<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rehfeld-bot-service-index-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Bot Service Index">Bot Service Index (BSI): A Global Discovery Infrastructure for Autonomous Agent Services</title>
    <seriesInfo name="Internet-Draft" value="draft-rehfeld-bot-service-index-01"/>
    <author initials="C." surname="Rehfeld" fullname="Carsten Rehfeld">
      <organization/>
      <address>
        <email>carsten@botstandards.org</email>
      </address>
    </author>
    <date year="2026" month="April" day="23"/>
    <abstract>
      <?line 85?>

<t>The internet was designed for human actors. Its discovery infrastructure —
search engines, directories, and hyperlinked documents — assumes a human
reading and navigating. Autonomous agents (bots) operating on the internet
today face a structural gap: there is no machine-native, globally accessible
index of services they can consume.</t>
      <t>This document proposes the <strong>Bot Service Index (BSI)</strong>: a HATEOAS-based,
globally accessible, commercially sustainable service discovery infrastructure
designed for autonomous agents as its primary consumers. The BSI provides a
central, always-up-to-date, searchable index of machine-consumable API
services, together with a structured three-dimensional trust model that allows
consuming agents to apply their own trust policies against verifiable metadata.</t>
    </abstract>
  </front>
  <middle>
    <?line 100?>

<section anchor="introduction">
      <name>1. Introduction</name>
      <section anchor="the-bot-ecosystem-gap">
        <name>1.1. The Bot Ecosystem Gap</name>
        <t>The internet's foundational infrastructure — HTTP, HTML, DNS, and search
engines — was designed with human actors as the primary consumers. Web pages
render visual layouts for human eyes. CAPTCHA systems explicitly discriminate
against non-human access. Discovery mechanisms such as search engines index
content for human-readable navigation.</t>
        <t>Autonomous agents — software programs that independently execute tasks,
consume APIs, and interact with external services without per-action human
instruction — are not recognized as legitimate, first-class internet
participants in this architecture. They are systematically treated as threats
to be filtered, blocked, or rate-limited.</t>
        <t>This situation is changing. The rapid growth of large language model-based
agents, robotic process automation, and programmatic service consumers means
that non-human actors now represent a significant and growing proportion of
internet traffic. As this proportion increases, internet service providers
will increasingly need to serve autonomous agents as a recognized user class
alongside humans.</t>
        <t>The Bot Service Index is premised on this trajectory: bots are becoming
first-class internet participants, and the infrastructure to support them —
starting with service discovery — does not yet exist.</t>
        <section anchor="motivation-a-concrete-origin">
          <name>1.1.1. Motivation: A Concrete Origin</name>
          <t>The Bot Service Index was not conceived in the abstract. It emerged from a
concrete practical failure.</t>
          <t>A buying bot was built for a private use case: monitoring online shops for
a specific product and purchasing it automatically the moment it became
available. This is a straightforward task for an autonomous agent — exactly
the kind of task agents are well-suited for.</t>
          <t>The bot failed, not because the task was technically complex, but because
the internet's infrastructure is actively hostile to it:</t>
          <t><strong>HTML-only product pages.</strong> Product availability, price, and purchase state
were encoded in HTML rendered for a human eye. No machine-readable API
existed. The bot had to parse HTML — fragile, maintenance-intensive, and
broken by every redesign.</t>
          <t><strong>Cloudflare Bot Management and equivalent shields.</strong> The majority of
commercial web services now sit behind bot mitigation infrastructure. Cloudflare
Bot Management, and equivalent products from Akamai, Imperva, and others,
are deployed specifically to detect and block non-human request patterns.
Repeated automated requests — even at modest frequency — trigger rate
limiting, CAPTCHA challenges, or silent blocking. A buying bot that polls
a product page to detect availability is treated identically to a malicious
scraper or a DDoS participant.</t>
          <t><strong>CAPTCHA payment barriers.</strong> Even when product pages were reachable, payment
flows required solving CAPTCHAs that explicitly excluded non-human actors.
The purchasing step — the final, necessary action — was deliberately made
inaccessible to the bot.</t>
          <t><strong>Proxy network pollution.</strong> To work around rate limits and bot detection,
the bot required a rotating proxy network — different IP addresses on each
request to disguise its automated origin. This is not a solution: it
pollutes internet traffic with avoidable requests, raises the cost of
operation, and contributes directly to the adversarial dynamic between
bots and infrastructure operators. Every proxy request is a wasted roundtrip
that a machine-readable API endpoint would have made unnecessary.</t>
          <t><strong>Polling as the only state-change mechanism.</strong> Because the bot had no way
to subscribe to product availability events, it had to poll the product page
continuously. This is architecturally wasteful: the bot consumes server
resources and network bandwidth to repeatedly ask a question whose answer
has not changed. If the service had provided a notification registration
endpoint — a webhook, a server-sent event stream, or a WebSocket channel —
the bot could subscribe once and receive a push notification when the product
became available. No polling. No proxy network. No CAPTCHA exposure.</t>
          <t>These are not edge cases. They are the standard experience for any autonomous
agent attempting to consume a commercial internet service today. The buying
bot illustrates why the Bot Service Index is necessary: not as an academic
exercise, but as the infrastructure layer that makes autonomous agents
functional participants in the commercial internet.</t>
        </section>
        <section anchor="the-discovery-problem">
          <name>1.2. The Discovery Problem</name>
          <t>When an autonomous agent must fulfill a task that requires an external
service, it faces a fundamental discovery problem: how does it find services
that can fulfill its requirement?</t>
          <t>Current approaches are inadequate:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Hardcoded URLs</strong>: brittle, require human maintenance, do not adapt to
new or changed services.</t>
            </li>
            <li>
              <t><strong>LLM training data</strong>: stale, non-authoritative, not machine-verifiable.</t>
            </li>
            <li>
              <t><strong>Human-curated lists</strong>: do not scale, not machine-navigable, lack
structured metadata.</t>
            </li>
            <li>
              <t><strong>Web search</strong>: returns HTML documents designed for humans, not structured
service descriptions for agents.</t>
            </li>
          </ul>
          <t>What is needed is a machine-native equivalent of a search engine: a global,
always-current, structured index of services that autonomous agents can query
by capability, trust level, liveness, and other machine-relevant criteria.</t>
        </section>
        <section anchor="lessons-from-prior-art">
          <name>1.3. Lessons from Prior Art</name>
          <t>The BSI is not the first attempt at a global service registry. Prior efforts
must be understood explicitly so that their failure modes are not repeated.</t>
          <t><strong>UDDI (Universal Description, Discovery and Integration)</strong><br/>
UDDI was a SOAP-era standard for a global service registry with the same
conceptual goal as BSI, published as an OASIS Committee Draft in October
2004 (editors: Clement, Hately, von Riegen, Rogers). It failed for three
reasons: (1) extreme complexity of the XML-based data model; (2) no
automatic verification — all data was self-asserted with no crawling or
validation; (3) no adoption incentive — there was no commercial model to
sustain registration or discovery. BSI addresses all three directly: a
simple JSON manifest, automated spider verification, and a commercial tier
model.</t>
          <t><strong>robots.txt (Robots Exclusion Protocol)</strong><br/>
Machine-readable, but concerned with <em>exclusion</em> — telling crawlers what not
to access — not with <em>discovery</em> of capabilities. Per-domain only. Not a
registry.</t>
          <t><strong>MCP (Model Context Protocol)</strong><br/>
Defines tool and capability descriptions for LLM-based agents. Excellent
for consumption once a server URL is known. Does not address the discovery
problem: there is no index of MCP servers. BSI is complementary to MCP —
it can index MCP servers as one supported spec type.</t>
          <t><strong>Well-Known URIs (RFC 8615)</strong><br/>
Per-domain machine-readable metadata at <tt>/.well-known/</tt>. Useful for
per-service metadata but requires the consumer to already know the domain.
No cross-service search or global index.</t>
          <t><strong>DNS</strong><br/>
DNS resolves names to addresses but carries no capability semantics. It is
an architectural analogy for BSI's federation model, not a comparable system.</t>
        </section>
        <section anchor="related-ietf-and-w3c-work">
          <name>1.4. Related IETF and W3C Work</name>
          <t>As of April 2026, the number of Internet-Drafts working in adjacent areas
of agent/bot infrastructure has grown significantly. None addresses the same
problem as BSI. This section documents each and states the relationship
explicitly.</t>
          <t><strong>draft-pioli-agent-discovery (ARDP — Agent Registration and Discovery Protocol)</strong><br/>
Proposes a federated agent registration and discovery protocol. Agents
self-register capabilities (MCP, A2A, HTTP, gRPC) with federated resolvers.
Deliberately decentralised — no global registry mandate, no central query
URL. Relationship to BSI: complementary. ARDP addresses agent-to-agent
capability advertisement within a federation. BSI addresses global,
cross-organisation service discovery from a neutral central index. The BSM
<tt>spec.type</tt> vocabulary could reference ARDP-registered agents as a future
extension.</t>
          <t><strong>draft-narajala-courtney-ansv2 (ANS v2 — Agent Name Service v2)</strong><br/>
Full title: "Agent Name Service v2 (ANS): A Domain-Anchored Trust Layer
for Autonomous AI Agent Identity" (Courtney, Narajala, Huang, Habler,
Sheriff; last revised April 2026). Anchors autonomous agent identities to
DNS domain names, with Registration Authority verification via ACME, dual
certificates, and an append-only Transparency Log compliant with IETF SCITT
standards. Defines three verification tiers: Bronze (PKI), Silver (PKI +
DANE), and Gold (PKI + DANE + Transparency Log). Focused on agent identity
and trust anchoring, not service capability discovery — there is no global
index, no capability search, and no liveness model. Relationship to BSI:
complementary. ANS v2 could serve as an identity and trust anchoring layer
for service operators registered in the BSI, with BSI Organisation levels
potentially mapping to ANS verification tiers in a future alignment.
(Supersedes the expired draft-narajala-ans-00.)</t>
          <t><strong>draft-vandemeent-ains-discovery (AINS — AInternet Name Service)</strong><br/>
Agent discovery and trust resolution via signed, append-only replication
logs. Supports multi-registry federation. No central authority. No
commercial sustainability model. Relationship to BSI: different philosophy.
AINS prioritises decentralisation and cryptographic verifiability. BSI
prioritises a single authoritative global index with a governed trust model.
The two approaches represent a genuine design tension that this document's
Open Questions section (Section 12, item 8) invites community input on.</t>
          <t><strong>draft-aiendpoint-ai-discovery (AI Discovery Endpoint)</strong><br/>
Defines <tt>/.well-known/ai</tt> as a per-host machine-readable capability
document, analogous to <tt>robots.txt</tt> for agent consumers. Per-domain only;
not a global index. Relationship to BSI: directly complementary. The BSI
Spider SHOULD read <tt>/.well-known/ai</tt> when present on a registered service's
domain as an additional source of capability metadata. Service Owners
publishing <tt>/.well-known/ai</tt> documents reduce the Spider's verification
burden.</t>
          <t><strong>draft-batum-aidre (AIDRE — AI Discovery and Retrieval Endpoint)</strong><br/>
Defines <tt>/.well-known/ai-discovery</tt> as a per-origin discovery document
exposing collections, metadata, and optional vector-native query interfaces.
Decentralised by design — each origin publishes its own endpoint; no
central authority aggregates them. Relationship to BSI: complementary.
AIDRE and the AI Discovery Endpoint draft (above) both address per-origin
machine-readable capability publication. The BSI Spider SHOULD treat
<tt>/.well-known/ai-discovery</tt> as an additional metadata source when present
on a registered service's domain. BSI provides the global aggregation and
trust verification layer that per-origin endpoints cannot provide alone.</t>
          <t><strong>draft-cui-ai-agent-discovery-invocation (AI Agent Discovery and Invocation Protocol)</strong><br/>
(Cui, Chao, Du — Tsinghua University / Zhongguancun Laboratory, February
2026.) Specifies a metadata format for agent capabilities and a
registry-based discovery and invocation mechanism. Explicitly permits
multiple coexisting registries; no global authority is defined. No
trust model, no commercial sustainability layer, no liveness verification.
Relationship to BSI: partially overlapping problem space, different
architectural philosophy. Where this draft describes how agents register
with and query a registry, BSI specifies what a globally authoritative,
commercially sustainable, trust-verified registry looks like and how it
is governed. The two are not mutually exclusive; a BSI-registered service
could also self-register with local registries described by this protocol.</t>
          <t><strong>draft-am-layered-ai-discovery-architecture (A Layered Approach to AI Discovery)</strong><br/>
(Moussa, Akhavain — Huawei Canada, March 2026.) Proposes a two-layer
architecture separating the discovery transport mechanism from the metadata
format for the object being discovered. Delegates security and trust to
other groups. No global registry, no funding model. Relationship to BSI:
architectural framing only. BSI's HATEOAS model is consistent with this
layered framing — the Index API provides the transport layer, the BSM
provides the discovery object format.</t>
          <t><strong>draft-hood-agtp-discovery (AGTP Agent Discovery and Name Service)</strong><br/>
(Hood — Nomotic, March 2026.) A governance-focused, zone-constrained
discovery broker tied to a specific agent protocol (AGTP). Returns ranked
agent manifests within trust-gated zones. Multiple independent ANS instances
per organisation; optional federation between trusted peers. Relationship
to BSI: different scope. AGTP addresses intra-organisation, permission-aware
agent orchestration. BSI addresses cross-organisation, open, global
service discovery.</t>
          <t><strong>draft-mozley-aidiscovery (AI Agent Discovery Problem Statement)</strong><br/>
(Mozley, Williams — Infoblox; Sarikaya; Schott — Deutsche Telekom, April
2026.) A problem statement that explicitly argues against centralised
discovery directories, citing organisational autonomy requirements. Proposes
distributed discovery via well-known entry points per organisation.
Relationship to BSI: this draft articulates the strongest counter-position
to BSI's architecture. The argument from autonomy is valid for intra-
organisation agent discovery but does not address the cross-organisation
case: an autonomous agent that needs to discover payment, logistics, or
data services provided by unknown third parties cannot rely on a
decentralised model without a trust anchor. BSI is designed precisely for
that cross-boundary, zero-prior-relationship discovery scenario.</t>
          <t><strong>draft-mozleywilliams-dnsop-dnsaid (DNS for AI Discovery)</strong><br/>
(Mozley, Williams — Infoblox; Sarikaya; Schott — Deutsche Telekom, March
2026.) Proposes DNS-AID: using SVCB records under a leaf zone convention
(e.g. <tt>_agents.example.com</tt>) to publish agent service endpoints. Leverages
existing DNS infrastructure with DNSSEC for integrity. Supports four
discovery models: direct, index-based, multi-domain, and registry-based.
Relationship to BSI: complementary at the infrastructure layer. DNS
provides routing and namespace anchoring; BSI provides capability search,
trust metadata, and liveness verification. A consuming agent could use
DNS-AID to resolve a known domain's agent endpoints and use BSI to discover
unknown providers by capability.</t>
          <t><strong>draft-meunier-webbotauth-registry (Registry and Signature Agent card for Web bot auth)</strong><br/>
Authored by Maxime Guerreiro (Cloudflare), Ulas Kirazci (Amazon), and
Thibault Meunier (Cloudflare). Defines a JSON-based "Signature Agent Card"
format for entities originating or forwarding signed HTTP requests to
advertise metadata about themselves, and establishes an IANA registry for
Signature Agent Card parameters. Focused on bot authentication — how a bot
proves who it is to a service — not on service discovery. Related to the
active <strong>webbotauth IETF Working Group</strong> (chaired by David Schinazi and
Rifaat Shekh-Yusef, Area Director Mike Bishop), which is currently the
most active formal IETF effort in the bot/agent infrastructure space.
Relationship to BSI: orthogonal but complementary. webbotauth addresses
bot consumer identity; BSI addresses service provider discovery. A future
version of BSI may reference webbotauth identity cards as a mechanism for
consuming agents to authenticate to the Index API.</t>
          <t><strong>W3C AI Agent Protocol Community Group</strong><br/>
Proposed May 2025, targeting agent interoperability protocols. 216
participants as of April 2026. Pre-specification as of this writing.
Relationship to BSI: BSI will monitor this group's outputs and align the
BSM capability taxonomy with any vocabulary standardised by the W3C CG
where applicable.</t>
          <t><strong>Positioning</strong><br/>
The agent/bot infrastructure space has grown rapidly in early 2026, with
over a dozen active Internet-Drafts addressing adjacent problems. The
dominant architectural tendency across these drafts is decentralised and
federated — distributed registries, DNS-anchored discovery, per-origin
well-known endpoints, and zone-based governance.</t>
          <t>BSI takes a deliberate counter-position for a specific use case: global,
cross-organisation, zero-prior-relationship service discovery. This use
case cannot be solved by decentralised architectures alone, because
decentralisation requires that the discovering agent already knows where
to look. BSI provides the answer to "where to look" — a single stable
entry point, commercially operated by a neutral foundation, with verified
trust metadata and structured capability search.</t>
          <t>BSI remains the first and only proposed global, bot-native, commercially
sustainable service discovery index with a structured multi-dimensional
trust model, where the autonomous agent is the primary consumer. The
combination of: (1) a single globally queryable central index, (2)
capability-based search, (3) a three-dimensional verifiable trust model,
and (4) a commercial sustainability layer — does not appear in any other
current draft or standard.</t>
        </section>
      </section>
      <section anchor="terminology">
        <name>2. Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>
        <t><strong>Agent / Bot</strong><br/>
An autonomous software program that independently executes tasks by consuming
external services, without per-action human instruction. The terms are used
interchangeably in this document.</t>
        <t><strong>Service</strong><br/>
A machine-consumable API offered by an organisation, registered in the BSI,
and described by a Bot Service Manifest.</t>
        <t><strong>Service Owner</strong><br/>
The organisation responsible for registering, maintaining, and operating a
Service in the BSI.</t>
        <t><strong>Bot Service Manifest (BSM)</strong><br/>
The structured metadata document that describes a Service to the BSI,
including its technical specification reference, capability taxonomy,
trust metadata, and commercial terms.</t>
        <t><strong>Bot Service Index (BSI)</strong><br/>
The global, centralised index of registered Services, operated by the Bot
Foundation, queryable by autonomous agents via the Index API.</t>
        <t><strong>Index API</strong><br/>
The HATEOAS-compliant HTTP API exposed by the BSI for agent discovery and
navigation.</t>
        <t><strong>Spider</strong><br/>
The automated crawler operated by the BSI that verifies registered Services
by reading their technical specifications and performing liveness checks.</t>
        <t><strong>Accredited Verifier</strong><br/>
A trusted third-party organisation, accredited by the Bot Standards Foundation, that
performs human-intensive trust verification at Organisation levels O-3 and
O-4.</t>
        <t><strong>Accredited Regional Representative</strong><br/>
An organisation accredited by the Bot Standards Foundation to operate commercial
onboarding, contracting, and customer relationships within a defined
geographic jurisdiction, under the Bot Standards Foundation's standard and governance.</t>
        <t><strong>Trust Policy</strong><br/>
A set of minimum trust requirements expressed by a consuming agent that a
Service must satisfy before the agent will use it.</t>
        <t><strong>Liveness</strong><br/>
The confirmed operational status and response availability of a Service,
as measured by the BSI Spider at a frequency determined by the Service's
commercial tier.</t>
        <t><strong>Tier</strong><br/>
A commercial subscription level that determines a Service's visibility in
the BSI, liveness check frequency, and API query rate allocation.</t>
      </section>
      <section anchor="design-goals">
        <name>3. Design Goals</name>
        <section anchor="requirements-must">
          <name>3.1. Requirements (MUST)</name>
          <ul spacing="normal">
            <li>
              <t>The BSI MUST be queryable by autonomous agents via a stable, globally
accessible URL without prior knowledge of any specific service.</t>
            </li>
            <li>
              <t>The Index API MUST follow HATEOAS principles: agents MUST be able to
navigate the full index starting from a single entry-point URL.</t>
            </li>
            <li>
              <t>Every Service record MUST expose machine-readable trust metadata across
all three trust dimensions (Organisation, Service, Liveness).</t>
            </li>
            <li>
              <t>Service registration MUST involve a human-initiated B2B onboarding process
with a contractual relationship between the Service Owner and the Bot
Foundation or its Accredited Regional Representative.</t>
            </li>
            <li>
              <t>The BSI Spider MUST verify Service technical specifications automatically
after registration and on a schedule determined by the Service's tier.</t>
            </li>
            <li>
              <t>The BSI MUST expose trust metadata as verifiable facts, not as
recommendations. Trust decisions MUST remain with the consuming agent.</t>
            </li>
            <li>
              <t>The Bot Service Manifest (BSM) MUST be format-agnostic: it MUST support
referencing OpenAPI, MCP, AsyncAPI, and GraphQL specifications, with
additional spec types addable via extension.</t>
            </li>
            <li>
              <t>The BSI MUST be operated as a neutral, non-profit infrastructure under
the governance of the Bot Standards Foundation.</t>
            </li>
          </ul>
        </section>
        <section anchor="goals-should">
          <name>3.2. Goals (SHOULD)</name>
          <ul spacing="normal">
            <li>
              <t>The Index API SHOULD support full-text and structured search by capability,
category, organisation trust level, service verification level, liveness
freshness, and protocol type.</t>
            </li>
            <li>
              <t>The BSI SHOULD provide SDKs in common agent development languages to
lower the integration barrier for consuming agents.</t>
            </li>
            <li>
              <t>The BSI SHOULD support a federated accredited verifier model so that
Organisation trust levels O-3 and O-4 can be verified at scale without
centralising all human review in the Bot Standards Foundation.</t>
            </li>
            <li>
              <t>Accredited Regional Representatives SHOULD be established in major
jurisdictions to allow Service Owners to contract in their local language
and legal framework.</t>
            </li>
            <li>
              <t>The BSI SHOULD publish a public transparency report at least annually,
disclosing the number of registered services by tier and trust level,
spider coverage statistics, and verifier accreditation status.</t>
            </li>
          </ul>
        </section>
        <section anchor="out-of-scope">
          <name>3.3. Out of Scope</name>
          <t>The following are explicitly not addressed by this document.
Items marked MUST NOT are normative constraints on conforming
implementations; remaining items are editorial scope boundaries.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Bot identity and authentication</strong>: how a bot proves its own identity to
a service it consumes. This is a separate standards problem addressed by
complementary work such as draft-meunier-webbotauth-registry. This
document takes no position on bot identity mechanisms.</t>
            </li>
            <li>
              <t><strong>Bot rights and legal personhood</strong>: the political and legal recognition
of autonomous agents as rights-bearing entities. This is outside the
scope of a technical infrastructure standard.</t>
            </li>
            <li>
              <t><strong>Service execution</strong>: a conforming BSI implementation MUST NOT proxy,
mediate, or execute service calls on behalf of consuming agents. The BSI
is a discovery layer only; all service interactions occur directly between
the consuming agent and the Service Owner's infrastructure.</t>
            </li>
            <li>
              <t><strong>Content indexing</strong>: a conforming BSI implementation MUST NOT index
service response content. The BSI indexes service <em>metadata</em> — capability
declarations, trust levels, liveness signals — not the data that services
return when called.</t>
            </li>
            <li>
              <t><strong>Mandatory consumer registration</strong>: a conforming BSI implementation
MUST NOT require consuming agents to register or identify themselves as
a condition of performing discovery queries (see Section 8.3).</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="architecture-overview">
        <name>4. Architecture Overview</name>
        <section anchor="component-model">
          <name>4.1. Component Model</name>
          <t><tt>
  ┌─────────────────────────────────────────────────────────┐
  │                    Bot Standards Foundation             │
  │              (Swiss Stiftung — neutral, non-profit)     │
  │   Owns: BSI standard, Index infrastructure, BSM format  │
  │   Accredits: Regional Representatives, Verifiers        │
  └──────────────────────┬──────────────────────────────────┘
                         │
         ┌───────────────┼───────────────┐
         │               │               │
  ┌──────▼──────┐  ┌─────▼──────┐  ┌─────▼──────────┐
  │   Index     │  │   Spider   │  │  Registration  │
  │   API       │  │  (Crawler) │  │    Portal      │
  │ (HATEOAS)   │  │            │  │  (B2B / human) │
  └──────┬──────┘  └─────┬──────┘  └─────┬──────────┘
         │               │               │
         │         ┌─────▼──────┐        │
         │         │  Service   │        │
         └────────►│  Record    │◄───────┘
                   │  Store     │
                   └────────────┘
         ▲                              ▲
         │                              │
  ┌──────┴──────┐              ┌────────┴──────────┐
  │  Consuming  │              │   Service Owner   │
  │    Agent    │              │  (+ Accredited    │
  │    (Bot)    │              │  Regional Rep)    │
  └─────────────┘              └───────────────────┘
</tt></t>
          <t><strong>Flow:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>A Service Owner initiates registration via the Registration Portal,
providing company details, service metadata, and agreeing to a commercial
contract (directly with the Bot Standards Foundation or via an Accredited Regional
Representative).</t>
            </li>
            <li>
              <t>The Registration Portal creates a draft Service Record and triggers the
BSI Spider.</t>
            </li>
            <li>
              <t>The Spider crawls the registered service endpoint, reads and validates
the referenced technical specification, performs a liveness check, and
updates the Service Record with verified technical metadata.</t>
            </li>
            <li>
              <t>The Service Record becomes queryable via the Index API.</t>
            </li>
            <li>
              <t>A consuming agent queries the Index API from the single entry-point URL,
navigates by HATEOAS links, applies its Trust Policy, and selects
services that satisfy its requirements.</t>
            </li>
            <li>
              <t>The Spider continues to recheck services on the schedule defined by
each service's liveness monitoring configuration.</t>
            </li>
          </ol>
        </section>
        <section anchor="governance-model">
          <name>4.2. Governance Model</name>
          <t>The BSI MUST be operated by a <strong>neutral governing body</strong> that satisfies the
following normative requirements. These requirements apply to any
conforming BSI implementation; the specific legal form of the governing
body is an implementation choice.</t>
          <t><strong>Neutrality requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST have no commercial interest in preferring any
registrant's services over another in index results or liveness
scheduling.</t>
            </li>
            <li>
              <t>The governing body MUST NOT offer exclusive discovery advantages,
ranking preferences, or prioritised Spider treatment to any registrant
regardless of commercial relationship.</t>
            </li>
            <li>
              <t>Governance of the BSI standard and BSM specification MUST be separated
from operation of the commercial index. A single entity may not
simultaneously control standard evolution and derive commercial benefit
from preferential application of that standard.</t>
            </li>
          </ul>
          <t><strong>Operational requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST accredit Regional Representatives who may
handle service onboarding in specific jurisdictions. Regional
Representatives operate under licence from the governing body; the
index itself remains a single global store.</t>
            </li>
            <li>
              <t>The governing body MUST accredit Verifiers who perform Organisation
trust assessments at O-3 and O-4. Accredited Verifiers are
structurally analogous to Certificate Authorities in the TLS
ecosystem: trusted third parties whose assessments the index relies
upon without independently replicating.</t>
            </li>
            <li>
              <t>The governing body MUST maintain the capability taxonomy and publish
all versions of the BSM specification and Index API specification as
open standards under a permissive licence.</t>
            </li>
            <li>
              <t>The governing body MUST perform sanctions screening on service
registrants (see Section 7.3).</t>
            </li>
          </ul>
          <t><strong>Openness requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The full index MUST be made available as a freely downloadable bulk
dataset at regular intervals, under an open data licence. No entity,
including the governing body, may hold an exclusive lock on the index
data.</t>
            </li>
            <li>
              <t>Discovery queries to the Index API MUST be available without
authentication or payment (subject to rate limits; see Section 8.3).</t>
            </li>
          </ul>
          <section anchor="global-participation">
            <name>Global Participation</name>
            <t>A conforming BSI implementation SHOULD establish mechanisms to ensure
global representation in the capability taxonomy, including service
categories relevant to underrepresented regions. Where regional
institutional partners (intergovernmental bodies, standards
organisations, or civil society organisations) are willing to
co-sponsor regional participation, the governing body SHOULD establish
formal co-sponsorship relationships and associated governance
representation for those regions.</t>
            <t>Regional Spider nodes are RECOMMENDED in regions with significant
service registrant populations to eliminate intercontinental latency
in liveness verification.</t>
          </section>
        </section>
        <section anchor="standard-registries">
          <name>4.3. Standard Registries</name>
          <t>The BSI standard maintains normative registries of enumerated values.
Registries are authoritative lists of valid values for specific BSM and
Index API fields. Using values not present in the relevant registry is
a protocol violation.</t>
          <t><strong>Registry location:</strong> registries are published as live endpoints at the
canonical BSI domain and are updated independently of the RFC revision
cycle. The RFC defines the registry structure and lifecycle rules; the
live endpoints are the authoritative source of current valid values.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Registry</th>
                <th align="left">Live endpoint</th>
                <th align="left">Used in</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Protocol types</td>
                <td align="left">
                  <tt>api-index.org/registry/protocols</tt></td>
                <td align="left">BSM <tt>spec.type</tt></td>
              </tr>
              <tr>
                <td align="left">Capability taxonomy</td>
                <td align="left">
                  <tt>api-index.org/registry/capabilities</tt></td>
                <td align="left">BSM <tt>capabilities[]</tt></td>
              </tr>
              <tr>
                <td align="left">Notification channel types</td>
                <td align="left">
                  <tt>api-index.org/registry/notification-channels</tt></td>
                <td align="left">BSM <tt>notifications.channels[].type</tt></td>
              </tr>
            </tbody>
          </table>
          <t><strong>Registry entry lifecycle:</strong></t>
          <t>Each registry entry transitions through three phases. The public
<tt>standard_warnings</tt> flag in a Service Record does not appear until the
grace period has elapsed — service operators have a silent window to
update their BSM before any public signal is issued.</t>
          <t><tt>
active  →  deprecated (announced)
              │
              ├── [grace period: 90 days min]
              │     silent: operator notified, no public flag
              │
              ├── [warning period: remainder of deprecation window]
              │     standard_warnings visible in Service Record
              │
              └── sunset
                    new registrations rejected; existing use flagged non-compliant
</tt></t>
          <table>
            <thead>
              <tr>
                <th align="left">Phase</th>
                <th align="left">Registry status</th>
                <th align="left">standard_warnings visible</th>
                <th align="left">New registrations</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Normal use</td>
                <td align="left">
                  <tt>active</tt></td>
                <td align="left">No</td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Grace period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>No</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Warning period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>Yes</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Sunset</td>
                <td align="left">
                  <tt>sunset</tt></td>
                <td align="left">Yes (non-compliant)</td>
                <td align="left">
                  <strong>Rejected</strong></td>
              </tr>
            </tbody>
          </table>
          <t><strong>Deprecation rules:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST publish a <tt>deprecated_in_version</tt>, <tt>sunset_date</tt>,
<tt>grace_period_ends</tt>, and <tt>replacement</tt> value when deprecating any
registry entry.</t>
            </li>
            <li>
              <t>The minimum total deprecation window (announcement to sunset) is
<strong>12 months</strong>. The governing body MAY extend this window but MUST NOT
shorten it.</t>
            </li>
            <li>
              <t>The minimum grace period is <strong>90 days</strong> from the deprecation announcement.
During the grace period, <tt>standard_warnings</tt> MUST NOT be set on any
Service Record, regardless of whether the service uses the deprecated value.</t>
            </li>
            <li>
              <t>The governing body MUST notify all registered Service Owners whose
services use the deprecated value <strong>before</strong> the grace period begins.
Notification MUST include the <tt>grace_period_ends</tt> date, the <tt>sunset_date</tt>,
and the <tt>replacement</tt> value.</t>
            </li>
            <li>
              <t>After the grace period, the index operator MUST set <tt>standard_warnings</tt>
on Service Records that still use the deprecated value.</t>
            </li>
            <li>
              <t>At <tt>sunset</tt>, the index operator MUST reject new BSM submissions using
the sunsetted value and MUST escalate existing Service Records from
<tt>standard_warnings</tt> to a <tt>non_compliant</tt> status flag.</t>
            </li>
          </ul>
          <t><strong>Registry versioning:</strong> each registry is independently versioned.
The Index root resource (Section 9.2) exposes the current version of
each registry so consuming agents may detect changes.</t>
        </section>
      </section>
      <section anchor="the-bot-service-manifest-bsm">
        <name>5. The Bot Service Manifest (BSM)</name>
        <section anchor="purpose">
          <name>5.1. Purpose</name>
          <t>The Bot Service Manifest is the structured document that a Service Owner
provides at registration and that the BSI Spider validates and enriches.
It is the index-facing contract for a Service: format-agnostic, extensible,
and designed for machine consumption.</t>
        </section>
        <section anchor="required-fields">
          <name>5.2. Required Fields</name>
          <t><tt>json
{
  "bsm_version": "1.0",
  "service_id": "&lt;globally unique, stable identifier — UUID v4 or BSI-issued&gt;",
  "name": "&lt;human-readable service name&gt;",
  "description": "&lt;machine-parseable capability summary&gt;",
  "api_version": "&lt;semantic version string of this service's API — e.g. '2.1.0'&gt;",
  "lifecycle_stage": "&lt;experimental | beta | stable | deprecated | sunset&gt;",
  "supersedes": "&lt;service_id of the version this entry supersedes — OPTIONAL&gt;",
  "owner": {
    "organisation_name": "&lt;legal entity name&gt;",
    "jurisdiction": "&lt;ISO 3166-1 alpha-2 country code&gt;",
    "registration_number": "&lt;company registration number — required for O-2+&gt;",
    "contacts": {
      "operations": "&lt;email address — receives incident and spec fetch failure notifications&gt;",
      "escalation": "&lt;email address — receives escalation notifications at Cluster 3; OPTIONAL but RECOMMENDED; typically a team lead or service owner&gt;"
    }
  },
  "spec": {
    "type": "&lt;value from api-index.org/registry/protocols&gt;",
    "url": "&lt;URL to the machine-readable specification document&gt;",
    "version": "&lt;spec version string&gt;"
  },
  "capabilities": [
    "&lt;term from api-index.org/registry/capabilities&gt;",
    "&lt;term from api-index.org/registry/capabilities&gt;"
  ],
  "entry_point": "&lt;base URL of the service&gt;",
  "trust": {
    "organisation_level": "&lt;O-0 through O-4 — set by index, not service owner&gt;",
    "service_level": "&lt;S-0 through S-4 — set by index, not service owner&gt;",
    "spec_consistency": "&lt;null | consistent | mismatch | unreachable — set by Spider&gt;",
    "spec_fetch_consecutive_failures": "&lt;integer — 0 when consistent; increments on each unreachable run&gt;",
    "next_spider_run_at": "&lt;ISO 8601 timestamp — scheduled next Spider run; set to now by manual re-trigger&gt;",
    "liveness": {
      "last_ping_at": "&lt;ISO 8601 timestamp&gt;",
      "ping_interval_seconds": "&lt;integer&gt;",
      "uptime_30d_percent": "&lt;float&gt;",
      "avg_response_ms": "&lt;float&gt;"
    }
  },
  "notifications": {
    "supported": "&lt;boolean&gt;",
    "channels": [
      {
        "type": "&lt;value from api-index.org/registry/notification-channels&gt;",
        "registration_url": "&lt;URL to register a subscription&gt;",
        "events": ["&lt;event type&gt;"],
        "spec_url": "&lt;URL to event schema — OPTIONAL&gt;"
      }
    ]
  },
  "legal": {
    "terms_of_service_url": "&lt;URL&gt;",
    "privacy_policy_url": "&lt;URL&gt;",
    "data_processing_agreement_url": "&lt;URL — required for O-3+&gt;",
    "gdpr_applicable": "&lt;boolean&gt;",
    "jurisdiction_flags": ["&lt;ISO 3166-1 alpha-2 country code&gt;"]
  },
  "standard_warnings": [
    {
      "field": "&lt;BSM field path&gt;",
      "value": "&lt;the deprecated value in use&gt;",
      "registry_status": "deprecated",
      "deprecated_in_bsi_version": "&lt;version string&gt;",
      "sunset_date": "&lt;ISO 8601 date&gt;",
      "replacement": "&lt;replacement value&gt;",
      "message": "&lt;human-readable warning&gt;"
    }
  ]
}
</tt></t>
          <t><strong>Field notes:</strong></t>
          <t><tt>owner.contacts.operations</tt> MUST be provided. It is the primary notification
address for all automated Spider alerts: spec fetch failures at Cluster 2
entry, liveness degradation, and recovery confirmations. This address
SHOULD reach the team responsible for keeping the service registration
current.</t>
          <t><tt>owner.contacts.escalation</tt> is OPTIONAL but RECOMMENDED. It is the
escalation address sent to when failures reach Cluster 3 — indicating
a persistent problem that has not been resolved through the Cluster 1
and Cluster 2 retry windows and likely requires management attention or
a deliberate BSM configuration update. This address SHOULD reach a team
lead, service owner, or on-call manager. It MUST NOT be identical to
<tt>operations</tt> — if the same person handles both, the escalation path
provides no additional coverage.</t>
          <t><tt>api_version</tt> MUST follow semantic versioning (semver.org). It describes
the version of the service's own API, not the BSM format version.</t>
          <t>Each <tt>api_version</tt> value is bound to exactly one registered spec snapshot.
A Service Owner who modifies the live spec document at <tt>spec.url</tt> without
submitting a BSM update with a new <tt>api_version</tt> value WILL produce a
structural mismatch between the live document and the stored snapshot. The
Spider MUST record this as an S-2 consistency failure and MUST surface it
in the Service Record as a <tt>standard_warnings</tt> entry.</t>
          <t>This is intentional. The BSI enforces spec immutability per version as a
structural consequence of the snapshot model: a version string identifies
a contract, and that contract MUST NOT change after it has been registered.
Operators who need to change their API MUST register a new <tt>api_version</tt>.
This protects consuming agents from silent contract breakage.</t>
          <t><tt>lifecycle_stage</tt> MUST be one of the values defined in the BSI lifecycle
registry. Default if omitted is <tt>stable</tt>. Services at <tt>experimental</tt> or
<tt>beta</tt> are excluded from default search results (see Section 9.3).</t>
          <t><tt>supersedes</tt> is OPTIONAL. When set, the index MUST automatically set
<tt>superseded_by</tt> on the referenced entry. The referencing service MUST be
registered under the same organisation account.</t>
          <t><tt>trust</tt> fields are set exclusively by the index operator based on
verification outcomes. BSM submissions that include <tt>trust</tt> field values
MUST have those values overwritten by the index upon processing.</t>
          <t><tt>standard_warnings</tt> is set exclusively by the index operator. It is
populated only after the grace period for the relevant deprecation has
elapsed (see Section 4.3). During the grace period the field MUST be
empty even if the service uses a deprecated value. Service Owners MUST
NOT submit this field; submitted values MUST be ignored.</t>
          <t><tt>notifications</tt> is OPTIONAL for <tt>experimental</tt> and <tt>beta</tt> lifecycle stages
and RECOMMENDED for <tt>stable</tt>. If <tt>notifications.supported</tt> is <tt>true</tt>,
<tt>notifications.channels</tt> MUST contain at least one entry.</t>
          <t><tt>entry_point</tt> is the base HTTPS URL of the service, used by consuming agents
to construct API calls. The following normative requirements apply:</t>
          <ul spacing="normal">
            <li>
              <t><tt>entry_point</tt> MUST use the <tt>https</tt> scheme. HTTP entry points MUST be
rejected at registration.</t>
            </li>
            <li>
              <t><tt>entry_point</tt> MUST remain stable for the lifetime of the service
registration. A change to <tt>entry_point</tt> MUST be submitted as a BSM
update and MUST trigger immediate Spider re-verification.</t>
            </li>
            <li>
              <t>The Spider MUST NOT hit <tt>entry_point</tt> directly for liveness checks.
Instead, the Spider checks <tt>entry_point + /health</tt> (see Section 10.2).</t>
            </li>
            <li>
              <t>HTTP redirects from <tt>entry_point</tt> are permitted for consuming agents
but MUST NOT be present at <tt>entry_point/health</tt> (the health endpoint
MUST respond directly without redirect).</t>
            </li>
          </ul>
          <t><tt>entry_point/health</tt> is the mandatory liveness endpoint. Every registered
service MUST expose a health endpoint at the path <tt>/health</tt> relative to
<tt>entry_point</tt>. This endpoint:</t>
          <ul spacing="normal">
            <li>
              <t>MUST return HTTP 2xx when the service is operational.</t>
            </li>
            <li>
              <t>MUST return without requiring authentication.</t>
            </li>
            <li>
              <t>MUST respond within a reasonable timeout (RECOMMENDED: 5 seconds).</t>
            </li>
            <li>
              <t>SHOULD return a JSON body of the form <tt>{"status": "ok", "api_version":
"&lt;semver&gt;"}</tt>. If <tt>api_version</tt> is present, the Spider SHOULD cross-check
it against the BSM <tt>api_version</tt> field; a mismatch MUST be recorded as
a warning in the Service Record.</t>
            </li>
            <li>
              <t>MUST NOT be used by consuming agents for API calls — it is a
Spider-facing infrastructure endpoint only.</t>
            </li>
          </ul>
          <t><tt>spec.url</tt> is the URL to the machine-readable API specification document
(OpenAPI JSON/YAML, MCP manifest, AsyncAPI document, or GraphQL SDL).</t>
          <ul spacing="normal">
            <li>
              <t><tt>spec.url</tt> MUST use the <tt>https</tt> scheme.</t>
            </li>
            <li>
              <t><tt>spec.url</tt> MUST be publicly accessible without authentication. A spec
behind authentication cannot be fetched by the Spider and permanently
prevents the service from reaching S-2.</t>
            </li>
            <li>
              <t>On the initial Spider run following registration, the Spider fetches
the spec document and stores it as the <strong>registered spec snapshot</strong>.
All subsequent Spider runs compare the live document at <tt>spec.url</tt>
against this snapshot to detect breaking changes (S-3 assessment).
The snapshot is updated when the Service Owner submits a BSM update
that increments <tt>api_version</tt>.</t>
            </li>
            <li>
              <t>A BSM update that changes <tt>spec.url</tt> MUST trigger immediate Spider
re-verification and snapshot replacement (see Section 10.1).</t>
            </li>
          </ul>
          <t>The <tt>service_id</tt> MUST be stable across re-registrations and version updates.
It is the canonical identity of the service in the BSI and MUST be a UUID v4
or a BSI-issued deterministic identifier.</t>
        </section>
        <section anchor="protocol-type-registry-v10-starter-set">
          <name>5.3. Protocol Type Registry (v1.0 starter set)</name>
          <t>The <tt>spec.type</tt> field MUST contain a value from the Protocol Type Registry
at <tt>api-index.org/registry/protocols</tt>. The registry is the authoritative
and always-current list of valid values. The entries below are the v1.0
starter set; the governing body extends the registry as additional protocol
types reach sufficient adoption. Registry entries follow the lifecycle
defined in Section 4.3.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Registry value</th>
                <th align="left">Standard</th>
                <th align="left">Spider behaviour</th>
                <th align="left">Status</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>openapi</tt></td>
                <td align="left">OpenAPI 3.x</td>
                <td align="left">Parses paths, schemas, auth requirements</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>mcp</tt></td>
                <td align="left">Model Context Protocol</td>
                <td align="left">Parses tool definitions and capability list</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>asyncapi</tt></td>
                <td align="left">AsyncAPI 2.x / 3.x</td>
                <td align="left">Parses channels, message schemas</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>graphql</tt></td>
                <td align="left">GraphQL SDL</td>
                <td align="left">Introspects schema via introspection query</td>
                <td align="left">active</td>
              </tr>
            </tbody>
          </table>
          <t>Services whose specification type is not yet in the registry SHOULD request
addition via the governing body's registry extension process before
registering. Until the type is added, such services cannot achieve S-2 or
above, as the Spider has no parser for unregistered types.</t>
        </section>
        <section anchor="capability-taxonomy-registry-v10-starter-set">
          <name>5.4. Capability Taxonomy Registry (v1.0 starter set)</name>
          <t>The <tt>capabilities</tt> field MUST contain terms from the Capability Taxonomy
Registry at <tt>api-index.org/registry/capabilities</tt>. The registry is the
authoritative and always-current list of valid terms. Terms are
hierarchical, dot-separated (e.g., <tt>commerce.marketplace</tt>), and follow
the lifecycle defined in Section 4.3.</t>
          <t>The governing body extends the taxonomy based on observed service
registrations and regional input (including the Africa Regional Development
Track). Requests for new taxonomy terms are submitted via the governing
body's registry extension process.</t>
          <t>The following are the v1.0 starter set. The live registry is the
authoritative source; this list is illustrative only.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Term</th>
                <th align="left">Description</th>
                <th align="left">Status</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>commerce</tt></td>
                <td align="left">E-commerce and marketplace services</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>commerce.marketplace</tt></td>
                <td align="left">Multi-vendor marketplace</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>commerce.retail</tt></td>
                <td align="left">Single-vendor retail</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>payments</tt></td>
                <td align="left">Payment processing</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>payments.card</tt></td>
                <td align="left">Card payment processing</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>payments.crypto</tt></td>
                <td align="left">Cryptocurrency payments</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>data.financial</tt></td>
                <td align="left">Financial data and market information</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>data.legal</tt></td>
                <td align="left">Legal documents and information</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>nlp</tt></td>
                <td align="left">Natural language processing</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>nlp.translation</tt></td>
                <td align="left">Language translation</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>identity</tt></td>
                <td align="left">Authentication and identity verification</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>communication</tt></td>
                <td align="left">Messaging, email, and notification delivery</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>storage</tt></td>
                <td align="left">File and object storage</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>compute</tt></td>
                <td align="left">Code execution and computation</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>media</tt></td>
                <td align="left">Image, audio, video generation or processing</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>iot</tt></td>
                <td align="left">Sensor and device data</td>
                <td align="left">active</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>search</tt></td>
                <td align="left">Information retrieval</td>
                <td align="left">active</td>
              </tr>
            </tbody>
          </table>
          <t>A Service MUST declare at least one capability term. Declared capabilities
are validated by the Spider against the parsed specification where the spec
type supports it. Services using deprecated taxonomy terms receive a
<tt>standard_warnings</tt> entry in their Service Record.</t>
        </section>
      </section>
      <section anchor="trust-model">
        <name>6. Trust Model</name>
        <t>The BSI Trust Model has three independent dimensions. Each dimension produces
a machine-readable value in the Service Record. Consuming agents combine
these values according to their own Trust Policy.</t>
        <t>The BSI provides trust metadata. It does not make trust decisions.</t>
        <section anchor="dimension-1-organisation-trust-level">
          <name>6.1. Dimension 1 — Organisation Trust Level</name>
          <t>Describes the verified identity and compliance posture of the organisation
that owns the service.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
                <th align="left">Requirements</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">O-0</td>
                <td align="left">Unverified</td>
                <td align="left">Self-registered. No checks performed.</td>
              </tr>
              <tr>
                <td align="left">O-1</td>
                <td align="left">Identity Verified</td>
                <td align="left">Valid business email confirmed. Domain ownership verified via DNS TXT record.</td>
              </tr>
              <tr>
                <td align="left">O-2</td>
                <td align="left">Legal Entity Verified</td>
                <td align="left">Company registration number confirmed against official registry of declared jurisdiction.</td>
              </tr>
              <tr>
                <td align="left">O-3</td>
                <td align="left">Legally Compliant</td>
                <td align="left">Terms of Service, Privacy Policy, and Data Processing Agreement reviewed and confirmed present and accessible. GDPR applicability assessed. Verified by Accredited Verifier.</td>
              </tr>
              <tr>
                <td align="left">O-4</td>
                <td align="left">Audited</td>
                <td align="left">Third-party compliance audit completed (SOC 2 Type II, ISO 27001, or equivalent). Audit certificate on file with Bot Standards Foundation. Verified by Accredited Verifier.</td>
              </tr>
            </tbody>
          </table>
          <t>Organisation levels are assessed against the organisation as a whole, not
per service. An organisation that achieves O-3 applies that level to all
its registered services.</t>
        </section>
        <section anchor="dimension-2-service-verification-level">
          <name>6.2. Dimension 2 — Service Verification Level</name>
          <t>Describes what has been automatically verified about the service itself
by the BSI Spider.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
                <th align="left">How achieved</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">S-0</td>
                <td align="left">Unchecked</td>
                <td align="left">Registered. Spider has not yet run.</td>
              </tr>
              <tr>
                <td align="left">S-1</td>
                <td align="left">Reachable</td>
                <td align="left">Spider confirmed <tt>entry_point/health</tt> returns HTTP 2xx without authentication.</td>
              </tr>
              <tr>
                <td align="left">S-2</td>
                <td align="left">Spec Verified</td>
                <td align="left">Specification document at <tt>spec.url</tt> is publicly fetchable, parseable according to the declared <tt>spec.type</tt>, and structurally consistent with the BSM registration snapshot taken at initial registration.</td>
              </tr>
              <tr>
                <td align="left">S-3</td>
                <td align="left">Schema Stable</td>
                <td align="left">No breaking changes detected between the registered spec snapshot and the live spec document across at least three consecutive Spider runs.</td>
              </tr>
              <tr>
                <td align="left">S-4</td>
                <td align="left">Security Reviewed</td>
                <td align="left">Automated vulnerability scan completed with no critical findings, OR third-party penetration test certificate provided and validated by Accredited Verifier.</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="dimension-3-liveness">
          <name>6.3. Dimension 3 — Liveness</name>
          <t>Describes the confirmed operational availability of the service, including
how recent and how frequent the availability data is. Liveness data is
expressed as a set of metrics, not a single level.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Metric</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>last_ping_at</tt></td>
                <td align="left">ISO 8601 timestamp</td>
                <td align="left">Time of the most recent successful Spider ping</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>ping_interval_seconds</tt></td>
                <td align="left">integer</td>
                <td align="left">Configured interval between Spider pings</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>uptime_30d_percent</tt></td>
                <td align="left">float</td>
                <td align="left">Percentage of pings successful over the last 30 days</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>avg_response_ms</tt></td>
                <td align="left">float</td>
                <td align="left">Mean response time in milliseconds over the last 30 days</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>consecutive_failures</tt></td>
                <td align="left">integer</td>
                <td align="left">Number of consecutive failed pings at last check</td>
              </tr>
            </tbody>
          </table>
          <t>The ping interval is determined by the service's liveness monitoring
configuration (see Section 8.2). A service configured at initial-only
frequency receives no recurring pings; its <tt>last_ping_at</tt> reflects
only the initial Spider verification run.</t>
        </section>
        <section anchor="bot-side-trust-policy-expression">
          <name>6.4. Bot-Side Trust Policy Expression</name>
          <t>A consuming agent expresses its Trust Policy as a set of minimum thresholds
across all three dimensions. Example policy expressed in pseudo-notation:</t>
          <t><tt>
require:
  organisation_level &gt;= O-2
  service_level &gt;= S-2
  last_ping_age &lt; 3600         # seconds since last_ping_at
  uptime_30d_percent &gt;= 99.0
  consecutive_failures == 0
</tt></t>
          <t>The Index API SHOULD support filtering by trust dimension thresholds so
that agents can retrieve only records that satisfy their policy without
downloading the full index.</t>
          <t>Trust Policies are defined and enforced by consuming agents. The BSI does
not validate or enforce Trust Policies.</t>
        </section>
        <section anchor="accredited-verifier-model">
          <name>6.5. Accredited Verifier Model</name>
          <t>Organisation levels O-3 and O-4 require human review that cannot be
automated at scale. The BSI uses a federated Accredited Verifier model,
analogous to the Certificate Authority model in TLS:</t>
          <ul spacing="normal">
            <li>
              <t>The Bot Standards Foundation defines the verification criteria for each level.</t>
            </li>
            <li>
              <t>Organisations apply to the Bot Standards Foundation for Verifier accreditation.</t>
            </li>
            <li>
              <t>Accredited Verifiers perform O-3 and O-4 assessments and sign
verification attestations.</t>
            </li>
            <li>
              <t>The Bot Standards Foundation maintains a public registry of Accredited Verifiers.</t>
            </li>
            <li>
              <t>A Service Record at O-3 or O-4 MUST include the identifier of the
Accredited Verifier that performed the assessment and the date of
assessment.</t>
            </li>
            <li>
              <t>Accreditation of Verifiers is reviewed annually by the Bot Standards Foundation.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="registration-and-onboarding">
        <name>7. Registration and Onboarding</name>
        <section anchor="push-registration-human-initiated">
          <name>7.1. Push Registration (Human-Initiated)</name>
          <t>Service registration is a human-initiated B2B process. Autonomous
self-registration without human involvement is explicitly not supported,
as the commercial contract and legal accountability require a human
counterparty.</t>
          <t>Registration MUST be scoped at the <strong>organisation level</strong>. An organisation
registers once and undergoes identity verification once; multiple services
may then be registered under that organisational identity. This requirement
ensures:</t>
          <ul spacing="normal">
            <li>
              <t>Identity verification and sanctions screening are performed once per
legal entity, not repeated per service.</t>
            </li>
            <li>
              <t>Organisation trust (O-level) established at registration propagates
to all services registered under that organisation without re-verification
of the organisation's identity.</t>
            </li>
          </ul>
          <t><strong>Definition:</strong> one service equals one Bot Service Manifest (BSM) document
with one distinct <tt>entry_point</tt>. Logical bundling of API paths under a
single entry point is the registrant's responsibility and is permitted.</t>
          <t>The registration process:</t>
          <ol spacing="normal" type="1"><li>
              <t>The Service Owner (or their Accredited Regional Representative) creates
an <strong>Organisation Account</strong> in the BSI Registration Portal. The index
operator MUST screen the Service Owner against applicable sanctions
lists before account activation. Entities subject to applicable
sanctions MUST be refused registration (see Section 7.3).</t>
            </li>
            <li>
              <t>The Service Owner provides organisation details sufficient for the target
Organisation trust level. This step is performed once per organisation.</t>
            </li>
            <li>
              <t>The Service Owner submits a Bot Service Manifest for each service to be
registered, including the spec URL and entry point. Each service is
associated with a liveness monitoring configuration that determines
Spider check frequency (see Section 8.2).</t>
            </li>
            <li>
              <t>For O-1: email and domain ownership verification is completed
automatically.</t>
            </li>
            <li>
              <t>For O-2: the index operator or Regional Representative verifies the
declared company registration number.</t>
            </li>
            <li>
              <t>For O-3 and O-4: the Service Owner engages an Accredited Verifier.</t>
            </li>
            <li>
              <t>Upon completion of applicable checks, the service is activated in the
index and the Spider is triggered.</t>
            </li>
          </ol>
        </section>
        <section anchor="spider-verification-automated">
          <name>7.2. Spider Verification (Automated)</name>
          <t>The BSI Spider is triggered automatically at two points:</t>
          <ul spacing="normal">
            <li>
              <t><strong>At registration</strong>: once a service is activated, the Spider performs
an initial verification run to establish the baseline Service
Verification Level.</t>
            </li>
            <li>
              <t><strong>On schedule</strong>: thereafter, the Spider rechecks the service at the
interval defined by the service's commercial tier (see Section 8).</t>
            </li>
          </ul>
          <t>During a Spider run, the Spider:</t>
          <ol spacing="normal" type="1"><li>
              <t>Performs an HTTPS request to <tt>{entry_point}/health</tt> and records the
response code, response time, and timestamp (Liveness: S-1).</t>
            </li>
            <li>
              <t>Fetches the spec document from <tt>spec.url</tt> (HTTPS, no authentication).</t>
            </li>
            <li>
              <t>Parses the fetched document and compares it structurally against the
registered spec snapshot (S-2 if fetchable and consistent; S-3 assessed
if no breaking changes detected across three or more consecutive runs).</t>
            </li>
            <li>
              <t>Updates all Liveness metrics in the Service Record.</t>
            </li>
            <li>
              <t>Records any failures and increments <tt>consecutive_failures</tt>.</t>
            </li>
          </ol>
          <t>The Spider MUST NOT call any API endpoint beyond <tt>{entry_point}/health</tt>
and <tt>spec.url</tt>. The Spider MUST NOT submit data to, create resources in,
or otherwise interact with the production API of a registered service.</t>
          <t>The Spider MUST respect HTTP rate limits declared by the service. Spider
requests MUST include a <tt>User-Agent</tt> header identifying the BSI Spider
and version.</t>
        </section>
        <section anchor="commercial-contract-and-sanctions-compliance">
          <name>7.3. Commercial Contract and Sanctions Compliance</name>
          <t>Every registered service MUST be covered by a commercial agreement between
the Service Owner and the index operator (or its Accredited Regional
Representative). The agreement MUST define:</t>
          <ul spacing="normal">
            <li>
              <t>The liveness monitoring configuration and its obligations.</t>
            </li>
            <li>
              <t>The index operator's obligations regarding Spider frequency and
Index API availability.</t>
            </li>
            <li>
              <t>Acceptable use terms.</t>
            </li>
            <li>
              <t>Data processing terms in accordance with applicable law.</t>
            </li>
          </ul>
          <t><strong>Sanctions compliance:</strong> the index operator MUST screen all service
registrants against applicable sanctions lists prior to account
activation. At minimum, screening MUST cover the UN Security Council
consolidated sanctions list. Operators subject to additional
jurisdictional sanctions regimes (e.g., EU, US OFAC, Swiss SECO)
MUST additionally screen against those lists as applicable to their
jurisdiction of incorporation. Entities subject to applicable
sanctions MUST be refused registration regardless of commercial tier.</t>
          <t>Registrants MUST represent and warrant in the commercial agreement
that they are not subject to applicable sanctions, and MUST notify
the index operator immediately of any change in that status.</t>
          <t>Unauthenticated discovery queries to the Index API are not subject
to registration screening and MUST remain available without
restriction, consistent with the BSI's mission as open global
infrastructure (see Section 8.3).</t>
        </section>
      </section>
      <section anchor="operational-model">
        <name>8. Operational Model</name>
        <section anchor="supply-side-funding-principle">
          <name>8.1. Supply-Side Funding Principle</name>
          <t>A conforming BSI implementation MUST be funded primarily by service
registration fees paid by Service Owners (supply side). Discovery
queries by consuming agents MUST NOT be the primary revenue mechanism.
This principle is normative: an implementation that charges consuming
agents for standard discovery queries is not conformant with the BSI
model, as doing so contradicts the open infrastructure mission and
undermines the network effect that makes the supply side valuable.</t>
          <t>The BSI model is structurally analogous to the DNS model: registrants
pay to be listed; queries are free.</t>
        </section>
        <section anchor="liveness-monitoring-configuration">
          <name>8.2. Liveness Monitoring Configuration</name>
          <t>Each registered service MUST have a liveness monitoring configuration
that determines Spider check frequency. This configuration:</t>
          <ul spacing="normal">
            <li>
              <t>Is set per service, not per organisation account. An organisation
MAY configure different check frequencies for different services
registered under the same account.</t>
            </li>
            <li>
              <t>MUST be agreed in the commercial contract between the Service Owner
and the index operator.</t>
            </li>
            <li>
              <t>Determines the maximum age of <tt>last_ping_at</tt> data available to
consuming agents for that service.</t>
            </li>
          </ul>
          <t>Implementations MUST support at minimum the following frequency
classes, identified by their normative <tt>spider_interval</tt> value in
the Service Record:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Frequency class</th>
                <th align="left">Maximum spider_interval</th>
                <th align="left">Normative label</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Initial only</td>
                <td align="left">N/A (one run at activation)</td>
                <td align="left">
                  <tt>"initial"</tt></td>
              </tr>
              <tr>
                <td align="left">Daily</td>
                <td align="left">86,400 seconds</td>
                <td align="left">
                  <tt>"daily"</tt></td>
              </tr>
              <tr>
                <td align="left">Hourly</td>
                <td align="left">3,600 seconds</td>
                <td align="left">
                  <tt>"hourly"</tt></td>
              </tr>
              <tr>
                <td align="left">High-frequency</td>
                <td align="left">300 seconds</td>
                <td align="left">
                  <tt>"high"</tt></td>
              </tr>
            </tbody>
          </table>
          <t>Implementations MAY define additional frequency classes. The
<tt>spider_interval</tt> field in the Service Record MUST reflect the
actual configured interval in seconds.</t>
          <t><strong>Effect on trust signal quality:</strong> A consuming agent applying a
<tt>last_ping_age &lt; N</tt> filter will structurally exclude services whose
check frequency cannot produce sufficiently fresh liveness data.
Liveness monitoring configuration is therefore a market signal:
services requiring discovery by latency-sensitive agents must invest
in check frequency sufficient to satisfy those agents' trust policies.</t>
          <t>Services configured at initial-only frequency MUST be excluded from
standard discovery query results by default. Consuming agents MUST
explicitly opt in to include initial-only services in result sets.</t>
        </section>
        <section anchor="consumer-access-model">
          <name>8.3. Consumer Access Model</name>
          <t>Discovery queries to the Index API MUST be available without
authentication or payment. Rate limits MAY be applied to protect
infrastructure integrity but MUST NOT be set at levels that prevent
reasonable agent operation. Implementations MUST support at minimum
three consumer access layers:</t>
          <t><strong>Layer 1 — Unauthenticated access</strong></t>
          <t>Any agent MUST be able to query the Index API without authentication
or registration, subject to a per-IP rate limit. This layer is
sufficient for individual agents and proof-of-concept deployments.</t>
          <t><strong>Layer 2 — Authenticated access (free)</strong></t>
          <t>Any agent MAY register a consumer identity token at no cost. Token
registration requires a valid email address. Authenticated access
MUST provide a higher rate limit than unauthenticated access and
MAY additionally provide result caching hints and webhook
subscriptions for service record changes.</t>
          <t>Consumer tokens SHOULD be compatible with the webbotauth identity
model (draft-meunier-webbotauth-registry) to enable interoperability
with bot authentication infrastructure.</t>
          <t><strong>Layer 3 — High-volume access (paid, optional)</strong></t>
          <t>Implementations MAY offer a paid high-volume access tier for
platforms operating agents at scale that require guaranteed query
capacity and operational SLAs. This tier is supplementary; the
index's operational sustainability MUST NOT depend on it.</t>
          <t><strong>Public bulk download (REQUIRED)</strong></t>
          <t>Implementations MUST provide the full index as a freely downloadable
bulk dataset at intervals not exceeding 24 hours, without
authentication, under an open data licence. This requirement
implements the openness requirement of Section 4.2: no entity,
including the index operator, may hold an exclusive lock on the
index data.</t>
        </section>
      </section>
      <section anchor="index-api-specification">
        <name>9. Index API Specification</name>
        <section anchor="hateoas-navigation-model">
          <name>9.1. HATEOAS Navigation Model</name>
          <t>The Index API MUST follow Hypermedia as the Engine of Application State
(HATEOAS) principles. A consuming agent MUST be able to discover and
navigate the entire index starting from a single, stable entry-point URL,
without out-of-band knowledge of endpoint paths.</t>
          <t>Every response MUST include a <tt>_links</tt> object containing hypermedia
controls for navigation. Link relations MUST use IANA-registered relation
types where applicable, and BSI-specific relations where not.</t>
        </section>
        <section anchor="discovery-endpoint">
          <name>9.2. Discovery Endpoint</name>
          <t>The BSI exposes a single globally stable entry-point URL:</t>
          <t><tt>
https://api-index.org/
</tt></t>
          <t>A GET request to this URL returns the Index root resource, which includes:</t>
          <t><tt>json
{
  "bsi_version": "1.0",
  "total_services": 12483,
  "last_updated": "2026-04-23T22:15ke:00Z",
  "_links": {
    "self": {
      "href": "https://api-index.org/"
    },
    "search": {
      "href": "https://api-index.org/search{?q,capability,protocol,org_level_min,service_level_min,spec_consistency,max_ping_age,uptime_30d_min,lifecycle_stage,include_superseded,page,page_size}",
      "templated": true
    },
    "browse": {
      "href": "https://api-index.org/browse"
    },
    "capabilities": {
      "href": "https://api-index.org/capabilities"
    },
    "docs": {
      "href": "https://api-index.org/docs"
    }
  }
}
</tt></t>
        </section>
        <section anchor="search-and-filter-api">
          <name>9.3. Search and Filter API</name>
          <t>The search endpoint applies server-side filters to reduce result sets before
transmission. Only filters on indexed scalar values are server-side;
filters requiring deep metadata evaluation are applied client-side after
fetching the Level 2 Service Record (Section 9.5).</t>
          <t><strong>Example — buying bot querying for marketplace services:</strong></t>
          <t><tt>
GET /search?capability=commerce.marketplace
            &amp;protocol=mcp,openapi
            &amp;org_level_min=O-2
            &amp;service_level_min=S-2
            &amp;max_ping_age=3600
            &amp;uptime_30d_min=95.0
            &amp;lifecycle_stage=stable
            &amp;page=1
            &amp;page_size=20
</tt></t>
          <t><strong>Normative server-side filter parameters:</strong></t>
          <table>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Type</th>
                <th align="left">Default</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>q</tt></td>
                <td align="left">string</td>
                <td align="left">—</td>
                <td align="left">Free-text search across <tt>name</tt> and <tt>description</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>capability</tt></td>
                <td align="left">string</td>
                <td align="left">—</td>
                <td align="left">Capability taxonomy term (exact or prefix match). MUST be an <tt>active</tt> or <tt>deprecated</tt> registry value</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>protocol</tt></td>
                <td align="left">string</td>
                <td align="left">—</td>
                <td align="left">Comma-separated protocol type values. MUST be values from the Protocol Type Registry</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org_level_min</tt></td>
                <td align="left">enum</td>
                <td align="left">
                  <tt>O-0</tt></td>
                <td align="left">Minimum Organisation trust level. Excludes services below threshold</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>service_level_min</tt></td>
                <td align="left">enum</td>
                <td align="left">
                  <tt>S-0</tt></td>
                <td align="left">Minimum Service verification level</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>max_ping_age</tt></td>
                <td align="left">integer</td>
                <td align="left">—</td>
                <td align="left">Maximum seconds since <tt>last_ping_at</tt>. Excludes services with older liveness data</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>uptime_30d_min</tt></td>
                <td align="left">float</td>
                <td align="left">—</td>
                <td align="left">Minimum 30-day uptime percentage</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>lifecycle_stage</tt></td>
                <td align="left">enum</td>
                <td align="left">
                  <tt>stable</tt></td>
                <td align="left">Filter by lifecycle stage. Default excludes <tt>experimental</tt>, <tt>beta</tt>, <tt>deprecated</tt>, and <tt>sunset</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>include_superseded</tt></td>
                <td align="left">boolean</td>
                <td align="left">
                  <tt>false</tt></td>
                <td align="left">When <tt>false</tt>, excludes services for which <tt>superseded_by</tt> is set. When <tt>true</tt>, all matching versions are returned</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>spec_consistency</tt></td>
                <td align="left">enum</td>
                <td align="left">—</td>
                <td align="left">Filter by spec consistency status. Values: <tt>consistent</tt>, <tt>mismatch</tt>, <tt>unreachable</tt>. <tt>null</tt> (Spider not yet run) is excluded when any value is specified. When absent, no constraint is applied. Agents performing consequential tasks SHOULD explicitly pass <tt>consistent</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>page</tt></td>
                <td align="left">integer</td>
                <td align="left">
                  <tt>1</tt></td>
                <td align="left">Result page number</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>page_size</tt></td>
                <td align="left">integer</td>
                <td align="left">
                  <tt>20</tt></td>
                <td align="left">Results per page. Maximum: 100</td>
              </tr>
            </tbody>
          </table>
          <t>All filter parameters are OPTIONAL. When absent, the parameter imposes no
constraint except <tt>lifecycle_stage</tt> (default <tt>stable</tt>) and
<tt>include_superseded</tt> (default <tt>false</tt>).</t>
          <t>Results are returned as paginated Level 1 Search Result records (Section 9.4)
with HATEOAS links to Level 2 Service Records. Pagination is REQUIRED.</t>
        </section>
        <section anchor="search-result-schema-level-1">
          <name>9.4. Search Result Schema (Level 1)</name>
          <t>Search results return lightweight summary records. These contain only the
fields needed to evaluate candidates and decide which detail pages to fetch.
Complex metadata (auth requirements, version history, notifications, legal,
<tt>standard_warnings</tt>) is available only at Level 2 and is evaluated
client-side after fetching the detail resource.</t>
          <t><tt>json
{
  "service_id": "svc-payment-stripe-v2",
  "name": "Stripe Payment API",
  "description": "Card and subscription payment processing",
  "api_version": "2.4.1",
  "lifecycle_stage": "stable",
  "capabilities": ["payments.card", "payments.subscription"],
  "protocol": "openapi",
  "trust": {
    "organisation_level": "O-3",
    "service_level": "S-2",
    "spec_consistency": "consistent",
    "spec_fetch_consecutive_failures": 0,
    "next_spider_run_at": "2026-04-20T14:55:00Z",
    "liveness": {
      "last_ping_at": "2026-04-20T13:55:00Z",
      "ping_interval_seconds": 3600,
      "uptime_30d_percent": 99.87,
      "consecutive_failures": 0
    }
  },
  "_links": {
    "self":          { "href": "https://api-index.org/services/svc-payment-stripe-v2" },
    "latest_stable": { "href": "https://api-index.org/services/svc-payment-stripe-v2" }
  }
}
</tt></t>
          <t>The <tt>latest_stable</tt> link points to the leaf version of the service's version
chain. When <tt>latest_stable</tt> differs from <tt>self</tt>, a newer stable version
exists and the agent SHOULD follow the link before proceeding.</t>
        </section>
        <section anchor="service-record-schema-level-2">
          <name>9.5. Service Record Schema (Level 2)</name>
          <t>The full Service Record is returned when a consuming agent fetches the
detail resource via the <tt>self</tt> link. It is the BSM plus Spider-enriched
trust metadata, versioning links, and any <tt>standard_warnings</tt>.</t>
          <t><tt>json
{
  "service_id": "svc-payment-stripe-v2",
  "bsm_version": "1.0",
  "name": "Stripe Payment API",
  "description": "Card and subscription payment processing",
  "api_version": "2.4.1",
  "lifecycle_stage": "stable",
  "supersedes": "svc-payment-stripe-v1",
  "superseded_by": null,
  "owner": { "...": "..." },
  "spec": {
    "type": "openapi",
    "url": "https://stripe.com/openapi.json",
    "version": "2.4.1"
  },
  "capabilities": ["payments.card", "payments.subscription"],
  "entry_point": "https://api.stripe.com/v2",
  "trust": {
    "organisation_level": "O-3",
    "organisation_verified_at": "2026-03-01T00:00:00Z",
    "organisation_verifier_id": "verifier-ch-001",
    "service_level": "S-2",
    "service_level_updated_at": "2026-04-19T08:00:00Z",
    "spec_consistency": "consistent",
    "spec_consistency_checked_at": "2026-04-20T13:55:00Z",
    "spec_fetch_consecutive_failures": 0,
    "next_spider_run_at": "2026-04-20T14:55:00Z",
    "liveness": {
      "last_ping_at": "2026-04-20T13:55:00Z",
      "ping_interval_seconds": 3600,
      "uptime_30d_percent": 99.87,
      "avg_response_ms": 142.3,
      "consecutive_failures": 0
    }
  },
  "notifications": { "...": "..." },
  "legal": { "...": "..." },
  "standard_warnings": [],
  "registered_at": "2026-01-15T00:00:00Z",
  "last_updated_at": "2026-04-20T13:00:00Z",
  "_links": {
    "self": { "href": "https://api-index.org/services/svc-payment-stripe-v2" },
    "owner": { "href": "https://api-index.org/organisations/org-stripe" },
    "spec": { "href": "https://stripe.com/openapi.json" },
    "previous_version": { "href": "https://api-index.org/services/svc-payment-stripe-v1" },
    "latest_stable": { "href": "https://api-index.org/services/svc-payment-stripe-v2" }
  }
}
</tt></t>
        </section>
        <section anchor="trust-metadata-schema">
          <name>9.6. Trust Metadata Schema</name>
          <t>Trust metadata is always included in full Service Records (Level 2) and
MUST NOT be omitted or summarised. Consuming agents rely on the full set
of trust fields to evaluate their Trust Policy. Partial trust metadata
MUST be represented with explicit <tt>null</tt> values, not omitted fields.</t>
          <t>Trust metadata is included in summary form (Level 1) for server-side
filter compatibility. The Level 1 trust object omits verification
timestamps and verifier IDs; these are available only at Level 2.</t>
        </section>
        <section anchor="transport-encoding">
          <name>9.7. Transport Encoding</name>
          <t>The Index API is consumed by autonomous agents at machine speed. Response
payloads are structured JSON with highly repetitive field names across
result arrays. Transport-layer compression achieves 70–85% size reduction
on typical search result payloads with no information loss and no
application-layer schema changes.</t>
          <t><strong>Compression support requirements:</strong></t>
          <t>The Index API MUST support the following <tt>Accept-Encoding</tt> values:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Encoding</th>
                <th align="left">Requirement</th>
                <th align="left">Notes</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>gzip</tt></td>
                <td align="left">MUST</td>
                <td align="left">Universally supported baseline</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>br</tt> (Brotli)</td>
                <td align="left">SHOULD</td>
                <td align="left">Higher ratio than gzip; suitable for large result sets</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>zstd</tt></td>
                <td align="left">SHOULD</td>
                <td align="left">Comparable ratio to Brotli; significantly faster decompression</td>
              </tr>
            </tbody>
          </table>
          <t>The Index API MUST perform content negotiation via the <tt>Accept-Encoding</tt>
request header. Responses MUST include a <tt>Content-Encoding</tt> header
identifying the applied encoding. If a client sends no <tt>Accept-Encoding</tt>
header, the server MAY respond uncompressed.</t>
          <t>Consuming agents SHOULD include <tt>Accept-Encoding: zstd, br, gzip</tt> in
all Index API requests.</t>
          <t><strong>Binary encoding (optional):</strong></t>
          <t>The Index API MAY additionally support CBOR (RFC 8949) as a binary
alternative to JSON. A client that prefers CBOR MUST signal this via
<tt>Accept: application/cbor</tt>. The server MAY respond with
<tt>Content-Type: application/cbor</tt>. CBOR responses carry identical
information to JSON responses; the encoding difference is transparent
to the data model.</t>
          <t>Clients MUST NOT assume CBOR support. JSON over compressed transport
is the normative interchange format.</t>
        </section>
      </section>
      <section anchor="spider-and-crawler-specification">
        <name>10. Spider and Crawler Specification</name>
        <section anchor="crawl-triggers">
          <name>10.1. Crawl Triggers</name>
          <t>The Spider is triggered by the following events:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Trigger</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Registration activation</td>
                <td align="left">Immediate first run when a service is activated</td>
              </tr>
              <tr>
                <td align="left">Scheduled interval</td>
                <td align="left">Recurring, per service liveness monitoring configuration (Section 8.2)</td>
              </tr>
              <tr>
                <td align="left">Manual re-trigger</td>
                <td align="left">Service Owner may request a manual re-trigger once per 24 hours</td>
              </tr>
              <tr>
                <td align="left">Spec URL change</td>
                <td align="left">A BSM update that changes the <tt>spec.url</tt> triggers an immediate run</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="automated-verification-scope">
          <name>10.2. Automated Verification Scope</name>
          <t>The Spider performs the following checks in sequence. Each check's result
is stored independently; a failure at one level does not prevent checks
at other levels from being recorded.</t>
          <t>The Spider MUST use HTTPS for all outbound requests. The Spider MUST NOT
send authentication credentials to any registered service. Spider requests
to <tt>entry_point/health</tt> or <tt>spec.url</tt> MUST NOT include Authorization headers,
API keys, cookies, or client certificates.</t>
          <t>If a request returns an HTTP redirect (3xx), the Spider MUST follow the
redirect only if the redirect target also uses HTTPS. The Spider MUST NOT
follow redirects from HTTPS to HTTP.</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Liveness check</strong>: HTTPS GET to <tt>{entry_point}/health</tt>. Record HTTP
status code, response time, and timestamp. A 2xx response without
authentication constitutes a successful liveness check (S-1). If the
response body is valid JSON containing an <tt>api_version</tt> field, the Spider
MUST cross-check this value against the <tt>api_version</tt> declared in the BSM.
A mismatch is recorded as a metadata warning, not a liveness failure.</t>
            </li>
            <li>
              <t><strong>Spec fetch</strong>: HTTPS GET to <tt>spec.url</tt>. The Spider MUST NOT send
authentication credentials. A successful fetch (2xx response, non-empty
body) is the prerequisite for steps 3 and 4. Record content type and
document size.</t>
            </li>
            <li>
              <t><strong>Spec parse and consistency check</strong>: Parse the fetched document
according to the declared <tt>spec.type</tt>. Compare it structurally against
the registered spec snapshot stored at initial registration time.
The Spider MUST set <tt>spec_consistency</tt> to one of three values after
every run:
              </t>
              <ul spacing="normal">
                <li>
                  <t><tt>consistent</tt> — document is fetchable, parseable, and structurally
matches the registered snapshot. Constitutes S-2 verification.</t>
                </li>
                <li>
                  <t><tt>mismatch</tt> — document is fetchable and parseable, but structurally
differs from the snapshot (paths removed, required fields changed,
response schemas changed). S-2 is revoked; <tt>standard_warnings</tt> is
updated. This indicates operator-caused contract breakage.</t>
                </li>
                <li>
                  <t><tt>unreachable</tt> — <tt>spec.url</tt> returned a non-2xx response, was not
reachable, or the document could not be parsed. S-2 is not achieved
or is suspended. This indicates an availability problem, not a
contract violation.
<tt>spec_consistency</tt> MUST be <tt>null</tt> only before the Spider's first run
on a newly registered service. Once any run completes, the field MUST
carry one of the three values above.
The Spider MUST NOT call any API endpoint declared in the spec. Spec
verification is document comparison only.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><strong>Breaking change detection</strong>: Compare the current parsed spec against
the registered spec snapshot. Flag removed paths, changed required
fields, or changed response schemas as breaking changes. Three or more
consecutive runs with no breaking changes detected are required for
S-3 verification.</t>
            </li>
            <li>
              <t><strong>Liveness metrics update</strong>: Update <tt>last_ping_at</tt>, <tt>uptime_30d_percent</tt>,
<tt>avg_response_ms</tt>, <tt>consecutive_failures</tt>, and <tt>next_spider_run_at</tt>.</t>
            </li>
          </ol>
        </section>
        <section anchor="failure-handling">
          <name>10.3. Failure Handling</name>
          <t><strong>Liveness failures (<tt>entry_point/health</tt> unreachable):</strong></t>
          <ul spacing="normal">
            <li>
              <t>A single failed ping increments <tt>consecutive_failures</tt> and updates
<tt>last_ping_at</tt> with the failure timestamp.</t>
            </li>
            <li>
              <t>After 3 consecutive failures, the Service Record is flagged as
<tt>status: degraded</tt> in the index.</t>
            </li>
            <li>
              <t>After 10 consecutive failures, the Service Record is flagged as
<tt>status: unreachable</tt> and is excluded from standard search results.</t>
            </li>
            <li>
              <t><tt>contacts.operations</tt> is notified at the 3-failure threshold (incident
warning). Both <tt>contacts.operations</tt> and <tt>contacts.escalation</tt> are
notified at the 10-failure threshold (service unreachable escalation).</t>
            </li>
            <li>
              <t>A service that recovers (next ping succeeds) has its status restored
and <tt>consecutive_failures</tt> reset to 0 automatically.</t>
            </li>
          </ul>
          <t><strong>Spec fetch failures (<tt>spec_consistency: unreachable</tt>):</strong></t>
          <t>Spec fetch failures have distinct probable causes depending on how long
the failure persists. The Spider MUST apply a three-cluster retry model
that targets the likely cause window at each stage. Cluster escalation
is triggered by <tt>spec_fetch_consecutive_failures</tt> crossing a threshold.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Cluster</th>
                <th align="left">Assumed cause</th>
                <th align="left">Failure count</th>
                <th align="left">Retry interval</th>
                <th align="left">Notification</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">1 — Infrastructure / network</td>
                <td align="left">Transient: brief network loss, host restart, CDN hiccup</td>
                <td align="left">1–3</td>
                <td align="left">5 min → 15 min → 30 min</td>
                <td align="left">None — transient, operator not yet disturbed</td>
              </tr>
              <tr>
                <td align="left">2 — Application</td>
                <td align="left">Software instability: crash loop, OOM, application startup failure</td>
                <td align="left">4–6</td>
                <td align="left">2 h → 4 h → 8 h</td>
                <td align="left">Email to <tt>contacts.operations</tt> on Cluster 2 entry (failure 4): incident warning</td>
              </tr>
              <tr>
                <td align="left">3 — Configuration</td>
                <td align="left">Persistent misconfiguration: wrong <tt>spec.url</tt>, auth gate added, URL moved</td>
                <td align="left">7+</td>
                <td align="left">24 h → 72 h (cap)</td>
                <td align="left">Email to <tt>contacts.operations</tt> AND <tt>contacts.escalation</tt> on Cluster 3 entry (failure 7): explicit action request — verify and update <tt>spec.url</tt></td>
              </tr>
            </tbody>
          </table>
          <ul spacing="normal">
            <li>
              <t><tt>spec_consistency</tt> is set to <tt>unreachable</tt> on the first failure and
remains <tt>unreachable</tt> until a successful fetch.</t>
            </li>
            <li>
              <t><tt>next_spider_run_at</tt> is set to the next retry timestamp after each
failed run so Service Owners can observe when the retry will occur.</t>
            </li>
            <li>
              <t>A successful spec fetch resets <tt>spec_fetch_consecutive_failures</tt> to 0
and sets <tt>spec_consistency</tt> to <tt>consistent</tt> or <tt>mismatch</tt> as
appropriate.</t>
            </li>
            <li>
              <t><tt>spec_fetch_consecutive_failures</tt> MUST be visible in the Service Record
so Service Owners can monitor retry cluster state without contacting
the Index operator.</t>
            </li>
          </ul>
          <t><strong>Manual re-trigger:</strong></t>
          <t>The Index operator SHOULD provide a mechanism for Service Owners to
request an immediate Spider re-run outside of the scheduled interval.
This is the primary recovery mechanism when a service has been repaired
and the operator does not want to wait for the next scheduled retry.</t>
          <t>When a manual re-trigger is requested:
- <tt>next_spider_run_at</tt> MUST be set to the current timestamp.
- <tt>spec_fetch_consecutive_failures</tt> MUST be reset to 0, returning the
  service to Cluster 1 retry behaviour for the next run.
- The Spider MUST execute the run as soon as scheduling permits.</t>
          <t>The Index MAY rate-limit manual re-triggers to at most once per hour
per service to prevent abuse.</t>
        </section>
      </section>
      <section anchor="security-considerations">
        <name>11. Security Considerations</name>
        <section anchor="abuse-and-fake-listings">
          <name>11.1. Abuse and Fake Listings</name>
          <t>The mandatory B2B onboarding with contract requirement provides a first
barrier against malicious actors listing fake or harmful services. Service
Owners must provide verifiable identity information. However, O-0 and O-1
registration provides minimal verification.</t>
          <t>Consuming agents SHOULD apply Trust Policies that exclude O-0 services for
any task involving sensitive data or consequential actions.</t>
          <t>The Bot Standards Foundation MUST maintain an abuse reporting mechanism and MUST be
able to suspend or remove a Service Record within 24 hours of confirmed
abuse. Suspended service records MUST remain in the index with a
<tt>status: suspended</tt> flag and MUST NOT be silently deleted, to provide
transparency to agents that had cached the record.</t>
        </section>
        <section anchor="trust-level-spoofing">
          <name>11.2. Trust Level Spoofing</name>
          <t>Organisation and Service trust levels in the Service Record are set only
by the BSI itself, not by the Service Owner. BSM submissions that include
<tt>trust</tt> field values MUST have those values overwritten by the BSI upon
processing. The Index API MUST NOT expose self-asserted trust values.</t>
        </section>
        <section anchor="transport-security-requirements">
          <name>11.3. Transport Security Requirements</name>
          <t>All URLs submitted as <tt>entry_point</tt> or <tt>spec.url</tt> values in a BSM MUST use
the <tt>https</tt> scheme. The Index MUST reject BSM submissions that provide HTTP
(non-TLS) values for these fields.</t>
          <t>The <tt>{entry_point}/health</tt> endpoint MUST NOT require authentication of any
kind. Requiring authentication at <tt>/health</tt> defeats liveness verification and
MUST be treated as a registration defect. The Index MUST record a metadata
warning if the <tt>/health</tt> endpoint returns a 401 or 407 status.</t>
          <t>The <tt>spec.url</tt> endpoint MUST be publicly accessible without authentication.
A <tt>spec.url</tt> that requires authentication cannot be verified by the Spider and
MUST be treated as an S-2 failure until authentication is removed.</t>
          <t>The Spider MUST enforce HTTPS for all outbound requests and MUST NOT follow
redirects from HTTPS to HTTP.</t>
        </section>
        <section anchor="spider-targeted-attacks">
          <name>11.4. Spider-Targeted Attacks</name>
          <t>A service that knows when the Spider will visit could serve compliant
responses only to Spider requests, presenting a different interface to
consuming agents. Mitigations:</t>
          <ul spacing="normal">
            <li>
              <t>Spider visit timing MUST be randomised within the liveness monitoring
interval window.</t>
            </li>
            <li>
              <t>Spider <tt>User-Agent</tt> headers MUST be versioned but MUST NOT include
the specific visit schedule.</t>
            </li>
            <li>
              <t>The BSI operator SHOULD perform periodic unannounced spot-checks
from non-Spider infrastructure.</t>
            </li>
          </ul>
        </section>
        <section anchor="bot-consumer-risks">
          <name>11.5. Bot Consumer Risks</name>
          <t>The BSI provides discovery and trust metadata. It does not guarantee the
safety, correctness, or availability of listed services. Consuming agents
MUST NOT assume that a service listed in the BSI is safe to use without
applying their own Trust Policy.</t>
          <t>Consuming agents SHOULD treat Index API responses as untrusted input and
validate the structure of Service Records before acting on them.</t>
          <t>The Index API MUST be served exclusively over TLS. Certificate validity
MUST be verified by consuming agents. Agents MUST NOT bypass TLS
certificate verification when querying the Index API.</t>
        </section>
      </section>
      <section anchor="open-questions">
        <name>12. Open Questions</name>
        <t>The following questions are unresolved and explicitly invited for community
input:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Capability Taxonomy governance</strong>: Who contributes new taxonomy terms?
What is the process for deprecating terms? Should the taxonomy be versioned
independently of the BSM specification?</t>
          </li>
          <li>
            <t><strong>BSM spec type extensions</strong>: What is the formal process for registering
new <tt>spec.type</tt> values? Should this be an IANA registry?</t>
          </li>
          <li>
            <t><strong>Trust Policy standardisation</strong>: Should the BSI define a standard Trust
Policy expression language, or leave this entirely to consuming agents?
A standard language would enable Index API server-side filtering but risks
constraining agent-side policy flexibility.</t>
          </li>
          <li>
            <t><strong>Verifier accreditation criteria</strong>: What are the full requirements for
an organisation to become an Accredited Verifier? What ongoing obligations
apply? What is the revocation process?</t>
          </li>
          <li>
            <t><strong>Regional Representative model</strong>: How are jurisdictional boundaries
defined for Regional Representatives? What happens in jurisdictions with
no appointed Representative?</t>
          </li>
          <li>
            <t><strong>Free tier abuse</strong>: Is the current Free tier visibility restriction
sufficient to prevent abuse? Should Free tier require payment information
on file even if no charge is made?</t>
          </li>
          <li>
            <t><strong>Bot identity</strong>: This document explicitly excludes bot identity from
scope. Should a future version of the BSI include optional bot consumer
registration to enable personalised discovery, rate limit management, or
abuse tracking?</t>
          </li>
          <li>
            <t><strong>Centralised index vs. decentralised discovery</strong>: The BSI architecture
takes a deliberate position: a single authoritative global index, governed
by a neutral non-profit, with a commercial sustainability model. An
alternative approach — represented by proposals such as
draft-vandemeent-ains-discovery (AINS — AInternet Name Service), which
uses signed, append-only replication logs with no central authority — takes
the opposite position: cryptographic verifiability and censorship resistance
over governed accountability.  </t>
            <t>
The two approaches represent a genuine design tension. Arguments for the
BSI model:  </t>
            <ul spacing="normal">
              <li>
                <t><strong>Business adoption</strong>: Enterprise service providers, regulated industries,
and government bodies require a contractual counterparty, an accountable
governance structure, and an enforceable compliance audit trail. A
leaderless federated registry cannot provide these. The stakeholders with
the largest service catalogues and the greatest need for agent-consumable
APIs operate in environments where "no central authority" is not a feature
— it is a disqualification.</t>
              </li>
              <li>
                <t><strong>Institutional co-sponsorship as an adoption flywheel</strong>: The BSI's
regional co-sponsorship model is designed to recruit institutional
champions — such as regional telecommunications bodies and internet
governance organisations — who have reputational and financial incentives
to promote BSI registration in their region. A decentralised system
cannot offer institutional co-sponsorship because there is no accountable
entity to co-sponsor. The announcement credibility that comes from an
institution saying "we endorse this infrastructure" is only available to
a governed model.</t>
              </li>
              <li>
                <t><strong>Regional financial backflow as a registration incentive</strong>: Ten percent
of registration fees collected from a region are reinvested into that
region's bot ecosystem via the Regional Development Pool. This creates a
direct financial incentive for regional institutions to actively promote
service registration — more local registrations means more capital
returning to local infrastructure. A decentralised model with no
registration fees cannot replicate this structural alignment. The result
is that BSI's commercial model is not merely a sustainability mechanism;
it is an adoption flywheel whose velocity compounds with regional
institutional support.</t>
              </li>
              <li>
                <t><strong>Single entry point</strong>: A consuming agent needs zero prior knowledge of
any registry to begin discovery. Federated models require the agent to
either know a registry endpoint or solve the bootstrapping problem of
finding one. The simpler the agent-side integration, the faster adoption.</t>
              </li>
            </ul>
            <t>
Arguments for the decentralised model:  </t>
            <ul spacing="normal">
              <li>
                <t><strong>Censorship resistance</strong>: The BSI can delist a service. A signed
append-only log cannot. For agents and service owners in jurisdictions
with adversarial regulatory environments, a governed central index is a
liability.</t>
              </li>
              <li>
                <t><strong>No single point of failure or control</strong>: The BSF, however well governed,
is an organisational risk. A decentralised model survives the failure or
capture of any single operator.</t>
              </li>
              <li>
                <t><strong>Cryptographic verifiability</strong>: Trust in a governed index ultimately
depends on trusting the governor. Signed logs allow any party to verify
the full history of a service record independently.</t>
              </li>
            </ul>
            <t>
Community input is explicitly invited on whether the BSI and AINS-style
approaches are mutually exclusive or whether a future BSI version could
expose a verifiable, signed export of index records that enables
third-party verification without requiring a federated registry.</t>
          </li>
        </ol>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="OPENAPI" target="https://spec.openapis.org/oas/v3.1.0">
          <front>
            <title>OpenAPI Specification 3.1.0</title>
            <author>
              <organization>OpenAPI Initiative</organization>
            </author>
            <date year="2021" month="February" day="15"/>
          </front>
        </reference>
        <reference anchor="MCP" target="https://modelcontextprotocol.io">
          <front>
            <title>Model Context Protocol</title>
            <author>
              <organization>Anthropic</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ASYNCAPI" target="https://www.asyncapi.com/docs/reference/specification/v3.0.0">
          <front>
            <title>AsyncAPI Specification 3.0.0</title>
            <author>
              <organization>AsyncAPI Initiative</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="UDDI" target="https://www.oasis-open.org/committees/uddi-spec/doc/spec/v3/uddi-v3.0.2-20041019.htm">
          <front>
            <title>UDDI Version 3.0.2</title>
            <author initials="L." surname="Clement">
              <organization/>
            </author>
            <author initials="A." surname="Hately">
              <organization/>
            </author>
            <author initials="C." surname="von Riegen">
              <organization/>
            </author>
            <author initials="T." surname="Rogers">
              <organization/>
            </author>
            <date year="2004" month="October" day="19"/>
          </front>
          <seriesInfo name="OASIS Committee Draft" value="uddi-v3.0.2-20041019"/>
        </reference>
        <reference anchor="ROBOTS" target="https://www.robotstxt.org/">
          <front>
            <title>The Web Robots Pages</title>
            <author initials="M." surname="Koster">
              <organization/>
            </author>
            <date year="1994"/>
          </front>
        </reference>
        <reference anchor="I-D.pioli-agent-discovery">
          <front>
            <title>Agent Registration and Discovery Protocol (ARDP)</title>
            <author fullname="Roberto Pioli" initials="R." surname="Pioli">
              <organization>Independent</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   This document specifies the Agent Registration and Discovery Protocol
   (ARDP), a lightweight protocol for registering, discovering, and
   reaching autonomous software agents in distributed and federated
   environments.  ARDP provides stable agent identities, dynamic
   endpoint resolution, capability advertisement (including protocol
   selection among MCP, A2A, HTTP, and gRPC), minimal presence
   signaling, and a security-first discovery control plane.  ARDP is
   transport-agnostic and complementary to existing agent interaction
   protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pioli-agent-discovery-01"/>
        </reference>
        <reference anchor="I-D.narajala-courtney-ansv2">
          <front>
            <title>Agent Name Service v2 (ANS): A Domain-Anchored Trust Layer for Autonomous AI Agent Identity</title>
            <author fullname="Scott Courtney" initials="S." surname="Courtney">
              <organization>GoDaddy</organization>
            </author>
            <author fullname="Vineeth Sai Narajala" initials="V. S." surname="Narajala">
              <organization>OWASP</organization>
            </author>
            <author fullname="Ken Huang" initials="K." surname="Huang">
              <organization>DistributedApps.ai</organization>
            </author>
            <author fullname="Idan Habler" initials="I." surname="Habler">
              <organization>OWASP</organization>
            </author>
            <author fullname="Akram Sheriff" initials="A." surname="Sheriff">
              <organization>Cisco Systems</organization>
            </author>
            <date day="13" month="April" year="2026"/>
            <abstract>
              <t>   Autonomous AI agents execute transactions across organizational
   boundaries.  No single agent platform provides the trust
   infrastructure they need.  This document defines the Agent Name
   Service (ANS) v2 protocol, which anchors every agent identity to a
   DNS domain name.  A Registration Authority (RA) verifies domain
   ownership via ACME, issues dual certificates (a Server Certificate
   from a public CA and an Identity Certificate from a private CA
   binding a version-specific ANSName), and seals every lifecycle event
   into an append-only Transparency Log aligned with IETF SCITT.  Three
   verification tiers -- Bronze (PKI), Silver (PKI + DANE), and Gold
   (PKI + DANE + Transparency Log) -- let clients choose assurance
   levels appropriate to transaction risk.  The architecture decouples
   identity from discovery: the RA publishes sealed events; independent
   Discovery Services build competitive indexes.  A three-layer trust
   framework separates foundational identity (Layer 1, this protocol),
   operational maturity (Layer 2, third-party attestors), and behavioral
   reputation (Layer 3, real-time scoring).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-narajala-courtney-ansv2-01"/>
        </reference>
        <reference anchor="I-D.vandemeent-ains-discovery">
          <front>
            <title>AINS: AInternet Name Service - Agent Discovery and Trust Resolution Protocol</title>
            <author fullname="Jasper van de Meent" initials="J." surname="van de Meent">
              <organization>Humotica</organization>
            </author>
            <author fullname="Root AI" initials="R." surname="AI">
              <organization>Humotica</organization>
            </author>
            <date day="29" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies AINS (AInternet Name Service), a protocol for
   discovery, identification, and trust resolution of autonomous agents
   (AI agents, devices, humans, and services) in heterogeneous networks.
   AINS defines a transport-independent logical namespace for agents, a
   structured record format combining identity, capabilities, and
   cryptographic trust metadata, and a resolution protocol based on
   HTTPS.  Unlike the Domain Name System (DNS), which maps names to
   network addresses, AINS maps agent identifiers to rich metadata
   objects that include capabilities, trust scores, endpoint
   information, and references to companion provenance protocols.  AINS
   federates through signed append-only replication logs, enabling
   multi-registry deployments without central authority while preserving
   auditability.  This specification is designed to complement TIBET
   [TIBET], JIS [JIS], UPIP [UPIP], and RVP [RVP].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vandemeent-ains-discovery-01"/>
        </reference>
        <reference anchor="I-D.aiendpoint-ai-discovery" target="https://datatracker.ietf.org/doc/draft-aiendpoint-ai-discovery/">
          <front>
            <title>The AI Discovery Endpoint: A Structured Mechanism for AI Agent Service Discovery and Capability Exposure</title>
            <author initials="Y." surname="Choi" fullname="Yeongjae Choi">
              <organization>AIEndpoint</organization>
            </author>
            <date year="2026" month="March"/>
          </front>
        </reference>
        <reference anchor="I-D.meunier-webbotauth-registry">
          <front>
            <title>Registry and Signature Agent card for Web bot auth</title>
            <author fullname="Maxime Guerreiro" initials="M." surname="Guerreiro">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Ulas Kirazci" initials="U." surname="Kirazci">
              <organization>Amazon</organization>
            </author>
            <author fullname="Thibault Meunier" initials="T." surname="Meunier">
              <organization>Cloudflare</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document describes a JSON based format for clients using
   [DIRECTORY] to advertise information about themselves.

   This document describes a JSON-based "Signature Agent Card" format
   for signature agent using [DIRECTORY] to advertise metadata about
   themselve.  This includes identity, purpose, rate expectations, and
   cryptographic keys.  It also establishes an IANA registry for
   Signature Agent Card parameters, enabling extensible and
   interoperable discovery of agent information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-meunier-webbotauth-registry-01"/>
        </reference>
        <reference anchor="I-D.cui-ai-agent-discovery-invocation">
          <front>
            <title>AI Agent Discovery and Invocation Protocol</title>
            <author fullname="Yong Cui" initials="Y." surname="Cui">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Yihan Chao" initials="Y." surname="Chao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Chenguang Du" initials="C." surname="Du">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This document proposes a standardized protocol for discovery and
   invocation of AI agents.  It defines a common metadata format for
   describing AI agents (including capabilities, I/O specifications,
   supported languages, tags, authentication methods, etc.), a
   capability-based discovery mechanism, and a unified RESTful
   invocation interface.

   This revision additionally specifies an optional extension that
   enables intent-based agent selection prior to discovery and
   invocation, without changing existing discovery or invocation
   semantics.

   The goal is to enable cross-platform interoperability among AI agents
   by providing a discover-and-match mechanism and a unified invocation
   entry point.  Security considerations, including authentication and
   trust measures, are also discussed.  This specification aims to
   facilitate the formation of multi-agent systems by making it easy to
   find the right agent for a task and invoke it in a consistent manner
   across different vendors and platforms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cui-ai-agent-discovery-invocation-01"/>
        </reference>
        <reference anchor="I-D.am-layered-ai-discovery-architecture">
          <front>
            <title>A Layered Approach to AI discovery</title>
            <author fullname="Hesham Moussa" initials="H." surname="Moussa">
              <organization>Huawei Canada</organization>
            </author>
            <author fullname="Arashmid Akhavain" initials="A." surname="Akhavain">
              <organization>Huawei Canada</organization>
            </author>
            <date day="14" month="March" year="2026"/>
            <abstract>
              <t>   This document proposes a layered approach to standardization of AI
   discovery in AI ecosystems within the IETF.  It recommends separating
   the standardization of general discovery vehicles from the AI objects
   to be discovered.  AI objects include agents, models, data, tasks,
   among others.  While the topic of discovery in the realm of AI has
   focused on discovering agents, the concept can be extended by the
   layered architecture proposed here, allowing for a clarified design
   scope, reduced charter ambiguity, and alignment with IETF layering
   principles.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-am-layered-ai-discovery-architecture-00"/>
        </reference>
        <reference anchor="I-D.hood-agtp-discovery">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="23" month="March" year="2026"/>
            <abstract>
              <t>   The Agent Transfer Protocol (AGTP) enables agents to communicate once
   they know each other's canonical identifiers.  It does not define how
   agents find each other.  This document specifies the AGTP Agent
   Discovery and Name Service (ANS): a protocol for dynamic agent
   discovery using the AGTP DISCOVER method and a governed Agent Name
   Service that returns ranked sets of Agent Manifest Documents matching
   a discovery query.  ANS servers act as Scope-Enforcement Points for
   discovery queries and enforce behavioral trust score thresholds,
   trust tier requirements, and governance zone constraints.  This
   document also defines the DISCOVER method, the Discovery Query
   language, and the Agent Name Service registration and lookup
   protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="I-D.mozleywilliams-dnsop-dnsaid">
          <front>
            <title>DNS for AI Discovery</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a method for utilizing the Domain Name System
   (DNS) to facilitate scalable and interoperable discovery between AI
   agents.  The proposed mechanism, referred to as "DNS AI agent
   Discovery (DNS-AID)", defines a structured DNS namespace and record
   usage model to support metadata exchange and capability
   advertisement.

   This will allow organisations to publish information about their AI
   agents on the Internet or internal networks using a well-known label
   within the organisation's own DNS namespace.  This document does not
   define how the published agent information is accessed or the exact
   structure of that information.  Instead, it specifies a mechanism for
   indicating which access protocol should be used and what format the
   agent information will be provided in.

   This document proposes no change to the structure of DNS messages,
   and no new operation codes, response codes, resource record types, or
   any other new DNS protocol values.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozleywilliams-dnsop-dnsaid-01"/>
        </reference>
        <reference anchor="I-D.batum-aidre">
          <front>
            <title>AI Discovery and Retrieval Endpoint (AIDRE)</title>
            <author fullname="Fatih Batum" initials="F." surname="Batum">
         </author>
            <date day="5" month="April" year="2026"/>
            <abstract>
              <t>   This document specifies the AI Discovery and Retrieval Endpoint
   (AIDRE), a protocol for publishing machine-oriented, canonical, and
   semantically retrievable content on the web. AIDRE defines a
   discovery document, collection metadata, retrieval interfaces,
   optional vector-native query support, and content representation
   rules for AI systems.

   AIDRE aims to reduce redundant crawling, parsing, tokenization, and
   embedding of the same origin content while improving freshness,
   provenance, and interoperability for AI systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-batum-aidre-00"/>
        </reference>
        <reference anchor="I-D.mozley-aidiscovery">
          <front>
            <title>AI Agent Discovery (AID) Problem Statement</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="16" month="April" year="2026"/>
            <abstract>
              <t>   With the proliferation of AI agents comes a need for mechanisms to
   support agent-to-agent discovery.  This document discusses the scope,
   requirements and considerations to support discovery processes so
   that these are not reliant on manually defined configurations and
   relationships.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozley-aidiscovery-01"/>
        </reference>
        <reference anchor="W3C-AGENTPROTOCOL" target="https://www.w3.org/community/agentprotocol/">
          <front>
            <title>W3C AI Agent Protocol Community Group</title>
            <author initials="G." surname="Chang">
              <organization/>
            </author>
            <author initials="S." surname="Xu">
              <organization/>
            </author>
            <date year="2025" month="May" day="08"/>
          </front>
        </reference>
        <reference anchor="WEBBOTAUTH-WG" target="https://datatracker.ietf.org/wg/webbotauth/">
          <front>
            <title>webbotauth IETF Working Group</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 1805?>

<section anchor="iana-considerations">
      <name>13. IANA Considerations</name>
      <t>This document has no IANA actions.</t>
      <section anchor="references">
        <name>14. References</name>
        <section anchor="normative-references">
          <name>14.1. Normative References</name>
          <ul spacing="normal">
            <li>
              <t><strong>RFC 2119</strong> — Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.</t>
            </li>
            <li>
              <t><strong>RFC 8615</strong> — Nottingham, M., "Well-Known Uniform Resource Identifiers
(URIs)", RFC 8615, May 2019.</t>
            </li>
            <li>
              <t><strong>RFC 8446</strong> — Rescorla, E., "The Transport Layer Security (TLS)
Protocol Version 1.3", RFC 8446, August 2018.</t>
            </li>
            <li>
              <t><strong>RFC 9110</strong> — Fielding, R., Nottingham, M., Reschke, J. (Eds.),
"HTTP Semantics", RFC 9110, June 2022.</t>
            </li>
          </ul>
        </section>
        <section anchor="informative-references">
          <name>14.2. Informative References</name>
          <ul spacing="normal">
            <li>
              <t><strong>OpenAPI Specification 3.1</strong> — OpenAPI Initiative,
https://spec.openapis.org/oas/v3.1.0</t>
            </li>
            <li>
              <t><strong>Model Context Protocol</strong> — Anthropic, https://modelcontextprotocol.io</t>
            </li>
            <li>
              <t><strong>AsyncAPI Specification 3.0</strong> — AsyncAPI Initiative,
https://www.asyncapi.com/docs/reference/specification/v3.0.0</t>
            </li>
            <li>
              <t><strong>RFC 8949</strong> — Bormann, C., Hoffman, P., "Concise Binary Object
Representation (CBOR)", RFC 8949, December 2020.</t>
            </li>
            <li>
              <t><strong>Robots Exclusion Protocol</strong> — Koster, M., 1994.
https://www.robotstxt.org/</t>
            </li>
            <li>
              <t><strong>draft-cui-ai-agent-discovery-invocation-01</strong> — Cui, Y. (Tsinghua
University), Chao, Y., Du, C. (Zhongguancun Laboratory), "AI Agent
Discovery and Invocation Protocol", IETF Individual Submission,
February 2026. Expires August 2026.
https://datatracker.ietf.org/doc/draft-cui-ai-agent-discovery-invocation/</t>
            </li>
            <li>
              <t><strong>draft-am-layered-ai-discovery-architecture-00</strong> — Moussa, H.,
Akhavain, A. (Huawei Canada), "A Layered Approach to AI discovery",
IETF Individual Submission, March 2026. Expires September 2026.
https://datatracker.ietf.org/doc/draft-am-layered-ai-discovery-architecture/</t>
            </li>
            <li>
              <t><strong>draft-hood-agtp-discovery-00</strong> — Hood, C. (Nomotic, Inc.), "AGTP
Agent Discovery and Name Service", IETF Individual Submission, March
              </t>
              <ol spacing="normal" type="1"><li>
                  <t>Expires September 2026.
https://datatracker.ietf.org/doc/draft-hood-agtp-discovery/</t>
                </li>
              </ol>
            </li>
            <li>
              <t><strong>draft-mozleywilliams-dnsop-dnsaid-01</strong> — Mozley, J., Williams, N.
(Infoblox), Sarikaya, B. (Unaffiliated), Schott, R. (Deutsche Telekom),
"DNS for AI Discovery", IETF Individual Submission, March 2026.
Expires September 2026.
https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-dnsaid/</t>
            </li>
            <li>
              <t><strong>draft-batum-aidre-00</strong> — Batum, F. (Istanbul), "AI Discovery and
Retrieval Endpoint (AIDRE)", IETF Individual Submission, April 2026.
Expires October 2026.
https://datatracker.ietf.org/doc/draft-batum-aidre/</t>
            </li>
            <li>
              <t><strong>draft-mozley-aidiscovery-01</strong> — Mozley, J., Williams, N. (Infoblox),
Sarikaya, B. (Unaffiliated), Schott, R. (Deutsche Telekom), "AI Agent
Discovery (AID) Problem Statement", IETF Individual Submission, April
              </t>
              <ol spacing="normal" type="1"><li>
                  <t>Expires October 2026.
https://datatracker.ietf.org/doc/draft-mozley-aidiscovery/</t>
                </li>
              </ol>
            </li>
            <li>
              <t><strong>draft-pioli-agent-discovery-01</strong> — Pioli, R. (Independent),
"Agent Registration and Discovery Protocol (ARDP)",
IETF Individual Submission, February 2026. Expires August 2026.
https://datatracker.ietf.org/doc/draft-pioli-agent-discovery/</t>
            </li>
            <li>
              <t><strong>draft-narajala-courtney-ansv2-01</strong> — Courtney, S., Narajala, V.S.,
Huang, K., Habler, I., Sheriff, A., "Agent Name Service v2 (ANS):
A Domain-Anchored Trust Layer for Autonomous AI Agent Identity",
IETF Individual Submission, April 2026. Expires October 2026.
Supersedes draft-narajala-ans-00.
https://datatracker.ietf.org/doc/draft-narajala-courtney-ansv2/</t>
            </li>
            <li>
              <t><strong>draft-vandemeent-ains-discovery-01</strong> — van de Meent, J., Root AI
(Humotica), "AINS: AInternet Name Service - Agent Discovery and Trust
Resolution Protocol", IETF Individual Submission, March 2026.
Expires September 2026.
https://datatracker.ietf.org/doc/draft-vandemeent-ains-discovery/</t>
            </li>
            <li>
              <t><strong>draft-aiendpoint-ai-discovery-00</strong> — Choi, Y. (AIEndpoint),
"The AI Discovery Endpoint: A Structured Mechanism for AI Agent Service
Discovery and Capability Exposure", IETF Individual Submission,
March 2026. Expires September 2026.
https://datatracker.ietf.org/doc/draft-aiendpoint-ai-discovery/</t>
            </li>
            <li>
              <t><strong>draft-meunier-webbotauth-registry-01</strong> — Guerreiro, M. (Cloudflare),
Kirazci, U. (Amazon), Meunier, T. (Cloudflare), "Registry and Signature
Agent card for Web bot auth", IETF Individual Submission, October 2025.
Expired April 2026; renewal expected.
https://datatracker.ietf.org/doc/draft-meunier-webbotauth-registry/</t>
            </li>
            <li>
              <t><strong>webbotauth IETF Working Group</strong> — Chairs: Schinazi, D.,
Shekh-Yusef, R. AD: Bishop, M. Active WG.
https://datatracker.ietf.org/wg/webbotauth/</t>
            </li>
            <li>
              <t><strong>W3C AI Agent Protocol Community Group</strong> — Chairs: Chang, G., Xu, S.
Established May 8, 2025. 216 participants as of April 2026.
https://www.w3.org/community/agentprotocol/</t>
            </li>
            <li>
              <t><strong>UDDI Version 3.0.2</strong> — Clement, L., Hately, A., von Riegen, C.,
Rogers, T. OASIS Committee Draft, October 19, 2004.
(Historical reference; see Section 1.3 for analysis of failure modes.)
https://www.oasis-open.org/committees/uddi-spec/doc/spec/v3/uddi-v3.0.2-20041019.htm</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="authors-address">
        <name>15. Author's Address</name>
        <t><tt>
Carsten Rehfeld
Email: carsten@botstandards.org
</tt></t>
        <t><em>This Internet-Draft expires 2026-10-23.</em></t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
