AIP-02: Capability Model
Abstract#
Defines the hierarchical capability system governing all execution authority.
Capability Structure#
Capabilities MUST follow: category.subcategory.action
Examples:
-
device.file.read
-
wallet.sign.transaction
-
net.fetch
-
storage.put
-
k8s.pod.exec
Normative Requirements#
-
Every tool invocation MUST declare its required capability.
-
Capabilities MUST be validated before execution.
-
Capability validation MUST precede policy evaluation for a given tool call.
-
Unspecified capabilities MUST default to DENY.
-
Capability escalation MUST NOT occur implicitly.
-
Capability registry updates MUST be versioned and auditable.
-
Capability names MUST remain backward compatible; deprecated capabilities MUST remain resolvable.
-
Implementations SHOULD support capability scoping (domain, workspace, environment).
Legal Consideration#
Capability boundaries define explicit authority limits and reduce ambiguity about delegated authority.