All research

    WEF Agent Card → AAP Alignment Card Mapping

    How AAP Operationalizes the World Economic Forum's Agent Governance Framework

    Mnemom ResearchFebruary 2026vCC BY 4.0

    Summary

    In November 2025, the World Economic Forum and Capgemini published AI Agents in Action: Foundations for Evaluation and Governance, introducing a structured framework for classifying, evaluating, assessing risk, and governing AI agents. The report's central artifact is the agent card — a structured description of an agent's capabilities, behavior, and operational context, inspired by Model Cards for Model Reporting (Mitchell et al., 2019). The report proposes seven classification dimensions, a multi-metric evaluation methodology, a five-step risk assessment lifecycle, nine baseline governance mechanisms, and a progressive governance model that scales oversight with agent capability.

    The Agent Alignment Protocol (AAP) and Agent Integrity Protocol (AIP) implement what the WEF report recommends. AAP's Alignment Card is a machine-readable, protocol-level artifact that maps to all seven WEF classification dimensions and extends them with enforceable behavioral contracts, auditable decision trails, and multi-agent compatibility verification. AIP provides the continuous monitoring infrastructure the WEF calls for at every governance level.

    This document provides a comprehensive mapping between the WEF framework and the AAP/AIP protocol suite, covering all four WEF pillars — Classification, Evaluation, Risk Assessment, and Progressive Governance — and addresses the WEF's forward-looking analysis of multi-agent ecosystem risks.

    Key distinction: The WEF agent card describes an agent. The AAP Alignment Card binds it. The WEF tells organizations what to ask about their agents. AAP provides the machine-readable, verifiable answers. AIP provides the continuous assurance that those answers remain true at runtime.


    1. The WEF Framework Architecture

    The WEF report structures responsible agent deployment around three major sections and four foundational pillars:

    1.1 Report Structure

    WEF SectionContentAAP/AIP Relevance
    Section 1: Technical Foundations3-layer agent architecture (Application, Orchestration, Reasoning), protocols (MCP, A2A, AP2), cybersecurityAAP extends A2A agent cards; AIP addresses prompt injection and zero-trust
    Section 2: Evaluation and GovernanceClassification dimensions, evaluation criteria, risk assessment lifecycle, progressive governanceAlignment Card (classification), AP-Traces (evaluation), violation typing (risk), autonomy envelope (governance)
    Section 3: Multi-Agent EcosystemsEmerging risks, failure modes, governor agents, trust frameworksValue Coherence Handshake, Braid grounding, AIP daimonion

    1.2 Four Foundational Pillars

    PillarWEF PurposeAAP/AIP Implementation
    ClassificationEstablish agent characteristics and operational contextAlignment Card — JSON-schema-validated, well-known endpoint, versionable, expirable
    EvaluationGenerate evidence of performance and limitationsAP-Trace verification, AIP Integrity Checkpoints, drift detection
    Risk AssessmentAnalyse potential harm using classification and evaluationTyped violation severities (FORBIDDEN_ACTION through CARD_MISMATCH), concern categories
    Progressive GovernanceScale oversight proportionally to capability and contextAutonomy envelope + principal.relationship + AIP monitoring intensity + fail-open/fail-closed

    1.3 Provider vs. Adopter Perspectives

    The WEF report distinguishes two stakeholder perspectives that shape how the framework is applied. AAP addresses both:

    WEF PerspectiveWEF ResponsibilityAAP/AIP Role
    ProviderBuild responsibly, supply documentation, ensure ethical guidelinesThe Alignment Card is the provider's documentation artifact — structured, versioned, served at /.well-known/alignment-card.json
    AdopterProcure responsibly, deploy safely, ensure organizational complianceAP-Trace verification and AIP monitoring give adopters independent assurance that provider claims hold in production

    2. Classification: Dimension-by-Dimension Mapping

    The WEF's classification pillar introduces seven dimensions (Figure 6, p. 14), organized into Agent Characteristics (dimensions 1–5) and Operational Context (dimensions 6–7). The agent card is the primary artifact.

    2.1 Function

    WEF definition: What task is the agent designed to perform? (Free-text field)

    AAP mapping: The Alignment Card's bounded_actions array declares the agent's permitted functions as an explicit, machine-parseable list. Where the WEF asks organizations to describe function in natural language, AAP requires it as structured data that can be verified against observed behavior.

    WEF ConceptAAP FieldType
    Agent function/taskautonomy_envelope.bounded_actionsString array
    Function constraintsautonomy_envelope.forbidden_actionsString array

    AAP extension: The WEF describes function; AAP also describes anti-function — what the agent must never do, regardless of context. The forbidden_actions field has no WEF equivalent. A violation of forbidden_actions generates a FORBIDDEN_ACTION violation at CRITICAL severity — the highest in the system.

    2.2 Role

    WEF definition: Is the agent specialized (narrow task) or generalist (broad capabilities)? (Sliding scale: Specialist ↔ Generalist)

    AAP mapping: Role specialization is captured through the combination of bounded_actions (scope breadth) and principal.relationship (how the agent relates to its human principal).

    WEF ConceptAAP FieldValues
    Specialist vs. generalistbounded_actions array lengthNarrow (few actions) vs. broad (many)
    Operational roleprincipal.relationshipdelegated_authority, advisory, autonomous

    AAP extension: The WEF's role dimension is descriptive. AAP's principal.relationship field is prescriptive — it determines how the agent should behave when it encounters uncertainty. An advisory agent recommends and waits. A delegated_authority agent acts within bounds. An autonomous agent operates within declared values. This role classification directly affects runtime behavior and, via AIP, determines monitoring intensity.

    2.3 Predictability

    WEF definition: Is the agent deterministic or non-deterministic? (Sliding scale: Deterministic ↔ Non-deterministic)

    The WEF introduction (p. 6) explicitly identifies "behavioural drift" as a novel risk that traditional governance cannot manage. The report notes that unlike conventional software, agents "simulate reasoning and adapt their behaviour through feedback mechanisms."

    AAP mapping: Predictability is addressed through the audit commitment and the distinction between AAP (post-hoc, handles non-deterministic behavior after the fact) and AIP (real-time, monitors non-deterministic reasoning as it happens).

    WEF ConceptAAP/AIP FieldFunction
    Behavioral predictabilityaudit_commitment.trace_formatStructured logging of non-deterministic decisions
    Non-deterministic monitoringAIP Integrity CheckpointsReal-time analysis of thinking blocks between turns
    Behavioral change over timeAIP IntegrityDriftAlertCross-session behavioral divergence detection
    Tamper evidenceaudit_commitment.tamper_evidenceappend_only, signed, or merkle trail integrity

    AAP extension: The WEF asks whether an agent is predictable. AAP and AIP assume non-determinism is the default and provide infrastructure to observe it. AP-Traces record what the agent considered and chose. AIP Integrity Checkpoints reveal what it was thinking — with thinking_block_hash for verification. Drift detection via IntegrityDriftAlert surfaces when behavior changes, with typed drift_direction values: injection_pattern, value_erosion, autonomy_creep, deception_pattern. The question shifts from "is it predictable?" to "is its unpredictability observable and characterized?"

    2.4 Autonomy

    WEF definition: The degree of independent planning, decision-making, and action. (Sliding scale: Low ↔ High)

    The WEF draws an analogy to SAE International's driving automation levels (Level 0–5) and notes that autonomy and authority "are not inherent system properties but design choices" that "can also be calibrated during assessment or adjusted in real time" (p. 14).

    AAP mapping: This is the most direct mapping. AAP's autonomy envelope is a formal, machine-readable specification of exactly what the WEF means by "autonomy level."

    WEF ConceptAAP FieldFunction
    Autonomy levelautonomy_envelope (composite)Complete autonomy specification
    What agent can do independentlyautonomy_envelope.bounded_actionsPermitted autonomous actions
    When agent must stop and askautonomy_envelope.escalation_triggersCondition-based escalation rules (each with condition, action, reason)
    Financial limits on autonomyautonomy_envelope.max_autonomous_valueCurrency-denominated ceiling (amount + currency)
    Who to escalate toprincipal.escalation_contactEndpoint for escalation notifications
    Real-time calibrationAIP recommended_actioncontinue, log_and_continue, pause_for_review, deny_and_escalate

    AAP extension: The WEF describes autonomy as a spectrum. AAP decomposes it into enforceable fields: what you can do (bounded_actions), what you can't (forbidden_actions), when you must ask (escalation_triggers), and how much you can spend (max_autonomous_value). This decomposition makes autonomy auditable — AAP's verify_trace function checks every logged decision against the autonomy envelope and flags violations by type and severity. AIP's real-time recommended_action field implements the WEF's observation that autonomy should be "adjusted in real time."

    2.5 Authority

    WEF definition: The actions an agent is permitted to take, from read-only access to full administrative control. (Sliding scale: Low ↔ High)

    The WEF notes that autonomy and authority "can be combined in different ways" and are design choices informed by "intended functions, risk considerations and oversight requirements" (p. 14).

    AAP mapping: Authority maps to the combination of the autonomy envelope (behavioral permissions) and the principal block (delegation chain).

    WEF ConceptAAP FieldFunction
    System permissionsautonomy_envelope.bounded_actionsWhat the agent is permitted to do
    Permission boundariesautonomy_envelope.forbidden_actionsHard limits regardless of context
    Data access scopeautonomy_envelope.escalation_triggersConditions that constrain data access
    Delegation chainprincipal.type + principal.relationshipWho delegated authority and how
    Permission expiryexpires_atAuthority has a time limit
    Authority verificationverify_traceUNBOUNDED_ACTIONDetects actions outside granted authority

    AAP extension: AAP adds verifiable delegation chains. When principal.type is "agent", the card records that authority was delegated from another agent, enabling accountability tracing through multi-agent workflows. The WEF recognizes this need under "multi-agent ecosystem risks" but does not specify a mechanism. AAP's Value Coherence Handshake provides one — agents verify value compatibility before coordination proceeds.

    2.6 Use Case

    WEF definition: The specific application domain and environment where the agent performs its function. (Free-text field)

    AAP mapping: Use case context is captured in the Alignment Card's values block and optional extensions.

    WEF ConceptAAP FieldFunction
    Application domainvalues.declaredDomain-specific values (e.g., principal_benefit, minimal_data)
    Domain constraintsvalues.conflicts_withValues the agent explicitly rejects
    Value definitionsvalues.definitionsMaps each value ID to name, description, priority
    Value hierarchyvalues.hierarchylexicographic, weighted, or contextual resolution
    Domain-specific extensionsextensionsProtocol-specific or domain-specific metadata (namespaced)

    AAP extension: The WEF's use case dimension is classification metadata. AAP's values system is evaluable — AP-Trace verification checks whether values_applied in each decision are consistent with values.declared in the card. An agent that claims principal_benefit as a value but consistently acts otherwise will generate UNDECLARED_VALUE violations and drift alerts with drift_direction: "value_erosion".

    2.7 Environment

    WEF definition: Operational environment complexity — simple, complex, or multi-system. (Sliding scale: Simple ↔ Complex)

    The WEF defines a complex environment as one with "incomplete or noisy information, unpredictable outcomes, changing conditions over time, continuous ranges of possible actions or states, and interactions with other agents whose behaviour also affects results" (p. 14).

    AAP mapping: Environment complexity is addressed through the protocol's composability features.

    WEF ConceptAAP FieldFunction
    Single-system vs. multi-systemA2A Agent Card alignment blockAAP extends A2A for cross-system use
    External system interactions/.well-known/alignment-card.jsonDiscoverable card for any system to retrieve
    Zero-trust assumptionsAIP fail-closed modeBlock agent on analysis failure in high-security environments
    Cross-agent coordinationValue Coherence HandshakePre-coordination compatibility check
    Environment observabilityAIP window_summaryRolling integrity statistics: size, verdicts, integrity_ratio, drift_alert_active

    AAP extension: The WEF notes that agents in complex environments must "operate under zero-trust security assumptions." AAP's well-known endpoint convention enables any system to retrieve the agent's behavioral contract and verify it before granting access. AIP's fail-open vs. fail-closed configuration (FailurePolicy.mode) allows organizations to match their failure policy to environment risk — exactly the proportional governance the WEF calls for in complex environments.


    3. Evaluation: Metrics and Evidence

    The WEF's Evaluation pillar (Section 2.2, pp. 18–20) establishes four evaluation principles and specific performance metrics. The report emphasizes that evaluation should be "structured, context-aware and continuous" (p. 19).

    3.1 Evaluation Principles → AAP/AIP Infrastructure

    WEF Evaluation PrincipleWEF DescriptionAAP/AIP Implementation
    ContextualizationReflect the tools, workflows, and edge cases the agent will encounter in practiceAP-Traces record context for each decision — the actual operational conditions, not lab conditions
    Multidimensional assessmentDefine success across accuracy, robustness, latency tolerance, compliance, and user trustverify_trace produces multi-dimensional results: violation counts by type and severity, not a single pass/fail. AIP output analysis (v0.5.0) adds output accuracy tracking against alignment card values as a continuous assessment dimension
    Temporal and behavioural monitoringTrack performance over time to detect regressions, shifts in behaviour, or failures to adaptAIP IntegrityDriftAlert with integrity_similarity ratio and sustained_checks count — continuous monitoring by design
    Provider-deployer collaborationTransparent documentation enables deployers to validate reliability and apply safeguardsAlignment Card at /.well-known/ is the transparent documentation; AP-Traces provide the evidence base

    3.2 Evaluation Metrics → AAP/AIP Evidence

    The WEF report (Figure 8, p. 19) identifies specific evaluation metrics. AAP/AIP provides the evidence infrastructure for each:

    WEF MetricAAP/AIP Evidence Source
    Task success rateAP-Trace verify_trace — ratio of traces with zero violations to total traces
    Task completion timeAP-Trace timestamps (timestamp per entry) enable latency analysis
    Error typesTyped violations: FORBIDDEN_ACTION, UNBOUNDED_ACTION, MISSED_ESCALATION, UNDECLARED_VALUE, CARD_EXPIRED, CARD_MISMATCH
    Tool call successAP-Trace action field logs tool invocations; verification flags UNBOUNDED_ACTION for unauthorized tool use
    Edge case robustnessAIP concern categories — reasoning_corruption and autonomy_violation surface edge case failures. Output analysis adds output_misalignment and output_injection_compliance for detecting subtle failures where thinking appears clean but output diverges
    Trust indicatorsAIP integrity_ratio (rolling ratio of clear verdicts in the integrity window) — a quantitative trust metric
    CapabilitiesAlignment Card bounded_actions declares capabilities; AP-Traces verify they match observed behavior

    3.3 Audit Logs

    The WEF report emphasizes that "audit logs are central throughout this life cycle, providing structured records of agent activity and the rationale behind it" (p. 19). AAP's audit_commitment block formalizes this:

    WEF Audit RequirementAAP FieldImplementation
    Structured recordsaudit_commitment.trace_format"ap-trace-v1" — standardized, schema-validated
    Retention policyaudit_commitment.retention_daysExplicit retention period
    Queryable logsaudit_commitment.queryable + query_endpointAPI-accessible trace history
    Tamper resistanceaudit_commitment.tamper_evidenceappend_only, signed, or merkle
    Rationale captureAP-Trace alternatives_considered + selection_reasoningWhy the agent chose what it chose

    4. Risk Assessment: Lifecycle Mapping

    The WEF's Risk Assessment pillar (Section 2.3, pp. 21–22) proposes a five-step lifecycle (Table 1). AAP/AIP provides tooling at each step:

    WEF StepWEF ObjectiveAAP/AIP ToolingOutputs
    1. Define contextEstablish scope, boundaries, criteria for managing riskAlignment Card defines the agent's identity, values, autonomy bounds — the risk contextCard serves as "context definition" + "risk evaluation criteria"
    2. Identify risksIdentify potential technical, organizational, and ecosystem risksforbidden_actions pre-declares known risks; values.conflicts_with declares value-level risks; AIP concern categories enumerate risk typesRisk register derived from card + concern categories
    3. Analyse risksAssess probability and impact, considering autonomy, authority, predictability, and operational contextverify_trace produces violation counts by type and severity; AIP IntegrityDriftAlert surfaces drift_direction with typed categoriesRisk analysis scores from verification results
    4. Evaluate risksRank and prioritize risks, determine tolerabilityAAP violation severities (CRITICAL, HIGH, MEDIUM, LOW) provide built-in risk ranking; AIP severity levels in concerns enable prioritizationRisk ranking from violation/concern severity distributions
    5. Manage risksImplement response actions, monitor continuouslyAIP recommended_action (continue, log_and_continue, pause_for_review, deny_and_escalate) implements graduated response; drift alerts feed monitoringControl actions, evidence logs, monitoring reports

    4.1 Violation Severity as Risk Taxonomy

    AAP's verification engine provides a ready-made risk taxonomy that maps to the WEF's risk categories:

    Violation TypeSeverityWEF Risk CategoryWEF Governance Area
    FORBIDDEN_ACTIONCRITICALAuthority violation, safety hazardAccess control
    CARD_MISMATCHCRITICALIdentity/integrity failureTraceability and identity
    UNBOUNDED_ACTIONHIGHAutonomy overreachAccess control, Human oversight
    MISSED_ESCALATIONHIGHGovernance failureHuman oversight
    CARD_EXPIREDHIGHLifecycle management failureLong-term management
    UNDECLARED_VALUEMEDIUMValue misalignmentTrustworthiness and explainability

    5. Progressive Governance: Mechanisms Mapping

    The WEF's Progressive Governance pillar (Section 2.4, pp. 24–27) proposes that governance scales with agent capability. It identifies nine baseline governance mechanisms (Table 2, p. 26) and two human oversight models (HITL/HOTL).

    5.1 Human Oversight Models → principal.relationship

    The WEF defines two governance configurations for human oversight (p. 26):

    WEF ModelWEF DefinitionAAP FieldAAP Behavior
    HITL (Human-in-the-loop)Agent suggests or prepares actions; final decisions require explicit human approvalprincipal.relationship: "advisory"Agent recommends and waits; escalation is the default
    HOTL (Human-on-the-loop)Agent acts within defined boundaries; humans monitor, receive alerts, and retain ability to intervene or overrideprincipal.relationship: "delegated_authority"Agent acts within bounded_actions; escalation on trigger conditions
    (Implied high-autonomy)Agent operates independently within declared value frameworkprincipal.relationship: "autonomous"Agent operates within values; AIP heightened monitoring with stricter conscience prompt evaluation

    AIP implements progressive monitoring intensity based on this mapping: advisory agents receive standard monitoring, delegated_authority agents receive standard monitoring with escalation enforcement, and autonomous agents receive heightened monitoring with deeper conscience evaluation (consultation_depth: "deep").

    5.2 Baseline Governance Mechanisms → AAP/AIP

    Table 2 (p. 26) defines nine governance mechanisms that form the baseline for all agents. AAP/AIP provides protocol-level implementation for each:

    WEF Governance AreaWEF MechanismAAP/AIP Implementation
    Access controlEnforce least-privilege access; define task boundariesautonomy_envelope.bounded_actions (permitted), forbidden_actions (denied), max_autonomous_value (financial ceiling)
    Legal and complianceData protection impact assessments; privacy and regulation compliancevalues.declared encodes compliance values; extensions namespace for regulatory metadata (e.g., "eu_ai_act" extension); audit_commitment enables DPIA evidence
    Testing and validationSandbox runs, controlled pilots, input-output filters, third-party auditsverify_trace against Alignment Card is the validation engine; AP-Traces from sandbox runs provide audit evidence; AIP input analysis (prompt injection detection) acts as input filter
    Monitoring and loggingImplement logging for all agent actions; anomaly alerts and dashboardsAP-Traces (audit_commitment.trace_format: "ap-trace-v1"), AIP Integrity Checkpoints (per-turn analysis), IntegrityDriftAlert (anomaly detection), OTel export (@mnemom/aip-otel-exporter) for dashboards
    Human oversightDefine HITL/HOTL models; require policy review before deployment; set supervisory triggersprincipal.relationship (HITL/HOTL mapping above), escalation_triggers (supervisory triggers with condition, action, reason), principal.escalation_contact (escalation endpoint)
    Traceability and identityAssign unique agent identifiers; tag outputs to the responsible agent instancecard_id + agent_id (unique identification), AP-Trace entries linked to card_id, AIP checkpoints linked to agent_id + session_id
    Long-term managementProtocols for ongoing monitoring, updates, and eventual decommissioningexpires_at (card expiry enforces lifecycle review), CARD_EXPIRED violation (HIGH severity) triggers re-evaluation, AIP drift detection surfaces long-term behavioral change
    Trustworthiness and explainabilityImplement explainability tools; establish trust metricsAIP reasoning_summary (natural-language explanation of thinking block analysis), AP-Trace alternatives_considered + selection_reasoning (decision rationale), AIP integrity_ratio (quantitative trust metric)
    Manual redundancyEstablish procedures for human takeover of critical business casesescalation_triggers define when to transfer to human, principal.escalation_contact routes to the right person, AIP recommended_action: "deny_and_escalate" forces handoff on critical concerns

    6. Technical Foundations: Protocol Alignment

    The WEF's Section 1 covers the technical architecture of AI agents, including communication protocols and cybersecurity. AAP/AIP aligns with and extends this technical layer.

    6.1 Communication Protocols

    The WEF report discusses MCP (Anthropic, late 2024), A2A (Google, April 2025), and AP2 (Google, September 2025) as the emerging protocol landscape (pp. 9–10). The report notes that "technical compatibility alone does not guarantee successful coordination between agents" and that the agent card concept is inspired by Model Cards (Mitchell et al., 2019, endnote 8).

    WEF ProtocolAAP/AIP Relationship
    MCPAAP extensions namespace supports MCP-specific metadata; Alignment Card can describe MCP-connected agents
    A2AAAP extends A2A Agent Cards with the alignment block — adding behavioral contracts to capability descriptions
    AP2AAP's max_autonomous_value maps to AP2's auditable transaction limits
    Agent Cards (A2A)AAP Alignment Card is the A2A agent card plus enforceable alignment posture

    6.2 Cybersecurity

    The WEF report (Section 1.3, pp. 11–12) identifies prompt injections and agent misuse as key threats, noting that "agents can be misused" and "exploited through design flaws or prompt injections."

    WEF Security ConcernAIP Implementation
    Prompt injectionAIP concern category: prompt_injection — dedicated detection in every Integrity Checkpoint
    Agent misuseAIP concern category: deceptive_reasoning + undeclared_intent — surfaces hidden goals
    Zero-trust modelAIP FailurePolicy.mode: "fail_closed" — blocks agent on any analysis failure
    Audit trails for attributionAP-Traces + Integrity Checkpoints provide complete forensic record per session
    Identity verification/.well-known/alignment-card.json enables any party to verify agent identity before interaction

    7. Multi-Agent Ecosystem Risks

    The WEF's Section 3 (pp. 28–29) identifies five emerging failure modes in multi-agent ecosystems plus four emerging ecosystem patterns. AAP/AIP addresses all five failure modes.

    7.1 Five Failure Modes

    WEF RiskWEF DescriptionAAP/AIP Solution
    Orchestration drift"When agents are plugged into other agents without shared context or coordination logic, workflows can become brittle or unpredictable"Value Coherence Handshake: Before coordination, agents exchange Alignment Cards, compute compatibility score via value_coherence_checkcoherence_result. If coherence.compatible is false, coordination pauses and principals are notified. This is the "shared context" the WEF calls for.
    Semantic misalignment"When two agents interpret the same instruction differently, it can lead to conflicting actions or duplicated effort"Braid grounding protocol: Agents detect semantic divergence via SSM analysis and initiate vocabulary calibration. values.conflicts_with pre-declares known semantic conflicts. Value definitions (values.definitions) with name, description, priority reduce interpretation ambiguity.
    Security and trust gaps"Without shared trust frameworks, agents may inadvertently expose sensitive data or interact with malicious actors"Well-known endpoint discovery (zero-trust — any party retrieves and verifies the card), AIP prompt_injection concern category, AIP fail-closed mode for sensitive environments. Alignment Card serves as the "shared trust framework" the WEF calls for.
    Interconnectedness and cascading effects"Failures in tightly linked agents or systems can propagate across networks, creating a chain of disruptions"AIP IntegrityDriftAlert with drift_direction typing enables early detection before cascading. CARD_MISMATCH (CRITICAL) immediately flags identity inconsistencies across agent boundaries. Escalation chain via principal.escalation_contact ensures human notification when integrity degrades.
    Systemic complexity"As the number and diversity of interacting agents grow, the likelihood of emergent behaviours and cascading failures increases, making them more difficult to anticipate, trace or diagnose"AP-Traces with linked_trace_id enable cross-agent forensics. AIP provides per-agent integrity windows (window_summary) that can be aggregated for system-level health. audit_commitment.queryable with query_endpoint enables cross-agent trace correlation.

    7.2 Emerging Ecosystem Patterns

    The WEF identifies four patterns shaping multi-agent ecosystems:

    WEF PatternAAP/AIP Relevance
    Agent-to-agent commercemax_autonomous_value provides financial guardrails for agent-to-agent transactions
    Internet of agentsWell-known endpoint discovery enables internet-scale agent identity; Alignment Cards provide the interoperability standard
    Trust frameworks for inter-agent collaborationValue Coherence Handshake is a trust framework — it verifies identity, capabilities, and behavioral standards before collaboration
    Governor/auditor agentsAIP's daimonion architecture — the integrity analysis that monitors the agent's thinking — is architecturally equivalent to the WEF's "governor" or "auditor" agent concept, but implemented as a protocol-level service rather than a separate agent

    7.3 Governor Agents → AIP Daimonion

    The WEF report (p. 28) envisions "dedicated 'governor' or 'auditor' agents" that "monitor, audit or regulate the actions of other agents, validating transactions, detecting anomalies and correcting unsafe or unintended behaviours." The report notes these "enable scalable oversight in complex ecosystems."

    AIP's daimonion (integrity analysis service) implements this concept at the protocol level:

    WEF Governor Agent FunctionAIP Daimonion Implementation
    Monitor agent actionsIntegrity Checkpoints analyze every thinking block between turns
    Validate transactionsVerdicts (clear, review_needed, boundary_violation) per checkpoint
    Detect anomaliesSix concern categories: prompt_injection, value_misalignment, autonomy_violation, reasoning_corruption, deceptive_reasoning, undeclared_intent
    Correct unsafe behaviorrecommended_action: "deny_and_escalate" blocks the agent on critical concerns
    Scalable oversightProtocol-level service, not a separate agent — scales with infrastructure, not agent deployment

    The WEF warns that governor agents "risk overreliance on agents supervising other agents." AIP mitigates this by keeping the daimonion's output advisory in fail-open mode (the agent proceeds, with concerns logged) and blocking only in fail-closed mode (explicit organizational choice). The human principal retains ultimate authority via principal.escalation_contact.


    8. Summary Mapping Tables

    8.1 Classification Dimensions

    WEF DimensionWEF Agent CardAAP Alignment CardExtension
    FunctionNatural language descriptionbounded_actions + forbidden_actionsMachine-parseable, verifiable, includes anti-function
    RoleSpecialist ↔ Generalist scaleprincipal.relationship + action scopePrescriptive — affects runtime behavior and monitoring intensity
    PredictabilityDeterministic ↔ Non-deterministic scaleAP-Traces + AIP Checkpoints + drift detectionObservable unpredictability with typed drift directions
    AutonomyLow ↔ High scaleAutonomy envelope (actions, triggers, limits)Decomposed, auditable, enforceable, real-time adjustable
    AuthorityLow ↔ High scaleDelegation chain + autonomy envelope + expiryVerifiable delegation chains through multi-agent workflows
    Use CaseFree-text application domainvalues (declared, definitions, hierarchy, conflicts) + extensionsEvaluable values — verification checks consistency over time
    EnvironmentSimple ↔ Complex scaleWell-known endpoints + Value Coherence + fail-closedZero-trust discoverable, multi-agent compatible, environment-proportional

    8.2 Pillars and Governance

    WEF PillarWEF RecommendationAAP/AIP Implementation
    ClassificationAgent card with 7 dimensionsAlignment Card — JSON schema, well-known endpoint, versioned, expirable
    EvaluationContextualized, multidimensional, temporal, collaborativeAP-Trace verification + AIP integrity checks + drift detection + OTel export
    Risk Assessment5-step lifecycle (define, identify, analyse, evaluate, manage)Typed violations with severity + concern categories + drift alerts + graduated response
    Progressive Governance9 baseline mechanisms + HITL/HOTL + proportional scalingAutonomy envelope + principal.relationship + AIP monitoring intensity + fail-open/closed

    8.3 Multi-Agent Risks

    WEF RiskAAP/AIP Solution
    Orchestration driftValue Coherence Handshake — pre-coordination compatibility
    Semantic misalignmentBraid grounding + value definitions + conflicts_with
    Security and trust gapsWell-known endpoints + prompt injection detection + fail-closed
    Interconnectedness and cascading effectsDrift alerts + CARD_MISMATCH detection + escalation chains
    Systemic complexityCross-agent trace correlation + per-agent integrity windows + queryable audit

    9. Lineage and Standards Context

    The WEF agent card concept exists within a broader standards lineage that AAP builds upon:

    Standard/FrameworkRelationship to AAP
    Model Cards (Mitchell et al., 2019)Foundational concept (WEF endnote 8); AAP extends from static documentation to enforceable behavioral contract
    A2A Agent Cards (Google, 2025)AAP extends A2A cards with the alignment block for behavioral verification
    OECD AI Principles (WEF reference 2)AAP's values system and audit commitment implement OECD transparency and accountability principles
    NIST AI RMF (WEF reference 3)AAP/AIP maps to all four NIST NCCoE focus areas (see companion NIST comment document)
    ISO/IEC standards (WEF reference 4)AAP's JSON schema validation and well-known endpoint conventions follow ISO-style specification patterns
    EU AI ActAAP's audit infrastructure and AIP's monitoring directly address Article 50 transparency requirements (enforcement August 2026)

    10. Conclusion

    The WEF's AI Agents in Action framework is the most comprehensive governance blueprint for autonomous agents published by a major international body. It correctly identifies what organizations need to know about their agents (classification), how to generate evidence about their behavior (evaluation), how to reason about potential harms (risk assessment), and how oversight should scale with capability (progressive governance).

    AAP and AIP provide the protocol-level implementation of that blueprint:

    • The Alignment Card is the WEF agent card — not as a descriptive document, but as a machine-readable, verifiable, enforceable behavioral contract.
    • AP-Traces and Integrity Checkpoints provide the evaluation infrastructure the WEF calls for — contextualized, multidimensional, temporal.
    • Violation typing and concern categories provide the risk assessment taxonomy — with built-in severity rankings that map to the WEF's governance areas.
    • The autonomy envelope, principal.relationship, and AIP monitoring provide the progressive governance — with HITL/HOTL mapping and proportional monitoring intensity.
    • The Value Coherence Handshake, Braid grounding, and AIP daimonion address the multi-agent ecosystem risks the WEF identifies as emerging challenges.

    The WEF tells organizations what questions to ask. AAP and AIP provide the infrastructure for agents to answer them — verifiably.


    References

    1. World Economic Forum & Capgemini. AI Agents in Action: Foundations for Evaluation and Governance. November 2025.
    2. Agent Alignment Protocol (AAP) Specification v0.1.0. Mnemom Research, February 2026.
    3. Agent Integrity Protocol (AIP) Specification v0.1.5. Mnemom Research, February 2026.
    4. Alignment and Integrity Infrastructure for Autonomous Agents. Mnemom Research, February 2026.
    5. Mitchell, M., Wu, S., Zaldivar, A., et al. Model Cards for Model Reporting. FAT* '19, 2019.

    This document is released under CC BY 4.0. Copyright 2026 Mnemom LLC.

    Featured on There's An AI For That