加密溯源如何取代持有者令牌,為AI代理革命提供安全保障

Hacker News March 2026
Source: Hacker NewsAI agent securityArchive: March 2026
網際網路的基礎安全模型——持有者令牌——在自主AI代理時代正面臨淘汰。一種新的範式「加密溯源」正在興起,它能實現從人類到機器的安全、可離線操作且可審計的權限委託。這一轉變對於確保AI代理生態系統的信任至關重要。
The article body is currently shown in English by default. You can generate the full version in this language on demand.

The security architecture underpinning modern digital services is built on a fragile premise: the bearer token. This 'possession equals permission' model, exemplified by OAuth access tokens and API keys, is fundamentally incompatible with the future of autonomous AI agents. These agents operate in offline or constrained environments, lack constant connectivity for token refresh, and create catastrophic single points of failure when their static credentials are stolen—a reality underscored by recent high-profile software supply chain attacks.

The notme.bot specification represents a direct challenge to this paradigm. It proposes replacing secret credentials with cryptographic provenance. Instead of handing an AI agent a reusable 'master key' (a bearer token), a human user grants a cryptographically signed 'deed'—a verifiable, context-bound delegation for a specific action or scope. The target service can independently validate this deed without calling back to a central authority, enabling offline operation, fine-grained permissions, and an immutable audit trail.

This transition is not merely an incremental security improvement; it is a foundational shift akin to moving from passwords to hardware security keys, but at the machine-to-machine layer. For the rapidly expanding ecosystem of AI agents that can write code, manage infrastructure, and execute complex workflows, cryptographic provenance makes the principle of least privilege a cryptographic guarantee rather than a policy hope. It directly addresses the core contradiction between human-designed authorization flows and the operational realities of autonomous AI, potentially redefining software supply chain security and enabling new, trustworthy forms of human-AI collaboration.

Technical Deep Dive

The notme.bot framework's core innovation is its replacement of opaque bearer tokens with transparent, verifiable cryptographic artifacts. The architecture is built around three primary components: the Deed, the Provenance Chain, and the Verifier.

A Deed is a structured data object (likely JSON or CBOR) containing the authorization's metadata: the delegator's identity, the delegatee (agent) identifier, the specific action or resource scope, a validity window, and a nonce. Critically, this deed is signed by the delegator's private key, creating a digital signature that binds all these parameters together. The signature uses established algorithms like Ed25519 or ECDSA P-256, ensuring strong cryptographic guarantees.

The Provenance Chain is the mechanism for tracing authority back to a trusted root. A deed can itself be a delegation from another entity. For example, a company's security officer might sign a deed delegating infrastructure management capability to a team lead's key. The team lead can then sign a more specific deed, delegating permission to restart a specific server cluster to an AI agent. The verifier checks the entire chain of signatures, ensuring each delegation in the lineage is valid and authorized. This creates a hierarchical, auditable permission structure without a central database.

The Verifier is the service or tool receiving the request. Its job is straightforward: validate the cryptographic signatures on the deed and its chain, check that the current time is within the validity window, and confirm that the requested action matches the deed's scope. It does this using only public keys, which can be published in advance via mechanisms like Key Transparency logs or simple, static configuration. No secret exchange with the verifier is ever needed.

This architecture enables several key properties:
* Offline-First: The agent presents a signed deed; the verifier needs no network call to an authorization server.
* Context-Binding: The deed is inextricably linked to specific parameters (agent ID, action, resource). A stolen deed cannot be reused for a different action or by a different agent.
* Non-Repudiation & Auditability: Every delegation is cryptographically signed, creating a permanent, tamper-proof log of who authorized what and when.

A relevant open-source project exploring similar concepts is `spicedb` by AuthZed. While not implementing notme.bot directly, SpiceDB is a Zanzibar-inspired permissions database that decouples authorization logic from application code. Its growing adoption (over 11k GitHub stars) highlights the industry's push for scalable, consistent authorization systems. notme.bot could leverage such a system for storing and validating public key mappings and policy relationships, while the deed itself carries the immediate, verifiable proof.

| Authorization Model | Secret Storage Required | Offline Operation | Fine-Grained Audit | Resistance to Replay/Theft |
|---|---|---|---|---|
| Bearer Token (OAuth) | Yes (Token) | No | Limited (Central Logs) | Low (Possession = Permission) |
| API Key | Yes (The Key Itself) | Yes | Very Limited | Very Low (Static Secret) |
| notme.bot (Provenance) | No (Only Private Key for Signing) | Yes | High (Cryptographic Chain) | High (Context-Bound) |

Data Takeaway: The table reveals the fundamental trade-offs. Traditional models prioritize simplicity and online connectivity at the cost of secret management and vulnerability to theft. Cryptographic provenance eliminates the secret-at-rest problem for the agent and enables offline operation, but shifts complexity to key management for delegators and requires verifiers to understand the new protocol.

Key Players & Case Studies

The push for this new paradigm is being driven by a confluence of actors: security researchers, infrastructure companies grappling with AI agent integration, and open-source communities.

The notme.bot initiative itself appears to be a community-driven specification, likely born from practical frustration with existing tools. Its narrative origin—a developer unable to authorize an AI agent while on a flight—perfectly encapsulates the offline limitation of OAuth. This grassroots, problem-oriented genesis gives it credibility among engineers.

Major cloud and platform providers are developing parallel, proprietary solutions. Google's Cloud IAM has long supported short-lived service account credentials and is increasingly integrating context-aware access. AWS with its IAM Roles Anywhere and SigV4 signing process demonstrates the value of signed requests over sent secrets. Microsoft's Entra ID (formerly Azure AD) is deepening integration with workload identities. These platforms are natural adoption vectors for a standard like notme.bot, as they already manage identity at scale.

AI Agent platform companies are the immediate beneficiaries and potential early adopters. Cognition Labs (maker of Devin), MultiOn, and other providers of autonomous coding or web-browsing agents currently face the acute risk of their agents' credentials being compromised, leading to catastrophic account takeovers. For them, adopting cryptographic provenance isn't a feature—it's an existential security requirement for user trust.

Security and infrastructure tooling companies are also key. HashiCorp Vault dominates the secrets management space. A shift to provenance could be seen as a threat to its core model, but it also presents an opportunity: Vault could become the premier, secure signer for deeds, managing the private keys and signing policies, thus evolving from a secrets *store* to a cryptographic authority *service*. GitHub is a critical case study. Its recent personal access token (PAT) security improvements and fine-grained tokens show awareness of the problem. A notme.bot-style system could revolutionize how CI/CD pipelines and AI coding agents securely commit code, moving from stored PATs to signed, single-commit delegations.

| Entity | Current Approach | Pain Point | Strategic Interest in Provenance |
|---|---|---|---|
| AI Agent Platforms (e.g., Cognition) | Store user API keys (risky) or use OAuth (offline break) | Credential theft, offline failures | Extreme – Core to product safety & scalability |
| Cloud Providers (e.g., AWS, GCP) | IAM Roles, Service Accounts, Signed Requests | Complexity, secret rotation, bridging on-prem/cloud | High – Unify and secure machine identity |
| Secrets Managers (e.g., HashiCorp) | Centralized vault for static secrets | Vault as a high-value attack target | Moderate/High – Evolve or be bypassed |
| Developer Platforms (e.g., GitHub) | Personal Access Tokens, OAuth Apps | Token leakage in logs, repos, over-permissioned bots | High – Secure the software supply chain at the commit gate |

Data Takeaway: Adoption drivers vary significantly. AI agent companies have the most urgent, product-centric need. Cloud providers have the infrastructure to make it a standard. The competitive dynamic will hinge on whether a single provider creates a proprietary lock-in solution or the open notme.bot specification gains critical mass.

Industry Impact & Market Dynamics

The successful adoption of cryptographic provenance would trigger a cascade of changes across the software security and AI markets, reshaping business models and risk profiles.

First, it would commoditize basic machine identity and authorization. Today, this is a complex, expensive problem solved by a patchwork of tools (secrets managers, IAM, PKI). A lightweight, open standard could reduce the need for heavy middleware for many use cases, particularly for SaaS and smaller companies integrating AI agents. This threatens the market for simplistic secrets management solutions but opens a larger market for advanced cryptographic key management and policy orchestration services.

Second, it enables new AI agent business models and use cases. Currently, the security fear severely limits what tasks users will delegate to an autonomous agent. Would you give an AI your AWS root key? Your database credentials? Almost certainly not. With provenance, you could delegate a specific, time-bound, auditable action—"deploy this specific container image to staging"—with near-zero risk of lateral movement. This unlocks premium, high-trust agent services in finance, healthcare, and infrastructure management, potentially expanding the total addressable market for agentic AI significantly.

Third, it reshapes software supply chain security. The 2020 SolarWinds attack and subsequent breaches like Codecov hinged on stealing signing certificates or build system credentials. A provenance model where every deployment, commit, or build step requires a freshly signed deed for that specific action dramatically raises the bar. An attacker who infiltrates a system cannot reuse stolen credentials; they would need to compromise the specific private key used for signing and then use it before detection, a much narrower and riskier attack window.

The market data supports the urgency. The global secrets management market is projected to grow from ~$1.5B in 2023 to over $5B by 2028 (CAGR >25%). Simultaneously, the AI agent platform market is nascent but forecast for explosive growth. This creates a powerful economic incentive: a security solution that unlocks the larger AI market will outcompete one that merely protects the status quo.

| Market Segment | 2024 Est. Size | 2028 Projection | Primary Growth Driver | Impact of Provenance Adoption |
|---|---|---|---|---|
| Secrets Management | $1.8 Billion | $5.2 Billion | Cloud Migration, Compliance | Disruptive – Shifts demand from storage to signing services |
| AI Agent Platforms | $3.5 Billion | $28.5 Billion | Automation demand, LLM advances | Catalytic – Removes a key adoption barrier (security fear) |
| Identity & Access Mgmt (IAM) | $16 Billion | $32 Billion | Zero-Trust, Hybrid Work | Evolutionary – Extends IAM principles to non-human entities |

Data Takeaway: The financial stakes are immense. Cryptographic provenance sits at the intersection of two high-growth markets. Its potential to disrupt the secrets management space is real, but its role as a catalyst for the even larger AI agent market is where its true economic value will be realized.

Risks, Limitations & Open Questions

Despite its promise, the transition to cryptographic provenance faces significant hurdles and introduces new complexities.

Key Management Burden Shifted, Not Eliminated: The model eliminates the need for agents to store secrets, but it intensifies the need for secure, highly available key management for *delegators*. The security of the entire system now rests on the protection of the user's or service's private signing key. This is a familiar problem (see TLS certificates), but now it's on every developer or system that wants to delegate to an AI. Widespread adoption would necessitate user-friendly, robust key storage solutions, potentially hardware-based (HSMs, TPMs, secure enclaves), which adds cost and complexity.

Revocation is Challenging: The beauty of deeds—their offline verifiability—is also a weakness. If a delegation needs to be revoked before its expiry (e.g., an employee is terminated, a key is suspected compromised), there is no central authority to inform. Solutions require verifiers to check a revocation status list (a CRL-like mechanism), which reintroduces online dependencies, or to use very short-lived deeds, increasing signing frequency. This is a fundamental trade-off between offline capability and immediate revocation.

Standardization and Ecosystem Fragmentation: For notme.bot to succeed, it needs broad adoption across cloud APIs, SaaS platforms, and internal tools. Without it, we risk a fragmented landscape where an AI agent needs to understand multiple, incompatible provenance schemes or fall back to tokens for some services. The history of security standards (e.g., SAML vs. OAuth) suggests a long, messy convergence period is likely.
Quantum Vulnerability: The cryptographic signatures at the heart of the system (Ed25519, ECDSA) are not quantum-resistant. While a practical quantum computer capable of breaking them is likely years away, building a long-term infrastructure on vulnerable primitives is risky. Post-quantum cryptography (PQC) algorithms need to be designed into the specification from the outset, or a migration path must be clearly defined.

Human Factors and Usability: The process of creating and signing a deed must be seamless, ideally invisible to the end-user. If it requires complex CLI commands or manual intervention, adoption will be limited to security-conscious enterprises. The "user experience of delegation" is an unsolved challenge critical to mainstream success.

AINews Verdict & Predictions

The notme.bot specification and the broader shift to cryptographic provenance represent the most consequential evolution in machine identity and authorization since the advent of OAuth 2.0. This is not a niche security improvement; it is the necessary substrate for a future where autonomous AI agents are pervasive and trustworthy.

Our editorial judgment is that this paradigm will achieve dominant, but not exclusive, adoption for AI agent authorization within the next 3-5 years. The drivers are too powerful: the existential security needs of agent platforms, the alignment with cloud providers' zero-trust journeys, and the pressing demand to harden software supply chains. It will first see adoption in high-value, sensitive domains like code deployment and infrastructure management before trickling down to more mundane tasks.

We make the following specific predictions:
1. Cloud Provider Embrace: Within 18 months, at least one major cloud provider (most likely Google or Microsoft, given their integrated ecosystems) will announce a managed service or native IAM integration that implements the core concepts of notme.bot, perhaps under a different name. This will provide the legitimacy and tooling needed for enterprise adoption.
2. GitHub as a Tipping Point: If GitHub adopts a provenance model for repository actions and commits, it will become the de facto standard for the developer and AI coding tool ecosystem overnight. This is the single most important adoption event to watch for.
3. The Rise of the Delegation Manager: A new class of SaaS product—the "Delegation Manager"—will emerge. It will handle the user experience, key management, policy definition, and signing of deeds, making the technology accessible to non-expert teams. Companies like Okta or HashiCorp are well-positioned to build this, or it will be a venture-backed startup.
4. Hybrid Transition Period: For a decade or more, the world will operate in a hybrid state. Legacy bearer tokens will persist for human-facing applications and older systems, while cryptographic provenance becomes the standard for machine-to-machine and AI agent communication. Gateways and translation layers will be necessary.

The ultimate success metric will be invisibility. When developers can safely grant an AI agent the ability to act on their behalf without a second thought about credential leakage, the revolution will be complete. notme.bot is the first, crucial blueprint for that secure future.

More from Hacker News

Pi-treebase 像改程式碼一樣改寫 AI 對話:LLM 的 Git RebaseAINews has uncovered Pi-treebase, an open-source project that fundamentally reimagines how we interact with large languaPrave 的代理技能層:AI 開發一直缺少的作業系統The AI agent ecosystem has hit a structural wall. Every developer builds isolated tools and prompt chains from scratch, Haskell 函數式程式設計將 AI 代理代幣成本降低 60%The AI industry has long grappled with the 'token explosion' problem: every reasoning step, tool call, or memory retrievOpen source hub3277 indexed articles from Hacker News

Related topics

AI agent security99 related articles

Archive

March 20262347 published articles

Further Reading

SharkAuth:開源安全層,解鎖AI代理經濟的關鍵AI代理即將管理我們的日曆、財務和企業工作流程,但當前的授權機制卻嚴重不足。SharkAuth 這個新開源專案引入了一個專用的授權層,提供精細、可撤銷且具時效性的委派代幣。零信任AI代理:Peon等Rust運行時如何重新定義自主系統安全AI代理開發正經歷一場根本性的架構轉變,將安全防護從邊界防禦轉向嵌入式執行。開源專案Peon以Rust建構並整合Casbin,正是此新典範的體現,它創建了一個零信任運行時環境,讓每個代理行動都必須通過嚴格驗證。Nono.sh 的核心級安全模型重新定義關鍵基礎設施的 AI 代理安全開源項目 Nono.sh 對 AI 代理安全提出了根本性的重新思考。它不再依賴脆弱的應用層權限,而是實現了一個由核心強制執行的零信任運行模型,將每個代理視為本質上不可信。這一基礎性轉變有望為關鍵基礎設施解鎖 AI 的深度應用。AI 代理的『權限革命』:密碼學委託如何取代 API 金鑰一場針對自主 AI 系統的根本性安全改革正在進行中。業界正超越靜態 API 金鑰的脆弱模式,轉向採用密碼學委託框架,該框架能授予臨時且可審計的權限。這一轉變對於實現安全、大規模的協作 AI 部署至關重要。

常见问题

GitHub 热点“How Cryptographic Provenance Is Replacing Bearer Tokens to Secure the AI Agent Revolution”主要讲了什么?

The security architecture underpinning modern digital services is built on a fragile premise: the bearer token. This 'possession equals permission' model, exemplified by OAuth acce…

这个 GitHub 项目在“notme.bot vs OAuth for AI agents”上为什么会引发关注?

The notme.bot framework's core innovation is its replacement of opaque bearer tokens with transparent, verifiable cryptographic artifacts. The architecture is built around three primary components: the Deed, the Provenan…

从“implement cryptographic provenance GitHub”看,这个 GitHub 项目的热度表现如何?

当前相关 GitHub 项目总星标约为 0,近一日增长约为 0,这说明它在开源社区具有较强讨论度和扩散能力。