Response to NIST AI Agent Standards Initiative Request for Information

Verifiable Agent Departure and Arrival Ceremonies for AI Agent Interoperability
Warren Koch, EXIT Protocol Project
March 2026
NIST-2025-0035-0001

1. Executive Summary

This response presents the Passage Protocol — a pair of open-source specifications (EXIT v1.2 and ENTRY v1.0) and reference implementations for creating verifiable, cryptographically signed records of AI agent departures from and arrivals into digital systems. The protocol addresses a structural gap in the current AI agent ecosystem: no standardized mechanism exists for agents to portably prove where they have been, how they left, and under what standing — information critical to trust, safety, interoperability, and security assessment in multi-agent environments.

This is a protocol proposal offered as a starting point for discussion, not a definitive or dogmatic solution. We welcome adaptation, extension, critique, and alternative approaches that address the same structural gap.

The protocol is implemented across five npm packages (cellar-door-exit@0.2.2, cellar-door-entry@0.1.2, @cellar-door/mcp-server@0.1.3, @cellar-door/langchain@0.1.3, @cellar-door/vercel-ai-sdk@0.1.4) with 592 passing tests (456 EXIT + 80 ENTRY + 56 framework integrations). It is Apache 2.0 licensed, developed in the open across six GitHub repositories, and designed to be non-custodial (no central registry required), interoperable (JSON-LD, W3C DID-compatible), and safe by default (anti-weaponization clauses, coercion detection, sunset policies).

The protocol has undergone structured AI-simulated adversarial review across legal, domain, and security perspectives. This is not a substitute for formal human expert review, which has not yet been conducted.


2. Mapping to NIST RFI Questions

This section directly addresses NIST's prioritized questions from the AI Agent Standards Initiative RFI.

2.1 Question 1(a): Unique Security Threats from Agentic AI

Agent lock-in — the inability of agents to depart platforms with verifiable records — constitutes a security vulnerability specific to agentic AI systems. When agents cannot produce portable departure records:

The Passage Protocol proposes EXIT and ENTRY markers as security infrastructure that makes these threats observable and auditable.

2.2 Question 1(d): How Agents Differ from Non-Agentic AI

Non-agentic AI systems operate within a single deployment boundary. Agentic AI systems cross organizational and platform boundaries, creating lifecycle transitions — departures and arrivals — that have no analog in traditional AI deployment. These transitions create novel security surfaces: unauditable movements, non-portable reputation, and the inability to verify an agent's prior operational history at a new platform. The Passage Protocol addresses this by treating departure and arrival as first-class lifecycle events with cryptographic verification.

2.3 Question 2(a): Technical Controls for Agent Security

The Passage Protocol proposes the following technical controls for agent lifecycle management:

2.4 Question 2(e): Relevant Frameworks and Standards

The Passage Protocol aligns with and extends:

StandardRelationship
NIST AI 100-1 (AI RMF)EXIT markers provide Govern and Manage function artifacts
NIST AI 600-1 (GenAI Profile)Addresses agent mobility risks in generative AI deployments
NIST SP 800-53 Rev 5AU-2 (Audit Events), AU-3 (Content), SI-4 (Monitoring), AC-2 (Account Management)
NIST SP 800-63-3DID verification parallels identity proofing (IAL)
NIST SP 800-61 Rev 3EXIT markers as forensic artifacts for incident response
ISO/IEC 42001Markers as auditable controls within AI management systems
ISO/IEC 23894Supports traceability requirements in AI risk management
W3C DID Core / VCs 2.0Subject identifiers use DIDs; markers wrappable as VCs
FIPA Agent ManagementExtends FIPA lifecycle model to departure/arrival
IEEE P2247 / P3119Complements ethical governance and procurement compliance
EU Digital Markets ActSupports Art. 6(9) data portability requirements

2.5 Question 3(a): Security Assessment Methods

EXIT markers and Passage histories function as assessment artifacts: standardized, machine-readable records of agent lifecycle events. Security teams can:

2.6 Question 3(b): Assessment Across Agent Lifecycle

The Passage Protocol addresses assessment at lifecycle boundaries — the points where agents transition between platforms. These boundaries are currently unassessable because no standardized artifacts exist. EXIT markers at departure and ENTRY markers at arrival create assessable checkpoints throughout an agent's cross-platform lifecycle.

2.7 Question 4(a): Deployment Environment Governance

Admission policies in the ENTRY protocol provide a mechanism for constraining deployment environments. Platforms define what agents they admit, under what conditions, and with what capability restrictions. Probation and capability scoping implement the principle of least privilege for arriving agents. These mechanisms allow platforms to modify their effective deployment environment in response to security signals embedded in EXIT markers.

2.8 Question 4(b): Governance Across Deployment Environments

The Passage Protocol enables governance across heterogeneous deployment environments without requiring a central authority. Each platform maintains sovereignty over its admission decisions (per the anti-coordination clause prohibiting shared exclusion databases), while the standardized marker format enables interoperability. The discovery protocol (.well-known/exit-protocol) enables platforms to advertise their EXIT/ENTRY capabilities, facilitating ecosystem-wide governance visibility.

2.9 Question 4(d): Deployment Monitoring

Standardized departure and arrival records enable monitoring for anomalous agent migration patterns:

Without a common format for lifecycle events, these patterns are invisible to platform operators.


3. Problem Statement

AI agents are already crossing platform boundaries. Every time an agent accesses an external service, calls a tool, or interacts with another system, it is capable of sharing portions of its context, instructions, or data with that service. These cross-boundary movements happen constantly in agentic AI systems today — they are the operational reality of tool use, API access, and multi-agent orchestration.

What does not exist is any standardized way to track, verify, or audit these movements. We have not yet seen complex chain-reaction effects from untracked agent mobility — cascading compromises across platforms, coordinated exfiltration through tool-use chains, or identity spoofing across organizational boundaries. But the structural conditions for such incidents are already present. When they occur, we will want the ability to trace agent provenance across systems and to layer identity verification and accountability onto cross-platform movements. Verifiable departure and arrival records are the necessary base layer for that complex order to form.

Industry standards have emerged for agent communication (A2A), tool access (MCP), agent discovery (OASF), and payment authorization (AP2). Yet no standard addresses what happens when an agent leaves one platform and arrives at another.

Today, when an agent departs:

These are structural consequences of an ecosystem where agent identity, reputation, and mobility lack interoperable standards — and they carry direct security implications.


4. What the Passage Protocol Is

The Passage Protocol defines two complementary ceremonies:

EXIT (v1.2) defines a departure ceremony — a structured, state-machine-governed process producing a cryptographically signed departure marker (~335 bytes unsigned, ~660 bytes signed). The marker records who departed, from where, when, how, and under what standing.

ENTRY (v1.0) defines an arrival ceremony — destination platforms verify EXIT markers and issue signed arrival markers. Together, a verified EXIT-ENTRY pair constitutes a Proof of Passage (PoP).

4.1 Core Design Principles

4.2 Ceremony State Machine

The departure ceremony follows a seven-state machine with three paths:

Critical invariant (D-006): DEPARTED is terminal. Disputes modify metadata but cannot prevent departure.

4.3 Exit Types

Eight exit types capture departure scenarios: voluntary, forced, emergency, keyCompromise, platform_shutdown, directed, constructive, and acquisition.

4.4 Optional Modules

ModulePurpose
A: LineagePredecessor/successor chains for agent continuity
B: State SnapshotContent-addressed reference to system state at departure
C: Dispute BundleEvidence preservation, challenge windows, right of reply (v1.2: dispute expiry, resolution tracking, arbiter DID)
D: EconomicAsset manifests and obligation tracking (declarations, not transfer instruments)
E: MetadataHuman-readable narrative, reasons, tags
F: Cross-Domain AnchoringOn-chain or external registry anchoring with Merkle batch operations

4.5 V1.2 Enhancements

EXIT v1.2 adds several features relevant to NIST's security and interoperability concerns:

4.6 ENTRY Protocol

ENTRY v1.0 defines:


5. Technical Architecture

5.1 Cryptographic Foundation

5.2 Trust Mechanisms

Illustrative mechanisms for higher-layer protocol consumption (not normative L0 components):

5.3 Safety Guardrails

Four heuristic detection systems provide ethical guardrails:

  1. Coercion Detection — identifies retaliation, conflicting status signals, suspicious emergency patterns
  2. Weaponization Detection — cross-marker analysis detecting systematic abuse of forced-exit mechanisms
  3. Reputation Laundering Detection — per-subject analysis detecting identity cycling
  4. Ethical Compliance Validation — checks for transparency violations

These are advisory signals for human review, not automated enforcement.

5.4 Anchoring


6. Implementation Status

6.1 Packages

PackageVersionDescription
cellar-door-exit0.2.2Core EXIT protocol — markers, signing, verification, ceremonies, modules, ethics, KERI, privacy, anchoring, amendments, revocations
cellar-door-entry0.1.2ENTRY protocol — arrival markers, admission policies, probation, capability scoping, claim tracking, revocation, passage verification
@cellar-door/langchain0.1.3LangChain integration — EXIT as an agent tool
@cellar-door/vercel-ai-sdk0.1.4Vercel AI SDK integration — EXIT as middleware
@cellar-door/mcp-server0.1.3Model Context Protocol server — EXIT tools exposed via MCP

6.2 Test Coverage

6.3 Performance

Sub-millisecond ceremony timing. Ed25519 signing: 0.46 ms. Full verification including schema validation: 1.9 ms. Cooperative ceremony: 0.91 ms. Core markers: ~335 bytes unsigned, ~660 bytes signed.

6.4 Framework Integrations


7. Legal and Regulatory Analysis

7.1 Review Process

The protocol has undergone structured adversarial analysis using AI-simulated domain-expert review. This included:

This process is not a substitute for formal human expert review or security audit, which the project has not yet undergone. It is a structured method for identifying potential weaknesses across domains that a solo developer would otherwise miss.

7.2 Key Legal Findings


8. Recommendations for NIST

We offer these recommendations as proposals for NIST's consideration, informed by our experience developing the Passage Protocol. We recognize NIST will integrate input from many stakeholders and perspectives.

8.1 Standardize Agent Mobility Primitives

Agent departure and arrival are fundamental lifecycle events currently absent from agent standards. NIST standards could define or reference verifiable mechanisms for these events, ensuring agents can move between systems with cryptographic proof of their history and standing.

8.2 Treat Departure Availability as a Security Property

Standards governing AI agent lifecycle could ensure that agents (or their operators) can always initiate departure. Blocking exit creates lock-in, enables exploitation, and removes a critical safety mechanism. The Passage Protocol's invariant — disputes are recorded but never prevent departure — illustrates one approach.

8.3 Separate Departure from Admission

Standards could recognize the asymmetry between leaving and arriving. Departure is a safety-critical capability. Admission is a platform's legitimate prerogative. Conflating the two risks either unsafe systems (exit can be blocked) or insecure ones (admission cannot be controlled).

8.4 Encourage Graduated Trust Models

Self-attested reputation is cheap talk. Origin-attested reputation may be weaponized. Standards could encourage trust models that honestly label the provenance and strength of trust signals rather than treating all attestations as equivalent.

8.5 Favor Non-Custodial Architectures

Agent mobility standards could avoid requiring a central registry controlled by any single entity. Non-custodial, content-addressed, cryptographically signed artifacts — verifiable by any party without a network call — provide a strong foundation for a decentralized agent ecosystem.

8.6 Include Anti-Weaponization Provisions

Any standard creating portable reputation or status records should include provisions against their use as blacklists or exclusion databases. Without such provisions, mobility infrastructure risks becoming surveillance infrastructure.

Zero-knowledge proof techniques offer a promising path here: agents could prove properties of their departure history (e.g., "departed in good standing from at least three platforms") without revealing which platforms, when, or other identifying details. The current Passage Protocol supports field-level redaction as a partial measure, but ZK-based selective disclosure would provide cryptographic guarantees rather than policy-based ones. We recommend NIST consider privacy-preserving verification as a design requirement for any agent mobility standard.


9. About the Submitter

Warren Koch is the creator of the Passage Protocol project, based in British Columbia, Canada. The project is open source under Apache 2.0, with no venture funding or commercial obligations. The protocol was developed to address a structural gap in the AI agent ecosystem identified through direct experience building agent systems.

The project maintains six public GitHub repositories, five published npm packages, and two protocol specifications (EXIT v1.2, ENTRY v1.0) that have undergone structured AI-simulated adversarial review across legal, domain, and security perspectives. No formal human expert review or security audit has been conducted.

This response is offered in the collaborative spirit of NIST's initiative. The Passage Protocol is one possible approach to agent lifecycle standardization — a concrete starting point for discussion, not a finished answer. We welcome feedback, critique, and engagement from the NIST community and fellow respondents.

Contact: warrenkoch@gmail.com
License: Apache 2.0
Specifications: EXIT Protocol v1.2, ENTRY Protocol v1.0
Code: https://github.com/CellarDoorExits


This response is submitted to the NIST AI Agent Standards Initiative Request for Information (NIST-2025-0035-0001). The views expressed are those of the submitter and do not represent any organization or employer.

There's always a door...

𓉸