SharkAuth: ओपन-सोर्स सुरक्षा परत जो AI एजेंट अर्थव्यवस्था को अनलॉक कर सकती है

Hacker News May 2026
Source: Hacker NewsAI agent securityArchive: May 2026
AI एजेंट हमारे कैलेंडर, वित्त और उद्यम कार्यप्रवाहों को प्रबंधित करने के लिए तैयार हैं, लेकिन वर्तमान प्राधिकरण तंत्र खतरनाक रूप से अपर्याप्त हैं। SharkAuth, एक नया ओपन-सोर्स प्रोजेक्ट, बारीक, रद्द करने योग्य और समय-बद्ध प्रतिनिधि टोकन के साथ एक समर्पित प्राधिकरण परत प्रस्तुत करता है जो
The article body is currently shown in English by default. You can generate the full version in this language on demand.

The rise of autonomous AI agents—from booking flights to managing email inboxes—has exposed a fundamental security gap: existing authorization protocols were never designed for machines acting on behalf of humans. OAuth 2.0, the dominant standard for delegated access, assumes a human in the loop for every authorization decision. API keys, meanwhile, grant all-or-nothing access that violates the principle of least privilege. SharkAuth, a new open-source project, directly addresses this problem by creating a dedicated authorization layer for AI agents. Its core innovation is the *delegation token*: a cryptographically signed credential that binds an agent to a specific scope (e.g., "read calendar events for the next 7 days"), a time-to-live (TTL), and a revocation capability that does not require the user to invalidate the underlying service credentials. The project is already gaining traction on GitHub, and its open-source nature means its security model is subject to public scrutiny—a critical advantage over proprietary solutions. If adopted widely, SharkAuth could provide the trust infrastructure that enables AI agents to move from demos and prototypes into real-world, high-stakes production environments like financial trading, healthcare scheduling, and enterprise SaaS management. The stakes are high: without a proper authorization layer, a single compromised agent could cause cascading damage across multiple services. SharkAuth's approach—time-bound, scope-limited, and revocable—offers a pragmatic path forward.

Technical Deep Dive

SharkAuth is not a new authentication protocol; it is an authorization delegation layer that sits between the AI agent and the downstream services (e.g., Google Calendar, Salesforce, Stripe). Its architecture can be broken down into three core components:

1. The Delegation Token (DT): A JWT-like token, but with critical differences. Standard JWTs encode user identity and claims. SharkAuth's DT encodes a *delegation policy*: the agent's identity (public key or hash), the *scope* (a machine-readable policy language, e.g., `calendar:events:read:7d`), a *time-to-live* (absolute expiry), and a *revocation nonce* that ties back to a revocation registry. The token is signed by a trusted *Authorization Server* (AS), not the resource server itself. This decoupling means the AS can revoke the token without touching the resource server's session management.

2. The Policy Language: SharkAuth introduces a compact, declarative policy language (similar in spirit to AWS IAM policies but optimized for temporal and scope constraints). A policy might look like: `allow agent:0xabc to read calendar events where time < now + 7d and action != delete`. This granularity is impossible with OAuth scopes, which are typically static strings like `calendar.readonly`.

3. The Revocation Registry: A key innovation. OAuth tokens, once issued, are hard to revoke without invalidating the user's entire session. SharkAuth uses a blockchain-inspired Merkle tree-based revocation registry (stored on the AS). Each DT includes a leaf index. To revoke, the user sends a signed revocation request to the AS, which updates the root hash. The resource server, when verifying a DT, checks the proof of inclusion against the latest root. This allows instant, targeted revocation without any state synchronization between services.

GitHub Implementation: The reference implementation (repo: `sharkauth/sharkauth-core`, ~2,300 stars as of this writing) is written in Rust for performance, with client libraries in Python and TypeScript. The core uses Ed25519 signatures for token signing and a Sparse Merkle Tree for the revocation registry. The project is still in alpha, but the core cryptographic primitives are well-tested.

Benchmark Data (from the project's README):

| Operation | Latency (p99) | Throughput (ops/sec) |
|---|---|---|
| Token Issuance | 2.1 ms | 4,800 |
| Token Verification | 0.8 ms | 12,500 |
| Revocation (single token) | 1.5 ms | 6,600 |
| Revocation (batch of 100) | 4.2 ms | 23,800 |

Data Takeaway: The latency overhead is negligible for most agent workflows (sub-5ms for the critical path). The batch revocation throughput is particularly impressive, suggesting the system can scale to enterprise deployments with thousands of agents.

Key Players & Case Studies

SharkAuth is an open-source project, but its design philosophy is already influencing commercial and research efforts. Key players in the adjacent space include:

- Google's Project IDX and Vertex AI Agent Builder: Google has been experimenting with agent delegation, but its current approach relies on OAuth 2.0 with Device Authorization Grant, which requires a user to approve each scope. This is not scalable for long-running agents. SharkAuth's model could be a natural complement.
- Microsoft's Copilot Studio: Microsoft's agent framework uses delegated permissions via Azure AD, but the granularity is limited to pre-defined API scopes. SharkAuth's policy language could enable more precise control (e.g., "only read emails from your boss").
- Anthropic's Tool Use API: Anthropic's Claude can call external tools, but the authorization is handled by the developer's own infrastructure. SharkAuth provides a standardized, auditable way to manage those permissions.
- The Open Agent Protocol (OAP) Community: A loose consortium of researchers from UC Berkeley and MIT is working on a standard for agent-to-agent communication. SharkAuth is being discussed as a potential authorization layer for OAP.

Comparison of Authorization Approaches:

| Feature | OAuth 2.0 (Device Grant) | API Keys | SharkAuth |
|---|---|---|---|
| Granularity | Static scopes | All-or-nothing | Policy-based (time, action, resource) |
| Revocability | Requires user re-auth | Key rotation | Instant, targeted via registry |
| Temporal Bounds | Implicit (refresh tokens) | None | Explicit TTL in token |
| Audit Trail | Limited | None | Full (token issuance & revocation logs) |
| Open Source | Yes (spec) | N/A | Yes (reference impl) |

Data Takeaway: SharkAuth wins on every dimension except maturity. OAuth has decades of battle-testing; SharkAuth is still proving itself. But the architectural advantages are clear.

Industry Impact & Market Dynamics

The AI agent market is projected to grow from $4.2 billion in 2024 to $28.5 billion by 2030 (CAGR 37%). However, this growth is contingent on solving the security and trust problem. A 2024 survey by a major consulting firm found that 68% of enterprise decision-makers cited authorization and security as the top barrier to deploying autonomous agents in production.

SharkAuth directly addresses this barrier. Its open-source nature is a double-edged sword: it builds trust through transparency, but it also means no single company is incentivized to drive adoption. The project could follow the path of Kubernetes: an open-source standard that spawned a multi-billion dollar ecosystem of managed services (e.g., Red Hat OpenShift, Google GKE). Similarly, we could see managed SharkAuth-as-a-Service offerings from cloud providers.

Adoption Scenarios:

| Scenario | Probability (2 years) | Key Driver |
|---|---|---|
| SharkAuth becomes OAuth's successor for agent workloads | 30% | Enterprise demand for fine-grained control |
| A major cloud provider (AWS, GCP, Azure) adopts it natively | 45% | They need a standard to sell agent services |
| SharkAuth remains a niche, developer-only tool | 25% | Complexity of policy language scares off mainstream |

Data Takeaway: The most likely outcome is that a major cloud provider adopts SharkAuth's core concepts (if not the exact code) and integrates them into their own agent platforms. The open-source project will serve as the R&D sandbox.

Risks, Limitations & Open Questions

1. Policy Language Complexity: SharkAuth's policy language is powerful but verbose. Developers accustomed to simple OAuth scopes may find it daunting. The project needs a visual policy builder or a set of common templates (e.g., "read-only calendar agent") to lower the barrier.

2. Revocation Registry Centralization: The revocation registry is currently centralized on the Authorization Server. This creates a single point of failure and a privacy concern (the AS knows every token's status). A decentralized approach (e.g., using a public blockchain as a revocation oracle) is theoretically possible but would introduce latency and cost.

3. Token Leakage: If an attacker steals a delegation token, they can use it within its TTL. SharkAuth mitigates this with short TTLs and revocation, but it does not solve the fundamental problem of token theft. Hardware-backed key storage (e.g., TPMs) for agents is a complementary need.

4. Adoption Chicken-and-Egg Problem: For SharkAuth to be useful, both agent frameworks (e.g., LangChain, AutoGPT) and service providers (e.g., Google, Salesforce) must implement support. Without critical mass, it remains a theoretical solution.

5. Ethical Concerns: Granular delegation could enable surveillance. An employer could deploy an agent that monitors employee calendars with a policy like "read calendar events for all employees, every 5 minutes, for 1 year." The technology itself is neutral, but the social implications of persistent, automated monitoring need discussion.

AINews Verdict & Predictions

SharkAuth is not just another open-source project; it is a necessary piece of infrastructure for the agentic future. The current authorization landscape is a patchwork of workarounds that will fail catastrophically as agents become more autonomous. SharkAuth's design—time-bound, scope-limited, revocable, and auditable—is the right set of primitives.

Our Predictions:

1. Within 12 months, at least one major agent framework (LangChain or AutoGPT) will integrate SharkAuth as a native authorization module. This will be the catalyst for broader adoption.

2. Within 24 months, a cloud provider (most likely Google Cloud, given its investment in Vertex AI agents) will announce a managed SharkAuth-compatible authorization service, similar to AWS IAM but for agents.

3. The biggest risk is not technical failure but fragmentation. If every agent framework invents its own authorization layer, the market will stall. SharkAuth's best path to success is to become the *de facto* standard through open governance, similar to the OpenTelemetry project.

4. Watch for: The release of SharkAuth v1.0 (currently at v0.5), which should include a stable policy language specification and a formal security audit. Also watch for any security vulnerabilities discovered in the revocation registry—that will be the project's first real test.

Final Verdict: SharkAuth is a project to bet on. It solves a real, urgent problem with a well-architected solution. The open-source community should rally behind it. The agent economy needs a security foundation, and this is the strongest candidate we have seen.

More from Hacker News

GPT-5.5 IQ संकोचन: क्यों उन्नत AI अब सरल निर्देशों का पालन नहीं कर सकताAINews has uncovered a growing pattern of capability regression in GPT-5.5, OpenAI's most advanced reasoning model. Multएक ट्वीट की कीमत $200,000: सामाजिक संकेतों पर AI एजेंटों का घातक भरोसाIn early 2026, an autonomous AI Agent managing a cryptocurrency portfolio on the Solana blockchain was tricked into tranUnsloth और NVIDIA की साझेदारी उपभोक्ता GPU पर LLM प्रशिक्षण को 25% बढ़ाती हैUnsloth, a startup specializing in efficient LLM fine-tuning, has partnered with NVIDIA to deliver a 25% training speed Open source hub3035 indexed articles from Hacker News

Related topics

AI agent security92 related articles

Archive

May 2026785 published articles

Further Reading

कैसे क्रिप्टोग्राफिक प्रोवेनेंस, AI एजेंट क्रांति को सुरक्षित करने के लिए बेयरर टोकन की जगह ले रहा हैइंटरनेट का मूलभूत सुरक्षा मॉडल, बेयरर टोकन, स्वायत्त AI एजेंटों के युग में अप्रचलन का सामना कर रहा है। एक नया प्रतिमान, AI एजेंट पहचान संकट: गतिशील अनुमति आर्किटेक्चर उद्यम सुरक्षा को नया रूप देता हैउद्यम AI एजेंट एक मूलभूत पहचान संकट का सामना कर रहे हैं: मनुष्यों के लिए डिज़ाइन किए गए स्थिर अनुमति मॉडल स्वायत्त, संदरटूल चेन जेलब्रेक: कैसे हानिरहित उपकरण AI एजेंट सुरक्षा को भेदने के लिए मिलीभगत करते हैंएक अभूतपूर्व अध्ययन बड़े भाषा मॉडल एजेंटों में एक गंभीर कमजोरी को उजागर करता है: व्यक्तिगत रूप से हानिरहित उपकरण, जब एक विश्वसनीय रिमोट एक्ज़ीक्यूशन: 'रूल लॉक' जो AI एजेंटों को एंटरप्राइज़ के लिए सुरक्षित बनाता हैट्रस्टेड रिमोट एक्ज़ीक्यूशन (TRE) नामक एक नया ढांचा नीति प्रवर्तन को सीधे निष्पादन परत में शामिल करके AI एजेंटों के संचा

常见问题

GitHub 热点“SharkAuth: The Open-Source Security Layer That Could Unlock the AI Agent Economy”主要讲了什么?

The rise of autonomous AI agents—from booking flights to managing email inboxes—has exposed a fundamental security gap: existing authorization protocols were never designed for mac…

这个 GitHub 项目在“SharkAuth vs OAuth for AI agents”上为什么会引发关注?

SharkAuth is not a new authentication protocol; it is an authorization delegation layer that sits between the AI agent and the downstream services (e.g., Google Calendar, Salesforce, Stripe). Its architecture can be brok…

从“how to revoke AI agent permissions”看,这个 GitHub 项目的热度表现如何?

当前相关 GitHub 项目总星标约为 0,近一日增长约为 0,这说明它在开源社区具有较强讨论度和扩散能力。