Policy Brief

AI Agent Provenance: A Critical Infrastructure Gap

Audience: CISA, defense/intelligence, cybersecurity policy.

Autonomous AI agents are already operating across critical infrastructure: financial systems, cloud platforms, development pipelines, and operational technology. These agents move between systems, make decisions, and execute actions with increasing independence.

The threat

A compromised AI agent can currently move between platforms with no verifiable history. There is no standardized mechanism to:

This is equivalent to allowing unregistered vehicles on highways with no license plates, no VIN, and no title history.

Attack scenarios enabled by this gap

What EXIT Protocol provides

Current status

Recommendation

Include AI agent provenance requirements in CISA's forthcoming AI security guidance. EXIT Protocol provides a reference implementation that can be evaluated immediately.