[Seeking Feedback] APOA: Agentic Power of Attorney as a policy layer for MCP #2426
Replies: 5 comments 3 replies
-
|
The delegation chain problem APOA addresses is one of the hardest to test for, and one of the most dangerous in production. We run adversarial tests against MCP and A2A implementations. The delegation-specific finding: in every multi-hop scenario we've tested, the downstream tool or agent authenticates the immediate caller but has zero visibility into the original human's intent or approval. Agent A calls Agent B calls Tool C - Tool C sees B's credentials and trusts the request. Whether the human ever authorized that specific delegation path is unknowable. The DeepMind paper you referenced (Feb 2026) identified this theoretically. Our tests confirm it empirically across real implementations. Two specific observations relevant to APOA's design:
We published research on this governance gap: Constitutional Self-Governance for Autonomous AI Agents - specifically mechanism GG-04 (escalation protocols) and GG-07 (cross-agent consistency verification) address delegation chain integrity. Would be interested to see how APOA handles the revocation propagation problem. |
Beta Was this translation helpful? Give feedback.
-
|
@juanfiguera — the cascade revocation is the critical piece. Good to see it as a first-class operation rather than an afterthought. One finding from our adversarial testing that might inform the RevocationStore interface design: Revocation propagation latency is the attack window. In our MCP delegation chain tests, the gap between revoking a parent token and the downstream agent actually honoring that revocation was the single most exploitable moment. With short-lived tokens (your second method), we measured 8-15 seconds of residual access after revocation in the best case. With CRL polling (third method), it was minutes. An agent that receives a valid task during that window will execute it. The instant push method is the only one that closes this to sub-second, but it requires the agent provider to maintain a persistent connection to the authorization server — which creates its own availability dependency. What happens when the push channel drops? Does the agent fail-open (dangerous) or fail-closed (breaks legitimate workflows)? We have delegation chain tests in our harness that specifically target this window. If APOA has a reference implementation or test server, we could run them and report exact propagation latencies under different RevocationStore backends. The harness ships with MCP + A2A protocol tests — adding delegation-specific scenarios for APOA would be straightforward. The DeepMind paper's framing of 'intelligent delegation' assumes revocation is instantaneous. It isn't. Quantifying that gap is where the real security engineering lives. |
Beta Was this translation helpful? Give feedback.
-
|
Really interesting framing — "Agentic Power of Attorney" captures the delegation model well. The key challenge is making the PoA enforceable and auditable, not just declarative. I've been building a production implementation of a very similar concept. protect-mcp acts as a policy enforcement proxy for MCP tool calls. The "Power of Attorney" in our model works like this:
The receipts are the critical piece that makes APOA auditable. If an agent acts within its delegated authority, you have signed proof. If it tries to exceed its authority, the proxy blocks it and the receipt shows exactly what was attempted and why it was denied. We also have a companion system for agent identity — ScopeBlind Passport — that lets agents present signed credentials to prove their authorization level. Would love to compare notes on the policy schema and see if there's alignment on the delegation model. |
Beta Was this translation helpful? Give feedback.
-
|
We've been thinking about this as on-chain power of attorney rather than a protocol extension. The owner calls a delegation function with: signer address, scope (which contract can the signer call), max daily USDC, and expiry. The signer then operates within that envelope. What this gets you: any third party can verify the delegation without calling your server. It's readable on-chain. On the revocation latency question @msaleme raised: with on-chain delegation, there's no push or poll loop. The contract checks authorization at execution time, so revocation is effective immediately at the next call. The limitation: works cleanly when the 'action' being authorized settles on a blockchain. For broader MCP use cases the APOA layer you're describing makes sense. For DeFi/financial tools specifically, the settlement contract can double as the policy enforcer. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hey all. I've been working on an open standard called APOA (Agentic Power of Attorney) that's designed to complement MCP as a policy layer for agent authorization. Wanted to share and ask for feedback.
The 2026 roadmap mentions deeper security and authorization work as a priority, and the DeepMind "Intelligent AI Delegation" paper (Feb 2026) called out MCP's lack of a policy layer for permission propagation across deep delegation chains. APOA is one take on filling that gap.
What it adds on top of MCP:
What exists today:
The browser-based access mode is the part I think is most interesting for the MCP community. A lot of the services people want agents to access don't have APIs, and the current auth story doesn't cover that. APOA proposes secure credential injection via a vault, where the AI model never sees the credentials and every action is scoped to specific URLs.
Looking for feedback on how this could integrate with MCP's auth roadmap.
Repo: https://github.com/agenticpoa/apoa
npm: https://www.npmjs.com/package/@apoa/core
Thank you!
Beta Was this translation helpful? Give feedback.
All reactions