G

Agent Binding Model

Agent Binding Model

Version: GD/1.2 — Module: Identity Model


Definition#

AI agents operate under domain authority. They are not independent identities. They inherit authority from the parent domain — and that authority is explicit, scoped, and revocable.

Without a domain-anchored identity, an AI agent is a black box: unknown authorization, unknown scope, no accountability. With Gao Domain, every agent is a verifiable entity under a known authority.


Structure#

merchant.gao
├── Owner Key (root authority)
└── Agent Keys (scoped, delegated)
    ├── assistant.merchant.gao   [read:data, respond:messages]
    ├── booking.merchant.gao     [read:calendar, write:appointments]
    └── pay-agent.merchant.gao   [initiate:payment ≤ $200]

Agents are bound as subdomains of the parent domain. They inherit the parent’s trust badge. A ✅ Business Verified merchant means every agent under that merchant is also ✅ Business Verified — verifiably so.


Permission Model#

Each agent has an explicit permission scope defined at binding time:

{
  "agent_domain": "assistant.merchant.gao",
  "parent_domain": "merchant.gao",
  "public_key":    "0xAGENT_KEY...",
  "scope":         ["read:data", "respond:messages", "schedule:appointments"],
  "created_at":    "2026-02-01T00:00:00Z",
  "expires_at":    "2027-01-01T00:00:00Z",
  "revocable":     true,
  "active":        true
}

Example Agent Scopes

Agent

Permitted

Not Permitted

assistant.merchant.gao

Read data, respond to messages, schedule appointments

Access financial data, make payments

booking.merchant.gao

Read calendar, write appointments, send confirmations

Access payment records, modify pricing

pay-agent.merchant.gao

Initiate payments ≤ $200, issue receipts

Access private keys, exceed payment limit


Security Principles#

Cannot escalate. An agent authorized for booking cannot grant itself payment permissions. Scope is set at binding time by the owner key. No in-flight escalation is possible.

Cannot override owner. The owner key is the root authority. An agent operating under merchant.gao cannot modify the domain’s wallet mapping, change ownership, or grant additional permissions to itself.

Explicit, not implicit. Agents have only the permissions the owner assigns. There are no default permissions. An agent with no scope has no authority.

Time-bound. Permissions automatically expire on the set date. No agent can hold permanent authority without the owner actively renewing it.

Instantly revocable. The owner can revoke any agent’s authority at any time. Revocation takes effect immediately — no grace period for the agent.


Verification#

Any external system can verify an agent’s identity and authority scope before accepting its requests:

GET /v1/agent/verify?domain=assistant.merchant.gao&action=schedule_appointment
{
  "agent_domain":      "assistant.merchant.gao",
  "parent_domain":     "merchant.gao",
  "authorized":        true,
  "scope":             ["read:data", "respond:messages", "schedule:appointments"],
  "action_permitted":  true,
  "action_requested":  "schedule_appointment",
  "expires_at":        "2027-01-01T00:00:00Z",
  "parent_trust_level": 2,
  "parent_trust_label": "Business Verified"
}

If the action is outside scope:

{
  "authorized":        true,
  "action_permitted":  false,
  "action_requested":  "initiate_payment",
  "reason":            "Action 'initiate_payment' is outside the declared scope for this agent."
}

---

### Trust Inheritance

The agent inherits the parent domain’s trust badge. If `merchant.gao` is `✅ Business Verified`, then `assistant.merchant.gao` displays as:

🤖 assistant.merchant.gao ✅ Authorized agent of merchant.gao Business Verified — Merchant Inc · Houston, TX Scope: read:data, respond:messages, schedule:appointments Expires: 2027-01-01


An unverified parent produces an unverified agent  regardless of what the agent claims about itself. The trust signal cannot be spoofed through the agent path.

---

### Integration with Layer 8 (Gao AI OS)

When an AI agent operates through Gao AI OS (Layer 8), the agent binding at Layer 5 (Domain) provides the authority anchor for the CAP token system at Layer 8.

Layer 5 — Gao Domain agent.merchant.gao [scope: booking, payment ≤ $200] ↓ Layer 8 — Gao AI OS CAP token issued within domain scope GAR v1 validates CAP against domain binding Receipt references both agent_domain and parent_domain


The domain binding is the root that makes the Layer 8 execution auditable end-to-end: from domain authority  CAP grant  execution  on-chain receipt.

---

### Why This Matters

**The problem without agent identity:**

-   An AI agent contacts your business. You have no way to know who authorized it, what it is permitted to do, or how to hold it accountable.
    
-   A scammer deploys an agent claiming to be from a known company. There is no verification mechanism.
    

**With Gao Domain agent binding:**

-   Every agent has a verifiable identity under a known domain
    
-   The parent domain’s trust badge signals the trustworthiness of the agent
    
-   Scope is verifiable on-demand by any system
    
-   Expiry is automatic  no persistent, unchecked access
    
-   Revocation is immediate and cryptographically enforced
    

This is the foundation that makes a trustworthy multi-agent internet possible.

---

_Agent binding is one capability of the identity container. See Identity Container for the full model. For Layer 8 AI OS execution, see Gao AI OS documentation._