| Internet-Draft | Intent Security | April 2026 |
| Jiang, et al. | Expires 3 October 2026 | [Page] |
Intent-based requests enable users, applications, and agents to express goals and constraints without specifying step-by-step procedures. Such intents are commonly translated into executable directives and propagated across multiple entities (clients, agents, authorization components, orchestration functions, and execution endpoints). This multi-hop processing expands the attack surface for tampering, privilege escalation, constraint bypass, and intent drift.¶
This document provides a solution-agnostic security analysis for intent-based requests across agentic systems. It introduces a reference model and scenarios to guide protocol and system design, and also presents threats and requirements. The document emphasizes constraint validation, invocation validation, multi-hop chain-of-custody, and policy-driven responses to drift, while remaining independent of any specific deployment domain.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 3 October 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Intent-based interaction is increasingly adopted in automation, orchestration, and agentic systems, where a request expresses desired outcomes and constraints rather than explicit procedures. A receiving system (or a chain of systems) translates the intent into executable directives and invokes tools or services to achieve the intended outcome.¶
Multi-hop processing (client-to-agent, agent-to-agent, agent-to-tool/service) introduces security risks beyond traditional single-hop APIs, including: (1) integrity and substitution attacks against derived directives, (2) privilege escalation during tool/service invocation, (3) constraint bypass, and (4) multi-hop intent drift where constraints degrade or diverge over transformations.¶
This document does not define a new protocol. Instead, it provides a security-oriented reference model, threat analysis, requirements, and scenarios to support future standardization and interoperable designs.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This document uses the following terms:¶
In many agentic systems, an intent is translated into executable directives (e.g., an allowed rule set) that must be propagated across multiple entities and enforced at execution endpoints. However, existing designs often lack end-to-end mechanisms that jointly ensure: (1) directives remain within authorized boundaries across transformations and propagation, (2) constraints are validated before execution, (3) invocations are privilege-checked and constraint-checked at each call boundary, and (4) drift is detected and handled under policy.¶
This document considers the following representative threats in multi-hop intent processing:¶
Based on the threats above, this document identifies the following security requirements:¶
This section introduces a technology-neutral reference model for intent-based requests. The model is aligned with intent-based system decomposition commonly used in IBN guidance [RFC9315], while remaining applicable to non-networking domains.¶
+--------------+ +---------------------------+
| User Space | | IBS Space |
| | Intent | |
| Intent |---------->| Intent Processing Func |
| Originator | Artifact | |
| |---------->| +---------+ +---------+ |
| Intent | | | Intent | |Constrain| |
| Client | | |Transform| |Validate |-+-> Policy/
+--------------+ | +---------+ +---------+ | Constrain
| | Authority
| +---------+ |
| |Invocate | |
| | Gate |--------------+-> Tool/
| +---------+ | Service
+---------------------------+ Provider
^ |
| Observe|
| v
+---------------------------+
| Observer (Monitoring) |
+---------------------------+
The figure separates User Space from IBS Space for clarity. Deployments may collapse functions into fewer components or distribute them across multiple agents and services.¶
The following entities are defined in the reference model:¶
This section provides an informative lifecycle overview to contextualize constraint validation, invocation validation, observation, and drift handling.¶
This section describes representative security scenarios using a consistent template: Setting, Actors, Assets, Attack Sketch, Impact, and Relevant Requirements. These scenarios are not exhaustive but illustrate key threat patterns in multi-hop intent processing.¶
Setting:¶
An IBS translates an intent into derived directives (e.g., allowed rules) that traverse multiple intermediaries before reaching an execution endpoint.¶
Actors:¶
Intent Originator, Intent Client, IBS, one or more intermediaries (agents/clients), Tool/Service Provider.¶
Assets:¶
Authorization boundary, constraints/invariants, protected resources, audit evidence.¶
Attack Sketch:¶
Impact:¶
Privilege escalation, policy bypass, unauthorized side effects, compliance violations.¶
Relevant Requirements:¶
R1 (Provenance and Authorization Boundary Binding), R2 (Chain-of-Custody for Derived Directives), R3 (Constraint Validation), R5 (Non-Bypass Enforcement), R6 (Observability and Auditability).¶
This section provides solution-agnostic security considerations mapped to the scenarios and requirements. Implementations may realize these considerations using different security mechanisms (tokens, signatures, attestation, policy engines, or protocol-level bindings).¶
Table 1 summarizes the primary mappings between the elaborated scenarios and security requirements. Note that these mappings are non-exhaustive; additional requirements may apply depending on deployment context.¶
| Scenario | Primary Threats | Key Requirements |
|---|---|---|
| 1 (Directive Tampering) | T1, T3 | R1, R2, R3, R5, R6 |
Scenario 1 highlights that derived directives are often more operationally powerful than the original intent text. Therefore, systems should treat derived directives as security-relevant artifacts whose integrity and authorization boundary binding should be protected across hops.¶
The core challenge is ensuring that derived directives cannot be tampered with or substituted in transit, and that execution endpoints can verify the authenticity and authorization boundary of received directives.¶
The following procedure is informative and solution-agnostic. Implementations may use various mechanisms (e.g., signed tokens, cryptographic binding, attestation) to achieve these objectives.¶
This procedure addresses T1 (Directive Tampering/Substitution) and T3 (Constraint Bypass) by establishing end-to-end integrity and validation across multi-hop processing.¶
Beyond the scenario-specific considerations, the following general principles apply to intent-based systems:¶
This document has no IANA actions.¶
TODO¶