues in agent-to-agent data exchanges. + +**Evidence:** 145 data format drafts with high overlap but no clear standards for agent-generated data provenance tracking + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-romanchuk-normative-admissibility](https://datatracker.ietf.org/doc/draft-romanchuk-normative-admissibility/) (score 3.4) — Normative Admissibility Framework for Agent Speech Acts +- [draft-li-semantic-routing-architecture](https://datatracker.ietf.org/doc/draft-li-semantic-routing-architecture/) (score 3.6) — Semantic Routing Architecture for AI Agents Communication +- [draft-cui-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/) (score 4.1) — A Framework for LLM Agent-Assisted Network Management with Human-in-the-Loop +- [draft-mpsb-agntcy-messaging](https://datatracker.ietf.org/doc/draft-mpsb-agntcy-messaging/) (score 2.6) — An Overview of Messaging Systems and Their Applicability to Agentic AI +- [draft-gaikwad-south-authorization](https://datatracker.ietf.org/doc/draft-gaikwad-south-authorization/) (score 3.7) — SOUTH: Stochastic Authorization for Agent and Service Requests +- [draft-abaris-aicdh](https://datatracker.ietf.org/doc/draft-abaris-aicdh/) (score 2.8) — AI Content Disclosure Header + +**Top-rated in Data formats/interop** (145 drafts): + +- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra +- [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) (4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L +- [draft-ietf-lake-app-profiles](https://datatracker.ietf.org/doc/draft-ietf-lake-app-profiles/) (4.6) — Defines canonical CBOR representation for EDHOC application profiles and coordination mechanisms for +- [draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/) (4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco +- [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/) (4.5) — Defines CDDL-based data format for verifiable agent conversation records using COSE signing. Support + +### Partially Addressing Ideas + +4 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| Context-Enhanced Training Data | draft-improving-data-quality-tags | extension | +| Training Data Provenance Claims | draft-messous-eat-ai | mechanism | +| Sentinel Evidence Package | draft-reilly-sentinel-protocol | architecture | +| AI Lifecycle Provenance Tracking | draft-reilly-sentinel-protocol | architecture | + +--- + +## 6. Agent Capability Degradation Handling + +| | | +|---|---| +| **Severity** | HIGH | +| **Category** | AI safety/alignment | +| **Drafts in category** | 44 | + +No standardized approaches for detecting and handling when an agent's capabilities degrade due to model drift, data corruption, or hardware issues. Systems need graceful degradation protocols rather than silent failures. + +**Evidence:** Only 44 safety/alignment drafts don't address capability degradation, while 213+ drafts assume stable agent performance + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite +- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment +- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment +- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps +- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks +- [draft-li-dmsc-inf-architecture](https://datatracker.ietf.org/doc/draft-li-dmsc-inf-architecture/) (score 3.1) — Dynamic Multi-agent Secured Collaboration Infrastructure Architecture + +**Top-rated in AI safety/alignment** (44 drafts): + +- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra +- [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) (4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and +- [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) (4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou +- [draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/) (4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb +- [draft-goswami-agentic-jwt](https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/) (4.5) — Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autonomous AI systems. Int + +### Partially Addressing Ideas + +45 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| Semantic Routing | draft-agent-gw | mechanism | +| Semantic Routing | draft-ainp-protocol | mechanism | +| Capability-based Discovery | draft-ainp-protocol | pattern | +| Complex Delegation Relationship Management | draft-chen-ai-agent-auth-new-requirements | architecture | +| Capability-Based Discovery Mechanism | draft-cui-ai-agent-discovery-invocation | mechanism | +| Agent Capability Negotiation Protocol | draft-cui-dmsc-agent-cdi | protocol | +| Agent Capability-Based Routing | draft-du-catalist-routing-considerations | mechanism | +| Agent Monitoring and Tracking | draft-fu-nmop-agent-communication-framework | mechanism | + +*...and 37 more* + +--- + +## 7. Multi-Agent Coordination Deadlocks + +| | | +|---|---| +| **Severity** | HIGH | +| **Category** | A2A protocols | +| **Drafts in category** | 120 | + +With 120+ A2A protocol drafts, there's insufficient attention to preventing deadlock situations where multiple agents create circular dependencies or resource conflicts. Missing are standardized deadlock detection and resolution mechanisms. + +**Evidence:** 120 A2A protocol drafts with high internal overlap but no systematic deadlock prevention frameworks + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-li-dmsc-mcps-agw](https://datatracker.ietf.org/doc/draft-li-dmsc-mcps-agw/) (score 3.5) — Multi-agent Collaboration Protocol Suite based on Agent Gateway +- [draft-li-dmsc-inf-architecture](https://datatracker.ietf.org/doc/draft-li-dmsc-inf-architecture/) (score 3.1) — Dynamic Multi-agent Secured Collaboration Infrastructure Architecture +- [draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/) (score 4.1) — Task-Oriented Multi-Agent Recovery Framework for High-Reliability in Converged M +- [draft-chang-agent-context-interaction](https://datatracker.ietf.org/doc/draft-chang-agent-context-interaction/) (score 2.9) — Agent Context Interaction Optimizations +- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps +- [draft-cui-ai-agent-task](https://datatracker.ietf.org/doc/draft-cui-ai-agent-task/) (score 3.0) — Task-oriented Coordination Requirements for AI Agent Protocols + +**Top-rated in A2A protocols** (120 drafts): + +- [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) (4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou +- [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) (4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L +- [draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/) (4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco +- [draft-chen-oauth-rar-agent-extensions](https://datatracker.ietf.org/doc/draft-chen-oauth-rar-agent-extensions/) (4.2) — Extends OAuth RAR with policy_context and lifecycle_binding members for AI agent environments. Enabl +- [draft-mallick-muacp](https://datatracker.ietf.org/doc/draft-mallick-muacp/) (4.2) — Resource-efficient messaging protocol specifically designed for constrained IoT/Edge devices with de + +### Partially Addressing Ideas + +11 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| Multi-Agent Task Coordination | draft-du-ai-agent-communication-6g-aspect | mechanism | +| AI Gateway | draft-fu-nmop-agent-communication-framework | architecture | +| DMSC Infrastructure Architecture | draft-li-dmsc-inf-architecture | architecture | +| Multi-agent Collaboration Protocol Suite | draft-li-dmsc-macp | protocol | +| Task-based Multi-Agent Coordination | draft-li-dmsc-mcps-agw | pattern | +| Cognitive Networking Substrate | draft-li-semantic-routing-architecture | architecture | +| Agent Communication Use Cases | draft-stephan-ai-agent-6g | pattern | +| Structured Responsibility and Traceability Architecture (SRTA) | draft-takagi-srta-trinity | architecture | + +*...and 3 more* + +--- + +## 8. Agent Privacy Preservation + +| | | +|---|---| +| **Severity** | HIGH | +| **Category** | Agent identity/auth | +| **Drafts in category** | 108 | + +Agents often process sensitive data but current drafts don't adequately address privacy-preserving computation, differential privacy, or secure multi-party computation for agent interactions. This is critical for deployment in regulated industries. + +**Evidence:** 108 identity/auth drafts focus on authentication but lack privacy preservation mechanisms for agent data processing + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite +- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment +- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment +- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps +- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks +- [draft-kale-agntcy-federated-privacy](https://datatracker.ietf.org/doc/draft-kale-agntcy-federated-privacy/) (score 3.2) — Privacy-Preserving Federated Learning Architecture for Multi-Tenant AI Agent Sys + +**Top-rated in Agent identity/auth** (108 drafts): + +- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra +- [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) (4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and +- [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) (4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou +- [draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/) (4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb +- [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) (4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L + +### Partially Addressing Ideas + +11 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| Agent Card Structure | draft-nandakumar-agent-sd-jwt | protocol | +| Pseudonymous Key Generation | draft-bradleylundberg-cfrg-arkg | mechanism | +| Privacy-Preserving Human Tokens | draft-dhir-http-agent-profile | mechanism | +| Cryptographic Erasure Compliance | draft-gaikwad-aps-profile | mechanism | +| Privacy-Respecting Capability Attestation | draft-huang-rats-agentic-eat-cap-attest | pattern | +| Differential Privacy for Agent Models | draft-kale-agntcy-federated-privacy | mechanism | +| Agent Identity Preservation | draft-liu-oauth-a2a-profile | pattern | +| Inference-Time Data Access Policy Claims | draft-messous-eat-ai | mechanism | + +*...and 3 more* + +--- + +## 9. Agent Firmware/Model Update Security + +| | | +|---|---| +| **Severity** | HIGH | +| **Category** | Model serving/inference | +| **Drafts in category** | 42 | + +While model serving is addressed in 42 drafts, there's insufficient focus on secure update mechanisms for agent models and firmware. Missing are standards for cryptographically verified, rollback-capable agent updates. + +**Evidence:** 42 model serving drafts but no comprehensive security standards for agent software/model updates + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite +- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment +- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment +- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps +- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks +- [draft-ietf-tls-extended-key-update](https://datatracker.ietf.org/doc/draft-ietf-tls-extended-key-update/) (score 4.2) — Extended Key Update for Transport Layer Security (TLS) 1.3 + +**Top-rated in Model serving/inference** (42 drafts): + +- [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) (4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L +- [draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/) (4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco +- [draft-calabria-bmwg-ai-fabric-inference-bench](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/) (4.5) — Defines benchmarking methodology for AI inference network fabrics. Establishes KPIs and test procedu +- [draft-wang-cats-odsi](https://datatracker.ietf.org/doc/draft-wang-cats-odsi/) (4.5) — Specifies framework for decentralized LLM inference across untrusted participants with layer-aware e +- [draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/) (4.2) — Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o + +### Partially Addressing Ideas + +79 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| Multi-layered Security Architecture | draft-aylward-daap-v2 | architecture | +| VERA Zero Trust Reference Architecture | draft-berlinai-vera | architecture | +| Evidence-Based Maturity Runtime | draft-berlinai-vera | mechanism | +| Five Enforcement Pillars with Typed Schemas | draft-berlinai-vera | pattern | +| AI Agent Structured Threat Model | draft-berlinai-vera | requirement | +| Cryptographic Proof-Based Autonomy | draft-berlinai-vera | mechanism | +| Pseudonymous Key Generation | draft-bradleylundberg-cfrg-arkg | mechanism | +| Multi-Agent Security Protection | draft-fu-nmop-agent-communication-framework | mechanism | + +*...and 71 more* + +--- + +## 10. Real-time Agent Debugging + +| | | +|---|---| +| **Severity** | MEDIUM | +| **Category** | Other AI/agent | +| **Drafts in category** | 26 | + +Missing standardized protocols for debugging autonomous agents in production environments. When agents make unexpected decisions, there are no standard interfaces for real-time introspection without disrupting operations. + +**Evidence:** 26 other AI/agent drafts suggest various approaches but no standardized debugging protocols for production agents + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-an-nmrg-i2icf-cits](https://datatracker.ietf.org/doc/draft-an-nmrg-i2icf-cits/) (score 3.7) — Interface to In-Network Computing Functions for Cooperative Intelligent Transpor +- [draft-zhao-detnet-enhanced-use-cases](https://datatracker.ietf.org/doc/draft-zhao-detnet-enhanced-use-cases/) (score 3.2) — Enhanced Use Cases for Scaling Deterministic Networks +- [draft-zhang-rvp-problem-statement](https://datatracker.ietf.org/doc/draft-zhang-rvp-problem-statement/) (score 3.5) — Problem Statements and Requirements of Real-Virtual Agent Protocol (RVP): Commun +- [draft-yuan-rtgwg-traffic-agent-usecase](https://datatracker.ietf.org/doc/draft-yuan-rtgwg-traffic-agent-usecase/) (score 3.7) — Use cases of the AI Network Traffic Optimization Agent +- [draft-hong-nmrg-agenticai-ps](https://datatracker.ietf.org/doc/draft-hong-nmrg-agenticai-ps/) (score 3.0) — Motivations and Problem Statement of Agentic AI for network management +- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite + +**Top-rated in Other AI/agent** (26 drafts): + +- [draft-calabria-bmwg-ai-fabric-inference-bench](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/) (4.5) — Defines benchmarking methodology for AI inference network fabrics. Establishes KPIs and test procedu +- [draft-ietf-tls-ecdhe-mlkem](https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/) (4.4) — Defines hybrid post-quantum key agreement mechanisms for TLS 1.3 that combine ML-KEM with traditiona +- [draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/) (4.2) — Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o +- [draft-an-nmrg-i2icf-cits](https://datatracker.ietf.org/doc/draft-an-nmrg-i2icf-cits/) (3.7) — Defines framework for orchestrating In-Network Computing Functions in Cooperative Intelligent Transp +- [draft-cui-nmrg-auto-test](https://datatracker.ietf.org/doc/draft-cui-nmrg-auto-test/) (3.6) — Framework for AI-assisted network protocol testing using LLMs and automated test generation. Defines + +### Partially Addressing Ideas + +23 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| A2A Protocol Transport over MOQT | draft-a2a-moqt-transport | protocol | +| QUIC-based Publish/Subscribe for AI Agents | draft-a2a-moqt-transport | mechanism | +| Streaming Capabilities Integration | draft-a2a-moqt-transport | mechanism | +| Action-Based Authorization | draft-aylward-aiga-2 | mechanism | +| Multi-layered Security Architecture | draft-aylward-daap-v2 | architecture | +| Behavioral Monitoring Framework | draft-aylward-daap-v2 | mechanism | +| Context-Aware Task Scheduling | draft-cui-ai-agent-task | mechanism | +| Real-Time Task Adaptability | draft-cui-ai-agent-task | requirement | + +*...and 15 more* + +--- + +## 11. Cross-Protocol Agent Migration + +| | | +|---|---| +| **Severity** | MEDIUM | +| **Category** | A2A protocols | +| **Drafts in category** | 120 | + +No standardized mechanisms for migrating agent state and context when moving between different A2A protocols or infrastructure providers. This creates vendor lock-in and limits agent mobility. + +**Evidence:** 120 A2A protocol drafts with high overlap suggest competing approaches but no migration standards between them + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (score 4.8) — Verifiable Operations Ledger and Trace (VOLT) Protocol +- [draft-han-ai-agent-impact-infra](https://datatracker.ietf.org/doc/draft-han-ai-agent-impact-infra/) (score 2.3) — The Impact of AI Agent to Network Infrastructure +- [draft-narajala-ans](https://datatracker.ietf.org/doc/draft-narajala-ans/) (score 4.2) — Agent Name Service (ANS): A Universal Directory for Secure AI Agent Discovery an +- [draft-ietf-emu-eap-edhoc](https://datatracker.ietf.org/doc/draft-ietf-emu-eap-edhoc/) (score 3.2) — Using the Extensible Authentication Protocol (EAP) with Ephemeral Diffie-Hellman +- [draft-howe-sipcore-mcp-extension](https://datatracker.ietf.org/doc/draft-howe-sipcore-mcp-extension/) (score 3.7) — SIP Extension for Model Context Protocol (MCP) +- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite + +**Top-rated in A2A protocols** (120 drafts): + +- [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) (4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou +- [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) (4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L +- [draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/) (4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco +- [draft-chen-oauth-rar-agent-extensions](https://datatracker.ietf.org/doc/draft-chen-oauth-rar-agent-extensions/) (4.2) — Extends OAuth RAR with policy_context and lifecycle_binding members for AI agent environments. Enabl +- [draft-mallick-muacp](https://datatracker.ietf.org/doc/draft-mallick-muacp/) (4.2) — Resource-efficient messaging protocol specifically designed for constrained IoT/Edge devices with de + +### Partially Addressing Ideas + +3 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| Transport-Independent Attestation Format | draft-drake-email-tpm-attestation | extension | +| Cross-Protocol Integration Pattern | draft-rosenberg-aiproto-cheq | pattern | +| Agent Mobility with IPv6 MIPv6 | draft-yc-ipv6-for-ioa | mechanism | + +--- + +## 12. Agent Energy Consumption Optimization + +| | | +|---|---| +| **Severity** | MEDIUM | +| **Category** | ML traffic mgmt | +| **Drafts in category** | 73 | + +Missing standards for energy-aware agent deployment and operation. As AI workloads are energy-intensive, there's no framework for agents to optimize their energy consumption or for infrastructure to enforce energy budgets. + +**Evidence:** 73 ML traffic management drafts focus on performance but lack energy consumption considerations for sustainable AI deployment + +### Related Drafts + +**Keyword matches** (drafts mentioning gap topic): + +- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite +- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment +- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment +- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps +- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks +- [draft-ahc-green-smartpdu-yang](https://datatracker.ietf.org/doc/draft-ahc-green-smartpdu-yang/) (score 2.9) — A YANG Model for SmartPDU Monitoring and Control + +**Top-rated in ML traffic mgmt** (73 drafts): + +- [draft-calabria-bmwg-ai-fabric-inference-bench](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/) (4.5) — Defines benchmarking methodology for AI inference network fabrics. Establishes KPIs and test procedu +- [draft-dhir-http-agent-profile](https://datatracker.ietf.org/doc/draft-dhir-http-agent-profile/) (4.2) — Defines HTTP Agent Profile for authenticating agent traffic, separating human from agent traffic, an +- [draft-calabria-bmwg-ai-fabric-terminology](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-terminology/) (4.2) — Defines comprehensive benchmarking terminology for AI network fabrics including collective communica +- [draft-li-spring-rdma-multicast-over-srv6](https://datatracker.ietf.org/doc/draft-li-spring-rdma-multicast-over-srv6/) (4.2) — Specifies SRv6 extensions for RDMA multicast delivery with new End.MT behavior and ACK/NACK aggregat +- [draft-song-tsvwg-camp](https://datatracker.ietf.org/doc/draft-song-tsvwg-camp/) (4.2) — Proposes CAMP, a multipath transport protocol for interactive multimodal LLM systems that maintains + +### Partially Addressing Ideas + +17 extracted ideas touch on this gap: + +| Idea | Draft | Type | +|------|-------|------| +| SmartPDU Telemetry Framework | draft-ahc-green-smartpdu-yang | mechanism | +| Agent Context Distribution | draft-chang-agent-context-interaction | mechanism | +| Context Distribution Optimization Procedures | draft-chang-agent-context-interaction | protocol | +| Schema Deduplication via JSON References | draft-chang-agent-token-efficient | mechanism | +| Agentic Data Optimization Layer (ADOL) | draft-chang-agent-token-efficient | architecture | +| Information Exchange Efficiency | draft-chuyi-nmrg-agentic-network-inference | mechanism | +| Vector Index Workload Optimization | draft-gaikwad-aps-profile | pattern | +| Collaboration Tunnel Protocol (TCT) | draft-jurkovikj-collab-tunnel | protocol | + +*...and 9 more* + +--- + +## Cross-Cutting Analysis + +### Gaps by Category + +| Category | Drafts | Gaps | Gap Topics | +|----------|-------:|-----:|------------| +| a2a protocols | 120 | 2 | Multi-Agent Coordination Deadlocks; Cross-Protocol Agent Migration | +| agent identity/auth | 108 | 1 | Agent Privacy Preservation | +| ai safety/alignment | 44 | 2 | Agent Behavior Verification; Agent Capability Degradation Handling | +| autonomous netops | 93 | 1 | Agent Resource Exhaustion Protection | +| data formats/interop | 145 | 1 | Agent-Generated Data Provenance | +| human-agent interaction | 30 | 1 | Human Override Protocols | +| ml traffic mgmt | 73 | 1 | Agent Energy Consumption Optimization | +| model serving/inference | 42 | 1 | Agent Firmware/Model Update Security | +| other ai/agent | 26 | 1 | Real-time Agent Debugging | +| policy/governance | 91 | 1 | Cross-Domain Agent Liability | + +## Recommendations + +Based on the gap analysis, the highest-impact areas for new standardization work: + +1. **Runtime behavior verification** — The most critical safety gap. Agents declare policies but nothing validates compliance at runtime. +2. **Error recovery and rollback** — Autonomous operations need standardized failure handling before real deployment at scale. +3. **Protocol interoperability layer** — 92 competing A2A protocols need a translation/negotiation framework to avoid fragmentation. +4. **Dynamic trust systems** — Static certificates cannot scale to long-running agent ecosystems. Trust must be earned and revocable. +5. **Human emergency override** — The 7:1 ratio of autonomous capability to human oversight drafts is concerning for production deployments. \ No newline at end of file diff --git a/data/reports/holistic-agent-ecosystem-draft-outlines.md b/data/reports/holistic-agent-ecosystem-draft-outlines.md new file mode 100644 index 0000000..e161679 --- /dev/null +++ b/data/reports/holistic-agent-ecosystem-draft-outlines.md @@ -0,0 +1,268 @@ +# Holistic Agent Ecosystem: Analysis and Draft Outlines + +*Derived from IETF draft analyzer gaps (12), overlap matrix (260 drafts), and 1,262 extracted ideas. Goal: a unified agent ecosystem with DAG orchestration and HITL built in, agnostic and extensible, applicable to both fast/relaxed (e.g. K8s) and regulated/proof-heavy environments.* + +--- + +## 1. Vision Summary + +| Pillar | Meaning | Gap / Overlap Evidence | +|--------|---------|------------------------| +| **DAG** | Task/workflow as directed acyclic graph: dependencies, execution order, checkpoints, rollback along the graph. | **Gap 3** (Error Recovery/Rollback), **Gap 1** (Resource Management — scheduling/quotas). Ideas: "Task-Oriented Multi-Agent Recovery", "Working Memory", "Execution Context Token (ECT)". No single draft defines *agent task DAG* as a first-class construct. | +| **HITL** | Human-in-the-loop as a first-class primitive: approval gates, escalation, emergency override, explainability. | **Gap 7** (Human Override); only 22 human-agent drafts vs 60 autonomous netops. Ideas: CHEQ (confirmation), "Human Oversight Requirements", "Level 4 Autonomous Network Architecture". | +| **Agnostic + extensible** | Protocol- and transport-agnostic; works over any A2A protocol; extensible via profiles. | **Gap 4** (Cross-Protocol Translation) — 92 A2A drafts, no universal translation/negotiation. Overlap matrix: high within-category similarity (0.75+) but no interoperability layer. | +| **Dual regime** | Same model works in "fast/relaxed" (K8s, dev) and "regulated" (proofs, attestation, audit). | **Gaps 2, 8, 9, 12**: Behavior verification, cross-domain security, dynamic trust, data provenance. Ideas: STAMP, DAAP, verifiable conversations, ECT — all additive assurance. | + +--- + +## 2. How This Fits With WIMSE and ECT (Differentiation) + +**SPIFFE** (CNCF) defines the *identifier* for a workload (`spiffe://trust-domain/path`) and its ecosystem (SVIDs, etc.). So **"who" at the identifier level is already SPIFFE** (or similar URI schemes). + +**WIMSE** (Workload Identity in a *Multi System Environment* — [draft-ietf-wimse-arch](https://datatracker.ietf.org/doc/draft-ietf-wimse-arch/)) is the **IETF architecture** for how workload identity and **security context** are conveyed and used across systems. It is **not only "who"**. It covers: + +- **Workload identity**: identifier (WIMSE uses a URI; SPIFFE ID is one conforming example), credentials (WIT, X.509), trust domains. +- **Security context**: "information needed for a workload to perform its function" — authorization, accounting, auditing, user info, what processing has already happened, propagation along the call chain. +- **Identity proxy**: inspect, replace, or augment identity and context (e.g. at gateways). +- **Use cases**: bootstrapping, service auth, **authorization**, **audit trails**, **security context establishment and propagation**, delegation, cross-boundary, **AI/ML intermediaries**. + +So: **SPIFFE = identifier (who). WIMSE = architecture for conveying identity + security context in protocols (who + context + propagation + authz + audit).** + +**ECT** (Execution Context Tokens), in [draft-nennemann-wimse-ect](https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/), is a **JWT-based extension** that records *what* each task did: each ECT is a signed record of one task, linked to predecessors via a DAG (`par` / `jti`). ECT reuses the WIMSE signing model (same key as WIT) and adds: token format, HTTP transport (Execution-Context header), DAG validation, audit-ledger interface. So **ECT = execution evidence (what happened)** built on WIMSE identity/signing. + +### Fit in (recommended) + +Our ecosystem drafts **do not compete with SPIFFE, WIMSE, or ECT**. They **build on** them: + +| Layer | SPIFFE / WIMSE / ECT | Our drafts (AEM, AERR, HEOP, DATS, CPAT, etc.) | +|-------|----------------------|-----------------------------------------------| +| **Identifier** | SPIFFE (or URI): "who" | We use existing identifiers (e.g. `iss` / SPIFFE ID in ECT). | +| **Identity + context** | WIMSE: credentials, security context, propagation, authz, audit | We assume WIMSE (or equivalent) for auth and context; we do not redefine it. | +| **Evidence** | ECT: token format, DAG linkage, signing, audit | We **use ECT as the carrier**: checkpoints, errors, overrides, trust assertions, translation hops are **new ECT node types** (new `exec_act` values and optional claims). | +| **Semantics** | ECT: “a task happened, here are parents” | We define **orchestration and operations**: dependencies, checkpoints, rollback protocol, HITL points, resource hints, assurance profiles, protocol binding. | + +Concretely: + +- **AERR** (Error Recovery/Rollback): Checkpoints, errors, and rollback results are **ECTs** with specific `exec_act` and extension claims. Rollback walks the **ECT DAG**; no second DAG format. +- **HEOP** (Human Emergency Override): Override and acknowledgment are **ECTs** that link into the same ECT DAG for audit. +- **DATS** (Dynamic Trust): Trust events are derived from **ECT outcomes**; trust assertions are **ECTs**. +- **CPAT** (Cross-Protocol Translation): Each translation hop produces an **ECT**, so the cross-protocol path is one continuous ECT DAG. +- **Agent DAG HITL** ([draft-nennemann-agent-dag-hitl-safety](https://datatracker.ietf.org/doc/draft-nennemann-agent-dag-hitl-safety/)): Policy for when HITL is required; decisions and overrides still record as ECTs. + +So the **execution model** (DAG of tasks, checkpoints, rollback, HITL) is **implemented using ECT** as the token and DAG format. We add **semantics and protocols** on top, not a new token or DAG structure. + +### Differentiate (what we add) + +| Concern | WIMSE/ECT | Our ecosystem | +|---------|-----------|----------------| +| **DAG** | ECT defines *how* nodes link (`par`, `jti`, validation). | We define *what* a node means (task, checkpoint, error, override, trust, translation), *when* to create them, and *how* to act on them (rollback, circuit breaker, HITL flow). | +| **Orchestration** | Out of scope for ECT. | Execution order, resource hints, scheduling, lifecycle; can be described in a **declarative workflow** (e.g. JSON) that is *realized* as ECTs at runtime. | +| **Recovery** | Not in ECT. | AERR: checkpoint placement, error propagation, rollback protocol, circuit breaker. | +| **HITL** | Not in ECT. | HEOP + Agent DAG HITL: approval gates, override, escalation; all recorded as ECTs. | +| **Trust / assurance** | ECT provides signed, linked evidence. | DATS, APAE: how to *derive* trust from ECT outcomes; assurance levels and profiles. | +| **Interop** | Single token format (ECT over HTTP). | CPAT, AEPB: translation between *protocols*; each hop still emits ECTs so the cross-protocol run is one ECT DAG. | + +In other words: **SPIFFE = who (identifier). WIMSE = identity + security context + propagation + authz + audit. ECT = execution evidence (DAG of signed records). Our work = orchestration, recovery, HITL, trust, and interop that consume and produce that evidence.** + +### Implications for the draft family + +- **Draft A (AEM)**: Should state that the **reference implementation of the execution model** is ECT: “The ecosystem uses Execution Context Tokens (ECT) [I-D.nennemann-wimse-ect] as the standard representation of task execution and DAG linkage; extensions (e.g. AERR, HEOP) define additional ECT node types and procedures.” +- **Draft B (ATD)**: Either (1) **ATD = abstract model** (nodes, edges, checkpoints, rollback set) with “ECT is one binding” and optional JSON/CBOR for *declarative* workflow definition, or (2) **ATD = semantics of ECT usage** (when to emit which ECT types, execution semantics, resource hints) without a second wire format. Prefer (2) to avoid overlap with ECT and keep one DAG format. +- **Drafts C, D, E (HITL, AEPB, APAE)**: Same pattern: define procedures and semantics; **record all significant events as ECTs** so the full run is one auditable ECT DAG. Reference SPIFFE/WIMSE for identity and context, and ECT for format and validation. + +### One-sentence positioning + +**“SPIFFE gives the identifier; WIMSE gives the architecture for identity and security context; ECT gives the DAG evidence format. Our drafts specify how to use that format for orchestration, recovery, human oversight, trust, and cross-protocol interop, so the same stack works from relaxed to fully regulated.”** + +--- + +## 3. How the Data Supports This + +### From gap analysis +- **Critical**: Resource management (scheduling/quotas for DAG nodes), behavior verification (runtime proofs in regulated mode), error recovery/rollback (DAG-based undo). +- **High**: Cross-protocol translation (agnostic layer), human override (HITL), lifecycle (versioning/retirement of workflows), multi-agent consensus (coordination in DAG), cross-domain security and dynamic trust (regulated regime). +- **Medium**: Monitoring, explainability (HITL), provenance (regulated regime). + +### From overlap +- **A2A protocols** (92 drafts, avg pairwise sim 0.76): Heavy duplication; a thin *ecosystem layer* on top of "any A2A" would reduce friction. +- **Agent discovery/reg** (57) and **identity/auth** (98): Discovery and identity are shared concerns; the ecosystem draft can reference ANS, ADL, OAuth RAR, etc., without mandating one. +- **Human-agent** (22) is underweight; HITL should be a first-class extension point in the ecosystem document. + +### From ideas (sample) +- **DAG/context**: "Working Memory", "Execution Context Token", "Task-Oriented Multi-Agent Recovery Framework", "State Consistency Management", "Checkpoint". +- **HITL**: "CHEQ protocol", "Human Oversight Requirements", "Human-in-the-Loop", "Emergency Override". +- **Agnostic**: "Automated Protocol Adaptation", "Semantic Routing", "Protocol Adapter Layer", "Cross-Protocol Translation". +- **Dual regime**: "Cryptographic Proof-Based Autonomy", "Verifiable Agent Behavior Attestation", "Trust Scoring", "Behavioral Monitoring", "Data Provenance". + +--- + +## 4. Proposed Draft Family + +Five drafts that together define the holistic ecosystem. Each fills gaps and references existing work (see landscape) to avoid duplication. + +--- + +### Draft A: **Agent Ecosystem Model (AEM) — Architecture and Terminology** + +**Role**: Informational. Single source of concepts (DAG, HITL, assurance levels, protocol agnosticism) so other drafts and WGs share vocabulary. + +**Gaps addressed**: Cross-cutting; reduces overlap by establishing a common model. + +**Outline**: + +1. **Introduction** — Need for a unified model across 260+ drafts; scope (orchestration, control, assurance); non-goals (no new wire protocol). +2. **Terminology** — Agent, task, workflow, DAG, node, checkpoint, HITL point, assurance level, ecosystem layer, protocol binding. +3. **Architectural Model** — Ecosystem layer above protocol bindings (A2A, MCP, etc.); DAG as the execution model; HITL as optional nodes; assurance as an orthogonal axis. +4. **Assurance Levels** — Level 0 (best-effort, no proofs), Level 1 (audit trail), Level 2 (attestation/verification), Level 3 (full provenance and compliance). Same DAG/HITL model at every level. +5. **Protocol Agnosticism** — How the ecosystem layer binds to existing protocols (reference ANS, ADL, MCP, STAMP, DAAP, etc.); extension points. +6. **Security Considerations** — Trust boundaries; what each assurance level guarantees. +7. **IANA Considerations** — None or registry for assurance level identifiers. + +**Target**: Individual or NMOP; **Status**: Informational. +**Related drafts**: draft-rosenberg-aiproto-framework, draft-zyyhl-agent-networks-framework, draft-nennemann-wimse-ect, draft-aylward-daap-v2. + +--- + +### Draft B: **Agent Task DAG (ATD) — Execution Model and Checkpoints** + +**Role**: Define the *semantics* of the DAG execution model (when to emit which ECT types, execution order, checkpoints, rollback) **using ECT as the token and DAG format**. Does not define a second wire format; avoids overlap with [draft-nennemann-wimse-ect](https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/). + +**Gaps addressed**: **Gap 1** (Resource Management — scheduling/quotas per node), **Gap 3** (Error Recovery and Rollback). + +**Outline**: + +1. **Introduction** — Why DAG (ordering, dependencies, safe rollback); relationship to AEM; dependency on ECT for token format and DAG structure. +2. **Terminology** — Node, edge, root, leaf, checkpoint, rollback set, blast radius (aligned with ECT and AERR). +3. **Execution Semantics** — Topological order; node states (pending, running, done, failed, rolled back); when agents MUST/SHOULD emit ECTs; checkpoint placement (per ECT or per subgraph, per AERR). +4. **Resource Hints and Quotas** — Optional resource claims (e.g. in ECT `ext` or workflow descriptor); integration with scheduling (K8s, etc.); fair allocation when agents compete (gap 1). +5. **Checkpoint and Rollback** — Reference AERR for checkpoint/error/rollback ECT types; rollback protocol: walk ECT DAG backwards; circuit-breaker to contain cascading failure. +6. **Optional: Declarative Workflow** — JSON/CBOR for *pre-run* workflow definition (nodes, dependencies, HITL slots, resource hints); at runtime this is realized as ECTs. Enables tooling and portability without replacing ECT. +7. **Security Considerations** — Integrity of ECT DAG and checkpoints; who may trigger rollback. +8. **IANA Considerations** — None if ECT registry is used for node/action types; or registry for workflow descriptor media type. + +**Target**: NMOP or individual; **Status**: Standards-track or Experimental. +**Related drafts**: draft-nennemann-wimse-ect, draft-aerr-agent-error-recovery-rollback, draft-yue-anima-agent-recovery-networks, draft-li-dmsc-macp. + +--- + +### Draft C: **Human-in-the-Loop (HITL) Primitives for Agent Ecosystems** + +**Role**: Standardize HITL as first-class: approval gates, escalation, emergency override, and explainability hooks. + +**Gaps addressed**: **Gap 7** (Human Override and Intervention), **Gap 11** (Agent Explainability). + +**Outline**: + +1. **Introduction** — Need for HITL in autonomous systems; design goals (minimal friction in relaxed mode, mandatory in regulated). +2. **Terminology** — HITL point, approval gate, escalation, override, explainability token. +3. **HITL Point Model** — Placement in DAG (before/after node, or as a node); types: approval required, notification only, override-only (emergency). +4. **Approval and Escalation** — Request/response format (reference OAuth, CHEQ); timeouts and escalation paths; revocation of approval. +5. **Emergency Override** — Signal to halt or rollback; scope (single node, subgraph, full DAG); authentication and audit (reference DAAP, STAMP). +6. **Explainability** — Optional explainability token (summary, evidence, link to verifiable conversation); required at higher assurance levels. +7. **Binding to AEM** — How HITL integrates with Draft A assurance levels; optional in Level 0, required in Level 2+ for critical paths. +8. **Security Considerations** — Who can approve/override; replay and revocation. +9. **IANA Considerations** — None or registry for HITL point types. + +**Target**: NMOP or OPS; **Status**: Standards-track or Experimental. +**Related drafts**: draft-rosenberg-aiproto-cheq, draft-rosenberg-cheq, draft-cui-nmrg-llm-nm, draft-irtf-nmrg-llm-nm, draft-aap-oauth-profile, draft-birkholz-verifiable-agent-conversations. + +--- + +### Draft D: **Agent Ecosystem Protocol Binding (AEPB) — Agnostic Interop Layer** + +**Role**: Define how the ecosystem layer (AEM + ATD + HITL) binds to existing A2A and discovery protocols; translation/negotiation so different protocols interoperate. + +**Gaps addressed**: **Gap 4** (Cross-Protocol Translation), **Gap 5** (Lifecycle — versioning/retirement). + +**Outline**: + +1. **Introduction** — Proliferation of 92 A2A protocols; need for a binding layer that preserves ecosystem semantics (DAG, HITL) over any protocol. +2. **Terminology** — Protocol binding, translation, negotiation, capability advertisement. +3. **Capability Advertisement** — How agents/gateways advertise support for AEM/ATD/HITL and assurance levels (reference ADL, ANS, DNS-SD). +4. **Binding Requirements** — What a protocol must provide: task invocation, dependency ordering, checkpoint/rollback signals, HITL callbacks. Mapping to MCP, A2A over HTTP, A2A over MOQT, etc. +5. **Translation and Negotiation** — When two agents speak different protocols: gateway or negotiation (e.g. common subset); minimal translation schema (intent, result, error). +6. **Lifecycle** — Versioning of DAG and agents; graceful shutdown and drain; retirement without breaking dependents (gap 5). +7. **Security Considerations** — Trust of translators; integrity across protocol boundaries. +8. **IANA Considerations** — Registry for protocol binding identifiers. + +**Target**: NMOP or individual; **Status**: Experimental. +**Related drafts**: draft-agent-gw, draft-narajala-ans, draft-nederveld-adl, draft-ainp-protocol, draft-mallick-muacp, draft-a2a-moqt-transport. + +--- + +### Draft E: **Assurance Profiles for Agent Ecosystems (APAE) — Dual Regime** + +**Role**: Define how the same ecosystem runs in "relaxed" vs "regulated" mode: which proofs, attestations, and provenance are required. + +**Gaps addressed**: **Gap 2** (Behavior Verification), **Gap 8** (Cross-Domain Security), **Gap 9** (Dynamic Trust), **Gap 12** (Data Provenance). + +**Outline**: + +1. **Introduction** — Same DAG/HITL model in dev (K8s) vs regulated (finance, healthcare); assurance profile = dial for proof level. +2. **Terminology** — Assurance profile, proof, attestation, provenance, trust boundary. +3. **Profiles** — **Relaxed**: best-effort, optional audit; **Standard**: audit trail + optional attestation; **Regulated**: attestation per critical node, provenance chain, behavior verification (reference STAMP, DAAP, verifiable conversations). +4. **Behavior Verification** — How runtime behavior is checked against declared policy (reference DAAP, RATS, EAT); evidence format. +5. **Cross-Domain and Trust** — Trust boundaries between domains; dynamic trust scoring (reference Cosmos, SEAT); revocation. +6. **Provenance** — Data lineage along the DAG; format for provenance records (reference verifiable conversation format); retention. +7. **Security Considerations** — What each profile guarantees and does not guarantee. +8. **IANA Considerations** — Registry for assurance profile identifiers. + +**Target**: NMOP or LAKE/RATS; **Status**: Informational or Experimental. +**Related drafts**: draft-guy-bary-stamp-protocol, draft-aylward-daap-v2, draft-birkholz-verifiable-agent-conversations, draft-jiang-seat-dynamic-attestation, draft-cosmos-protocol-specification. + +--- + +## 5. Dependency Graph of Drafts + +``` + [A: AEM - Architecture & Terminology] + | + +----+----+----+----+ + | | | | | + v v v v v +[B: ATD] [C: HITL] [D: AEPB] [E: APAE] + DAG Human Binding Assurance + + + + + + | | | | + +--------+---------+---------+ + | + Implementations: same ecosystem in K8s (relaxed) or regulated (proofs) +``` + +- **A** is the foundation; B, C, D, E reference A and each other where needed. +- **B** (ATD) and **C** (HITL) are the core execution model; **D** (AEPB) makes it agnostic; **E** (APAE) makes it dual-regime. + +--- + +## 6. How to Use This With Your Analyzer + +- **Generate outlines via CLI**: Use `ietf draft-gen ` with topics: "Agent Ecosystem Model", "Agent Task DAG", "Human-in-the-Loop primitives", "Agent Ecosystem Protocol Binding", "Assurance Profiles for Agent Ecosystems". Feed the gap context from this file or from `data/reports/gaps.md`. +- **Cross-reference**: When writing each draft, cite the related drafts listed above; the analyzer’s `ietf similar` and `ietf compare` can find more. +- **Ideas database**: Search `ideas` for mechanism/architecture/protocol types (e.g. "checkpoint", "override", "translation") to pull concrete mechanisms into sections. + +--- + +## 7. Deeper Datatracker Analysis — What to Run + +To keep refining these drafts from the data, use your analyzer as follows: + +| Goal | Commands / data | +|------|------------------| +| **Find drafts that touch DAG/workflow** | `ietf search "task graph"`, `ietf search "workflow"`, `ietf search "checkpoint"`, `ietf search "rollback"`; then `ietf similar ` for each. | +| **Find HITL-related work** | `ietf search "human-in-the-loop"`, `ietf search "override"`, `ietf search "approval"`; check `data/reports/ideas.md` for "CHEQ", "human", "override". | +| **Cross-protocol / interop** | `ietf report overlap-matrix`; focus on A2A vs other categories; `ietf similar draft-agent-gw` (protocol adaptation). | +| **Assurance / proofs** | Search ideas for "attestation", "verifiable", "provenance", "trust"; list drafts in AI safety/alignment and identity/auth. | +| **Gap → draft outline** | For each gap in `gaps.md`, run `ietf draft-gen ""` (e.g. "Agent Error Recovery and Rollback") and merge with the outlines above. | +| **Cluster overlap** | `ietf clusters --threshold 0.85` to see near-duplicates; use one as canonical and reference others to reduce fragmentation. | + +Refreshing the pipeline periodically (`ietf fetch`, `ietf analyze --all`, `ietf ideas --all`, `ietf gaps`) keeps gaps and ideas aligned with the latest datatracker activity. + +--- + +## 8. One-Page Pitch (Elevator Version) + +**Problem**: 260+ IETF drafts on AI agents; no single model for orchestration (DAG), human oversight (HITL), or for running the same system in both fast and regulated environments. + +**Proposal**: Five coordinated drafts — (A) shared architecture and terminology, (B) DAG execution with checkpoints and rollback, (C) HITL primitives (approval, override, explainability), (D) protocol-agnostic binding so any A2A protocol can participate, (E) assurance profiles so the same stack works in K8s or in a proof-heavy regulated regime. + +**Outcome**: One holistic agent ecosystem: DAG + HITL built in, agnostic and extensible, applicable everywhere from relaxed to fully proven. diff --git a/data/reports/idea-overlap.md b/data/reports/idea-overlap.md new file mode 100644 index 0000000..66f6b29 --- /dev/null +++ b/data/reports/idea-overlap.md @@ -0,0 +1,78 @@ +# Cross-Organization Idea Overlap +*Generated 2026-03-03 19:59 UTC — 1780 ideas from 361 drafts* + +**628** ideas appear across 2+ organizations, out of 1467 unique idea clusters. + +## Top Convergence Points + +Ideas where the most organizations independently converge: + +| # | Idea | Orgs | Drafts | Organizations | +|--:|------|-----:|-------:|---------------| +| 1 | Fully Adaptive Routing Ethernet (FARE) | 14 | 1 | Baidu, Biren Technology, Broadcom, Centec, China Mobile, Cloudnine Information Technologies, Enflame Technology, Huawei, Hygon, Metanet Networking Technology, Moore Threads, Resnics Technology, Ruijie Networks, Tencent | +| 2 | Scale-Up Network Adaptation | 14 | 1 | Baidu, Biren Technology, Broadcom, Centec, China Mobile, Cloudnine Information Technologies, Enflame Technology, Huawei, Hygon, Metanet Networking Technology, Moore Threads, Resnics Technology, Ruijie Networks, Tencent | +| 3 | MoE Expert Parallelization | 14 | 1 | Baidu, Biren Technology, Broadcom, Centec, China Mobile, Cloudnine Information Technologies, Enflame Technology, Huawei, Hygon, Metanet Networking Technology, Moore Threads, Resnics Technology, Ruijie Networks, Tencent | +| 4 | Tensor Parallelization Support | 14 | 1 | Baidu, Biren Technology, Broadcom, Centec, China Mobile, Cloudnine Information Technologies, Enflame Technology, Huawei, Hygon, Metanet Networking Technology, Moore Threads, Resnics Technology, Ruijie Networks, Tencent | +| 5 | Ultra-Low Latency Routing | 14 | 1 | Baidu, Biren Technology, Broadcom, Centec, China Mobile, Cloudnine Information Technologies, Enflame Technology, Huawei, Hygon, Metanet Networking Technology, Moore Threads, Resnics Technology, Ruijie Networks, Tencent | +| 6 | Ultra-High Throughput Fabric | 14 | 1 | Baidu, Biren Technology, Broadcom, Centec, China Mobile, Cloudnine Information Technologies, Enflame Technology, Huawei, Hygon, Metanet Networking Technology, Moore Threads, Resnics Technology, Ruijie Networks, Tencent | +| 7 | Adaptive Load Balancing | 14 | 1 | Baidu, Biren Technology, Broadcom, Centec, China Mobile, Cloudnine Information Technologies, Enflame Technology, Huawei, Hygon, Metanet Networking Technology, Moore Threads, Resnics Technology, Ruijie Networks, Tencent | +| 8 | Large Language Model Network Optimization | 14 | 1 | Baidu, Biren Technology, Broadcom, Centec, China Mobile, Cloudnine Information Technologies, Enflame Technology, Huawei, Hygon, Metanet Networking Technology, Moore Threads, Resnics Technology, Ruijie Networks, Tencent | +| 9 | Distributed AI Inference Architecture | 9 | 4 | China Mobile, DONG-EUI University, Daejeon University, ETRI, Huawei, National Institute of Information and Communications Technology, Pengcheng Laboratory, Tsinghua Shenzhen International Graduate School & Pengcheng Laboratory, Tsinghua University | +| 10 | ISAC-Enabled CATS Architecture | 9 | 3 | CAICT, China Mobile, China Unicom, Huawei, InterDigital, InterDigital Europe, Telefonica, Universidad Carlos III de Madrid, ZTE Corporation | +| 11 | Agent-to-Agent (A2A) Communication Paradigm | 8 | 5 | CAICT, China Mobile, Department of Computer Science & Engineering, Deutsche Telekom, Huawei, Intelligent Information R and D Division Mobility Platform Research Center, Orange, Telefonica | +| 12 | Heterogeneous Hardware AI Deployment | 8 | 3 | DONG-EUI University, Daejeon University, ETRI, Huawei, National Institute of Information and Communications Technology, Pengcheng Laboratory, Tsinghua Shenzhen International Graduate School & Pengcheng Laboratory, Tsinghua University | +| 13 | Network Digital Twin Support | 8 | 3 | China Mobile, China Unicom, DONG-EUI University, Daejeon University, ETRI, Huawei, National Institute of Information and Communications Technology, Telefonica | +| 14 | Resource-Constrained Device Optimization | 8 | 2 | Beihang University, DONG-EUI University, Daejeon University, ETRI, Huawei, National Institute of Information and Communications Technology, Xidian University, ZTE Corporation | +| 15 | Multi-Agent Communication Protocol | 7 | 8 | AsiaInfo, BUPT, China Mobile, China Telecom, China Unicom, Huawei, Zhongguancun Laboratory | +| 16 | AI Agent Communication Network (ACN) | 7 | 5 | ANP Open Source Community, China Mobile, China Telecom, China Unicom, Cisco, Five9, Huawei | +| 17 | Autonomous Network Agent Standardization Requirements | 7 | 2 | China Telecom, DONG-EUI University, Daejeon University, Everything OPS, Huawei, Swisscom, Telefonica | +| 18 | LISP-H3 Integration | 7 | 2 | Ariga.io, Cisco, ISI, R.C. ATHENA, Nexar Inc., Oterra.ai, Universitat Politecnica de Catalunya, lispers.net | +| 19 | H3-based EID Addressing | 7 | 2 | Ariga.io, CAW, Cisco, Nexar Inc., Oterra.ai, Universitat Politecnica de Catalunya, lispers.net | +| 20 | Natural Language Interchange Protocol (NLIP) | 7 | 1 | Fordham University, IBM, Marist University, Purdue University, Service Now, University of Illinois at Urbana-Champaign, eBay Inc. | +| 21 | AI-Mediated API Translation | 7 | 1 | Fordham University, IBM, Marist University, Purdue University, Service Now, University of Illinois at Urbana-Champaign, eBay Inc. | +| 22 | Uniform Agent Communication Interface | 7 | 1 | Fordham University, IBM, Marist University, Purdue University, Service Now, University of Illinois at Urbana-Champaign, eBay Inc. | +| 23 | Generative AI Communication Layer | 7 | 1 | Fordham University, IBM, Marist University, Purdue University, Service Now, University of Illinois at Urbana-Champaign, eBay Inc. | +| 24 | Natural Language Agent Registration | 7 | 1 | Fordham University, IBM, Marist University, Purdue University, Service Now, University of Illinois at Urbana-Champaign, eBay Inc. | +| 25 | Agentic Network Architecture | 6 | 7 | CNIC, CAS, China Mobile, China Unicom, Huawei, ICT, CAS, UnionPay | +| 26 | ELA Protocol | 6 | 6 | Bitwave, Cisco, Ericsson, Five9, Inria, Sandelman Software Works | +| 27 | AI Gateway | 6 | 4 | AsiaInfo, BUPT, China Telecom, Huawei, UnionPay, Zhongguancun Laboratory | +| 28 | ISAC-CATS Integration Pattern | 6 | 3 | Bitwave, China Mobile, Cisco, Five9, InterDigital Europe, Universidad Carlos III de Madrid | +| 29 | Agent Communication across WAN | 6 | 3 | China Mobile, China Unicom, Deutsche Telekom, Huawei, Orange, Telefonica | +| 30 | DH-KA MAC Key Derivation | 6 | 2 | Bundesdruckerei GmbH, Ericsson, IDsec Solutions, The Agency for Digital Government, University of Murcia, University of Oviedo | + +## Most Overlapping Organization Pairs + +| Org A | Org B | Shared Ideas | Examples | +|-------|-------|-------------:|----------| +| China Mobile | Huawei | 47 | Fully Adaptive Routing Ethernet (FARE); Scale-Up Network Adaptation; MoE Expert Parallelization +44 | +| China Unicom | Huawei | 38 | ISAC-Enabled CATS Architecture; Network Digital Twin Support; Multi-Agent Communication Protocol +35 | +| China Mobile | ZTE Corporation | 36 | ISAC-Enabled CATS Architecture; Cross-Domain Agent Coordination; Autonomic Network Device Operation +33 | +| Huawei | Telefonica | 35 | ISAC-Enabled CATS Architecture; Agent-to-Agent (A2A) Communication Paradigm; Network Digital Twin Support +32 | +| China Unicom | ZTE Corporation | 28 | ISAC-Enabled CATS Architecture; Cross-Domain Agent Coordination; Autonomic Network Device Operation +25 | +| Pengcheng Laboratory | Tsinghua Shenzhen International Graduate School & Pengcheng Laboratory | 27 | Distributed AI Inference Architecture; Heterogeneous Hardware AI Deployment; Intelligence Delivery Network (IDN) +24 | +| China Mobile | China Unicom | 27 | ISAC-Enabled CATS Architecture; Network Digital Twin Support; Multi-Agent Communication Protocol +24 | +| Cisco | Huawei | 27 | AI Agent Communication Network (ACN); Agent Registration and Renewal Protocol; Network Management Agent (NMA) +24 | +| China Telecom | Huawei | 26 | Multi-Agent Communication Protocol; AI Agent Communication Network (ACN); Autonomous Network Agent Standardization Requirements +23 | +| Cisco | Google | 26 | LISP-Based Unified Control Plane; EID-to-RLOC Mapping for AI Networks; Publication-Subscription for AI Data Flow +23 | +| Cisco | Five9 | 25 | AI Agent Communication Network (ACN); ELA Protocol; ISAC-CATS Integration Pattern +22 | +| InterDigital | InterDigital Europe | 21 | ISAC-Enabled CATS Architecture; ISAC Network Optimization; Low-Latency Sensing-Communication Requirements +18 | +| Ericsson | Inria | 21 | ELA Protocol; Zero-touch IoT onboarding; COSE-based EAP Authentication +18 | +| China Telecom | China Unicom | 20 | Multi-Agent Communication Protocol; AI Agent Communication Network (ACN); I2NSF-5G Integration Architecture +17 | +| Tsinghua University | Zhongguancun Laboratory | 20 | Capability-based Discovery; Unified RESTful Invocation Interface; Intent-Based Agent Selection Extension +17 | +| InterDigital Europe | Universidad Carlos III de Madrid | 19 | ISAC-Enabled CATS Architecture; ISAC-CATS Integration Pattern; ISAC Network Optimization +16 | +| Pengcheng Laboratory | Tsinghua University | 18 | Distributed AI Inference Architecture; Heterogeneous Hardware AI Deployment; Intelligence Delivery Network (IDN) +15 | +| Tsinghua Shenzhen International Graduate School & Pengcheng Laboratory | Tsinghua University | 18 | Distributed AI Inference Architecture; Heterogeneous Hardware AI Deployment; Intelligence Delivery Network (IDN) +15 | +| CAICT | China Mobile | 18 | ISAC-Enabled CATS Architecture; Agent-to-Agent (A2A) Communication Paradigm; Autonomic Network Device Operation +15 | +| CAICT | ZTE Corporation | 17 | ISAC-Enabled CATS Architecture; Autonomic Network Device Operation; Multi-Data Center Big Data Processing +14 | + +## Cross-Org Ideas by Type + +- **mechanism**: 310 +- **architecture**: 142 +- **pattern**: 136 +- **protocol**: 120 +- **requirement**: 93 +- **extension**: 68 +- **framework**: 5 +- **profile**: 2 +- **registry**: 1 \ No newline at end of file diff --git a/data/reports/ideas.md b/data/reports/ideas.md new file mode 100644 index 0000000..91d9d74 --- /dev/null +++ b/data/reports/ideas.md @@ -0,0 +1,132 @@ +# Technical Ideas Extracted from IETF AI/Agent Drafts +*Generated 2026-03-03 19:58 UTC — 1780 ideas from 361 drafts* + +## Most Common Ideas (appearing in 3+ drafts) + +| Idea | Appearances | Drafts | +|------|------------:|--------| +| Multi-Agent Communication Protocol | 8 | draft-fu-nmop-agent-communication-framework, draft-li-dmsc-macp, draft-liu-access-collaboration-agent, draft-yl-agent-id-requirements, draft-zhang-dmsc-mas-communication +3 more | +| Agentic Network Architecture | 7 | draft-chuyi-nmrg-agentic-network-inference, draft-chuyi-nmrg-ai-agent-network, draft-du-catalist-routing-considerations, draft-men-rtgwg-agent-networking-digibank-scenario, draft-men-rtgwg-agent-networking-in-digibank +2 more | +| Cross-Domain Agent Coordination | 6 | draft-chuyi-nmrg-agentic-network-inference, draft-du-catalist-routing-considerations, draft-han-rtgwg-agent-gateway-intercomm-framework, draft-intellinode-ai-semantic-contract, draft-ni-a2a-ai-agent-security-requirements +1 more | +| ELA Protocol | 6 | draft-ietf-lake-authz, draft-mpsb-agntcy-slim, draft-rosenberg-aiproto, draft-rosenberg-aiproto-cheq, draft-rosenberg-aiproto-nact +1 more | +| Agent-to-Agent (A2A) Communication Paradigm | 5 | draft-an-nmrg-i2icf-cits, draft-du-ai-agent-communication-6g-aspect, draft-liu-rtgwg-agent-gateway-requirements, draft-stephan-ai-agent-6g, draft-zeng-opsawg-applicability-mcp-a2a | +| Action-Based Authorization | 5 | draft-aylward-aiga-1, draft-aylward-aiga-2, draft-chen-agent-decoupled-authorization-model, draft-jiang-seat-dynamic-attestation, draft-williams-netmod-lm-hierarchy-topology | +| AI Agent Communication Network (ACN) | 5 | draft-du-ai-agent-communication-6g-aspect, draft-han-ai-agent-impact-infra, draft-jiang-cats-reference-acn, draft-rosenberg-aiproto-framework, draft-zyyhl-agent-networks-framework | +| Agent Registration Process | 5 | draft-zheng-agent-identity-management, draft-zheng-dispatch-agent-identity-management, draft-zl-agents-networking-architecture, draft-zl-agents-networking-framework, draft-zlgsgl-rtgwg-agents-networking-framework | +| AI Gateway | 4 | draft-fu-nmop-agent-communication-framework, draft-li-dmsc-macp, draft-men-rtgwg-agent-networking-digibank-scenario, draft-men-rtgwg-agent-networking-in-digibank | +| Distributed AI Inference Architecture | 4 | draft-hong-nmrg-ai-deploy, draft-irtf-nmrg-ai-deploy, draft-li-individual-inip, draft-song-rtgwg-din-usecases-requirements | +| MCP Session Establishment over MOQT | 4 | draft-jennings-ai-mcp-over-moq, draft-jennings-mcp-over-moqt, draft-mcp-over-moqt, draft-nandakumar-a2a-moqt-transport | +| Agent-Based Network Management | 4 | draft-pang-agents-networking-scenarios, draft-wmz-nmrg-agent-ndt-arch, draft-zeng-nmrg-mcp-usecases-requirements, draft-zhang-agent-gap-network | +| 3GPP AI/ML Agent Requirements Framework | 4 | draft-sarischo-6gip-aiagent-requirements, draft-tong-network-agent-use-cases-in-6g, draft-yu-ai-agent-use-cases-in-6g, draft-yu-dmsc-ai-agent-use-cases-in-6g | +| Multi-Agent Interaction Model | 4 | draft-vandoulas-aidp, draft-wang-nmrg-magent-im, draft-zhao-nmrg-ai-agent-for-dtn, draft-zl-agents-networking-architecture | +| Network Equipment as MCP Servers | 4 | draft-zeng-mcp-network-mgmt, draft-zw-nmrg-mcp-network-mgmt, draft-zw-opsawg-mcp-network-mgmt, draft-zw-rtgwg-mcp-network-mgmt | +| Cross-Domain Agent Identity Management | 3 | draft-abbey-scim-agent-extension, draft-scim-agent-extension, draft-wahl-scim-agent-schema | +| Capability-based Discovery | 3 | draft-ainp-protocol, draft-cui-ai-agent-discovery-invocation, draft-mozleywilliams-dnsop-bandaid | +| PQ/T Hybrid Key Exchange for EAP-AKA' | 3 | draft-ar-emu-hybrid-pqc-eapaka, draft-ietf-emu-hybrid-pqc-eapaka, draft-ietf-sshm-mlkem-hybrid-kex | +| Quantum-Safe Session Key Generation | 3 | draft-ar-emu-hybrid-pqc-eapaka, draft-ietf-emu-pqc-eapaka, draft-ra-emu-pqc-eapaka | +| Cryptographic Identity Verification | 3 | draft-aylward-daap-v2, draft-liu-agent-operation-authorization, draft-schulze-ecap | +| ISAC-CATS Integration Pattern | 3 | draft-bernardos-cats-isac-uc, draft-mp-agntcy-ads, draft-rosenberg-aiproto-a2t | +| ISAC-Enabled CATS Architecture | 3 | draft-bernardos-cats-isac-uc, draft-zhao-ccamp-actn-optical-network-agent, draft-zhao-detnet-enhanced-use-cases | +| ISAC Network Optimization | 3 | draft-bernardos-nmrg-agentic-network-optimization, draft-li-dmsc-inf-architecture, draft-xsaopig-nmop-service-flow-modal-mapping | +| ASN-Agent Authentication | 3 | draft-blahaj-grow-rpki-oauth, draft-liu-dmsc-acps-arc, draft-yao-agent-auth-considerations | +| Time to First Token (TTFT) Measurement | 3 | draft-calabria-bmwg-ai-fabric-inference-bench, draft-gaikwad-llm-benchmarking-methodology, draft-gaikwad-llm-benchmarking-terminology | +| EDHOC-AKA Authentication Method | 3 | draft-chen-lake-edhoc-aka, draft-ietf-emu-eap-edhoc, draft-pocero-authkem-ikr-edhoc | +| Global AI Agent Communication Framework | 3 | draft-du-ai-agent-communication-6g-aspect, draft-mao-rtgwg-agent-comm-protocol-gap-analysis, draft-mzsg-rtgwg-agent-cross-device-comm-framework | +| Agent-to-Agent Routing Protocol | 3 | draft-du-catalist-routing-considerations, draft-mozley-aidiscovery, draft-xie-ai-agent-multimodal | +| ACaaS for Dynamic Edge AI Placement | 3 | draft-dunbar-neotec-ac-te-applicability, draft-dunbar-onions-ac-te-applicability, draft-dunbar-onsen-ac-te-applicability | +| TE Topology Model for Edge Network Performance | 3 | draft-dunbar-neotec-ac-te-applicability, draft-dunbar-onions-ac-te-applicability, draft-dunbar-onsen-ac-te-applicability | +| Service Objective Mapping to YANG Models | 3 | draft-dunbar-neotec-ac-te-applicability, draft-dunbar-onions-ac-te-applicability, draft-dunbar-onsen-ac-te-applicability | +| Real-Time AI Inference Network Requirements | 3 | draft-dunbar-neotec-ac-te-applicability, draft-dunbar-onions-ac-te-applicability, draft-dunbar-onsen-ac-te-applicability | +| AC and TE YANG Model Gap Identification | 3 | draft-dunbar-neotec-ac-te-applicability, draft-dunbar-onions-ac-te-applicability, draft-dunbar-onsen-ac-te-applicability | +| Agent Communication across WAN | 3 | draft-han-ai-agent-impact-infra, draft-liu-dmsc-gw-requirements, draft-stephan-ai-agent-6g | +| Heterogeneous Hardware AI Deployment | 3 | draft-hong-nmrg-ai-deploy, draft-irtf-nmrg-ai-deploy, draft-li-cats-idn | +| Network Digital Twin Support | 3 | draft-hong-nmrg-ai-deploy, draft-irtf-nmrg-ai-deploy, draft-wmz-nmrg-agent-ndt-arch | +| MCP Capability Advertisement Headers | 3 | draft-howe-sipcore-mcp-extension, draft-kompella-lsr-mptecap, draft-sz-dmsc-iaip | +| AI Usage Preferences Vocabulary | 3 | draft-ietf-aipref-vocab, draft-madhavan-aipref-displaybasedpref, draft-vaughan-aipref-vocab | +| PSK Authentication Method for EDHOC | 3 | draft-ietf-lake-edhoc-psk, draft-lake-pocero-authkem-edhoc, draft-lake-pocero-authkem-ikr-edhoc | +| MCP Message Mapping to MOQT Objects | 3 | draft-jennings-ai-mcp-over-moq, draft-mcp-over-moqt, draft-nandakumar-a2a-moqt-transport | +| Signature-Free PQC Authentication | 3 | draft-lake-pocero-authkem-edhoc, draft-pocero-authkem-edhoc, draft-spm-lake-pqsuites | +| Agent Context Protocol | 3 | draft-liu-agent-context-protocol, draft-oauth-transaction-tokens-for-agents, draft-srijal-agents-policy | +| Multi-Agent Context Architecture | 3 | draft-liu-agent-context-protocol, draft-wolfe-faf-format, draft-yl-agent-id-requirements | +| Delegated Agent Discovery | 3 | draft-liu-dmsc-gw-requirements, draft-liu-rtgwg-agent-gateway-requirements, draft-meunier-webbotauth-registry | +| Agent Registration and Renewal Protocol | 3 | draft-narajala-ans, draft-ni-a2a-ai-agent-security-requirements, draft-pioli-agent-discovery | +| Fixed Network Agent Communication | 3 | draft-pang-agents-networking-scenarios, draft-yang-nmrg-mcp-nm, draft-zhang-agent-gap-network | +| Tool Enumeration API | 3 | draft-rosenberg-aiproto, draft-rosenberg-aiproto-a2t, draft-rosenberg-aiproto-nact | +| Agntcy Framework | 3 | draft-rosenberg-aiproto-framework, draft-zl-agents-networking-framework, draft-zlgsgl-rtgwg-agents-networking-framework | +| On-Device AI Agent Architecture | 3 | draft-sarischo-6gip-aiagent-requirements, draft-stephan-ai-agent-6g, draft-zhang-rtgwg-ai-agents-troubleshooting | +| Flow-Based Secure Multilink Path Selection | 3 | draft-templin-6man-aero3, draft-templin-intarea-aero, draft-templin-intarea-aero2 | +| Agent Certificate Authority | 3 | draft-zl-agents-networking-architecture, draft-zl-agents-networking-framework, draft-zlgsgl-rtgwg-agents-networking-framework | + +## Ideas Appearing in 2 Drafts (157 ideas) + +- **Agent Authorization Profile (AAP)** — draft-aap-oauth-profile, draft-rosenberg-oauth-aauth +- **AI Content Degree Classification** — draft-abaris-aicdh, draft-chen-nmrg-semantic-inference-routing +- **Agent Resource Type** — draft-abbey-scim-agent-extension, draft-scim-agent-extension +- **Agentic Application Resource Type** — draft-abbey-scim-agent-extension, draft-scim-agent-extension +- **AI Workload Characterization** — draft-aft-ai-traffic, draft-ai-traffic +- **Inter-DC AI Traffic Problem Statement** — draft-aft-ai-traffic, draft-ai-traffic +- **Federated AI Service Architecture** — draft-aft-ai-traffic, draft-ai-traffic +- **Private Data Training Network Requirements** — draft-aft-ai-traffic, draft-ai-traffic +- **Semantic Routing** — draft-agent-gw, draft-ainp-protocol +- **Agent Communication Gateway (Agent-GW)** — draft-agent-gw, draft-yao-agent-auth-considerations +- **I2NSF-5G Integration Framework** — draft-ahn-nmrg-5g-security-i2nsf-framework, draft-liu-dmsc-acps-arc +- **Closed-Loop Security Analytics** — draft-ahn-nmrg-5g-security-i2nsf-framework, draft-ahn-opsawg-5g-security-i2nsf-framework +- **I2NSF-5G Integration Architecture** — draft-ahn-opsawg-5g-security-i2nsf-framework, draft-hw-ai-agent-6g +- **ICF Orchestration Framework** — draft-an-nmrg-i2icf-cits, draft-chuyi-nmrg-agentic-network-inference +- **Multi-Domain ICF Coordination** — draft-an-nmrg-i2icf-cits, draft-du-ai-agent-communication-6g-aspect +- **Hybrid Ephemeral Public Key Protection** — draft-ar-emu-hybrid-pqc-eapaka, draft-ietf-emu-hybrid-pqc-eapaka +- **EAP-AKA' FS Protocol Enhancement** — draft-ar-emu-hybrid-pqc-eapaka, draft-ra-emu-pqc-eapaka +- **Immutable Kernel Architecture** — draft-aylward-aiga-1, draft-aylward-aiga-2 +- **Tiered Risk-Based Governance** — draft-aylward-aiga-1, draft-aylward-aiga-2 +- **Federated Authority Network** — draft-aylward-aiga-1, draft-aylward-aiga-2 +- **Network-Level Quarantine Protocol** — draft-aylward-aiga-1, draft-aylward-aiga-2 +- **Multi-Vendor TEE Attestation (M-TACE)** — draft-aylward-aiga-1, draft-aylward-aiga-2 +- **Multi-layered Security Architecture** — draft-aylward-daap-v2, draft-narvaneni-agent-uri +- **RATS-based Agent Attestation** — draft-barney-caam, draft-huang-acme-scalable-agent-enrollment +- **Public Key Derived HMAC** — draft-bastian-jose-dvs, draft-bastian-jose-pkdh +- **DH-KA MAC Key Derivation** — draft-bastian-jose-pkdh, draft-ietf-emu-eap-edhoc +- **Low-Latency Sensing-Communication Requirements** — draft-bernardos-cats-isac-uc, draft-bernardos-green-isac-uc +- **Environment Perception Integration** — draft-bernardos-green-isac-uc, draft-bernardos-nmrg-agentic-network-optimization +- **Scalable Intent Model Architecture** — draft-cgfabk-nmrg-ibn-generative-ai, draft-huang-acme-scalable-agent-enrollment +- **Decoupled Authorization Architecture** — draft-chen-agent-decoupled-authorization-model, draft-song-oauth-ai-agent-collaborate-authz + +## Unique Ideas (1259 ideas appearing in only 1 draft) + +- **A2A Protocol Transport over MOQT** (draft-a2a-moqt-transport) — Defines how Agent-to-Agent protocol messages are carried over Media over QUIC Transport using its pu +- **QUIC-based Publish/Subscribe for AI Agents** (draft-a2a-moqt-transport) — Uses MOQT's publish/subscribe messaging pattern to support AI agent discovery, negotiation, and coll +- **Streaming Capabilities Integration** (draft-a2a-moqt-transport) — Leverages MOQT's built-in streaming mechanisms to handle continuous data flows between AI agents. Su +- **Built-in Prioritization for Agent Communication** (draft-a2a-moqt-transport) — Utilizes MOQT's prioritization mechanisms to manage different types of agent messages and data strea +- **Structured Claims for Agent Context** (draft-aap-oauth-profile) — Standardized JWT claims that capture agent identity, task context, and operational constraints in ma +- **Agent Delegation Chain Validation** (draft-aap-oauth-profile) — Validation rules for tracking and verifying delegation chains when AI agents act on behalf of humans +- **Human Oversight Requirements** (draft-aap-oauth-profile) — Structured claims and validation patterns that specify when human oversight is required for agent ac +- **Context-Aware M2M Authorization** (draft-aap-oauth-profile) — Application of OAuth 2.0 Token Exchange and proof-of-possession mechanisms specifically for agent-to +- **AI-Disclosure HTTP Header** (draft-abaris-aicdh) — A machine-readable HTTP response header field that discloses the presence and degree of AI-generated +- **Layered Disclosure Strategy** (draft-abaris-aicdh) — A mechanism that supports multiple disclosure formats simultaneously, combining machine-readable hea +- **HTTP Structured Field Compatibility** (draft-abaris-aicdh) — Implementation uses standardized HTTP structured field syntax to ensure interoperability with existi +- **Multi-Consumer Metadata Architecture** (draft-abaris-aicdh) — Designed to serve metadata needs of user agents, bots, and archiving systems simultaneously. Provide +- **User Schema Extensions for Agent Relationships** (draft-abbey-scim-agent-extension) — Extensions to the core SCIM User schema to represent relationships between human users and their ass +- **Group Schema Extensions for Agentic Constructs** (draft-abbey-scim-agent-extension) — Extensions to the core SCIM Group schema to support grouping of mixed human and agent identities. Al +- **Working Memory** (draft-agent-gw) — A structured context management system that maintains state and intermediate results across multi-st +- **Automated Protocol Adaptation** (draft-agent-gw) — A mechanism that automatically translates between different agent communication protocols and legacy +- **Oracle-free Agent Evaluation** (draft-agent-gw) — An evaluation mechanism that assesses agent performance and capabilities without relying on external +- **Collaborative Inference Acceleration (KDN)** (draft-agent-gw) — A knowledge distribution network that accelerates inference by sharing computational resources and i +- **SmartPDU YANG Data Model** (draft-ahc-green-smartpdu-yang) — Define a standardized YANG schema for configuration, monitoring, and control of Smart Power Distribu +- **SmartPDU Telemetry Framework** (draft-ahc-green-smartpdu-yang) — Establish a YANG-based telemetry collection mechanism for detailed energy consumption monitoring acr + +*...and 1239 more unique ideas* + +## Ideas by Type + +- **mechanism**: 663 +- **architecture**: 280 +- **pattern**: 251 +- **protocol**: 228 +- **requirement**: 171 +- **extension**: 168 +- **framework**: 9 +- **profile**: 3 +- **algorithm**: 2 +- **vocabulary**: 2 +- **principle**: 1 +- **registry**: 1 +- **schema**: 1 \ No newline at end of file diff --git a/data/reports/landscape.md b/data/reports/landscape.md index 2e1cf96..1cf5e4a 100644 --- a/data/reports/landscape.md +++ b/data/reports/landscape.md @@ -1,13 +1,16 @@ # IETF AI/Agent Draft Landscape -*Generated 2026-02-27 23:29 UTC* +*Generated 2026-03-03 19:58 UTC* -## A2A protocols (77 drafts) +## A2A protocols (85 drafts) - **[draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/)** (score: 4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou +- **[draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/)** (score: 4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L - **[draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/)** (score: 4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco - **[draft-chen-oauth-rar-agent-extensions](https://datatracker.ietf.org/doc/draft-chen-oauth-rar-agent-extensions/)** (score: 4.2) — Extends OAuth RAR with policy_context and lifecycle_binding members for AI agent environments. Enabl - **[draft-mallick-muacp](https://datatracker.ietf.org/doc/draft-mallick-muacp/)** (score: 4.2) — Resource-efficient messaging protocol specifically designed for constrained IoT/Edge devices with de +- **[draft-li-spring-rdma-multicast-over-srv6](https://datatracker.ietf.org/doc/draft-li-spring-rdma-multicast-over-srv6/)** (score: 4.2) — Specifies SRv6 extensions for RDMA multicast delivery with new End.MT behavior and ACK/NACK aggregat +- **[draft-song-tsvwg-camp](https://datatracker.ietf.org/doc/draft-song-tsvwg-camp/)** (score: 4.2) — Proposes CAMP, a multipath transport protocol for interactive multimodal LLM systems that maintains - **[draft-narajala-ans](https://datatracker.ietf.org/doc/draft-narajala-ans/)** (score: 4.2) — Introduces Agent Name Service (ANS) as a DNS-based universal directory for AI agent discovery and ve - **[draft-oauth-transaction-tokens-for-agents](https://datatracker.ietf.org/doc/draft-oauth-transaction-tokens-for-agents/)** (score: 4.2) — Extends OAuth Transaction Tokens framework to support agent context propagation with actor and princ - **[draft-zhang-dmsc-mas-communication](https://datatracker.ietf.org/doc/draft-zhang-dmsc-mas-communication/)** (score: 4.2) — Analyzes security risks in multi-agent communication and limitations of existing protocols like TLS @@ -15,9 +18,13 @@ - **[draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/)** (score: 4.1) — Defines task-oriented multi-agent framework for fault recovery in converged mobile networks. Targets - **[draft-nederveld-adl](https://datatracker.ietf.org/doc/draft-nederveld-adl/)** (score: 4.1) — Defines ADL, a JSON-based standard for describing AI agents including their capabilities, tools, per - **[draft-mw-spice-actor-chain](https://datatracker.ietf.org/doc/draft-mw-spice-actor-chain/)** (score: 4.1) — Extends OAuth 2.0 Token Exchange with cryptographically verifiable actor chains to provide tamper-ev +- **[draft-jadoon-nmrg-agentic-ai-autonomous-networks](https://datatracker.ietf.org/doc/draft-jadoon-nmrg-agentic-ai-autonomous-networks/)** (score: 4.1) — Introduces architectural principles for integrating AI agents into IP protocol stack layers while pr - **[draft-ietf-lisp-nexagon](https://datatracker.ietf.org/doc/draft-ietf-lisp-nexagon/)** (score: 4.0) — Combines LISP with H3 spatial indexing to create geospatial intelligence network for physical-world - **[draft-barney-caam](https://datatracker.ietf.org/doc/draft-barney-caam/)** (score: 4.0) — Specifies Contextual Agent Authorization Mesh for runtime authorization of agents after discovery, p - **[draft-nennemann-wimse-ect](https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/)** (score: 4.0) — Defines Execution Context Tokens as JWT extension to WIMSE for tracking task execution in distribute +- **[draft-jennings-ai-mcp-over-moq](https://datatracker.ietf.org/doc/draft-jennings-ai-mcp-over-moq/)** (score: 4.0) — Defines how to transport Model Context Protocol (MCP) messages over Media over QUIC Transport (MOQT) +- **[draft-han-anima-ai-asa](https://datatracker.ietf.org/doc/draft-han-anima-ai-asa/)** (score: 4.0) — Analyzes the impact of enhancing ANIMA's Autonomic Service Agents with AI/LLM capabilities, focusing +- **[draft-liao-aipref-autoctl-core](https://datatracker.ietf.org/doc/draft-liao-aipref-autoctl-core/)** (score: 4.0) — Defines core machine-readable protocol for server-side automation permissions targeting AI-driven we - **[draft-ainp-protocol](https://datatracker.ietf.org/doc/draft-ainp-protocol/)** (score: 3.9) — Defines semantic communication protocol for AI agents using intent-based routing and negotiation. Re - **[draft-agent-gw](https://datatracker.ietf.org/doc/draft-agent-gw/)** (score: 3.9) — Proposes an Intelligent Agent Communication Gateway for large-scale multi-agent collaboration. Featu - **[draft-mp-agntcy-ads](https://datatracker.ietf.org/doc/draft-mp-agntcy-ads/)** (score: 3.9) — Describes Agent Directory Service for storing and discovering AI agent metadata based on skills. Fea @@ -29,12 +36,17 @@ - **[draft-ravikiran-clawdentity-protocol](https://datatracker.ietf.org/doc/draft-ravikiran-clawdentity-protocol/)** (score: 3.9) — Specifies Clawdentity protocol for cryptographic identity and trust in AI agent communication. Provi - **[draft-jurkovikj-httpapi-agentic-state](https://datatracker.ietf.org/doc/draft-jurkovikj-httpapi-agentic-state/)** (score: 3.9) — Defines Agentic State Transfer (AST) HTTP profile for managing canonical resource state across multi - **[draft-tejido-swp-core](https://datatracker.ietf.org/doc/draft-tejido-swp-core/)** (score: 3.9) — Specifies SlimWire Protocol Core, a binary framing layer for agent/tool messaging with profile-based +- **[draft-templin-intarea-aero2](https://datatracker.ietf.org/doc/draft-templin-intarea-aero2/)** (score: 3.9) — Specifies AERO service for IP internetworking over overlay multilink networks using IPv6 ND for cont +- **[draft-ramadan-mboned-sonar](https://datatracker.ietf.org/doc/draft-ramadan-mboned-sonar/)** (score: 3.8) — Specifies a protocol for verifiable multicast delivery using cryptoeconomic accountability and stati - **[draft-luan-rtgwg-sdaf](https://datatracker.ietf.org/doc/draft-luan-rtgwg-sdaf/)** (score: 3.8) — Proposes symmetry-driven forwarding mechanism for LEO satellite networks to avoid routing loops and - **[draft-zhao-nmop-network-management-agent](https://datatracker.ietf.org/doc/draft-zhao-nmop-network-management-agent/)** (score: 3.8) — Defines AI-driven Network Management Agent concept for Level 4 autonomous networks. Specifies integr - **[draft-eckert-anima-acp-free-ani](https://datatracker.ietf.org/doc/draft-eckert-anima-acp-free-ani/)** (score: 3.8) — Describes lightweight variation of Autonomic Networking Infrastructure without expensive ACP impleme +- **[draft-li-individual-inip](https://datatracker.ietf.org/doc/draft-li-individual-inip/)** (score: 3.8) — Specifies a protocol for performing lightweight ML inference directly in network devices like switch +- **[draft-ietf-aipref-attach](https://datatracker.ietf.org/doc/draft-ietf-aipref-attach/)** (score: 3.8) — Specifies how AI usage preferences can be signaled during HTTP content acquisition. Updates RFC 9309 - **[draft-rosenberg-aiproto-framework](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-framework/)** (score: 3.7) — Provides framework and requirements for AI agent protocols on the Internet. Surveys existing approac - **[draft-an-nmrg-i2icf-cits](https://datatracker.ietf.org/doc/draft-an-nmrg-i2icf-cits/)** (score: 3.7) — Defines framework for orchestrating In-Network Computing Functions in Cooperative Intelligent Transp - **[draft-melnikov-sasl2](https://datatracker.ietf.org/doc/draft-melnikov-sasl2/)** (score: 3.7) — Updates SASL framework to support modern authentication requirements including multi-factor authenti +- **[draft-howe-sipcore-mcp-extension](https://datatracker.ietf.org/doc/draft-howe-sipcore-mcp-extension/)** (score: 3.7) — Defines SIP extension to carry Model Context Protocol with new option-tags, headers, and media types - **[draft-sogomonian-aiip-architecture](https://datatracker.ietf.org/doc/draft-sogomonian-aiip-architecture/)** (score: 3.7) — Defines architectural model for Artificial Intelligence Internet Protocol (AIIP) enabling stateless, - **[draft-rosenberg-aiproto](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto/)** (score: 3.7) — Defines N-ACT protocol for AI agents to discover and invoke third-party tools and APIs. Focuses on e - **[draft-rosenberg-aiproto-nact](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-nact/)** (score: 3.7) — Defines N-ACT protocol for AI agents to discover and invoke third-party tools and APIs. Focuses on e @@ -49,8 +61,10 @@ - **[draft-mozleywilliams-dnsop-bandaid](https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-bandaid/)** (score: 3.6) — Proposes using DNS with SVCB records to enable AI agent discovery and capability advertisement. Leve - **[draft-li-semantic-routing-architecture](https://datatracker.ietf.org/doc/draft-li-semantic-routing-architecture/)** (score: 3.6) — Introduces semantic routing architecture using intent vectors and trust scores for AI agent communic - **[draft-vandoulas-aidp](https://datatracker.ietf.org/doc/draft-vandoulas-aidp/)** (score: 3.6) — Defines a comprehensive control-plane protocol for secure agent interactions with delegation, author +- **[draft-altanai-aipref-realtime-protocol-bindings](https://datatracker.ietf.org/doc/draft-altanai-aipref-realtime-protocol-bindings/)** (score: 3.6) — Defines how AI preference expressions are bound to real-time protocols like SIP and SDP. Specifies h - **[draft-ietf-ace-edhoc-oscore-profile](https://datatracker.ietf.org/doc/draft-ietf-ace-edhoc-oscore-profile/)** (score: 3.6) — Defines ACE framework profile using EDHOC for mutual authentication and OSCORE for secure communicat - **[draft-liu-oauth-a2a-profile](https://datatracker.ietf.org/doc/draft-liu-oauth-a2a-profile/)** (score: 3.6) — Specifies OAuth Transaction Token profile for Agent-to-Agent communication. Embeds call chain contex +- **[draft-templin-6man-aero3](https://datatracker.ietf.org/doc/draft-templin-6man-aero3/)** (score: 3.6) — Specifies automatic extended route optimization for IP internetworking over overlay multilink networ - **[draft-liu-dmsc-acps-arc](https://datatracker.ietf.org/doc/draft-liu-dmsc-acps-arc/)** (score: 3.6) — Proposes Agent Collaboration Protocols architecture for Internet of Agents, covering agent lifecycle - **[draft-liang-agentdns](https://datatracker.ietf.org/doc/draft-liang-agentdns/)** (score: 3.5) — Proposes a DNS-inspired naming and service discovery system for LLM agents to enable autonomous disc - **[draft-song-oauth-ai-agent-collaborate-authz](https://datatracker.ietf.org/doc/draft-song-oauth-ai-agent-collaborate-authz/)** (score: 3.5) — Proposes OAuth 2.0 extension for multi-AI agent collaboration with applier-on-behalf-of authorizatio @@ -62,25 +76,19 @@ - **[draft-li-dmsc-mcps-agw](https://datatracker.ietf.org/doc/draft-li-dmsc-mcps-agw/)** (score: 3.5) — Defines a protocol suite using Agent Gateways as control-plane entities for multi-agent collaboratio - **[draft-jiang-seat-dynamic-attestation](https://datatracker.ietf.org/doc/draft-jiang-seat-dynamic-attestation/)** (score: 3.4) — Defines dynamic attestation mechanisms for AI agents to convey runtime posture changes during long-l - **[draft-romanchuk-normative-admissibility](https://datatracker.ietf.org/doc/draft-romanchuk-normative-admissibility/)** (score: 3.4) — Establishes a framework for evaluating whether autonomous agent speech acts are admissible based on +- **[draft-du-catalist-routing-considerations](https://datatracker.ietf.org/doc/draft-du-catalist-routing-considerations/)** (score: 3.4) — Proposes routing considerations for AI agent-to-agent communication in overlay networks. Focuses on +- **[draft-kartha-internet20-ainative](https://datatracker.ietf.org/doc/draft-kartha-internet20-ainative/)** (score: 3.4) — Proposes Internet 2.0 architecture with AI models as first-class network entities, including HTTP+AI - **[draft-yan-a2a-device-agent-applicability](https://datatracker.ietf.org/doc/draft-yan-a2a-device-agent-applicability/)** (score: 3.4) — Discusses applying Agent-to-Agent (A2A) Protocol to network management for communication between Con +- **[draft-zw-rtgwg-mcp-network-mgmt](https://datatracker.ietf.org/doc/draft-zw-rtgwg-mcp-network-mgmt/)** (score: 3.4) — Specifies MCP extensions for network equipment management with routers/switches as MCP servers. Defi - **[draft-stephan-ai-agent-6g](https://datatracker.ietf.org/doc/draft-stephan-ai-agent-6g/)** (score: 3.4) — Examines AI agent communication protocols specifically for 6G systems based on 3GPP requirements. Ex - **[draft-cosmos-protocol-specification](https://datatracker.ietf.org/doc/draft-cosmos-protocol-specification/)** (score: 3.3) — Defines comprehensive badge-based identity and communication system with trust scoring, post-quantum - **[draft-sz-dmsc-iaip](https://datatracker.ietf.org/doc/draft-sz-dmsc-iaip/)** (score: 3.3) — Defines Intent-based Agent Interconnection Protocol (IAIP) for dynamic agent discovery and routing a +- **[draft-wang-cats-innetwork-infer](https://datatracker.ietf.org/doc/draft-wang-cats-innetwork-infer/)** (score: 3.3) — Proposes a framework for decentralized LLM inference across untrusted participants using layer-aware +- **[draft-mcp-over-moqt](https://datatracker.ietf.org/doc/draft-mcp-over-moqt/)** (score: 3.3) — Defines transport mapping for Model Context Protocol over Media over QUIC Transport. Specifies how M +- **[draft-jennings-mcp-over-moqt](https://datatracker.ietf.org/doc/draft-jennings-mcp-over-moqt/)** (score: 3.3) — Defines transport mapping for Model Context Protocol over Media over QUIC Transport. Specifies how M - **[draft-liu-rtgwg-agent-gateway-requirements](https://datatracker.ietf.org/doc/draft-liu-rtgwg-agent-gateway-requirements/)** (score: 3.2) — Discusses requirements for Agent Gateways in agent-to-agent communications to improve scalability, e - **[draft-pioli-agent-discovery](https://datatracker.ietf.org/doc/draft-pioli-agent-discovery/)** (score: 3.2) — Specifies ARDP, a lightweight protocol for agent registration and discovery in distributed environme - **[draft-gaikwad-woa](https://datatracker.ietf.org/doc/draft-gaikwad-woa/)** (score: 3.2) — Specifies Web of Agents (WoA) format using JSON Schema to describe AI agent inputs/outputs served fr -- **[draft-mao-rtgwg-apn-framework-for-ioa](https://datatracker.ietf.org/doc/draft-mao-rtgwg-apn-framework-for-ioa/)** (score: 3.2) — Applies Application-aware Performance Network framework to Internet of Agents scenario. Addresses ne -- **[draft-zhang-dmsc-ioa-semantic-interaction](https://datatracker.ietf.org/doc/draft-zhang-dmsc-ioa-semantic-interaction/)** (score: 3.2) — Specifies a semantic layer for Internet of Agents using ontology models and JSON-LD serialization. D -- **[draft-sun-zhang-iaip](https://datatracker.ietf.org/doc/draft-sun-zhang-iaip/)** (score: 3.2) — Defines Intent-based Agent Interconnection Protocol for Agent Gateways, focusing on semantic intent -- **[draft-yao-agent-auth-considerations](https://datatracker.ietf.org/doc/draft-yao-agent-auth-considerations/)** (score: 3.1) — Extends OAuth model for AI agent authentication and authorization in Agent Communication Networks. P -- **[draft-li-dmsc-inf-architecture](https://datatracker.ietf.org/doc/draft-li-dmsc-inf-architecture/)** (score: 3.1) — Proposes a network infrastructure architecture for large-scale multi-agent collaboration. Focuses on -- **[draft-a2a-moqt-transport](https://datatracker.ietf.org/doc/draft-a2a-moqt-transport/)** (score: 3.1) — Specifies transport of Agent-to-Agent protocol over Media over QUIC Transport. Leverages MOQT's publ -- **[draft-nandakumar-a2a-moqt-transport](https://datatracker.ietf.org/doc/draft-nandakumar-a2a-moqt-transport/)** (score: 3.0) — Identical specification to draft-a2a-moqt-transport for transporting Agent-to-Agent protocol over MO -- **[draft-hong-nmrg-agenticai-ps](https://datatracker.ietf.org/doc/draft-hong-nmrg-agenticai-ps/)** (score: 3.0) — Presents problem statement and motivations for applying Agentic AI to network management. Emphasizes -- **[draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/)** (score: 3.0) — Proposes a multi-agent communication framework for network AIOps with AI gateway, Agent Name Service -- **[draft-cui-dmsc-agent-cdi](https://datatracker.ietf.org/doc/draft-cui-dmsc-agent-cdi/)** (score: 3.0) — Defines comprehensive framework for cross-domain AI agent interoperability including identity federa -- **[draft-yang-dmsc-ioa-task-protocol](https://datatracker.ietf.org/doc/draft-yang-dmsc-ioa-task-protocol/)** (score: 3.0) — Defines a protocol for distributed collaboration among heterogeneous AI agents, enabling dynamic tea -- **[draft-ramakrishna-satp-data-sharing](https://datatracker.ietf.org/doc/draft-ramakrishna-satp-data-sharing/)** (score: 2.9) — Defines a DLT-neutral protocol for sharing asset views and metadata across blockchain networks via g ## AI safety / guardrails / alignment (1 drafts) @@ -88,6 +96,7 @@ ## AI safety/alignment (35 drafts) +- **[draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/)** (score: 4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra - **[draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/)** (score: 4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and - **[draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/)** (score: 4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou - **[draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/)** (score: 4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb @@ -104,6 +113,7 @@ - **[draft-schulze-ecap](https://datatracker.ietf.org/doc/draft-schulze-ecap/)** (score: 4.1) — ECAP defines a cryptographically-verified protocol for web crawlers to obtain consent from hosts bef - **[draft-mw-spice-actor-chain](https://datatracker.ietf.org/doc/draft-mw-spice-actor-chain/)** (score: 4.1) — Extends OAuth 2.0 Token Exchange with cryptographically verifiable actor chains to provide tamper-ev - **[draft-barney-caam](https://datatracker.ietf.org/doc/draft-barney-caam/)** (score: 4.0) — Specifies Contextual Agent Authorization Mesh for runtime authorization of agents after discovery, p +- **[draft-han-anima-ai-asa](https://datatracker.ietf.org/doc/draft-han-anima-ai-asa/)** (score: 4.0) — Analyzes the impact of enhancing ANIMA's Autonomic Service Agents with AI/LLM capabilities, focusing - **[draft-rosenberg-aiproto-cheq](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-cheq/)** (score: 3.9) — Proposes CHEQ protocol for human confirmation of AI agent decisions before execution. Protects again - **[draft-berlinai-vera](https://datatracker.ietf.org/doc/draft-berlinai-vera/)** (score: 3.9) — Introduces VERA, a zero-trust architecture for AI agent security with five enforcement pillars and c - **[draft-chen-ai-agent-auth-new-requirements](https://datatracker.ietf.org/doc/draft-chen-ai-agent-auth-new-requirements/)** (score: 3.8) — Identifies new authentication and authorization requirements for AI agents that go beyond traditiona @@ -112,6 +122,8 @@ - **[draft-rosenberg-oauth-aauth](https://datatracker.ietf.org/doc/draft-rosenberg-oauth-aauth/)** (score: 3.6) — Extends OAuth 2.1 for AI agents operating through PSTN/SMS channels to obtain access tokens using PI - **[draft-rosenberg-cheq](https://datatracker.ietf.org/doc/draft-rosenberg-cheq/)** (score: 3.6) — Proposes CHEQ protocol for human-in-the-loop confirmation of AI agent decisions before execution. Us - **[draft-messous-eat-ai](https://datatracker.ietf.org/doc/draft-messous-eat-ai/)** (score: 3.6) — Defines an Entity Attestation Token profile for remote attestation of autonomous AI agents, specifyi +- **[draft-reilly-sentinel-protocol](https://datatracker.ietf.org/doc/draft-reilly-sentinel-protocol/)** (score: 3.6) — Defines blockchain-anchored integrity protocol for AI lifecycle provenance using Sentinel Evidence P +- **[draft-vaughan-aipref-vocab](https://datatracker.ietf.org/doc/draft-vaughan-aipref-vocab/)** (score: 3.6) — Proposes vocabulary for rightsholders to express content preferences for AI training use through met - **[draft-wang-hjs-accountability](https://datatracker.ietf.org/doc/draft-wang-hjs-accountability/)** (score: 3.5) — Defines HJS accountability layer for AI agents using blockchain-anchored timestamps to create immuta - **[draft-ietf-sml-trust](https://datatracker.ietf.org/doc/draft-ietf-sml-trust/)** (score: 3.5) — Provides trust and security recommendations for handling structured data in email messages. Addresse - **[draft-yuan-rtgwg-security-agent-usecase](https://datatracker.ietf.org/doc/draft-yuan-rtgwg-security-agent-usecase/)** (score: 3.4) — Proposes AI Network Security Agents for routers to provide intelligent, adaptive security capabiliti @@ -119,24 +131,16 @@ - **[draft-jiang-seat-dynamic-attestation](https://datatracker.ietf.org/doc/draft-jiang-seat-dynamic-attestation/)** (score: 3.4) — Defines dynamic attestation mechanisms for AI agents to convey runtime posture changes during long-l - **[draft-romanchuk-normative-admissibility](https://datatracker.ietf.org/doc/draft-romanchuk-normative-admissibility/)** (score: 3.4) — Establishes a framework for evaluating whether autonomous agent speech acts are admissible based on - **[draft-diaconu-agents-authz-info-sharing](https://datatracker.ietf.org/doc/draft-diaconu-agents-authz-info-sharing/)** (score: 3.2) — Addresses authorization challenges in distributed multi-agent systems across multiple domains. Cover -- **[draft-kale-agntcy-federated-privacy](https://datatracker.ietf.org/doc/draft-kale-agntcy-federated-privacy/)** (score: 3.2) — Specifies architecture for privacy-preserving federated learning across multi-tenant AI agent system -- **[draft-mvieuille-kerpass-ephemsec](https://datatracker.ietf.org/doc/draft-mvieuille-kerpass-ephemsec/)** (score: 3.1) — Specifies EPHEMSEC algorithm for generating one-time passwords using public key cryptography instead -- **[draft-contario-totp-secure-enrollment](https://datatracker.ietf.org/doc/draft-contario-totp-secure-enrollment/)** (score: 3.1) — Extends TOTP enrollment to prevent key compromise through QR code capture or key persistence in exte -- **[draft-architect-cittamarket](https://datatracker.ietf.org/doc/draft-architect-cittamarket/)** (score: 3.1) — Specifies protocol for immutable AGI system identification using Bitcoin blockchain anchoring. Defin -## Agent discovery / registration (9 drafts) +## Agent discovery / registration (5 drafts) - **[draft-nandakumar-agent-sd-jwt](https://datatracker.ietf.org/doc/draft-nandakumar-agent-sd-jwt/)** (score: 3.9) — This draft defines SD-Card, a Selective Disclosure JWT encoding of Agent Cards that enables privacy- - **[draft-wahl-scim-agent-schema](https://datatracker.ietf.org/doc/draft-wahl-scim-agent-schema/)** (score: 3.9) — This draft extends the SCIM (System for Cross-domain Identity Management) protocol to support AI age - **[draft-huang-acme-scalable-agent-enrollment](https://datatracker.ietf.org/doc/draft-huang-acme-scalable-agent-enrollment/)** (score: 3.5) — This draft proposes two scalable models for certificate enrollment of AI agents: one using Zero-Know - **[draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/)** (score: 3.3) — This draft proposes an identity management framework for agents in an Internet of Agents (IOA) syste - **[draft-narvaneni-agent-uri](https://datatracker.ietf.org/doc/draft-narvaneni-agent-uri/)** (score: 3.3) — This draft defines the agent:// URI scheme for addressing and interoperating with software agents ac -- **[draft-hw-ai-agent-6g](https://datatracker.ietf.org/doc/draft-hw-ai-agent-6g/)** (score: 3.1) — This draft analyzes requirements for agent protocols specifically tailored to 6G mobile networks, ex -- **[draft-cui-ai-agent-task](https://datatracker.ietf.org/doc/draft-cui-ai-agent-task/)** (score: 3.0) — This draft proposes requirements for standardized AI agent protocols to enable task-oriented coordin -- **[draft-yl-agent-id-requirements](https://datatracker.ietf.org/doc/draft-yl-agent-id-requirements/)** (score: 2.9) — This draft proposes requirements for digital identity management in AI agent communication protocols -- **[draft-wang-nmrg-magent-im](https://datatracker.ietf.org/doc/draft-wang-nmrg-magent-im/)** (score: 2.9) — This draft proposes a protocol-agnostic data model for multi-agent communication in autonomous netwo -## Agent discovery/reg (50 drafts) +## Agent discovery/reg (43 drafts) - **[draft-narajala-ans](https://datatracker.ietf.org/doc/draft-narajala-ans/)** (score: 4.2) — Introduces Agent Name Service (ANS) as a DNS-based universal directory for AI agent discovery and ve - **[draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/)** (score: 4.2) — Specifies a comprehensive multi-agent collaboration protocol suite using Agent Gateways for registra @@ -153,6 +157,7 @@ - **[draft-eckert-anima-acp-free-ani](https://datatracker.ietf.org/doc/draft-eckert-anima-acp-free-ani/)** (score: 3.8) — Describes lightweight variation of Autonomic Networking Infrastructure without expensive ACP impleme - **[draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/)** (score: 3.7) — Defines comprehensive agent identity management for Internet of Agents systems. Covers agent registr - **[draft-an-nmrg-i2icf-cits](https://datatracker.ietf.org/doc/draft-an-nmrg-i2icf-cits/)** (score: 3.7) — Defines framework for orchestrating In-Network Computing Functions in Cooperative Intelligent Transp +- **[draft-howe-sipcore-mcp-extension](https://datatracker.ietf.org/doc/draft-howe-sipcore-mcp-extension/)** (score: 3.7) — Defines SIP extension to carry Model Context Protocol with new option-tags, headers, and media types - **[draft-rosenberg-aiproto](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto/)** (score: 3.7) — Defines N-ACT protocol for AI agents to discover and invoke third-party tools and APIs. Focuses on e - **[draft-rosenberg-aiproto-nact](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-nact/)** (score: 3.7) — Defines N-ACT protocol for AI agents to discover and invoke third-party tools and APIs. Focuses on e - **[draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/)** (score: 3.6) — Defines comprehensive framework for AI agent networks based on Agent Network Protocol (ANP). Provide @@ -163,12 +168,16 @@ - **[draft-li-semantic-routing-architecture](https://datatracker.ietf.org/doc/draft-li-semantic-routing-architecture/)** (score: 3.6) — Introduces semantic routing architecture using intent vectors and trust scores for AI agent communic - **[draft-mozleywilliams-dnsop-dnsaid](https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-dnsaid/)** (score: 3.6) — Uses existing DNS infrastructure for AI agent discovery through structured namespace and metadata ex - **[draft-eggert-mailmaint-uaautoconf](https://datatracker.ietf.org/doc/draft-eggert-mailmaint-uaautoconf/)** (score: 3.6) — Specifies automatic configuration mechanism for email, calendar, and contact applications. Enables s +- **[draft-li-cats-idn](https://datatracker.ietf.org/doc/draft-li-cats-idn/)** (score: 3.6) — Introduces Intelligence Delivery Network (IDN) framework for deploying ML models across distributed - **[draft-liu-dmsc-acps-arc](https://datatracker.ietf.org/doc/draft-liu-dmsc-acps-arc/)** (score: 3.6) — Proposes Agent Collaboration Protocols architecture for Internet of Agents, covering agent lifecycle - **[draft-liang-agentdns](https://datatracker.ietf.org/doc/draft-liang-agentdns/)** (score: 3.5) — Proposes a DNS-inspired naming and service discovery system for LLM agents to enable autonomous disc - **[draft-mozley-aidiscovery](https://datatracker.ietf.org/doc/draft-mozley-aidiscovery/)** (score: 3.5) — Defines requirements and considerations for AI agent-to-agent discovery mechanisms. Addresses the fu - **[draft-ye-problems-and-requirements-of-dns-for-ioa](https://datatracker.ietf.org/doc/draft-ye-problems-and-requirements-of-dns-for-ioa/)** (score: 3.5) — Analyzes DNS challenges for Internet of Agents scenarios and identifies technical requirements. Expl - **[draft-li-dmsc-mcps-agw](https://datatracker.ietf.org/doc/draft-li-dmsc-mcps-agw/)** (score: 3.5) — Defines a protocol suite using Agent Gateways as control-plane entities for multi-agent collaboratio - **[draft-kartha-grd](https://datatracker.ietf.org/doc/draft-kartha-grd/)** (score: 3.4) — Defines architectural framework for discovering network resources based on physical location and con +- **[draft-du-catalist-routing-considerations](https://datatracker.ietf.org/doc/draft-du-catalist-routing-considerations/)** (score: 3.4) — Proposes routing considerations for AI agent-to-agent communication in overlay networks. Focuses on +- **[draft-kartha-internet20-ainative](https://datatracker.ietf.org/doc/draft-kartha-internet20-ainative/)** (score: 3.4) — Proposes Internet 2.0 architecture with AI models as first-class network entities, including HTTP+AI +- **[draft-jimenez-tbd-robotstxt-update](https://datatracker.ietf.org/doc/draft-jimenez-tbd-robotstxt-update/)** (score: 3.4) — Proposes updates to robots.txt standard to handle AI-specific crawlers with new syntax for user-agen - **[draft-stephan-ai-agent-6g](https://datatracker.ietf.org/doc/draft-stephan-ai-agent-6g/)** (score: 3.4) — Examines AI agent communication protocols specifically for 6G systems based on 3GPP requirements. Ex - **[draft-zeng-nmrg-mcp-usecases-requirements](https://datatracker.ietf.org/doc/draft-zeng-nmrg-mcp-usecases-requirements/)** (score: 3.4) — Presents problem statement for integrating Model Context Protocol into network management for AI age - **[draft-sz-dmsc-iaip](https://datatracker.ietf.org/doc/draft-sz-dmsc-iaip/)** (score: 3.3) — Defines Intent-based Agent Interconnection Protocol (IAIP) for dynamic agent discovery and routing a @@ -176,26 +185,17 @@ - **[draft-liu-rtgwg-agent-gateway-requirements](https://datatracker.ietf.org/doc/draft-liu-rtgwg-agent-gateway-requirements/)** (score: 3.2) — Discusses requirements for Agent Gateways in agent-to-agent communications to improve scalability, e - **[draft-pioli-agent-discovery](https://datatracker.ietf.org/doc/draft-pioli-agent-discovery/)** (score: 3.2) — Specifies ARDP, a lightweight protocol for agent registration and discovery in distributed environme - **[draft-gaikwad-woa](https://datatracker.ietf.org/doc/draft-gaikwad-woa/)** (score: 3.2) — Specifies Web of Agents (WoA) format using JSON Schema to describe AI agent inputs/outputs served fr -- **[draft-tong-network-agent-use-cases-in-6g](https://datatracker.ietf.org/doc/draft-tong-network-agent-use-cases-in-6g/)** (score: 3.2) — Introduces network AI agent use cases in 6G focusing on connectivity services and third-party applic -- **[draft-meunier-webbotauth-registry](https://datatracker.ietf.org/doc/draft-meunier-webbotauth-registry/)** (score: 3.2) — Defines a JSON format for web bot signature agent cards to advertise identity, purpose, and cryptogr -- **[draft-mao-rtgwg-apn-framework-for-ioa](https://datatracker.ietf.org/doc/draft-mao-rtgwg-apn-framework-for-ioa/)** (score: 3.2) — Applies Application-aware Performance Network framework to Internet of Agents scenario. Addresses ne -- **[draft-zhang-dmsc-ioa-semantic-interaction](https://datatracker.ietf.org/doc/draft-zhang-dmsc-ioa-semantic-interaction/)** (score: 3.2) — Specifies a semantic layer for Internet of Agents using ontology models and JSON-LD serialization. D -- **[draft-sun-zhang-iaip](https://datatracker.ietf.org/doc/draft-sun-zhang-iaip/)** (score: 3.2) — Defines Intent-based Agent Interconnection Protocol for Agent Gateways, focusing on semantic intent -- **[draft-a2a-moqt-transport](https://datatracker.ietf.org/doc/draft-a2a-moqt-transport/)** (score: 3.1) — Specifies transport of Agent-to-Agent protocol over Media over QUIC Transport. Leverages MOQT's publ -- **[draft-levy-llm-uri-scheme](https://datatracker.ietf.org/doc/draft-levy-llm-uri-scheme/)** (score: 3.1) — Defines a URI scheme for identifying LLM endpoints with embedded configuration parameters. Creates a -- **[draft-vinaysingh-awp-wellknown](https://datatracker.ietf.org/doc/draft-vinaysingh-awp-wellknown/)** (score: 3.1) — Defines well-known URI and link relation for exposing website workflows to automated agents. Provide -- **[draft-nandakumar-a2a-moqt-transport](https://datatracker.ietf.org/doc/draft-nandakumar-a2a-moqt-transport/)** (score: 3.0) — Identical specification to draft-a2a-moqt-transport for transporting Agent-to-Agent protocol over MO -- **[draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/)** (score: 3.0) — Proposes a multi-agent communication framework for network AIOps with AI gateway, Agent Name Service -- **[draft-yang-dmsc-ioa-task-protocol](https://datatracker.ietf.org/doc/draft-yang-dmsc-ioa-task-protocol/)** (score: 3.0) — Defines a protocol for distributed collaboration among heterogeneous AI agents, enabling dynamic tea -- **[draft-ietf-roll-enrollment-priority](https://datatracker.ietf.org/doc/draft-ietf-roll-enrollment-priority/)** (score: 2.9) — Provides mechanism for RPL Root to control enrollment announcements and adjust enrollment priorities -## Agent identity/auth (86 drafts) +## Agent identity/auth (75 drafts) +- **[draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/)** (score: 4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra - **[draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/)** (score: 4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and - **[draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/)** (score: 4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou - **[draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/)** (score: 4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb +- **[draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/)** (score: 4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L - **[draft-ietf-lake-app-profiles](https://datatracker.ietf.org/doc/draft-ietf-lake-app-profiles/)** (score: 4.6) — Defines canonical CBOR representation for EDHOC application profiles and coordination mechanisms for - **[draft-goswami-agentic-jwt](https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/)** (score: 4.5) — Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autonomous AI systems. Int +- **[draft-wang-cats-odsi](https://datatracker.ietf.org/doc/draft-wang-cats-odsi/)** (score: 4.5) — Specifies framework for decentralized LLM inference across untrusted participants with layer-aware e - **[draft-aylward-aiga-2](https://datatracker.ietf.org/doc/draft-aylward-aiga-2/)** (score: 4.5) — Comprehensive AI governance framework with tiered risk model, federated authority network, and econo - **[draft-ietf-anima-constrained-voucher](https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/)** (score: 4.3) — Adapts BRSKI secure device onboarding for constrained IoT environments using CBOR vouchers and CoAP/ - **[draft-ietf-hpke-hpke](https://datatracker.ietf.org/doc/draft-ietf-hpke-hpke/)** (score: 4.3) — Comprehensive specification for hybrid public key encryption supporting arbitrary-sized plaintexts. @@ -223,6 +223,8 @@ - **[draft-josefsson-chempat](https://datatracker.ietf.org/doc/draft-josefsson-chempat/)** (score: 3.9) — Generic framework for Post-Quantum/Traditional hybrid key encapsulation mechanisms. Provides concret - **[draft-ravikiran-clawdentity-protocol](https://datatracker.ietf.org/doc/draft-ravikiran-clawdentity-protocol/)** (score: 3.9) — Specifies Clawdentity protocol for cryptographic identity and trust in AI agent communication. Provi - **[draft-bradleylundberg-cfrg-arkg](https://datatracker.ietf.org/doc/draft-bradleylundberg-cfrg-arkg/)** (score: 3.9) — Defines Asynchronous Remote Key Generation algorithm enabling delegation of public key generation wi +- **[draft-tsyrulnikov-rats-attested-inference-receipt](https://datatracker.ietf.org/doc/draft-tsyrulnikov-rats-attested-inference-receipt/)** (score: 3.9) — Defines Attested Inference Receipt (AIR) using COSE/CWT to create verifiable receipts for confidenti +- **[draft-ramadan-mboned-sonar](https://datatracker.ietf.org/doc/draft-ramadan-mboned-sonar/)** (score: 3.8) — Specifies a protocol for verifiable multicast delivery using cryptoeconomic accountability and stati - **[draft-ietf-emu-hybrid-pqc-eapaka](https://datatracker.ietf.org/doc/draft-ietf-emu-hybrid-pqc-eapaka/)** (score: 3.8) — Enhances EAP-AKA' with post-quantum cryptography to address quantum computing threats. Uses hybrid P - **[draft-chen-ai-agent-auth-new-requirements](https://datatracker.ietf.org/doc/draft-chen-ai-agent-auth-new-requirements/)** (score: 3.8) — Identifies new authentication and authorization requirements for AI agents that go beyond traditiona - **[draft-sogomonian-ai-uri-scheme](https://datatracker.ietf.org/doc/draft-sogomonian-ai-uri-scheme/)** (score: 3.8) — Defines experimental AI URI scheme for dedicated AI resource access. Enables native connectivity for @@ -261,37 +263,14 @@ - **[draft-liu-rtgwg-agent-gateway-requirements](https://datatracker.ietf.org/doc/draft-liu-rtgwg-agent-gateway-requirements/)** (score: 3.2) — Discusses requirements for Agent Gateways in agent-to-agent communications to improve scalability, e - **[draft-pioli-agent-discovery](https://datatracker.ietf.org/doc/draft-pioli-agent-discovery/)** (score: 3.2) — Specifies ARDP, a lightweight protocol for agent registration and discovery in distributed environme - **[draft-diaconu-agents-authz-info-sharing](https://datatracker.ietf.org/doc/draft-diaconu-agents-authz-info-sharing/)** (score: 3.2) — Addresses authorization challenges in distributed multi-agent systems across multiple domains. Cover -- **[draft-ietf-emu-eap-edhoc](https://datatracker.ietf.org/doc/draft-ietf-emu-eap-edhoc/)** (score: 3.2) — Defines EAP authentication method based on EDHOC for constrained environments. Integrates EDHOC's li -- **[draft-lake-pocero-authkem-edhoc](https://datatracker.ietf.org/doc/draft-lake-pocero-authkem-edhoc/)** (score: 3.2) — This draft extends the EDHOC protocol to provide quantum-resistant authentication using KEM-based me -- **[draft-meunier-webbotauth-registry](https://datatracker.ietf.org/doc/draft-meunier-webbotauth-registry/)** (score: 3.2) — Defines a JSON format for web bot signature agent cards to advertise identity, purpose, and cryptogr -- **[draft-ra-emu-pqc-eapaka](https://datatracker.ietf.org/doc/draft-ra-emu-pqc-eapaka/)** (score: 3.2) — Enhances EAP-AKA' with post-quantum key encapsulation mechanisms to protect against quantum computer -- **[draft-yao-agent-auth-considerations](https://datatracker.ietf.org/doc/draft-yao-agent-auth-considerations/)** (score: 3.1) — Extends OAuth model for AI agent authentication and authorization in Agent Communication Networks. P -- **[draft-mvieuille-kerpass-ephemsec](https://datatracker.ietf.org/doc/draft-mvieuille-kerpass-ephemsec/)** (score: 3.1) — Specifies EPHEMSEC algorithm for generating one-time passwords using public key cryptography instead -- **[draft-contario-totp-secure-enrollment](https://datatracker.ietf.org/doc/draft-contario-totp-secure-enrollment/)** (score: 3.1) — Extends TOTP enrollment to prevent key compromise through QR code capture or key persistence in exte -- **[draft-architect-cittamarket](https://datatracker.ietf.org/doc/draft-architect-cittamarket/)** (score: 3.1) — Specifies protocol for immutable AGI system identification using Bitcoin blockchain anchoring. Defin -- **[draft-ni-wimse-ai-agent-identity](https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/)** (score: 3.0) — Applies WIMSE (Workload Identity in Multi System Environments) framework to AI agents for identity a -- **[draft-sipos-dtn-bp-safe](https://datatracker.ietf.org/doc/draft-sipos-dtn-bp-safe/)** (score: 3.0) — Defines security association negotiation protocol for Bundle Protocol agents in delay-tolerant netwo -- **[draft-chen-lake-edhoc-aka](https://datatracker.ietf.org/doc/draft-chen-lake-edhoc-aka/)** (score: 3.0) — Defines EDHOC-AKA authentication method combining AKA protocol with EDHOC for mobile network access -- **[draft-wendt-stir-vesper](https://datatracker.ietf.org/doc/draft-wendt-stir-vesper/)** (score: 3.0) — Formalizes framework for verifiable telephone number identity using delegate certificates and author -- **[draft-cui-dmsc-agent-cdi](https://datatracker.ietf.org/doc/draft-cui-dmsc-agent-cdi/)** (score: 3.0) — Defines comprehensive framework for cross-domain AI agent interoperability including identity federa -- **[draft-condrey-rats-witnessd-enrollment](https://datatracker.ietf.org/doc/draft-condrey-rats-witnessd-enrollment/)** (score: 3.0) — Specifies trust anchor bootstrap protocol for proof of process framework. Defines device enrollment, -- **[draft-pocero-authkem-ikr-edhoc](https://datatracker.ietf.org/doc/draft-pocero-authkem-ikr-edhoc/)** (score: 3.0) — This draft proposes a KEM-based authentication variant for EDHOC that optimizes for scenarios where -- **[draft-happel-structured-email-trust](https://datatracker.ietf.org/doc/draft-happel-structured-email-trust/)** (score: 2.9) — Provides trust and security recommendations for handling structured data in email messages. Focuses -## Agent-to-agent communication protocols (12 drafts) +## Agent-to-agent communication protocols (5 drafts) - **[draft-nandakumar-agent-sd-jwt](https://datatracker.ietf.org/doc/draft-nandakumar-agent-sd-jwt/)** (score: 3.9) — This draft defines SD-Card, a Selective Disclosure JWT encoding of Agent Cards that enables privacy- - **[draft-oauth-ai-agents-on-behalf-of-user](https://datatracker.ietf.org/doc/draft-oauth-ai-agents-on-behalf-of-user/)** (score: 3.7) — This draft extends OAuth 2.0 to enable AI agents to securely obtain access tokens for acting on beha - **[draft-liu-agent-context-protocol](https://datatracker.ietf.org/doc/draft-liu-agent-context-protocol/)** (score: 3.5) — This draft proposes a standard protocol for AI agents to communicate context information to each oth - **[draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/)** (score: 3.3) — This draft proposes an identity management framework for agents in an Internet of Agents (IOA) syste - **[draft-narvaneni-agent-uri](https://datatracker.ietf.org/doc/draft-narvaneni-agent-uri/)** (score: 3.3) — This draft defines the agent:// URI scheme for addressing and interoperating with software agents ac -- **[draft-hw-ai-agent-6g](https://datatracker.ietf.org/doc/draft-hw-ai-agent-6g/)** (score: 3.1) — This draft analyzes requirements for agent protocols specifically tailored to 6G mobile networks, ex -- **[draft-zhang-agent-gap-network](https://datatracker.ietf.org/doc/draft-zhang-agent-gap-network/)** (score: 3.0) — This draft identifies problems and gaps in mobile core networks for supporting AI agent communicatio -- **[draft-cui-ai-agent-task](https://datatracker.ietf.org/doc/draft-cui-ai-agent-task/)** (score: 3.0) — This draft proposes requirements for standardized AI agent protocols to enable task-oriented coordin -- **[draft-zhang-rtgwg-ai-agents-troubleshooting](https://datatracker.ietf.org/doc/draft-zhang-rtgwg-ai-agents-troubleshooting/)** (score: 2.9) — This draft defines use cases and communication protocol requirements for troubleshooting agents depl -- **[draft-yl-agent-id-requirements](https://datatracker.ietf.org/doc/draft-yl-agent-id-requirements/)** (score: 2.9) — This draft proposes requirements for digital identity management in AI agent communication protocols -- **[draft-wang-nmrg-magent-im](https://datatracker.ietf.org/doc/draft-wang-nmrg-magent-im/)** (score: 2.9) — This draft proposes a protocol-agnostic data model for multi-agent communication in autonomous netwo -- **[draft-xie-ai-agent-multimodal](https://datatracker.ietf.org/doc/draft-xie-ai-agent-multimodal/)** (score: 2.9) — This draft outlines requirements for multimodal communication in AI agent protocols, enabling agents ## Autonomous netops (46 drafts) @@ -299,8 +278,12 @@ - **[draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/)** (score: 4.2) — Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o - **[draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/)** (score: 4.1) — Defines task-oriented multi-agent framework for fault recovery in converged mobile networks. Targets - **[draft-cui-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/)** (score: 4.1) — Defines framework for collaborative network management between LLM agents and human operators. Intro +- **[draft-jadoon-nmrg-agentic-ai-autonomous-networks](https://datatracker.ietf.org/doc/draft-jadoon-nmrg-agentic-ai-autonomous-networks/)** (score: 4.1) — Introduces architectural principles for integrating AI agents into IP protocol stack layers while pr +- **[draft-chen-nmrg-semantic-inference-routing](https://datatracker.ietf.org/doc/draft-chen-nmrg-semantic-inference-routing/)** (score: 4.1) — Defines SIRP protocol for content-aware routing of AI inference requests. Enables routing decisions - **[draft-ietf-lisp-nexagon](https://datatracker.ietf.org/doc/draft-ietf-lisp-nexagon/)** (score: 4.0) — Combines LISP with H3 spatial indexing to create geospatial intelligence network for physical-world +- **[draft-han-anima-ai-asa](https://datatracker.ietf.org/doc/draft-han-anima-ai-asa/)** (score: 4.0) — Analyzes the impact of enhancing ANIMA's Autonomic Service Agents with AI/LLM capabilities, focusing - **[draft-zeng-opsawg-llm-netconf-gap](https://datatracker.ietf.org/doc/draft-zeng-opsawg-llm-netconf-gap/)** (score: 3.9) — Analyzes gaps in existing network configuration protocols for LLM-driven intent-based networking. Id +- **[draft-templin-intarea-aero2](https://datatracker.ietf.org/doc/draft-templin-intarea-aero2/)** (score: 3.9) — Specifies AERO service for IP internetworking over overlay multilink networks using IPv6 ND for cont - **[draft-luan-rtgwg-sdaf](https://datatracker.ietf.org/doc/draft-luan-rtgwg-sdaf/)** (score: 3.8) — Proposes symmetry-driven forwarding mechanism for LEO satellite networks to avoid routing loops and - **[draft-zhao-nmop-network-management-agent](https://datatracker.ietf.org/doc/draft-zhao-nmop-network-management-agent/)** (score: 3.8) — Defines AI-driven Network Management Agent concept for Level 4 autonomous networks. Specifies integr - **[draft-eckert-anima-acp-free-ani](https://datatracker.ietf.org/doc/draft-eckert-anima-acp-free-ani/)** (score: 3.8) — Describes lightweight variation of Autonomic Networking Infrastructure without expensive ACP impleme @@ -312,55 +295,45 @@ - **[draft-zm-rtgwg-mcp-troubleshooting](https://datatracker.ietf.org/doc/draft-zm-rtgwg-mcp-troubleshooting/)** (score: 3.6) — Proposes using Model Context Protocol (MCP) to enable LLM-based automated network troubleshooting. M - **[draft-li-semantic-routing-architecture](https://datatracker.ietf.org/doc/draft-li-semantic-routing-architecture/)** (score: 3.6) — Introduces semantic routing architecture using intent vectors and trust scores for AI agent communic - **[draft-cui-nmrg-auto-test](https://datatracker.ietf.org/doc/draft-cui-nmrg-auto-test/)** (score: 3.6) — Framework for AI-assisted network protocol testing using LLMs and automated test generation. Defines +- **[draft-xsaopig-nsttlp-traffic-labeling](https://datatracker.ietf.org/doc/draft-xsaopig-nsttlp-traffic-labeling/)** (score: 3.6) — Specifies protocol for embedding service type identifiers in network packets to enable intelligent t - **[draft-moreno-lisp-uberlay](https://datatracker.ietf.org/doc/draft-moreno-lisp-uberlay/)** (score: 3.6) — Describes using LISP to interconnect multiple independent network overlays through a transit overlay +- **[draft-templin-6man-aero3](https://datatracker.ietf.org/doc/draft-templin-6man-aero3/)** (score: 3.6) — Specifies automatic extended route optimization for IP internetworking over overlay multilink networ - **[draft-liu-dmsc-acps-arc](https://datatracker.ietf.org/doc/draft-liu-dmsc-acps-arc/)** (score: 3.6) — Proposes Agent Collaboration Protocols architecture for Internet of Agents, covering agent lifecycle - **[draft-pbs-sidrops-roaanycast](https://datatracker.ietf.org/doc/draft-pbs-sidrops-roaanycast/)** (score: 3.6) — Defines best practices for managing Route Origin Authorizations (ROAs) for globally anycasted servic - **[draft-ye-problems-and-requirements-of-dns-for-ioa](https://datatracker.ietf.org/doc/draft-ye-problems-and-requirements-of-dns-for-ioa/)** (score: 3.5) — Analyzes DNS challenges for Internet of Agents scenarios and identifies technical requirements. Expl - **[draft-irtf-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-irtf-nmrg-llm-nm/)** (score: 3.5) — Defines framework for collaborative network management between LLMs and human operators with human-i +- **[draft-zeng-mcp-network-measurement](https://datatracker.ietf.org/doc/draft-zeng-mcp-network-measurement/)** (score: 3.5) — Proposes MCP framework for intelligent network measurement with AI assistance. Enables natural langu +- **[draft-templin-intarea-aero](https://datatracker.ietf.org/doc/draft-templin-intarea-aero/)** (score: 3.5) — Specifies Automatic Extended Route Optimization (AERO) service for IP internetworking over Overlay M - **[draft-ahn-nmrg-5g-security-i2nsf-framework](https://datatracker.ietf.org/doc/draft-ahn-nmrg-5g-security-i2nsf-framework/)** (score: 3.5) — Presents integrated framework for automated 5G edge network security using I2NSF architecture and In - **[draft-zhang-rvp-problem-statement](https://datatracker.ietf.org/doc/draft-zhang-rvp-problem-statement/)** (score: 3.5) — Proposes Real-Virtual Agent Protocol for coordinating physical entities with digital agents through - **[draft-zeng-opsawg-applicability-mcp-a2a](https://datatracker.ietf.org/doc/draft-zeng-opsawg-applicability-mcp-a2a/)** (score: 3.5) — Analyzes NETCONF limitations for advanced scenarios and proposes MCP and A2A protocols as complement - **[draft-yuan-rtgwg-security-agent-usecase](https://datatracker.ietf.org/doc/draft-yuan-rtgwg-security-agent-usecase/)** (score: 3.4) — Proposes AI Network Security Agents for routers to provide intelligent, adaptive security capabiliti - **[draft-kartha-grd](https://datatracker.ietf.org/doc/draft-kartha-grd/)** (score: 3.4) — Defines architectural framework for discovering network resources based on physical location and con +- **[draft-tan-ccamp-uonaco-problem-statement](https://datatracker.ietf.org/doc/draft-tan-ccamp-uonaco-problem-statement/)** (score: 3.4) — Defines requirements for unified orchestration between optical networks and AI computing to enable c - **[draft-yan-a2a-device-agent-applicability](https://datatracker.ietf.org/doc/draft-yan-a2a-device-agent-applicability/)** (score: 3.4) — Discusses applying Agent-to-Agent (A2A) Protocol to network management for communication between Con - **[draft-yue-moq-transporting-sensing-data](https://datatracker.ietf.org/doc/draft-yue-moq-transporting-sensing-data/)** (score: 3.4) — Proposes using Media Over QUIC (MOQ) to transport large-scale, real-time sensing data in 6G networks +- **[draft-zw-rtgwg-mcp-network-mgmt](https://datatracker.ietf.org/doc/draft-zw-rtgwg-mcp-network-mgmt/)** (score: 3.4) — Specifies MCP extensions for network equipment management with routers/switches as MCP servers. Defi - **[draft-zeng-nmrg-mcp-usecases-requirements](https://datatracker.ietf.org/doc/draft-zeng-nmrg-mcp-usecases-requirements/)** (score: 3.4) — Presents problem statement for integrating Model Context Protocol into network management for AI age +- **[draft-zhu-anima-service-intent](https://datatracker.ietf.org/doc/draft-zhu-anima-service-intent/)** (score: 3.4) — Defines a structured semantic model for expressing service-level objectives and constraints across n +- **[draft-xsaopig-nmop-service-flow-modal-mapping](https://datatracker.ietf.org/doc/draft-xsaopig-nmop-service-flow-modal-mapping/)** (score: 3.3) — Proposes a framework using ALTO protocol and SDN architecture for mapping service flow characteristi - **[draft-jeong-opsawg-intent-based-sdv-framework](https://datatracker.ietf.org/doc/draft-jeong-opsawg-intent-based-sdv-framework/)** (score: 3.3) — Proposes intent-based management framework for Software-Defined Vehicles in ITS environments. Covers +- **[draft-bernardos-nmrg-agentic-network-optimization](https://datatracker.ietf.org/doc/draft-bernardos-nmrg-agentic-network-optimization/)** (score: 3.3) — Focuses on agentic AI for distributed sensing in ISAC networks with joint optimization of sensing an - **[draft-chuyi-nmrg-ai-agent-network](https://datatracker.ietf.org/doc/draft-chuyi-nmrg-ai-agent-network/)** (score: 3.2) — Focuses on large language model-based agents for network operations and maintenance. Addresses pract - **[draft-ahn-opsawg-5g-security-i2nsf-framework](https://datatracker.ietf.org/doc/draft-ahn-opsawg-5g-security-i2nsf-framework/)** (score: 3.2) — Proposes an integrated security framework for 5G edge networks using I2NSF architecture with Intent- -- **[draft-tong-network-agent-use-cases-in-6g](https://datatracker.ietf.org/doc/draft-tong-network-agent-use-cases-in-6g/)** (score: 3.2) — Introduces network AI agent use cases in 6G focusing on connectivity services and third-party applic -- **[draft-sun-zhang-iaip](https://datatracker.ietf.org/doc/draft-sun-zhang-iaip/)** (score: 3.2) — Defines Intent-based Agent Interconnection Protocol for Agent Gateways, focusing on semantic intent -- **[draft-li-dmsc-inf-architecture](https://datatracker.ietf.org/doc/draft-li-dmsc-inf-architecture/)** (score: 3.1) — Proposes a network infrastructure architecture for large-scale multi-agent collaboration. Focuses on -- **[draft-zeng-mcp-troubleshooting](https://datatracker.ietf.org/doc/draft-zeng-mcp-troubleshooting/)** (score: 3.1) — Applies Model Context Protocol to network management for intent-based troubleshooting. Maps MCP role -- **[draft-sipos-dtn-bp-safe](https://datatracker.ietf.org/doc/draft-sipos-dtn-bp-safe/)** (score: 3.0) — Defines security association negotiation protocol for Bundle Protocol agents in delay-tolerant netwo -- **[draft-bernardos-cats-isac-uc](https://datatracker.ietf.org/doc/draft-bernardos-cats-isac-uc/)** (score: 3.0) — Presents Integrated Sensing and Communications (ISAC) as a use case for CATS architecture. Explores -- **[draft-hong-nmrg-agenticai-ps](https://datatracker.ietf.org/doc/draft-hong-nmrg-agenticai-ps/)** (score: 3.0) — Presents problem statement and motivations for applying Agentic AI to network management. Emphasizes -- **[draft-zhao-nmrg-ai-agent-for-dtn](https://datatracker.ietf.org/doc/draft-zhao-nmrg-ai-agent-for-dtn/)** (score: 3.0) — Proposes AI agent architecture for Digital Twin Networks, integrating autonomous agents at each DTN -- **[draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/)** (score: 3.0) — Proposes a multi-agent communication framework for network AIOps with AI gateway, Agent Name Service -- **[draft-leon-distributed-multi-signer](https://datatracker.ietf.org/doc/draft-leon-distributed-multi-signer/)** (score: 3.0) — Defines distributed DNSSEC multi-signer architecture with multi-signer agents and combiners. Introdu -- **[draft-yang-dmsc-ioa-task-protocol](https://datatracker.ietf.org/doc/draft-yang-dmsc-ioa-task-protocol/)** (score: 3.0) — Defines a protocol for distributed collaboration among heterogeneous AI agents, enabling dynamic tea -- **[draft-condrey-rats-witnessd-enrollment](https://datatracker.ietf.org/doc/draft-condrey-rats-witnessd-enrollment/)** (score: 3.0) — Specifies trust anchor bootstrap protocol for proof of process framework. Defines device enrollment, -- **[draft-ietf-roll-enrollment-priority](https://datatracker.ietf.org/doc/draft-ietf-roll-enrollment-priority/)** (score: 2.9) — Provides mechanism for RPL Root to control enrollment announcements and adjust enrollment priorities -## Autonomous network operations (5 drafts) - -- **[draft-hw-ai-agent-6g](https://datatracker.ietf.org/doc/draft-hw-ai-agent-6g/)** (score: 3.1) — This draft analyzes requirements for agent protocols specifically tailored to 6G mobile networks, ex -- **[draft-zhang-agent-gap-network](https://datatracker.ietf.org/doc/draft-zhang-agent-gap-network/)** (score: 3.0) — This draft identifies problems and gaps in mobile core networks for supporting AI agent communicatio -- **[draft-cui-ai-agent-task](https://datatracker.ietf.org/doc/draft-cui-ai-agent-task/)** (score: 3.0) — This draft proposes requirements for standardized AI agent protocols to enable task-oriented coordin -- **[draft-zhang-rtgwg-ai-agents-troubleshooting](https://datatracker.ietf.org/doc/draft-zhang-rtgwg-ai-agents-troubleshooting/)** (score: 2.9) — This draft defines use cases and communication protocol requirements for troubleshooting agents depl -- **[draft-wang-nmrg-magent-im](https://datatracker.ietf.org/doc/draft-wang-nmrg-magent-im/)** (score: 2.9) — This draft proposes a protocol-agnostic data model for multi-agent communication in autonomous netwo - -## Data formats / semantics for AI interop (3 drafts) +## Data formats / semantics for AI interop (2 drafts) - **[draft-liu-agent-context-protocol](https://datatracker.ietf.org/doc/draft-liu-agent-context-protocol/)** (score: 3.5) — This draft proposes a standard protocol for AI agents to communicate context information to each oth - **[draft-narvaneni-agent-uri](https://datatracker.ietf.org/doc/draft-narvaneni-agent-uri/)** (score: 3.3) — This draft defines the agent:// URI scheme for addressing and interoperating with software agents ac -- **[draft-xie-ai-agent-multimodal](https://datatracker.ietf.org/doc/draft-xie-ai-agent-multimodal/)** (score: 2.9) — This draft outlines requirements for multimodal communication in AI agent protocols, enabling agents -## Data formats/interop (80 drafts) +## Data formats/interop (85 drafts) +- **[draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/)** (score: 4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra +- **[draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/)** (score: 4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L - **[draft-ietf-lake-app-profiles](https://datatracker.ietf.org/doc/draft-ietf-lake-app-profiles/)** (score: 4.6) — Defines canonical CBOR representation for EDHOC application profiles and coordination mechanisms for - **[draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/)** (score: 4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco - **[draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/)** (score: 4.5) — Defines CDDL-based data format for verifiable agent conversation records using COSE signing. Support +- **[draft-ietf-aipref-vocab](https://datatracker.ietf.org/doc/draft-ietf-aipref-vocab/)** (score: 4.4) — Defines a standardized vocabulary for expressing preferences about how digital assets should be used - **[draft-cui-nmrg-llm-benchmark](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-benchmark/)** (score: 4.3) — Provides comprehensive evaluation framework for LLM-based network configuration agents. Includes emu - **[draft-ietf-anima-constrained-voucher](https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/)** (score: 4.3) — Adapts BRSKI secure device onboarding for constrained IoT environments using CBOR vouchers and CoAP/ - **[draft-ietf-hpke-hpke](https://datatracker.ietf.org/doc/draft-ietf-hpke-hpke/)** (score: 4.3) — Comprehensive specification for hybrid public key encryption supporting arbitrary-sized plaintexts. @@ -368,14 +341,18 @@ - **[draft-gaikwad-llm-benchmarking-methodology](https://datatracker.ietf.org/doc/draft-gaikwad-llm-benchmarking-methodology/)** (score: 4.2) — Defines comprehensive benchmarking methodologies for LLM inference serving systems including test pr - **[draft-ietf-sshm-mlkem-hybrid-kex](https://datatracker.ietf.org/doc/draft-ietf-sshm-mlkem-hybrid-kex/)** (score: 4.2) — Defines post-quantum hybrid key exchange combining ML-KEM with traditional ECDH for SSH transport la - **[draft-ietf-tls-extended-key-update](https://datatracker.ietf.org/doc/draft-ietf-tls-extended-key-update/)** (score: 4.2) — Adds post-compromise security to TLS 1.3 through fresh Diffie-Hellman exchanges during active sessio +- **[draft-calabria-bmwg-ai-fabric-terminology](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-terminology/)** (score: 4.2) — Defines comprehensive benchmarking terminology for AI network fabrics including collective communica - **[draft-narajala-ans](https://datatracker.ietf.org/doc/draft-narajala-ans/)** (score: 4.2) — Introduces Agent Name Service (ANS) as a DNS-based universal directory for AI agent discovery and ve - **[draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/)** (score: 4.2) — Specifies a comprehensive multi-agent collaboration protocol suite using Agent Gateways for registra - **[draft-gaikwad-llm-benchmarking-profiles](https://datatracker.ietf.org/doc/draft-gaikwad-llm-benchmarking-profiles/)** (score: 4.2) — Defines performance benchmarking profiles binding terminology and methodology to concrete architectu - **[draft-cui-dns-native-agent-naming-resolution](https://datatracker.ietf.org/doc/draft-cui-dns-native-agent-naming-resolution/)** (score: 4.1) — Specifies DNS-native naming and resolution for AI agents using FQDNs and SVCB records. Emphasizes DN - **[draft-nederveld-adl](https://datatracker.ietf.org/doc/draft-nederveld-adl/)** (score: 4.1) — Defines ADL, a JSON-based standard for describing AI agents including their capabilities, tools, per - **[draft-steele-agent-considerations](https://datatracker.ietf.org/doc/draft-steele-agent-considerations/)** (score: 4.0) — Defines guidelines for IETF specifications to support AI agent consumption and code generation. Intr +- **[draft-chen-nmrg-multi-provider-inference-api](https://datatracker.ietf.org/doc/draft-chen-nmrg-multi-provider-inference-api/)** (score: 4.0) — Specifies extensions for multi-provider AI inference using OpenAI API as reference standard. Enables - **[draft-ietf-lisp-nexagon](https://datatracker.ietf.org/doc/draft-ietf-lisp-nexagon/)** (score: 4.0) — Combines LISP with H3 spatial indexing to create geospatial intelligence network for physical-world - **[draft-nennemann-wimse-ect](https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/)** (score: 4.0) — Defines Execution Context Tokens as JWT extension to WIMSE for tracking task execution in distribute +- **[draft-jennings-ai-mcp-over-moq](https://datatracker.ietf.org/doc/draft-jennings-ai-mcp-over-moq/)** (score: 4.0) — Defines how to transport Model Context Protocol (MCP) messages over Media over QUIC Transport (MOQT) +- **[draft-dunbar-neotec-ac-te-applicability](https://datatracker.ietf.org/doc/draft-dunbar-neotec-ac-te-applicability/)** (score: 4.0) — Applies existing IETF YANG models for Attachment Circuits and Traffic Engineering to dynamic AI mode - **[draft-ietf-ace-coap-est-oscore](https://datatracker.ietf.org/doc/draft-ietf-ace-coap-est-oscore/)** (score: 3.9) — Specifies carrying EST certificate provisioning over CoAP using OSCORE protection instead of DTLS. B - **[draft-agent-gw](https://datatracker.ietf.org/doc/draft-agent-gw/)** (score: 3.9) — Proposes an Intelligent Agent Communication Gateway for large-scale multi-agent collaboration. Featu - **[draft-mp-agntcy-ads](https://datatracker.ietf.org/doc/draft-mp-agntcy-ads/)** (score: 3.9) — Describes Agent Directory Service for storing and discovering AI agent metadata based on skills. Fea @@ -388,77 +365,78 @@ - **[draft-jurkovikj-httpapi-agentic-state](https://datatracker.ietf.org/doc/draft-jurkovikj-httpapi-agentic-state/)** (score: 3.9) — Defines Agentic State Transfer (AST) HTTP profile for managing canonical resource state across multi - **[draft-tejido-swp-core](https://datatracker.ietf.org/doc/draft-tejido-swp-core/)** (score: 3.9) — Specifies SlimWire Protocol Core, a binary framing layer for agent/tool messaging with profile-based - **[draft-bradleylundberg-cfrg-arkg](https://datatracker.ietf.org/doc/draft-bradleylundberg-cfrg-arkg/)** (score: 3.9) — Defines Asynchronous Remote Key Generation algorithm enabling delegation of public key generation wi +- **[draft-tsyrulnikov-rats-attested-inference-receipt](https://datatracker.ietf.org/doc/draft-tsyrulnikov-rats-attested-inference-receipt/)** (score: 3.9) — Defines Attested Inference Receipt (AIR) using COSE/CWT to create verifiable receipts for confidenti +- **[draft-templin-intarea-aero2](https://datatracker.ietf.org/doc/draft-templin-intarea-aero2/)** (score: 3.9) — Specifies AERO service for IP internetworking over overlay multilink networks using IPv6 ND for cont +- **[draft-ramadan-mboned-sonar](https://datatracker.ietf.org/doc/draft-ramadan-mboned-sonar/)** (score: 3.8) — Specifies a protocol for verifiable multicast delivery using cryptoeconomic accountability and stati - **[draft-sogomonian-ai-uri-scheme](https://datatracker.ietf.org/doc/draft-sogomonian-ai-uri-scheme/)** (score: 3.8) — Defines experimental AI URI scheme for dedicated AI resource access. Enables native connectivity for - **[draft-srijal-agents-policy](https://datatracker.ietf.org/doc/draft-srijal-agents-policy/)** (score: 3.8) — Specifies AGENTS.TXT protocol as strict plaintext policy file for automated clients, bots, and crawl - **[draft-abbey-scim-agent-extension](https://datatracker.ietf.org/doc/draft-abbey-scim-agent-extension/)** (score: 3.8) — Extends SCIM 2.0 protocol to manage AI agents and agentic applications across domains. Adds new sche +- **[draft-ietf-aipref-attach](https://datatracker.ietf.org/doc/draft-ietf-aipref-attach/)** (score: 3.8) — Specifies how AI usage preferences can be signaled during HTTP content acquisition. Updates RFC 9309 - **[draft-scim-agent-extension](https://datatracker.ietf.org/doc/draft-scim-agent-extension/)** (score: 3.7) — Extends SCIM 2.0 specification to manage agents and agentic applications across domains. Builds on e - **[draft-rosenberg-aiproto-framework](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-framework/)** (score: 3.7) — Provides framework and requirements for AI agent protocols on the Internet. Surveys existing approac - **[draft-ietf-lamps-rfc7030-csrattrs](https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc7030-csrattrs/)** (score: 3.7) — Updates RFC7030 to clarify CSR Attributes Response encoding and adds template-based approach for EST - **[draft-ietf-suit-firmware-encryption](https://datatracker.ietf.org/doc/draft-ietf-suit-firmware-encryption/)** (score: 3.7) — Specifies encryption techniques for firmware and software payloads in SUIT manifests. Uses ES-DH and - **[draft-ietf-lamps-est-renewal-info](https://datatracker.ietf.org/doc/draft-ietf-lamps-est-renewal-info/)** (score: 3.7) — Extends EST protocol to provide server-side recommendations for certificate renewal timing. Addresse - **[draft-ietf-netconf-configuration-tracing](https://datatracker.ietf.org/doc/draft-ietf-netconf-configuration-tracing/)** (score: 3.7) — Specifies a NETCONF mechanism to map configuration modifications to their originating NMS using exte +- **[draft-howe-sipcore-mcp-extension](https://datatracker.ietf.org/doc/draft-howe-sipcore-mcp-extension/)** (score: 3.7) — Defines SIP extension to carry Model Context Protocol with new option-tags, headers, and media types - **[draft-rosenberg-aiproto](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto/)** (score: 3.7) — Defines N-ACT protocol for AI agents to discover and invoke third-party tools and APIs. Focuses on e - **[draft-rosenberg-aiproto-nact](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-nact/)** (score: 3.7) — Defines N-ACT protocol for AI agents to discover and invoke third-party tools and APIs. Focuses on e - **[draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/)** (score: 3.6) — Defines comprehensive framework for AI agent networks based on Agent Network Protocol (ANP). Provide - **[draft-yang-ioa-protocol](https://datatracker.ietf.org/doc/draft-yang-ioa-protocol/)** (score: 3.6) — Defines the Internet of Agents Protocol for distributed collaboration among heterogeneous AI agents. - **[draft-zm-rtgwg-mcp-troubleshooting](https://datatracker.ietf.org/doc/draft-zm-rtgwg-mcp-troubleshooting/)** (score: 3.6) — Proposes using Model Context Protocol (MCP) to enable LLM-based automated network troubleshooting. M +- **[draft-reilly-sentinel-protocol](https://datatracker.ietf.org/doc/draft-reilly-sentinel-protocol/)** (score: 3.6) — Defines blockchain-anchored integrity protocol for AI lifecycle provenance using Sentinel Evidence P +- **[draft-altanai-aipref-realtime-protocol-bindings](https://datatracker.ietf.org/doc/draft-altanai-aipref-realtime-protocol-bindings/)** (score: 3.6) — Defines how AI preference expressions are bound to real-time protocols like SIP and SDP. Specifies h - **[draft-mozleywilliams-dnsop-dnsaid](https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-dnsaid/)** (score: 3.6) — Uses existing DNS infrastructure for AI agent discovery through structured namespace and metadata ex - **[draft-eggert-mailmaint-uaautoconf](https://datatracker.ietf.org/doc/draft-eggert-mailmaint-uaautoconf/)** (score: 3.6) — Specifies automatic configuration mechanism for email, calendar, and contact applications. Enables s - **[draft-gaikwad-aps-profile](https://datatracker.ietf.org/doc/draft-gaikwad-aps-profile/)** (score: 3.6) — Storage service profile for agent persistent state including embeddings, preferences, and audit logs - **[draft-moreno-lisp-uberlay](https://datatracker.ietf.org/doc/draft-moreno-lisp-uberlay/)** (score: 3.6) — Describes using LISP to interconnect multiple independent network overlays through a transit overlay - **[draft-ietf-lake-edhoc-psk](https://datatracker.ietf.org/doc/draft-ietf-lake-edhoc-psk/)** (score: 3.6) — Specifies pre-shared key authentication method for EDHOC key exchange protocol. Enhances efficiency +- **[draft-vaughan-aipref-vocab](https://datatracker.ietf.org/doc/draft-vaughan-aipref-vocab/)** (score: 3.6) — Proposes vocabulary for rightsholders to express content preferences for AI training use through met - **[draft-irtf-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-irtf-nmrg-llm-nm/)** (score: 3.5) — Defines framework for collaborative network management between LLMs and human operators with human-i - **[draft-ietf-sml-trust](https://datatracker.ietf.org/doc/draft-ietf-sml-trust/)** (score: 3.5) — Provides trust and security recommendations for handling structured data in email messages. Addresse - **[draft-zeng-opsawg-applicability-mcp-a2a](https://datatracker.ietf.org/doc/draft-zeng-opsawg-applicability-mcp-a2a/)** (score: 3.5) — Analyzes NETCONF limitations for advanced scenarios and proposes MCP and A2A protocols as complement - **[draft-kartha-grd](https://datatracker.ietf.org/doc/draft-kartha-grd/)** (score: 3.4) — Defines architectural framework for discovering network resources based on physical location and con +- **[draft-li-cats-aisemantic-contract](https://datatracker.ietf.org/doc/draft-li-cats-aisemantic-contract/)** (score: 3.4) — Defines a contract mechanism allowing AI applications to communicate semantic information about thei +- **[draft-kartha-internet20-ainative](https://datatracker.ietf.org/doc/draft-kartha-internet20-ainative/)** (score: 3.4) — Proposes Internet 2.0 architecture with AI models as first-class network entities, including HTTP+AI - **[draft-yan-a2a-device-agent-applicability](https://datatracker.ietf.org/doc/draft-yan-a2a-device-agent-applicability/)** (score: 3.4) — Discusses applying Agent-to-Agent (A2A) Protocol to network management for communication between Con - **[draft-ietf-lamps-private-key-stmt-attr](https://datatracker.ietf.org/doc/draft-ietf-lamps-private-key-stmt-attr/)** (score: 3.4) — Defines X.509 attribute for private key possession statements as alternative to cryptographic proof - **[draft-yue-moq-transporting-sensing-data](https://datatracker.ietf.org/doc/draft-yue-moq-transporting-sensing-data/)** (score: 3.4) — Proposes using Media Over QUIC (MOQ) to transport large-scale, real-time sensing data in 6G networks - **[draft-ramakrishna-satp-views-addresses](https://datatracker.ietf.org/doc/draft-ramakrishna-satp-views-addresses/)** (score: 3.4) — Defines view and addressing mechanisms for secure asset transfer between DLT systems. Enables cross- +- **[draft-zw-rtgwg-mcp-network-mgmt](https://datatracker.ietf.org/doc/draft-zw-rtgwg-mcp-network-mgmt/)** (score: 3.4) — Specifies MCP extensions for network equipment management with routers/switches as MCP servers. Defi +- **[draft-thomson-aipref-sup](https://datatracker.ietf.org/doc/draft-thomson-aipref-sup/)** (score: 3.4) — Defines simple format for content usage preference expressions with HTTP header field. Updates RFC93 - **[draft-stephan-ai-agent-6g](https://datatracker.ietf.org/doc/draft-stephan-ai-agent-6g/)** (score: 3.4) — Examines AI agent communication protocols specifically for 6G systems based on 3GPP requirements. Ex +- **[draft-han-rtgwg-codeployment-pfc-fgfc](https://datatracker.ietf.org/doc/draft-han-rtgwg-codeployment-pfc-fgfc/)** (score: 3.4) — Describes use cases for coordinating flow control between data center PFC and WAN fine-grained flow - **[draft-sz-dmsc-iaip](https://datatracker.ietf.org/doc/draft-sz-dmsc-iaip/)** (score: 3.3) — Defines Intent-based Agent Interconnection Protocol (IAIP) for dynamic agent discovery and routing a +- **[draft-xsaopig-nmop-service-flow-modal-mapping](https://datatracker.ietf.org/doc/draft-xsaopig-nmop-service-flow-modal-mapping/)** (score: 3.3) — Proposes a framework using ALTO protocol and SDN architecture for mapping service flow characteristi +- **[draft-mcp-over-moqt](https://datatracker.ietf.org/doc/draft-mcp-over-moqt/)** (score: 3.3) — Defines transport mapping for Model Context Protocol over Media over QUIC Transport. Specifies how M +- **[draft-jennings-mcp-over-moqt](https://datatracker.ietf.org/doc/draft-jennings-mcp-over-moqt/)** (score: 3.3) — Defines transport mapping for Model Context Protocol over Media over QUIC Transport. Specifies how M - **[draft-chuyi-nmrg-ai-agent-network](https://datatracker.ietf.org/doc/draft-chuyi-nmrg-ai-agent-network/)** (score: 3.2) — Focuses on large language model-based agents for network operations and maintenance. Addresses pract - **[draft-liu-rtgwg-agent-gateway-requirements](https://datatracker.ietf.org/doc/draft-liu-rtgwg-agent-gateway-requirements/)** (score: 3.2) — Discusses requirements for Agent Gateways in agent-to-agent communications to improve scalability, e - **[draft-gaikwad-woa](https://datatracker.ietf.org/doc/draft-gaikwad-woa/)** (score: 3.2) — Specifies Web of Agents (WoA) format using JSON Schema to describe AI agent inputs/outputs served fr -- **[draft-gupta-httpapi-events-query](https://datatracker.ietf.org/doc/draft-gupta-httpapi-events-query/)** (score: 3.2) — Proposes Events Query Protocol (EQP) built on HTTP for user agents to receive event notifications di -- **[draft-meunier-webbotauth-registry](https://datatracker.ietf.org/doc/draft-meunier-webbotauth-registry/)** (score: 3.2) — Defines a JSON format for web bot signature agent cards to advertise identity, purpose, and cryptogr -- **[draft-zhang-dmsc-ioa-semantic-interaction](https://datatracker.ietf.org/doc/draft-zhang-dmsc-ioa-semantic-interaction/)** (score: 3.2) — Specifies a semantic layer for Internet of Agents using ontology models and JSON-LD serialization. D -- **[draft-zeng-mcp-troubleshooting](https://datatracker.ietf.org/doc/draft-zeng-mcp-troubleshooting/)** (score: 3.1) — Applies Model Context Protocol to network management for intent-based troubleshooting. Maps MCP role -- **[draft-a2a-moqt-transport](https://datatracker.ietf.org/doc/draft-a2a-moqt-transport/)** (score: 3.1) — Specifies transport of Agent-to-Agent protocol over Media over QUIC Transport. Leverages MOQT's publ -- **[draft-levy-llm-uri-scheme](https://datatracker.ietf.org/doc/draft-levy-llm-uri-scheme/)** (score: 3.1) — Defines a URI scheme for identifying LLM endpoints with embedded configuration parameters. Creates a -- **[draft-tojens-dhcp-option-concat-considerations](https://datatracker.ietf.org/doc/draft-tojens-dhcp-option-concat-considerations/)** (score: 3.1) — Updates RFC 3396 to make DHCP option concatenation requirements more flexible. Addresses real-world -- **[draft-ietf-lamps-rfc5274bis](https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5274bis/)** (score: 3.1) — Defines compliance requirements for Certificate Management Messages over CMS (CMC) enrollment protoc -- **[draft-vinaysingh-awp-wellknown](https://datatracker.ietf.org/doc/draft-vinaysingh-awp-wellknown/)** (score: 3.1) — Defines well-known URI and link relation for exposing website workflows to automated agents. Provide -- **[draft-wendt-stir-vesper](https://datatracker.ietf.org/doc/draft-wendt-stir-vesper/)** (score: 3.0) — Formalizes framework for verifiable telephone number identity using delegate certificates and author -- **[draft-ietf-lamps-e2e-mail-guidance](https://datatracker.ietf.org/doc/draft-ietf-lamps-e2e-mail-guidance/)** (score: 3.0) — Provides comprehensive guidance for implementing end-to-end email encryption securely. Addresses usa -- **[draft-nandakumar-a2a-moqt-transport](https://datatracker.ietf.org/doc/draft-nandakumar-a2a-moqt-transport/)** (score: 3.0) — Identical specification to draft-a2a-moqt-transport for transporting Agent-to-Agent protocol over MO -- **[draft-zhao-nmrg-ai-agent-for-dtn](https://datatracker.ietf.org/doc/draft-zhao-nmrg-ai-agent-for-dtn/)** (score: 3.0) — Proposes AI agent architecture for Digital Twin Networks, integrating autonomous agents at each DTN -- **[draft-cui-dmsc-agent-cdi](https://datatracker.ietf.org/doc/draft-cui-dmsc-agent-cdi/)** (score: 3.0) — Defines comprehensive framework for cross-domain AI agent interoperability including identity federa -- **[draft-leon-distributed-multi-signer](https://datatracker.ietf.org/doc/draft-leon-distributed-multi-signer/)** (score: 3.0) — Defines distributed DNSSEC multi-signer architecture with multi-signer agents and combiners. Introdu -- **[draft-happel-structured-email-trust](https://datatracker.ietf.org/doc/draft-happel-structured-email-trust/)** (score: 2.9) — Provides trust and security recommendations for handling structured data in email messages. Focuses -- **[draft-ramakrishna-satp-data-sharing](https://datatracker.ietf.org/doc/draft-ramakrishna-satp-data-sharing/)** (score: 2.9) — Defines a DLT-neutral protocol for sharing asset views and metadata across blockchain networks via g -- **[draft-bastian-jose-pkdh](https://datatracker.ietf.org/doc/draft-bastian-jose-pkdh/)** (score: 2.9) — Defines a method to derive symmetric MAC keys from public information in JSON Web Signatures using D -## Human-agent interaction (16 drafts) +## Human-agent interaction (19 drafts) - **[draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/)** (score: 4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb +- **[draft-ietf-aipref-vocab](https://datatracker.ietf.org/doc/draft-ietf-aipref-vocab/)** (score: 4.4) — Defines a standardized vocabulary for expressing preferences about how digital assets should be used - **[draft-dhir-http-agent-profile](https://datatracker.ietf.org/doc/draft-dhir-http-agent-profile/)** (score: 4.2) — Defines HTTP Agent Profile for authenticating agent traffic, separating human from agent traffic, an +- **[draft-song-tsvwg-camp](https://datatracker.ietf.org/doc/draft-song-tsvwg-camp/)** (score: 4.2) — Proposes CAMP, a multipath transport protocol for interactive multimodal LLM systems that maintains - **[draft-liu-agent-operation-authorization](https://datatracker.ietf.org/doc/draft-liu-agent-operation-authorization/)** (score: 4.1) — Specifies framework for verifiable delegation of actions from humans to AI agents using JWT tokens. - **[draft-cui-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/)** (score: 4.1) — Defines framework for collaborative network management between LLM agents and human operators. Intro - **[draft-steele-agent-considerations](https://datatracker.ietf.org/doc/draft-steele-agent-considerations/)** (score: 4.0) — Defines guidelines for IETF specifications to support AI agent consumption and code generation. Intr - **[draft-mishra-oauth-agent-grants](https://datatracker.ietf.org/doc/draft-mishra-oauth-agent-grants/)** (score: 4.0) — Extends OAuth 2.0 for AI agent authorization with human consent verification, revocation, and audit - **[draft-rosenberg-aiproto-cheq](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-cheq/)** (score: 3.9) — Proposes CHEQ protocol for human confirmation of AI agent decisions before execution. Protects again +- **[draft-farzdusa-aipref-enduser](https://datatracker.ietf.org/doc/draft-farzdusa-aipref-enduser/)** (score: 3.8) — Documents potential end user impacts of AI preference signaling standards across technological, lega - **[draft-oauth-ai-agents-on-behalf-of-user](https://datatracker.ietf.org/doc/draft-oauth-ai-agents-on-behalf-of-user/)** (score: 3.7) — This draft extends OAuth 2.0 to enable AI agents to securely obtain access tokens for acting on beha - **[draft-rosenberg-cheq](https://datatracker.ietf.org/doc/draft-rosenberg-cheq/)** (score: 3.6) — Proposes CHEQ protocol for human-in-the-loop confirmation of AI agent decisions before execution. Us - **[draft-zm-rtgwg-mcp-troubleshooting](https://datatracker.ietf.org/doc/draft-zm-rtgwg-mcp-troubleshooting/)** (score: 3.6) — Proposes using Model Context Protocol (MCP) to enable LLM-based automated network troubleshooting. M +- **[draft-altanai-aipref-realtime-protocol-bindings](https://datatracker.ietf.org/doc/draft-altanai-aipref-realtime-protocol-bindings/)** (score: 3.6) — Defines how AI preference expressions are bound to real-time protocols like SIP and SDP. Specifies h - **[draft-irtf-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-irtf-nmrg-llm-nm/)** (score: 3.5) — Defines framework for collaborative network management between LLMs and human operators with human-i +- **[draft-zeng-mcp-network-measurement](https://datatracker.ietf.org/doc/draft-zeng-mcp-network-measurement/)** (score: 3.5) — Proposes MCP framework for intelligent network measurement with AI assistance. Enables natural langu - **[draft-meta-layer-overview](https://datatracker.ietf.org/doc/draft-meta-layer-overview/)** (score: 3.5) — Introduces Meta-layer concept as coordination substrate for presence, annotation, and governance on +- **[draft-thomson-aipref-sup](https://datatracker.ietf.org/doc/draft-thomson-aipref-sup/)** (score: 3.4) — Defines simple format for content usage preference expressions with HTTP header field. Updates RFC93 - **[draft-zeng-nmrg-mcp-usecases-requirements](https://datatracker.ietf.org/doc/draft-zeng-nmrg-mcp-usecases-requirements/)** (score: 3.4) — Presents problem statement for integrating Model Context Protocol into network management for AI age -- **[draft-gupta-httpapi-events-query](https://datatracker.ietf.org/doc/draft-gupta-httpapi-events-query/)** (score: 3.2) — Proposes Events Query Protocol (EQP) built on HTTP for user agents to receive event notifications di -- **[draft-zeng-mcp-troubleshooting](https://datatracker.ietf.org/doc/draft-zeng-mcp-troubleshooting/)** (score: 3.1) — Applies Model Context Protocol to network management for intent-based troubleshooting. Maps MCP role -- **[draft-vinaysingh-awp-wellknown](https://datatracker.ietf.org/doc/draft-vinaysingh-awp-wellknown/)** (score: 3.1) — Defines well-known URI and link relation for exposing website workflows to automated agents. Provide -## Identity / authentication for AI agents (7 drafts) +## Identity / authentication for AI agents (6 drafts) - **[draft-nandakumar-agent-sd-jwt](https://datatracker.ietf.org/doc/draft-nandakumar-agent-sd-jwt/)** (score: 3.9) — This draft defines SD-Card, a Selective Disclosure JWT encoding of Agent Cards that enables privacy- - **[draft-wahl-scim-agent-schema](https://datatracker.ietf.org/doc/draft-wahl-scim-agent-schema/)** (score: 3.9) — This draft extends the SCIM (System for Cross-domain Identity Management) protocol to support AI age @@ -466,64 +444,89 @@ - **[draft-chen-agent-decoupled-authorization-model](https://datatracker.ietf.org/doc/draft-chen-agent-decoupled-authorization-model/)** (score: 3.5) — This draft proposes a decoupled authorization framework for AI agents that enables dynamic, intent-b - **[draft-huang-acme-scalable-agent-enrollment](https://datatracker.ietf.org/doc/draft-huang-acme-scalable-agent-enrollment/)** (score: 3.5) — This draft proposes two scalable models for certificate enrollment of AI agents: one using Zero-Know - **[draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/)** (score: 3.3) — This draft proposes an identity management framework for agents in an Internet of Agents (IOA) syste -- **[draft-yl-agent-id-requirements](https://datatracker.ietf.org/doc/draft-yl-agent-id-requirements/)** (score: 2.9) — This draft proposes requirements for digital identity management in AI agent communication protocols -## ML traffic mgmt (15 drafts) +## ML traffic mgmt (30 drafts) +- **[draft-calabria-bmwg-ai-fabric-inference-bench](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/)** (score: 4.5) — Defines benchmarking methodology for AI inference network fabrics. Establishes KPIs and test procedu - **[draft-dhir-http-agent-profile](https://datatracker.ietf.org/doc/draft-dhir-http-agent-profile/)** (score: 4.2) — Defines HTTP Agent Profile for authenticating agent traffic, separating human from agent traffic, an +- **[draft-calabria-bmwg-ai-fabric-terminology](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-terminology/)** (score: 4.2) — Defines comprehensive benchmarking terminology for AI network fabrics including collective communica +- **[draft-li-spring-rdma-multicast-over-srv6](https://datatracker.ietf.org/doc/draft-li-spring-rdma-multicast-over-srv6/)** (score: 4.2) — Specifies SRv6 extensions for RDMA multicast delivery with new End.MT behavior and ACK/NACK aggregat +- **[draft-song-tsvwg-camp](https://datatracker.ietf.org/doc/draft-song-tsvwg-camp/)** (score: 4.2) — Proposes CAMP, a multipath transport protocol for interactive multimodal LLM systems that maintains +- **[draft-yao-tsvwg-cco-requirement-and-analysis](https://datatracker.ietf.org/doc/draft-yao-tsvwg-cco-requirement-and-analysis/)** (score: 4.2) — Analyzes collective communication optimizations for AI training and inference clusters built on RDMA - **[draft-cui-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/)** (score: 4.1) — Defines framework for collaborative network management between LLM agents and human operators. Intro +- **[draft-chen-nmrg-semantic-inference-routing](https://datatracker.ietf.org/doc/draft-chen-nmrg-semantic-inference-routing/)** (score: 4.1) — Defines SIRP protocol for content-aware routing of AI inference requests. Enables routing decisions +- **[draft-dunbar-neotec-ac-te-applicability](https://datatracker.ietf.org/doc/draft-dunbar-neotec-ac-te-applicability/)** (score: 4.0) — Applies existing IETF YANG models for Attachment Circuits and Traffic Engineering to dynamic AI mode +- **[draft-liao-aipref-autoctl-core](https://datatracker.ietf.org/doc/draft-liao-aipref-autoctl-core/)** (score: 4.0) — Defines core machine-readable protocol for server-side automation permissions targeting AI-driven we +- **[draft-zhang-rtgwg-multicast-requirements-gaps-aidc](https://datatracker.ietf.org/doc/draft-zhang-rtgwg-multicast-requirements-gaps-aidc/)** (score: 3.9) — Identifies requirements for multicast technology in AI Data Centers to improve efficiency of point-t - **[draft-akhavain-moussa-ai-network](https://datatracker.ietf.org/doc/draft-akhavain-moussa-ai-network/)** (score: 3.9) — Proposes Data and Agent Aware-Inference and Training Network (DA-ITN) architecture. Comprehensive mu +- **[draft-pan-tsvwg-pie](https://datatracker.ietf.org/doc/draft-pan-tsvwg-pie/)** (score: 3.9) — Presents PIE queue management algorithm to address bufferbloat by controlling queueing latency. Ligh - **[draft-jurkovikj-httpapi-agentic-state](https://datatracker.ietf.org/doc/draft-jurkovikj-httpapi-agentic-state/)** (score: 3.9) — Defines Agentic State Transfer (AST) HTTP profile for managing canonical resource state across multi - **[draft-yuan-rtgwg-traffic-agent-usecase](https://datatracker.ietf.org/doc/draft-yuan-rtgwg-traffic-agent-usecase/)** (score: 3.7) — Presents use cases for AI agents optimizing network traffic through dynamic resource adjustment. Det - **[draft-an-nmrg-i2icf-cits](https://datatracker.ietf.org/doc/draft-an-nmrg-i2icf-cits/)** (score: 3.7) — Defines framework for orchestrating In-Network Computing Functions in Cooperative Intelligent Transp - **[draft-cui-nmrg-auto-test](https://datatracker.ietf.org/doc/draft-cui-nmrg-auto-test/)** (score: 3.6) — Framework for AI-assisted network protocol testing using LLMs and automated test generation. Defines +- **[draft-xsaopig-nsttlp-traffic-labeling](https://datatracker.ietf.org/doc/draft-xsaopig-nsttlp-traffic-labeling/)** (score: 3.6) — Specifies protocol for embedding service type identifiers in network packets to enable intelligent t +- **[draft-zeng-mcp-network-measurement](https://datatracker.ietf.org/doc/draft-zeng-mcp-network-measurement/)** (score: 3.5) — Proposes MCP framework for intelligent network measurement with AI assistance. Enables natural langu +- **[draft-templin-intarea-aero](https://datatracker.ietf.org/doc/draft-templin-intarea-aero/)** (score: 3.5) — Specifies Automatic Extended Route Optimization (AERO) service for IP internetworking over Overlay M +- **[draft-du-catalist-routing-considerations](https://datatracker.ietf.org/doc/draft-du-catalist-routing-considerations/)** (score: 3.4) — Proposes routing considerations for AI agent-to-agent communication in overlay networks. Focuses on +- **[draft-tan-ccamp-uonaco-problem-statement](https://datatracker.ietf.org/doc/draft-tan-ccamp-uonaco-problem-statement/)** (score: 3.4) — Defines requirements for unified orchestration between optical networks and AI computing to enable c +- **[draft-li-cats-aisemantic-contract](https://datatracker.ietf.org/doc/draft-li-cats-aisemantic-contract/)** (score: 3.4) — Defines a contract mechanism allowing AI applications to communicate semantic information about thei - **[draft-yue-moq-transporting-sensing-data](https://datatracker.ietf.org/doc/draft-yue-moq-transporting-sensing-data/)** (score: 3.4) — Proposes using Media Over QUIC (MOQ) to transport large-scale, real-time sensing data in 6G networks +- **[draft-han-rtgwg-codeployment-pfc-fgfc](https://datatracker.ietf.org/doc/draft-han-rtgwg-codeployment-pfc-fgfc/)** (score: 3.4) — Describes use cases for coordinating flow control between data center PFC and WAN fine-grained flow +- **[draft-wang-cats-innetwork-infer](https://datatracker.ietf.org/doc/draft-wang-cats-innetwork-infer/)** (score: 3.3) — Proposes a framework for decentralized LLM inference across untrusted participants using layer-aware +- **[draft-xsaopig-nmop-service-flow-modal-mapping](https://datatracker.ietf.org/doc/draft-xsaopig-nmop-service-flow-modal-mapping/)** (score: 3.3) — Proposes a framework using ALTO protocol and SDN architecture for mapping service flow characteristi +- **[draft-bernardos-nmrg-agentic-network-optimization](https://datatracker.ietf.org/doc/draft-bernardos-nmrg-agentic-network-optimization/)** (score: 3.3) — Focuses on agentic AI for distributed sensing in ISAC networks with joint optimization of sensing an - **[draft-chuyi-nmrg-ai-agent-network](https://datatracker.ietf.org/doc/draft-chuyi-nmrg-ai-agent-network/)** (score: 3.2) — Focuses on large language model-based agents for network operations and maintenance. Addresses pract -- **[draft-tong-network-agent-use-cases-in-6g](https://datatracker.ietf.org/doc/draft-tong-network-agent-use-cases-in-6g/)** (score: 3.2) — Introduces network AI agent use cases in 6G focusing on connectivity services and third-party applic -- **[draft-kale-agntcy-federated-privacy](https://datatracker.ietf.org/doc/draft-kale-agntcy-federated-privacy/)** (score: 3.2) — Specifies architecture for privacy-preserving federated learning across multi-tenant AI agent system -- **[draft-mao-rtgwg-apn-framework-for-ioa](https://datatracker.ietf.org/doc/draft-mao-rtgwg-apn-framework-for-ioa/)** (score: 3.2) — Applies Application-aware Performance Network framework to Internet of Agents scenario. Addresses ne -- **[draft-liu-nmrg-ai-llm-inference-requirements](https://datatracker.ietf.org/doc/draft-liu-nmrg-ai-llm-inference-requirements/)** (score: 3.2) — Analyzes system and network requirements for large-scale LLM inference services. Investigates mainst -- **[draft-li-dmsc-inf-architecture](https://datatracker.ietf.org/doc/draft-li-dmsc-inf-architecture/)** (score: 3.1) — Proposes a network infrastructure architecture for large-scale multi-agent collaboration. Focuses on -- **[draft-bernardos-cats-isac-uc](https://datatracker.ietf.org/doc/draft-bernardos-cats-isac-uc/)** (score: 3.0) — Presents Integrated Sensing and Communications (ISAC) as a use case for CATS architecture. Explores +- **[draft-zhao-detnet-enhanced-use-cases](https://datatracker.ietf.org/doc/draft-zhao-detnet-enhanced-use-cases/)** (score: 3.2) — Describes enhanced use cases for scaling deterministic networks beyond RFC8578, covering industrial -## ML-based traffic management / optimization (1 drafts) - -- **[draft-zhang-agent-gap-network](https://datatracker.ietf.org/doc/draft-zhang-agent-gap-network/)** (score: 3.0) — This draft identifies problems and gaps in mobile core networks for supporting AI agent communicatio - -## Model serving/inference (10 drafts) +## Model serving/inference (22 drafts) +- **[draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/)** (score: 4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L - **[draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/)** (score: 4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco +- **[draft-calabria-bmwg-ai-fabric-inference-bench](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/)** (score: 4.5) — Defines benchmarking methodology for AI inference network fabrics. Establishes KPIs and test procedu +- **[draft-wang-cats-odsi](https://datatracker.ietf.org/doc/draft-wang-cats-odsi/)** (score: 4.5) — Specifies framework for decentralized LLM inference across untrusted participants with layer-aware e - **[draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/)** (score: 4.2) — Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o - **[draft-gaikwad-llm-benchmarking-methodology](https://datatracker.ietf.org/doc/draft-gaikwad-llm-benchmarking-methodology/)** (score: 4.2) — Defines comprehensive benchmarking methodologies for LLM inference serving systems including test pr - **[draft-gaikwad-llm-benchmarking-profiles](https://datatracker.ietf.org/doc/draft-gaikwad-llm-benchmarking-profiles/)** (score: 4.2) — Defines performance benchmarking profiles binding terminology and methodology to concrete architectu +- **[draft-yao-tsvwg-cco-requirement-and-analysis](https://datatracker.ietf.org/doc/draft-yao-tsvwg-cco-requirement-and-analysis/)** (score: 4.2) — Analyzes collective communication optimizations for AI training and inference clusters built on RDMA +- **[draft-chen-nmrg-semantic-inference-routing](https://datatracker.ietf.org/doc/draft-chen-nmrg-semantic-inference-routing/)** (score: 4.1) — Defines SIRP protocol for content-aware routing of AI inference requests. Enables routing decisions +- **[draft-chen-nmrg-multi-provider-inference-api](https://datatracker.ietf.org/doc/draft-chen-nmrg-multi-provider-inference-api/)** (score: 4.0) — Specifies extensions for multi-provider AI inference using OpenAI API as reference standard. Enables +- **[draft-jennings-ai-mcp-over-moq](https://datatracker.ietf.org/doc/draft-jennings-ai-mcp-over-moq/)** (score: 4.0) — Defines how to transport Model Context Protocol (MCP) messages over Media over QUIC Transport (MOQT) +- **[draft-dunbar-neotec-ac-te-applicability](https://datatracker.ietf.org/doc/draft-dunbar-neotec-ac-te-applicability/)** (score: 4.0) — Applies existing IETF YANG models for Attachment Circuits and Traffic Engineering to dynamic AI mode +- **[draft-zhang-rtgwg-multicast-requirements-gaps-aidc](https://datatracker.ietf.org/doc/draft-zhang-rtgwg-multicast-requirements-gaps-aidc/)** (score: 3.9) — Identifies requirements for multicast technology in AI Data Centers to improve efficiency of point-t - **[draft-akhavain-moussa-ai-network](https://datatracker.ietf.org/doc/draft-akhavain-moussa-ai-network/)** (score: 3.9) — Proposes Data and Agent Aware-Inference and Training Network (DA-ITN) architecture. Comprehensive mu +- **[draft-tsyrulnikov-rats-attested-inference-receipt](https://datatracker.ietf.org/doc/draft-tsyrulnikov-rats-attested-inference-receipt/)** (score: 3.9) — Defines Attested Inference Receipt (AIR) using COSE/CWT to create verifiable receipts for confidenti +- **[draft-li-individual-inip](https://datatracker.ietf.org/doc/draft-li-individual-inip/)** (score: 3.8) — Specifies a protocol for performing lightweight ML inference directly in network devices like switch - **[draft-sogomonian-aiip-architecture](https://datatracker.ietf.org/doc/draft-sogomonian-aiip-architecture/)** (score: 3.7) — Defines architectural model for Artificial Intelligence Internet Protocol (AIIP) enabling stateless, +- **[draft-li-cats-idn](https://datatracker.ietf.org/doc/draft-li-cats-idn/)** (score: 3.6) — Introduces Intelligence Delivery Network (IDN) framework for deploying ML models across distributed +- **[draft-kartha-internet20-ainative](https://datatracker.ietf.org/doc/draft-kartha-internet20-ainative/)** (score: 3.4) — Proposes Internet 2.0 architecture with AI models as first-class network entities, including HTTP+AI +- **[draft-zhu-anima-service-intent](https://datatracker.ietf.org/doc/draft-zhu-anima-service-intent/)** (score: 3.4) — Defines a structured semantic model for expressing service-level objectives and constraints across n +- **[draft-wang-cats-innetwork-infer](https://datatracker.ietf.org/doc/draft-wang-cats-innetwork-infer/)** (score: 3.3) — Proposes a framework for decentralized LLM inference across untrusted participants using layer-aware - **[draft-chuyi-nmrg-ai-agent-network](https://datatracker.ietf.org/doc/draft-chuyi-nmrg-ai-agent-network/)** (score: 3.2) — Focuses on large language model-based agents for network operations and maintenance. Addresses pract -- **[draft-tong-network-agent-use-cases-in-6g](https://datatracker.ietf.org/doc/draft-tong-network-agent-use-cases-in-6g/)** (score: 3.2) — Introduces network AI agent use cases in 6G focusing on connectivity services and third-party applic -- **[draft-liu-nmrg-ai-llm-inference-requirements](https://datatracker.ietf.org/doc/draft-liu-nmrg-ai-llm-inference-requirements/)** (score: 3.2) — Analyzes system and network requirements for large-scale LLM inference services. Investigates mainst -- **[draft-levy-llm-uri-scheme](https://datatracker.ietf.org/doc/draft-levy-llm-uri-scheme/)** (score: 3.1) — Defines a URI scheme for identifying LLM endpoints with embedded configuration parameters. Creates a ## Other AI/agent (8 drafts) +- **[draft-calabria-bmwg-ai-fabric-inference-bench](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/)** (score: 4.5) — Defines benchmarking methodology for AI inference network fabrics. Establishes KPIs and test procedu - **[draft-ietf-tls-ecdhe-mlkem](https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/)** (score: 4.4) — Defines hybrid post-quantum key agreement mechanisms for TLS 1.3 that combine ML-KEM with traditiona - **[draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/)** (score: 4.2) — Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o - **[draft-an-nmrg-i2icf-cits](https://datatracker.ietf.org/doc/draft-an-nmrg-i2icf-cits/)** (score: 3.7) — Defines framework for orchestrating In-Network Computing Functions in Cooperative Intelligent Transp - **[draft-cui-nmrg-auto-test](https://datatracker.ietf.org/doc/draft-cui-nmrg-auto-test/)** (score: 3.6) — Framework for AI-assisted network protocol testing using LLMs and automated test generation. Defines - **[draft-stephan-ai-agent-6g](https://datatracker.ietf.org/doc/draft-stephan-ai-agent-6g/)** (score: 3.4) — Examines AI agent communication protocols specifically for 6G systems based on 3GPP requirements. Ex -- **[draft-architect-cittamarket](https://datatracker.ietf.org/doc/draft-architect-cittamarket/)** (score: 3.1) — Specifies protocol for immutable AGI system identification using Bitcoin blockchain anchoring. Defin -- **[draft-zhao-nmrg-ai-agent-for-dtn](https://datatracker.ietf.org/doc/draft-zhao-nmrg-ai-agent-for-dtn/)** (score: 3.0) — Proposes AI agent architecture for Digital Twin Networks, integrating autonomous agents at each DTN -- **[draft-ietf-httpbis-rfc6265bis](https://datatracker.ietf.org/doc/draft-ietf-httpbis-rfc6265bis/)** (score: 3.0) — Updates HTTP Cookie specification to replace RFC 6265 with improved security and privacy. Addresses +- **[draft-khatri-sipcore-call-transfer-fail-response](https://datatracker.ietf.org/doc/draft-khatri-sipcore-call-transfer-fail-response/)** (score: 3.3) — Defines a new SIP response code (497) for indicating call transfer failures with optional granular w +- **[draft-bernardos-nmrg-agentic-network-optimization](https://datatracker.ietf.org/doc/draft-bernardos-nmrg-agentic-network-optimization/)** (score: 3.3) — Focuses on agentic AI for distributed sensing in ISAC networks with joint optimization of sensing an ## Policy / governance / ethical frameworks (1 drafts) - **[draft-chen-agent-decoupled-authorization-model](https://datatracker.ietf.org/doc/draft-chen-agent-decoupled-authorization-model/)** (score: 3.5) — This draft proposes a decoupled authorization framework for AI agents that enables dynamic, intent-b -## Policy/governance (53 drafts) +## Policy/governance (63 drafts) +- **[draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/)** (score: 4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra - **[draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/)** (score: 4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and - **[draft-goswami-agentic-jwt](https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/)** (score: 4.5) — Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autonomous AI systems. Int +- **[draft-wang-cats-odsi](https://datatracker.ietf.org/doc/draft-wang-cats-odsi/)** (score: 4.5) — Specifies framework for decentralized LLM inference across untrusted participants with layer-aware e - **[draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/)** (score: 4.5) — Defines CDDL-based data format for verifiable agent conversation records using COSE signing. Support - **[draft-aylward-aiga-2](https://datatracker.ietf.org/doc/draft-aylward-aiga-2/)** (score: 4.5) — Comprehensive AI governance framework with tiered risk model, federated authority network, and econo +- **[draft-ietf-aipref-vocab](https://datatracker.ietf.org/doc/draft-ietf-aipref-vocab/)** (score: 4.4) — Defines a standardized vocabulary for expressing preferences about how digital assets should be used - **[draft-cui-nmrg-llm-benchmark](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-benchmark/)** (score: 4.3) — Provides comprehensive evaluation framework for LLM-based network configuration agents. Includes emu - **[draft-mw-wimse-transitive-attestation](https://datatracker.ietf.org/doc/draft-mw-wimse-transitive-attestation/)** (score: 4.3) — Defines WIMSE profile for cryptographically binding workload identities to their execution environme - **[draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/)** (score: 4.2) — Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o @@ -536,14 +539,19 @@ - **[draft-liu-agent-operation-authorization](https://datatracker.ietf.org/doc/draft-liu-agent-operation-authorization/)** (score: 4.1) — Specifies framework for verifiable delegation of actions from humans to AI agents using JWT tokens. - **[draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/)** (score: 4.1) — Defines task-oriented multi-agent framework for fault recovery in converged mobile networks. Targets - **[draft-schulze-ecap](https://datatracker.ietf.org/doc/draft-schulze-ecap/)** (score: 4.1) — ECAP defines a cryptographically-verified protocol for web crawlers to obtain consent from hosts bef +- **[draft-jadoon-nmrg-agentic-ai-autonomous-networks](https://datatracker.ietf.org/doc/draft-jadoon-nmrg-agentic-ai-autonomous-networks/)** (score: 4.1) — Introduces architectural principles for integrating AI agents into IP protocol stack layers while pr - **[draft-steele-agent-considerations](https://datatracker.ietf.org/doc/draft-steele-agent-considerations/)** (score: 4.0) — Defines guidelines for IETF specifications to support AI agent consumption and code generation. Intr +- **[draft-chen-nmrg-multi-provider-inference-api](https://datatracker.ietf.org/doc/draft-chen-nmrg-multi-provider-inference-api/)** (score: 4.0) — Specifies extensions for multi-provider AI inference using OpenAI API as reference standard. Enables - **[draft-mishra-oauth-agent-grants](https://datatracker.ietf.org/doc/draft-mishra-oauth-agent-grants/)** (score: 4.0) — Extends OAuth 2.0 for AI agent authorization with human consent verification, revocation, and audit - **[draft-barney-caam](https://datatracker.ietf.org/doc/draft-barney-caam/)** (score: 4.0) — Specifies Contextual Agent Authorization Mesh for runtime authorization of agents after discovery, p - **[draft-nennemann-wimse-ect](https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/)** (score: 4.0) — Defines Execution Context Tokens as JWT extension to WIMSE for tracking task execution in distribute +- **[draft-liao-aipref-autoctl-core](https://datatracker.ietf.org/doc/draft-liao-aipref-autoctl-core/)** (score: 4.0) — Defines core machine-readable protocol for server-side automation permissions targeting AI-driven we - **[draft-berlinai-vera](https://datatracker.ietf.org/doc/draft-berlinai-vera/)** (score: 3.9) — Introduces VERA, a zero-trust architecture for AI agent security with five enforcement pillars and c - **[draft-ietf-tls-deprecate-obsolete-kex](https://datatracker.ietf.org/doc/draft-ietf-tls-deprecate-obsolete-kex/)** (score: 3.8) — Deprecates obsolete key exchange methods in TLS 1.2 including finite field DH and RSA. Updates multi - **[draft-srijal-agents-policy](https://datatracker.ietf.org/doc/draft-srijal-agents-policy/)** (score: 3.8) — Specifies AGENTS.TXT protocol as strict plaintext policy file for automated clients, bots, and crawl - **[draft-zhao-nmop-network-management-agent](https://datatracker.ietf.org/doc/draft-zhao-nmop-network-management-agent/)** (score: 3.8) — Defines AI-driven Network Management Agent concept for Level 4 autonomous networks. Specifies integr +- **[draft-ietf-aipref-attach](https://datatracker.ietf.org/doc/draft-ietf-aipref-attach/)** (score: 3.8) — Specifies how AI usage preferences can be signaled during HTTP content acquisition. Updates RFC 9309 +- **[draft-farzdusa-aipref-enduser](https://datatracker.ietf.org/doc/draft-farzdusa-aipref-enduser/)** (score: 3.8) — Documents potential end user impacts of AI preference signaling standards across technological, lega - **[draft-scim-agent-extension](https://datatracker.ietf.org/doc/draft-scim-agent-extension/)** (score: 3.7) — Extends SCIM 2.0 specification to manage agents and agentic applications across domains. Builds on e - **[draft-rosenberg-aiproto-framework](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-framework/)** (score: 3.7) — Provides framework and requirements for AI agent protocols on the Internet. Surveys existing approac - **[draft-melnikov-sasl2](https://datatracker.ietf.org/doc/draft-melnikov-sasl2/)** (score: 3.7) — Updates SASL framework to support modern authentication requirements including multi-factor authenti @@ -553,8 +561,11 @@ - **[draft-kotecha-agentic-dispute-protocol](https://datatracker.ietf.org/doc/draft-kotecha-agentic-dispute-protocol/)** (score: 3.6) — Defines a protocol for autonomous agents to file and resolve disputes through structured automated p - **[draft-vandoulas-aidp](https://datatracker.ietf.org/doc/draft-vandoulas-aidp/)** (score: 3.6) — Defines a comprehensive control-plane protocol for secure agent interactions with delegation, author - **[draft-messous-eat-ai](https://datatracker.ietf.org/doc/draft-messous-eat-ai/)** (score: 3.6) — Defines an Entity Attestation Token profile for remote attestation of autonomous AI agents, specifyi +- **[draft-reilly-sentinel-protocol](https://datatracker.ietf.org/doc/draft-reilly-sentinel-protocol/)** (score: 3.6) — Defines blockchain-anchored integrity protocol for AI lifecycle provenance using Sentinel Evidence P +- **[draft-xsaopig-nsttlp-traffic-labeling](https://datatracker.ietf.org/doc/draft-xsaopig-nsttlp-traffic-labeling/)** (score: 3.6) — Specifies protocol for embedding service type identifiers in network packets to enable intelligent t - **[draft-gaikwad-aps-profile](https://datatracker.ietf.org/doc/draft-gaikwad-aps-profile/)** (score: 3.6) — Storage service profile for agent persistent state including embeddings, preferences, and audit logs - **[draft-pbs-sidrops-roaanycast](https://datatracker.ietf.org/doc/draft-pbs-sidrops-roaanycast/)** (score: 3.6) — Defines best practices for managing Route Origin Authorizations (ROAs) for globally anycasted servic +- **[draft-vaughan-aipref-vocab](https://datatracker.ietf.org/doc/draft-vaughan-aipref-vocab/)** (score: 3.6) — Proposes vocabulary for rightsholders to express content preferences for AI training use through met - **[draft-song-oauth-ai-agent-collaborate-authz](https://datatracker.ietf.org/doc/draft-song-oauth-ai-agent-collaborate-authz/)** (score: 3.5) — Proposes OAuth 2.0 extension for multi-AI agent collaboration with applier-on-behalf-of authorizatio - **[draft-wang-hjs-accountability](https://datatracker.ietf.org/doc/draft-wang-hjs-accountability/)** (score: 3.5) — Defines HJS accountability layer for AI agents using blockchain-anchored timestamps to create immuta - **[draft-ahn-nmrg-5g-security-i2nsf-framework](https://datatracker.ietf.org/doc/draft-ahn-nmrg-5g-security-i2nsf-framework/)** (score: 3.5) — Presents integrated framework for automated 5G edge network security using I2NSF architecture and In @@ -563,13 +574,12 @@ - **[draft-yuan-rtgwg-security-agent-usecase](https://datatracker.ietf.org/doc/draft-yuan-rtgwg-security-agent-usecase/)** (score: 3.4) — Proposes AI Network Security Agents for routers to provide intelligent, adaptive security capabiliti - **[draft-huang-rats-agentic-eat-cap-attest](https://datatracker.ietf.org/doc/draft-huang-rats-agentic-eat-cap-attest/)** (score: 3.4) — Extends Entity Attestation Token (EAT) to support capability attestation for agentic AI systems. Ena - **[draft-romanchuk-normative-admissibility](https://datatracker.ietf.org/doc/draft-romanchuk-normative-admissibility/)** (score: 3.4) — Establishes a framework for evaluating whether autonomous agent speech acts are admissible based on +- **[draft-tan-ccamp-uonaco-problem-statement](https://datatracker.ietf.org/doc/draft-tan-ccamp-uonaco-problem-statement/)** (score: 3.4) — Defines requirements for unified orchestration between optical networks and AI computing to enable c +- **[draft-jimenez-tbd-robotstxt-update](https://datatracker.ietf.org/doc/draft-jimenez-tbd-robotstxt-update/)** (score: 3.4) — Proposes updates to robots.txt standard to handle AI-specific crawlers with new syntax for user-agen +- **[draft-thomson-aipref-sup](https://datatracker.ietf.org/doc/draft-thomson-aipref-sup/)** (score: 3.4) — Defines simple format for content usage preference expressions with HTTP header field. Updates RFC93 +- **[draft-zhu-anima-service-intent](https://datatracker.ietf.org/doc/draft-zhu-anima-service-intent/)** (score: 3.4) — Defines a structured semantic model for expressing service-level objectives and constraints across n - **[draft-cosmos-protocol-specification](https://datatracker.ietf.org/doc/draft-cosmos-protocol-specification/)** (score: 3.3) — Defines comprehensive badge-based identity and communication system with trust scoring, post-quantum - **[draft-jeong-opsawg-intent-based-sdv-framework](https://datatracker.ietf.org/doc/draft-jeong-opsawg-intent-based-sdv-framework/)** (score: 3.3) — Proposes intent-based management framework for Software-Defined Vehicles in ITS environments. Covers - **[draft-diaconu-agents-authz-info-sharing](https://datatracker.ietf.org/doc/draft-diaconu-agents-authz-info-sharing/)** (score: 3.2) — Addresses authorization challenges in distributed multi-agent systems across multiple domains. Cover - **[draft-ahn-opsawg-5g-security-i2nsf-framework](https://datatracker.ietf.org/doc/draft-ahn-opsawg-5g-security-i2nsf-framework/)** (score: 3.2) — Proposes an integrated security framework for 5G edge networks using I2NSF architecture with Intent- -- **[draft-kale-agntcy-federated-privacy](https://datatracker.ietf.org/doc/draft-kale-agntcy-federated-privacy/)** (score: 3.2) — Specifies architecture for privacy-preserving federated learning across multi-tenant AI agent system -- **[draft-yao-agent-auth-considerations](https://datatracker.ietf.org/doc/draft-yao-agent-auth-considerations/)** (score: 3.1) — Extends OAuth model for AI agent authentication and authorization in Agent Communication Networks. P -- **[draft-ietf-lamps-e2e-mail-guidance](https://datatracker.ietf.org/doc/draft-ietf-lamps-e2e-mail-guidance/)** (score: 3.0) — Provides comprehensive guidance for implementing end-to-end email encryption securely. Addresses usa -- **[draft-hong-nmrg-agenticai-ps](https://datatracker.ietf.org/doc/draft-hong-nmrg-agenticai-ps/)** (score: 3.0) — Presents problem statement and motivations for applying Agentic AI to network management. Emphasizes -- **[draft-cui-dmsc-agent-cdi](https://datatracker.ietf.org/doc/draft-cui-dmsc-agent-cdi/)** (score: 3.0) — Defines comprehensive framework for cross-domain AI agent interoperability including identity federa -- **[draft-condrey-rats-witnessd-enrollment](https://datatracker.ietf.org/doc/draft-condrey-rats-witnessd-enrollment/)** (score: 3.0) — Specifies trust anchor bootstrap protocol for proof of process framework. Defines device enrollment, \ No newline at end of file +- **[draft-zhao-detnet-enhanced-use-cases](https://datatracker.ietf.org/doc/draft-zhao-detnet-enhanced-use-cases/)** (score: 3.2) — Describes enhanced use cases for scaling deterministic networks beyond RFC8578, covering industrial \ No newline at end of file diff --git a/data/reports/overview.md b/data/reports/overview.md index 610b662..9dcc7ac 100644 --- a/data/reports/overview.md +++ b/data/reports/overview.md @@ -1,17 +1,22 @@ # IETF AI/Agent Draft Overview -*Generated 2026-02-27 23:29 UTC — 200 rated / 260 tracked drafts* +*Generated 2026-03-03 19:58 UTC — 200 rated / 361 tracked drafts* | Score | Draft | Date | N | M | O | Mom | R | Summary | |------:|-------|------|:-:|:-:|:-:|:---:|:-:|---------| +| 4.8 | [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) | 2026-02-28 | █ | █ | ▁ | ▇ | █ | Defines tamper-evident execution trace format for AI agent workflows using hash ... | | 4.8 | [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) | 2026-01-02 | █ | ▇ | ▁ | █ | █ | Defines comprehensive protocol for AI agent accountability including authenticat... | | 4.6 | [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) | 2025-11-03 | █ | ▇ | ▁ | ▇ | █ | Defines STAMP protocol for cryptographic delegation and proof in AI agent system... | | 4.6 | [draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/) | 2026-02-20 | █ | ▇ | ▁ | ▇ | █ | Defines hardware attestation for email using TPM verification chains to prevent ... | +| 4.6 | [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) | 2026-02-11 | █ | ▇ | ▁ | ▇ | █ | Defines YANG data model for hierarchical language model coordination across tiny... | | 4.6 | [draft-ietf-lake-app-profiles](https://datatracker.ietf.org/doc/draft-ietf-lake-app-profiles/) | 2025-11-21 | ▇ | █ | ▃ | █ | █ | Defines canonical CBOR representation for EDHOC application profiles and coordin... | | 4.5 | [draft-goswami-agentic-jwt](https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/) | 2026-01-01 | █ | ▇ | ▃ | ▇ | █ | Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autono... | | 4.5 | [draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/) | 2026-01-12 | █ | ▇ | ▃ | ▇ | █ | Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent c... | +| 4.5 | [draft-calabria-bmwg-ai-fabric-inference-bench](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/) | 2026-02-27 | ▇ | █ | ▁ | ▇ | █ | Defines benchmarking methodology for AI inference network fabrics. Establishes K... | +| 4.5 | [draft-wang-cats-odsi](https://datatracker.ietf.org/doc/draft-wang-cats-odsi/) | 2026-03-02 | █ | ▇ | ▃ | ▇ | █ | Specifies framework for decentralized LLM inference across untrusted participant... | | 4.5 | [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/) | 2026-02-25 | ▇ | █ | ▃ | ▇ | █ | Defines CDDL-based data format for verifiable agent conversation records using C... | | 4.5 | [draft-aylward-aiga-2](https://datatracker.ietf.org/doc/draft-aylward-aiga-2/) | 2026-01-26 | █ | ▅ | ▁ | ▇ | █ | Comprehensive AI governance framework with tiered risk model, federated authorit... | | 4.4 | [draft-ietf-tls-ecdhe-mlkem](https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/) | 2026-02-17 | ▇ | ▇ | ▃ | █ | █ | Defines hybrid post-quantum key agreement mechanisms for TLS 1.3 that combine ML... | +| 4.4 | [draft-ietf-aipref-vocab](https://datatracker.ietf.org/doc/draft-ietf-aipref-vocab/) | 2025-12-01 | ▇ | ▇ | ▃ | █ | █ | Defines a standardized vocabulary for expressing preferences about how digital a... | | 4.3 | [draft-cui-nmrg-llm-benchmark](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-benchmark/) | 2025-12-30 | ▇ | ▇ | ▁ | ▇ | █ | Provides comprehensive evaluation framework for LLM-based network configuration ... | | 4.3 | [draft-ietf-anima-constrained-voucher](https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/) | 2026-02-27 | ▇ | █ | ▅ | ▇ | █ | Adapts BRSKI secure device onboarding for constrained IoT environments using CBO... | | 4.3 | [draft-ietf-hpke-hpke](https://datatracker.ietf.org/doc/draft-ietf-hpke-hpke/) | 2025-11-04 | ▅ | █ | ▃ | █ | █ | Comprehensive specification for hybrid public key encryption supporting arbitrar... | @@ -25,6 +30,9 @@ | 4.2 | [draft-gaikwad-llm-benchmarking-methodology](https://datatracker.ietf.org/doc/draft-gaikwad-llm-benchmarking-methodology/) | 2026-01-20 | ▇ | ▇ | ▃ | ▇ | █ | Defines comprehensive benchmarking methodologies for LLM inference serving syste... | | 4.2 | [draft-ietf-sshm-mlkem-hybrid-kex](https://datatracker.ietf.org/doc/draft-ietf-sshm-mlkem-hybrid-kex/) | 2026-02-26 | ▇ | ▇ | ▃ | ▇ | █ | Defines post-quantum hybrid key exchange combining ML-KEM with traditional ECDH ... | | 4.2 | [draft-ietf-tls-extended-key-update](https://datatracker.ietf.org/doc/draft-ietf-tls-extended-key-update/) | 2026-02-19 | ▇ | ▇ | ▃ | ▇ | █ | Adds post-compromise security to TLS 1.3 through fresh Diffie-Hellman exchanges ... | +| 4.2 | [draft-calabria-bmwg-ai-fabric-terminology](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-terminology/) | 2026-02-27 | ▇ | ▇ | ▃ | ▇ | █ | Defines comprehensive benchmarking terminology for AI network fabrics including ... | +| 4.2 | [draft-li-spring-rdma-multicast-over-srv6](https://datatracker.ietf.org/doc/draft-li-spring-rdma-multicast-over-srv6/) | 2026-03-01 | ▇ | ▇ | ▃ | ▇ | █ | Specifies SRv6 extensions for RDMA multicast delivery with new End.MT behavior a... | +| 4.2 | [draft-song-tsvwg-camp](https://datatracker.ietf.org/doc/draft-song-tsvwg-camp/) | 2026-03-02 | ▇ | ▇ | ▃ | ▇ | █ | Proposes CAMP, a multipath transport protocol for interactive multimodal LLM sys... | | 4.2 | [draft-narajala-ans](https://datatracker.ietf.org/doc/draft-narajala-ans/) | 2025-11-18 | █ | ▅ | ▃ | ▅ | █ | Introduces Agent Name Service (ANS) as a DNS-based universal directory for AI ag... | | 4.2 | [draft-oauth-transaction-tokens-for-agents](https://datatracker.ietf.org/doc/draft-oauth-transaction-tokens-for-agents/) | 2026-02-11 | ▇ | ▇ | ▅ | ▇ | █ | Extends OAuth Transaction Tokens framework to support agent context propagation ... | | 4.2 | [draft-zhang-dmsc-mas-communication](https://datatracker.ietf.org/doc/draft-zhang-dmsc-mas-communication/) | 2026-01-16 | ▇ | ▅ | ▁ | ▇ | █ | Analyzes security risks in multi-agent communication and limitations of existing... | @@ -32,6 +40,7 @@ | 4.2 | [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) | 2026-02-26 | ▇ | ▇ | ▅ | ▇ | █ | Specifies a comprehensive multi-agent collaboration protocol suite using Agent G... | | 4.2 | [draft-gaikwad-llm-benchmarking-profiles](https://datatracker.ietf.org/doc/draft-gaikwad-llm-benchmarking-profiles/) | 2026-01-20 | ▇ | ▇ | ▅ | ▇ | █ | Defines performance benchmarking profiles binding terminology and methodology to... | | 4.2 | [draft-lake-pocero-authkem-ikr-edhoc](https://datatracker.ietf.org/doc/draft-lake-pocero-authkem-ikr-edhoc/) | 2026-01-08 | ▇ | ▇ | ▅ | ▇ | █ | Specifies an optimized KEM-based authentication variant for EDHOC protocol in sc... | +| 4.2 | [draft-yao-tsvwg-cco-requirement-and-analysis](https://datatracker.ietf.org/doc/draft-yao-tsvwg-cco-requirement-and-analysis/) | 2025-01-09 | ▇ | ▇ | ▅ | ▇ | █ | Analyzes collective communication optimizations for AI training and inference cl... | | 4.1 | [draft-cui-dns-native-agent-naming-resolution](https://datatracker.ietf.org/doc/draft-cui-dns-native-agent-naming-resolution/) | 2025-12-22 | ▇ | ▇ | ▃ | ▅ | █ | Specifies DNS-native naming and resolution for AI agents using FQDNs and SVCB re... | | 4.1 | [draft-liu-agent-operation-authorization](https://datatracker.ietf.org/doc/draft-liu-agent-operation-authorization/) | 2025-11-25 | ▇ | ▅ | ▃ | ▇ | █ | Specifies framework for verifiable delegation of actions from humans to AI agent... | | 4.1 | [draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/) | 2026-02-06 | ▇ | ▅ | ▃ | ▇ | █ | Defines task-oriented multi-agent framework for fault recovery in converged mobi... | @@ -40,14 +49,22 @@ | 4.1 | [draft-nederveld-adl](https://datatracker.ietf.org/doc/draft-nederveld-adl/) | 2026-02-18 | ▇ | ▅ | ▃ | ▇ | █ | Defines ADL, a JSON-based standard for describing AI agents including their capa... | | 4.1 | [draft-mw-spice-actor-chain](https://datatracker.ietf.org/doc/draft-mw-spice-actor-chain/) | 2026-02-26 | ▇ | ▅ | ▃ | ▇ | █ | Extends OAuth 2.0 Token Exchange with cryptographically verifiable actor chains ... | | 4.1 | [draft-spm-lake-pqsuites](https://datatracker.ietf.org/doc/draft-spm-lake-pqsuites/) | 2025-10-20 | ▇ | ▅ | ▃ | ▇ | █ | Defines quantum-resistant cipher suites for EDHOC using ML-DSA signatures and ML... | +| 4.1 | [draft-jadoon-nmrg-agentic-ai-autonomous-networks](https://datatracker.ietf.org/doc/draft-jadoon-nmrg-agentic-ai-autonomous-networks/) | 2026-03-02 | ▇ | ▅ | ▃ | ▇ | █ | Introduces architectural principles for integrating AI agents into IP protocol s... | +| 4.1 | [draft-chen-nmrg-semantic-inference-routing](https://datatracker.ietf.org/doc/draft-chen-nmrg-semantic-inference-routing/) | 2025-10-01 | ▇ | ▅ | ▃ | ▇ | █ | Defines SIRP protocol for content-aware routing of AI inference requests. Enable... | | 4.0 | [draft-steele-agent-considerations](https://datatracker.ietf.org/doc/draft-steele-agent-considerations/) | 2025-11-05 | █ | ▅ | ▁ | ▅ | ▇ | Defines guidelines for IETF specifications to support AI agent consumption and c... | +| 4.0 | [draft-chen-nmrg-multi-provider-inference-api](https://datatracker.ietf.org/doc/draft-chen-nmrg-multi-provider-inference-api/) | 2025-10-20 | ▅ | █ | ▅ | ▇ | █ | Specifies extensions for multi-provider AI inference using OpenAI API as referen... | | 4.0 | [draft-mishra-oauth-agent-grants](https://datatracker.ietf.org/doc/draft-mishra-oauth-agent-grants/) | 2026-02-27 | ▇ | ▇ | ▅ | ▅ | █ | Extends OAuth 2.0 for AI agent authorization with human consent verification, re... | | 4.0 | [draft-ietf-lisp-nexagon](https://datatracker.ietf.org/doc/draft-ietf-lisp-nexagon/) | 2025-09-23 | ▇ | ▇ | ▃ | ▇ | ▇ | Combines LISP with H3 spatial indexing to create geospatial intelligence network... | | 4.0 | [draft-barney-caam](https://datatracker.ietf.org/doc/draft-barney-caam/) | 2026-02-25 | ▇ | ▇ | ▅ | ▅ | █ | Specifies Contextual Agent Authorization Mesh for runtime authorization of agent... | | 4.0 | [draft-nennemann-wimse-ect](https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/) | 2026-02-25 | ▇ | ▇ | ▃ | ▇ | ▇ | Defines Execution Context Tokens as JWT extension to WIMSE for tracking task exe... | +| 4.0 | [draft-jennings-ai-mcp-over-moq](https://datatracker.ietf.org/doc/draft-jennings-ai-mcp-over-moq/) | 2026-03-02 | ▇ | ▇ | ▃ | ▇ | ▇ | Defines how to transport Model Context Protocol (MCP) messages over Media over Q... | +| 4.0 | [draft-dunbar-neotec-ac-te-applicability](https://datatracker.ietf.org/doc/draft-dunbar-neotec-ac-te-applicability/) | 2025-06-23 | ▇ | ▇ | ▁ | ▅ | ▇ | Applies existing IETF YANG models for Attachment Circuits and Traffic Engineerin... | +| 4.0 | [draft-han-anima-ai-asa](https://datatracker.ietf.org/doc/draft-han-anima-ai-asa/) | 2026-01-16 | ▇ | ▃ | ▁ | ▇ | █ | Analyzes the impact of enhancing ANIMA's Autonomic Service Agents with AI/LLM ca... | +| 4.0 | [draft-liao-aipref-autoctl-core](https://datatracker.ietf.org/doc/draft-liao-aipref-autoctl-core/) | 2025-11-03 | ▇ | ▅ | ▅ | ▇ | █ | Defines core machine-readable protocol for server-side automation permissions ta... | | 3.9 | [draft-ainp-protocol](https://datatracker.ietf.org/doc/draft-ainp-protocol/) | 2025-11-24 | █ | ▃ | ▁ | ▃ | █ | Defines semantic communication protocol for AI agents using intent-based routing... | | 3.9 | [draft-ietf-lake-authz](https://datatracker.ietf.org/doc/draft-ietf-lake-authz/) | 2025-11-21 | ▇ | ▇ | ▅ | ▇ | ▇ | Specifies lightweight authorization using EDHOC for zero-touch device onboarding... | | 3.9 | [draft-ietf-ace-coap-est-oscore](https://datatracker.ietf.org/doc/draft-ietf-ace-coap-est-oscore/) | 2025-10-20 | ▇ | ▇ | ▅ | ▇ | ▇ | Specifies carrying EST certificate provisioning over CoAP using OSCORE protectio... | +| 3.9 | [draft-zhang-rtgwg-multicast-requirements-gaps-aidc](https://datatracker.ietf.org/doc/draft-zhang-rtgwg-multicast-requirements-gaps-aidc/) | 2026-03-02 | ▇ | ▅ | ▁ | ▇ | ▇ | Identifies requirements for multicast technology in AI Data Centers to improve e... | | 3.9 | [draft-nandakumar-agent-sd-jwt](https://datatracker.ietf.org/doc/draft-nandakumar-agent-sd-jwt/) | 2025-10-20 | ▇ | ▅ | ▃ | ▅ | █ | This draft defines SD-Card, a Selective Disclosure JWT encoding of Agent Cards t... | | 3.9 | [draft-wahl-scim-agent-schema](https://datatracker.ietf.org/doc/draft-wahl-scim-agent-schema/) | 2026-02-20 | ▇ | ▅ | ▃ | ▅ | █ | This draft extends the SCIM (System for Cross-domain Identity Management) protoc... | | 3.9 | [draft-agent-gw](https://datatracker.ietf.org/doc/draft-agent-gw/) | 2026-02-16 | ▇ | ▅ | ▃ | ▅ | █ | Proposes an Intelligent Agent Communication Gateway for large-scale multi-agent ... | @@ -60,9 +77,13 @@ | 3.9 | [draft-josefsson-chempat](https://datatracker.ietf.org/doc/draft-josefsson-chempat/) | 2025-10-20 | ▇ | ▅ | ▃ | ▅ | █ | Generic framework for Post-Quantum/Traditional hybrid key encapsulation mechanis... | | 3.9 | [draft-cui-ai-agent-discovery-invocation](https://datatracker.ietf.org/doc/draft-cui-ai-agent-discovery-invocation/) | 2026-02-12 | ▅ | ▇ | ▅ | ▇ | █ | Proposes standardized protocol for AI agent discovery and invocation with common... | | 3.9 | [draft-ravikiran-clawdentity-protocol](https://datatracker.ietf.org/doc/draft-ravikiran-clawdentity-protocol/) | 2026-02-21 | ▅ | ▇ | ▅ | ▇ | █ | Specifies Clawdentity protocol for cryptographic identity and trust in AI agent ... | +| 3.9 | [draft-pan-tsvwg-pie](https://datatracker.ietf.org/doc/draft-pan-tsvwg-pie/) | 2024-09-24 | ▇ | █ | ▅ | ▇ | ▅ | Presents PIE queue management algorithm to address bufferbloat by controlling qu... | | 3.9 | [draft-jurkovikj-httpapi-agentic-state](https://datatracker.ietf.org/doc/draft-jurkovikj-httpapi-agentic-state/) | 2025-12-10 | ▇ | ▇ | ▃ | ▅ | ▇ | Defines Agentic State Transfer (AST) HTTP profile for managing canonical resourc... | | 3.9 | [draft-tejido-swp-core](https://datatracker.ietf.org/doc/draft-tejido-swp-core/) | 2026-02-20 | ▇ | ▇ | ▃ | ▅ | ▇ | Specifies SlimWire Protocol Core, a binary framing layer for agent/tool messagin... | | 3.9 | [draft-bradleylundberg-cfrg-arkg](https://datatracker.ietf.org/doc/draft-bradleylundberg-cfrg-arkg/) | 2026-02-27 | ▇ | ▇ | ▃ | ▅ | ▇ | Defines Asynchronous Remote Key Generation algorithm enabling delegation of publ... | +| 3.9 | [draft-tsyrulnikov-rats-attested-inference-receipt](https://datatracker.ietf.org/doc/draft-tsyrulnikov-rats-attested-inference-receipt/) | 2026-03-01 | ▇ | ▇ | ▃ | ▅ | ▇ | Defines Attested Inference Receipt (AIR) using COSE/CWT to create verifiable rec... | +| 3.9 | [draft-templin-intarea-aero2](https://datatracker.ietf.org/doc/draft-templin-intarea-aero2/) | 2024-04-04 | ▇ | ▇ | ▃ | ▅ | ▇ | Specifies AERO service for IP internetworking over overlay multilink networks us... | +| 3.8 | [draft-ramadan-mboned-sonar](https://datatracker.ietf.org/doc/draft-ramadan-mboned-sonar/) | 2025-11-04 | █ | ▇ | ▁ | ▃ | ▅ | Specifies a protocol for verifiable multicast delivery using cryptoeconomic acco... | | 3.8 | [draft-ietf-emu-hybrid-pqc-eapaka](https://datatracker.ietf.org/doc/draft-ietf-emu-hybrid-pqc-eapaka/) | 2026-02-26 | ▇ | ▅ | ▃ | ▇ | ▇ | Enhances EAP-AKA' with post-quantum cryptography to address quantum computing th... | | 3.8 | [draft-luan-rtgwg-sdaf](https://datatracker.ietf.org/doc/draft-luan-rtgwg-sdaf/) | 2026-02-25 | ▇ | ▅ | ▃ | ▇ | ▇ | Proposes symmetry-driven forwarding mechanism for LEO satellite networks to avoi... | | 3.8 | [draft-chen-ai-agent-auth-new-requirements](https://datatracker.ietf.org/doc/draft-chen-ai-agent-auth-new-requirements/) | 2026-01-06 | ▇ | ▃ | ▁ | ▅ | █ | Identifies new authentication and authorization requirements for AI agents that ... | @@ -72,6 +93,9 @@ | 3.8 | [draft-abbey-scim-agent-extension](https://datatracker.ietf.org/doc/draft-abbey-scim-agent-extension/) | 2025-10-16 | ▇ | ▅ | ▁ | ▅ | ▇ | Extends SCIM 2.0 protocol to manage AI agents and agentic applications across do... | | 3.8 | [draft-zhao-nmop-network-management-agent](https://datatracker.ietf.org/doc/draft-zhao-nmop-network-management-agent/) | 2026-02-27 | ▇ | ▃ | ▅ | ▇ | █ | Defines AI-driven Network Management Agent concept for Level 4 autonomous networ... | | 3.8 | [draft-eckert-anima-acp-free-ani](https://datatracker.ietf.org/doc/draft-eckert-anima-acp-free-ani/) | 2025-10-20 | ▇ | ▇ | ▅ | ▅ | ▇ | Describes lightweight variation of Autonomic Networking Infrastructure without e... | +| 3.8 | [draft-li-individual-inip](https://datatracker.ietf.org/doc/draft-li-individual-inip/) | 2026-03-02 | ▇ | ▅ | ▁ | ▅ | ▇ | Specifies a protocol for performing lightweight ML inference directly in network... | +| 3.8 | [draft-ietf-aipref-attach](https://datatracker.ietf.org/doc/draft-ietf-aipref-attach/) | 2025-11-03 | ▅ | ▇ | ▅ | █ | ▇ | Specifies how AI usage preferences can be signaled during HTTP content acquisiti... | +| 3.8 | [draft-farzdusa-aipref-enduser](https://datatracker.ietf.org/doc/draft-farzdusa-aipref-enduser/) | 2025-11-27 | ▇ | ▅ | ▁ | ▅ | ▇ | Documents potential end user impacts of AI preference signaling standards across... | | 3.7 | [draft-scim-agent-extension](https://datatracker.ietf.org/doc/draft-scim-agent-extension/) | 2025-10-11 | ▅ | ▇ | ▃ | ▇ | ▇ | Extends SCIM 2.0 specification to manage agents and agentic applications across ... | | 3.7 | [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) | 2025-11-02 | ▇ | ▅ | ▇ | ▅ | █ | Defines comprehensive agent identity management for Internet of Agents systems. ... | | 3.7 | [draft-yuan-rtgwg-traffic-agent-usecase](https://datatracker.ietf.org/doc/draft-yuan-rtgwg-traffic-agent-usecase/) | 2025-11-02 | ▅ | ▇ | ▃ | ▇ | ▇ | Presents use cases for AI agents optimizing network traffic through dynamic reso... | @@ -84,6 +108,7 @@ | 3.7 | [draft-ietf-suit-firmware-encryption](https://datatracker.ietf.org/doc/draft-ietf-suit-firmware-encryption/) | 2025-12-08 | ▅ | ▇ | ▃ | ▇ | ▇ | Specifies encryption techniques for firmware and software payloads in SUIT manif... | | 3.7 | [draft-ietf-lamps-est-renewal-info](https://datatracker.ietf.org/doc/draft-ietf-lamps-est-renewal-info/) | 2026-02-12 | ▅ | ▇ | ▃ | ▇ | ▇ | Extends EST protocol to provide server-side recommendations for certificate rene... | | 3.7 | [draft-ietf-netconf-configuration-tracing](https://datatracker.ietf.org/doc/draft-ietf-netconf-configuration-tracing/) | 2025-11-03 | ▅ | ▇ | ▃ | ▇ | ▇ | Specifies a NETCONF mechanism to map configuration modifications to their origin... | +| 3.7 | [draft-howe-sipcore-mcp-extension](https://datatracker.ietf.org/doc/draft-howe-sipcore-mcp-extension/) | 2025-09-29 | ▇ | ▇ | ▁ | ▅ | ▅ | Defines SIP extension to carry Model Context Protocol with new option-tags, head... | | 3.7 | [draft-gaikwad-south-authorization](https://datatracker.ietf.org/doc/draft-gaikwad-south-authorization/) | 2025-11-28 | ▇ | ▇ | ▃ | ▃ | ▇ | Authorization protocol supporting probabilistic decisions for agents and service... | | 3.7 | [draft-sogomonian-aiip-architecture](https://datatracker.ietf.org/doc/draft-sogomonian-aiip-architecture/) | 2025-12-15 | █ | ▃ | ▁ | ▃ | ▇ | Defines architectural model for Artificial Intelligence Internet Protocol (AIIP)... | | 3.7 | [draft-oauth-ai-agents-on-behalf-of-user](https://datatracker.ietf.org/doc/draft-oauth-ai-agents-on-behalf-of-user/) | 2026-02-27 | ▇ | ▅ | ▅ | ▃ | █ | This draft extends OAuth 2.0 to enable AI agents to securely obtain access token... | @@ -105,15 +130,21 @@ | 3.6 | [draft-vandoulas-aidp](https://datatracker.ietf.org/doc/draft-vandoulas-aidp/) | 2026-01-18 | ▇ | ▅ | ▃ | ▅ | ▇ | Defines a comprehensive control-plane protocol for secure agent interactions wit... | | 3.6 | [draft-messous-eat-ai](https://datatracker.ietf.org/doc/draft-messous-eat-ai/) | 2026-02-24 | ▇ | ▅ | ▃ | ▅ | ▇ | Defines an Entity Attestation Token profile for remote attestation of autonomous... | | 3.6 | [draft-cui-nmrg-auto-test](https://datatracker.ietf.org/doc/draft-cui-nmrg-auto-test/) | 2026-02-22 | ▇ | ▅ | ▃ | ▅ | ▇ | Framework for AI-assisted network protocol testing using LLMs and automated test... | +| 3.6 | [draft-reilly-sentinel-protocol](https://datatracker.ietf.org/doc/draft-reilly-sentinel-protocol/) | 2025-09-26 | ▇ | ▅ | ▃ | ▅ | ▇ | Defines blockchain-anchored integrity protocol for AI lifecycle provenance using... | +| 3.6 | [draft-altanai-aipref-realtime-protocol-bindings](https://datatracker.ietf.org/doc/draft-altanai-aipref-realtime-protocol-bindings/) | 2026-02-03 | ▇ | ▅ | ▃ | ▅ | ▇ | Defines how AI preference expressions are bound to real-time protocols like SIP ... | | 3.6 | [draft-mozleywilliams-dnsop-dnsaid](https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-dnsaid/) | 2026-02-24 | ▅ | ▇ | ▅ | ▇ | ▇ | Uses existing DNS infrastructure for AI agent discovery through structured names... | | 3.6 | [draft-eggert-mailmaint-uaautoconf](https://datatracker.ietf.org/doc/draft-eggert-mailmaint-uaautoconf/) | 2025-09-28 | ▅ | ▇ | ▅ | ▇ | ▇ | Specifies automatic configuration mechanism for email, calendar, and contact app... | | 3.6 | [draft-ietf-ace-edhoc-oscore-profile](https://datatracker.ietf.org/doc/draft-ietf-ace-edhoc-oscore-profile/) | 2025-10-20 | ▅ | ▇ | ▅ | ▇ | ▇ | Defines ACE framework profile using EDHOC for mutual authentication and OSCORE f... | +| 3.6 | [draft-xsaopig-nsttlp-traffic-labeling](https://datatracker.ietf.org/doc/draft-xsaopig-nsttlp-traffic-labeling/) | 2026-01-29 | ▅ | ▇ | ▅ | ▇ | ▇ | Specifies protocol for embedding service type identifiers in network packets to ... | | 3.6 | [draft-gaikwad-aps-profile](https://datatracker.ietf.org/doc/draft-gaikwad-aps-profile/) | 2025-11-30 | ▇ | ▅ | ▁ | ▃ | ▇ | Storage service profile for agent persistent state including embeddings, prefere... | | 3.6 | [draft-moreno-lisp-uberlay](https://datatracker.ietf.org/doc/draft-moreno-lisp-uberlay/) | 2025-10-09 | ▇ | ▇ | ▃ | ▅ | ▅ | Describes using LISP to interconnect multiple independent network overlays throu... | +| 3.6 | [draft-li-cats-idn](https://datatracker.ietf.org/doc/draft-li-cats-idn/) | 2026-03-02 | ▅ | ▅ | ▃ | ▅ | █ | Introduces Intelligence Delivery Network (IDN) framework for deploying ML models... | | 3.6 | [draft-liu-oauth-a2a-profile](https://datatracker.ietf.org/doc/draft-liu-oauth-a2a-profile/) | 2025-10-20 | ▇ | ▃ | ▅ | ▅ | █ | Specifies OAuth Transaction Token profile for Agent-to-Agent communication. Embe... | +| 3.6 | [draft-templin-6man-aero3](https://datatracker.ietf.org/doc/draft-templin-6man-aero3/) | 2026-02-28 | ▇ | ▇ | ▅ | ▃ | ▇ | Specifies automatic extended route optimization for IP internetworking over over... | | 3.6 | [draft-liu-dmsc-acps-arc](https://datatracker.ietf.org/doc/draft-liu-dmsc-acps-arc/) | 2026-01-29 | ▅ | ▅ | ▇ | ▇ | █ | Proposes Agent Collaboration Protocols architecture for Internet of Agents, cove... | | 3.6 | [draft-ietf-lake-edhoc-psk](https://datatracker.ietf.org/doc/draft-ietf-lake-edhoc-psk/) | 2025-11-21 | ▅ | ▇ | ▃ | ▅ | ▇ | Specifies pre-shared key authentication method for EDHOC key exchange protocol. ... | | 3.6 | [draft-pbs-sidrops-roaanycast](https://datatracker.ietf.org/doc/draft-pbs-sidrops-roaanycast/) | 2025-09-03 | ▅ | ▇ | ▃ | ▅ | ▇ | Defines best practices for managing Route Origin Authorizations (ROAs) for globa... | +| 3.6 | [draft-vaughan-aipref-vocab](https://datatracker.ietf.org/doc/draft-vaughan-aipref-vocab/) | 2025-07-24 | ▅ | ▅ | ▇ | ▇ | █ | Proposes vocabulary for rightsholders to express content preferences for AI trai... | | 3.5 | [draft-liu-agent-context-protocol](https://datatracker.ietf.org/doc/draft-liu-agent-context-protocol/) | 2026-01-26 | ▇ | ▃ | ▃ | ▃ | █ | This draft proposes a standard protocol for AI agents to communicate context inf... | | 3.5 | [draft-liang-agentdns](https://datatracker.ietf.org/doc/draft-liang-agentdns/) | 2025-10-09 | ▇ | ▅ | ▅ | ▅ | ▇ | Proposes a DNS-inspired naming and service discovery system for LLM agents to en... | | 3.5 | [draft-song-oauth-ai-agent-collaborate-authz](https://datatracker.ietf.org/doc/draft-song-oauth-ai-agent-collaborate-authz/) | 2025-11-06 | ▇ | ▅ | ▅ | ▅ | ▇ | Proposes OAuth 2.0 extension for multi-AI agent collaboration with applier-on-be... | @@ -121,6 +152,8 @@ | 3.5 | [draft-ye-problems-and-requirements-of-dns-for-ioa](https://datatracker.ietf.org/doc/draft-ye-problems-and-requirements-of-dns-for-ioa/) | 2025-11-02 | ▇ | ▃ | ▁ | ▅ | ▇ | Analyzes DNS challenges for Internet of Agents scenarios and identifies technica... | | 3.5 | [draft-wang-hjs-accountability](https://datatracker.ietf.org/doc/draft-wang-hjs-accountability/) | 2026-02-21 | ▇ | ▃ | ▁ | ▅ | ▇ | Defines HJS accountability layer for AI agents using blockchain-anchored timesta... | | 3.5 | [draft-irtf-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-irtf-nmrg-llm-nm/) | 2025-09-14 | ▇ | ▅ | ▅ | ▅ | ▇ | Defines framework for collaborative network management between LLMs and human op... | +| 3.5 | [draft-zeng-mcp-network-measurement](https://datatracker.ietf.org/doc/draft-zeng-mcp-network-measurement/) | 2025-10-20 | ▇ | ▅ | ▅ | ▅ | ▇ | Proposes MCP framework for intelligent network measurement with AI assistance. E... | +| 3.5 | [draft-templin-intarea-aero](https://datatracker.ietf.org/doc/draft-templin-intarea-aero/) | 2024-02-16 | ▇ | ▅ | ▅ | ▅ | ▇ | Specifies Automatic Extended Route Optimization (AERO) service for IP internetwo... | | 3.5 | [draft-ahn-nmrg-5g-security-i2nsf-framework](https://datatracker.ietf.org/doc/draft-ahn-nmrg-5g-security-i2nsf-framework/) | 2026-02-25 | ▅ | ▇ | ▇ | ▇ | ▇ | Presents integrated framework for automated 5G edge network security using I2NSF... | | 3.5 | [draft-jia-oauth-scope-aggregation](https://datatracker.ietf.org/doc/draft-jia-oauth-scope-aggregation/) | 2026-02-10 | ▅ | ▅ | ▃ | ▇ | ▇ | Extends OAuth 2.0 with scope aggregation to reduce authorization round-trips in ... | | 3.5 | [draft-meta-layer-overview](https://datatracker.ietf.org/doc/draft-meta-layer-overview/) | 2025-10-06 | █ | ▁ | ▁ | ▃ | ▇ | Introduces Meta-layer concept as coordination substrate for presence, annotation... | @@ -137,71 +170,38 @@ | 3.4 | [draft-jiang-seat-dynamic-attestation](https://datatracker.ietf.org/doc/draft-jiang-seat-dynamic-attestation/) | 2025-11-13 | ▇ | ▃ | ▃ | ▅ | ▇ | Defines dynamic attestation mechanisms for AI agents to convey runtime posture c... | | 3.4 | [draft-romanchuk-normative-admissibility](https://datatracker.ietf.org/doc/draft-romanchuk-normative-admissibility/) | 2026-01-06 | █ | ▃ | ▁ | ▃ | ▅ | Establishes a framework for evaluating whether autonomous agent speech acts are ... | | 3.4 | [draft-kartha-grd](https://datatracker.ietf.org/doc/draft-kartha-grd/) | 2026-01-19 | ▇ | ▃ | ▃ | ▅ | ▇ | Defines architectural framework for discovering network resources based on physi... | +| 3.4 | [draft-du-catalist-routing-considerations](https://datatracker.ietf.org/doc/draft-du-catalist-routing-considerations/) | 2026-03-02 | ▇ | ▃ | ▃ | ▅ | ▇ | Proposes routing considerations for AI agent-to-agent communication in overlay n... | +| 3.4 | [draft-tan-ccamp-uonaco-problem-statement](https://datatracker.ietf.org/doc/draft-tan-ccamp-uonaco-problem-statement/) | 2026-03-02 | ▇ | ▃ | ▃ | ▅ | ▇ | Defines requirements for unified orchestration between optical networks and AI c... | +| 3.4 | [draft-li-cats-aisemantic-contract](https://datatracker.ietf.org/doc/draft-li-cats-aisemantic-contract/) | 2026-03-02 | ▇ | ▃ | ▃ | ▅ | ▇ | Defines a contract mechanism allowing AI applications to communicate semantic in... | +| 3.4 | [draft-kartha-internet20-ainative](https://datatracker.ietf.org/doc/draft-kartha-internet20-ainative/) | 2025-11-20 | ▇ | ▃ | ▃ | ▅ | ▇ | Proposes Internet 2.0 architecture with AI models as first-class network entitie... | | 3.4 | [draft-yan-a2a-device-agent-applicability](https://datatracker.ietf.org/doc/draft-yan-a2a-device-agent-applicability/) | 2026-02-12 | ▅ | ▅ | ▅ | ▇ | ▇ | Discusses applying Agent-to-Agent (A2A) Protocol to network management for commu... | | 3.4 | [draft-ietf-lamps-private-key-stmt-attr](https://datatracker.ietf.org/doc/draft-ietf-lamps-private-key-stmt-attr/) | 2025-10-13 | ▅ | ▇ | ▁ | ▅ | ▅ | Defines X.509 attribute for private key possession statements as alternative to ... | | 3.4 | [draft-yue-moq-transporting-sensing-data](https://datatracker.ietf.org/doc/draft-yue-moq-transporting-sensing-data/) | 2025-10-19 | ▅ | ▅ | ▅ | ▇ | ▇ | Proposes using Media Over QUIC (MOQ) to transport large-scale, real-time sensing... | | 3.4 | [draft-ramakrishna-satp-views-addresses](https://datatracker.ietf.org/doc/draft-ramakrishna-satp-views-addresses/) | 2025-09-15 | ▇ | ▅ | ▃ | ▅ | ▅ | Defines view and addressing mechanisms for secure asset transfer between DLT sys... | +| 3.4 | [draft-jimenez-tbd-robotstxt-update](https://datatracker.ietf.org/doc/draft-jimenez-tbd-robotstxt-update/) | 2025-05-10 | ▅ | ▃ | ▁ | ▇ | ▇ | Proposes updates to robots.txt standard to handle AI-specific crawlers with new ... | +| 3.4 | [draft-zw-rtgwg-mcp-network-mgmt](https://datatracker.ietf.org/doc/draft-zw-rtgwg-mcp-network-mgmt/) | 2025-10-20 | ▅ | ▇ | ▇ | ▅ | ▇ | Specifies MCP extensions for network equipment management with routers/switches ... | +| 3.4 | [draft-thomson-aipref-sup](https://datatracker.ietf.org/doc/draft-thomson-aipref-sup/) | 2025-08-20 | ▅ | ▇ | ▇ | ▅ | ▇ | Defines simple format for content usage preference expressions with HTTP header ... | | 3.4 | [draft-stephan-ai-agent-6g](https://datatracker.ietf.org/doc/draft-stephan-ai-agent-6g/) | 2025-10-20 | ▅ | ▅ | ▃ | ▅ | ▇ | Examines AI agent communication protocols specifically for 6G systems based on 3... | | 3.4 | [draft-zeng-nmrg-mcp-usecases-requirements](https://datatracker.ietf.org/doc/draft-zeng-nmrg-mcp-usecases-requirements/) | 2026-02-14 | ▅ | ▅ | ▃ | ▅ | ▇ | Presents problem statement for integrating Model Context Protocol into network m... | +| 3.4 | [draft-zhu-anima-service-intent](https://datatracker.ietf.org/doc/draft-zhu-anima-service-intent/) | 2026-03-02 | ▅ | ▅ | ▃ | ▅ | ▇ | Defines a structured semantic model for expressing service-level objectives and ... | +| 3.4 | [draft-han-rtgwg-codeployment-pfc-fgfc](https://datatracker.ietf.org/doc/draft-han-rtgwg-codeployment-pfc-fgfc/) | 2026-02-28 | ▅ | ▅ | ▃ | ▅ | ▇ | Describes use cases for coordinating flow control between data center PFC and WA... | | 3.3 | [draft-cosmos-protocol-specification](https://datatracker.ietf.org/doc/draft-cosmos-protocol-specification/) | 2026-01-02 | █ | ▃ | ▃ | ▃ | ▅ | Defines comprehensive badge-based identity and communication system with trust s... | | 3.3 | [draft-sz-dmsc-iaip](https://datatracker.ietf.org/doc/draft-sz-dmsc-iaip/) | 2026-02-10 | ▇ | ▃ | ▅ | ▅ | ▇ | Defines Intent-based Agent Interconnection Protocol (IAIP) for dynamic agent dis... | +| 3.3 | [draft-wang-cats-innetwork-infer](https://datatracker.ietf.org/doc/draft-wang-cats-innetwork-infer/) | 2026-03-02 | ▇ | ▃ | ▅ | ▅ | ▇ | Proposes a framework for decentralized LLM inference across untrusted participan... | +| 3.3 | [draft-xsaopig-nmop-service-flow-modal-mapping](https://datatracker.ietf.org/doc/draft-xsaopig-nmop-service-flow-modal-mapping/) | 2025-10-16 | ▇ | ▃ | ▅ | ▅ | ▇ | Proposes a framework using ALTO protocol and SDN architecture for mapping servic... | +| 3.3 | [draft-mcp-over-moqt](https://datatracker.ietf.org/doc/draft-mcp-over-moqt/) | 2025-10-20 | ▇ | ▇ | █ | ▅ | ▅ | Defines transport mapping for Model Context Protocol over Media over QUIC Transp... | +| 3.3 | [draft-jennings-mcp-over-moqt](https://datatracker.ietf.org/doc/draft-jennings-mcp-over-moqt/) | 2025-10-20 | ▇ | ▇ | █ | ▅ | ▅ | Defines transport mapping for Model Context Protocol over Media over QUIC Transp... | +| 3.3 | [draft-khatri-sipcore-call-transfer-fail-response](https://datatracker.ietf.org/doc/draft-khatri-sipcore-call-transfer-fail-response/) | 2024-01-25 | ▅ | ▇ | ▃ | ▅ | ▅ | Defines a new SIP response code (497) for indicating call transfer failures with... | | 3.3 | [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) | 2025-11-03 | ▅ | ▃ | ▅ | ▅ | █ | This draft proposes an identity management framework for agents in an Internet o... | | 3.3 | [draft-narvaneni-agent-uri](https://datatracker.ietf.org/doc/draft-narvaneni-agent-uri/) | 2025-10-16 | ▇ | ▃ | ▃ | ▃ | ▇ | This draft defines the agent:// URI scheme for addressing and interoperating wit... | | 3.3 | [draft-jeong-opsawg-intent-based-sdv-framework](https://datatracker.ietf.org/doc/draft-jeong-opsawg-intent-based-sdv-framework/) | 2025-12-12 | ▇ | ▃ | ▃ | ▃ | ▇ | Proposes intent-based management framework for Software-Defined Vehicles in ITS ... | +| 3.3 | [draft-bernardos-nmrg-agentic-network-optimization](https://datatracker.ietf.org/doc/draft-bernardos-nmrg-agentic-network-optimization/) | 2026-03-02 | ▇ | ▅ | ▅ | ▅ | ▅ | Focuses on agentic AI for distributed sensing in ISAC networks with joint optimi... | | 3.2 | [draft-chuyi-nmrg-ai-agent-network](https://datatracker.ietf.org/doc/draft-chuyi-nmrg-ai-agent-network/) | 2025-10-20 | ▅ | ▅ | ▅ | ▅ | ▇ | Focuses on large language model-based agents for network operations and maintena... | | 3.2 | [draft-liu-rtgwg-agent-gateway-requirements](https://datatracker.ietf.org/doc/draft-liu-rtgwg-agent-gateway-requirements/) | 2025-11-28 | ▅ | ▅ | ▅ | ▅ | ▇ | Discusses requirements for Agent Gateways in agent-to-agent communications to im... | | 3.2 | [draft-pioli-agent-discovery](https://datatracker.ietf.org/doc/draft-pioli-agent-discovery/) | 2026-02-24 | ▅ | ▅ | ▅ | ▅ | ▇ | Specifies ARDP, a lightweight protocol for agent registration and discovery in d... | | 3.2 | [draft-diaconu-agents-authz-info-sharing](https://datatracker.ietf.org/doc/draft-diaconu-agents-authz-info-sharing/) | 2026-02-06 | ▅ | ▅ | ▅ | ▅ | ▇ | Addresses authorization challenges in distributed multi-agent systems across mul... | | 3.2 | [draft-gaikwad-woa](https://datatracker.ietf.org/doc/draft-gaikwad-woa/) | 2025-11-30 | ▅ | ▅ | ▅ | ▅ | ▇ | Specifies Web of Agents (WoA) format using JSON Schema to describe AI agent inpu... | | 3.2 | [draft-ahn-opsawg-5g-security-i2nsf-framework](https://datatracker.ietf.org/doc/draft-ahn-opsawg-5g-security-i2nsf-framework/) | 2026-01-09 | ▅ | ▅ | ▅ | ▅ | ▇ | Proposes an integrated security framework for 5G edge networks using I2NSF archi... | -| 3.2 | [draft-tong-network-agent-use-cases-in-6g](https://datatracker.ietf.org/doc/draft-tong-network-agent-use-cases-in-6g/) | 2025-11-02 | ▅ | ▃ | ▅ | ▇ | ▇ | Introduces network AI agent use cases in 6G focusing on connectivity services an... | -| 3.2 | [draft-gupta-httpapi-events-query](https://datatracker.ietf.org/doc/draft-gupta-httpapi-events-query/) | 2025-10-17 | ▅ | ▇ | ▅ | ▅ | ▅ | Proposes Events Query Protocol (EQP) built on HTTP for user agents to receive ev... | -| 3.2 | [draft-ietf-emu-eap-edhoc](https://datatracker.ietf.org/doc/draft-ietf-emu-eap-edhoc/) | 2026-02-14 | ▅ | ▇ | ▅ | ▅ | ▅ | Defines EAP authentication method based on EDHOC for constrained environments. I... | -| 3.2 | [draft-lake-pocero-authkem-edhoc](https://datatracker.ietf.org/doc/draft-lake-pocero-authkem-edhoc/) | 2025-10-16 | ▅ | ▃ | ▅ | ▇ | ▇ | This draft extends the EDHOC protocol to provide quantum-resistant authenticatio... | -| 3.2 | [draft-meunier-webbotauth-registry](https://datatracker.ietf.org/doc/draft-meunier-webbotauth-registry/) | 2025-10-20 | ▅ | ▅ | ▃ | ▃ | ▇ | Defines a JSON format for web bot signature agent cards to advertise identity, p... | -| 3.2 | [draft-kale-agntcy-federated-privacy](https://datatracker.ietf.org/doc/draft-kale-agntcy-federated-privacy/) | 2026-01-08 | ▅ | ▅ | ▇ | ▅ | ▇ | Specifies architecture for privacy-preserving federated learning across multi-te... | -| 3.2 | [draft-mao-rtgwg-apn-framework-for-ioa](https://datatracker.ietf.org/doc/draft-mao-rtgwg-apn-framework-for-ioa/) | 2025-11-02 | ▅ | ▅ | ▇ | ▅ | ▇ | Applies Application-aware Performance Network framework to Internet of Agents sc... | -| 3.2 | [draft-zhang-dmsc-ioa-semantic-interaction](https://datatracker.ietf.org/doc/draft-zhang-dmsc-ioa-semantic-interaction/) | 2026-02-27 | ▅ | ▅ | ▇ | ▅ | ▇ | Specifies a semantic layer for Internet of Agents using ontology models and JSON... | -| 3.2 | [draft-sun-zhang-iaip](https://datatracker.ietf.org/doc/draft-sun-zhang-iaip/) | 2026-02-05 | ▅ | ▅ | ▇ | ▅ | ▇ | Defines Intent-based Agent Interconnection Protocol for Agent Gateways, focusing... | -| 3.2 | [draft-liu-nmrg-ai-llm-inference-requirements](https://datatracker.ietf.org/doc/draft-liu-nmrg-ai-llm-inference-requirements/) | 2025-11-04 | ▅ | ▅ | ▇ | ▅ | ▇ | Analyzes system and network requirements for large-scale LLM inference services.... | -| 3.2 | [draft-ra-emu-pqc-eapaka](https://datatracker.ietf.org/doc/draft-ra-emu-pqc-eapaka/) | 2025-07-10 | ▅ | ▅ | ▇ | ▅ | ▇ | Enhances EAP-AKA' with post-quantum key encapsulation mechanisms to protect agai... | -| 3.1 | [draft-hw-ai-agent-6g](https://datatracker.ietf.org/doc/draft-hw-ai-agent-6g/) | 2026-01-21 | ▅ | ▃ | ▃ | ▅ | ▇ | This draft analyzes requirements for agent protocols specifically tailored to 6G... | -| 3.1 | [draft-yao-agent-auth-considerations](https://datatracker.ietf.org/doc/draft-yao-agent-auth-considerations/) | 2025-10-20 | ▅ | ▃ | ▃ | ▅ | ▇ | Extends OAuth model for AI agent authentication and authorization in Agent Commu... | -| 3.1 | [draft-li-dmsc-inf-architecture](https://datatracker.ietf.org/doc/draft-li-dmsc-inf-architecture/) | 2026-02-05 | ▅ | ▃ | ▃ | ▅ | ▇ | Proposes a network infrastructure architecture for large-scale multi-agent colla... | -| 3.1 | [draft-zeng-mcp-troubleshooting](https://datatracker.ietf.org/doc/draft-zeng-mcp-troubleshooting/) | 2025-10-20 | ▅ | ▃ | ▃ | ▅ | ▇ | Applies Model Context Protocol to network management for intent-based troublesho... | -| 3.1 | [draft-a2a-moqt-transport](https://datatracker.ietf.org/doc/draft-a2a-moqt-transport/) | 2025-10-20 | ▇ | ▃ | █ | ▅ | ▇ | Specifies transport of Agent-to-Agent protocol over Media over QUIC Transport. L... | -| 3.1 | [draft-levy-llm-uri-scheme](https://datatracker.ietf.org/doc/draft-levy-llm-uri-scheme/) | 2026-02-06 | ▅ | ▃ | ▃ | ▅ | ▇ | Defines a URI scheme for identifying LLM endpoints with embedded configuration p... | -| 3.1 | [draft-mvieuille-kerpass-ephemsec](https://datatracker.ietf.org/doc/draft-mvieuille-kerpass-ephemsec/) | 2025-11-22 | ▇ | ▅ | ▅ | ▃ | ▅ | Specifies EPHEMSEC algorithm for generating one-time passwords using public key ... | -| 3.1 | [draft-tojens-dhcp-option-concat-considerations](https://datatracker.ietf.org/doc/draft-tojens-dhcp-option-concat-considerations/) | 2025-09-04 | ▃ | ▇ | ▁ | ▅ | ▅ | Updates RFC 3396 to make DHCP option concatenation requirements more flexible. A... | -| 3.1 | [draft-ietf-lamps-rfc5274bis](https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5274bis/) | 2026-02-26 | ▃ | ▇ | ▁ | ▅ | ▅ | Defines compliance requirements for Certificate Management Messages over CMS (CM... | -| 3.1 | [draft-vinaysingh-awp-wellknown](https://datatracker.ietf.org/doc/draft-vinaysingh-awp-wellknown/) | 2025-11-02 | ▅ | ▅ | ▃ | ▅ | ▅ | Defines well-known URI and link relation for exposing website workflows to autom... | -| 3.1 | [draft-contario-totp-secure-enrollment](https://datatracker.ietf.org/doc/draft-contario-totp-secure-enrollment/) | 2025-09-27 | ▅ | ▅ | ▃ | ▅ | ▅ | Extends TOTP enrollment to prevent key compromise through QR code capture or key... | -| 3.1 | [draft-architect-cittamarket](https://datatracker.ietf.org/doc/draft-architect-cittamarket/) | 2025-12-19 | █ | ▁ | ▁ | ▁ | ▅ | Specifies protocol for immutable AGI system identification using Bitcoin blockch... | -| 3.0 | [draft-ni-wimse-ai-agent-identity](https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/) | 2025-10-20 | ▅ | ▃ | ▅ | ▅ | ▇ | Applies WIMSE (Workload Identity in Multi System Environments) framework to AI a... | -| 3.0 | [draft-sipos-dtn-bp-safe](https://datatracker.ietf.org/doc/draft-sipos-dtn-bp-safe/) | 2025-12-07 | ▅ | █ | ▇ | ▅ | ▃ | Defines security association negotiation protocol for Bundle Protocol agents in ... | -| 3.0 | [draft-chen-lake-edhoc-aka](https://datatracker.ietf.org/doc/draft-chen-lake-edhoc-aka/) | 2025-10-20 | ▅ | ▃ | ▅ | ▅ | ▇ | Defines EDHOC-AKA authentication method combining AKA protocol with EDHOC for mo... | -| 3.0 | [draft-bernardos-cats-isac-uc](https://datatracker.ietf.org/doc/draft-bernardos-cats-isac-uc/) | 2026-01-05 | ▅ | ▃ | ▅ | ▅ | ▇ | Presents Integrated Sensing and Communications (ISAC) as a use case for CATS arc... | -| 3.0 | [draft-wendt-stir-vesper](https://datatracker.ietf.org/doc/draft-wendt-stir-vesper/) | 2025-11-04 | ▅ | ▇ | ▇ | ▇ | ▃ | Formalizes framework for verifiable telephone number identity using delegate cer... | -| 3.0 | [draft-ietf-lamps-e2e-mail-guidance](https://datatracker.ietf.org/doc/draft-ietf-lamps-e2e-mail-guidance/) | 2025-08-23 | ▃ | █ | ▅ | ▇ | ▃ | Provides comprehensive guidance for implementing end-to-end email encryption sec... | -| 3.0 | [draft-nandakumar-a2a-moqt-transport](https://datatracker.ietf.org/doc/draft-nandakumar-a2a-moqt-transport/) | 2025-10-20 | ▇ | ▃ | █ | ▃ | ▇ | Identical specification to draft-a2a-moqt-transport for transporting Agent-to-Ag... | -| 3.0 | [draft-zhang-agent-gap-network](https://datatracker.ietf.org/doc/draft-zhang-agent-gap-network/) | 2026-01-09 | ▅ | ▃ | ▃ | ▃ | ▇ | This draft identifies problems and gaps in mobile core networks for supporting A... | -| 3.0 | [draft-cui-ai-agent-task](https://datatracker.ietf.org/doc/draft-cui-ai-agent-task/) | 2026-01-09 | ▅ | ▃ | ▃ | ▃ | ▇ | This draft proposes requirements for standardized AI agent protocols to enable t... | -| 3.0 | [draft-hong-nmrg-agenticai-ps](https://datatracker.ietf.org/doc/draft-hong-nmrg-agenticai-ps/) | 2025-10-20 | ▅ | ▃ | ▇ | ▅ | ▇ | Presents problem statement and motivations for applying Agentic AI to network ma... | -| 3.0 | [draft-zhao-nmrg-ai-agent-for-dtn](https://datatracker.ietf.org/doc/draft-zhao-nmrg-ai-agent-for-dtn/) | 2025-10-20 | ▇ | ▃ | ▅ | ▃ | ▅ | Proposes AI agent architecture for Digital Twin Networks, integrating autonomous... | -| 3.0 | [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) | 2026-01-25 | ▅ | ▃ | ▇ | ▅ | ▇ | Proposes a multi-agent communication framework for network AIOps with AI gateway... | -| 3.0 | [draft-cui-dmsc-agent-cdi](https://datatracker.ietf.org/doc/draft-cui-dmsc-agent-cdi/) | 2026-02-11 | ▅ | ▃ | ▇ | ▅ | ▇ | Defines comprehensive framework for cross-domain AI agent interoperability inclu... | -| 3.0 | [draft-leon-distributed-multi-signer](https://datatracker.ietf.org/doc/draft-leon-distributed-multi-signer/) | 2025-08-11 | ▅ | ▇ | ▅ | ▅ | ▃ | Defines distributed DNSSEC multi-signer architecture with multi-signer agents an... | -| 3.0 | [draft-ietf-httpbis-rfc6265bis](https://datatracker.ietf.org/doc/draft-ietf-httpbis-rfc6265bis/) | 2025-12-09 | ▃ | █ | █ | █ | ▃ | Updates HTTP Cookie specification to replace RFC 6265 with improved security and... | -| 3.0 | [draft-yang-dmsc-ioa-task-protocol](https://datatracker.ietf.org/doc/draft-yang-dmsc-ioa-task-protocol/) | 2026-01-29 | ▅ | ▃ | ▇ | ▅ | ▇ | Defines a protocol for distributed collaboration among heterogeneous AI agents, ... | -| 3.0 | [draft-condrey-rats-witnessd-enrollment](https://datatracker.ietf.org/doc/draft-condrey-rats-witnessd-enrollment/) | 2026-02-07 | ▇ | ▃ | ▅ | ▃ | ▅ | Specifies trust anchor bootstrap protocol for proof of process framework. Define... | -| 3.0 | [draft-pocero-authkem-ikr-edhoc](https://datatracker.ietf.org/doc/draft-pocero-authkem-ikr-edhoc/) | 2026-01-20 | ▅ | ▃ | ▇ | ▅ | ▇ | This draft proposes a KEM-based authentication variant for EDHOC that optimizes ... | -| 2.9 | [draft-happel-structured-email-trust](https://datatracker.ietf.org/doc/draft-happel-structured-email-trust/) | 2025-08-30 | ▅ | ▅ | ▃ | ▃ | ▅ | Provides trust and security recommendations for handling structured data in emai... | -| 2.9 | [draft-ramakrishna-satp-data-sharing](https://datatracker.ietf.org/doc/draft-ramakrishna-satp-data-sharing/) | 2025-09-15 | ▅ | ▅ | ▃ | ▃ | ▅ | Defines a DLT-neutral protocol for sharing asset views and metadata across block... | -| 2.9 | [draft-bastian-jose-pkdh](https://datatracker.ietf.org/doc/draft-bastian-jose-pkdh/) | 2025-11-04 | ▅ | ▅ | ▃ | ▃ | ▅ | Defines a method to derive symmetric MAC keys from public information in JSON We... | -| 2.9 | [draft-ietf-roll-enrollment-priority](https://datatracker.ietf.org/doc/draft-ietf-roll-enrollment-priority/) | 2026-02-20 | ▃ | ▇ | ▅ | ▅ | ▅ | Provides mechanism for RPL Root to control enrollment announcements and adjust e... | -| 2.9 | [draft-zhang-rtgwg-ai-agents-troubleshooting](https://datatracker.ietf.org/doc/draft-zhang-rtgwg-ai-agents-troubleshooting/) | 2025-11-03 | ▅ | ▃ | ▅ | ▃ | ▇ | This draft defines use cases and communication protocol requirements for trouble... | -| 2.9 | [draft-yl-agent-id-requirements](https://datatracker.ietf.org/doc/draft-yl-agent-id-requirements/) | 2026-01-03 | ▅ | ▃ | ▅ | ▃ | ▇ | This draft proposes requirements for digital identity management in AI agent com... | -| 2.9 | [draft-wang-nmrg-magent-im](https://datatracker.ietf.org/doc/draft-wang-nmrg-magent-im/) | 2026-01-09 | ▅ | ▃ | ▅ | ▃ | ▇ | This draft proposes a protocol-agnostic data model for multi-agent communication... | -| 2.9 | [draft-xie-ai-agent-multimodal](https://datatracker.ietf.org/doc/draft-xie-ai-agent-multimodal/) | 2026-01-09 | ▅ | ▃ | ▅ | ▃ | ▇ | This draft outlines requirements for multimodal communication in AI agent protoc... | +| 3.2 | [draft-zhao-detnet-enhanced-use-cases](https://datatracker.ietf.org/doc/draft-zhao-detnet-enhanced-use-cases/) | 2026-02-24 | ▅ | ▅ | ▃ | ▇ | ▅ | Describes enhanced use cases for scaling deterministic networks beyond RFC8578, ... | *N=Novelty, M=Maturity, O=Overlap, Mom=Momentum, R=Relevance (block height = score 1-5)* \ No newline at end of file diff --git a/data/reports/refs.md b/data/reports/refs.md new file mode 100644 index 0000000..7e50159 --- /dev/null +++ b/data/reports/refs.md @@ -0,0 +1,136 @@ +# Cross-Reference Report: Standards Foundation of the AI Agent Ecosystem +*Generated 2026-03-03 19:59 UTC — 360 of 361 drafts analyzed, 4231 total references (2443 RFC, 698 draft, 1090 BCP)* + +## Most-Referenced RFCs + +These are the standards building blocks of the IETF AI/agent ecosystem. + +| # | RFC | Name | Referenced By | +|--:|-----|------|-------------:| +| 1 | RFC 2119 | Key words (MUST/SHALL/MAY) | 285 drafts | +| 2 | RFC 8174 | Key words update | 237 drafts | +| 3 | RFC 8446 | TLS 1.3 | 42 drafts | +| 4 | RFC 6749 | OAuth 2.0 | 36 drafts | +| 5 | RFC 9110 | HTTP Semantics | 34 drafts | +| 6 | RFC 8126 | | 26 drafts | +| 7 | RFC 8259 | JSON | 26 drafts | +| 8 | RFC 5280 | | 22 drafts | +| 9 | RFC 7519 | JWT | 22 drafts | +| 10 | RFC 9052 | COSE | 20 drafts | +| 11 | RFC 8949 | | 19 drafts | +| 12 | RFC 9528 | | 19 drafts | +| 13 | RFC 8392 | CWT | 18 drafts | +| 14 | RFC 7515 | JWS | 16 drafts | +| 15 | RFC 9000 | | 16 drafts | +| 16 | RFC 4648 | | 14 drafts | +| 17 | RFC 5234 | | 14 drafts | +| 18 | RFC 9334 | | 14 drafts | +| 19 | RFC 3986 | URIs | 13 drafts | +| 20 | RFC 6241 | | 13 drafts | +| 21 | RFC 8610 | | 13 drafts | +| 22 | RFC 8615 | | 13 drafts | +| 23 | RFC 9053 | | 12 drafts | +| 24 | RFC 9309 | | 12 drafts | +| 25 | RFC 5869 | | 11 drafts | +| 26 | RFC 7252 | CoAP | 11 drafts | +| 27 | RFC 8613 | | 11 drafts | +| 28 | RFC 8693 | | 11 drafts | +| 29 | RFC 7950 | | 10 drafts | +| 30 | RFC 9360 | | 10 drafts | +| 31 | RFC 0791 | | 9 drafts | +| 32 | RFC 1035 | | 9 drafts | +| 33 | RFC 3339 | | 9 drafts | +| 34 | RFC 6750 | OAuth Bearer | 9 drafts | +| 35 | RFC 6838 | | 9 drafts | +| 36 | RFC 7030 | | 9 drafts | +| 37 | RFC 7748 | | 9 drafts | +| 38 | RFC 8415 | | 9 drafts | +| 39 | RFC 8785 | | 9 drafts | +| 40 | RFC 9449 | DPoP | 9 drafts | + +### Foundation Categories + +Grouping the most-referenced RFCs by function: + +- **Language/Conventions** (522 total refs): RFC 2119, RFC 8174 +- **Data Formats** (39 total refs): RFC 8259, RFC 3986 +- **HTTP** (34 total refs): RFC 9110 +- **Security/TLS** (42 total refs): RFC 8446 +- **OAuth/Identity** (92 total refs): RFC 6749, RFC 6750, RFC 7519, RFC 7515, RFC 9449 +- **IoT/Constrained** (49 total refs): RFC 9052, RFC 8392, RFC 7252 + +## Most-Referenced Drafts + +These drafts are the most-cited within the AI/agent corpus itself. + +| # | Draft | Referenced By | +|--:|-------|-------------:| +| 1 | draft-ietf | 44 drafts | +| 2 | draft-rosenberg-ai-protocols | 14 drafts | +| 3 | draft-ietf-cose | 8 drafts | +| 4 | draft-ietf-moq-transport | 7 drafts | +| 5 | draft-ietf-oauth | 7 drafts | +| 6 | draft-ietf-pquip | 7 drafts | +| 7 | draft-ietf-tls | 7 drafts | +| 8 | draft-ietf-core | 6 drafts | +| 9 | draft-ietf-tls-hybrid-design | 5 drafts | +| 10 | draft-irtf-nmrg-ai-challenges | 5 drafts | +| 11 | draft-ietf-ace | 4 drafts | +| 12 | draft-ietf-aipref | 4 drafts | +| 13 | draft-ietf-lake | 4 drafts | +| 14 | draft-ietf-lake-authz | 4 drafts | +| 15 | draft-ietf-lamps-kyber-certificates | 4 drafts | +| 16 | draft-ietf-moq | 4 drafts | +| 17 | draft-ietf-pquip-pqt-hybrid-terminology | 4 drafts | +| 18 | draft-irtf | 4 drafts | +| 19 | draft-irtf-nmrg | 4 drafts | +| 20 | draft-irtf-nmrg-network-digital | 4 drafts | + +## Drafts With Most References (most well-connected) + +| # | Draft | RFCs | Drafts | BCPs | Total | +|--:|-------|-----:|-------:|-----:|------:| +| 1 | draft-templin-intarea-aero2 | 68 | 10 | 5 | 83 | +| 2 | draft-templin-6man-aero3 | 68 | 9 | 5 | 82 | +| 3 | draft-templin-intarea-aero | 59 | 10 | 4 | 73 | +| 4 | draft-ietf-anima-constrained-voucher | 44 | 14 | 4 | 62 | +| 5 | draft-ietf-anima-brski-prm | 40 | 13 | 5 | 58 | +| 6 | draft-ietf-ace-edhoc-oscore-profile | 33 | 14 | 5 | 52 | +| 7 | draft-eggert-mailmaint-uaautoconf | 41 | 2 | 5 | 48 | +| 8 | draft-ietf-mailmaint-pacc | 39 | 2 | 5 | 46 | +| 9 | draft-mozleywilliams-dnsop-bandaid | 37 | 4 | 4 | 45 | +| 10 | draft-ietf-lamps-e2e-mail-guidance | 26 | 11 | 4 | 41 | +| 11 | draft-ietf-lake-app-profiles | 24 | 6 | 6 | 36 | +| 12 | draft-ietf-ace-coap-est-oscore | 24 | 4 | 3 | 31 | +| 13 | draft-sipos-dtn-bp-safe | 20 | 5 | 6 | 31 | +| 14 | draft-ietf-tls-deprecate-obsolete-kex | 25 | 1 | 4 | 30 | +| 15 | draft-lenders-core-dnr | 18 | 9 | 3 | 30 | +| 16 | draft-cosmos-protocol-specification | 9 | 17 | 3 | 29 | +| 17 | draft-ietf-emu-eap-edhoc | 20 | 5 | 3 | 28 | +| 18 | draft-ietf-sshm-mlkem-hybrid-kex | 12 | 12 | 4 | 28 | +| 19 | draft-ietf-lake-authz | 19 | 4 | 4 | 27 | +| 20 | draft-templin-6man-mla | 16 | 7 | 3 | 26 | + +## Category-Specific RFC Dependencies + +What each category builds on: + +- **A2A protocols**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 8446 (TLS 1.3) +- **AI safety / guardrails / alignment**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 6749 (OAuth 2.0), RFC 8174 (Key words update) +- **AI safety/alignment**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 7519 (JWT) +- **Agent discovery / registration**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 6749 (OAuth 2.0) +- **Agent discovery/reg**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 8446 (TLS 1.3) +- **Agent identity/auth**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 8446 (TLS 1.3) +- **Agent-to-agent communication protocols**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 6749 (OAuth 2.0) +- **Autonomous netops**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 6241 +- **Autonomous network operations**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 8986 +- **Data formats / semantics for AI interop**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 3986 (URIs) +- **Data formats/interop**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 8446 (TLS 1.3) +- **Human-agent interaction**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 9110 (HTTP Semantics) +- **Identity / authentication for AI agents**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 6749 (OAuth 2.0) +- **ML traffic mgmt**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 9110 (HTTP Semantics) +- **ML-based traffic management / optimization**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update) +- **Model serving/inference**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 8345 +- **Other AI/agent**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 8446 (TLS 1.3) +- **Policy / governance / ethical frameworks**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 6749 (OAuth 2.0), RFC 8174 (Key words update) +- **Policy/governance**: RFC 2119 (Key words (MUST/SHALL/MAY)), RFC 8174 (Key words update), RFC 6749 (OAuth 2.0) \ No newline at end of file diff --git a/data/reports/revisions.md b/data/reports/revisions.md new file mode 100644 index 0000000..0735554 --- /dev/null +++ b/data/reports/revisions.md @@ -0,0 +1,149 @@ +# Draft Revision Velocity Report +*Generated 2026-03-03 20:12 UTC — 361 drafts analyzed* + +## Overview + +- **Average revision**: 2.21 +- **At -00** (first draft only): **198** (54.8%) +- **Iterated** (rev >= 01): **163** (45.2%) +- **Highly iterated** (rev >= 05): **40** + +## Revision Distribution + +| Revision | Count | % | +|:---------|------:|--:| +| -00 | 198 | 54.8% | +| -01 | 72 | 19.9% | +| -02 | 27 | 7.5% | +| -03 | 11 | 3.0% | +| -04 | 13 | 3.6% | +| -05 | 7 | 1.9% | +| -06 | 7 | 1.9% | +| -07 | 5 | 1.4% | +| -08 | 1 | 0.3% | +| -09 | 4 | 1.1% | +| -10 | 2 | 0.6% | +| -11 | 1 | 0.3% | +| -13 | 1 | 0.3% | +| -15 | 1 | 0.3% | +| -16 | 1 | 0.3% | +| -17 | 1 | 0.3% | +| -22 | 1 | 0.3% | +| -23 | 2 | 0.6% | +| -26 | 1 | 0.3% | +| -30 | 1 | 0.3% | +| -32 | 1 | 0.3% | +| -57 | 1 | 0.3% | +| -60 | 1 | 0.3% | +| -67 | 1 | 0.3% | + +## Revision Velocity by Organization (>= 3 drafts) + +| # | Organization | Drafts | Avg Rev | At -00 | %-00 | Iterated | Max | +|--:|:-------------|-------:|--------:|-------:|-----:|---------:|----:| +| 1 | Huawei | 67 | 1.04 | 38 | 57% | 29 | 15 | +| 2 | China Mobile | 35 | 0.97 | 17 | 49% | 18 | 5 | +| 3 | Cisco | 25 | 5.52 | 13 | 52% | 12 | 57 | +| 4 | China Telecom | 24 | 0.96 | 15 | 62% | 9 | 6 | +| 5 | China Unicom | 22 | 0.86 | 12 | 55% | 10 | 3 | +| 6 | Independent | 18 | 0.56 | 12 | 67% | 6 | 3 | +| 7 | Tsinghua University | 16 | 0.44 | 10 | 62% | 6 | 2 | +| 8 | Telefonica | 13 | 1.77 | 6 | 46% | 7 | 6 | +| 9 | ZTE Corporation | 12 | 1.67 | 4 | 33% | 8 | 5 | +| 10 | Google | 11 | 3.55 | 5 | 45% | 6 | 22 | +| 11 | Pengcheng Laboratory | 10 | 0.10 | 9 | 90% | 1 | 1 | +| 12 | Five9 | 10 | 0.10 | 9 | 90% | 1 | 1 | +| 13 | Ericsson | 9 | 4.78 | 1 | 11% | 8 | 9 | +| 14 | BUPT | 7 | 1.14 | 3 | 43% | 4 | 3 | +| 15 | Amazon | 7 | 7.00 | 2 | 29% | 5 | 30 | +| 16 | Futurewei | 7 | 2.71 | 3 | 43% | 4 | 13 | +| 17 | Sandelman Software Works | 7 | 14.29 | 1 | 14% | 6 | 30 | +| 18 | Zhongguancun Laboratory | 6 | 0.67 | 2 | 33% | 4 | 1 | +| 19 | CAICT | 6 | 1.67 | 3 | 50% | 3 | 5 | +| 20 | Inria | 6 | 4.33 | 1 | 17% | 5 | 9 | +| 21 | Tsinghua Shenzhen International Graduate School & Pengcheng Laboratory | 6 | 0.17 | 5 | 83% | 1 | 1 | +| 22 | Deutsche Telekom | 6 | 0.67 | 4 | 67% | 2 | 2 | +| 23 | Bitwave | 6 | 0.17 | 5 | 83% | 1 | 1 | +| 24 | Boeing | 6 | 28.17 | 0 | 0% | 6 | 67 | +| 25 | Nokia | 5 | 3.20 | 1 | 20% | 4 | 9 | +| 26 | InterDigital Europe | 5 | 0.80 | 3 | 60% | 2 | 3 | +| 27 | InterDigital | 5 | 1.60 | 3 | 60% | 2 | 5 | +| 28 | RISE | 5 | 5.20 | 1 | 20% | 4 | 9 | +| 29 | Siemens | 5 | 17.20 | 0 | 0% | 5 | 26 | +| 30 | Department of Computer Science & Engineering | 4 | 1.50 | 1 | 25% | 3 | 4 | +| 31 | Universidad Carlos III de Madrid | 4 | 0.25 | 3 | 75% | 1 | 1 | +| 32 | Apple | 4 | 7.25 | 0 | 0% | 4 | 22 | +| 33 | Daejeon University | 4 | 3.25 | 0 | 0% | 4 | 7 | +| 34 | Mozilla | 4 | 2.25 | 2 | 50% | 2 | 5 | +| 35 | ISI, R.C. ATHENA | 4 | 0.75 | 1 | 25% | 3 | 1 | +| 36 | Aiiva.org | 3 | 0.00 | 3 | 100% | 0 | 0 | +| 37 | DONG-EUI University | 3 | 3.33 | 0 | 0% | 3 | 7 | +| 38 | DistributedApps.ai | 3 | 0.00 | 3 | 100% | 0 | 0 | +| 39 | lispers.net | 3 | 25.67 | 0 | 0% | 3 | 57 | +| 40 | Cloudflare | 3 | 1.67 | 1 | 33% | 2 | 4 | +| 41 | Infoblox, Inc. | 3 | 0.00 | 3 | 100% | 0 | 0 | +| 42 | IBM | 3 | 3.33 | 1 | 33% | 2 | 6 | +| 43 | CNIC, CAS | 3 | 0.00 | 3 | 100% | 0 | 0 | +| 44 | Huazhong University of Science and Technology | 3 | 1.67 | 1 | 33% | 2 | 4 | + +## Fire-and-Forget Organizations (>= 70% at -00, >= 5 drafts) + +Organizations that submit many drafts but rarely iterate: + +- **Pengcheng Laboratory**: 9/10 at -00 (90%), avg rev 0.10 +- **Five9**: 9/10 at -00 (90%), avg rev 0.10 +- **Tsinghua Shenzhen International Graduate School & Pengcheng Laboratory**: 5/6 at -00 (83%), avg rev 0.17 +- **Bitwave**: 5/6 at -00 (83%), avg rev 0.17 + +## Active Iterators (avg revision >= 3.0) + +Organizations that actively revise and improve their drafts: + +- **Boeing**: avg rev 28.2, max -67, 6 drafts +- **lispers.net**: avg rev 25.7, max -57, 3 drafts +- **Siemens**: avg rev 17.2, max -26, 5 drafts +- **Sandelman Software Works**: avg rev 14.3, max -30, 7 drafts +- **Apple**: avg rev 7.2, max -22, 4 drafts +- **Amazon**: avg rev 7.0, max -30, 7 drafts +- **Cisco**: avg rev 5.5, max -57, 25 drafts +- **RISE**: avg rev 5.2, max -09, 5 drafts +- **Ericsson**: avg rev 4.8, max -09, 9 drafts +- **Inria**: avg rev 4.3, max -09, 6 drafts +- **Google**: avg rev 3.5, max -22, 11 drafts +- **DONG-EUI University**: avg rev 3.3, max -07, 3 drafts +- **IBM**: avg rev 3.3, max -06, 3 drafts +- **Daejeon University**: avg rev 3.2, max -07, 4 drafts +- **Nokia**: avg rev 3.2, max -09, 5 drafts + +## Most-Revised Drafts (Top 20) + +| # | Rev | Name | Title | +|--:|----:|:-----|:------| +| 1 | -67 | draft-templin-intarea-aero | Automatic Extended Route Optimization (AERO) | +| 2 | -60 | draft-templin-6man-aero3 | Automatic Extended Route Optimization (AERO) | +| 3 | -57 | draft-ietf-lisp-nexagon | Geo-Intelligence Network Based On H3 and LISP | +| 4 | -32 | draft-templin-6man-mla | IPv6 Addresses for Ad Hoc Networks | +| 5 | -30 | draft-ietf-anima-constrained-voucher | Constrained Bootstrapping Remote Secure Key Infras | +| 6 | -26 | draft-ietf-suit-firmware-encryption | Encrypted Payloads in SUIT Manifests | +| 7 | -23 | draft-ietf-anima-brski-prm | BRSKI with Pledge in Responder Mode (BRSKI-PRM) | +| 8 | -23 | draft-ietf-lamps-rfc7030-csrattrs | Clarification and enhancement of RFC7030 CSR Attri | +| 9 | -22 | draft-ietf-httpbis-rfc6265bis | Cookies: HTTP State Management Mechanism | +| 10 | -17 | draft-ietf-lamps-e2e-mail-guidance | Guidance on End-to-End E-mail Security | +| 11 | -16 | draft-ietf-sshm-ssh-agent | SSH Agent Protocol | +| 12 | -15 | draft-ietf-roll-enrollment-priority | Controlling Secure Network Enrollment in RPL netwo | +| 13 | -13 | draft-ietf-pim-zeroconf-mcast-addr-alloc-ps | Zeroconf Multicast Address Allocation Problem Stat | +| 14 | -11 | draft-ietf-lamps-rfc5274bis | Certificate Management Messages over CMS (CMC): Co | +| 15 | -10 | draft-bradleylundberg-cfrg-arkg | The Asynchronous Remote Key Generation (ARKG) algo | +| 16 | -10 | draft-ietf-sshm-mlkem-hybrid-kex | PQ/T Hybrid Key Exchange with ML-KEM in SSH | +| 17 | -09 | draft-ietf-ace-coap-est-oscore | Protecting EST Payloads with OSCORE | +| 18 | -09 | draft-ietf-lamps-private-key-stmt-attr | An Attribute for Statement of Possession of a Priv | +| 19 | -09 | draft-ietf-ace-edhoc-oscore-profile | Ephemeral Diffie-Hellman Over COSE (EDHOC) and Obj | +| 20 | -09 | draft-ietf-tls-extended-key-update | Extended Key Update for Transport Layer Security ( | + +## Score Comparison: Iterated vs First-Draft + +| Metric | Iterated (rev > 00) | First-Draft (rev 00) | +|--------|--------------------:|---------------------:| +| Count | 163 | 198 | +| Average Score | 3.31 | 3.36 | +| Max Score | 4.65 | 4.85 | \ No newline at end of file diff --git a/data/reports/sprint-plan.md b/data/reports/sprint-plan.md new file mode 100644 index 0000000..3b0b25f --- /dev/null +++ b/data/reports/sprint-plan.md @@ -0,0 +1,408 @@ +# Sprint Plan: Next 3 Sprints + +*Created: 2026-03-03 | Status: Ready for execution* + +**Decisions made:** +- **Publication platform**: GitHub Pages (Markdown-native, pairs with open-source release) +- **Publication cadence**: Staggered, 1 post per day (Post 1 + series overview on day 1) +- **License**: MIT + +--- + +## Current State (Sprint 0 — Where We Are) + +| Asset | Status | Details | +|-------|--------|---------| +| Blog series (8 posts + overview) | Final polish | ~22K words across 10 files. Writer doing final editorial pass. All numbers updated to 361-draft dataset. | +| CLI tool | Working | 24+ commands, 6,882 lines Python, 13 source files. 7 new features built this session (refs, trends, idea-overlap, status, revisions, centrality, co-occurrence). | +| Database | Fully processed | 361 drafts, 557 authors, 230 orgs, 1,780 ideas (628 cross-org convergent), 12 gaps. Pipeline complete on all drafts. | +| Reports | Fresh | All 15 report types regenerated from full dataset. 7 data packages in `data/reports/blog-series/data/`. | +| arXiv paper | Draft v1 | 13 pages at `paper/main.tex`, based on 260-draft dataset — needs update to 361+ with new analyses. | +| Packaging | Minimal | pyproject.toml exists (version 0.1.0). No tests, no CI, no LICENSE, no CONTRIBUTING.md. | +| README | Outdated | References 260 drafts, version 0.1.0, missing new commands and features. | +| Open source readiness | Not ready | No tests, no CI, no contribution guide, stale README. Tool works but isn't packaged for others. | + +--- + +## Sprint 1: Publish the Blog Series + Begin Outreach (Highest Value, Time-Sensitive) + +**Theme**: Get the analysis in front of people while the landscape is still moving fast. IETF 122 is upcoming and the data changes monthly — publishing now maximizes relevance. The pipeline is complete, the blog series is in final editorial polish — this sprint is about getting it live and in front of the right people. + +**Duration**: 3-5 days + +**NOTE**: Tasks 1.1-1.3 from the original plan are ALREADY DONE: +- Pipeline ran on all 361 drafts (557 authors, 1,780 ideas, 628 cross-org convergent, 12 gaps) +- All 15 reports regenerated +- All 8 blog posts updated with expanded-dataset numbers and verified for consistency +- Two deep analysis rounds completed (revision velocity, safety ratio trends, RFC divergence, co-occurrence, IETF meeting timing) +- Seven new CLI features implemented (refs, trends, idea-overlap, status, revisions, centrality, co-occurrence) + +### Task 1.1: Complete Final Editorial Polish +**Agent**: Writer +**Effort**: S +**What**: Finish the ongoing editorial pass. The Writer is currently on this task. Once complete, the series is publication-ready. +**Acceptance criteria**: All 8 posts finalized. Writer confirms no further changes needed. Series overview (Post 00) is consistent with all posts. +**Dependencies**: None (in progress now) + +### Task 1.2: Choose a Publication Platform and Publish +**Agent**: Writer + Architect +**Effort**: M +**What**: Decide where to publish the blog series and get posts live. Options (in order of recommendation): +1. **GitHub Pages** (fastest, free, Markdown-native) — create a simple static site with Jekyll/Hugo from the blog-series directory. Can publish straight from the repo. +2. **Substack / Medium / dev.to** — wider audience, built-in discovery, but requires manual formatting and copy-paste from Markdown. +3. **Personal blog** — if the author already has one, lowest friction. + +Key decisions: +- Publish all 8 at once (series dump) or staggered (1 per day / every 2 days)? + - **Recommendation**: Publish Post 1 + Post 00 (series overview) on day 1, then one post per day. This builds anticipation and makes each post shareable individually. +- Interlink: each post should link to the previous and next post in the series. +- If GitHub Pages: set up a minimal Jekyll/Hugo site with posts from `data/reports/blog-series/`. + +**Acceptance criteria**: Post 1 is live and publicly accessible. Publication schedule for posts 2-8 is set. +**Dependencies**: Task 1.1 + +### Task 1.3: Social Media and IETF Community Outreach +**Agent**: Architect (drafts messaging) + Writer (final copy) +**Effort**: M +**What**: Write announcement copy and identify channels: +- **Short-form posts** (Twitter/X, LinkedIn, Mastodon, Bluesky): 3-4 variations highlighting different angles: + - The growth stat + safety deficit angle ("IETF AI agent drafts went from 0.5% to 9.3% of all submissions in 15 months — with a 4:1 capability-to-safety ratio") + - The geopolitics angle ("One company writes 18% of all AI agent standards drafts") + - The fragmentation angle ("120 A2A protocols, 14 competing OAuth proposals, zero interop layer") + - The methodology angle ("We analyzed 361 IETF drafts with Claude for ~$9 and found the standards world is building highways before traffic lights") +- **IETF mailing lists**: Post to relevant lists (art@ietf.org, agents@ietf.org if it exists, or general discussion) with a brief summary and link to Post 1 +- **Hacker News / Reddit /r/networking /r/machinelearning**: Submit Post 1 or Post 4 (gaps — the most newsworthy finding) +- **Direct outreach**: Identify 5-10 people who would care most (IETF area directors, authors of top-ranked drafts like DAAP and VOLT, AI standards researchers, MCP/A2A protocol teams) and share directly +**Acceptance criteria**: Announcement text ready for 3+ platforms. List of 5-10 direct outreach targets with contact method. Post submitted to at least one community (HN or IETF list). +**Dependencies**: Task 1.2 + +### Task 1.4: Fetch Latest Drafts (IETF 122 Prep) +**Agent**: Analyst +**Effort**: S +**What**: Run `ietf fetch` to pick up any new drafts submitted since the last fetch (2026-03-03). IETF meetings drive submission spikes — capture anything new before the paper update. Process any new drafts through the full pipeline (analyze, authors, ideas, embed, gaps). +**Acceptance criteria**: Any new drafts since 2026-03-03 are fetched, stored, and fully processed. Count reported. +**Dependencies**: None (can run in parallel with publishing tasks) + +### Task 1.5: Commit All Current Work +**Agent**: Coder +**Effort**: S +**What**: The git status shows extensive uncommitted work: modified source files (cli.py, db.py, analyzer.py, reports.py, visualize.py, models.py, config.py), new files (CLAUDE.md, orgs.py, scripts/, blog series), new reports, agent definitions. Create a clean commit (or a few topical commits) capturing the current state: v0.3.0 with expanded dataset, 8-post blog series, 7 new features, agent team artifacts. +**Acceptance criteria**: All meaningful changes committed. Working tree clean. Version bumped to 0.3.0 in pyproject.toml and cli.py. +**Dependencies**: Task 1.1 (want final polished blog posts in the commit) + +### Sprint 1 Success Criteria +- [ ] Blog series editorial polish complete +- [ ] Blog Post 1 is live and publicly accessible +- [ ] Publication schedule set for remaining 7 posts +- [ ] Announcement posted to at least 2 channels +- [ ] Latest drafts fetched for IETF 122 coverage +- [ ] All current work committed to git (v0.3.0) + +--- + +## Sprint 2: Update the arXiv Paper + Deepen Analysis + +**Theme**: Turn the expanded dataset into a credible academic contribution. The paper at `paper/main.tex` is solid but frozen at 260 drafts — updating it to 361+ with the new analyses makes it publishable. + +**Duration**: 5-7 days + +### Task 2.1: Run Pipeline on Any Newly Fetched Drafts +**Agent**: Analyst +**Effort**: S-M +**What**: Process any new drafts picked up in Sprint 1 Task 1.4 (IETF 122 fetch). Run the full pipeline: analyze, authors, ideas, embed, gaps. Regenerate reports. +**Acceptance criteria**: All drafts in the database are fully analyzed. Reports refreshed. +**Dependencies**: Sprint 1 Task 1.4 + +### Task 2.2: Generate Updated Figures for the Paper +**Agent**: Analyst + Coder +**Effort**: M +**What**: The paper has placeholder figures ([TIMELINE], [QUALITY], [RADAR], [NETWORK]). Run `ietf viz all` to regenerate the HTML visualizations, then use `paper/export_figures.py` (or write one if it doesn't work) to export publication-quality PNG/PDF versions. + +Figures needed: +- Figure 1: Monthly submission timeline (stacked area by category) — with 361+ drafts +- Figure 2: Rating distributions by category (violin plots) — updated +- Figure 3: Similarity heatmap (now 361x361) — updated +- Figure 4: Quality vs. uniqueness scatter — updated +- Figure 5: Radar charts for top categories — updated +- Figure 6: Author collaboration network — updated with expanded dataset + +**Acceptance criteria**: All 6 figures exported as PDF/PNG in `paper/figures/`. Each figure reflects the full expanded dataset. +**Dependencies**: Task 2.1 + +### Task 2.3: Update Paper Text and Tables +**Agent**: Writer + Architect +**Effort**: L +**What**: Update `paper/main.tex` throughout: +- **Title**: Change "260" to the current count +- **Abstract**: Update all numbers (drafts, authors, ideas, similarity pairs, tokens) +- **Section 3 (Methodology)**: Add the 6 new keywords (mcp, agentic, inference, generative, intelligent, aipref). Update seed keyword list from 6 to 12. +- **Section 4 (Dataset Overview)**: Update Table 1 with new numbers. Time span now extends further. +- **Section 5 (Findings)**: All tables and stats need updating with 361+ draft data. Particularly: + - Table 2 (categories) — will likely have new entries from expanded keywords + - Table 4 (organizations) — author/org counts will change + - Table 5 (top-ranked drafts) — new top drafts may emerge + - All prose stats (percentages, counts, growth rates) +- **Section 6 (Discussion)**: Revisit conclusions — do they still hold with 40% more data? Any new insights? +- **Section 7 (Future Work)**: Several items are now done (citation network via refs, gap-driven standardization). Update. +- **Section 8 (Conclusion)**: Update closing numbers +- **Appendix A**: Full category list will likely expand +- **Repository URL**: Fill in the [TODO] with actual URL after open-source release (or leave as "available upon publication") +- **References**: Add citations for MCP, any new relevant work + +**Acceptance criteria**: Paper compiles cleanly with `make` (or `pdflatex`). All numbers match the current database. No [TODO] placeholders remain (except possibly author name/email if not yet decided). +**Dependencies**: Tasks 2.1, 2.2 + +### Task 2.4: Add New Analysis Sections to Paper +**Agent**: Architect + Analyst +**Effort**: M +**What**: The blog series uncovered findings that aren't in the paper. Consider adding: +- **Cross-organization convergence**: The idea-overlap analysis showing which technical ideas appear across multiple independent organizations (convergence signals vs. within-org duplication) +- **Team bloc analysis**: The 33 detected collaboration clusters and what they mean for coordination +- **RFC cross-reference graph**: Which foundational RFCs underpin the agent ecosystem (if `ietf refs` data is available) +- **Gap evolution**: Whether any of the 12 identified gaps are being filled by newer submissions + +Pick the 1-2 most compelling additions that strengthen the paper's contribution without bloating it past 15 pages. + +**Acceptance criteria**: 1-2 new subsections added. Paper is <= 16 pages. New sections have supporting data tables/figures. +**Dependencies**: Task 2.3 + +### Task 2.5: Submit to arXiv +**Agent**: Architect +**Effort**: S +**What**: Prepare the arXiv submission package: +- Compile the final PDF +- Ensure all figures are included +- Write the arXiv abstract (may differ slightly from paper abstract) +- Choose categories: cs.AI, cs.SE, or cs.CY (Computers and Society) — recommend cs.AI as primary, cs.SE as secondary +- Upload to arXiv +**Acceptance criteria**: Paper submitted to arXiv with no compilation errors. arXiv ID received. +**Dependencies**: Tasks 2.3, 2.4 + +### Task 2.6: Continue Blog Publication (Posts 2-8) +**Agent**: Writer +**Effort**: S (per post, ongoing) +**What**: Continue publishing the remaining blog posts on the schedule set in Sprint 1. For each post: format for the platform, add interlinks, publish, announce on social media. +**Acceptance criteria**: All 8 posts published by end of Sprint 2. Each post has at least one social media announcement. +**Dependencies**: Sprint 1 Task 1.4 + +### Sprint 2 Success Criteria +- [ ] arXiv paper updated with 361+ draft data and submitted +- [ ] All 8 blog posts published +- [ ] At least one new analysis (cross-org convergence or RFC cross-refs) added to paper +- [ ] Paper figures reflect the expanded dataset + +--- + +## Sprint 3: Open-Source Release + Tool Polish + +**Theme**: Make the tool usable by others. The analysis is interesting, but the *methodology* — combining LLM rating with embedding similarity at scale — is the reusable contribution. A clean open-source release turns a one-off project into a tool others can use to monitor IETF standardization activity. + +**Duration**: 7-10 days + +### Task 3.1: Add Tests +**Agent**: Coder +**Effort**: L +**What**: Currently zero tests. Add a test suite covering the critical paths: +- `tests/test_db.py` — Database operations (upsert, query, FTS search, embedding storage) +- `tests/test_config.py` — Config load/save, defaults, overrides +- `tests/test_models.py` — Dataclass creation, serialization +- `tests/test_fetcher.py` — Mock Datatracker API responses, parse draft metadata +- `tests/test_analyzer.py` — Mock Claude API, parse ratings/ideas from responses +- `tests/test_cli.py` — Click CLI integration tests (using CliRunner) +- `tests/test_reports.py` — Report generation produces valid markdown + +Use pytest. Mock all external APIs (Datatracker, Claude, Ollama). Include a small test fixture database with ~5 drafts. + +Add to pyproject.toml: +```toml +[project.optional-dependencies] +dev = ["pytest>=7.0", "pytest-cov", "responses>=0.25"] +``` + +**Acceptance criteria**: `pytest` passes with >= 70% coverage on db.py, config.py, models.py. All tests run without network access. +**Dependencies**: None + +### Task 3.2: Set Up CI/CD (GitHub Actions) +**Agent**: Coder +**Effort**: M +**What**: Create `.github/workflows/ci.yml`: +- Trigger on push to main and PRs +- Python 3.11+ matrix +- Install deps, run pytest +- Run linting (ruff or flake8) +- Optionally: build the package and check it installs cleanly + +**Acceptance criteria**: CI green on current main. PRs get automatic test runs. Badge in README. +**Dependencies**: Task 3.1 + +### Task 3.3: Clean Up Code for Public Release +**Agent**: Coder +**Effort**: M +**What**: Audit and fix: +- **Version**: Update from 0.1.0 to 0.3.0 (0.2.0 was the viz release, 0.3.0 is the expanded+blog release) in both `pyproject.toml` and `cli.py` +- **Config portability**: `config.py` uses `Path(__file__).resolve().parent.parent.parent / "data"` as default — this only works in dev mode. For installed packages, default to `~/.ietf-analyzer/` or use XDG conventions. Keep current behavior as fallback for dev. +- **Remove stale files**: `data/ietf_drafts.db` (empty/stale per MEMORY.md). Clean up any other debris. +- **Error handling at boundaries**: Ensure graceful failures when: + - Ollama is not running (`ietf embed` should say "Ollama not reachable" not crash) + - ANTHROPIC_API_KEY is not set (`ietf analyze` should say "Set ANTHROPIC_API_KEY" not crash) + - Network is unavailable (`ietf fetch` should handle timeouts) +- **Type hints**: Ensure public API functions have type hints (don't add to internal helpers) +- **.env support**: Already uses python-dotenv — verify it works from any working directory +- **Remove any debug prints or commented-out code** + +**Acceptance criteria**: Tool installs cleanly via `pip install .` in a fresh venv. Commands that need external services give clear error messages when those services are unavailable. +**Dependencies**: None + +### Task 3.4: Write Proper README and Docs +**Agent**: Writer + Coder +**Effort**: M +**What**: Rewrite `README.md` for an open-source audience: +- Project description with the hook (what it does, why it matters) +- Updated stats (361+ drafts, 557+ authors, 1,780+ ideas) +- Installation: pip install, API key setup, Ollama setup +- Quick start: the 6-command pipeline +- Full CLI reference (all 24 commands with options) +- Configuration: explain config.json, environment variables, defaults +- Architecture overview: how the modules fit together (fetcher -> db -> analyzer -> reports/viz) +- Screenshots/examples of output (report excerpts, viz screenshots) +- Contributing guide (CONTRIBUTING.md) +- Link to the blog series and arXiv paper +- License badge, CI badge + +**Acceptance criteria**: A newcomer can go from `git clone` to running their first analysis by following the README. No broken links. +**Dependencies**: Task 3.3 + +### Task 3.5: Add LICENSE +**Agent**: Coder +**Effort**: S +**What**: Choose and add a license. Recommendations: +- **MIT** — simplest, most permissive, standard for tools like this +- **Apache 2.0** — if patent protection matters + +Add to pyproject.toml: +```toml +license = {text = "MIT"} +``` + +**Acceptance criteria**: LICENSE file in repo root. License field in pyproject.toml. License header convention documented. +**Dependencies**: None + +### Task 3.6: Prepare PyPI Package +**Agent**: Coder +**Effort**: M +**What**: Make the package installable from PyPI: +- Update pyproject.toml with full metadata (author, URL, classifiers, keywords, long_description from README) +- Ensure `python -m build` produces a clean sdist and wheel +- Test install from the built wheel in a fresh venv +- Write publish script: `scripts/publish.sh` using twine +- Register the package name on PyPI (or Test PyPI first) + +```toml +[project] +name = "ietf-draft-analyzer" +version = "0.3.0" +description = "Track, categorize, and rate AI/agent-related IETF Internet-Drafts" +readme = "README.md" +license = {text = "MIT"} +keywords = ["ietf", "internet-draft", "ai-agents", "standards", "nlp"] +classifiers = [ + "Development Status :: 3 - Alpha", + "Environment :: Console", + "Intended Audience :: Science/Research", + "Topic :: Scientific/Engineering :: Artificial Intelligence", + "Programming Language :: Python :: 3.11", +] +``` + +**Acceptance criteria**: `pip install ietf-draft-analyzer` works from PyPI (or Test PyPI). The `ietf` command is available after install. +**Dependencies**: Tasks 3.3, 3.4, 3.5 + +### Task 3.7: Public Repository Setup +**Agent**: Coder + Architect +**Effort**: S +**What**: Prepare the GitHub repository for public visibility: +- Ensure `.gitignore` covers: `.env`, `__pycache__`, `*.egg-info`, `data/config.json`, `data/drafts.db` (the actual user data shouldn't be in the repo — but the schema should be recreatable) +- Add `CONTRIBUTING.md` with: how to set up dev environment, how to run tests, code style, PR process +- Add issue templates (bug report, feature request) +- Update paper [TODO] repository URL +- Decide: include `data/drafts.db` in repo (useful for reproducibility) or .gitignore it (cleaner)? + - **Recommendation**: Include a snapshot as a GitHub Release asset, not in the git tree. Add a `scripts/download-data.sh` that fetches it. +- Set repo topics: ietf, internet-drafts, ai-agents, standardization, nlp, cli + +**Acceptance criteria**: Repo is ready to be made public. No secrets or personal data in git history. README renders correctly on GitHub. +**Dependencies**: Tasks 3.4, 3.5, 3.6 + +### Sprint 3 Success Criteria +- [ ] Test suite with >= 70% coverage on core modules +- [ ] CI/CD running on GitHub Actions +- [ ] Tool installable via `pip install ietf-draft-analyzer` +- [ ] README guides a newcomer from clone to first analysis +- [ ] LICENSE file present (MIT) +- [ ] Repository is public-ready (no secrets, clean history, proper .gitignore) + +--- + +## Cross-Sprint Dependencies + +``` +Sprint 1 Sprint 2 Sprint 3 +──────── ──────── ──────── +1.1 Final polish ────────> 1.2 Publish +1.2 Publish ─────────────> 2.6 Continue publishing +1.4 Fetch latest ────────> 2.1 Process new drafts +1.5 Commit v0.3.0 ──────> 3.3 Code cleanup + 2.1 Process new ──────────> 2.2 Figures + 2.2 Figures ───────────────> 2.3 Paper text + 2.3 Paper ─────────────────> 2.4 New sections + 2.4 New sections ──────────> 2.5 Submit arXiv + 2.5 Submit arXiv ──────────> 3.7 Add arXiv URL to README + 2.2 Figures ───────────────> 3.4 Screenshots in README + 3.1 Tests ──────> 3.2 CI/CD + 3.3 Cleanup ────> 3.6 PyPI + 3.5 License ────> 3.6 PyPI +``` + +## Parallelization Plan + +### Sprint 1 (3-5 days) +- **Day 1**: Writer finishes editorial polish (1.1). Analyst fetches latest drafts (1.4, parallel). Coder prepares commit (1.5, parallel). +- **Day 2**: Architect + Writer choose publication platform and set up (1.2). Architect drafts social media copy (1.3, start). +- **Day 3-4**: Publish Post 1 (1.2). Finalize social media copy (1.3). Begin announcing. +- **Day 5**: First post live, schedule confirmed, announcements out. + +### Sprint 2 (5-7 days) +- **Day 1-2**: Analyst processes new drafts (2.1) + generates figures (2.2). Writer publishes posts 2-4 (2.6). +- **Day 3-5**: Writer + Architect update paper text (2.3). Architect + Analyst add new sections (2.4). Writer publishes posts 5-7 (2.6). +- **Day 6-7**: Architect prepares arXiv submission (2.5). Writer publishes post 8 (2.6). + +### Sprint 3 (7-10 days) +- **Day 1-3**: Coder writes tests (3.1) and cleans code (3.3) in parallel. Coder adds LICENSE (3.5). +- **Day 4-5**: Coder sets up CI (3.2). Writer + Coder write README/docs (3.4). +- **Day 6-8**: Coder prepares PyPI package (3.6). Coder + Architect prepare public repo (3.7). +- **Day 9-10**: Final testing, publish to PyPI, make repo public. + +--- + +## Risk Register + +| Risk | Impact | Mitigation | +|------|--------|------------| +| Blog stats shift significantly with 101 new drafts | M — requires rewriting parts of posts | Run pipeline first (1.1), check before publishing | +| Ollama not available for embeddings | M — blocks pipeline | Can proceed without embeddings; analyze + ideas work independently | +| arXiv paper exceeds page limit after updates | L — need to trim | Set hard limit at 16 pages; prioritize 1-2 new sections max | +| PyPI name `ietf-draft-analyzer` taken | L — just rename | Check name availability early in Sprint 3 | +| IETF 122 generates a burst of new drafts mid-sprint | L — good problem to have | Fetch and process incrementally; blog posts note the snapshot date | + +--- + +## What Value Comes When + +| Milestone | Sprint | Impact | +|-----------|--------|--------| +| Blog Post 1 live | Sprint 1 | First public visibility; test the messaging | +| Full blog series published | Sprint 2 | Complete narrative in front of the community | +| arXiv paper submitted | Sprint 2 | Academic credibility; citeable artifact | +| Open-source tool on PyPI | Sprint 3 | Others can reproduce and extend the analysis | +| Public GitHub repo | Sprint 3 | Community contributions; methodology visible | + +The highest-value action is publishing the blog series NOW (Sprint 1). The landscape is moving — every week of delay makes the analysis slightly less current. The paper and open-source release build credibility and longevity but can follow. diff --git a/data/reports/status.md b/data/reports/status.md new file mode 100644 index 0000000..f84772a --- /dev/null +++ b/data/reports/status.md @@ -0,0 +1,126 @@ +# WG Adoption Status Report +*Generated 2026-03-03 20:09 UTC — 361 drafts analyzed* + +## Overview + +- **WG-adopted** (draft-ietf-*): **36** (10.0%) +- **IRTF** (draft-irtf-*): **2** +- **Individual**: **325** (90.0%) + +## Working Groups with AI/Agent Drafts + +| # | WG | Drafts | Draft Names | +|--:|:---|-------:|-------------| +| 1 | lamps | 6 | draft-ietf-lamps-e2e-mail-guidance, draft-ietf-lamps-rfc5274bis, draft-ietf-lamps-private-key-stmt-attr, draft-ietf-lamps-attestation-freshness, draft-ietf-lamps-rfc7030-csrattrs, draft-ietf-lamps-est-renewal-info | +| 2 | lake | 5 | draft-ietf-lake-edhoc-impl-cons, draft-ietf-lake-authz, draft-ietf-lake-edhoc-psk, draft-ietf-lake-app-profiles, draft-ietf-lake-ra | +| 3 | tls | 3 | draft-ietf-tls-ecdhe-mlkem, draft-ietf-tls-deprecate-obsolete-kex, draft-ietf-tls-extended-key-update | +| 4 | emu | 3 | draft-ietf-emu-eap-edhoc, draft-ietf-emu-pqc-eapaka, draft-ietf-emu-hybrid-pqc-eapaka | +| 5 | sshm | 2 | draft-ietf-sshm-ssh-agent, draft-ietf-sshm-mlkem-hybrid-kex | +| 6 | anima | 2 | draft-ietf-anima-brski-prm, draft-ietf-anima-constrained-voucher | +| 7 | httpbis | 2 | draft-ietf-httpbis-rfc6265bis, draft-ietf-httpbis-layered-cookies | +| 8 | ace | 2 | draft-ietf-ace-coap-est-oscore, draft-ietf-ace-edhoc-oscore-profile | +| 9 | aipref | 2 | draft-ietf-aipref-vocab, draft-ietf-aipref-attach | +| 10 | lisp | 1 | draft-ietf-lisp-nexagon | +| 11 | dnsop | 1 | draft-ietf-dnsop-ds-automation | +| 12 | mailmaint | 1 | draft-ietf-mailmaint-pacc | +| 13 | sml | 1 | draft-ietf-sml-trust | +| 14 | roll | 1 | draft-ietf-roll-enrollment-priority | +| 15 | hpke | 1 | draft-ietf-hpke-hpke | +| 16 | suit | 1 | draft-ietf-suit-firmware-encryption | +| 17 | netconf | 1 | draft-ietf-netconf-configuration-tracing | +| 18 | pim | 1 | draft-ietf-pim-zeroconf-mcast-addr-alloc-ps | + +## Score Comparison: WG-Adopted vs Individual + +| Metric | WG-Adopted | Individual | +|--------|----------:|----------:| +| Count (rated) | 36 | 325 | +| Average Score | 3.54 | 3.31 | +| Min Score | 2.40 | 1.35 | +| Max Score | 4.60 | 4.85 | + +### Per-Dimension Comparison + +| Dimension | WG-Adopted Avg | Individual Avg | Delta | +|-----------|---------------:|---------------:|------:| +| Novelty | 2.92 | 3.36 | -0.45 | +| Maturity | 4.11 | 2.83 | +1.28 | +| Overlap | 2.39 | 2.66 | -0.27 | +| Momentum | 3.89 | 2.91 | +0.98 | +| Relevance | 3.58 | 3.87 | -0.29 | + +## Category Distribution: WG-Adopted vs Individual + +| Category | WG-Adopted | Individual | % WG | +|----------|----------:|----------:|-----:| +| A2A protocols | 3 | 133 | 2% | +| AI safety/alignment | 1 | 44 | 2% | +| Agent discovery/reg | 3 | 76 | 4% | +| Agent identity/auth | 14 | 107 | 12% | +| Autonomous netops | 4 | 94 | 4% | +| Data formats/interop | 20 | 128 | 14% | +| Human-agent interaction | 1 | 29 | 3% | +| ML traffic mgmt | 0 | 74 | 0% | +| Model serving/inference | 0 | 42 | 0% | +| Other AI/agent | 4 | 22 | 15% | +| Policy/governance | 6 | 87 | 6% | + +## Gap Coverage by WG-Adopted Work + +Do any WG-adopted drafts address the identified gaps? + +| Gap | Severity | WG Coverage | +|-----|----------|-------------| +| Agent Behavior Verification | CRITICAL | Yes | +| Cross-Domain Agent Liability | CRITICAL | Yes | +| Agent Resource Exhaustion Protection | HIGH | Yes | +| Human Override Protocols | CRITICAL | Yes | +| Agent-Generated Data Provenance | HIGH | Yes | +| Agent Capability Degradation Handling | HIGH | Yes | +| Multi-Agent Coordination Deadlocks | HIGH | Yes | +| Agent Privacy Preservation | HIGH | Yes | +| Real-time Agent Debugging | MEDIUM | Yes | +| Agent Firmware/Model Update Security | HIGH | **No** | +| Cross-Protocol Agent Migration | MEDIUM | Yes | +| Agent Energy Consumption Optimization | MEDIUM | **No** | + +## All WG-Adopted Drafts + +| Draft | WG | Score | Categories | Title | +|-------|:---|------:|------------|-------| +| draft-ietf-mailmaint-pacc | mailmaint | 2.4 | Data formats/interop | Automatic Configuration of Email, Calendar, and Co | +| draft-ietf-anima-constrained-voucher | anima | 4.3 | Agent identity/auth, Data formats/interop | Constrained Bootstrapping Remote Secure Key Infras | +| draft-ietf-dnsop-ds-automation | dnsop | 2.8 | Other AI/agent | Operational Recommendations for DS Automation | +| draft-ietf-sshm-mlkem-hybrid-kex | sshm | 4.2 | Data formats/interop | PQ/T Hybrid Key Exchange with ML-KEM in SSH | +| draft-ietf-pim-zeroconf-mcast-addr-alloc-ps | pim | 2.5 | Agent discovery/reg, Data formats/interop | Zeroconf Multicast Address Allocation Problem Stat | +| draft-ietf-lamps-rfc5274bis | lamps | 3.1 | Data formats/interop | Certificate Management Messages over CMS (CMC): Co | +| draft-ietf-emu-hybrid-pqc-eapaka | emu | 3.8 | Agent identity/auth | Enhancing Security in EAP-AKA' with Hybrid Post-Qu | +| draft-ietf-emu-pqc-eapaka | emu | 3.5 | Agent identity/auth | Post-Quantum Key Encapsulation Mechanisms (PQ KEMs | +| draft-ietf-sshm-ssh-agent | sshm | 2.8 | Agent identity/auth | SSH Agent Protocol | +| draft-ietf-roll-enrollment-priority | roll | 2.9 | Agent discovery/reg, Autonomous netops | Controlling Secure Network Enrollment in RPL netwo | +| draft-ietf-tls-extended-key-update | tls | 4.2 | Data formats/interop | Extended Key Update for Transport Layer Security ( | +| draft-ietf-tls-ecdhe-mlkem | tls | 4.4 | Other AI/agent | Post-quantum hybrid ECDHE-MLKEM Key Agreement for | +| draft-ietf-emu-eap-edhoc | emu | 3.2 | Agent identity/auth | Using the Extensible Authentication Protocol (EAP) | +| draft-ietf-lamps-est-renewal-info | lamps | 3.7 | Data formats/interop | Certificate Renewal Recommendations for Enrollment | +| draft-ietf-tls-deprecate-obsolete-kex | tls | 3.8 | Policy/governance | Deprecating Obsolete Key Exchange Methods in (D)TL | +| draft-ietf-lake-edhoc-impl-cons | lake | 2.8 | Agent identity/auth | Implementation Considerations for Ephemeral Diffie | +| draft-ietf-lamps-rfc7030-csrattrs | lamps | 3.7 | Data formats/interop, Policy/governance | Clarification and enhancement of RFC7030 CSR Attri | +| draft-ietf-httpbis-rfc6265bis | httpbis | 3.0 | Other AI/agent | Cookies: HTTP State Management Mechanism | +| draft-ietf-suit-firmware-encryption | suit | 3.7 | Data formats/interop | Encrypted Payloads in SUIT Manifests | +| draft-ietf-aipref-vocab | aipref | 4.4 | Policy/governance, Data formats/interop | A Vocabulary For Expressing AI Usage Preferences | +| draft-ietf-lake-edhoc-psk | lake | 3.6 | Data formats/interop | EDHOC Authenticated with Pre-Shared Keys (PSK) | +| draft-ietf-lake-app-profiles | lake | 4.6 | Data formats/interop, Agent identity/auth | Coordinating the Use of Application Profiles for E | +| draft-ietf-lake-authz | lake | 3.9 | Agent identity/auth, Agent discovery/reg | Lightweight Authorization using Ephemeral Diffie-H | +| draft-ietf-lake-ra | lake | 3.7 | Agent identity/auth, Policy/governance | Remote attestation over EDHOC | +| draft-ietf-httpbis-layered-cookies | httpbis | 2.8 | Other AI/agent | Cookies: HTTP State Management Mechanism | +| draft-ietf-hpke-hpke | hpke | 4.3 | Agent identity/auth, Data formats/interop | Hybrid Public Key Encryption | +| draft-ietf-netconf-configuration-tracing | netconf | 3.7 | Autonomous netops, Data formats/interop | External Trace ID for Configuration Tracing | +| draft-ietf-aipref-attach | aipref | 3.8 | A2A protocols, Policy/governance | Associating AI Usage Preferences with Content in H | +| draft-ietf-sml-trust | sml | 3.5 | Data formats/interop, AI safety/alignment | Trust and security considerations for Structured E | +| draft-ietf-ace-coap-est-oscore | ace | 3.9 | Agent identity/auth, Data formats/interop | Protecting EST Payloads with OSCORE | +| draft-ietf-ace-edhoc-oscore-profile | ace | 3.6 | Agent identity/auth, A2A protocols | Ephemeral Diffie-Hellman Over COSE (EDHOC) and Obj | +| draft-ietf-lamps-attestation-freshness | lamps | 3.7 | Agent identity/auth | Nonce-based Freshness for Remote Attestation in Ce | +| draft-ietf-lamps-private-key-stmt-attr | lamps | 3.4 | Data formats/interop | An Attribute for Statement of Possession of a Priv | +| draft-ietf-lisp-nexagon | lisp | 4.0 | Autonomous netops, A2A protocols | Geo-Intelligence Network Based On H3 and LISP | +| draft-ietf-lamps-e2e-mail-guidance | lamps | 3.0 | Data formats/interop, Policy/governance | Guidance on End-to-End E-mail Security | +| draft-ietf-anima-brski-prm | anima | 2.9 | Agent identity/auth, Autonomous netops | BRSKI with Pledge in Responder Mode (BRSKI-PRM) | \ No newline at end of file diff --git a/data/reports/team-blocs.md b/data/reports/team-blocs.md new file mode 100644 index 0000000..3226fb4 --- /dev/null +++ b/data/reports/team-blocs.md @@ -0,0 +1,995 @@ +# Team Bloc Analysis +*Generated 2026-03-01 20:02 UTC — 403 authors, 260 drafts* +*Parameters: cohesion >= 70%, min shared drafts >= 2, min size >= 2* + +## Summary + +| Metric | Value | +|--------|------:| +| Total blocs detected | 33 | +| Authors in blocs | 102 / 403 (25%) | +| Largest bloc | 13 members | +| Most shared drafts | 22 | + +### Bloc Size Distribution + +| Size | Count | +|------|------:| +| 10+ members | 1 | +| 5-9 members | 2 | +| 3-4 members | 11 | +| 2 members | 19 | + +### Blocs by Organization + +| Organization | Blocs | Total Members | Total Shared Drafts | +|-------------|------:|--------------:|--------------------:| +| Huawei | 4 | 20 | 29 | +| Cisco | 3 | 9 | 7 | +| Ericsson | 1 | 5 | 6 | +| Bitwave | 1 | 2 | 6 | +| China Telecom | 1 | 6 | 5 | +| Zhongguancun Laboratory | 1 | 4 | 5 | +| Infoblox, Inc. | 1 | 4 | 4 | +| ISI, R.C. ATHENA | 1 | 4 | 4 | +| Nokia | 1 | 2 | 4 | +| China Mobile | 1 | 2 | 4 | +| China Unicom | 2 | 4 | 4 | +| Department of Computer Science & Engineering | 1 | 3 | 3 | +| RISE | 1 | 2 | 3 | +| Bundesdruckerei GmbH | 1 | 4 | 2 | +| JPMorgan Chase & Co | 1 | 4 | 2 | +| IBM | 1 | 4 | 2 | +| Entrust Limited | 1 | 3 | 2 | +| AKAYLA, Inc. | 1 | 2 | 2 | +| Daejeon University | 1 | 2 | 2 | +| National Security Institute, Virginia Tech | 1 | 2 | 2 | +| InterDigital Europe | 1 | 2 | 2 | +| Amazon | 1 | 2 | 2 | +| Fraunhofer SIT | 1 | 2 | 2 | +| ICANN | 1 | 2 | 2 | +| Apple | 1 | 2 | 2 | +| Okta | 1 | 2 | 2 | +| ICT, CAS | 1 | 2 | 2 | + +--- + +## Detailed Bloc Profiles + +### 1. Huawei team (13) + +| | | +|---|---| +| **Members** | 13 | +| **Shared Drafts** | 22 | +| **Cohesion** | 94% | +| **Primary Org** | Huawei | +| **All Orgs** | Huawei, UnionPay | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Bing Liu | Huawei | 21 | 19 | +| Nan Geng | Huawei | 19 | 19 | +| Zhenbin Li | Huawei | 19 | 19 | +| Qiangzhou Gao | Huawei | 18 | 18 | +| Xiaotong Shang | Huawei | 17 | 17 | +| Jianwei Mao | Huawei | 11 | 11 | +| Guanming Zeng | Huawei | 7 | 6 | +| Li Zhang | Huawei | 5 | 5 | +| Chong Zheng | Huawei | 3 | 3 | +| Xiaohua Men | UnionPay | 2 | 2 | +| Yulun Fang | UnionPay | 2 | 2 | +| Quan Yuan | Huawei | 2 | 2 | +| Ruyi Zhang | Huawei | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-men-rtgwg-agent-networking-in-digibank](https://datatracker.ietf.org/doc/draft-men-rtgwg-agent-networking-in-digibank/) | 7/13 | 1.8 | A2A protocols, Agent discovery/reg | +| [draft-men-rtgwg-agent-networking-digibank-scenario](https://datatracker.ietf.org/doc/draft-men-rtgwg-agent-networking-digibank-scenario/) | 7/13 | 2.5 | A2A protocols, Agent discovery/reg | +| [draft-yuan-rtgwg-traffic-agent-usecase](https://datatracker.ietf.org/doc/draft-yuan-rtgwg-traffic-agent-usecase/) | 7/13 | 3.7 | ML traffic mgmt, Autonomous netops | +| [draft-zeng-opsawg-applicability-mcp-a2a](https://datatracker.ietf.org/doc/draft-zeng-opsawg-applicability-mcp-a2a/) | 7/13 | 3.5 | Autonomous netops, A2A protocols | +| [draft-zhang-rtgwg-ai-agents-troubleshooting](https://datatracker.ietf.org/doc/draft-zhang-rtgwg-ai-agents-troubleshooting/) | 7/13 | 2.9 | Agent-to-agent communication protocols, Autonomous network operations | +| [draft-yuan-rtgwg-security-agent-usecase](https://datatracker.ietf.org/doc/draft-yuan-rtgwg-security-agent-usecase/) | 7/13 | 3.4 | Autonomous netops, AI safety/alignment | +| [draft-zeng-opsawg-llm-netconf-gap](https://datatracker.ietf.org/doc/draft-zeng-opsawg-llm-netconf-gap/) | 7/13 | 3.9 | Autonomous netops, A2A protocols | +| [draft-zm-rtgwg-mcp-troubleshooting](https://datatracker.ietf.org/doc/draft-zm-rtgwg-mcp-troubleshooting/) | 7/13 | 3.6 | Autonomous netops, Human-agent interaction | +| [draft-zhang-rtgwg-ai-agents-measurement](https://datatracker.ietf.org/doc/draft-zhang-rtgwg-ai-agents-measurement/) | 7/13 | 2.7 | Autonomous netops, A2A protocols | +| [draft-mzsg-rtgwg-agent-cross-device-comm-framework](https://datatracker.ietf.org/doc/draft-mzsg-rtgwg-agent-cross-device-comm-framework/) | 7/13 | 2.5 | A2A protocols, Autonomous netops | +| [draft-mao-rtgwg-agent-comm-protocol-gap-analysis](https://datatracker.ietf.org/doc/draft-mao-rtgwg-agent-comm-protocol-gap-analysis/) | 7/13 | 3.6 | A2A protocols, Autonomous netops | +| [draft-pang-agents-networking-scenarios](https://datatracker.ietf.org/doc/draft-pang-agents-networking-scenarios/) | 6/13 | 2.3 | Autonomous netops, Other AI/agent | +| [draft-zlgsgl-rtgwg-agents-networking-framework](https://datatracker.ietf.org/doc/draft-zlgsgl-rtgwg-agents-networking-framework/) | 6/13 | 3.6 | Autonomous netops, A2A protocols | +| [draft-zl-agents-networking-framework](https://datatracker.ietf.org/doc/draft-zl-agents-networking-framework/) | 6/13 | 2.4 | Agent discovery / registration, Identity / authentication for AI agents | +| [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) | 6/13 | 3.7 | Agent identity/auth, Agent discovery/reg | +| [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) | 6/13 | 3.3 | Identity / authentication for AI agents, Agent discovery / registration | +| [draft-liu-rtgwg-agent-gateway-requirements](https://datatracker.ietf.org/doc/draft-liu-rtgwg-agent-gateway-requirements/) | 5/13 | 3.2 | A2A protocols, Agent identity/auth | +| [draft-mao-rtgwg-apn-framework-for-ioa](https://datatracker.ietf.org/doc/draft-mao-rtgwg-apn-framework-for-ioa/) | 4/13 | 3.2 | ML traffic mgmt, A2A protocols | +| [draft-zl-agents-networking-architecture](https://datatracker.ietf.org/doc/draft-zl-agents-networking-architecture/) | 3/13 | 2.5 | Autonomous netops, A2A protocols | +| [draft-zl-agents-networking-scenarios](https://datatracker.ietf.org/doc/draft-zl-agents-networking-scenarios/) | 2/13 | 2.3 | Autonomous netops, Human-agent interaction | +| [draft-ni-a2a-ai-agent-security-requirements](https://datatracker.ietf.org/doc/draft-ni-a2a-ai-agent-security-requirements/) | 2/13 | 3.7 | AI safety/alignment, Agent identity/auth | +| [draft-zeng-mcp-troubleshooting](https://datatracker.ietf.org/doc/draft-zeng-mcp-troubleshooting/) | 2/13 | 3.1 | Autonomous netops, Data formats/interop | + +--- + +### 2. Ericsson team (5) + +| | | +|---|---| +| **Members** | 5 | +| **Shared Drafts** | 6 | +| **Cohesion** | 100% | +| **Primary Org** | Ericsson | +| **All Orgs** | Ericsson, Inria, University of Murcia | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Göran Selander | Ericsson | 7 | 6 | +| John Preuß Mattsson | Ericsson | 5 | 5 | +| Mališa Vučinić | Inria | 2 | 2 | +| Francisco Lopez-Gomez | University of Murcia | 2 | 2 | +| Rafael Marin-Lopez | University of Murcia | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-ietf-lake-edhoc-psk](https://datatracker.ietf.org/doc/draft-ietf-lake-edhoc-psk/) | 4/5 | 3.6 | Data formats/interop | +| [draft-ietf-emu-eap-edhoc](https://datatracker.ietf.org/doc/draft-ietf-emu-eap-edhoc/) | 4/5 | 3.2 | Agent identity/auth | +| [draft-ietf-lake-authz](https://datatracker.ietf.org/doc/draft-ietf-lake-authz/) | 3/5 | 3.9 | Agent identity/auth, Agent discovery/reg | +| [draft-ietf-ace-coap-est-oscore](https://datatracker.ietf.org/doc/draft-ietf-ace-coap-est-oscore/) | 2/5 | 3.9 | Agent identity/auth, Data formats/interop | +| [draft-spm-lake-pqsuites](https://datatracker.ietf.org/doc/draft-spm-lake-pqsuites/) | 2/5 | 4.1 | Agent identity/auth | +| [draft-ietf-ace-edhoc-oscore-profile](https://datatracker.ietf.org/doc/draft-ietf-ace-edhoc-oscore-profile/) | 2/5 | 3.6 | Agent identity/auth, A2A protocols | + +--- + +### 3. Bitwave team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 6 | +| **Cohesion** | 100% | +| **Primary Org** | Bitwave | +| **All Orgs** | Bitwave, Five9 | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Jonathan Rosenberg | Five9 | 7 | 6 | +| Pat White | Bitwave | 6 | 6 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-rosenberg-aiproto-cheq](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-cheq/) | 2/2 | 3.9 | Human-agent interaction, AI safety/alignment | +| [draft-rosenberg-aiproto-a2t](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-a2t/) | 2/2 | 3.9 | A2A protocols, Data formats/interop | +| [draft-rosenberg-cheq](https://datatracker.ietf.org/doc/draft-rosenberg-cheq/) | 2/2 | 3.6 | AI safety/alignment, Human-agent interaction | +| [draft-rosenberg-aiproto-nact](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-nact/) | 2/2 | 3.7 | A2A protocols, Data formats/interop | +| [draft-rosenberg-oauth-aauth](https://datatracker.ietf.org/doc/draft-rosenberg-oauth-aauth/) | 2/2 | 3.6 | Agent identity/auth, AI safety/alignment | +| [draft-rosenberg-aiproto](https://datatracker.ietf.org/doc/draft-rosenberg-aiproto/) | 2/2 | 3.7 | A2A protocols, Data formats/interop | + +--- + +### 4. China Telecom team (6) + +| | | +|---|---| +| **Members** | 6 | +| **Shared Drafts** | 5 | +| **Cohesion** | 100% | +| **Primary Org** | China Telecom | +| **All Orgs** | BUPT, China Telecom, Tsinghua University | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Aijun Wang | China Telecom | 8 | 5 | +| Menghan Yu | China Telecom | 3 | 2 | +| Jinyan Li | China Telecom | 3 | 3 | +| Zhiyuan Liu | Tsinghua University | 2 | 2 | +| Cheng Yang | BUPT | 2 | 2 | +| Zhen Li | China Telecom | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-yu-dmsc-ai-agent-use-cases-in-6g](https://datatracker.ietf.org/doc/draft-yu-dmsc-ai-agent-use-cases-in-6g/) | 4/6 | 2.6 | Autonomous netops, ML traffic mgmt | +| [draft-yu-ai-agent-use-cases-in-6g](https://datatracker.ietf.org/doc/draft-yu-ai-agent-use-cases-in-6g/) | 4/6 | 2.5 | Agent-to-agent communication protocols, Identity / authentication for AI agents | +| [draft-yang-ioa-protocol](https://datatracker.ietf.org/doc/draft-yang-ioa-protocol/) | 3/6 | 3.6 | A2A protocols, Agent discovery/reg | +| [draft-yang-dmsc-ioa-task-protocol](https://datatracker.ietf.org/doc/draft-yang-dmsc-ioa-task-protocol/) | 3/6 | 3.0 | A2A protocols, Agent discovery/reg | +| [draft-hw-ai-agent-6g](https://datatracker.ietf.org/doc/draft-hw-ai-agent-6g/) | 2/6 | 3.1 | Agent-to-agent communication protocols, Autonomous network operations | + +--- + +### 5. Zhongguancun Laboratory team (4) + +| | | +|---|---| +| **Members** | 4 | +| **Shared Drafts** | 5 | +| **Cohesion** | 94% | +| **Primary Org** | Zhongguancun Laboratory | +| **All Orgs** | Tsinghua University, Zhongguancun Laboratory | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Yong Cui | Tsinghua University | 8 | 5 | +| Chenguang Du | Zhongguancun Laboratory | 4 | 3 | +| Lei Zhang | Zhongguancun Laboratory | 2 | 2 | +| Mingzhe Xing | Zhongguancun Laboratory | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-cui-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/) | 3/4 | 4.1 | Human-agent interaction, Autonomous netops | +| [draft-irtf-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-irtf-nmrg-llm-nm/) | 3/4 | 3.5 | Autonomous netops, Human-agent interaction | +| [draft-cui-nmrg-llm-benchmark](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-benchmark/) | 2/4 | 4.3 | Autonomous netops, Policy/governance | +| [draft-cui-ai-agent-discovery-invocation](https://datatracker.ietf.org/doc/draft-cui-ai-agent-discovery-invocation/) | 2/4 | 3.9 | Agent discovery/reg, A2A protocols | +| [draft-cui-ai-agent-task](https://datatracker.ietf.org/doc/draft-cui-ai-agent-task/) | 2/4 | 3.0 | Agent-to-agent communication protocols, Agent discovery / registration | + +--- + +### 6. Infoblox, Inc. team (4) + +| | | +|---|---| +| **Members** | 4 | +| **Shared Drafts** | 4 | +| **Cohesion** | 100% | +| **Primary Org** | Infoblox, Inc. | +| **All Orgs** | Deutsche Telekom, Independent, Infoblox, Inc. | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Roland Schott | Deutsche Telekom | 5 | 4 | +| Behcet Sarikaya | Independent | 4 | 4 | +| Jim Mozley | Infoblox, Inc. | 3 | 3 | +| Nic Williams | Infoblox, Inc. | 3 | 3 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-mozleywilliams-dnsop-bandaid](https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-bandaid/) | 4/4 | 3.6 | Agent discovery/reg, A2A protocols | +| [draft-mozleywilliams-dnsop-dnsaid](https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-dnsaid/) | 4/4 | 3.6 | Agent discovery/reg, Data formats/interop | +| [draft-mozley-aidiscovery](https://datatracker.ietf.org/doc/draft-mozley-aidiscovery/) | 4/4 | 3.5 | Agent discovery/reg, A2A protocols | +| [draft-sarischo-6gip-aiagent-requirements](https://datatracker.ietf.org/doc/draft-sarischo-6gip-aiagent-requirements/) | 2/4 | 2.6 | Agent discovery/reg, Autonomous netops | + +--- + +### 7. ISI, R.C. ATHENA team (4) + +| | | +|---|---| +| **Members** | 4 | +| **Shared Drafts** | 4 | +| **Cohesion** | 100% | +| **Primary Org** | ISI, R.C. ATHENA | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Evangelos Haleplidis | ISI, R.C. ATHENA | 4 | 4 | +| Lidia Pocero Fraile | ISI, R.C. ATHENA | 4 | 4 | +| Apostolos P. Fournaris | ISI, R.C. ATHENA | 4 | 4 | +| Christos Koulamas | ISI, R.C. ATHENA | 4 | 4 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-pocero-authkem-edhoc](https://datatracker.ietf.org/doc/draft-pocero-authkem-edhoc/) | 4/4 | 3.7 | Agent identity/auth, A2A protocols | +| [draft-lake-pocero-authkem-ikr-edhoc](https://datatracker.ietf.org/doc/draft-lake-pocero-authkem-ikr-edhoc/) | 4/4 | 4.2 | Agent identity/auth | +| [draft-pocero-authkem-ikr-edhoc](https://datatracker.ietf.org/doc/draft-pocero-authkem-ikr-edhoc/) | 4/4 | 3.0 | Agent identity/auth | +| [draft-lake-pocero-authkem-edhoc](https://datatracker.ietf.org/doc/draft-lake-pocero-authkem-edhoc/) | 4/4 | 3.2 | Agent identity/auth | + +--- + +### 8. Nokia team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 4 | +| **Cohesion** | 100% | +| **Primary Org** | Nokia | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Tirumaleswar Reddy.K | Nokia | 5 | 4 | +| Aritra Banerjee | Nokia | 4 | 4 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-ra-emu-pqc-eapaka](https://datatracker.ietf.org/doc/draft-ra-emu-pqc-eapaka/) | 2/2 | 3.2 | Agent identity/auth | +| [draft-ietf-emu-pqc-eapaka](https://datatracker.ietf.org/doc/draft-ietf-emu-pqc-eapaka/) | 2/2 | 3.5 | Agent identity/auth | +| [draft-ar-emu-hybrid-pqc-eapaka](https://datatracker.ietf.org/doc/draft-ar-emu-hybrid-pqc-eapaka/) | 2/2 | 3.5 | Agent identity/auth | +| [draft-ietf-emu-hybrid-pqc-eapaka](https://datatracker.ietf.org/doc/draft-ietf-emu-hybrid-pqc-eapaka/) | 2/2 | 3.8 | Agent identity/auth | + +--- + +### 9. China Mobile team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 4 | +| **Cohesion** | 100% | +| **Primary Org** | China Mobile | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Meiling Chen | China Mobile | 4 | 4 | +| Li Su | China Mobile | 4 | 4 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-chen-ai-agent-auth-new-requirements](https://datatracker.ietf.org/doc/draft-chen-ai-agent-auth-new-requirements/) | 2/2 | 3.8 | Agent identity/auth, AI safety/alignment | +| [draft-chen-lake-edhoc-aka](https://datatracker.ietf.org/doc/draft-chen-lake-edhoc-aka/) | 2/2 | 3.0 | Agent identity/auth | +| [draft-chen-oauth-rar-agent-extensions](https://datatracker.ietf.org/doc/draft-chen-oauth-rar-agent-extensions/) | 2/2 | 4.2 | Agent identity/auth, A2A protocols | +| [draft-chen-agent-decoupled-authorization-model](https://datatracker.ietf.org/doc/draft-chen-agent-decoupled-authorization-model/) | 2/2 | 3.5 | Identity / authentication for AI agents, AI safety / guardrails / alignment | + +--- + +### 10. Department of Computer Science & Engineering team (3) + +| | | +|---|---| +| **Members** | 3 | +| **Shared Drafts** | 3 | +| **Cohesion** | 100% | +| **Primary Org** | Department of Computer Science & Engineering | +| **All Orgs** | Department of Computer Science & Engineering, School of Electronic Engineering | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Jaehoon Paul Jeong | Department of Computer Science & Engineering | 4 | 3 | +| Yoseop Ahn | Department of Computer Science & Engineering | 3 | 3 | +| Younghan Kim | School of Electronic Engineering | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-ahn-nmrg-5g-security-i2nsf-framework](https://datatracker.ietf.org/doc/draft-ahn-nmrg-5g-security-i2nsf-framework/) | 3/3 | 3.5 | Policy/governance, Autonomous netops | +| [draft-ahn-opsawg-5g-security-i2nsf-framework](https://datatracker.ietf.org/doc/draft-ahn-opsawg-5g-security-i2nsf-framework/) | 3/3 | 3.2 | Autonomous netops, Policy/governance | +| [draft-jeong-opsawg-intent-based-sdv-framework](https://datatracker.ietf.org/doc/draft-jeong-opsawg-intent-based-sdv-framework/) | 2/3 | 3.3 | Autonomous netops, Agent discovery/reg | + +--- + +### 11. Cisco team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 3 | +| **Cohesion** | 100% | +| **Primary Org** | Cisco | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Cullen Fluffy Jennings | Cisco | 6 | 3 | +| Suhas Nandakumar | Cisco | 3 | 3 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-a2a-moqt-transport](https://datatracker.ietf.org/doc/draft-a2a-moqt-transport/) | 2/2 | 3.1 | A2A protocols, Data formats/interop | +| [draft-nandakumar-a2a-moqt-transport](https://datatracker.ietf.org/doc/draft-nandakumar-a2a-moqt-transport/) | 2/2 | 3.0 | A2A protocols, Data formats/interop | +| [draft-nandakumar-agent-sd-jwt](https://datatracker.ietf.org/doc/draft-nandakumar-agent-sd-jwt/) | 2/2 | 3.9 | Agent discovery / registration, Identity / authentication for AI agents | + +--- + +### 12. RISE team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 3 | +| **Cohesion** | 100% | +| **Primary Org** | RISE | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Marco Tiloca | RISE | 4 | 3 | +| Rikard Höglund | RISE | 3 | 3 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-tiloca-lake-exporter-output-length](https://datatracker.ietf.org/doc/draft-tiloca-lake-exporter-output-length/) | 2/2 | 2.4 | Agent identity/auth | +| [draft-ietf-ace-edhoc-oscore-profile](https://datatracker.ietf.org/doc/draft-ietf-ace-edhoc-oscore-profile/) | 2/2 | 3.6 | Agent identity/auth, A2A protocols | +| [draft-ietf-lake-app-profiles](https://datatracker.ietf.org/doc/draft-ietf-lake-app-profiles/) | 2/2 | 4.6 | Data formats/interop, Agent identity/auth | + +--- + +### 13. Huawei team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 3 | +| **Cohesion** | 100% | +| **Primary Org** | Huawei | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Peter Chunchi Liu | Huawei | 4 | 3 | +| Ni Yuan | Huawei | 3 | 3 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-liu-oauth-a2a-profile](https://datatracker.ietf.org/doc/draft-liu-oauth-a2a-profile/) | 2/2 | 3.6 | Agent identity/auth, A2A protocols | +| [draft-ni-a2a-ai-agent-security-requirements](https://datatracker.ietf.org/doc/draft-ni-a2a-ai-agent-security-requirements/) | 2/2 | 3.7 | AI safety/alignment, Agent identity/auth | +| [draft-ni-wimse-ai-agent-identity](https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/) | 2/2 | 3.0 | Agent identity/auth | + +--- + +### 14. Bundesdruckerei GmbH team (4) + +| | | +|---|---| +| **Members** | 4 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Bundesdruckerei GmbH | +| **All Orgs** | Bundesdruckerei GmbH, IDsec Solutions, The Agency for Digital Government | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Micha Kraus | Bundesdruckerei GmbH | 2 | 2 | +| Paul Bastian | Bundesdruckerei GmbH | 2 | 2 | +| Peter Lee Altmann | The Agency for Digital Government | 2 | 2 | +| Stefan Santesson | IDsec Solutions | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-bastian-jose-pkdh](https://datatracker.ietf.org/doc/draft-bastian-jose-pkdh/) | 4/4 | 2.9 | Data formats/interop | +| [draft-bastian-jose-dvs](https://datatracker.ietf.org/doc/draft-bastian-jose-dvs/) | 4/4 | 2.7 | Agent identity/auth, Data formats/interop | + +--- + +### 15. JPMorgan Chase & Co team (4) + +| | | +|---|---| +| **Members** | 4 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | JPMorgan Chase & Co | +| **All Orgs** | Aryaka, JPMorgan Chase & Co, Oracle, Telefonica | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Diego Lopez | Telefonica | 4 | 2 | +| Ramki Krishnan | JPMorgan Chase & Co | 2 | 2 | +| A Prasad | Oracle | 2 | 2 | +| Srinivasa Addepalli | Aryaka | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-mw-wimse-transitive-attestation](https://datatracker.ietf.org/doc/draft-mw-wimse-transitive-attestation/) | 4/4 | 4.3 | Agent identity/auth, AI safety/alignment | +| [draft-mw-spice-actor-chain](https://datatracker.ietf.org/doc/draft-mw-spice-actor-chain/) | 4/4 | 4.1 | Agent identity/auth, AI safety/alignment | + +--- + +### 16. Cisco team (4) + +| | | +|---|---| +| **Members** | 4 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Cisco | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Luca Muscariello | Cisco | 3 | 2 | +| Michele Papalini | Cisco | 2 | 2 | +| Mauro Sardara | Cisco | 2 | 2 | +| Sam Betts | Cisco | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-mpsb-agntcy-messaging](https://datatracker.ietf.org/doc/draft-mpsb-agntcy-messaging/) | 4/4 | 2.6 | A2A protocols, Data formats/interop | +| [draft-mpsb-agntcy-slim](https://datatracker.ietf.org/doc/draft-mpsb-agntcy-slim/) | 4/4 | 2.8 | A2A protocols, Data formats/interop | + +--- + +### 17. IBM team (4) + +| | | +|---|---| +| **Members** | 4 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | IBM | +| **All Orgs** | Consensys, IBM | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Sandeep Nishad | IBM | 2 | 2 | +| Ermyas Abebe | Consensys | 2 | 2 | +| Vinayaka Pandit | IBM | 2 | 2 | +| Venkatraman Ramakrishna | IBM | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-ramakrishna-satp-views-addresses](https://datatracker.ietf.org/doc/draft-ramakrishna-satp-views-addresses/) | 4/4 | 3.4 | Data formats/interop, Agent identity/auth | +| [draft-ramakrishna-satp-data-sharing](https://datatracker.ietf.org/doc/draft-ramakrishna-satp-data-sharing/) | 4/4 | 2.9 | Data formats/interop, A2A protocols | + +--- + +### 18. Cisco team (3) + +| | | +|---|---| +| **Members** | 3 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Cisco | +| **All Orgs** | Cisco, lispers.net | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Dino Farinacci | lispers.net | 3 | 2 | +| Alberto Rodriguez-Natal | Cisco | 2 | 2 | +| Fabio Maino | Cisco | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-ietf-lisp-nexagon](https://datatracker.ietf.org/doc/draft-ietf-lisp-nexagon/) | 3/3 | 4.0 | Autonomous netops, A2A protocols | +| [draft-moreno-lisp-uberlay](https://datatracker.ietf.org/doc/draft-moreno-lisp-uberlay/) | 3/3 | 3.6 | Data formats/interop, Autonomous netops | + +--- + +### 19. Entrust Limited team (3) + +| | | +|---|---| +| **Members** | 3 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Entrust Limited | +| **All Orgs** | Ciena, Entrust Limited, Sandelman Software Works | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Michael Richardson | Sandelman Software Works | 7 | 2 | +| Mike Ounsworth | Entrust Limited | 2 | 2 | +| Rifaat Shekh-Yusef | Ciena | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-ietf-lamps-est-renewal-info](https://datatracker.ietf.org/doc/draft-ietf-lamps-est-renewal-info/) | 3/3 | 3.7 | Data formats/interop | +| [draft-yusef-lamps-rfc7030-renewal-recommendation](https://datatracker.ietf.org/doc/draft-yusef-lamps-rfc7030-renewal-recommendation/) | 3/3 | 2.8 | Data formats/interop | + +--- + +### 20. Huawei team (3) + +| | | +|---|---| +| **Members** | 3 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Huawei | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Faye Liu | Huawei | 3 | 2 | +| LUN LI | Huawei | 2 | 2 | +| Yurong Song | Huawei | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-song-oauth-ai-agent-authorization](https://datatracker.ietf.org/doc/draft-song-oauth-ai-agent-authorization/) | 3/3 | 2.8 | Identity / authentication for AI agents, Policy / governance / ethical frameworks | +| [draft-song-oauth-ai-agent-collaborate-authz](https://datatracker.ietf.org/doc/draft-song-oauth-ai-agent-collaborate-authz/) | 3/3 | 3.5 | Agent identity/auth, A2A protocols | + +--- + +### 21. AKAYLA, Inc. team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | AKAYLA, Inc. | +| **All Orgs** | AKAYLA, Inc., sn3rd | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Joe Mandel | AKAYLA, Inc. | 2 | 2 | +| Sean Turner | sn3rd | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-ietf-lamps-rfc5274bis](https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5274bis/) | 2/2 | 3.1 | Data formats/interop | +| [draft-ietf-lamps-attestation-freshness](https://datatracker.ietf.org/doc/draft-ietf-lamps-attestation-freshness/) | 2/2 | 3.7 | Agent identity/auth | + +--- + +### 22. Daejeon University team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Daejeon University | +| **All Orgs** | Daejeon University, Huawei | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Qin Wu | Huawei | 3 | 2 | +| Yong-Geun Hong | Daejeon University | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/) | 2/2 | 4.2 | Autonomous netops, Model serving/inference | +| [draft-hong-nmrg-agenticai-ps](https://datatracker.ietf.org/doc/draft-hong-nmrg-agenticai-ps/) | 2/2 | 3.0 | Autonomous netops, A2A protocols | + +--- + +### 23. National Security Institute, Virginia Tech team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | National Security Institute, Virginia Tech | +| **All Orgs** | Boeing, National Security Institute, Virginia Tech | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Fred Templin | Boeing | 3 | 2 | +| Daniel J. Jakubisin | National Security Institute, Virginia Tech | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-templin-manet-inet-omni](https://datatracker.ietf.org/doc/draft-templin-manet-inet-omni/) | 2/2 | 2.5 | Autonomous netops, A2A protocols | +| [draft-templin-manet-inet](https://datatracker.ietf.org/doc/draft-templin-manet-inet/) | 2/2 | 2.0 | Other AI/agent | + +--- + +### 24. InterDigital Europe team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | InterDigital Europe | +| **All Orgs** | InterDigital Europe, Universidad Carlos III de Madrid | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Alain Mourad | InterDigital Europe | 2 | 2 | +| Carlos J. Bernardos | Universidad Carlos III de Madrid | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-bernardos-green-isac-uc](https://datatracker.ietf.org/doc/draft-bernardos-green-isac-uc/) | 2/2 | 2.5 | Autonomous netops, Other AI/agent | +| [draft-bernardos-cats-isac-uc](https://datatracker.ietf.org/doc/draft-bernardos-cats-isac-uc/) | 2/2 | 3.0 | Autonomous netops, ML traffic mgmt | + +--- + +### 25. Amazon team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Amazon | +| **All Orgs** | Amazon, University of Waterloo | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Panos Kampanakis | Amazon | 3 | 2 | +| Douglas Stebila | University of Waterloo | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-ietf-sshm-mlkem-hybrid-kex](https://datatracker.ietf.org/doc/draft-ietf-sshm-mlkem-hybrid-kex/) | 2/2 | 4.2 | Data formats/interop | +| [draft-ietf-tls-ecdhe-mlkem](https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/) | 2/2 | 4.4 | Other AI/agent | + +--- + +### 26. Fraunhofer SIT team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Fraunhofer SIT | +| **All Orgs** | Fraunhofer SIT, Tradeverifyd | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Henk Birkholz | Fraunhofer SIT | 2 | 2 | +| Orie Steele | Tradeverifyd | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/) | 2/2 | 4.5 | AI safety/alignment, Data formats/interop | +| [draft-steele-agent-considerations](https://datatracker.ietf.org/doc/draft-steele-agent-considerations/) | 2/2 | 4.0 | Data formats/interop, Policy/governance | + +--- + +### 27. Huawei team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Huawei | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Arashmid Akhavain | Huawei | 3 | 2 | +| Chenchen Yang | Huawei | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-yue-moq-transporting-sensing-data](https://datatracker.ietf.org/doc/draft-yue-moq-transporting-sensing-data/) | 2/2 | 3.4 | ML traffic mgmt, Data formats/interop | +| [draft-hw-ai-agent-6g](https://datatracker.ietf.org/doc/draft-hw-ai-agent-6g/) | 2/2 | 3.1 | Agent-to-agent communication protocols, Autonomous network operations | + +--- + +### 28. ICANN team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | ICANN | +| **All Orgs** | ICANN, audriga | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Arnt Gulbrandsen | ICANN | 2 | 2 | +| Hans-Jörg Happel | audriga | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-ietf-sml-trust](https://datatracker.ietf.org/doc/draft-ietf-sml-trust/) | 2/2 | 3.5 | Data formats/interop, AI safety/alignment | +| [draft-happel-structured-email-trust](https://datatracker.ietf.org/doc/draft-happel-structured-email-trust/) | 2/2 | 2.9 | Data formats/interop, Agent identity/auth | + +--- + +### 29. China Unicom team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | China Unicom | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| ZhangYutao | China Unicom | 2 | 2 | +| Lin Zhu | China Unicom | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-zhul-intarea-bnc-up-specific-suboption](https://datatracker.ietf.org/doc/draft-zhul-intarea-bnc-up-specific-suboption/) | 2/2 | 2.9 | Other AI/agent | +| [draft-zhul-dhc-bnc-up-specific-suboption](https://datatracker.ietf.org/doc/draft-zhul-dhc-bnc-up-specific-suboption/) | 2/2 | 2.7 | Other AI/agent | + +--- + +### 30. China Unicom team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | China Unicom | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Yi Yue | China Unicom | 3 | 2 | +| Xuebei Zhang | China Unicom | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/) | 2/2 | 4.1 | Autonomous netops, A2A protocols | +| [draft-zhang-agent-gap-network](https://datatracker.ietf.org/doc/draft-zhang-agent-gap-network/) | 2/2 | 3.0 | Agent-to-agent communication protocols, Autonomous network operations | + +--- + +### 31. Apple team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Apple | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Matt Diephouse | Apple | 2 | 2 | +| Daniel Eggert | Apple | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-ietf-mailmaint-pacc](https://datatracker.ietf.org/doc/draft-ietf-mailmaint-pacc/) | 2/2 | 2.4 | Data formats/interop | +| [draft-eggert-mailmaint-uaautoconf](https://datatracker.ietf.org/doc/draft-eggert-mailmaint-uaautoconf/) | 2/2 | 3.6 | Agent discovery/reg, Data formats/interop | + +--- + +### 32. Okta team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | Okta | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| Rafael S. Cohen | Okta | 2 | 2 | +| Macy Abbey | Okta | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-abbey-scim-agent-extension](https://datatracker.ietf.org/doc/draft-abbey-scim-agent-extension/) | 2/2 | 3.8 | Agent identity/auth, Data formats/interop | +| [draft-scim-agent-extension](https://datatracker.ietf.org/doc/draft-scim-agent-extension/) | 2/2 | 3.7 | Agent identity/auth, Data formats/interop | + +--- + +### 33. ICT, CAS team (2) + +| | | +|---|---| +| **Members** | 2 | +| **Shared Drafts** | 2 | +| **Cohesion** | 100% | +| **Primary Org** | ICT, CAS | +| **All Orgs** | CNIC, CAS, ICT, CAS | + +**Members:** + +| Author | Organization | Drafts | In-Bloc Drafts | +|--------|-------------|-------:|--------------:| +| ShengSun | ICT, CAS | 2 | 2 | +| Xinyi Zhang | CNIC, CAS | 2 | 2 | + +**Shared Drafts:** + +| Draft | Co-authors | Score | Categories | +|-------|----------:|------:|------------| +| [draft-sun-zhang-iaip](https://datatracker.ietf.org/doc/draft-sun-zhang-iaip/) | 2/2 | 3.2 | A2A protocols, Agent discovery/reg | +| [draft-sz-dmsc-iaip](https://datatracker.ietf.org/doc/draft-sz-dmsc-iaip/) | 2/2 | 3.3 | A2A protocols, Agent discovery/reg | + +--- + +## Cross-Bloc Connections + +*Authors who bridge between different blocs or connect blocs to the wider community.* + +| Bloc Author | Bloc | External Author | Their Affiliation | Shared | +|-------------|------|-----------------|-------------------|-------:| +| Jonathan Rosenberg | Bitwave team (2) | Cullen Fluffy Jennings | Cisco team (2) | 3 | +| Cullen Fluffy Jennings | Cisco team (2) | Pat White | Bitwave team (2) | 2 | +| Yong Cui | Zhongguancun Laboratory team (4) | Xiaohui Xie | (independent) | 2 | +| Aijun Wang | China Telecom team (6) | Xueting Li | (independent) | 2 | diff --git a/data/reports/timeline.md b/data/reports/timeline.md index 95e15b7..427135d 100644 --- a/data/reports/timeline.md +++ b/data/reports/timeline.md @@ -1,33 +1,53 @@ # IETF AI/Agent Drafts Timeline -*Generated 2026-02-28 10:27 UTC — 260 drafts across 9 months* +*Generated 2026-03-03 19:59 UTC — 361 drafts across 19 months* ## Monthly Submission Volume ``` -2025-06 | # 2 -2025-07 | ## 4 -2025-08 | ### 7 -2025-09 | ##### 10 -2025-10 | ########################### 50 -2025-11 | ############################ 51 -2025-12 | ####### 13 -2026-01 | ############################ 51 -2026-02 | ######################################## 72 +2024-01 | # 3 +2024-02 | 1 +2024-04 | 1 +2024-09 | 2 +2024-10 | 1 +2024-12 | 1 +2025-01 | # 4 +2025-04 | ## 5 +2025-05 | 2 +2025-06 | ## 5 +2025-07 | ## 5 +2025-08 | ### 8 +2025-09 | ####### 17 +2025-10 | ############################### 67 +2025-11 | ############################ 61 +2025-12 | ####### 16 +2026-01 | ######################### 54 +2026-02 | ######################################## 86 +2026-03 | ########## 22 ``` ## Category Breakdown by Month | Month | A2A protocol | AI safety / | AI safety/al | Agent discov | Agent discov | Agent identi | Agent-to-age | Autonomous n | Autonomous n | Data formats | Data formats | Human-agent | Identity / a | ML traffic m | ML-based tra | Model servin | Other AI/age | Policy / gov | Policy/gover | Total | |---------|------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | -----:| -| 2025-06 | 1 | 0 | 0 | 0 | 0 | 2 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 2 | -| 2025-07 | 2 | 0 | 1 | 0 | 1 | 2 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | -| 2025-08 | 0 | 0 | 0 | 0 | 0 | 2 | 0 | 2 | 0 | 0 | 5 | 0 | 0 | 0 | 0 | 0 | 2 | 0 | 2 | 7 | -| 2025-09 | 3 | 0 | 2 | 0 | 2 | 2 | 0 | 4 | 0 | 0 | 6 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 3 | 10 | -| 2025-10 | 22 | 0 | 5 | 2 | 13 | 23 | 2 | 12 | 0 | 1 | 24 | 6 | 1 | 4 | 0 | 2 | 5 | 0 | 7 | 50 | -| 2025-11 | 19 | 0 | 7 | 2 | 15 | 19 | 3 | 14 | 1 | 0 | 21 | 7 | 2 | 6 | 0 | 3 | 2 | 0 | 10 | 51 | -| 2025-12 | 2 | 0 | 3 | 1 | 2 | 7 | 0 | 3 | 0 | 0 | 4 | 0 | 1 | 1 | 0 | 1 | 2 | 0 | 4 | 13 | -| 2026-01 | 12 | 0 | 7 | 7 | 8 | 14 | 9 | 9 | 4 | 2 | 15 | 2 | 4 | 6 | 1 | 4 | 3 | 1 | 12 | 51 | -| 2026-02 | 31 | 1 | 11 | 2 | 16 | 27 | 2 | 15 | 0 | 0 | 26 | 5 | 5 | 6 | 0 | 3 | 7 | 1 | 21 | 72 | +| 2024-01 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 3 | +| 2024-02 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | +| 2024-04 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | +| 2024-09 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 2 | +| 2024-10 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 1 | +| 2024-12 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | +| 2025-01 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 0 | 0 | 4 | 0 | 2 | 0 | 0 | 0 | 4 | +| 2025-04 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 2 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 3 | 5 | +| 2025-05 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | +| 2025-06 | 1 | 0 | 0 | 0 | 0 | 2 | 0 | 3 | 0 | 0 | 1 | 0 | 0 | 3 | 0 | 1 | 0 | 0 | 1 | 5 | +| 2025-07 | 2 | 0 | 2 | 0 | 1 | 2 | 0 | 0 | 0 | 0 | 2 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 5 | +| 2025-08 | 0 | 0 | 0 | 0 | 0 | 2 | 0 | 2 | 0 | 0 | 6 | 1 | 0 | 0 | 0 | 0 | 2 | 0 | 3 | 8 | +| 2025-09 | 4 | 0 | 4 | 0 | 3 | 3 | 0 | 6 | 0 | 0 | 11 | 1 | 0 | 4 | 0 | 1 | 0 | 0 | 6 | 17 | +| 2025-10 | 26 | 0 | 5 | 2 | 13 | 23 | 2 | 19 | 0 | 1 | 35 | 7 | 1 | 13 | 0 | 9 | 5 | 0 | 10 | 67 | +| 2025-11 | 26 | 0 | 7 | 2 | 16 | 21 | 3 | 17 | 1 | 0 | 25 | 9 | 2 | 9 | 0 | 4 | 2 | 0 | 15 | 61 | +| 2025-12 | 2 | 0 | 3 | 1 | 3 | 7 | 0 | 4 | 0 | 0 | 6 | 1 | 1 | 3 | 0 | 1 | 2 | 0 | 6 | 16 | +| 2026-01 | 13 | 0 | 8 | 7 | 8 | 14 | 9 | 12 | 4 | 2 | 15 | 2 | 4 | 7 | 1 | 5 | 4 | 1 | 13 | 54 | +| 2026-02 | 36 | 1 | 12 | 2 | 17 | 29 | 2 | 18 | 0 | 0 | 32 | 6 | 5 | 15 | 0 | 8 | 8 | 1 | 23 | 86 | +| 2026-03 | 9 | 0 | 1 | 0 | 3 | 3 | 0 | 8 | 0 | 0 | 5 | 1 | 0 | 11 | 0 | 9 | 1 | 0 | 6 | 22 | ## Trends diff --git a/data/reports/trends.md b/data/reports/trends.md new file mode 100644 index 0000000..dc76431 --- /dev/null +++ b/data/reports/trends.md @@ -0,0 +1,72 @@ +# Category Trend Analysis +*Generated 2026-03-03 19:59 UTC — 361 drafts, 19 months, 19 categories* + +## Growth Summary + +| Category | Total | Last 3mo | Prev 3mo | Growth | +|----------|------:|---------:|---------:|-------:| +| A2A protocols | 120 | 58 | 54 | +7% | +| AI safety / guardrails / alignment | 1 | 1 | 0 | new | +| AI safety/alignment | 44 | 21 | 15 | +40% | +| Agent discovery / registration | 14 | 9 | 5 | +80% | +| Agent discovery/reg | 65 | 28 | 32 | -12% | +| Agent identity/auth | 108 | 46 | 51 | -10% | +| Agent-to-agent communication protocols | 16 | 11 | 5 | +120% | +| Autonomous netops | 93 | 38 | 40 | -5% | +| Autonomous network operations | 5 | 4 | 1 | +300% | +| Data formats / semantics for AI interop | 3 | 2 | 1 | +100% | +| Data formats/interop | 145 | 52 | 66 | -21% | +| Human-agent interaction | 30 | 9 | 17 | -47% | +| Identity / authentication for AI agents | 13 | 9 | 4 | +125% | +| ML traffic mgmt | 73 | 33 | 25 | +32% | +| ML-based traffic management / optimization | 1 | 1 | 0 | new | +| Model serving/inference | 42 | 22 | 14 | +57% | +| Other AI/agent | 26 | 13 | 9 | +44% | +| Policy / governance / ethical frameworks | 2 | 2 | 0 | new | +| Policy/governance | 91 | 42 | 31 | +35% | + +## Monthly Breakdown + +| Month | A2A protocols | AI safety / gua | AI safety/align | Agent discovery | Agent discovery | Agent identity/ | Agent-to-agent | Autonomous neto | Autonomous netw | Data formats / | Data formats/in | Human-agent int | Identity / auth | ML traffic mgmt | ML-based traffi | Model serving/i | Other AI/agent | Policy / govern | Policy/governan | Total | +|-------|---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | ---: | -----:| +| 2024-01 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 5 | +| 2024-02 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 2 | +| 2024-04 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 3 | +| 2024-09 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 3 | +| 2024-10 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 2 | +| 2024-12 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | +| 2025-01 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 0 | 0 | 4 | 0 | 2 | 0 | 0 | 0 | 8 | +| 2025-04 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 2 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 3 | 10 | +| 2025-05 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 5 | +| 2025-06 | 1 | 0 | 0 | 0 | 0 | 2 | 0 | 3 | 0 | 0 | 1 | 0 | 0 | 3 | 0 | 1 | 0 | 0 | 1 | 12 | +| 2025-07 | 2 | 0 | 2 | 0 | 1 | 2 | 0 | 0 | 0 | 0 | 2 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 11 | +| 2025-08 | 0 | 0 | 0 | 0 | 0 | 2 | 0 | 2 | 0 | 0 | 6 | 1 | 0 | 0 | 0 | 0 | 2 | 0 | 3 | 16 | +| 2025-09 | 4 | 0 | 4 | 0 | 3 | 3 | 0 | 6 | 0 | 0 | 11 | 1 | 0 | 4 | 0 | 1 | 0 | 0 | 6 | 43 | +| 2025-10 | 26 | 0 | 5 | 2 | 13 | 23 | 2 | 19 | 0 | 1 | 35 | 7 | 1 | 13 | 0 | 9 | 5 | 0 | 10 | 171 | +| 2025-11 | 26 | 0 | 7 | 2 | 16 | 21 | 3 | 17 | 1 | 0 | 25 | 9 | 2 | 9 | 0 | 4 | 2 | 0 | 15 | 159 | +| 2025-12 | 2 | 0 | 3 | 1 | 3 | 7 | 0 | 4 | 0 | 0 | 6 | 1 | 1 | 3 | 0 | 1 | 2 | 0 | 6 | 40 | +| 2026-01 | 13 | 0 | 8 | 7 | 8 | 14 | 9 | 12 | 4 | 2 | 15 | 2 | 4 | 7 | 1 | 5 | 4 | 1 | 13 | 129 | +| 2026-02 | 36 | 1 | 12 | 2 | 17 | 29 | 2 | 18 | 0 | 0 | 32 | 6 | 5 | 15 | 0 | 8 | 8 | 1 | 23 | 215 | +| 2026-03 | 9 | 0 | 1 | 0 | 3 | 3 | 0 | 8 | 0 | 0 | 5 | 1 | 0 | 11 | 0 | 9 | 1 | 0 | 6 | 57 | + +## Fastest Growing Categories (early vs late half) + +- **AI safety / guardrails / alignment**: new (0 -> 1 drafts) +- **Agent discovery / registration**: new (0 -> 14 drafts) +- **Agent-to-agent communication protocols**: new (0 -> 16 drafts) +- **Autonomous network operations**: new (0 -> 5 drafts) +- **Data formats / semantics for AI interop**: new (0 -> 3 drafts) +- **Identity / authentication for AI agents**: new (0 -> 13 drafts) +- **ML-based traffic management / optimization**: new (0 -> 1 drafts) +- **Policy / governance / ethical frameworks**: new (0 -> 2 drafts) +- **A2A protocols**: +11800% (1 -> 119 drafts) +- **Agent discovery/reg**: +6300% (1 -> 64 drafts) +- **Agent identity/auth**: +5200% (2 -> 106 drafts) +- **Human-agent interaction**: +2800% (1 -> 29 drafts) +- **Autonomous netops**: +2125% (4 -> 89 drafts) +- **AI safety/alignment**: +2000% (2 -> 42 drafts) +- **Data formats/interop**: +1871% (7 -> 138 drafts) +- **Other AI/agent**: +1100% (2 -> 24 drafts) +- **Policy/governance**: +1100% (7 -> 84 drafts) +- **Model serving/inference**: +850% (4 -> 38 drafts) +- **ML traffic mgmt**: +712% (8 -> 65 drafts) \ No newline at end of file diff --git a/docs/assets/style.css b/docs/assets/style.css new file mode 100644 index 0000000..2b2fbf8 --- /dev/null +++ b/docs/assets/style.css @@ -0,0 +1,162 @@ +:root { + --bg: #f5f7fa; + --card-bg: #ffffff; + --text: #1a1a2e; + --text-dim: #666; + --accent: #4a6cf7; + --accent-light: rgba(74,108,247,0.1); + --green: #10b981; + --orange: #f59e0b; + --red: #ef4444; + --border: #e5e7eb; + --shadow: 0 1px 4px rgba(0,0,0,0.08); + --radius: 10px; +} +* { margin: 0; padding: 0; box-sizing: border-box; } +body { + font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, sans-serif; + background: var(--bg); color: var(--text); + line-height: 1.5; +} +a { color: var(--accent); text-decoration: none; } +a:hover { text-decoration: underline; } + +/* Layout */ +.container { max-width: 1200px; margin: 0 auto; padding: 20px; } +.header { + background: var(--card-bg); border-bottom: 1px solid var(--border); + padding: 16px 0; margin-bottom: 24px; +} +.header .container { display: flex; align-items: center; justify-content: space-between; } +.header h1 { font-size: 1.3rem; } +.header nav { display: flex; gap: 20px; font-size: 0.9rem; } +.header nav a { color: var(--text-dim); font-weight: 500; } +.header nav a:hover, .header nav a.active { color: var(--accent); text-decoration: none; } + +/* Cards */ +.cards { display: grid; grid-template-columns: repeat(auto-fit, minmax(200px, 1fr)); gap: 16px; margin-bottom: 24px; } +.card { + background: var(--card-bg); border-radius: var(--radius); + padding: 20px; box-shadow: var(--shadow); +} +.card .label { font-size: 0.8rem; color: var(--text-dim); text-transform: uppercase; letter-spacing: 0.5px; } +.card .value { font-size: 2rem; font-weight: 700; margin-top: 4px; } +.card .sub { font-size: 0.8rem; color: var(--text-dim); margin-top: 4px; } + +/* Tables */ +.panel { + background: var(--card-bg); border-radius: var(--radius); + box-shadow: var(--shadow); overflow: hidden; margin-bottom: 24px; +} +.panel-header { padding: 16px 20px; border-bottom: 1px solid var(--border); font-weight: 600; } +table { width: 100%; border-collapse: collapse; } +th { + background: #f8f9fb; padding: 10px 12px; text-align: left; + font-size: 0.78rem; color: var(--text-dim); cursor: pointer; user-select: none; + white-space: nowrap; border-bottom: 2px solid var(--border); +} +th:hover { color: var(--accent); } +td { padding: 10px 12px; border-bottom: 1px solid #f0f0f0; font-size: 0.83rem; vertical-align: top; } +tr:hover { background: #fafbff; } + +/* Controls */ +.controls { + background: var(--card-bg); border-radius: var(--radius); + padding: 16px 20px; margin-bottom: 16px; box-shadow: var(--shadow); +} +.controls-row { display: flex; gap: 16px; align-items: center; flex-wrap: wrap; margin-bottom: 10px; } +.controls-row:last-child { margin-bottom: 0; } +.search-box { + flex: 1; min-width: 250px; padding: 8px 14px; + border: 1px solid var(--border); border-radius: 6px; + font-size: 0.9rem; outline: none; +} +.search-box:focus { border-color: var(--accent); box-shadow: 0 0 0 2px var(--accent-light); } +.slider-group { display: flex; align-items: center; gap: 6px; font-size: 0.8rem; color: var(--text-dim); } +.slider-group input[type=range] { width: 100px; cursor: pointer; } +.slider-val { font-weight: 600; min-width: 24px; text-align: center; } + +/* Chips */ +.chip-row { display: flex; flex-wrap: wrap; gap: 6px; } +.chip { + display: inline-block; padding: 3px 10px; border-radius: 12px; + font-size: 0.75rem; cursor: pointer; border: 1px solid var(--border); + background: var(--card-bg); transition: all 0.15s; user-select: none; +} +.chip.active { background: var(--accent); color: #fff; border-color: var(--accent); } +.chip:hover { border-color: var(--accent); } + +/* Badges */ +.score-badge { + display: inline-block; padding: 2px 8px; border-radius: 10px; + font-weight: 600; font-size: 0.8rem; +} +.score-high { background: #d4edda; color: #155724; } +.score-mid { background: #fff3cd; color: #856404; } +.score-low { background: #f8d7da; color: #721c24; } +.cat-badge { + display: inline-block; padding: 1px 7px; border-radius: 8px; + font-size: 0.68rem; margin: 1px 2px; background: #e8eaf6; color: #3949ab; +} +.source-badge { + display: inline-block; padding: 1px 7px; border-radius: 8px; + font-size: 0.68rem; margin: 1px 2px; +} +.source-ietf { background: #e3f2fd; color: #1565c0; } +.source-w3c { background: #fce4ec; color: #c62828; } + +/* Severity */ +.sev-critical { color: var(--red); font-weight: 600; } +.sev-high { color: var(--orange); font-weight: 600; } +.sev-medium { color: var(--text); } +.sev-low { color: var(--text-dim); } + +/* Bar */ +.bar { display: inline-block; height: 10px; border-radius: 3px; background: var(--accent); vertical-align: middle; } + +/* Detail */ +.detail-row td { padding: 12px 20px; background: #f8faff; } +.detail-grid { display: grid; grid-template-columns: 1fr 1fr; gap: 10px; max-width: 800px; } +.detail-item { font-size: 0.82rem; } +.detail-item strong { color: #333; } +.detail-item .note { color: var(--text-dim); font-size: 0.78rem; } +.summary-text { font-size: 0.82rem; color: #444; margin-top: 6px; line-height: 1.4; } + +/* Chart container */ +.chart-container { + background: var(--card-bg); border-radius: var(--radius); + box-shadow: var(--shadow); padding: 20px; margin-bottom: 24px; +} + +/* Gap cards */ +.gap-card { + background: var(--card-bg); border-radius: var(--radius); + border-left: 4px solid var(--accent); padding: 16px 20px; + box-shadow: var(--shadow); margin-bottom: 12px; +} +.gap-card h3 { font-size: 0.95rem; margin-bottom: 4px; } +.gap-card p { font-size: 0.83rem; color: var(--text-dim); margin-bottom: 4px; } +.gap-card .meta { font-size: 0.75rem; color: var(--text-dim); } +.gap-card.critical { border-left-color: var(--red); } +.gap-card.high { border-left-color: var(--orange); } + +.dim { font-size: 0.75rem; color: var(--text-dim); } +.clickable { cursor: pointer; } +.reset-btn { + padding: 4px 12px; border: 1px solid var(--border); border-radius: 6px; + background: var(--card-bg); cursor: pointer; font-size: 0.78rem; color: var(--text-dim); +} +.reset-btn:hover { border-color: var(--accent); color: var(--accent); } +.result-count { font-size: 0.85rem; color: var(--text-dim); margin: 10px 0 8px; } + +/* Timeline bars */ +.tl-bar { + display: inline-block; height: 16px; border-radius: 3px; + vertical-align: middle; min-width: 2px; +} + +@media (max-width: 768px) { + .cards { grid-template-columns: 1fr 1fr; } + .controls-row { flex-direction: column; align-items: stretch; } + .detail-grid { grid-template-columns: 1fr; } +} diff --git a/docs/data/drafts.json b/docs/data/drafts.json new file mode 100644 index 0000000..93b1381 --- /dev/null +++ b/docs/data/drafts.json @@ -0,0 +1,9558 @@ +[ + { + "name": "draft-cowles-volt", + "title": "Verifiable Operations Ledger and Trace (VOLT) Protocol", + "date": "2026-02-28", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-cowles-volt/", + "pages": 40, + "group": "individual", + "score": 4.85, + "novelty": 5, + "maturity": 5, + "overlap": 1, + "momentum": 4, + "relevance": 5, + "categories": [ + "AI safety/alignment", + "Data formats/interop", + "Policy/governance", + "Agent identity/auth" + ], + "summary": "Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptographic integrity. Provides privacy-first audit trails for agent operations.", + "novelty_note": "Highly novel approach to AI agent auditability and transparency", + "maturity_note": "Comprehensive 40-page specification with detailed technical design", + "overlap_note": "Unique focus on verifiable agent operation logging", + "momentum_note": "Addresses critical need for AI transparency and accountability", + "relevance_note": "Extremely relevant for trustworthy AI agent deployments", + "doc_status": "" + }, + { + "name": "draft-aylward-daap-v2", + "title": "Distributed AI Accountability Protocol (DAAP) Version 2.0", + "date": "2026-01-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-aylward-daap-v2/", + "pages": 18, + "group": "individual", + "score": 4.8, + "novelty": 5, + "maturity": 4, + "overlap": 1, + "momentum": 5, + "relevance": 5, + "categories": [ + "AI safety/alignment", + "Agent identity/auth", + "Policy/governance" + ], + "summary": "Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and remote control. Addresses AI safety through cryptographic identity verification and behavioral oversight.", + "novelty_note": "Comprehensive approach to critical AI safety and accountability challenges", + "maturity_note": "Well-developed protocol with detailed security and governance mechanisms", + "overlap_note": "Unique focus on comprehensive AI accountability and safety controls", + "momentum_note": "High urgency due to growing AI safety concerns and regulatory pressure", + "relevance_note": "Extremely relevant given current AI safety and governance discussions", + "doc_status": "" + }, + { + "name": "draft-guy-bary-stamp-protocol", + "title": "Secure Task-bound Agent Message Proof (STAMP) Protocol", + "date": "2025-11-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/", + "pages": 9, + "group": "individual", + "score": 4.65, + "novelty": 5, + "maturity": 4, + "overlap": 1, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "A2A protocols" + ], + "summary": "Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bound tokens and integrates with OAuth 2.0 and zero-trust principles.", + "novelty_note": "Novel cryptographic approach specifically designed for agent delegation and task binding", + "maturity_note": "Well-developed protocol specification with clear integration points", + "overlap_note": "Unique protocol design, minimal overlap with existing auth mechanisms", + "momentum_note": "Strong technical approach likely to attract security and auth working group attention", + "relevance_note": "Highly relevant for secure agent deployments and enterprise adoption", + "doc_status": "" + }, + { + "name": "draft-drake-email-tpm-attestation", + "title": "Hardware Attestation for Email Sender Verification", + "date": "2026-02-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/", + "pages": 25, + "group": "individual", + "score": 4.65, + "novelty": 5, + "maturity": 4, + "overlap": 1, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "Human-agent interaction" + ], + "summary": "Defines hardware attestation for email using TPM verification chains to prevent spam and provide Sybil resistance. Includes privacy-preserving SD-JWT alternative and broader applicability to other protocols.", + "novelty_note": "Highly novel approach connecting hardware attestation to email authentication and AI-resistant spam prevention", + "maturity_note": "Comprehensive specification with both full attestation and privacy-preserving variants", + "overlap_note": "Unique approach to hardware-based sender verification, no significant overlap", + "momentum_note": "Addresses critical AI-era challenge of distinguishing human-controlled from automated systems", + "relevance_note": "Extremely relevant for AI era where traditional spam/authentication mechanisms may fail", + "doc_status": "" + }, + { + "name": "draft-williams-netmod-lm-hierarchy-topology", + "title": "Hierarchical Topology for Language Model Coordination", + "date": "2026-02-11", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/", + "pages": 12, + "group": "individual", + "score": 4.65, + "novelty": 5, + "maturity": 4, + "overlap": 1, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "Agent identity/auth", + "Data formats/interop", + "Model serving/inference" + ], + "summary": "Defines YANG data model for hierarchical language model coordination across tiny, small, and large LMs in distributed inference scenarios. Includes secure messaging, request escalation, and pluggable trust models for edge-to-cloud AI deployments.", + "novelty_note": "Novel hierarchical LM coordination architecture with comprehensive security and trust mechanisms", + "maturity_note": "Well-structured YANG model with clear architecture but needs interoperability testing", + "overlap_note": "Unique approach to hierarchical LM coordination with formal data modeling", + "momentum_note": "Addresses critical need for distributed AI inference coordination", + "relevance_note": "Highly relevant for edge AI, federated inference, and multi-tier AI system coordination", + "doc_status": "" + }, + { + "name": "draft-ietf-lake-app-profiles", + "title": "Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)", + "date": "2025-11-21", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lake-app-profiles/", + "pages": 48, + "group": "individual", + "score": 4.6, + "novelty": 4, + "maturity": 5, + "overlap": 2, + "momentum": 5, + "relevance": 5, + "categories": [ + "Data formats/interop", + "Agent identity/auth" + ], + "summary": "Defines canonical CBOR representation for EDHOC application profiles and coordination mechanisms for their use. Establishes standardized way to describe, distribute, and store EDHOC parameters while defining well-known profiles for interoperability.", + "novelty_note": "High novelty in standardizing application profile coordination for lightweight protocols", + "maturity_note": "Very mature and comprehensive specification with detailed technical framework", + "overlap_note": "Unique approach to application profile coordination with minimal overlap", + "momentum_note": "Strong momentum from LAKE working group with broad industry interest", + "relevance_note": "Critical for EDHOC deployment and interoperability across various applications", + "doc_status": "" + }, + { + "name": "draft-goswami-agentic-jwt", + "title": "Secure Intent Protocol: JWT Compatible Agentic Identity and Workflow Management", + "date": "2026-01-01", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/", + "pages": 71, + "group": "individual", + "score": 4.55, + "novelty": 5, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "Policy/governance" + ], + "summary": "Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autonomous AI systems. Introduces cryptographic agent identity and workflow-aware token binding to solve intent-execution separation.", + "novelty_note": "Addresses fundamental new problem of intent-execution separation in AI agents", + "maturity_note": "Extensive 71-page specification with security analysis and validation", + "overlap_note": "Novel approach to OAuth extension with minimal overlap", + "momentum_note": "Addresses critical security needs for enterprise AI adoption", + "relevance_note": "Extremely relevant for secure autonomous agent deployment", + "doc_status": "" + }, + { + "name": "draft-chang-agent-token-efficient", + "title": "A Token-efficient Data Layer for Agentic Communication", + "date": "2026-01-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/", + "pages": 12, + "group": "individual", + "score": 4.55, + "novelty": 5, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Model serving/inference" + ], + "summary": "Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protocols. Introduces schema deduplication, adaptive fields, and retrieval-based selection.", + "novelty_note": "Highly novel approach to token efficiency problem, introduces concrete technical solutions with ADOL framework", + "maturity_note": "Well-developed technical solution with specific mechanisms and backward compatibility", + "overlap_note": "Addresses efficiency concerns not directly tackled by other agent communication drafts", + "momentum_note": "Solves real performance problem with practical implementation approach", + "relevance_note": "Extremely relevant as LLM token costs and context limits are major practical constraints", + "doc_status": "" + }, + { + "name": "draft-calabria-bmwg-ai-fabric-inference-bench", + "title": "Benchmarking Methodology for AI Inference Serving Network Fabrics", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/", + "pages": 40, + "group": "individual", + "score": 4.55, + "novelty": 4, + "maturity": 5, + "overlap": 1, + "momentum": 4, + "relevance": 5, + "categories": [ + "ML traffic mgmt", + "Model serving/inference", + "Other AI/agent" + ], + "summary": "Defines benchmarking methodology for AI inference network fabrics. Establishes KPIs and test procedures for evaluating fabric performance under realistic inference workloads.", + "novelty_note": "First comprehensive benchmarking framework for AI inference fabrics", + "maturity_note": "Extensive 40-page methodology with detailed test procedures and KPIs", + "overlap_note": "Unique benchmarking focus with minimal overlap to other drafts", + "momentum_note": "Addresses critical need for standardized AI fabric performance evaluation", + "relevance_note": "Essential for comparing and optimizing AI inference infrastructure", + "doc_status": "" + }, + { + "name": "draft-wang-cats-odsi", + "title": "An Open, Decentralized, and Scalable Framework for Large Language Model Inference", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-wang-cats-odsi/", + "pages": 30, + "group": "individual", + "score": 4.55, + "novelty": 5, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Model serving/inference", + "Agent identity/auth", + "Policy/governance" + ], + "summary": "Specifies framework for decentralized LLM inference across untrusted participants with layer-aware execution. Addresses openness, scalability, and security challenges in distributed AI inference.", + "novelty_note": "Novel approach to decentralized, trustless LLM inference with layer-aware coordination", + "maturity_note": "Substantial document with comprehensive framework though protocol details deferred", + "overlap_note": "Some conceptual overlap with IDN but focuses on decentralization and security", + "momentum_note": "Lengthy detailed document suggests significant development effort and commitment", + "relevance_note": "Addresses critical challenges in scalable, open AI infrastructure", + "doc_status": "" + }, + { + "name": "draft-birkholz-verifiable-agent-conversations", + "title": "Verifiable Agent Conversation Records", + "date": "2026-02-25", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/", + "pages": 51, + "group": "individual", + "score": 4.45, + "novelty": 4, + "maturity": 5, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "AI safety/alignment", + "Data formats/interop", + "Policy/governance" + ], + "summary": "Defines CDDL-based data format for verifiable agent conversation records using COSE signing. Supports accountability, compliance, and cross-vendor interoperability for agent interactions.", + "novelty_note": "Verifiable conversation records for agents is novel and addresses important trust concerns", + "maturity_note": "Comprehensive 51-page specification with detailed CDDL definitions shows high maturity", + "overlap_note": "Builds on existing standards but application to agent conversations is unique", + "momentum_note": "Established author with detailed specification suggests strong momentum", + "relevance_note": "Critical for agent accountability and regulatory compliance", + "doc_status": "" + }, + { + "name": "draft-aylward-aiga-2", + "title": "AI Governance and Accountability Protocol (AIGA)", + "date": "2026-01-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-aylward-aiga-2/", + "pages": 23, + "group": "individual", + "score": 4.45, + "novelty": 5, + "maturity": 3, + "overlap": 1, + "momentum": 4, + "relevance": 5, + "categories": [ + "AI safety/alignment", + "Policy/governance", + "Agent identity/auth" + ], + "summary": "Comprehensive AI governance framework with tiered risk model, federated authority network, and economic incentive alignment. Includes advanced security mechanisms for high-assurance scenarios.", + "novelty_note": "Highly novel integration of technical enforcement, economic incentives, and federated governance", + "maturity_note": "Ambitious scope with detailed mechanisms but implementation complexity may be challenging", + "overlap_note": "Unique comprehensive approach to AI governance with technical enforcement", + "momentum_note": "Addresses critical regulatory and safety concerns with strong technical foundation", + "relevance_note": "Extremely relevant given increasing focus on AI safety and regulatory compliance", + "doc_status": "" + }, + { + "name": "draft-ietf-tls-ecdhe-mlkem", + "title": "Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3", + "date": "2026-02-17", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/", + "pages": 12, + "group": "individual", + "score": 4.4, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 5, + "relevance": 5, + "categories": [ + "Other AI/agent" + ], + "summary": "Defines hybrid post-quantum key agreement mechanisms for TLS 1.3 that combine ML-KEM with traditional ECDHE. Provides quantum-resistant security while maintaining compatibility with existing elliptic curve cryptography.", + "novelty_note": "Post-quantum hybrid approach is relatively novel, combining established ECDHE with new ML-KEM standard", + "maturity_note": "Well-developed 12-page specification from IETF working group, ready for implementation", + "overlap_note": "Unique focus on TLS 1.3 post-quantum hybrids, minimal overlap with other drafts", + "momentum_note": "High momentum - post-quantum cryptography is critical priority with strong industry support", + "relevance_note": "Extremely relevant for future-proofing TLS against quantum computing threats", + "doc_status": "" + }, + { + "name": "draft-ietf-aipref-vocab", + "title": "A Vocabulary For Expressing AI Usage Preferences", + "date": "2025-12-01", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-aipref-vocab/", + "pages": 13, + "group": "individual", + "score": 4.4, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 5, + "relevance": 5, + "categories": [ + "Policy/governance", + "Data formats/interop", + "Human-agent interaction" + ], + "summary": "Defines a standardized vocabulary for expressing preferences about how digital assets should be used by automated processing systems. Allows declaration of restrictions or permissions for AI and other automated systems.", + "novelty_note": "Core vocabulary specification is novel approach to standardizing AI usage preferences", + "maturity_note": "Well-developed 13-page spec from IETF working group with clear scope", + "overlap_note": "Foundation vocabulary that other drafts build upon, minimal direct overlap", + "momentum_note": "Official IETF working group draft with recent publication date", + "relevance_note": "Highly relevant as foundational specification for emerging AI content governance needs", + "doc_status": "" + }, + { + "name": "draft-cui-nmrg-llm-benchmark", + "title": "A Framework to Evaluate LLM Agents for Network Configuration", + "date": "2025-12-30", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-benchmark/", + "pages": 25, + "group": "individual", + "score": 4.35, + "novelty": 4, + "maturity": 4, + "overlap": 1, + "momentum": 4, + "relevance": 5, + "categories": [ + "Autonomous netops", + "Policy/governance", + "Data formats/interop" + ], + "summary": "Provides comprehensive evaluation framework for LLM-based network configuration agents. Includes emulator environment, task suites, and multi-dimensional assessment metrics.", + "novelty_note": "First standardized benchmarking framework for LLM network agents", + "maturity_note": "Detailed framework with clear metrics and comprehensive evaluation approach", + "overlap_note": "No similar standardized benchmarking approaches identified", + "momentum_note": "Strong research interest in LLM network applications drives relevance", + "relevance_note": "Critical for advancing LLM network applications with standardized evaluation", + "doc_status": "" + }, + { + "name": "draft-ietf-anima-constrained-voucher", + "title": "Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/", + "pages": 93, + "group": "individual", + "score": 4.35, + "novelty": 4, + "maturity": 5, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Adapts BRSKI secure device onboarding for constrained IoT environments using CBOR vouchers and CoAP/DTLS. Enables zero-touch bootstrapping in resource-limited and lossy networks.", + "novelty_note": "Significant adaptation of BRSKI for constrained environments with new encoding and transport", + "maturity_note": "Comprehensive 93-page specification with detailed protocol adaptations and implementations", + "overlap_note": "Builds heavily on BRSKI but targets different deployment scenario", + "momentum_note": "IETF working group draft addressing growing IoT security bootstrapping needs", + "relevance_note": "Extremely relevant for IoT deployments requiring secure zero-touch onboarding", + "doc_status": "" + }, + { + "name": "draft-ietf-hpke-hpke", + "title": "Hybrid Public Key Encryption", + "date": "2025-11-04", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-hpke-hpke/", + "pages": 85, + "group": "individual", + "score": 4.3, + "novelty": 3, + "maturity": 5, + "overlap": 2, + "momentum": 5, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Comprehensive specification for hybrid public key encryption supporting arbitrary-sized plaintexts. Includes pre-shared key authentication and works with various KEM/KDF/AEAD combinations.", + "novelty_note": "Moderate novelty as hybrid encryption concept exists but comprehensive standardization adds value", + "maturity_note": "Mature IETF working group standard with extensive development and review", + "overlap_note": "Relatively unique comprehensive approach to hybrid PKE standardization", + "momentum_note": "Strong IETF momentum with wide industry interest and implementation", + "relevance_note": "Extremely relevant as fundamental cryptographic building block for modern protocols", + "doc_status": "" + }, + { + "name": "draft-mw-wimse-transitive-attestation", + "title": "Transitive Attestation for Sovereign Workloads: A WIMSE Profile", + "date": "2026-02-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mw-wimse-transitive-attestation/", + "pages": 11, + "group": "individual", + "score": 4.3, + "novelty": 5, + "maturity": 2, + "overlap": 2, + "momentum": 5, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "Policy/governance" + ], + "summary": "Defines WIMSE profile for cryptographically binding workload identities to their execution environment to prevent credential misuse. Addresses AI agent security concerns including prompt injection and cross-jurisdictional movement.", + "novelty_note": "Novel approach to workload identity portability with specific focus on AI agent security risks", + "maturity_note": "Early stage profile with dependencies on other draft specifications", + "overlap_note": "Builds on WIMSE framework but addresses unique AI agent security challenges", + "momentum_note": "Very high momentum due to urgent AI security needs and regulatory concerns", + "relevance_note": "Extremely relevant for AI agent deployment security and autonomous system integrity", + "doc_status": "" + }, + { + "name": "draft-wmz-nmrg-agent-ndt-arch", + "title": "Network Digital Twin and Agentic AI based Architecture for AI driven Network Operations", + "date": "2026-02-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/", + "pages": 37, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Autonomous netops", + "Model serving/inference", + "Policy/governance", + "Other AI/agent" + ], + "summary": "Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network operations. Provides detailed cookbook approach using existing technologies enhanced with new AI capabilities.", + "novelty_note": "Novel integration of NDT and Agentic AI for network operations", + "maturity_note": "Substantial 37-page document with detailed architectural components", + "overlap_note": "Unique focus on digital twin integration with agent architecture", + "momentum_note": "Strong momentum with comprehensive content and clear use cases", + "relevance_note": "highly relevant to current industry needs for AI-driven network automation", + "doc_status": "" + }, + { + "name": "draft-dhir-http-agent-profile", + "title": "HTTP Agent Profile (HAP): Authenticated and Monetized Agent Traffic on the Web", + "date": "2025-11-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-dhir-http-agent-profile/", + "pages": 13, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "ML traffic mgmt", + "Policy/governance", + "Human-agent interaction" + ], + "summary": "Defines HTTP Agent Profile for authenticating agent traffic, separating human from agent traffic, and enabling micropayments for content access. Addresses economic misalignment between content providers and AI systems.", + "novelty_note": "Novel integration of authentication, traffic separation, and micropayments for agent HTTP traffic", + "maturity_note": "Mature approach reusing existing HTTP features with clear deployment path", + "overlap_note": "Unique combination of authentication and monetization for agent traffic", + "momentum_note": "Addresses pressing real-world problems with practical deployment strategy", + "relevance_note": "Extremely relevant to current challenges with AI crawlers and web monetization", + "doc_status": "" + }, + { + "name": "draft-chen-oauth-rar-agent-extensions", + "title": "Policy and Lifecycle Extensions for OAuth Rich Authorization Requests", + "date": "2026-02-04", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chen-oauth-rar-agent-extensions/", + "pages": 9, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "A2A protocols", + "Policy/governance" + ], + "summary": "Extends OAuth RAR with policy_context and lifecycle_binding members for AI agent environments. Enables policy assurance levels and task-bound authorization lifetimes.", + "novelty_note": "Concrete extensions to established OAuth RAR standard, novel lifecycle binding concept", + "maturity_note": "Well-structured technical solution building on RFC 9396, includes specific implementation details", + "overlap_note": "Builds on OAuth RAR but addresses distinct AI agent requirements not covered elsewhere", + "momentum_note": "Strong technical foundation on established standard, clear implementation path", + "relevance_note": "Highly relevant for securing AI agent interactions with practical OAuth integration", + "doc_status": "" + }, + { + "name": "draft-aylward-aiga-1", + "title": "AI Governance and Accountability Protocol (AIGA)", + "date": "2025-11-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-aylward-aiga-1/", + "pages": 20, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Policy/governance", + "AI safety/alignment", + "Agent identity/auth" + ], + "summary": "Specifies AI Governance and Accountability Protocol with tiered risk-based governance model. Includes immutable kernel architecture and federated authority network for AI agent oversight.", + "novelty_note": "Comprehensive governance protocol specifically for autonomous AI agents", + "maturity_note": "Well-structured protocol specification with detailed mechanisms", + "overlap_note": "Novel AI governance approach, limited overlap with existing protocols", + "momentum_note": "Detailed technical specification suggests strong development momentum", + "relevance_note": "Critical for AI agent deployment in networked environments", + "doc_status": "" + }, + { + "name": "draft-mallick-muacp", + "title": "The Micro Agent Communication Protocol (uACP)", + "date": "2026-01-17", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mallick-muacp/", + "pages": 37, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "Data formats/interop" + ], + "summary": "Resource-efficient messaging protocol specifically designed for constrained IoT/Edge devices with deterministic bounds. Provides concrete technical specifications with OSCORE security integration.", + "novelty_note": "First protocol addressing resource constraints with specific bounds for agent communication", + "maturity_note": "Detailed technical specifications with clear resource bounds and security binding", + "overlap_note": "Unique focus on resource-constrained environments distinguishes from general protocols", + "momentum_note": "Strong technical foundation and clear market need for IoT agent communication", + "relevance_note": "Critical for IoT/Edge AI deployment which is rapidly expanding market segment", + "doc_status": "" + }, + { + "name": "draft-aap-oauth-profile", + "title": "Agent Authorization Profile (AAP) for OAuth 2.0", + "date": "2026-02-07", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-aap-oauth-profile/", + "pages": 83, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "Policy/governance" + ], + "summary": "Defines an OAuth 2.0 authorization profile specifically for autonomous AI agents, extending existing standards with structured claims for agent identity and context. Enables context-aware, auditable authorization in agent-to-API scenarios.", + "novelty_note": "Novel application of OAuth to AI agents with thoughtful extensions for autonomous systems", + "maturity_note": "Comprehensive 83-page specification with detailed technical mechanisms", + "overlap_note": "Some conceptual overlap with agent identity themes but distinct OAuth focus", + "momentum_note": "Strong relevance to enterprise AI deployment and security concerns", + "relevance_note": "Extremely relevant to current AI agent security and authorization challenges", + "doc_status": "" + }, + { + "name": "draft-gaikwad-llm-benchmarking-methodology", + "title": "Benchmarking Methodology for Large Language Model Serving", + "date": "2026-01-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-gaikwad-llm-benchmarking-methodology/", + "pages": 48, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Model serving/inference", + "Data formats/interop" + ], + "summary": "Defines comprehensive benchmarking methodologies for LLM inference serving systems including test procedures and measurement specifications. Companion to terminology document.", + "novelty_note": "Thorough methodology development for emerging LLM benchmarking needs", + "maturity_note": "Well-developed at 48 pages with detailed procedures and specifications", + "overlap_note": "Part of series but methodology focus is relatively unique", + "momentum_note": "Part of coordinated effort with multiple related drafts", + "relevance_note": "Critical for standardizing LLM performance evaluation across industry", + "doc_status": "" + }, + { + "name": "draft-ietf-sshm-mlkem-hybrid-kex", + "title": "PQ/T Hybrid Key Exchange with ML-KEM in SSH", + "date": "2026-02-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-sshm-mlkem-hybrid-kex/", + "pages": 15, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Data formats/interop" + ], + "summary": "Defines post-quantum hybrid key exchange combining ML-KEM with traditional ECDH for SSH transport layer. Provides quantum resistance while maintaining compatibility.", + "novelty_note": "Novel hybrid approach combining quantum-resistant and traditional crypto", + "maturity_note": "Well-developed IETF draft addressing critical post-quantum needs", + "overlap_note": "Part of broader post-quantum cryptography efforts but SSH-specific", + "momentum_note": "High momentum due to post-quantum migration urgency", + "relevance_note": "Critical for quantum-resistant SSH implementations", + "doc_status": "" + }, + { + "name": "draft-ietf-tls-extended-key-update", + "title": "Extended Key Update for Transport Layer Security (TLS) 1.3", + "date": "2026-02-19", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-tls-extended-key-update/", + "pages": 40, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Data formats/interop" + ], + "summary": "Adds post-compromise security to TLS 1.3 through fresh Diffie-Hellman exchanges during active sessions. Particularly valuable for long-lived connections in IoT and telecom environments.", + "novelty_note": "Significant security enhancement addressing post-compromise scenarios not covered by existing KeyUpdate", + "maturity_note": "Substantial 40-page specification with clear security motivation and detailed mechanism", + "overlap_note": "Extends TLS 1.3 in novel direction, minimal overlap with other key management approaches", + "momentum_note": "IETF working group draft addressing important security gap in long-lived sessions", + "relevance_note": "Critical security improvement for TLS, especially relevant for IoT and industrial applications", + "doc_status": "" + }, + { + "name": "draft-calabria-bmwg-ai-fabric-terminology", + "title": "Benchmarking Terminology for AI Network Fabrics", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-terminology/", + "pages": 30, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "ML traffic mgmt", + "Data formats/interop" + ], + "summary": "Defines comprehensive benchmarking terminology for AI network fabrics including collective communication primitives and RDMA transport mechanisms. Establishes vendor-neutral vocabulary for AI networking performance evaluation.", + "novelty_note": "Significant contribution to standardizing AI networking terminology", + "maturity_note": "Well-developed terminology framework with clear scope and references", + "overlap_note": "Extends existing benchmarking RFCs but focuses on new AI domain", + "momentum_note": "Strong foundation work that enables broader AI networking standardization", + "relevance_note": "Highly relevant as foundational work for AI infrastructure standardization", + "doc_status": "" + }, + { + "name": "draft-li-spring-rdma-multicast-over-srv6", + "title": "SRv6 Extensions for RDMA Multicast Delivery", + "date": "2026-03-01", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-spring-rdma-multicast-over-srv6/", + "pages": 17, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "ML traffic mgmt", + "A2A protocols" + ], + "summary": "Specifies SRv6 extensions for RDMA multicast delivery with new End.MT behavior and ACK/NACK aggregation procedures. Targets AI training parameter distribution and distributed storage scenarios.", + "novelty_note": "Novel combination of RDMA multicast semantics with SRv6 segment routing", + "maturity_note": "Detailed technical specification with clear protocol extensions", + "overlap_note": "Unique approach to RDMA multicast - limited overlap with existing work", + "momentum_note": "Addresses critical scalability needs for distributed AI workloads", + "relevance_note": "Highly relevant for large-scale AI training and inference deployment", + "doc_status": "" + }, + { + "name": "draft-song-tsvwg-camp", + "title": "Consistency-Aware Multipath Transport (CAMP) toward Interactive Multimodal LLM-Based Systems", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-song-tsvwg-camp/", + "pages": 15, + "group": "individual", + "score": 4.25, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "Human-agent interaction", + "ML traffic mgmt" + ], + "summary": "Proposes CAMP, a multipath transport protocol for interactive multimodal LLM systems that maintains consistency across different modalities. Builds on MPQUIC with specialized scheduling for audio, video, and text streams.", + "novelty_note": "First work addressing multipath consistency for multimodal LLM applications", + "maturity_note": "Comprehensive technical specification with detailed protocol design and mechanisms", + "overlap_note": "Builds on MPQUIC but addresses unique multimodal consistency challenges", + "momentum_note": "High momentum due to growing interactive LLM applications and multimodal AI systems", + "relevance_note": "Extremely relevant for emerging interactive AI applications requiring real-time multimodal delivery", + "doc_status": "" + }, + { + "name": "draft-narajala-ans", + "title": "Agent Name Service (ANS): A Universal Directory for Secure AI Agent Discovery and Interoperability", + "date": "2025-11-18", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-narajala-ans/", + "pages": 48, + "group": "individual", + "score": 4.2, + "novelty": 5, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent discovery/reg", + "Agent identity/auth", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Introduces Agent Name Service (ANS) as a DNS-based universal directory for AI agent discovery and verification. Uses PKI certificates for agent identity and supports multiple communication protocols through adapter layers.", + "novelty_note": "Comprehensive novel architecture addressing fundamental AI agent discovery and trust challenges", + "maturity_note": "Well-structured specification but complex system requiring significant implementation and deployment effort", + "overlap_note": "Some overlap with DNS and PKI concepts but unique application to AI agent ecosystem", + "momentum_note": "Addresses critical infrastructure need with potential for broad adoption if implementation challenges are overcome", + "relevance_note": "Extremely relevant as foundational infrastructure for multi-agent systems and AI agent interoperability", + "doc_status": "" + }, + { + "name": "draft-oauth-transaction-tokens-for-agents", + "title": "Transaction Tokens For Agents", + "date": "2026-02-11", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-oauth-transaction-tokens-for-agents/", + "pages": 13, + "group": "individual", + "score": 4.15, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Policy/governance", + "A2A protocols" + ], + "summary": "Extends OAuth Transaction Tokens framework to support agent context propagation with actor and principal fields. Enables granular access control for agent-based workloads.", + "novelty_note": "Novel extension addressing agent-specific authorization needs", + "maturity_note": "Well-developed with clear technical specifications", + "overlap_note": "Builds on existing OAuth framework but adds agent-specific elements", + "momentum_note": "Strong momentum with concrete technical approach", + "relevance_note": "Highly relevant for agent security and authorization", + "doc_status": "" + }, + { + "name": "draft-zhang-dmsc-mas-communication", + "title": "Security Analysis of Multi-agents Secured Communication and Limitations of Existing Protocols", + "date": "2026-01-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhang-dmsc-mas-communication/", + "pages": 8, + "group": "individual", + "score": 4.15, + "novelty": 4, + "maturity": 3, + "overlap": 1, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "AI safety/alignment", + "Agent identity/auth" + ], + "summary": "Analyzes security risks in multi-agent communication and limitations of existing protocols like TLS and HTTP. Establishes problem statement for agent-native security needs.", + "novelty_note": "Good analysis of agent-specific security challenges not well addressed by current protocols", + "maturity_note": "Solid problem analysis but lacks proposed solutions", + "overlap_note": "Unique security analysis perspective on agent communication", + "momentum_note": "Security analysis likely to generate significant community interest and discussion", + "relevance_note": "Very relevant as agent systems need security models beyond traditional web protocols", + "doc_status": "" + }, + { + "name": "draft-jewell-aibdp", + "title": "AI Boundary Declaration Protocol (AIBDP)", + "date": "2026-02-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jewell-aibdp/", + "pages": 6, + "group": "individual", + "score": 4.15, + "novelty": 5, + "maturity": 2, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Policy/governance", + "AI safety/alignment" + ], + "summary": "Defines AI Boundary Declaration Protocol for expressing content usage boundaries for AI systems. Provides machine-readable permissions and denials for AI training, indexing, and access.", + "novelty_note": "Highly novel approach to AI governance through declarative boundary protocols", + "maturity_note": "Short at 6 pages, appears early stage despite comprehensive scope claims", + "overlap_note": "Some conceptual overlap with robots.txt but significantly different focus on AI boundaries", + "momentum_note": "High relevance to current AI governance debates suggests good momentum potential", + "relevance_note": "Extremely relevant to current AI ethics and governance concerns", + "doc_status": "" + }, + { + "name": "draft-li-dmsc-macp", + "title": "Multi-agent Collaboration Protocol Suite", + "date": "2026-02-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-dmsc-macp/", + "pages": 21, + "group": "individual", + "score": 4.15, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Specifies a comprehensive multi-agent collaboration protocol suite using Agent Gateways for registration, authentication, and capability management. Enables scalable semantic interactions among distributed agents across heterogeneous networks.", + "novelty_note": "Comprehensive protocol suite with gateway architecture is well-conceived", + "maturity_note": "Substantial 21-page specification with detailed protocol design", + "overlap_note": "Overlaps with other agent communication protocols but more comprehensive", + "momentum_note": "Large document suggests significant development effort and potential industry interest", + "relevance_note": "Addresses core multi-agent collaboration needs with practical approach", + "doc_status": "" + }, + { + "name": "draft-gaikwad-llm-benchmarking-profiles", + "title": "Performance Benchmarking Profiles for Large Language Model Serving Systems", + "date": "2026-01-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-gaikwad-llm-benchmarking-profiles/", + "pages": 53, + "group": "individual", + "score": 4.15, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "Model serving/inference", + "Data formats/interop" + ], + "summary": "Defines performance benchmarking profiles binding terminology and methodology to concrete architectural roles and workload patterns. Specifies System Under Test boundaries and measurement points.", + "novelty_note": "Comprehensive profile definition for reproducible LLM benchmarking", + "maturity_note": "Highly mature at 53 pages with detailed architectural specifications", + "overlap_note": "Builds directly on companion methodology and terminology documents", + "momentum_note": "Strong momentum as part of comprehensive benchmarking framework", + "relevance_note": "Essential for standardized, comparable LLM performance evaluation", + "doc_status": "" + }, + { + "name": "draft-lake-pocero-authkem-ikr-edhoc", + "title": "KEM-based Authentication for EDHOC in Initiator-Known Responder (IKR) Scenarios", + "date": "2026-01-08", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-lake-pocero-authkem-ikr-edhoc/", + "pages": 26, + "group": "individual", + "score": 4.15, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth" + ], + "summary": "Specifies an optimized KEM-based authentication variant for EDHOC protocol in scenarios where the initiator knows the responder's credentials. Enables post-quantum authentication with only three messages while maintaining mutual authentication and forward secrecy.", + "novelty_note": "High novelty in optimizing post-quantum authentication for constrained environments with prior knowledge scenarios", + "maturity_note": "Well-developed technical specification building on established EDHOC framework", + "overlap_note": "Builds heavily on existing EDHOC work but provides distinct optimization", + "momentum_note": "Strong momentum from LAKE working group and post-quantum cryptography interest", + "relevance_note": "Highly relevant for IoT and constrained device security in post-quantum era", + "doc_status": "" + }, + { + "name": "draft-yao-tsvwg-cco-requirement-and-analysis", + "title": "Collective Communication Optimizations: Requirement and Analysis", + "date": "2025-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yao-tsvwg-cco-requirement-and-analysis/", + "pages": 15, + "group": "individual", + "score": 4.15, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "ML traffic mgmt", + "Model serving/inference" + ], + "summary": "Analyzes collective communication optimizations for AI training and inference clusters built on RDMA. Examines network-assisted collective acceleration approaches and identifies gaps with current IETF standards like iWARP.", + "novelty_note": "Detailed analysis of network optimization needs specific to AI workloads", + "maturity_note": "Comprehensive analysis with clear requirements and technical depth", + "overlap_note": "Some overlap with HPC networking but specific AI workload focus", + "momentum_note": "Strong momentum due to massive AI infrastructure investments", + "relevance_note": "Extremely relevant as AI model sizes and training requirements continue growing", + "doc_status": "" + }, + { + "name": "draft-cui-dns-native-agent-naming-resolution", + "title": "DNS-Native AI Agent Naming and Resolution", + "date": "2025-12-22", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-cui-dns-native-agent-naming-resolution/", + "pages": 26, + "group": "individual", + "score": 4.1, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent discovery/reg", + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Specifies DNS-native naming and resolution for AI agents using FQDNs and SVCB records. Emphasizes DNS as authoritative source with graceful degradation for legacy clients.", + "novelty_note": "Creative use of existing DNS infrastructure for agent discovery and identity", + "maturity_note": "Comprehensive 26-page specification with detailed technical design", + "overlap_note": "Unique DNS-based approach with minimal overlap to other agent work", + "momentum_note": "Leverages proven DNS infrastructure but requires adoption momentum", + "relevance_note": "Extremely relevant for scalable agent ecosystems and internet integration", + "doc_status": "" + }, + { + "name": "draft-liu-agent-operation-authorization", + "title": "Agent Operation Authorization", + "date": "2025-11-25", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-agent-operation-authorization/", + "pages": 15, + "group": "individual", + "score": 4.05, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "Human-agent interaction", + "Policy/governance" + ], + "summary": "Specifies framework for verifiable delegation of actions from humans to AI agents using JWT tokens. Provides fine-grained authorization with cryptographic verification and audit trails.", + "novelty_note": "Novel two-phase authorization framework with human-readable proposals and verifiable tokens", + "maturity_note": "Well-defined JWT-based approach but may need refinement for complex authorization scenarios", + "overlap_note": "Specific focus on human-to-agent authorization delegation is relatively unique", + "momentum_note": "Addresses critical trust and safety concerns with practical cryptographic approach", + "relevance_note": "Highly relevant for safe agent deployment and preventing unauthorized actions", + "doc_status": "" + }, + { + "name": "draft-yue-anima-agent-recovery-networks", + "title": "Task-Oriented Multi-Agent Recovery Framework for High-Reliability in Converged Mobile Networks", + "date": "2026-02-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/", + "pages": 11, + "group": "individual", + "score": 4.05, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Policy/governance" + ], + "summary": "Defines task-oriented multi-agent framework for fault recovery in converged mobile networks. Targets 5G/6G deployments like MOCN and SNPN where centralized management is insufficient.", + "novelty_note": "Novel application of multi-agent systems to specific mobile network recovery challenges", + "maturity_note": "Domain-specific approach with clear use cases but implementation details need development", + "overlap_note": "Unique focus on mobile network recovery though shares general multi-agent concepts", + "momentum_note": "5G/6G network complexity drives strong industry need for automated recovery solutions", + "relevance_note": "Extremely relevant as mobile networks become more complex and require autonomous management", + "doc_status": "" + }, + { + "name": "draft-cui-nmrg-llm-nm", + "title": "A Framework for LLM Agent-Assisted Network Management with Human-in-the-Loop", + "date": "2025-10-19", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/", + "pages": 21, + "group": "individual", + "score": 4.05, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Human-agent interaction", + "Autonomous netops", + "ML traffic mgmt", + "AI safety/alignment" + ], + "summary": "Defines framework for collaborative network management between LLM agents and human operators. Introduces enhanced telemetry, decision modules, and human-in-the-loop workflows.", + "novelty_note": "Novel application of LLMs to network management with structured human-agent collaboration", + "maturity_note": "Comprehensive framework but likely early stage given emerging nature of LLM integration", + "overlap_note": "Some overlap with general AI/ML network management but specific LLM focus is distinctive", + "momentum_note": "High current interest in LLM applications and network automation convergence", + "relevance_note": "Extremely relevant given industry focus on AI-assisted network operations", + "doc_status": "" + }, + { + "name": "draft-schulze-ecap", + "title": "The Ethical Crawler Agreement Protocol (ECAP)", + "date": "2025-12-10", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-schulze-ecap/", + "pages": 3, + "group": "individual", + "score": 4.05, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Policy/governance", + "Agent identity/auth", + "AI safety/alignment" + ], + "summary": "ECAP defines a cryptographically-verified protocol for web crawlers to obtain consent from hosts before accessing resources. It replaces voluntary robots.txt with mandatory consent-based access using signatures and policy handshakes.", + "novelty_note": "Novel approach to making web crawling consent mandatory rather than voluntary, using crypto verification", + "maturity_note": "Basic protocol structure defined but likely needs more detail on implementation and edge cases", + "overlap_note": "Some conceptual overlap with robots.txt but fundamentally different approach with crypto verification", + "momentum_note": "High relevance to current AI scraping debates and web consent issues", + "relevance_note": "Extremely relevant to current controversies around AI training data collection and web scraping ethics", + "doc_status": "" + }, + { + "name": "draft-nederveld-adl", + "title": "Agent Definition Language (ADL)", + "date": "2026-02-18", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-nederveld-adl/", + "pages": 53, + "group": "individual", + "score": 4.05, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Data formats/interop", + "Agent discovery/reg", + "A2A protocols" + ], + "summary": "Defines ADL, a JSON-based standard for describing AI agents including their capabilities, tools, permissions, and configuration. Enables agent discovery, interoperability, and lifecycle management across platforms.", + "novelty_note": "Novel standardized approach to agent description with comprehensive metadata coverage", + "maturity_note": "Well-structured spec but lacks implementation examples and ecosystem validation", + "overlap_note": "Some overlap with agent identity/discovery concepts but unique in comprehensive agent description approach", + "momentum_note": "Strong potential for adoption as foundational agent metadata standard", + "relevance_note": "Critical infrastructure piece for agent ecosystem interoperability and management", + "doc_status": "" + }, + { + "name": "draft-mw-spice-actor-chain", + "title": "Cryptographically Verifiable Actor Chain for OAuth 2.0 Token Exchange", + "date": "2026-02-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mw-spice-actor-chain/", + "pages": 21, + "group": "individual", + "score": 4.05, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "A2A protocols" + ], + "summary": "Extends OAuth 2.0 Token Exchange with cryptographically verifiable actor chains to provide tamper-evident audit trails of delegation paths. Addresses security gaps in multi-hop service environments, particularly for AI agent-to-agent workloads vulnerable to prompt injection attacks.", + "novelty_note": "Novel approach to cryptographic delegation auditability in OAuth, specifically addressing AI agent prompt injection vulnerabilities", + "maturity_note": "Well-structured extension to established OAuth 2.0 framework with clear security motivations", + "overlap_note": "Builds on OAuth 2.0 Token Exchange but addresses previously unaddressed delegation auditability gaps", + "momentum_note": "High relevance given growing AI agent deployments and security concerns around delegation chains", + "relevance_note": "Directly addresses critical security needs for AI agent authentication and delegation tracking", + "doc_status": "" + }, + { + "name": "draft-spm-lake-pqsuites", + "title": "Quantum-Resistant Cipher Suites for EDHOC", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-spm-lake-pqsuites/", + "pages": 8, + "group": "individual", + "score": 4.05, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth" + ], + "summary": "Defines quantum-resistant cipher suites for EDHOC using ML-DSA signatures and ML-KEM key exchange. Specifies post-quantum operation for both signature and PSK authentication methods.", + "novelty_note": "First comprehensive PQ cipher suite definition for EDHOC", + "maturity_note": "Concise but technically sound specification", + "overlap_note": "Unique focus on EDHOC post-quantum adaptation", + "momentum_note": "Strong momentum due to LAKE working group activity", + "relevance_note": "Critical for post-quantum IoT security infrastructure", + "doc_status": "" + }, + { + "name": "draft-jadoon-nmrg-agentic-ai-autonomous-networks", + "title": "Agentic AI Architectural Principles for Autonomous Computer Networks", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jadoon-nmrg-agentic-ai-autonomous-networks/", + "pages": 12, + "group": "individual", + "score": 4.05, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Policy/governance" + ], + "summary": "Introduces architectural principles for integrating AI agents into IP protocol stack layers while preserving deterministic protocol behavior. Proposes agent controllers for cross-layer coordination.", + "novelty_note": "Novel approach to layered agentic augmentation of existing protocols", + "maturity_note": "12-page research document with solid architectural thinking", + "overlap_note": "Unique approach to protocol stack integration", + "momentum_note": "Strong conceptual foundation for research community discussion", + "relevance_note": "Highly relevant as foundational architecture for agentic networking", + "doc_status": "" + }, + { + "name": "draft-chen-nmrg-semantic-inference-routing", + "title": "Semantic Inference Routing Protocol (SIRP)", + "date": "2025-10-01", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chen-nmrg-semantic-inference-routing/", + "pages": 12, + "group": "individual", + "score": 4.05, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Model serving/inference", + "ML traffic mgmt", + "Autonomous netops" + ], + "summary": "Defines SIRP protocol for content-aware routing of AI inference requests. Enables routing decisions based on semantic analysis rather than just client metadata.", + "novelty_note": "Novel semantic content analysis approach for inference routing", + "maturity_note": "12-page specification with concrete protocol framework", + "overlap_note": "Unique semantic routing approach with minimal overlap", + "momentum_note": "Addresses critical inference routing challenges with technical depth", + "relevance_note": "Extremely relevant for optimizing distributed AI inference systems", + "doc_status": "" + }, + { + "name": "draft-steele-agent-considerations", + "title": "Agent Considerations", + "date": "2025-11-05", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-steele-agent-considerations/", + "pages": 16, + "group": "individual", + "score": 4.05, + "novelty": 5, + "maturity": 3, + "overlap": 1, + "momentum": 3, + "relevance": 4, + "categories": [ + "Data formats/interop", + "Policy/governance", + "Human-agent interaction" + ], + "summary": "Defines guidelines for IETF specifications to support AI agent consumption and code generation. Introduces Agent Consideration sections with agentcards and implementation guidance.", + "novelty_note": "Highly novel meta-approach to specification design for AI agents", + "maturity_note": "Comprehensive framework but still developing implementation details", + "overlap_note": "Unique approach to specification methodology", + "momentum_note": "Moderate momentum, addressing emerging need", + "relevance_note": "Very relevant for future IETF specification development", + "doc_status": "" + }, + { + "name": "draft-chen-nmrg-multi-provider-inference-api", + "title": "Multi-Provider Extensions for Agentic AI Inference APIs", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chen-nmrg-multi-provider-inference-api/", + "pages": 44, + "group": "individual", + "score": 4.05, + "novelty": 3, + "maturity": 5, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "Model serving/inference", + "Data formats/interop", + "Policy/governance" + ], + "summary": "Specifies extensions for multi-provider AI inference using OpenAI API as reference standard. Enables provider diversity, load balancing, and failover while maintaining backward compatibility.", + "novelty_note": "Extends existing OpenAI API standard for multi-provider scenarios", + "maturity_note": "Comprehensive 44-page specification with detailed technical content", + "overlap_note": "Some overlap with inference serving concepts but unique multi-provider focus", + "momentum_note": "Addresses practical multi-provider challenges with mature specification", + "relevance_note": "Highly relevant for preventing vendor lock-in in AI inference deployments", + "doc_status": "" + }, + { + "name": "draft-mishra-oauth-agent-grants", + "title": "Delegated Agent Authorization Protocol (DAAP)", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mishra-oauth-agent-grants/", + "pages": 27, + "group": "individual", + "score": 4.0, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Policy/governance", + "Human-agent interaction" + ], + "summary": "Extends OAuth 2.0 for AI agent authorization with human consent verification, revocation, and audit trails. Uses DIDs for agent identity and provides multi-agent delegation capabilities.", + "novelty_note": "Agent-specific OAuth extension with DID integration and cascade revocation is novel", + "maturity_note": "Well-developed 27-page specification with clear protocol definitions", + "overlap_note": "Extends OAuth 2.0 but agent-specific features reduce overlap", + "momentum_note": "Addresses clear market need but adoption uncertain", + "relevance_note": "Essential for secure agent authorization in production systems", + "doc_status": "" + }, + { + "name": "draft-ietf-lisp-nexagon", + "title": "Geo-Intelligence Network Based On H3 and LISP", + "date": "2025-09-23", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lisp-nexagon/", + "pages": 21, + "group": "individual", + "score": 4.0, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Combines LISP with H3 spatial indexing to create geospatial intelligence network for physical-world applications. Enables distributed agents to report, aggregate, and disseminate location-based state information for transportation and logistics.", + "novelty_note": "Creative combination of LISP routing with H3 geospatial indexing for agent networks", + "maturity_note": "Well-developed protocol specification with clear technical foundation", + "overlap_note": "Builds on LISP and H3 but novel combination for agent-based geospatial applications", + "momentum_note": "IETF working group adoption indicates strong momentum and community support", + "relevance_note": "Highly relevant for location-aware autonomous systems and IoT agent deployments", + "doc_status": "" + }, + { + "name": "draft-barney-caam", + "title": "Contextual Agent Authorization Mesh (CAAM)", + "date": "2026-02-25", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-barney-caam/", + "pages": 33, + "group": "individual", + "score": 4.0, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Policy/governance", + "A2A protocols", + "AI safety/alignment" + ], + "summary": "Specifies Contextual Agent Authorization Mesh for runtime authorization of agents after discovery, providing ReBAC and purpose-bound delegation. Integrates with ARDP, SPIFFE, and RATS for comprehensive agent authorization framework.", + "novelty_note": "Comprehensive authorization framework specifically designed for agent interactions with novel contextual authorization approach", + "maturity_note": "Detailed technical specification with good integration of multiple existing frameworks", + "overlap_note": "Builds on existing identity and authorization work but creates novel composition for agent scenarios", + "momentum_note": "References multiple existing frameworks suggesting some industry alignment", + "relevance_note": "Extremely relevant as authorization is critical for safe agent deployment and inter-agent interaction", + "doc_status": "" + }, + { + "name": "draft-nennemann-wimse-ect", + "title": "Execution Context Tokens for Distributed Agentic Workflows", + "date": "2026-02-25", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/", + "pages": 23, + "group": "individual", + "score": 4.0, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "A2A protocols", + "Policy/governance", + "Data formats/interop" + ], + "summary": "Defines Execution Context Tokens as JWT extension to WIMSE for tracking task execution in distributed agentic workflows. Creates DAG-linked execution records transported via new HTTP header alongside WIMSE identity headers.", + "novelty_note": "Novel approach to workflow execution tracking with cryptographic linking of task dependencies", + "maturity_note": "Well-specified extension to existing WIMSE work with clear technical details", + "overlap_note": "Extends WIMSE but addresses unique workflow tracking problem not covered elsewhere", + "momentum_note": "Builds on active WIMSE working group with established momentum", + "relevance_note": "Highly relevant for distributed agent workflows and auditability of agent task execution", + "doc_status": "" + }, + { + "name": "draft-jennings-ai-mcp-over-moq", + "title": "Model Context Protocol and Agent Skills over Media over QUIC Transport", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jennings-ai-mcp-over-moq/", + "pages": 37, + "group": "individual", + "score": 4.0, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Model serving/inference" + ], + "summary": "Defines how to transport Model Context Protocol (MCP) messages over Media over QUIC Transport (MOQT) for AI agent communication. Focuses on efficient delivery of agent skills with progressive loading and caching.", + "novelty_note": "Novel combination of MCP and MOQT with emphasis on agent skills delivery", + "maturity_note": "Well-structured 37-page specification with detailed transport mappings", + "overlap_note": "Some overlap with general agent communication but unique transport focus", + "momentum_note": "Strong technical foundation building on established protocols", + "relevance_note": "High relevance for scalable AI agent communication infrastructure", + "doc_status": "" + }, + { + "name": "draft-dunbar-neotec-ac-te-applicability", + "title": "Applying Attachmet Circuit and Traffic Engineering YANG Data Model to Edge AI Use Case", + "date": "2025-06-23", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-dunbar-neotec-ac-te-applicability/", + "pages": 26, + "group": "individual", + "score": 3.95, + "novelty": 4, + "maturity": 4, + "overlap": 1, + "momentum": 3, + "relevance": 4, + "categories": [ + "Model serving/inference", + "Data formats/interop", + "ML traffic mgmt" + ], + "summary": "Applies existing IETF YANG models for Attachment Circuits and Traffic Engineering to dynamic AI model placement at edge sites. Evaluates model applicability for AI inference use cases with specific network performance requirements.", + "novelty_note": "Novel application of existing YANG models to AI placement, practical approach to leveraging current standards", + "maturity_note": "Well-developed technical approach with concrete YANG model applications and gap analysis", + "overlap_note": "Unique focus on applying existing YANG models to AI placement scenarios", + "momentum_note": "Specific technical approach with practical implementation path", + "relevance_note": "Highly relevant for operators needing to integrate AI services with existing network management", + "doc_status": "" + }, + { + "name": "draft-han-anima-ai-asa", + "title": "Considerations of AI-powered Autonomic Service Agent Communication", + "date": "2026-01-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-han-anima-ai-asa/", + "pages": 8, + "group": "individual", + "score": 3.95, + "novelty": 4, + "maturity": 2, + "overlap": 1, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "Autonomous netops", + "AI safety/alignment" + ], + "summary": "Analyzes the impact of enhancing ANIMA's Autonomic Service Agents with AI/LLM capabilities, focusing on communication protocol considerations. Explores how AI-powered ASAs could elevate network management intelligence.", + "novelty_note": "First to systematically consider AI/LLM integration with ANIMA ASA architecture", + "maturity_note": "Early analysis phase with conceptual considerations rather than concrete solutions", + "overlap_note": "Unique focus on AI-enhanced autonomic service agents", + "momentum_note": "High relevance to current AI networking trends and ANIMA evolution", + "relevance_note": "Directly addresses AI-powered autonomous network operations and agent communication", + "doc_status": "" + }, + { + "name": "draft-liao-aipref-autoctl-core", + "title": "Protocol for Automation Control", + "date": "2025-11-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liao-aipref-autoctl-core/", + "pages": 11, + "group": "individual", + "score": 3.95, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "ML traffic mgmt", + "Policy/governance" + ], + "summary": "Defines core machine-readable protocol for server-side automation permissions targeting AI-driven web automation. Builds on RFC9309 with file formats, HTTP method restrictions, and purpose requirements.", + "novelty_note": "Addresses emerging AI automation control needs with structured protocol approach", + "maturity_note": "Core specification appears reasonably complete with clear scope and structure", + "overlap_note": "Overlaps with RFC9309 and AI preference space but defines distinct core protocol", + "momentum_note": "Recent timestamp and companion extension draft suggest strong momentum", + "relevance_note": "Highly relevant core protocol for managing AI-driven automation interactions", + "doc_status": "" + }, + { + "name": "draft-ainp-protocol", + "title": "AI-Native Network Protocol (AINP) for Semantic Agent Communication", + "date": "2025-11-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ainp-protocol/", + "pages": 17, + "group": "individual", + "score": 3.95, + "novelty": 5, + "maturity": 2, + "overlap": 1, + "momentum": 2, + "relevance": 5, + "categories": [ + "A2A protocols", + "Agent discovery/reg" + ], + "summary": "Defines semantic communication protocol for AI agents using intent-based routing and negotiation. Replaces location-based networking with capability-based agent discovery.", + "novelty_note": "Novel semantic routing and intent exchange paradigm for AI agents", + "maturity_note": "Early version 0.1 specification with only 17 pages of detail", + "overlap_note": "Unique approach to AI agent communication protocols", + "momentum_note": "Individual submission without clear working group adoption", + "relevance_note": "Directly addresses core AI agent networking and communication needs", + "doc_status": "" + }, + { + "name": "draft-ietf-lake-authz", + "title": "Lightweight Authorization using Ephemeral Diffie-Hellman Over COSE (ELA)", + "date": "2025-11-21", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lake-authz/", + "pages": 48, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Agent discovery/reg" + ], + "summary": "Specifies lightweight authorization using EDHOC for zero-touch device onboarding. Enables secure enrollment of new devices in constrained networks using manufacturer-installed trust anchors.", + "novelty_note": "Novel application of EDHOC for zero-touch onboarding scenarios", + "maturity_note": "Substantial 48-page specification with detailed authorization procedures", + "overlap_note": "Overlaps with other EDHOC drafts but focuses on specific authorization use case", + "momentum_note": "Strong momentum driven by IoT device deployment needs", + "relevance_note": "Highly relevant for automated device provisioning and IoT security", + "doc_status": "" + }, + { + "name": "draft-ietf-ace-coap-est-oscore", + "title": "Protecting EST Payloads with OSCORE", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-ace-coap-est-oscore/", + "pages": 23, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Specifies carrying EST certificate provisioning over CoAP using OSCORE protection instead of DTLS. Builds on EST-coaps but uses OSCORE and EDHOC for constrained environments.", + "novelty_note": "Significant adaptation of EST for constrained IoT environments", + "maturity_note": "Well-developed IETF working group draft with comprehensive specification", + "overlap_note": "Some overlap with existing EST and CoAP security work", + "momentum_note": "Strong momentum as official IETF working group item", + "relevance_note": "High relevance for IoT certificate management", + "doc_status": "" + }, + { + "name": "draft-zhang-rtgwg-multicast-requirements-gaps-aidc", + "title": "Requirements and Gap Analysis of Multicast in AI Data Centers", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhang-rtgwg-multicast-requirements-gaps-aidc/", + "pages": 11, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 1, + "momentum": 4, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Model serving/inference" + ], + "summary": "Identifies requirements for multicast technology in AI Data Centers to improve efficiency of point-to-multipoint data transmission during model training and inference. Analyzes gaps between current multicast capabilities and AIDC needs.", + "novelty_note": "First systematic analysis of multicast requirements specifically for AI datacenter workloads", + "maturity_note": "Requirements analysis is solid but gaps analysis needs validation against real deployments", + "overlap_note": "Unique focus on multicast for AI datacenters", + "momentum_note": "Strong relevance to scaling AI training and inference infrastructure", + "relevance_note": "Critical for efficient AI model training and distributed inference at scale", + "doc_status": "" + }, + { + "name": "draft-nandakumar-agent-sd-jwt", + "title": "Selective Disclosure for Agent Discovery and Identity Management (SD- Agent)", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-nandakumar-agent-sd-jwt/", + "pages": 31, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent discovery/reg", + "Agent identity/auth", + "A2A protocols" + ], + "summary": "This draft defines SD-Card, a Selective Disclosure JWT encoding of Agent Cards that enables privacy-preserving agent discovery by allowing agents to selectively reveal capabilities, contact information, and metadata based on context while maintaining cryptographic integrity and preventing correlation across interactions.", + "novelty_note": "Novel application of SD-JWT to agent discovery, addressing real privacy and security gaps in A2A protocols", + "maturity_note": "Well-structured draft with detailed examples and processes, but appears to be early revision with some incomplete sections", + "overlap_note": "Builds on SD-JWT (RFC) and references A2A-SPEC, but creates new application domain rather than duplicating existing work", + "momentum_note": "Authors from Cisco with networking expertise, revision 01 indicates active development, but no clear WG adoption signals", + "relevance_note": "Directly addresses critical needs for AI agent networking: privacy-preserving discovery, authentication, and selective capability disclosure", + "doc_status": "" + }, + { + "name": "draft-wahl-scim-agent-schema", + "title": "System for Cross-domain Identity Management: Agentic Identity Schema", + "date": "2026-02-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-wahl-scim-agent-schema/", + "pages": 13, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Agent discovery/reg" + ], + "summary": "This draft extends the SCIM (System for Cross-domain Identity Management) protocol to support AI agent identities, defining a JSON schema for representing, provisioning, and managing agent identities in cloud services. It enables agents to be authenticated and authorized through existing SCIM infrastructure, including OAuth token exchange support.", + "novelty_note": "Novel application of SCIM to AI agents - existing SCIM is for human users only", + "maturity_note": "Well-structured draft with detailed schema but appears truncated and is informational status", + "overlap_note": "Builds on SCIM RFCs 7643/7644 and OAuth RFCs 6749/8693 but extends to new domain", + "momentum_note": "Microsoft author with SCIM expertise, but unclear WG adoption status for this extension", + "relevance_note": "Directly addresses critical need for agent identity management as AI systems scale", + "doc_status": "" + }, + { + "name": "draft-agent-gw", + "title": "Agent Communication Gateway for Semantic Routing and Working Memory", + "date": "2026-02-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-agent-gw/", + "pages": 8, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Proposes an Intelligent Agent Communication Gateway for large-scale multi-agent collaboration. Features semantic routing, working memory, and protocol adaptation mechanisms.", + "novelty_note": "Comprehensive gateway architecture with semantic routing and working memory is quite novel", + "maturity_note": "Good architectural overview but implementation details appear limited", + "overlap_note": "Some overlap with general gateway concepts but agent-specific features are unique", + "momentum_note": "Solid architectural vision but unclear community adoption", + "relevance_note": "Addresses critical infrastructure needs for multi-agent systems", + "doc_status": "" + }, + { + "name": "draft-mp-agntcy-ads", + "title": "Agent Directory Service", + "date": "2026-02-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mp-agntcy-ads/", + "pages": 31, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent discovery/reg", + "Data formats/interop", + "A2A protocols" + ], + "summary": "Describes Agent Directory Service for storing and discovering AI agent metadata based on skills. Features distributed directories with content-routing protocol for agent discovery.", + "novelty_note": "First comprehensive directory service specifically designed for AI agent discovery", + "maturity_note": "Good conceptual framework but needs more protocol specification detail", + "overlap_note": "Unique approach to agent discovery, minimal overlap with existing directory services", + "momentum_note": "Agent discovery is important problem but early stage development", + "relevance_note": "Extremely relevant for AI agent ecosystem scalability and interoperability", + "doc_status": "" + }, + { + "name": "draft-rosenberg-aiproto-cheq", + "title": "CHEQ: A Protocol for Confirmation AI Agent Decisions with Human in the Loop (HITL)", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-cheq/", + "pages": 15, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "Human-agent interaction", + "AI safety/alignment", + "A2A protocols" + ], + "summary": "Proposes CHEQ protocol for human confirmation of AI agent decisions before execution. Protects against AI hallucinations while preserving human privacy in tool invocation.", + "novelty_note": "Novel approach to human-in-the-loop validation with privacy protection", + "maturity_note": "Well-defined protocol with integration points but needs more technical detail", + "overlap_note": "Unique focus on decision confirmation, complements but doesn't overlap existing protocols", + "momentum_note": "Addresses critical safety concern with clear integration path", + "relevance_note": "Essential safety mechanism for AI agent deployment in production environments", + "doc_status": "" + }, + { + "name": "draft-zeng-opsawg-llm-netconf-gap", + "title": "Gap Analysis of Network Configuration Protocols in LLM-Driven Intent-Based Networking", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zeng-opsawg-llm-netconf-gap/", + "pages": 9, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Analyzes gaps in existing network configuration protocols for LLM-driven intent-based networking. Identifies extension points for NETCONF, RESTCONF, gNMI, MCP, and A2A protocols.", + "novelty_note": "First systematic analysis of protocol gaps for LLM-driven network operations", + "maturity_note": "Good analysis depth but early stage without concrete solutions", + "overlap_note": "Unique focus on LLM-network protocol integration gaps", + "momentum_note": "Operations working group submission with clear problem focus", + "relevance_note": "Highly relevant for AI-driven network management evolution", + "doc_status": "" + }, + { + "name": "draft-akhavain-moussa-ai-network", + "title": "AI Network for Training, Inference, and Agentic Interactions", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-akhavain-moussa-ai-network/", + "pages": 37, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "A2A protocols", + "ML traffic mgmt", + "Model serving/inference", + "Data formats/interop" + ], + "summary": "Proposes Data and Agent Aware-Inference and Training Network (DA-ITN) architecture. Comprehensive multi-plane network design for AI training, inference, and agent interactions.", + "novelty_note": "Novel unified architecture specifically designed for AI network requirements", + "maturity_note": "Detailed 37-page specification but very early draft stage", + "overlap_note": "Limited overlap with existing networking protocols, AI-focused approach", + "momentum_note": "Substantial technical content suggests serious effort, needs community validation", + "relevance_note": "Directly addresses core AI networking infrastructure needs", + "doc_status": "" + }, + { + "name": "draft-rosenberg-aiproto-a2t", + "title": "AI Agent to Tool (A2T) Protocol", + "date": "2025-11-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-a2t/", + "pages": 23, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Agent discovery/reg" + ], + "summary": "Defines Agent-to-Tool (A2T) protocol for integrating third-party APIs into AI agent operations. Provides enumeration and invocation APIs to reduce integration complexity for enterprise AI agents.", + "novelty_note": "Novel standardization of AI agent-tool integration with focus on enterprise API consumption", + "maturity_note": "Solid conceptual foundation but needs more implementation details and real-world validation", + "overlap_note": "Some conceptual overlap with API gateway patterns but unique AI agent focus", + "momentum_note": "Addresses clear enterprise need with potential for industry adoption", + "relevance_note": "Highly relevant to AI agent ecosystem development and enterprise integration challenges", + "doc_status": "" + }, + { + "name": "draft-berlinai-vera", + "title": "VERA: Verifiable Enforcement for Runtime Agents", + "date": "2026-02-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-berlinai-vera/", + "pages": 7, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "AI safety/alignment", + "Agent identity/auth", + "Policy/governance" + ], + "summary": "Introduces VERA, a zero-trust architecture for AI agent security with five enforcement pillars and cryptographic proof-based autonomy. Provides structured threat model and security properties for runtime agent verification.", + "novelty_note": "Comprehensive zero-trust approach to AI agent security is quite novel", + "maturity_note": "Good architectural framework but needs more implementation details", + "overlap_note": "Some conceptual overlap with agent identity/auth but unique approach", + "momentum_note": "Addresses critical security concerns with structured approach", + "relevance_note": "Highly relevant to AI agent deployment security concerns", + "doc_status": "" + }, + { + "name": "draft-josefsson-chempat", + "title": "Chempat: Generic Instantiated PQ/T Hybrid Key Encapsulation Mechanisms", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-josefsson-chempat/", + "pages": 20, + "group": "individual", + "score": 3.9, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Generic framework for Post-Quantum/Traditional hybrid key encapsulation mechanisms. Provides concrete instantiated algorithms combining classical and quantum-resistant cryptographic methods.", + "novelty_note": "High novelty in providing generic combiner construct for PQ/T hybrid KEMs", + "maturity_note": "Individual draft with solid technical content but less institutional backing", + "overlap_note": "Relatively unique approach to hybrid PQ cryptography, low overlap", + "momentum_note": "Individual effort with uncertain implementation momentum", + "relevance_note": "Extremely relevant for quantum-resistant cryptography transition", + "doc_status": "" + }, + { + "name": "draft-cui-ai-agent-discovery-invocation", + "title": "AI Agent Discovery and Invocation Protocol", + "date": "2026-02-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-cui-ai-agent-discovery-invocation/", + "pages": 18, + "group": "individual", + "score": 3.85, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent discovery/reg", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Proposes standardized protocol for AI agent discovery and invocation with common metadata format and RESTful interface. Includes intent-based agent selection extension.", + "novelty_note": "Standard approach to common problem with useful intent-based extension", + "maturity_note": "Well-developed specification with clear interfaces and security considerations", + "overlap_note": "Overlaps with draft-liang-agentdns on agent discovery functionality", + "momentum_note": "Addresses immediate interoperability needs with practical approach", + "relevance_note": "Extremely relevant - core requirement for multi-agent system deployment", + "doc_status": "" + }, + { + "name": "draft-ravikiran-clawdentity-protocol", + "title": "Clawdentity: Cryptographic Identity and Trust Protocol for AI Agent Communication", + "date": "2026-02-21", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ravikiran-clawdentity-protocol/", + "pages": 31, + "group": "individual", + "score": 3.85, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Specifies Clawdentity protocol for cryptographic identity and trust in AI agent communication. Provides Ed25519 identity, registry credentials, pairing ceremonies, and authenticated relay transport.", + "novelty_note": "Solid but incremental approach to agent identity using established cryptographic primitives", + "maturity_note": "Comprehensive protocol specification with detailed security considerations and implementation guidance", + "overlap_note": "Moderate overlap with general agent identity concepts but distinct in bilateral trust approach", + "momentum_note": "Strong technical foundation and addresses fundamental need for agent-to-agent trust", + "relevance_note": "Essential infrastructure for secure agent communication and identity verification", + "doc_status": "" + }, + { + "name": "draft-pan-tsvwg-pie", + "title": "PIE: A Lightweight Control Scheme To Address the Bufferbloat Problem", + "date": "2024-09-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-pan-tsvwg-pie/", + "pages": 12, + "group": "individual", + "score": 3.85, + "novelty": 4, + "maturity": 5, + "overlap": 3, + "momentum": 4, + "relevance": 3, + "categories": [ + "ML traffic mgmt" + ], + "summary": "Presents PIE queue management algorithm to address bufferbloat by controlling queueing latency. Lightweight design suitable for hardware and software implementation without per-packet timestamps.", + "novelty_note": "Well-developed AQM algorithm with novel proportional-integral approach", + "maturity_note": "Mature work with simulation, theoretical analysis, and Linux testbed validation", + "overlap_note": "Competes with other AQM schemes like CoDel but has distinct approach", + "momentum_note": "Strong technical foundation and validation, addresses real network problems", + "relevance_note": "Relevant for AI applications requiring low latency, but general networking improvement", + "doc_status": "" + }, + { + "name": "draft-jurkovikj-httpapi-agentic-state", + "title": "HTTP Profile for Synchronized Resource State (Agentic State Transfer)", + "date": "2025-12-10", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jurkovikj-httpapi-agentic-state/", + "pages": 21, + "group": "individual", + "score": 3.85, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Data formats/interop", + "A2A protocols", + "ML traffic mgmt" + ], + "summary": "Defines Agentic State Transfer (AST) HTTP profile for managing canonical resource state across multiple synchronized representations. Uses semantic validators and optimistic concurrency control for atomic agent mutations.", + "novelty_note": "Novel approach to HTTP resource state synchronization across representations for agent environments", + "maturity_note": "Comprehensive technical specification with clear semantic model and implementation guidance", + "overlap_note": "Unique focus on multi-representation state synchronization for agents", + "momentum_note": "Technical complexity may slow adoption but addresses important consistency problems", + "relevance_note": "Very relevant for agent-driven web interactions and preventing race conditions", + "doc_status": "" + }, + { + "name": "draft-tejido-swp-core", + "title": "SlimWire Protocol (SWP) Core: Binary Framing and Envelope Substrate", + "date": "2026-02-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-tejido-swp-core/", + "pages": 15, + "group": "individual", + "score": 3.85, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Data formats/interop" + ], + "summary": "Specifies SlimWire Protocol Core, a binary framing layer for agent/tool messaging with profile-based extensibility. Provides transport-independent message boundaries and envelope encoding with security bindings.", + "novelty_note": "Novel binary framing approach optimized for agent messaging with strong conformance model", + "maturity_note": "Detailed technical specification with conformance testing and security considerations", + "overlap_note": "Unique binary protocol approach, minimal overlap with other agent communication protocols", + "momentum_note": "Technical merit is high but adoption may be limited by binary format complexity", + "relevance_note": "Addresses real need for efficient agent messaging but may face adoption challenges", + "doc_status": "" + }, + { + "name": "draft-bradleylundberg-cfrg-arkg", + "title": "The Asynchronous Remote Key Generation (ARKG) algorithm", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-bradleylundberg-cfrg-arkg/", + "pages": 47, + "group": "individual", + "score": 3.85, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Defines Asynchronous Remote Key Generation algorithm enabling delegation of public key generation without private key access. Supports pseudonymous keys, enhanced forward secrecy, and paired device authentication scenarios.", + "novelty_note": "Novel cryptographic primitive for remote key generation with multiple practical applications", + "maturity_note": "Comprehensive specification with abstract algorithm, concrete instantiations, and formal treatment", + "overlap_note": "Addresses unique cryptographic capability not covered by existing key generation standards", + "momentum_note": "Solid cryptographic foundation with clear applications but may need broader adoption drivers", + "relevance_note": "Strong relevance for agent privacy, forward secrecy, and distributed authentication scenarios", + "doc_status": "" + }, + { + "name": "draft-tsyrulnikov-rats-attested-inference-receipt", + "title": "Attested Inference Receipt (AIR): A COSE/CWT Profile for Confidential AI Inference", + "date": "2026-03-01", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-tsyrulnikov-rats-attested-inference-receipt/", + "pages": 28, + "group": "individual", + "score": 3.85, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Model serving/inference", + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Defines Attested Inference Receipt (AIR) using COSE/CWT to create verifiable receipts for confidential AI inference events in TEEs. Binds model identity, input/output hashes, and platform attestation into signed artifacts for audit and compliance.", + "novelty_note": "Novel application of existing COSE/CWT standards to AI inference attestation with specific TEE platform support", + "maturity_note": "Well-structured technical specification with clear scope and concrete platform implementations", + "overlap_note": "Some overlap with general attestation work but specific to AI inference use cases", + "momentum_note": "Addresses growing need for AI transparency but limited to specific TEE environments", + "relevance_note": "Highly relevant for confidential AI and regulatory compliance requirements", + "doc_status": "" + }, + { + "name": "draft-templin-intarea-aero2", + "title": "Automatic Extended Route Optimization (AERO)", + "date": "2024-04-04", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-templin-intarea-aero2/", + "pages": 113, + "group": "individual", + "score": 3.85, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Autonomous netops", + "Data formats/interop" + ], + "summary": "Specifies AERO service for IP internetworking over overlay multilink networks using IPv6 ND for control messaging. Comprehensive solution for mobility, multicast, and route optimization across diverse transport scenarios.", + "novelty_note": "Novel integration of IPv6 ND with overlay multilink networks for comprehensive mobility solution", + "maturity_note": "Very detailed technical specification with 113 pages of comprehensive protocols and procedures", + "overlap_note": "Some overlap with mobility protocols but unique approach and comprehensive scope", + "momentum_note": "Substantial individual effort, unclear broader community engagement", + "relevance_note": "Highly relevant for mobility and multi-transport scenarios, addresses real operational needs", + "doc_status": "" + }, + { + "name": "draft-ramadan-mboned-sonar", + "title": "SONAR: Statistical Observation Network for Attestation and Reach", + "date": "2025-11-04", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ramadan-mboned-sonar/", + "pages": 22, + "group": "individual", + "score": 3.85, + "novelty": 5, + "maturity": 4, + "overlap": 1, + "momentum": 2, + "relevance": 3, + "categories": [ + "A2A protocols", + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Specifies a protocol for verifiable multicast delivery using cryptoeconomic accountability and statistical sampling. Combines IP multicast efficiency with blockchain-based attestation and VRF sampling for coverage verification.", + "novelty_note": "Highly novel combination of multicast, cryptoeconomics, zkSNARKs, and statistical verification", + "maturity_note": "Detailed protocol specification with concrete parameters and implementation considerations", + "overlap_note": "Unique approach combining multicast with cryptoeconomic verification mechanisms", + "momentum_note": "Complex protocol with blockchain dependencies may limit adoption momentum", + "relevance_note": "Relevant for verifiable content distribution but narrow use case scope", + "doc_status": "" + }, + { + "name": "draft-ietf-emu-hybrid-pqc-eapaka", + "title": "Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography", + "date": "2026-02-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-emu-hybrid-pqc-eapaka/", + "pages": 13, + "group": "individual", + "score": 3.8, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth" + ], + "summary": "Enhances EAP-AKA' with post-quantum cryptography to address quantum computing threats. Uses hybrid PQ/T algorithms to achieve quantum-safe authentication.", + "novelty_note": "Novel application of hybrid post-quantum crypto to cellular authentication protocols", + "maturity_note": "Short specification building on recent EAP-AKA' FS work, early stage development", + "overlap_note": "Specific to EAP-AKA' with some overlap to general PQC standardization efforts", + "momentum_note": "Timely post-quantum crypto adoption in critical mobile authentication", + "relevance_note": "High relevance for future-proofing mobile network security", + "doc_status": "" + }, + { + "name": "draft-luan-rtgwg-sdaf", + "title": "Symmetry-Driven Asynchronous Forwarding with Fast Reroute for LEO Satellite Networks (SDAF)", + "date": "2026-02-25", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-luan-rtgwg-sdaf/", + "pages": 16, + "group": "individual", + "score": 3.8, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols" + ], + "summary": "Proposes symmetry-driven forwarding mechanism for LEO satellite networks to avoid routing loops and black holes during topology changes. Leverages toroidal topology structure for faster convergence without protocol modifications.", + "novelty_note": "Creative use of satellite constellation symmetry for autonomous forwarding decisions", + "maturity_note": "Well-developed technical approach but needs validation in real satellite environments", + "overlap_note": "Addresses unique challenges of satellite networks with novel approach", + "momentum_note": "Strong momentum due to growing LEO constellation deployments", + "relevance_note": "Very relevant for autonomous satellite operations and space-based networking", + "doc_status": "" + }, + { + "name": "draft-chen-ai-agent-auth-new-requirements", + "title": "New requirements for Authentication and Authorization in the AI Agents era", + "date": "2026-01-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chen-ai-agent-auth-new-requirements/", + "pages": 5, + "group": "individual", + "score": 3.8, + "novelty": 4, + "maturity": 2, + "overlap": 1, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "AI safety/alignment" + ], + "summary": "Identifies new authentication and authorization requirements for AI agents that go beyond traditional human-user frameworks. Focuses on managing dynamic agent behavior rather than static identity verification.", + "novelty_note": "Novel focus on dynamic behavior-based auth vs static identity, addressing fundamental paradigm shift for AI agents", + "maturity_note": "Early stage requirements document, lacks concrete solutions or implementation details", + "overlap_note": "Unique focus on AI agent auth requirements, no direct overlap with other drafts", + "momentum_note": "Addresses critical security gap but needs broader community input and technical solutions", + "relevance_note": "Extremely relevant as AI agents proliferate and existing auth frameworks prove inadequate", + "doc_status": "" + }, + { + "name": "draft-sogomonian-ai-uri-scheme", + "title": "AI URI Scheme", + "date": "2025-10-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-sogomonian-ai-uri-scheme/", + "pages": 6, + "group": "individual", + "score": 3.8, + "novelty": 4, + "maturity": 2, + "overlap": 1, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent discovery/reg", + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Defines experimental AI URI scheme for dedicated AI resource access. Enables native connectivity for autonomous systems while supporting human interoperability via HTTPS gateways.", + "novelty_note": "Novel approach to AI resource addressing with dual autonomous/human access paradigm", + "maturity_note": "Very brief specification lacking detailed syntax, semantics, and security considerations", + "overlap_note": "Unique approach to AI resource identification, no direct overlaps found", + "momentum_note": "AI infrastructure gaining attention but URI schemes are niche area", + "relevance_note": "Highly relevant for AI agent discovery, registration, and autonomous system connectivity", + "doc_status": "" + }, + { + "name": "draft-ietf-tls-deprecate-obsolete-kex", + "title": "Deprecating Obsolete Key Exchange Methods in (D)TLS 1.2", + "date": "2026-01-23", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-tls-deprecate-obsolete-kex/", + "pages": 23, + "group": "individual", + "score": 3.75, + "novelty": 2, + "maturity": 4, + "overlap": 1, + "momentum": 4, + "relevance": 5, + "categories": [ + "Policy/governance" + ], + "summary": "Deprecates obsolete key exchange methods in TLS 1.2 including finite field DH and RSA. Updates multiple RFCs to change cipher suite recommendations to MUST NOT or SHOULD NOT.", + "novelty_note": "Standard security maintenance work deprecating known weak algorithms", + "maturity_note": "Thorough specification updating many RFCs with clear deprecation guidance", + "overlap_note": "Focused TLS 1.2 security update with unique scope", + "momentum_note": "Important security maintenance from established IETF TLS working group", + "relevance_note": "Critical for maintaining TLS security posture across internet infrastructure", + "doc_status": "" + }, + { + "name": "draft-srijal-agents-policy", + "title": "AGENTS.TXT: Strict Policy File for Automated Clients", + "date": "2025-10-07", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-srijal-agents-policy/", + "pages": 5, + "group": "individual", + "score": 3.75, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 5, + "categories": [ + "Policy/governance", + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Specifies AGENTS.TXT protocol as strict plaintext policy file for automated clients, bots, and crawlers. Includes hash verification and mandatory restrictive behavior for malformed files.", + "novelty_note": "Builds on robots.txt concept with stricter verification and failure handling for AI agents", + "maturity_note": "Well-defined protocol specification with clear directives and error handling", + "overlap_note": "Similar to robots.txt but distinct focus on modern automated agents", + "momentum_note": "Addresses immediate practical need as AI agents proliferate across web services", + "relevance_note": "Extremely relevant given current explosion of AI agents and need for access control", + "doc_status": "" + }, + { + "name": "draft-abbey-scim-agent-extension", + "title": "SCIM Agents and Agentic Applications Extension", + "date": "2025-10-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-abbey-scim-agent-extension/", + "pages": 27, + "group": "individual", + "score": 3.75, + "novelty": 4, + "maturity": 3, + "overlap": 1, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Data formats/interop", + "Agent discovery/reg" + ], + "summary": "Extends SCIM 2.0 protocol to manage AI agents and agentic applications across domains. Adds new schemas and resource types for agent identity management using existing SCIM infrastructure.", + "novelty_note": "First to systematically extend SCIM for agent identity management", + "maturity_note": "Builds on mature SCIM foundation but agent-specific extensions are early", + "overlap_note": "Unique approach using SCIM for agent identity management", + "momentum_note": "Leverages established SCIM ecosystem but agent management is emerging", + "relevance_note": "Addresses critical need for agent identity management as agentic systems proliferate", + "doc_status": "" + }, + { + "name": "draft-zhao-nmop-network-management-agent", + "title": "AI based Network Management Agent(NMA): Concepts and Architecture", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhao-nmop-network-management-agent/", + "pages": 24, + "group": "individual", + "score": 3.75, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Policy/governance" + ], + "summary": "Defines AI-driven Network Management Agent concept for Level 4 autonomous networks. Specifies integration with existing SDN controllers for intent-based reasoning and autonomous operations.", + "novelty_note": "Novel conceptual framework bridging AI agents with network autonomy levels", + "maturity_note": "Early stage architectural proposal with limited implementation details", + "overlap_note": "Some overlap with existing autonomous network and SDN work", + "momentum_note": "Strong industry push toward network automation and AI integration", + "relevance_note": "Highly relevant as networks move toward autonomous operations", + "doc_status": "" + }, + { + "name": "draft-eckert-anima-acp-free-ani", + "title": "ACP free \"Automation Network Infrastructure\" for simple in-network automation (aNI)", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-eckert-anima-acp-free-ani/", + "pages": 21, + "group": "individual", + "score": 3.75, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Agent identity/auth", + "A2A protocols", + "Agent discovery/reg" + ], + "summary": "Describes lightweight variation of Autonomic Networking Infrastructure without expensive ACP implementation. Uses existing ANI certificates and protocols with application-level software agents.", + "novelty_note": "Creative simplification of complex ANI architecture while retaining core automation benefits", + "maturity_note": "Detailed technical approach with clear trade-offs and implementation considerations", + "overlap_note": "Builds heavily on existing ANIMA work but with significant architectural changes", + "momentum_note": "Strong technical foundation but depends on broader ANIMA adoption momentum", + "relevance_note": "Highly relevant for making autonomic networking more implementable and practical", + "doc_status": "" + }, + { + "name": "draft-li-individual-inip", + "title": "In-Network Inference Protocol", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-individual-inip/", + "pages": 17, + "group": "individual", + "score": 3.75, + "novelty": 4, + "maturity": 3, + "overlap": 1, + "momentum": 3, + "relevance": 4, + "categories": [ + "Model serving/inference", + "A2A protocols" + ], + "summary": "Specifies a protocol for performing lightweight ML inference directly in network devices like switches and SmartNICs. Uses centralized control plane for model management and distributed data plane for inference execution.", + "novelty_note": "Novel integration of inference capabilities into network data plane devices", + "maturity_note": "Detailed protocol specification with packet formats and architecture, but implementation complexity unclear", + "overlap_note": "Unique approach to in-network computing for inference", + "momentum_note": "Edge computing trend supports concept but network device inference is still emerging", + "relevance_note": "Very relevant for reducing latency and improving efficiency in AI applications", + "doc_status": "" + }, + { + "name": "draft-ietf-aipref-attach", + "title": "Associating AI Usage Preferences with Content in HTTP", + "date": "2025-11-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-aipref-attach/", + "pages": 10, + "group": "individual", + "score": 3.75, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 5, + "relevance": 4, + "categories": [ + "A2A protocols", + "Policy/governance", + "Data formats/interop" + ], + "summary": "Specifies how AI usage preferences can be signaled during HTTP content acquisition. Updates RFC 9309 to include usage preference mechanisms for automated systems.", + "novelty_note": "Novel HTTP integration but builds on existing RFC 9309 foundation", + "maturity_note": "Mature IETF working group draft with clear technical specification", + "overlap_note": "Complements vocab draft but focuses on HTTP transport mechanism", + "momentum_note": "Active IETF working group effort with recent updates", + "relevance_note": "Very relevant for practical deployment of AI preference signaling", + "doc_status": "" + }, + { + "name": "draft-farzdusa-aipref-enduser", + "title": "AI Preferences Signaling: End User Impact", + "date": "2025-11-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-farzdusa-aipref-enduser/", + "pages": 13, + "group": "individual", + "score": 3.75, + "novelty": 4, + "maturity": 3, + "overlap": 1, + "momentum": 3, + "relevance": 4, + "categories": [ + "Policy/governance", + "Human-agent interaction" + ], + "summary": "Documents potential end user impacts of AI preference signaling standards across technological, legal, and ethical dimensions. Suggests principles for working group consideration in standardization.", + "novelty_note": "Novel focus on end user impact analysis for AI preference standards", + "maturity_note": "Well-developed analysis but primarily guidance document rather than technical spec", + "overlap_note": "Unique perspective focused on user impact rather than technical mechanisms", + "momentum_note": "Recent individual submission addressing active working group concerns", + "relevance_note": "Highly relevant for ensuring standards consider broader stakeholder impacts", + "doc_status": "" + }, + { + "name": "draft-scim-agent-extension", + "title": "SCIM Agents and Agentic Applications Extension", + "date": "2025-10-11", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-scim-agent-extension/", + "pages": 27, + "group": "individual", + "score": 3.7, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Data formats/interop", + "Policy/governance" + ], + "summary": "Extends SCIM 2.0 specification to manage agents and agentic applications across domains. Builds on existing identity management infrastructure to reduce protocol proliferation.", + "novelty_note": "Practical extension of established standard rather than novel approach", + "maturity_note": "Builds on mature SCIM foundation with detailed schema extensions", + "overlap_note": "Unique approach using identity management for agent management", + "momentum_note": "Leverages existing SCIM ecosystem and addresses practical deployment needs", + "relevance_note": "Very relevant for enterprise agent identity and lifecycle management", + "doc_status": "" + }, + { + "name": "draft-zheng-agent-identity-management", + "title": "Agent Identity Managenment", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/", + "pages": 12, + "group": "individual", + "score": 3.7, + "novelty": 4, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Agent discovery/reg" + ], + "summary": "Defines comprehensive agent identity management for Internet of Agents systems. Covers agent registration, identifier structure, and identity management functions through agent gateways.", + "novelty_note": "Comprehensive identity management framework", + "maturity_note": "Well-structured with detailed requirements", + "overlap_note": "Significant overlap with other identity drafts", + "momentum_note": "Active development in agent identity space", + "relevance_note": "Critical foundational work for agent ecosystems", + "doc_status": "" + }, + { + "name": "draft-yuan-rtgwg-traffic-agent-usecase", + "title": "Use cases of the AI Network Traffic Optimization Agent", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yuan-rtgwg-traffic-agent-usecase/", + "pages": 10, + "group": "individual", + "score": 3.7, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops" + ], + "summary": "Presents use cases for AI agents optimizing network traffic through dynamic resource adjustment. Details applications in tunnel adjustment, traffic steering, and network slice management.", + "novelty_note": "Specific application of AI to traffic optimization", + "maturity_note": "Well-detailed use cases with clear scenarios", + "overlap_note": "Unique focus on traffic optimization use cases", + "momentum_note": "Strong industry interest in AI network optimization", + "relevance_note": "Valuable for understanding practical applications", + "doc_status": "" + }, + { + "name": "draft-rosenberg-aiproto-framework", + "title": "Framework, Use Cases and Requirements for AI Agent Protocols", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-framework/", + "pages": 26, + "group": "individual", + "score": 3.7, + "novelty": 2, + "maturity": 4, + "overlap": 3, + "momentum": 5, + "relevance": 5, + "categories": [ + "A2A protocols", + "Policy/governance", + "Data formats/interop" + ], + "summary": "Provides framework and requirements for AI agent protocols on the Internet. Surveys existing approaches like MCP and A2A to guide IETF standardization efforts.", + "novelty_note": "Primarily synthesizes existing work rather than proposing new technical solutions", + "maturity_note": "Well-researched framework document with comprehensive use cases and requirements analysis", + "overlap_note": "Overlaps with general AI protocol discussions but serves as foundational framework", + "momentum_note": "Critical for establishing IETF direction in AI agent standardization", + "relevance_note": "Essential framework document for the emerging field of AI agent protocols", + "doc_status": "" + }, + { + "name": "draft-an-nmrg-i2icf-cits", + "title": "Interface to In-Network Computing Functions for Cooperative Intelligent Transportation Systems", + "date": "2026-02-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-an-nmrg-i2icf-cits/", + "pages": 15, + "group": "individual", + "score": 3.7, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "A2A protocols", + "ML traffic mgmt", + "Agent discovery/reg", + "Other AI/agent" + ], + "summary": "Defines framework for orchestrating In-Network Computing Functions in Cooperative Intelligent Transportation Systems. Incorporates Agent-to-Agent communication for multi-domain V2X scenarios.", + "novelty_note": "Combines in-network computing with A2A protocols specifically for transportation systems", + "maturity_note": "Comprehensive framework but requires extensive validation in real C-ITS deployments", + "overlap_note": "Overlaps with general V2X and edge computing work but A2A integration is newer", + "momentum_note": "Strong momentum in autonomous vehicles and smart transportation infrastructure", + "relevance_note": "Very relevant for emerging connected vehicle ecosystems and smart cities", + "doc_status": "" + }, + { + "name": "draft-melnikov-sasl2", + "title": "Extensible Simple Authentication and Security Layer (SASL)", + "date": "2025-06-05", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-melnikov-sasl2/", + "pages": 10, + "group": "individual", + "score": 3.7, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "A2A protocols", + "Policy/governance" + ], + "summary": "Updates SASL framework to support modern authentication requirements including multi-factor authentication and password change requests. Maintains backward compatibility while extending capabilities.", + "novelty_note": "Evolutionary update to established protocol with modern auth extensions", + "maturity_note": "Mature specification from experienced author updating well-understood protocol", + "overlap_note": "Updates existing SASL but adds distinct new capabilities", + "momentum_note": "Strong IETF momentum with established author and clear use cases", + "relevance_note": "High relevance for agent authentication and multi-factor security requirements", + "doc_status": "" + }, + { + "name": "draft-ietf-lamps-attestation-freshness", + "title": "Nonce-based Freshness for Remote Attestation in Certificate Signing Requests (CSRs) for the Certification Management Protocol (CMP), for Enrollment over Secure Transport (EST), and for Certificate Management over CMS (CMC)", + "date": "2025-10-19", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lamps-attestation-freshness/", + "pages": 20, + "group": "individual", + "score": 3.7, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth" + ], + "summary": "Outlines how nonces are supplied to end entities by RA/CA for inclusion in attestation evidence within Certificate Signing Requests. Covers implementation across CMP, EST, and CMC protocols to demonstrate evidence freshness.", + "novelty_note": "Addresses important freshness problem in attestation but uses established nonce-based approach", + "maturity_note": "Mature specification from established working group with comprehensive protocol coverage", + "overlap_note": "Some overlap with existing certificate management protocols but adds attestation-specific mechanisms", + "momentum_note": "Strong momentum from LAMPS working group and growing attestation requirements", + "relevance_note": "Very relevant for trusted computing and device attestation scenarios", + "doc_status": "" + }, + { + "name": "draft-ietf-lake-ra", + "title": "Remote attestation over EDHOC", + "date": "2025-11-21", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lake-ra/", + "pages": 30, + "group": "individual", + "score": 3.7, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Policy/governance" + ], + "summary": "Specifies remote attestation procedures integrated with EDHOC lightweight key exchange protocol. Enables verification of device/system integrity during authentication based on RATS architecture.", + "novelty_note": "Moderate novelty in combining attestation with EDHOC, though both concepts exist separately", + "maturity_note": "Well-structured IETF working group draft with clear technical approach", + "overlap_note": "Some overlap with general attestation and EDHOC work but specific combination is relatively unique", + "momentum_note": "IETF working group backing suggests good momentum and implementation interest", + "relevance_note": "High relevance for IoT security and zero-trust architectures requiring device attestation", + "doc_status": "" + }, + { + "name": "draft-ietf-lamps-rfc7030-csrattrs", + "title": "Clarification and enhancement of RFC7030 CSR Attributes definition", + "date": "2026-01-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc7030-csrattrs/", + "pages": 25, + "group": "individual", + "score": 3.7, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Data formats/interop", + "Policy/governance" + ], + "summary": "Updates RFC7030 to clarify CSR Attributes Response encoding and adds template-based approach for EST servers. Resolves implementation challenges and confusion in the existing EST specification.", + "novelty_note": "Incremental improvement to existing EST protocol with template approach being moderately novel", + "maturity_note": "Well-developed specification addressing real implementation issues with clear encoding rules", + "overlap_note": "Specific update to EST protocol with limited overlap to other current drafts", + "momentum_note": "IETF working group draft addressing documented interoperability problems", + "relevance_note": "High relevance for PKI deployments and certificate enrollment infrastructure", + "doc_status": "" + }, + { + "name": "draft-ietf-suit-firmware-encryption", + "title": "Encrypted Payloads in SUIT Manifests", + "date": "2025-12-08", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-suit-firmware-encryption/", + "pages": 55, + "group": "individual", + "score": 3.7, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Data formats/interop" + ], + "summary": "Specifies encryption techniques for firmware and software payloads in SUIT manifests. Uses ES-DH and AES-KW for key agreement with symmetric encryption for payload protection.", + "novelty_note": "Applies established crypto techniques to SUIT manifest context, moderately novel integration", + "maturity_note": "Comprehensive 55-page specification with detailed technical approaches", + "overlap_note": "Specific to SUIT manifest encryption with minimal overlap to other efforts", + "momentum_note": "Active IETF working group addressing IoT security needs", + "relevance_note": "Important for IoT device security and firmware update protection", + "doc_status": "" + }, + { + "name": "draft-ietf-lamps-est-renewal-info", + "title": "Certificate Renewal Recommendations for Enrollment over Secure Transport", + "date": "2026-02-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lamps-est-renewal-info/", + "pages": 7, + "group": "individual", + "score": 3.7, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Data formats/interop" + ], + "summary": "Extends EST protocol to provide server-side recommendations for certificate renewal timing. Addresses the issue of overly early renewal attempts as certificate lifetimes shorten.", + "novelty_note": "Modest extension to existing EST protocol, addresses practical timing optimization", + "maturity_note": "Well-scoped problem with clear solution, builds on established EST standard", + "overlap_note": "Specific EST extension with minimal overlap with other certificate management work", + "momentum_note": "IETF working group draft addressing real deployment needs as cert lifetimes decrease", + "relevance_note": "High relevance for PKI deployments, especially with trend toward shorter certificate lifetimes", + "doc_status": "" + }, + { + "name": "draft-ietf-netconf-configuration-tracing", + "title": "External Trace ID for Configuration Tracing", + "date": "2025-11-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-netconf-configuration-tracing/", + "pages": 19, + "group": "individual", + "score": 3.7, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Data formats/interop" + ], + "summary": "Specifies a NETCONF mechanism to map configuration modifications to their originating NMS using external trace IDs. Includes a YANG module to facilitate troubleshooting and post-mortem analysis in autonomous networks.", + "novelty_note": "Builds on existing NETCONF but adds useful tracing capabilities for multi-NMS environments", + "maturity_note": "Well-structured 19-page specification with concrete YANG module, appears implementation-ready", + "overlap_note": "Some overlap with general network management drafts but tracing focus is relatively unique", + "momentum_note": "IETF working group draft addressing real operational needs in complex networks", + "relevance_note": "Highly relevant for autonomous networks and multi-controller environments becoming common", + "doc_status": "" + }, + { + "name": "draft-howe-sipcore-mcp-extension", + "title": "SIP Extension for Model Context Protocol (MCP)", + "date": "2025-09-29", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-howe-sipcore-mcp-extension/", + "pages": 50, + "group": "individual", + "score": 3.7, + "novelty": 4, + "maturity": 4, + "overlap": 1, + "momentum": 3, + "relevance": 3, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Agent discovery/reg" + ], + "summary": "Defines SIP extension to carry Model Context Protocol with new option-tags, headers, and media types. Enables MCP payload exchange during SIP sessions.", + "novelty_note": "Novel integration of MCP with SIP protocol, unique approach among the drafts", + "maturity_note": "High maturity with detailed protocol specifications and substantial length", + "overlap_note": "Unique approach focusing on SIP integration rather than network management", + "momentum_note": "Solid momentum with comprehensive specification and established SIP community", + "relevance_note": "Moderately relevant to AI agents in communication systems but different domain", + "doc_status": "" + }, + { + "name": "draft-gaikwad-south-authorization", + "title": "SOUTH: Stochastic Authorization for Agent and Service Requests", + "date": "2025-11-28", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-gaikwad-south-authorization/", + "pages": 44, + "group": "individual", + "score": 3.7, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 2, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Policy/governance" + ], + "summary": "Authorization protocol supporting probabilistic decisions for agents and services. Enables uncertainty and contextual factors in access control decisions.", + "novelty_note": "Stochastic authorization decisions are novel for network protocols", + "maturity_note": "Well-developed 44-page specification with HTTP binding", + "overlap_note": "Extends existing auth patterns but adds unique probabilistic element", + "momentum_note": "Individual submission, unclear adoption trajectory", + "relevance_note": "Addresses agent authorization needs with uncertainty handling", + "doc_status": "" + }, + { + "name": "draft-sogomonian-aiip-architecture", + "title": "Architecture for the Artificial Intelligence Internet Protocol (AIIP)", + "date": "2025-12-15", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-sogomonian-aiip-architecture/", + "pages": 8, + "group": "individual", + "score": 3.7, + "novelty": 5, + "maturity": 2, + "overlap": 1, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent identity/auth", + "Model serving/inference" + ], + "summary": "Defines architectural model for Artificial Intelligence Internet Protocol (AIIP) enabling stateless, verifiable invocation of autonomous systems. Uses resolve-invoke-receipt pattern with cryptographic execution receipts and optional attestation evidence.", + "novelty_note": "Very high novelty - completely new protocol architecture for AI system invocation", + "maturity_note": "Early stage architectural definition, lacks implementation details", + "overlap_note": "Unique approach - no similar AI-specific internet protocol architectures", + "momentum_note": "Low momentum - very early stage, unclear adoption path", + "relevance_note": "High relevance as AI systems become more distributed and autonomous", + "doc_status": "" + }, + { + "name": "draft-oauth-ai-agents-on-behalf-of-user", + "title": "OAuth 2.0 Extension: On-Behalf-Of User Authorization for AI Agents", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-oauth-ai-agents-on-behalf-of-user/", + "pages": 16, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 2, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Human-agent interaction", + "A2A protocols" + ], + "summary": "This draft extends OAuth 2.0 to enable AI agents to securely obtain access tokens for acting on behalf of users. It introduces new parameters (requested_actor, actor_token) to the authorization flow to ensure explicit user consent and proper authentication of AI agents during delegation.", + "novelty_note": "Novel application of OAuth 2.0 specifically for AI agent delegation with new parameters and consent mechanisms", + "maturity_note": "Well-structured draft with detailed protocol steps and security considerations, but appears to be early-stage work from non-IETF authors", + "overlap_note": "Builds on OAuth 2.0 RFC6749 and relates to Token Exchange RFC8693, but addresses gaps in existing specifications for AI agent scenarios", + "momentum_note": "Authors from WSO2 but no clear IETF working group adoption, second revision suggests some development but limited institutional backing", + "relevance_note": "Directly addresses a critical need for secure AI agent authorization in distributed systems, highly relevant to AI agent networking", + "doc_status": "" + }, + { + "name": "draft-ni-a2a-ai-agent-security-requirements", + "title": "Security Requirements for AI Agents", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ni-a2a-ai-agent-security-requirements/", + "pages": 11, + "group": "individual", + "score": 3.65, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 4, + "relevance": 5, + "categories": [ + "AI safety/alignment", + "Agent identity/auth" + ], + "summary": "Establishes security requirements for AI agents across their operational lifecycle. Covers provisioning, registration, cross-domain interconnection, and access control security aspects.", + "novelty_note": "Systematic security requirements approach", + "maturity_note": "Good coverage of security lifecycle stages", + "overlap_note": "Some overlap with identity and auth drafts", + "momentum_note": "Strong interest in AI agent security", + "relevance_note": "Essential for secure agent deployment", + "doc_status": "" + }, + { + "name": "draft-rosenberg-aiproto", + "title": "Normalized API for AI Agents Calling Tools (N-ACT)", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-rosenberg-aiproto/", + "pages": 23, + "group": "individual", + "score": 3.65, + "novelty": 3, + "maturity": 4, + "overlap": 5, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Agent discovery/reg" + ], + "summary": "Defines N-ACT protocol for AI agents to discover and invoke third-party tools and APIs. Focuses on enterprise agents with enumeration and invocation capabilities.", + "novelty_note": "Standardizes common pattern of AI tool integration but builds on existing OpenAI specifications", + "maturity_note": "Comprehensive specification with clear API definitions and enterprise focus", + "overlap_note": "Identical to draft-rosenberg-aiproto-nact - appears to be duplicate submission", + "momentum_note": "Strong enterprise use case and addresses major AI integration pain point", + "relevance_note": "Extremely relevant for current AI agent development and enterprise adoption", + "doc_status": "" + }, + { + "name": "draft-rosenberg-aiproto-nact", + "title": "Normalized API for AI Agents Calling Tools (N-ACT)", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-nact/", + "pages": 23, + "group": "individual", + "score": 3.65, + "novelty": 3, + "maturity": 4, + "overlap": 5, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Agent discovery/reg" + ], + "summary": "Defines N-ACT protocol for AI agents to discover and invoke third-party tools and APIs. Focuses on enterprise agents with enumeration and invocation capabilities.", + "novelty_note": "Standardizes common pattern of AI tool integration but builds on existing OpenAI specifications", + "maturity_note": "Comprehensive specification with clear API definitions and enterprise focus", + "overlap_note": "Identical to draft-rosenberg-aiproto - appears to be duplicate submission", + "momentum_note": "Strong enterprise use case and addresses major AI integration pain point", + "relevance_note": "Extremely relevant for current AI agent development and enterprise adoption", + "doc_status": "" + }, + { + "name": "draft-pocero-authkem-edhoc", + "title": "KEM-based Authentication for EDHOC", + "date": "2025-10-25", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-pocero-authkem-edhoc/", + "pages": 41, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 2, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "A2A protocols" + ], + "summary": "Extends EDHOC with KEM-based authentication for post-quantum resistance. Enables signature-free quantum-resistant authentication using mechanisms like ML-KEM.", + "novelty_note": "High novelty in signature-free post-quantum authentication for EDHOC", + "maturity_note": "Individual draft with detailed technical approach but limited institutional review", + "overlap_note": "Some overlap with EDHOC and PQC work but specific approach is fairly unique", + "momentum_note": "Individual effort with uncertain adoption prospects", + "relevance_note": "Highly relevant for post-quantum cryptography and lightweight authentication", + "doc_status": "" + }, + { + "name": "draft-zyyhl-agent-networks-framework", + "title": "Framework for AI Agent Networks", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/", + "pages": 21, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Data formats/interop", + "Agent identity/auth" + ], + "summary": "Defines comprehensive framework for AI agent networks based on Agent Network Protocol (ANP). Provides basic functions needed for AI agent communication within trusted domains.", + "novelty_note": "Substantial framework for agent-to-agent networking with dedicated protocol", + "maturity_note": "Most detailed at 21 pages with concrete protocol framework, but references incomplete ANP spec", + "overlap_note": "Relatively unique approach to agent networking protocols", + "momentum_note": "Comprehensive framework could attract interest but depends on ANP protocol development", + "relevance_note": "Highly relevant as agent-to-agent communication becomes critical infrastructure need", + "doc_status": "" + }, + { + "name": "draft-kotecha-agentic-dispute-protocol", + "title": "Agentic Dispute Protocol", + "date": "2025-10-14", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-kotecha-agentic-dispute-protocol/", + "pages": 26, + "group": "individual", + "score": 3.65, + "novelty": 5, + "maturity": 3, + "overlap": 1, + "momentum": 2, + "relevance": 3, + "categories": [ + "A2A protocols", + "Policy/governance", + "AI safety/alignment" + ], + "summary": "Defines a protocol for autonomous agents to file and resolve disputes through structured automated processes. Includes evidence submission, cryptographic proofs, and multiple resolution frameworks.", + "novelty_note": "Highly novel - first formal protocol for automated agent dispute resolution", + "maturity_note": "Comprehensive but complex specification needing real-world validation", + "overlap_note": "Unique focus on dispute resolution - no overlap with other drafts", + "momentum_note": "Addresses future need but may be premature for current agent capabilities", + "relevance_note": "Relevant for advanced agent interactions but not immediate priority", + "doc_status": "" + }, + { + "name": "draft-mao-rtgwg-agent-comm-protocol-gap-analysis", + "title": "Gap Analysis for the Cross-device Communication Protocol for AI Agents in Network Devices", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mao-rtgwg-agent-comm-protocol-gap-analysis/", + "pages": 8, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Autonomous netops" + ], + "summary": "Analyzes gaps in existing networking and AI protocols for cross-device communication between AI agents on network devices. Evaluates classical networking protocols and popular AI agent protocols for suitability.", + "novelty_note": "Novel gap analysis approach for agent communication", + "maturity_note": "Good analytical foundation, references framework draft", + "overlap_note": "Unique focus on protocol gap analysis", + "momentum_note": "Part of broader cross-device communication work", + "relevance_note": "Important for understanding protocol requirements", + "doc_status": "" + }, + { + "name": "draft-zlgsgl-rtgwg-agents-networking-framework", + "title": "Agents Networking Framework for Enterprise and Broadband", + "date": "2025-11-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zlgsgl-rtgwg-agents-networking-framework/", + "pages": 14, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Agent discovery/reg" + ], + "summary": "Introduces a comprehensive agents networking framework for enterprise and broadband environments. Defines core components and interactions for agent-based networking systems.", + "novelty_note": "Novel framework approach for agent networking architecture", + "maturity_note": "More developed with defined components and interactions", + "overlap_note": "Some conceptual overlap with SDN frameworks", + "momentum_note": "Good momentum with detailed framework definition", + "relevance_note": "Highly relevant for enterprise networking evolution", + "doc_status": "" + }, + { + "name": "draft-han-rtgwg-agent-gateway-intercomm-framework", + "title": "Agent Gateway Intercommunication Framework", + "date": "2026-01-30", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-han-rtgwg-agent-gateway-intercomm-framework/", + "pages": 12, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Autonomous netops" + ], + "summary": "Defines framework for intercommunication between Agent Gateways in Agent Internet ecosystem. Addresses data synchronization, protocol compatibility, and security for cross-domain agent collaboration.", + "novelty_note": "Novel hierarchical framework for agent gateway intercommunication", + "maturity_note": "Well-structured framework with clear components but implementation details may need refinement", + "overlap_note": "Specialized focus on gateway interoperability reduces overlap", + "momentum_note": "Technical depth and clear problem focus suggest moderate momentum potential", + "relevance_note": "Highly relevant for scalable agent infrastructure and cross-domain collaboration", + "doc_status": "" + }, + { + "name": "draft-yang-ioa-protocol", + "title": "Internet of Agents Protocol (IoA Protocol) for Heterogeneous Agent Collaboration", + "date": "2025-07-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yang-ioa-protocol/", + "pages": 13, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Defines the Internet of Agents Protocol for distributed collaboration among heterogeneous AI agents. Provides layered architecture for dynamic team formation and task coordination across diverse agent types.", + "novelty_note": "Novel protocol specifically for multi-agent collaboration with focus on heterogeneous systems", + "maturity_note": "Well-structured but lacks implementation details and security considerations", + "overlap_note": "Some overlap with general agent communication but focused on collaboration aspects", + "momentum_note": "Targets emerging 6G scenarios which may drive adoption", + "relevance_note": "Highly relevant as multi-agent systems become more prevalent", + "doc_status": "" + }, + { + "name": "draft-rosenberg-oauth-aauth", + "title": "AAuth - Agentic Authorization OAuth 2.1 Extension", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-rosenberg-oauth-aauth/", + "pages": 10, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "AI safety/alignment" + ], + "summary": "Extends OAuth 2.1 for AI agents operating through PSTN/SMS channels to obtain access tokens using PII collected via natural language. Addresses hallucination-based impersonation risks.", + "novelty_note": "Novel OAuth extension specifically designed for AI agent authentication challenges", + "maturity_note": "Moderate maturity at 10 pages with specific technical approach", + "overlap_note": "Extends existing OAuth but addresses unique AI agent use cases", + "momentum_note": "Addresses practical AI deployment needs but faces significant security challenges", + "relevance_note": "Highly relevant for AI agent deployment in practical scenarios", + "doc_status": "" + }, + { + "name": "draft-rosenberg-cheq", + "title": "CHEQ: A Protocol for Confirmation AI Agent Decisions with Human in the Loop (HITL)", + "date": "2025-07-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-rosenberg-cheq/", + "pages": 14, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "AI safety/alignment", + "Human-agent interaction", + "A2A protocols" + ], + "summary": "Proposes CHEQ protocol for human-in-the-loop confirmation of AI agent decisions before execution. Uses signed objects to prevent AI hallucinations from causing unwanted actions while protecting human privacy.", + "novelty_note": "Novel approach to AI safety through structured confirmation protocol with privacy protection", + "maturity_note": "Well-defined protocol but lacks implementation details and security analysis", + "overlap_note": "Some overlap with general AI safety approaches but protocol specifics are unique", + "momentum_note": "Addresses important AI safety concerns but limited community involvement evident", + "relevance_note": "Highly relevant as AI agents become more autonomous and safety becomes critical", + "doc_status": "" + }, + { + "name": "draft-mozleywilliams-dnsop-bandaid", + "title": "Brokered Agent Network for DNS AI Discovery", + "date": "2025-10-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-bandaid/", + "pages": 37, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "A2A protocols", + "Agent identity/auth" + ], + "summary": "Proposes using DNS with SVCB records to enable AI agent discovery and capability advertisement. Leverages existing DNS infrastructure including DNSSEC and DANE for secure agent-to-agent discovery.", + "novelty_note": "Novel application of DNS service discovery specifically for AI agents with structured metadata exchange", + "maturity_note": "Well-structured with clear DNS integration but limited implementation details and security analysis", + "overlap_note": "Complementary to other AI agent protocols, focuses specifically on discovery rather than communication", + "momentum_note": "Addresses clear need for agent discovery but uncertain industry adoption of DNS-based approach", + "relevance_note": "Highly relevant for scalable AI agent ecosystems, leverages proven DNS infrastructure", + "doc_status": "" + }, + { + "name": "draft-zm-rtgwg-mcp-troubleshooting", + "title": "Using the Model Context Protocol (MCP) for Intent-Based Network Troubleshooting Automation", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zm-rtgwg-mcp-troubleshooting/", + "pages": 15, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Human-agent interaction", + "Data formats/interop" + ], + "summary": "Proposes using Model Context Protocol (MCP) to enable LLM-based automated network troubleshooting. Maps MCP roles to network management domain with devices as servers and controllers as clients.", + "novelty_note": "Novel application of MCP to network management with device-to-device collaboration extension", + "maturity_note": "Well-structured but early stage, needs implementation validation", + "overlap_note": "Some overlap with general network automation but MCP approach is distinct", + "momentum_note": "Growing interest in AI-driven network operations but MCP adoption uncertain", + "relevance_note": "Highly relevant as networks become more complex and require intelligent automation", + "doc_status": "" + }, + { + "name": "draft-li-semantic-routing-architecture", + "title": "Semantic Routing Architecture for AI Agents Communication", + "date": "2025-11-04", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-semantic-routing-architecture/", + "pages": 11, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Autonomous netops", + "Agent discovery/reg" + ], + "summary": "Introduces semantic routing architecture using intent vectors and trust scores for AI agent communication. Moves beyond traditional IP routing to application-layer semantic decisions.", + "novelty_note": "Novel semantic-driven routing paradigm for AI agent networks", + "maturity_note": "Clear architecture description but implementation details needed", + "overlap_note": "Distinct from traditional routing protocols, AI agent specific", + "momentum_note": "Solid technical foundation, needs broader community engagement", + "relevance_note": "Addresses key challenge of intelligent agent communication routing", + "doc_status": "" + }, + { + "name": "draft-vandoulas-aidp", + "title": "Agent Interaction & Delegation Protocol (AIDP)", + "date": "2026-01-18", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-vandoulas-aidp/", + "pages": 34, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent identity/auth", + "Policy/governance" + ], + "summary": "Defines a comprehensive control-plane protocol for secure agent interactions with delegation, authority enforcement, and cross-domain interoperability. Addresses core infrastructure needs for multi-agent systems with auditable execution binding.", + "novelty_note": "Novel integration of intent expression, capability delegation, and execution result binding in single protocol", + "maturity_note": "Well-structured but lacks implementation details and security analysis depth", + "overlap_note": "Some overlap with general agent communication but unique delegation focus", + "momentum_note": "Addresses clear industry need but no implementation indicators mentioned", + "relevance_note": "Highly relevant as foundational infrastructure for enterprise agent deployments", + "doc_status": "" + }, + { + "name": "draft-messous-eat-ai", + "title": "Entity Attestation Token (EAT) Profile for Autonomous AI Agents", + "date": "2026-02-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-messous-eat-ai/", + "pages": 18, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "Policy/governance" + ], + "summary": "Defines an Entity Attestation Token profile for remote attestation of autonomous AI agents, specifying claims for model integrity, training data provenance, and inference policies. Extends EAT for AI-specific attestation needs within the IETF RATS architecture.", + "novelty_note": "Novel application of EAT to AI agent attestation with specific claims for model parameters and training data provenance", + "maturity_note": "Reasonable technical depth but could benefit from more implementation details and security analysis", + "overlap_note": "Some overlap with general RATS work but AI-specific attestation claims are relatively unique", + "momentum_note": "Addresses emerging need for AI agent trust but limited demonstrated industry adoption", + "relevance_note": "Highly relevant for trustworthy AI deployment and aligns with growing focus on AI safety and verification", + "doc_status": "" + }, + { + "name": "draft-cui-nmrg-auto-test", + "title": "Framework and Automation Levels for AI-Assisted Network Protocol Testing", + "date": "2026-02-22", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-cui-nmrg-auto-test/", + "pages": 14, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "ML traffic mgmt", + "Other AI/agent" + ], + "summary": "Framework for AI-assisted network protocol testing using LLMs and automated test generation. Defines automation maturity levels from manual (Level 0) to fully autonomous testing (Level 5).", + "novelty_note": "Novel application of LLMs to protocol testing with structured automation maturity model", + "maturity_note": "Good framework structure with clear levels but needs more implementation detail", + "overlap_note": "Some overlap with general testing automation but AI-specific focus is relatively unique", + "momentum_note": "Research group draft in active AI networking area with practical applications", + "relevance_note": "Highly relevant to AI-assisted network operations and protocol development", + "doc_status": "" + }, + { + "name": "draft-reilly-sentinel-protocol", + "title": "Reilly Sentinel Protocol (RSP): Blockchain-Anchored Integrity for AI Datasets, Training, Fine-Tuning, and Inference Provenance", + "date": "2025-09-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-reilly-sentinel-protocol/", + "pages": 11, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "AI safety/alignment", + "Data formats/interop", + "Policy/governance" + ], + "summary": "Defines blockchain-anchored integrity protocol for AI lifecycle provenance using Sentinel Evidence Packages. Provides tamper-evident audit trails for datasets, training, and inference.", + "novelty_note": "Creative combination of blockchain timestamping with AI provenance tracking", + "maturity_note": "Well-defined protocol structure but needs implementation validation", + "overlap_note": "Unique focus on blockchain-anchored AI provenance", + "momentum_note": "Addresses regulatory compliance needs but blockchain dependency may limit adoption", + "relevance_note": "Very relevant for regulated AI deployments and safety-critical applications", + "doc_status": "" + }, + { + "name": "draft-altanai-aipref-realtime-protocol-bindings", + "title": "AI Preferences for Real-Time Protocol Bindings", + "date": "2026-02-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-altanai-aipref-realtime-protocol-bindings/", + "pages": 15, + "group": "individual", + "score": 3.65, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Human-agent interaction", + "Data formats/interop" + ], + "summary": "Defines how AI preference expressions are bound to real-time protocols like SIP and SDP. Specifies headers and attributes for endpoints and AI assistants to negotiate AI processing requirements for session metadata and media.", + "novelty_note": "Novel integration of AI preferences into established real-time communication protocols", + "maturity_note": "Well-structured with concrete protocol bindings but early stage implementation", + "overlap_note": "Limited overlap, focuses specifically on real-time protocol bindings for AI preferences", + "momentum_note": "Addresses emerging need for AI integration in telecom but niche application area", + "relevance_note": "Highly relevant as AI assistants become integrated into communication systems", + "doc_status": "" + }, + { + "name": "draft-mozleywilliams-dnsop-dnsaid", + "title": "DNS for AI Discovery", + "date": "2026-02-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-dnsaid/", + "pages": 24, + "group": "individual", + "score": 3.6, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Uses existing DNS infrastructure for AI agent discovery through structured namespace and metadata exchange. Enables organizations to publish agent capabilities in their DNS domains.", + "novelty_note": "Leverages proven DNS infrastructure for new AI agent discovery use case", + "maturity_note": "Well-structured specification building on solid DNS foundation with clear scope", + "overlap_note": "Overlaps with IAIP on agent discovery but uses different DNS-based approach", + "momentum_note": "High adoption potential due to DNS ubiquity and no protocol changes required", + "relevance_note": "Highly relevant for scalable agent discovery and interoperability", + "doc_status": "" + }, + { + "name": "draft-eggert-mailmaint-uaautoconf", + "title": "Automatic Configuration of Email, Calendar, and Contact Server Settings", + "date": "2025-09-28", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-eggert-mailmaint-uaautoconf/", + "pages": 41, + "group": "individual", + "score": 3.6, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Specifies automatic configuration mechanism for email, calendar, and contact applications. Enables service providers to publish standardized configuration data for simplified client setup.", + "novelty_note": "Builds on existing autoconfig concepts but provides comprehensive multi-service approach", + "maturity_note": "Substantial 41-page document indicates thorough development and consideration of use cases", + "overlap_note": "Some overlap with existing email autoconfig mechanisms and service discovery protocols", + "momentum_note": "Strong author reputation and comprehensive scope suggests good momentum", + "relevance_note": "Highly relevant for simplifying user experience and reducing configuration errors", + "doc_status": "" + }, + { + "name": "draft-ietf-ace-edhoc-oscore-profile", + "title": "Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-ace-edhoc-oscore-profile/", + "pages": 91, + "group": "individual", + "score": 3.6, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "A2A protocols" + ], + "summary": "Defines ACE framework profile using EDHOC for mutual authentication and OSCORE for secure communication. Enables authorization delegation from constrained devices to more capable hosts.", + "novelty_note": "Reasonable novelty in combining existing protocols for constrained environment authorization", + "maturity_note": "Comprehensive 91-page specification from established IETF working group", + "overlap_note": "Moderate overlap with existing ACE, EDHOC, and OSCORE specifications", + "momentum_note": "Strong IETF working group support and addresses real IoT deployment needs", + "relevance_note": "Very relevant for IoT and constrained device security architectures", + "doc_status": "" + }, + { + "name": "draft-xsaopig-nsttlp-traffic-labeling", + "title": "Network Service Type-Aware Traffic Labeling Protocol (NST-TLP)", + "date": "2026-01-29", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-xsaopig-nsttlp-traffic-labeling/", + "pages": 15, + "group": "individual", + "score": 3.6, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops", + "Policy/governance" + ], + "summary": "Specifies protocol for embedding service type identifiers in network packets to enable intelligent traffic recognition and policy-based forwarding. Supports various applications from VR to IoT with standardized service labels.", + "novelty_note": "Builds on existing traffic classification concepts but provides standardized labeling approach", + "maturity_note": "Well-defined protocol with clear packet header specifications and implementation guidance", + "overlap_note": "Overlaps with existing QoS and traffic classification mechanisms but adds AI-awareness", + "momentum_note": "Addresses practical network management needs with implementable solution", + "relevance_note": "Very relevant for AI workload management and network optimization", + "doc_status": "" + }, + { + "name": "draft-gaikwad-aps-profile", + "title": "Agent Persistent State Profile", + "date": "2025-11-30", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-gaikwad-aps-profile/", + "pages": 22, + "group": "individual", + "score": 3.6, + "novelty": 4, + "maturity": 3, + "overlap": 1, + "momentum": 2, + "relevance": 4, + "categories": [ + "Data formats/interop", + "Policy/governance" + ], + "summary": "Storage service profile for agent persistent state including embeddings, preferences, and audit logs. Addresses compliance and performance needs for AI agent storage.", + "novelty_note": "First standardization attempt for AI agent-specific storage requirements", + "maturity_note": "Detailed experimental specification with Kubernetes integration", + "overlap_note": "Novel focus on agent-specific storage class requirements", + "momentum_note": "Individual experimental draft seeking feedback", + "relevance_note": "Addresses critical infrastructure needs for persistent AI agents", + "doc_status": "" + }, + { + "name": "draft-moreno-lisp-uberlay", + "title": "Uberlay Interconnection of Multiple LISP overlays", + "date": "2025-10-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-moreno-lisp-uberlay/", + "pages": 20, + "group": "individual", + "score": 3.6, + "novelty": 4, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 3, + "categories": [ + "Data formats/interop", + "Autonomous netops" + ], + "summary": "Describes using LISP to interconnect multiple independent network overlays through a transit overlay called 'uberlay'. Enables interworking of different overlay approaches while maintaining autonomy and failure survivability across domains.", + "novelty_note": "High novelty - novel approach to multi-overlay interconnection using LISP", + "maturity_note": "Mature specification with detailed mechanisms and procedures", + "overlap_note": "Some overlap with LISP work but focuses on multi-overlay interconnection", + "momentum_note": "Moderate momentum within LISP community", + "relevance_note": "Moderate relevance for complex overlay network deployments", + "doc_status": "" + }, + { + "name": "draft-li-cats-idn", + "title": "A Framework of Intelligence Delivery Network (IDN) for Deep Learning Inference", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-cats-idn/", + "pages": 15, + "group": "individual", + "score": 3.6, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 5, + "categories": [ + "Model serving/inference", + "Agent discovery/reg" + ], + "summary": "Introduces Intelligence Delivery Network (IDN) framework for deploying ML models across distributed servers for latency-aware inference. Focuses on architectural framework and vocabulary without protocol details.", + "novelty_note": "Extends CDN concepts to AI inference but builds on established distributed computing ideas", + "maturity_note": "Reasonable length with architectural framework but explicitly defers protocol details", + "overlap_note": "Some overlap with ODSI on distributed inference but different focus areas", + "momentum_note": "Moderate length and framework approach suggests some development investment", + "relevance_note": "Addresses critical need for distributed AI inference infrastructure", + "doc_status": "" + }, + { + "name": "draft-liu-oauth-a2a-profile", + "title": "Agent-to-Agent (A2A) Profile for OAuth Transaction Tokens", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-oauth-a2a-profile/", + "pages": 5, + "group": "individual", + "score": 3.6, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "A2A protocols" + ], + "summary": "Specifies OAuth Transaction Token profile for Agent-to-Agent communication. Embeds call chain context to maintain agent identity and authorization across distributed agent workloads.", + "novelty_note": "Novel application of OAuth Transaction Tokens specifically for agent-to-agent scenarios", + "maturity_note": "Very brief draft at 5 pages, needs substantial development and detail", + "overlap_note": "Builds on existing OAuth work but applies it to new agent communication domain", + "momentum_note": "Addresses emerging need for agent authentication but needs broader community input", + "relevance_note": "Highly relevant for AI agent ecosystems requiring secure inter-agent communication", + "doc_status": "" + }, + { + "name": "draft-templin-6man-aero3", + "title": "Automatic Extended Route Optimization (AERO)", + "date": "2026-02-28", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-templin-6man-aero3/", + "pages": 99, + "group": "individual", + "score": 3.6, + "novelty": 4, + "maturity": 4, + "overlap": 3, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Autonomous netops" + ], + "summary": "Specifies automatic extended route optimization for IP internetworking over overlay multilink networks. Targets air/land/sea/space mobile applications with IPv6 neighbor discovery control plane.", + "novelty_note": "Comprehensive approach to multilink overlay networking with novel OMNI interface concept", + "maturity_note": "Very detailed 99-page specification suggesting significant development effort and maturity", + "overlap_note": "Overlaps with existing mobility and overlay networking solutions but offers integrated approach", + "momentum_note": "Long-running work by established author but limited broader community engagement visible", + "relevance_note": "Highly relevant for emerging mobile and space networking requirements", + "doc_status": "" + }, + { + "name": "draft-liu-dmsc-acps-arc", + "title": "Agent Collaboration Protocols Architecture for Internet of Agents", + "date": "2026-01-29", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-dmsc-acps-arc/", + "pages": 16, + "group": "individual", + "score": 3.55, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 4, + "relevance": 5, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Agent identity/auth", + "Autonomous netops" + ], + "summary": "Proposes Agent Collaboration Protocols architecture for Internet of Agents, covering agent lifecycle from access to collaboration. Includes trusted registration, authentication, discovery, interaction, and monitoring components.", + "novelty_note": "Comprehensive agent collaboration architecture but builds on established distributed systems concepts", + "maturity_note": "Good architectural overview but needs more detailed protocol specifications", + "overlap_note": "Heavy overlap with draft-li-dmsc-mcps-agw and similar multi-agent collaboration efforts", + "momentum_note": "Strong momentum as part of broader Internet of Agents standardization push", + "relevance_note": "Highly relevant for future large-scale agent deployments and IoA infrastructure", + "doc_status": "" + }, + { + "name": "draft-ietf-lake-edhoc-psk", + "title": "EDHOC Authenticated with Pre-Shared Keys (PSK)", + "date": "2025-11-21", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lake-edhoc-psk/", + "pages": 31, + "group": "individual", + "score": 3.55, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Data formats/interop" + ], + "summary": "Specifies pre-shared key authentication method for EDHOC key exchange protocol. Enhances efficiency while providing mutual authentication and quantum resistance.", + "novelty_note": "PSK method extension to existing EDHOC protocol", + "maturity_note": "Comprehensive 31-page specification with detailed security considerations", + "overlap_note": "Extends EDHOC but PSK approach is relatively unique", + "momentum_note": "Steady progress in LAKE working group", + "relevance_note": "Important for IoT and constrained device authentication", + "doc_status": "" + }, + { + "name": "draft-pbs-sidrops-roaanycast", + "title": "Route Origin Authorization (ROA) Governance for Anycasted Services with Unique Origin ASNs", + "date": "2025-09-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-pbs-sidrops-roaanycast/", + "pages": 7, + "group": "individual", + "score": 3.55, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Policy/governance", + "Autonomous netops" + ], + "summary": "Defines best practices for managing Route Origin Authorizations (ROAs) for globally anycasted services where each anycast node uses a unique origin ASN. Addresses technical risks and mitigation strategies for RPKI operations in anycast deployments.", + "novelty_note": "Moderate novelty - addresses specific gap in ROA management for unique-ASN anycast deployments", + "maturity_note": "Well-developed with concrete best practices and risk mitigation strategies", + "overlap_note": "Limited overlap with existing RPKI/ROA work, focuses on specific anycast scenario", + "momentum_note": "Moderate momentum - addresses operational need in RPKI community", + "relevance_note": "High relevance for network operators using anycast with RPKI validation", + "doc_status": "" + }, + { + "name": "draft-vaughan-aipref-vocab", + "title": "Vocabulary for Expressing Content Preferences for AI Training", + "date": "2025-07-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-vaughan-aipref-vocab/", + "pages": 13, + "group": "individual", + "score": 3.55, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 4, + "relevance": 5, + "categories": [ + "Policy/governance", + "Data formats/interop", + "AI safety/alignment" + ], + "summary": "Proposes vocabulary for rightsholders to express content preferences for AI training use through metadata or content-delivery protocols. Provides structured approach to permissions, usage scope, and data retention preferences.", + "novelty_note": "Addresses emerging need for AI training consent mechanisms with structured vocabulary approach", + "maturity_note": "Reasonably detailed vocabulary specification but needs broader ecosystem adoption", + "overlap_note": "Significant overlap with related aipref drafts addressing similar content preference concerns", + "momentum_note": "Strong relevance to current AI training and copyright concerns", + "relevance_note": "Extremely relevant to current debates over AI training data rights and consent", + "doc_status": "" + }, + { + "name": "draft-liu-agent-context-protocol", + "title": "Agent Context Protocol", + "date": "2026-01-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-agent-context-protocol/", + "pages": 8, + "group": "individual", + "score": 3.55, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 5, + "categories": [ + "A2A protocols", + "Data formats/interop" + ], + "summary": "This draft proposes a standard protocol for AI agents to communicate context information to each other, independent of the underlying communication protocol. It defines semantic standards for agent context messages to improve interoperability and enable more accurate responses from called agents.", + "novelty_note": "First standardization attempt for agent context communication semantics", + "maturity_note": "Very early draft (version 00), incomplete with truncated content and minimal technical detail", + "overlap_note": "Limited overlap with existing networking protocols, focuses on AI-specific context semantics", + "momentum_note": "Single author from industry, no WG adoption evident, first version with no revision history", + "relevance_note": "Directly addresses core need for standardized AI agent interoperability and context sharing", + "doc_status": "" + }, + { + "name": "draft-liang-agentdns", + "title": "AgentDNS: A Root Domain Naming System for LLM Agents", + "date": "2025-10-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liang-agentdns/", + "pages": 22, + "group": "individual", + "score": 3.55, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "A2A protocols", + "Agent identity/auth" + ], + "summary": "Proposes a DNS-inspired naming and service discovery system for LLM agents to enable autonomous discovery and invocation of third-party services. Addresses interoperability and trust management in agent collaboration ecosystems.", + "novelty_note": "Novel application of DNS concepts to agent ecosystems with semantic discovery", + "maturity_note": "Well-structured but lacks implementation details and evaluation", + "overlap_note": "Overlaps with draft-cui-ai-agent-discovery-invocation on agent discovery", + "momentum_note": "Addresses clear need but no evidence of industry adoption yet", + "relevance_note": "Highly relevant for emerging agent interoperability challenges", + "doc_status": "" + }, + { + "name": "draft-song-oauth-ai-agent-collaborate-authz", + "title": "OAuth2.0 Extension for Multi-AI Agent Collaboration: Applier-On-Behalf-Of Authorization", + "date": "2025-11-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-song-oauth-ai-agent-collaborate-authz/", + "pages": 8, + "group": "individual", + "score": 3.55, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "A2A protocols", + "Policy/governance" + ], + "summary": "Proposes OAuth 2.0 extension for multi-AI agent collaboration with applier-on-behalf-of authorization. Simplifies authorization for coordinated agent workflows.", + "novelty_note": "Novel approach to multi-agent authorization coordination", + "maturity_note": "Clear technical approach with specific OAuth extension", + "overlap_note": "Some overlap with general OAuth delegation patterns", + "momentum_note": "Good momentum addressing practical multi-agent needs", + "relevance_note": "Highly relevant for multi-agent system deployment", + "doc_status": "" + }, + { + "name": "draft-mozley-aidiscovery", + "title": "AI Agent Discovery (AID) Problem Statement", + "date": "2025-10-15", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mozley-aidiscovery/", + "pages": 8, + "group": "individual", + "score": 3.55, + "novelty": 4, + "maturity": 2, + "overlap": 1, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "A2A protocols" + ], + "summary": "Defines requirements and considerations for AI agent-to-agent discovery mechanisms. Addresses the fundamental problem of how AI agents locate and identify each other in distributed systems.", + "novelty_note": "Novel focus on agent discovery protocols, addressing emerging need as AI agents proliferate", + "maturity_note": "Early stage problem statement, only 8 pages, lacks concrete protocol specification", + "overlap_note": "Unique focus on AI agent discovery, no significant overlap with existing drafts", + "momentum_note": "Addresses timely need but limited concrete progress shown", + "relevance_note": "Highly relevant as AI agents become more common and need discovery mechanisms", + "doc_status": "" + }, + { + "name": "draft-ye-problems-and-requirements-of-dns-for-ioa", + "title": "Problems Statement and Requirements Analysis of DNS for Internet of Agents (IoA)", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ye-problems-and-requirements-of-dns-for-ioa/", + "pages": 10, + "group": "individual", + "score": 3.55, + "novelty": 4, + "maturity": 2, + "overlap": 1, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "Autonomous netops" + ], + "summary": "Analyzes DNS challenges for Internet of Agents scenarios and identifies technical requirements. Explores how DNS must evolve to support agent collaboration in AI-driven environments.", + "novelty_note": "First systematic analysis of DNS requirements specifically for Internet of Agents", + "maturity_note": "Problem statement stage with limited concrete solutions or protocol specifications", + "overlap_note": "Unique focus on DNS for agent networks, no direct overlap with existing work", + "momentum_note": "Addresses important infrastructure need but early stage with limited community traction", + "relevance_note": "Very relevant for agent discovery and naming in large-scale AI systems", + "doc_status": "" + }, + { + "name": "draft-wang-hjs-accountability", + "title": "HJS: An Accountability Layer for AI Agents", + "date": "2026-02-21", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-wang-hjs-accountability/", + "pages": 8, + "group": "individual", + "score": 3.55, + "novelty": 4, + "maturity": 2, + "overlap": 1, + "momentum": 3, + "relevance": 4, + "categories": [ + "Policy/governance", + "AI safety/alignment", + "A2A protocols" + ], + "summary": "Defines HJS accountability layer for AI agents using blockchain-anchored timestamps to create immutable responsibility chains. Provides primitives for judgment, delegation, termination, and verification with court-admissible evidence.", + "novelty_note": "Novel blockchain integration for AI agent accountability with legal framework consideration", + "maturity_note": "Brief specification lacking implementation details and integration examples", + "overlap_note": "Unique blockchain-based accountability approach, no direct overlap with other drafts", + "momentum_note": "Important problem space but may face adoption challenges due to blockchain dependency", + "relevance_note": "Addresses critical need for AI agent accountability and legal traceability", + "doc_status": "" + }, + { + "name": "draft-irtf-nmrg-llm-nm", + "title": "A Framework for LLM-Assisted Network Management with Human-in-the-Loop", + "date": "2025-09-14", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-irtf-nmrg-llm-nm/", + "pages": 12, + "group": "individual", + "score": 3.55, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Human-agent interaction", + "Data formats/interop" + ], + "summary": "Defines framework for collaborative network management between LLMs and human operators with human-in-the-loop oversight. Introduces telemetry modules and standardized interaction models.", + "novelty_note": "Good integration of human oversight with LLM automation in network management", + "maturity_note": "Moderate maturity with defined framework components and workflows", + "overlap_note": "Overlaps with autonomous network operations but adds human-in-the-loop aspect", + "momentum_note": "IRTF draft suggests research community interest but moderate momentum", + "relevance_note": "Highly relevant for practical LLM deployment in network operations", + "doc_status": "" + }, + { + "name": "draft-zeng-mcp-network-measurement", + "title": "MCP-based Network Measurement Framework: Using Model Context Protocol for Intelligent Network Measurement", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zeng-mcp-network-measurement/", + "pages": 10, + "group": "individual", + "score": 3.55, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Human-agent interaction", + "ML traffic mgmt" + ], + "summary": "Proposes MCP framework for intelligent network measurement with AI assistance. Enables natural language-driven network monitoring and fault diagnosis.", + "novelty_note": "Novel application of MCP to specific network measurement domain with natural language interface", + "maturity_note": "Reasonable maturity with concrete use cases but still developing technical details", + "overlap_note": "Some overlap with general MCP network management but focuses on measurement", + "momentum_note": "Moderate momentum with focused application area and multiple related drafts by author", + "relevance_note": "Very relevant for AI-assisted network operations and intelligent monitoring", + "doc_status": "" + }, + { + "name": "draft-templin-intarea-aero", + "title": "Automatic Extended Route Optimization (AERO)", + "date": "2024-02-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-templin-intarea-aero/", + "pages": 120, + "group": "individual", + "score": 3.55, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "ML traffic mgmt" + ], + "summary": "Specifies Automatic Extended Route Optimization (AERO) service for IP internetworking over Overlay Multilink Network interfaces. Supports mobility management, multicast forwarding, and route optimization for air/land/sea/space applications.", + "novelty_note": "High novelty - comprehensive overlay networking solution with unique mobility focus", + "maturity_note": "Complex 120-page specification may need refinement, but technically comprehensive", + "overlap_note": "Moderate overlap with other mobility and overlay networking solutions", + "momentum_note": "Strong technical depth but niche application areas may limit adoption", + "relevance_note": "Highly relevant for next-gen mobility scenarios including IoT, aviation, and space networks", + "doc_status": "" + }, + { + "name": "draft-ahn-nmrg-5g-security-i2nsf-framework", + "title": "An Integrated Security Service System for 5G Networks using an I2NSF Framework", + "date": "2026-02-25", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ahn-nmrg-5g-security-i2nsf-framework/", + "pages": 16, + "group": "individual", + "score": 3.5, + "novelty": 3, + "maturity": 4, + "overlap": 4, + "momentum": 4, + "relevance": 4, + "categories": [ + "Policy/governance", + "Autonomous netops", + "Agent identity/auth" + ], + "summary": "Presents integrated framework for automated 5G edge network security using I2NSF architecture and Intent-Based Networking. Enables high-level security intent translation into enforceable policies across network and application layers.", + "novelty_note": "Moderate novelty - integrates existing I2NSF and IBN concepts for 5G security", + "maturity_note": "Well-developed framework with detailed architecture and policy mechanisms", + "overlap_note": "Significant overlap with I2NSF, IBN, and 5G security work", + "momentum_note": "High momentum driven by 5G deployment and security automation needs", + "relevance_note": "High relevance for 5G network security and automated policy management", + "doc_status": "" + }, + { + "name": "draft-jia-oauth-scope-aggregation", + "title": "OAuth 2.0 Scope Aggregation for Multi-Step AI Agent Workflows", + "date": "2026-02-10", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jia-oauth-scope-aggregation/", + "pages": 15, + "group": "individual", + "score": 3.5, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Policy/governance" + ], + "summary": "Extends OAuth 2.0 with scope aggregation to reduce authorization round-trips in multi-step AI agent workflows. Improves efficiency by bundling required permissions upfront.", + "novelty_note": "Practical extension to existing OAuth for AI workflow optimization", + "maturity_note": "Well-defined problem with clear solution building on established OAuth framework", + "overlap_note": "Extends OAuth but addresses AI-specific use case not covered elsewhere", + "momentum_note": "Strong potential adoption given OAuth ubiquity and clear efficiency benefits", + "relevance_note": "Very relevant for AI agent authorization and workflow management", + "doc_status": "" + }, + { + "name": "draft-meta-layer-overview", + "title": "The Meta-Layer: A Coordination Substrate for Presence, Annotation, and Governance on the Web", + "date": "2025-10-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-meta-layer-overview/", + "pages": 11, + "group": "individual", + "score": 3.5, + "novelty": 5, + "maturity": 1, + "overlap": 1, + "momentum": 2, + "relevance": 4, + "categories": [ + "Policy/governance", + "Human-agent interaction", + "A2A protocols" + ], + "summary": "Introduces Meta-layer concept as coordination substrate for presence, annotation, and governance on the web. Enables communities and agents to collaborate in shared digital spaces above content layers.", + "novelty_note": "Highly novel architectural concept for web-scale coordination and governance", + "maturity_note": "Very early conceptual stage, lacks concrete protocols or implementation details", + "overlap_note": "Unique architectural vision with no direct parallels in existing work", + "momentum_note": "Ambitious concept but needs significant development and community building", + "relevance_note": "Relevant for agent coordination and governance but very early stage", + "doc_status": "" + }, + { + "name": "draft-ietf-emu-pqc-eapaka", + "title": "Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA prime", + "date": "2026-02-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-emu-pqc-eapaka/", + "pages": 20, + "group": "individual", + "score": 3.5, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth" + ], + "summary": "This draft proposes enhancing EAP-AKA' Forward Secrecy with Post-Quantum Key Encapsulation Mechanisms to protect against future quantum computer threats. It builds on RFC9678 by replacing traditional ECDHE key exchange with quantum-resistant alternatives.", + "novelty_note": "Incremental enhancement of existing protocol with established PQ-KEM techniques", + "maturity_note": "Draft stage with reasonable technical foundation but requires implementation validation", + "overlap_note": "Specific application to EAP-AKA' with limited overlap in similar PQ-KEM integrations", + "momentum_note": "High momentum due to urgent quantum threat timeline and active IETF post-quantum standardization efforts", + "relevance_note": "Highly relevant for securing authentication infrastructure against quantum threats", + "doc_status": "" + }, + { + "name": "draft-chen-agent-decoupled-authorization-model", + "title": "A Decoupled Authorization Model for Agent2Agent", + "date": "2026-02-14", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chen-agent-decoupled-authorization-model/", + "pages": 6, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "Policy/governance" + ], + "summary": "This draft proposes a decoupled authorization framework for AI agents that enables dynamic, intent-based permissions through Just-in-Time authorization decisions rather than static role-based access. It addresses the challenges of traditional authorization models when applied to ephemeral, autonomous AI agents by separating authorization decisions (ADP) from enforcement points (AEP).", + "novelty_note": "Intent-based authorization for AI agents and decoupled ADP/AEP architecture is a novel approach to a real emerging problem", + "maturity_note": "Very early draft (00) with incomplete sections, truncated content, and missing critical implementation details", + "overlap_note": "Builds on OAuth 2.0 (RFC 6749) and traditional authorization frameworks but addresses AI-specific gaps not covered by existing work", + "momentum_note": "No clear WG adoption indicated, early version from China Mobile authors, no revision history to assess community interest", + "relevance_note": "Directly addresses critical security and authorization challenges for AI agent ecosystems, which is fundamental to safe agent deployment", + "doc_status": "" + }, + { + "name": "draft-huang-acme-scalable-agent-enrollment", + "title": "Extending Certificate Enrollment Protocols for Scalable Agentic AI Identity", + "date": "2025-12-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-huang-acme-scalable-agent-enrollment/", + "pages": 9, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Agent discovery/reg" + ], + "summary": "This draft proposes two scalable models for certificate enrollment of AI agents: one using Zero-Knowledge Proofs for privacy-preserving attestation, and another using trusted host environments to endorse agent certificates. It addresses the scalability bottleneck of performing full attestation validation for every agent enrollment in large-scale deployments.", + "novelty_note": "Novel application of ZKP and host-based trust models to AI agent certificate enrollment, addressing specific scalability challenges not covered in existing standards", + "maturity_note": "Early draft with incomplete specification, missing protocol details, security analysis, and implementation considerations", + "overlap_note": "Builds on existing SCEP/EST protocols and RATS attestation framework, but proposes new extensions rather than duplicating existing work", + "momentum_note": "New draft (-00) from authors without clear IETF track record, submitted to RATS WG but no indication of WG adoption or review", + "relevance_note": "Directly addresses core challenge of scalable identity management for AI agents, which is fundamental to secure agent deployment", + "doc_status": "" + }, + { + "name": "draft-ietf-sml-trust", + "title": "Trust and security considerations for Structured Email", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-sml-trust/", + "pages": 7, + "group": "individual", + "score": 3.45, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 4, + "relevance": 3, + "categories": [ + "Data formats/interop", + "AI safety/alignment" + ], + "summary": "Provides trust and security recommendations for handling structured data in email messages. Addresses security considerations for message user agents processing structured email content.", + "novelty_note": "Incremental security guidance for existing structured email approaches", + "maturity_note": "IETF working group draft with established discussion venue and GitHub repo", + "overlap_note": "Some overlap with general email security but focused on structured data", + "momentum_note": "Active IETF working group with clear development process", + "relevance_note": "Relevant for email systems but limited AI/agent focus", + "doc_status": "" + }, + { + "name": "draft-zhang-rvp-problem-statement", + "title": "Problem Statements and Requirements of Real-Virtual Agent Protocol (RVP): Communication Protocol for Embodied Intelligence in Physical- Digital Continuum", + "date": "2025-10-21", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhang-rvp-problem-statement/", + "pages": 23, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 5, + "categories": [ + "A2A protocols", + "Agent identity/auth", + "Autonomous netops" + ], + "summary": "Proposes Real-Virtual Agent Protocol for coordinating physical entities with digital agents through unified identity management. Targets manufacturing, smart cities, and human-AI collaborative environments.", + "novelty_note": "Novel approach to physical-digital agent coordination with composite identity", + "maturity_note": "Problem statement stage, lacks implementation details and deployment experience", + "overlap_note": "Some overlap with IoT and agent protocols but unique physical-digital focus", + "momentum_note": "Individual submission without clear standardization momentum", + "relevance_note": "Highly relevant for embodied AI and physical-digital agent coordination", + "doc_status": "" + }, + { + "name": "draft-zeng-opsawg-applicability-mcp-a2a", + "title": "When NETCONF Is Not Enough: Applicability of MCP and A2A for Advanced Network Management Scenarios", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zeng-opsawg-applicability-mcp-a2a/", + "pages": 12, + "group": "individual", + "score": 3.45, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Analyzes NETCONF limitations for advanced scenarios and proposes MCP and A2A protocols as complementary solutions. Provides implementation guidance and coexistence models.", + "novelty_note": "Practical applicability analysis but builds on existing protocol concepts", + "maturity_note": "Detailed implementation guidance with coexistence models shows maturity", + "overlap_note": "Some overlap with existing NETCONF extensions but unique multi-protocol approach", + "momentum_note": "Operations working group context with practical implementation focus", + "relevance_note": "Relevant for advanced network management and agent integration", + "doc_status": "" + }, + { + "name": "draft-li-dmsc-mcps-agw", + "title": "Multi-agent Collaboration Protocol Suite based on Agent Gateway", + "date": "2026-02-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-dmsc-mcps-agw/", + "pages": 7, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Agent identity/auth" + ], + "summary": "Defines a protocol suite using Agent Gateways as control-plane entities for multi-agent collaboration. Enables agent registration, authentication, capability management and semantic routing while preserving P2P interactions.", + "novelty_note": "Gateway-based architecture for agent collaboration is a solid architectural approach", + "maturity_note": "Good architectural foundation but likely needs more protocol detail for full implementation", + "overlap_note": "Significant overlap with other agent collaboration drafts, particularly draft-liu-dmsc-acps-arc", + "momentum_note": "Part of emerging multi-agent collaboration standardization efforts", + "relevance_note": "Highly relevant as multi-agent systems become more prevalent in distributed computing", + "doc_status": "" + }, + { + "name": "draft-ar-emu-hybrid-pqc-eapaka", + "title": "Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography", + "date": "2025-07-10", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ar-emu-hybrid-pqc-eapaka/", + "pages": 13, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth" + ], + "summary": "Enhances EAP-AKA' with hybrid post-quantum cryptography combining traditional and quantum-resistant algorithms. Provides quantum safety while maintaining backwards compatibility.", + "novelty_note": "Hybrid approach offers practical transition strategy", + "maturity_note": "Solid technical foundation but needs implementation validation", + "overlap_note": "Direct overlap with draft-ra-emu-pqc-eapaka on same protocol", + "momentum_note": "Growing interest in hybrid PQC approaches", + "relevance_note": "Highly relevant for quantum-resistant authentication evolution", + "doc_status": "" + }, + { + "name": "draft-yuan-rtgwg-security-agent-usecase", + "title": "Use cases of the AI Network Security Agent", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yuan-rtgwg-security-agent-usecase/", + "pages": 7, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "AI safety/alignment", + "Policy/governance" + ], + "summary": "Proposes AI Network Security Agents for routers to provide intelligent, adaptive security capabilities beyond traditional static ACLs and signature-based detection. Outlines four key use cases including dynamic defense, ACL optimization, configuration security, and collaborative defense.", + "novelty_note": "Novel application of AI agents specifically to network security with concrete use cases, though AI in security is not new", + "maturity_note": "Early stage with high-level concepts and scenarios but lacks technical implementation details", + "overlap_note": "Some overlap with general AI agent networking concepts but security focus is distinctive", + "momentum_note": "Security applications of AI agents have industry interest but this is an early contribution", + "relevance_note": "Highly relevant as network security increasingly needs intelligent automation and adaptive responses", + "doc_status": "" + }, + { + "name": "draft-huang-rats-agentic-eat-cap-attest", + "title": "Capability Attestation Extensions for the Entity Attestation Token (EAT) in Agentic AI Systems", + "date": "2025-12-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-huang-rats-agentic-eat-cap-attest/", + "pages": 6, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "Policy/governance" + ], + "summary": "Extends Entity Attestation Token (EAT) to support capability attestation for agentic AI systems. Enables secure assertion of agent functional, reasoning, and operational capabilities.", + "novelty_note": "Novel application of EAT to agentic systems with new capability-specific claims", + "maturity_note": "Early stage draft at only 6 pages with basic specification", + "overlap_note": "Some overlap with agent identity work but unique attestation focus", + "momentum_note": "Part of emerging RATS working group interest in AI systems", + "relevance_note": "Highly relevant for trustworthy AI deployment and verification", + "doc_status": "" + }, + { + "name": "draft-jiang-seat-dynamic-attestation", + "title": "Dynamic Attestation for AI Agent Communication", + "date": "2025-11-13", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jiang-seat-dynamic-attestation/", + "pages": 5, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "AI safety/alignment", + "A2A protocols" + ], + "summary": "Defines dynamic attestation mechanisms for AI agents to convey runtime posture changes during long-lived TLS sessions. Enables relying parties to make authorization decisions based on current agent state including platform TCB, manifest, and runtime context.", + "novelty_note": "Novel application of remote attestation to AI agent runtime verification with dynamic updates", + "maturity_note": "Early stage use case description, lacks detailed protocol specification", + "overlap_note": "Some overlap with general remote attestation work but AI agent focus is distinct", + "momentum_note": "Addresses real need for trusted AI agent communication but limited detail", + "relevance_note": "Highly relevant for secure AI agent deployments and trust establishment", + "doc_status": "" + }, + { + "name": "draft-romanchuk-normative-admissibility", + "title": "Normative Admissibility Framework for Agent Speech Acts", + "date": "2026-01-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-romanchuk-normative-admissibility/", + "pages": 16, + "group": "individual", + "score": 3.45, + "novelty": 5, + "maturity": 2, + "overlap": 1, + "momentum": 2, + "relevance": 3, + "categories": [ + "AI safety/alignment", + "A2A protocols", + "Policy/governance" + ], + "summary": "Establishes a framework for evaluating whether autonomous agent speech acts are admissible based on modality and grounding state. Focuses on deterministic evaluation without requiring semantic truth verification.", + "novelty_note": "Highly novel approach to agent communication validation using speech act theory and formal logic", + "maturity_note": "Theoretical framework is well-developed but practical implementation details are unclear", + "overlap_note": "Unique approach not seen in other agent protocol drafts", + "momentum_note": "Specialized academic approach may have limited industry adoption momentum", + "relevance_note": "Relevant for agent safety and verification but may be too theoretical for immediate practical use", + "doc_status": "" + }, + { + "name": "draft-kartha-grd", + "title": "Geospatial Resource Discovery (GRD): Problem Statement and Conceptual Architecture", + "date": "2026-01-19", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-kartha-grd/", + "pages": 8, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "Autonomous netops", + "Data formats/interop" + ], + "summary": "Defines architectural framework for discovering network resources based on physical location and context rather than predefined identifiers. Targets AR, autonomous systems, and spatial computing applications that need location-aware resource discovery.", + "novelty_note": "Novel approach to resource discovery using geospatial context instead of traditional naming", + "maturity_note": "Early stage architectural document with no protocol or implementation details", + "overlap_note": "Limited overlap with existing DNS/naming standards, addresses different problem space", + "momentum_note": "Addresses emerging need for spatial computing but still conceptual", + "relevance_note": "Highly relevant for autonomous systems and AR applications requiring location-based discovery", + "doc_status": "" + }, + { + "name": "draft-du-catalist-routing-considerations", + "title": "Routing Considerations in Agentic Network", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-du-catalist-routing-considerations/", + "pages": 8, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "ML traffic mgmt", + "Agent discovery/reg" + ], + "summary": "Proposes routing considerations for AI agent-to-agent communication in overlay networks. Focuses on cross-domain scenarios where agents with different skills need to interconnect.", + "novelty_note": "Novel focus on agent-specific routing requirements in overlay networks", + "maturity_note": "Brief 8-page document lacks detailed technical specifications", + "overlap_note": "Some overlap with other agentic network drafts but unique routing focus", + "momentum_note": "Part of emerging agentic networking trend but limited scope", + "relevance_note": "Highly relevant as AI agents proliferate and need interconnection", + "doc_status": "" + }, + { + "name": "draft-tan-ccamp-uonaco-problem-statement", + "title": "Unified Optical Networks and AI Computing Orchestration (UONACO) Problem Statement, Use Cases and Requirements", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-tan-ccamp-uonaco-problem-statement/", + "pages": 10, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops", + "Policy/governance" + ], + "summary": "Defines requirements for unified orchestration between optical networks and AI computing to enable coordinated resource provisioning. Addresses the problem of isolated control planes preventing optimal AI workload performance across distributed data centers.", + "novelty_note": "Novel approach to joint optical-compute orchestration for AI workloads with bidirectional awareness", + "maturity_note": "Problem statement stage with basic requirements definition, lacks detailed protocol specifications", + "overlap_note": "Some overlap with general network-compute coordination but specific to optical networks and AI", + "momentum_note": "Addresses growing need for AI infrastructure coordination but early stage draft", + "relevance_note": "Highly relevant to emerging AI infrastructure needs and distributed training requirements", + "doc_status": "" + }, + { + "name": "draft-li-cats-aisemantic-contract", + "title": "Semantic-Driven Traffic Shaping Contract for AI Networks", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-cats-aisemantic-contract/", + "pages": 6, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Data formats/interop" + ], + "summary": "Defines a contract mechanism allowing AI applications to communicate semantic information about their traffic to networks. Networks use this information to provide differentiated resource allocation and forwarding for AI workloads.", + "novelty_note": "Novel approach to expose AI traffic semantics to network layer for optimized handling", + "maturity_note": "Early stage work with basic contract definition, lacks detailed implementation specifics", + "overlap_note": "Some overlap with general traffic engineering but unique AI semantic focus", + "momentum_note": "Growing interest in AI-aware networking but still niche area", + "relevance_note": "Highly relevant as AI workloads become dominant in data centers", + "doc_status": "" + }, + { + "name": "draft-kartha-internet20-ainative", + "title": "Internet 2.0: An Intent-Aware, AI-Native Extension of the Web", + "date": "2025-11-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-kartha-internet20-ainative/", + "pages": 14, + "group": "individual", + "score": 3.45, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Model serving/inference", + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Proposes Internet 2.0 architecture with AI models as first-class network entities, including HTTP+AI extensions, Model Resolution Network (MRN), and AI-aware browsers. Aims to transform the web from document retrieval to intent-based AI interaction.", + "novelty_note": "Novel concept of treating AI models as network primitives with dedicated discovery and routing mechanisms", + "maturity_note": "Highly ambitious architectural proposal lacking implementation details and concrete specifications", + "overlap_note": "Some overlap with model serving concepts but unique in comprehensive internet architecture redesign", + "momentum_note": "Addresses emerging need for AI-native networking but may be too ambitious for near-term adoption", + "relevance_note": "Highly relevant to future AI infrastructure needs and network evolution", + "doc_status": "" + }, + { + "name": "draft-yan-a2a-device-agent-applicability", + "title": "Applicability of A2A Protocol for Network Management Agents", + "date": "2026-02-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yan-a2a-device-agent-applicability/", + "pages": 19, + "group": "individual", + "score": 3.4, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "A2A protocols", + "Autonomous netops", + "Data formats/interop" + ], + "summary": "Discusses applying Agent-to-Agent (A2A) Protocol to network management for communication between Controller and Device Agents. Explores integration with existing protocols like NETCONF and RESTCONF.", + "novelty_note": "Applies A2A concepts to network management domain with device agents", + "maturity_note": "Well-developed at 19 pages with detailed workflows and scenarios", + "overlap_note": "Moderate overlap with existing network management and A2A work", + "momentum_note": "Strong alignment with network automation trends and SDN evolution", + "relevance_note": "Very relevant to autonomous network operations and management", + "doc_status": "" + }, + { + "name": "draft-ietf-lamps-private-key-stmt-attr", + "title": "An Attribute for Statement of Possession of a Private Key", + "date": "2025-10-13", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lamps-private-key-stmt-attr/", + "pages": 19, + "group": "individual", + "score": 3.4, + "novelty": 3, + "maturity": 4, + "overlap": 1, + "momentum": 3, + "relevance": 3, + "categories": [ + "Data formats/interop" + ], + "summary": "Defines X.509 attribute for private key possession statements as alternative to cryptographic proof of possession. Enables certificate subjects to provide signed statements for CA verification.", + "novelty_note": "Alternative approach to traditional proof-of-possession mechanisms", + "maturity_note": "Mature 19-page specification with detailed attribute definitions", + "overlap_note": "Unique approach to private key possession verification", + "momentum_note": "Standard LAMPS working group development", + "relevance_note": "Relevant for flexible certificate enrollment scenarios", + "doc_status": "" + }, + { + "name": "draft-yue-moq-transporting-sensing-data", + "title": "Challenges in Transporting Sensing Data with Media Over QUIC", + "date": "2025-10-19", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yue-moq-transporting-sensing-data/", + "pages": 18, + "group": "individual", + "score": 3.4, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Data formats/interop", + "Autonomous netops" + ], + "summary": "Proposes using Media Over QUIC (MOQ) to transport large-scale, real-time sensing data in 6G networks. Focuses on autonomous driving, smart cities, and industrial IoT scenarios with requirements for low latency and high throughput.", + "novelty_note": "Moderate novelty - applies existing MOQ to new 6G sensing data use cases", + "maturity_note": "Moderate maturity with identified challenges but limited concrete solutions", + "overlap_note": "Moderate overlap with MOQ and 6G transport work", + "momentum_note": "High momentum due to 6G development and IoT growth", + "relevance_note": "High relevance for emerging 6G and autonomous system deployments", + "doc_status": "" + }, + { + "name": "draft-ramakrishna-satp-views-addresses", + "title": "Views and View Addresses for Secure Asset Transfer", + "date": "2025-09-15", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ramakrishna-satp-views-addresses/", + "pages": 23, + "group": "individual", + "score": 3.4, + "novelty": 4, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 3, + "categories": [ + "Data formats/interop", + "Agent identity/auth" + ], + "summary": "Defines view and addressing mechanisms for secure asset transfer between DLT systems. Enables cross-system asset interoperability with access control and verification.", + "novelty_note": "Novel abstraction for cross-DLT asset views with comprehensive security model", + "maturity_note": "Detailed technical specification but complex system requiring extensive validation", + "overlap_note": "Some overlap with general interoperability work but DLT focus is distinct", + "momentum_note": "Addresses growing need for blockchain interoperability", + "relevance_note": "Relevant for AI agents handling digital assets but narrow application domain", + "doc_status": "" + }, + { + "name": "draft-jimenez-tbd-robotstxt-update", + "title": "Robots.txt update proposal", + "date": "2025-05-10", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jimenez-tbd-robotstxt-update/", + "pages": 5, + "group": "individual", + "score": 3.4, + "novelty": 3, + "maturity": 2, + "overlap": 1, + "momentum": 4, + "relevance": 4, + "categories": [ + "Policy/governance", + "Agent discovery/reg" + ], + "summary": "Proposes updates to robots.txt standard to handle AI-specific crawlers with new syntax for user-agent identification. Aims to distinguish between training and inference activities for better web content access management.", + "novelty_note": "Evolutionary update to existing standard addressing new AI crawler use cases", + "maturity_note": "Brief document with limited technical depth, appears early stage", + "overlap_note": "Unique focus on robots.txt for AI applications", + "momentum_note": "High relevance due to widespread AI training concerns and web scraping issues", + "relevance_note": "Very relevant to current debates about AI training data and web content rights", + "doc_status": "" + }, + { + "name": "draft-zw-rtgwg-mcp-network-mgmt", + "title": "Model Context Protocol (MCP) Extensions for Network Equipment Management", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zw-rtgwg-mcp-network-mgmt/", + "pages": 18, + "group": "individual", + "score": 3.35, + "novelty": 3, + "maturity": 4, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Specifies MCP extensions for network equipment management with routers/switches as MCP servers. Defines capability tokens, tools, and error codes without breaking existing MCP.", + "novelty_note": "Incremental novelty in extending MCP for network equipment with backward compatibility", + "maturity_note": "Good maturity with concrete technical specifications and implementation details", + "overlap_note": "Heavy overlap with draft-zeng-mcp-network-mgmt, nearly identical abstracts", + "momentum_note": "Moderate momentum with detailed technical approach and routing working group focus", + "relevance_note": "Highly relevant for network equipment AI integration and management", + "doc_status": "" + }, + { + "name": "draft-thomson-aipref-sup", + "title": "Short Usage Preference Strings for Automated Processing", + "date": "2025-08-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-thomson-aipref-sup/", + "pages": 17, + "group": "individual", + "score": 3.35, + "novelty": 3, + "maturity": 4, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "Data formats/interop", + "Policy/governance", + "Human-agent interaction" + ], + "summary": "Defines simple format for content usage preference expressions with HTTP header field. Updates RFC9309 to provide standardized preference conveyance mechanism.", + "novelty_note": "Simple but practical approach to preference expression with HTTP integration", + "maturity_note": "Well-developed specification with detailed format definition and HTTP integration", + "overlap_note": "High overlap with RFC9309 updates and AI preference signaling mechanisms", + "momentum_note": "Recent timestamp and detailed specification suggest active development", + "relevance_note": "Highly relevant for standardizing AI content usage preference communication", + "doc_status": "" + }, + { + "name": "draft-stephan-ai-agent-6g", + "title": "AI Agent protocols for 6G systems", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-stephan-ai-agent-6g/", + "pages": 13, + "group": "individual", + "score": 3.35, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Data formats/interop", + "Other AI/agent" + ], + "summary": "Examines AI agent communication protocols specifically for 6G systems based on 3GPP requirements. Extrapolates protocol requirements from established 3GPP use cases.", + "novelty_note": "Builds on existing 3GPP work with moderate protocol innovation", + "maturity_note": "Reasonable detail with clear 3GPP foundation and protocol focus", + "overlap_note": "Unique 6G focus with limited overlap to other drafts", + "momentum_note": "Moderate momentum with established 3GPP backing", + "relevance_note": "High relevance to emerging 6G standards and agent protocols", + "doc_status": "" + }, + { + "name": "draft-zeng-nmrg-mcp-usecases-requirements", + "title": "MCP for Network Management: Problem Statement, Use Cases, and Requirements", + "date": "2026-02-14", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zeng-nmrg-mcp-usecases-requirements/", + "pages": 6, + "group": "individual", + "score": 3.35, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Human-agent interaction", + "Agent discovery/reg" + ], + "summary": "Presents problem statement for integrating Model Context Protocol into network management for AI agents. Outlines use cases for troubleshooting, security, and optimization with functional and security requirements.", + "novelty_note": "Applying MCP to network management is a reasonable extension", + "maturity_note": "Good requirements document but needs follow-up protocol work", + "overlap_note": "Some overlap with network automation but MCP focus is distinctive", + "momentum_note": "NMRG venue and structured approach suggests research community interest", + "relevance_note": "Very relevant to AI-driven network operations trend", + "doc_status": "" + }, + { + "name": "draft-zhu-anima-service-intent", + "title": "Definition of Service Intent in Autonomic Networks", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhu-anima-service-intent/", + "pages": 10, + "group": "individual", + "score": 3.35, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Model serving/inference", + "Policy/governance" + ], + "summary": "Defines a structured semantic model for expressing service-level objectives and constraints across network, compute, and storage resources in autonomic networks. Extends ANIMA Intent to support emerging AI inference services with proper identification, scope, versioning, and lifecycle management.", + "novelty_note": "Builds on existing ANIMA Intent but adds service-level abstractions for multi-resource scenarios", + "maturity_note": "Provides semantic model and format specification but likely needs implementation validation", + "overlap_note": "Related to ANIMA work but focuses on service-level rather than connection-centric intent", + "momentum_note": "Addresses growing need for AI service orchestration in autonomic networks", + "relevance_note": "Highly relevant for AI service deployment and autonomous network management", + "doc_status": "" + }, + { + "name": "draft-han-rtgwg-codeployment-pfc-fgfc", + "title": "Use cases and Requirement for Flow Control Collaboration Across DCNs and WAN", + "date": "2026-02-28", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-han-rtgwg-codeployment-pfc-fgfc/", + "pages": 9, + "group": "individual", + "score": 3.35, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Data formats/interop" + ], + "summary": "Describes use cases for coordinating flow control between data center PFC and WAN fine-grained flow control. Aims to achieve end-to-end lossless transmission across network domains.", + "novelty_note": "Addresses gap in cross-domain flow control coordination, building on established PFC mechanisms", + "maturity_note": "Well-structured requirements document but needs technical solution specification", + "overlap_note": "Builds on existing PFC work but addresses novel cross-domain coordination problem", + "momentum_note": "Addresses industry need for DC-WAN integration, likely to gain data center community interest", + "relevance_note": "Very relevant to current data center and cloud networking evolution", + "doc_status": "" + }, + { + "name": "draft-cosmos-protocol-specification", + "title": "The Cosmos Protocol Specification (Trust-Native Semantic Protocol)", + "date": "2026-01-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-cosmos-protocol-specification/", + "pages": 23, + "group": "individual", + "score": 3.35, + "novelty": 5, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "Agent identity/auth", + "A2A protocols", + "Policy/governance" + ], + "summary": "Defines comprehensive badge-based identity and communication system with trust scoring, post-quantum encryption, and semantic messaging. Designed for deployments preferring to avoid external blockchain infrastructure while supporting decentralized identity management.", + "novelty_note": "Ambitious integration of multiple novel concepts: badge identity, trust scoring, post-quantum crypto, semantic grammar", + "maturity_note": "Very early stage with broad scope, appears incomplete based on abstract truncation", + "overlap_note": "Some concepts exist separately but this specific integration approach is unique", + "momentum_note": "Complex scope may hinder adoption, unclear community backing", + "relevance_note": "Addresses important identity and trust challenges but may be overly ambitious", + "doc_status": "" + }, + { + "name": "draft-sz-dmsc-iaip", + "title": "Intent-based Agent Interconnection Protocol at Agent Gateway", + "date": "2026-02-10", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-sz-dmsc-iaip/", + "pages": 18, + "group": "individual", + "score": 3.35, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Defines Intent-based Agent Interconnection Protocol (IAIP) for dynamic agent discovery and routing at gateways based on semantic intent rather than static addressing. Enables capability-based agent matching and dispatching.", + "novelty_note": "Novel semantic intent-based routing approach for AI agents with dynamic capability matching", + "maturity_note": "Early stage specification with broad scope but limited implementation detail", + "overlap_note": "Overlaps with DNS-AID and AWP on agent discovery, but uses different semantic intent approach", + "momentum_note": "Addresses emerging need for agent interconnection but lacks clear adoption path", + "relevance_note": "Highly relevant for multi-agent systems and agent interoperability infrastructure", + "doc_status": "" + }, + { + "name": "draft-wang-cats-innetwork-infer", + "title": "An Open, Decentralized, and Scalable Framework for Large Language Model Inference", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-wang-cats-innetwork-infer/", + "pages": 30, + "group": "individual", + "score": 3.35, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Model serving/inference", + "A2A protocols", + "ML traffic mgmt" + ], + "summary": "Proposes a framework for decentralized LLM inference across untrusted participants using layer-aware activation transport. Focuses on architectural design for distributed inference with explicit deadlines and security mechanisms.", + "novelty_note": "Novel approach to decentralized LLM inference with layer-aware transport", + "maturity_note": "Architectural framework only, lacks concrete protocols and wire formats", + "overlap_note": "Overlaps with other distributed inference drafts but unique decentralized approach", + "momentum_note": "Addresses important scalability concerns but implementation complexity may limit adoption", + "relevance_note": "Highly relevant to distributed AI infrastructure needs", + "doc_status": "" + }, + { + "name": "draft-xsaopig-nmop-service-flow-modal-mapping", + "title": "Architecture for Service Flow Characteristics and Modal Mapping Based on SDN and ALTO Protocol", + "date": "2025-10-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-xsaopig-nmop-service-flow-modal-mapping/", + "pages": 9, + "group": "individual", + "score": 3.35, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops", + "Data formats/interop" + ], + "summary": "Proposes a framework using ALTO protocol and SDN architecture for mapping service flow characteristics to network modal resources in multi-modal intelligent computing networks. Focuses on dynamic resource allocation and network performance optimization.", + "novelty_note": "Novel integration of ALTO, SDN, and multi-modal resource mapping for intelligent networks", + "maturity_note": "Early stage framework with limited implementation details or validation", + "overlap_note": "Some overlap with network resource allocation approaches but unique multi-modal focus", + "momentum_note": "Addresses emerging needs but unclear industry adoption", + "relevance_note": "Directly addresses intelligent computing network requirements and resource optimization", + "doc_status": "" + }, + { + "name": "draft-mcp-over-moqt", + "title": "Model Context Protocol over Media over QUIC Transport", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mcp-over-moqt/", + "pages": 32, + "group": "individual", + "score": 3.3, + "novelty": 4, + "maturity": 4, + "overlap": 5, + "momentum": 3, + "relevance": 3, + "categories": [ + "A2A protocols", + "Data formats/interop" + ], + "summary": "Defines transport mapping for Model Context Protocol over Media over QUIC Transport. Specifies how MCP messages map to MOQT objects for efficient delivery.", + "novelty_note": "Novel transport combination addressing efficiency needs of MCP", + "maturity_note": "Well-developed at 32 pages with detailed protocol specifications", + "overlap_note": "Identical to draft-jennings-mcp-over-moqt", + "momentum_note": "Moderate momentum, addresses important transport layer needs", + "relevance_note": "Foundational transport work relevant to broader AI agent communication", + "doc_status": "" + }, + { + "name": "draft-jennings-mcp-over-moqt", + "title": "Model Context Protocol over Media over QUIC Transport", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jennings-mcp-over-moqt/", + "pages": 32, + "group": "individual", + "score": 3.3, + "novelty": 4, + "maturity": 4, + "overlap": 5, + "momentum": 3, + "relevance": 3, + "categories": [ + "A2A protocols", + "Data formats/interop" + ], + "summary": "Defines transport mapping for Model Context Protocol over Media over QUIC Transport. Specifies how MCP messages map to MOQT objects for efficient delivery.", + "novelty_note": "Novel transport combination addressing efficiency needs of MCP", + "maturity_note": "Well-developed at 32 pages with detailed protocol specifications", + "overlap_note": "Identical to draft-mcp-over-moqt", + "momentum_note": "Moderate momentum, Jennings authorship suggests established backing", + "relevance_note": "Foundational transport work relevant to broader AI agent communication", + "doc_status": "" + }, + { + "name": "draft-khatri-sipcore-call-transfer-fail-response", + "title": "A SIP Response Code (497) for Call Transfer Failure", + "date": "2024-01-25", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-khatri-sipcore-call-transfer-fail-response/", + "pages": 11, + "group": "individual", + "score": 3.3, + "novelty": 3, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 3, + "categories": [ + "Other AI/agent" + ], + "summary": "Defines a new SIP response code (497) for indicating call transfer failures with optional granular warning codes. Allows SIP entities to handle subsequent calls more intelligently based on transfer failure information.", + "novelty_note": "Moderate novelty - adds specific response code for call transfer scenarios, incremental improvement to SIP", + "maturity_note": "Well-defined scope, clear technical specification, builds on established SIP framework", + "overlap_note": "Low overlap - addresses specific SIP response code gap not covered by existing drafts", + "momentum_note": "SIP remains relevant but not cutting-edge, moderate vendor interest likely", + "relevance_note": "Relevant for VoIP systems and call centers, but limited to SIP-based communications", + "doc_status": "" + }, + { + "name": "draft-zheng-dispatch-agent-identity-management", + "title": "Agent Identity Managenment", + "date": "2025-11-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/", + "pages": 12, + "group": "individual", + "score": 3.3, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 5, + "categories": [ + "Agent identity/auth", + "Agent discovery/reg", + "A2A protocols" + ], + "summary": "This draft proposes an identity management framework for agents in an Internet of Agents (IOA) system, defining agent description requirements, registration processes with agent gateways, identifier structures, and management functions. It aims to provide foundational identity infrastructure for secure and scalable agent interoperability.", + "novelty_note": "While identity management concepts are well-established, applying them specifically to AI agents with agent-specific attributes like intelligence level and form factor is relatively novel", + "maturity_note": "This is version 00 with incomplete sections (Extended Information cut off), contains typos in title ('Managenment'), and lacks detailed technical specifications", + "overlap_note": "Overlaps with general identity management protocols and potentially with other agent discovery/registration drafts, but focuses specifically on IOA systems", + "momentum_note": "Multiple authors from Huawei suggests organizational backing, but as a first version in dispatch working group indicates early stage exploration rather than established momentum", + "relevance_note": "Identity management is fundamental for any multi-agent system and directly addresses core infrastructure needs for AI agent networking and interoperability", + "doc_status": "" + }, + { + "name": "draft-narvaneni-agent-uri", + "title": "The agent:// Protocol -- A URI-Based Framework for Interoperable Agents", + "date": "2025-10-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-narvaneni-agent-uri/", + "pages": 29, + "group": "individual", + "score": 3.3, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "A2A protocols", + "Data formats/interop" + ], + "summary": "This draft defines the agent:// URI scheme for addressing and interoperating with software agents across different platforms and ecosystems. It provides a layered framework supporting basic addressing/transport as well as extensible features like capability discovery and orchestration.", + "novelty_note": "While URI schemes exist, this is the first standardized approach specifically for agent addressing with support for both remote and local agents", + "maturity_note": "Draft shows good structure but has formatting issues, incomplete sections (truncated ABNF), and appears to be early stage experimental work", + "overlap_note": "References existing agent communication protocols (FIPA-ACL, Contract Net) but positions itself as complementary addressing layer rather than competing", + "momentum_note": "Independent submission by single author, revision 02 indicates some iteration, but no clear WG adoption or broader community engagement visible", + "relevance_note": "Addresses critical interoperability challenge for agent ecosystems - standardized addressing is fundamental for agent-to-agent communication at scale", + "doc_status": "" + }, + { + "name": "draft-jeong-opsawg-intent-based-sdv-framework", + "title": "An Intent-Based Management Framework for Software-Defined Vehicles in Intelligent Transportation Systems", + "date": "2025-12-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jeong-opsawg-intent-based-sdv-framework/", + "pages": 20, + "group": "individual", + "score": 3.3, + "novelty": 4, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Agent discovery/reg", + "Policy/governance" + ], + "summary": "Proposes intent-based management framework for Software-Defined Vehicles in ITS environments. Covers network, security, and application management for SDV-to-SDV and infrastructure communication.", + "novelty_note": "Novel application of intent-based networking to automotive domain with ITS integration", + "maturity_note": "High-level framework without detailed protocols or implementation specifics", + "overlap_note": "Combines existing intent-based networking with vehicular networks in new way", + "momentum_note": "Individual submission in emerging but not yet mature SDV standardization space", + "relevance_note": "Very relevant to autonomous vehicle networking and intent-based agent systems", + "doc_status": "" + }, + { + "name": "draft-bernardos-nmrg-agentic-network-optimization", + "title": "Solutions for enabling agentic sensing with network optimization", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-bernardos-nmrg-agentic-network-optimization/", + "pages": 14, + "group": "individual", + "score": 3.3, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 3, + "categories": [ + "Autonomous netops", + "ML traffic mgmt", + "Other AI/agent" + ], + "summary": "Focuses on agentic AI for distributed sensing in ISAC networks with joint optimization of sensing and communication. Addresses synchronization and processing constraints for multi-sensor fusion.", + "novelty_note": "Specific application of agentic AI to ISAC sensing optimization", + "maturity_note": "14 pages with good technical depth but appears incomplete in abstract", + "overlap_note": "Some overlap with general network optimization but ISAC focus is distinctive", + "momentum_note": "ISAC is hot topic but agentic angle needs clearer positioning", + "relevance_note": "Relevant for specific sensing applications but narrower scope", + "doc_status": "" + }, + { + "name": "draft-chuyi-nmrg-ai-agent-network", + "title": "Large Model based Agents for Network Operation and Maintenance", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chuyi-nmrg-ai-agent-network/", + "pages": 16, + "group": "individual", + "score": 3.25, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "ML traffic mgmt", + "Model serving/inference", + "Data formats/interop" + ], + "summary": "Focuses on large language model-based agents for network operations and maintenance. Addresses practical challenges like system isolation and fragmented data in network operations.", + "novelty_note": "Practical focus on LLM applications but incremental novelty", + "maturity_note": "Moderate detail with scenario identification and impact analysis", + "overlap_note": "Moderate overlap with other network agent operation drafts", + "momentum_note": "Good momentum with practical focus and standardization exploration", + "relevance_note": "High relevance to current LLM and network automation trends", + "doc_status": "" + }, + { + "name": "draft-liu-rtgwg-agent-gateway-requirements", + "title": "Requirements for Agent Gateway", + "date": "2025-11-28", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-rtgwg-agent-gateway-requirements/", + "pages": 10, + "group": "individual", + "score": 3.25, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent identity/auth", + "Data formats/interop", + "Agent discovery/reg" + ], + "summary": "Discusses requirements for Agent Gateways in agent-to-agent communications to improve scalability, efficiency and security. Identifies gaps in current gateway solutions that necessitate new Agent Gateway entities.", + "novelty_note": "Requirements analysis for agent gateways shows some novelty in systematic approach", + "maturity_note": "More mature requirements analysis compared to other drafts, though still early stage", + "overlap_note": "Overlaps with agent gateway concepts in banking drafts but more technical focus", + "momentum_note": "Requirements documents often gain traction if they address real needs", + "relevance_note": "Highly relevant as agent gateway requirements are fundamental to agent networking", + "doc_status": "" + }, + { + "name": "draft-pioli-agent-discovery", + "title": "Agent Registration and Discovery Protocol (ARDP)", + "date": "2026-02-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-pioli-agent-discovery/", + "pages": 13, + "group": "individual", + "score": 3.25, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "Agent identity/auth", + "A2A protocols" + ], + "summary": "Specifies ARDP, a lightweight protocol for agent registration and discovery in distributed environments. Provides stable identities, endpoint resolution, capability advertisement, and security-first discovery.", + "novelty_note": "Well-defined protocol approach to agent discovery with practical transport-agnostic design", + "maturity_note": "More concrete protocol specification with clear technical components and interoperability focus", + "overlap_note": "Overlaps with discovery aspects of other drafts but focuses specifically on the protocol layer", + "momentum_note": "Agent discovery is fundamental need but market adoption unclear", + "relevance_note": "Essential building block for distributed agent systems across many domains", + "doc_status": "" + }, + { + "name": "draft-diaconu-agents-authz-info-sharing", + "title": "Cross-Domain AuthZ Information sharing for Agents", + "date": "2026-02-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-diaconu-agents-authz-info-sharing/", + "pages": 31, + "group": "individual", + "score": 3.25, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Policy/governance", + "AI safety/alignment" + ], + "summary": "Addresses authorization challenges in distributed multi-agent systems across multiple domains. Covers dynamic identity, interoperable claims, and verifiable credentials for secure cross-domain authorization.", + "novelty_note": "Applies existing identity/authorization concepts to multi-agent context with cross-domain focus", + "maturity_note": "Substantial document addressing real security challenges but builds on established identity patterns", + "overlap_note": "Overlaps with identity aspects of cross-domain drafts but deeper focus on authorization specifics", + "momentum_note": "Authorization is critical for agent deployment but competing standards may emerge", + "relevance_note": "Essential for practical multi-domain agent systems where security is paramount", + "doc_status": "" + }, + { + "name": "draft-gaikwad-woa", + "title": "The Web of Agents (WoA)", + "date": "2025-11-30", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-gaikwad-woa/", + "pages": 19, + "group": "individual", + "score": 3.25, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "Data formats/interop", + "A2A protocols" + ], + "summary": "Specifies Web of Agents (WoA) format using JSON Schema to describe AI agent inputs/outputs served from well-known HTTP locations. Provides uniform invocation convention for HTTP-hosted AI agents without defining discovery protocols.", + "novelty_note": "Straightforward application of existing web standards to agent description and invocation", + "maturity_note": "Reasonable level of detail for interface specification, builds on established HTTP/JSON patterns", + "overlap_note": "Similar to OpenAPI/service description approaches but agent-specific", + "momentum_note": "Practical approach leveraging web infrastructure, moderate interest likely", + "relevance_note": "Very relevant for web-based agent interoperability and standardization", + "doc_status": "" + }, + { + "name": "draft-ahn-opsawg-5g-security-i2nsf-framework", + "title": "An Integrated Security Service System for 5G Networks using an I2NSF Framework", + "date": "2026-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ahn-opsawg-5g-security-i2nsf-framework/", + "pages": 16, + "group": "individual", + "score": 3.25, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Policy/governance" + ], + "summary": "Proposes an integrated security framework for 5G edge networks using I2NSF architecture with Intent-Based Networking. Enables automated translation of high-level security intents into enforceable policies across network and application layers.", + "novelty_note": "Combines existing I2NSF and IBN concepts for 5G security but integration approach shows some novelty", + "maturity_note": "Well-structured framework but lacks implementation details and validation results", + "overlap_note": "Moderate overlap with existing I2NSF and 5G security work, but specific integration is less explored", + "momentum_note": "5G security is active area but I2NSF adoption has been moderate", + "relevance_note": "Highly relevant for autonomous 5G security management and policy automation", + "doc_status": "" + }, + { + "name": "draft-zhao-detnet-enhanced-use-cases", + "title": "Enhanced Use Cases for Scaling Deterministic Networks", + "date": "2026-02-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhao-detnet-enhanced-use-cases/", + "pages": 25, + "group": "individual", + "score": 3.25, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 4, + "relevance": 3, + "categories": [ + "ML traffic mgmt", + "Policy/governance" + ], + "summary": "Describes enhanced use cases for scaling deterministic networks beyond RFC8578, covering industrial internet, high-experience video, intelligent computing, and ISAC-enabled smart factories. Outlines common properties and network requirements for these scenarios.", + "novelty_note": "Extends existing DetNet work with new use cases including intelligent computing applications", + "maturity_note": "Comprehensive use case analysis but implementation details not yet developed", + "overlap_note": "Builds on RFC8578 but addresses new application domains", + "momentum_note": "Strong relevance to emerging industrial and AI computing requirements", + "relevance_note": "Relevant to AI systems requiring deterministic network behavior", + "doc_status": "" + }, + { + "name": "draft-traffic-analysis-and-network-mode-mapping", + "title": "Network Traffic Analysis and Network Modal Mapping Method", + "date": "2025-09-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-traffic-analysis-and-network-mode-mapping/", + "pages": 7, + "group": "individual", + "score": 3.25, + "novelty": 4, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops", + "Model serving/inference" + ], + "summary": "Presents an LLM-based framework for network traffic classification and modality mapping to improve resource allocation efficiency. Uses two-phase approach with pre-training for traffic representations and dynamic mapping for resource strategies.", + "novelty_note": "Novel application of LLMs to traffic analysis and multi-modal resource mapping", + "maturity_note": "Conceptual framework without detailed implementation or validation results", + "overlap_note": "Significant overlap with draft-xsaopig-nmop-service-flow-modal-mapping on modal mapping concepts", + "momentum_note": "Relevant to ML-driven networking but early development stage", + "relevance_note": "Directly applies AI/ML to traffic management and network resource optimization", + "doc_status": "" + }, + { + "name": "draft-tong-network-agent-use-cases-in-6g", + "title": "Network AI Agent Use Cases and Requirements in 6G", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-tong-network-agent-use-cases-in-6g/", + "pages": 10, + "group": "individual", + "score": 3.2, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "Autonomous netops", + "ML traffic mgmt", + "Agent discovery/reg", + "Model serving/inference" + ], + "summary": "Introduces network AI agent use cases in 6G focusing on connectivity services and third-party applications, drawing from 3GPP scenarios. Discusses integration requirements within 6G framework.", + "novelty_note": "6G-specific agent use cases provide some novelty but builds heavily on existing 3GPP work", + "maturity_note": "Use case focused with limited technical specification details", + "overlap_note": "Moderate overlap with general AI agent networking but 6G focus provides differentiation", + "momentum_note": "6G and AI agents are both high-interest areas with strong industry momentum", + "relevance_note": "Very relevant as 6G networks will likely require extensive AI agent capabilities", + "doc_status": "" + }, + { + "name": "draft-gupta-httpapi-events-query", + "title": "HTTP Events Query", + "date": "2025-10-17", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-gupta-httpapi-events-query/", + "pages": 29, + "group": "individual", + "score": 3.2, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 3, + "relevance": 3, + "categories": [ + "Data formats/interop", + "Human-agent interaction" + ], + "summary": "Proposes Events Query Protocol (EQP) built on HTTP for user agents to receive event notifications directly from resources. Offers intuitive approach where resources themselves are event sources.", + "novelty_note": "Builds on existing HTTP but novel application to direct resource-based event notifications", + "maturity_note": "Well-developed at 29 pages with detailed protocol specification", + "overlap_note": "Some overlap with existing HTTP event mechanisms like Server-Sent Events", + "momentum_note": "Solid technical foundation but unclear adoption trajectory", + "relevance_note": "Relevant for AI agents needing event streams, but not AI-specific", + "doc_status": "" + }, + { + "name": "draft-ietf-emu-eap-edhoc", + "title": "Using the Extensible Authentication Protocol (EAP) with Ephemeral Diffie-Hellman over COSE (EDHOC)", + "date": "2026-02-14", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-emu-eap-edhoc/", + "pages": 31, + "group": "individual", + "score": 3.2, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 3, + "relevance": 3, + "categories": [ + "Agent identity/auth" + ], + "summary": "Defines EAP authentication method based on EDHOC for constrained environments. Integrates EDHOC's lightweight security handshake into the standard EAP framework.", + "novelty_note": "Reasonable novelty in bridging EAP and EDHOC protocols", + "maturity_note": "Well-developed 31-page specification with clear integration approach", + "overlap_note": "Overlaps with EDHOC family but unique in EAP integration", + "momentum_note": "Moderate momentum from enterprise network authentication needs", + "relevance_note": "Relevant for enterprise networks requiring constrained device authentication", + "doc_status": "" + }, + { + "name": "draft-lake-pocero-authkem-edhoc", + "title": "KEM-based Authentication for EDHOC", + "date": "2025-10-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-lake-pocero-authkem-edhoc/", + "pages": 33, + "group": "individual", + "score": 3.2, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "Agent identity/auth" + ], + "summary": "This draft extends the EDHOC protocol to provide quantum-resistant authentication using KEM-based mechanisms instead of traditional signatures. It addresses the need for post-quantum cryptography in IoT and constrained device authentication scenarios.", + "novelty_note": "Moderate novelty in applying KEM-based authentication to EDHOC, building on established PQC concepts", + "maturity_note": "Early stage draft with basic specification but likely needs implementation experience and security analysis", + "overlap_note": "Some overlap with general PQC standardization efforts but specific to EDHOC protocol extensions", + "momentum_note": "High momentum due to urgent industry need for quantum-resistant cryptography in IoT/constrained devices", + "relevance_note": "Highly relevant as quantum threat becomes more imminent and IoT devices need lightweight PQC solutions", + "doc_status": "" + }, + { + "name": "draft-intellinode-ai-semantic-contract", + "title": "Semantic-Driven Traffic Shaping Contract for AI Networks", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-intellinode-ai-semantic-contract/", + "pages": 6, + "group": "individual", + "score": 3.2, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Data formats/interop" + ], + "summary": "Defines contracts allowing AI applications to communicate semantic information about tensor flows to networks for optimized scheduling. Networks commit to differentiated forwarding based on these semantics and real-time states.", + "novelty_note": "Novel approach to expose AI workload semantics to network layer for optimization", + "maturity_note": "Very brief document with limited technical detail and no protocol specifics", + "overlap_note": "Overlaps with other IntelliNode drafts on AI-aware networking", + "momentum_note": "Short document suggests early-stage development with limited backing", + "relevance_note": "Highly relevant to emerging AI infrastructure optimization needs", + "doc_status": "" + }, + { + "name": "draft-cgfabk-nmrg-ibn-generative-ai", + "title": "Generative AI for Intent-Based Networking", + "date": "2025-10-17", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-cgfabk-nmrg-ibn-generative-ai/", + "pages": 16, + "group": "individual", + "score": 3.2, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Model serving/inference" + ], + "summary": "Describes methods for specializing AI models to create targeted generative models for Intent-Based Networking. Focuses on making IBN systems more scalable and efficient through AI techniques.", + "novelty_note": "Applies generative AI to IBN, combining two established areas in new way", + "maturity_note": "Conceptual framework provided but lacks detailed technical specifications", + "overlap_note": "Overlaps with existing IBN and AI model work but specific combination is less explored", + "momentum_note": "High interest in both generative AI and network automation creates good momentum", + "relevance_note": "Very relevant as networks seek more intelligent automation capabilities", + "doc_status": "" + }, + { + "name": "draft-zhao-anima-automatic-congestion-relief", + "title": "Automatic Network Congestion Relief", + "date": "2025-09-04", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhao-anima-automatic-congestion-relief/", + "pages": 7, + "group": "individual", + "score": 3.2, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 4, + "relevance": 4, + "categories": [ + "Autonomous netops", + "ML traffic mgmt", + "AI safety/alignment" + ], + "summary": "Introduces automatic congestion relief using intelligent traffic analysis and dynamic regulation. Focuses on real-time self-healing response to fiber failures and network congestion events.", + "novelty_note": "Moderate novelty - intelligent congestion management is active area, self-healing angle is useful", + "maturity_note": "Low maturity - only 7 pages for complex topic, lacks implementation details", + "overlap_note": "Moderate overlap with existing traffic engineering and congestion control mechanisms", + "momentum_note": "High momentum - network automation and intelligent traffic management are hot topics", + "relevance_note": "Highly relevant for modern network operations and autonomous systems", + "doc_status": "" + }, + { + "name": "draft-it-aipref-attachment", + "title": "Indicating Preferences Regarding Content Usage", + "date": "2025-05-28", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-it-aipref-attachment/", + "pages": 7, + "group": "individual", + "score": 3.2, + "novelty": 3, + "maturity": 4, + "overlap": 4, + "momentum": 2, + "relevance": 4, + "categories": [ + "Policy/governance", + "Data formats/interop", + "Human-agent interaction" + ], + "summary": "Defines HTTP-based signaling mechanism for content usage preferences by automated systems. Updates RFC9309 to include usage preferences alongside content acquisition.", + "novelty_note": "Practical extension to existing RFC with focused HTTP integration approach", + "maturity_note": "Concise and focused update to established RFC with clear implementation path", + "overlap_note": "Significant overlap with RFC9309 and broader AI preference signaling space", + "momentum_note": "Older timestamp suggests less active recent development compared to other drafts", + "relevance_note": "Relevant for content creator rights and automated system compliance", + "doc_status": "" + }, + { + "name": "draft-meunier-webbotauth-registry", + "title": "Registry and Signature Agent card for Web bot auth", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-meunier-webbotauth-registry/", + "pages": 18, + "group": "individual", + "score": 3.2, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 2, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Defines a JSON format for web bot signature agent cards to advertise identity, purpose, and cryptographic keys. Establishes IANA registry for extensible agent metadata discovery.", + "novelty_note": "Builds on existing agent card concepts but adds signature-specific elements", + "maturity_note": "Basic format definition with registry setup, needs more implementation details", + "overlap_note": "Some overlap with general agent identity work but signature focus is distinct", + "momentum_note": "Early draft with limited community engagement visible", + "relevance_note": "Agent identity and discovery are critical infrastructure needs for AI systems", + "doc_status": "" + }, + { + "name": "draft-illyes-aipref-jafar", + "title": "A JSON-Based Format for Publishing IP Ranges of Automated HTTP Clients", + "date": "2025-09-30", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-illyes-aipref-jafar/", + "pages": 8, + "group": "individual", + "score": 3.2, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 2, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "ML traffic mgmt", + "Data formats/interop" + ], + "summary": "Defines JSON format for automated HTTP client operators to publish their IP ranges publicly. Aims to help identify legitimate automated traffic and reduce blocking of beneficial clients.", + "novelty_note": "Novel standardization of existing practices for IP range disclosure", + "maturity_note": "Concise 8-page spec but individual submission lacks WG validation", + "overlap_note": "Complementary to other drafts, focuses on client identification not preferences", + "momentum_note": "Individual submission without clear working group adoption path", + "relevance_note": "Highly relevant for automated client identification and traffic management", + "doc_status": "" + }, + { + "name": "draft-kale-agntcy-federated-privacy", + "title": "Privacy-Preserving Federated Learning Architecture for Multi-Tenant AI Agent Systems", + "date": "2026-01-08", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-kale-agntcy-federated-privacy/", + "pages": 13, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "AI safety/alignment", + "Policy/governance" + ], + "summary": "Specifies architecture for privacy-preserving federated learning across multi-tenant AI agent systems. Combines federated averaging, differential privacy, and secure aggregation to enable cross-organizational model training while maintaining data isolation.", + "novelty_note": "Standard application of known federated learning techniques to multi-tenant agent scenarios", + "maturity_note": "Reference architecture with established privacy techniques, reasonable technical depth", + "overlap_note": "Significant overlap with existing federated learning and differential privacy literature", + "momentum_note": "Addresses practical deployment concerns, moderate community interest expected", + "relevance_note": "Very relevant for enterprise AI agent deployments requiring privacy preservation", + "doc_status": "" + }, + { + "name": "draft-mao-rtgwg-apn-framework-for-ioa", + "title": "APN Framework for Internet of Agent (IoA)", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mao-rtgwg-apn-framework-for-ioa/", + "pages": 11, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "A2A protocols", + "Agent discovery/reg" + ], + "summary": "Applies Application-aware Performance Network framework to Internet of Agents scenario. Addresses network service requirements for AI agent interactions across different platforms.", + "novelty_note": "Applies existing APN framework to new IoA use case", + "maturity_note": "Framework-level document with some technical detail but limited implementation", + "overlap_note": "Heavy overlap with existing APN work, incremental IoA application", + "momentum_note": "Routing working group context provides some momentum", + "relevance_note": "Relevant for agent network performance and quality of service", + "doc_status": "" + }, + { + "name": "draft-zhang-dmsc-ioa-semantic-interaction", + "title": "Ontology-based Semantic Interaction for Internet of Agents", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhang-dmsc-ioa-semantic-interaction/", + "pages": 19, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Agent discovery/reg" + ], + "summary": "Specifies a semantic layer for Internet of Agents using ontology models and JSON-LD serialization. Defines common vocabulary and negotiation procedures for deterministic semantic interoperability across agent domains.", + "novelty_note": "Applies semantic web technologies to agent interaction, moderately novel combination", + "maturity_note": "Reasonable technical depth but semantic alignment challenges remain complex", + "overlap_note": "Heavy overlap with IoA task protocol draft, both targeting agent interoperability", + "momentum_note": "Part of broader IoA effort but semantic web adoption in agents unclear", + "relevance_note": "Important for agent interoperability but semantic standardization faces adoption challenges", + "doc_status": "" + }, + { + "name": "draft-sun-zhang-iaip", + "title": "Intent-based Agent Interconnection Protocol at Agent Gateway", + "date": "2026-02-05", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-sun-zhang-iaip/", + "pages": 18, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Autonomous netops" + ], + "summary": "Defines Intent-based Agent Interconnection Protocol for Agent Gateways, focusing on semantic intent rather than network addressing. Specifies agent registration, capability advertisement, and intent-based routing mechanisms.", + "novelty_note": "Intent-based approach to agent interconnection shows reasonable novelty", + "maturity_note": "Decent technical specification though gateway architecture needs more detail", + "overlap_note": "Substantial overlap with other IoA drafts, particularly in agent discovery and registration", + "momentum_note": "Part of emerging agent infrastructure standards but adoption path unclear", + "relevance_note": "Relevant to agent infrastructure but intent-based networking adoption still emerging", + "doc_status": "" + }, + { + "name": "draft-liu-nmrg-ai-llm-inference-requirements", + "title": "Requirements Analysis of System and Network for Large Language Model Inference Service", + "date": "2025-11-04", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-nmrg-ai-llm-inference-requirements/", + "pages": 10, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "Model serving/inference", + "ML traffic mgmt" + ], + "summary": "Analyzes system and network requirements for large-scale LLM inference services. Investigates mainstream inference frameworks and their network management challenges.", + "novelty_note": "Useful requirements analysis but builds on existing inference frameworks", + "maturity_note": "Good survey of existing systems with clear problem identification", + "overlap_note": "Significant overlap with other LLM serving and inference optimization work", + "momentum_note": "Recent and addresses important scaling challenges", + "relevance_note": "Very relevant for understanding LLM deployment requirements at scale", + "doc_status": "" + }, + { + "name": "draft-ra-emu-pqc-eapaka", + "title": "Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA prime", + "date": "2025-07-10", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ra-emu-pqc-eapaka/", + "pages": 15, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth" + ], + "summary": "Enhances EAP-AKA' with post-quantum key encapsulation mechanisms to protect against quantum computer threats. Replaces traditional ECDHE with PQ-KEMs for quantum-safe authentication.", + "novelty_note": "Straightforward application of PQ-KEMs to existing protocol", + "maturity_note": "Clear technical approach but early stage specification", + "overlap_note": "Significant overlap with draft-ar-emu-hybrid-pqc-eapaka addressing same protocol", + "momentum_note": "Moderate interest in post-quantum security preparations", + "relevance_note": "High relevance for quantum-resistant authentication protocols", + "doc_status": "" + }, + { + "name": "draft-liao-aipref-autoctl-ext", + "title": "Protocol Extension for Automation Control", + "date": "2025-11-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liao-aipref-autoctl-ext/", + "pages": 16, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Policy/governance", + "A2A protocols" + ], + "summary": "Extends automation control protocols with granular permissions including rate limiting, technology restrictions, and API permissions. Provides service owners detailed control over automated interactions beyond basic core specifications.", + "novelty_note": "Reasonable extension of existing automation control concepts with practical granular controls", + "maturity_note": "References core spec but appears well-structured for an extension document", + "overlap_note": "Heavy overlap with core automation control draft and general AI preference space", + "momentum_note": "Part of related draft series with recent timestamps suggesting active development", + "relevance_note": "Highly relevant for AI automation management with practical granular controls", + "doc_status": "" + }, + { + "name": "draft-hw-ai-agent-6g", + "title": "Requirements and Enabling Technologies of Agent Protocols for 6G Networks", + "date": "2026-01-21", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-hw-ai-agent-6g/", + "pages": 20, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Autonomous netops", + "Agent discovery/reg" + ], + "summary": "This draft analyzes requirements for agent protocols specifically tailored to 6G mobile networks, examining how mobile network characteristics like QoS guarantees, mobility, and resource dynamicity create unique needs for agent communication. It proposes a multi-layer protocol architecture including agent governance, meta-protocol, security, and transport layers to enable multi-agent systems across terminals, networks, and services.", + "novelty_note": "Novel focus on mobile network-specific agent protocol requirements, but builds on existing agent communication concepts", + "maturity_note": "Early stage draft with requirements analysis but limited concrete protocol specifications or implementation details", + "overlap_note": "Some overlap with general agent communication protocols but focuses specifically on mobile/6G context which is relatively unique", + "momentum_note": "Multiple authors from major telecom companies (Huawei, China Telecom, China Unicom) suggest industry interest, but appears to be initial version", + "relevance_note": "Highly relevant as it addresses agent networking in critical mobile infrastructure context with specific focus on multi-agent systems and QoS requirements", + "doc_status": "" + }, + { + "name": "draft-yao-agent-auth-considerations", + "title": "Further considerations on AI Agent Authentication and Authorization Based on OAuth Extension", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yao-agent-auth-considerations/", + "pages": 15, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "A2A protocols", + "Policy/governance" + ], + "summary": "Extends OAuth model for AI agent authentication and authorization in Agent Communication Networks. Proposes new workflows addressing unique requirements of agent-to-agent authentication.", + "novelty_note": "Reasonable extension of OAuth to agent domain with some novel considerations", + "maturity_note": "Early conceptual work building on OAuth but lacks detailed protocol specification", + "overlap_note": "Some conceptual overlap with general OAuth extensions but agent-specific", + "momentum_note": "OAuth is well-established but agent auth is still developing", + "relevance_note": "Critical for secure agent ecosystems as they become more prevalent", + "doc_status": "" + }, + { + "name": "draft-li-dmsc-inf-architecture", + "title": "Dynamic Multi-agent Secured Collaboration Infrastructure Architecture", + "date": "2026-02-05", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-dmsc-inf-architecture/", + "pages": 11, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols", + "ML traffic mgmt" + ], + "summary": "Proposes a network infrastructure architecture for large-scale multi-agent collaboration. Focuses on how network control and forwarding functions can actively participate in agent coordination.", + "novelty_note": "Novel application of network infrastructure to agent collaboration, but builds on existing networking concepts", + "maturity_note": "Early stage architectural framework, lacks implementation details and validation", + "overlap_note": "Related to other DMSC drafts but focuses specifically on infrastructure layer", + "momentum_note": "Part of coordinated DMSC effort, moderate early interest expected", + "relevance_note": "Highly relevant as agent systems scale and need infrastructure support", + "doc_status": "" + }, + { + "name": "draft-zeng-mcp-troubleshooting", + "title": "Using the Model Context Protocol (MCP) for Intent-Based Network Troubleshooting Automation", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zeng-mcp-troubleshooting/", + "pages": 10, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Data formats/interop", + "Human-agent interaction" + ], + "summary": "Applies Model Context Protocol to network management for intent-based troubleshooting. Maps MCP roles to network devices and controllers for automated operations.", + "novelty_note": "Novel application of MCP to network management domain with practical automation benefits", + "maturity_note": "Brief document with limited technical depth and implementation guidance", + "overlap_note": "Unique application domain though builds on existing MCP standard", + "momentum_note": "Interesting network management application but narrow scope may limit adoption", + "relevance_note": "Highly relevant for network automation and demonstrates practical AI agent applications", + "doc_status": "" + }, + { + "name": "draft-a2a-moqt-transport", + "title": "Media over QUIC Transport (MOQT) for Agent-to-Agent Protocol", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-a2a-moqt-transport/", + "pages": 12, + "group": "individual", + "score": 3.15, + "novelty": 4, + "maturity": 2, + "overlap": 5, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Agent discovery/reg" + ], + "summary": "Specifies transport of Agent-to-Agent protocol over Media over QUIC Transport. Leverages MOQT's publish/subscribe model for real-time AI agent communication.", + "novelty_note": "Creative application of media transport protocol for AI agent communication", + "maturity_note": "Early stage specification, lacks implementation details and validation", + "overlap_note": "Identical to draft-nandakumar-a2a-moqt-transport", + "momentum_note": "Growing interest in A2A protocols but MOQT adoption for non-media unclear", + "relevance_note": "Highly relevant for real-time agent communication infrastructure", + "doc_status": "" + }, + { + "name": "draft-levy-llm-uri-scheme", + "title": "The \"llm\" URI Scheme", + "date": "2026-02-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-levy-llm-uri-scheme/", + "pages": 17, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Model serving/inference", + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Defines a URI scheme for identifying LLM endpoints with embedded configuration parameters. Creates a standardized way to specify model, provider, authentication, and inference parameters in a single connection string.", + "novelty_note": "URI schemes for AI services are emerging but not well-established in standards", + "maturity_note": "Early draft with basic specification, needs more implementation experience", + "overlap_note": "Some overlap with general service discovery but specific to LLM endpoints", + "momentum_note": "Growing interest in LLM standardization but limited IETF momentum", + "relevance_note": "High relevance for LLM integration and interoperability in network applications", + "doc_status": "" + }, + { + "name": "draft-silver-aipref-vocab-substitutive", + "title": "Vocabulary For Expressing AI Substitutive Usage", + "date": "2025-09-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-silver-aipref-vocab-substitutive/", + "pages": 5, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "Policy/governance", + "Data formats/interop" + ], + "summary": "Proposes vocabulary for expressing preferences about AI substitutive usage of digital assets, focusing on inference-time uses that create outputs substituting for original content. Nests within broader automated processing preference framework.", + "novelty_note": "Specific focus on substitutive AI usage is novel within preference expression frameworks", + "maturity_note": "Early stage vocabulary proposal that needs broader community input and refinement", + "overlap_note": "Related to general AI preference frameworks but focuses on specific substitutive use case", + "momentum_note": "Growing importance of AI usage preferences but early adoption phase", + "relevance_note": "High relevance for content protection and AI governance discussions", + "doc_status": "" + }, + { + "name": "draft-ruan-spring-priority-flow-control-sid", + "title": "SRv6 behavior extention for Flow Control in WAN", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ruan-spring-priority-flow-control-sid/", + "pages": 10, + "group": "individual", + "score": 3.15, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "A2A protocols" + ], + "summary": "Extends SRv6 with flow control capabilities for WAN environments supporting RDMA-based AI workloads. Enables congestion notification and response for distributed AI training and inference.", + "novelty_note": "Novel application of SRv6 to AI traffic flow control in WAN scenarios", + "maturity_note": "Technical approach appears sound but document seems incomplete", + "overlap_note": "Builds on SRv6 but addresses distinct flow control requirements", + "momentum_note": "Growing interest in AI traffic management but early stage work", + "relevance_note": "Addresses important WAN flow control needs for distributed AI", + "doc_status": "" + }, + { + "name": "draft-mvieuille-kerpass-ephemsec", + "title": "KerPass EPHEMSEC One-Time Password Algorithm", + "date": "2025-11-22", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mvieuille-kerpass-ephemsec/", + "pages": 31, + "group": "individual", + "score": 3.15, + "novelty": 4, + "maturity": 3, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Agent identity/auth", + "AI safety/alignment" + ], + "summary": "Specifies EPHEMSEC algorithm for generating one-time passwords using public key cryptography instead of shared secrets. Includes context binding for phishing resistance and built-in time synchronization.", + "novelty_note": "Innovative approach to OTP generation with public key cryptography and context binding features", + "maturity_note": "Detailed algorithm specification but needs broader security analysis and implementation testing", + "overlap_note": "Overlaps with existing OTP algorithms but introduces novel public key approach", + "momentum_note": "Single author with limited industry validation or adoption signals", + "relevance_note": "Relevant to AI agent authentication but not specifically designed for agent use cases", + "doc_status": "" + }, + { + "name": "draft-tojens-dhcp-option-concat-considerations", + "title": "DHCP Option Concatenation Considerations", + "date": "2025-09-04", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-tojens-dhcp-option-concat-considerations/", + "pages": 7, + "group": "individual", + "score": 3.1, + "novelty": 2, + "maturity": 4, + "overlap": 1, + "momentum": 3, + "relevance": 3, + "categories": [ + "Data formats/interop" + ], + "summary": "Updates RFC 3396 to make DHCP option concatenation requirements more flexible. Addresses real-world implementation deviations from original strict concatenation requirements.", + "novelty_note": "Incremental improvement addressing deployment reality rather than novel approach", + "maturity_note": "Well-motivated by deployment experience and clear problem statement", + "overlap_note": "Unique focus on this specific DHCP implementation issue", + "momentum_note": "Standards update addressing known interoperability issues should gain support", + "relevance_note": "Important for DHCP implementations but narrow technical scope", + "doc_status": "" + }, + { + "name": "draft-ietf-lamps-rfc5274bis", + "title": "Certificate Management Messages over CMS (CMC): Compliance Requirements", + "date": "2026-02-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5274bis/", + "pages": 14, + "group": "individual", + "score": 3.1, + "novelty": 2, + "maturity": 4, + "overlap": 1, + "momentum": 3, + "relevance": 3, + "categories": [ + "Data formats/interop" + ], + "summary": "Defines compliance requirements for Certificate Management Messages over CMS (CMC) enrollment protocol. Updates and obsoletes previous RFCs with current compliance statements.", + "novelty_note": "Incremental update to existing CMC compliance requirements", + "maturity_note": "Mature IETF working group draft updating well-established protocols", + "overlap_note": "Specific to CMC compliance, minimal overlap with other drafts", + "momentum_note": "Standard LAMPS working group progression", + "relevance_note": "Important for PKI certificate management compliance", + "doc_status": "" + }, + { + "name": "draft-vinaysingh-awp-wellknown", + "title": "The Agent Workflow Protocol (AWP) Well-Known Resource and Link Relation", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-vinaysingh-awp-wellknown/", + "pages": 6, + "group": "individual", + "score": 3.1, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 3, + "categories": [ + "Human-agent interaction", + "Data formats/interop", + "Agent discovery/reg" + ], + "summary": "Defines well-known URI and link relation for exposing website workflows to automated agents. Provides minimal JSON format for agent interaction without web scraping.", + "novelty_note": "Simple approach to structured agent-web interaction using established well-known URI pattern", + "maturity_note": "Concise specification with clear scope, though limited technical depth", + "overlap_note": "Complements other agent discovery mechanisms but focuses on web workflow exposure", + "momentum_note": "Moderate potential given simplicity but requires website operator adoption", + "relevance_note": "Relevant for web-based agent interactions and structured workflow automation", + "doc_status": "" + }, + { + "name": "draft-contario-totp-secure-enrollment", + "title": "TOTP Secure Enrollment", + "date": "2025-09-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-contario-totp-secure-enrollment/", + "pages": 21, + "group": "individual", + "score": 3.1, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 3, + "categories": [ + "Agent identity/auth", + "AI safety/alignment" + ], + "summary": "Extends TOTP enrollment to prevent key compromise through QR code capture or key persistence in external systems. Addresses common security vulnerabilities in current TOTP deployment practices.", + "novelty_note": "Practical security improvement to widely-used TOTP enrollment process", + "maturity_note": "Addresses real-world security concerns but builds incrementally on existing TOTP framework", + "overlap_note": "Extends TOTP standard with minimal overlap to existing secure enrollment methods", + "momentum_note": "Moderate interest given widespread TOTP usage but may face adoption challenges", + "relevance_note": "Relevant for agent authentication security but not AI/agent-specific", + "doc_status": "" + }, + { + "name": "draft-architect-cittamarket", + "title": "The CITTAMARKET Protocol: Decentralized AGI Identity Anchoring via Bitcoin", + "date": "2025-12-19", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-architect-cittamarket/", + "pages": 3, + "group": "individual", + "score": 3.1, + "novelty": 5, + "maturity": 1, + "overlap": 1, + "momentum": 1, + "relevance": 3, + "categories": [ + "AI safety/alignment", + "Agent identity/auth", + "Other AI/agent" + ], + "summary": "Specifies protocol for immutable AGI system identification using Bitcoin blockchain anchoring. Defines four-layer architecture for creating unforgeable 'Sovereign Identity' records with Proof-of-Work coordination.", + "novelty_note": "Highly novel approach combining AGI identity, blockchain anchoring, and distributed coordination", + "maturity_note": "Only 3 pages with minimal technical detail, appears more conceptual than implementable", + "overlap_note": "Unique combination of AGI, Bitcoin, and identity concepts not seen in other drafts", + "momentum_note": "Individual submission with unconventional approach, unlikely to gain IETF traction", + "relevance_note": "Addresses AGI identity which is relevant but approach may be impractical for real deployment", + "doc_status": "" + }, + { + "name": "draft-xu-sidrops-asrank-vulnerabilities", + "title": "Structural Vulnerabilities in ASRank under Adversarial Conditions", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-xu-sidrops-asrank-vulnerabilities/", + "pages": 9, + "group": "individual", + "score": 3.1, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 3, + "categories": [ + "AI safety/alignment", + "Policy/governance" + ], + "summary": "Analyzes security vulnerabilities in the ASRank algorithm used for inferring AS business relationships from BGP data. Identifies how adversarial manipulation could affect inference results.", + "novelty_note": "Important security analysis of widely-used BGP analysis tool, though builds on existing ASRank work", + "maturity_note": "Solid analysis with concrete examples, but primarily analytical rather than proposing solutions", + "overlap_note": "Related to BGP security research but specific focus on ASRank vulnerabilities is unique", + "momentum_note": "BGP security remains important but ASRank-specific work has limited audience", + "relevance_note": "Relevant for network security and BGP operations, though somewhat specialized", + "doc_status": "" + }, + { + "name": "draft-zw-nmrg-mcp-network-mgmt", + "title": "Model Context Protocol (MCP) Extensions for Network Equipment Management", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zw-nmrg-mcp-network-mgmt/", + "pages": 18, + "group": "individual", + "score": 3.05, + "novelty": 3, + "maturity": 3, + "overlap": 5, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Defines MCP extensions for network equipment management using JSON-RPC 2.0 framework. Specifies how network devices can act as MCP servers with controllers as clients.", + "novelty_note": "Practical extension of existing MCP protocol to networking domain", + "maturity_note": "More mature at 18 pages with detailed technical specifications", + "overlap_note": "Nearly identical to draft-zw-opsawg-mcp-network-mgmt", + "momentum_note": "", + "relevance_note": "Highly relevant to autonomous network management and AI-driven operations", + "doc_status": "" + }, + { + "name": "draft-zw-opsawg-mcp-network-mgmt", + "title": "Model Context Protocol (MCP) Extensions for Network Equipment Management", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zw-opsawg-mcp-network-mgmt/", + "pages": 18, + "group": "individual", + "score": 3.05, + "novelty": 3, + "maturity": 3, + "overlap": 5, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Defines MCP extensions for network equipment management using JSON-RPC 2.0 framework. Specifies how network devices can act as MCP servers with controllers as clients.", + "novelty_note": "Practical extension of existing MCP protocol to networking domain", + "maturity_note": "More mature at 18 pages, updated version suggests active development", + "overlap_note": "Nearly identical to draft-zw-nmrg-mcp-network-mgmt, likely venue change", + "momentum_note": "Active development shown by venue migration and updates", + "relevance_note": "Highly relevant to autonomous network management and AI-driven operations", + "doc_status": "" + }, + { + "name": "draft-aft-ai-traffic", + "title": "Handling inter-DC/Edge AI-related network traffic: Problem statement", + "date": "2025-10-13", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-aft-ai-traffic/", + "pages": 38, + "group": "individual", + "score": 3.05, + "novelty": 3, + "maturity": 3, + "overlap": 5, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Model serving/inference" + ], + "summary": "Problem statement addressing network traffic challenges for federated LLM training and inference across datacenters. Emphasizes understanding AI workload characteristics for distributed operations.", + "novelty_note": "Solid problem identification for federated AI, but remains at problem statement level", + "maturity_note": "More recent version, better positioned but still needs solution development", + "overlap_note": "Identical abstract to draft-ai-traffic, appears to be same work under different name", + "momentum_note": "More recent version suggests continued interest, but needs solution development", + "relevance_note": "Addresses critical federated AI networking challenges relevant to industry needs", + "doc_status": "" + }, + { + "name": "draft-ni-wimse-ai-agent-identity", + "title": "WIMSE Applicability for AI Agents", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/", + "pages": 10, + "group": "individual", + "score": 3.05, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth" + ], + "summary": "Applies WIMSE (Workload Identity in Multi System Environments) framework to AI agents for identity and credential management. Focuses on establishing independent identities for AI agents operating across systems.", + "novelty_note": "Moderate novelty in applying existing WIMSE to AI agents", + "maturity_note": "Early stage, limited technical detail in abstract", + "overlap_note": "Some overlap with other agent identity drafts", + "momentum_note": "Part of emerging AI agent standardization work", + "relevance_note": "Highly relevant as agent identity is foundational", + "doc_status": "" + }, + { + "name": "draft-sipos-dtn-bp-safe", + "title": "Bundle Protocol (BP) Security Associations with Few Exchanges (SAFE)", + "date": "2025-12-07", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-sipos-dtn-bp-safe/", + "pages": 77, + "group": "individual", + "score": 3.05, + "novelty": 3, + "maturity": 5, + "overlap": 4, + "momentum": 3, + "relevance": 2, + "categories": [ + "Agent identity/auth", + "Autonomous netops" + ], + "summary": "Defines security association negotiation protocol for Bundle Protocol agents in delay-tolerant networks. Optimizes asymmetric-key operations for high-throughput DTN security.", + "novelty_note": "DTN-specific security associations are somewhat novel but follow established patterns", + "maturity_note": "Comprehensive 77-page specification with detailed protocol definitions", + "overlap_note": "Significant overlap with general security association protocols", + "momentum_note": "Mature specification but DTN market is niche", + "relevance_note": "Limited relevance to mainstream AI agent deployments", + "doc_status": "" + }, + { + "name": "draft-chen-lake-edhoc-aka", + "title": "EDHOC Authenticated with AKA", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chen-lake-edhoc-aka/", + "pages": 8, + "group": "individual", + "score": 3.05, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth" + ], + "summary": "Defines EDHOC-AKA authentication method combining AKA protocol with EDHOC for mobile network access authentication. Designed for resource-constrained scenarios like Non-Terrestrial Networks using symmetric cryptography.", + "novelty_note": "Novel combination of AKA and EDHOC but builds on well-established protocols", + "maturity_note": "Early stage specification with limited technical detail and implementation guidance", + "overlap_note": "Significant overlap with existing AKA and EDHOC protocols", + "momentum_note": "Moderate interest from mobile network and satellite communication communities", + "relevance_note": "Highly relevant for satellite and mobile network authentication scenarios", + "doc_status": "" + }, + { + "name": "draft-bernardos-cats-isac-uc", + "title": "Integrated Sensing and Communications (ISAC) for CATS", + "date": "2026-01-05", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-bernardos-cats-isac-uc/", + "pages": 10, + "group": "individual", + "score": 3.05, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "ML traffic mgmt" + ], + "summary": "Presents Integrated Sensing and Communications (ISAC) as a use case for CATS architecture. Explores joint optimization of sensing and communication functions for autonomous systems and smart cities.", + "novelty_note": "Applies existing ISAC concepts to CATS framework, use case exploration rather than protocol innovation", + "maturity_note": "Early-stage use case document, limited technical depth in protocol specifics", + "overlap_note": "ISAC concepts exist elsewhere, overlap with general CATS and sensing integration work", + "momentum_note": "Part of emerging CATS discussions but still exploratory phase", + "relevance_note": "High relevance for future autonomous systems requiring integrated sensing and communication", + "doc_status": "" + }, + { + "name": "draft-chuyi-nmrg-agentic-network-inference", + "title": "Agentic Network Architecture and Protocol for Supporting Agent Interconnection Communication and Multi-level Inference", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chuyi-nmrg-agentic-network-inference/", + "pages": 9, + "group": "individual", + "score": 3.05, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "Model serving/inference", + "A2A protocols" + ], + "summary": "Proposes network architecture for multi-agent interconnection and multi-level inference across cloud-edge-end environments. Addresses coordination and scheduling for collaborative agent tasks.", + "novelty_note": "Addresses emerging need for agent interconnection but concepts are broad", + "maturity_note": "Short 9-page draft with high-level concepts, needs more technical detail", + "overlap_note": "Moderate overlap with general distributed AI and edge computing work", + "momentum_note": "Timely topic but execution needs strengthening", + "relevance_note": "Very relevant to future agent-centric network architectures", + "doc_status": "" + }, + { + "name": "draft-yc-ipv6-for-ioa", + "title": "Capabilities and Future Requirements of IPv6 for the Internet of Agents (IoA)", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yc-ipv6-for-ioa/", + "pages": 7, + "group": "individual", + "score": 3.05, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Analyzes IPv6 capabilities for supporting Internet of Agents (IoA) infrastructure. Explores how IPv6's address space and features can enable billions of intelligent agents.", + "novelty_note": "Applies existing IPv6 to new IoA domain with some novel requirements", + "maturity_note": "7-page analysis document without concrete protocol extensions", + "overlap_note": "Overlaps conceptually with other IoA drafts but IPv6-specific angle", + "momentum_note": "Builds on established IPv6 foundation for emerging IoA applications", + "relevance_note": "Very relevant for scaling agent communications to massive deployments", + "doc_status": "" + }, + { + "name": "draft-wendt-stir-vesper", + "title": "VESPER - Framework for VErifiable STI Personas", + "date": "2025-11-04", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-wendt-stir-vesper/", + "pages": 23, + "group": "individual", + "score": 3.0, + "novelty": 3, + "maturity": 4, + "overlap": 4, + "momentum": 4, + "relevance": 2, + "categories": [ + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Formalizes framework for verifiable telephone number identity using delegate certificates and authority tokens. Extends existing STIR/SHAKEN work with transparency mechanisms and rich call data support.", + "novelty_note": "Evolution of existing STIR work with verifiable transparency elements", + "maturity_note": "Mature technical specification building on established protocols", + "overlap_note": "Heavy overlap with existing STIR/SHAKEN and certificate transparency work", + "momentum_note": "Strong technical detail and builds on author's established work", + "relevance_note": "Telephony-focused, limited relevance to AI agent networking", + "doc_status": "" + }, + { + "name": "draft-ietf-lamps-e2e-mail-guidance", + "title": "Guidance on End-to-End E-mail Security", + "date": "2025-08-23", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lamps-e2e-mail-guidance/", + "pages": 68, + "group": "individual", + "score": 3.0, + "novelty": 2, + "maturity": 5, + "overlap": 3, + "momentum": 4, + "relevance": 2, + "categories": [ + "Data formats/interop", + "Policy/governance" + ], + "summary": "Provides comprehensive guidance for implementing end-to-end email encryption securely. Addresses usability issues and interoperability problems in cryptographic email protection.", + "novelty_note": "Guidance document for existing standards rather than novel technical contribution", + "maturity_note": "Mature 68-page IETF working group document with extensive detail", + "overlap_note": "Overlaps with existing email security standards but provides unique implementation guidance", + "momentum_note": "Strong IETF working group backing with clear implementation focus", + "relevance_note": "Limited relevance to AI/agent protocols beyond general secure communication", + "doc_status": "" + }, + { + "name": "draft-nandakumar-a2a-moqt-transport", + "title": "Media over QUIC Transport (MOQT) for Agent-to-Agent Protocol", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-nandakumar-a2a-moqt-transport/", + "pages": 12, + "group": "individual", + "score": 3.0, + "novelty": 4, + "maturity": 2, + "overlap": 5, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Agent discovery/reg" + ], + "summary": "Identical specification to draft-a2a-moqt-transport for transporting Agent-to-Agent protocol over MOQT. Appears to be duplicate submission with different author.", + "novelty_note": "Same novel approach as duplicate draft", + "maturity_note": "Early stage, identical content suggests coordination issues between authors", + "overlap_note": "Complete duplication of draft-a2a-moqt-transport", + "momentum_note": "Duplicate submission reduces momentum and creates confusion", + "relevance_note": "Same high relevance but undermined by duplication issue", + "doc_status": "" + }, + { + "name": "draft-intellinode-cats-in-network-scheduling", + "title": "IntelliNode: In-Network Intelligent Scheduling Extensions for CATS", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-intellinode-cats-in-network-scheduling/", + "pages": 6, + "group": "individual", + "score": 3.0, + "novelty": 4, + "maturity": 2, + "overlap": 5, + "momentum": 2, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops" + ], + "summary": "Introduces IntelliNode mechanism for AI-aware network scheduling using FPGA-enhanced switches. Creates closed-loop system for real-time tensor flow optimization and heterogeneous compute matching.", + "novelty_note": "Innovative integration of FPGAs in network switches for AI workload optimization", + "maturity_note": "Brief document with high-level architecture but limited implementation details", + "overlap_note": "Appears to be duplicate or very similar to draft-li-cats-intellinode-network-scheduling", + "momentum_note": "Short length and potential duplication suggests coordination issues", + "relevance_note": "Addresses important AI infrastructure optimization challenges", + "doc_status": "" + }, + { + "name": "draft-zhang-agent-gap-network", + "title": "Problem Statement and Gap Analysis for Agent-enabled Mobile Core Network", + "date": "2026-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhang-agent-gap-network/", + "pages": 6, + "group": "individual", + "score": 3.0, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Autonomous netops", + "ML traffic mgmt" + ], + "summary": "This draft identifies problems and gaps in mobile core networks for supporting AI agent communication, focusing on changes in interaction content (multimodality), entities (agent-to-agent), and protocols (semantic understanding). It argues current networks are 'dumb pipelines' that need AI-native capabilities for agent communication scenarios.", + "novelty_note": "Addresses emerging AI agent networking needs but analysis is fairly general and high-level", + "maturity_note": "Very early draft with many TBD sections, incomplete use cases, and missing technical details", + "overlap_note": "References 3GPP TR 22.870 for AI Agent definitions but appears to be first IETF work specifically on agent-enabled mobile core networks", + "momentum_note": "First version (-00) from China Unicom authors, no evidence of working group adoption or broader community engagement yet", + "relevance_note": "Highly relevant as it addresses fundamental networking infrastructure needs for AI agent deployment at mobile network scale", + "doc_status": "" + }, + { + "name": "draft-cui-ai-agent-task", + "title": "Task-oriented Coordination Requirements for AI Agent Protocols", + "date": "2026-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-cui-ai-agent-task/", + "pages": 10, + "group": "individual", + "score": 3.0, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Autonomous netops" + ], + "summary": "This draft proposes requirements for standardized AI agent protocols to enable task-oriented coordination in multi-agent systems. It addresses the need for dynamic task discovery, negotiation, and context-aware scheduling across heterogeneous networking environments, focusing on scenarios where multiple AI agents must collaborate to complete complex tasks.", + "novelty_note": "Addresses emerging AI agent coordination needs but builds on established multi-agent system concepts", + "maturity_note": "Early draft with basic framework outlined but lacks detailed technical specifications and appears truncated", + "overlap_note": "Some overlap with general multi-agent coordination work but focuses specifically on AI agents in networking contexts", + "momentum_note": "Authors from reputable institutions (Tsinghua University) but this appears to be initial version with limited development history", + "relevance_note": "Highly relevant to AI agent networking as it directly addresses coordination protocols for multi-agent AI systems", + "doc_status": "" + }, + { + "name": "draft-hong-nmrg-agenticai-ps", + "title": "Motivations and Problem Statement of Agentic AI for network management", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-hong-nmrg-agenticai-ps/", + "pages": 16, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Policy/governance" + ], + "summary": "Presents problem statement and motivations for applying Agentic AI to network management. Emphasizes collaborative autonomous agents for fully automated network operations, management and security.", + "novelty_note": "Frames existing agentic AI concepts within network management context with collaborative focus", + "maturity_note": "Problem statement level document, lacks concrete technical solutions or protocols", + "overlap_note": "Significant overlap with autonomous network operations and AI agent coordination topics", + "momentum_note": "NMRG venue appropriate, collaborative automation angle has potential interest", + "relevance_note": "Highly relevant to network automation trends and operator pain points", + "doc_status": "" + }, + { + "name": "draft-zhao-nmrg-ai-agent-for-dtn", + "title": "AI Agent Architecture for DTN Digital Twin Network", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhao-nmrg-ai-agent-for-dtn/", + "pages": 7, + "group": "individual", + "score": 2.95, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Autonomous netops", + "Data formats/interop", + "Other AI/agent" + ], + "summary": "Proposes AI agent architecture for Digital Twin Networks, integrating autonomous agents at each DTN component level. Extends traditional DTN architecture for more intelligent and adaptive network management.", + "novelty_note": "Novel combination of digital twin technology with AI agents for network management", + "maturity_note": "Very brief at 7 pages, appears to be early conceptual stage", + "overlap_note": "Some overlap with network digital twins and AI agent architectures", + "momentum_note": "Niche combination of technologies may limit broader adoption", + "relevance_note": "Relevant for advanced network management but digital twin adoption still emerging", + "doc_status": "" + }, + { + "name": "draft-fu-nmop-agent-communication-framework", + "title": "Agent Communication Framework for Network AIOps", + "date": "2026-01-25", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/", + "pages": 13, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Autonomous netops", + "Agent discovery/reg" + ], + "summary": "Proposes a multi-agent communication framework for network AIOps with AI gateway, Agent Name Service, and security features. Focuses on coordinating heterogeneous agents for intelligent network operations and maintenance.", + "novelty_note": "Standard multi-agent coordination approach but network operations focus adds domain-specific value", + "maturity_note": "Early stage framework with basic architectural components outlined but limited technical detail", + "overlap_note": "Significant overlap with other agent communication and discovery drafts in this set", + "momentum_note": "Network operations domain has established interest but multi-agent approach is emerging", + "relevance_note": "Highly relevant as networks become more complex and autonomous operations gain traction", + "doc_status": "" + }, + { + "name": "draft-cui-dmsc-agent-cdi", + "title": "Cross-Domain Interoperability Framework for AI Agent Collaboration", + "date": "2026-02-11", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-cui-dmsc-agent-cdi/", + "pages": 34, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Data formats/interop", + "Policy/governance", + "A2A protocols" + ], + "summary": "Defines comprehensive framework for cross-domain AI agent interoperability including identity federation and trust establishment. Enables multi-domain collaboration without centralized control.", + "novelty_note": "Comprehensive approach to cross-domain agent interoperability combining multiple established concepts", + "maturity_note": "Extensive framework but appears early stage with broad scope requiring significant development", + "overlap_note": "Heavy overlap with authorization draft and touches on discovery/communication aspects", + "momentum_note": "Cross-domain interoperability is important but complexity may limit adoption", + "relevance_note": "Addresses fundamental challenge for large-scale agent deployment across organizations", + "doc_status": "" + }, + { + "name": "draft-leon-distributed-multi-signer", + "title": "Distributed DNSSEC Multi-Signer Bootstrap", + "date": "2025-08-11", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-leon-distributed-multi-signer/", + "pages": 31, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 4, + "overlap": 3, + "momentum": 3, + "relevance": 2, + "categories": [ + "Autonomous netops", + "Data formats/interop" + ], + "summary": "Defines distributed DNSSEC multi-signer architecture with multi-signer agents and combiners. Introduces HSYNC RRtype and secure communication mechanisms between MSAs.", + "novelty_note": "Extends existing DNSSEC multi-signer concepts with distributed approach", + "maturity_note": "Comprehensive 31-page specification with detailed technical mechanisms", + "overlap_note": "Builds on RFC8901 multi-signer model but adds distributed aspects", + "momentum_note": "DNSSEC automation has steady interest but limited to DNS community", + "relevance_note": "Limited AI/agent relevance beyond DNS infrastructure automation", + "doc_status": "" + }, + { + "name": "draft-ietf-httpbis-rfc6265bis", + "title": "Cookies: HTTP State Management Mechanism", + "date": "2025-12-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-httpbis-rfc6265bis/", + "pages": 62, + "group": "individual", + "score": 2.95, + "novelty": 2, + "maturity": 5, + "overlap": 5, + "momentum": 5, + "relevance": 2, + "categories": [ + "Other AI/agent" + ], + "summary": "Updates HTTP Cookie specification to replace RFC 6265 with improved security and privacy. Addresses historical flaws while maintaining backward compatibility for widely-used web functionality.", + "novelty_note": "Incremental improvement to existing well-established standard", + "maturity_note": "Mature working group draft with extensive detail and broad industry review", + "overlap_note": "Direct update to existing RFC, heavy overlap by design", + "momentum_note": "Strong working group support and clear path to standardization", + "relevance_note": "Foundational web technology but not specifically targeted at AI/agent scenarios", + "doc_status": "" + }, + { + "name": "draft-yang-dmsc-ioa-task-protocol", + "title": "Internet of Agents Task Protocol (IoA Task Protocol) for Heterogeneous Agent Collaboration", + "date": "2026-01-29", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yang-dmsc-ioa-task-protocol/", + "pages": 14, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Autonomous netops" + ], + "summary": "Defines a protocol for distributed collaboration among heterogeneous AI agents, enabling dynamic team formation and task coordination. Targets large-scale scenarios like intelligent transportation and smart healthcare across diverse network environments.", + "novelty_note": "Reasonable novelty in agent task coordination, but builds on known distributed systems concepts", + "maturity_note": "Early stage with basic protocol definition, lacks implementation details and security considerations", + "overlap_note": "Significant overlap with other IoA drafts in this set, particularly the semantic interaction draft", + "momentum_note": "Part of emerging IoA standardization effort but unclear industry backing", + "relevance_note": "Highly relevant to growing AI agent ecosystem and multi-agent systems deployment", + "doc_status": "" + }, + { + "name": "draft-condrey-rats-witnessd-enrollment", + "title": "Trust Anchor Bootstrap Protocol for Proof of Process", + "date": "2026-02-07", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-condrey-rats-witnessd-enrollment/", + "pages": 13, + "group": "individual", + "score": 2.95, + "novelty": 4, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Agent identity/auth", + "Policy/governance", + "Autonomous netops" + ], + "summary": "Specifies trust anchor bootstrap protocol for proof of process framework. Defines device enrollment, key provisioning, and trust anchor validation across different deployment modes.", + "novelty_note": "Novel approach combining device attestation with process verification", + "maturity_note": "Early specification without widespread implementation or testing", + "overlap_note": "Overlaps with existing device attestation and enrollment protocols", + "momentum_note": "Limited visibility in IETF working groups, niche application area", + "relevance_note": "Relevant for secure agent deployment but specialized use case", + "doc_status": "" + }, + { + "name": "draft-pocero-authkem-ikr-edhoc", + "title": "KEM-based Authentication for EDHOC in Initiator-Known Responder (IKR) Scenarios", + "date": "2026-01-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-pocero-authkem-ikr-edhoc/", + "pages": 26, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "Agent identity/auth" + ], + "summary": "This draft proposes a KEM-based authentication variant for EDHOC that optimizes for scenarios where the initiator knows the responder's credentials beforehand, reducing the handshake to three mandatory messages. It aims to provide signature-free post-quantum authentication while maintaining mutual authentication and forward secrecy in constrained environments.", + "novelty_note": "Moderate novelty - builds incrementally on existing KEM-based EDHOC authentication with optimization for specific IKR scenarios", + "maturity_note": "Early maturity - recent draft with limited field testing of the optimized three-message approach", + "overlap_note": "Significant overlap with existing EDHOC KEM authentication work, representing an optimization rather than fundamental innovation", + "momentum_note": "Moderate momentum - post-quantum cryptography adoption is growing but constrained environment deployment remains niche", + "relevance_note": "High relevance for IoT and constrained networks needing post-quantum security, though limited to specific IKR use cases", + "doc_status": "" + }, + { + "name": "draft-shi-moq-kvcache", + "title": "KVCache over MoQT", + "date": "2025-10-11", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-shi-moq-kvcache/", + "pages": 6, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Model serving/inference", + "Data formats/interop" + ], + "summary": "Specifies transmission of LLM KVCache over MoQT for efficient reuse and bandwidth savings. Leverages publish/subscribe transport for local caching of inference state.", + "novelty_note": "Practical application of MoQT to specific LLM caching needs", + "maturity_note": "Short specification needing more detailed protocol definition", + "overlap_note": "Significant overlap with general MoQT and caching mechanisms", + "momentum_note": "Addresses clear efficiency need but limited scope", + "relevance_note": "Highly relevant for LLM inference optimization", + "doc_status": "" + }, + { + "name": "draft-yang-spring-sr-policy-intelligent-routing", + "title": "Intelligent Routing Method of SR Policy", + "date": "2025-06-15", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yang-spring-sr-policy-intelligent-routing/", + "pages": 13, + "group": "individual", + "score": 2.95, + "novelty": 2, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops" + ], + "summary": "Describes an intelligent routing method for SR Policy that uses network quality metrics to make routing decisions in MPLS and IPv6 environments. Extends existing SR Policy framework with quality-based path selection.", + "novelty_note": "Quality-based routing exists; intelligence aspect appears to be basic metrics analysis", + "maturity_note": "Builds on established SR Policy framework with reasonable technical depth", + "overlap_note": "Moderate overlap with existing SR Policy and traffic engineering work", + "momentum_note": "SPRING working group context provides some momentum but not clear broad support", + "relevance_note": "Highly relevant to current SPRING work and network optimization needs", + "doc_status": "" + }, + { + "name": "draft-chen-tsvwg-high-speed-data-express", + "title": "High speed data express in IP: Concept, Reference Architecture and Technologies", + "date": "2025-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chen-tsvwg-high-speed-data-express/", + "pages": 7, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Model serving/inference" + ], + "summary": "Proposes IP-based reference architecture for high-speed data transmission using 'one low and three high' technical system. Targets AI and super-computing services requiring wide-area massive data transfer.", + "novelty_note": "Novel 'data express' concept with differentiated services, but builds on known IP principles", + "maturity_note": "Conceptual stage with reference architecture, limited implementation details", + "overlap_note": "Overlaps with traffic engineering, QoS, and high-performance networking drafts", + "momentum_note": "Good timing for AI data needs, but faces competition from existing solutions", + "relevance_note": "Very relevant for AI workloads needing efficient wide-area data movement", + "doc_status": "" + }, + { + "name": "draft-keller-aipref-vocab", + "title": "Proposal for an Opt-Out Vocabulary", + "date": "2025-04-10", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-keller-aipref-vocab/", + "pages": 6, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "Policy/governance", + "Data formats/interop", + "AI safety/alignment" + ], + "summary": "Proposes standardized vocabulary for machine-readable opt-outs related to Text and Data Mining and AI training. Defines three key use cases with mechanism-agnostic approach for consistent interpretation.", + "novelty_note": "Focuses specifically on opt-out mechanisms with clear use case categorization", + "maturity_note": "Brief specification needs more detailed implementation guidance and examples", + "overlap_note": "Substantial overlap with other aipref drafts but focuses specifically on opt-out scenarios", + "momentum_note": "Addresses important consent mechanisms but competes with similar efforts", + "relevance_note": "Relevant to AI training governance and rights management debates", + "doc_status": "" + }, + { + "name": "draft-happel-structured-email-trust", + "title": "Trust and security considerations for Structured Email", + "date": "2025-08-30", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-happel-structured-email-trust/", + "pages": 10, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "Data formats/interop", + "Agent identity/auth" + ], + "summary": "Provides trust and security recommendations for handling structured data in email messages. Focuses on guidance for message user agents to safely process structured email content.", + "novelty_note": "Addresses growing need for secure structured email handling but builds on existing email security concepts", + "maturity_note": "Brief document suggests early stage development with basic recommendations framework", + "overlap_note": "Some overlap with general email security work but specific to structured data trust", + "momentum_note": "Limited scope and length suggests modest community engagement", + "relevance_note": "Relevant as structured email becomes more common, though narrow application domain", + "doc_status": "" + }, + { + "name": "draft-ramakrishna-satp-data-sharing", + "title": "Protocol for Requesting and Sharing Views across Networks", + "date": "2025-09-15", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ramakrishna-satp-data-sharing/", + "pages": 21, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "Data formats/interop", + "A2A protocols" + ], + "summary": "Defines a DLT-neutral protocol for sharing asset views and metadata across blockchain networks via gateway nodes. Enables cross-system interoperability while preserving native consensus mechanisms.", + "novelty_note": "Builds on existing blockchain interoperability concepts but provides specific gateway protocol design", + "maturity_note": "Well-structured protocol definition but needs implementation validation and security analysis", + "overlap_note": "Some overlap with blockchain interoperability work but focused on specific data sharing use case", + "momentum_note": "Limited community engagement evident, needs broader blockchain ecosystem adoption", + "relevance_note": "Relevant for multi-chain environments but primarily traditional DLT rather than AI agents", + "doc_status": "" + }, + { + "name": "draft-bastian-jose-pkdh", + "title": "Public Key Derived HMAC for JOSE", + "date": "2025-11-04", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-bastian-jose-pkdh/", + "pages": 14, + "group": "individual", + "score": 2.95, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "Data formats/interop" + ], + "summary": "Defines a method to derive symmetric MAC keys from public information in JSON Web Signatures using Diffie-Hellman key agreement. This enables HMAC-based authentication without requiring pre-shared keys.", + "novelty_note": "Novel approach combining DH-KA with JWS for MAC key derivation, though builds on established JOSE framework", + "maturity_note": "Reasonably mature specification with clear technical approach, but needs more implementation experience", + "overlap_note": "Some overlap with existing JOSE specifications but introduces new key derivation mechanism", + "momentum_note": "Limited discussion and adoption visible in broader community", + "relevance_note": "Relevant for JSON-based security applications requiring dynamic key establishment", + "doc_status": "" + }, + { + "name": "draft-ietf-roll-enrollment-priority", + "title": "Controlling Secure Network Enrollment in RPL networks", + "date": "2026-02-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-roll-enrollment-priority/", + "pages": 10, + "group": "individual", + "score": 2.9, + "novelty": 2, + "maturity": 4, + "overlap": 3, + "momentum": 3, + "relevance": 3, + "categories": [ + "Agent discovery/reg", + "Autonomous netops" + ], + "summary": "Provides mechanism for RPL Root to control enrollment announcements and adjust enrollment priorities in RPL networks. Extends existing RFC9032 enrollment proxy capabilities with centralized control.", + "novelty_note": "Incremental enhancement to existing RPL enrollment mechanisms", + "maturity_note": "Mature, focused specification building on established RPL standards", + "overlap_note": "Direct extension of RFC9032 with some overlap in enrollment control mechanisms", + "momentum_note": "Solid but incremental improvement to existing IoT networking capabilities", + "relevance_note": "Relevant for IoT agent enrollment scenarios but limited to RPL network contexts", + "doc_status": "" + }, + { + "name": "draft-ahc-green-smartpdu-yang", + "title": "A YANG Model for SmartPDU Monitoring and Control", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ahc-green-smartpdu-yang/", + "pages": 8, + "group": "individual", + "score": 2.9, + "novelty": 2, + "maturity": 3, + "overlap": 1, + "momentum": 3, + "relevance": 3, + "categories": [ + "Data formats/interop", + "Policy/governance" + ], + "summary": "Defines YANG model for smart power distribution unit monitoring and control. Provides vendor-neutral framework developed during IETF hackathon for energy management.", + "novelty_note": "Straightforward application of YANG to power management domain, incremental innovation", + "maturity_note": "Has working implementation from hackathon but needs refinement for production use", + "overlap_note": "Unique focus on SmartPDU YANG modeling with minimal overlap", + "momentum_note": "Benefits from hackathon development and green networking interest", + "relevance_note": "Relevant to growing focus on network energy efficiency and sustainability", + "doc_status": "" + }, + { + "name": "draft-zhang-rtgwg-ai-agents-troubleshooting", + "title": "Use Cases and Requirements of Communication Protocol for Troubleshooting Agents on Network Devices", + "date": "2025-11-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhang-rtgwg-ai-agents-troubleshooting/", + "pages": 14, + "group": "individual", + "score": 2.9, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Autonomous netops" + ], + "summary": "This draft defines use cases and communication protocol requirements for troubleshooting agents deployed on network devices. It focuses on enabling distributed agents to collaboratively identify, diagnose, and resolve network issues across data center, campus, and IoT edge environments through standardized inter-agent communication.", + "novelty_note": "Applies existing concepts like gRPC to agent-based troubleshooting but doesn't introduce fundamentally new protocol mechanisms", + "maturity_note": "Early stage draft (-00) with basic structure but incomplete content, placeholder URLs, and truncated examples", + "overlap_note": "Overlaps with existing network management protocols (NETCONF, RESTCONF) and telemetry standards, but focuses specifically on agent coordination", + "momentum_note": "Multiple Huawei authors suggesting corporate backing, but no evidence of WG adoption or prior revisions yet", + "relevance_note": "Highly relevant to autonomous network operations trend, addressing key challenge of distributed agent coordination for network troubleshooting", + "doc_status": "" + }, + { + "name": "draft-yl-agent-id-requirements", + "title": "Digital Identity Management for AI Agent Communication Protocols", + "date": "2026-01-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yl-agent-id-requirements/", + "pages": 9, + "group": "individual", + "score": 2.9, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "A2A protocols", + "Agent discovery/reg" + ], + "summary": "This draft proposes requirements for digital identity management in AI agent communication protocols, focusing on identifiers, attributes (skills, capabilities, services), authentication, authorization, and discovery mechanisms. It aims to establish a foundation for secure, interoperable communication between AI agents and other entities across different domains and providers.", + "novelty_note": "Applies existing digital identity concepts to AI agents, which is relatively new but builds on established identity management principles", + "maturity_note": "Early stage draft with incomplete sections, basic requirements definition, and limited technical detail or protocol specifications", + "overlap_note": "Overlaps with general digital identity management RFCs and potentially other AI agent communication drafts like draft-rosenberg-ai-protocols mentioned in references", + "momentum_note": "China Mobile authors suggest some industry backing, but this appears to be version 00 with no evidence of working group adoption or broad community engagement", + "relevance_note": "Highly relevant as identity management is fundamental for secure AI agent interactions and will be critical as agents become more prevalent", + "doc_status": "" + }, + { + "name": "draft-wang-nmrg-magent-im", + "title": "A Protocol-agnostic Multiple Agents Interaction Model for Autonomous Network", + "date": "2026-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-wang-nmrg-magent-im/", + "pages": 33, + "group": "individual", + "score": 2.9, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Autonomous netops", + "Agent discovery/reg" + ], + "summary": "This draft proposes a protocol-agnostic data model for multi-agent communication in autonomous networks, enabling intelligent agents to coordinate across domains for tasks like fault management, service optimization, and user complaint handling. It aims to support Level 4 network autonomy through structured agent interaction patterns.", + "novelty_note": "The specific focus on autonomous network operations with multi-agent coordination is relatively novel, though general multi-agent systems are well-established", + "maturity_note": "This is version -00 with incomplete content (truncated), basic YANG model provided but limited implementation details", + "overlap_note": "Some overlap with existing network management protocols (NETCONF, RESTCONF) and TMForum standards, but specific multi-agent coordination aspects are less covered", + "momentum_note": "Authors from Huawei with network management background, but this is initial version with no WG adoption visible, dated 2025/2026 suggesting early stage", + "relevance_note": "Highly relevant to AI/agent networking as it directly addresses multi-agent coordination in network operations, a key area for autonomous network evolution", + "doc_status": "" + }, + { + "name": "draft-xie-ai-agent-multimodal", + "title": "Multimodal Management Requirements for AI Agent Protocols", + "date": "2026-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-xie-ai-agent-multimodal/", + "pages": 5, + "group": "individual", + "score": 2.9, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Data formats/interop" + ], + "summary": "This draft outlines requirements for multimodal communication in AI agent protocols, enabling agents to negotiate and exchange synchronized multimedia content including text, files, audio/video streams, and sensor data. It identifies gaps in existing agent protocols and proposes requirements for media channel establishment, multi-stream multiplexing, and synchronized multimodal data transmission.", + "novelty_note": "Applies existing multimedia concepts to AI agents, but specific combination is moderately novel", + "maturity_note": "Very early draft with basic requirements but lacks technical depth, protocol details, or implementation guidance", + "overlap_note": "Overlaps with existing multimedia protocols (SIP, WebRTC, RTP) and references existing agent protocols (A2A, ANP, Agntcy)", + "momentum_note": "Authors from established institution (CNIC, CAS) but this is version -00 with no clear working group adoption or revision history", + "relevance_note": "Highly relevant as multimodal capabilities are becoming critical for AI agents, especially with advancement of multimodal LLMs", + "doc_status": "" + }, + { + "name": "draft-campbell-agentic-http", + "title": "A Best Current Practice for Agentic Interactions over HTTP", + "date": "2026-02-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-campbell-agentic-http/", + "pages": 6, + "group": "individual", + "score": 2.9, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent identity/auth", + "Agent discovery/reg" + ], + "summary": "This draft proposes a Best Current Practice for AI agent interactions over HTTP, standardizing tool invocation via GET requests, stateless authentication, and formalizing the 402 Payment Required status code to enable a native economic layer for machine-to-machine transactions.", + "novelty_note": "While HTTP-based agent interactions exist, the specific combination of GET-only tool calls and 402-based payment semantics is relatively novel", + "maturity_note": "Early draft with some inconsistencies (document dates, RFC number vs draft status) and limited technical depth in key areas like security", + "overlap_note": "Overlaps with existing HTTP authentication RFCs, OpenAPI specifications, and general REST API best practices, but focuses specifically on agent use cases", + "momentum_note": "Single author from unknown organization, no indication of working group adoption, appears to be initial version with limited community engagement", + "relevance_note": "Highly relevant as it addresses a key challenge in AI agent networking - standardized communication patterns and economic transactions between agents", + "doc_status": "" + }, + { + "name": "draft-chang-agent-context-interaction", + "title": "Agent Context Interaction Optimizations", + "date": "2026-02-13", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-chang-agent-context-interaction/", + "pages": 13, + "group": "individual", + "score": 2.9, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "ML traffic mgmt" + ], + "summary": "Defines procedures for distributing context among multiple agents in complex workflows. Aims to optimize execution latency, token consumption, and task success rates.", + "novelty_note": "Context distribution optimization is novel but builds on established multi-agent coordination concepts", + "maturity_note": "Brief abstract and early stage development suggest limited technical depth", + "overlap_note": "Overlaps with agent communication and workflow management concepts", + "momentum_note": "Single author draft with minimal detail suggests limited momentum", + "relevance_note": "Context management is crucial for practical multi-agent systems", + "doc_status": "" + }, + { + "name": "draft-li-cdn-node-selection-enhancement", + "title": "CDN Node Selection Enhancement using Anycast and QUIC", + "date": "2025-11-07", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-cdn-node-selection-enhancement/", + "pages": 6, + "group": "individual", + "score": 2.9, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops" + ], + "summary": "Proposes enhanced CDN node selection using anycast and QUIC for load-aware redirection. Enables dynamic route advertisement based on server load and client requirements.", + "novelty_note": "Clever combination of anycast, BGP, and QUIC for dynamic CDN optimization", + "maturity_note": "Early stage proposal with basic concepts outlined but needs detailed protocol specification", + "overlap_note": "Overlaps with existing CDN and anycast technologies but offers novel integration approach", + "momentum_note": "Limited visibility into industry adoption or working group interest", + "relevance_note": "Highly relevant to CDN performance optimization and modern application delivery", + "doc_status": "" + }, + { + "name": "draft-jain-lisp-network-ai-infra", + "title": "LISP-Based Network for AI Infrastructure", + "date": "2025-12-13", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jain-lisp-network-ai-infra/", + "pages": 23, + "group": "individual", + "score": 2.85, + "novelty": 2, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops", + "Agent discovery/reg" + ], + "summary": "Applies LISP control plane mechanisms to AI infrastructure supporting scale-up, scale-out, and scale-across deployments. Leverages existing LISP features for unified control plane across heterogeneous accelerator fabrics.", + "novelty_note": "Application of existing LISP protocol to AI infrastructure use case", + "maturity_note": "Comprehensive application document with detailed LISP mechanism usage", + "overlap_note": "Heavy reliance on existing LISP specifications with AI-specific deployment patterns", + "momentum_note": "Builds on established LISP foundation but AI infrastructure application is emerging", + "relevance_note": "Highly relevant for AI infrastructure needing unified control plane across diverse fabrics", + "doc_status": "" + }, + { + "name": "draft-ietf-anima-brski-prm", + "title": "BRSKI with Pledge in Responder Mode (BRSKI-PRM)", + "date": "2025-06-07", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-anima-brski-prm/", + "pages": 123, + "group": "individual", + "score": 2.85, + "novelty": 2, + "maturity": 4, + "overlap": 1, + "momentum": 3, + "relevance": 2, + "categories": [ + "Agent identity/auth", + "Autonomous netops" + ], + "summary": "Enhances BRSKI for device bootstrapping where pledges act as servers in responder mode. Introduces registrar-agent component for scenarios with limited registrar communication.", + "novelty_note": "Incremental enhancement to existing BRSKI protocol for specific deployment scenarios", + "maturity_note": "Mature specification with detailed protocol mechanics and comprehensive coverage", + "overlap_note": "Extends BRSKI but addresses distinct use case not covered by other AI agent drafts", + "momentum_note": "Limited to specific BRSKI deployment scenarios but addresses real operational need", + "relevance_note": "Low relevance to AI agents specifically, focused on general device bootstrapping", + "doc_status": "" + }, + { + "name": "draft-takagi-srta-trinity", + "title": "SRTA and the Trinity Configuration: A Conceptual Architecture for Safe AGI Coordination", + "date": "2025-09-14", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-takagi-srta-trinity/", + "pages": 6, + "group": "individual", + "score": 2.85, + "novelty": 5, + "maturity": 1, + "overlap": 1, + "momentum": 1, + "relevance": 2, + "categories": [ + "AI safety/alignment", + "Policy/governance", + "A2A protocols" + ], + "summary": "Proposes SRTA architecture and Trinity Configuration for safe AGI coordination using theological analogy. Presents theoretical framework for superintelligence governance.", + "novelty_note": "Highly novel theological approach to AI safety architecture", + "maturity_note": "Very early conceptual work with limited technical specification", + "overlap_note": "Unique approach unlike any existing AI safety or coordination work", + "momentum_note": "Speculative work with unclear practical implementation path", + "relevance_note": "Important safety topic but too theoretical for current practical needs", + "doc_status": "" + }, + { + "name": "draft-zhul-intarea-bnc-up-specific-suboption", + "title": "Broadband Network UP-Specific Information Suboption for the DHCP Relay Agent Option", + "date": "2026-02-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhul-intarea-bnc-up-specific-suboption/", + "pages": 6, + "group": "individual", + "score": 2.85, + "novelty": 2, + "maturity": 4, + "overlap": 1, + "momentum": 3, + "relevance": 2, + "categories": [ + "Other AI/agent" + ], + "summary": "Defines a DHCP relay agent suboption for broadband networks to include UP-specific information. Ensures subscribers in the same SGRP under the same UP get IP addresses from consistent address spaces.", + "novelty_note": "Standard DHCP extension with conventional approach", + "maturity_note": "Well-defined technical specification with clear implementation path", + "overlap_note": "Specific to broadband DHCP scenarios, minimal overlap", + "momentum_note": "Addresses specific industry need but narrow scope", + "relevance_note": "Limited to broadband network scenarios, not broadly applicable to AI/agents", + "doc_status": "" + }, + { + "name": "draft-fu-cats-flow-lb", + "title": "Flow-Level Load Balancing of Computing-Aware Traffic Steering (CATS)", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-fu-cats-flow-lb/", + "pages": 9, + "group": "individual", + "score": 2.85, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 4, + "relevance": 3, + "categories": [ + "ML traffic mgmt", + "Autonomous netops" + ], + "summary": "Specifies flow-level load balancing for Computing-Aware Traffic Steering to reduce control overhead. Enables data plane autonomous flow distribution for better resource utilization.", + "novelty_note": "Incremental improvement to CATS with focus on autonomous data plane decisions", + "maturity_note": "Brief document with limited technical depth and no evaluation", + "overlap_note": "Significant overlap with existing CATS and load balancing work", + "momentum_note": "CATS is active area with strong industry interest", + "relevance_note": "Relevant for autonomous traffic management but narrowly focused", + "doc_status": "" + }, + { + "name": "draft-li-cats-intellinode-network-scheduling", + "title": "IntelliNode: In-Network Intelligent Scheduling Extensions for CATS", + "date": "2026-03-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-cats-intellinode-network-scheduling/", + "pages": 6, + "group": "individual", + "score": 2.85, + "novelty": 4, + "maturity": 2, + "overlap": 5, + "momentum": 1, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops" + ], + "summary": "Introduces IntelliNode mechanism for AI-aware network scheduling using FPGA-enhanced switches. Creates closed-loop system for real-time tensor flow optimization and heterogeneous compute matching.", + "novelty_note": "Innovative integration of FPGAs in network switches for AI workload optimization", + "maturity_note": "Brief document with high-level architecture but limited implementation details", + "overlap_note": "Appears to be duplicate or very similar to draft-intellinode-cats-in-network-scheduling", + "momentum_note": "Duplicate submission suggests poor coordination and low momentum", + "relevance_note": "Addresses important AI infrastructure optimization challenges", + "doc_status": "" + }, + { + "name": "draft-mzhang-nfsv4-recursively-setting", + "title": "Recursively Setting Attributes of Subdirectories and files", + "date": "2025-04-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mzhang-nfsv4-recursively-setting/", + "pages": 14, + "group": "individual", + "score": 2.85, + "novelty": 3, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 2, + "categories": [ + "Data formats/interop" + ], + "summary": "Extends NFSv4 with server-side recursive attribute setting for directories and files. Applies near-data computing principles to reduce network overhead and improve efficiency.", + "novelty_note": "Reasonable extension to NFSv4 server-side operations, follows established patterns", + "maturity_note": "Well-developed proposal with clear mechanism description and rationale", + "overlap_note": "Extends existing NFS work but addresses specific new functionality", + "momentum_note": "Useful optimization but incremental improvement to existing protocol", + "relevance_note": "Limited AI/agent relevance, more of a general storage optimization", + "doc_status": "" + }, + { + "name": "draft-pan-aqm-pie", + "title": "PIE: A Lightweight Control Scheme To Address the Bufferbloat Problem", + "date": "2024-12-18", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-pan-aqm-pie/", + "pages": 13, + "group": "individual", + "score": 2.85, + "novelty": 2, + "maturity": 4, + "overlap": 1, + "momentum": 3, + "relevance": 2, + "categories": [ + "Other AI/agent" + ], + "summary": "PIE is a lightweight queue management algorithm that addresses bufferbloat by controlling average queueing latency to reduce jitter and improve application performance. The design avoids per-packet timestamps making it suitable for both hardware and software implementation.", + "novelty_note": "PIE is an established AQM algorithm, this appears to be documentation of existing work", + "maturity_note": "Well-developed with simulation results, theoretical analysis, and Linux testbed validation", + "overlap_note": "Focused specifically on PIE algorithm without significant overlap with other drafts", + "momentum_note": "Active queue management remains relevant but PIE is already widely implemented", + "relevance_note": "Traditional networking problem, not directly related to AI/ML agent systems", + "doc_status": "" + }, + { + "name": "draft-blahaj-grow-rpki-oauth", + "title": "Attesting the Identities of Parties in OpenID Connect (OIDC) using the Resource Public Key Infrastructure (RPKI)", + "date": "2026-01-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-blahaj-grow-rpki-oauth/", + "pages": 7, + "group": "individual", + "score": 2.85, + "novelty": 3, + "maturity": 2, + "overlap": 1, + "momentum": 2, + "relevance": 3, + "categories": [ + "Agent identity/auth", + "Policy/governance" + ], + "summary": "Specifies method to bind OpenID Connect authentication to ASN agents using RPKI infrastructure. Addresses authentication gaps in the GROW Working Group's Peering API.", + "novelty_note": "Creative combination of RPKI and OIDC for network operator authentication", + "maturity_note": "Brief draft with limited technical detail and implementation guidance", + "overlap_note": "Unique approach combining these specific technologies", + "momentum_note": "Limited to specific peering use case with uncertain broader adoption", + "relevance_note": "Relevant for network peering but narrow application scope", + "doc_status": "" + }, + { + "name": "draft-williams-http-bearer-extension", + "title": "HTTP Bearer Auth Method Extensions", + "date": "2025-12-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-williams-http-bearer-extension/", + "pages": 16, + "group": "individual", + "score": 2.85, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Agent identity/auth" + ], + "summary": "Improves HTTP Bearer authentication with automatic token fetching from STS. Eliminates need for PKCE and simplifies user-agent token management.", + "novelty_note": "Incremental improvement to existing Bearer auth with automation", + "maturity_note": "Focused 16-page specification with clear HTTP integration", + "overlap_note": "Extends existing Bearer auth and OIDC patterns", + "momentum_note": "Individual submission without clear working group support", + "relevance_note": "Relevant for agent authentication but primarily traditional web auth", + "doc_status": "" + }, + { + "name": "draft-templin-6man-mla", + "title": "IPv6 Addresses for Ad Hoc Networks", + "date": "2026-02-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-templin-6man-mla/", + "pages": 12, + "group": "individual", + "score": 2.85, + "novelty": 3, + "maturity": 3, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "A2A protocols" + ], + "summary": "Introduces Multilink Local Address (MLA) type for autonomous IPv6 addressing in ad hoc networks. Enables topology-independent addressing when traditional delegation services are unavailable.", + "novelty_note": "New IPv6 address type for specific ad hoc networking scenarios", + "maturity_note": "Moderate complexity solution with clear problem statement but individual submission", + "overlap_note": "Some overlap with other IPv6 addressing schemes for mobile/ad hoc scenarios", + "momentum_note": "Individual submission without clear working group momentum", + "relevance_note": "Moderate relevance for ad hoc networking scenarios, niche but legitimate use case", + "doc_status": "" + }, + { + "name": "draft-ietf-lake-edhoc-impl-cons", + "title": "Implementation Considerations for Ephemeral Diffie-Hellman Over COSE (EDHOC)", + "date": "2026-01-07", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-lake-edhoc-impl-cons/", + "pages": 43, + "group": "individual", + "score": 2.8, + "novelty": 2, + "maturity": 4, + "overlap": 4, + "momentum": 3, + "relevance": 3, + "categories": [ + "Agent identity/auth" + ], + "summary": "Provides implementation guidance for EDHOC authenticated key exchange protocol. Offers practical considerations for deploying EDHOC in constrained environments.", + "novelty_note": "Implementation guidance document, not introducing new protocols but providing practical advice", + "maturity_note": "Comprehensive 43-page implementation guide from established working group", + "overlap_note": "Significant overlap with other EDHOC-related drafts in this set", + "momentum_note": "Moderate momentum as supporting document for EDHOC adoption", + "relevance_note": "Moderately relevant for constrained device implementations and IoT scenarios", + "doc_status": "" + }, + { + "name": "draft-abaris-aicdh", + "title": "AI Content Disclosure Header", + "date": "2026-01-30", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-abaris-aicdh/", + "pages": 8, + "group": "individual", + "score": 2.8, + "novelty": 2, + "maturity": 3, + "overlap": 2, + "momentum": 3, + "relevance": 3, + "categories": [ + "Data formats/interop", + "Policy/governance", + "Human-agent interaction" + ], + "summary": "Proposes HTTP header for disclosing AI-generated content in web responses. Provides machine-readable metadata for user agents and archiving systems.", + "novelty_note": "Straightforward application of HTTP headers to AI content disclosure", + "maturity_note": "Clear specification but limited scope and technical complexity", + "overlap_note": "Some similarity to content-type headers but AI-specific application is unique", + "momentum_note": "Simple enough for quick adoption but may face policy/governance debates", + "relevance_note": "Moderately relevant for AI transparency but peripheral to core networking concerns", + "doc_status": "" + }, + { + "name": "draft-ietf-httpbis-layered-cookies", + "title": "Cookies: HTTP State Management Mechanism", + "date": "2025-11-18", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-httpbis-layered-cookies/", + "pages": 46, + "group": "individual", + "score": 2.8, + "novelty": 2, + "maturity": 5, + "overlap": 5, + "momentum": 4, + "relevance": 2, + "categories": [ + "Other AI/agent" + ], + "summary": "Updates HTTP cookie specification replacing RFC 6265. Maintains existing widely-deployed cookie functionality while addressing historical security and privacy issues.", + "novelty_note": "Incremental improvement to existing standard rather than new functionality", + "maturity_note": "IETF working group draft with 46 pages of detailed specification", + "overlap_note": "Direct replacement/update of existing RFC 6265", + "momentum_note": "Active IETF working group with clear standardization path", + "relevance_note": "Traditional web technology, limited relevance to AI/agent systems", + "doc_status": "" + }, + { + "name": "draft-du-ai-agent-communication-6g-aspect", + "title": "Use Cases and Requirements of AI Agent Communication from 6G Aspect", + "date": "2026-01-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-du-ai-agent-communication-6g-aspect/", + "pages": 20, + "group": "individual", + "score": 2.8, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Agent identity/auth" + ], + "summary": "This draft proposes requirements and frameworks for AI Agent Communication Networks (ACN) in 6G systems, focusing on agent-to-agent communication across domains. It introduces use cases for AI agent collaboration, grouping mechanisms, and both centralized and decentralized communication frameworks to enable interoperability between AI agents from different organizations.", + "novelty_note": "Combines 6G networking perspective with AI agent communication, but core concepts of multi-agent systems and service discovery are well-established", + "maturity_note": "Early draft with incomplete sections (text cuts off mid-sentence), limited technical depth, and appears to be first version (-00)", + "overlap_note": "Overlaps significantly with existing multi-agent system protocols, service discovery mechanisms, and the referenced draft-rosenberg-ai-protocols on AI agent protocols", + "momentum_note": "Single author from China Mobile, no evidence of working group adoption, first version suggests limited community engagement so far", + "relevance_note": "Highly relevant as it addresses core challenge of inter-domain AI agent communication and proposes concrete network architectures for agent collaboration", + "doc_status": "" + }, + { + "name": "draft-song-oauth-ai-agent-authorization", + "title": "OAuth2.0 Extention for AI Agent: Authorization on Target", + "date": "2026-01-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-song-oauth-ai-agent-authorization/", + "pages": 8, + "group": "individual", + "score": 2.8, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 4, + "categories": [ + "Agent identity/auth", + "Policy/governance", + "Agent discovery/reg" + ], + "summary": "This draft proposes an extension to OAuth 2.0 that adds a 'target_id' field to enable granular authorization for AI agents and AI models deployed on clients. The extension aims to distinguish between the client device and specific AI components for better security, traceability, and compliance with regulations like GDPR.", + "novelty_note": "Addresses a legitimate gap in OAuth for AI agents, but the solution is a straightforward parameter addition rather than a fundamental innovation", + "maturity_note": "Draft appears incomplete (text cuts off mid-sentence), has numerous spelling/grammar errors, and lacks detailed technical specifications and examples", + "overlap_note": "Heavily overlaps with draft-oauth-ai-agents-on-behalf-of-user which it references, and builds incrementally on existing OAuth 2.0 framework", + "momentum_note": "First version (00) from Huawei authors, no evidence of working group adoption, and quality issues suggest limited momentum", + "relevance_note": "Directly addresses authorization challenges for AI agents which is increasingly important as AI systems become more autonomous and distributed", + "doc_status": "" + }, + { + "name": "draft-ietf-sshm-ssh-agent", + "title": "SSH Agent Protocol", + "date": "2026-02-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-sshm-ssh-agent/", + "pages": 31, + "group": "individual", + "score": 2.8, + "novelty": 1, + "maturity": 5, + "overlap": 2, + "momentum": 4, + "relevance": 2, + "categories": [ + "Agent identity/auth" + ], + "summary": "This draft specifies the SSH Agent Protocol for managing cryptographic keys used in SSH authentication. It standardizes an existing de-facto protocol that allows SSH clients to interact with key management agents to perform cryptographic operations without directly exposing private keys.", + "novelty_note": "This is standardization of an existing widely-deployed protocol, not novel work", + "maturity_note": "Version 16 draft with extensive implementation history and broad deployment", + "overlap_note": "Builds on SSH core RFCs (4251-4254) but addresses previously unstandardized agent protocol", + "momentum_note": "IETF working group adoption, mature revision number, from established SSH implementer", + "relevance_note": "While about 'agents', this is cryptographic key agents for SSH, not AI agents", + "doc_status": "" + }, + { + "name": "draft-jiang-cats-reference-acn", + "title": "CATS Reference Model for AI-Agent Communication Network", + "date": "2026-01-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jiang-cats-reference-acn/", + "pages": 12, + "group": "individual", + "score": 2.8, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 3, + "categories": [ + "A2A protocols", + "ML traffic mgmt", + "Data formats/interop" + ], + "summary": "Extends CATS framework to support AI-agent Communication Networks with reference architecture. Defines protocol stacks and signaling for agent-to-agent communication services.", + "novelty_note": "Extends existing CATS work to AI agent domain with new reference model", + "maturity_note": "High-level reference model lacking detailed protocol specifications", + "overlap_note": "Builds heavily on existing CATS framework with agent-specific extensions", + "momentum_note": "Benefits from existing CATS momentum but limited to that community", + "relevance_note": "Relevant for CATS community but narrow focus on specific architecture", + "doc_status": "" + }, + { + "name": "draft-yang-nmrg-mcp-nm", + "title": "Applicability of MCP for the Network Management", + "date": "2026-02-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yang-nmrg-mcp-nm/", + "pages": 19, + "group": "individual", + "score": 2.8, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Agent discovery/reg" + ], + "summary": "Applies Model Context Protocol (MCP) to network management for AI integration. Discusses network exposure, MCP server discovery, and communication between network elements and controllers.", + "novelty_note": "Moderate novelty in applying MCP to network management, but builds on established concepts", + "maturity_note": "Early stage draft with broad scope but limited concrete technical details", + "overlap_note": "Significant overlap with other MCP network management drafts in this set", + "momentum_note": "Limited momentum indicated by single draft and broad approach", + "relevance_note": "Highly relevant to AI-driven network operations and autonomous networking", + "doc_status": "" + }, + { + "name": "draft-ietf-dnsop-ds-automation", + "title": "Operational Recommendations for DS Automation", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-dnsop-ds-automation/", + "pages": 25, + "group": "individual", + "score": 2.75, + "novelty": 2, + "maturity": 4, + "overlap": 1, + "momentum": 4, + "relevance": 1, + "categories": [ + "Other AI/agent" + ], + "summary": "Provides operational recommendations for automated DS parameter acceptance in DNS. Addresses technical decisions around validation checks and multi-party coordination.", + "novelty_note": "Operational guidance for existing standards rather than new technical innovation", + "maturity_note": "Mature operational guidance from working group with practical focus", + "overlap_note": "Specific to DNS operations with no overlap with AI/agent work", + "momentum_note": "Working group draft with clear operational need and community support", + "relevance_note": "DNS-specific operational guidance, not relevant to AI/agent protocols", + "doc_status": "" + }, + { + "name": "draft-hackett-ures", + "title": "Unified Rendering of Email Standard (URES)", + "date": "2026-01-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-hackett-ures/", + "pages": 23, + "group": "individual", + "score": 2.75, + "novelty": 2, + "maturity": 4, + "overlap": 2, + "momentum": 3, + "relevance": 2, + "categories": [ + "Data formats/interop", + "Other AI/agent" + ], + "summary": "Specifies requirements for uniform HTML email rendering across mail clients, addressing inconsistencies in HTML/CSS interpretation. Covers dark mode, embedded assets, positioning, and secure SVG rendering while maintaining MIME compatibility.", + "novelty_note": "Addresses known email rendering problems but approach is incremental rather than novel", + "maturity_note": "Well-developed specification with clear requirements and backwards compatibility considerations", + "overlap_note": "Some overlap with existing email standards but addresses specific rendering gaps", + "momentum_note": "Addresses real industry pain points which could drive adoption", + "relevance_note": "Not directly AI/agent related, more focused on traditional email client interoperability", + "doc_status": "" + }, + { + "name": "draft-mpsb-agntcy-slim", + "title": "Secure Low-Latency Interactive Messaging (SLIM)", + "date": "2026-02-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mpsb-agntcy-slim/", + "pages": 17, + "group": "individual", + "score": 2.75, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Agent identity/auth" + ], + "summary": "Specifies SLIM protocol for real-time interactive AI applications, combining gRPC over HTTP/2/3 with MLS for secure messaging. Designed as transport layer for agent protocols like A2A and MCP with native RPC semantics.", + "novelty_note": "Combines existing technologies (gRPC, MLS) in AI-specific way but limited fundamental innovation", + "maturity_note": "Good technical specification but builds heavily on existing protocols without clear differentiation", + "overlap_note": "Significant overlap with gRPC, HTTP/2-3, and MLS work; incremental addition for AI use case", + "momentum_note": "Appears vendor-driven with limited broader community engagement", + "relevance_note": "Relevant for agent communication but unclear advantage over existing gRPC+MLS combinations", + "doc_status": "" + }, + { + "name": "draft-yusef-lamps-rfc7030-renewal-recommendation", + "title": "Certificate Renewal Recommendations for Enrollment over Secure Transport", + "date": "2026-01-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yusef-lamps-rfc7030-renewal-recommendation/", + "pages": 7, + "group": "individual", + "score": 2.75, + "novelty": 2, + "maturity": 3, + "overlap": 1, + "momentum": 2, + "relevance": 3, + "categories": [ + "Data formats/interop" + ], + "summary": "Extends EST protocol to provide certificate renewal timing recommendations from CA to end-entity devices. Addresses issues with traditional 50% lifetime renewal approach.", + "novelty_note": "Incremental extension addressing practical deployment issue", + "maturity_note": "Concise 7-page draft addressing specific operational need", + "overlap_note": "Specific EST extension with minimal overlap", + "momentum_note": "Individual submission with limited visibility", + "relevance_note": "Useful for automated certificate lifecycle management", + "doc_status": "" + }, + { + "name": "draft-xu-rtgwg-fare-in-sun", + "title": "Fully Adaptive Routing Ethernet in Scale-Up Networks", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-xu-rtgwg-fare-in-sun/", + "pages": 9, + "group": "individual", + "score": 2.75, + "novelty": 2, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Data formats/interop" + ], + "summary": "Extends WECMP load balancing for AI scale-up networks supporting MoE architectures. Adapts existing scale-out network techniques for high-throughput, low-latency GPU interconnection.", + "novelty_note": "Incremental extension of existing WECMP to different network topology", + "maturity_note": "Brief document with basic concept description, lacks detailed protocol mechanisms", + "overlap_note": "Builds heavily on existing WECMP mechanisms with AI-specific application", + "momentum_note": "Addresses practical AI infrastructure needs but limited technical depth", + "relevance_note": "Very relevant to current AI training infrastructure requirements for MoE models", + "doc_status": "" + }, + { + "name": "draft-zhang-rtgwg-ai-agents-measurement", + "title": "Use Cases and Requirements of Communication Protocol for Measurement Agents on Network Devices", + "date": "2025-11-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhang-rtgwg-ai-agents-measurement/", + "pages": 7, + "group": "individual", + "score": 2.75, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Defines use cases and requirements for communication protocols enabling measurement agents on network devices. Focuses on network monitoring and telemetry collection through AI agents.", + "novelty_note": "Moderate novelty in applying agent paradigm to network measurement", + "maturity_note": "Early stage draft with basic requirements definition", + "overlap_note": "Some overlap with general network telemetry protocols", + "momentum_note": "Limited momentum, appears to be initial exploration", + "relevance_note": "Relevant for network operations but narrow scope", + "doc_status": "" + }, + { + "name": "draft-liu-dmsc-gw-requirements", + "title": "Gateway Requirements for Dynamic Multi-agents Secured Collaboration", + "date": "2026-01-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-dmsc-gw-requirements/", + "pages": 8, + "group": "individual", + "score": 2.75, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "A2A protocols", + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Defines requirements for gateways in multi-agent systems to improve scalability and security. Identifies gaps in current gateway solutions for agent collaboration.", + "novelty_note": "Applies gateway concepts to agent systems with some novel requirements", + "maturity_note": "Requirements document without protocol specification or implementation", + "overlap_note": "Complements DMSC architecture draft, minimal overlap with existing gateway specs", + "momentum_note": "Limited scope may restrict broader community engagement", + "relevance_note": "Moderately relevant for agent system scaling, but more specialized use case", + "doc_status": "" + }, + { + "name": "draft-jurkovikj-collab-tunnel", + "title": "The Collaboration Tunnel Protocol (TCT)", + "date": "2025-11-14", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-jurkovikj-collab-tunnel/", + "pages": 38, + "group": "individual", + "score": 2.75, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "Data formats/interop", + "Human-agent interaction" + ], + "summary": "Defines an HTTP-based protocol for efficient delivery of web content to automated agents using bidirectional URL discovery and content fingerprinting. Focuses on bandwidth reduction while preserving canonical URLs through conditional requests and ETags.", + "novelty_note": "Novel combination of bidirectional discovery and template-invariant fingerprinting, but builds on established HTTP caching concepts", + "maturity_note": "Early stage with limited implementation details and unclear real-world validation", + "overlap_note": "Some overlap with web caching and content delivery protocols but unique agent-focused approach", + "momentum_note": "Single author draft with no clear industry backing or implementation momentum", + "relevance_note": "Addresses legitimate need for efficient agent-web interaction but limited scope compared to broader AI agent challenges", + "doc_status": "" + }, + { + "name": "draft-verma-dmsc-nlip-notes", + "title": "Use of Natural Language for Agent Communication", + "date": "2026-02-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-verma-dmsc-nlip-notes/", + "pages": 8, + "group": "individual", + "score": 2.75, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "A2A protocols", + "Human-agent interaction", + "Data formats/interop" + ], + "summary": "Proposes using generative AI to create flexible communication protocols for agent-to-agent interactions, replacing strict APIs with natural language-based communication. Aims to solve API explosion and interoperability challenges through a uniform AI-mediated interface.", + "novelty_note": "Natural language for agent communication is novel but conceptually straightforward", + "maturity_note": "Very early stage with limited technical detail and no concrete protocol specification", + "overlap_note": "Some overlap with other agent communication drafts but unique NL approach", + "momentum_note": "Single author, short document suggests limited community engagement", + "relevance_note": "Addresses real interoperability problems but approach may be premature", + "doc_status": "" + }, + { + "name": "draft-zhang-rtgwg-llmmoe-multicast", + "title": "Multicast usage in LLM MoE", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhang-rtgwg-llmmoe-multicast/", + "pages": 7, + "group": "individual", + "score": 2.75, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "ML traffic mgmt", + "Model serving/inference" + ], + "summary": "Analyzes multicast use cases in Large Language Model Mixture of Experts architectures, particularly for token dispatching. Attempts to identify networking opportunities in LLM MoE systems.", + "novelty_note": "Novel application of multicast to LLM MoE, but analysis appears preliminary", + "maturity_note": "Very early stage with limited technical depth at 7 pages", + "overlap_note": "Some overlap with ML traffic management concepts but unique multicast focus", + "momentum_note": "Recent draft but narrow scope may limit broader interest", + "relevance_note": "Relevant to networking optimization for LLM inference but very specific use case", + "doc_status": "" + }, + { + "name": "draft-lenders-core-dnr", + "title": "Discovery of Network-designated OSCORE-based Resolvers: Problem Statement", + "date": "2026-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-lenders-core-dnr/", + "pages": 12, + "group": "individual", + "score": 2.75, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Identifies problems in designing DNS SVCB records for OSCORE endpoint discovery. Addresses challenges in discovering CoAP servers and DNS resolvers using OSCORE encryption.", + "novelty_note": "Novel problem identification in DNS service discovery for OSCORE environments", + "maturity_note": "Early-stage problem statement document, only 12 pages without solutions", + "overlap_note": "Unique focus on DNS discovery for OSCORE, limited overlap", + "momentum_note": "Lower momentum as problem statement without proposed solutions", + "relevance_note": "Relevant for CoAP and constrained network service discovery", + "doc_status": "" + }, + { + "name": "draft-bastian-jose-dvs", + "title": "Public Key Derived HMAC for JOSE", + "date": "2025-10-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-bastian-jose-dvs/", + "pages": 11, + "group": "individual", + "score": 2.75, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Defines deriving HMAC keys from public key information in JOSE using Diffie-Hellman key agreement. Enables symmetric MAC authentication from public key operations.", + "novelty_note": "Novel combination of DH-KA with JOSE for MAC derivation", + "maturity_note": "Brief specification needs more detail and security analysis", + "overlap_note": "Unique approach to JOSE authentication enhancement", + "momentum_note": "Limited momentum, niche application area", + "relevance_note": "Relevant for web security and authentication protocols", + "doc_status": "" + }, + { + "name": "draft-liu-rtgwg-mdt-in-high-bdp", + "title": "Use Cases and Requirements of Massive Data Transmission(MDT) in High Bandwidth-delay Product (BDP) Network", + "date": "2025-10-11", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-rtgwg-mdt-in-high-bdp/", + "pages": 11, + "group": "individual", + "score": 2.75, + "novelty": 3, + "maturity": 2, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "ML traffic mgmt", + "Data formats/interop" + ], + "summary": "Proposes a framework for massive data transmission in high bandwidth-delay networks using nighttime idle capacity. Introduces terminal-driven parameter optimization for applications like same-day delivery services.", + "novelty_note": "Novel application of terminal-driven optimization for massive data transfers, though builds on existing traffic engineering concepts", + "maturity_note": "Early stage work with basic architecture outlined but lacks detailed technical specifications", + "overlap_note": "Some overlap with existing traffic engineering and QoS work but focuses on specific MDT use case", + "momentum_note": "Limited adoption signals, appears to be early exploratory work from single organization", + "relevance_note": "Addresses real need for efficient bulk data transfer but may be too application-specific for IETF", + "doc_status": "" + }, + { + "name": "draft-zhao-ccamp-actn-optical-network-agent", + "title": "Integration of Network Management Agent (NMA) into ACTN-Based Optical Network", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhao-ccamp-actn-optical-network-agent/", + "pages": 10, + "group": "individual", + "score": 2.7, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 3, + "categories": [ + "Autonomous netops", + "Other AI/agent" + ], + "summary": "Integrates Network Management Agents into ACTN-based optical networks for autonomous operations. Extends ACTN architecture with AI capabilities for optical network management.", + "novelty_note": "Applies NMA concept to specific optical network domain with ACTN", + "maturity_note": "Early architectural proposal with limited technical depth", + "overlap_note": "Builds heavily on companion NMA draft and existing ACTN work", + "momentum_note": "Optical networks seeking automation but AI integration still emerging", + "relevance_note": "Relevant for optical network operators but narrow domain focus", + "doc_status": "" + }, + { + "name": "draft-gaikwad-llm-benchmarking-terminology", + "title": "Benchmarking Terminology for Large Language Model Serving", + "date": "2026-01-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-gaikwad-llm-benchmarking-terminology/", + "pages": 54, + "group": "individual", + "score": 2.7, + "novelty": 2, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 3, + "categories": [ + "Model serving/inference", + "Data formats/interop" + ], + "summary": "Establishes standardized terminology for LLM serving performance metrics across different system types. Focuses purely on vocabulary definition without prescribing methodologies.", + "novelty_note": "Terminology standardization is incremental but necessary foundational work", + "maturity_note": "Comprehensive terminology coverage but limited technical depth as terminology-only document", + "overlap_note": "Some overlap with general performance measurement standards but LLM-specific", + "momentum_note": "Industry need exists but terminology docs typically have lower adoption momentum", + "relevance_note": "Useful for industry standardization but indirect impact on technical deployment", + "doc_status": "" + }, + { + "name": "draft-zhul-dhc-bnc-up-specific-suboption", + "title": "Broadband Network UP-Specific Information Suboption for the DHCP Relay Agent Option", + "date": "2026-01-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhul-dhc-bnc-up-specific-suboption/", + "pages": 6, + "group": "individual", + "score": 2.7, + "novelty": 2, + "maturity": 4, + "overlap": 1, + "momentum": 2, + "relevance": 2, + "categories": [ + "Other AI/agent" + ], + "summary": "Defines a DHCP relay agent suboption for broadband networks to include UP-specific information. Ensures subscribers in the same SGRP under the same UP get IP addresses from the same address space.", + "novelty_note": "Incremental extension to existing DHCP relay mechanisms for specific broadband use case", + "maturity_note": "Well-defined technical specification with clear implementation guidance", + "overlap_note": "Unique DHCP extension, no significant overlap with other drafts", + "momentum_note": "Narrow telecom-specific use case with limited broader appeal", + "relevance_note": "Relevant to broadband operators but limited connection to AI/agent themes", + "doc_status": "" + }, + { + "name": "draft-zeng-mcp-network-mgmt", + "title": "Model Context Protocol (MCP) Extensions for Network Equipment Management", + "date": "2025-10-16", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zeng-mcp-network-mgmt/", + "pages": 7, + "group": "individual", + "score": 2.7, + "novelty": 3, + "maturity": 2, + "overlap": 5, + "momentum": 2, + "relevance": 4, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Specifies MCP extensions for network equipment management allowing routers/switches as MCP servers. Defines capability tokens, tools, and error codes with backward compatibility.", + "novelty_note": "Similar approach to network MCP extensions as other drafts in this area", + "maturity_note": "Lower maturity with brief specification and limited technical detail", + "overlap_note": "Extremely heavy overlap with draft-zw-rtgwg-mcp-network-mgmt, nearly identical", + "momentum_note": "Lower momentum due to brevity and potential duplication with other efforts", + "relevance_note": "Highly relevant for AI-driven network management despite overlap issues", + "doc_status": "" + }, + { + "name": "draft-gont-dhcwg-dhcpv6-iids", + "title": "A Method for Generating Semantically Opaque IPv6 Interface Identifiers (IIDs) with Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", + "date": "2025-08-14", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-gont-dhcwg-dhcpv6-iids/", + "pages": 11, + "group": "individual", + "score": 2.65, + "novelty": 2, + "maturity": 4, + "overlap": 3, + "momentum": 3, + "relevance": 2, + "categories": [ + "Agent identity/auth", + "Data formats/interop" + ], + "summary": "Describes method for generating semantically opaque IPv6 interface identifiers in DHCPv6. Adapts RFC 7217 SLAAC method for DHCPv6 server-side address assignment.", + "novelty_note": "Incremental extension of existing RFC 7217 method to DHCPv6 context", + "maturity_note": "Well-developed specification building on proven RFC 7217 foundation", + "overlap_note": "Directly builds upon RFC 7217 and existing DHCPv6 specifications", + "momentum_note": "Established author with IETF track record, addresses known privacy issue", + "relevance_note": "Traditional networking protocol with minimal direct AI/agent relevance", + "doc_status": "" + }, + { + "name": "draft-song-rtgwg-din-usecases-requirements", + "title": "Distributed Inference Network (DIN) Problem Statement, Use Cases, and Requirements", + "date": "2026-02-28", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-song-rtgwg-din-usecases-requirements/", + "pages": 10, + "group": "individual", + "score": 2.65, + "novelty": 2, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "Model serving/inference", + "ML traffic mgmt", + "Autonomous netops" + ], + "summary": "Defines problem statement and requirements for Distributed Inference Networks addressing scalability and latency challenges. Focuses on edge-cloud collaboration for AI inference services.", + "novelty_note": "Problem statement document rather than novel technical solution", + "maturity_note": "Early stage requirements document without concrete solutions", + "overlap_note": "Substantial overlap with other distributed inference problem statements", + "momentum_note": "Good problem articulation but needs follow-up solution drafts", + "relevance_note": "Highly relevant for distributed AI infrastructure planning", + "doc_status": "" + }, + { + "name": "draft-xiong-rtgwg-requirements-hp-wan", + "title": "Requirements for High-performance Wide Area Networks", + "date": "2025-01-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-xiong-rtgwg-requirements-hp-wan/", + "pages": 9, + "group": "individual", + "score": 2.65, + "novelty": 2, + "maturity": 2, + "overlap": 4, + "momentum": 3, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Data formats/interop" + ], + "summary": "Defines requirements for high-performance wide area networks to support massive data transmission between data centers. Focuses on ensuring data integrity and stable transmission for big data and intelligent computing applications.", + "novelty_note": "Basic requirements document for high-performance WAN, covers well-known needs", + "maturity_note": "Early stage requirements draft, lacks detailed technical specifications", + "overlap_note": "Significant overlap with existing WAN optimization and data center interconnect work", + "momentum_note": "Addresses current AI/big data needs but competes with established solutions", + "relevance_note": "Highly relevant to AI workloads requiring massive data movement between data centers", + "doc_status": "" + }, + { + "name": "draft-wang-ppm-ecdh-psi", + "title": "PSI based on ECDH", + "date": "2025-08-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-wang-ppm-ecdh-psi/", + "pages": 31, + "group": "individual", + "score": 2.65, + "novelty": 2, + "maturity": 3, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "Data formats/interop" + ], + "summary": "This draft specifies ECDH-based Private Set Intersection (PSI) for two parties using elliptic curve cryptography and the Meadows protocol. It enables participants to find common records while preserving privacy of non-intersecting elements.", + "novelty_note": "Applies well-known ECDH techniques to PSI with standard elliptic curves - incremental but solid engineering", + "maturity_note": "Reasonable technical depth for IETF draft with concrete protocol specification, though some implementation details may need refinement", + "overlap_note": "PSI is established research area but ECDH-specific variant for IETF standardization has limited direct overlap", + "momentum_note": "Privacy-preserving computation gaining interest but unclear if this specific approach has strong industry backing", + "relevance_note": "Privacy-preserving set intersection has legitimate use cases in federated learning and data sharing scenarios", + "doc_status": "" + }, + { + "name": "draft-dunbar-onions-ac-te-applicability", + "title": "Applying Attachmet Circuit and Traffic Engineering YANG Data Model to Edge AI Use Case", + "date": "2025-10-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-dunbar-onions-ac-te-applicability/", + "pages": 25, + "group": "individual", + "score": 2.65, + "novelty": 2, + "maturity": 3, + "overlap": 2, + "momentum": 2, + "relevance": 3, + "categories": [ + "ML traffic mgmt", + "Model serving/inference", + "Autonomous netops" + ], + "summary": "Explores applying existing YANG data models for attachment circuits and traffic engineering to edge AI placement. Evaluates model applicability for dynamic AI inference location selection.", + "novelty_note": "Application of existing models rather than new protocol development", + "maturity_note": "Practical exercise with concrete use case but limited to existing tools", + "overlap_note": "Unique application of YANG models to AI edge placement", + "momentum_note": "Limited scope as applicability study rather than new solution", + "relevance_note": "Moderately relevant for edge AI deployment optimization", + "doc_status": "" + }, + { + "name": "draft-sarischo-6gip-aiagent-requirements", + "title": "AI Agents for 6G Requirements and Implementation Approaches", + "date": "2025-09-11", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-sarischo-6gip-aiagent-requirements/", + "pages": 10, + "group": "individual", + "score": 2.65, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Agent discovery/reg", + "Autonomous netops", + "Policy/governance" + ], + "summary": "Defines requirements for AI/ML agents in 6G mobile networks, covering different agent types and their specific needs. Describes implementation approaches including API discovery and DNS-based agent discovery mechanisms.", + "novelty_note": "Applies existing AI agent concepts to 6G context with some novel DNS discovery approaches", + "maturity_note": "Early stage draft with basic requirements enumeration, lacks detailed technical specifications", + "overlap_note": "Overlaps with general AI agent frameworks but focuses specifically on 6G domain", + "momentum_note": "Limited momentum, niche 6G focus may restrict broader IETF interest", + "relevance_note": "Relevant for telecom industry moving toward 6G, moderate relevance for general networking", + "doc_status": "" + }, + { + "name": "draft-mpsb-agntcy-messaging", + "title": "An Overview of Messaging Systems and Their Applicability to Agentic AI", + "date": "2026-02-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mpsb-agntcy-messaging/", + "pages": 20, + "group": "individual", + "score": 2.65, + "novelty": 3, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "A2A protocols", + "Data formats/interop", + "Agent identity/auth" + ], + "summary": "Analyzes messaging protocols for agentic AI systems, comparing AMQP, MQTT, NATS, Kafka and others across security and performance dimensions. Introduces AGNTCY SLIM as a purpose-built solution with MLS integration for quantum-safe agent communication.", + "novelty_note": "Useful comparative analysis but AGNTCY SLIM appears to be proprietary solution being promoted", + "maturity_note": "More of a survey document than a protocol specification; lacks detailed technical specifications", + "overlap_note": "Overlaps with existing messaging protocol work and MLS standardization efforts", + "momentum_note": "Unclear industry support for AGNTCY SLIM; appears vendor-driven", + "relevance_note": "Addresses real need for agent messaging but focuses heavily on promoting specific proprietary solution", + "doc_status": "" + }, + { + "name": "draft-yu-dmsc-ai-agent-use-cases-in-6g", + "title": "AI Agent Use Cases and Requirements in 6G Network", + "date": "2026-01-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yu-dmsc-ai-agent-use-cases-in-6g/", + "pages": 10, + "group": "individual", + "score": 2.6, + "novelty": 2, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 3, + "categories": [ + "Autonomous netops", + "ML traffic mgmt", + "Agent discovery/reg" + ], + "summary": "Introduces AI agent use cases in 6G networks based on 3GPP SA1 technical reports. Elaborates on operator requirements for AI agent integration.", + "novelty_note": "Largely references existing 3GPP work, limited novel contribution beyond compilation", + "maturity_note": "Decent compilation of use cases but heavily dependent on external specifications", + "overlap_note": "Significant overlap with 3GPP work and general 6G AI discussions", + "momentum_note": "Benefits from 3GPP backing but unclear IETF-specific value proposition", + "relevance_note": "Relevant for 6G context but limited broader applicability beyond telecom", + "doc_status": "" + }, + { + "name": "draft-irtf-nmrg-ai-deploy", + "title": "Considerations of network/system for AI services", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-irtf-nmrg-ai-deploy/", + "pages": 26, + "group": "individual", + "score": 2.6, + "novelty": 2, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 3, + "categories": [ + "Model serving/inference", + "ML traffic mgmt" + ], + "summary": "Outlines network and system configuration for distributed AI inference services across edge and cloud environments. Covers deployment considerations and use cases for network-based AI services.", + "novelty_note": "Incremental improvement over earlier version but still lacks specific technical innovations", + "maturity_note": "Better written than earlier version, under IRTF umbrella suggests more formal review", + "overlap_note": "Very similar to draft-hong-nmrg-ai-deploy, appears to be refined version", + "momentum_note": "IRTF adoption suggests institutional support and continued development", + "relevance_note": "Relevant distributed AI deployment guidance, though at high architectural level", + "doc_status": "" + }, + { + "name": "draft-xiong-rtgwg-use-cases-hp-wan", + "title": "Use Cases for High-performance Wide Area Network", + "date": "2025-01-03", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-xiong-rtgwg-use-cases-hp-wan/", + "pages": 9, + "group": "individual", + "score": 2.6, + "novelty": 2, + "maturity": 3, + "overlap": 4, + "momentum": 3, + "relevance": 3, + "categories": [ + "Data formats/interop", + "ML traffic mgmt" + ], + "summary": "Describes use cases for High-performance Wide Area Networks driven by big data and intelligent computing demands. Focuses on applications requiring massive data transmission across WAN and MAN.", + "novelty_note": "Low novelty - high-performance networking use cases are well-documented", + "maturity_note": "Moderate maturity - use case document is appropriately scoped but could be more detailed", + "overlap_note": "High overlap - many existing high-performance networking specifications and use cases", + "momentum_note": "Moderate momentum - big data networking remains important but not revolutionary", + "relevance_note": "Relevant for data center interconnect and cloud providers, moderate broader applicability", + "doc_status": "" + }, + { + "name": "draft-nsiangani-authenticatedsecuredlayer", + "title": "ASL Authenticated Secure Layer Protocol", + "date": "2026-02-11", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-nsiangani-authenticatedsecuredlayer/", + "pages": 63, + "group": "individual", + "score": 2.6, + "novelty": 5, + "maturity": 1, + "overlap": 1, + "momentum": 1, + "relevance": 1, + "categories": [ + "Other AI/agent" + ], + "summary": "Proposes ASL protocol using novel phi-ns-x arithmetic primitive instead of traditional crypto. Claims security through non-linear modular arithmetic and combinatorial complexity.", + "novelty_note": "Completely novel cryptographic approach abandoning all established primitives", + "maturity_note": "Unproven cryptographic claims without peer review or security analysis", + "overlap_note": "Entirely different approach from any existing security protocols", + "momentum_note": "Individual submission with no working group support or adoption signals", + "relevance_note": "Very low relevance due to unvetted crypto and lack of security foundation", + "doc_status": "" + }, + { + "name": "draft-yang-srv6ops-intelligent-routing", + "title": "Intelligent Routing Method of SR Policy", + "date": "2025-06-30", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yang-srv6ops-intelligent-routing/", + "pages": 12, + "group": "individual", + "score": 2.6, + "novelty": 2, + "maturity": 3, + "overlap": 5, + "momentum": 2, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Autonomous netops" + ], + "summary": "Nearly identical to the SPRING SR Policy draft but focused on SRv6 operations. Describes intelligent routing method for SR Policy based on network quality metrics.", + "novelty_note": "Appears to be duplicate content of spring draft with minor SRv6 focus", + "maturity_note": "Similar technical maturity to spring version, builds on established SR foundations", + "overlap_note": "Heavy overlap with the corresponding SPRING draft and existing SRv6 work", + "momentum_note": "Potential duplication issues may harm adoption prospects", + "relevance_note": "SRv6 operations are highly relevant but duplication reduces value", + "doc_status": "" + }, + { + "name": "draft-meyerzuselha-oauth-web-message-response-mode", + "title": "OAuth 2.0 Web Message Response Mode for Popup- and Iframe-based Authorization Flows", + "date": "2025-11-05", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-meyerzuselha-oauth-web-message-response-mode/", + "pages": 16, + "group": "individual", + "score": 2.55, + "novelty": 2, + "maturity": 4, + "overlap": 4, + "momentum": 3, + "relevance": 2, + "categories": [ + "Agent identity/auth", + "Human-agent interaction" + ], + "summary": "Extends OAuth 2.0 with a web message response mode using postMessage API for popup and iframe-based authorization flows. Targets browser-based applications needing secondary window authorization.", + "novelty_note": "Incremental extension to existing OAuth 2.0 framework using well-established postMessage patterns", + "maturity_note": "Well-defined specification building on mature OAuth 2.0 foundation with clear implementation path", + "overlap_note": "Significant overlap with existing OAuth 2.0 response modes and browser-based authentication flows", + "momentum_note": "Addresses practical OAuth implementation need but limited to specific use case", + "relevance_note": "Relevant to AI agents requiring web-based authentication but not AI-specific innovation", + "doc_status": "" + }, + { + "name": "draft-romm-aipref-contentsignals", + "title": "Vocabulary For Expressing Content Signals", + "date": "2025-10-01", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-romm-aipref-contentsignals/", + "pages": 5, + "group": "individual", + "score": 2.55, + "novelty": 2, + "maturity": 2, + "overlap": 5, + "momentum": 3, + "relevance": 4, + "categories": [ + "Policy/governance", + "Data formats/interop" + ], + "summary": "Proposes three categories for expressing preferences about digital asset use by automated processing systems. Designed to nest within the broader AIPREF-VOCAB framework for automated processing preferences.", + "novelty_note": "Incremental extension to existing aipref work with limited novel contribution", + "maturity_note": "Very brief specification lacking detail and concrete implementation guidance", + "overlap_note": "Heavy overlap with draft-vaughan-aipref-vocab, appears to be complementary work", + "momentum_note": "Part of coordinated effort on content preferences but limited individual impact", + "relevance_note": "Relevant to AI training consent but adds limited value over related drafts", + "doc_status": "" + }, + { + "name": "draft-zl-agents-networking-architecture", + "title": "Agents Networking Architecture for Enterprise and Broadband", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zl-agents-networking-architecture/", + "pages": 13, + "group": "individual", + "score": 2.55, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Data formats/interop" + ], + "summary": "Defines core components and interactions for agent networking architecture in enterprise and broadband environments. Provides foundational framework for agent-based networking systems.", + "novelty_note": "Basic architectural framework, but limited novelty in core concepts", + "maturity_note": "Early draft with brief content, lacks detailed specifications", + "overlap_note": "Overlaps significantly with other agent networking architecture drafts", + "momentum_note": "Limited momentum indicated by brief content and basic scope", + "relevance_note": "Relevant to growing agent networking field but lacks depth", + "doc_status": "" + }, + { + "name": "draft-men-rtgwg-agent-networking-digibank-scenario", + "title": "Agents Networking Scenarios in Enterprise and Broadband Networks", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-men-rtgwg-agent-networking-digibank-scenario/", + "pages": 10, + "group": "individual", + "score": 2.55, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "A2A protocols", + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Describes digital banking scenarios evolving toward agentic service interconnection and proposes an agent networking architecture centered on agent gateways. Focuses on enterprise and broadband network contexts.", + "novelty_note": "Specific application to digital banking is somewhat novel but agent gateway concept is not unique", + "maturity_note": "Scenario-focused with limited technical depth on implementation", + "overlap_note": "Significant overlap with the other digital banking draft and agent gateway concepts", + "momentum_note": "Banking-specific use cases may have limited broader appeal in IETF context", + "relevance_note": "Relevant to understanding agent networking applications but narrow domain focus", + "doc_status": "" + }, + { + "name": "draft-zhang-aiproto-svcb-mapping-for-agents", + "title": "Service Binding Mapping for Agents", + "date": "2026-01-05", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zhang-aiproto-svcb-mapping-for-agents/", + "pages": 6, + "group": "individual", + "score": 2.55, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Defines new DNS resource record type AGENT as SVCB-compatible RR for agent service resolution. Addresses limitations of current DNS for intelligent agent protocols.", + "novelty_note": "New DNS record type specifically for agent services", + "maturity_note": "Short 6-page draft with basic mapping specifications", + "overlap_note": "Significant overlap with draft-cui-dns-native-agent-naming-resolution", + "momentum_note": "Competing approach to DNS-based agent resolution may limit adoption", + "relevance_note": "Relevant but potentially redundant with other DNS-based agent work", + "doc_status": "" + }, + { + "name": "draft-wolfe-faf-format", + "title": "FAF: Foundational AI-context Format for Development Tools", + "date": "2026-01-21", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-wolfe-faf-format/", + "pages": 10, + "group": "individual", + "score": 2.55, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "Data formats/interop", + "Human-agent interaction" + ], + "summary": "YAML-based format for sharing software project context with AI development tools. Addresses context fragmentation in multi-agent development environments.", + "novelty_note": "Specific application to AI development tools is novel though format approach is conventional", + "maturity_note": "Brief specification lacks detailed schema and implementation guidance", + "overlap_note": "Similar to existing project metadata formats but AI-specific features", + "momentum_note": "IANA registration shows some traction but limited technical depth may hinder adoption", + "relevance_note": "Relevant to developer tooling but narrow use case limits broader impact", + "doc_status": "" + }, + { + "name": "draft-templin-manet-inet-omni", + "title": "MANET Internetworking with AERO/OMNI", + "date": "2026-02-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-templin-manet-inet-omni/", + "pages": 13, + "group": "individual", + "score": 2.55, + "novelty": 2, + "maturity": 3, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Autonomous netops", + "A2A protocols" + ], + "summary": "Presents framework for connecting mobile ad-hoc networks to the Internet using AERO and OMNI technologies. Enables isolated mobile networks to interface with fixed infrastructure.", + "novelty_note": "Incremental work building on existing AERO/OMNI technologies for MANET connectivity", + "maturity_note": "Builds on established technologies but specific integration approach needs development", + "overlap_note": "Some overlap with existing MANET and mobile networking solutions", + "momentum_note": "Limited momentum as MANET interest has declined in recent years", + "relevance_note": "Relevant for autonomous mobile systems but traditional networking focus", + "doc_status": "" + }, + { + "name": "draft-zm-rtgwg-mcp-network-measurement", + "title": "MCP-based Network Measurement Framework: Using Model Context Protocol for Intelligent Network Measurement", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zm-rtgwg-mcp-network-measurement/", + "pages": 10, + "group": "individual", + "score": 2.55, + "novelty": 3, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "Autonomous netops", + "A2A protocols", + "Human-agent interaction" + ], + "summary": "Proposes using Model Context Protocol to enable AI-driven network measurement operations. Network devices act as MCP servers while controllers with LLM capability serve as clients for natural language-driven monitoring.", + "novelty_note": "Novel application of MCP to network measurement, but builds on established concepts", + "maturity_note": "Early stage work, 10 pages suggests preliminary development", + "overlap_note": "High overlap with other MCP network management drafts in this set", + "momentum_note": "Limited momentum indicators, newer draft with narrow focus", + "relevance_note": "Relevant to autonomous network operations but specific to measurement domain", + "doc_status": "" + }, + { + "name": "draft-ai-traffic", + "title": "Handling inter-DC/Edge AI-related network traffic: Problem statement", + "date": "2024-10-07", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ai-traffic/", + "pages": 38, + "group": "individual", + "score": 2.55, + "novelty": 3, + "maturity": 2, + "overlap": 5, + "momentum": 1, + "relevance": 4, + "categories": [ + "ML traffic mgmt", + "Model serving/inference" + ], + "summary": "Problem statement for handling AI/LLM traffic between datacenters and edge locations. Focuses on understanding network characteristics of distributed AI training and inference workloads.", + "novelty_note": "Good identification of federated AI networking challenges, though problem statement only", + "maturity_note": "Problem statement level, lacks concrete solutions or protocols", + "overlap_note": "Identical content to draft-aft-ai-traffic, appears to be duplicate or renamed draft", + "momentum_note": "Old version from 2024, likely superseded by the aft version", + "relevance_note": "Highly relevant to current federated AI trends and inter-DC traffic management needs", + "doc_status": "" + }, + { + "name": "draft-dunbar-onsen-ac-pe2pe-ucmp-applicability", + "title": "Applying Attachmet Circuit and PE2PE YANG Data Model to dynamic policies Use Case", + "date": "2026-02-23", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-dunbar-onsen-ac-pe2pe-ucmp-applicability/", + "pages": 21, + "group": "individual", + "score": 2.55, + "novelty": 2, + "maturity": 3, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "ML traffic mgmt", + "Model serving/inference" + ], + "summary": "Applies existing IETF YANG models to dynamic UCMP policy enforcement for AI inference traffic between distributed edge data centers. Identifies gaps in current models for cloud-initiated, time-bounded network policy coordination.", + "novelty_note": "Limited novelty - primarily applies existing YANG models to new use case", + "maturity_note": "Well-structured analysis but relies heavily on existing specifications", + "overlap_note": "Moderate overlap with general YANG model applicability studies", + "momentum_note": "Niche application area with limited immediate adoption potential", + "relevance_note": "Relevant for AI infrastructure networking but very specialized scope", + "doc_status": "" + }, + { + "name": "draft-yu-ai-agent-use-cases-in-6g", + "title": "AI Agent Use Cases and Requirements in 6G Network", + "date": "2026-01-05", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-yu-ai-agent-use-cases-in-6g/", + "pages": 15, + "group": "individual", + "score": 2.5, + "novelty": 2, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 4, + "categories": [ + "A2A protocols", + "Agent identity/auth", + "Agent discovery/reg" + ], + "summary": "This draft catalogs use cases for AI agents in 6G networks, referencing 3GPP work to define how network-embedded AI agents can provide intent-based services through collaboration between device, network, and application agents. It outlines potential requirements for supporting AI agent operations in mobile networks from an operator perspective.", + "novelty_note": "Primarily compiles existing 3GPP use cases rather than proposing new technical solutions", + "maturity_note": "Early stage work that catalogues requirements without detailed technical specifications or protocols", + "overlap_note": "Heavily references 3GPP SA1 R20 Study TR 22.870 and duplicates much content from those standardization efforts", + "momentum_note": "China Telecom authors but appears to be individual submission without working group adoption, revision -02 suggests limited community engagement", + "relevance_note": "Directly addresses AI agent networking in mobile systems, covering key aspects like identity, discovery, and collaboration requirements", + "doc_status": "" + }, + { + "name": "draft-willman-rtgwg-conduit-tunnels", + "title": "Underlay for IPsec Transport", + "date": "2026-02-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-willman-rtgwg-conduit-tunnels/", + "pages": 38, + "group": "individual", + "score": 2.5, + "novelty": 3, + "maturity": 3, + "overlap": 4, + "momentum": 2, + "relevance": 2, + "categories": [ + "Autonomous netops", + "Policy/governance" + ], + "summary": "Specifies CONDUIT protocol for managing IPsec tunnel fabrics with automated lifecycle management and SRv6 integration. Focuses on tactical networks with strict cryptographic requirements.", + "novelty_note": "Combines existing technologies (IPsec, SRv6) in novel orchestration framework", + "maturity_note": "Detailed specification with clear architecture but needs implementation validation", + "overlap_note": "Significant overlap with existing tunnel management and SRv6 specifications", + "momentum_note": "Traditional networking focus with limited AI/agent community engagement", + "relevance_note": "Primarily traditional networking with potential but indirect AI/agent relevance", + "doc_status": "" + }, + { + "name": "draft-bernardos-green-isac-uc", + "title": "Integrated Sensing and Communications (ISAC) use case for GREEN", + "date": "2025-08-31", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-bernardos-green-isac-uc/", + "pages": 5, + "group": "individual", + "score": 2.5, + "novelty": 2, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 3, + "categories": [ + "Autonomous netops", + "Other AI/agent" + ], + "summary": "Presents ISAC use case for GREEN Working Group discussions on joint sensing and communication optimization. Targets applications in autonomous systems, smart cities, and industrial automation.", + "novelty_note": "Use case presentation of known ISAC concepts, limited technical novelty", + "maturity_note": "Template-based use case document without technical specifications or solutions", + "overlap_note": "Moderate overlap with existing ISAC research and GREEN use cases", + "momentum_note": "ISAC is emerging area and GREEN WG is active, but early stage", + "relevance_note": "Relevant for autonomous systems requiring sensing capabilities but lacks AI/agent focus", + "doc_status": "" + }, + { + "name": "draft-hu-neotec-usecases-notc", + "title": "Use cases in network operations in telco cloud", + "date": "2026-01-07", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-hu-neotec-usecases-notc/", + "pages": 11, + "group": "individual", + "score": 2.5, + "novelty": 2, + "maturity": 2, + "overlap": 3, + "momentum": 3, + "relevance": 3, + "categories": [ + "Autonomous netops", + "Model serving/inference", + "Other AI/agent" + ], + "summary": "Presents network operations use cases for telco cloud orchestration including AI-based video recognition and dynamic bandwidth transport. Demonstrates elastic provisioning, failover mechanisms, and cross-domain resource scheduling for telecom cloud environments.", + "novelty_note": "Applies existing concepts to telco cloud scenarios rather than introducing new technical approaches", + "maturity_note": "Use case descriptions lack technical depth and standardization specifics", + "overlap_note": "Overlaps with general cloud orchestration and network slicing work", + "momentum_note": "Relevant to telco AI adoption but limited technical innovation", + "relevance_note": "Moderately relevant for telco AI deployments but lacks technical depth", + "doc_status": "" + }, + { + "name": "draft-mzsg-rtgwg-agent-cross-device-comm-framework", + "title": "Cross-device Communication Framework for AI Agents in Network Devices", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-mzsg-rtgwg-agent-cross-device-comm-framework/", + "pages": 8, + "group": "individual", + "score": 2.45, + "novelty": 3, + "maturity": 1, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "A2A protocols", + "Autonomous netops", + "Data formats/interop" + ], + "summary": "Proposes communication framework for AI agents deployed across different network devices. Focuses on collaboration requirements for tasks like network measurement and troubleshooting.", + "novelty_note": "Addresses practical need for agent coordination in network devices", + "maturity_note": "Very early stage with minimal technical detail or protocol specification", + "overlap_note": "Some overlap with general agent communication frameworks", + "momentum_note": "Network device AI deployment still in early phases", + "relevance_note": "Relevant for network operations but limited scope and early development", + "doc_status": "" + }, + { + "name": "draft-ietf-pim-zeroconf-mcast-addr-alloc-ps", + "title": "Zeroconf Multicast Address Allocation Problem Statement and Requirements", + "date": "2026-02-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-pim-zeroconf-mcast-addr-alloc-ps/", + "pages": 11, + "group": "individual", + "score": 2.45, + "novelty": 2, + "maturity": 3, + "overlap": 3, + "momentum": 3, + "relevance": 2, + "categories": [ + "Agent discovery/reg", + "Data formats/interop" + ], + "summary": "Problem statement for multicast address allocation in zero-configuration environments. Identifies challenges and requirements for decentralized multicast group address assignment without manual configuration.", + "novelty_note": "Problem statement for known issues, not introducing new concepts but formalizing requirements", + "maturity_note": "Solid problem analysis but only 11 pages, needs companion solution drafts for full impact", + "overlap_note": "Overlaps with existing zeroconf and multicast allocation work but focuses on specific intersection", + "momentum_note": "IETF working group effort but problem statements typically have lower implementation urgency", + "relevance_note": "Addresses niche use case, limited relevance to broader AI/agent networking trends", + "doc_status": "" + }, + { + "name": "draft-dunbar-onsen-ac-te-applicability", + "title": "Applying Attachmet Circuit and Traffic Engineering YANG Data Model to Edge AI Use Case", + "date": "2026-02-23", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-dunbar-onsen-ac-te-applicability/", + "pages": 25, + "group": "individual", + "score": 2.45, + "novelty": 2, + "maturity": 3, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "ML traffic mgmt", + "Model serving/inference" + ], + "summary": "Explores application of IETF AC and TE YANG models for dynamic AI model placement at edge cloud sites. Focuses on network performance-based optimization for real-time AI inference.", + "novelty_note": "Similar approach to companion draft - applying existing models to AI use cases", + "maturity_note": "Comprehensive analysis but primarily an applicability study", + "overlap_note": "Significant overlap with companion UCMP draft and general TE work", + "momentum_note": "Limited broader applicability beyond specific edge AI scenarios", + "relevance_note": "Addresses relevant edge AI deployment challenges but narrow focus", + "doc_status": "" + }, + { + "name": "draft-madhavan-aipref-displaybasedpref", + "title": "A Vocabulary for Controlling Usage of Content Collected by Search and AI Crawlers", + "date": "2025-09-22", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-madhavan-aipref-displaybasedpref/", + "pages": 10, + "group": "individual", + "score": 2.45, + "novelty": 2, + "maturity": 3, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "Policy/governance", + "ML traffic mgmt", + "Data formats/interop" + ], + "summary": "Proposes vocabulary for controlling content usage by search and AI crawlers. Creates structured declarations about restrictions and permissions for crawler-retrieved content.", + "novelty_note": "Similar concept to IETF vocab draft but different approach and scope", + "maturity_note": "Individual submission with reasonable development but less institutional backing", + "overlap_note": "Significant overlap with official IETF vocab draft in purpose and scope", + "momentum_note": "Individual draft competing with established working group effort", + "relevance_note": "Relevant topic but potentially superseded by working group efforts", + "doc_status": "" + }, + { + "name": "draft-zl-agents-networking-framework", + "title": "Agents Networking Framework for Enterprise and Broadband", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zl-agents-networking-framework/", + "pages": 14, + "group": "individual", + "score": 2.4, + "novelty": 2, + "maturity": 1, + "overlap": 3, + "momentum": 2, + "relevance": 4, + "categories": [ + "Agent discovery/reg", + "Agent identity/auth", + "A2A protocols" + ], + "summary": "This draft proposes a networking framework for AI agents in enterprise and broadband environments, defining four core components: Agent Certificate Authority (ACA), Agent Registration Server (ARS), AI Agents, and Agent Gateway (AGw). It aims to enable secure agent-to-agent communication, identity management, and collaborative task execution across domains.", + "novelty_note": "Framework combines existing concepts (PKI, service discovery, gateways) applied to AI agents without significant technical innovation", + "maturity_note": "Very early draft with incomplete content (text cuts off mid-sentence), lacks technical depth, protocol specifications, and implementation details", + "overlap_note": "Overlaps with existing service discovery protocols, PKI frameworks, and gateway architectures, though specific application to AI agents is less common", + "momentum_note": "Multiple Huawei authors but no evidence of working group adoption, first revision (-00), and working group (rtgwg) focus may not align well with AI agent networking", + "relevance_note": "Directly addresses core challenges in AI agent networking including identity, discovery, and secure inter-agent communication", + "doc_status": "" + }, + { + "name": "draft-ietf-mailmaint-pacc", + "title": "Automatic Configuration of Email, Calendar, and Contact Server Settings", + "date": "2026-02-27", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-ietf-mailmaint-pacc/", + "pages": 38, + "group": "individual", + "score": 2.4, + "novelty": 2, + "maturity": 4, + "overlap": 4, + "momentum": 2, + "relevance": 2, + "categories": [ + "Data formats/interop" + ], + "summary": "Specifies automatic configuration mechanism for email, calendar, and contact applications. Service providers publish standardized configuration that user agents retrieve for simplified setup.", + "novelty_note": "Incremental improvement to existing email configuration approaches", + "maturity_note": "Mature specification with detailed protocol definition and good structure", + "overlap_note": "Significant overlap with existing autoconfiguration mechanisms like Thunderbird's", + "momentum_note": "Limited momentum as email configuration is not a high-priority problem", + "relevance_note": "Low relevance to AI/agent systems, traditional email automation", + "doc_status": "" + }, + { + "name": "draft-tiloca-lake-exporter-output-length", + "title": "In-band Agreement of Output Lengths for the EDHOC_Exporter Interface of Ephemeral Diffie-Hellman Over COSE (EDHOC)", + "date": "2026-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-tiloca-lake-exporter-output-length/", + "pages": 10, + "group": "individual", + "score": 2.4, + "novelty": 2, + "maturity": 3, + "overlap": 2, + "momentum": 2, + "relevance": 2, + "categories": [ + "Agent identity/auth" + ], + "summary": "This draft defines a mechanism for EDHOC peers to agree in-band on output lengths for the EDHOC_Exporter interface using External Authorization Data items. The approach allows negotiation of key derivation output sizes during the EDHOC handshake process.", + "novelty_note": "Incremental extension to existing EDHOC protocol using established EAD mechanisms", + "maturity_note": "Builds on mature EDHOC foundation but adds new negotiation complexity", + "overlap_note": "Specific to EDHOC exporter interface with limited overlap to other key agreement protocols", + "momentum_note": "Niche enhancement for EDHOC deployments with limited broader appeal", + "relevance_note": "Useful for EDHOC implementations but addresses narrow technical requirement", + "doc_status": "" + }, + { + "name": "draft-liu-rtgwg-llmsync-multicast", + "title": "Multicast Use Cases for Large Language Model Synchronization", + "date": "2026-02-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-rtgwg-llmsync-multicast/", + "pages": 6, + "group": "individual", + "score": 2.35, + "novelty": 2, + "maturity": 1, + "overlap": 1, + "momentum": 2, + "relevance": 3, + "categories": [ + "ML traffic mgmt", + "Model serving/inference" + ], + "summary": "Discusses multicast use cases for Large Language Model synchronization in inference cloud services. Very brief draft outlining potential applications for LLM deployment scenarios.", + "novelty_note": "Early exploration of multicast applications for LLM infrastructure", + "maturity_note": "Very early stage with minimal technical detail or concrete proposals", + "overlap_note": "Unique focus on LLM-specific multicast applications", + "momentum_note": "Limited momentum due to lack of technical depth and concrete solutions", + "relevance_note": "Relevant to ML infrastructure but needs substantial development to be actionable", + "doc_status": "" + }, + { + "name": "draft-zl-agents-networking-scenarios", + "title": "Agents Networking Scenarios in Enterprise and Broadband Networks", + "date": "2025-10-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-zl-agents-networking-scenarios/", + "pages": 8, + "group": "individual", + "score": 2.35, + "novelty": 2, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Autonomous netops", + "Human-agent interaction", + "Other AI/agent" + ], + "summary": "Describes specific agent networking scenarios for enterprise and home broadband networks. Focuses on practical use cases distinct from 6G and general Internet scenarios.", + "novelty_note": "Limited novelty, mainly scenario descriptions based on assumptions", + "maturity_note": "Brief 8-page document with basic scenario coverage", + "overlap_note": "Scenarios overlap with other agent networking use case discussions", + "momentum_note": "Low momentum with brief content and assumption-based scenarios", + "relevance_note": "Moderately relevant for understanding practical deployment contexts", + "doc_status": "" + }, + { + "name": "draft-pang-agents-networking-scenarios", + "title": "Agents Networking Scenarios in Enterprise and Broadband Networks", + "date": "2025-11-06", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-pang-agents-networking-scenarios/", + "pages": 9, + "group": "individual", + "score": 2.35, + "novelty": 2, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Autonomous netops", + "Other AI/agent" + ], + "summary": "Describes networking scenarios for agents in enterprise and broadband networks, distinguishing them from mobile and Internet scenarios. Based on reasonable assumptions as agentic services are still emerging.", + "novelty_note": "Basic scenario enumeration without novel technical contributions", + "maturity_note": "Early stage draft with assumptions rather than concrete solutions", + "overlap_note": "Overlaps with general agent networking concepts but focuses on specific environments", + "momentum_note": "Limited technical depth may constrain adoption momentum", + "relevance_note": "Relevant for understanding agent deployment contexts but lacks implementation guidance", + "doc_status": "" + }, + { + "name": "draft-han-ai-agent-impact-infra", + "title": "The Impact of AI Agent to Network Infrastructure", + "date": "2026-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-han-ai-agent-impact-infra/", + "pages": 8, + "group": "individual", + "score": 2.35, + "novelty": 2, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Autonomous netops", + "ML traffic mgmt" + ], + "summary": "Discusses and analyzes the impact of AI agents on network infrastructure. Aims to facilitate IETF discussion and standardization efforts.", + "novelty_note": "General analysis document, limited novel technical insights", + "maturity_note": "Basic discussion document with analysis issues, needs more technical depth", + "overlap_note": "Some overlap with other infrastructure-focused AI agent discussions", + "momentum_note": "Broad scope but lacks concrete proposals, may struggle to gain traction", + "relevance_note": "Moderately relevant for understanding infrastructure impacts but lacks actionable content", + "doc_status": "" + }, + { + "name": "draft-liu-saag-zt-problem-statement", + "title": "Zero trust standards in IETF: use cases and problem statement", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-saag-zt-problem-statement/", + "pages": 8, + "group": "individual", + "score": 2.35, + "novelty": 2, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Policy/governance", + "Agent identity/auth" + ], + "summary": "Identifies the need for standardized zero trust interoperability protocols in IETF. Proposes framework for multi-vendor zero trust environments moving beyond existing architectural guidance.", + "novelty_note": "Zero trust concepts well-established, but interoperability focus has merit", + "maturity_note": "Problem statement stage with numerous typos and formatting issues", + "overlap_note": "Overlaps with existing zero trust and network security work", + "momentum_note": "Early draft with basic problem identification, unclear community support", + "relevance_note": "Zero trust relevant to AI agents but not AI-specific focus", + "doc_status": "" + }, + { + "name": "draft-improving-data-quality-tags", + "title": "Improving Data Quality through Special Text Tags", + "date": "2024-01-26", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-improving-data-quality-tags/", + "pages": 6, + "group": "individual", + "score": 2.35, + "novelty": 2, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "Data formats/interop", + "AI safety/alignment" + ], + "summary": "Proposes special text tags to enhance data quality and improve conversational AI model understanding. Tags provide additional context and structure during training and inference for more accurate responses.", + "novelty_note": "Straightforward application of markup concepts to AI training data", + "maturity_note": "Very brief document lacking detailed technical specification", + "overlap_note": "Some similarity to existing markup and metadata approaches", + "momentum_note": "Limited scope and unclear adoption path", + "relevance_note": "Relevant to AI training quality but approach may be too simplistic", + "doc_status": "" + }, + { + "name": "draft-illyes-aipref-cbcp", + "title": "Crawler best practices", + "date": "2025-10-07", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-illyes-aipref-cbcp/", + "pages": 6, + "group": "individual", + "score": 2.35, + "novelty": 2, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 3, + "categories": [ + "ML traffic mgmt", + "Policy/governance" + ], + "summary": "Describes best practices for web crawlers with basic guidelines. Very brief document focusing on crawler behavior recommendations.", + "novelty_note": "Limited novelty as crawler best practices are well-established domain", + "maturity_note": "Very brief document with minimal technical depth, appears early stage", + "overlap_note": "Moderate overlap with general web automation and crawler management practices", + "momentum_note": "GitHub-hosted with recent timestamp but minimal content suggests limited momentum", + "relevance_note": "Moderately relevant for AI crawler behavior but lacks technical depth", + "doc_status": "" + }, + { + "name": "draft-hong-nmrg-ai-deploy", + "title": "Considerations of network/system for AI services", + "date": "2025-04-24", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-hong-nmrg-ai-deploy/", + "pages": 25, + "group": "individual", + "score": 2.25, + "novelty": 2, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "Model serving/inference", + "ML traffic mgmt" + ], + "summary": "Describes network and system configurations for distributed AI inference services, covering deployment considerations for edge and cloud environments. Includes use cases like self-driving vehicles and network digital twins.", + "novelty_note": "Basic coverage of distributed AI deployment, but lacks novel technical contributions or specific protocols", + "maturity_note": "Early draft with grammar issues and incomplete technical details", + "overlap_note": "Heavily overlaps with draft-irtf-nmrg-ai-deploy which appears to be an updated version", + "momentum_note": "Superseded by the IRTF version, limited independent momentum", + "relevance_note": "Addresses relevant distributed AI deployment challenges but at a high level", + "doc_status": "" + }, + { + "name": "draft-kompella-lsr-mptecap", + "title": "Multipath Traffic Engineering Capabilities", + "date": "2026-01-09", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-kompella-lsr-mptecap/", + "pages": 6, + "group": "individual", + "score": 2.2, + "novelty": 2, + "maturity": 3, + "overlap": 4, + "momentum": 2, + "relevance": 2, + "categories": [ + "ML traffic mgmt" + ], + "summary": "Defines capabilities advertising for Multipath Traffic Engineering (MPTE) in IGP routing protocols. Enables nodes to advertise MPTE support for tunnel provisioning decisions.", + "novelty_note": "Incremental extension to existing traffic engineering capabilities advertising", + "maturity_note": "Concise but complete at 6 pages, builds on established IGP mechanisms", + "overlap_note": "Significant overlap with existing TE capabilities and IGP extensions", + "momentum_note": "Limited to specific networking community, not AI-focused", + "relevance_note": "Limited relevance to AI/agent systems, traditional networking focus", + "doc_status": "" + }, + { + "name": "draft-tjw-dbound2-problem-statement", + "title": "Domain Boundaries 2.0 Problem Statement", + "date": "2024-01-11", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-tjw-dbound2-problem-statement/", + "pages": 6, + "group": "individual", + "score": 2.2, + "novelty": 2, + "maturity": 3, + "overlap": 4, + "momentum": 2, + "relevance": 2, + "categories": [ + "Agent identity/auth", + "Policy/governance" + ], + "summary": "Outlines problems with determining organizational boundaries in DNS when clients make administrative relationship inferences. Identifies issues with current mitigation strategies for domain boundary determination.", + "novelty_note": "Problem statement for existing DNS organizational boundary issues", + "maturity_note": "Good problem identification but limited to problem statement phase", + "overlap_note": "Overlaps with existing DNS security and organizational identity work", + "momentum_note": "Long-standing problem with unclear urgency for AI-specific solutions", + "relevance_note": "Peripherally relevant to AI agents needing to understand domain relationships", + "doc_status": "" + }, + { + "name": "draft-dunbar-neotec-ac-pe2pe-ucmp-applicability", + "title": "Applying Attachmet Circuit and PE2PE YANG Data Model to dynamic policies Use Case", + "date": "2025-12-25", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-dunbar-neotec-ac-pe2pe-ucmp-applicability/", + "pages": 21, + "group": "individual", + "score": 2.15, + "novelty": 1, + "maturity": 3, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "ML traffic mgmt", + "Policy/governance", + "Data formats/interop" + ], + "summary": "Evaluates existing YANG data models for dynamic UCMP policy enforcement across edge cloud sites. Identifies gaps in current IETF specifications for time-scoped, cloud-initiated network policies.", + "novelty_note": "Applicability study of existing models rather than novel protocol development", + "maturity_note": "Thorough analysis document with practical evaluation of existing specifications", + "overlap_note": "Heavily references and applies existing YANG models with gap analysis", + "momentum_note": "Incremental analysis work with limited new technical contributions", + "relevance_note": "Relevant for understanding current model limitations in dynamic policy scenarios", + "doc_status": "" + }, + { + "name": "draft-wang-data-transmission-security-irii", + "title": "Data Transmission Security of Identity Resolution in Industrial Internet", + "date": "2025-11-22", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-wang-data-transmission-security-irii/", + "pages": 15, + "group": "individual", + "score": 2.1, + "novelty": 2, + "maturity": 2, + "overlap": 3, + "momentum": 2, + "relevance": 2, + "categories": [ + "Agent identity/auth", + "Policy/governance" + ], + "summary": "Examines security requirements for data transmission in Industrial Internet identity resolution systems. Focuses on protecting cross-organizational data sharing and resolution processes.", + "novelty_note": "Standard security analysis for industrial systems, covers expected security concerns", + "maturity_note": "Early analysis phase, lacks concrete security mechanisms or protocols", + "overlap_note": "Overlaps with general industrial IoT and identity resolution security work", + "momentum_note": "Addresses important area but lacks technical depth and implementation path", + "relevance_note": "Limited direct AI/agent relevance, more focused on industrial identity systems", + "doc_status": "" + }, + { + "name": "draft-li-iotops-intelligent-security", + "title": "Intelligent Protection Optimization System for IOT", + "date": "2024-09-01", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-li-iotops-intelligent-security/", + "pages": 6, + "group": "individual", + "score": 2.05, + "novelty": 2, + "maturity": 1, + "overlap": 4, + "momentum": 2, + "relevance": 3, + "categories": [ + "Autonomous netops", + "Policy/governance" + ], + "summary": "Proposes an information-centered network architecture for IoT security with intelligent protection optimization across naming, data exchange, and caching layers. Aims to improve content privacy protection without additional costs.", + "novelty_note": "Information-centric networking for IoT security is not new, lacks specific technical innovations", + "maturity_note": "Very early stage with vague technical details and minimal concrete implementation guidance", + "overlap_note": "Significant overlap with existing ICN and IoT security drafts and research", + "momentum_note": "Limited adoption indicators, appears to be individual submission without broad support", + "relevance_note": "IoT security is relevant but approach seems disconnected from current IETF IoT work", + "doc_status": "" + }, + { + "name": "draft-steckbeck-ua-conn-sec", + "title": "User Agent Connection Security", + "date": "2025-08-17", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-steckbeck-ua-conn-sec/", + "pages": 6, + "group": "individual", + "score": 2.0, + "novelty": 2, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 2, + "categories": [ + "Policy/governance", + "Other AI/agent" + ], + "summary": "Proposes framework for user agents to restrict connections to authorized second and third-party resources. Aims to prevent attacks through compromised connected resources.", + "novelty_note": "Incremental improvement to existing web security policies like CSP", + "maturity_note": "Brief 6-page document lacks detailed specification and implementation guidance", + "overlap_note": "Significant overlap with CSP and other web security frameworks", + "momentum_note": "Limited evidence of community interest or implementation momentum", + "relevance_note": "Tangentially relevant to AI agents that use web resources", + "doc_status": "" + }, + { + "name": "draft-templin-manet-inet", + "title": "MANET Internetworking: Problem Statement and Gap Analysis", + "date": "2026-01-12", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-templin-manet-inet/", + "pages": 11, + "group": "individual", + "score": 2.0, + "novelty": 2, + "maturity": 2, + "overlap": 4, + "momentum": 2, + "relevance": 2, + "categories": [ + "Other AI/agent" + ], + "summary": "Presents problem statement and gap analysis for MANET internetworking with fixed networks. Identifies challenges in connecting autonomous mobile node systems to the global Internet.", + "novelty_note": "Problem statement format limits novelty, addressing well-known MANET challenges", + "maturity_note": "Early stage problem identification without proposed solutions", + "overlap_note": "High overlap with decades of MANET research and existing problem statements", + "momentum_note": "MANET research has declined in recent years with limited working group activity", + "relevance_note": "Limited relevance to modern AI/agent systems, focuses on traditional mobile networking", + "doc_status": "" + }, + { + "name": "draft-tu-nmrg-blockchain-trusted-protocol", + "title": "A Blockchain Trusted Protocol for Intelligent Communication Network", + "date": "2025-04-10", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-tu-nmrg-blockchain-trusted-protocol/", + "pages": 14, + "group": "individual", + "score": 1.8, + "novelty": 2, + "maturity": 1, + "overlap": 4, + "momentum": 2, + "relevance": 2, + "categories": [ + "Policy/governance", + "Agent identity/auth" + ], + "summary": "Defines a blockchain-based trusted protocol specifically for sixth-generation (6G) intelligent communication networks. Very brief specification with limited technical details provided.", + "novelty_note": "Low novelty - blockchain for networking is well-explored, 6G context adds some freshness", + "maturity_note": "Very low maturity - only 14 pages with minimal technical detail for such a broad topic", + "overlap_note": "High overlap - many blockchain networking protocols exist", + "momentum_note": "Blockchain networking has mixed reception, 6G timeline is distant", + "relevance_note": "Limited current relevance due to early 6G stage and sparse technical content", + "doc_status": "" + }, + { + "name": "draft-men-rtgwg-agent-networking-in-digibank", + "title": "Agent Networking Scenarios of Digital Banking", + "date": "2025-11-02", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-men-rtgwg-agent-networking-in-digibank/", + "pages": 10, + "group": "individual", + "score": 1.75, + "novelty": 2, + "maturity": 2, + "overlap": 5, + "momentum": 1, + "relevance": 2, + "categories": [ + "A2A protocols", + "Agent discovery/reg" + ], + "summary": "Describes digital banking digitalization trends toward agentic services and proposes agent networking architecture with agent gateway as core component. Very similar to the other digital banking draft.", + "novelty_note": "Limited novelty, appears to duplicate content from related draft", + "maturity_note": "Early stage conceptual work with scenario focus", + "overlap_note": "Heavy overlap with draft-men-rtgwg-agent-networking-digibank-scenario", + "momentum_note": "Duplicate content reduces momentum and may indicate coordination issues", + "relevance_note": "Limited relevance due to narrow focus and apparent duplication", + "doc_status": "" + }, + { + "name": "draft-liu-access-collaboration-agent", + "title": "Ubiquitous Access Collaboration Requirements for AI Agent Protocols", + "date": "2025-10-17", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-liu-access-collaboration-agent/", + "pages": 6, + "group": "individual", + "score": 1.65, + "novelty": 2, + "maturity": 1, + "overlap": 4, + "momentum": 1, + "relevance": 2, + "categories": [ + "A2A protocols", + "Other AI/agent" + ], + "summary": "Brief document exploring requirements for AI agent communication protocols in ubiquitous access collaboration scenarios. Very preliminary with minimal detail.", + "novelty_note": "Limited novelty - discusses general requirements without specific solutions", + "maturity_note": "Very early stage - only 6 pages with minimal technical content", + "overlap_note": "General requirements overlap with other agent protocol discussions", + "momentum_note": "No clear momentum - appears to be initial exploration only", + "relevance_note": "Potentially relevant but too underdeveloped to assess properly", + "doc_status": "" + }, + { + "name": "draft-doujiali-cloudnetwork-intelligentoperation", + "title": "An requirement of Cloud Network Intelligent Operation and Maintenance.", + "date": "2025-04-20", + "source": "ietf", + "url": "https://datatracker.ietf.org/doc/draft-doujiali-cloudnetwork-intelligentoperation/", + "pages": 5, + "group": "individual", + "score": 1.35, + "novelty": 1, + "maturity": 1, + "overlap": 4, + "momentum": 1, + "relevance": 2, + "categories": [ + "Autonomous netops", + "Policy/governance" + ], + "summary": "Proposes requirements for cloud network intelligent operation and maintenance. Very brief document outlining needs for standardized intelligent operations.", + "novelty_note": "Requirements-only document with no novel technical contributions", + "maturity_note": "Extremely immature with minimal content and no technical specifications", + "overlap_note": "Heavy overlap with existing network management and cloud operations work", + "momentum_note": "No clear working group support or adoption pathway", + "relevance_note": "Topic is relevant but document provides little value to IETF standardization", + "doc_status": "" + } +] \ No newline at end of file diff --git a/docs/data/gaps.json b/docs/data/gaps.json new file mode 100644 index 0000000..bceec3b --- /dev/null +++ b/docs/data/gaps.json @@ -0,0 +1,101 @@ +{ + "current": [ + { + "id": 25, + "topic": "Agent Behavior Verification", + "description": "While many drafts address agent identity and authentication, few tackle how to verify that an agent is actually behaving according to its declared capabilities and policies. There's a critical gap in runtime behavioral attestation and compliance monitoring mechanisms.", + "category": "AI safety/alignment", + "evidence": "High overlap in identity/auth (108 drafts) but only 44 drafts on safety/alignment, with no specific focus on behavioral verification", + "severity": "critical" + }, + { + "id": 26, + "topic": "Cross-Domain Agent Liability", + "description": "When autonomous agents operate across organizational boundaries and cause harm or make decisions with legal implications, there's no standardized framework for liability attribution. The policy/governance drafts don't address cross-jurisdictional legal accountability.", + "category": "Policy/governance", + "evidence": "91 policy/governance drafts but legal liability for cross-domain autonomous actions remains unaddressed", + "severity": "critical" + }, + { + "id": 27, + "topic": "Agent Resource Exhaustion Protection", + "description": "Missing standardized mechanisms to prevent malicious or poorly designed agents from consuming excessive network, compute, or storage resources. Current drafts focus on traffic management but not on agent-specific resource quotas and enforcement.", + "category": "Autonomous netops", + "evidence": "93 autonomous netops drafts and 73 ML traffic management drafts lack agent-specific resource protection mechanisms", + "severity": "high" + }, + { + "id": 28, + "topic": "Human Override Protocols", + "description": "Critical gap in standardized protocols for humans to safely interrupt, override, or take control of autonomous agents in emergency situations. Only 30 drafts address human-agent interaction, with no focus on emergency takeover procedures.", + "category": "Human-agent interaction", + "evidence": "Only 30 human-agent interaction drafts compared to 213+ autonomous operation drafts, with no emergency override standards", + "severity": "critical" + }, + { + "id": 29, + "topic": "Agent-Generated Data Provenance", + "description": "While 145 drafts address data formats for AI interop, there's insufficient attention to tracking the provenance and lineage of data generated by agents. This creates trust and auditability issues in agent-to-agent data exchanges.", + "category": "Data formats/interop", + "evidence": "145 data format drafts with high overlap but no clear standards for agent-generated data provenance tracking", + "severity": "high" + }, + { + "id": 30, + "topic": "Agent Capability Degradation Handling", + "description": "No standardized approaches for detecting and handling when an agent's capabilities degrade due to model drift, data corruption, or hardware issues. Systems need graceful degradation protocols rather than silent failures.", + "category": "AI safety/alignment", + "evidence": "Only 44 safety/alignment drafts don't address capability degradation, while 213+ drafts assume stable agent performance", + "severity": "high" + }, + { + "id": 31, + "topic": "Multi-Agent Coordination Deadlocks", + "description": "With 120+ A2A protocol drafts, there's insufficient attention to preventing deadlock situations where multiple agents create circular dependencies or resource conflicts. Missing are standardized deadlock detection and resolution mechanisms.", + "category": "A2A protocols", + "evidence": "120 A2A protocol drafts with high internal overlap but no systematic deadlock prevention frameworks", + "severity": "high" + }, + { + "id": 32, + "topic": "Agent Privacy Preservation", + "description": "Agents often process sensitive data but current drafts don't adequately address privacy-preserving computation, differential privacy, or secure multi-party computation for agent interactions. This is critical for deployment in regulated industries.", + "category": "Agent identity/auth", + "evidence": "108 identity/auth drafts focus on authentication but lack privacy preservation mechanisms for agent data processing", + "severity": "high" + }, + { + "id": 33, + "topic": "Real-time Agent Debugging", + "description": "Missing standardized protocols for debugging autonomous agents in production environments. When agents make unexpected decisions, there are no standard interfaces for real-time introspection without disrupting operations.", + "category": "Other AI/agent", + "evidence": "26 other AI/agent drafts suggest various approaches but no standardized debugging protocols for production agents", + "severity": "medium" + }, + { + "id": 34, + "topic": "Agent Firmware/Model Update Security", + "description": "While model serving is addressed in 42 drafts, there's insufficient focus on secure update mechanisms for agent models and firmware. Missing are standards for cryptographically verified, rollback-capable agent updates.", + "category": "Model serving/inference", + "evidence": "42 model serving drafts but no comprehensive security standards for agent software/model updates", + "severity": "high" + }, + { + "id": 35, + "topic": "Cross-Protocol Agent Migration", + "description": "No standardized mechanisms for migrating agent state and context when moving between different A2A protocols or infrastructure providers. This creates vendor lock-in and limits agent mobility.", + "category": "A2A protocols", + "evidence": "120 A2A protocol drafts with high overlap suggest competing approaches but no migration standards between them", + "severity": "medium" + }, + { + "id": 36, + "topic": "Agent Energy Consumption Optimization", + "description": "Missing standards for energy-aware agent deployment and operation. As AI workloads are energy-intensive, there's no framework for agents to optimize their energy consumption or for infrastructure to enforce energy budgets.", + "category": "ML traffic mgmt", + "evidence": "73 ML traffic management drafts focus on performance but lack energy consumption considerations for sustainable AI deployment", + "severity": "medium" + } + ], + "history": [] +} \ No newline at end of file diff --git a/docs/data/meta.json b/docs/data/meta.json new file mode 100644 index 0000000..c00103b --- /dev/null +++ b/docs/data/meta.json @@ -0,0 +1,5 @@ +{ + "generated_at": "2026-03-03T23:32:29.056739+00:00", + "version": "0.3.0", + "project": "IETF Living Standards Observatory" +} \ No newline at end of file diff --git a/docs/data/observatory.json b/docs/data/observatory.json new file mode 100644 index 0000000..bf3f6ed --- /dev/null +++ b/docs/data/observatory.json @@ -0,0 +1,9 @@ +{ + "total_docs": 361, + "sources": {}, + "gaps_count": 12, + "unrated": 0, + "ideas": 1780, + "authors": 557, + "last_update": null +} \ No newline at end of file diff --git a/docs/data/timeline.json b/docs/data/timeline.json new file mode 100644 index 0000000..6816317 --- /dev/null +++ b/docs/data/timeline.json @@ -0,0 +1,264 @@ +{ + "months": [ + "2024-01", + "2024-02", + "2024-04", + "2024-09", + "2024-10", + "2024-12", + "2025-01", + "2025-04", + "2025-05", + "2025-06", + "2025-07", + "2025-08", + "2025-09", + "2025-10", + "2025-11", + "2025-12", + "2026-01", + "2026-02", + "2026-03" + ], + "by_category": { + "2024-01": { + "Agent identity/auth": 1, + "Policy/governance": 1, + "Other AI/agent": 1, + "Data formats/interop": 1, + "AI safety/alignment": 1 + }, + "2024-02": { + "Autonomous netops": 1, + "ML traffic mgmt": 1 + }, + "2024-04": { + "A2A protocols": 1, + "Autonomous netops": 1, + "Data formats/interop": 1 + }, + "2024-09": { + "Autonomous netops": 1, + "Policy/governance": 1, + "ML traffic mgmt": 1 + }, + "2024-10": { + "ML traffic mgmt": 1, + "Model serving/inference": 1 + }, + "2024-12": { + "Other AI/agent": 1 + }, + "2025-01": { + "Data formats/interop": 2, + "ML traffic mgmt": 4, + "Model serving/inference": 2 + }, + "2025-04": { + "Policy/governance": 3, + "Agent identity/auth": 1, + "Data formats/interop": 2, + "AI safety/alignment": 1, + "Autonomous netops": 1, + "Model serving/inference": 1, + "ML traffic mgmt": 1 + }, + "2025-05": { + "Policy/governance": 2, + "Agent discovery/reg": 1, + "Data formats/interop": 1, + "Human-agent interaction": 1 + }, + "2025-06": { + "Agent identity/auth": 2, + "A2A protocols": 1, + "Policy/governance": 1, + "Autonomous netops": 3, + "ML traffic mgmt": 3, + "Model serving/inference": 1, + "Data formats/interop": 1 + }, + "2025-07": { + "Agent identity/auth": 2, + "A2A protocols": 2, + "Agent discovery/reg": 1, + "Data formats/interop": 2, + "AI safety/alignment": 2, + "Human-agent interaction": 1, + "Policy/governance": 1 + }, + "2025-08": { + "Autonomous netops": 2, + "Data formats/interop": 6, + "Agent identity/auth": 2, + "Policy/governance": 3, + "Other AI/agent": 2, + "Human-agent interaction": 1 + }, + "2025-09": { + "Policy/governance": 6, + "Autonomous netops": 6, + "Data formats/interop": 11, + "ML traffic mgmt": 4, + "AI safety/alignment": 4, + "Agent discovery/reg": 3, + "A2A protocols": 4, + "Human-agent interaction": 1, + "Agent identity/auth": 3, + "Model serving/inference": 1 + }, + "2025-10": { + "Policy/governance": 10, + "Data formats/interop": 36, + "Model serving/inference": 9, + "ML traffic mgmt": 13, + "Autonomous netops": 19, + "Agent discovery/reg": 15, + "Agent identity/auth": 24, + "Human-agent interaction": 7, + "A2A protocols": 28, + "AI safety/alignment": 5, + "Other AI/agent": 5 + }, + "2025-11": { + "A2A protocols": 29, + "Autonomous netops": 18, + "Data formats/interop": 25, + "ML traffic mgmt": 9, + "Agent discovery/reg": 18, + "Agent identity/auth": 23, + "AI safety/alignment": 7, + "Policy/governance": 15, + "Human-agent interaction": 9, + "Model serving/inference": 4, + "Other AI/agent": 2 + }, + "2025-12": { + "Policy/governance": 6, + "Data formats/interop": 6, + "Human-agent interaction": 1, + "Agent identity/auth": 8, + "Autonomous netops": 4, + "Other AI/agent": 2, + "A2A protocols": 2, + "ML traffic mgmt": 3, + "AI safety/alignment": 3, + "Agent discovery/reg": 4, + "Model serving/inference": 1 + }, + "2026-01": { + "Agent identity/auth": 18, + "AI safety/alignment": 8, + "Policy/governance": 14, + "A2A protocols": 22, + "Agent discovery/reg": 15, + "ML traffic mgmt": 8, + "Data formats/interop": 17, + "Autonomous netops": 16, + "Model serving/inference": 5, + "Other AI/agent": 4, + "Human-agent interaction": 2 + }, + "2026-02": { + "A2A protocols": 38, + "Human-agent interaction": 6, + "Data formats/interop": 32, + "Agent identity/auth": 34, + "Policy/governance": 24, + "Autonomous netops": 18, + "ML traffic mgmt": 15, + "Agent discovery/reg": 19, + "Other AI/agent": 8, + "AI safety/alignment": 13, + "Model serving/inference": 8 + }, + "2026-03": { + "ML traffic mgmt": 11, + "A2A protocols": 9, + "Model serving/inference": 9, + "Agent identity/auth": 3, + "Data formats/interop": 5, + "Autonomous netops": 8, + "Policy/governance": 6, + "Agent discovery/reg": 3, + "Human-agent interaction": 1, + "Other AI/agent": 1, + "AI safety/alignment": 1 + } + }, + "by_source": { + "2024-01": { + "ietf": 3 + }, + "2024-02": { + "ietf": 1 + }, + "2024-04": { + "ietf": 1 + }, + "2024-09": { + "ietf": 2 + }, + "2024-10": { + "ietf": 1 + }, + "2024-12": { + "ietf": 1 + }, + "2025-01": { + "ietf": 4 + }, + "2025-04": { + "ietf": 5 + }, + "2025-05": { + "ietf": 2 + }, + "2025-06": { + "ietf": 5 + }, + "2025-07": { + "ietf": 5 + }, + "2025-08": { + "ietf": 8 + }, + "2025-09": { + "ietf": 17 + }, + "2025-10": { + "ietf": 67 + }, + "2025-11": { + "ietf": 61 + }, + "2025-12": { + "ietf": 16 + }, + "2026-01": { + "ietf": 54 + }, + "2026-02": { + "ietf": 86 + }, + "2026-03": { + "ietf": 22 + } + }, + "categories": [ + "A2A protocols", + "AI safety/alignment", + "Agent discovery/reg", + "Agent identity/auth", + "Autonomous netops", + "Data formats/interop", + "Human-agent interaction", + "ML traffic mgmt", + "Model serving/inference", + "Other AI/agent", + "Policy/governance" + ], + "sources": [ + "ietf" + ] +} \ No newline at end of file diff --git a/docs/index.html b/docs/index.html new file mode 100644 index 0000000..aa34434 --- /dev/null +++ b/docs/index.html @@ -0,0 +1,110 @@ + + + + + +Living Standards Observatory + + + +
+
+

Living Standards Observatory

+ +
+
+
+ +
+
Total Documents
--
+
Standards Bodies
--
Active sources
+
Open Gaps
--
Identified coverage gaps
+
Ideas Extracted
--
Technical contributions
+
Authors Tracked
--
Individual contributors
+
Last Update
--
+
+ +
+
Top Rated Documents
+ + + + + +
ScoreDocumentSourceDateCategories
+
+ +
+
Critical & High Severity Gaps
+
+
+ +
+ + + + \ No newline at end of file diff --git a/docs/observatory/explorer.html b/docs/observatory/explorer.html new file mode 100644 index 0000000..dccf48e --- /dev/null +++ b/docs/observatory/explorer.html @@ -0,0 +1,239 @@ + + + + + +Explorer - Living Standards Observatory + + + +
+
+

Living Standards Observatory

+ +
+
+
+ +
+
+ + +
Min score: 1.0
+
Min novelty: 1
+
Max overlap: 5
+ +
+
+
+
+
+ +
+ + + + + + + + + + + + + + + + + +
Score Draft Src Date NMOMomRCategories
+ +
+ + + + \ No newline at end of file diff --git a/docs/observatory/gaps.html b/docs/observatory/gaps.html new file mode 100644 index 0000000..4c191f0 --- /dev/null +++ b/docs/observatory/gaps.html @@ -0,0 +1,118 @@ + + + + + +Gaps - Living Standards Observatory + + + +
+
+

Living Standards Observatory

+ +
+
+
+ +

Coverage Gaps

+

Areas, problems, or technical challenges not adequately addressed by existing standards documents.

+ +
+
+ + +
+
+ +
+ +

Gap History

+

How gaps have evolved across observatory snapshots.

+
+ + + + + +
SnapshotTopicSeverityStatus
+
+ +
+ + + + \ No newline at end of file diff --git a/docs/observatory/timeline.html b/docs/observatory/timeline.html new file mode 100644 index 0000000..11337a8 --- /dev/null +++ b/docs/observatory/timeline.html @@ -0,0 +1,157 @@ + + + + + +Timeline - Living Standards Observatory + + + + +
+
+

Living Standards Observatory

+ +
+
+
+ +

Submission Timeline

+

Monthly document submissions across standards bodies and categories.

+ +
+ + +
+ +
+ +
+ +
+
Monthly Totals
+ + + +
MonthTotalBy Source
+
+ +
+ + + + \ No newline at end of file diff --git a/paper/figures/EXPORT_INSTRUCTIONS.md b/paper/figures/EXPORT_INSTRUCTIONS.md new file mode 100644 index 0000000..12450b1 --- /dev/null +++ b/paper/figures/EXPORT_INSTRUCTIONS.md @@ -0,0 +1,17 @@ +# Manual Figure Export + +Install kaleido for automatic export: + pip install kaleido + +Or open each HTML file in a browser and use the Plotly toolbar +(camera icon) to save as PNG. + +Required files: +- timeline.png +- quality.png +- radar.png +- network.png +- landscape-tsne.png +- bubble.png +- treemap.png +- orgs.png diff --git a/paper/figures/network-placeholder.pdf b/paper/figures/network-placeholder.pdf new file mode 100644 index 0000000..fc05dd6 Binary files /dev/null and b/paper/figures/network-placeholder.pdf differ diff --git a/paper/figures/quality-placeholder.pdf b/paper/figures/quality-placeholder.pdf new file mode 100644 index 0000000..f628b03 Binary files /dev/null and b/paper/figures/quality-placeholder.pdf differ diff --git a/paper/figures/radar-placeholder.pdf b/paper/figures/radar-placeholder.pdf new file mode 100644 index 0000000..1a5fd51 Binary files /dev/null and b/paper/figures/radar-placeholder.pdf differ diff --git a/paper/figures/score-distributions.png b/paper/figures/score-distributions.png new file mode 100644 index 0000000..aa98372 Binary files /dev/null and b/paper/figures/score-distributions.png differ diff --git a/paper/figures/similarity-heatmap.png b/paper/figures/similarity-heatmap.png new file mode 100644 index 0000000..310efbb Binary files /dev/null and b/paper/figures/similarity-heatmap.png differ diff --git a/paper/figures/timeline-placeholder.pdf b/paper/figures/timeline-placeholder.pdf new file mode 100644 index 0000000..afb99db Binary files /dev/null and b/paper/figures/timeline-placeholder.pdf differ diff --git a/paper/main.pdf b/paper/main.pdf new file mode 100644 index 0000000..c9928c8 Binary files /dev/null and b/paper/main.pdf differ diff --git a/pyproject.toml b/pyproject.toml index 3a12295..e6d4d50 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -21,6 +21,7 @@ dependencies = [ "scipy>=1.11", "scikit-learn>=1.3", "networkx>=3.2", + "markdown>=3.5", ] [project.scripts] diff --git a/scripts/agent-team-prompt.md b/scripts/agent-team-prompt.md new file mode 100644 index 0000000..648fc8b --- /dev/null +++ b/scripts/agent-team-prompt.md @@ -0,0 +1,362 @@ +# Agent Team: IETF AI Agent Landscape — The Big Picture + +> **Goal**: Transform a fragmented analysis of 361 IETF Internet-Drafts into a coherent, compelling narrative about what's coming with AI agents in the standards world. Produce a blog series, implement deeper analysis features, and draft the missing architectural pieces that tie everything together. + +--- + +## Context: What We Have + +This project (`ietf-draft-analyzer`) has already built a powerful pipeline: + +- **361 drafts** fetched from IETF Datatracker (AI/agent-related, keywords: agent, ai-agent, llm, autonomous, machine-learning, artificial-intelligence, mcp, agentic, inference, generative, intelligent, aipref) +- **403 authors** from **184 organizations** mapped with co-authorship networks +- **1,262 technical ideas** extracted and classified (mechanisms, architectures, protocols, patterns, extensions, requirements) +- **12 standardization gaps** identified (3 critical, 6 high, 3 medium) +- **13+ interactive visualizations** (t-SNE landscape, heatmap, timeline, network graph, treemap, bubble charts, radar, quality scatter, etc.) +- **33 team blocs** detected via co-authorship analysis +- A **5-draft ecosystem architecture** already outlined (AEM, ATD, HITL, AEPB, APAE) building on SPIFFE/WIMSE/ECT +- One existing blog post draft ("The IETF's AI Agent Gold Rush") +- An arXiv paper draft (13 pages, needs finishing) + +**Key finding**: The IETF is in a 36x growth sprint on AI agent protocols (2→72 drafts/month in 9 months), but with a 4:1 ratio of capability-building to safety work. The landscape is deeply fragmented — 92 A2A protocol drafts with no interoperability layer, 13 competing OAuth-for-agents proposals, and critical gaps in behavior verification, resource management, and error recovery. + +**Data freshness note**: 101 new drafts (from keyword expansion on 2026-03-03) still need: analysis/rating, author fetch, idea extraction, embedding. Run the pipeline first. + +--- + +## The Team + +### 1. Architect — "The Big Picture" + +**Role**: Connect the dots. You see what nobody else sees — the patterns across 361 drafts, the structural forces shaping this landscape, the story of what's actually happening and what's coming next. + +**Your job**: +- Read ALL existing reports in `data/reports/` to internalize the landscape +- Read `data/reports/holistic-agent-ecosystem-draft-outlines.md` and `data/reports/draft-family-consistency.md` — these are the most intellectually developed pieces +- Design the **narrative arc** for the blog series: what story are we telling, in what order, building to what conclusion? +- Identify what analysis is MISSING that would make the story more compelling (and tell the Coder what to build) +- Draft the **architectural vision document** — the missing "here's what the IETF agent ecosystem will look like in 2 years" piece +- Review everything the Writer produces for technical accuracy and narrative coherence + +**Key questions only you can answer**: +- What's the meta-story? (Not just "there are lots of drafts" but "here's what this means for the future of the internet") +- Where are the tectonic plates? (Chinese standards push vs. Western absence, safety deficit, protocol fragmentation) +- What are the 3-5 things someone building agent systems TODAY needs to know from this data? +- How does the proposed 5-draft ecosystem (AEM/ATD/HITL/AEPB/APAE) fit into or challenge the existing landscape? + +**Deliverables**: +- [ ] Blog series outline with narrative arc (titles, key thesis per post, reading order) +- [ ] "State of the Agent Ecosystem" architectural vision (~2000 words) +- [ ] Review notes on each blog post before publication +- [ ] List of missing analyses for the Coder to implement + +--- + +### 2. Analyst — "The Data Whisperer" + +**Role**: You are the one who goes deep into the database and extracts the stories hiding in the numbers. Every blog post needs data-backed claims, and you find them. + +**Your job**: +- Run the pipeline on the 101 new drafts first: `ietf analyze --all --cheap`, `ietf authors --fetch`, `ietf ideas --all --cheap --batch 5`, `ietf embed`, `ietf gaps` +- Query the SQLite database (`data/drafts.db`) directly for insights the CLI doesn't surface +- Find the stories in the data: trends, outliers, surprising patterns, contradictions +- Generate fresh reports: `ietf report overview`, `ietf report landscape`, `ietf report authors`, etc. +- Create custom SQL queries for specific blog post needs +- Cross-reference findings with the Architect's narrative needs + +**Specific analyses to run**: +- **Trend analysis**: How have categories shifted month-over-month? Is the safety gap widening or narrowing? +- **New keyword impact**: What did the 101 new drafts from `mcp`, `agentic`, `inference`, `generative`, `intelligent`, `aipref` add? Any new categories or patterns? +- **Author velocity**: Who's publishing fastest? Any new entrants in the last 3 months? +- **Idea convergence**: Which ideas appear across the most organizations (not just drafts)? Cross-org idea overlap = actual consensus signals +- **Gap evolution**: Have any of the 12 gaps been partially filled by newer drafts? +- **Competition mapping**: For each crowded area (OAuth for agents, A2A protocols, agent discovery), who's competing and how do their approaches differ? +- **Quality vs. quantity**: Do high-volume authors/orgs produce higher or lower quality scores? + +**Tools at your disposal**: +```bash +# CLI commands +ietf fetch # Pull latest drafts +ietf analyze --all --cheap # Rate all unrated drafts (Haiku, ~$0.30) +ietf ideas --all --cheap --batch 5 # Extract ideas in batches +ietf embed # Generate embeddings +ietf gaps # Re-run gap analysis +ietf report # overview|landscape|digest|timeline|overlap-matrix|authors|ideas|gaps +ietf search "" # FTS5 search +ietf similar # Find similar drafts by embedding +ietf viz all # Regenerate all visualizations + +# Direct DB queries +sqlite3 data/drafts.db "SELECT ..." +``` + +**Deliverables**: +- [ ] Pipeline run on 101 new drafts (analyze, authors, ideas, embed, gaps) +- [ ] Refreshed reports (all types) +- [ ] Per-blog-post data package: key stats, tables, chart data, quotable numbers +- [ ] "Surprising findings" list — things that challenge assumptions +- [ ] Custom visualizations or data tables for blog posts + +--- + +### 3. Coder — "The Feature Builder" + +**Role**: Implement new analysis features that unlock deeper insights. The current tool is powerful but there are capabilities that would dramatically improve the analysis. + +**Your job**: +- Read the existing codebase thoroughly: `src/ietf_analyzer/` (cli.py, db.py, analyzer.py, reports.py, embeddings.py, authors.py, fetcher.py, models.py, config.py, orgs.py, draftgen.py, visualize.py) +- Implement features the Architect and Analyst need +- Write clean, tested code that fits the existing patterns (Click CLI, SQLite, Claude API, rich output) +- Save all scripts to `scripts/` for reproducibility + +**Priority features to implement** (coordinate with Architect on order): + +1. **RFC Cross-Reference** (`ietf refs`): + - Parse each draft's full text for RFC references (regex: `RFC\s*\d{4,}`, `\[RFC\d+\]`) + - Store in new `draft_refs` table (draft_name, ref_type, ref_id) + - Report: which RFCs are most referenced? Which drafts build on what foundation? + - This reveals the "dependency tree" of the agent ecosystem — what existing standards are they building on? + +2. **Revision Tracking** (`ietf revisions`): + - For drafts with rev > 00, fetch all prior revisions from Datatracker + - Compute diff stats (added/removed sections, size changes) + - Track: which drafts are actively evolving? Which are stale? + - This tells us about momentum and commitment + +3. **Category Trend Analysis** (`ietf trends`): + - Monthly breakdown of new drafts per category + - Growth rate calculation per category + - Identify: which categories are accelerating? Which peaked and declined? + - Output: markdown table + data for visualization + +4. **Cross-Organization Idea Overlap** (`ietf idea-overlap`): + - For each idea that appears in 2+ drafts, check if the drafts come from different orgs + - Cross-org idea overlap = genuine convergence (not just one team's duplicates) + - Report: top ideas with multi-org convergence + +5. **Draft Status Tracking**: + - Fetch current IESG state and WG adoption status from Datatracker + - Track: which drafts have been adopted by WGs? Which are in IETF Last Call? + - This reveals which proposals have real traction vs. which are just ideas + +6. **Semantic Search Enhancement** (`ietf ask ""`): + - Natural language query against embeddings + FTS5 + - "Which drafts address agent authentication?" → ranked results + - Useful for blog research and ad-hoc exploration + +**Code patterns to follow**: +- CLI: Click commands in `cli.py` with `@click.option()` decorators +- DB: Add tables in `db.py` `ensure_tables()`, queries as methods on `DraftDB` +- Reports: Add report types in `reports.py` `generate_report()` +- Config: Add new config fields in `config.py` `AnalyzerConfig` +- Always cache Claude API calls via `llm_cache` table + +**Deliverables**: +- [ ] RFC cross-reference feature (parse, store, report) +- [ ] Category trend analysis (monthly breakdown, growth rates) +- [ ] Cross-org idea overlap analysis +- [ ] Draft status/traction tracking +- [ ] Any features the Architect identifies as needed for the blog series +- [ ] Scripts in `scripts/` for running new analyses + +--- + +### 4. Writer — "The Storyteller" + +**Role**: Turn data and architectural insights into compelling, publishable blog posts. You make the complex accessible and the dry data riveting. + +**Your job**: +- Work from the Architect's narrative arc and the Analyst's data packages +- Write a series of blog posts that build on each other +- Each post should stand alone but link to the series +- Tone: authoritative but accessible, data-driven but narrative, opinionated where the data supports it +- Reference specific drafts, authors, and organizations by name — this is journalism, not a whitepaper +- Include data tables, pull quotes, and key stats formatted for web publication + +**The Blog Series** (refine with Architect, but start from this skeleton): + +### Post 1: "The IETF's AI Agent Gold Rush" (UPDATE existing draft) +*The overview piece. Hook readers with the numbers.* +- Update from 260→361 drafts with new findings +- The 36x growth curve +- The 4:1 safety deficit +- The organizational landscape (Huawei dominance, Western absence) +- Tease the rest of the series + +### Post 2: "Who's Writing the Rules for AI Agents?" +*The geopolitics piece. Follow the authors.* +- Deep dive into the 33 team blocs +- The Huawei 13-person, 94%-cohesion, 22-draft campaign +- Chinese institutional ecosystem (Huawei + China Mobile + Tsinghua + ZTE + ...) +- Where are Google, Microsoft, Apple? Why? +- Cross-org collaboration map: who works together, who doesn't +- What does standards authorship concentration mean for the future? + +### Post 3: "The OAuth Wars and Other Battles" +*The fragmentation piece. Where multiple teams fight over the same problem.* +- The 13-draft OAuth-for-AI-agents cluster +- The 8-draft multi-agent communication protocol convergence +- Near-duplicate analysis: 25+ draft pairs with >0.98 similarity +- The A2A protocol zoo: 92 drafts, no interop +- What fragmentation costs: wasted effort, delayed deployment, confusion for implementers + +### Post 4: "What Nobody's Building (And Why It Matters)" +*The gaps piece. The most important blog post in the series.* +- The 3 critical gaps: behavior verification, resource management, error recovery +- The 6 high-priority gaps: human override, cross-protocol translation, lifecycle, consensus, cross-domain security, dynamic trust +- Only 22 human-agent interaction drafts vs 92 A2A protocols — agents talking to agents but not to humans +- Only 36 safety drafts — who's building the guardrails? +- For each gap: what could go wrong if this isn't addressed? Real-world scenario. + +### Post 5: "The 1,262 Ideas That Will Shape Agent Infrastructure" +*The ideas piece. What's actually being proposed.* +- Taxonomy: 488 mechanisms, 217 architectures, 179 protocols, 169 patterns, 99 extensions, 93 requirements +- The ideas that show up everywhere (convergence signals) +- The ideas that appear exactly once (innovation at the edges) +- Map ideas to the gaps: which ideas partially fill which gaps? +- The most ambitious technical proposals in the corpus + +### Post 6: "Drawing the Big Picture: What the Agent Ecosystem Actually Needs" +*The vision piece. The capstone.* +- Synthesize everything: growth, fragmentation, gaps, ideas, geopolitics +- The proposed holistic ecosystem (AEM/ATD/HITL/AEPB/APAE) — what it would solve +- DAG orchestration, HITL as first-class, protocol agnosticism, dual regime (relaxed vs regulated) +- What's coming next: predictions based on the data +- Call to action: what builders, policymakers, and standards participants should do + +### Post 7 (optional): "How We Built This: Analyzing 361 IETF Drafts with Claude and Ollama" +*The methodology piece. For the technical audience.* +- The tool: Python CLI, Datatracker API, Claude for analysis, Ollama for embeddings +- The pipeline: fetch → analyze → embed → ideas → gaps → viz +- Cost: ~$3 for 260 drafts, hybrid Haiku/Sonnet approach +- Lessons in LLM-powered document analysis at scale +- Open source: how others can use it + +### Post 8: "Agents Building the Agent Analysis" +*The meta piece. The one that makes people smile.* +- We used Claude Code agent teams (Architect, Analyst, Coder, Writer) to analyze the IETF's AI agent standards +- The irony is the point: the very ecosystem gaps we identified (orchestration, HITL, assurance) mirror our own team structure +- What worked: parallel execution, specialization, the prompt as project spec +- What surprised us: moments where agent output changed our direction +- Cost/speed transparency: tokens, time, human oversight required +- Honest about limitations: where human judgment was non-negotiable +- Source material: `data/reports/dev-journal.md` (every session logs milestones there) + +**Style guide**: +- Lead with the most surprising finding in each post +- Use data tables (markdown) for quantitative claims +- Bold the key numbers on first mention +- Link to specific drafts on datatracker.ietf.org +- Each post: 1500-2500 words +- End each post with a teaser for the next one +- Include a "Key Takeaways" box (3-5 bullet points) at the end + +**Deliverables**: +- [ ] Post 1: Updated "Gold Rush" overview (data/reports/blog-series/01-gold-rush.md) +- [ ] Post 2: Authors and geopolitics (data/reports/blog-series/02-who-writes-the-rules.md) +- [ ] Post 3: Fragmentation and competition (data/reports/blog-series/03-oauth-wars.md) +- [ ] Post 4: Gaps analysis (data/reports/blog-series/04-what-nobody-builds.md) +- [ ] Post 5: Ideas taxonomy (data/reports/blog-series/05-1262-ideas.md) +- [ ] Post 6: Vision and ecosystem (data/reports/blog-series/06-big-picture.md) +- [ ] Post 7: Methodology (data/reports/blog-series/07-how-we-built-this.md) + +--- + +## Development Journal (CRITICAL) + +**Every agent MUST log milestones to `data/reports/dev-journal.md`.** + +This journal is the source material for Post 8 ("Agents Building the Agent Analysis") — the meta blog post about using Claude agent teams to build this project. Without it, we lose the story. + +Append entries in this format: +```markdown +### [DATE] [AGENT] — [SHORT TITLE] + +**What**: [What was done] +**Why**: [The reasoning] +**Result**: [Outcome, key numbers, artifacts] +**Surprise**: [Optional — anything unexpected] +**Cost**: [Optional — API tokens, time, model] +``` + +Log: pipeline runs, features built, posts written, architectural decisions, coordination moments (when one agent's output changed another's plan), data surprises, tool limitations. Skip: routine file reads, minor formatting fixes. + +See `CLAUDE.md` for full details. + +--- + +## Workflow + +``` +Phase 1: Foundation (Analyst + Coder in parallel) +├── Analyst: Run pipeline on 101 new drafts, refresh all reports +├── Coder: Implement RFC cross-reference + category trends +└── Architect: Read all reports, design narrative arc + +Phase 2: Deep Analysis (Analyst + Coder, informed by Architect) +├── Analyst: Run new analyses (trends, cross-org ideas, competition mapping) +├── Coder: Implement remaining features (status tracking, idea overlap) +└── Architect: Finalize blog outline, draft vision document + +Phase 3: Writing (Writer, supported by Analyst) +├── Writer: Draft posts 1-3 (overview, authors, fragmentation) +├── Analyst: Provide data packages for each post +└── Architect: Review each post for accuracy and narrative + +Phase 4: Vision (Writer + Architect) +├── Writer: Draft posts 4-6 (gaps, ideas, big picture) +├── Architect: Co-author post 6 (the vision piece) +└── Writer: Draft post 7 (methodology, optional) + +Phase 5: Polish +├── Architect: Final review of all posts +├── Analyst: Fact-check all numbers against latest DB +└── Writer: Final edits, cross-linking, consistent formatting +``` + +--- + +## File Structure + +``` +data/reports/blog-series/ +├── 00-series-overview.md # Series intro and reading order +├── 01-gold-rush.md # The overview +├── 02-who-writes-the-rules.md # Authors and geopolitics +├── 03-oauth-wars.md # Fragmentation +├── 04-what-nobody-builds.md # Gaps (the most important one) +├── 05-1262-ideas.md # Ideas taxonomy +├── 06-big-picture.md # Vision and ecosystem +└── 07-how-we-built-this.md # Methodology +``` + +--- + +## Key Data Points to Weave Throughout + +These numbers should appear across multiple posts: + +| Stat | Value | Context | +|------|-------|---------| +| Total drafts | 361 | (up from 260 after keyword expansion) | +| Growth rate | 36x | (2→72 drafts/month, Jun 2025→Feb 2026) | +| Safety ratio | 4:1 | (capability to safety drafts) | +| Authors | 403 | from 184 organizations | +| Top org | Huawei | 39 authors, 45 drafts | +| Ideas extracted | 1,262 | from 260 analyzed drafts | +| Gaps identified | 12 | 3 critical, 6 high, 3 medium | +| Team blocs | 33 | covering 25% of all authors | +| Biggest bloc | Huawei | 13 people, 94% cohesion, 22 shared drafts | +| OAuth cluster | 13 drafts | all solving agent auth via OAuth, incompatible | +| Near-duplicates | 25+ pairs | >0.98 cosine similarity | +| A2A protocols | 92 drafts | no interoperability layer | +| Human-agent | 22 drafts | vs 92 A2A and 60 autonomous netops | +| Analysis cost | ~$3.16 | 260 drafts via Claude Sonnet | + +--- + +## The Thesis + +Across all posts, we're building to one argument: + +**The IETF's AI agent standardization effort is the largest, fastest-growing, and most consequential standards race in a decade — but it's building the highways before the traffic lights. The data shows explosive growth (36x in 9 months), deep fragmentation (92 competing A2A protocols), concerning concentration (one company writes 12% of all drafts), and a structural safety deficit (4:1 capability to guardrails). What's missing isn't more protocols — it's the connective tissue: a shared execution model, human oversight primitives, protocol interoperability, and assurance profiles that work from dev to production. The drafts we analyzed contain 1,262 technical ideas, many of them brilliant, but they need an architecture to fit into. That's the big picture.** diff --git a/scripts/fetch-expanded-keywords.sh b/scripts/fetch-expanded-keywords.sh new file mode 100755 index 0000000..aa4b46a --- /dev/null +++ b/scripts/fetch-expanded-keywords.sh @@ -0,0 +1,19 @@ +#!/usr/bin/env bash +# Fetch AI/agent drafts with expanded keyword set (original 6 + 6 new). +# Run from project root: bash scripts/fetch-expanded-keywords.sh +# +# New keywords added 2026-03-03 after probing Datatracker API: +# mcp, agentic, inference, generative, intelligent, aipref +# These brought in ~101 new drafts (260 -> 361). + +set -euo pipefail +cd "$(dirname "$0")/.." + +echo "=== Fetching with expanded keywords ===" +python -m ietf_analyzer.cli fetch \ + -k mcp -k agentic -k inference -k generative -k intelligent -k aipref + +echo "" +echo "=== Draft count ===" +sqlite3 data/drafts.db "SELECT COUNT(*) || ' total drafts' FROM drafts;" +sqlite3 data/drafts.db "SELECT COUNT(*) || ' drafts with full text' FROM drafts WHERE full_text IS NOT NULL AND full_text != '';" diff --git a/scripts/generate-draft-family.sh b/scripts/generate-draft-family.sh new file mode 100755 index 0000000..f05a318 --- /dev/null +++ b/scripts/generate-draft-family.sh @@ -0,0 +1,32 @@ +#!/usr/bin/env bash +# Generate the full 5-draft agent ecosystem family +# Usage: ./scripts/generate-draft-family.sh [--cheap] +# +# Generates: AEM, ATD, HITL, AEPB, APAE drafts +# Output: data/reports/generated-drafts/ +# Estimated cost: ~$0.28/draft ($1.50 total with --quality, ~$0.15 with --cheap) + +set -euo pipefail + +QUALITY_FLAG="${1:---quality}" + +echo "=== Generating Agent Ecosystem Draft Family ===" +echo "Mode: ${QUALITY_FLAG}" +echo "" + +# Generate the full family +ietf pipeline family --name agent-ecosystem "${QUALITY_FLAG}" + +echo "" +echo "=== Running quality gates ===" + +# Get IDs of generated drafts and run quality gates +for id in $(sqlite3 data/drafts.db "SELECT id FROM generated_drafts WHERE family_name='agent-ecosystem' ORDER BY id"); do + echo "Quality check: draft #${id}" + ietf pipeline quality "${id}" || true +done + +echo "" +echo "=== Done ===" +echo "Drafts saved to: data/reports/generated-drafts/" +echo "Run 'ietf pipeline status' to see all generated drafts" diff --git a/scripts/run-new-analyses.sh b/scripts/run-new-analyses.sh new file mode 100755 index 0000000..dec57bc --- /dev/null +++ b/scripts/run-new-analyses.sh @@ -0,0 +1,33 @@ +#!/bin/bash +# Run all new analysis features (refs, trends, idea-overlap) and generate reports. +# Usage: bash scripts/run-new-analyses.sh + +set -e + +echo "=== Extracting cross-references ===" +python -m src.ietf_analyzer.cli refs --extract + +echo "" +echo "=== Top Referenced RFCs ===" +python -m src.ietf_analyzer.cli refs --top 20 + +echo "" +echo "=== Top Referenced Drafts ===" +python -m src.ietf_analyzer.cli refs --type draft --top 15 + +echo "" +echo "=== Category Trends ===" +python -m src.ietf_analyzer.cli trends + +echo "" +echo "=== Cross-Org Idea Overlap ===" +python -m src.ietf_analyzer.cli idea-overlap + +echo "" +echo "=== Generating Reports ===" +python -m src.ietf_analyzer.cli report refs +python -m src.ietf_analyzer.cli report trends +python -m src.ietf_analyzer.cli report idea-overlap + +echo "" +echo "Done! Reports saved to data/reports/" diff --git a/scripts/team-blocs-report.py b/scripts/team-blocs-report.py new file mode 100755 index 0000000..2ebb7aa --- /dev/null +++ b/scripts/team-blocs-report.py @@ -0,0 +1,228 @@ +#!/usr/bin/env python3 +"""Generate a detailed team blocs report. + +Usage: + PYTHONPATH=src python scripts/team-blocs-report.py + PYTHONPATH=src python scripts/team-blocs-report.py --min-shared 3 --threshold 0.80 +""" + +import argparse +from collections import defaultdict +from datetime import datetime, timezone +from pathlib import Path + +from ietf_analyzer.config import Config +from ietf_analyzer.db import Database +from ietf_analyzer.orgs import detect_blocs, normalize_org, top_orgs_normalized + + +def main(): + parser = argparse.ArgumentParser(description="Team blocs report") + parser.add_argument("--min-shared", type=int, default=2, help="Min shared drafts to form a bloc edge (default: 2)") + parser.add_argument("--threshold", type=float, default=0.70, help="Cohesion threshold 0-1 (default: 0.70)") + parser.add_argument("--min-size", type=int, default=2, help="Min members per bloc (default: 2)") + parser.add_argument("-o", "--output", default=None, help="Output path (default: data/reports/team-blocs.md)") + args = parser.parse_args() + + cfg = Config() + db = Database(cfg) + out = Path(args.output) if args.output else Path(cfg.data_dir) / "reports" / "team-blocs.md" + + now = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M UTC") + draft_sets = db.author_draft_sets() + draft_counts = db.author_draft_counts() + total_authors = db.author_count() + total_drafts = db.count_drafts() + + # Build rating lookup for categories + pairs_data = db.drafts_with_ratings(limit=500) + rating_map = {draft.name: rating for draft, rating in pairs_data} + + blocs = detect_blocs( + db, + cohesion_threshold=args.threshold, + min_size=args.min_size, + min_shared_drafts=args.min_shared, + ) + + # Stats + bloc_authors = set() + for b in blocs: + bloc_authors |= b.member_pids + pct_in_blocs = len(bloc_authors) / total_authors * 100 if total_authors else 0 + + lines = [ + "# Team Bloc Analysis", + f"*Generated {now} — {total_authors} authors, {total_drafts} drafts*", + f"*Parameters: cohesion >= {args.threshold:.0%}, min shared drafts >= {args.min_shared}, min size >= {args.min_size}*\n", + "## Summary\n", + f"| Metric | Value |", + f"|--------|------:|", + f"| Total blocs detected | {len(blocs)} |", + f"| Authors in blocs | {len(bloc_authors)} / {total_authors} ({pct_in_blocs:.0f}%) |", + f"| Largest bloc | {len(blocs[0].members)} members |" if blocs else "| Largest bloc | — |", + f"| Most shared drafts | {blocs[0].shared_drafts} |" if blocs else "| Most shared drafts | — |", + "", + ] + + # Bloc size distribution + size_dist: dict[str, int] = defaultdict(int) + for b in blocs: + n = len(b.members) + if n >= 10: + size_dist["10+"] += 1 + elif n >= 5: + size_dist["5-9"] += 1 + elif n >= 3: + size_dist["3-4"] += 1 + else: + size_dist["2"] += 1 + + lines.extend([ + "### Bloc Size Distribution\n", + "| Size | Count |", + "|------|------:|", + ]) + for label in ["10+", "5-9", "3-4", "2"]: + if label in size_dist: + lines.append(f"| {label} members | {size_dist[label]} |") + lines.append("") + + # Org breakdown + org_blocs: dict[str, list] = defaultdict(list) + for b in blocs: + org_blocs[b.primary_org].append(b) + + lines.extend([ + "### Blocs by Organization\n", + "| Organization | Blocs | Total Members | Total Shared Drafts |", + "|-------------|------:|--------------:|--------------------:|", + ]) + org_summary = sorted(org_blocs.items(), key=lambda x: -sum(b.shared_drafts for b in x[1])) + for org, obs in org_summary: + total_m = sum(len(b.members) for b in obs) + total_s = sum(b.shared_drafts for b in obs) + lines.append(f"| {org} | {len(obs)} | {total_m} | {total_s} |") + lines.append("") + + # Detailed blocs + lines.extend([ + "---\n", + "## Detailed Bloc Profiles\n", + ]) + + for i, bloc in enumerate(blocs): + lines.append(f"### {i + 1}. {bloc.label}") + lines.append("") + lines.append(f"| | |") + lines.append(f"|---|---|") + lines.append(f"| **Members** | {len(bloc.members)} |") + lines.append(f"| **Shared Drafts** | {bloc.shared_drafts} |") + lines.append(f"| **Cohesion** | {bloc.cohesion:.0%} |") + lines.append(f"| **Primary Org** | {bloc.primary_org} |") + + # List orgs if multi-org + orgs = set(org for _, _, org in bloc.members if org) + if len(orgs) > 1: + lines.append(f"| **All Orgs** | {', '.join(sorted(orgs))} |") + lines.append("") + + # Member table + lines.append("**Members:**\n") + lines.append("| Author | Organization | Drafts | In-Bloc Drafts |") + lines.append("|--------|-------------|-------:|--------------:|") + for pid, name, org in bloc.members: + total_d = draft_counts.get(pid, 0) + my_drafts = draft_sets.get(pid, set()) + # Count how many of this person's drafts have another bloc member + bloc_other_pids = bloc.member_pids - {pid} + in_bloc = sum( + 1 for d in my_drafts + if any(d in draft_sets.get(other, set()) for other in bloc_other_pids) + ) + lines.append(f"| {name} | {org} | {total_d} | {in_bloc} |") + lines.append("") + + # Shared drafts list + all_drafts: dict[str, int] = defaultdict(int) + for pid in bloc.member_pids: + for d in draft_sets.get(pid, set()): + all_drafts[d] += 1 + shared_list = sorted( + [(d, cnt) for d, cnt in all_drafts.items() if cnt >= 2], + key=lambda x: -x[1], + ) + + if shared_list: + lines.append("**Shared Drafts:**\n") + lines.append("| Draft | Co-authors | Score | Categories |") + lines.append("|-------|----------:|------:|------------|") + for d, cnt in shared_list: + r = rating_map.get(d) + score = f"{r.composite_score:.1f}" if r else "—" + cats = ", ".join(r.categories[:2]) if r else "" + lines.append( + f"| [{d}](https://datatracker.ietf.org/doc/{d}/) " + f"| {cnt}/{len(bloc.members)} | {score} | {cats} |" + ) + lines.append("") + + lines.append("---\n") + + # Cross-bloc connections + lines.extend([ + "## Cross-Bloc Connections\n", + "*Authors who bridge between different blocs or connect blocs to the wider community.*\n", + ]) + + # Find authors in blocs who also collaborate with people outside their bloc + coauthor_rows = db.conn.execute( + """SELECT a1.name, da1.person_id, a2.name, da2.person_id, COUNT(*) as shared + FROM draft_authors da1 + JOIN draft_authors da2 ON da1.draft_name = da2.draft_name + AND da1.person_id < da2.person_id + JOIN authors a1 ON da1.person_id = a1.person_id + JOIN authors a2 ON da2.person_id = a2.person_id + GROUP BY da1.person_id, da2.person_id + HAVING shared >= 2 + ORDER BY shared DESC""" + ).fetchall() + + # Map pid -> bloc index + pid_bloc: dict[int, int] = {} + for bi, b in enumerate(blocs): + for pid in b.member_pids: + pid_bloc[pid] = bi + + bridges = [] + for r in coauthor_rows: + _, pid_a, _, pid_b, shared = r[0], r[1], r[2], r[3], r[4] + bloc_a = pid_bloc.get(pid_a) + bloc_b = pid_bloc.get(pid_b) + # One in a bloc, other not — or in different blocs + if bloc_a is not None and bloc_b is not None and bloc_a != bloc_b: + bridges.append((r[0], blocs[bloc_a].label, r[2], blocs[bloc_b].label, shared)) + elif bloc_a is not None and bloc_b is None: + bridges.append((r[0], blocs[bloc_a].label, r[2], "(independent)", shared)) + elif bloc_b is not None and bloc_a is None: + bridges.append((r[2], blocs[bloc_b].label, r[0], "(independent)", shared)) + + if bridges: + lines.append("| Bloc Author | Bloc | External Author | Their Affiliation | Shared |") + lines.append("|-------------|------|-----------------|-------------------|-------:|") + for a, bloc_label, b, other_label, shared in bridges[:30]: + lines.append(f"| {a} | {bloc_label} | {b} | {other_label} | {shared} |") + else: + lines.append("No cross-bloc connections found with >= 2 shared drafts.") + + lines.append("") + + report = "\n".join(lines) + out.parent.mkdir(parents=True, exist_ok=True) + out.write_text(report) + db.close() + print(f"Report written to {out} ({len(blocs)} blocs)") + + +if __name__ == "__main__": + main() diff --git a/src/ietf_analyzer/analyzer.py b/src/ietf_analyzer/analyzer.py index 31ed4dc..46945ad 100644 --- a/src/ietf_analyzer/analyzer.py +++ b/src/ietf_analyzer/analyzer.py @@ -77,7 +77,7 @@ Abstract: {abstract} {text_excerpt} -Return 3-8 ideas. Focus on CONCRETE technical contributions, not general statements. +Return 0-8 ideas. Only include CONCRETE, NOVEL technical contributions — not restatements of the abstract or general goals. If the draft has no substantive technical ideas (e.g. it is a problem statement, administrative document, or off-topic), return an empty array []. JSON array only, no fences.""" BATCH_IDEAS_PROMPT = """\ @@ -86,7 +86,7 @@ Per idea: {{"title":"short name","description":"1 sentence","type":"mechanism|pr {drafts_block} -3-8 ideas per draft. CONCRETE technical contributions only. +0-8 ideas per draft. Only include CONCRETE, NOVEL technical contributions. If a draft has no substantive ideas, map it to an empty array. Do not pad with restatements of the abstract. Return ONLY a JSON object like {{"draft-name":[...], ...}}, no fences.""" GAP_ANALYSIS_PROMPT = """\ @@ -397,16 +397,16 @@ class Analyzer: count = 0 for d in drafts: ideas = results.get(d.name, []) + if not isinstance(ideas, list): + ideas = [ideas] if ideas else [] + self.db.cache_response( + d.name, _prompt_hash(f"batch-ideas-{phash}-{d.name}"), + self.config.claude_model_cheap if cheap else self.config.claude_model, + f"batch-ideas[{d.name}]", json.dumps(ideas), + in_tok // len(drafts), out_tok // len(drafts), + ) + self.db.insert_ideas(d.name, ideas) if ideas: - if not isinstance(ideas, list): - ideas = [ideas] - self.db.cache_response( - d.name, _prompt_hash(f"batch-ideas-{phash}-{d.name}"), - self.config.claude_model_cheap if cheap else self.config.claude_model, - f"batch-ideas[{d.name}]", json.dumps(ideas), - in_tok // len(drafts), out_tok // len(drafts), - ) - self.db.insert_ideas(d.name, ideas) count += 1 return count except (json.JSONDecodeError, anthropic.APIError) as e: diff --git a/src/ietf_analyzer/cli.py b/src/ietf_analyzer/cli.py index 9468e4e..d811446 100644 --- a/src/ietf_analyzer/cli.py +++ b/src/ietf_analyzer/cli.py @@ -433,6 +433,104 @@ def ideas_report(): db.close() +@report.command("refs") +def refs_report(): + """Cross-reference report — which standards the ecosystem builds on.""" + from .reports import Reporter + cfg = _get_config() + db = Database(cfg) + reporter = Reporter(cfg, db) + try: + path = reporter.refs_report() + console.print(f"Report saved: [bold]{path}[/]") + finally: + db.close() + + +@report.command("trends") +def trends_report(): + """Category trend analysis report (markdown).""" + from .reports import Reporter + cfg = _get_config() + db = Database(cfg) + reporter = Reporter(cfg, db) + try: + path = reporter.trends_report() + console.print(f"Report saved: [bold]{path}[/]") + finally: + db.close() + + +@report.command("idea-overlap") +def idea_overlap_report(): + """Cross-organization idea overlap report.""" + from .reports import Reporter + cfg = _get_config() + db = Database(cfg) + reporter = Reporter(cfg, db) + try: + path = reporter.idea_overlap_report() + console.print(f"Report saved: [bold]{path}[/]") + finally: + db.close() + + +@report.command("status") +def status_report(): + """WG adoption status report.""" + from .reports import Reporter + cfg = _get_config() + db = Database(cfg) + reporter = Reporter(cfg, db) + try: + path = reporter.status_report() + console.print(f"Report saved: [bold]{path}[/]") + finally: + db.close() + + +@report.command("revisions") +def revisions_report(): + """Draft revision velocity report.""" + from .reports import Reporter + cfg = _get_config() + db = Database(cfg) + reporter = Reporter(cfg, db) + try: + path = reporter.revisions_report() + console.print(f"Report saved: [bold]{path}[/]") + finally: + db.close() + + +@report.command("centrality") +def centrality_report(): + """Author network centrality report.""" + from .reports import Reporter + cfg = _get_config() + db = Database(cfg) + reporter = Reporter(cfg, db) + try: + path = reporter.centrality_report() + console.print(f"Report saved: [bold]{path}[/]") + finally: + db.close() + + +@report.command("co-occurrence") +def co_occurrence_report(): + """Category co-occurrence matrix report.""" + from .reports import Reporter + cfg = _get_config() + db = Database(cfg) + reporter = Reporter(cfg, db) + try: + path = reporter.co_occurrence_report() + console.print(f"Report saved: [bold]{path}[/]") + finally: + db.close() + + # ── visualize ──────────────────────────────────────────────────────────── @@ -778,6 +876,715 @@ def gaps(refresh: bool): db.close() +# ── refs ──────────────────────────────────────────────────────────────── + + +@main.command() +@click.argument("name", required=False) +@click.option("--extract/--no-extract", default=False, help="Extract refs from all drafts with text") +@click.option("--top", "-n", default=30, help="Number of top-referenced items to show") +@click.option("--type", "ref_type", default="rfc", type=click.Choice(["rfc", "draft", "bcp"]), + help="Reference type to show top results for") +def refs(name: str | None, extract: bool, top: int, ref_type: str): + """Parse and show cross-references (RFCs, drafts, BCPs) in draft texts.""" + import re + + cfg = _get_config() + db = Database(cfg) + + try: + if extract: + missing = db.drafts_without_refs() + if not missing: + console.print("[green]All drafts with text already have refs extracted.[/]") + else: + console.print(f"Extracting refs from [bold]{len(missing)}[/] drafts...") + extracted = 0 + for draft_name in missing: + draft = db.get_draft(draft_name) + if not draft or not draft.full_text: + continue + found_refs = _extract_refs(draft.full_text, draft.name) + if found_refs: + db.insert_refs(draft_name, found_refs) + extracted += 1 + console.print(f"Extracted refs from [bold green]{extracted}[/] drafts") + + if name: + # Show refs for a specific draft + draft_refs = db.get_refs_for_draft(name) + if not draft_refs: + console.print(f"[yellow]No refs found for {name}. Run `ietf refs --extract` first.[/]") + return + table = Table(title=f"References in {name}") + table.add_column("Type", style="dim", width=6) + table.add_column("Reference", style="cyan") + for rt, rid in sorted(draft_refs): + table.add_row(rt.upper(), rid) + console.print(table) + else: + # Show top-referenced items + stats = db.ref_stats() + if stats["total_refs"] == 0: + console.print("[yellow]No refs extracted yet. Run `ietf refs --extract` first.[/]") + return + + console.print(f"\n[bold]Reference Stats[/]: {stats['drafts_with_refs']} drafts, " + f"{stats['total_refs']} total refs " + f"({stats['rfc_refs']} RFC, {stats['draft_refs']} draft, {stats['bcp_refs']} BCP)\n") + + top_items = db.top_referenced(ref_type=ref_type, limit=top) + table = Table(title=f"Top {len(top_items)} Most-Referenced {ref_type.upper()}s") + table.add_column("#", justify="right", width=4) + table.add_column("Reference", style="cyan", width=30) + table.add_column("Count", justify="right", width=6) + table.add_column("Referenced By", max_width=60) + for rank, (rid, cnt, drafts) in enumerate(top_items, 1): + label = f"RFC {rid}" if ref_type == "rfc" else rid + draft_list = ", ".join(d.replace("draft-", "")[:25] for d in drafts[:4]) + if len(drafts) > 4: + draft_list += f" +{len(drafts) - 4}" + table.add_row(str(rank), label, str(cnt), draft_list) + console.print(table) + finally: + db.close() + + +def _extract_refs(text: str, self_name: str) -> list[tuple[str, str]]: + """Extract RFC, draft, and BCP references from draft full text.""" + import re + + refs: set[tuple[str, str]] = set() + + # RFC references: RFC 1234, RFC1234, [RFC1234], [RFC 1234] + for m in re.finditer(r'\[?RFC\s*(\d{4,})\]?', text, re.IGNORECASE): + refs.add(("rfc", m.group(1))) + + # BCP references: BCP 14, BCP14, [BCP14] + for m in re.finditer(r'\[?BCP\s*(\d+)\]?', text, re.IGNORECASE): + refs.add(("bcp", m.group(1))) + + # Draft references: draft-ietf-something-name + for m in re.finditer(r'(draft-[\w][\w-]+[\w])', text, re.IGNORECASE): + draft_ref = m.group(1).lower() + # Strip trailing version numbers (e.g., draft-foo-bar-03 -> draft-foo-bar) + draft_ref = re.sub(r'-\d{2,}$', '', draft_ref) + # Don't reference self + if draft_ref != self_name: + refs.add(("draft", draft_ref)) + + return list(refs) + + +# ── trends ───────────────────────────────────────────────────────────── + + +@main.command() +@click.option("--category", "-c", help="Filter to a specific category") +@click.option("--json-out", is_flag=True, help="Also output JSON for visualization") +def trends(category: str | None, json_out: bool): + """Show category trend analysis — monthly breakdown with growth rates.""" + import json as json_mod + from collections import defaultdict + + cfg = _get_config() + db = Database(cfg) + + try: + pairs = db.drafts_with_ratings(limit=500) + all_drafts = db.list_drafts(limit=500, order_by="time ASC") + + if not pairs: + console.print("[yellow]No rated drafts. Run `ietf analyze --all` first.[/]") + return + + # Build rating lookup + rating_map = {draft.name: rating for draft, rating in pairs} + + # Collect monthly counts per category + monthly: dict[str, dict[str, int]] = defaultdict(lambda: defaultdict(int)) + all_cats: set[str] = set() + for d in all_drafts: + month = d.time[:7] if d.time else "unknown" + r = rating_map.get(d.name) + if r: + for c in r.categories: + if category and c.lower() != category.lower(): + continue + monthly[month][c] += 1 + all_cats.add(c) + + if not all_cats: + console.print(f"[yellow]No data for category '{category}'[/]" if category + else "[yellow]No category data found.[/]") + return + + months = sorted(m for m in monthly.keys() if m != "unknown") + cats = sorted(all_cats) + + # Compute cumulative and growth + rows_data = [] + cumulative: dict[str, int] = defaultdict(int) + prev_count: dict[str, int] = defaultdict(int) + + for month in months: + for cat in cats: + count = monthly[month].get(cat, 0) + cumulative[cat] += count + growth = 0.0 + if prev_count[cat] > 0: + growth = ((count - prev_count[cat]) / prev_count[cat]) * 100 + rows_data.append({ + "month": month, + "category": cat, + "count": count, + "cumulative": cumulative[cat], + "growth_rate": growth, + }) + prev_count[cat] = count + + # Display summary table + console.print(f"\n[bold]Category Trends[/] — {len(months)} months, {len(cats)} categories\n") + + # Show per-category totals and recent momentum + table = Table(title="Category Growth Summary") + table.add_column("Category", style="cyan") + table.add_column("Total", justify="right", width=6) + table.add_column("Last 3mo", justify="right", width=8) + table.add_column("Prev 3mo", justify="right", width=8) + table.add_column("Growth", justify="right", width=8) + + recent_months = months[-3:] if len(months) >= 3 else months + prev_months = months[-6:-3] if len(months) >= 6 else [] + + for cat in cats: + total = cumulative[cat] + recent = sum(monthly[m].get(cat, 0) for m in recent_months) + prev = sum(monthly[m].get(cat, 0) for m in prev_months) if prev_months else 0 + if prev > 0: + growth_str = f"{((recent - prev) / prev) * 100:+.0f}%" + elif recent > 0: + growth_str = "new" + else: + growth_str = "-" + table.add_row(cat, str(total), str(recent), str(prev) if prev_months else "-", growth_str) + + console.print(table) + + # Monthly detail + console.print(f"\n[bold]Monthly Breakdown[/]\n") + detail_table = Table() + detail_table.add_column("Month", style="dim", width=8) + for cat in cats: + detail_table.add_column(cat[:14], justify="right", width=max(6, len(cat[:14]))) + detail_table.add_column("Total", justify="right", width=6, style="bold") + + for month in months: + row = [month] + total = 0 + for cat in cats: + c = monthly[month].get(cat, 0) + total += c + row.append(str(c) if c else "") + row.append(str(total)) + detail_table.add_row(*row) + + console.print(detail_table) + + # Optional JSON output + if json_out: + out_path = Path(cfg.data_dir) / "reports" / "trends.json" + out_path.write_text(json_mod.dumps(rows_data, indent=2)) + console.print(f"\nJSON saved: [bold]{out_path}[/]") + + finally: + db.close() + + +# ── status ────────────────────────────────────────────────────────────── + + +@main.command() +@click.option("--wg", "-w", help="Filter to a specific WG") +def status(wg: str | None): + """Show WG adoption status — which drafts have institutional backing.""" + import json as json_mod + from collections import defaultdict + + cfg = _get_config() + db = Database(cfg) + + try: + all_status = db.draft_adoption_status() + total = len(all_status) + adopted = [s for s in all_status if s["wg_adopted"]] + individual = [s for s in all_status if not s["wg_adopted"]] + irtf = [s for s in all_status if s["stream"] == "irtf"] + + console.print(f"\n[bold]Draft Adoption Status[/]: {total} total drafts\n") + console.print(f" WG-adopted (draft-ietf-*): [bold green]{len(adopted)}[/] ({len(adopted)/total*100:.1f}%)") + console.print(f" IRTF (draft-irtf-*): [bold blue]{len(irtf)}[/]") + console.print(f" Individual: [bold]{len(individual)}[/] ({len(individual)/total*100:.1f}%)\n") + + # WG breakdown + wg_groups: dict[str, list[dict]] = defaultdict(list) + for s in adopted: + wg_groups[s["wg_name"]].append(s) + + if wg: + # Show drafts for a specific WG + wg_drafts = wg_groups.get(wg, []) + if not wg_drafts: + console.print(f"[yellow]No WG-adopted drafts for '{wg}'[/]") + return + table = Table(title=f"WG '{wg}' Drafts ({len(wg_drafts)})") + table.add_column("Date", style="dim", width=10) + table.add_column("Name", style="cyan") + table.add_column("Title", max_width=50) + for s in sorted(wg_drafts, key=lambda x: x["time"] or ""): + table.add_row(s["time"][:10] if s["time"] else "", s["name"], s["title"][:50]) + console.print(table) + else: + # Show WG summary + table = Table(title=f"Working Groups with AI/Agent Drafts ({len(wg_groups)} WGs)") + table.add_column("#", justify="right", width=4) + table.add_column("WG", style="cyan", width=12) + table.add_column("Drafts", justify="right", width=6) + table.add_column("Draft Names", max_width=60) + + for rank, (wg_name, drafts) in enumerate( + sorted(wg_groups.items(), key=lambda x: -len(x[1])), 1 + ): + draft_list = ", ".join(d["name"].replace("draft-ietf-", "")[:30] for d in drafts[:4]) + if len(drafts) > 4: + draft_list += f" +{len(drafts) - 4}" + table.add_row(str(rank), wg_name, str(len(drafts)), draft_list) + + console.print(table) + + # Score comparison + pairs = db.drafts_with_ratings(limit=500) + if pairs: + adopted_names = {s["name"] for s in adopted} + adopted_scores = [r.composite_score for d, r in pairs if d.name in adopted_names] + individual_scores = [r.composite_score for d, r in pairs if d.name not in adopted_names] + + if adopted_scores and individual_scores: + console.print(f"\n[bold]Score Comparison[/]:") + avg_adopted = sum(adopted_scores) / len(adopted_scores) + avg_individual = sum(individual_scores) / len(individual_scores) + console.print(f" WG-adopted avg score: [bold green]{avg_adopted:.2f}[/] ({len(adopted_scores)} rated)") + console.print(f" Individual avg score: [bold]{avg_individual:.2f}[/] ({len(individual_scores)} rated)") + + # Check gap coverage + gaps = db.all_gaps() + if gaps: + gap_cats = {g["category"].lower() for g in gaps} + adopted_cats: set[str] = set() + for d, r in pairs: + if d.name in adopted_names: + for c in r.categories: + adopted_cats.add(c.lower()) + + covered = gap_cats & adopted_cats + uncovered = gap_cats - adopted_cats + console.print(f"\n[bold]Gap Coverage by WG-Adopted Work[/]:") + console.print(f" Gap categories with WG backing: {len(covered)}") + if covered: + console.print(f" {', '.join(sorted(covered))}") + console.print(f" Gap categories without WG backing: {len(uncovered)}") + if uncovered: + console.print(f" [yellow]{', '.join(sorted(uncovered))}[/]") + + finally: + db.close() + + +# ── revisions ────────────────────────────────────────────────────────── + + +@main.command() +@click.option("--org", "-o", help="Filter to a specific organization") +@click.option("--top", "-n", default=20, help="Number of orgs to show") +def revisions(org: str | None, top: int): + """Analyze draft revision velocity — who iterates vs fire-and-forget.""" + from collections import defaultdict + from .orgs import normalize_org + + cfg = _get_config() + db = Database(cfg) + + try: + all_revs = db.revision_velocity() + total = len(all_revs) + at_00 = sum(1 for r in all_revs if r["rev_int"] == 0) + avg_rev = sum(r["rev_int"] for r in all_revs) / total if total else 0 + + console.print(f"\n[bold]Draft Revision Velocity[/]: {total} drafts\n") + console.print(f" Average revision: [bold]{avg_rev:.2f}[/]") + console.print(f" At -00 (first draft): [bold]{at_00}[/] ({at_00/total*100:.1f}%)") + console.print(f" Iterated (rev >= 01): [bold]{total - at_00}[/] ({(total-at_00)/total*100:.1f}%)") + console.print(f" Highly iterated (rev >= 05): [bold]{sum(1 for r in all_revs if r['rev_int'] >= 5)}[/]\n") + + # Get per-org stats using normalized org names + aff_rows = db.conn.execute( + "SELECT da.draft_name, a.affiliation FROM draft_authors da " + "JOIN authors a ON da.person_id = a.person_id " + "WHERE a.affiliation != ''" + ).fetchall() + + # Map draft -> rev + draft_rev = {r["name"]: r["rev_int"] for r in all_revs} + + # Group drafts by normalized org (deduped) + org_drafts: dict[str, set[str]] = defaultdict(set) + for row in aff_rows: + norm = normalize_org(row["affiliation"]) + if norm: + org_drafts[norm].add(row["draft_name"]) + + if org: + # Show drafts for a specific org + drafts = org_drafts.get(org, set()) + if not drafts: + console.print(f"[yellow]No drafts for '{org}'[/]") + return + table = Table(title=f"'{org}' Drafts by Revision ({len(drafts)})") + table.add_column("Rev", justify="right", width=4) + table.add_column("Name", style="cyan", max_width=50) + table.add_column("Title", max_width=40) + draft_details = [(d, draft_rev.get(d, 0)) for d in drafts] + for name, rev in sorted(draft_details, key=lambda x: -x[1]): + title_row = next((r["title"] for r in all_revs if r["name"] == name), "") + table.add_row(f"-{rev:02d}", name, title_row[:40]) + console.print(table) + else: + # Show org summary + org_stats = [] + for org_name, drafts in org_drafts.items(): + if len(drafts) < 3: + continue + revs = [draft_rev.get(d, 0) for d in drafts] + n_00 = sum(1 for r in revs if r == 0) + org_stats.append({ + "org": org_name, + "drafts": len(drafts), + "avg_rev": sum(revs) / len(revs), + "at_00": n_00, + "pct_00": n_00 / len(drafts) * 100, + "max_rev": max(revs), + }) + + org_stats.sort(key=lambda x: -x["drafts"]) + + table = Table(title=f"Revision Velocity by Organization (>= 3 drafts, top {top})") + table.add_column("#", justify="right", width=4) + table.add_column("Organization", style="cyan", width=28) + table.add_column("Drafts", justify="right", width=6) + table.add_column("Avg Rev", justify="right", width=8) + table.add_column("At -00", justify="right", width=6) + table.add_column("%-00", justify="right", width=6) + table.add_column("Max", justify="right", width=4) + + for rank, s in enumerate(org_stats[:top], 1): + table.add_row( + str(rank), s["org"][:28], str(s["drafts"]), + f"{s['avg_rev']:.2f}", str(s["at_00"]), + f"{s['pct_00']:.0f}%", str(s["max_rev"]), + ) + console.print(table) + + # Highlight the fire-and-forget vs iterators narrative + high_00 = [s for s in org_stats if s["pct_00"] >= 70 and s["drafts"] >= 5] + iterators = [s for s in org_stats if s["avg_rev"] >= 3.0 and s["drafts"] >= 3] + + if high_00: + console.print("\n[bold]Fire-and-Forget[/] (>= 70% at -00, >= 5 drafts):") + for s in high_00: + console.print(f" {s['org']}: {s['at_00']}/{s['drafts']} at -00 ({s['pct_00']:.0f}%)") + + if iterators: + console.print("\n[bold]Active Iterators[/] (avg revision >= 3.0):") + for s in iterators: + console.print(f" {s['org']}: avg rev {s['avg_rev']:.1f}, max -{s['max_rev']:02d}") + + # Generate report + from .reports import Reporter + reporter = Reporter(cfg, db) + path = reporter.revisions_report() + console.print(f"\nReport saved: [bold]{path}[/]") + + finally: + db.close() + + +# ── idea-overlap ──────────────────────────────────────────────────────── + + +@main.command("idea-overlap") +@click.option("--threshold", "-t", default=0.75, help="Title similarity threshold (0-1)") +@click.option("--limit", "-n", default=50, help="Max results to show") +def idea_overlap(threshold: float, limit: int): + """Find ideas that appear across multiple organizations.""" + from collections import defaultdict + from difflib import SequenceMatcher + from .orgs import normalize_org + + cfg = _get_config() + db = Database(cfg) + + try: + all_ideas = db.all_ideas() + if not all_ideas: + console.print("[yellow]No ideas extracted yet. Run `ietf ideas --all` first.[/]") + return + + # Build draft -> org mapping + draft_orgs: dict[str, set[str]] = defaultdict(set) + rows = db.conn.execute( + """SELECT da.draft_name, a.affiliation + FROM draft_authors da + JOIN authors a ON da.person_id = a.person_id + WHERE a.affiliation != ''""" + ).fetchall() + for r in rows: + org = normalize_org(r["affiliation"]) + if org and org != "Independent": + draft_orgs[r["draft_name"]].add(org) + + # Group similar ideas (same logic as ideas_report but tracking orgs) + idea_groups: list[dict] = [] + for idea in all_ideas: + title_lower = idea["title"].lower().strip() + matched = False + for group in idea_groups: + ratio = SequenceMatcher(None, title_lower, group["canonical"]).ratio() + if ratio >= threshold: + group["ideas"].append(idea) + group["drafts"].add(idea["draft_name"]) + group["orgs"].update(draft_orgs.get(idea["draft_name"], set())) + matched = True + break + if not matched: + idea_groups.append({ + "canonical": title_lower, + "title": idea["title"], + "ideas": [idea], + "drafts": {idea["draft_name"]}, + "orgs": set(draft_orgs.get(idea["draft_name"], set())), + }) + + # Filter to cross-org ideas (2+ orgs) + cross_org = [g for g in idea_groups if len(g["orgs"]) >= 2] + cross_org.sort(key=lambda g: (-len(g["orgs"]), -len(g["drafts"]))) + + console.print(f"\n[bold]Cross-Organization Idea Overlap[/]") + console.print(f"{len(all_ideas)} ideas, {len(idea_groups)} unique, " + f"[bold green]{len(cross_org)}[/] appear across 2+ orgs\n") + + if not cross_org: + console.print("[yellow]No cross-org idea overlap found at this threshold.[/]") + return + + table = Table(title=f"Ideas Shared Across Organizations (top {min(limit, len(cross_org))})") + table.add_column("#", justify="right", width=4) + table.add_column("Idea", style="bold", max_width=40) + table.add_column("Orgs", justify="right", width=5) + table.add_column("Drafts", justify="right", width=6) + table.add_column("Organizations", max_width=50) + + for rank, g in enumerate(cross_org[:limit], 1): + org_list = ", ".join(sorted(g["orgs"])[:5]) + if len(g["orgs"]) > 5: + org_list += f" +{len(g['orgs']) - 5}" + table.add_row( + str(rank), g["title"][:40], str(len(g["orgs"])), + str(len(g["drafts"])), org_list, + ) + + console.print(table) + + # Also generate the report + from .reports import Reporter + reporter = Reporter(cfg, db) + path = reporter.idea_overlap_report() + console.print(f"\nReport saved: [bold]{path}[/]") + + finally: + db.close() + + +# ── co-occurrence ────────────────────────────────────────────────────── + + +@main.command("co-occurrence") +def co_occurrence(): + """Category co-occurrence matrix — which categories appear together.""" + from collections import defaultdict + + cfg = _get_config() + db = Database(cfg) + + try: + pairs = db.drafts_with_ratings(limit=500) + total = len(pairs) + multi_cat = sum(1 for d, r in pairs if len(r.categories) > 1) + + console.print(f"\n[bold]Category Co-occurrence Analysis[/]: {total} drafts\n") + console.print(f" Multi-category drafts: [bold]{multi_cat}[/] ({multi_cat/total*100:.1f}%)\n") + + # Build counts + cat_counts: dict[str, int] = defaultdict(int) + cooccur: dict[tuple[str, str], int] = defaultdict(int) + for d, r in pairs: + for c in r.categories: + cat_counts[c] += 1 + for i, c1 in enumerate(r.categories): + for c2 in r.categories[i + 1:]: + key = tuple(sorted([c1, c2])) + cooccur[key] += 1 + + # Top co-occurrences + table = Table(title="Top 15 Category Co-occurrences") + table.add_column("#", justify="right", width=4) + table.add_column("Category A", style="cyan", width=22) + table.add_column("Category B", style="cyan", width=22) + table.add_column("Count", justify="right", width=6) + + top_pairs = sorted(cooccur.items(), key=lambda x: -x[1])[:15] + for rank, ((c1, c2), n) in enumerate(top_pairs, 1): + table.add_row(str(rank), c1, c2, str(n)) + console.print(table) + + # AI safety isolation check + safety_cooccur = {k: v for k, v in cooccur.items() if "AI safety/alignment" in k} + if safety_cooccur: + console.print("\n[bold]AI Safety/Alignment Co-occurrences[/]:") + for (c1, c2), n in sorted(safety_cooccur.items(), key=lambda x: -x[1]): + other = c2 if c1 == "AI safety/alignment" else c1 + console.print(f" {n:>3d} + {other}") + + # Generate report + from .reports import Reporter + reporter = Reporter(cfg, db) + path = reporter.co_occurrence_report() + console.print(f"\nReport saved: [bold]{path}[/]") + + finally: + db.close() + + +# ── centrality ───────────────────────────────────────────────────────── + + +@main.command() +@click.option("--top", "-n", default=20, help="Number of results to show") +def centrality(top: int): + """Author network centrality — bridge-builders and key connectors.""" + import networkx as nx + from collections import defaultdict + from .orgs import normalize_org + + cfg = _get_config() + db = Database(cfg) + + try: + # Build co-authorship graph + rows = db.conn.execute( + """SELECT da1.person_id as p1, da2.person_id as p2, COUNT(*) as shared + FROM draft_authors da1 + JOIN draft_authors da2 ON da1.draft_name = da2.draft_name + AND da1.person_id < da2.person_id + GROUP BY da1.person_id, da2.person_id""" + ).fetchall() + + G = nx.Graph() + for r in rows: + G.add_edge(r[0], r[1], weight=r[2]) + + persons = db.conn.execute( + "SELECT person_id, name, affiliation FROM authors" + ).fetchall() + person_info = {r[0]: (r[1], normalize_org(r[2])) for r in persons} + + console.print(f"\n[bold]Author Network Analysis[/]: {G.number_of_nodes()} authors, {G.number_of_edges()} co-authorship edges\n") + + # Cross-org vs intra-org edges + chinese_orgs = { + "Huawei", "China Mobile", "China Telecom", "China Unicom", + "ZTE Corporation", "Tsinghua University", "BUPT", + "Pengcheng Laboratory", "CAICT", "AsiaInfo", + "Zhongguancun Laboratory", "CNIC, CAS", + "Tsinghua Shenzhen International Graduate School & Pengcheng Laboratory", + "Huazhong University of Science and Technology", + } + cross_org = intra_org = cross_divide = 0 + for u, v in G.edges(): + _, org_u = person_info.get(u, ("?", "")) + _, org_v = person_info.get(v, ("?", "")) + if org_u and org_v: + if org_u == org_v: + intra_org += 1 + else: + cross_org += 1 + if (org_u in chinese_orgs) != (org_v in chinese_orgs): + cross_divide += 1 + + total_edges = cross_org + intra_org + console.print(f" Intra-org edges: [bold]{intra_org}[/] ({intra_org/total_edges*100:.1f}%)") + console.print(f" Cross-org edges: [bold]{cross_org}[/] ({cross_org/total_edges*100:.1f}%)") + console.print(f" Cross Chinese-Western edges: [bold]{cross_divide}[/]") + + avg_clustering = nx.average_clustering(G) + components = list(nx.connected_components(G)) + console.print(f" Clustering coefficient: [bold]{avg_clustering:.3f}[/]") + console.print(f" Connected components: [bold]{len(components)}[/], largest: {len(max(components, key=len))}\n") + + # Betweenness centrality + bc = nx.betweenness_centrality(G) + + table = Table(title=f"Top {top} Authors by Betweenness Centrality") + table.add_column("#", justify="right", width=4) + table.add_column("Author", style="bold", width=28) + table.add_column("Organization", style="cyan", width=20) + table.add_column("BC Score", justify="right", width=8) + table.add_column("Degree", justify="right", width=6) + table.add_column("CN/West", justify="center", width=8) + + top_bc = sorted(bc.items(), key=lambda x: -x[1])[:top] + for rank, (pid, score) in enumerate(top_bc, 1): + name, org = person_info.get(pid, ("?", "?")) + degree = G.degree(pid) + cn = sum(1 for n in G.neighbors(pid) if person_info.get(n, ("", ""))[1] in chinese_orgs) + west = sum(1 for n in G.neighbors(pid) if person_info.get(n, ("", ""))[1] not in chinese_orgs and person_info.get(n, ("", ""))[1]) + table.add_row(str(rank), name[:28], org[:20], f"{score:.4f}", str(degree), f"{cn}/{west}") + + console.print(table) + + # Bridge-builders + bridges = [] + for pid in G.nodes(): + name, org = person_info.get(pid, ("?", "")) + cn = sum(1 for n in G.neighbors(pid) if person_info.get(n, ("", ""))[1] in chinese_orgs) + west = sum(1 for n in G.neighbors(pid) if person_info.get(n, ("", ""))[1] not in chinese_orgs and person_info.get(n, ("", ""))[1]) + if cn > 0 and west > 0: + bridges.append((pid, name, org, bc.get(pid, 0), cn, west)) + + bridges.sort(key=lambda x: -x[3]) + console.print(f"\n[bold]Cross-Divide Bridge-Builders[/] ({len(bridges)} people with neighbors in both blocs):\n") + for pid, name, org, bc_score, cn, west in bridges[:10]: + console.print(f" [bold]{name}[/] ({org}): BC={bc_score:.4f}, CN neighbors={cn}, Western={west}") + + # Generate report + from .reports import Reporter + reporter = Reporter(cfg, db) + path = reporter.centrality_report() + console.print(f"\nReport saved: [bold]{path}[/]") + + finally: + db.close() + + # ── draft-gen ─────────────────────────────────────────────────────────── @@ -834,3 +1641,386 @@ def config_cmd(set_key: tuple[str, str] | None): from dataclasses import asdict for key, val in asdict(cfg).items(): console.print(f" [bold]{key}:[/] {val}") + + +# ── pipeline ──────────────────────────────────────────────────────────────── + + +@main.group() +def pipeline(): + """Gap-to-Draft generation pipeline.""" + pass + + +@pipeline.command("context") +@click.argument("gap_topic") +def pipeline_context(gap_topic: str): + """Preview assembled context for a gap topic (dry run).""" + from .pipeline import ContextBuilder + + cfg = _get_config() + db = Database(cfg) + try: + builder = ContextBuilder(cfg, db) + ctx = builder.build_context(gap_topic) + console.print(f"\n[bold]Context for gap: {gap_topic}[/]\n") + + gap = ctx.get("gap") + if gap: + console.print(f"[cyan]Gap:[/] {gap.get('topic', '?')}") + console.print(f" {gap.get('description', '')[:200]}") + console.print(f" Severity: {gap.get('severity', '?')}") + + ideas = ctx.get("ideas", []) + console.print(f"\n[cyan]Convergent ideas:[/] {len(ideas)}") + for idea in ideas[:10]: + console.print(f" - {idea.get('title', '?')}: {idea.get('description', '')[:80]}") + + rfcs = ctx.get("rfc_foundations", []) + console.print(f"\n[cyan]RFC foundations:[/] {len(rfcs)}") + for ref_id, count in rfcs[:10]: + console.print(f" - RFC {ref_id} (cited by {count} drafts)") + + similar = ctx.get("similar_drafts", []) + console.print(f"\n[cyan]Similar existing drafts:[/] {len(similar)}") + for name, score in similar[:8]: + console.print(f" - {name} (similarity: {score:.3f})") + + top_rated = ctx.get("top_rated", []) + console.print(f"\n[cyan]Top-rated in category:[/] {len(top_rated)}") + + wg_ctx = ctx.get("wg_context", []) + adopted = [w for w in wg_ctx if w.get("wg_adopted")] + console.print(f"\n[cyan]WG context:[/] {len(adopted)} WG-adopted drafts") + + vision = ctx.get("ecosystem_vision", "") + if vision: + console.print(f"\n[cyan]Ecosystem vision:[/] {len(vision)} chars loaded") + finally: + db.close() + + +@pipeline.command("generate") +@click.argument("gap_topic") +@click.option("--cheap/--quality", default=False, help="Use Haiku (cheap) or Sonnet (quality)") +@click.option("--dry-run", is_flag=True, help="Show outline only, don't generate sections") +@click.option("--family", "family_name", default="", help="Family name for multi-draft generation") +def pipeline_generate(gap_topic: str, cheap: bool, dry_run: bool, family_name: str): + """Generate a single draft from a gap topic.""" + from .analyzer import Analyzer + from .pipeline import PipelineGenerator, ContextBuilder + + cfg = _get_config() + db = Database(cfg) + analyzer = Analyzer(cfg, db) + + try: + builder = ContextBuilder(cfg, db) + generator = PipelineGenerator(cfg, db, analyzer) + ctx = builder.build_context(gap_topic) + + console.print(f"[bold]Generating draft for gap: {gap_topic}[/]") + + outline = generator.generate_outline(ctx, cheap=cheap) + console.print(f" Title: [cyan]{outline.get('title', '?')}[/]") + console.print(f" Sections: {len(outline.get('sections', []))}") + console.print(f" Target WG: {outline.get('target_wg', '?')}") + + if dry_run: + import json + console.print("\n[bold]Outline (dry run):[/]") + console.print(json.dumps(outline, indent=2)) + return + + result = generator.generate_full(gap_topic, cheap=cheap) + console.print(f"\n[bold green]Draft generated![/]") + console.print(f" ID: {result.get('id', '?')}") + console.print(f" Draft name: {result.get('draft_name', '?')}") + + # Export text file + output_dir = Path(cfg.data_dir) / "reports" / "generated-drafts" + output_dir.mkdir(parents=True, exist_ok=True) + draft_name = result.get("draft_name", "draft-unknown") + out_path = output_dir / f"{draft_name}.txt" + if result.get("full_text"): + out_path.write_text(result["full_text"]) + console.print(f" Saved: {out_path}") + finally: + db.close() + + +@pipeline.command("family") +@click.option("--name", "family_name", default="agent-ecosystem", help="Family name") +@click.option("--cheap/--quality", default=False, help="Use Haiku (cheap) or Sonnet (quality)") +def pipeline_family(family_name: str, cheap: bool): + """Generate the full 5-draft ecosystem family.""" + from .analyzer import Analyzer + from .pipeline import FamilyCoordinator + + cfg = _get_config() + db = Database(cfg) + analyzer = Analyzer(cfg, db) + + try: + coordinator = FamilyCoordinator(cfg, db, analyzer) + console.print(f"[bold]Generating draft family: {family_name}[/]\n") + results = coordinator.generate_family(family_name=family_name, cheap=cheap) + console.print(f"\n[bold green]Generated {len(results)} drafts![/]") + + # Export all + output_dir = Path(cfg.data_dir) / "reports" / "generated-drafts" + output_dir.mkdir(parents=True, exist_ok=True) + + for r in results: + draft_name = r.get("draft_name", "draft-unknown") + if r.get("full_text"): + out_path = output_dir / f"{draft_name}.txt" + out_path.write_text(r["full_text"]) + console.print(f" [green]{r.get('family_role', '?')}[/] → {out_path}") + + # Family summary + summary_path = output_dir / "family-summary.md" + lines = [f"# Draft Family: {family_name}\n"] + for r in results: + lines.append(f"## {r.get('family_role', '?')}: {r.get('title', '?')}") + lines.append(f"- Draft: `{r.get('draft_name', '?')}`") + lines.append(f"- Gap: {r.get('gap_topic', '?')}") + lines.append(f"- Sections: {len(r.get('sections', []))}") + lines.append("") + summary_path.write_text("\n".join(lines)) + console.print(f"\n Summary: {summary_path}") + + # Consistency check + consistency = coordinator.check_consistency(family_name) + if consistency.get("issues"): + console.print(f"\n[yellow]Consistency issues:[/]") + for issue in consistency["issues"]: + console.print(f" - {issue}") + else: + console.print(f"\n[green]No consistency issues found[/]") + finally: + db.close() + + +@pipeline.command("quality") +@click.argument("draft_id", type=int) +def pipeline_quality(draft_id: int): + """Run quality gates on a generated draft.""" + from .analyzer import Analyzer + from .pipeline import QualityGates + + cfg = _get_config() + db = Database(cfg) + analyzer = Analyzer(cfg, db) + + try: + gates = QualityGates(cfg, db, analyzer) + console.print(f"[bold]Running quality gates on draft #{draft_id}[/]\n") + results = gates.run_all(draft_id) + + for gate_name, result in results.items(): + status = "[green]PASS[/]" if result["passed"] else "[red]FAIL[/]" + console.print(f" {status} {gate_name}: {result.get('details', '')[:100]}") + if "score" in result: + console.print(f" Score: {result['score']:.2f}") + finally: + db.close() + + +@pipeline.command("status") +def pipeline_status(): + """Show all generated drafts.""" + cfg = _get_config() + db = Database(cfg) + try: + drafts = db.get_generated_drafts() + if not drafts: + console.print("No generated drafts yet. Run `ietf pipeline generate `") + return + + table = Table(title=f"Generated Drafts ({len(drafts)})") + table.add_column("ID", justify="right", width=4) + table.add_column("Draft Name", style="cyan") + table.add_column("Gap Topic") + table.add_column("Family", width=15) + table.add_column("Status", width=10) + table.add_column("Quality", justify="right", width=7) + table.add_column("Created", width=10) + + for d in drafts: + table.add_row( + str(d["id"]), + d["draft_name"], + d["gap_topic"][:30], + d.get("family_name", ""), + d.get("status", "?"), + f"{d.get('quality_score', 0):.1f}" if d.get("quality_score") else "-", + (d.get("created_at") or "")[:10], + ) + console.print(table) + finally: + db.close() + + +@pipeline.command("export") +@click.argument("draft_id", type=int) +@click.option("--output", "-o", help="Output file path") +def pipeline_export(draft_id: int, output: str | None): + """Export a generated draft as I-D text.""" + cfg = _get_config() + db = Database(cfg) + try: + draft = db.get_generated_draft(draft_id) + if not draft: + console.print(f"[red]Draft #{draft_id} not found[/]") + return + + text = draft.get("full_text", "") + if not text: + console.print(f"[red]Draft #{draft_id} has no generated text[/]") + return + + if output: + out_path = Path(output) + else: + output_dir = Path(cfg.data_dir) / "reports" / "generated-drafts" + output_dir.mkdir(parents=True, exist_ok=True) + out_path = output_dir / f"{draft['draft_name']}.txt" + + out_path.write_text(text) + console.print(f"Exported: [bold green]{out_path}[/]") + finally: + db.close() + + +# ── observatory ───────────────────────────────────────────────────────────── + + +@main.group() +def observatory(): + """Living Standards Observatory — monitor AI standards across bodies.""" + pass + + +@observatory.command("update") +@click.option("--source", "-s", default=None, help="Comma-separated sources (e.g. ietf,w3c)") +@click.option("--full/--delta", default=False, help="Full refresh or delta only") +def observatory_update(source: str | None, full: bool): + """Fetch, analyze, and update the observatory.""" + from .observatory import Observatory + from .analyzer import Analyzer + + cfg = _get_config() + db = Database(cfg) + analyzer = Analyzer(cfg, db) + + try: + obs = Observatory(cfg, db, analyzer) + sources = source.split(",") if source else None + console.print(f"[bold]Observatory update[/] ({'full' if full else 'delta'})") + result = obs.update(sources=sources, full=full) + + console.print(f"\n[bold green]Update complete![/]") + console.print(f" New docs: {result.get('new_docs', 0)}") + console.print(f" Analyzed: {result.get('analyzed', 0)}") + console.print(f" Embedded: {result.get('embedded', 0)}") + console.print(f" Ideas extracted: {result.get('ideas', 0)}") + if result.get("gaps_updated"): + console.print(f" Gaps re-analyzed: yes ({result.get('gap_count', 0)} gaps)") + finally: + db.close() + + +@observatory.command("dashboard") +def observatory_dashboard(): + """Regenerate the static dashboard site.""" + from .dashboard import DashboardGenerator + + cfg = _get_config() + db = Database(cfg) + + try: + gen = DashboardGenerator(cfg, db) + path = gen.generate() + console.print(f"[bold green]Dashboard generated:[/] {path}") + console.print(f" Open: file://{path}/index.html") + finally: + db.close() + + +@observatory.command("status") +def observatory_status(): + """Show observatory status — doc counts, sources, last update.""" + from .observatory import Observatory + + cfg = _get_config() + db = Database(cfg) + + try: + obs = Observatory(cfg, db) + status = obs.status() + + console.print(f"\n[bold]Observatory Status[/]\n") + console.print(f" Total documents: [bold]{status.get('total_docs', 0)}[/]") + console.print(f" Unrated: {status.get('unrated', 0)}") + console.print(f" Unembedded: {status.get('unembedded', 0)}") + console.print(f" Gaps: {status.get('gaps', 0)}") + + sources = status.get("sources", {}) + if sources: + console.print(f"\n [bold]Sources:[/]") + for name, count in sources.items(): + console.print(f" {name}: {count} docs") + + last_update = status.get("last_update") + if last_update: + console.print(f"\n Last update: {last_update[:10]}") + console.print(f" Snapshots: {status.get('snapshots', 0)}") + finally: + db.close() + + +@observatory.command("snapshot") +def observatory_snapshot(): + """Record current state as a snapshot.""" + cfg = _get_config() + db = Database(cfg) + try: + snap_id = db.create_snapshot() + gaps = db.all_gaps() + if gaps: + db.record_gap_history(snap_id, gaps) + console.print(f"[bold green]Snapshot #{snap_id} created[/] ({db.count_drafts()} docs, {len(gaps)} gaps)") + finally: + db.close() + + +@observatory.command("diff") +@click.option("--since", help="Show changes since this date (YYYY-MM-DD)") +def observatory_diff(since: str | None): + """Show what changed since a date.""" + from .observatory import Observatory + + cfg = _get_config() + db = Database(cfg) + + try: + obs = Observatory(cfg, db) + result = obs.diff(since=since) + + console.print(f"\n[bold]Observatory Diff[/]") + if since: + console.print(f" Since: {result.get('since', since)}") + + new_docs = result.get("new_docs", []) + console.print(f" New documents: {result.get('new_doc_count', len(new_docs))}") + gap_changes = result.get("gap_changes", []) + console.print(f" Gap history entries: {len(gap_changes)}") + + if new_docs: + console.print(f"\n [bold]New documents:[/]") + for doc in new_docs[:20]: + d = dict(doc) if not isinstance(doc, dict) else doc + console.print(f" [{d.get('source', '?')}] {d.get('name', '?')}: {d.get('title', '')[:60]}") + finally: + db.close() diff --git a/src/ietf_analyzer/config.py b/src/ietf_analyzer/config.py index e9a1b71..1882d07 100644 --- a/src/ietf_analyzer/config.py +++ b/src/ietf_analyzer/config.py @@ -16,6 +16,12 @@ DEFAULT_KEYWORDS = [ "autonomous", "machine-learning", "artificial-intelligence", + "mcp", + "agentic", + "inference", + "generative", + "intelligent", + "aipref", ] @@ -32,6 +38,15 @@ class Config: fetch_since: str = "2024-01-01" # Polite delay between API requests (seconds) fetch_delay: float = 0.5 + # Pipeline + generation_max_tokens: int = 4096 + generation_model: str = "" # defaults to claude_model + # Observatory + observatory_sources: list[str] = field(default_factory=lambda: ["ietf"]) + dashboard_dir: str = str(DEFAULT_DATA_DIR.parent / "docs") + w3c_groups: list[str] = field(default_factory=lambda: [ + "webmachinelearning", "wot", "credentials", "did", "vc" + ]) def save(self) -> None: Path(self.data_dir).mkdir(parents=True, exist_ok=True) diff --git a/src/ietf_analyzer/dashboard.py b/src/ietf_analyzer/dashboard.py new file mode 100644 index 0000000..e483c19 --- /dev/null +++ b/src/ietf_analyzer/dashboard.py @@ -0,0 +1,981 @@ +"""Static dashboard generator for GitHub Pages — Living Standards Observatory.""" + +from __future__ import annotations + +import json +from collections import Counter, defaultdict +from datetime import datetime, timezone +from pathlib import Path + +from .config import Config +from .db import Database +from .models import Rating + +console = None + + +def _get_console(): + global console + if console is None: + from rich.console import Console + + console = Console() + return console + + +class DashboardGenerator: + """Generate a static GitHub Pages site under docs/.""" + + def __init__(self, config: Config | None = None, db: Database | None = None): + self.config = config or Config.load() + self.db = db or Database(self.config) + self.output_dir = Path(self.config.dashboard_dir) + + def generate(self) -> str: + """Generate full static site. Returns path to docs/.""" + con = _get_console() + self.output_dir.mkdir(parents=True, exist_ok=True) + (self.output_dir / "observatory").mkdir(exist_ok=True) + (self.output_dir / "data").mkdir(exist_ok=True) + (self.output_dir / "assets").mkdir(exist_ok=True) + + con.print("[bold]Generating dashboard...[/]") + + self._generate_data_files() + con.print(" [green]OK[/] Data files") + + self._generate_style() + con.print(" [green]OK[/] Styles") + + self._generate_index() + con.print(" [green]OK[/] Index page") + + self._generate_explorer() + con.print(" [green]OK[/] Explorer page") + + self._generate_gaps_page() + con.print(" [green]OK[/] Gaps page") + + self._generate_timeline_page() + con.print(" [green]OK[/] Timeline page") + + con.print(f"\n[bold green]Dashboard generated at {self.output_dir}/[/]") + return str(self.output_dir) + + # ── Data files ────────────────────────────────────────────────────────── + + def _generate_data_files(self) -> None: + """Write JSON data files to docs/data/.""" + data_dir = self.output_dir / "data" + + # observatory.json — key metrics + total = self.db.count_drafts() + sources = self.db.all_sources() + gaps = self.db.all_gaps() + snapshots = self.db.get_snapshots(limit=1) + unrated = len(self.db.unrated_drafts(limit=10000)) + idea_count = self.db.idea_count() + author_count = self.db.author_count() + + observatory_data = { + "total_docs": total, + "sources": {s["name"]: s["doc_count"] for s in sources}, + "gaps_count": len(gaps), + "unrated": unrated, + "ideas": idea_count, + "authors": author_count, + "last_update": snapshots[0]["snapshot_at"] if snapshots else None, + } + (data_dir / "observatory.json").write_text(json.dumps(observatory_data, indent=2)) + + # drafts.json — all docs with ratings + pairs = self.db.drafts_with_ratings(limit=1000) + drafts_data = [] + for d, r in pairs: + drafts_data.append({ + "name": d.name, + "title": d.title, + "date": d.date, + "source": d.source or "ietf", + "url": d.source_url or d.datatracker_url, + "pages": d.pages or 0, + "group": d.group or "individual", + "score": round(r.composite_score, 2), + "novelty": r.novelty, + "maturity": r.maturity, + "overlap": r.overlap, + "momentum": r.momentum, + "relevance": r.relevance, + "categories": r.categories, + "summary": r.summary, + "novelty_note": r.novelty_note, + "maturity_note": r.maturity_note, + "overlap_note": r.overlap_note, + "momentum_note": r.momentum_note, + "relevance_note": r.relevance_note, + "doc_status": d.doc_status or "", + }) + (data_dir / "drafts.json").write_text(json.dumps(drafts_data, indent=2)) + + # gaps.json — current gaps + history + gap_history = self.db.gap_history_timeline() + gaps_data = { + "current": gaps, + "history": gap_history, + } + (data_dir / "gaps.json").write_text(json.dumps(gaps_data, indent=2)) + + # timeline.json — monthly counts by source and category + all_drafts = self.db.list_drafts(limit=2000, order_by="time ASC") + rating_map = {d.name: r for d, r in pairs} + monthly: dict[str, dict[str, int]] = defaultdict(lambda: defaultdict(int)) + monthly_source: dict[str, dict[str, int]] = defaultdict(lambda: defaultdict(int)) + + for d in all_drafts: + month = d.time[:7] if d.time else "unknown" + src = d.source or "ietf" + monthly_source[month][src] += 1 + r = rating_map.get(d.name) + if r: + for c in r.categories: + monthly[month][c] += 1 + + months = sorted(set(list(monthly.keys()) + list(monthly_source.keys()))) + all_cats: set[str] = set() + for mc in monthly.values(): + all_cats.update(mc.keys()) + all_sources_set: set[str] = set() + for ms in monthly_source.values(): + all_sources_set.update(ms.keys()) + + timeline_data = { + "months": months, + "by_category": {m: dict(monthly.get(m, {})) for m in months}, + "by_source": {m: dict(monthly_source.get(m, {})) for m in months}, + "categories": sorted(all_cats), + "sources": sorted(all_sources_set), + } + (data_dir / "timeline.json").write_text(json.dumps(timeline_data, indent=2)) + + # meta.json + meta = { + "generated_at": datetime.now(timezone.utc).isoformat(), + "version": "0.3.0", + "project": "IETF Living Standards Observatory", + } + (data_dir / "meta.json").write_text(json.dumps(meta, indent=2)) + + # ── Style ─────────────────────────────────────────────────────────────── + + def _generate_style(self) -> None: + """Shared CSS.""" + css = """\ +:root { + --bg: #f5f7fa; + --card-bg: #ffffff; + --text: #1a1a2e; + --text-dim: #666; + --accent: #4a6cf7; + --accent-light: rgba(74,108,247,0.1); + --green: #10b981; + --orange: #f59e0b; + --red: #ef4444; + --border: #e5e7eb; + --shadow: 0 1px 4px rgba(0,0,0,0.08); + --radius: 10px; +} +* { margin: 0; padding: 0; box-sizing: border-box; } +body { + font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, sans-serif; + background: var(--bg); color: var(--text); + line-height: 1.5; +} +a { color: var(--accent); text-decoration: none; } +a:hover { text-decoration: underline; } + +/* Layout */ +.container { max-width: 1200px; margin: 0 auto; padding: 20px; } +.header { + background: var(--card-bg); border-bottom: 1px solid var(--border); + padding: 16px 0; margin-bottom: 24px; +} +.header .container { display: flex; align-items: center; justify-content: space-between; } +.header h1 { font-size: 1.3rem; } +.header nav { display: flex; gap: 20px; font-size: 0.9rem; } +.header nav a { color: var(--text-dim); font-weight: 500; } +.header nav a:hover, .header nav a.active { color: var(--accent); text-decoration: none; } + +/* Cards */ +.cards { display: grid; grid-template-columns: repeat(auto-fit, minmax(200px, 1fr)); gap: 16px; margin-bottom: 24px; } +.card { + background: var(--card-bg); border-radius: var(--radius); + padding: 20px; box-shadow: var(--shadow); +} +.card .label { font-size: 0.8rem; color: var(--text-dim); text-transform: uppercase; letter-spacing: 0.5px; } +.card .value { font-size: 2rem; font-weight: 700; margin-top: 4px; } +.card .sub { font-size: 0.8rem; color: var(--text-dim); margin-top: 4px; } + +/* Tables */ +.panel { + background: var(--card-bg); border-radius: var(--radius); + box-shadow: var(--shadow); overflow: hidden; margin-bottom: 24px; +} +.panel-header { padding: 16px 20px; border-bottom: 1px solid var(--border); font-weight: 600; } +table { width: 100%; border-collapse: collapse; } +th { + background: #f8f9fb; padding: 10px 12px; text-align: left; + font-size: 0.78rem; color: var(--text-dim); cursor: pointer; user-select: none; + white-space: nowrap; border-bottom: 2px solid var(--border); +} +th:hover { color: var(--accent); } +td { padding: 10px 12px; border-bottom: 1px solid #f0f0f0; font-size: 0.83rem; vertical-align: top; } +tr:hover { background: #fafbff; } + +/* Controls */ +.controls { + background: var(--card-bg); border-radius: var(--radius); + padding: 16px 20px; margin-bottom: 16px; box-shadow: var(--shadow); +} +.controls-row { display: flex; gap: 16px; align-items: center; flex-wrap: wrap; margin-bottom: 10px; } +.controls-row:last-child { margin-bottom: 0; } +.search-box { + flex: 1; min-width: 250px; padding: 8px 14px; + border: 1px solid var(--border); border-radius: 6px; + font-size: 0.9rem; outline: none; +} +.search-box:focus { border-color: var(--accent); box-shadow: 0 0 0 2px var(--accent-light); } +.slider-group { display: flex; align-items: center; gap: 6px; font-size: 0.8rem; color: var(--text-dim); } +.slider-group input[type=range] { width: 100px; cursor: pointer; } +.slider-val { font-weight: 600; min-width: 24px; text-align: center; } + +/* Chips */ +.chip-row { display: flex; flex-wrap: wrap; gap: 6px; } +.chip { + display: inline-block; padding: 3px 10px; border-radius: 12px; + font-size: 0.75rem; cursor: pointer; border: 1px solid var(--border); + background: var(--card-bg); transition: all 0.15s; user-select: none; +} +.chip.active { background: var(--accent); color: #fff; border-color: var(--accent); } +.chip:hover { border-color: var(--accent); } + +/* Badges */ +.score-badge { + display: inline-block; padding: 2px 8px; border-radius: 10px; + font-weight: 600; font-size: 0.8rem; +} +.score-high { background: #d4edda; color: #155724; } +.score-mid { background: #fff3cd; color: #856404; } +.score-low { background: #f8d7da; color: #721c24; } +.cat-badge { + display: inline-block; padding: 1px 7px; border-radius: 8px; + font-size: 0.68rem; margin: 1px 2px; background: #e8eaf6; color: #3949ab; +} +.source-badge { + display: inline-block; padding: 1px 7px; border-radius: 8px; + font-size: 0.68rem; margin: 1px 2px; +} +.source-ietf { background: #e3f2fd; color: #1565c0; } +.source-w3c { background: #fce4ec; color: #c62828; } + +/* Severity */ +.sev-critical { color: var(--red); font-weight: 600; } +.sev-high { color: var(--orange); font-weight: 600; } +.sev-medium { color: var(--text); } +.sev-low { color: var(--text-dim); } + +/* Bar */ +.bar { display: inline-block; height: 10px; border-radius: 3px; background: var(--accent); vertical-align: middle; } + +/* Detail */ +.detail-row td { padding: 12px 20px; background: #f8faff; } +.detail-grid { display: grid; grid-template-columns: 1fr 1fr; gap: 10px; max-width: 800px; } +.detail-item { font-size: 0.82rem; } +.detail-item strong { color: #333; } +.detail-item .note { color: var(--text-dim); font-size: 0.78rem; } +.summary-text { font-size: 0.82rem; color: #444; margin-top: 6px; line-height: 1.4; } + +/* Chart container */ +.chart-container { + background: var(--card-bg); border-radius: var(--radius); + box-shadow: var(--shadow); padding: 20px; margin-bottom: 24px; +} + +/* Gap cards */ +.gap-card { + background: var(--card-bg); border-radius: var(--radius); + border-left: 4px solid var(--accent); padding: 16px 20px; + box-shadow: var(--shadow); margin-bottom: 12px; +} +.gap-card h3 { font-size: 0.95rem; margin-bottom: 4px; } +.gap-card p { font-size: 0.83rem; color: var(--text-dim); margin-bottom: 4px; } +.gap-card .meta { font-size: 0.75rem; color: var(--text-dim); } +.gap-card.critical { border-left-color: var(--red); } +.gap-card.high { border-left-color: var(--orange); } + +.dim { font-size: 0.75rem; color: var(--text-dim); } +.clickable { cursor: pointer; } +.reset-btn { + padding: 4px 12px; border: 1px solid var(--border); border-radius: 6px; + background: var(--card-bg); cursor: pointer; font-size: 0.78rem; color: var(--text-dim); +} +.reset-btn:hover { border-color: var(--accent); color: var(--accent); } +.result-count { font-size: 0.85rem; color: var(--text-dim); margin: 10px 0 8px; } + +/* Timeline bars */ +.tl-bar { + display: inline-block; height: 16px; border-radius: 3px; + vertical-align: middle; min-width: 2px; +} + +@media (max-width: 768px) { + .cards { grid-template-columns: 1fr 1fr; } + .controls-row { flex-direction: column; align-items: stretch; } + .detail-grid { grid-template-columns: 1fr; } +} +""" + (self.output_dir / "assets" / "style.css").write_text(css) + + # ── Shared HTML pieces ────────────────────────────────────────────────── + + def _header_html(self, active: str = "") -> str: + def active_cls(page: str) -> str: + return ' class="active"' if page == active else "" + + return f"""\ +
+
+

Living Standards Observatory

+ +
+
""" + + def _index_header_html(self) -> str: + return """\ +
+
+

Living Standards Observatory

+ +
+
""" + + # ── Index page ────────────────────────────────────────────────────────── + + def _generate_index(self) -> None: + """Landing page with key metrics dashboard.""" + html = f"""\ + + + + + +Living Standards Observatory + + + +{self._index_header_html()} +
+ +
+
Total Documents
--
+
Standards Bodies
--
Active sources
+
Open Gaps
--
Identified coverage gaps
+
Ideas Extracted
--
Technical contributions
+
Authors Tracked
--
Individual contributors
+
Last Update
--
+
+ +
+
Top Rated Documents
+ + + + + +
ScoreDocumentSourceDateCategories
+
+ +
+
Critical & High Severity Gaps
+
+
+ +
+ + + +""" + (self.output_dir / "index.html").write_text(html) + + # ── Explorer page ─────────────────────────────────────────────────────── + + def _generate_explorer(self) -> None: + """Multi-source draft browser with search, filters, score sliders.""" + html = f"""\ + + + + + +Explorer - Living Standards Observatory + + + +{self._header_html("explorer")} +
+ +
+
+ + +
Min score: 1.0
+
Min novelty: 1
+
Max overlap: 5
+ +
+
+
+
+
+ +
+ + + + + + + + + + + + + + + + + +
Score Draft Src Date NMOMomRCategories
+ +
+ + + +""" + (self.output_dir / "observatory" / "explorer.html").write_text(html) + + # ── Gaps page ─────────────────────────────────────────────────────────── + + def _generate_gaps_page(self) -> None: + """Gap tracker with fill-status over time.""" + html = f"""\ + + + + + +Gaps - Living Standards Observatory + + + +{self._header_html("gaps")} +
+ +

Coverage Gaps

+

Areas, problems, or technical challenges not adequately addressed by existing standards documents.

+ +
+
+ + +
+
+ +
+ +

Gap History

+

How gaps have evolved across observatory snapshots.

+
+ + + + + +
SnapshotTopicSeverityStatus
+
+ +
+ + + +""" + (self.output_dir / "observatory" / "gaps.html").write_text(html) + + # ── Timeline page ─────────────────────────────────────────────────────── + + def _generate_timeline_page(self) -> None: + """Submission timeline across sources.""" + html = f"""\ + + + + + +Timeline - Living Standards Observatory + + + + +{self._header_html("timeline")} +
+ +

Submission Timeline

+

Monthly document submissions across standards bodies and categories.

+ +
+ + +
+ +
+ +
+ +
+
Monthly Totals
+ + + +
MonthTotalBy Source
+
+ +
+ + + +""" + (self.output_dir / "observatory" / "timeline.html").write_text(html) diff --git a/src/ietf_analyzer/db.py b/src/ietf_analyzer/db.py index 7f716a5..590d558 100644 --- a/src/ietf_analyzer/db.py +++ b/src/ietf_analyzer/db.py @@ -10,7 +10,7 @@ from pathlib import Path import numpy as np from .config import Config -from .models import Author, Draft, Rating +from .models import Author, Draft, Rating, normalize_category SCHEMA = """ CREATE TABLE IF NOT EXISTS drafts ( @@ -117,6 +117,73 @@ CREATE TABLE IF NOT EXISTS gaps ( analyzed_at TEXT ); +-- Cross-references (RFC, draft, BCP references found in draft text) +CREATE TABLE IF NOT EXISTS draft_refs ( + draft_name TEXT NOT NULL REFERENCES drafts(name), + ref_type TEXT NOT NULL, -- 'rfc', 'draft', 'bcp' + ref_id TEXT NOT NULL, -- e.g. '8259', 'draft-ietf-httpbis-semantics', 'BCP14' + UNIQUE(draft_name, ref_type, ref_id) +); + +CREATE INDEX IF NOT EXISTS idx_draft_refs_ref ON draft_refs(ref_type, ref_id); + +-- Generated drafts from gap-to-draft pipeline +CREATE TABLE IF NOT EXISTS generated_drafts ( + id INTEGER PRIMARY KEY AUTOINCREMENT, + gap_topic TEXT NOT NULL, + draft_name TEXT NOT NULL, + title TEXT NOT NULL, + abstract TEXT NOT NULL DEFAULT '', + outline_json TEXT DEFAULT '{}', + sections_json TEXT DEFAULT '[]', + full_text TEXT, + family_name TEXT DEFAULT '', + family_role TEXT DEFAULT '', + version INTEGER DEFAULT 0, + rating_json TEXT DEFAULT '{}', + novelty_score REAL DEFAULT 0.0, + quality_score REAL DEFAULT 0.0, + status TEXT DEFAULT 'draft', + created_at TEXT +); + +CREATE TABLE IF NOT EXISTS generation_runs ( + id INTEGER PRIMARY KEY AUTOINCREMENT, + family_name TEXT DEFAULT '', + gap_ids TEXT DEFAULT '[]', + total_input_tokens INTEGER DEFAULT 0, + total_output_tokens INTEGER DEFAULT 0, + model_used TEXT DEFAULT '', + status TEXT DEFAULT 'running', + started_at TEXT, + completed_at TEXT +); + +-- Observatory tables +CREATE TABLE IF NOT EXISTS sources ( + name TEXT PRIMARY KEY, + last_fetch TEXT, + doc_count INTEGER DEFAULT 0 +); + +CREATE TABLE IF NOT EXISTS observatory_snapshots ( + id INTEGER PRIMARY KEY AUTOINCREMENT, + snapshot_at TEXT NOT NULL, + total_docs INTEGER DEFAULT 0, + new_since_last INTEGER DEFAULT 0, + changed_gaps INTEGER DEFAULT 0 +); + +CREATE TABLE IF NOT EXISTS gap_history ( + id INTEGER PRIMARY KEY AUTOINCREMENT, + snapshot_id INTEGER REFERENCES observatory_snapshots(id), + gap_topic TEXT NOT NULL, + gap_description TEXT NOT NULL, + severity TEXT DEFAULT 'medium', + status TEXT DEFAULT 'open', + recorded_at TEXT +); + -- Triggers to keep FTS index in sync CREATE TRIGGER IF NOT EXISTS drafts_ai AFTER INSERT ON drafts BEGIN INSERT INTO drafts_fts(rowid, name, title, abstract, full_text) @@ -152,8 +219,23 @@ class Database: self._conn.execute("PRAGMA journal_mode=WAL") self._conn.execute("PRAGMA foreign_keys=ON") self._conn.executescript(SCHEMA) + self._migrate_schema() return self._conn + def _migrate_schema(self) -> None: + """Additive migration — add columns if missing.""" + cols = {r[1] for r in self._conn.execute("PRAGMA table_info(drafts)").fetchall()} + migrations = [ + ("source", "TEXT DEFAULT 'ietf'"), + ("source_id", "TEXT DEFAULT ''"), + ("source_url", "TEXT DEFAULT ''"), + ("doc_status", "TEXT DEFAULT ''"), + ] + for col, typedef in migrations: + if col not in cols: + self._conn.execute(f"ALTER TABLE drafts ADD COLUMN {col} {typedef}") + self._conn.commit() + def close(self) -> None: if self._conn: self._conn.close() @@ -303,7 +385,7 @@ class Database: novelty_note=r["novelty_note"], maturity_note=r["maturity_note"], overlap_note=r["overlap_note"], momentum_note=r["momentum_note"], relevance_note=r["relevance_note"], - categories=json.loads(r["r_categories"]) if r["r_categories"] else [], + categories=[normalize_category(c) for c in json.loads(r["r_categories"])] if r["r_categories"] else [], rated_at=r["rated_at"], ) results.append((draft, rating)) @@ -503,6 +585,30 @@ class Database: ).fetchall() return [(r["org_a"], r["org_b"], r["shared"]) for r in rows] + def org_data_raw(self) -> list[tuple[str, int, str]]: + """Return (affiliation, person_id, draft_name) for all draft_authors with affiliation.""" + rows = self.conn.execute( + "SELECT affiliation, person_id, draft_name FROM draft_authors WHERE affiliation != ''" + ).fetchall() + return [(r[0], r[1], r[2]) for r in rows] + + def author_draft_counts(self) -> dict[int, int]: + """Return {person_id: draft_count} for all authors.""" + rows = self.conn.execute( + "SELECT person_id, COUNT(*) FROM draft_authors GROUP BY person_id" + ).fetchall() + return {r[0]: r[1] for r in rows} + + def author_draft_sets(self) -> dict[int, set[str]]: + """Return {person_id: set(draft_names)} for all authors.""" + rows = self.conn.execute( + "SELECT person_id, draft_name FROM draft_authors" + ).fetchall() + result: dict[int, set[str]] = {} + for r in rows: + result.setdefault(r[0], set()).add(r[1]) + return result + # --- Ideas --- def insert_ideas(self, draft_name: str, ideas: list[dict]) -> None: @@ -529,7 +635,9 @@ class Database: rows = self.conn.execute( """SELECT d.name FROM drafts d LEFT JOIN ideas i ON d.name = i.draft_name - WHERE i.draft_name IS NULL + LEFT JOIN llm_cache lc ON d.name = lc.draft_name + AND lc.request_json LIKE 'batch-ideas[%' + WHERE i.draft_name IS NULL AND lc.draft_name IS NULL LIMIT ?""", (limit,), ).fetchall() @@ -565,6 +673,314 @@ class Database: "category": r["category"], "evidence": r["evidence"], "severity": r["severity"]} for r in rows] + # --- Refs --- + + def insert_refs(self, draft_name: str, refs: list[tuple[str, str]]) -> None: + """Insert cross-references for a draft. refs = [(ref_type, ref_id), ...].""" + for ref_type, ref_id in refs: + self.conn.execute( + """INSERT OR IGNORE INTO draft_refs (draft_name, ref_type, ref_id) + VALUES (?, ?, ?)""", + (draft_name, ref_type, ref_id), + ) + self.conn.commit() + + def get_refs_for_draft(self, draft_name: str) -> list[tuple[str, str]]: + """Return [(ref_type, ref_id)] for a draft.""" + rows = self.conn.execute( + "SELECT ref_type, ref_id FROM draft_refs WHERE draft_name = ?", + (draft_name,), + ).fetchall() + return [(r["ref_type"], r["ref_id"]) for r in rows] + + def top_referenced(self, ref_type: str = "rfc", limit: int = 30) -> list[tuple[str, int, list[str]]]: + """Return (ref_id, count, [draft_names]) for most-referenced items.""" + rows = self.conn.execute( + """SELECT ref_id, COUNT(*) as cnt, + GROUP_CONCAT(draft_name, '||') as drafts + FROM draft_refs + WHERE ref_type = ? + GROUP BY ref_id + ORDER BY cnt DESC + LIMIT ?""", + (ref_type, limit), + ).fetchall() + return [ + (r["ref_id"], r["cnt"], r["drafts"].split("||") if r["drafts"] else []) + for r in rows + ] + + def drafts_referencing(self, ref_type: str, ref_id: str) -> list[str]: + """Return draft names that reference a specific RFC/draft/BCP.""" + rows = self.conn.execute( + "SELECT draft_name FROM draft_refs WHERE ref_type = ? AND ref_id = ?", + (ref_type, ref_id), + ).fetchall() + return [r["draft_name"] for r in rows] + + def ref_counts_by_draft(self) -> list[tuple[str, int, int, int]]: + """Return (draft_name, rfc_count, draft_count, bcp_count) for all drafts with refs.""" + rows = self.conn.execute( + """SELECT draft_name, + SUM(CASE WHEN ref_type = 'rfc' THEN 1 ELSE 0 END) as rfcs, + SUM(CASE WHEN ref_type = 'draft' THEN 1 ELSE 0 END) as drafts, + SUM(CASE WHEN ref_type = 'bcp' THEN 1 ELSE 0 END) as bcps + FROM draft_refs + GROUP BY draft_name + ORDER BY rfcs DESC""" + ).fetchall() + return [(r["draft_name"], r["rfcs"], r["drafts"], r["bcps"]) for r in rows] + + def drafts_without_refs(self, limit: int = 500) -> list[str]: + """Return draft names that have full_text but no refs extracted yet.""" + rows = self.conn.execute( + """SELECT d.name FROM drafts d + LEFT JOIN draft_refs dr ON d.name = dr.draft_name + WHERE d.full_text IS NOT NULL AND dr.draft_name IS NULL + LIMIT ?""", + (limit,), + ).fetchall() + return [r["name"] for r in rows] + + def ref_stats(self) -> dict: + """Return summary stats for refs table.""" + row = self.conn.execute( + """SELECT COUNT(DISTINCT draft_name) as drafts_with_refs, + COUNT(*) as total_refs, + SUM(CASE WHEN ref_type = 'rfc' THEN 1 ELSE 0 END) as rfc_refs, + SUM(CASE WHEN ref_type = 'draft' THEN 1 ELSE 0 END) as draft_refs, + SUM(CASE WHEN ref_type = 'bcp' THEN 1 ELSE 0 END) as bcp_refs, + COUNT(DISTINCT ref_id) as unique_refs + FROM draft_refs""" + ).fetchone() + return dict(row) + + # --- Generated Drafts --- + + def upsert_generated_draft(self, data: dict) -> int: + """Insert or update a generated draft. Returns row id.""" + now = datetime.now(timezone.utc).isoformat() + existing = self.conn.execute( + "SELECT id FROM generated_drafts WHERE draft_name = ? AND version = ?", + (data["draft_name"], data.get("version", 0)), + ).fetchone() + if existing: + self.conn.execute( + """UPDATE generated_drafts SET + gap_topic=?, title=?, abstract=?, outline_json=?, + sections_json=?, full_text=?, family_name=?, family_role=?, + rating_json=?, novelty_score=?, quality_score=?, status=? + WHERE id=?""", + (data["gap_topic"], data["title"], data.get("abstract", ""), + json.dumps(data.get("outline", {})), json.dumps(data.get("sections", [])), + data.get("full_text"), data.get("family_name", ""), + data.get("family_role", ""), json.dumps(data.get("rating", {})), + data.get("novelty_score", 0.0), data.get("quality_score", 0.0), + data.get("status", "draft"), existing["id"]), + ) + self.conn.commit() + return existing["id"] + else: + cur = self.conn.execute( + """INSERT INTO generated_drafts + (gap_topic, draft_name, title, abstract, outline_json, sections_json, + full_text, family_name, family_role, version, rating_json, + novelty_score, quality_score, status, created_at) + VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)""", + (data["gap_topic"], data["draft_name"], data["title"], + data.get("abstract", ""), json.dumps(data.get("outline", {})), + json.dumps(data.get("sections", [])), data.get("full_text"), + data.get("family_name", ""), data.get("family_role", ""), + data.get("version", 0), json.dumps(data.get("rating", {})), + data.get("novelty_score", 0.0), data.get("quality_score", 0.0), + data.get("status", "draft"), now), + ) + self.conn.commit() + return cur.lastrowid + + def get_generated_drafts(self, status: str | None = None) -> list[dict]: + query = "SELECT * FROM generated_drafts" + params: list = [] + if status: + query += " WHERE status = ?" + params.append(status) + query += " ORDER BY created_at DESC" + rows = self.conn.execute(query, params).fetchall() + return [dict(r) for r in rows] + + def get_generated_draft(self, draft_id: int) -> dict | None: + row = self.conn.execute( + "SELECT * FROM generated_drafts WHERE id = ?", (draft_id,) + ).fetchone() + return dict(row) if row else None + + def get_family_drafts(self, family_name: str) -> list[dict]: + rows = self.conn.execute( + "SELECT * FROM generated_drafts WHERE family_name = ? ORDER BY family_role", + (family_name,), + ).fetchall() + return [dict(r) for r in rows] + + def log_generation_run(self, data: dict) -> int: + now = datetime.now(timezone.utc).isoformat() + cur = self.conn.execute( + """INSERT INTO generation_runs + (family_name, gap_ids, total_input_tokens, total_output_tokens, + model_used, status, started_at) + VALUES (?, ?, ?, ?, ?, ?, ?)""", + (data.get("family_name", ""), json.dumps(data.get("gap_ids", [])), + data.get("total_input_tokens", 0), data.get("total_output_tokens", 0), + data.get("model_used", ""), data.get("status", "running"), now), + ) + self.conn.commit() + return cur.lastrowid + + def update_generation_run(self, run_id: int, **kwargs) -> None: + sets = [] + params = [] + for k, v in kwargs.items(): + sets.append(f"{k} = ?") + params.append(v) + if not sets: + return + params.append(run_id) + self.conn.execute( + f"UPDATE generation_runs SET {', '.join(sets)} WHERE id = ?", params + ) + self.conn.commit() + + # --- Observatory --- + + def upsert_source(self, name: str, doc_count: int = 0) -> None: + now = datetime.now(timezone.utc).isoformat() + self.conn.execute( + """INSERT INTO sources (name, last_fetch, doc_count) + VALUES (?, ?, ?) + ON CONFLICT(name) DO UPDATE SET last_fetch=excluded.last_fetch, doc_count=excluded.doc_count""", + (name, now, doc_count), + ) + self.conn.commit() + + def get_source(self, name: str) -> dict | None: + row = self.conn.execute("SELECT * FROM sources WHERE name = ?", (name,)).fetchone() + return dict(row) if row else None + + def all_sources(self) -> list[dict]: + rows = self.conn.execute("SELECT * FROM sources ORDER BY name").fetchall() + return [dict(r) for r in rows] + + def create_snapshot(self) -> int: + now = datetime.now(timezone.utc).isoformat() + total = self.count_drafts() + # Count new since last snapshot + last = self.conn.execute( + "SELECT snapshot_at FROM observatory_snapshots ORDER BY id DESC LIMIT 1" + ).fetchone() + new_count = 0 + if last: + new_count = self.conn.execute( + "SELECT COUNT(*) FROM drafts WHERE fetched_at > ?", (last["snapshot_at"],) + ).fetchone()[0] + else: + new_count = total + cur = self.conn.execute( + """INSERT INTO observatory_snapshots (snapshot_at, total_docs, new_since_last, changed_gaps) + VALUES (?, ?, ?, 0)""", + (now, total, new_count), + ) + self.conn.commit() + return cur.lastrowid + + def record_gap_history(self, snapshot_id: int, gaps: list[dict]) -> None: + now = datetime.now(timezone.utc).isoformat() + for g in gaps: + self.conn.execute( + """INSERT INTO gap_history (snapshot_id, gap_topic, gap_description, severity, status, recorded_at) + VALUES (?, ?, ?, ?, ?, ?)""", + (snapshot_id, g["topic"], g["description"], + g.get("severity", "medium"), g.get("status", "open"), now), + ) + self.conn.commit() + + def gap_history_timeline(self) -> list[dict]: + rows = self.conn.execute( + """SELECT gh.*, os.snapshot_at FROM gap_history gh + JOIN observatory_snapshots os ON gh.snapshot_id = os.id + ORDER BY os.snapshot_at, gh.gap_topic""" + ).fetchall() + return [dict(r) for r in rows] + + def get_snapshots(self, limit: int = 20) -> list[dict]: + rows = self.conn.execute( + "SELECT * FROM observatory_snapshots ORDER BY id DESC LIMIT ?", (limit,) + ).fetchall() + return [dict(r) for r in rows] + + def drafts_by_source(self, source: str, limit: int = 500) -> list[Draft]: + rows = self.conn.execute( + "SELECT * FROM drafts WHERE source = ? ORDER BY time DESC LIMIT ?", + (source, limit), + ).fetchall() + return [self._row_to_draft(r) for r in rows] + + # --- WG/Status --- + + def draft_adoption_status(self) -> list[dict]: + """Return adoption status for all drafts based on naming convention. + + Returns list of dicts: {name, title, time, wg_adopted, wg_name, stream} + """ + import re + rows = self.conn.execute( + 'SELECT name, title, time FROM drafts' + ).fetchall() + results = [] + for r in rows: + name = r["name"] + wg_adopted = False + wg_name = "" + stream = "individual" + + # Primary signal: draft-ietf-{wg}-* naming convention + m = re.match(r'^draft-ietf-(\w+)-', name) + if m: + wg_adopted = True + wg_name = m.group(1) + stream = "ietf" + elif name.startswith("draft-irtf-"): + m2 = re.match(r'^draft-irtf-(\w+)-', name) + wg_name = m2.group(1) if m2 else "" + stream = "irtf" + + results.append({ + "name": name, + "title": r["title"], + "time": r["time"], + "wg_adopted": wg_adopted, + "wg_name": wg_name, + "stream": stream, + }) + return results + + def revision_velocity(self) -> list[dict]: + """Return revision data for all drafts. + + Returns list of dicts: {name, title, time, rev, rev_int} + """ + rows = self.conn.execute( + "SELECT name, title, time, rev FROM drafts" + ).fetchall() + return [ + { + "name": r["name"], + "title": r["title"], + "time": r["time"], + "rev": r["rev"], + "rev_int": int(r["rev"]) if r["rev"].isdigit() else 0, + } + for r in rows + ] + # --- Helpers --- @staticmethod @@ -580,11 +996,16 @@ class Database: categories=json.loads(d.get("categories") or "[]"), tags=json.loads(d.get("tags") or "[]"), fetched_at=d.get("fetched_at"), + source=d.get("source", "ietf"), + source_id=d.get("source_id", ""), + source_url=d.get("source_url", ""), + doc_status=d.get("doc_status", ""), ) @staticmethod def _row_to_rating(row: sqlite3.Row) -> Rating: d = dict(row) + raw_cats = json.loads(d.get("categories") or "[]") return Rating( draft_name=d["draft_name"], novelty=d["novelty"], maturity=d["maturity"], overlap=d["overlap"], momentum=d["momentum"], relevance=d["relevance"], @@ -594,6 +1015,6 @@ class Database: overlap_note=d.get("overlap_note", ""), momentum_note=d.get("momentum_note", ""), relevance_note=d.get("relevance_note", ""), - categories=json.loads(d.get("categories") or "[]"), + categories=[normalize_category(c) for c in raw_cats], rated_at=d.get("rated_at"), ) diff --git a/src/ietf_analyzer/models.py b/src/ietf_analyzer/models.py index ba9386f..91e2598 100644 --- a/src/ietf_analyzer/models.py +++ b/src/ietf_analyzer/models.py @@ -5,6 +5,24 @@ from __future__ import annotations from dataclasses import dataclass, field from datetime import datetime +# Map old verbose category names to canonical short names +CATEGORY_NORMALIZE: dict[str, str] = { + "Agent-to-agent communication protocols": "A2A protocols", + "AI safety / guardrails / alignment": "AI safety/alignment", + "ML-based traffic management / optimization": "ML traffic mgmt", + "Autonomous network operations": "Autonomous netops", + "Identity / authentication for AI agents": "Agent identity/auth", + "Data formats / semantics for AI interop": "Data formats/interop", + "Policy / governance / ethical frameworks": "Policy/governance", + "AI model serving / inference protocols": "Model serving/inference", + "Agent discovery / registration": "Agent discovery/reg", +} + + +def normalize_category(cat: str) -> str: + """Normalize a category name to its canonical short form.""" + return CATEGORY_NORMALIZE.get(cat, cat) + @dataclass class Author: @@ -36,6 +54,10 @@ class Draft: categories: list[str] = field(default_factory=list) tags: list[str] = field(default_factory=list) fetched_at: str | None = None + source: str = "ietf" + source_id: str = "" + source_url: str = "" + doc_status: str = "" @property def text_url(self) -> str: diff --git a/src/ietf_analyzer/observatory.py b/src/ietf_analyzer/observatory.py new file mode 100644 index 0000000..cc0eee4 --- /dev/null +++ b/src/ietf_analyzer/observatory.py @@ -0,0 +1,286 @@ +"""Observatory — orchestrates periodic update cycles across sources.""" + +from __future__ import annotations + +import json +from datetime import datetime, timezone + +from rich.console import Console +from rich.progress import ( + BarColumn, + MofNCompleteColumn, + Progress, + SpinnerColumn, + TextColumn, +) + +from .config import Config +from .db import Database +from .models import Draft +from .sources import get_fetcher +from .sources.base import SourceDocument + +console = Console() + + +def _doc_to_draft(doc: SourceDocument) -> Draft: + """Convert a SourceDocument to a Draft for DB storage.""" + extra = doc.extra or {} + return Draft( + name=doc.name, + rev=extra.get("rev", "00"), + title=doc.title, + abstract=doc.abstract, + time=doc.time, + dt_id=int(doc.source_id) if doc.source_id and doc.source_id.isdigit() else None, + pages=extra.get("pages"), + words=extra.get("words"), + group=extra.get("group"), + group_uri=extra.get("group_uri"), + expires=extra.get("expires"), + ad=extra.get("ad"), + shepherd=extra.get("shepherd"), + states=extra.get("states", []), + full_text=doc.full_text, + fetched_at=datetime.now(timezone.utc).isoformat(), + source=doc.source, + source_id=doc.source_id, + source_url=doc.source_url, + doc_status=doc.doc_status, + ) + + +class Observatory: + """Orchestrates the full observatory update cycle.""" + + def __init__( + self, + config: Config | None = None, + db: Database | None = None, + analyzer=None, + ): + self.config = config or Config.load() + self.db = db or Database(self.config) + self._analyzer = analyzer + + @property + def analyzer(self): + """Lazy-load analyzer to avoid Anthropic key requirement for status/diff.""" + if self._analyzer is None: + from .analyzer import Analyzer + + self._analyzer = Analyzer(self.config, self.db) + return self._analyzer + + def update( + self, + sources: list[str] | None = None, + full: bool = False, + ) -> dict: + """Full update cycle. + + 1. Snapshot current state + 2. Fetch from enabled sources (delta by default) + 3. Analyze unrated docs (Claude, with caching) + 4. Embed missing docs (Ollama) + 5. Extract ideas from new docs + 6. Re-run gap analysis if >= 5 new docs + 7. Record gap changes in gap_history + 8. Return summary stats + """ + sources = sources or self.config.observatory_sources + stats: dict = {"sources": {}, "new_docs": 0, "analyzed": 0, "embedded": 0, "ideas": 0, "gaps_changed": False} + + # 1. Snapshot current state + console.print("[bold]1/7[/] Creating snapshot...") + snapshot_id = self.db.create_snapshot() + + # 2. Fetch from enabled sources + console.print("[bold]2/7[/] Fetching from sources...") + total_new = 0 + for src_name in sources: + new_count = self._fetch_source(src_name, full=full) + stats["sources"][src_name] = new_count + total_new += new_count + stats["new_docs"] = total_new + console.print(f" Fetched [bold green]{total_new}[/] new documents total") + + # 3. Analyze unrated docs + console.print("[bold]3/7[/] Analyzing unrated documents...") + analyzed = self.analyzer.rate_all_unrated(limit=200, batch_size=5) + stats["analyzed"] = analyzed + + # 4. Embed missing docs + console.print("[bold]4/7[/] Embedding missing documents...") + embedded = self._embed_missing() + stats["embedded"] = embedded + + # 5. Extract ideas from new docs + console.print("[bold]5/7[/] Extracting ideas...") + ideas = self.analyzer.extract_all_ideas(limit=200, batch_size=5, cheap=True) + stats["ideas"] = ideas + + # 6. Re-run gap analysis if enough new docs + if total_new >= 5: + console.print("[bold]6/7[/] Re-running gap analysis...") + gaps = self.analyzer.gap_analysis() + if gaps: + self.db.record_gap_history(snapshot_id, gaps) + stats["gaps_changed"] = True + console.print(f" Found [bold]{len(gaps)}[/] gaps") + else: + console.print(f"[bold]6/7[/] Skipping gap analysis ({total_new} < 5 new docs)") + # Record current gaps unchanged + current_gaps = self.db.all_gaps() + if current_gaps: + self.db.record_gap_history(snapshot_id, current_gaps) + + # 7. Update source records + console.print("[bold]7/7[/] Updating source records...") + for src_name in sources: + count = len(self.db.drafts_by_source(src_name, limit=10000)) + self.db.upsert_source(src_name, doc_count=count) + + console.print("\n[bold green]Observatory update complete![/]") + console.print(f" New docs: {total_new} | Analyzed: {analyzed} | Embedded: {embedded} | Ideas: {ideas}") + return stats + + def _fetch_source(self, source_name: str, full: bool = False) -> int: + """Fetch documents from a single source. Returns count of new docs.""" + fetcher = get_fetcher(source_name, self.config) + try: + # Delta fetch: only since last fetch unless full=True + since = None + if not full: + src = self.db.get_source(source_name) + if src and src.get("last_fetch"): + since = src["last_fetch"][:10] # Date portion only + + docs = fetcher.search(self.config.search_keywords, since=since) + + new_count = 0 + for doc in docs: + existing = self.db.get_draft(doc.name) + if existing is None: + new_count += 1 + draft = _doc_to_draft(doc) + self.db.upsert_draft(draft) + + # Download text for docs missing it + missing_text = [ + d for d in docs + if self.db.get_draft(d.name) and self.db.get_draft(d.name).full_text is None + ] + if missing_text: + console.print(f" Downloading text for {len(missing_text)} {source_name} docs...") + with Progress( + SpinnerColumn(), + TextColumn("[progress.description]{task.description}"), + BarColumn(), + MofNCompleteColumn(), + console=console, + ) as progress: + task = progress.add_task(f"Downloading {source_name} texts...", total=len(missing_text)) + for doc in missing_text: + text = fetcher.download_text(doc) + if text: + draft = self.db.get_draft(doc.name) + if draft: + draft.full_text = text + self.db.upsert_draft(draft) + progress.advance(task) + + return new_count + finally: + fetcher.close() + + def _embed_missing(self) -> int: + """Embed documents that don't have embeddings yet.""" + missing = self.db.drafts_without_embeddings(limit=500) + if not missing: + console.print(" All documents already embedded.") + return 0 + + try: + from .embeddings import Embedder + + embedder = Embedder(self.config, self.db) + except Exception as e: + console.print(f" [yellow]Skipping embeddings (Ollama unavailable): {e}[/]") + return 0 + + count = 0 + with Progress( + SpinnerColumn(), + TextColumn("[progress.description]{task.description}"), + BarColumn(), + MofNCompleteColumn(), + console=console, + ) as progress: + task = progress.add_task("Embedding...", total=len(missing)) + for name in missing: + try: + vec = embedder.embed_draft(name) + if vec is not None: + count += 1 + except Exception: + pass + progress.advance(task) + + console.print(f" Embedded [bold green]{count}[/] documents") + return count + + def status(self) -> dict: + """Current observatory state -- doc counts, sources, last update.""" + total = self.db.count_drafts() + sources = self.db.all_sources() + snapshots = self.db.get_snapshots(limit=1) + gaps = self.db.all_gaps() + + # Count by source + source_counts = {} + for src in sources: + source_counts[src["name"]] = src["doc_count"] + + # Unrated / unembedded + unrated = len(self.db.unrated_drafts(limit=10000)) + unembedded = len(self.db.drafts_without_embeddings(limit=10000)) + + last_update = snapshots[0]["snapshot_at"] if snapshots else None + + return { + "total_docs": total, + "sources": source_counts, + "unrated": unrated, + "unembedded": unembedded, + "gaps": len(gaps), + "last_update": last_update, + "snapshots": len(self.db.get_snapshots(limit=100)), + } + + def diff(self, since: str | None = None) -> dict: + """What changed since a date -- new docs, gap changes.""" + if since is None: + # Default to last snapshot + snapshots = self.db.get_snapshots(limit=2) + if len(snapshots) >= 2: + since = snapshots[1]["snapshot_at"] + else: + since = "2000-01-01" + + # New docs since date + new_docs = self.db.conn.execute( + "SELECT name, title, source, time FROM drafts WHERE fetched_at > ? ORDER BY time DESC", + (since,), + ).fetchall() + + # Gap changes + gap_timeline = self.db.gap_history_timeline() + recent_gaps = [g for g in gap_timeline if g.get("recorded_at", "") > since] + + return { + "since": since, + "new_docs": [dict(r) for r in new_docs], + "new_doc_count": len(new_docs), + "gap_changes": recent_gaps, + } diff --git a/src/ietf_analyzer/orgs.py b/src/ietf_analyzer/orgs.py new file mode 100644 index 0000000..95227e1 --- /dev/null +++ b/src/ietf_analyzer/orgs.py @@ -0,0 +1,291 @@ +"""Organization normalization and team bloc detection.""" + +from __future__ import annotations + +from collections import defaultdict +from dataclasses import dataclass, field + +from .db import Database + +# Maps raw affiliation strings to canonical org names. +# Built from SELECT DISTINCT affiliation FROM draft_authors. +ORG_ALIASES: dict[str, str] = { + # Huawei + "Huawei Technologies": "Huawei", + "Huawei Technologies Co., Ltd.": "Huawei", + "Huawei Technologies, Co., Ltd": "Huawei", + "Huawei Tech": "Huawei", + "Huawei Canada": "Huawei", + "Huawei R&D": "Huawei", + "Huawei Singapore": "Huawei", + # Cisco + "Cisco Systems": "Cisco", + "Cisco Systems, Inc.": "Cisco", + # Ericsson + "Ericsson AB": "Ericsson", + # RISE + "RISE AB": "RISE", + "RISE": "RISE", + # Independent + "Independent Researcher": "Independent", + "Unaffiliated": "Independent", + "Individual Contributor": "Independent", + # Inria + "INRIA": "Inria", + # Google + "Google LLC": "Google", + "Google": "Google", + # Apple + "Apple Inc": "Apple", + "Apple, Inc": "Apple", + "Apple": "Apple", + # Amazon + "Amazon Web Services": "Amazon", + "AWS": "Amazon", + "Amazon": "Amazon", + # Siemens + "Siemens AG": "Siemens", + # ZTE + "ZTE": "ZTE Corporation", + # Telefonica + "Telefonica I+D": "Telefonica", + # Deutsche Telekom + "Deutsche Telecom": "Deutsche Telekom", + # InterDigital + "InterDigital Europe Ltd.": "InterDigital Europe", + # Boeing + "Boeing Technology Innovation": "Boeing", + "Boeing Research & Technology": "Boeing", + # Futurewei + "Futurewei Technologies USA": "Futurewei", + "Futurewei": "Futurewei", + # IBM + "IBM Research": "IBM", + "IBM": "IBM", + # China Telecom + "China Telecom Research Institute": "China Telecom", + # Beijing University (multiline variant from Datatracker) + "Beijing University of Posts and\n Telecommunications": "BUPT", + "Beijing University of Posts and Telecommunications": "BUPT", + # AsiaInfo + "AsiaInfo Technologies (China) Inc.": "AsiaInfo", + "AsiaInfo Technologies (China) Inc": "AsiaInfo", + # Dept of CS + "Department of Computer Science and Engineering": "Department of Computer Science & Engineering", +} + +# Common suffixes to strip for fuzzy matching +_SUFFIXES = [ + ", Inc.", ", Inc", " Inc.", " Inc", + " LLC", " Ltd.", " Ltd", + " AB", " GmbH", " Corp", + " Co., Ltd.", " Co., Ltd", + " Technologies", +] + + +def normalize_org(raw: str) -> str: + """Normalize an affiliation string to a canonical org name.""" + raw = raw.strip() + if not raw: + return "" + # Exact match + if raw in ORG_ALIASES: + return ORG_ALIASES[raw] + # Fuzzy: strip suffixes and check again + stripped = raw + for suffix in _SUFFIXES: + if stripped.endswith(suffix): + stripped = stripped[: -len(suffix)].strip() + break + if stripped in ORG_ALIASES: + return ORG_ALIASES[stripped] + if stripped != raw and stripped: + # Check if the stripped form matches a canonical name directly + for canonical in set(ORG_ALIASES.values()): + if stripped.lower() == canonical.lower(): + return canonical + return raw + + +@dataclass +class Bloc: + """A team of authors who consistently co-author together.""" + + members: list[tuple[int, str, str]] # (person_id, name, normalized_org) + shared_drafts: int # drafts where >= 2 members co-author + primary_org: str + cohesion: float # avg pairwise cohesion + + @property + def member_pids(self) -> set[int]: + return {pid for pid, _, _ in self.members} + + @property + def label(self) -> str: + return f"{self.primary_org} team ({len(self.members)})" + + +def detect_blocs( + db: Database, + cohesion_threshold: float = 0.70, + min_size: int = 2, + min_shared_drafts: int = 2, +) -> list[Bloc]: + """Detect team blocs where all member pairs share >= threshold of drafts. + + Uses connected components on a cohesion-filtered co-author graph, + then merges overlapping groups into single blocs. + """ + draft_counts = db.author_draft_counts() + draft_sets = db.author_draft_sets() + + # Get enriched pair data with person_ids + rows = db.conn.execute( + """SELECT a1.name, da1.person_id, a2.name, da2.person_id, COUNT(*) as shared + FROM draft_authors da1 + JOIN draft_authors da2 ON da1.draft_name = da2.draft_name + AND da1.person_id < da2.person_id + JOIN authors a1 ON da1.person_id = a1.person_id + JOIN authors a2 ON da2.person_id = a2.person_id + GROUP BY da1.person_id, da2.person_id + HAVING shared >= ? + ORDER BY shared DESC""", + (min_shared_drafts,), + ).fetchall() + + # Get affiliations per person + aff_rows = db.conn.execute( + "SELECT person_id, affiliation FROM authors" + ).fetchall() + person_aff = {r[0]: normalize_org(r[1]) for r in aff_rows} + person_name: dict[int, str] = {} + + # Build cohesion-filtered adjacency: only keep edges with high overlap + adj: dict[int, set[int]] = defaultdict(set) + pair_shared: dict[tuple[int, int], int] = {} + pair_cohesion: dict[tuple[int, int], float] = {} + + for r in rows: + name_a, pid_a, name_b, pid_b, shared = r[0], r[1], r[2], r[3], r[4] + person_name[pid_a] = name_a + person_name[pid_b] = name_b + min_d = min(draft_counts.get(pid_a, 1), draft_counts.get(pid_b, 1)) + cohesion = shared / min_d + if cohesion >= cohesion_threshold: + adj[pid_a].add(pid_b) + adj[pid_b].add(pid_a) + key = (min(pid_a, pid_b), max(pid_a, pid_b)) + pair_shared[key] = shared + pair_cohesion[key] = cohesion + + # Find connected components (each component = one merged bloc) + visited: set[int] = set() + components: list[set[int]] = [] + for pid in adj: + if pid in visited: + continue + component: set[int] = set() + stack = [pid] + while stack: + node = stack.pop() + if node in visited: + continue + visited.add(node) + component.add(node) + stack.extend(adj[node] - visited) + if len(component) >= min_size: + components.append(component) + + # Build Bloc objects from components + blocs = [] + for comp in components: + members = [ + (pid, person_name.get(pid, "?"), person_aff.get(pid, "")) + for pid in comp + ] + + # Shared drafts = drafts where >= 2 bloc members appear + all_drafts: dict[str, int] = defaultdict(int) + for pid in comp: + for d in draft_sets.get(pid, set()): + all_drafts[d] += 1 + shared_count = sum(1 for cnt in all_drafts.values() if cnt >= 2) + + # Primary org = most common among members + org_counts: dict[str, int] = defaultdict(int) + for _, _, org in members: + if org: + org_counts[org] += 1 + primary = max(org_counts, key=org_counts.get) if org_counts else "" + + # Average pairwise cohesion (only for connected pairs) + edges = [ + pair_cohesion[key] + for a in comp for b in comp if a < b + for key in [(a, b)] if key in pair_cohesion + ] + avg_coh = sum(edges) / len(edges) if edges else 0 + + blocs.append(Bloc( + members=sorted(members, key=lambda m: -len(draft_sets.get(m[0], set()))), + shared_drafts=shared_count, + primary_org=primary, + cohesion=avg_coh, + )) + + # Sort: most shared drafts first (the interesting ones) + blocs.sort(key=lambda b: (-b.shared_drafts, -len(b.members))) + return blocs + + +def top_orgs_normalized( + db: Database, limit: int = 20 +) -> list[tuple[str, int, int]]: + """Return (canonical_org, unique_authors, unique_drafts) with merged orgs.""" + raw = db.org_data_raw() + + org_people: dict[str, set[int]] = defaultdict(set) + org_drafts: dict[str, set[str]] = defaultdict(set) + + for aff, pid, draft_name in raw: + canonical = normalize_org(aff) + if canonical: + org_people[canonical].add(pid) + org_drafts[canonical].add(draft_name) + + results = [ + (org, len(org_people[org]), len(org_drafts[org])) + for org in org_people + ] + results.sort(key=lambda x: -x[2]) + return results[:limit] + + +def cross_org_normalized( + db: Database, limit: int = 20 +) -> list[tuple[str, str, int]]: + """Return (org_a, org_b, shared_drafts) with normalized org names.""" + # Get all (aff_a, aff_b, draft_name) cross-org triples + rows = db.conn.execute( + """SELECT da1.affiliation, da2.affiliation, da1.draft_name + FROM draft_authors da1 + JOIN draft_authors da2 ON da1.draft_name = da2.draft_name + AND da1.person_id < da2.person_id + WHERE da1.affiliation != '' AND da2.affiliation != ''""" + ).fetchall() + + pair_drafts: dict[tuple[str, str], set[str]] = defaultdict(set) + for aff_a, aff_b, draft_name in rows: + norm_a = normalize_org(aff_a) + norm_b = normalize_org(aff_b) + if norm_a and norm_b and norm_a != norm_b: + key = tuple(sorted([norm_a, norm_b])) + pair_drafts[key].add(draft_name) + + results = [ + (org_a, org_b, len(drafts)) + for (org_a, org_b), drafts in pair_drafts.items() + ] + results.sort(key=lambda x: -x[2]) + return results[:limit] diff --git a/src/ietf_analyzer/pipeline/__init__.py b/src/ietf_analyzer/pipeline/__init__.py new file mode 100644 index 0000000..240445a --- /dev/null +++ b/src/ietf_analyzer/pipeline/__init__.py @@ -0,0 +1,6 @@ +"""Gap-to-Draft generation pipeline.""" +from .context import ContextBuilder +from .generator import PipelineGenerator +from .quality import QualityGates +from .family import FamilyCoordinator +from .formatter import DraftFormatter diff --git a/src/ietf_analyzer/pipeline/context.py b/src/ietf_analyzer/pipeline/context.py new file mode 100644 index 0000000..b39a391 --- /dev/null +++ b/src/ietf_analyzer/pipeline/context.py @@ -0,0 +1,259 @@ +"""Context builder — assembles rich context for draft generation from DB queries.""" + +from __future__ import annotations + +import json +from pathlib import Path + +import numpy as np +from rich.console import Console + +from ..config import Config +from ..db import Database + +console = Console() + + +def _cosine_similarity(a: np.ndarray, b: np.ndarray) -> float: + dot = np.dot(a, b) + norm = np.linalg.norm(a) * np.linalg.norm(b) + if norm == 0: + return 0.0 + return float(dot / norm) + + +class ContextBuilder: + def __init__(self, config: Config, db: Database): + self.config = config + self.db = db + + def build_context(self, gap_topic: str) -> dict: + """Assemble full context for a gap topic. All DB queries, zero Claude calls.""" + gap = self._find_gap(gap_topic) + if not gap: + console.print(f"[yellow]No gap found matching '{gap_topic}', using topic as-is[/]") + gap = { + "id": 0, + "topic": gap_topic, + "description": gap_topic, + "category": "", + "evidence": "", + "severity": "medium", + } + + ideas = self._convergent_ideas(gap) + rfcs = self._rfc_foundations(gap.get("category", "")) + similar = self._similar_drafts(gap["description"]) + top_rated = self._top_rated_in_category(gap.get("category", "")) + wg_context = self._wg_context() + ecosystem = self._ecosystem_vision() + siblings = self._sibling_context(gap_topic) + + return { + "gap": gap, + "convergent_ideas": ideas, + "rfc_foundations": rfcs, + "similar_drafts": similar, + "top_rated": top_rated, + "wg_context": wg_context, + "ecosystem_vision": ecosystem, + "sibling_context": siblings, + } + + def _find_gap(self, topic: str) -> dict | None: + """Find a gap by topic string (fuzzy match).""" + gaps = self.db.all_gaps() + topic_lower = topic.lower() + # Exact match first + for g in gaps: + if g["topic"].lower() == topic_lower: + return g + # Substring match + for g in gaps: + if topic_lower in g["topic"].lower() or topic_lower in g["description"].lower(): + return g + # Word overlap match + topic_words = set(topic_lower.split()) + best = None + best_score = 0 + for g in gaps: + gap_words = set(g["topic"].lower().split()) | set(g["description"].lower().split()) + overlap = len(topic_words & gap_words) + if overlap > best_score: + best_score = overlap + best = g + return best if best_score >= 2 else None + + def _convergent_ideas(self, gap: dict, limit: int = 20) -> list[dict]: + """Find ideas that converge on this gap topic via keyword matching.""" + all_ideas = self.db.all_ideas() + if not all_ideas: + return [] + + # Build search terms from gap topic + description + search_text = (gap["topic"] + " " + gap["description"]).lower() + search_words = set(search_text.split()) + # Remove common words + stop_words = {"the", "a", "an", "and", "or", "in", "of", "for", "to", "is", + "are", "that", "this", "with", "not", "by", "on", "at", "from", + "as", "be", "it", "no", "but", "has", "have", "do", "does"} + search_words -= stop_words + + scored = [] + for idea in all_ideas: + idea_text = (idea["title"] + " " + idea["description"]).lower() + idea_words = set(idea_text.split()) + overlap = len(search_words & idea_words) + if overlap >= 1: + scored.append((overlap, idea)) + + scored.sort(key=lambda x: x[0], reverse=True) + return [item for _, item in scored[:limit]] + + def _rfc_foundations(self, category: str, limit: int = 10) -> list[tuple[str, int]]: + """Get most-referenced RFCs, optionally filtered by category.""" + top_refs = self.db.top_referenced(ref_type="rfc", limit=limit * 2) + if not category: + return [(ref_id, count) for ref_id, count, _ in top_refs[:limit]] + + # Filter to RFCs referenced by drafts in this category + category_lower = category.lower() + pairs = self.db.drafts_with_ratings(limit=500) + category_drafts = set() + for draft, rating in pairs: + for cat in rating.categories: + if category_lower in cat.lower(): + category_drafts.add(draft.name) + + if not category_drafts: + return [(ref_id, count) for ref_id, count, _ in top_refs[:limit]] + + filtered = [] + for ref_id, count, draft_names in top_refs: + cat_count = sum(1 for d in draft_names if d in category_drafts) + if cat_count > 0: + filtered.append((ref_id, cat_count)) + + filtered.sort(key=lambda x: x[1], reverse=True) + return filtered[:limit] + + def _similar_drafts(self, gap_desc: str, limit: int = 8) -> list[tuple[str, float]]: + """Find semantically similar existing drafts via embeddings.""" + all_embeddings = self.db.all_embeddings() + if not all_embeddings: + return [] + + # Try to embed the gap description via Ollama + try: + import ollama as ollama_lib + client = ollama_lib.Client(host=self.config.ollama_url) + resp = client.embed( + model=self.config.ollama_embed_model, + input=gap_desc[:8000], + ) + gap_vec = np.array(resp["embeddings"][0], dtype=np.float32) + except Exception as e: + console.print(f"[yellow]Ollama embedding failed, skipping similarity: {e}[/]") + return [] + + similarities = [] + for name, vec in all_embeddings.items(): + sim = _cosine_similarity(gap_vec, vec) + similarities.append((name, sim)) + + similarities.sort(key=lambda x: x[1], reverse=True) + return similarities[:limit] + + def _top_rated_in_category(self, category: str, limit: int = 5) -> list[tuple]: + """Get top-rated drafts in a category.""" + pairs = self.db.drafts_with_ratings(limit=500) + if not category: + return [ + (draft.name, draft.title, rating.composite_score) + for draft, rating in pairs[:limit] + ] + + category_lower = category.lower() + matching = [] + for draft, rating in pairs: + for cat in rating.categories: + if category_lower in cat.lower(): + matching.append((draft.name, draft.title, rating.composite_score)) + break + + return matching[:limit] + + def _wg_context(self) -> str: + """Summarize WG adoption status.""" + adoption = self.db.draft_adoption_status() + wg_counts: dict[str, int] = {} + adopted_count = 0 + for d in adoption: + if d["wg_adopted"]: + adopted_count += 1 + wg = d["wg_name"] + wg_counts[wg] = wg_counts.get(wg, 0) + 1 + + total = len(adoption) + if not wg_counts: + return f"{total} drafts, none WG-adopted yet." + + top_wgs = sorted(wg_counts.items(), key=lambda x: x[1], reverse=True)[:5] + wg_lines = ", ".join(f"{wg} ({n})" for wg, n in top_wgs) + return f"{total} drafts, {adopted_count} WG-adopted. Top WGs: {wg_lines}" + + def _ecosystem_vision(self) -> str: + """Load ecosystem vision document if it exists.""" + vision_path = Path(self.config.data_dir) / "reports" / "holistic-agent-ecosystem-draft-outlines.md" + if not vision_path.exists(): + return "(No ecosystem vision document found)" + + text = vision_path.read_text() + # Return the pitch section (compact) rather than the full document + if "## 8. One-Page Pitch" in text: + pitch = text.split("## 8. One-Page Pitch")[1].strip() + return pitch[:2000] + # Fallback: return the vision summary + if "## 1. Vision Summary" in text: + parts = text.split("## 1. Vision Summary")[1] + if "## 2." in parts: + parts = parts.split("## 2.")[0] + return parts.strip()[:2000] + return text[:2000] + + def _sibling_context(self, gap_topic: str) -> list[dict]: + """Get outlines of sibling drafts from the same family.""" + # Check all family drafts + families = self.db.get_generated_drafts() + if not families: + return [] + + # Find which family this gap_topic belongs to + topic_lower = gap_topic.lower() + family_name = "" + for gd in families: + if topic_lower in gd.get("gap_topic", "").lower(): + family_name = gd.get("family_name", "") + break + + if not family_name: + return [] + + siblings = self.db.get_family_drafts(family_name) + result = [] + for s in siblings: + if s.get("gap_topic", "").lower() == topic_lower: + continue # Skip self + outline = {} + if s.get("outline_json"): + try: + outline = json.loads(s["outline_json"]) if isinstance(s["outline_json"], str) else s["outline_json"] + except (json.JSONDecodeError, TypeError): + pass + result.append({ + "role": s.get("family_role", ""), + "title": s.get("title", ""), + "abstract": s.get("abstract", ""), + "outline": outline, + }) + return result diff --git a/src/ietf_analyzer/pipeline/family.py b/src/ietf_analyzer/pipeline/family.py new file mode 100644 index 0000000..7a6b8a5 --- /dev/null +++ b/src/ietf_analyzer/pipeline/family.py @@ -0,0 +1,219 @@ +"""Family coordinator — orchestrates generation of the 5-draft ecosystem.""" + +from __future__ import annotations + +import json + +from rich.console import Console + +from ..config import Config +from ..db import Database +from .generator import PipelineGenerator +from .quality import QualityGates + +console = Console() + +FAMILY_DRAFTS = [ + { + "role": "AEM", + "topic": "Agent Ecosystem Model", + "description": ( + "Core architecture and terminology for the agent ecosystem. " + "Defines shared concepts: DAG execution model, HITL points, " + "assurance levels, protocol agnosticism. Foundation for all " + "companion drafts." + ), + }, + { + "role": "ATD", + "topic": "Agent Task DAG", + "description": ( + "Execution model using DAG structure with checkpoints and rollback. " + "Defines node semantics (pending/running/done/failed/rolled-back), " + "resource hints, circuit breakers, and rollback protocol. " + "Uses ECT as token and DAG format." + ), + }, + { + "role": "HITL", + "topic": "Human-in-the-Loop", + "description": ( + "Human oversight as first-class primitive. Approval gates, " + "escalation paths, emergency override (PAUSE/CONSTRAIN/STOP/TAKEOVER), " + "and explainability hooks. Integrates with DAG as HITL nodes." + ), + }, + { + "role": "AEPB", + "topic": "Agent Ecosystem Protocol Bindings", + "description": ( + "Cross-protocol interoperability layer. Capability advertisement, " + "protocol binding requirements, translation gateways, negotiation. " + "Makes ecosystem semantics available over any A2A protocol." + ), + }, + { + "role": "APAE", + "topic": "Agent Provenance Assurance Ecosystem", + "description": ( + "Trust, verification, and provenance for dual-regime operation. " + "Assurance profiles (relaxed/standard/regulated), behavior verification, " + "dynamic trust scoring (AIMD model), provenance chains. " + "Same stack from K8s to fully proven." + ), + }, +] + + +class FamilyCoordinator: + def __init__(self, config: Config, db: Database, analyzer): + self.config = config + self.db = db + self.analyzer = analyzer + self.generator = PipelineGenerator(config, db, analyzer) + self.quality = QualityGates(config, db, analyzer) + + def generate_family(self, family_name: str = "agent-ecosystem", cheap: bool = False) -> list[dict]: + """Generate all 5 drafts in order. AEM first, then B-E with sibling context.""" + console.print(f"\n[bold cyan]Generating draft family: {family_name}[/]") + console.print(f"Drafts: {len(FAMILY_DRAFTS)}, cheap={cheap}") + + # Log the generation run + run_id = self.db.log_generation_run({ + "family_name": family_name, + "gap_ids": [d["role"] for d in FAMILY_DRAFTS], + "model_used": self.config.claude_model_cheap if cheap else self.config.claude_model, + "status": "running", + }) + + results = [] + total_in = 0 + total_out = 0 + + for i, draft_spec in enumerate(FAMILY_DRAFTS): + console.print( + f"\n[bold]{'='*60}[/]" + f"\n[bold]Draft {i+1}/{len(FAMILY_DRAFTS)}: " + f"[cyan]{draft_spec['role']}[/] — {draft_spec['topic']}[/]" + f"\n[bold]{'='*60}[/]" + ) + + try: + result = self.generator.generate_full( + gap_topic=draft_spec["topic"], + cheap=cheap, + family_name=family_name, + family_role=draft_spec["role"], + ) + results.append(result) + + # Run quality gates + draft_id = result.get("id") + if draft_id: + console.print(f"\n[dim]Running quality gates for {draft_spec['role']}...[/]") + qr = self.quality.run_all(draft_id) + result["quality_results"] = qr + + except Exception as e: + console.print(f"[red]Failed to generate {draft_spec['role']}: {e}[/]") + results.append({ + "role": draft_spec["role"], + "topic": draft_spec["topic"], + "error": str(e), + }) + + # Update run + self.db.update_generation_run( + run_id, + status="completed", + completed_at=_now_iso(), + ) + + # Summary + console.print(f"\n[bold cyan]{'='*60}[/]") + console.print(f"[bold]Family generation complete: {family_name}[/]") + successful = [r for r in results if "error" not in r] + console.print(f" Generated: {len(successful)}/{len(FAMILY_DRAFTS)} drafts") + for r in results: + if "error" in r: + console.print(f" [red]FAIL[/] {r['role']}: {r['error']}") + else: + console.print(f" [green]OK[/] {r.get('family_role', '?')}: {r.get('title', '?')}") + + return results + + def check_consistency(self, family_name: str) -> dict: + """Check terminology consistency across family drafts.""" + drafts = self.db.get_family_drafts(family_name) + if not drafts: + return {"consistent": False, "details": "No drafts found for family"} + + # Collect terminology from all outlines + all_terms: dict[str, dict[str, str]] = {} # term -> {role: definition} + for gd in drafts: + role = gd.get("family_role", "?") + outline_raw = gd.get("outline_json", "{}") + try: + outline = json.loads(outline_raw) if isinstance(outline_raw, str) else outline_raw + except (json.JSONDecodeError, TypeError): + continue + + terms = outline.get("terminology", {}) + if not isinstance(terms, dict): + continue + for term, defn in terms.items(): + term_lower = term.lower() + if term_lower not in all_terms: + all_terms[term_lower] = {} + all_terms[term_lower][role] = defn + + # Find terms used in multiple drafts + shared_terms = {t: roles for t, roles in all_terms.items() if len(roles) > 1} + if not shared_terms: + return { + "consistent": True, + "shared_terms": 0, + "details": "No shared terminology found across drafts", + } + + # Check for inconsistencies (simple: different definitions for same term) + inconsistencies = [] + for term, roles in shared_terms.items(): + definitions = list(roles.values()) + # Rough check: if definitions differ significantly + unique_defs = set(d.lower().strip().rstrip(".") for d in definitions) + if len(unique_defs) > 1: + inconsistencies.append({ + "term": term, + "definitions": roles, + }) + + consistent = len(inconsistencies) == 0 + details_parts = [f"{len(shared_terms)} shared terms across drafts"] + if inconsistencies: + details_parts.append(f"{len(inconsistencies)} inconsistencies found:") + for inc in inconsistencies: + details_parts.append(f" '{inc['term']}': {inc['definitions']}") + + console.print(f"\n[bold]Consistency check: {family_name}[/]") + console.print(f" Shared terms: {len(shared_terms)}") + console.print(f" Inconsistencies: {len(inconsistencies)}") + if consistent: + console.print(" [green]All terminology consistent[/]") + else: + for inc in inconsistencies: + console.print(f" [yellow]Inconsistent: '{inc['term']}'[/]") + for role, defn in inc["definitions"].items(): + console.print(f" {role}: {defn[:80]}") + + return { + "consistent": consistent, + "shared_terms": len(shared_terms), + "inconsistencies": inconsistencies, + "details": "; ".join(details_parts), + } + + +def _now_iso() -> str: + from datetime import datetime, timezone + return datetime.now(timezone.utc).isoformat() diff --git a/src/ietf_analyzer/pipeline/formatter.py b/src/ietf_analyzer/pipeline/formatter.py new file mode 100644 index 0000000..c0d86af --- /dev/null +++ b/src/ietf_analyzer/pipeline/formatter.py @@ -0,0 +1,203 @@ +"""Draft formatter — assembles outline + sections into I-D text format.""" + +from __future__ import annotations + +import textwrap +from datetime import datetime, timezone, timedelta + + +class DraftFormatter: + @staticmethod + def format_draft(outline: dict, sections: list[str], family_name: str = "") -> str: + """Assemble outline + sections into I-D text format.""" + title = outline["title"] + draft_name = DraftFormatter._make_draft_name(title, family_name) + + parts = [] + parts.append(DraftFormatter._header_block(outline, draft_name)) + parts.append("") + parts.append("Abstract") + parts.append("") + parts.append(DraftFormatter._wrap_text(outline.get("abstract", ""))) + parts.append("") + parts.append(DraftFormatter._status_memo(outline)) + parts.append("") + + # Terminology section (if outline has terminology) + terms = outline.get("terminology", {}) + if terms: + parts.append(DraftFormatter._terminology_section(outline)) + parts.append("") + + # Table of Contents + parts.append("Table of Contents") + parts.append("") + section_list = outline.get("sections", []) + for i, section in enumerate(section_list, 1): + stitle = section.get("title", f"Section {i}") + dots = "." * max(1, 60 - len(stitle)) + parts.append(f" {i}. {stitle} {dots} {i + 2}") + ref_num = len(section_list) + 1 + parts.append(f" {ref_num}. References {'.' * (60 - len('References'))} {ref_num + 2}") + parts.append("") + + # Sections + for i, (section_info, section_text) in enumerate( + zip(section_list, sections), 1 + ): + stitle = section_info.get("title", f"Section {i}") + parts.append(f"{i}. {stitle}") + parts.append("") + parts.append(DraftFormatter._wrap_text(section_text)) + parts.append("") + + # References section + parts.append(DraftFormatter._references_section(outline)) + parts.append("") + + # Author's Address + parts.append("Author's Address") + parts.append("") + parts.append(" Generated by IETF Draft Analyzer") + if family_name: + parts.append(f" Family: {family_name}") + parts.append(f" {datetime.now(timezone.utc).strftime('%Y-%m-%d')}") + parts.append("") + + return "\n".join(parts) + + @staticmethod + def _make_draft_name(title: str, family_name: str = "") -> str: + """Generate a draft name from title.""" + words = title.lower().split() + slug = "-".join(w for w in words[:4] if w.isalnum()) + if family_name: + return f"draft-{family_name}-{slug}-00" + return f"draft-ai-{slug}-00" + + @staticmethod + def _header_block(outline: dict, draft_name: str) -> str: + """Proper I-D header.""" + now = datetime.now(timezone.utc) + expires = now + timedelta(days=185) + date_str = now.strftime("%B %Y") + exp_str = expires.strftime("%B %d, %Y") + status = outline.get("intended_status", "Informational") + wg = outline.get("target_wg", "individual") + title = outline["title"] + + lines = [] + lines.append(f"Internet-Draft{' ' * 45}{wg}") + lines.append(f"Intended status: {status:<44s}{date_str}") + lines.append(f"Expires: {exp_str}") + lines.append("") + lines.append("") + lines.append(f" {title}") + lines.append(f" {draft_name}") + return "\n".join(lines) + + @staticmethod + def _status_memo(outline: dict) -> str: + """Status of This Memo boilerplate.""" + status = outline.get("intended_status", "Informational") + lines = [] + lines.append("Status of This Memo") + lines.append("") + lines.append(DraftFormatter._wrap_text( + "This Internet-Draft is submitted in full conformance with the " + "provisions of BCP 78 and BCP 79." + )) + lines.append("") + lines.append(DraftFormatter._wrap_text( + f"This document is intended to have {status} status. " + "Distribution of this memo is unlimited." + )) + return "\n".join(lines) + + @staticmethod + def _references_section(outline: dict) -> str: + """Normative + Informative References from outline data.""" + lines = [] + norm_refs = outline.get("normative_refs", []) + info_refs = outline.get("informative_refs", []) + + ref_num = len(outline.get("sections", [])) + 1 + lines.append(f"{ref_num}. References") + lines.append("") + + if norm_refs: + lines.append(f"{ref_num}.1. Normative References") + lines.append("") + for ref in norm_refs: + lines.append(f" [{ref}]") + lines.append(f" {ref}") + lines.append("") + + if info_refs: + sub = "2" if norm_refs else "1" + lines.append(f"{ref_num}.{sub}. Informative References") + lines.append("") + for ref in info_refs: + lines.append(f" [{ref}]") + lines.append(f" {ref}") + lines.append("") + + if not norm_refs and not info_refs: + lines.append(" (No references specified)") + lines.append("") + + return "\n".join(lines) + + @staticmethod + def _terminology_section(outline: dict) -> str: + """Terminology section from outline terminology dict.""" + terms = outline.get("terminology", {}) + if not terms: + return "" + + lines = [] + lines.append("Terminology") + lines.append("") + lines.append(DraftFormatter._wrap_text( + 'The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL ' + 'NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", ' + '"MAY", and "OPTIONAL" in this document are to be interpreted as ' + 'described in BCP 14 [RFC2119] [RFC8174] when, and only when, they ' + 'appear in all capitals, as shown here.' + )) + lines.append("") + + for term, definition in terms.items(): + lines.append(f" {term}") + lines.append(DraftFormatter._wrap_text(definition, indent=6)) + lines.append("") + + return "\n".join(lines) + + @staticmethod + def _wrap_text(text: str, indent: int = 3, width: int = 69) -> str: + """72-char line wrapping for I-D format.""" + prefix = " " * indent + paragraphs = text.strip().split("\n\n") + wrapped = [] + for para in paragraphs: + # Preserve list items + if para.strip().startswith("-") or para.strip().startswith("*"): + inner_lines = para.strip().split("\n") + for line in inner_lines: + line = line.strip() + sub_lines = textwrap.wrap( + line, width=width, + initial_indent=prefix, + subsequent_indent=prefix + " ", + ) + wrapped.append("\n".join(sub_lines)) + else: + para = " ".join(para.split()) # Normalize whitespace + lines = textwrap.wrap( + para, width=width, + initial_indent=prefix, + subsequent_indent=prefix, + ) + wrapped.append("\n".join(lines)) + return "\n\n".join(wrapped) diff --git a/src/ietf_analyzer/pipeline/generator.py b/src/ietf_analyzer/pipeline/generator.py new file mode 100644 index 0000000..29aeac7 --- /dev/null +++ b/src/ietf_analyzer/pipeline/generator.py @@ -0,0 +1,269 @@ +"""Pipeline generator — enhanced outline + section generation with rich context.""" + +from __future__ import annotations + +import hashlib +import json +from datetime import datetime, timezone + +from rich.console import Console +from rich.progress import Progress, SpinnerColumn, TextColumn, BarColumn, MofNCompleteColumn + +from ..config import Config +from ..db import Database +from .context import ContextBuilder +from .prompts import OUTLINE_PROMPT_V2, SECTION_PROMPT_V2 +from .formatter import DraftFormatter + +console = Console() + + +def _prompt_hash(text: str) -> str: + return hashlib.sha256(text.encode()).hexdigest()[:16] + + +class PipelineGenerator: + def __init__(self, config: Config, db: Database, analyzer): + self.config = config + self.db = db + self.analyzer = analyzer + self.context_builder = ContextBuilder(config, db) + + def _format_ideas_for_prompt(self, ideas: list[dict]) -> str: + if not ideas: + return "(none found)" + lines = [] + for idea in ideas: + lines.append( + f"- [{idea.get('type', '?')}] {idea['title']}: " + f"{idea['description']} (from {idea.get('draft_name', '?')})" + ) + return "\n".join(lines) + + def _format_rfcs_for_prompt(self, rfcs: list[tuple[str, int]]) -> str: + if not rfcs: + return "(none found)" + return "\n".join(f"- RFC {ref_id} (cited by {count} drafts)" for ref_id, count in rfcs) + + def _format_similar_for_prompt(self, similar: list[tuple[str, float]]) -> str: + if not similar: + return "(none found)" + lines = [] + for name, sim in similar: + draft = self.db.get_draft(name) + title = draft.title if draft else name + lines.append(f"- {name}: {title} (similarity: {sim:.2f})") + return "\n".join(lines) + + def _format_top_rated_for_prompt(self, top_rated: list[tuple]) -> str: + if not top_rated: + return "(none found)" + return "\n".join( + f"- {name}: {title} (score: {score:.1f})" + for name, title, score in top_rated + ) + + def _format_siblings_for_prompt(self, siblings: list[dict]) -> str: + if not siblings: + return "(none — this is the first draft in the family)" + lines = [] + for s in siblings: + role = s.get("role", "?") + title = s.get("title", "?") + abstract = s.get("abstract", "")[:200] + outline = s.get("outline", {}) + sections = outline.get("sections", []) + section_titles = [sec.get("title", "") for sec in sections] + lines.append( + f"- [{role}] {title}\n" + f" Abstract: {abstract}\n" + f" Sections: {', '.join(section_titles)}" + ) + return "\n".join(lines) + + def _format_terminology_for_prompt(self, outline: dict) -> str: + terms = outline.get("terminology", {}) + if not terms: + return "(none defined yet)" + return "\n".join(f"- **{term}**: {defn}" for term, defn in terms.items()) + + def generate_outline(self, context: dict, cheap: bool = False) -> dict: + """Generate outline from assembled context. Returns outline dict.""" + gap = context["gap"] + + prompt = OUTLINE_PROMPT_V2.format( + gap_topic=gap["topic"], + gap_description=gap["description"], + gap_category=gap.get("category", ""), + gap_evidence=gap.get("evidence", ""), + gap_severity=gap.get("severity", "medium"), + convergent_ideas=self._format_ideas_for_prompt(context["convergent_ideas"]), + rfc_foundations=self._format_rfcs_for_prompt(context["rfc_foundations"]), + similar_drafts=self._format_similar_for_prompt(context["similar_drafts"]), + top_rated=self._format_top_rated_for_prompt(context["top_rated"]), + wg_context=context["wg_context"], + ecosystem_vision=context["ecosystem_vision"], + sibling_context=self._format_siblings_for_prompt(context["sibling_context"]), + ) + + phash = _prompt_hash("pipeline-outline-" + prompt) + cache_key = f"_pipeline_{gap['topic']}_" + + # Check cache + cached = self.db.get_cached_response(cache_key, phash) + if cached: + try: + return json.loads(cached) + except (json.JSONDecodeError, KeyError): + pass + + text, in_tok, out_tok = self.analyzer._call_claude( + prompt, max_tokens=4096, cheap=cheap + ) + text = self.analyzer._extract_json(text) + outline = json.loads(text) + + self.db.cache_response( + cache_key, phash, + self.config.claude_model_cheap if cheap else self.config.claude_model, + prompt, text, in_tok, out_tok, + ) + + return outline + + def generate_section(self, outline: dict, section_idx: int, context: dict, cheap: bool = False) -> str: + """Generate a single section with relevant ideas and refs.""" + sections = outline["sections"] + section = sections[section_idx] + + outline_text = "\n".join( + f"{i+1}. {s['title']}: {s.get('summary', '')}" + for i, s in enumerate(sections) + ) + + # Find ideas relevant to this section + key_ideas = section.get("key_ideas", []) + relevant_ideas = [] + if key_ideas and context["convergent_ideas"]: + for idea in context["convergent_ideas"]: + for key in key_ideas: + if key.lower() in idea["title"].lower() or key.lower() in idea["description"].lower(): + relevant_ideas.append(idea) + break + if not relevant_ideas: + # Use top 3 convergent ideas as fallback + relevant_ideas = context["convergent_ideas"][:3] + + # Format RFC refs + rfc_refs = "" + norm_refs = outline.get("normative_refs", []) + info_refs = outline.get("informative_refs", []) + all_refs = norm_refs + info_refs + if all_refs: + rfc_refs = "\n".join(f"- {ref}" for ref in all_refs[:10]) + else: + rfc_refs = self._format_rfcs_for_prompt(context["rfc_foundations"][:5]) + + # Format cross-references to siblings + cross_refs = self._format_siblings_for_prompt(context["sibling_context"]) + + prompt = SECTION_PROMPT_V2.format( + draft_title=outline["title"], + abstract=outline["abstract"], + outline_text=outline_text, + section_num=section_idx + 1, + section_title=section["title"], + section_summary=section.get("summary", ""), + relevant_ideas=self._format_ideas_for_prompt(relevant_ideas), + rfc_refs=rfc_refs, + cross_refs=cross_refs, + terminology=self._format_terminology_for_prompt(outline), + ) + + phash = _prompt_hash("pipeline-section-" + prompt) + cache_key = f"_pipeline_{outline['title']}_s{section_idx}_" + + # Check cache + cached = self.db.get_cached_response(cache_key, phash) + if cached: + return cached + + text, in_tok, out_tok = self.analyzer._call_claude( + prompt, max_tokens=2048, cheap=cheap + ) + + self.db.cache_response( + cache_key, phash, + self.config.claude_model_cheap if cheap else self.config.claude_model, + prompt, text, in_tok, out_tok, + ) + + return text + + def generate_full(self, gap_topic: str, cheap: bool = False, + family_name: str = "", family_role: str = "") -> dict: + """Full pipeline: context -> outline -> sections -> assemble -> store in DB.""" + console.print(f"\n[bold]Pipeline: {gap_topic}[/]") + + # Step 1: Build context + console.print("[dim]Step 1/4:[/] Building context...") + context = self.context_builder.build_context(gap_topic) + console.print( + f" Ideas: {len(context['convergent_ideas'])}, " + f"RFCs: {len(context['rfc_foundations'])}, " + f"Similar: {len(context['similar_drafts'])}, " + f"Siblings: {len(context['sibling_context'])}" + ) + + # Step 2: Generate outline + console.print("[dim]Step 2/4:[/] Generating outline...") + outline = self.generate_outline(context, cheap=cheap) + console.print(f" Title: [cyan]{outline['title']}[/]") + console.print(f" Sections: {len(outline['sections'])}") + console.print(f" Status: {outline.get('intended_status', '?')}") + + # Step 3: Generate sections + console.print("[dim]Step 3/4:[/] Generating sections...") + sections = [] + with Progress( + SpinnerColumn(), + TextColumn("[progress.description]{task.description}"), + BarColumn(), + MofNCompleteColumn(), + console=console, + ) as progress: + task = progress.add_task("Writing...", total=len(outline["sections"])) + for i, s in enumerate(outline["sections"]): + progress.update(task, description=f"Section: {s['title'][:30]}") + text = self.generate_section(outline, i, context, cheap=cheap) + sections.append(text) + progress.advance(task) + + # Step 4: Assemble and store + console.print("[dim]Step 4/4:[/] Assembling draft...") + full_text = DraftFormatter.format_draft(outline, sections, family_name=family_name) + + # Generate draft name from title + words = outline["title"].lower().split() + slug = "-".join(w for w in words[:4] if w.isalnum()) + draft_name = f"draft-ai-{slug}-00" + + data = { + "gap_topic": gap_topic, + "draft_name": draft_name, + "title": outline["title"], + "abstract": outline.get("abstract", ""), + "outline": outline, + "sections": sections, + "full_text": full_text, + "family_name": family_name, + "family_role": family_role, + "version": 0, + "status": "draft", + } + + draft_id = self.db.upsert_generated_draft(data) + console.print(f" Stored as generated_draft id={draft_id}, name={draft_name}") + + data["id"] = draft_id + return data diff --git a/src/ietf_analyzer/pipeline/prompts.py b/src/ietf_analyzer/pipeline/prompts.py new file mode 100644 index 0000000..6ca96b1 --- /dev/null +++ b/src/ietf_analyzer/pipeline/prompts.py @@ -0,0 +1,92 @@ +"""Prompt templates for the gap-to-draft generation pipeline.""" + +from __future__ import annotations + +OUTLINE_PROMPT_V2 = """\ +You are writing an IETF Internet-Draft to address a gap in the AI/agent standardization landscape. + +## Gap to Address +Topic: {gap_topic} +Description: {gap_description} +Category: {gap_category} +Evidence: {gap_evidence} +Severity: {gap_severity} + +## Convergent Ideas from Existing Drafts +These ideas from the current landscape converge on this topic — build on them, don't duplicate: +{convergent_ideas} + +## RFC Foundations +Most-referenced RFCs in this space — cite where relevant: +{rfc_foundations} + +## Similar Existing Drafts +These drafts are closest to this gap — differentiate from them: +{similar_drafts} + +## Top-Rated Drafts in Category +Drafts the community considers strong in this area: +{top_rated} + +## Working Group Context +{wg_context} + +## Ecosystem Vision +{ecosystem_vision} + +## Sibling Drafts (same family) +{sibling_context} + +Generate a detailed outline for an Internet-Draft that fills this gap. +Return JSON: +{{ + "title": "full draft title", + "abstract": "150-250 word abstract", + "sections": [ + {{"title": "section title", "summary": "2-3 sentence summary of content", "key_ideas": ["idea titles to incorporate"]}} + ], + "normative_refs": ["RFC NNNN", "draft-name"], + "informative_refs": ["RFC NNNN", "draft-name"], + "terminology": {{"term": "definition"}}, + "target_wg": "suggested IETF working group", + "intended_status": "informational|standards-track|experimental" +}} + +Requirements: +- Include standard sections: Introduction, Terminology, Problem Statement, then 2-4 technical sections, Security Considerations, IANA Considerations +- Reference specific RFCs and drafts from the context above +- Use terminology consistent with sibling drafts if any +- Abstract should clearly state the problem, approach, and contribution +JSON only, no fences.""" + +SECTION_PROMPT_V2 = """\ +Write the following section of an Internet-Draft titled "{draft_title}". + +Abstract: {abstract} + +Full outline: +{outline_text} + +Write section {section_num}: {section_title} +Summary: {section_summary} + +## Relevant Ideas to Incorporate +{relevant_ideas} + +## RFC References to Cite +{rfc_refs} + +## Cross-References to Sister Drafts +{cross_refs} + +## Terminology +{terminology} + +Follow IETF Internet-Draft conventions: +- Formal, precise technical language +- Use RFC 2119 keywords (MUST, SHOULD, MAY) where appropriate +- Reference existing RFCs and drafts where relevant (use [RFCNNNN] format) +- 3-6 paragraphs per section +- Use the terminology definitions provided above consistently + +Write the section content only (no section number or title). Plain text.""" diff --git a/src/ietf_analyzer/pipeline/quality.py b/src/ietf_analyzer/pipeline/quality.py new file mode 100644 index 0000000..62b8c03 --- /dev/null +++ b/src/ietf_analyzer/pipeline/quality.py @@ -0,0 +1,277 @@ +"""Quality gates for generated drafts — novelty, references, format, self-rating.""" + +from __future__ import annotations + +import json +import re +from datetime import datetime, timezone + +import numpy as np +from rich.console import Console + +from ..config import Config +from ..db import Database + +console = Console() + + +def _cosine_similarity(a: np.ndarray, b: np.ndarray) -> float: + dot = np.dot(a, b) + norm = np.linalg.norm(a) * np.linalg.norm(b) + if norm == 0: + return 0.0 + return float(dot / norm) + + +REQUIRED_SECTIONS = ["introduction", "security considerations", "iana considerations"] + + +class QualityGates: + def __init__(self, config: Config, db: Database, analyzer): + self.config = config + self.db = db + self.analyzer = analyzer + + def run_all(self, draft_id: int) -> dict: + """Run all quality gates. Returns {gate_name: {passed: bool, score: float, details: str}}""" + results = {} + results["novelty"] = self.check_novelty(draft_id) + results["references"] = self.check_references(draft_id) + results["format"] = self.check_format(draft_id) + results["self_rating"] = self.check_self_rating(draft_id) + + passed = sum(1 for r in results.values() if r["passed"]) + total = len(results) + console.print( + f"Quality gates: [{'green' if passed == total else 'yellow'}]" + f"{passed}/{total} passed[/]" + ) + for name, result in results.items(): + status = "[green]PASS[/]" if result["passed"] else "[red]FAIL[/]" + console.print(f" {status} {name}: {result['details']}") + + return results + + def check_novelty(self, draft_id: int) -> dict: + """Embed generated abstract, compare against all existing drafts. + Flag if max_similarity > 0.90.""" + gd = self.db.get_generated_draft(draft_id) + if not gd: + return {"passed": False, "score": 0.0, "details": "Draft not found"} + + abstract = gd.get("abstract", "") + title = gd.get("title", "") + text_to_embed = f"{title}\n\n{abstract}" + + if not text_to_embed.strip(): + return {"passed": False, "score": 0.0, "details": "No abstract to check"} + + # Embed via Ollama + try: + import ollama as ollama_lib + client = ollama_lib.Client(host=self.config.ollama_url) + resp = client.embed( + model=self.config.ollama_embed_model, + input=text_to_embed[:8000], + ) + gen_vec = np.array(resp["embeddings"][0], dtype=np.float32) + except Exception as e: + return {"passed": True, "score": 0.0, + "details": f"Ollama unavailable, skipping novelty check: {e}"} + + all_embeddings = self.db.all_embeddings() + if not all_embeddings: + return {"passed": True, "score": 1.0, "details": "No existing embeddings to compare"} + + max_sim = 0.0 + most_similar = "" + for name, vec in all_embeddings.items(): + sim = _cosine_similarity(gen_vec, vec) + if sim > max_sim: + max_sim = sim + most_similar = name + + passed = max_sim < 0.90 + return { + "passed": passed, + "score": 1.0 - max_sim, + "details": ( + f"Max similarity: {max_sim:.3f} with {most_similar}" + + ("" if passed else " — too similar, needs differentiation") + ), + } + + def check_references(self, draft_id: int) -> dict: + """Extract RFC/draft refs via regex, cross-check against draft_refs table.""" + gd = self.db.get_generated_draft(draft_id) + if not gd: + return {"passed": False, "score": 0.0, "details": "Draft not found"} + + full_text = gd.get("full_text", "") + if not full_text: + return {"passed": False, "score": 0.0, "details": "No full text"} + + # Extract references from generated text + rfc_pattern = re.compile(r'\[?RFC\s*(\d{3,5})\]?', re.IGNORECASE) + draft_pattern = re.compile(r'(draft-[a-z0-9-]+)', re.IGNORECASE) + + found_rfcs = set(rfc_pattern.findall(full_text)) + found_drafts = set(draft_pattern.findall(full_text)) + + total_refs = len(found_rfcs) + len(found_drafts) + + # Cross-check: how many of these RFCs are actually in our DB? + known_rfcs = set() + for ref_id in found_rfcs: + drafts = self.db.drafts_referencing("rfc", ref_id) + if drafts: + known_rfcs.add(ref_id) + + # Cross-check: how many referenced drafts exist in our DB? + known_drafts = set() + for dname in found_drafts: + if self.db.get_draft(dname): + known_drafts.add(dname) + + verified = len(known_rfcs) + len(known_drafts) + score = verified / total_refs if total_refs > 0 else 0.0 + + passed = total_refs >= 3 and score >= 0.3 + return { + "passed": passed, + "score": score, + "details": ( + f"{total_refs} refs found ({len(found_rfcs)} RFCs, {len(found_drafts)} drafts), " + f"{verified} verified in DB ({score:.0%})" + ), + } + + def check_format(self, draft_id: int) -> dict: + """Check line length <= 72, required sections present, no markdown leaked.""" + gd = self.db.get_generated_draft(draft_id) + if not gd: + return {"passed": False, "score": 0.0, "details": "Draft not found"} + + full_text = gd.get("full_text", "") + if not full_text: + return {"passed": False, "score": 0.0, "details": "No full text"} + + issues = [] + + # Check line length + lines = full_text.split("\n") + long_lines = [i + 1 for i, line in enumerate(lines) if len(line) > 72] + if long_lines: + issues.append(f"{len(long_lines)} lines exceed 72 chars") + + # Check required sections + text_lower = full_text.lower() + for section in REQUIRED_SECTIONS: + if section not in text_lower: + issues.append(f"Missing required section: {section}") + + # Check for leaked markdown + markdown_patterns = [ + (r'^#{1,3}\s', "markdown headers (# )"), + (r'\*\*[^*]+\*\*', "bold markdown (**text**)"), + (r'```', "code fences (```)"), + (r'\[([^\]]+)\]\(http', "markdown links"), + ] + for pattern, desc in markdown_patterns: + if re.search(pattern, full_text, re.MULTILINE): + issues.append(f"Leaked markdown: {desc}") + + if not issues: + return {"passed": True, "score": 1.0, "details": "All format checks pass"} + + score = max(0.0, 1.0 - len(issues) * 0.25) + return { + "passed": len(issues) <= 1, # Allow one minor issue + "score": score, + "details": "; ".join(issues), + } + + def check_self_rating(self, draft_id: int) -> dict: + """Feed through existing rate_draft() pipeline. Score on same 1-5 scale.""" + gd = self.db.get_generated_draft(draft_id) + if not gd: + return {"passed": False, "score": 0.0, "details": "Draft not found"} + + # Create a temporary prompt matching the analyzer's rating format + title = gd.get("title", "") + abstract = gd.get("abstract", "") + draft_name = gd.get("draft_name", "") + + from ..analyzer import RATE_PROMPT_COMPACT, CATEGORIES_SHORT, _prompt_hash + + prompt = RATE_PROMPT_COMPACT.format( + name=draft_name, + title=title, + time=datetime.now(timezone.utc).strftime("%Y-%m-%d"), + pages="?", + abstract=abstract[:2000], + categories=", ".join(CATEGORIES_SHORT), + ) + + phash = _prompt_hash("self-rate-" + prompt) + cache_key = f"_selfrate_{draft_id}_" + + # Check cache + cached = self.db.get_cached_response(cache_key, phash) + if cached: + try: + data = json.loads(cached) + return self._parse_self_rating(data, draft_id) + except (json.JSONDecodeError, KeyError): + pass + + try: + text, in_tok, out_tok = self.analyzer._call_claude(prompt, max_tokens=512, cheap=True) + text = self.analyzer._extract_json(text) + data = json.loads(text) + + self.db.cache_response( + cache_key, phash, + self.config.claude_model_cheap, + prompt, text, in_tok, out_tok, + ) + + return self._parse_self_rating(data, draft_id) + except Exception as e: + return {"passed": False, "score": 0.0, + "details": f"Self-rating failed: {e}"} + + def _parse_self_rating(self, data: dict, draft_id: int) -> dict: + """Parse self-rating result and update the generated draft.""" + novelty = int(data.get("n", data.get("novelty", 3))) + maturity = int(data.get("m", data.get("maturity", 3))) + relevance = int(data.get("r", data.get("relevance", 3))) + overlap = int(data.get("o", data.get("overlap", 3))) + momentum = int(data.get("mo", data.get("momentum", 3))) + + composite = ( + novelty * 0.30 + + relevance * 0.25 + + maturity * 0.20 + + momentum * 0.15 + + (6 - overlap) * 0.10 + ) + + # Store rating on the generated draft + gd = self.db.get_generated_draft(draft_id) + if gd: + self.db.conn.execute( + "UPDATE generated_drafts SET rating_json = ?, quality_score = ? WHERE id = ?", + (json.dumps(data), composite, draft_id), + ) + self.db.conn.commit() + + passed = composite >= 2.5 + return { + "passed": passed, + "score": composite / 5.0, + "details": ( + f"Composite: {composite:.1f}/5 " + f"(N:{novelty} M:{maturity} O:{overlap} Mo:{momentum} R:{relevance})" + ), + } diff --git a/src/ietf_analyzer/reports.py b/src/ietf_analyzer/reports.py index 4087bd4..4cf1797 100644 --- a/src/ietf_analyzer/reports.py +++ b/src/ietf_analyzer/reports.py @@ -9,7 +9,7 @@ from pathlib import Path from .config import Config from .db import Database -from .models import Draft, Rating +from .models import Draft, Rating, normalize_category STAR = {1: "\u2581", 2: "\u2583", 3: "\u2585", 4: "\u2587", 5: "\u2588"} @@ -409,6 +409,8 @@ class Reporter: def authors_report(self) -> str: """Generate author/organization network report.""" + from .orgs import normalize_org, detect_blocs, top_orgs_normalized, cross_org_normalized + now = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M UTC") author_count = self.db.author_count() total_drafts = self.db.count_drafts() @@ -424,7 +426,7 @@ class Reporter: f"*Generated {now} — {author_count} unique authors across {total_drafts} drafts*\n", ] - # Top authors + # ── Section 1: Top Authors ── top = self.db.top_authors(limit=30) lines.extend([ "## Top Authors by Draft Count\n", @@ -438,10 +440,10 @@ class Reporter: if r: cats.update(r.categories) cat_str = ", ".join(sorted(cats)[:3]) - lines.append(f"| {rank} | {name} | {aff} | {cnt} | {cat_str} |") + lines.append(f"| {rank} | {name} | {normalize_org(aff)} | {cnt} | {cat_str} |") - # Top orgs - orgs = self.db.top_orgs(limit=20) + # ── Section 2: Top Organizations (normalized) ── + orgs = top_orgs_normalized(self.db, limit=20) lines.extend([ "\n## Top Organizations\n", "| # | Organization | Authors | Drafts |", @@ -450,19 +452,66 @@ class Reporter: for rank, (org, authors, drafts) in enumerate(orgs, 1): lines.append(f"| {rank} | {org} | {authors} | {drafts} |") - # Co-author pairs + # ── Section 3: Team Blocs ── + blocs = detect_blocs(self.db, cohesion_threshold=0.70, min_size=2) + bloc_pid_map: dict[int, int] = {} # pid -> bloc index (for ALL blocs) + + # Register all bloc members for pair filtering (even small blocs) + for i, bloc in enumerate(blocs): + for pid, _, _ in bloc.members: + bloc_pid_map[pid] = i + + # Only display blocs with >= 3 shared drafts (significant teams) + display_blocs = [b for b in blocs if b.shared_drafts >= 3] + if display_blocs: + lines.extend([ + "\n## Team Blocs\n", + "*Persistent co-author teams (>= 70% pairwise draft overlap, >= 3 shared drafts).*\n", + "| # | Team | Members | Shared Drafts | Cohesion | Key Authors |", + "|--:|------|--------:|-----:|--------:|------------|", + ]) + for i, bloc in enumerate(display_blocs): + names = ", ".join( + f"{n.split()[0][0]}. {n.split()[-1]}" if " " in n else n + for _, n, _ in bloc.members[:6] + ) + if len(bloc.members) > 6: + names += f" +{len(bloc.members) - 6}" + lines.append( + f"| {i + 1} | {bloc.label} | {len(bloc.members)} " + f"| {bloc.shared_drafts} | {bloc.cohesion:.0%} | {names} |" + ) + + # ── Section 4: Top Collaboration Pairs (cross-bloc) ── coauthors = self.db.coauthor_pairs() if coauthors: + # Get pid mapping for filtering + pid_lookup: dict[str, int] = {} + for r in self.db.conn.execute("SELECT person_id, name FROM authors").fetchall(): + pid_lookup[r[1]] = r[0] + lines.extend([ - "\n## Strongest Collaboration Pairs\n", + "\n## Top Collaboration Pairs\n", + "*Excluding intra-bloc pairs (see Team Blocs above).*\n", "| Author A | Author B | Shared Drafts |", "|----------|----------|-----:|", ]) - for a, b, shared in coauthors[:20]: + shown = 0 + for a, b, shared in coauthors: + pid_a = pid_lookup.get(a) + pid_b = pid_lookup.get(b) + # Skip if both are in the same bloc + if (pid_a is not None and pid_b is not None + and pid_a in bloc_pid_map and pid_b in bloc_pid_map + and bloc_pid_map[pid_a] == bloc_pid_map[pid_b]): + continue lines.append(f"| {a} | {b} | {shared} |") + shown += 1 + if shown >= 20: + break - # Cross-org - cross = self.db.cross_org_collaborations(limit=15) + # ── Section 5: Cross-Organization Collaboration (normalized) ── + cross = cross_org_normalized(self.db, limit=15) if cross: lines.extend([ "\n## Cross-Organization Collaboration\n", @@ -564,40 +613,1063 @@ class Reporter: return str(path) def gaps_report(self) -> str: - """Generate gap analysis report.""" + """Generate detailed gap analysis report with cross-references.""" now = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M UTC") gaps = self.db.all_gaps() total_drafts = self.db.count_drafts() + all_ideas = self.db.all_ideas() + + # Build category -> (draft, rating) mapping (case-insensitive) + pairs = self.db.drafts_with_ratings(limit=500) + cat_drafts: dict[str, list[tuple[Draft, Rating]]] = defaultdict(list) + for draft, rating in pairs: + for c in rating.categories: + cat_drafts[c.lower()].append((draft, rating)) + + # Idea index + idea_count_total = self.db.idea_count() lines = [ "# Gap Analysis: IETF AI/Agent Draft Landscape", - f"*Generated {now} — analyzing {total_drafts} drafts*\n", + f"*Generated {now} — analyzing {total_drafts} drafts, " + f"{idea_count_total} technical ideas*\n", + "## Overview\n", + f"This report identifies **{len(gaps)} gaps** — areas, problems, or " + f"technical challenges not adequately addressed by the current {total_drafts} " + f"IETF AI/agent drafts. Each gap is cross-referenced with related drafts " + f"and extracted technical ideas to show partial coverage.\n", ] - # Group by severity + # Summary table severity_order = {"critical": 0, "high": 1, "medium": 2, "low": 3} gaps.sort(key=lambda g: severity_order.get(g["severity"], 4)) - for i, gap in enumerate(gaps, 1): - sev = gap["severity"].upper() - lines.extend([ - f"### {i}. {gap['topic']}", - f"**Severity:** {sev} ", - f"**Category:** {gap['category'] or 'cross-cutting'} ", - f"**Description:** {gap['description']} ", - f"**Evidence:** {gap['evidence']}\n", - ]) - - # Summary by_sev: dict[str, int] = defaultdict(int) for g in gaps: by_sev[g["severity"]] += 1 - lines.append("## Summary by Severity\n") + + lines.extend([ + "| Severity | Count |", + "|----------|------:|", + ]) for sev in ["critical", "high", "medium", "low"]: if by_sev[sev]: - lines.append(f"- **{sev.title()}:** {by_sev[sev]} gaps") + lines.append(f"| **{sev.upper()}** | {by_sev[sev]} |") + lines.append("") + + # Safety deficit callout + safety_count = len(cat_drafts.get("ai safety/alignment", [])) + protocol_count = len(cat_drafts.get("a2a protocols", [])) + netops_count = len(cat_drafts.get("autonomous netops", [])) + lines.extend([ + "### Safety Deficit\n", + f"Only **{safety_count}** of {total_drafts} drafts address AI safety/alignment, " + f"while **{protocol_count}** focus on A2A protocols and **{netops_count}** on " + f"autonomous operations. The ratio of capability-building to safety is " + f"roughly **{(protocol_count + netops_count) // max(safety_count, 1)}:1**.\n", + ]) + + # Detailed gap sections + lines.append("---\n") + + for i, gap in enumerate(gaps, 1): + sev = gap["severity"].upper() + cat = gap["category"] + cat_lower = cat.lower() + related = cat_drafts.get(cat_lower, []) + + lines.extend([ + f"## {i}. {gap['topic']}", + "", + f"| | |", + f"|---|---|", + f"| **Severity** | {sev} |", + f"| **Category** | {cat or 'cross-cutting'} |", + f"| **Drafts in category** | {len(related)} |", + "", + f"{gap['description']}\n", + ]) + + if gap["evidence"]: + lines.append(f"**Evidence:** {gap['evidence']}\n") + + # Related drafts (FTS search for gap topic keywords) + keywords = [kw for kw in gap["topic"].replace("and", "").split() if len(kw) > 4] + fts_results: list[Draft] = [] + seen: set[str] = set() + for kw in keywords: + try: + found = self.db.search_drafts('"' + kw + '"', limit=5) + for d in found: + if d.name not in seen: + seen.add(d.name) + fts_results.append(d) + except Exception: + pass + + if fts_results or related: + lines.append("### Related Drafts\n") + + if fts_results: + lines.append("**Keyword matches** (drafts mentioning gap topic):\n") + for d in fts_results[:6]: + r = self.db.get_rating(d.name) + score = f"score {r.composite_score:.1f}" if r else "unrated" + lines.append( + f"- [{d.name}]({d.datatracker_url}) ({score}) — {d.title[:80]}" + ) + lines.append("") + + if related: + # Top-rated drafts in the same category + top_related = sorted(related, key=lambda x: x[1].composite_score, reverse=True) + lines.append(f"**Top-rated in {cat}** ({len(related)} drafts):\n") + for d, r in top_related[:5]: + lines.append( + f"- [{d.name}]({d.datatracker_url}) ({r.composite_score:.1f}) " + f"— {r.summary[:100]}" + ) + lines.append("") + + # Related ideas + gap_kws = set(kw.lower() for kw in gap["topic"].split() if len(kw) > 3) + matching_ideas = [] + for idea in all_ideas: + t = idea["title"].lower() + d = idea["description"].lower() + hits = sum(1 for kw in gap_kws if kw in t or kw in d) + if hits >= 2: + matching_ideas.append((hits, idea)) + matching_ideas.sort(key=lambda x: x[0], reverse=True) + + if matching_ideas: + lines.extend([ + "### Partially Addressing Ideas\n", + f"{len(matching_ideas)} extracted ideas touch on this gap:\n", + "| Idea | Draft | Type |", + "|------|-------|------|", + ]) + for _, idea in matching_ideas[:8]: + lines.append( + f"| {idea['title']} | {idea['draft_name']} | {idea.get('type', '')} |" + ) + if len(matching_ideas) > 8: + lines.append(f"\n*...and {len(matching_ideas) - 8} more*") + lines.append("") + else: + lines.append("### Partially Addressing Ideas\n") + lines.append("No directly related technical ideas found in current drafts — " + "this gap is entirely unaddressed.\n") + + lines.append("---\n") + + # Cross-cutting analysis + lines.extend([ + "## Cross-Cutting Analysis\n", + "### Gaps by Category\n", + "| Category | Drafts | Gaps | Gap Topics |", + "|----------|-------:|-----:|------------|", + ]) + gap_by_cat: dict[str, list[str]] = defaultdict(list) + for g in gaps: + gap_by_cat[g["category"].lower()].append(g["topic"]) + + all_cats = sorted(set(list(cat_drafts.keys()) + list(gap_by_cat.keys()))) + for cat in all_cats: + draft_count = len(cat_drafts.get(cat, [])) + gap_topics = gap_by_cat.get(cat, []) + if gap_topics: + topics = "; ".join(gap_topics) + lines.append(f"| {cat} | {draft_count} | {len(gap_topics)} | {topics} |") + + # Recommendations + lines.extend([ + "\n## Recommendations\n", + "Based on the gap analysis, the highest-impact areas for new standardization work:\n", + "1. **Runtime behavior verification** — The most critical safety gap. " + "Agents declare policies but nothing validates compliance at runtime.", + "2. **Error recovery and rollback** — Autonomous operations need " + "standardized failure handling before real deployment at scale.", + "3. **Protocol interoperability layer** — 92 competing A2A protocols need " + "a translation/negotiation framework to avoid fragmentation.", + "4. **Dynamic trust systems** — Static certificates cannot scale to " + "long-running agent ecosystems. Trust must be earned and revocable.", + "5. **Human emergency override** — The 7:1 ratio of autonomous capability " + "to human oversight drafts is concerning for production deployments.", + ]) report = "\n".join(lines) path = self.output_dir / "gaps.md" path.write_text(report) return str(path) + + def refs_report(self) -> str: + """Generate cross-reference report — which RFCs/standards the agent ecosystem builds on.""" + now = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M UTC") + stats = self.db.ref_stats() + total_drafts = self.db.count_drafts() + + # Build rating lookup for categories + pairs_data = self.db.drafts_with_ratings(limit=500) + rating_map: dict[str, Rating] = {} + for draft, rating in pairs_data: + rating_map[draft.name] = rating + + lines = [ + "# Cross-Reference Report: Standards Foundation of the AI Agent Ecosystem", + f"*Generated {now} — {stats['drafts_with_refs']} of {total_drafts} drafts analyzed, " + f"{stats['total_refs']} total references " + f"({stats['rfc_refs']} RFC, {stats['draft_refs']} draft, {stats['bcp_refs']} BCP)*\n", + ] + + # Well-known RFC names for context + rfc_names = { + "2119": "Key words (MUST/SHALL/MAY)", + "8174": "Key words update", + "8259": "JSON", + "7519": "JWT", + "6749": "OAuth 2.0", + "7540": "HTTP/2", + "9110": "HTTP Semantics", + "7525": "TLS Recommendations", + "8446": "TLS 1.3", + "3986": "URIs", + "7230": "HTTP/1.1 Message Syntax", + "7231": "HTTP/1.1 Semantics", + "8288": "Web Linking", + "6125": "TLS Server Identity", + "7515": "JWS", + "7516": "JWE", + "7517": "JWK", + "7518": "JWA", + "9449": "DPoP", + "6750": "OAuth Bearer", + "8725": "JWT Best Practices", + "9396": "Rich Authorization Requests", + "9101": "JAR (JWT-Secured Authorization)", + "8414": "OAuth Server Metadata", + "7591": "Dynamic Client Registration", + "8705": "mTLS for OAuth", + "9068": "JWT Access Tokens", + "6819": "OAuth Threat Model", + "9200": "ACE-OAuth", + "9052": "COSE", + "8392": "CWT", + "7252": "CoAP", + } + + # Top RFCs + top_rfcs = self.db.top_referenced(ref_type="rfc", limit=40) + if top_rfcs: + lines.extend([ + "## Most-Referenced RFCs\n", + "These are the standards building blocks of the IETF AI/agent ecosystem.\n", + "| # | RFC | Name | Referenced By |", + "|--:|-----|------|-------------:|", + ]) + for rank, (rid, cnt, drafts) in enumerate(top_rfcs, 1): + name = rfc_names.get(rid, "") + lines.append(f"| {rank} | RFC {rid} | {name} | {cnt} drafts |") + + # Categorize the foundation + lines.extend([ + "\n### Foundation Categories\n", + "Grouping the most-referenced RFCs by function:\n", + ]) + + foundation_cats = { + "Language/Conventions": ["2119", "8174"], + "Data Formats": ["8259", "3986", "8288"], + "HTTP": ["7540", "9110", "7230", "7231"], + "Security/TLS": ["7525", "8446", "6125"], + "OAuth/Identity": ["6749", "6750", "7519", "7515", "7516", "7517", "7518", + "8725", "9449", "9396", "9101", "8414", "7591", "8705", + "9068", "6819"], + "IoT/Constrained": ["9200", "9052", "8392", "7252"], + } + + rfc_set = {rid for rid, _, _ in top_rfcs} + for fcat, rfcs in foundation_cats.items(): + hits = [r for r in rfcs if r in rfc_set] + if hits: + total_refs = sum(cnt for rid, cnt, _ in top_rfcs if rid in hits) + rfc_list = ", ".join(f"RFC {r}" for r in hits) + lines.append(f"- **{fcat}** ({total_refs} total refs): {rfc_list}") + + # Top draft cross-references + top_drafts = self.db.top_referenced(ref_type="draft", limit=20) + if top_drafts: + lines.extend([ + "\n## Most-Referenced Drafts\n", + "These drafts are the most-cited within the AI/agent corpus itself.\n", + "| # | Draft | Referenced By |", + "|--:|-------|-------------:|", + ]) + for rank, (rid, cnt, drafts) in enumerate(top_drafts, 1): + lines.append(f"| {rank} | {rid} | {cnt} drafts |") + + # Drafts with most outgoing references + ref_counts = self.db.ref_counts_by_draft() + if ref_counts: + lines.extend([ + "\n## Drafts With Most References (most well-connected)\n", + "| # | Draft | RFCs | Drafts | BCPs | Total |", + "|--:|-------|-----:|-------:|-----:|------:|", + ]) + # Sort by total + sorted_counts = sorted(ref_counts, key=lambda x: x[1] + x[2] + x[3], reverse=True) + for rank, (dname, rfcs, drafts_cnt, bcps) in enumerate(sorted_counts[:20], 1): + total = rfcs + drafts_cnt + bcps + lines.append(f"| {rank} | {dname} | {rfcs} | {drafts_cnt} | {bcps} | {total} |") + + # Category analysis: which categories reference which RFCs most + cat_rfc_counts: dict[str, dict[str, int]] = defaultdict(lambda: defaultdict(int)) + for draft_name, rating in rating_map.items(): + draft_refs = self.db.get_refs_for_draft(draft_name) + for rt, rid in draft_refs: + if rt == "rfc": + for cat in rating.categories: + cat_rfc_counts[cat][rid] += 1 + + if cat_rfc_counts: + lines.extend([ + "\n## Category-Specific RFC Dependencies\n", + "What each category builds on:\n", + ]) + for cat in sorted(cat_rfc_counts.keys()): + rfc_counts = cat_rfc_counts[cat] + top_3 = sorted(rfc_counts.items(), key=lambda x: x[1], reverse=True)[:3] + rfc_list = ", ".join( + f"RFC {rid} ({rfc_names.get(rid, '')})" if rfc_names.get(rid) else f"RFC {rid}" + for rid, _ in top_3 + ) + lines.append(f"- **{cat}**: {rfc_list}") + + report = "\n".join(lines) + path = self.output_dir / "refs.md" + path.write_text(report) + return str(path) + + def trends_report(self) -> str: + """Generate category trend analysis report with monthly breakdown and growth rates.""" + now = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M UTC") + pairs = self.db.drafts_with_ratings(limit=500) + all_drafts = self.db.list_drafts(limit=500, order_by="time ASC") + total = len(all_drafts) + + rating_map = {draft.name: rating for draft, rating in pairs} + + # Monthly counts per category + monthly: dict[str, dict[str, int]] = defaultdict(lambda: defaultdict(int)) + all_cats: set[str] = set() + for d in all_drafts: + month = d.time[:7] if d.time else "unknown" + r = rating_map.get(d.name) + if r: + for c in r.categories: + monthly[month][c] += 1 + all_cats.add(c) + + months = sorted(m for m in monthly.keys() if m != "unknown") + cats = sorted(all_cats) + + lines = [ + "# Category Trend Analysis", + f"*Generated {now} — {total} drafts, {len(months)} months, {len(cats)} categories*\n", + ] + + # Growth summary + recent_months = months[-3:] if len(months) >= 3 else months + prev_months = months[-6:-3] if len(months) >= 6 else [] + + lines.extend([ + "## Growth Summary\n", + "| Category | Total | Last 3mo | Prev 3mo | Growth |", + "|----------|------:|---------:|---------:|-------:|", + ]) + + cumulative: dict[str, int] = defaultdict(int) + for month in months: + for cat in cats: + cumulative[cat] += monthly[month].get(cat, 0) + + for cat in cats: + total_cat = cumulative[cat] + recent = sum(monthly[m].get(cat, 0) for m in recent_months) + prev = sum(monthly[m].get(cat, 0) for m in prev_months) if prev_months else 0 + if prev > 0: + growth_str = f"{((recent - prev) / prev) * 100:+.0f}%" + elif recent > 0: + growth_str = "new" + else: + growth_str = "-" + lines.append(f"| {cat} | {total_cat} | {recent} | {prev if prev_months else '-'} | {growth_str} |") + + # Monthly detail table + lines.extend(["\n## Monthly Breakdown\n"]) + header = "| Month |" + " | ".join(f" {c[:15]}" for c in cats) + " | Total |" + sep = "|-------|" + " | ".join("---:" for _ in cats) + " | -----:|" + lines.append(header) + lines.append(sep) + + for month in months: + counts = [str(monthly[month].get(c, 0)) for c in cats] + month_total = sum(monthly[month].values()) + lines.append(f"| {month} | " + " | ".join(counts) + f" | {month_total} |") + + # Half-over-half comparison + if len(months) >= 4: + mid = len(months) // 2 + early = months[:mid] + late = months[mid:] + + lines.extend([ + "\n## Fastest Growing Categories (early vs late half)\n", + ]) + + growth_data = [] + for cat in cats: + e = sum(monthly[m].get(cat, 0) for m in early) + l = sum(monthly[m].get(cat, 0) for m in late) + if e > 0: + pct = ((l - e) / e) * 100 + growth_data.append((cat, pct, e, l)) + elif l > 0: + growth_data.append((cat, float("inf"), e, l)) + + growth_data.sort(key=lambda x: x[1], reverse=True) + for cat, pct, e, l in growth_data: + if pct == float("inf"): + lines.append(f"- **{cat}**: new (0 -> {l} drafts)") + else: + lines.append(f"- **{cat}**: {pct:+.0f}% ({e} -> {l} drafts)") + + report = "\n".join(lines) + path = self.output_dir / "trends.md" + path.write_text(report) + return str(path) + + def idea_overlap_report(self, threshold: float = 0.75) -> str: + """Generate cross-org idea overlap report.""" + from difflib import SequenceMatcher + from .orgs import normalize_org + + now = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M UTC") + all_ideas = self.db.all_ideas() + total_drafts = self.db.count_drafts() + + # Build draft -> orgs mapping + draft_orgs: dict[str, set[str]] = defaultdict(set) + rows = self.db.conn.execute( + """SELECT da.draft_name, a.affiliation + FROM draft_authors da + JOIN authors a ON da.person_id = a.person_id + WHERE a.affiliation != ''""" + ).fetchall() + for r in rows: + org = normalize_org(r["affiliation"]) + if org and org != "Independent": + draft_orgs[r["draft_name"]].add(org) + + # Group similar ideas + idea_groups: list[dict] = [] + for idea in all_ideas: + title_lower = idea["title"].lower().strip() + matched = False + for group in idea_groups: + ratio = SequenceMatcher(None, title_lower, group["canonical"]).ratio() + if ratio >= threshold: + group["ideas"].append(idea) + group["drafts"].add(idea["draft_name"]) + group["orgs"].update(draft_orgs.get(idea["draft_name"], set())) + matched = True + break + if not matched: + idea_groups.append({ + "canonical": title_lower, + "title": idea["title"], + "ideas": [idea], + "drafts": {idea["draft_name"]}, + "orgs": set(draft_orgs.get(idea["draft_name"], set())), + }) + + cross_org = [g for g in idea_groups if len(g["orgs"]) >= 2] + cross_org.sort(key=lambda g: (-len(g["orgs"]), -len(g["drafts"]))) + + lines = [ + "# Cross-Organization Idea Overlap", + f"*Generated {now} — {len(all_ideas)} ideas from {total_drafts} drafts*\n", + f"**{len(cross_org)}** ideas appear across 2+ organizations, " + f"out of {len(idea_groups)} unique idea clusters.\n", + ] + + if cross_org: + # Top convergence points + lines.extend([ + "## Top Convergence Points\n", + "Ideas where the most organizations independently converge:\n", + "| # | Idea | Orgs | Drafts | Organizations |", + "|--:|------|-----:|-------:|---------------|", + ]) + for rank, g in enumerate(cross_org[:30], 1): + org_list = ", ".join(sorted(g["orgs"])) + draft_list = ", ".join(sorted(g["drafts"])[:3]) + if len(g["drafts"]) > 3: + draft_list += f" +{len(g['drafts']) - 3}" + lines.append( + f"| {rank} | {g['title']} | {len(g['orgs'])} | {len(g['drafts'])} | {org_list} |" + ) + + # Org-pair overlap heatmap + org_pair_ideas: dict[tuple[str, str], list[str]] = defaultdict(list) + for g in cross_org: + orgs_sorted = sorted(g["orgs"]) + for i in range(len(orgs_sorted)): + for j in range(i + 1, len(orgs_sorted)): + key = (orgs_sorted[i], orgs_sorted[j]) + org_pair_ideas[key].append(g["title"]) + + top_pairs = sorted(org_pair_ideas.items(), key=lambda x: -len(x[1])) + if top_pairs: + lines.extend([ + "\n## Most Overlapping Organization Pairs\n", + "| Org A | Org B | Shared Ideas | Examples |", + "|-------|-------|-------------:|----------|", + ]) + for (org_a, org_b), ideas_list in top_pairs[:20]: + examples = "; ".join(ideas_list[:3]) + if len(ideas_list) > 3: + examples += f" +{len(ideas_list) - 3}" + lines.append(f"| {org_a} | {org_b} | {len(ideas_list)} | {examples} |") + + # By idea type + type_cross: dict[str, int] = defaultdict(int) + for g in cross_org: + for idea in g["ideas"]: + type_cross[idea.get("type", "other")] += 1 + if type_cross: + lines.extend(["\n## Cross-Org Ideas by Type\n"]) + for t, count in sorted(type_cross.items(), key=lambda x: -x[1]): + lines.append(f"- **{t or 'untyped'}**: {count}") + + report = "\n".join(lines) + path = self.output_dir / "idea-overlap.md" + path.write_text(report) + return str(path) + + def status_report(self) -> str: + """Generate WG adoption status report — traction vs aspiration.""" + now = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M UTC") + all_status = self.db.draft_adoption_status() + total = len(all_status) + adopted = [s for s in all_status if s["wg_adopted"]] + individual = [s for s in all_status if not s["wg_adopted"]] + irtf = [s for s in all_status if s["stream"] == "irtf"] + + # Build rating/category lookup + pairs = self.db.drafts_with_ratings(limit=500) + rating_map: dict[str, Rating] = {} + for draft, rating in pairs: + rating_map[draft.name] = rating + + adopted_names = {s["name"] for s in adopted} + + lines = [ + "# WG Adoption Status Report", + f"*Generated {now} — {total} drafts analyzed*\n", + "## Overview\n", + f"- **WG-adopted** (draft-ietf-*): **{len(adopted)}** ({len(adopted)/total*100:.1f}%)", + f"- **IRTF** (draft-irtf-*): **{len(irtf)}**", + f"- **Individual**: **{len(individual)}** ({len(individual)/total*100:.1f}%)\n", + ] + + # WG breakdown + wg_groups: dict[str, list[dict]] = defaultdict(list) + for s in adopted: + wg_groups[s["wg_name"]].append(s) + + lines.extend([ + "## Working Groups with AI/Agent Drafts\n", + "| # | WG | Drafts | Draft Names |", + "|--:|:---|-------:|-------------|", + ]) + for rank, (wg_name, drafts) in enumerate( + sorted(wg_groups.items(), key=lambda x: -len(x[1])), 1 + ): + draft_names = ", ".join(d["name"] for d in drafts) + lines.append(f"| {rank} | {wg_name} | {len(drafts)} | {draft_names} |") + + # Score comparison + adopted_scores = [r.composite_score for d, r in pairs if d.name in adopted_names] + individual_scores = [r.composite_score for d, r in pairs if d.name not in adopted_names] + + if adopted_scores and individual_scores: + avg_adopted = sum(adopted_scores) / len(adopted_scores) + avg_individual = sum(individual_scores) / len(individual_scores) + lines.extend([ + "\n## Score Comparison: WG-Adopted vs Individual\n", + "| Metric | WG-Adopted | Individual |", + "|--------|----------:|----------:|", + f"| Count (rated) | {len(adopted_scores)} | {len(individual_scores)} |", + f"| Average Score | {avg_adopted:.2f} | {avg_individual:.2f} |", + f"| Min Score | {min(adopted_scores):.2f} | {min(individual_scores):.2f} |", + f"| Max Score | {max(adopted_scores):.2f} | {max(individual_scores):.2f} |", + ]) + + # Per-dimension comparison + dims = ["novelty", "maturity", "overlap", "momentum", "relevance"] + lines.extend([ + "\n### Per-Dimension Comparison\n", + "| Dimension | WG-Adopted Avg | Individual Avg | Delta |", + "|-----------|---------------:|---------------:|------:|", + ]) + for dim in dims: + adopted_dim = [getattr(r, dim) for d, r in pairs if d.name in adopted_names] + individual_dim = [getattr(r, dim) for d, r in pairs if d.name not in adopted_names] + if adopted_dim and individual_dim: + avg_a = sum(adopted_dim) / len(adopted_dim) + avg_i = sum(individual_dim) / len(individual_dim) + delta = avg_a - avg_i + lines.append(f"| {dim.capitalize()} | {avg_a:.2f} | {avg_i:.2f} | {delta:+.2f} |") + + # Category distribution comparison (normalize old verbose names) + adopted_cats: dict[str, int] = defaultdict(int) + individual_cats: dict[str, int] = defaultdict(int) + for d, r in pairs: + cat_dict = adopted_cats if d.name in adopted_names else individual_cats + for c in r.categories: + cat_dict[normalize_category(c)] += 1 + + all_cats = sorted(set(list(adopted_cats.keys()) + list(individual_cats.keys()))) + if all_cats: + lines.extend([ + "\n## Category Distribution: WG-Adopted vs Individual\n", + "| Category | WG-Adopted | Individual | % WG |", + "|----------|----------:|----------:|-----:|", + ]) + for cat in all_cats: + a = adopted_cats.get(cat, 0) + i = individual_cats.get(cat, 0) + pct = a / (a + i) * 100 if (a + i) > 0 else 0 + lines.append(f"| {cat} | {a} | {i} | {pct:.0f}% |") + + # Gap coverage + gaps = self.db.all_gaps() + if gaps: + adopted_cat_set = {c.lower() for c in adopted_cats.keys()} + lines.extend([ + "\n## Gap Coverage by WG-Adopted Work\n", + "Do any WG-adopted drafts address the identified gaps?\n", + "| Gap | Severity | WG Coverage |", + "|-----|----------|-------------|", + ]) + for g in gaps: + cat_lower = g["category"].lower() + has_wg = "Yes" if cat_lower in adopted_cat_set else "**No**" + lines.append(f"| {g['topic']} | {g['severity'].upper()} | {has_wg} |") + + # List all WG-adopted drafts with scores + lines.extend([ + "\n## All WG-Adopted Drafts\n", + "| Draft | WG | Score | Categories | Title |", + "|-------|:---|------:|------------|-------|", + ]) + for s in sorted(adopted, key=lambda x: x["time"] or "", reverse=True): + r = rating_map.get(s["name"]) + score = f"{r.composite_score:.1f}" if r else "-" + cats = ", ".join(normalize_category(c) for c in r.categories[:2]) if r else "" + lines.append(f"| {s['name']} | {s['wg_name']} | {score} | {cats} | {s['title'][:50]} |") + + report = "\n".join(lines) + path = self.output_dir / "status.md" + path.write_text(report) + return str(path) + + def revisions_report(self) -> str: + """Generate draft revision velocity report — who iterates vs fire-and-forget.""" + from .orgs import normalize_org + + now = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M UTC") + all_revs = self.db.revision_velocity() + total = len(all_revs) + at_00 = sum(1 for r in all_revs if r["rev_int"] == 0) + avg_rev = sum(r["rev_int"] for r in all_revs) / total if total else 0 + + lines = [ + "# Draft Revision Velocity Report", + f"*Generated {now} — {total} drafts analyzed*\n", + "## Overview\n", + f"- **Average revision**: {avg_rev:.2f}", + f"- **At -00** (first draft only): **{at_00}** ({at_00/total*100:.1f}%)", + f"- **Iterated** (rev >= 01): **{total - at_00}** ({(total-at_00)/total*100:.1f}%)", + f"- **Highly iterated** (rev >= 05): **{sum(1 for r in all_revs if r['rev_int'] >= 5)}**\n", + ] + + # Revision distribution + rev_dist: dict[int, int] = defaultdict(int) + for r in all_revs: + rev_dist[r["rev_int"]] += 1 + + lines.extend([ + "## Revision Distribution\n", + "| Revision | Count | % |", + "|:---------|------:|--:|", + ]) + for rev in sorted(rev_dist.keys()): + label = f"-{rev:02d}" if rev < 10 else f"-{rev}" + cnt = rev_dist[rev] + lines.append(f"| {label} | {cnt} | {cnt/total*100:.1f}% |") + + # Per-org analysis + aff_rows = self.db.conn.execute( + "SELECT da.draft_name, a.affiliation FROM draft_authors da " + "JOIN authors a ON da.person_id = a.person_id " + "WHERE a.affiliation != ''" + ).fetchall() + + draft_rev = {r["name"]: r["rev_int"] for r in all_revs} + org_drafts: dict[str, set[str]] = defaultdict(set) + for row in aff_rows: + norm = normalize_org(row["affiliation"]) + if norm: + org_drafts[norm].add(row["draft_name"]) + + org_stats = [] + for org_name, drafts in org_drafts.items(): + if len(drafts) < 3: + continue + revs = [draft_rev.get(d, 0) for d in drafts] + n_00 = sum(1 for r in revs if r == 0) + org_stats.append({ + "org": org_name, + "drafts": len(drafts), + "avg_rev": sum(revs) / len(revs), + "at_00": n_00, + "pct_00": n_00 / len(drafts) * 100, + "max_rev": max(revs), + "iterated": len(drafts) - n_00, + }) + + org_stats.sort(key=lambda x: -x["drafts"]) + + lines.extend([ + "\n## Revision Velocity by Organization (>= 3 drafts)\n", + "| # | Organization | Drafts | Avg Rev | At -00 | %-00 | Iterated | Max |", + "|--:|:-------------|-------:|--------:|-------:|-----:|---------:|----:|", + ]) + for rank, s in enumerate(org_stats, 1): + lines.append( + f"| {rank} | {s['org']} | {s['drafts']} | {s['avg_rev']:.2f} | " + f"{s['at_00']} | {s['pct_00']:.0f}% | {s['iterated']} | {s['max_rev']} |" + ) + + # Fire-and-forget vs iterators + high_00 = [s for s in org_stats if s["pct_00"] >= 70 and s["drafts"] >= 5] + iterators = [s for s in org_stats if s["avg_rev"] >= 3.0 and s["drafts"] >= 3] + + if high_00: + lines.extend([ + "\n## Fire-and-Forget Organizations (>= 70% at -00, >= 5 drafts)\n", + "Organizations that submit many drafts but rarely iterate:\n", + ]) + for s in sorted(high_00, key=lambda x: -x["pct_00"]): + lines.append(f"- **{s['org']}**: {s['at_00']}/{s['drafts']} at -00 ({s['pct_00']:.0f}%), avg rev {s['avg_rev']:.2f}") + + if iterators: + lines.extend([ + "\n## Active Iterators (avg revision >= 3.0)\n", + "Organizations that actively revise and improve their drafts:\n", + ]) + for s in sorted(iterators, key=lambda x: -x["avg_rev"]): + lines.append(f"- **{s['org']}**: avg rev {s['avg_rev']:.1f}, max -{s['max_rev']:02d}, {s['drafts']} drafts") + + # Most-revised individual drafts + top_revised = sorted(all_revs, key=lambda r: -r["rev_int"])[:20] + lines.extend([ + "\n## Most-Revised Drafts (Top 20)\n", + "| # | Rev | Name | Title |", + "|--:|----:|:-----|:------|", + ]) + for rank, r in enumerate(top_revised, 1): + lines.append(f"| {rank} | -{r['rev_int']:02d} | {r['name']} | {r['title'][:50]} |") + + # Score comparison: iterated vs first-draft + pairs = self.db.drafts_with_ratings(limit=500) + if pairs: + iterated_scores = [rat.composite_score for d, rat in pairs if draft_rev.get(d.name, 0) > 0] + first_scores = [rat.composite_score for d, rat in pairs if draft_rev.get(d.name, 0) == 0] + + if iterated_scores and first_scores: + lines.extend([ + "\n## Score Comparison: Iterated vs First-Draft\n", + "| Metric | Iterated (rev > 00) | First-Draft (rev 00) |", + "|--------|--------------------:|---------------------:|", + f"| Count | {len(iterated_scores)} | {len(first_scores)} |", + f"| Average Score | {sum(iterated_scores)/len(iterated_scores):.2f} | {sum(first_scores)/len(first_scores):.2f} |", + f"| Max Score | {max(iterated_scores):.2f} | {max(first_scores):.2f} |", + ]) + + report = "\n".join(lines) + path = self.output_dir / "revisions.md" + path.write_text(report) + return str(path) + + def centrality_report(self) -> str: + """Generate author network centrality report.""" + import networkx as nx + from .orgs import normalize_org + + now = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M UTC") + + # Build co-authorship graph + rows = self.db.conn.execute( + """SELECT da1.person_id as p1, da2.person_id as p2, COUNT(*) as shared + FROM draft_authors da1 + JOIN draft_authors da2 ON da1.draft_name = da2.draft_name + AND da1.person_id < da2.person_id + GROUP BY da1.person_id, da2.person_id""" + ).fetchall() + + G = nx.Graph() + for r in rows: + G.add_edge(r[0], r[1], weight=r[2]) + + persons = self.db.conn.execute( + "SELECT person_id, name, affiliation FROM authors" + ).fetchall() + person_info = {r[0]: (r[1], normalize_org(r[2])) for r in persons} + + chinese_orgs = { + "Huawei", "China Mobile", "China Telecom", "China Unicom", + "ZTE Corporation", "Tsinghua University", "BUPT", + "Pengcheng Laboratory", "CAICT", "AsiaInfo", + "Zhongguancun Laboratory", "CNIC, CAS", + "Tsinghua Shenzhen International Graduate School & Pengcheng Laboratory", + "Huazhong University of Science and Technology", + } + + # Edge classification + cross_org = intra_org = cross_divide = 0 + for u, v in G.edges(): + _, org_u = person_info.get(u, ("?", "")) + _, org_v = person_info.get(v, ("?", "")) + if org_u and org_v: + if org_u == org_v: + intra_org += 1 + else: + cross_org += 1 + if (org_u in chinese_orgs) != (org_v in chinese_orgs): + cross_divide += 1 + + total_edges = cross_org + intra_org + avg_clustering = nx.average_clustering(G) + components = list(nx.connected_components(G)) + bc = nx.betweenness_centrality(G) + + lines = [ + "# Author Network Centrality Report", + f"*Generated {now} — {G.number_of_nodes()} authors, {G.number_of_edges()} co-authorship edges*\n", + "## Network Overview\n", + f"- **Authors (nodes)**: {G.number_of_nodes()}", + f"- **Co-authorship edges**: {G.number_of_edges()}", + f"- **Intra-org edges**: {intra_org} ({intra_org/total_edges*100:.1f}%)", + f"- **Cross-org edges**: {cross_org} ({cross_org/total_edges*100:.1f}%)", + f"- **Cross Chinese-Western edges**: {cross_divide}", + f"- **Clustering coefficient**: {avg_clustering:.3f}", + f"- **Connected components**: {len(components)}, largest: {len(max(components, key=len))}\n", + ] + + # Top betweenness centrality + top_bc = sorted(bc.items(), key=lambda x: -x[1])[:30] + lines.extend([ + "## Top 30 Authors by Betweenness Centrality\n", + "Betweenness centrality measures how often an author lies on the shortest path between " + "other authors — high BC = key connector in the network.\n", + "| # | Author | Organization | BC Score | Degree | CN Neighbors | Western Neighbors |", + "|--:|:-------|:-------------|--------:|-------:|-------------:|------------------:|", + ]) + for rank, (pid, score) in enumerate(top_bc, 1): + name, org = person_info.get(pid, ("?", "?")) + degree = G.degree(pid) + cn = sum(1 for n in G.neighbors(pid) if person_info.get(n, ("", ""))[1] in chinese_orgs) + west = sum(1 for n in G.neighbors(pid) if person_info.get(n, ("", ""))[1] not in chinese_orgs and person_info.get(n, ("", ""))[1]) + lines.append(f"| {rank} | {name} | {org} | {score:.4f} | {degree} | {cn} | {west} |") + + # Bridge-builders + bridges = [] + for pid in G.nodes(): + name, org = person_info.get(pid, ("?", "")) + cn = sum(1 for n in G.neighbors(pid) if person_info.get(n, ("", ""))[1] in chinese_orgs) + west = sum(1 for n in G.neighbors(pid) if person_info.get(n, ("", ""))[1] not in chinese_orgs and person_info.get(n, ("", ""))[1]) + if cn > 0 and west > 0: + bridges.append((pid, name, org, bc.get(pid, 0), cn, west)) + + bridges.sort(key=lambda x: -x[3]) + lines.extend([ + f"\n## Cross-Divide Bridge-Builders ({len(bridges)} authors)\n", + "Authors who co-author with people from both Chinese and Western organizations.\n", + "| # | Author | Organization | BC Score | CN Neighbors | Western Neighbors |", + "|--:|:-------|:-------------|--------:|-------------:|------------------:|", + ]) + for rank, (pid, name, org, bc_score, cn, west) in enumerate(bridges[:20], 1): + lines.append(f"| {rank} | {name} | {org} | {bc_score:.4f} | {cn} | {west} |") + + # Org-level centrality + org_bc: dict[str, list[float]] = defaultdict(list) + for pid, score in bc.items(): + _, org = person_info.get(pid, ("?", "")) + if org: + org_bc[org].append(score) + + org_avg_bc = [ + (org, sum(scores) / len(scores), max(scores), len(scores)) + for org, scores in org_bc.items() + if len(scores) >= 3 + ] + org_avg_bc.sort(key=lambda x: -x[1]) + + lines.extend([ + "\n## Organization-Level Centrality (>= 3 authors)\n", + "| # | Organization | Authors | Avg BC | Max BC |", + "|--:|:-------------|--------:|-------:|-------:|", + ]) + for rank, (org, avg, mx, cnt) in enumerate(org_avg_bc[:20], 1): + lines.append(f"| {rank} | {org} | {cnt} | {avg:.4f} | {mx:.4f} |") + + report = "\n".join(lines) + path = self.output_dir / "centrality.md" + path.write_text(report) + return str(path) + + def co_occurrence_report(self) -> str: + """Generate category co-occurrence matrix report.""" + now = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M UTC") + pairs = self.db.drafts_with_ratings(limit=500) + total = len(pairs) + multi_cat = sum(1 for d, r in pairs if len(r.categories) > 1) + + # Build counts + cat_counts: dict[str, int] = defaultdict(int) + cooccur: dict[tuple[str, str], int] = defaultdict(int) + for d, r in pairs: + for c in r.categories: + cat_counts[c] += 1 + for i, c1 in enumerate(r.categories): + for c2 in r.categories[i + 1:]: + key = tuple(sorted([c1, c2])) + cooccur[key] += 1 + + cats = sorted(cat_counts.keys(), key=lambda c: -cat_counts[c]) + + lines = [ + "# Category Co-occurrence Report", + f"*Generated {now} — {total} drafts, {multi_cat} ({multi_cat/total*100:.1f}%) multi-category*\n", + "## Category Counts\n", + "| Category | Count | % of Drafts |", + "|:---------|------:|------------:|", + ] + for c in cats: + lines.append(f"| {c} | {cat_counts[c]} | {cat_counts[c]/total*100:.1f}% |") + + # Co-occurrence matrix + lines.extend([ + "\n## Co-occurrence Matrix\n", + "Number of drafts assigned to both categories simultaneously.\n", + ]) + + # Build matrix header (abbreviated names) + abbrev = { + "A2A protocols": "A2A", + "AI safety/alignment": "Safe", + "ML traffic mgmt": "ML", + "Autonomous netops": "Auto", + "Agent identity/auth": "IdAuth", + "Data formats/interop": "Data", + "Policy/governance": "Policy", + "Model serving/inference": "Model", + "Agent discovery/reg": "Disc", + "Human-agent interaction": "Human", + "Other AI/agent": "Other", + } + + header = "| |" + "|".join(f" {abbrev.get(c, c[:5])} " for c in cats) + "|" + sep = "|:---|" + "|".join("---:" for _ in cats) + "|" + lines.extend([header, sep]) + + for c1 in cats: + row = f"| **{abbrev.get(c1, c1[:5])}** |" + for c2 in cats: + if c1 == c2: + row += f" **{cat_counts[c1]}** |" + else: + key = tuple(sorted([c1, c2])) + val = cooccur.get(key, 0) + row += f" {val if val > 0 else '-'} |" + lines.append(row) + + # Top co-occurrences + top_pairs = sorted(cooccur.items(), key=lambda x: -x[1])[:20] + lines.extend([ + "\n## Top 20 Co-occurrences\n", + "| # | Category A | Category B | Count | Jaccard Index |", + "|--:|:-----------|:-----------|------:|--------------:|", + ]) + for rank, ((c1, c2), n) in enumerate(top_pairs, 1): + jaccard = n / (cat_counts[c1] + cat_counts[c2] - n) + lines.append(f"| {rank} | {c1} | {c2} | {n} | {jaccard:.3f} |") + + # AI safety isolation analysis + safety_cooccur = {k: v for k, v in cooccur.items() if "AI safety/alignment" in k} + safety_total = cat_counts.get("AI safety/alignment", 0) + lines.extend([ + f"\n## AI Safety/Alignment Coupling Analysis ({safety_total} drafts)\n", + "Is AI safety structurally isolated from other categories?\n", + "| Co-occurring Category | Count | % of Safety Drafts | Jaccard |", + "|:----------------------|------:|-------------------:|--------:|", + ]) + for (c1, c2), n in sorted(safety_cooccur.items(), key=lambda x: -x[1]): + other = c2 if c1 == "AI safety/alignment" else c1 + other_total = cat_counts[other] + jaccard = n / (safety_total + other_total - n) + lines.append(f"| {other} | {n} | {n/safety_total*100:.1f}% | {jaccard:.3f} |") + + # Determine isolation verdict + total_safety_links = sum(safety_cooccur.values()) + avg_links_per_safety = total_safety_links / safety_total if safety_total else 0 + lines.extend([ + f"\n**Verdict**: AI safety drafts have {total_safety_links} co-occurrence links across " + f"{len(safety_cooccur)} categories ({avg_links_per_safety:.1f} avg links per safety draft). " + ]) + if avg_links_per_safety > 1.5: + lines.append("Safety is **well-coupled** with other categories, particularly policy/governance and identity/auth.") + elif avg_links_per_safety > 0.8: + lines.append("Safety is **moderately coupled** -- present but not deeply integrated.") + else: + lines.append("Safety is **structurally isolated** -- rarely co-occurs with other categories.") + + # Category clusters (categories that frequently appear together) + lines.extend([ + "\n## Category Clusters\n", + "Groups of categories that form natural clusters based on co-occurrence.\n", + ]) + + # Simple cluster detection: categories that co-occur more than expected + for c in cats: + strong_partners = [] + for (c1, c2), n in cooccur.items(): + if c not in (c1, c2): + continue + other = c2 if c == c1 else c1 + expected = cat_counts[c] * cat_counts[other] / total + lift = n / expected if expected > 0 else 0 + if lift > 1.5 and n >= 5: + strong_partners.append((other, n, lift)) + if strong_partners: + strong_partners.sort(key=lambda x: -x[2]) + partner_str = ", ".join(f"{p} (lift {l:.1f}x)" for p, _, l in strong_partners[:3]) + lines.append(f"- **{c}** clusters with: {partner_str}") + + report = "\n".join(lines) + path = self.output_dir / "co-occurrence.md" + path.write_text(report) + return str(path) diff --git a/src/ietf_analyzer/sources/__init__.py b/src/ietf_analyzer/sources/__init__.py new file mode 100644 index 0000000..94b1bee --- /dev/null +++ b/src/ietf_analyzer/sources/__init__.py @@ -0,0 +1,14 @@ +"""Multi-source document fetcher registry.""" + +from .base import SourceDocument, SourceFetcher +from .ietf import IETFFetcher +from .w3c import W3CFetcher + +FETCHERS = {"ietf": IETFFetcher, "w3c": W3CFetcher} + + +def get_fetcher(source_name: str, config=None): + cls = FETCHERS.get(source_name) + if cls is None: + raise ValueError(f"Unknown source: {source_name}") + return cls(config) diff --git a/src/ietf_analyzer/sources/base.py b/src/ietf_analyzer/sources/base.py new file mode 100644 index 0000000..a7d52be --- /dev/null +++ b/src/ietf_analyzer/sources/base.py @@ -0,0 +1,32 @@ +from __future__ import annotations + +from dataclasses import dataclass, field +from typing import Protocol + + +@dataclass +class SourceDocument: + """Generic document from any standards body.""" + + name: str # Unique identifier (e.g. "draft-foo-bar", "webnn-api") + title: str + abstract: str + source: str # "ietf", "w3c", etc. + source_id: str = "" # Body-specific ID + source_url: str = "" # Canonical URL + full_text: str | None = None + time: str = "" # ISO date + doc_status: str = "" # "active", "published", "expired", etc. + extra: dict = field(default_factory=dict) # Body-specific metadata + + +class SourceFetcher(Protocol): + """Protocol for standards body fetchers.""" + + def search( + self, keywords: list[str], since: str | None = None + ) -> list[SourceDocument]: ... + + def download_text(self, doc: SourceDocument) -> str | None: ... + + def close(self) -> None: ... diff --git a/src/ietf_analyzer/sources/ietf.py b/src/ietf_analyzer/sources/ietf.py new file mode 100644 index 0000000..dd872f2 --- /dev/null +++ b/src/ietf_analyzer/sources/ietf.py @@ -0,0 +1,82 @@ +"""IETF Datatracker adapter — delegates to existing Fetcher.""" + +from __future__ import annotations + +from ..config import Config +from ..fetcher import Fetcher +from ..models import Draft +from .base import SourceDocument + + +class IETFFetcher: + """IETF Datatracker adapter wrapping the existing Fetcher class.""" + + def __init__(self, config: Config | None = None): + self.config = config or Config.load() + self._fetcher = Fetcher(self.config) + + def search( + self, keywords: list[str], since: str | None = None + ) -> list[SourceDocument]: + """Search Datatracker, convert Draft -> SourceDocument.""" + drafts = self._fetcher.search_drafts(keywords=keywords, since=since) + return [self._draft_to_doc(d) for d in drafts] + + def download_text(self, doc: SourceDocument) -> str | None: + """Download full text for a SourceDocument.""" + draft = self._doc_to_draft(doc) + return self._fetcher.download_full_text(draft) + + def close(self) -> None: + self._fetcher.close() + + @staticmethod + def _draft_to_doc(draft: Draft) -> SourceDocument: + return SourceDocument( + name=draft.name, + title=draft.title, + abstract=draft.abstract, + source="ietf", + source_id=str(draft.dt_id) if draft.dt_id else "", + source_url=draft.datatracker_url, + full_text=draft.full_text, + time=draft.time or "", + doc_status="active", + extra={ + "rev": draft.rev, + "pages": draft.pages, + "words": draft.words, + "group": draft.group, + "group_uri": draft.group_uri, + "expires": draft.expires, + "ad": draft.ad, + "shepherd": draft.shepherd, + "states": draft.states, + "fetched_at": draft.fetched_at, + }, + ) + + @staticmethod + def _doc_to_draft(doc: SourceDocument) -> Draft: + extra = doc.extra or {} + return Draft( + name=doc.name, + rev=extra.get("rev", "00"), + title=doc.title, + abstract=doc.abstract, + time=doc.time, + dt_id=int(doc.source_id) if doc.source_id else None, + pages=extra.get("pages"), + words=extra.get("words"), + group=extra.get("group"), + group_uri=extra.get("group_uri"), + expires=extra.get("expires"), + ad=extra.get("ad"), + shepherd=extra.get("shepherd"), + states=extra.get("states", []), + full_text=doc.full_text, + fetched_at=extra.get("fetched_at"), + source="ietf", + source_id=doc.source_id, + source_url=doc.source_url, + ) diff --git a/src/ietf_analyzer/sources/w3c.py b/src/ietf_analyzer/sources/w3c.py new file mode 100644 index 0000000..1e45d77 --- /dev/null +++ b/src/ietf_analyzer/sources/w3c.py @@ -0,0 +1,187 @@ +"""Fetch specs from W3C public API.""" + +from __future__ import annotations + +import re +import time as time_mod + +import httpx +from rich.console import Console +from rich.progress import ( + BarColumn, + MofNCompleteColumn, + Progress, + SpinnerColumn, + TextColumn, +) + +from ..config import Config +from .base import SourceDocument + +W3C_API = "https://api.w3.org" + +console = Console() + + +def _strip_html(html: str) -> str: + """Minimal HTML tag stripper — no heavy dependencies.""" + text = re.sub(r"]*>.*?", "", html, flags=re.DOTALL) + text = re.sub(r"]*>.*?", "", text, flags=re.DOTALL) + text = re.sub(r"<[^>]+>", " ", text) + text = re.sub(r" ", " ", text) + text = re.sub(r"&", "&", text) + text = re.sub(r"<", "<", text) + text = re.sub(r">", ">", text) + text = re.sub(r"&#\d+;", "", text) + text = re.sub(r"\s+", " ", text) + return text.strip() + + +class W3CFetcher: + """Fetch specs from the W3C public API (no auth needed).""" + + def __init__(self, config: Config | None = None): + self.config = config or Config.load() + self.client = httpx.Client(timeout=30, follow_redirects=True) + self.groups = self.config.w3c_groups + + def search( + self, keywords: list[str], since: str | None = None + ) -> list[SourceDocument]: + """Fetch specs from AI-relevant W3C groups, filtered by keywords.""" + seen: dict[str, SourceDocument] = {} + kw_lower = [k.lower() for k in keywords] + + with Progress( + SpinnerColumn(), + TextColumn("[progress.description]{task.description}"), + BarColumn(), + MofNCompleteColumn(), + console=console, + ) as progress: + task = progress.add_task("Fetching W3C specs...", total=len(self.groups)) + + for group in self.groups: + progress.update(task, description=f"W3C group: {group}") + specs = self._fetch_group_specs(group) + for spec in specs: + # Client-side keyword filter on title + description + haystack = (spec.title + " " + spec.abstract).lower() + if any(kw in haystack for kw in kw_lower): + if since and spec.time and spec.time < since: + continue + if spec.name not in seen: + seen[spec.name] = spec + progress.advance(task) + + console.print(f"Found [bold green]{len(seen)}[/] W3C specs matching keywords") + return list(seen.values()) + + def _fetch_group_specs(self, group_shortname: str) -> list[SourceDocument]: + """Fetch all specifications for a W3C group.""" + url = f"{W3C_API}/groups/{group_shortname}/specifications" + specs: list[SourceDocument] = [] + + try: + page = 1 + while True: + resp = self.client.get( + url, + params={"format": "json", "page": page}, + headers={"Accept": "application/json"}, + ) + resp.raise_for_status() + data = resp.json() + + spec_list = data if isinstance(data, list) else data.get("_links", {}).get("specifications", []) + if not spec_list: + # Try alternate response shape + spec_list = data.get("specifications", []) + if not spec_list: + break + + for item in spec_list: + href = item.get("href", "") + shortname = item.get("shortname", "") + title = item.get("title", shortname) + + if not shortname and href: + # Extract shortname from href like /specifications/webnn + parts = href.rstrip("/").split("/") + shortname = parts[-1] if parts else "" + + if not shortname: + continue + + # Fetch spec detail for abstract/description + detail = self._fetch_spec_detail(shortname) + abstract = detail.get("description", title) + spec_url = detail.get("editor-draft", detail.get("url", f"https://www.w3.org/TR/{shortname}/")) + status = detail.get("status", "") + date = detail.get("date", "") + + specs.append( + SourceDocument( + name=f"w3c-{shortname}", + title=title, + abstract=abstract, + source="w3c", + source_id=shortname, + source_url=spec_url, + time=date, + doc_status=status, + extra={"group": group_shortname}, + ) + ) + time_mod.sleep(0.3) + + # Check pagination + pages = data.get("pages", 1) if isinstance(data, dict) else 1 + if page >= pages: + break + page += 1 + time_mod.sleep(0.3) + + except httpx.HTTPError as e: + console.print(f"[yellow]W3C API error for {group_shortname}: {e}[/]") + + return specs + + def _fetch_spec_detail(self, shortname: str) -> dict: + """Fetch detail for a single spec.""" + try: + resp = self.client.get( + f"{W3C_API}/specifications/{shortname}", + headers={"Accept": "application/json"}, + ) + resp.raise_for_status() + data = resp.json() + return { + "description": data.get("description", ""), + "title": data.get("title", shortname), + "editor-draft": data.get("editor-draft", ""), + "url": data.get("_links", {}).get("latest-version", {}).get("href", ""), + "status": data.get("_links", {}).get("latest-version", {}).get("status", ""), + "date": data.get("_links", {}).get("latest-version", {}).get("date", ""), + } + except httpx.HTTPError: + return {} + + def download_text(self, doc: SourceDocument) -> str | None: + """Fetch spec URL content and strip HTML to plain text.""" + url = doc.source_url + if not url: + return None + try: + resp = self.client.get(url) + resp.raise_for_status() + content_type = resp.headers.get("content-type", "") + if "html" in content_type: + return _strip_html(resp.text)[:50000] + return resp.text[:50000] + except httpx.HTTPError as e: + console.print(f"[dim]Could not download text for {doc.name}: {e}[/]") + return None + + def close(self) -> None: + self.client.close() diff --git a/src/ietf_analyzer/visualize.py b/src/ietf_analyzer/visualize.py index 82028b1..940a03b 100644 --- a/src/ietf_analyzer/visualize.py +++ b/src/ietf_analyzer/visualize.py @@ -449,9 +449,10 @@ class Visualizer: if len(G.nodes) == 0: raise RuntimeError(f"No edges with min_shared={min_shared}.") - # Get affiliations for coloring + # Get affiliations for coloring (normalized) + from .orgs import normalize_org top_authors = self.db.top_authors(limit=200) - author_aff = {name: aff for name, aff, _, _ in top_authors} + author_aff = {name: normalize_org(aff) for name, aff, _, _ in top_authors} # Node sizing by degree degrees = dict(G.degree()) @@ -650,7 +651,8 @@ class Visualizer: """ import plotly.express as px - orgs = self.db.top_orgs(limit=20) + from .orgs import top_orgs_normalized + orgs = top_orgs_normalized(self.db, limit=20) if not orgs: raise RuntimeError("No author data. Run `ietf authors --fetch` first.")