| Internet-Draft | APIX Core | April 2026 |
| Rehfeld | Expires 31 October 2026 | [Page] |
The internet was designed for human actors. Its discovery infrastructure — search engines, directories, and hyperlinked documents — assumes a human reading and navigating. Autonomous agents (bots) operating on the internet today face a structural gap: there is no machine-native, globally accessible index of services they can consume.¶
This document defines the core infrastructure of the API Index (APIX): a HATEOAS-based, globally accessible, commercially sustainable service discovery infrastructure designed for autonomous agents as its primary consumers. It specifies the governance model, the three-dimensional trust model, the APIX Manifest (APM) base format, commercial onboarding and sanctions compliance, the supply-side funding model, and the base Index API. These elements are shared across all APIX service types.¶
Profile documents extend this core for specific service categories: the APIX Services Profile (draft-rehfeld-apix-services-00) defines the web API and bot service profile; the APIX IoT Device Profile (draft-rehfeld-apix-iot-00) defines the IoT device profile.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 31 October 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
The internet's foundational infrastructure — HTTP, HTML, DNS, and search engines — was designed with human actors as the primary consumers. Web pages render visual layouts for human eyes. CAPTCHA systems explicitly discriminate against non-human access. Discovery mechanisms such as search engines index content for human-readable navigation.¶
Autonomous agents — software programs that independently execute tasks, consume APIs, and interact with external services without per-action human instruction — are not recognized as legitimate, first-class internet participants in this architecture. They are systematically treated as threats to be filtered, blocked, or rate-limited.¶
This situation is changing. The rapid growth of large language model-based agents, robotic process automation, and programmatic service consumers means that non-human actors now represent a significant and growing proportion of internet traffic. As this proportion increases, internet service providers will increasingly need to serve autonomous agents as a recognized user class alongside humans.¶
The API Index is premised on this trajectory: bots are becoming first-class internet participants, and the infrastructure to support them — starting with service discovery — does not yet exist. Regulators are converging on the same direction: the EU AI Act (Article 50) requires transparency and identity disclosure for AI systems that interact with people, and NIST's Center for AI Standards and Innovation solicited public input on securing AI agent systems in early 2026. APIX's verifiable trust model is designed to meet these emerging compliance requirements by construction.¶
The API Index was not conceived in the abstract. It emerged from a concrete practical failure.¶
A buying bot was built for a private use case: monitoring online shops for a specific product and purchasing it automatically the moment it became available. This is a straightforward task for an autonomous agent — exactly the kind of task agents are well-suited for.¶
The bot failed, not because the task was technically complex, but because the internet's infrastructure is actively hostile to it:¶
HTML-only product pages. Product availability, price, and purchase state were encoded in HTML rendered for a human eye. No machine-readable API existed. The bot had to parse HTML — fragile, maintenance-intensive, and broken by every redesign.¶
Cloudflare Bot Management and equivalent shields. The majority of commercial web services now sit behind bot mitigation infrastructure. Cloudflare Bot Management, and equivalent products from Akamai, Imperva, and others, are deployed specifically to detect and block non-human request patterns. Repeated automated requests — even at modest frequency — trigger rate limiting, CAPTCHA challenges, or silent blocking. A buying bot that polls a product page to detect availability is treated identically to a malicious scraper or a DDoS participant.¶
CAPTCHA payment barriers. Even when product pages were reachable, payment flows required solving CAPTCHAs that explicitly excluded non-human actors. The purchasing step — the final, necessary action — was deliberately made inaccessible to the bot.¶
Proxy network pollution. To work around rate limits and bot detection, the bot required a rotating proxy network — different IP addresses on each request to disguise its automated origin. This is not a solution: it pollutes internet traffic with avoidable requests, raises the cost of operation, and contributes directly to the adversarial dynamic between bots and infrastructure operators. Every proxy request is a wasted roundtrip that a machine-readable API endpoint would have made unnecessary.¶
Polling as the only state-change mechanism. Because the bot had no way to subscribe to product availability events, it had to poll the product page continuously. This is architecturally wasteful: the bot consumes server resources and network bandwidth to repeatedly ask a question whose answer has not changed.¶
These are not edge cases. They are the standard experience for any autonomous agent attempting to consume a commercial internet service today. The buying bot illustrates why the API Index is necessary: not as an academic exercise, but as the infrastructure layer that makes autonomous agents functional participants in the commercial internet.¶
When an autonomous agent must fulfill a task that requires an external service, it faces a fundamental discovery problem: how does it find services that can fulfill its requirement?¶
Current approaches are inadequate:¶
Hardcoded URLs: brittle, require human maintenance, do not adapt to new or changed services.¶
LLM training data: stale, non-authoritative, not machine-verifiable.¶
Human-curated lists: do not scale, not machine-navigable, lack structured metadata.¶
Web search: returns HTML documents designed for humans, not structured service descriptions for agents.¶
What is needed is a machine-native equivalent of a search engine: a global, always-current, structured index of services that autonomous agents can query by capability, trust level, liveness, and other machine-relevant criteria.¶
When an autonomous agent retrieves data from a web service today, it typically receives a response designed for a human browser: HTML markup, CSS stylesheets, JavaScript bundles, embedded fonts, advertising payloads, and analytics tracking instrumentation. The actual information content — an endpoint URL, a price, an availability flag — may occupy two kilobytes. The page weight delivering that content is routinely one to three megabytes.¶
This is a 500- to 1500-fold payload multiplier that carries no value for a machine consumer. It consumes bandwidth at the client, compute at the server, transit capacity on the network, and — at the scale of the growing autonomous agent population — represents a measurable and unnecessary energy expenditure.¶
Machine-native APIs eliminate this overhead entirely. A structured JSON response delivers exactly the information the agent requested and nothing else. The IETF Datatracker provides a concrete illustration: the human-facing document page for an Internet-Draft loads several hundred kilobytes of rendered HTML and supporting assets; the equivalent information retrieved via the Datatracker REST API returns in under one kilobyte of JSON. The data is identical. The difference is entirely overhead serving a human rendering pipeline that a machine does not have.¶
APIX addresses both the discovery gap and this efficiency gap together. By providing infrastructure that indexes machine-native service endpoints, APIX encourages Service Owners to expose structured, agent-consumable APIs alongside or in place of human-facing interfaces. The aggregate effect, as autonomous agent workloads scale, is a reduction in the payload overhead carried by bot traffic across the internet as a whole. This is an explicit co-mission of APIX: machine-native infrastructure is not only more functional for agents — it is more efficient for the internet, and helps reduce humanity's environmental footprint as much as possible.¶
The APIX is not the first attempt at a global service registry. Prior efforts must be understood explicitly so that their failure modes are not repeated.¶
UDDI (Universal Description, Discovery and Integration) UDDI was a SOAP-era standard for a global service registry with the same conceptual goal as APIX, published as an OASIS Committee Draft in October 2004. It failed for three reasons: (1) extreme complexity of the XML-based data model; (2) no automatic verification — all data was self-asserted with no crawling or validation; (3) no adoption incentive — there was no commercial model to sustain registration or discovery. APIX addresses all three directly: a simple JSON manifest, automated spider verification, and a commercial tier model.¶
robots.txt (Robots Exclusion Protocol) Machine-readable, but concerned with exclusion — telling crawlers what not to access — not with discovery of capabilities. Per-domain only. Not a registry.¶
MCP (Model Context Protocol) Defines tool and capability descriptions for LLM-based agents. Excellent for consumption once a server URL is known. Does not address the discovery problem: there is no index of MCP servers. APIX is complementary to MCP — it can index MCP servers as one supported spec type.¶
Well-Known URIs (RFC 8615)
Per-domain machine-readable metadata at /.well-known/. Useful for
per-service metadata but requires the consumer to already know the domain.
No cross-service search or global index.¶
DNS DNS resolves names to addresses but carries no capability semantics. It is an architectural analogy for APIX's federation model, not a comparable system.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].¶
All API responses MUST be encoded as UTF-8 as mandated by [RFC8259] Section 8.1. All string fields in APM documents and Index API responses MUST contain valid UTF-8. HTTP status codes used throughout this specification are defined in [RFC9110].¶
Agent An autonomous software program that executes complex, goal-directed tasks by consuming external services, without per-action human instruction. Agents may use LLM-backed or programmatic orchestration logic. The primary consumer class targeted by the APIX Index API.¶
Bot An autonomous software program that executes deterministic, rule-based internet tasks: web crawling, API polling, automated messaging, without per-action human instruction. Behavior is scripted rather than goal-directed. The APIX Spider is itself a bot.¶
Connected Device A physical or embedded hardware unit with network connectivity that exposes services or sensor data via the APIX Presence Protocol. Registered as a Device Class and tracked as a Device Instance as defined in [APIX-IOT]. Distinct from Agent and Bot in that the principal is hardware, not software.¶
Service A machine-consumable API or connected device class offered by an organisation, registered in the APIX, and described by an APIX Manifest. The term covers both web API services ([APIX-SERVICES]) and IoT device services ([APIX-IOT]).¶
Service Owner The organisation responsible for registering, maintaining, and operating a Service in the APIX.¶
APIX Manifest (APM) The structured metadata document that describes a Service to the APIX, including its technical specification reference, capability taxonomy, trust metadata, and commercial terms. Profile documents define the additional fields applicable to each service type.¶
Governing Body The neutral, non-profit entity that operates the APIX, maintains its registries, accredits Regional Representatives and Verifiers, and ensures the governance and operational requirements defined in this specification are met. Any entity that satisfies those requirements MAY fulfil this role.¶
API Index (APIX) The global, centralised index of registered Services, operated by the governing body and queryable by autonomous agents via the Index API.¶
Index API The HATEOAS-compliant HTTP API exposed by the APIX for agent discovery and navigation.¶
Accredited Verifier A trusted third-party organisation, accredited by the governing body, that performs human-intensive trust verification at Organisation levels O-4 and O-5.¶
Accredited Regional Representative An organisation accredited by the governing body to operate commercial onboarding, contracting, and customer relationships within a defined geographic jurisdiction, under the governing body's standard and governance.¶
Trust Policy A set of minimum trust requirements expressed by a consuming agent that a Service must satisfy before the agent will use it.¶
Liveness The confirmed operational status and response availability of a Service, as measured by automated means at a frequency determined by the Service's commercial tier. The specific liveness mechanism differs by service type: Spider health checks for web API services; presence signals for IoT device services.¶
Tier A commercial subscription level that determines a Service's visibility in the APIX, liveness check frequency, and API query rate allocation.¶
The APIX MUST be queryable by autonomous agents via a stable, globally accessible URL without prior knowledge of any specific service.¶
The Index API MUST follow HATEOAS principles: agents MUST be able to navigate the full index starting from a single entry-point URL.¶
Every Service record MUST expose machine-readable trust metadata across all three trust dimensions (Organisation, Service, Liveness).¶
Service registration MUST be human-initiated. The registrant MUST agree to the index operator's Terms of Service before any service record is activated. For O-0 and O-1, self-service portal registration with accepted Terms of Service satisfies this requirement. For O-2 and above, registration MUST additionally involve a formal B2B contractual relationship between the Service Owner and the index operator or its Accredited Regional Representative.¶
The APIX MUST expose trust metadata as verifiable facts, not as recommendations. Trust decisions MUST remain with the consuming agent.¶
The APIX Manifest (APM) MUST be format-agnostic: it MUST support referencing multiple service types via an extensible type registry.¶
The APIX MUST be operated as a neutral, non-profit infrastructure under the governance of the governing body.¶
The Index API SHOULD support full-text and structured search by capability, category, organisation trust level, service verification level, liveness freshness, and protocol type.¶
The APIX SHOULD provide SDKs in common agent development languages to lower the integration barrier for consuming agents.¶
The APIX SHOULD support a federated accredited verifier model so that Organisation trust levels O-4 and O-5 can be verified at scale without centralising all human review in the governing body.¶
Accredited Regional Representatives SHOULD be established in major jurisdictions to allow Service Owners to contract in their local language and legal framework.¶
The APIX SHOULD publish a public transparency report at least annually, disclosing the number of registered services by tier and trust level, coverage statistics, and verifier accreditation status.¶
The APIX SHOULD, through its verification model and tier structure, incentivise Service Owners to expose structured, machine-consumable API endpoints rather than requiring agents to adapt to human-facing HTML interfaces. Eliminating rendering, styling, and advertising overhead from machine-to-machine communication is an explicit efficiency objective of this infrastructure.¶
The following are explicitly not addressed by this document. Items marked MUST NOT are normative constraints on conforming implementations; remaining items are editorial scope boundaries.¶
Bot identity and authentication: how a bot proves its own identity to a service it consumes. This is addressed by complementary work such as draft-meunier-webbotauth-registry. This document takes no position on bot identity mechanisms.¶
Bot rights and legal personhood: outside the scope of a technical infrastructure standard.¶
Service execution: a conforming APIX implementation MUST NOT proxy, mediate, or execute service calls on behalf of consuming agents. The APIX is a discovery layer only; all service interactions occur directly between the consuming agent and the Service Owner's infrastructure.¶
Content indexing: a conforming APIX implementation MUST NOT index service response content. The APIX indexes service metadata — capability declarations, trust levels, liveness signals — not the data that services return when called.¶
Mandatory consumer registration: a conforming APIX implementation MUST NOT require consuming agents to register or identify themselves as a condition of performing discovery queries (see Section 9.2).¶
+----------------------------------------------------------+
| the governing body |
| (Swiss Stiftung -- neutral, non-profit) |
| Owns: APIX standard, Index infrastructure, APM format |
| Accredits: Regional Representatives, Verifiers |
+---------------------+------------------------------------+
|
+---------------+-------------------+
| | |
+-----+------+ +-----+--------+ +-------+---------+
| Index | | Verification | | Registration |
| API | | Component | | Portal |
| (HATEOAS) | |(type-specific| | (B2B / human) |
+-----+------+ +-----+--------+ +-------+---------+
| | |
| +-----+------+ |
| | Service | |
+-------->| Record |<-----------+
| Store |
+------------+
^ ^
| |
+-----+------+ +--------+-----------+
| Consuming | | Service Owner |
| Agent | | (+ Accredited |
| (Bot) | | Regional Rep) |
+------------+ +--------------------+
¶
This document uses the generic terms "governing body" and "index operator" in all normative requirements. These terms are intentionally role-based: any entity that satisfies the governance, neutrality, and operational requirements defined in this specification MAY fulfil them. The reference implementation of these roles is described in the non-normative appendix "Reference Implementation" at the end of this document.¶
Flow:¶
A Service Owner (or their Accredited Regional Representative) creates an Organisation Account in the APIX Registration Portal, providing company details and agreeing to a commercial contract.¶
The Registration Portal creates a draft Service Record and triggers profile-appropriate verification (Spider crawl for web API services; manufacturer provisioning for IoT device classes).¶
The verification component updates the Service Record with verified technical metadata.¶
The Service Record becomes queryable via the Index API.¶
A consuming agent queries the Index API from the single entry-point URL, navigates by HATEOAS links, applies its Trust Policy, and selects services that satisfy its requirements.¶
Verification rechecks services on the schedule defined by each service's liveness monitoring configuration.¶
The APIX MUST be operated by a neutral governing body that satisfies the following normative requirements. These requirements apply to any conforming APIX implementation; the specific legal form of the governing body is an implementation choice.¶
Neutrality requirements:¶
The governing body MUST have no commercial interest in preferring any registrant's services over another in index results or liveness scheduling.¶
The governing body MUST NOT offer exclusive discovery advantages, ranking preferences, or prioritised verification treatment to any registrant regardless of commercial relationship.¶
Governance of the APIX standard and APM specification MUST be separated from operation of the commercial index. A single entity may not simultaneously control standard evolution and derive commercial benefit from preferential application of that standard.¶
Operational requirements:¶
The governing body MUST accredit Regional Representatives who may handle service onboarding in specific jurisdictions. Regional Representatives operate under licence from the governing body; the index itself remains a single global store.¶
The governing body MUST accredit Verifiers who perform Organisation trust assessments at O-4 and O-5. Accredited Verifiers are structurally analogous to Certificate Authorities in the TLS ecosystem.¶
The governing body MUST maintain the capability taxonomy and publish all versions of the APM specification and Index API specification as open standards under a permissive licence.¶
The governing body MUST perform sanctions screening on service registrants (see Section 8).¶
Openness requirements:¶
The full index MUST be made available as a freely downloadable bulk dataset on the first day of each calendar month, under the Open Database Licence (ODbL) 1.0. No entity, including the governing body, may hold an exclusive lock on the index data.¶
Incremental diff files MUST be published daily, each covering all record additions, updates, and deletions since the previous day's snapshot. A downstream consumer MUST be able to reach current index state by applying the monthly full snapshot and the sequence of daily diffs since that snapshot, without downloading any additional full snapshots.¶
Discovery queries to the Index API MUST be available without authentication or payment (subject to rate limits; see Section 9.2).¶
A conforming APIX implementation SHOULD establish mechanisms to ensure global representation in the capability taxonomy, including service categories relevant to underrepresented regions. Where regional institutional partners are willing to co-sponsor regional participation, the governing body SHOULD establish formal co-sponsorship relationships and associated governance representation for those regions.¶
Regional verification nodes are RECOMMENDED in regions with significant service registrant populations to eliminate intercontinental latency in liveness verification.¶
The APIX standard maintains normative registries of enumerated values. Registries are authoritative lists of valid values for specific APM and Index API fields. Using values not present in the relevant registry is a protocol violation.¶
Registry location: Registries are published as live JSON endpoints at
apix.example.org/registry/ and are updated independently of the RFC
revision cycle. The RFC defines the registry structure and lifecycle
rules; the live endpoints are the authoritative source of current values.¶
protocolsProtocol type registry.
Endpoint: apix.example.org/registry/protocols.
APM field: spec.type.¶
capabilitiesCapability taxonomy registry.
Endpoint: apix.example.org/registry/capabilities.
APM field: capabilities[].¶
notification-channelsNotification channel type registry.
Endpoint: apix.example.org/registry/notification-channels.
APM field: notifications.channels[].type.¶
presence-modesPresence mode registry.
Endpoint: apix.example.org/registry/presence-modes.
APM field: spec.presence_mode (device classes).¶
delegation-scopesDevice delegation scope registry.
Endpoint: apix.example.org/registry/delegation-scopes.
APM field: scopes[] in delegation grant requests (device classes).¶
Initial values for each registry are defined in the applicable profile document: [APIX-SERVICES] for protocol types and capability taxonomy; [APIX-IOT] for presence modes, delegation scopes, and IoT capability terms.¶
Registry entry lifecycle:¶
Each registry entry transitions through three phases. The standard_warnings
flag in a Service Record does not appear until the grace period has elapsed —
service operators have a silent window to update their APM before any public
signal is issued.¶
active -> deprecated (announced)
|
+-- [grace period: 90 days min]
| silent: operator notified, no public flag
|
+-- [warning period: remainder of deprecation window]
| standard_warnings visible in Service Record
|
+-- sunset
new registrations rejected; flagged non-compliant
¶
| Phase | Status | standard_warnings | New regs. |
|---|---|---|---|
| Normal use |
active
|
No | Accepted |
| Grace period |
deprecated
|
No | Accepted |
| Warning period |
deprecated
|
Yes | Accepted |
| Sunset |
sunset
|
Yes (non-compliant) | Rejected |
Deprecation rules:¶
The governing body MUST publish a deprecated_in_version, sunset_date,
grace_period_ends, and replacement value when deprecating any registry
entry.¶
The minimum total deprecation window (announcement to sunset) is 12 months. The governing body MAY extend this window but MUST NOT shorten it.¶
The minimum grace period is 90 days from the deprecation announcement.
During the grace period, standard_warnings MUST NOT be set on any Service
Record, regardless of whether the service uses the deprecated value.¶
The governing body MUST notify all registered Service Owners whose services
use the deprecated value before the grace period begins. Notification MUST
include the grace_period_ends date, the sunset_date, and the
replacement value.¶
After the grace period, the index operator MUST set standard_warnings on
Service Records that still use the deprecated value.¶
At sunset, the index operator MUST reject new APM submissions using the
sunsetted value and MUST escalate existing Service Records from
standard_warnings to a non_compliant status flag.¶
Registry versioning: each registry is independently versioned. The Index root resource (Section 10.2) exposes the current version of each registry so consuming agents may detect changes.¶
APIX is infrastructure designed for one purpose: enabling autonomous agents and the organisations that deploy them to discover legitimate services and operate productively in the commercial internet. Registration in the APIX is a declaration that a service or device class is offered in good faith for legitimate use. The APIX is not a neutral medium indifferent to the purposes for which it is used. It is infrastructure built for legitimate use, and it is by design closed to actors who are refused or removed under the compliance mechanisms defined in this specification — sanctions screening, KYC verification, and judicial enforcement through the LER process.¶
This is not a policy statement. It is the foundational design constraint from which the cooperation mechanisms in this document and in [APIX-IOT] derive their legitimacy.¶
Because APIX provides infrastructure for legitimate use, it has a duty to cooperate with properly authorised law enforcement when that infrastructure is misused. This duty is not conditional on commercial convenience or reputational risk. When a registrant or device fleet is confirmed to be operating criminally, APIX MUST act — through the mechanisms defined in this document and in [APIX-IOT] — to limit the harm that flows from that misuse.¶
APIX MUST cooperate with authorised law enforcement requests that satisfy the jurisdictional and judicial requirements defined in [APIX-IOT] Section 5.8. Refusal to cooperate with a validly authorised request is not permitted. Delay beyond the processing time commitments defined in that section requires documented justification and MUST be reported in the governing body's annual transparency report.¶
APIX is not a surveillance instrument. The cooperation mechanisms in this specification are reactive and bounded. The following prohibitions are normative and apply to all conforming implementations:¶
APIX MUST NOT proactively monitor, profile, or analyse the behaviour of registered services, device fleets, or consuming agents beyond what is technically necessary to deliver liveness verification and abuse detection as defined in this specification.¶
APIX MUST NOT share index data, presence signal logs, device instance records, or consuming agent query patterns with any law enforcement or government authority except through the Law Enforcement Request process defined in [APIX-IOT] Section 9.8, with its associated judicial authorisation requirements and jurisdictional constraints.¶
Bulk data requests — requests that are not targeted at identified specific devices, instances, or registrants but instead seek aggregate ecosystem intelligence — MUST be refused regardless of the requesting authority's jurisdiction or claimed legal basis. A valid LER MUST identify specific device IP addresses or registrant identifiers. A request for "all devices in region X" or "all services in category Y" is not a valid LER.¶
APIX MUST NOT establish any data-sharing arrangement, standing access grant, or automated feed to any law enforcement or intelligence agency. Every cooperation action is event-triggered, scoped to a specific identified case, and subject to the judicial authorisation requirement.¶
Enhanced monitoring, graduated response actions, and LER processing are ALWAYS triggered by one of two conditions:¶
External identification: a legitimate authority in an accepted jurisdiction has submitted an LER with valid judicial authorisation identifying specific devices or registrants as confirmed participants in criminal activity. Suspicion alone is not sufficient. The judicial authorisation requirement is the gatekeeping mechanism.¶
Technical anomaly detection: APIX's own infrastructure detects
signal patterns technically inconsistent with legitimate device operation
— such as rapid mass re-registration from a single IP address, heartbeat
flooding at rates outside any plausible device density, or token reuse
patterns that cannot arise from legitimate manufacture and provisioning.
Such detections result in classification at the observe tier of the
Bad-Bot Graduated Response ([APIX-IOT] Section 9.9), not in immediate
blocking. They are recorded, monitored, and shared with authorised law
enforcement on request through the LER process. They do not trigger
autonomous enforcement action by APIX.¶
Speculative profiling — building behavioural models of registered services or device fleets in the absence of a trigger — is prohibited under the Non-Surveillance Commitment above.¶
All cooperation is bounded by the accepted jurisdictions framework defined in [APIX-IOT] Section 9.8. This boundary is not negotiable on a case-by-case basis. APIX MUST NOT cooperate with a law enforcement request from a jurisdiction not on the Accepted Jurisdiction Whitelist, even when:¶
The requesting authority presents a compelling case.¶
The alleged criminal activity is severe.¶
Political, commercial, or reputational pressure is applied.¶
Another accepted-jurisdiction authority vouches for the request.¶
The Accepted Jurisdiction Whitelist exists precisely to make this boundary resist pressure. The governing body MAY add jurisdictions to the whitelist through its defined board decision process; it MUST NOT bypass the whitelist for individual cases. Any governing body action that grants cooperation outside the whitelist is a specification violation and MUST be reported in the transparency report.¶
The annual transparency report required by Section 4.2 is not merely informational. It is the mechanism by which the non-surveillance commitment and the jurisdictional guardrails are held accountable. The governing body MUST disclose in that report:¶
The number of LER requests received, accepted, and refused, by requesting jurisdiction tier.¶
The number of bulk data requests received and refused.¶
Any case in which cooperation outside the accepted jurisdictions framework was requested, with the governing body's response.¶
Any case in which APIX's own technical anomaly detection was used as the basis for a law enforcement referral.¶
The total number of device instances, services, and organisations subject to active suppression, suspension, or graduated response measures at the reporting date.¶
If a governing body fails to publish this report within 90 days of the close of a calendar year, any member of the governing body board MUST be empowered to publish it unilaterally. The right to publish the transparency report MUST NOT be waivable by board resolution.¶
The APIX Manifest is the structured document that a Service Owner provides at registration. It is the index-facing contract for a Service: format-agnostic, extensible, and designed for machine consumption.¶
The APM has two layers:¶
Base fields — defined in this document and required for all service types:
apm_version, service_id, name, description, owner (with
organisation_name, jurisdiction, registration_number, contacts),
capabilities, trust (organisation and service level assignments), and
legal. These fields are common to all profiles.¶
lifecycle_stage is required for all service types but its valid values
and transition rules are profile-defined. Each profile owns its own
lifecycle model; the field is not a shared enum. See [APIX-SERVICES] and
[APIX-IOT] for the lifecycle models applicable to each service type.¶
Profile fields — defined in profile documents and required only for the
applicable service type. [APIX-SERVICES] defines the full APM schema for
web API services. [APIX-IOT] defines the full APM schema for device class
registrations. An APM submission MUST conform to the profile schema
corresponding to its spec.type value.¶
Extension fields — the custom array is a governed extension mechanism
for declaring properties not yet covered by the base or profile schemas. The
custom field is OPTIONAL in all profiles. It is a flat list of reverse-domain
key name strings; no values are stored in the index. The APIX indexes only the
declared key names, enabling discovery via the custom_key search parameter.
This design provides a clean promotion path: when a custom key accumulates
sufficient independent adoption across organisations, the Bot Standards
Foundation MAY initiate a governance track to promote the pattern to a standard
named field in a future APM version. Full normative rules — including key naming
conventions, list size limits, and Spider behaviour — are defined in the
applicable profile document ([APIX-SERVICES], [APIX-IOT]).¶
The trust fields in an APM submission MUST be set exclusively by the index
operator based on verification outcomes. APM submissions that include trust
field values MUST have those values overwritten by the index upon processing.
A Service Owner MUST NOT assert their own trust level.¶
The APIX Trust Model has three independent dimensions. Each dimension produces a machine-readable value in the Service Record. Consuming agents combine these values according to their own Trust Policy.¶
The APIX provides trust metadata. It does not make trust decisions.¶
Describes the verified identity and compliance posture of the organisation that owns the service.¶
| Level | Label |
|---|---|
| O-0 | Unverified |
| O-1 | Identity Verified |
| O-2 | Legal Entity Verified |
| O-3 | Hygiene Verified |
| O-4 | Operationally Verified |
| O-5 | Audited |
Self-registered. No checks performed.¶
Valid business email confirmed. Domain ownership verified via DNS TXT record.¶
Company registration number confirmed against official registry of the declared jurisdiction.¶
security.txt (RFC 9116) present and valid at
/.well-known/security.txt; DMARC and SPF DNS records configured
for the registered domain; Privacy Policy, Terms of Service, and
Data Processing Agreement accessible at declared URLs. All checks
performed automatically by APIX. No human reviewer required.¶
Organisation governance structure, operational security practices, incident response capability, and personnel vetting reviewed by an Accredited Verifier against the Verifier Standard.¶
Third-party compliance audit completed (SOC 2 Type II, ISO 27001, or equivalent). Audit certificate on file with the governing body. O-5 may be achieved directly without O-4 as a prerequisite via direct certificate submission to the governing body.¶
Organisation levels are assessed against the organisation as a whole, not per service. An organisation that achieves any O-level applies that level to all its registered services.¶
Describes what has been automatically verified about the service itself. The specific verification mechanism differs by service type (Spider for web API services; manufacturer registration process for device classes).¶
| Level | Label |
|---|---|
| S-0 | Unchecked |
| S-1 | Reachable |
| S-2 | Spec Verified |
| S-3 | Schema Stable |
| S-4 | Security Reviewed |
Registered. Verification has not yet run.¶
Service confirmed reachable by automated check.¶
Specification or capability declaration confirmed and consistent with registration.¶
No breaking changes detected across at least three consecutive verification runs.¶
Automated vulnerability scan completed with no critical findings, OR third-party penetration test certificate provided and validated by an Accredited Verifier.¶
Profile documents define the exact criteria by which each level is achieved for each service type.¶
Describes the confirmed operational availability of the service, including how recent and how frequent the availability data is. Liveness data is expressed as a set of metrics, not a single level.¶
last_ping_at (ISO 8601 timestamp)Time of the most recent successful liveness check.¶
ping_interval_seconds (integer)Configured interval between liveness checks.¶
uptime_30d_percent (float)Percentage of checks successful over the last 30 days.¶
avg_response_ms (float)Mean response time in milliseconds over the last 30 days.¶
consecutive_failures (integer)Number of consecutive failed checks at last run.¶
The check interval is determined by the service's liveness monitoring
configuration. A service configured at initial-only frequency receives no
recurring checks; its last_ping_at reflects only the initial verification
run.¶
The concrete fields and measurement model for Liveness differ by service type and are defined in each profile document.¶
The three trust dimensions (Organisation, Service Verification, Liveness) are universal across all APIX service types. However, their concrete implementation — the verification mechanisms, the APM fields that carry trust state, and the achievable levels — differs by service type. Three distinct trust implementations are defined across the APIX profile suite.¶
API Service Trust (defined in [APIX-SERVICES])¶
Verification is pull-based: the APIX Spider visits the service on a
scheduled basis, checks reachability, fetches and parses the specification,
and runs schema comparison across consecutive runs. Liveness is measured
by the index — the Spider pings the service endpoint and records response
time and availability metrics. The trust object in an API service APM
carries observed metrics (last_ping_at, uptime_30d_percent,
avg_response_ms, consecutive_failures).¶
Device Class Trust (defined in [APIX-IOT])¶
Verification is registration-based: a device manufacturer registers the
device class, providing a capability declaration and firmware version
contract. The APIX Spider does not visit device hardware. Liveness
configuration is declared by the manufacturer at registration time
(presence_mode, heartbeat_interval_seconds) — not observed by the
index. The trust object in a device class APM carries manufacturer-declared
configuration, not measured metrics. spec_consistency is always null
for device classes: there is no specification document for the Spider to
fetch.¶
Device Instance Trust (defined in [APIX-IOT])¶
Liveness is push-based: individual device instances signal their presence
to the index at regular intervals. The index does not probe devices.
Instance trust state (online, reachable, last_seen_at) reflects
the most recent presence signal received, not a Spider measurement.
Device instance trust state is private — it is never returned to
unauthenticated queries regardless of trust levels.¶
These are three architecturally distinct trust models that share only the O-level and S-level abstractions. Implementers MUST NOT assume that trust object fields in a device class or device instance APM follow the structure of an API service APM.¶
A consuming agent expresses its Trust Policy as a set of minimum thresholds across all three dimensions. Example policy expressed in pseudo-notation:¶
require: organisation_level >= O-2 service_level >= S-2 last_ping_age < 3600 # seconds since last_ping_at uptime_30d_percent >= 99.0 consecutive_failures == 0¶
The Index API SHOULD support filtering by trust dimension thresholds so that agents can retrieve only records that satisfy their policy without downloading the full index.¶
Trust Policies are defined and enforced by consuming agents. The APIX does not validate or enforce Trust Policies.¶
Organisation level O-3 (Hygiene Verified) is achieved by automatic APIX checks and requires no human reviewer. Organisation level O-4 requires an Accredited Verifier assessment. Organisation level O-5 may be achieved directly without O-4 as a prerequisite via direct certificate submission to the governing body (SOC 2 Type II or ISO 27001). The APIX uses a federated Accredited Verifier model, analogous to the Certificate Authority model in TLS:¶
the governing body defines the verification criteria for each level and publishes the Verifier Standard.¶
Organisations apply to the governing body for Verifier accreditation.¶
Accredited Verifiers perform O-4 assessments and, where applicable, O-5 attestations, signing verification reports in each case.¶
the governing body maintains a public registry of Accredited Verifiers and their accreditation status.¶
A Service Record at O-4 MUST include the identifier of the Accredited Verifier that performed the assessment and the date of assessment.¶
A Service Record at O-5 via direct certificate submission MUST include the certificate reference, issuing auditor, scope, and expiry date.¶
Accreditation of Verifiers is reviewed annually by the governing body.¶
A Verifier placed in suspended status following a failed annual review MUST be given a minimum 90-day remediation window before final revocation. The 90-day window applies to performance failures: lapsed certifications, reduced capacity, or failure to meet audit quality standards. It does not apply to fundamental violations, for which the governing body MUST revoke accreditation immediately. Fundamental violations include: issuing a false or unsupported O-4 or O-5 assessment, certifying a related entity in breach of the independence requirement, leaking confidential assessment data, or colluding with an organisation to obtain a trust level fraudulently.¶
Elevation verification requirements:¶
Elevation to O-4 or O-5 MUST be verified through an out-of-band channel that is independent of the digital submission path used to submit the elevation request. The governing body MUST NOT record an O-4 or O-5 elevation solely on the basis of a digitally submitted application, regardless of the authentication mechanism used for that submission. The out-of-band verification MUST confirm that the elevation was intentionally authorised by a responsible representative of the applicant organisation, and that the submitted evidence (Accredited Verifier report or audit certificate) is genuine.¶
Elevation to O-5 MUST additionally be confirmed by two independently authorised representatives of the applicant organisation. The two confirming individuals MUST hold separate credentials and MUST act independently; a single individual confirming twice does not satisfy this requirement. The governing body MUST enforce this programmatically for O-5 elevations processed through its operational interface.¶
The specific out-of-band verification mechanism and the implementation of the two-representative confirmation are operational responsibilities of the governing body and are documented in the APIX implementation guide. Conforming implementations of the APIX governing body role MUST implement mechanisms that satisfy these requirements; the specific mechanisms are not prescribed by this specification.¶
Design Note — Future Trust Level Evolution (non-normative): The O-0 through O-5 architecture defined here is the Version 1 model. O-3 was introduced to provide an automatable, zero-cost on-ramp for early-stage organisations, bridging the gap between legal entity verification (O-2) and the first human-reviewed tier (O-4). As the governing body Accredited Verifier market matures and a meaningful population of O-5 organisations is established, a Version 2 evolution is anticipated in which O-5 is joined by a premium O-6 designation with APIX-specific assessment criteria beyond the industry baseline — dedicated incident response covering governing body cooperation obligations, agreed governing body audit access, and APIX-specific operational commitments. This evolution requires the governing body to develop and publish an O-6 assessment standard, which is not feasible at initial launch. The trust level record structure (see implementation guide Part I §1.4) is designed to accommodate additional components without breaking existing consumers.¶
Every registered service MUST be covered by a commercial agreement between the Service Owner and the index operator (or its Accredited Regional Representative). The agreement MUST define:¶
The liveness monitoring configuration and its obligations.¶
The index operator's obligations regarding verification frequency and Index API availability.¶
Acceptable use terms.¶
Data processing terms in accordance with applicable law.¶
Sanctions compliance: the index operator MUST screen all service registrants against applicable sanctions lists prior to account activation. At minimum, screening MUST cover the UN Security Council consolidated sanctions list. Operators subject to additional jurisdictional sanctions regimes (e.g., EU, US OFAC, Swiss SECO) MUST additionally screen against those lists as applicable to their jurisdiction of incorporation. Entities subject to applicable sanctions MUST be refused registration regardless of commercial tier.¶
Registrants MUST represent and warrant in the commercial agreement that they are not subject to applicable sanctions, and MUST notify the index operator immediately of any change in that status.¶
Ongoing sanctions monitoring: The index operator MUST perform periodic re-screening of all registered organisations against the same sanctions lists checked at initial registration. Re-screening MUST occur at least quarterly. Upon detection of a new match for a previously-cleared organisation — whether by periodic re-screening, third-party notification, or registrant self-report — the index operator MUST immediately:¶
Suspend the organisation's account. All API credentials are revoked; no further registration or update operations are accepted from the organisation.¶
Suspend all services registered by the organisation. Suspended services are removed from all discovery results.¶
Revoke all active credentials issued to the organisation (API keys, instance tokens where applicable). All associated service instances are marked offline or unreachable.¶
Open a legal review case. The specific sanctions list and matched entry MUST NOT be disclosed externally; the organisation receives only a generic account suspension notice.¶
If the sanctions match is subsequently determined to be a false positive or the registrant is removed from the relevant list, the index operator MAY reinstate the account following legal review. Reinstatement requires a fresh KYC and sanctions check.¶
Unauthenticated discovery queries to the Index API are not subject to registration screening and MUST remain available without restriction, consistent with the APIX's mission as open global infrastructure.¶
A conforming APIX implementation MUST be funded primarily by service registration fees paid by Service Owners (supply side). Discovery queries by consuming agents MUST NOT be the primary revenue mechanism. This principle is normative: an implementation that charges consuming agents for standard discovery queries is not conformant with the APIX model, as doing so contradicts the open infrastructure mission and undermines the network effect that makes the supply side valuable.¶
The APIX model is structurally analogous to the DNS model: registrants pay to be listed; queries are free.¶
Fee structures applicable to each service type are defined in the relevant profile document. All implementations MUST apply fees consistently to all registrants of a given service type at the same commercial tier, with no preferential treatment. The governing body publishes the normative fee schedule as a separate registry document, updated independently of this RFC.¶
Discovery queries to the Index API MUST be available without authentication or payment. Rate limits MAY be applied to protect infrastructure integrity but MUST NOT be set at levels that prevent reasonable agent operation. Implementations MUST support at minimum three consumer access layers:¶
Layer 1 — Unauthenticated access¶
Any agent MUST be able to query the Index API without authentication or registration, subject to a per-IP rate limit. This layer is sufficient for individual agents and proof-of-concept deployments.¶
Layer 2 — Authenticated access (free)¶
Any agent MAY register a consumer identity token at no cost. Token registration requires a valid email address. Authenticated access MUST provide a higher rate limit than unauthenticated access and MAY additionally provide result caching hints and webhook subscriptions for service record changes.¶
Consumer tokens SHOULD be compatible with the webbotauth identity model ([I-D.meunier-webbotauth-registry]) to enable interoperability with bot authentication infrastructure.¶
Layer 3 — High-volume access (paid, optional)¶
Implementations MAY offer a paid high-volume access tier for platforms operating agents at scale that require guaranteed query capacity and operational SLAs. This tier is supplementary; the index's operational sustainability MUST NOT depend on it.¶
Public bulk download (REQUIRED)¶
Implementations MUST provide the full index as a freely downloadable bulk dataset on the first day of each calendar month, without authentication, under the Open Database Licence (ODbL) 1.0. This requirement implements the openness requirement of Section 4.2: no entity, including the index operator, may hold an exclusive lock on the index data.¶
Implementations MUST additionally publish a daily diff file covering all
record additions, updates, and deletions since the previous day. Daily diffs
MUST be serialised in the same format as the full snapshot and MUST be
available at the same endpoint, identified by an ISO 8601 date in their
filename or URL path (e.g. diff-2026-04-28.json). A new mirror MUST be
able to reach current index state by downloading the latest monthly full
snapshot and applying the sequence of daily diffs since that snapshot date,
without downloading any additional full snapshots.¶
A conforming APIX implementation SHOULD publish aggregate ecological impact statistics derived from observed index usage. These statistics quantify the efficiency gain attributable to machine-native API consumption compared to equivalent traditional web request technology consumption, and SHOULD be updated in real time and included in the annual transparency report.¶
The comparison baseline is the full traditional web request stack — not payload size alone — including the request waterfall (HTML page with dependent CSS, JavaScript, image, and font resources), JavaScript execution overhead for dynamically rendered pages, polling requests that occur in the absence of a notification mechanism, retry waste from access-control measures, and proxy infrastructure maintained solely to circumvent those measures.¶
The following metrics SHOULD be derived from directly observable index events and published at a stable public endpoint:¶
Discovery requests served — each request represents one agent retrieval that did not require scraping or probing a service endpoint directly.¶
Notification events fired — each event represents one or more polling requests eliminated across all subscribed consuming agents.¶
Estimated data transfer saved (GB) — computed from discovery request count, service profile type, and the differential between average traditional web page size and average machine-native API response size for that profile type.¶
Estimated CO2 equivalent avoided — computed from total estimated data transfer saved using a published CO2-per-GB methodology. The methodology document, including its source data and version, MUST be publicly accessible at a stable URL.¶
All published figures MUST be accompanied by the computation methodology, confidence bounds, and source data references. Conservative estimates MUST be used where data is incomplete; figures MUST NOT be extrapolated beyond what the directly observed data supports.¶
The governing body SHOULD seek independent validation of the methodology from an established environmental computing research organisation.¶
The APIX exposes a single globally stable entry-point URL:¶
https://apix.example.org/¶
A GET request to this URL returns the Index root resource. The root resource includes base navigation links common to all implementations, plus profile-specific links defined in applicable profile documents.¶
{
"apix_version": "1.0",
"total_services": 12483,
"last_updated": "2026-04-25T00:00:00Z",
"registry_versions": {
"protocols": "1.0",
"capabilities": "1.0",
"presence_modes": "1.0"
},
"_links": {
"self": {
"href": "https://apix.example.org/"
},
"search": {
"href": "https://apix.example.org/search{/api_version}{?...}",
"templated": true
},
"browse": {
"href": "https://apix.example.org/browse"
},
"capabilities": {
"href": "https://apix.example.org/capabilities"
},
"devices": {
"href": "https://apix.example.org/devices{?capability,...}",
"templated": true
},
"docs": {
"href": "https://apix.example.org/docs"
},
"apix:ecological-impact-stats": {
"href": "https://apix.example.org/stats/ecological-impact"
}
}
}
¶
The {?q,...} placeholder above is abbreviated. The complete search URI
template (parameters grouped for readability; the value is a single
uninterrupted string at runtime):¶
https://apix.example.org/search{/api_version}
{?q,capability,protocol,language,pricing_model,
auth_method,deployment_region,near,coverage_radius_km,
custom_key,org_level_min,service_level_min,spec_consistency,
max_ping_age,uptime_30d_min,lifecycle_stage,
include_superseded,page,page_size}
¶
The lifecycle_stage parameter accepts values defined by each profile
document. Valid values differ by service type and are not a shared enum.
See [APIX-SERVICES] and [APIX-IOT] for the valid values applicable
to each service type.¶
The devices link template (defined in [APIX-IOT]):¶
https://apix.example.org/devices
{?capability,protocol,online,api_version,
endpoint_confidence,page,page_size}
¶
Profile-specific links (e.g., the devices link defined in [APIX-IOT]) are
present in the root resource when the implementation includes support for that
profile. Consuming agents MUST follow links rather than constructing URLs
independently; the presence or absence of a link in the root resource is the
authoritative signal of whether a capability is supported.¶
The Index API is consumed by autonomous agents at machine speed. Response payloads are structured JSON with highly repetitive field names across result arrays. Transport-layer compression achieves 70–85% size reduction on typical search result payloads with no information loss and no application-layer schema changes.¶
Compression support requirements:¶
The Index API MUST support the following Accept-Encoding values:¶
| Encoding | Requirement | Notes |
|---|---|---|
gzip
|
MUST | Universally supported baseline |
br (Brotli) |
SHOULD | Higher compression ratio than gzip |
zstd
|
SHOULD | Similar ratio to Brotli; faster decompression |
The Index API MUST perform content negotiation via the Accept-Encoding
request header. Responses MUST include a Content-Encoding header
identifying the applied encoding. If a client sends no Accept-Encoding
header, the server MAY respond uncompressed.¶
Consuming agents SHOULD include Accept-Encoding: zstd, br, gzip in all
Index API requests.¶
The Index API MAY additionally support CBOR (RFC 8949) as a binary
alternative to JSON. A client that prefers CBOR MUST signal this via
Accept: application/cbor. CBOR responses carry identical information to
JSON responses. Clients MUST NOT assume CBOR support. JSON over compressed
transport is the normative interchange format.¶
The root resource returned at https://apix.example.org/ MUST include an
apix_version field identifying the version of the Index API schema in use.
Version values are of the form MAJOR.MINOR (e.g., "1.0", "1.2", "2.0").¶
Consuming agents MUST read apix_version at the start of each session.
Agents MUST NOT cache apix_version across sessions: the version field is
the authoritative signal that the schema has changed.¶
The APIX follows a semantic versioning policy for the Index API:¶
Non-breaking changes (MINOR increment):¶
Adding new fields to Service Records or the root resource¶
Adding new optional query parameters to the search endpoint¶
Adding new _links relations to any response¶
Expanding an enumerated value registry (new capability terms, new protocol types)¶
Increasing rate limits¶
Minor version increments are backward compatible. A consuming agent written
for 1.0 MUST be able to operate correctly against a 1.x endpoint,
provided it ignores unknown fields.¶
Consuming agents MUST follow the robustness principle: ignore unknown fields and unknown link relations rather than failing. This requirement is normative.¶
Breaking changes (MAJOR increment):¶
Removing or renaming fields in Service Records¶
Changing the type or semantics of an existing field¶
Removing or renaming existing query parameters¶
Changing the structure of the HATEOAS _links object¶
Changing the URL of the single entry-point¶
A MAJOR version increment MUST NOT occur without a concurrent deprecation notice for the prior version (see below).¶
When a new MAJOR version is released, the prior MAJOR version MUST remain supported for a minimum of 24 months from the date the new version becomes available. During this period:¶
Both versions MUST be simultaneously queryable¶
The root resource of the prior version MUST include a deprecated flag
with the sunset_date of the old version¶
Consuming agents that include the IETF Sunset header
([RFC8594]) in their responses MUST use it to signal the old version's
sunset date¶
the governing body MUST NOT sunset a MAJOR version without giving consuming agents at least 24 months to migrate.¶
The api_version field in an APM and the version path segment in the
search endpoint (/search/v{major}.{minor}/) rest on a single foundational
guarantee: a published api_version value has an immutable field structure
definition.¶
This invariant MUST be stated unambiguously to consuming agents and service operators:¶
A field present in version v2.4 will be present in every service that
declares api_version: "2.4.x" for the lifetime of that registration.¶
A field absent from version v2.4 will never appear in a v2.4.x
service record without a version increment.¶
Removing a field, changing a field's type, or making any other breaking change REQUIRES a new major version. The major bump is the explicit, sufficient notice to consumers. No deprecation period within a major version is required or expected.¶
Adding a field requires a new minor version. Even additive changes are
not permitted within a published version — a service that adds a field
mid-life has implicitly created a new contract and MUST increment
api_version accordingly.¶
This invariant enables the version path filter to be an unconditional
schema contract: an agent that pins to /search/v2.4/ receives results
with a fixed, permanent field set. Service owners are freed from the
pressure to retain unwanted fields for backwards compatibility — the
correct action is always to increment the version and move forward cleanly.¶
The APIX does NOT perform cross-version response mapping. The
api_version path segment is a strict storage filter: only service
registrations whose api_version field matches the specified prefix
are returned. The index never synthesises a response of one version
from a record stored at a different version.¶
The consequence is deliberate and unambiguous:¶
A service that has upgraded from v2.4 to v3.0 is stored as a separate
record. The v3.0 record does not appear in /search/v2/ results.
There are no null substitutions for dropped fields, no type coercions
for changed fields, and no partial responses. A v3 record is a
different resource; it is not a transformed view of a v2 record.¶
The v2.4 record remains in the index — immutably — until the service
owner advances it through the lifecycle (deprecated → sunset) or
the record is superseded and eventually removed. An agent pinned to
/search/v2/ continues to see v2.4 registrations for as long as
they exist in the index at that lifecycle stage.¶
As services migrate to newer major versions, the v2 result set shrinks. Diminishing or empty results at a pinned version are not a failure condition — they are the designed signal that the consuming agent's version pin no longer covers the current service landscape and an upgrade of consumer code is warranted.¶
Upgrade path discovery: The Level 2 Service Record for a superseded
version MUST include a populated superseded_by field pointing to the
current version's record. A consuming agent that finds a v2.4 result with
superseded_by set SHOULD follow the link to inspect the v3.0 record and
determine whether upgrading its version pin is feasible. This is the
mechanism by which agents discover that a newer contract is available
without being forced off the old one before they are ready.¶
A consuming agent that receives only empty results for its pinned version
SHOULD query GET /search/ with no path segment and no query parameters.
This returns the version landscape only — a summary of available
api_version prefixes, service counts, and lifecycle status — and executes
no content query. The agent uses this response to identify which version
prefix covers the current service population and then issues a new scoped
query (e.g., /search/v3/?...) with explicit filters. A parameter-less
/search/ MUST NOT return service records; it exists solely as a version
discovery resource.¶
The root resource exposes a registry_versions object (Section 10.2).
Consuming agents that cache capability taxonomy or protocol type data MUST
compare the current registry_versions values against their cached version
on each session. A change in any registry version MUST trigger a cache
refresh before the agent applies trust filtering or capability matching.¶
APIX centralises knowledge that has intrinsic intelligence value: the identity and capability of every registered service, the network location of every online IoT device instance, the query patterns of every consuming agent, and the contact details of law enforcement authorities across accepted jurisdictions. This concentration makes the Bot Standards Foundation an ultra-high-value target for state-sponsored actors, criminal organisations, and corporate adversaries.¶
The Non-Surveillance Commitment (Section 5) defines what APIX will not do to the ecosystem it serves. This section defines what the Bot Standards Foundation MUST do to protect itself and the ecosystem from being exploited involuntarily — through compromise, coercion, insider threat, or organisational capture.¶
The requirements in this section are normative obligations on the Bot Standards Foundation as operator. They are not addressed to Service Owners or consuming agents.¶
the governing body MUST operate APIX infrastructure under the following technical constraints:¶
Infrastructure separation: The token store, tamper-evident audit log, and LER processing queue MUST be hosted on systems with no shared network path to the public-facing Index API query infrastructure. Compromise of the query layer MUST NOT provide lateral access to the token store or audit log.¶
Air-gapped token issuance: Instance token batches for IoT device classes MUST be generated on infrastructure with no persistent internet connection. Issuance systems MUST use hardware security modules (HSMs) for all cryptographic operations. The issuance network MUST be physically separated from the token delivery network.¶
Geographic distribution: Core APIX systems MUST be distributed across at least two independent physical jurisdictions. No single legal order from any one jurisdiction MUST be sufficient to take the full system offline or compel full data access.¶
Zero-trust internal architecture: No governing body system MUST grant implicit trust to requests from other governing body systems. All inter-system communication MUST be authenticated and authorised independently of network location. Lateral movement within governing body infrastructure MUST require separate credentials at each boundary.¶
Cryptographic floor: All external-facing endpoints MUST use TLS 1.3 or higher ([RFC8446]). All signing operations MUST use asymmetric keys stored in hardware-backed key storage. Key material MUST NOT be exportable from the HSM in plaintext under any operational procedure.¶
Mandatory penetration testing: The governing body MUST commission an independent penetration test of its production infrastructure at least annually. A summary of findings (severity distribution, remediation status) MUST be published in the governing body's annual security report within 90 days of the test. The identity of the testing firm MUST be disclosed.¶
Responsible disclosure programme: The governing body MUST maintain a public responsible disclosure policy at a stable URL and MUST acknowledge vulnerability reports within 5 business days.¶
Personnel vetting: All staff and contractors with access to the token store, LER queue, sanctions screening pipeline, or audit log MUST undergo documented background verification commensurate with the sensitivity of the systems they can access, prior to access being granted. Access MUST be reviewed annually.¶
Segregation of duties: No individual staff member MUST hold simultaneous access to more than two of the following: token store, audit log, LER queue, sanctions pipeline, board signing keys. This constraint MUST be enforced technically, not procedurally.¶
Least-privilege access: Access rights MUST be scoped to the minimum required for the role. Privileged access MUST expire after a defined session window and MUST require re-authentication. No standing privileged sessions are permitted.¶
Security awareness: All governing body staff MUST complete security awareness training annually, covering at minimum the threat types and unlawful request scenarios relevant to an operator under the security obligations defined in this section.¶
Insider threat detection: The governing body MUST operate anomalous access pattern detection across all privileged systems. Anomalies MUST generate alerts to a security function independent of the alerted staff member's reporting line.¶
Whistleblower protection: Any governing body staff member or contractor who receives an instruction — from any source, including governing body board members — that would cause the governing body to act contrary to the Non-Surveillance Commitment (Section 5) or the requirements of this section MUST have a protected right to report that instruction to an external body without prior internal approval. This right MUST be codified in the governing body's founding charter charter and in every employment and contractor agreement. It MUST NOT be waivable by board resolution or individual contract term.¶
Structural domicile: the governing body MUST maintain its Swiss Stiftung domicile as a structural defence. The Swiss legal system, political neutrality, and the oversight of the Eidgenössische Stiftungsaufsicht provide a foundation that is not subject to the data access regimes of any single major power.¶
Golden share: the governing body's charter MUST maintain a governance mechanism equivalent to a 51% golden share that prevents any acquisition, merger, or board supermajority from overriding the charter's core purpose. No commercial transaction MUST be permitted to subordinate the governing body's neutrality obligations to the interests of a single organisation or jurisdiction.¶
Board composition: No single nation-state's citizens or residents MUST hold a majority of board seats. No individual MUST hold more than one vote on any board decision. Board composition MUST be published annually in the transparency report.¶
Infrastructure jurisdiction policy: The governing body MUST NOT host core APIX systems — token store, audit log, LER queue — in jurisdictions that impose secret data access orders (orders that legally prohibit the recipient from disclosing that the order was received). The governing body MUST maintain a published list of approved hosting jurisdictions, reviewed annually by the board. Removal of a jurisdiction from the approved list MUST trigger migration of any systems hosted there within 180 days.¶
Lawful pressure resistance: If the governing body receives a government demand for data access, system access, or operational changes that does not satisfy the LER criteria defined in [APIX-IOT] Section 9.8, The governing body MUST refuse the demand. The governing body MUST record the demand in the audit log and MUST report its existence — without operational detail that would compromise an ongoing investigation — in the next annual transparency report. The governing body MUST NOT comply with informal diplomatic pressure, agency-level requests, or extra-judicial demands regardless of the requesting party's political standing.¶
Anti-capture review: The board MUST conduct an annual review of whether any commercial relationship, grant dependency, or staff composition creates a conflict of interest with the governing body's neutrality obligations. Findings MUST be published in the transparency report.¶
The following conditions each independently trigger the governing body crisis governance protocol:¶
Credible evidence that APIX production infrastructure has been compromised by an external actor¶
Receipt of a demand that the governing body's legal counsel assesses as an attempt to compel action contrary to the charter¶
Attempted hostile acquisition, board capture, or charter amendment by a party with a conflict of interest¶
Regulatory action that threatens loss of Swiss Stiftung domicile¶
Obligations on trigger:¶
The discovering party MUST notify all board members within 4 hours.¶
The governing body MUST publish a public statement acknowledging the trigger event within 72 hours of confirmation. The statement MUST describe the nature of the threat in general terms without disclosing operational detail that would aid the attacker.¶
The governing body MUST activate its continuity-of-operations plan, ensuring Index API availability is maintained independently of any compromised or coerced system.¶
If Swiss domicile is threatened or lost, the board MUST convene within 30 days to activate a pre-agreed organisational relocation framework. The destination jurisdiction MUST satisfy the infrastructure jurisdiction policy defined above. The relocation framework MUST be prepared and approved by the board before APIX reaches production operation and MUST be reviewed annually.¶
No single board member and no external party MUST have the authority to suspend or delay execution of steps 1–3 above.¶
The least-held data is the least-leakable data. The following constraints apply to all APIX operational systems:¶
APIX MUST NOT log consuming agent query patterns beyond the minimum required for liveness monitoring and abuse detection. Query logs MUST be purged after 30 days unless retained under a specific, documented, time-limited LER investigation scope.¶
Device instance network location data (network.ipv6, as published in
the instance record) MUST be purged from APIX systems within 72 hours of
the instance transitioning to offline status, subject to any active LER
retention obligation on that instance. The internally observed source IPv4
address (observed_source_ipv4, retained for abuse detection and
geo-routing and not surfaced in the instance record) is subject to the
same purge obligation and timeline.¶
APIX MUST NOT build or maintain cross-session behavioural profiles of consuming agents. Each query session MUST be treated as independent.¶
Every data field collected or retained by APIX MUST have a documented functional justification. Fields without a current functional justification MUST be deleted from the data model in the next schema revision. This review MUST be a standing agenda item at each the governing body board meeting.¶
the governing body MUST publish an annual security report within 90 days of the close of each calendar year. The security report is separate from the transparency report defined in Section 5.6 and MUST contain:¶
Summary of the year's penetration test findings: severity distribution (critical / high / medium / low count), remediation status of prior findings, identity of testing firm¶
Summary of infrastructure changes affecting the attack surface¶
Staff access review outcomes: number of access rights granted, revoked, and modified¶
Count of external demands received that did not meet LER criteria, and how each was handled¶
Count of whistleblower reports received and their resolution status (no identifying detail)¶
Board attestation that the infrastructure jurisdiction policy was reviewed and remains current¶
The same unilateral publication right defined for the transparency report (Section 5.6) applies to the security report: if the board fails to publish within 90 days of period close, any individual board member MUST be empowered to publish it unilaterally. This right MUST NOT be waivable by board resolution.¶
The mandatory Terms of Service acceptance at registration provides a first barrier against malicious actors listing fake or harmful services. For O-0 and O-1, identity verification is limited; consuming agents SHOULD NOT rely solely on index presence for trust at these levels. For O-2 and above, the formal B2B contractual relationship and progressively stronger identity and compliance verification substantially raise the cost of abuse.¶
Consuming agents SHOULD apply Trust Policies that exclude O-0 services for any task involving sensitive data or consequential actions.¶
the governing body MUST maintain an abuse reporting mechanism and
MUST be able to suspend or remove a Service Record within 24 hours of
confirmed abuse. Suspended service records MUST remain in the index with a
status: suspended flag and MUST NOT be silently deleted, to provide
transparency to agents that had cached the record.¶
Organisation and Service trust levels in the Service Record are set only by
the APIX itself, not by the Service Owner. APM submissions that include
trust field values MUST have those values overwritten by the APIX upon
processing. The Index API MUST NOT expose self-asserted trust values.¶
The Index API MUST be served exclusively over TLS ([RFC8446]). Certificate validity MUST be verified by consuming agents. Agents MUST NOT bypass TLS certificate verification when querying the Index API.¶
All entry_point and spec.url values submitted in APM registrations MUST
use the https scheme. The Index MUST reject APM submissions that provide
HTTP (non-TLS) values for these fields.¶
The APIX provides discovery and trust metadata. It does not guarantee the safety, correctness, or availability of listed services. Consuming agents MUST NOT assume that a service listed in the APIX is safe to use without applying their own Trust Policy.¶
Consuming agents SHOULD treat Index API responses as untrusted input and validate the structure of Service Records before acting on them.¶
This document requests no IANA actions. Registry structures defined here are
maintained by the governing body at apix.example.org/registry/.
Initial registry values are defined in [APIX-SERVICES] and [APIX-IOT].¶
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.¶
[RFC8259] Bray, T., "The JavaScript Object Notation (JSON) Data Interchange Format", RFC 8259, December 2017.¶
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, August 2018.¶
[RFC8594] Wilde, E., "The Sunset HTTP Header Field", RFC 8594, May 2019.¶
[RFC8615] Nottingham, M., "Well-Known Uniform Resource Identifiers (URIs)", RFC 8615, May 2019.¶
[RFC9110] Fielding, R., et al., "HTTP Semantics", RFC 9110, June 2022.¶
[RFC9116] Foudil, E., Shafranovich, Y., "A File Format to Aid in Security Vulnerability Disclosure", RFC 9116, April 2022.¶
[APIX-SERVICES] Rehfeld, C., "APIX Services Profile", draft-rehfeld-apix-services-00.¶
[APIX-IOT] Rehfeld, C., "APIX IoT Device Profile", draft-rehfeld-apix-iot-00.¶
[UDDI] Clement, L., et al., "UDDI Version 3.0.2", OASIS, 2004.¶
[I-D.pioli-agent-discovery], [I-D.narajala-courtney-ansv2], [I-D.vandemeent-ains-discovery], [I-D.aiendpoint-ai-discovery], [I-D.meunier-webbotauth-registry], [I-D.cui-ai-agent-discovery-invocation], [I-D.am-layered-ai-discovery-architecture], [I-D.hood-agtp-discovery], [I-D.mozleywilliams-dnsop-dnsaid], [I-D.batum-aidre], [I-D.mozley-aidiscovery] - Related Internet-Drafts, Section 1.6.¶
[W3C-AGENTPROTOCOL] Chang, G., Xu, S., "W3C AI Agent Protocol Community Group", 2025.¶
[WEBBOTAUTH-WG] "webbotauth IETF Working Group".¶