Provenance
Which domain, owner, profile and package generated the data.
A JSON file can be copied, stale, incomplete or misleading. The next step for agentic web infrastructure is provenance: who published this profile, when it changed, whether it is signed, and what access level each reader has.
Trust is not only legal paperwork. It is operational clarity for machines.
Which domain, owner, profile and package generated the data.
When the data was last reviewed, updated or checked by the website scanner.
Whether the Agent Card, canonical profile, website files and public site tell the same story.
A2A v1 introduces signatures and canonicalization so an Agent Card can become a verifiable trust object.
Unsigned, signed, invalid signature, unknown issuer or verified issuer.
Stable JSON canonicalization matters because signatures must verify the same object across systems.
A registry can show which cards are signed, fresh, reachable and consistent with the website.
Not every capability belongs in public. Public cards can stay safe while authenticated clients see more.
| Public | Basic identity, documentation URL, public skills, supported interfaces and general security requirements. |
|---|---|
| Authenticated | Extended capabilities, private routes, partner-only actions, scopes and richer task contracts. |
| Owner-controlled | Rules for what agents can do, what requires human confirmation and where the buyer is handed off. |