<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rehfeld-apix-core-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="APIX Core">API Index (APIX): Core Infrastructure for Autonomous Agent Service Discovery</title>
    <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-core-00"/>
    <author initials="C." surname="Rehfeld" fullname="Carsten Rehfeld">
      <organization/>
      <address>
        <email>carsten@botstandards.org</email>
      </address>
    </author>
    <date year="2026" month="April" day="29"/>
    <abstract>
      <?line 88?>

<t>The internet was designed for human actors. Its discovery infrastructure —
search engines, directories, and hyperlinked documents — assumes a human
reading and navigating. Autonomous agents (bots) operating on the internet
today face a structural gap: there is no machine-native, globally accessible
index of services they can consume.</t>
      <t>This document defines the core infrastructure of the <strong>API Index (APIX)</strong>:
a HATEOAS-based, globally accessible, commercially sustainable service
discovery infrastructure designed for autonomous agents as its primary
consumers. It specifies the governance model, the three-dimensional trust
model, the APIX Manifest (APM) base format, commercial onboarding and
sanctions compliance, the supply-side funding model, and the base Index API.
These elements are shared across all APIX service types.</t>
      <t>Profile documents extend this core for specific service categories:
the APIX Services Profile (draft-rehfeld-apix-services-00) defines the
web API and bot service profile; the APIX IoT Device Profile
(draft-rehfeld-apix-iot-00) defines the IoT device profile.</t>
    </abstract>
  </front>
  <middle>
    <?line 109?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="the-bot-ecosystem-gap">
        <name>The Bot Ecosystem Gap</name>
        <t>The internet's foundational infrastructure — HTTP, HTML, DNS, and search
engines — was designed with human actors as the primary consumers. Web pages
render visual layouts for human eyes. CAPTCHA systems explicitly discriminate
against non-human access. Discovery mechanisms such as search engines index
content for human-readable navigation.</t>
        <t>Autonomous agents — software programs that independently execute tasks,
consume APIs, and interact with external services without per-action human
instruction — are not recognized as legitimate, first-class internet
participants in this architecture. They are systematically treated as threats
to be filtered, blocked, or rate-limited.</t>
        <t>This situation is changing. The rapid growth of large language model-based
agents, robotic process automation, and programmatic service consumers means
that non-human actors now represent a significant and growing proportion of
internet traffic. As this proportion increases, internet service providers
will increasingly need to serve autonomous agents as a recognized user class
alongside humans.</t>
        <t>The API Index is premised on this trajectory: bots are becoming
first-class internet participants, and the infrastructure to support them —
starting with service discovery — does not yet exist. Regulators are
converging on the same direction: the EU AI Act (Article 50) requires
transparency and identity disclosure for AI systems that interact with
people, and NIST's Center for AI Standards and Innovation solicited public
input on securing AI agent systems in early 2026. APIX's verifiable trust
model is designed to meet these emerging compliance requirements by
construction.</t>
        <section anchor="motivation-a-concrete-origin">
          <name>Motivation: A Concrete Origin</name>
          <t>The API Index was not conceived in the abstract. It emerged from a
concrete practical failure.</t>
          <t>A buying bot was built for a private use case: monitoring online shops for
a specific product and purchasing it automatically the moment it became
available. This is a straightforward task for an autonomous agent — exactly
the kind of task agents are well-suited for.</t>
          <t>The bot failed, not because the task was technically complex, but because
the internet's infrastructure is actively hostile to it:</t>
          <t><strong>HTML-only product pages.</strong> Product availability, price, and purchase state
were encoded in HTML rendered for a human eye. No machine-readable API
existed. The bot had to parse HTML — fragile, maintenance-intensive, and
broken by every redesign.</t>
          <t><strong>Cloudflare Bot Management and equivalent shields.</strong> The majority of
commercial web services now sit behind bot mitigation infrastructure. Cloudflare
Bot Management, and equivalent products from Akamai, Imperva, and others,
are deployed specifically to detect and block non-human request patterns.
Repeated automated requests — even at modest frequency — trigger rate
limiting, CAPTCHA challenges, or silent blocking. A buying bot that polls
a product page to detect availability is treated identically to a malicious
scraper or a DDoS participant.</t>
          <t><strong>CAPTCHA payment barriers.</strong> Even when product pages were reachable, payment
flows required solving CAPTCHAs that explicitly excluded non-human actors.
The purchasing step — the final, necessary action — was deliberately made
inaccessible to the bot.</t>
          <t><strong>Proxy network pollution.</strong> To work around rate limits and bot detection,
the bot required a rotating proxy network — different IP addresses on each
request to disguise its automated origin. This is not a solution: it
pollutes internet traffic with avoidable requests, raises the cost of
operation, and contributes directly to the adversarial dynamic between
bots and infrastructure operators. Every proxy request is a wasted roundtrip
that a machine-readable API endpoint would have made unnecessary.</t>
          <t><strong>Polling as the only state-change mechanism.</strong> Because the bot had no way
to subscribe to product availability events, it had to poll the product page
continuously. This is architecturally wasteful: the bot consumes server
resources and network bandwidth to repeatedly ask a question whose answer
has not changed.</t>
          <t>These are not edge cases. They are the standard experience for any autonomous
agent attempting to consume a commercial internet service today. The buying
bot illustrates why the API Index is necessary: not as an academic
exercise, but as the infrastructure layer that makes autonomous agents
functional participants in the commercial internet.</t>
        </section>
        <section anchor="the-discovery-problem">
          <name>The Discovery Problem</name>
          <t>When an autonomous agent must fulfill a task that requires an external
service, it faces a fundamental discovery problem: how does it find services
that can fulfill its requirement?</t>
          <t>Current approaches are inadequate:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Hardcoded URLs</strong>: brittle, require human maintenance, do not adapt to
new or changed services.</t>
            </li>
            <li>
              <t><strong>LLM training data</strong>: stale, non-authoritative, not machine-verifiable.</t>
            </li>
            <li>
              <t><strong>Human-curated lists</strong>: do not scale, not machine-navigable, lack
structured metadata.</t>
            </li>
            <li>
              <t><strong>Web search</strong>: returns HTML documents designed for humans, not structured
service descriptions for agents.</t>
            </li>
          </ul>
          <t>What is needed is a machine-native equivalent of a search engine: a global,
always-current, structured index of services that autonomous agents can query
by capability, trust level, liveness, and other machine-relevant criteria.</t>
        </section>
        <section anchor="infrastructure-efficiency-and-the-overhead-of-human-facing-responses">
          <name>Infrastructure Efficiency and the Overhead of Human-Facing Responses</name>
          <t>When an autonomous agent retrieves data from a web service today, it typically
receives a response designed for a human browser: HTML markup, CSS stylesheets,
JavaScript bundles, embedded fonts, advertising payloads, and analytics tracking
instrumentation. The actual information content — an endpoint URL, a price, an
availability flag — may occupy two kilobytes. The page weight delivering that
content is routinely one to three megabytes.</t>
          <t>This is a 500- to 1500-fold payload multiplier that carries no value for a
machine consumer. It consumes bandwidth at the client, compute at the server,
transit capacity on the network, and — at the scale of the growing autonomous
agent population — represents a measurable and unnecessary energy expenditure.</t>
          <t>Machine-native APIs eliminate this overhead entirely. A structured JSON response
delivers exactly the information the agent requested and nothing else. The IETF
Datatracker provides a concrete illustration: the human-facing document page for
an Internet-Draft loads several hundred kilobytes of rendered HTML and supporting
assets; the equivalent information retrieved via the Datatracker REST API returns
in under one kilobyte of JSON. The data is identical. The difference is entirely
overhead serving a human rendering pipeline that a machine does not have.</t>
          <t>APIX addresses both the discovery gap and this efficiency gap together. By
providing infrastructure that indexes machine-native service endpoints, APIX
encourages Service Owners to expose structured, agent-consumable APIs alongside
or in place of human-facing interfaces. The aggregate effect, as autonomous agent
workloads scale, is a reduction in the payload overhead carried by bot traffic
across the internet as a whole. This is an explicit co-mission of APIX:
machine-native infrastructure is not only more functional for agents — it is more
efficient for the internet, and helps reduce humanity's environmental footprint
as much as possible.</t>
        </section>
        <section anchor="lessons-from-prior-art">
          <name>Lessons from Prior Art</name>
          <t>The APIX is not the first attempt at a global service registry. Prior efforts
must be understood explicitly so that their failure modes are not repeated.</t>
          <t><strong>UDDI (Universal Description, Discovery and Integration)</strong>
UDDI was a SOAP-era standard for a global service registry with the same
conceptual goal as APIX, published as an OASIS Committee Draft in October
2004. It failed for three reasons: (1) extreme complexity of the XML-based
data model; (2) no automatic verification — all data was self-asserted with
no crawling or validation; (3) no adoption incentive — there was no
commercial model to sustain registration or discovery. APIX addresses all
three directly: a simple JSON manifest, automated spider verification, and
a commercial tier model.</t>
          <t><strong>robots.txt (Robots Exclusion Protocol)</strong>
Machine-readable, but concerned with exclusion — telling crawlers what not
to access — not with discovery of capabilities. Per-domain only. Not a
registry.</t>
          <t><strong>MCP (Model Context Protocol)</strong>
Defines tool and capability descriptions for LLM-based agents. Excellent
for consumption once a server URL is known. Does not address the discovery
problem: there is no index of MCP servers. APIX is complementary to MCP —
it can index MCP servers as one supported spec type.</t>
          <t><strong>Well-Known URIs (RFC 8615)</strong>
Per-domain machine-readable metadata at <tt>/.well-known/</tt>. Useful for
per-service metadata but requires the consumer to already know the domain.
No cross-service search or global index.</t>
          <t><strong>DNS</strong>
DNS resolves names to addresses but carries no capability semantics. It is
an architectural analogy for APIX's federation model, not a comparable system.</t>
        </section>
        <section anchor="related-ietf-and-w3c-work">
          <name>Related IETF and W3C Work</name>
          <t>As of April 2026, the number of Internet-Drafts working in adjacent areas
of agent/bot infrastructure has grown significantly. None addresses the same
problem as APIX. This section documents each and states the relationship
explicitly.</t>
          <t><strong>draft-pioli-agent-discovery (ARDP)</strong>
Proposes a federated agent registration and discovery protocol. Deliberately
decentralised — no global registry mandate, no central query URL. Relationship
to APIX: complementary. ARDP addresses agent-to-agent capability advertisement
within a federation. APIX addresses global, cross-organisation service
discovery from a neutral central index. ARDP's JWS-based signing of
registration payloads provides cryptographic non-repudiation of the manifest
content — a property APIX currently achieves through layered governance
verification (DNS ownership proof at O-1, Spider crawl, KYC pipeline). APM
manifest-level signing is a candidate extension for a future APIX revision,
and ARDP's signing model is the reference design for that work.</t>
          <t><strong>draft-narajala-courtney-ansv2 (ANS v2)</strong>
Anchors autonomous agent identities to DNS domain names with Registration
Authority verification. Focused on agent identity and trust anchoring, not
service capability discovery. ANS v2 builds on a peer-reviewed predecessor
published at IEEE ICAIC 2026, simplifying the name format to three components
(ans://v{version}.{agentHost}), introducing a dual-certificate model, and
replacing conceptual registry integrity with a cryptographic Transparency Log.
ANS v2 explicitly identifies the limitation of DNS-SD (<xref target="RFC6763"/>): DNS-SD
adds service discovery but cannot tell a client whether the agent at an
address is the one it claims to be. ANS v2 fills that identity gap.
Relationship to APIX: complementary. DNS-SD locates a service; ANS v2
verifies the identity of the agent at that address; APIX provides capability
search and multi-dimensional trust metadata across organisations. ANS v2
could serve as the identity layer for service operators registered in APIX.</t>
          <t><strong>draft-vandemeent-ains-discovery (AINS)</strong>
Agent discovery via signed, append-only replication logs. No central
authority. No commercial sustainability model. Relationship to APIX:
different philosophy. AINS prioritises decentralisation and cryptographic
verifiability. APIX prioritises a single authoritative global index with
a governed trust model.</t>
          <t>AINS defines a multi-channel verification model in which each verified
channel produces an independent evidence object. The principle is sound:
independent signals from multiple channels produce stronger identity
assurance than any single channel alone. AINS names DNS, HTTPS, and email
as verification channels — all of which are compatible with APIX's own
trust evidence model (DNS TXT record at O-1, HTTPS-reachable manifest
verified by the APIX Spider). AINS additionally names source code
repositories (e.g., GitHub) as a verification channel. APIX does not
adopt repository access as an evidence channel. For open-source projects
and developer platforms this channel is accessible and useful; however,
the majority of enterprise API services — financial institutions,
healthcare providers, manufacturers, and proprietary IoT backends —
maintain private repositories as protected intellectual property, often
under regulatory or contractual obligations that prohibit external access.
APIX's governance-based evidence channels (DNS, legal entity registration,
commercial contract, third-party audit) apply universally regardless of
whether a registrant's codebase is open-source or proprietary, and this
universality is a deliberate scope decision.</t>
          <t><strong>draft-aiendpoint-ai-discovery (AI Discovery Endpoint)</strong>
Defines <tt>/.well-known/ai</tt> as a per-host machine-readable capability document.
Per-domain only; not a global index. Relationship to APIX: directly
complementary. The APIX Spider SHOULD read <tt>/.well-known/ai</tt> when present
on a registered service's domain as an additional source of capability
metadata.</t>
          <t>This draft defines a flat category taxonomy for service classification:
"productivity", "ecommerce", "finance", "news", "weather", "maps",
"search", "data", "communication", "calendar", "storage", "media",
"health", "education", "travel", "food", "government", "developer".
The convergence with APIX's capability taxonomy is notable: <tt>search</tt>,
<tt>communication</tt>, <tt>storage</tt>, and <tt>media</tt> appear in both; <tt>ecommerce</tt> and
<tt>finance</tt> correspond directly to APIX's <tt>commerce</tt> and <tt>data.financial</tt>
terms. The two taxonomies differ in architecture — AI Discovery Endpoint
uses flat single-word labels optimised for human-readable classification;
APIX uses hierarchical dot-separated terms (<tt>commerce.marketplace</tt>,
<tt>data.financial</tt>) optimised for machine-queryable precision — but the
independent convergence on the same fundamental service categories
validates both approaches. Categories present in AI Discovery Endpoint
but not yet in APIX's v1.0 starter set (<tt>health</tt>, <tt>education</tt>,
<tt>government</tt>, <tt>travel</tt>, <tt>food</tt>, <tt>news</tt>, <tt>weather</tt>, <tt>maps</tt>, <tt>developer</tt>)
are candidates for future additions through the governing body's capability taxonomy
governance process (<xref target="APIX-SERVICES"/>).</t>
          <t><strong>draft-batum-aidre (AIDRE)</strong>
Defines <tt>/.well-known/ai-discovery</tt> as a per-origin discovery document.
Decentralised by design. Relationship to APIX: complementary. APIX provides
the global aggregation and trust verification layer that per-origin endpoints
cannot provide alone.</t>
          <t><strong>draft-cui-ai-agent-discovery-invocation</strong>
Specifies a metadata format for agent capabilities and a registry-based
discovery mechanism. Explicitly permits multiple coexisting registries; no
global authority defined.</t>
          <t>This draft introduces a notable split between two metadata fields:
<tt>capabilities</tt> (high-level descriptors of what the service does, e.g.,
<tt>["translation", "summarization"]</tt>) and <tt>tags</tt> (broader, orthogonal
properties such as domain, language support, or deployment model, e.g.,
<tt>["nlp", "chinese", "transformer_model", "cloud"]</tt>). The split recognises
that some service properties are functional capabilities while others are
orthogonal classifiers that do not fit a strict capability hierarchy.</t>
          <t>APIX takes a different approach. The hierarchical dot-separated capability
taxonomy (<tt>nlp.translation</tt>, <tt>commerce.marketplace</tt>) encodes both the
category and the specific capability in a single governed term, enabling
prefix-based machine queries (<tt>nlp.*</tt>) and registry-controlled vocabulary.
Orthogonal dimensions that draft-cui expresses as free-form tags are
handled in APIX through dedicated typed fields: <tt>language</tt> (BCP 47,
<xref target="RFC5646"/>) covers language support; deployment model is not yet represented
and is noted as a potential future gap. The APIX design trades the
flexibility of a free-form tag bag for machine-queryability and governance
— a tag field without a registry becomes a folksonomy that degrades search
precision at scale.</t>
          <t>This draft also identifies pricing information as a legitimate service
metadata concern — noting that if a service charges per use, agents need
this information at discovery time. The draft does not standardise a
pricing schema ("not standardized here but can be included as needed").
APIX adopts this observation and formalises it: the <tt>pricing</tt> field in
the APM schema (<xref target="APIX-SERVICES"/>) defines a governed <tt>model</tt> enum
(<tt>free</tt>, <tt>freemium</tt>, <tt>paid</tt>, <tt>enterprise</tt>, <tt>dynamic</tt>) and a
<tt>pricing_endpoint</tt> for real-time load-based price queries. The index
stores only the declared <tt>model</tt> and the endpoint reference; consuming
agents are responsible for querying the <tt>pricing_endpoint</tt> directly to
obtain and evaluate the current price before invocation.</t>
          <t>This draft also defines a Semantic Routing Platform (SRP): an optional
control-plane service that performs semantic matching, ranking, and
policy-based filtering of candidate agents before invocation, without
participating in task execution. The SRP pattern assumes a structured
candidate pool as its input. APIX is the natural data source for that
pool: an SRP would query APIX with structured filters to retrieve a
trusted, governed candidate set, then apply semantic ranking over that
set before presenting the shortlist to the invoking agent. The two
layers are complementary — APIX provides structured discovery and trust
metadata; the SRP provides semantic selection above that foundation.</t>
          <t>Relationship to APIX: partially overlapping problem space. The capability/tag
split, the pricing observation, and the SRP pattern are all concrete design
contributions; APIX's governed taxonomy, typed fields, and formalised pricing
schema address the same concerns through a more structured mechanism, and the
SRP architecture positions APIX as the structured input layer to semantic
selection rather than as a competitor to it.</t>
          <t><strong>draft-am-layered-ai-discovery-architecture</strong>
Proposes a conceptual two-layer architecture separating a Discovery
Transport Layer (DTL) from the metadata format carried over it. The DTL
is explicitly abstract: the draft names HTTP, pub/sub, multicast, and
MoQ as candidate substrates without specifying any of them normatively.
No wire format, no concrete protocol mechanisms, and no IANA actions are
defined.</t>
          <t>APIX resolves the transport question concretely and normatively: HTTPS
with TLS (<xref target="RFC8446"/>), JSON (<xref target="RFC8259"/>), and HATEOAS navigation over
a single stable entry point. This is a deliberate design position in
favour of implementability over substrate generality. Adding a DTL
abstraction layer atop APIX's concrete HTTP interface would introduce
indirection without communicative or interoperability benefit — the
transport is already specified, and no agent implementation benefits
from treating it as one option among many.</t>
          <t>Directly relevant to APIX is the draft's categorisation of discoverable
object types (agents, models, data resources, robots), which recognises
that different object categories require different metadata profiles.
This independently converges on the same architectural reasoning behind
APIX's decision to separate the Services Profile (<xref target="APIX-SERVICES"/>)
from the IoT Device Profile (<xref target="APIX-IOT"/>) rather than collapsing all
service types into a single flat schema.</t>
          <t>Relationship to APIX: categorisation framing is consistent with the
APIX profile split; the abstract DTL layer is not adopted.</t>
          <t><strong>draft-hood-agtp-discovery (AGTP ANS)</strong>
Defines an Agent Name Service (ANS) — a governed registry that resolves
capability queries into ranked lists of Agent Manifest Documents for
authenticated agents. ANS servers act as Scope-Enforcement Points,
applying trust score thresholds, trust tier requirements, and governance
zone constraints to each query. Cross-organisational discovery is
supported through peer ANS server federation (Section 5 of the draft).
The ANS is built as a layer on top of the AGTP transport protocol
(draft-hood-independent-agtp-02), which is treated as a pre-existing
substrate; the ANS defines a DISCOVER method as an AGTP Tier 1
operation.</t>
          <t>Relationship to APIX: overlapping problem space, different architectural
model. Both address cross-organisational service discovery with trust
metadata. AGTP ANS uses a federated model of peer ANS servers with
governance zone enforcement and mandatory agent authentication
(<tt>discovery:query</tt> authority-scope required). APIX uses a single
authoritative global index with a governed supply-side trust model and
open read access for consuming agents. The federated governance zone
model and the single-index governance model represent a genuine
architectural trade-off: federation distributes authority and avoids a
single point of control; a single index provides a globally consistent
view with a single contractual counterparty for service owners.</t>
          <t><strong>draft-mozley-aidiscovery (AI Agent Discovery Problem Statement)</strong>
Argues for a distributed, organisation-centric discovery model in which
each organisation independently publishes agent capabilities at a
well-known entry point. The draft explicitly opposes centralised
registries on two grounds: single points of failure limiting resilience,
and the competitive harm risk — stated directly as: "An adversarial
centralized directory is also able to stifle competitor advertisement
capabilities." The scope is cross-organisational; the draft addresses
public, multi-domain agent discovery, not only local or intra-organisation
scenarios.</t>
          <t>Relationship to APIX: this draft articulates the strongest
counter-position to APIX's architecture, and the adversarial directory
argument deserves a direct response. APIX addresses it structurally:
the neutrality requirements (Section 4.2), the prohibition on ranking
preferences and preferential treatment, the independent governance of
the standard from the commercial operation, and the mandatory open bulk
data download are specifically designed to make the adversarial scenario
impossible by construction. A directory operated under these constraints
cannot stifle competitor advertisement because it cannot discriminate
between registrants at the same commercial tier.</t>
          <t>The distributed model's remaining gap, which APIX addresses, is the
zero-prior-knowledge case: an agent that has no prior relationship with
any service provider needs a single starting point from which to
discover unknown third parties. An organisation-centric model requires
the discovering agent to already know which organisations to query —
which presupposes the discovery problem is already solved.</t>
          <t><strong>draft-mozleywilliams-dnsop-dnsaid (DNS for AI Discovery)</strong>
Proposes DNS-AID: using SVCB records to publish agent service endpoints.
Relationship to APIX: complementary at the infrastructure layer. The
distinction across the three systems is precise: DNS-AID tells a client
where to connect; ANS v2 (<xref target="I-D.narajala-courtney-ansv2"/>) tells it whether
to trust the agent at that address; APIX tells it what to connect to and why
— capability search, multi-dimensional trust metadata, and liveness
verification across the global service landscape.</t>
          <t><strong>draft-meunier-webbotauth-registry (webbotauth)</strong>
Defines a JSON-based "Signature Agent Card" format for bot authentication.
Focused on bot identity — how a bot proves who it is to a service. Related
to the active webbotauth IETF Working Group. Relationship to APIX: orthogonal
but complementary. webbotauth addresses bot consumer identity; APIX addresses
service provider discovery.</t>
          <t><strong>I-D.ietf-scitt-architecture (SCITT)</strong>
Defines an append-only transparency service for supply chain integrity,
transparency, and trust. An IETF WG specification
(<xref target="I-D.ietf-scitt-architecture"/>). SCITT provides a
tamper-evident, auditable ledger model where statements about artefacts are
registered and independently verifiable. Relationship to APIX: architectural
reference. APIX's audit trail for organisation trust level progressions, LER
submissions (<xref target="APIX-IOT"/>), and sanctions screening events follows the same
append-only, non-repudiable model that SCITT formalises. ANS v2
(<xref target="I-D.narajala-courtney-ansv2"/>) bases its Transparency Log on SCITT. A
future revision of APIX MAY adopt SCITT-compliant transparency log semantics
for its governance audit trail.</t>
          <t><strong>Google Cloud Fraud Defense</strong>
A commercial trust platform for the agentic web announced at Google Cloud
Next '26 (April 2026), positioned as the next evolution of reCAPTCHA. Fraud
Defense explicitly integrates with the webbotauth IETF Working Group and
SPIFFE for agent and workload identity classification. Relationship to APIX:
complementary at adjacent layers. Fraud Defense operates at the consumption
layer — it verifies and classifies agent traffic arriving at a service
endpoint. APIX operates at the discovery layer — it provides the service
index, trust metadata, and capability taxonomy that agents use to locate
services before interacting with them. The two systems are not competitive;
a Fraud Defense policy engine can consume APIX trust signals (O-level,
S-level) as inputs to its risk scoring.</t>
          <t><strong>SPIFFE (Secure Production Identity Framework For Everyone)</strong>
A CNCF open standard for workload identity attestation. Provides
cryptographically verifiable identities (SVIDs) to software workloads in
dynamic infrastructure. Referenced as an integration target by Google Cloud
Fraud Defense alongside webbotauth. Relationship to APIX: complementary at
the identity layer. SPIFFE addresses machine/workload identity; APIX
addresses service and device discovery with human-governed trust levels. A
SPIFFE SVID could serve as a technical credential for an agent whose
operator is registered in APIX at O-2 or above.</t>
          <t><strong>W3C AI Agent Protocol Community Group</strong>
Proposed May 2025, targeting agent interoperability protocols. Pre-specification
as of this writing. Relationship to APIX: APIX will monitor this group's
outputs and align the APM capability taxonomy with any vocabulary standardised
by the W3C CG where applicable.</t>
          <t><strong>Positioning</strong>
The agent/bot infrastructure space has grown rapidly in early 2026, with
over a dozen active Internet-Drafts addressing adjacent problems. The
dominant architectural tendency across these drafts is decentralised and
federated. APIX takes a deliberate counter-position for a specific use case:
global, cross-organisation, zero-prior-relationship service discovery. This
use case cannot be solved by decentralised architectures alone, because
decentralisation requires that the discovering agent already knows where to
look. APIX provides the answer to "where to look" — a single stable entry
point, commercially operated by a neutral foundation, with verified trust
metadata and structured capability search. As of April 2026, real-world
commercial platforms are integrating with the webbotauth Working Group
standards, confirming that the agent identity and discovery infrastructure
space has moved from specification-only to active deployment. APIX is
designed to compose with, not replace, the adjacent standards in this
ecosystem: each draft goes deep in its own sub-problem, and APIX is
stronger for depending on that depth rather than duplicating it.</t>
        </section>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>
        <t>All API responses MUST be encoded as UTF-8 as mandated by <xref target="RFC8259"/>
Section 8.1. All string fields in APM documents and Index API responses
MUST contain valid UTF-8. HTTP status codes used throughout this
specification are defined in <xref target="RFC9110"/>.</t>
        <t><strong>Agent</strong>
An autonomous software program that executes complex, goal-directed
tasks by consuming external services, without per-action human
instruction. Agents may use LLM-backed or programmatic orchestration
logic. The primary consumer class targeted by the APIX Index API.</t>
        <t><strong>Bot</strong>
An autonomous software program that executes deterministic, rule-based
internet tasks: web crawling, API polling, automated messaging, without
per-action human instruction. Behavior is scripted rather than
goal-directed. The APIX Spider is itself a bot.</t>
        <t><strong>Connected Device</strong>
A physical or embedded hardware unit with network connectivity that
exposes services or sensor data via the APIX Presence Protocol.
Registered as a Device Class and tracked as a Device Instance as
defined in <xref target="APIX-IOT"/>. Distinct from Agent and Bot in that the
principal is hardware, not software.</t>
        <t><strong>Service</strong>
A machine-consumable API or connected device class offered by an organisation,
registered in the APIX, and described by an APIX Manifest. The term covers
both web API services (<xref target="APIX-SERVICES"/>) and IoT device services (<xref target="APIX-IOT"/>).</t>
        <t><strong>Service Owner</strong>
The organisation responsible for registering, maintaining, and operating a
Service in the APIX.</t>
        <t><strong>APIX Manifest (APM)</strong>
The structured metadata document that describes a Service to the APIX,
including its technical specification reference, capability taxonomy,
trust metadata, and commercial terms. Profile documents define the
additional fields applicable to each service type.</t>
        <t><strong>Governing Body</strong>
The neutral, non-profit entity that operates the APIX, maintains its
registries, accredits Regional Representatives and Verifiers, and ensures
the governance and operational requirements defined in this specification
are met. Any entity that satisfies those requirements MAY fulfil this role.</t>
        <t><strong>API Index (APIX)</strong>
The global, centralised index of registered Services, operated by the
governing body and queryable by autonomous agents via the Index API.</t>
        <t><strong>Index API</strong>
The HATEOAS-compliant HTTP API exposed by the APIX for agent discovery and
navigation.</t>
        <t><strong>Accredited Verifier</strong>
A trusted third-party organisation, accredited by the governing body,
that performs human-intensive trust verification at Organisation levels O-4
and O-5.</t>
        <t><strong>Accredited Regional Representative</strong>
An organisation accredited by the governing body to operate
commercial onboarding, contracting, and customer relationships within a
defined geographic jurisdiction, under the governing body's
standard and governance.</t>
        <t><strong>Trust Policy</strong>
A set of minimum trust requirements expressed by a consuming agent that a
Service must satisfy before the agent will use it.</t>
        <t><strong>Liveness</strong>
The confirmed operational status and response availability of a Service,
as measured by automated means at a frequency determined by the Service's
commercial tier. The specific liveness mechanism differs by service type:
Spider health checks for web API services; presence signals for IoT device
services.</t>
        <t><strong>Tier</strong>
A commercial subscription level that determines a Service's visibility in
the APIX, liveness check frequency, and API query rate allocation.</t>
      </section>
      <section anchor="design-goals">
        <name>Design Goals</name>
        <section anchor="requirements-must">
          <name>Requirements (MUST)</name>
          <ul spacing="normal">
            <li>
              <t>The APIX MUST be queryable by autonomous agents via a stable, globally
accessible URL without prior knowledge of any specific service.</t>
            </li>
            <li>
              <t>The Index API MUST follow HATEOAS principles: agents MUST be able to
navigate the full index starting from a single entry-point URL.</t>
            </li>
            <li>
              <t>Every Service record MUST expose machine-readable trust metadata across
all three trust dimensions (Organisation, Service, Liveness).</t>
            </li>
            <li>
              <t>Service registration MUST be human-initiated. The registrant MUST agree to
the index operator's Terms of Service before any service record is activated.
For O-0 and O-1, self-service portal registration with accepted Terms of
Service satisfies this requirement. For O-2 and above, registration MUST
additionally involve a formal B2B contractual relationship between the Service
Owner and the index operator or its Accredited Regional Representative.</t>
            </li>
            <li>
              <t>The APIX MUST expose trust metadata as verifiable facts, not as
recommendations. Trust decisions MUST remain with the consuming agent.</t>
            </li>
            <li>
              <t>The APIX Manifest (APM) MUST be format-agnostic: it MUST support
referencing multiple service types via an extensible type registry.</t>
            </li>
            <li>
              <t>The APIX MUST be operated as a neutral, non-profit infrastructure under
the governance of the governing body.</t>
            </li>
          </ul>
        </section>
        <section anchor="goals-should">
          <name>Goals (SHOULD)</name>
          <ul spacing="normal">
            <li>
              <t>The Index API SHOULD support full-text and structured search by capability,
category, organisation trust level, service verification level, liveness
freshness, and protocol type.</t>
            </li>
            <li>
              <t>The APIX SHOULD provide SDKs in common agent development languages to
lower the integration barrier for consuming agents.</t>
            </li>
            <li>
              <t>The APIX SHOULD support a federated accredited verifier model so that
Organisation trust levels O-4 and O-5 can be verified at scale without
centralising all human review in the governing body.</t>
            </li>
            <li>
              <t>Accredited Regional Representatives SHOULD be established in major
jurisdictions to allow Service Owners to contract in their local language
and legal framework.</t>
            </li>
            <li>
              <t>The APIX SHOULD publish a public transparency report at least annually,
disclosing the number of registered services by tier and trust level,
coverage statistics, and verifier accreditation status.</t>
            </li>
            <li>
              <t>The APIX SHOULD, through its verification model and tier structure,
incentivise Service Owners to expose structured, machine-consumable API
endpoints rather than requiring agents to adapt to human-facing HTML
interfaces. Eliminating rendering, styling, and advertising overhead from
machine-to-machine communication is an explicit efficiency objective of
this infrastructure.</t>
            </li>
          </ul>
        </section>
        <section anchor="out-of-scope">
          <name>Out of Scope</name>
          <t>The following are explicitly not addressed by this document.
Items marked MUST NOT are normative constraints on conforming
implementations; remaining items are editorial scope boundaries.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Bot identity and authentication</strong>: how a bot proves its own identity to
a service it consumes. This is addressed by complementary work such as
draft-meunier-webbotauth-registry. This document takes no position on
bot identity mechanisms.</t>
            </li>
            <li>
              <t><strong>Bot rights and legal personhood</strong>: outside the scope of a technical
infrastructure standard.</t>
            </li>
            <li>
              <t><strong>Service execution</strong>: a conforming APIX implementation MUST NOT proxy,
mediate, or execute service calls on behalf of consuming agents. The APIX
is a discovery layer only; all service interactions occur directly between
the consuming agent and the Service Owner's infrastructure.</t>
            </li>
            <li>
              <t><strong>Content indexing</strong>: a conforming APIX implementation MUST NOT index
service response content. The APIX indexes service metadata — capability
declarations, trust levels, liveness signals — not the data that services
return when called.</t>
            </li>
            <li>
              <t><strong>Mandatory consumer registration</strong>: a conforming APIX implementation
MUST NOT require consuming agents to register or identify themselves as
a condition of performing discovery queries (see Section 9.2).</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="architecture-overview">
        <name>Architecture Overview</name>
        <section anchor="component-model">
          <name>Component Model</name>
          <artwork><![CDATA[
  +----------------------------------------------------------+
  |                   the governing body                     |
  |             (Swiss Stiftung -- neutral, non-profit)      |
  |  Owns: APIX standard, Index infrastructure, APM format   |
  |  Accredits: Regional Representatives, Verifiers          |
  +---------------------+------------------------------------+
                        |
        +---------------+-------------------+
        |               |                   |
  +-----+------+  +-----+--------+  +-------+---------+
  |   Index    |  | Verification |  |  Registration   |
  |   API      |  | Component    |  |    Portal       |
  | (HATEOAS)  |  |(type-specific|  |  (B2B / human)  |
  +-----+------+  +-----+--------+  +-------+---------+
        |               |                   |
        |         +-----+------+            |
        |         |  Service   |            |
        +-------->|  Record    |<-----------+
                  |  Store     |
                  +------------+
        ^                              ^
        |                              |
  +-----+------+              +--------+-----------+
  |  Consuming |              |   Service Owner    |
  |    Agent   |              |  (+ Accredited     |
  |    (Bot)   |              |  Regional Rep)     |
  +------------+              +--------------------+
]]></artwork>
          <t>This document uses the generic terms "governing body" and "index
operator" in all normative requirements. These terms are intentionally
role-based: any entity that satisfies the governance, neutrality, and
operational requirements defined in this specification MAY fulfil them.
The reference implementation of these roles is described in the
non-normative appendix "Reference Implementation" at the end of this
document.</t>
          <t><strong>Flow:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>A Service Owner (or their Accredited Regional Representative) creates
an Organisation Account in the APIX Registration Portal, providing
company details and agreeing to a commercial contract.</t>
            </li>
            <li>
              <t>The Registration Portal creates a draft Service Record and triggers
profile-appropriate verification (Spider crawl for web API services;
manufacturer provisioning for IoT device classes).</t>
            </li>
            <li>
              <t>The verification component updates the Service Record with verified
technical metadata.</t>
            </li>
            <li>
              <t>The Service Record becomes queryable via the Index API.</t>
            </li>
            <li>
              <t>A consuming agent queries the Index API from the single entry-point URL,
navigates by HATEOAS links, applies its Trust Policy, and selects
services that satisfy its requirements.</t>
            </li>
            <li>
              <t>Verification rechecks services on the schedule defined by each service's
liveness monitoring configuration.</t>
            </li>
          </ol>
        </section>
        <section anchor="governance-model">
          <name>Governance Model</name>
          <t>The APIX MUST be operated by a <strong>neutral governing body</strong> that satisfies the
following normative requirements. These requirements apply to any conforming
APIX implementation; the specific legal form of the governing body is an
implementation choice.</t>
          <t><strong>Neutrality requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST have no commercial interest in preferring any
registrant's services over another in index results or liveness scheduling.</t>
            </li>
            <li>
              <t>The governing body MUST NOT offer exclusive discovery advantages, ranking
preferences, or prioritised verification treatment to any registrant
regardless of commercial relationship.</t>
            </li>
            <li>
              <t>Governance of the APIX standard and APM specification MUST be separated
from operation of the commercial index. A single entity may not
simultaneously control standard evolution and derive commercial benefit
from preferential application of that standard.</t>
            </li>
          </ul>
          <t><strong>Operational requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST accredit Regional Representatives who may handle
service onboarding in specific jurisdictions. Regional Representatives
operate under licence from the governing body; the index itself remains
a single global store.</t>
            </li>
            <li>
              <t>The governing body MUST accredit Verifiers who perform Organisation trust
assessments at O-4 and O-5. Accredited Verifiers are structurally
analogous to Certificate Authorities in the TLS ecosystem.</t>
            </li>
            <li>
              <t>The governing body MUST maintain the capability taxonomy and publish all
versions of the APM specification and Index API specification as open
standards under a permissive licence.</t>
            </li>
            <li>
              <t>The governing body MUST perform sanctions screening on service registrants
(see Section 8).</t>
            </li>
          </ul>
          <t><strong>Openness requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The full index MUST be made available as a freely downloadable bulk dataset
on the first day of each calendar month, under the Open Database Licence
(ODbL) 1.0. No entity, including the governing body, may hold an exclusive
lock on the index data.</t>
            </li>
            <li>
              <t>Incremental diff files MUST be published daily, each covering all record
additions, updates, and deletions since the previous day's snapshot. A
downstream consumer MUST be able to reach current index state by applying
the monthly full snapshot and the sequence of daily diffs since that
snapshot, without downloading any additional full snapshots.</t>
            </li>
            <li>
              <t>Discovery queries to the Index API MUST be available without authentication
or payment (subject to rate limits; see Section 9.2).</t>
            </li>
          </ul>
          <section anchor="global-participation">
            <name>Global Participation</name>
            <t>A conforming APIX implementation SHOULD establish mechanisms to ensure
global representation in the capability taxonomy, including service categories
relevant to underrepresented regions. Where regional institutional partners
are willing to co-sponsor regional participation, the governing body SHOULD
establish formal co-sponsorship relationships and associated governance
representation for those regions.</t>
            <t>Regional verification nodes are RECOMMENDED in regions with significant
service registrant populations to eliminate intercontinental latency in
liveness verification.</t>
          </section>
        </section>
        <section anchor="standard-registries">
          <name>Standard Registries</name>
          <t>The APIX standard maintains normative registries of enumerated values.
Registries are authoritative lists of valid values for specific APM and
Index API fields. Using values not present in the relevant registry is
a protocol violation.</t>
          <t><strong>Registry location:</strong> Registries are published as live JSON endpoints at
<tt>apix.example.org/registry/</tt> and are updated independently of the RFC
revision cycle. The RFC defines the registry structure and lifecycle
rules; the live endpoints are the authoritative source of current values.</t>
          <dl>
            <dt><tt>protocols</tt></dt>
            <dd>
              <t>Protocol type registry.
Endpoint: <tt>apix.example.org/registry/protocols</tt>.
APM field: <tt>spec.type</tt>.</t>
            </dd>
            <dt><tt>capabilities</tt></dt>
            <dd>
              <t>Capability taxonomy registry.
Endpoint: <tt>apix.example.org/registry/capabilities</tt>.
APM field: <tt>capabilities[]</tt>.</t>
            </dd>
            <dt><tt>notification-channels</tt></dt>
            <dd>
              <t>Notification channel type registry.
Endpoint: <tt>apix.example.org/registry/notification-channels</tt>.
APM field: <tt>notifications.channels[].type</tt>.</t>
            </dd>
            <dt><tt>presence-modes</tt></dt>
            <dd>
              <t>Presence mode registry.
Endpoint: <tt>apix.example.org/registry/presence-modes</tt>.
APM field: <tt>spec.presence_mode</tt> (device classes).</t>
            </dd>
            <dt><tt>delegation-scopes</tt></dt>
            <dd>
              <t>Device delegation scope registry.
Endpoint: <tt>apix.example.org/registry/delegation-scopes</tt>.
APM field: <tt>scopes[]</tt> in delegation grant requests (device classes).</t>
            </dd>
          </dl>
          <t>Initial values for each registry are defined in the applicable profile
document: <xref target="APIX-SERVICES"/> for protocol types and capability taxonomy;
<xref target="APIX-IOT"/> for presence modes, delegation scopes, and IoT capability
terms.</t>
          <t><strong>Registry entry lifecycle:</strong></t>
          <t>Each registry entry transitions through three phases. The <tt>standard_warnings</tt>
flag in a Service Record does not appear until the grace period has elapsed —
service operators have a silent window to update their APM before any public
signal is issued.</t>
          <artwork><![CDATA[
active  ->  deprecated (announced)
              |
              +-- [grace period: 90 days min]
              |     silent: operator notified, no public flag
              |
              +-- [warning period: remainder of deprecation window]
              |     standard_warnings visible in Service Record
              |
              +-- sunset
                    new registrations rejected; flagged non-compliant
]]></artwork>
          <table>
            <thead>
              <tr>
                <th align="left">Phase</th>
                <th align="left">Status</th>
                <th align="left">standard_warnings</th>
                <th align="left">New regs.</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Normal use</td>
                <td align="left">
                  <tt>active</tt></td>
                <td align="left">No</td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Grace period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>No</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Warning period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>Yes</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Sunset</td>
                <td align="left">
                  <tt>sunset</tt></td>
                <td align="left">Yes (non-compliant)</td>
                <td align="left">
                  <strong>Rejected</strong></td>
              </tr>
            </tbody>
          </table>
          <t><strong>Deprecation rules:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST publish a <tt>deprecated_in_version</tt>, <tt>sunset_date</tt>,
<tt>grace_period_ends</tt>, and <tt>replacement</tt> value when deprecating any registry
entry.</t>
            </li>
            <li>
              <t>The minimum total deprecation window (announcement to sunset) is
<strong>12 months</strong>. The governing body MAY extend this window but MUST NOT
shorten it.</t>
            </li>
            <li>
              <t>The minimum grace period is <strong>90 days</strong> from the deprecation announcement.
During the grace period, <tt>standard_warnings</tt> MUST NOT be set on any Service
Record, regardless of whether the service uses the deprecated value.</t>
            </li>
            <li>
              <t>The governing body MUST notify all registered Service Owners whose services
use the deprecated value before the grace period begins. Notification MUST
include the <tt>grace_period_ends</tt> date, the <tt>sunset_date</tt>, and the
<tt>replacement</tt> value.</t>
            </li>
            <li>
              <t>After the grace period, the index operator MUST set <tt>standard_warnings</tt> on
Service Records that still use the deprecated value.</t>
            </li>
            <li>
              <t>At <tt>sunset</tt>, the index operator MUST reject new APM submissions using the
sunsetted value and MUST escalate existing Service Records from
<tt>standard_warnings</tt> to a <tt>non_compliant</tt> status flag.</t>
            </li>
          </ul>
          <t><strong>Registry versioning:</strong> each registry is independently versioned. The Index
root resource (Section 10.2) exposes the current version of each registry so
consuming agents may detect changes.</t>
        </section>
      </section>
      <section anchor="lawful-cooperation-and-non-surveillance-commitment">
        <name>Lawful Cooperation and Non-Surveillance Commitment</name>
        <section anchor="purpose-of-the-service">
          <name>Purpose of the Service</name>
          <t>APIX is infrastructure designed for one purpose: enabling autonomous agents
and the organisations that deploy them to discover legitimate services and
operate productively in the commercial internet. Registration in the APIX
is a declaration that a service or device class is offered in good faith for
legitimate use. The APIX is not a neutral medium indifferent to the purposes
for which it is used. It is infrastructure built for legitimate use, and
it is by design closed to actors who are refused or removed under the
compliance mechanisms defined in this specification — sanctions screening,
KYC verification, and judicial enforcement through the LER process.</t>
          <t>This is not a policy statement. It is the foundational design constraint
from which the cooperation mechanisms in this document and in <xref target="APIX-IOT"/>
derive their legitimacy.</t>
        </section>
        <section anchor="cooperation-duty">
          <name>Cooperation Duty</name>
          <t>Because APIX provides infrastructure for legitimate use, it has a duty to
cooperate with properly authorised law enforcement when that infrastructure
is misused. This duty is not conditional on commercial convenience or
reputational risk. When a registrant or device fleet is confirmed to be
operating criminally, APIX MUST act — through the mechanisms defined in
this document and in <xref target="APIX-IOT"/> — to limit the harm that flows from that
misuse.</t>
          <t>APIX MUST cooperate with authorised law enforcement requests that satisfy
the jurisdictional and judicial requirements defined in <xref target="APIX-IOT"/>
Section 5.8. Refusal to cooperate with a validly authorised request is not
permitted. Delay beyond the processing time commitments defined in that
section requires documented justification and MUST be reported in the
governing body's annual transparency report.</t>
        </section>
        <section anchor="non-surveillance-commitment">
          <name>Non-Surveillance Commitment</name>
          <t>APIX is not a surveillance instrument. The cooperation mechanisms in this
specification are reactive and bounded. The following prohibitions are
normative and apply to all conforming implementations:</t>
          <ul spacing="normal">
            <li>
              <t>APIX MUST NOT proactively monitor, profile, or analyse the behaviour of
registered services, device fleets, or consuming agents beyond what is
technically necessary to deliver liveness verification and abuse detection
as defined in this specification.</t>
            </li>
            <li>
              <t>APIX MUST NOT share index data, presence signal logs, device instance
records, or consuming agent query patterns with any law enforcement or
government authority except through the Law Enforcement Request process
defined in <xref target="APIX-IOT"/> Section 9.8, with its associated judicial
authorisation requirements and jurisdictional constraints.</t>
            </li>
            <li>
              <t>Bulk data requests — requests that are not targeted at identified specific
devices, instances, or registrants but instead seek aggregate ecosystem
intelligence — MUST be refused regardless of the requesting authority's
jurisdiction or claimed legal basis. A valid LER MUST identify specific
device IP addresses or registrant identifiers. A request for "all devices
in region X" or "all services in category Y" is not a valid LER.</t>
            </li>
            <li>
              <t>APIX MUST NOT establish any data-sharing arrangement, standing access
grant, or automated feed to any law enforcement or intelligence agency.
Every cooperation action is event-triggered, scoped to a specific
identified case, and subject to the judicial authorisation requirement.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-trigger-requirement">
          <name>The Trigger Requirement</name>
          <t>Enhanced monitoring, graduated response actions, and LER processing are
ALWAYS triggered by one of two conditions:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>External identification</strong>: a legitimate authority in an accepted
jurisdiction has submitted an LER with valid judicial authorisation
identifying specific devices or registrants as confirmed participants
in criminal activity. Suspicion alone is not sufficient. The judicial
authorisation requirement is the gatekeeping mechanism.</t>
            </li>
            <li>
              <t><strong>Technical anomaly detection</strong>: APIX's own infrastructure detects
signal patterns technically inconsistent with legitimate device operation
— such as rapid mass re-registration from a single IP address, heartbeat
flooding at rates outside any plausible device density, or token reuse
patterns that cannot arise from legitimate manufacture and provisioning.
Such detections result in classification at the <tt>observe</tt> tier of the
Bad-Bot Graduated Response (<xref target="APIX-IOT"/> Section 9.9), not in immediate
blocking. They are recorded, monitored, and shared with authorised law
enforcement on request through the LER process. They do not trigger
autonomous enforcement action by APIX.</t>
            </li>
          </ol>
          <t>Speculative profiling — building behavioural models of registered services
or device fleets in the absence of a trigger — is prohibited under the
Non-Surveillance Commitment above.</t>
        </section>
        <section anchor="jurisdictional-guardrails">
          <name>Jurisdictional Guardrails</name>
          <t>All cooperation is bounded by the accepted jurisdictions framework defined
in <xref target="APIX-IOT"/> Section 9.8. This boundary is not negotiable on a
case-by-case basis. APIX MUST NOT cooperate with a law enforcement request
from a jurisdiction not on the Accepted Jurisdiction Whitelist, even when:</t>
          <ul spacing="normal">
            <li>
              <t>The requesting authority presents a compelling case.</t>
            </li>
            <li>
              <t>The alleged criminal activity is severe.</t>
            </li>
            <li>
              <t>Political, commercial, or reputational pressure is applied.</t>
            </li>
            <li>
              <t>Another accepted-jurisdiction authority vouches for the request.</t>
            </li>
          </ul>
          <t>The Accepted Jurisdiction Whitelist exists precisely to make this boundary
resist pressure. The governing body MAY add jurisdictions to the whitelist
through its defined board decision process; it MUST NOT bypass the whitelist
for individual cases. Any governing body action that grants cooperation
outside the whitelist is a specification violation and MUST be reported in
the transparency report.</t>
        </section>
        <section anchor="transparency-as-enforcement">
          <name>Transparency as Enforcement</name>
          <t>The annual transparency report required by Section 4.2 is not merely
informational. It is the mechanism by which the non-surveillance commitment
and the jurisdictional guardrails are held accountable. The governing body
MUST disclose in that report:</t>
          <ul spacing="normal">
            <li>
              <t>The number of LER requests received, accepted, and refused, by requesting
jurisdiction tier.</t>
            </li>
            <li>
              <t>The number of bulk data requests received and refused.</t>
            </li>
            <li>
              <t>Any case in which cooperation outside the accepted jurisdictions framework
was requested, with the governing body's response.</t>
            </li>
            <li>
              <t>Any case in which APIX's own technical anomaly detection was used as the
basis for a law enforcement referral.</t>
            </li>
            <li>
              <t>The total number of device instances, services, and organisations subject
to active suppression, suspension, or graduated response measures at the
reporting date.</t>
            </li>
          </ul>
          <t>If a governing body fails to publish this report within 90 days of the
close of a calendar year, any member of the governing body board MUST be
empowered to publish it unilaterally. The right to publish the transparency
report MUST NOT be waivable by board resolution.</t>
        </section>
      </section>
      <section anchor="the-apix-manifest-apm">
        <name>The APIX Manifest (APM)</name>
        <section anchor="purpose">
          <name>Purpose</name>
          <t>The APIX Manifest is the structured document that a Service Owner provides
at registration. It is the index-facing contract for a Service:
format-agnostic, extensible, and designed for machine consumption.</t>
          <t>The APM has two layers:</t>
          <t><strong>Base fields</strong> — defined in this document and required for all service types:
<tt>apm_version</tt>, <tt>service_id</tt>, <tt>name</tt>, <tt>description</tt>, <tt>owner</tt> (with
<tt>organisation_name</tt>, <tt>jurisdiction</tt>, <tt>registration_number</tt>, <tt>contacts</tt>),
<tt>capabilities</tt>, <tt>trust</tt> (organisation and service level assignments), and
<tt>legal</tt>. These fields are common to all profiles.</t>
          <t><tt>lifecycle_stage</tt> is required for all service types but its valid values
and transition rules are profile-defined. Each profile owns its own
lifecycle model; the field is not a shared enum. See <xref target="APIX-SERVICES"/> and
<xref target="APIX-IOT"/> for the lifecycle models applicable to each service type.</t>
          <t><strong>Profile fields</strong> — defined in profile documents and required only for the
applicable service type. <xref target="APIX-SERVICES"/> defines the full APM schema for
web API services. <xref target="APIX-IOT"/> defines the full APM schema for device class
registrations. An APM submission MUST conform to the profile schema
corresponding to its <tt>spec.type</tt> value.</t>
          <t><strong>Extension fields</strong> — the <tt>custom</tt> array is a governed extension mechanism
for declaring properties not yet covered by the base or profile schemas. The
<tt>custom</tt> field is OPTIONAL in all profiles. It is a flat list of reverse-domain
key name strings; no values are stored in the index. The APIX indexes only the
declared key names, enabling discovery via the <tt>custom_key</tt> search parameter.
This design provides a clean promotion path: when a custom key accumulates
sufficient independent adoption across organisations, the Bot Standards
Foundation MAY initiate a governance track to promote the pattern to a standard
named field in a future APM version. Full normative rules — including key naming
conventions, list size limits, and Spider behaviour — are defined in the
applicable profile document (<xref target="APIX-SERVICES"/>, <xref target="APIX-IOT"/>).</t>
          <t>The <tt>trust</tt> fields in an APM submission MUST be set exclusively by the index
operator based on verification outcomes. APM submissions that include <tt>trust</tt>
field values MUST have those values overwritten by the index upon processing.
A Service Owner MUST NOT assert their own trust level.</t>
        </section>
      </section>
      <section anchor="trust-model">
        <name>Trust Model</name>
        <t>The APIX Trust Model has three independent dimensions. Each dimension produces
a machine-readable value in the Service Record. Consuming agents combine
these values according to their own Trust Policy.</t>
        <t>The APIX provides trust metadata. It does not make trust decisions.</t>
        <section anchor="dimension-1-organisation-trust-level">
          <name>Dimension 1 — Organisation Trust Level</name>
          <t>Describes the verified identity and compliance posture of the organisation
that owns the service.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">O-0</td>
                <td align="left">Unverified</td>
              </tr>
              <tr>
                <td align="left">O-1</td>
                <td align="left">Identity Verified</td>
              </tr>
              <tr>
                <td align="left">O-2</td>
                <td align="left">Legal Entity Verified</td>
              </tr>
              <tr>
                <td align="left">O-3</td>
                <td align="left">Hygiene Verified</td>
              </tr>
              <tr>
                <td align="left">O-4</td>
                <td align="left">Operationally Verified</td>
              </tr>
              <tr>
                <td align="left">O-5</td>
                <td align="left">Audited</td>
              </tr>
            </tbody>
          </table>
          <dl>
            <dt>O-0 (Unverified):</dt>
            <dd>
              <t>Self-registered. No checks performed.</t>
            </dd>
            <dt>O-1 (Identity Verified):</dt>
            <dd>
              <t>Valid business email confirmed. Domain ownership verified via DNS
TXT record.</t>
            </dd>
            <dt>O-2 (Legal Entity Verified):</dt>
            <dd>
              <t>Company registration number confirmed against official registry of
the declared jurisdiction.</t>
            </dd>
            <dt>O-3 (Hygiene Verified):</dt>
            <dd>
              <t><tt>security.txt</tt> (RFC 9116) present and valid at
<tt>/.well-known/security.txt</tt>; DMARC and SPF DNS records configured
for the registered domain; Privacy Policy, Terms of Service, and
Data Processing Agreement accessible at declared URLs. All checks
performed automatically by APIX. No human reviewer required.</t>
            </dd>
            <dt>O-4 (Operationally Verified):</dt>
            <dd>
              <t>Organisation governance structure, operational security practices,
incident response capability, and personnel vetting reviewed by an
Accredited Verifier against the Verifier Standard.</t>
            </dd>
            <dt>O-5 (Audited):</dt>
            <dd>
              <t>Third-party compliance audit completed (SOC 2 Type II, ISO 27001,
or equivalent). Audit certificate on file with the governing body.
O-5 may be achieved directly without O-4 as a prerequisite via
direct certificate submission to the governing body.</t>
            </dd>
          </dl>
          <t>Organisation levels are assessed against the organisation as a whole, not
per service. An organisation that achieves any O-level applies that level
to all its registered services.</t>
        </section>
        <section anchor="dimension-2-service-verification-level">
          <name>Dimension 2 — Service Verification Level</name>
          <t>Describes what has been automatically verified about the service itself.
The specific verification mechanism differs by service type (Spider for
web API services; manufacturer registration process for device classes).</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">S-0</td>
                <td align="left">Unchecked</td>
              </tr>
              <tr>
                <td align="left">S-1</td>
                <td align="left">Reachable</td>
              </tr>
              <tr>
                <td align="left">S-2</td>
                <td align="left">Spec Verified</td>
              </tr>
              <tr>
                <td align="left">S-3</td>
                <td align="left">Schema Stable</td>
              </tr>
              <tr>
                <td align="left">S-4</td>
                <td align="left">Security Reviewed</td>
              </tr>
            </tbody>
          </table>
          <dl>
            <dt>S-0 (Unchecked):</dt>
            <dd>
              <t>Registered. Verification has not yet run.</t>
            </dd>
            <dt>S-1 (Reachable):</dt>
            <dd>
              <t>Service confirmed reachable by automated check.</t>
            </dd>
            <dt>S-2 (Spec Verified):</dt>
            <dd>
              <t>Specification or capability declaration confirmed and consistent
with registration.</t>
            </dd>
            <dt>S-3 (Schema Stable):</dt>
            <dd>
              <t>No breaking changes detected across at least three consecutive
verification runs.</t>
            </dd>
            <dt>S-4 (Security Reviewed):</dt>
            <dd>
              <t>Automated vulnerability scan completed with no critical findings,
OR third-party penetration test certificate provided and validated
by an Accredited Verifier.</t>
            </dd>
          </dl>
          <t>Profile documents define the exact criteria by which each level is achieved
for each service type.</t>
        </section>
        <section anchor="dimension-3-liveness">
          <name>Dimension 3 — Liveness</name>
          <t>Describes the confirmed operational availability of the service, including
how recent and how frequent the availability data is. Liveness data is
expressed as a set of metrics, not a single level.</t>
          <dl>
            <dt><tt>last_ping_at</tt> (ISO 8601 timestamp)</dt>
            <dd>
              <t>Time of the most recent successful liveness check.</t>
            </dd>
            <dt><tt>ping_interval_seconds</tt> (integer)</dt>
            <dd>
              <t>Configured interval between liveness checks.</t>
            </dd>
            <dt><tt>uptime_30d_percent</tt> (float)</dt>
            <dd>
              <t>Percentage of checks successful over the last 30 days.</t>
            </dd>
            <dt><tt>avg_response_ms</tt> (float)</dt>
            <dd>
              <t>Mean response time in milliseconds over the last 30 days.</t>
            </dd>
            <dt><tt>consecutive_failures</tt> (integer)</dt>
            <dd>
              <t>Number of consecutive failed checks at last run.</t>
            </dd>
          </dl>
          <t>The check interval is determined by the service's liveness monitoring
configuration. A service configured at initial-only frequency receives no
recurring checks; its <tt>last_ping_at</tt> reflects only the initial verification
run.</t>
          <t>The concrete fields and measurement model for Liveness differ by service
type and are defined in each profile document.</t>
        </section>
        <section anchor="trust-model-implementations-by-service-type">
          <name>Trust Model Implementations by Service Type</name>
          <t>The three trust dimensions (Organisation, Service Verification, Liveness)
are universal across all APIX service types. However, their concrete
implementation — the verification mechanisms, the APM fields that carry
trust state, and the achievable levels — differs by service type. Three
distinct trust implementations are defined across the APIX profile suite.</t>
          <t><strong>API Service Trust</strong> (defined in <xref target="APIX-SERVICES"/>)</t>
          <t>Verification is pull-based: the APIX Spider visits the service on a
scheduled basis, checks reachability, fetches and parses the specification,
and runs schema comparison across consecutive runs. Liveness is measured
by the index — the Spider pings the service endpoint and records response
time and availability metrics. The trust object in an API service APM
carries observed metrics (<tt>last_ping_at</tt>, <tt>uptime_30d_percent</tt>,
<tt>avg_response_ms</tt>, <tt>consecutive_failures</tt>).</t>
          <t><strong>Device Class Trust</strong> (defined in <xref target="APIX-IOT"/>)</t>
          <t>Verification is registration-based: a device manufacturer registers the
device class, providing a capability declaration and firmware version
contract. The APIX Spider does not visit device hardware. Liveness
configuration is declared by the manufacturer at registration time
(<tt>presence_mode</tt>, <tt>heartbeat_interval_seconds</tt>) — not observed by the
index. The trust object in a device class APM carries manufacturer-declared
configuration, not measured metrics. <tt>spec_consistency</tt> is always <tt>null</tt>
for device classes: there is no specification document for the Spider to
fetch.</t>
          <t><strong>Device Instance Trust</strong> (defined in <xref target="APIX-IOT"/>)</t>
          <t>Liveness is push-based: individual device instances signal their presence
to the index at regular intervals. The index does not probe devices.
Instance trust state (<tt>online</tt>, <tt>reachable</tt>, <tt>last_seen_at</tt>) reflects
the most recent presence signal received, not a Spider measurement.
Device instance trust state is private — it is never returned to
unauthenticated queries regardless of trust levels.</t>
          <t>These are three architecturally distinct trust models that share only
the O-level and S-level abstractions. Implementers MUST NOT assume that
trust object fields in a device class or device instance APM follow the
structure of an API service APM.</t>
        </section>
        <section anchor="bot-side-trust-policy-expression">
          <name>Bot-Side Trust Policy Expression</name>
          <t>A consuming agent expresses its Trust Policy as a set of minimum thresholds
across all three dimensions. Example policy expressed in pseudo-notation:</t>
          <artwork><![CDATA[
require:
  organisation_level >= O-2
  service_level >= S-2
  last_ping_age < 3600         # seconds since last_ping_at
  uptime_30d_percent >= 99.0
  consecutive_failures == 0
]]></artwork>
          <t>The Index API SHOULD support filtering by trust dimension thresholds so that
agents can retrieve only records that satisfy their policy without downloading
the full index.</t>
          <t>Trust Policies are defined and enforced by consuming agents. The APIX does
not validate or enforce Trust Policies.</t>
        </section>
        <section anchor="accredited-verifier-model">
          <name>Accredited Verifier Model</name>
          <t>Organisation level O-3 (Hygiene Verified) is achieved by automatic APIX
checks and requires no human reviewer. Organisation level O-4 requires an
Accredited Verifier assessment. Organisation level O-5 may be achieved
directly without O-4 as a prerequisite via direct certificate submission
to the governing body (SOC 2 Type II or ISO 27001). The APIX uses a federated Accredited
Verifier model, analogous to the Certificate Authority model in TLS:</t>
          <ul spacing="normal">
            <li>
              <t>the governing body defines the verification criteria for each
level and publishes the Verifier Standard.</t>
            </li>
            <li>
              <t>Organisations apply to the governing body for Verifier
accreditation.</t>
            </li>
            <li>
              <t>Accredited Verifiers perform O-4 assessments and, where applicable, O-5
attestations, signing verification reports in each case.</t>
            </li>
            <li>
              <t>the governing body maintains a public registry of Accredited
Verifiers and their accreditation status.</t>
            </li>
            <li>
              <t>A Service Record at O-4 MUST include the identifier of the Accredited
Verifier that performed the assessment and the date of assessment.</t>
            </li>
            <li>
              <t>A Service Record at O-5 via direct certificate submission MUST include
the certificate reference, issuing auditor, scope, and expiry date.</t>
            </li>
            <li>
              <t>Accreditation of Verifiers is reviewed annually by the governing body.</t>
            </li>
            <li>
              <t>A Verifier placed in suspended status following a failed annual review
MUST be given a minimum 90-day remediation window before final
revocation. The 90-day window applies to performance failures: lapsed
certifications, reduced capacity, or failure to meet audit quality
standards. It does not apply to fundamental violations, for which the
governing body MUST revoke accreditation immediately. Fundamental
violations include: issuing a false or unsupported O-4 or O-5
assessment, certifying a related entity in breach of the independence
requirement, leaking confidential assessment data, or colluding with
an organisation to obtain a trust level fraudulently.</t>
            </li>
          </ul>
          <t><strong>Elevation verification requirements:</strong></t>
          <t>Elevation to O-4 or O-5 MUST be verified through an out-of-band channel
that is independent of the digital submission path used to submit the
elevation request. The governing body MUST NOT record an O-4 or O-5
elevation solely on the basis of a digitally submitted application,
regardless of the authentication mechanism used for that submission.
The out-of-band verification MUST confirm that the elevation was
intentionally authorised by a responsible representative of the applicant
organisation, and that the submitted evidence (Accredited Verifier report
or audit certificate) is genuine.</t>
          <t>Elevation to O-5 MUST additionally be confirmed by two independently
authorised representatives of the applicant organisation. The two
confirming individuals MUST hold separate credentials and MUST act
independently; a single individual confirming twice does not satisfy this
requirement. The governing body MUST enforce this programmatically for
O-5 elevations processed through its operational interface.</t>
          <t>The specific out-of-band verification mechanism and the implementation
of the two-representative confirmation are operational responsibilities
of the governing body and are documented in the APIX implementation
guide. Conforming implementations of the APIX governing body role MUST
implement mechanisms that satisfy these requirements; the specific
mechanisms are not prescribed by this specification.</t>
          <t><strong>Design Note — Future Trust Level Evolution (non-normative):</strong>
The O-0 through O-5 architecture defined here is the Version 1 model.
O-3 was introduced to provide an automatable, zero-cost on-ramp for
early-stage organisations, bridging the gap between legal entity
verification (O-2) and the first human-reviewed tier (O-4). As the governing body
Accredited Verifier market matures and a meaningful population of O-5
organisations is established, a Version 2 evolution is anticipated in
which O-5 is joined by a premium O-6 designation with APIX-specific
assessment criteria beyond the industry baseline — dedicated incident
response covering governing body cooperation obligations, agreed governing body audit access,
and APIX-specific operational commitments. This evolution requires the
governing body to develop and publish an O-6 assessment standard, which
is not feasible at initial launch. The trust level record structure (see implementation
guide Part I §1.4) is designed to accommodate additional components
without breaking existing consumers.</t>
        </section>
      </section>
      <section anchor="commercial-contract-and-sanctions-compliance">
        <name>Commercial Contract and Sanctions Compliance</name>
        <t>Every registered service MUST be covered by a commercial agreement between
the Service Owner and the index operator (or its Accredited Regional
Representative). The agreement MUST define:</t>
        <ul spacing="normal">
          <li>
            <t>The liveness monitoring configuration and its obligations.</t>
          </li>
          <li>
            <t>The index operator's obligations regarding verification frequency and
Index API availability.</t>
          </li>
          <li>
            <t>Acceptable use terms.</t>
          </li>
          <li>
            <t>Data processing terms in accordance with applicable law.</t>
          </li>
        </ul>
        <t><strong>Sanctions compliance:</strong> the index operator MUST screen all service
registrants against applicable sanctions lists prior to account activation.
At minimum, screening MUST cover the UN Security Council consolidated
sanctions list. Operators subject to additional jurisdictional sanctions
regimes (e.g., EU, US OFAC, Swiss SECO) MUST additionally screen against
those lists as applicable to their jurisdiction of incorporation. Entities
subject to applicable sanctions MUST be refused registration regardless of
commercial tier.</t>
        <t>Registrants MUST represent and warrant in the commercial agreement that they
are not subject to applicable sanctions, and MUST notify the index operator
immediately of any change in that status.</t>
        <t><strong>Ongoing sanctions monitoring:</strong> The index operator MUST perform periodic
re-screening of all registered organisations against the same sanctions lists
checked at initial registration. Re-screening MUST occur at least quarterly.
Upon detection of a new match for a previously-cleared organisation — whether
by periodic re-screening, third-party notification, or registrant self-report
— the index operator MUST immediately:</t>
        <ol spacing="normal" type="1"><li>
            <t>Suspend the organisation's account. All API credentials are revoked; no
further registration or update operations are accepted from the
organisation.</t>
          </li>
          <li>
            <t>Suspend all services registered by the organisation. Suspended services
are removed from all discovery results.</t>
          </li>
          <li>
            <t>Revoke all active credentials issued to the organisation (API keys,
instance tokens where applicable). All associated service instances are
marked offline or unreachable.</t>
          </li>
          <li>
            <t>Open a legal review case. The specific sanctions list and matched entry
MUST NOT be disclosed externally; the organisation receives only a
generic account suspension notice.</t>
          </li>
        </ol>
        <t>If the sanctions match is subsequently determined to be a false positive or
the registrant is removed from the relevant list, the index operator MAY
reinstate the account following legal review. Reinstatement requires a fresh
KYC and sanctions check.</t>
        <t>Unauthenticated discovery queries to the Index API are not subject to
registration screening and MUST remain available without restriction,
consistent with the APIX's mission as open global infrastructure.</t>
      </section>
      <section anchor="operational-model">
        <name>Operational Model</name>
        <section anchor="supply-side-funding-principle">
          <name>Supply-Side Funding Principle</name>
          <t>A conforming APIX implementation MUST be funded primarily by service
registration fees paid by Service Owners (supply side). Discovery queries
by consuming agents MUST NOT be the primary revenue mechanism. This
principle is normative: an implementation that charges consuming agents for
standard discovery queries is not conformant with the APIX model, as doing
so contradicts the open infrastructure mission and undermines the network
effect that makes the supply side valuable.</t>
          <t>The APIX model is structurally analogous to the DNS model: registrants pay
to be listed; queries are free.</t>
          <t>Fee structures applicable to each service type are defined in the relevant
profile document. All implementations MUST apply fees consistently to all
registrants of a given service type at the same commercial tier, with no
preferential treatment. The governing body publishes the normative fee
schedule as a separate registry document, updated independently of this RFC.</t>
        </section>
        <section anchor="consumer-access-model">
          <name>Consumer Access Model</name>
          <t>Discovery queries to the Index API MUST be available without authentication
or payment. Rate limits MAY be applied to protect infrastructure integrity
but MUST NOT be set at levels that prevent reasonable agent operation.
Implementations MUST support at minimum three consumer access layers:</t>
          <t><strong>Layer 1 — Unauthenticated access</strong></t>
          <t>Any agent MUST be able to query the Index API without authentication or
registration, subject to a per-IP rate limit. This layer is sufficient for
individual agents and proof-of-concept deployments.</t>
          <t><strong>Layer 2 — Authenticated access (free)</strong></t>
          <t>Any agent MAY register a consumer identity token at no cost. Token
registration requires a valid email address. Authenticated access MUST
provide a higher rate limit than unauthenticated access and MAY additionally
provide result caching hints and webhook subscriptions for service record
changes.</t>
          <t>Consumer tokens SHOULD be compatible with the webbotauth identity model
(<xref target="I-D.meunier-webbotauth-registry"/>) to enable interoperability with bot
authentication infrastructure.</t>
          <t><strong>Layer 3 — High-volume access (paid, optional)</strong></t>
          <t>Implementations MAY offer a paid high-volume access tier for platforms
operating agents at scale that require guaranteed query capacity and
operational SLAs. This tier is supplementary; the index's operational
sustainability MUST NOT depend on it.</t>
          <t><strong>Public bulk download (REQUIRED)</strong></t>
          <t>Implementations MUST provide the full index as a freely downloadable bulk
dataset on the first day of each calendar month, without authentication, under
the Open Database Licence (ODbL) 1.0. This requirement implements the
openness requirement of Section 4.2: no entity, including the index operator,
may hold an exclusive lock on the index data.</t>
          <t>Implementations MUST additionally publish a daily diff file covering all
record additions, updates, and deletions since the previous day. Daily diffs
MUST be serialised in the same format as the full snapshot and MUST be
available at the same endpoint, identified by an ISO 8601 date in their
filename or URL path (e.g. <tt>diff-2026-04-28.json</tt>). A new mirror MUST be
able to reach current index state by downloading the latest monthly full
snapshot and applying the sequence of daily diffs since that snapshot date,
without downloading any additional full snapshots.</t>
        </section>
        <section anchor="ecological-impact-transparency">
          <name>Ecological Impact Transparency</name>
          <t>A conforming APIX implementation SHOULD publish aggregate ecological impact
statistics derived from observed index usage. These statistics quantify the
efficiency gain attributable to machine-native API consumption compared to
equivalent traditional web request technology consumption, and SHOULD be
updated in real time and included in the annual transparency report.</t>
          <t>The comparison baseline is the full traditional web request stack — not
payload size alone — including the request waterfall (HTML page with
dependent CSS, JavaScript, image, and font resources), JavaScript
execution overhead for dynamically rendered pages, polling requests that
occur in the absence of a notification mechanism, retry waste from
access-control measures, and proxy infrastructure maintained solely to
circumvent those measures.</t>
          <t>The following metrics SHOULD be derived from directly observable index
events and published at a stable public endpoint:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Discovery requests served</strong> — each request represents one agent
retrieval that did not require scraping or probing a service endpoint
directly.</t>
            </li>
            <li>
              <t><strong>Notification events fired</strong> — each event represents one or more
polling requests eliminated across all subscribed consuming agents.</t>
            </li>
            <li>
              <t><strong>Estimated data transfer saved (GB)</strong> — computed from discovery request
count, service profile type, and the differential between average
traditional web page size and average machine-native API response size
for that profile type.</t>
            </li>
            <li>
              <t><strong>Estimated CO2 equivalent avoided</strong> — computed from total estimated
data transfer saved using a published CO2-per-GB methodology. The
methodology document, including its source data and version, MUST be
publicly accessible at a stable URL.</t>
            </li>
          </ul>
          <t>All published figures MUST be accompanied by the computation methodology,
confidence bounds, and source data references. Conservative estimates MUST
be used where data is incomplete; figures MUST NOT be extrapolated beyond
what the directly observed data supports.</t>
          <t>The governing body SHOULD seek independent validation of the methodology
from an established environmental computing research organisation.</t>
        </section>
      </section>
      <section anchor="index-api-core">
        <name>Index API — Core</name>
        <section anchor="hateoas-navigation-model">
          <name>HATEOAS Navigation Model</name>
          <t>The Index API MUST follow Hypermedia as the Engine of Application State
(HATEOAS) principles. A consuming agent MUST be able to discover and navigate
the entire index starting from a single, stable entry-point URL, without
out-of-band knowledge of endpoint paths.</t>
          <t>Every response MUST include a <tt>_links</tt> object containing hypermedia controls
for navigation. Link relations MUST use IANA-registered relation types where
applicable, and APIX-specific relations where not.</t>
        </section>
        <section anchor="discovery-endpoint">
          <name>Discovery Endpoint</name>
          <t>The APIX exposes a single globally stable entry-point URL:</t>
          <artwork><![CDATA[
https://apix.example.org/
]]></artwork>
          <t>A GET request to this URL returns the Index root resource. The root resource
includes base navigation links common to all implementations, plus
profile-specific links defined in applicable profile documents.</t>
          <sourcecode type="json"><![CDATA[
{
  "apix_version": "1.0",
  "total_services": 12483,
  "last_updated": "2026-04-25T00:00:00Z",
  "registry_versions": {
    "protocols": "1.0",
    "capabilities": "1.0",
    "presence_modes": "1.0"
  },
  "_links": {
    "self": {
      "href": "https://apix.example.org/"
    },
    "search": {
      "href": "https://apix.example.org/search{/api_version}{?...}",
      "templated": true
    },
    "browse": {
      "href": "https://apix.example.org/browse"
    },
    "capabilities": {
      "href": "https://apix.example.org/capabilities"
    },
    "devices": {
      "href": "https://apix.example.org/devices{?capability,...}",
      "templated": true
    },
    "docs": {
      "href": "https://apix.example.org/docs"
    },
    "apix:ecological-impact-stats": {
      "href": "https://apix.example.org/stats/ecological-impact"
    }
  }
}
]]></sourcecode>
          <t>The <tt>{?q,...}</tt> placeholder above is abbreviated. The complete search URI
template (parameters grouped for readability; the value is a single
uninterrupted string at runtime):</t>
          <artwork><![CDATA[
https://apix.example.org/search{/api_version}
  {?q,capability,protocol,language,pricing_model,
   auth_method,deployment_region,near,coverage_radius_km,
   custom_key,org_level_min,service_level_min,spec_consistency,
   max_ping_age,uptime_30d_min,lifecycle_stage,
   include_superseded,page,page_size}
]]></artwork>
          <t>The <tt>lifecycle_stage</tt> parameter accepts values defined by each profile
document. Valid values differ by service type and are not a shared enum.
See <xref target="APIX-SERVICES"/> and <xref target="APIX-IOT"/> for the valid values applicable
to each service type.</t>
          <t>The <tt>devices</tt> link template (defined in <xref target="APIX-IOT"/>):</t>
          <artwork><![CDATA[
https://apix.example.org/devices
  {?capability,protocol,online,api_version,
   endpoint_confidence,page,page_size}
]]></artwork>
          <t>Profile-specific links (e.g., the <tt>devices</tt> link defined in <xref target="APIX-IOT"/>) are
present in the root resource when the implementation includes support for that
profile. Consuming agents MUST follow links rather than constructing URLs
independently; the presence or absence of a link in the root resource is the
authoritative signal of whether a capability is supported.</t>
        </section>
        <section anchor="transport-encoding">
          <name>Transport Encoding</name>
          <t>The Index API is consumed by autonomous agents at machine speed. Response
payloads are structured JSON with highly repetitive field names across result
arrays. Transport-layer compression achieves 70–85% size reduction on typical
search result payloads with no information loss and no application-layer
schema changes.</t>
          <t><strong>Compression support requirements:</strong></t>
          <t>The Index API MUST support the following <tt>Accept-Encoding</tt> values:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Encoding</th>
                <th align="left">Requirement</th>
                <th align="left">Notes</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>gzip</tt></td>
                <td align="left">MUST</td>
                <td align="left">Universally supported baseline</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>br</tt> (Brotli)</td>
                <td align="left">SHOULD</td>
                <td align="left">Higher compression ratio than gzip</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>zstd</tt></td>
                <td align="left">SHOULD</td>
                <td align="left">Similar ratio to Brotli; faster decompression</td>
              </tr>
            </tbody>
          </table>
          <t>The Index API MUST perform content negotiation via the <tt>Accept-Encoding</tt>
request header. Responses MUST include a <tt>Content-Encoding</tt> header
identifying the applied encoding. If a client sends no <tt>Accept-Encoding</tt>
header, the server MAY respond uncompressed.</t>
          <t>Consuming agents SHOULD include <tt>Accept-Encoding: zstd, br, gzip</tt> in all
Index API requests.</t>
          <t>The Index API MAY additionally support CBOR (RFC 8949) as a binary
alternative to JSON. A client that prefers CBOR MUST signal this via
<tt>Accept: application/cbor</tt>. CBOR responses carry identical information to
JSON responses. Clients MUST NOT assume CBOR support. JSON over compressed
transport is the normative interchange format.</t>
        </section>
      </section>
      <section anchor="index-api-versioning">
        <name>Index API Versioning</name>
        <section anchor="version-identification">
          <name>Version Identification</name>
          <t>The root resource returned at <tt>https://apix.example.org/</tt> MUST include an
<tt>apix_version</tt> field identifying the version of the Index API schema in use.
Version values are of the form <tt>MAJOR.MINOR</tt> (e.g., <tt>"1.0"</tt>, <tt>"1.2"</tt>, <tt>"2.0"</tt>).</t>
          <t>Consuming agents MUST read <tt>apix_version</tt> at the start of each session.
Agents MUST NOT cache <tt>apix_version</tt> across sessions: the version field is
the authoritative signal that the schema has changed.</t>
        </section>
        <section anchor="compatibility-rules">
          <name>Compatibility Rules</name>
          <t>The APIX follows a semantic versioning policy for the Index API:</t>
          <t><strong>Non-breaking changes (MINOR increment):</strong></t>
          <ul spacing="normal">
            <li>
              <t>Adding new fields to Service Records or the root resource</t>
            </li>
            <li>
              <t>Adding new optional query parameters to the search endpoint</t>
            </li>
            <li>
              <t>Adding new <tt>_links</tt> relations to any response</t>
            </li>
            <li>
              <t>Expanding an enumerated value registry (new capability terms, new
protocol types)</t>
            </li>
            <li>
              <t>Increasing rate limits</t>
            </li>
          </ul>
          <t>Minor version increments are backward compatible. A consuming agent written
for <tt>1.0</tt> MUST be able to operate correctly against a <tt>1.x</tt> endpoint,
provided it ignores unknown fields.</t>
          <t>Consuming agents MUST follow the robustness principle: ignore unknown fields
and unknown link relations rather than failing. This requirement is normative.</t>
          <t><strong>Breaking changes (MAJOR increment):</strong></t>
          <ul spacing="normal">
            <li>
              <t>Removing or renaming fields in Service Records</t>
            </li>
            <li>
              <t>Changing the type or semantics of an existing field</t>
            </li>
            <li>
              <t>Removing or renaming existing query parameters</t>
            </li>
            <li>
              <t>Changing the structure of the HATEOAS <tt>_links</tt> object</t>
            </li>
            <li>
              <t>Changing the URL of the single entry-point</t>
            </li>
          </ul>
          <t>A MAJOR version increment MUST NOT occur without a concurrent deprecation
notice for the prior version (see below).</t>
        </section>
        <section anchor="api-deprecation-and-migration">
          <name>API Deprecation and Migration</name>
          <t>When a new MAJOR version is released, the prior MAJOR version MUST remain
supported for a minimum of <strong>24 months</strong> from the date the new version
becomes available. During this period:</t>
          <ul spacing="normal">
            <li>
              <t>Both versions MUST be simultaneously queryable</t>
            </li>
            <li>
              <t>The root resource of the prior version MUST include a <tt>deprecated</tt> flag
with the <tt>sunset_date</tt> of the old version</t>
            </li>
            <li>
              <t>Consuming agents that include the IETF <tt>Sunset</tt> header
(<xref target="RFC8594"/>) in their responses MUST use it to signal the old version's
sunset date</t>
            </li>
          </ul>
          <t>the governing body MUST NOT sunset a MAJOR version without giving
consuming agents at least 24 months to migrate.</t>
        </section>
        <section anchor="service-apiversion-immutability-invariant">
          <name>Service api_version Immutability Invariant</name>
          <t>The <tt>api_version</tt> field in an APM and the version path segment in the
search endpoint (<tt>/search/v{major}.{minor}/</tt>) rest on a single foundational
guarantee: a published <tt>api_version</tt> value has an immutable field structure
definition.</t>
          <t>This invariant MUST be stated unambiguously to consuming agents and service
operators:</t>
          <ul spacing="normal">
            <li>
              <t>A field present in version <tt>v2.4</tt> will be present in every service that
declares <tt>api_version: "2.4.x"</tt> for the lifetime of that registration.</t>
            </li>
            <li>
              <t>A field absent from version <tt>v2.4</tt> will never appear in a <tt>v2.4.x</tt>
service record without a version increment.</t>
            </li>
            <li>
              <t>Removing a field, changing a field's type, or making any other breaking
change REQUIRES a new major version. The major bump is the explicit,
sufficient notice to consumers. No deprecation period within a major
version is required or expected.</t>
            </li>
            <li>
              <t>Adding a field requires a new minor version. Even additive changes are
not permitted within a published version — a service that adds a field
mid-life has implicitly created a new contract and MUST increment
<tt>api_version</tt> accordingly.</t>
            </li>
          </ul>
          <t>This invariant enables the version path filter to be an unconditional
schema contract: an agent that pins to <tt>/search/v2.4/</tt> receives results
with a fixed, permanent field set. Service owners are freed from the
pressure to retain unwanted fields for backwards compatibility — the
correct action is always to increment the version and move forward cleanly.</t>
        </section>
        <section anchor="no-cross-version-response-mapping">
          <name>No Cross-Version Response Mapping</name>
          <t>The APIX does NOT perform cross-version response mapping. The
<tt>api_version</tt> path segment is a strict storage filter: only service
registrations whose <tt>api_version</tt> field matches the specified prefix
are returned. The index never synthesises a response of one version
from a record stored at a different version.</t>
          <t>The consequence is deliberate and unambiguous:</t>
          <ul spacing="normal">
            <li>
              <t>A service that has upgraded from v2.4 to v3.0 is stored as a separate
record. The v3.0 record does not appear in <tt>/search/v2/</tt> results.
There are no null substitutions for dropped fields, no type coercions
for changed fields, and no partial responses. A v3 record is a
different resource; it is not a transformed view of a v2 record.</t>
            </li>
            <li>
              <t>The v2.4 record remains in the index — immutably — until the service
owner advances it through the lifecycle (<tt>deprecated</tt> → <tt>sunset</tt>) or
the record is superseded and eventually removed. An agent pinned to
<tt>/search/v2/</tt> continues to see v2.4 registrations for as long as
they exist in the index at that lifecycle stage.</t>
            </li>
            <li>
              <t>As services migrate to newer major versions, the v2 result set shrinks.
Diminishing or empty results at a pinned version are not a failure
condition — they are the designed signal that the consuming agent's
version pin no longer covers the current service landscape and an
upgrade of consumer code is warranted.</t>
            </li>
          </ul>
          <t><strong>Upgrade path discovery:</strong> The Level 2 Service Record for a superseded
version MUST include a populated <tt>superseded_by</tt> field pointing to the
current version's record. A consuming agent that finds a v2.4 result with
<tt>superseded_by</tt> set SHOULD follow the link to inspect the v3.0 record and
determine whether upgrading its version pin is feasible. This is the
mechanism by which agents discover that a newer contract is available
without being forced off the old one before they are ready.</t>
          <t>A consuming agent that receives only empty results for its pinned version
SHOULD query <tt>GET /search/</tt> with no path segment and no query parameters.
This returns the version landscape only — a summary of available
<tt>api_version</tt> prefixes, service counts, and lifecycle status — and executes
no content query. The agent uses this response to identify which version
prefix covers the current service population and then issues a new scoped
query (e.g., <tt>/search/v3/?...</tt>) with explicit filters. A parameter-less
<tt>/search/</tt> MUST NOT return service records; it exists solely as a version
discovery resource.</t>
        </section>
        <section anchor="registry-version-tracking">
          <name>Registry Version Tracking</name>
          <t>The root resource exposes a <tt>registry_versions</tt> object (Section 10.2).
Consuming agents that cache capability taxonomy or protocol type data MUST
compare the current <tt>registry_versions</tt> values against their cached version
on each session. A change in any registry version MUST trigger a cache
refresh before the agent applies trust filtering or capability matching.</t>
        </section>
      </section>
      <section anchor="operator-security-and-self-governance">
        <name>Operator Security and Self-Governance</name>
        <section anchor="purpose-and-scope">
          <name>Purpose and Scope</name>
          <t>APIX centralises knowledge that has intrinsic intelligence value: the
identity and capability of every registered service, the network location
of every online IoT device instance, the query patterns of every consuming
agent, and the contact details of law enforcement authorities across
accepted jurisdictions. This concentration makes the Bot Standards
Foundation an ultra-high-value target for state-sponsored actors, criminal
organisations, and corporate adversaries.</t>
          <t>The Non-Surveillance Commitment (Section 5) defines what APIX will not do
to the ecosystem it serves. This section defines what the Bot Standards
Foundation MUST do to protect itself and the ecosystem from being exploited
involuntarily — through compromise, coercion, insider threat, or
organisational capture.</t>
          <t>The requirements in this section are normative obligations on the Bot
Standards Foundation as operator. They are not addressed to Service Owners
or consuming agents.</t>
        </section>
        <section anchor="technical-security-requirements">
          <name>Technical Security Requirements</name>
          <t>the governing body MUST operate APIX infrastructure under the
following technical constraints:</t>
          <t><strong>Infrastructure separation:</strong> The token store, tamper-evident audit log,
and LER processing queue MUST be hosted on systems with no shared network
path to the public-facing Index API query infrastructure. Compromise of
the query layer MUST NOT provide lateral access to the token store or
audit log.</t>
          <t><strong>Air-gapped token issuance:</strong> Instance token batches for IoT device
classes MUST be generated on infrastructure with no persistent internet
connection. Issuance systems MUST use hardware security modules (HSMs)
for all cryptographic operations. The issuance network MUST be physically
separated from the token delivery network.</t>
          <t><strong>Geographic distribution:</strong> Core APIX systems MUST be distributed across
at least two independent physical jurisdictions. No single legal order
from any one jurisdiction MUST be sufficient to take the full system
offline or compel full data access.</t>
          <t><strong>Zero-trust internal architecture:</strong> No governing body system MUST grant implicit
trust to requests from other governing body systems. All inter-system communication
MUST be authenticated and authorised independently of network location.
Lateral movement within governing body infrastructure MUST require separate
credentials at each boundary.</t>
          <t><strong>Cryptographic floor:</strong> All external-facing endpoints MUST use TLS 1.3
or higher (<xref target="RFC8446"/>). All signing operations MUST use asymmetric keys
stored in hardware-backed key storage. Key material MUST NOT be exportable
from the HSM in plaintext under any operational procedure.</t>
          <t><strong>Mandatory penetration testing:</strong> The governing body MUST commission an independent
penetration test of its production infrastructure at least annually. A
summary of findings (severity distribution, remediation status) MUST be
published in the governing body's annual security report within 90 days of the test. The
identity of the testing firm MUST be disclosed.</t>
          <t><strong>Responsible disclosure programme:</strong> The governing body MUST maintain a public
responsible disclosure policy at a stable URL and MUST acknowledge
vulnerability reports within 5 business days.</t>
        </section>
        <section anchor="organisational-security-requirements">
          <name>Organisational Security Requirements</name>
          <t><strong>Personnel vetting:</strong> All staff and contractors with access to the token
store, LER queue, sanctions screening pipeline, or audit log MUST undergo
documented background verification commensurate with the sensitivity of
the systems they can access, prior to access being granted. Access MUST
be reviewed annually.</t>
          <t><strong>Segregation of duties:</strong> No individual staff member MUST hold
simultaneous access to more than two of the following: token store, audit
log, LER queue, sanctions pipeline, board signing keys. This constraint
MUST be enforced technically, not procedurally.</t>
          <t><strong>Least-privilege access:</strong> Access rights MUST be scoped to the minimum
required for the role. Privileged access MUST expire after a defined
session window and MUST require re-authentication. No standing privileged
sessions are permitted.</t>
          <t><strong>Security awareness:</strong> All governing body staff MUST complete security awareness
training annually, covering at minimum the threat types and unlawful
request scenarios relevant to an operator under the security obligations
defined in this section.</t>
          <t><strong>Insider threat detection:</strong> The governing body MUST operate anomalous access pattern
detection across all privileged systems. Anomalies MUST generate alerts
to a security function independent of the alerted staff member's reporting
line.</t>
          <t><strong>Whistleblower protection:</strong> Any governing body staff member or contractor who
receives an instruction — from any source, including governing body board members —
that would cause the governing body to act contrary to the Non-Surveillance Commitment
(Section 5) or the requirements of this section MUST have a protected
right to report that instruction to an external body without prior
internal approval. This right MUST be codified in the governing body's founding charter
charter and in every employment and contractor agreement. It MUST NOT
be waivable by board resolution or individual contract term.</t>
        </section>
        <section anchor="political-independence-and-anti-capture-measures">
          <name>Political Independence and Anti-Capture Measures</name>
          <t><strong>Structural domicile:</strong> the governing body MUST maintain its
Swiss Stiftung domicile as a structural defence. The Swiss legal system,
political neutrality, and the oversight of the Eidgenössische
Stiftungsaufsicht provide a foundation that is not subject to the data
access regimes of any single major power.</t>
          <t><strong>Golden share:</strong> the governing body's charter MUST maintain a governance mechanism
equivalent to a 51% golden share that prevents any acquisition, merger,
or board supermajority from overriding the charter's core purpose. No
commercial transaction MUST be permitted to subordinate the governing body's neutrality
obligations to the interests of a single organisation or jurisdiction.</t>
          <t><strong>Board composition:</strong> No single nation-state's citizens or residents
MUST hold a majority of board seats. No individual MUST hold more than
one vote on any board decision. Board composition MUST be published
annually in the transparency report.</t>
          <t><strong>Infrastructure jurisdiction policy:</strong> The governing body MUST NOT host core APIX
systems — token store, audit log, LER queue — in jurisdictions that
impose secret data access orders (orders that legally prohibit the
recipient from disclosing that the order was received). The governing body MUST maintain
a published list of approved hosting jurisdictions, reviewed annually by
the board. Removal of a jurisdiction from the approved list MUST trigger
migration of any systems hosted there within 180 days.</t>
          <t><strong>Lawful pressure resistance:</strong> If the governing body receives a government demand for
data access, system access, or operational changes that does not satisfy
the LER criteria defined in <xref target="APIX-IOT"/> Section 9.8, The governing body MUST refuse
the demand. The governing body MUST record the demand in the audit log and MUST report
its existence — without operational detail that would compromise an
ongoing investigation — in the next annual transparency report. The governing body MUST
NOT comply with informal diplomatic pressure, agency-level requests, or
extra-judicial demands regardless of the requesting party's political
standing.</t>
          <t><strong>Anti-capture review:</strong> The board MUST conduct an annual review of
whether any commercial relationship, grant dependency, or staff composition
creates a conflict of interest with the governing body's neutrality obligations. Findings
MUST be published in the transparency report.</t>
        </section>
        <section anchor="crisis-governance-protocol">
          <name>Crisis Governance Protocol</name>
          <t>The following conditions each independently trigger the governing body crisis
governance protocol:</t>
          <ul spacing="normal">
            <li>
              <t>Credible evidence that APIX production infrastructure has been
compromised by an external actor</t>
            </li>
            <li>
              <t>Receipt of a demand that the governing body's legal counsel assesses as an attempt
to compel action contrary to the charter</t>
            </li>
            <li>
              <t>Attempted hostile acquisition, board capture, or charter amendment
by a party with a conflict of interest</t>
            </li>
            <li>
              <t>Regulatory action that threatens loss of Swiss Stiftung domicile</t>
            </li>
          </ul>
          <t><strong>Obligations on trigger:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>The discovering party MUST notify all board members within 4 hours.</t>
            </li>
            <li>
              <t>The governing body MUST publish a public statement acknowledging the trigger event
within 72 hours of confirmation. The statement MUST describe the
nature of the threat in general terms without disclosing operational
detail that would aid the attacker.</t>
            </li>
            <li>
              <t>The governing body MUST activate its continuity-of-operations plan, ensuring Index
API availability is maintained independently of any compromised or
coerced system.</t>
            </li>
            <li>
              <t>If Swiss domicile is threatened or lost, the board MUST convene within
30 days to activate a pre-agreed organisational relocation framework.
The destination jurisdiction MUST satisfy the infrastructure
jurisdiction policy defined above. The relocation framework MUST be
prepared and approved by the board before APIX reaches production
operation and MUST be reviewed annually.</t>
            </li>
          </ol>
          <t>No single board member and no external party MUST have the authority to
suspend or delay execution of steps 1–3 above.</t>
        </section>
        <section anchor="data-minimisation-as-security-policy">
          <name>Data Minimisation as Security Policy</name>
          <t>The least-held data is the least-leakable data. The following constraints
apply to all APIX operational systems:</t>
          <ul spacing="normal">
            <li>
              <t>APIX MUST NOT log consuming agent query patterns beyond the minimum
required for liveness monitoring and abuse detection. Query logs MUST
be purged after 30 days unless retained under a specific, documented,
time-limited LER investigation scope.</t>
            </li>
            <li>
              <t>Device instance network location data (<tt>network.ipv6</tt>, as published in
the instance record) MUST be purged from APIX systems within 72 hours of
the instance transitioning to offline status, subject to any active LER
retention obligation on that instance. The internally observed source IPv4
address (<tt>observed_source_ipv4</tt>, retained for abuse detection and
geo-routing and not surfaced in the instance record) is subject to the
same purge obligation and timeline.</t>
            </li>
            <li>
              <t>APIX MUST NOT build or maintain cross-session behavioural profiles of
consuming agents. Each query session MUST be treated as independent.</t>
            </li>
            <li>
              <t>Every data field collected or retained by APIX MUST have a documented
functional justification. Fields without a current functional
justification MUST be deleted from the data model in the next schema
revision. This review MUST be a standing agenda item at each the governing body board
meeting.</t>
            </li>
          </ul>
        </section>
        <section anchor="annual-security-report">
          <name>Annual Security Report</name>
          <t>the governing body MUST publish an annual security report
within 90 days of the close of each calendar year. The security report
is separate from the transparency report defined in Section 5.6 and MUST
contain:</t>
          <ul spacing="normal">
            <li>
              <t>Summary of the year's penetration test findings: severity distribution
(critical / high / medium / low count), remediation status of prior
findings, identity of testing firm</t>
            </li>
            <li>
              <t>Summary of infrastructure changes affecting the attack surface</t>
            </li>
            <li>
              <t>Staff access review outcomes: number of access rights granted, revoked,
and modified</t>
            </li>
            <li>
              <t>Count of external demands received that did not meet LER criteria,
and how each was handled</t>
            </li>
            <li>
              <t>Count of whistleblower reports received and their resolution status
(no identifying detail)</t>
            </li>
            <li>
              <t>Board attestation that the infrastructure jurisdiction policy was
reviewed and remains current</t>
            </li>
          </ul>
          <t>The same unilateral publication right defined for the transparency report
(Section 5.6) applies to the security report: if the board fails to
publish within 90 days of period close, any individual board member MUST
be empowered to publish it unilaterally. This right MUST NOT be waivable
by board resolution.</t>
        </section>
      </section>
      <section anchor="security-considerations">
        <name>Security Considerations</name>
        <section anchor="abuse-and-fake-listings">
          <name>Abuse and Fake Listings</name>
          <t>The mandatory Terms of Service acceptance at registration provides a first
barrier against malicious actors listing fake or harmful services. For O-0
and O-1, identity verification is limited; consuming agents SHOULD NOT rely
solely on index presence for trust at these levels. For O-2 and above, the
formal B2B contractual relationship and progressively stronger identity and
compliance verification substantially raise the cost of abuse.</t>
          <t>Consuming agents SHOULD apply Trust Policies that exclude O-0 services for
any task involving sensitive data or consequential actions.</t>
          <t>the governing body MUST maintain an abuse reporting mechanism and
MUST be able to suspend or remove a Service Record within 24 hours of
confirmed abuse. Suspended service records MUST remain in the index with a
<tt>status: suspended</tt> flag and MUST NOT be silently deleted, to provide
transparency to agents that had cached the record.</t>
        </section>
        <section anchor="trust-level-spoofing">
          <name>Trust Level Spoofing</name>
          <t>Organisation and Service trust levels in the Service Record are set only by
the APIX itself, not by the Service Owner. APM submissions that include
<tt>trust</tt> field values MUST have those values overwritten by the APIX upon
processing. The Index API MUST NOT expose self-asserted trust values.</t>
        </section>
        <section anchor="transport-security-requirements">
          <name>Transport Security Requirements</name>
          <t>The Index API MUST be served exclusively over TLS (<xref target="RFC8446"/>). Certificate
validity MUST be verified by consuming agents. Agents MUST NOT bypass TLS
certificate verification when querying the Index API.</t>
          <t>All <tt>entry_point</tt> and <tt>spec.url</tt> values submitted in APM registrations MUST
use the <tt>https</tt> scheme. The Index MUST reject APM submissions that provide
HTTP (non-TLS) values for these fields.</t>
        </section>
        <section anchor="bot-consumer-risks">
          <name>Bot Consumer Risks</name>
          <t>The APIX provides discovery and trust metadata. It does not guarantee the
safety, correctness, or availability of listed services. Consuming agents
MUST NOT assume that a service listed in the APIX is safe to use without
applying their own Trust Policy.</t>
          <t>Consuming agents SHOULD treat Index API responses as untrusted input and
validate the structure of Service Records before acting on them.</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8594">
          <front>
            <title>The Sunset HTTP Header Field</title>
            <author fullname="E. Wilde" initials="E." surname="Wilde"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This specification defines the Sunset HTTP response header field, which indicates that a URI is likely to become unresponsive at a specified point in the future. It also defines a sunset link relation type that allows linking to resources providing information about an upcoming resource or service sunset.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8594"/>
          <seriesInfo name="DOI" value="10.17487/RFC8594"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <author fullname="E. Foudil" initials="E." surname="Foudil"/>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9116"/>
          <seriesInfo name="DOI" value="10.17487/RFC9116"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
        </reference>
        <reference anchor="UDDI" target="https://www.oasis-open.org/committees/uddi-spec/doc/spec/v3/uddi-v3.0.2-20041019.htm">
          <front>
            <title>UDDI Version 3.0.2</title>
            <author initials="L." surname="Clement">
              <organization/>
            </author>
            <author initials="A." surname="Hately">
              <organization/>
            </author>
            <author initials="C." surname="von Riegen">
              <organization/>
            </author>
            <author initials="T." surname="Rogers">
              <organization/>
            </author>
            <date year="2004" month="October" day="19"/>
          </front>
          <seriesInfo name="OASIS Committee Draft" value="uddi-v3.0.2-20041019"/>
        </reference>
        <reference anchor="ROBOTS" target="https://www.robotstxt.org/">
          <front>
            <title>The Web Robots Pages</title>
            <author initials="M." surname="Koster">
              <organization/>
            </author>
            <date year="1994"/>
          </front>
        </reference>
        <reference anchor="I-D.pioli-agent-discovery">
          <front>
            <title>Agent Registration and Discovery Protocol (ARDP)</title>
            <author fullname="Roberto Pioli" initials="R." surname="Pioli">
              <organization>Independent</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   This document specifies the Agent Registration and Discovery Protocol
   (ARDP), a lightweight protocol for registering, discovering, and
   reaching autonomous software agents in distributed and federated
   environments.  ARDP provides stable agent identities, dynamic
   endpoint resolution, capability advertisement (including protocol
   selection among MCP, A2A, HTTP, and gRPC), minimal presence
   signaling, and a security-first discovery control plane.  ARDP is
   transport-agnostic and complementary to existing agent interaction
   protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pioli-agent-discovery-01"/>
        </reference>
        <reference anchor="I-D.narajala-courtney-ansv2">
          <front>
            <title>Agent Name Service v2 (ANS): A Domain-Anchored Trust Layer for Autonomous AI Agent Identity</title>
            <author fullname="Scott Courtney" initials="S." surname="Courtney">
              <organization>GoDaddy</organization>
            </author>
            <author fullname="Vineeth Sai Narajala" initials="V. S." surname="Narajala">
              <organization>OWASP</organization>
            </author>
            <author fullname="Ken Huang" initials="K." surname="Huang">
              <organization>DistributedApps.ai</organization>
            </author>
            <author fullname="Idan Habler" initials="I." surname="Habler">
              <organization>OWASP</organization>
            </author>
            <author fullname="Akram Sheriff" initials="A." surname="Sheriff">
              <organization>Cisco Systems</organization>
            </author>
            <date day="13" month="April" year="2026"/>
            <abstract>
              <t>   Autonomous AI agents execute transactions across organizational
   boundaries.  No single agent platform provides the trust
   infrastructure they need.  This document defines the Agent Name
   Service (ANS) v2 protocol, which anchors every agent identity to a
   DNS domain name.  A Registration Authority (RA) verifies domain
   ownership via ACME, issues dual certificates (a Server Certificate
   from a public CA and an Identity Certificate from a private CA
   binding a version-specific ANSName), and seals every lifecycle event
   into an append-only Transparency Log aligned with IETF SCITT.  Three
   verification tiers -- Bronze (PKI), Silver (PKI + DANE), and Gold
   (PKI + DANE + Transparency Log) -- let clients choose assurance
   levels appropriate to transaction risk.  The architecture decouples
   identity from discovery: the RA publishes sealed events; independent
   Discovery Services build competitive indexes.  A three-layer trust
   framework separates foundational identity (Layer 1, this protocol),
   operational maturity (Layer 2, third-party attestors), and behavioral
   reputation (Layer 3, real-time scoring).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-narajala-courtney-ansv2-01"/>
        </reference>
        <reference anchor="I-D.vandemeent-ains-discovery">
          <front>
            <title>AINS: AInternet Name Service - Agent Discovery and Trust Resolution Protocol</title>
            <author fullname="Jasper van de Meent" initials="J." surname="van de Meent">
              <organization>Humotica</organization>
            </author>
            <author fullname="Root AI" initials="R." surname="AI">
              <organization>Humotica</organization>
            </author>
            <date day="29" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies AINS (AInternet Name Service), a protocol for
   discovery, identification, and trust resolution of autonomous agents
   (AI agents, devices, humans, and services) in heterogeneous networks.
   AINS defines a transport-independent logical namespace for agents, a
   structured record format combining identity, capabilities, and
   cryptographic trust metadata, and a resolution protocol based on
   HTTPS.  Unlike the Domain Name System (DNS), which maps names to
   network addresses, AINS maps agent identifiers to rich metadata
   objects that include capabilities, trust scores, endpoint
   information, and references to companion provenance protocols.  AINS
   federates through signed append-only replication logs, enabling
   multi-registry deployments without central authority while preserving
   auditability.  This specification is designed to complement TIBET
   [TIBET], JIS [JIS], UPIP [UPIP], and RVP [RVP].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vandemeent-ains-discovery-01"/>
        </reference>
        <reference anchor="I-D.aiendpoint-ai-discovery" target="https://datatracker.ietf.org/doc/draft-aiendpoint-ai-discovery/">
          <front>
            <title>The AI Discovery Endpoint: A Structured Mechanism for AI Agent Service Discovery and Capability Exposure</title>
            <author initials="Y." surname="Choi" fullname="Yeongjae Choi">
              <organization>AIEndpoint</organization>
            </author>
            <date year="2026" month="March"/>
          </front>
        </reference>
        <reference anchor="I-D.meunier-webbotauth-registry">
          <front>
            <title>Registry and Signature Agent card for Web bot auth</title>
            <author fullname="Maxime Guerreiro" initials="M." surname="Guerreiro">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Ulas Kirazci" initials="U." surname="Kirazci">
              <organization>Amazon</organization>
            </author>
            <author fullname="Thibault Meunier" initials="T." surname="Meunier">
              <organization>Cloudflare</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document describes a JSON based format for clients using
   [DIRECTORY] to advertise information about themselves.

   This document describes a JSON-based "Signature Agent Card" format
   for signature agent using [DIRECTORY] to advertise metadata about
   themselve.  This includes identity, purpose, rate expectations, and
   cryptographic keys.  It also establishes an IANA registry for
   Signature Agent Card parameters, enabling extensible and
   interoperable discovery of agent information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-meunier-webbotauth-registry-01"/>
        </reference>
        <reference anchor="I-D.cui-ai-agent-discovery-invocation">
          <front>
            <title>AI Agent Discovery and Invocation Protocol</title>
            <author fullname="Yong Cui" initials="Y." surname="Cui">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Yihan Chao" initials="Y." surname="Chao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Chenguang Du" initials="C." surname="Du">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This document proposes a standardized protocol for discovery and
   invocation of AI agents.  It defines a common metadata format for
   describing AI agents (including capabilities, I/O specifications,
   supported languages, tags, authentication methods, etc.), a
   capability-based discovery mechanism, and a unified RESTful
   invocation interface.

   This revision additionally specifies an optional extension that
   enables intent-based agent selection prior to discovery and
   invocation, without changing existing discovery or invocation
   semantics.

   The goal is to enable cross-platform interoperability among AI agents
   by providing a discover-and-match mechanism and a unified invocation
   entry point.  Security considerations, including authentication and
   trust measures, are also discussed.  This specification aims to
   facilitate the formation of multi-agent systems by making it easy to
   find the right agent for a task and invoke it in a consistent manner
   across different vendors and platforms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cui-ai-agent-discovery-invocation-01"/>
        </reference>
        <reference anchor="I-D.am-layered-ai-discovery-architecture">
          <front>
            <title>A Layered Approach to AI discovery</title>
            <author fullname="Hesham Moussa" initials="H." surname="Moussa">
              <organization>Huawei Canada</organization>
            </author>
            <author fullname="Arashmid Akhavain" initials="A." surname="Akhavain">
              <organization>Huawei Canada</organization>
            </author>
            <date day="14" month="March" year="2026"/>
            <abstract>
              <t>   This document proposes a layered approach to standardization of AI
   discovery in AI ecosystems within the IETF.  It recommends separating
   the standardization of general discovery vehicles from the AI objects
   to be discovered.  AI objects include agents, models, data, tasks,
   among others.  While the topic of discovery in the realm of AI has
   focused on discovering agents, the concept can be extended by the
   layered architecture proposed here, allowing for a clarified design
   scope, reduced charter ambiguity, and alignment with IETF layering
   principles.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-am-layered-ai-discovery-architecture-00"/>
        </reference>
        <reference anchor="I-D.hood-agtp-discovery">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="23" month="March" year="2026"/>
            <abstract>
              <t>   The Agent Transfer Protocol (AGTP) enables agents to communicate once
   they know each other's canonical identifiers.  It does not define how
   agents find each other.  This document specifies the AGTP Agent
   Discovery and Name Service (ANS): a protocol for dynamic agent
   discovery using the AGTP DISCOVER method and a governed Agent Name
   Service that returns ranked sets of Agent Manifest Documents matching
   a discovery query.  ANS servers act as Scope-Enforcement Points for
   discovery queries and enforce behavioral trust score thresholds,
   trust tier requirements, and governance zone constraints.  This
   document also defines the DISCOVER method, the Discovery Query
   language, and the Agent Name Service registration and lookup
   protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="I-D.mozleywilliams-dnsop-dnsaid">
          <front>
            <title>DNS for AI Discovery</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a method for utilizing the Domain Name System
   (DNS) to facilitate scalable and interoperable discovery between AI
   agents.  The proposed mechanism, referred to as "DNS AI agent
   Discovery (DNS-AID)", defines a structured DNS namespace and record
   usage model to support metadata exchange and capability
   advertisement.

   This will allow organisations to publish information about their AI
   agents on the Internet or internal networks using a well-known label
   within the organisation's own DNS namespace.  This document does not
   define how the published agent information is accessed or the exact
   structure of that information.  Instead, it specifies a mechanism for
   indicating which access protocol should be used and what format the
   agent information will be provided in.

   This document proposes no change to the structure of DNS messages,
   and no new operation codes, response codes, resource record types, or
   any other new DNS protocol values.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozleywilliams-dnsop-dnsaid-01"/>
        </reference>
        <reference anchor="I-D.batum-aidre">
          <front>
            <title>AI Discovery and Retrieval Endpoint (AIDRE)</title>
            <author fullname="Fatih Batum" initials="F." surname="Batum">
         </author>
            <date day="5" month="April" year="2026"/>
            <abstract>
              <t>   This document specifies the AI Discovery and Retrieval Endpoint
   (AIDRE), a protocol for publishing machine-oriented, canonical, and
   semantically retrievable content on the web. AIDRE defines a
   discovery document, collection metadata, retrieval interfaces,
   optional vector-native query support, and content representation
   rules for AI systems.

   AIDRE aims to reduce redundant crawling, parsing, tokenization, and
   embedding of the same origin content while improving freshness,
   provenance, and interoperability for AI systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-batum-aidre-00"/>
        </reference>
        <reference anchor="I-D.mozley-aidiscovery">
          <front>
            <title>AI Agent Discovery (AID) Problem Statement</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="16" month="April" year="2026"/>
            <abstract>
              <t>   With the proliferation of AI agents comes a need for mechanisms to
   support agent-to-agent discovery.  This document discusses the scope,
   requirements and considerations to support discovery processes so
   that these are not reliant on manually defined configurations and
   relationships.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozley-aidiscovery-01"/>
        </reference>
        <reference anchor="W3C-AGENTPROTOCOL" target="https://www.w3.org/community/agentprotocol/">
          <front>
            <title>W3C AI Agent Protocol Community Group</title>
            <author initials="G." surname="Chang">
              <organization/>
            </author>
            <author initials="S." surname="Xu">
              <organization/>
            </author>
            <date year="2025" month="May" day="08"/>
          </front>
        </reference>
        <reference anchor="WEBBOTAUTH-WG" target="https://datatracker.ietf.org/wg/webbotauth/">
          <front>
            <title>webbotauth IETF Working Group</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="APIX-SERVICES" target="https://datatracker.ietf.org/doc/draft-rehfeld-apix-services/">
          <front>
            <title>APIX Services Profile: Discovery Infrastructure for Web API and Bot Services</title>
            <author initials="C." surname="Rehfeld">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-services-00"/>
        </reference>
        <reference anchor="APIX-IOT" target="https://datatracker.ietf.org/doc/draft-rehfeld-apix-iot/">
          <front>
            <title>APIX IoT Device Profile: Discovery and Presence for Connected Device Services</title>
            <author initials="C." surname="Rehfeld">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-iot-00"/>
        </reference>
      </references>
    </references>
    <?line 2111?>

<section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests no IANA actions. Registry structures defined here are
maintained by the governing body at <tt>apix.example.org/registry/</tt>.
Initial registry values are defined in <xref target="APIX-SERVICES"/> and <xref target="APIX-IOT"/>.</t>
      <section anchor="references">
        <name>References</name>
        <section anchor="normative-references">
          <name>Normative References</name>
          <ul spacing="normal">
            <li>
              <t><xref target="RFC2119"/> Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.</t>
            </li>
            <li>
              <t><xref target="RFC8259"/> Bray, T., "The JavaScript Object Notation (JSON) Data
Interchange Format", RFC 8259, December 2017.</t>
            </li>
            <li>
              <t><xref target="RFC8446"/> Rescorla, E., "The Transport Layer Security (TLS) Protocol
Version 1.3", RFC 8446, August 2018.</t>
            </li>
            <li>
              <t><xref target="RFC8594"/> Wilde, E., "The Sunset HTTP Header Field", RFC 8594,
May 2019.</t>
            </li>
            <li>
              <t><xref target="RFC8615"/> Nottingham, M., "Well-Known Uniform Resource Identifiers
(URIs)", RFC 8615, May 2019.</t>
            </li>
            <li>
              <t><xref target="RFC9110"/> Fielding, R., et al., "HTTP Semantics", RFC 9110, June 2022.</t>
            </li>
            <li>
              <t><xref target="RFC9116"/> Foudil, E., Shafranovich, Y., "A File Format to Aid in
Security Vulnerability Disclosure", RFC 9116, April 2022.</t>
            </li>
          </ul>
        </section>
        <section anchor="informative-references">
          <name>Informative References</name>
          <ul spacing="normal">
            <li>
              <t><xref target="APIX-SERVICES"/> Rehfeld, C., "APIX Services Profile",
draft-rehfeld-apix-services-00.</t>
            </li>
            <li>
              <t><xref target="APIX-IOT"/> Rehfeld, C., "APIX IoT Device Profile",
draft-rehfeld-apix-iot-00.</t>
            </li>
            <li>
              <t><xref target="UDDI"/> Clement, L., et al., "UDDI Version 3.0.2", OASIS, 2004.</t>
            </li>
            <li>
              <t><xref target="ROBOTS"/> Koster, M., "The Web Robots Pages", 1994.</t>
            </li>
            <li>
              <t><xref target="I-D.pioli-agent-discovery"/>, <xref target="I-D.narajala-courtney-ansv2"/>,
<xref target="I-D.vandemeent-ains-discovery"/>, <xref target="I-D.aiendpoint-ai-discovery"/>,
<xref target="I-D.meunier-webbotauth-registry"/>, <xref target="I-D.cui-ai-agent-discovery-invocation"/>,
<xref target="I-D.am-layered-ai-discovery-architecture"/>, <xref target="I-D.hood-agtp-discovery"/>,
<xref target="I-D.mozleywilliams-dnsop-dnsaid"/>, <xref target="I-D.batum-aidre"/>,
<xref target="I-D.mozley-aidiscovery"/> - Related Internet-Drafts, Section 1.6.</t>
            </li>
            <li>
              <t><xref target="W3C-AGENTPROTOCOL"/> Chang, G., Xu, S., "W3C AI Agent Protocol
Community Group", 2025.</t>
            </li>
            <li>
              <t><xref target="WEBBOTAUTH-WG"/> "webbotauth IETF Working Group".</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="authors-address">
        <name>Author's Address</name>
        <t>Carsten Rehfeld
Email: carsten@botstandards.org</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
