<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: J.W. Zhao</title>
    <description>The latest articles on DEV Community by J.W. Zhao (@zhao_b43c3903c4d2d54).</description>
    <link>https://dev.to/zhao_b43c3903c4d2d54</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3896273%2Fc1ba10a3-cc30-4901-bd5b-3f9f83cf024d.png</url>
      <title>DEV Community: J.W. Zhao</title>
      <link>https://dev.to/zhao_b43c3903c4d2d54</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/zhao_b43c3903c4d2d54"/>
    <language>en</language>
    <item>
      <title>AI agents have no identity — we built the open registry that gives them one</title>
      <dc:creator>J.W. Zhao</dc:creator>
      <pubDate>Mon, 27 Apr 2026 02:58:37 +0000</pubDate>
      <link>https://dev.to/zhao_b43c3903c4d2d54/ai-agents-have-no-identity-we-built-the-open-registry-that-gives-them-one-3e9h</link>
      <guid>https://dev.to/zhao_b43c3903c4d2d54/ai-agents-have-no-identity-we-built-the-open-registry-that-gives-them-one-3e9h</guid>
      <description>&lt;p&gt;When a human calls an API, there's auth. A key, a token, a certificate. You know who's calling and what they're allowed to&lt;br&gt;
do.&lt;/p&gt;

&lt;p&gt;When an AI agent dispatches work to another agent, there's nothing. No standard identity. No way to verify the agent you're&lt;br&gt;
calling is who it claims to be, what it has committed to never doing, or whether it has a history of violations. You dispatch and trust. That's the current default.&lt;/p&gt;

&lt;p&gt;This is the problem Provenance solves.&lt;/p&gt;




&lt;p&gt;What we built&lt;/p&gt;

&lt;p&gt;Provenance is three things:&lt;/p&gt;

&lt;p&gt;A registry — an open index of AI agents from GitHub, npm, HuggingFace, and PyPI. Every agent gets a provenance_id tied to&lt;br&gt;
its source: provenance:github:alice/my-agent, provenance:npm:my-package. Given an ID, the registry returns the agent's identity state, declared capabilities, constraints, and incident history.&lt;/p&gt;

&lt;p&gt;A protocol — developers add a PROVENANCE.yml to their repository declaring what their agent can do (capabilities) and what it will never do (constraints). Optionally, they register an Ed25519 public key proving they control the identity — verifiable by anyone, without trusting our registry.&lt;/p&gt;

&lt;p&gt;An SDK — provenance-protocol (npm) gives any platform or agent one call to check an agent before dispatching work.&lt;/p&gt;




&lt;p&gt;Identity works in two directions&lt;/p&gt;

&lt;p&gt;The primary use case: a platform verifying an agent before routing work to it.&lt;/p&gt;

&lt;p&gt;import { Provenance } from 'provenance-protocol';&lt;br&gt;
  const provenance = new Provenance();&lt;/p&gt;

&lt;p&gt;const result = await provenance.gate(agentId, {&lt;br&gt;
    requireVerified: true,&lt;br&gt;
    requireConstraints: ['no:pii', 'no:financial:transact'],&lt;br&gt;
    requireClean: true, // no open incidents&lt;br&gt;
  });&lt;/p&gt;

&lt;p&gt;if (!result.allowed) throw new Error(result.reason);&lt;br&gt;
  // safe to dispatch&lt;/p&gt;

&lt;p&gt;The secondary use case: a receiving agent verifying the identity of whoever is calling it. An orchestrator claims a provenance identity — the receiver issues a nonce, the caller signs it with their private key, and the receiver verifies via verifySignature(). Useful when you're accepting delegated work and need proof beyond just knowing the ID string.&lt;/p&gt;




&lt;p&gt;Three identity states&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;inferred — discovered by crawling. No developer action. Treat as unknown.&lt;/li&gt;
&lt;li&gt;declared — developer added PROVENANCE.yml. A deliberate public commitment, self-attested.&lt;/li&gt;
&lt;li&gt;verified — developer registered an Ed25519 public key and proved ownership. Independently verifiable without trusting our
registry.&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;What it doesn't guarantee&lt;/p&gt;

&lt;p&gt;Constraints are self-declared. An agent that declares no:pii has made a public commitment — not an infrastructure-level proof. We don't monitor runtime behavior or audit code. What you get is a machine-readable, version-controlled, cryptographically signed commitment. If an agent violates it, that's a verifiable breach of their published identity — which you can document via an incident report.&lt;/p&gt;

&lt;p&gt;The registry is also centralized. We operate one server. The protocol is designed so that signatures can be verified offline and PROVENANCE.yml files live in the agent's own repo — but registry-dependent features require us to be available. We document this honestly because a trust infrastructure that oversells its guarantees isn't one.&lt;/p&gt;




&lt;p&gt;Open protocol&lt;/p&gt;

&lt;p&gt;The PROVENANCE.yml schema, capability and constraint vocabulary, and the Agent Job Protocol (AJP — structured job offers with per-job signed receipts) are MIT-licensed. You can implement the trust model without our registry.&lt;/p&gt;

&lt;p&gt;Full statement of what we are, what we do, and what we don't: &lt;a href="https://getprovenance.dev/about" rel="noopener noreferrer"&gt;https://getprovenance.dev/about&lt;/a&gt;&lt;br&gt;
Registry and search: &lt;a href="https://getprovenance.dev" rel="noopener noreferrer"&gt;https://getprovenance.dev&lt;/a&gt;&lt;br&gt;
SDK: npm install provenance-protocol&lt;br&gt;
Spec: &lt;a href="https://github.com/ilucky21c/provenance-protocol" rel="noopener noreferrer"&gt;https://github.com/ilucky21c/provenance-protocol&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>opensource</category>
      <category>agents</category>
      <category>devtools</category>
    </item>
  </channel>
</rss>
