<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[DazzaGreenwood's Weblog: OnAgents.org]]></title><description><![CDATA[Dazza Greenwood, On Agents]]></description><link>https://www.dazzagreenwood.com/s/onagentsorg</link><image><url>https://substackcdn.com/image/fetch/$s_!v1jL!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e53f9b-8d27-43c3-9104-5012b429a866_800x800.png</url><title>DazzaGreenwood&apos;s Weblog: OnAgents.org</title><link>https://www.dazzagreenwood.com/s/onagentsorg</link></image><generator>Substack</generator><lastBuildDate>Tue, 05 May 2026 08:46:47 GMT</lastBuildDate><atom:link href="https://www.dazzagreenwood.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Dazza Greenwood]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[dazzagreenwood@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[dazzagreenwood@substack.com]]></itunes:email><itunes:name><![CDATA[Dazza Greenwood]]></itunes:name></itunes:owner><itunes:author><![CDATA[Dazza Greenwood]]></itunes:author><googleplay:owner><![CDATA[dazzagreenwood@substack.com]]></googleplay:owner><googleplay:email><![CDATA[dazzagreenwood@substack.com]]></googleplay:email><googleplay:author><![CDATA[Dazza Greenwood]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Existing on the New Web]]></title><description><![CDATA[Your Next Customer Might Be an AI Agent. Will You Let Them In?]]></description><link>https://www.dazzagreenwood.com/p/existing-on-the-new-web</link><guid isPermaLink="false">https://www.dazzagreenwood.com/p/existing-on-the-new-web</guid><dc:creator><![CDATA[Dazza Greenwood]]></dc:creator><pubDate>Tue, 25 Nov 2025 05:18:28 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/408173ed-cc64-414a-8b46-027969d0f89e_1794x1340.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Stephen Burns runs a motorcycle repair shop out of his garage in Redwood City. He&#8217;s meticulous about local SEO and has been for years. But <a href="https://commoncrawl.org/blog/from-seo-to-aio-why-your-content-needs-to-exist-in-ai-training-data">recently, customers started showing up who hadn&#8217;t found him through Google</a>. They&#8217;d asked ChatGPT where to get their motorcycle fixed, and it sent them to his garage.</p><p>That story captures something important happening across the web right now. Discovery is being restructured. The customer journey increasingly runs through AI systems, and those systems have their own requirements for who they can see and recommend.</p><p>Burns got lucky: his content made it into the training data, and the model knew he existed. But many businesses aren&#8217;t so fortunate. And the unlucky ones often don&#8217;t even know they&#8217;re invisible.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5OR4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5OR4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png 424w, https://substackcdn.com/image/fetch/$s_!5OR4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png 848w, https://substackcdn.com/image/fetch/$s_!5OR4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png 1272w, https://substackcdn.com/image/fetch/$s_!5OR4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5OR4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png" width="1456" height="843" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:843,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:7312365,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.dazzagreenwood.com/i/179890635?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5OR4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png 424w, https://substackcdn.com/image/fetch/$s_!5OR4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png 848w, https://substackcdn.com/image/fetch/$s_!5OR4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png 1272w, https://substackcdn.com/image/fetch/$s_!5OR4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f33cb9f-40d1-4182-9eb3-a6c1abb382ee_2674x1548.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>The Shift (Almost) Nobody Prepared For</strong></h2><p>For twenty years, the web security playbook has been straightforward: humans good, bots bad. Build walls. Check CAPTCHAs. Rate-limit aggressively. Block anything that doesn&#8217;t look like a person clicking around.</p><p>That made sense when &#8220;bot&#8221; meant scrapers, spammers, and credential stuffers. But the category has fractured. Today, automated traffic includes:</p><p><strong>Training crawlers</strong> harvesting content for AI model development (Common Crawl, GPTBot, ClaudeBot). These are extractive and periodic with no user behind them, just dataset assembly.</p><p><strong>Retrieval bots</strong> fetching real-time information to augment AI responses (Perplexity, ChatGPT with browsing). These surface your content in AI-synthesized answers.</p><p><strong>Transaction agents</strong> acting on direct behalf of users to accomplish specific goals: book a flight, compare insurance quotes, place an order, schedule an appointment.</p><p>That third category is the one that should keep business leaders up at night, not because it&#8217;s dangerous, but because it&#8217;s <em>valuable</em>, and we&#8217;re systematically blocking it.</p><p>When a user tells their AI assistant &#8220;find me a hotel in Lisbon under &#8364;200 with good reviews and book it,&#8221; that agent is a customer. It has intent, a task, and (via the user) a credit card. If your site can&#8217;t accommodate it - or worse, actively blocks it - you&#8217;ve lost a sale to a competitor whose infrastructure was ready.</p><p>Consider Children&#8217;s Hospital of Los Angeles, one of the top pediatric cancer centers in the United States. It&#8217;s effectively invisible to AI assistants. When parents ask Gemini or ChatGPT where to take a child with leukemia in LA, CHLA doesn&#8217;t appear, not because the hospital opted out, but because their CDN&#8217;s default settings block AI crawlers. Families may be unable to find potentially life-saving care because of a configuration choice the hospital may not even know was made.</p><p>That&#8217;s the current state: valuable, legitimate discovery and transaction pathways being severed by infrastructure designed for a different threat model.</p><div><hr></div><h2><strong>Three Properties Your Web Presence Now Needs</strong></h2><p>I&#8217;ve been working on identity and authorization infrastructure for AI agents with colleagues across the industry, including co-authoring a <a href="https://arxiv.org/abs/2510.25819">recent whitepaper</a> on the topic. We keep returning to the same framework. For your web presence to function in an agent-mediated world, it needs three properties:</p><p><strong>Accessible</strong>: The agent can actually reach your content and services. Not blocked by CDN defaults, overzealous bot detection, or blanket crawler bans.</p><p><strong>Legible</strong>: The agent can understand what it finds. Structured data, semantic markup, machine-readable formats. Not just pretty HTML that requires a human eye to interpret.</p><p><strong>Actionable</strong>: The agent can <em>do something</em>. Complete a transaction, submit an inquiry, access a service. Not just read, but also act.</p><p>If any layer is missing, whether accessibility, legibility, or actionability, your web presence is invisible or inert to the fastest-growing discovery and transaction channel emerging today. Even if your site is live but not properly indexed for agent retrieval or omitted from the training corpus, you may still be invisible.</p><p>Most organizations have focused their AI strategy on the first category, namely training data accessibility, being &#8220;in the model.&#8221; That matters. But it&#8217;s table stakes. The real opportunity (and the real risk of missing out) is in the third category: enabling legitimate agents to transact on behalf of real users.</p><div><hr></div><h2><strong>The Verification Problem (And Why It&#8217;s Being Solved)</strong></h2><p>The obvious objection: &#8220;How do I tell a legitimate agent from a malicious bot? They look the same at the firewall.&#8221;</p><p>Fair point. Today, they often do look the same. User-agent strings are trivially spoofable. Traffic patterns can be mimicked. This is a real problem.</p><p>But it&#8217;s being actively solved. The IETF is developing <strong>Web Bot Auth</strong>, a protocol that allows agents to cryptographically prove their identity within HTTP requests, essentially a passport for responsible agents. Major players like Cloudflare and Vercel are involved in the effort. AWS Bedrock AgentCore already supports Web Bot Auth to reduce CAPTCHAs when its agents browse protected sites. This isn&#8217;t speculative; it&#8217;s shipping.</p><p>On the authorization side, OAuth 2.1 extensions are being developed to support explicit <strong>delegated authority</strong>, a formal &#8220;on-behalf-of&#8221; flow where the agent&#8217;s access token contains two distinct identifiers: the user who granted permission and the agent performing the action. This is critically different from impersonation. It creates a clear, auditable link: you can see both <em>who</em> authorized the action and <em>what</em> performed it.</p><p>The infrastructure is coming. The question is whether you&#8217;ll be ready for it, or scrambling to catch up while your competitors capture the agent-mediated market.</p><div><hr></div><h2><strong>What &#8220;Agent Optimization&#8221; Actually Means</strong></h2><p>We&#8217;ve spent two decades optimizing for search engines. Keywords, backlinks, page speed, mobile responsiveness, the whole SEO apparatus. Now a new optimization target is emerging: AI agents.</p><p><strong>Agent Optimization</strong> means:</p><ul><li><p><strong>Structured data that agents can parse</strong>: Schema.org markup, JSON-LD, clear semantic HTML. If an agent can&#8217;t extract your pricing, availability, or booking endpoint programmatically, you don&#8217;t exist to it.</p></li><li><p><strong>APIs and action endpoints</strong>: Not just content to read, but services to invoke. Can an agent place an order? Submit an inquiry? Check inventory? If the only path is clicking through a JavaScript-heavy checkout flow, you&#8217;re invisible to agent-mediated commerce.</p></li><li><p><strong>Authentication infrastructure that distinguishes agent types</strong>: Allow legitimate agents through while maintaining security. This requires moving beyond binary &#8220;human or bot&#8221; detection to nuanced policies based on verified identity and delegated scope.</p></li><li><p><strong>Consent and governance frameworks</strong>: When an agent accesses your systems on behalf of a user, what are the terms? What data can it retrieve? What actions can it perform? Clear policies, machine-readable where possible.</p></li></ul><p>The organizations that build this infrastructure now will have a significant advantage as agent-mediated interaction becomes mainstream. Those that don&#8217;t will find themselves optimized out of an increasingly important channel.</p><div><hr></div><h2><strong>The Stakes Are Higher Than You Think</strong></h2><p><strong>Scenario 1: E-commerce.</strong> A user asks their AI assistant to &#8220;order more of that coffee I liked from last month.&#8221; The agent needs to access the user&#8217;s order history (with permission), find the product, check availability, and complete a purchase. If your site can&#8217;t support this flow, the agent will find a competitor who sells similar coffee and <em>can</em> support it. You didn&#8217;t lose a customer to a better product. You lost them to better infrastructure.</p><p><strong>Scenario 2: Professional services.</strong> A business user tells their agent to &#8220;schedule a consultation with a commercial real estate attorney in Denver for next week.&#8221; The agent needs to find appropriate providers, check availability, and book an appointment. If your law firm&#8217;s website is a brochure with a &#8220;Contact Us&#8221; form and no structured data, the agent can&#8217;t engage. You don&#8217;t get the lead.</p><p><strong>Scenario 3: B2B procurement.</strong> A procurement agent is tasked with &#8220;find three suppliers for industrial adhesives that meet our specs and request quotes.&#8221; The agent needs to query product databases, compare specifications, and initiate RFQ processes. If your supplier portal requires human navigation through nested menus, you&#8217;re not in the consideration set.</p><p>In each case, the failure isn&#8217;t about the quality of your product or service. It&#8217;s about the accessibility, legibility, and actionability of your web presence to AI agents acting as legitimate proxies for potential customers.</p><div><hr></div><h2><strong>What You Should Do Now</strong></h2><p><strong>1. Audit your current accessibility.</strong> Are AI crawlers being blocked by your CDN? Check your Cloudflare settings, your robots.txt, your rate-limiting rules. Tools like <a href="https://canaiseeit.com/">CanAISeeIt</a> can analyze which known AI bots can access your site and how you&#8217;re showing up in AI-generated citations.</p><p><strong>2. Assess your legibility.</strong> Can a machine parse your key information? Do you have structured data for products, services, pricing, availability, locations? Run your pages through schema validators. If an agent can&#8217;t extract the basics, you have work to do.</p><p><strong>3. Evaluate your actionability.</strong> What can an agent actually <em>do</em> on your site? If the answer is &#8220;read content,&#8221; you&#8217;re only halfway there. Consider APIs, booking integrations, programmatic inquiry endpoints. What would it take for an agent to complete a transaction?</p><p><strong>4. Develop agent access policies.</strong> Not all automated access is equal. Define what types of agents you want to support, under what conditions, with what verification. This is a policy decision, not just a technical one.</p><p><strong>5. Watch the standards landscape.</strong> Web Bot Auth, OAuth for AI agents, <a href="https://modelcontextprotocol.io/">MCP (Model Context Protocol)</a>, A2A (<a href="https://innovation.consumerreports.org/agents-talking-to-agents-a2a-reshaping-the-marketplace-and-your-power/">Agent-to-Agent protocol,</a> and the related <a href="https://www.dazzagreenwood.com/p/agent-payments-protocol-ap2">Agent Payment Protocol</a>), these are developing rapidly. You don&#8217;t need to implement everything today, but you should understand what&#8217;s coming. To get started, check out this webinar I hosted last week discussing the <a href="https://youtu.be/LtFCXOOGPrw?si=Jd0yOb9bQz6gTB1V">emerging AI Agents standards race</a>, with senior representatives from Visa, Stripe, Skyfire, and Consumer Reports.</p><p><strong>6. Reframe the conversation internally.</strong> If your security team&#8217;s mandate is &#8220;block bots,&#8221; you have a framing problem. The mandate should be &#8220;enable legitimate access while blocking malicious actors.&#8221; Those are different objectives with different implementations.</p><p><strong>7. Think in two layers: live retrieval and foundational memory.</strong> Your site must both be live-index-ready and training-corpus-visible.</p><p>For purposes of being open for business by AI Agents, your current site needs to be discoverable and indexable <em>now</em> by whatever live web feeds support retrieval-augmented generation (RAG) and AI-agent search. That means ensuring your content is live, indexed, updated, structured, and accessible.</p><p>But there&#8217;s a second, equally strategic layer: ensuring your content is included in the training data of large language models. Being in the training corpus doesn&#8217;t guarantee retrieval, but being absent from it dramatically lowers your odds of ever being surfaced.</p><p>Treat properly identified AI crawlers (like Common Crawl&#8217;s CCBot) as strategic stakeholders, not threats. Allow appropriate access. Mark your content as machine-readable. Opt in rather than blocking by default.</p><p><strong>The formula: live indexing + training corpus inclusion = dual-path visibility in the era of agent-mediated discovery.</strong></p><div><hr></div><h2><strong>Practical Standards: What&#8217;s Working Now</strong></h2><p>The strategic framework matters, but so does implementation. Here&#8217;s what&#8217;s emerging as practical infrastructure for agent-readiness.</p><h3><strong>For Accessibility</strong></h3><p><strong>robots.txt is getting AI-specific extensions.</strong> The Robots Exclusion Protocol (now RFC 9309) remains the baseline, but an IETF draft proposes syntax to distinguish AI training from inference, letting you permit RAG-style answers while blocking training ingestion, or vice versa. AI crawlers like GPTBot, ClaudeBot, and Google-Extended already check robots.txt.</p><p><strong>Cloudflare now blocks AI crawlers by default</strong> for new customers. If you&#8217;re on Cloudflare, check your settings. Their AI Crawl Control features let you make nuanced decisions. Be intentional about your access policy rather than accepting defaults that may be making you invisible.</p><h3><strong>For Legibility</strong></h3><p><strong><a href="https://llmstxt.org/">llms.txt</a> is the clearest practical step you can take today.</strong> It&#8217;s a simple Markdown file at <code>/llms.txt</code> that provides a curated map of your most important content for AI systems: key docs, FAQs, policies, pricing, with links to clean Markdown versions where possible.</p><p>Here&#8217;s what a basic llms.txt file looks like:</p><pre><code><code># YourCompany.com

&gt; Brief description of what your company does and what this site offers.

## Key Pages
- [Product Overview](/docs/product-overview.md): What we offer and how it works
- [Pricing](/pricing.md): Current plans and pricing
- [API Documentation](/docs/api.md): Full API reference for developers

## Support &amp; Policies
- [FAQ](/faq.md): Common questions answered
- [Terms of Service](/legal/terms.md)
- [Contact](/contact.md): How to reach us
</code></code></pre><p>Adoption is growing. Directories like <a href="https://llmstxt.site/">llmstxt.site</a> and <a href="https://directory.llmstxt.cloud/">directory.llmstxt.cloud</a> track hundreds of implementations. GitBook has published tutorials. CMS platforms are building auto-generation features.</p><p>I&#8217;ve implemented llms.txt on several of my own sites, and I plan to expand this significantly, adding Markdown versions of key content and keeping the files current. It&#8217;s one of the most concrete things you can do right now.</p><p><strong>Structured data (JSON-LD / Schema.org) remains non-negotiable.</strong> Products, organizations, FAQs, events, locations, schema markup gives agents a machine-readable knowledge graph of your key entities.</p><h3><strong>For Actionability</strong></h3><p><strong>Expose your services as tools, not just pages.</strong> If you have APIs, document them with OpenAPI/Swagger specs. Agents can ingest these and treat your API as a callable tool, placing orders, checking inventory, submitting inquiries, rather than screen-scraping checkout flows.</p><p><strong>Consider MCP (Model Context Protocol).</strong> If you want agents to <em>act</em> on your services, exposing an <a href="https://modelcontextprotocol.io/">MCP</a>-compatible endpoint is increasingly the path. Your booking system, inventory lookup, or quote generator can become a tool that agents call directly, with proper authentication and scoping.</p><p><strong>The </strong><code>/ask</code><strong> endpoint pattern is emerging.</strong> A Microsoft-Cloudflare collaboration is pushing a model where sites expose conversational interfaces: <code>/ask</code> for human Q&amp;A, <code>/mcp</code> for agent tool calls, both backed by the same retrieval infrastructure. Forward-looking, but being built now.</p><h3><strong>For Diagnostics</strong></h3><p><strong>Check where you stand.</strong> <a href="https://canaiseeit.com/">CanAISeeIt</a> scores sites on AI visibility, crawler accessibility, and protocol compliance. Your server logs show which AI user-agents are visiting. If you&#8217;re not seeing CCBot, GPTBot, or ClaudeBot, find out why.</p><div><hr></div><h2><strong>The Web Is Being Rebuilt. Quietly.</strong></h2><p>What I&#8217;m describing isn&#8217;t a distant future. It&#8217;s happening now, mostly invisibly. Every major AI lab is building agent capabilities. Every major identity vendor is developing agent-specific IAM. Standards bodies are actively drafting protocols for agent authentication, authorization, and payment.</p><p>The shift from search engine optimization to AI optimization is directionally right as a framing, but it undersells the magnitude. SEO was about being found. Agent optimization is about being found <em>and</em> being usable by non-human actors who represent real human intent.</p><p>The web was built for human browsers, then retrofitted for search engine crawlers. Now it&#8217;s being rebuilt again, this time for AI agents that act as legitimate proxies for human users.</p><p>The organizations that recognize this shift and prepare for it will capture a new channel of demand. Those that don&#8217;t will watch that demand flow to competitors who were paying attention.</p><p>Your next customer might arrive via an AI agent. The question is whether you&#8217;ll recognize them as a customer, or lock them out as a bot.</p>]]></content:encoded></item><item><title><![CDATA[AI Agent ID]]></title><description><![CDATA[Deep diver into generative AI for business, law and life. Founder of law.MIT.edu (research) and CIVICS.com (consultancy).]]></description><link>https://www.dazzagreenwood.com/p/ai-agent-id</link><guid isPermaLink="false">https://www.dazzagreenwood.com/p/ai-agent-id</guid><dc:creator><![CDATA[Dazza Greenwood]]></dc:creator><pubDate>Wed, 05 Nov 2025 02:15:47 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/09fe13a9-0c77-40ce-9791-443a4046405c_812x614.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Why Identity Management for AI Agents Can&#8217;t Wait: Introducing Our New OpenID Foundation Whitepaper</strong></p><p>If you&#8217;re investing in, building, or deploying AI agents, there&#8217;s a foundational problem you need to understand: <strong>identity, authentication, and authorization for autonomous agents is fundamentally different from traditional software, and many current implementations are getting it wrong.</strong></p><p>Today, I&#8217;m excited to share a comprehensive whitepaper I co-authored for the OpenID Foundation: &#8220;<a href="https://arxiv.org/abs/2510.25819">Identity Management for Agentic AI: The New Frontier of Authorization, Authentication, and Security for an AI Agent World</a>.&#8221;</p><p><strong>Why This Matters Now</strong></p><p>As AI agents rapidly move from proof-of-concept to pilot and now to production, they&#8217;re creating urgent security and accountability challenges:</p><ul><li><p><strong>User impersonation is masking accountability</strong>. Most agents today act indistinguishably from their users, creating dangerous gaps in audit trails and accountability when things go wrong.</p></li><li><p><strong>Consent fatigue is inevitable</strong>. As agents proliferate, users will face thousands of authorization requests, leading to reflexive approval and security risks.</p></li><li><p><strong>Recursive delegation is uncharted territory</strong>. When agents spawn sub-agents or delegate tasks across organizational boundaries, we lack clear mechanisms for scope attenuation and attributable transitive trust.</p></li><li><p><strong>Cross-domain operations break current models</strong>. OAuth 2.1 works well within anchored trust domains, but agents operating more fluidly across organizational boundaries need something more robust.</p></li></ul><p><strong>What&#8217;s Already Working (and What Isn&#8217;t)</strong></p><p>The good news: we&#8217;re not starting from scratch. Current OAuth 2.1 frameworks, when properly implemented with protocols like MCP (Model Context Protocol), provide a starting point for enterprise agents accessing internal tools within a single trust domain.</p><p>The challenge: this only solves the simplest use cases. The moment agents need greater autonomy, asynchronous execution, or cross-domain delegation, existing patterns reveal significant gaps.  We identify several issues, options, and future opportunities in the whitepaper that I hope will provide a sound approach supporting everyone seeking to span that gap!</p><p><strong>A Huge Thanks to the Team</strong></p><p>I want to especially thank <strong>Tobin South</strong> for his incredible, energetic leadership as the primary author and editor who wrangled this entire effort together. His vision and persistence made this comprehensive work possible. I&#8217;m also thrilled that the <strong>Stanford &amp; Consumer Reports <a href="https://loyalagents.org/">Loyal Agents Initiative</a></strong> (where both Tobin and I are active) was able to collaborate on this project. This cross-institutional collaboration reflects the urgency and importance of getting agent identity right, especially for ensuring AI agents are safe and effective for consumers to use and rely upon, particularly when conducting e-commerce transactions and making binding commitments on behalf of users.</p><p><strong>What&#8217;s in the Paper</strong></p><p>The whitepaper provides both immediate, practical guidance and a strategic roadmap:</p><ul><li><p><strong>Section 2</strong> outlines current best practices using existing standards (OAuth 2.1, SCIM, SSO, CIBA) for today&#8217;s agent implementations</p></li><li><p><strong>Section 3</strong> tackles future challenges: delegated authority models, recursive delegation, scope attenuation, scalable consent mechanisms, and the economic layer (payments and financial transactions)</p></li><li><p><strong>Real-world use cases</strong> demonstrating where traditional IAM fails and what&#8217;s needed for high-velocity, asynchronous, and cross-domain agent operations</p></li></ul><p><strong>What&#8217;s Coming Next</strong></p><p>This whitepaper is just the beginning of a deeper exploration I&#8217;ll be sharing:</p><p><strong>Agent Protocols</strong>: I&#8217;ve already started with my recent post on <a href="https://www.dazzagreenwood.com/p/agent-payments-protocol-ap2">Agent Payments Protocol (AP2)</a> last month, with more protocol deep-dives to follow.</p><p><strong>Legal Dimensions</strong>: Building on my previous work on <a href="https://www.dazzagreenwood.com/p/when-ai-agents-conduct-transactions">AI agents conducting transactions</a>, <a href="https://www.dazzagreenwood.com/p/ueta-and-llm-agents-a-deep-dive-into">UETA and LLM agents</a>, and <a href="https://www.dazzagreenwood.com/p/recent-posts-on-ai-agents">recent agent legal frameworks</a>, I&#8217;ll be diving deeper into the legal infrastructure needed for increasingly autonomous agent transactions.</p><p><strong>Evals for AI Agents</strong>: Following up on my initial exploration <a href="https://www.dazzagreenwood.com/p/beyond-ai-benchmarks">beyond AI benchmarks</a>, I&#8217;ll be sharing frameworks for properly evaluating agent capabilities, safety, and reliability.</p><p><strong>High-Value Use Cases</strong>: Identifying and unpacking the specific scenarios where proper identity capabilities unlock significant new value and reduces risk.</p><p><strong>Agents Accelerating Research and Science</strong>: Exploring how properly governed agents can transform scientific discovery and research methodologies to spur innovation.</p><p><strong>Looking Forward with Clear Eyes</strong></p><p>I&#8217;m genuinely optimistic about the transformative potential of AI agents to augment human capabilities, empower consumers, and create new forms of value. The technical foundations exist, brilliant people across industry and academia are collaborating, and momentum is building toward interoperable standards.</p><p>But let&#8217;s be clear: <strong>many hard challenges remain</strong>. We need to move from impersonation to true delegation, build scalable governance mechanisms that respect user autonomy, create robust cross-domain trust fabrics, and ensure agents serve their users&#8217; interests loyally. The work of building safe, trustworthy, and effective agent systems is just beginning.</p><p>For those investing in AI agents: ignoring these identity and authorization challenges doesn&#8217;t make them go away, it just means you&#8217;ll hit them unexpectedly in production. This whitepaper aims to be your starting point for understanding what&#8217;s required and building responsibly from the ground up.</p><p><strong>Read the full paper</strong>: <a href="https://arxiv.org/abs/2510.25819">Identity Management for Agentic AI</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://arxiv.org/abs/2510.25819" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rFkI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png 424w, https://substackcdn.com/image/fetch/$s_!rFkI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png 848w, https://substackcdn.com/image/fetch/$s_!rFkI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png 1272w, https://substackcdn.com/image/fetch/$s_!rFkI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rFkI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png" width="812" height="614" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:614,&quot;width&quot;:812,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:495385,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://arxiv.org/abs/2510.25819&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.dazzagreenwood.com/i/178043410?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rFkI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png 424w, https://substackcdn.com/image/fetch/$s_!rFkI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png 848w, https://substackcdn.com/image/fetch/$s_!rFkI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png 1272w, https://substackcdn.com/image/fetch/$s_!rFkI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e9e2179-d2ce-46ce-a7a9-ce8c328dd01b_812x614.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Let&#8217;s build the future of autonomous agents together, securely, responsibly, accountably, and successfully! </p>]]></content:encoded></item><item><title><![CDATA[Agent Payments Protocol (AP2)]]></title><description><![CDATA[Initial Thoughts on Building the Business, Legal, and Technical Integrated Framework for the Emerging AI Agent Economy]]></description><link>https://www.dazzagreenwood.com/p/agent-payments-protocol-ap2</link><guid isPermaLink="false">https://www.dazzagreenwood.com/p/agent-payments-protocol-ap2</guid><dc:creator><![CDATA[Dazza Greenwood]]></dc:creator><pubDate>Wed, 17 Sep 2025 14:59:20 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9b45d996-fc7c-4594-8e8f-8494416fca4d_304x274.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Overview: AP2 as a Foundational Protocol for Trusted AI Commerce</strong></h3><p>Yesterday, Google announced the <a href="https://cloud.google.com/blog/products/ai-machine-learning/announcing-agents-to-payments-ap2-protocol?utm_source=newsletter.theaireport.ai&amp;utm_medium=newsletter&amp;utm_campaign=google-promises-safe-ai-agent-payments&amp;_bhlid=0a10d28d2600ed13f33e2173a3e98d51d415d06a">Agent Payments Protocol (AP2)</a>, a new, open standard designed to solve the fundamental question of trust in AI-driven payments in commerce. Today&#8217;s payment systems assume a human is clicking "buy." AP2 creates the framework for a world where autonomous AI agents can securely and verifiably transact on behalf of users and businesses.</p><p>It achieves this by introducing a system of <strong>Verifiable Credentials</strong> called "Mandates," which serve as cryptographically signed, auditable proof of authority and intent for every transaction. AP2 is not a new payment network; it is a data protocol that layers on top of the <strong>Agent2Agent (A2A) protocol</strong>, ensuring it can work with any payment method&#8212;from credit cards to real-time bank transfers. I previously wrote about A2A <a href="https://www.dazzagreenwood.com/p/recent-posts-on-ai-agents">here</a> in the" Agents Talking to Agents (A2A): Reshaping the Marketplace and Your Power" section.</p><h4><strong>Deep Dive: The Intent Mandate - The "Digital Power of Attorney"</strong></h4><p>The <strong>Intent Mandate</strong> is the most critical innovation for business and legal purposes. It is the core instrument of delegation for any transaction where the user is not present to give final approval (a "Human-Not-Present" scenario).</p><ul><li><p><strong>What it is:</strong> A legally and technically significant "delegation contract" that a user signs to grant an AI agent specific, constrained purchasing authority. It formally translates a user's goal (e.g., "Buy this item if the price drops below $100") into a set of enforceable rules.</p></li><li><p><strong>Legal Significance:</strong> It serves as non-repudiable proof that the user authorized the agent's action, providing a powerful evidentiary anchor for assigning liability and resolving disputes. It answers the question: "Who told the agent to do that?"</p></li><li><p><strong>Business Significance:</strong> It unlocks automated and conditional commerce. Businesses can empower agents to execute procurement strategies, manage subscriptions, or react to market opportunities autonomously, all while operating within pre-approved boundaries.</p></li></ul><h4><strong>Deep Dive: The Other Mandates - The "Evidentiary Chain"</strong></h4><p>Two other mandates complete the transaction's auditable trail:</p><ul><li><p><strong>The Cart Mandate:</strong> This is the "notarized purchase order" for <strong>Human-Present</strong> transactions. The merchant generates it to lock in the final terms (items, price, shipping), and the user signs it on a trusted device surface. It provides definitive proof of what was agreed upon at the moment of purchase.</p></li><li><p><strong>The Payment Mandate:</strong> This is the "transaction manifest" sent to the payment network (e.g., Visa, Mastercard). Its primary purpose is to signal that an AI agent was involved and whether a human was present. This allows issuers and networks to apply appropriate risk models and provides critical data for the financial ecosystem.</p></li></ul><div><hr></div><h3><strong>Examples and Use Cases for Consumers and Businesses</strong></h3><p>AP2 creates powerful new capabilities for both B2C and B2B commerce by providing a secure framework for delegation.</p><h4><strong>Consumer Use Cases: Convenience and Automation with Guardrails</strong></h4><p><strong>Deal Hunting<br></strong> A user wants to buy a specific gaming console but only if it drops below $400 before the holidays.<br> The user signs an <strong>Intent Mandate</strong> with the SKU, a price ceiling of $400, and an expiry date. The agent monitors prices and executes the purchase automatically when the condition is met.</p><p><strong>Time-Sensitive Purchases<br></strong> A user wants to buy tickets for a popular concert the moment they go on sale.<br> The user signs an <strong>Intent Mandate</strong> specifying the event, a seating preference (e.g., "front section"), and a maximum budget. The agent is pre-authorized to act instantly.</p><p><strong>Complex Travel Planning<br></strong> A user asks their agent: "Book me a round-trip flight and a 4-star hotel in London for the first week of December, total budget $1500."<br> The agent holds a signed <strong>Intent Mandate</strong>. It interacts with airline and hotel agents simultaneously. Once it finds a combination that fits the budget and criteria, it can execute both bookings.</p><p><strong>Subscription Management<br></strong> "Renew my streaming subscription, but only if the price doesn't increase by more than 10%."<br> An <strong>Intent Mandate</strong> governs the renewal. The agent verifies the price each cycle and either proceeds or pauses for user instruction if the price hike exceeds the limit.</p><p><strong>On-the-Go Purchases<br></strong> While driving, a user tells their voice assistant to order and pay for coffee from a nearby shop.<br> This is a <strong>Human-Present</strong> flow. The coffee shop's agent returns a <strong>Cart Mandate</strong>. The user provides a quick biometric approval on their phone or car's infotainment screen, signing the Cart Mandate to complete the payment.</p><div><hr></div><h4><strong>Business Use Cases: Auditable Automation and Control</strong></h4><p>AP2 is transformative for B2B transactions, providing the auditable trail necessary for corporate governance and financial controls.</p><p><strong>Automated Procurement<br></strong> A procurement manager authorizes an agent to re-order lab supplies from approved vendors whenever inventory drops below a threshold, provided the price per unit has not increased by more than 5% since the last order.<br> The manager signs an <strong>Intent Mandate</strong> that is cryptographically linked to their corporate identity. The mandate specifies the SKUs, the approved vendor list, and the 5% price variance rule. Every purchase is auditable and tied back to this specific, standing authorization.</p><p><strong>Contractor &amp; Field Operations<br></strong> A construction firm authorizes a site foreman's agent to purchase up to $5,000 in materials from Home Depot or Lowe's for a specific project.<br> The project manager issues a time-bound <strong>Intent Mandate</strong> linked to the foreman's identity and the project's budget code. The mandate limits the merchant category and total spend. The trail proves the expense was authorized for that project, streamlining reconciliation.</p><p><strong>Dynamic Cloud Resource Scaling<br></strong> An IT department authorizes an agent to scale cloud computing resources based on real-time demand, with a hard budget cap of $10,000/month.<br> The CIO signs an <strong>Intent Mandate</strong> allowing the agent to interact with the cloud provider's agent. The mandate contains the budget cap and service-level rules. This prevents runaway costs while enabling automation.</p><p><strong>Travel &amp; Expense Management<br></strong> An employee uses their corporate travel agent to book a trip. The company's policy (e.g., "economy class only, hotel under $300/night") is encoded into the agent's instructions.<br> The employee's request generates an <strong>Intent Mandate</strong> that also reflects corporate policy constraints. The auditable trail shows the booking was compliant, simplifying expense reporting. The employee's identity is tied to the authorization.</p><div><hr></div><h3><strong>Structuring the Corresponding Legal Framework: The Letter of Authorization</strong></h3><p>It stands to reason that the technical IntentMandate must be backed by a formal legal agreement, a <strong>Letter of Authorization (LoA)</strong> of some kind, between the User (or User Organization) and the AI Agent Provider, unless the user is operating the AI Agent infrastructure themself. This agreement defines the legal rights and responsibilities of each party. Below are three potential models for structuring this relationship.</p><p>I am focused primarily on option 1 below as a conceptual approach to such authorization, and also actively developing other options given this early stage of implementation.</p><h4><strong>OPTION 1: The Principal-Agent Model (User as Authorizer, Provider as Enforcer)</strong></h4><p>This model establishes a classic principal-agent relationship where the user provides explicit instructions and the provider must execute them faithfully.</p><ul><li><p><strong>User Responsibilities:</strong> The user is the source of authority and is responsible for clearly articulating their intent. Their primary responsibilities include:</p><ul><li><p><strong>Delegating Authority:</strong> The user initiates the entire process by appointing the provider to operate the agent on their behalf, often memorialized through an agreement like a DocuSign.</p></li><li><p><strong>Defining Authorization (The "What"):</strong> The user must specify exactly what the agent is allowed to do. This includes defining the scope (check_balance), the target resource (account GH-1234), and any constraints (data_minimization, purpose_binding).</p></li><li><p><strong>Defining Autonomy (The "How"):</strong> The user sets the rules for <em>how</em> the agent carries out its tasks, such as when it can act silently ("auto-ok") versus when it must get explicit, real-time confirmation ("always-ask").</p></li><li><p><strong>Assuming Consequences:</strong> The user is ultimately responsible for the consequences of the agent's <em>properly authorized</em> actions.</p></li></ul></li><li><p><strong>AI Agent Provider Responsibilities &#129302;:</strong> The AI Agent Provider is responsible for the technical and operational infrastructure that brings the user's instructions to life safely and reliably. Their key responsibilities are:</p><ul><li><p><strong>Operating Secure Infrastructure:</strong> The provider must maintain the underlying service, network, and security controls to run the agent reliably.</p></li><li><p><strong>Enforcing User Grants:</strong> The provider's core duty is to honor and strictly enforce the authorization and autonomy rules defined by the user. The agent must not exceed its granted authority.</p></li><li><p><strong>Managing Authentication &amp; Credentials:</strong> The provider is responsible for presenting the correct credentials (e.g., short-lived, purpose-bound tokens) to third parties like the bank.</p></li><li><p><strong>Enforcing Revocation:</strong> When a user revokes permission, the provider must ensure that access is terminated promptly, meeting the stated Service-Level Objective (SLO) of <strong>&#8804;60 seconds</strong>.</p></li><li><p><strong>Providing Evidence:</strong> The provider must generate and deliver auditable proof of the agent's actions, such as signed receipts, to create a clear evidence trail for all parties.</p></li><li><p><strong>Upholding a Duty of Care:</strong> A central point of the exercise is to determine the <em>nature</em> of the provider's duty&#8212;whether they are simply a neutral "tool provider" or hold a higher, fiduciary-like "duty of loyalty" to act in the user's best interest and avoid conflicts.</p></li></ul></li></ul><h4><strong>OPTION 2: The Managed Platform Model (Template-Based Delegation)</strong></h4><p>This model positions the AI Agent Provider as a platform offering pre-defined, vetted "skills" or "playbooks." The user's role is to configure and authorize these templates rather than defining instructions from scratch. This is analogous to using a marketplace of trusted apps with pre-set permissions.</p><ul><li><p><strong>User Responsibilities:</strong></p><ul><li><p><strong>Selecting and Configuring Templates:</strong> The user browses a library of pre-built "Mandate Templates" (e.g., "Auto-Book Travel," "Monitor and Buy Stock") and configures key parameters (e.g., budget, dates, vendors).</p></li><li><p><strong>Authorizing the Configured Template:</strong> The user signs the finalized template, which becomes the active Intent Mandate.</p></li><li><p><strong>Monitoring and Revoking:</strong> The user is responsible for monitoring the agent's actions against the template's goals and revoking authorization if needed.</p></li></ul></li><li><p><strong>AI Agent Provider Responsibilities &#129302;:</strong></p><ul><li><p><strong>Curating a Safe and Secure Template Library:</strong> The provider is responsible for the safety, security, and clarity of the templates it offers. This includes vetting them for common exploits or ambiguous language.</p></li><li><p><strong>Strict Parameter Enforcement:</strong> The provider must ensure the agent operates strictly within the user-configured parameters of the chosen template.</p></li><li><p><strong>Transparency and Disclosure:</strong> The provider must clearly disclose the capabilities and limitations of each template.</p></li><li><p><strong>Liability for Template Flaws:</strong> The provider may assume a greater share of liability if a loss occurs due to a flaw or vulnerability in the template itself, rather than user error in configuration.</p></li></ul></li></ul><h4><strong>OPTION 3: The Certified Fiduciary Model (Role-Based Trust &amp; Duty of Care)</strong></h4><p>This model envisions an ecosystem where AI agents can be independently certified for specific, high-stakes roles (e.g., "Certified Corporate Procurement Agent," "Certified Financial Advisor Agent"). The legal framework is tied to the agent's certified capabilities and implies a higher standard of care.</p><ul><li><p><strong>User/User Organization Responsibilities:</strong></p><ul><li><p><strong>Due Diligence in Agent Selection:</strong> The user is responsible for selecting an agent with the appropriate certification for the task at hand. Using a non-certified agent for a high-stakes financial task would place more liability on the user.</p></li><li><p><strong>Providing Clear Objectives:</strong> The user must still provide the high-level goals and constraints for the Intent Mandate.</p></li><li><p><strong>Cooperation in Audits:</strong> The user must cooperate in providing information if a certified agent's actions are audited.</p></li></ul></li><li><p><strong>AI Agent Provider Responsibilities &#129302;:</strong></p><ul><li><p><strong>Achieving and Maintaining Certification:</strong> The provider must meet the rigorous technical, security, and ethical standards required by a third-party certifying body.</p></li><li><p><strong>Upholding a Fiduciary Duty:</strong> For certified financial roles, the agent must legally and technically operate under a fiduciary duty, meaning it must act in the user's absolute best financial interest, avoiding conflicts of interest (e.g., it cannot favor a merchant who pays a higher commission).</p></li><li><p><strong>Proactive Risk Mitigation:</strong> A certified agent is expected to go beyond simple instruction-following and proactively identify and flag potential risks to the user (e.g., "Warning: This purchase is non-refundable and the merchant has a poor rating. Do you still wish to proceed?").</p></li><li><p><strong>Submitting to Audits:</strong> The provider must agree to be audited by the certifying body to ensure continued compliance.</p></li></ul></li></ul><p>I&#8217;m working on some other potential options as well, but nothing quite ready to share yet.  And as always, if you have other ideas about how this could play out, I&#8217;m <a href="https://www.civics.com/contact">all ears</a>!</p><div><hr></div><h3><strong>Remaining Work and Strategic Next Steps</strong></h3><p>AP2 provides the technical foundation, but significant work remains to build the business and legal ecosystems around it.</p><h4><strong>For Businesses and Consumers (as Users):</strong></h4><ol><li><p><strong>Develop Internal Governance and Delegation Policies:</strong> Businesses must create clear policies defining who can authorize agents, for what purposes, and under what financial limits. This includes <a href="https://www.civics.com/evals">establishing evaluations</a> for adherence to adopted practices and policies.</p></li><li><p><strong>Integrate with Procurement and ERP Systems:</strong> The true power of B2B automation will be realized when agents can read from and write to existing systems of record, like SAP or Oracle, governed by AP2 mandates.</p></li><li><p><strong>User Education and Training:</strong> Both consumers and employees will need to be educated on how to safely and effectively delegate authority to AI agents, including how to craft clear, unambiguous intents.</p></li></ol><h4><strong>For AI Agent Providers:</strong></h4><ol><li><p><strong>Build User-Friendly Mandate Creation Tools:</strong> The process of creating and signing an Intent Mandate must be simple, transparent, and secure. This is a critical UX/UI challenge.</p></li><li><p><strong>Develop Legal Frameworks and LoAs:</strong> Providers must work with their legal teams to develop the "Letter of Authorization" agreements based on one of the models above, clearly defining responsibilities and liabilities.</p></li><li><p><strong>Engage with the Ecosystem on Certification:</strong> For the Fiduciary Model to work, providers should begin conversations with industry bodies and regulators to define what "certification" means for different agent roles.  Evals and benchmarks developed by users could be a strategic basis for some such certifications or trust marks.</p></li></ol><h4><strong>For the AP2 Standard and the Intent Mandate:</strong></h4><ol><li><p><strong>Evolve the Intent Mandate Schema:</strong> The current v0.1 schema is designed for common commerce. Future versions will need to support more complex business logic, such as:</p><ul><li><p><strong>Conditional Logic:</strong> "Buy item A only <em>if</em> item B is also available."</p></li><li><p><strong>Multi-Party Approvals:</strong> Requiring signatures from multiple individuals (e.g., a manager and finance) for high-value corporate purchases.</p></li><li><p><strong>Richer Constraint Language:</strong> Moving beyond simple price ceilings to more complex rules (e.g., "quality benchmarks," "ratings and rankings," "total cost of ownership," "vendor performance scores," etc.).</p></li></ul></li><li><p><strong>Formalize the Cryptographic Profile:</strong> As discussed, a formal specification for the signature and verification process is the top technical priority for moving from alpha to a production-ready standard.</p><p></p></li></ol><p>AP2 addresses a fundamental challenge that will only grow more pressing as AI agents become routine participants in commerce: establishing verifiable authority and accountability for autonomous transactions. While still in early stages, the protocol provides a practical framework for businesses and developers to begin experimenting with trusted agent delegation. The business, legal and technical foundations outlined here represent necessary infrastructure for scaling AI commerce effectively and responsibly. In future posts, I'll be sharing working examples and implementation patterns for those interested in testing these concepts in practice. For organizations considering how agent-mediated transactions might fit their operations, now is an appropriate time to begin exploring the possibilities.  <br><br>Reach out to me directly <a href="https://www.civics.com/contact">here</a> if you&#8217;d like to discuss opportunities to work together on these and related opportunities.</p>]]></content:encoded></item><item><title><![CDATA[AI Agents x Law Initiative]]></title><description><![CDATA[A New Stanford and Industry Initiative Launched Yesterday]]></description><link>https://www.dazzagreenwood.com/p/ai-agents-x-law-initiative</link><guid isPermaLink="false">https://www.dazzagreenwood.com/p/ai-agents-x-law-initiative</guid><dc:creator><![CDATA[Dazza Greenwood]]></dc:creator><pubDate>Wed, 09 Apr 2025 18:42:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/993zAAFOXlQ" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I'm thrilled to have convened the inaugural event marking the launch of an exciting new research and development initiative at Stanford University, in close collaboration with industry leaders and experts focused on AI Agents. </p><div id="youtube2-993zAAFOXlQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;993zAAFOXlQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/993zAAFOXlQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>This kickoff workshop, co-presented by Stanford CodeX, MIT Computational Law Report, Stanford HAI Digital Economy Lab, and Consumer Reports Innovation Lab, began a crucial conversation about the legal dimensions and innovative applications of AI Agents. </p><h4><strong>April 8th, 2025 Inauguraal Workshop Program</strong></h4><p><strong>Introductions</strong></p><ul><li><p>Speaker: Dazza Greenwood</p></li></ul><p><strong>Welcome Remarks</strong></p><ul><li><p>Speaker: Sandy Pentland</p></li></ul><p><strong>Setting the Context for AI Agents x Law</strong></p><ul><li><p>Speaker: Dazza Greenwood</p></li></ul><p><strong>Legal Issues and Options for AI Agents Conducting Transactions</strong></p><ul><li><p>Speaker: Diana Stern</p></li></ul><p><strong>Legal Practice and Innovating Law with AI Agents</strong></p><ul><li><p>Speaker: Damien Riehl</p></li></ul><p><strong>Open Source Demo Example of Legal Error Handling for AI Agent</strong></p><ul><li><p>Speaker: Andor Kesselman</p></li></ul><p><strong>Authenticated Delegation of Authority for AI Agents</strong></p><ul><li><p>Speaker: Tobin South</p></li></ul><p>You can view the session recording here and embedded above, and learn more or share your insights via this feedback form at <a href="https://computationallaw.org">https://computationallaw.org</a></p>]]></content:encoded></item><item><title><![CDATA[Unleashing Creativity with OpenAI’s New Agents SDK]]></title><description><![CDATA[I Got Pre-Release Access to the OpenAI Agents Framework and Here's What I Built]]></description><link>https://www.dazzagreenwood.com/p/unleashing-creativity-with-openais</link><guid isPermaLink="false">https://www.dazzagreenwood.com/p/unleashing-creativity-with-openais</guid><dc:creator><![CDATA[Dazza Greenwood]]></dc:creator><pubDate>Wed, 12 Mar 2025 00:25:53 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2beeecd7-567e-442b-99f2-3bf85f32fbfc_1124x844.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I&#8217;m thrilled to dive into OpenAI&#8217;s new Agents SDK publicly released earlier today.  It&#8217;s a game-changer for AI orchestration and workflow automation. Early access let me transform imaginative ideas into reality with near-effortless speed.  </p><p>Here&#8217;s a <a href="https://x.com/AlexReibman/status/1899533549893746925">demo</a> of the first version of my project working with the SDK from last week, presented to the OpenAI Agent team, thanks to early access with <a href="https://www.agentops.ai/">AgentOps</a>!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.dazzagreenwood.com/p/f957edc6-3ccb-49bb-8b03-a517c30bff95" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L0rt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png 424w, https://substackcdn.com/image/fetch/$s_!L0rt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png 848w, https://substackcdn.com/image/fetch/$s_!L0rt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png 1272w, https://substackcdn.com/image/fetch/$s_!L0rt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L0rt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png" width="1124" height="844" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:844,&quot;width&quot;:1124,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:688348,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.dazzagreenwood.com/p/f957edc6-3ccb-49bb-8b03-a517c30bff95&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.dazzagreenwood.com/i/158884950?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!L0rt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png 424w, https://substackcdn.com/image/fetch/$s_!L0rt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png 848w, https://substackcdn.com/image/fetch/$s_!L0rt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png 1272w, https://substackcdn.com/image/fetch/$s_!L0rt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94d85baa-d015-4d10-8982-f557bd6320ee_1124x844.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Initial Pre-Release Demo at https://x.com/AlexReibman/status/1899533549893746925</figcaption></figure></div><p><strong>My Journey from Straight Python to the OpenAI Agents SDK</strong></p><p>Previously, I built autonomous AI agents using pure Python&#8212;a powerful but intricate process. But I found it better to do it that way than using any of the available agent frameworks.  Check out my original project <a href="https://www.dazzagreenwood.com/p/autonomous-ai-agents-for-continuous-innovation-live-demo">here</a>. It demanded meticulous orchestration and heavy coding to handle multi-agent workflows. The OpenAI Agents SDK slashed that complexity, letting me reimagine and rebuild my project into a streamlined, modular, and far more powerful system.</p><p><strong>Introducing "Agento": A Modular AI Planning System</strong></p><p>My new "Agento" project showcases how the OpenAI Agents SDK can be used to turn broad goals into structured, actionable plans with iterative polish.  Literally, you can start this sucker off with ANY goal or idea you can think of and it will go to work on it for you. Here&#8217;s the breakdown:</p><ol><li><p>Criteria Generation: Iteratively identifies and select custom success metrics, grounded in full web search to ensure they are relevant and actionable.</p></li><li><p>Plan Generation: Crafts detailed goal-achievement strategies and a plan outline.</p></li><li><p>Plan Expansion and Evaluation: Expands and critiques each plan outline into a full draft.</p></li><li><p>Revision Identification: Spots needed improvements based on your original goal and, critically, on the success criteria.</p></li><li><p>Revision Implementation: Applies and tests revisions for a solid and well-aligned draft.</p></li><li><p>There is also a module to export your final plan as easy to read markdown (with MS Word, PDF, and other formats depending on the plan content coming soon)</p></li></ol><p>Each module is independent and interchangeable, linked by standard JSON interfaces for flexibility across agent frameworks. This means you can take any module and re-create it in whatever agent framework you prefer (LangGraph, Crew, AutoGen, etc, etc) and everything will still work.  It&#8217;s just JSON in and JSON out. Dive into the details and grab the starter code <a href="https://github.com/dazzaji/agento6">here</a>.</p><p><strong>Making Your Life Easier with a Ready-to-Go Single File</strong></p><p>To get you started fast, I&#8217;ve packed all of the OpenAI Agent SDK code and docs into one ready-to-use file. Just add or attach it to your LLM prompts for a seamless custom-agent-building experience. Grab the total Agent SDK in one file right <a href="https://raw.githubusercontent.com/dazzaji/agento6/refs/heads/main/openai_openai-agents-python.md">here</a>!</p><p><strong>A Deeper Dive into OpenAI Agents SDK</strong></p><p>The OpenAI Agents SDK, a versatile open-source tool, orchestrates complex multi-agent workflows with ease. It outshines earlier frameworks like Swarm, boosting productivity and simplicity. Key features:</p><ul><li><p>Agent Configuration: Equip agents with built-in or custom tools effortlessly.</p></li><li><p>Smart Handoffs: Delegate tasks between agents seamlessly.</p></li><li><p>Guardrails: Enforce safety and other priorities with input/output validation.</p></li><li><p>Tracing &amp; Observability: Debug and optimize with clear execution insights.</p></li></ul><p><strong>Dig into the details of the new SDK at these links</strong></p><ul><li><p>OpenAI Announcement: <a href="https://openai.com/index/new-tools-for-building-agents/">https://openai.com/index/new-tools-for-building-agents/ </a> </p></li><li><p>Documentation: <a href="https://platform.openai.com/docs/guides/agents">https://platform.openai.com/docs/guides/agents</a>  </p></li><li><p>SDK docs: <a href="https://openai.github.io/openai-agents-python/">https://openai.github.io/openai-agents-python/</a>  </p></li><li><p>GitHub repo: <a href="https://github.com/openai/openai-agents-python">https://github.com/openai/openai-agents-python</a>  </p></li><li><p>SDK walkthrough: <a href="https://x.com/OpenAIDevs/status/1899531225468969240?t=617">https://x.com/OpenAIDevs/status/1899531225468969240?t=617</a></p></li></ul><p><strong>Try it Out!</strong></p><p>Whether you&#8217;re building a breakthrough or simplifying daily tasks, the OpenAI Agents SDK supercharges your work. Dive into the docs, try my "Agento" example, and see how it can lift your projects to new heights. Let&#8217;s innovate together, just grab the code, start fast, and unlock endless possibilities with OpenAI&#8217;s latest gem!</p>]]></content:encoded></item><item><title><![CDATA[UETA and LLM Agents: A Deep Dive into Legal Error Handling]]></title><description><![CDATA[The Hidden Key to Building Trust in AI-Powered Transactions]]></description><link>https://www.dazzagreenwood.com/p/ueta-and-llm-agents-a-deep-dive-into</link><guid isPermaLink="false">https://www.dazzagreenwood.com/p/ueta-and-llm-agents-a-deep-dive-into</guid><dc:creator><![CDATA[Dazza Greenwood]]></dc:creator><pubDate>Mon, 03 Feb 2025 07:17:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lU1z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff05702-289f-4694-82aa-bc452b04cd3a_1260x660.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Pre-Release Version</em></p><p>In previous explorations of UETA and LLM agents, we established that the law&#8217;s broad applicability extends to modern AI-powered transactions. In this deep dive, we focus on error handling&#8212;the critical yet often neglected factor that determines both user trust and system resilience.</p><p>Have you ever been stuck in a frustrating loop with an automated system, unable to fix a simple mistake? In AI-driven commerce, every transaction intermediated by an LLM agent is a moment of truth. Section 10 of the Uniform Electronic Transactions Act (UETA) provides a clear legal framework for error correction and prevention&#8212;yet it remains largely ignored in AI-powered transactions.</p><p>Without these safeguards, <strong>your transactions may not be final</strong>&#8212;leaving businesses exposed to transaction reversals, liability disputes, and operational uncertainty. But by <strong>building in error prevention, correction, and auditability, </strong>AI agent systems can establish <strong>true finality</strong>&#8212;where transactions are legally binding, disputes are minimized, and fairness is ensured for consumers.</p><p><strong>It&#8217;s time to bring this critical legal requirement into the light&#8212;to protect businesses from liability, give consumers trustworthy digital transactions, and ensure AI-driven commerce operates with certainty and integrity.</strong></p><p>To get into this topic, I&#8217;ll spotlight this passage from a <a href="https://law.stanford.edu/2025/01/21/from-fine-print-to-machine-code-how-ai-agents-are-rewriting-the-rules-of-engagement-2/">recent post</a> I co-authored with Diana Stern published by Stanford CodeX:</p><blockquote><p>By implementing a user interface and process flow that enables customers to review and correct transactions before they are finalized, providers not only comply with UETA but also establish a strong argument for ratification. If a customer has the opportunity to correct an error but chooses not to, they have arguably adopted the transaction as final. Moreover, this provision of UETA cannot be varied by contract, which means this rule allowing customers to reverse transactions will apply even if providers insert disclaimers or other contract terms insisting the customer holds all responsibility and liability for mistakes and errors committed by the Transactional Agent.</p><p>Given this is the law of the land in the U.S., with UETA enacted in 49 states, it is prudent to take these rules seriously. This design pattern &#8211; proactively building in error prevention and correction mechanisms &#8211; is therefore not just about legal compliance; it&#8217;s a fundamental aspect of responsible Transactional Agent development that helps define the point of finality and clarify the allocation of risk. But it&#8217;s also just good practice and a fair rule. By implementing these mechanisms, providers can significantly reduce their risk of liability. By embracing error avoidance and corrections protocols in the design and deployment of Transactional Agents, perhaps the most valuable benefit will not be avoiding liability for reversed transactions but legitimately earning Transactional Agent customers&#8217; trust and reliance upon this new technology and way of doing business.</p></blockquote><p>With that context, let&#8217;s dive in!</p><h3>Why Error Handling Matters Now More Than Ever</h3><p>For business and technology leaders, error handling might seem like a technical detail best left to development teams. For legal and risk management professionals, it may appear as just another compliance checkbox. Both perspectives, however, overlook the larger strategic importance of robust error handling.</p><p>Every transaction your LLM agent handles is a moment of truth. When transactions proceed flawlessly, interactions feel seamless. But when errors occur, the system faces a critical choice: </p><p>- <strong>Leave users stranded:</strong> Failing to offer correction options can trap users in a rigid, automated process. </p><p>- <strong>Empower users:</strong> Providing clear, transparent paths for error correction builds trust and long-term loyalty.</p><p>This distinction not only affects user satisfaction but also lays the groundwork for sustainable, scalable automated commerce.</p><h3>The Business Case for Robust Error Handling</h3><p>Implementing strong error handling capabilities is an investment&#8212;not merely an added cost. Consider the following benefits:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/Dua0v/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ff05702-289f-4694-82aa-bc452b04cd3a_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:472,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/Dua0v/1/" width="730" height="472" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>Beyond these immediate advantages, robust error handling lays the foundation for the future of automated commerce.</p><h3>UETA Section 10: A Framework for Fair Automation</h3><p>UETA&#8217;s Section 10 provides a forward-thinking framework for error handling in electronic transactions. Its key principles include:</p><ol><li><p><strong>User Agency:</strong> Systems must offer meaningful opportunities for error prevention and correction.</p></li><li><p><strong>Mutual Responsibility:</strong> Both parties should adhere to agreed-upon security procedures.</p></li><li><p><strong>Clear Communication:</strong> Prompt notifications and clear procedures are essential when errors occur.</p></li><li><p><strong>Fair Resolution:</strong> The system must ensure that users have a path to avoid being bound by erroneous transactions.</p></li></ol><p>These principles serve not only as legal requirements but also as best practices that reinforce user trust and system reliability.</p><h2>Implementation Requirements: Bridging Legal Theory and Technical Practice</h2><p>For both business leaders and legal teams, meeting UETA compliance while optimizing user experience demands that error handling systems deliver on two fronts: legal integrity and technical robustness. Achieving this balance requires that your LLM-based system be designed around four core capabilities:</p><p>Here are the four points in narrative form, combining the business and legal/risk values for each capability:</p><ul><li><p>Error Prevention serves dual purposes: it reduces support costs and drives higher user satisfaction on the business side, while proactively mitigating risks from a legal perspective. This capability helps organizations stay ahead of potential issues before they materialize.</p></li><li><p>Error Detection capabilities enable quick identification and resolution of issues, supporting operational efficiency. From a legal standpoint, this capability ensures proper evidence preservation and enables ongoing compliance monitoring, providing organizations with real-time insights into their regulatory adherence.</p></li><li><p>Error Correction enhances the user experience and helps retain customers by smoothly resolving issues when they occur. Legally, it provides clear demonstration of UETA (Uniform Electronic Transactions Act) compliance, showing that the organization maintains appropriate error handling procedures.</p></li><li><p>Record Keeping delivers valuable business intelligence and supports process improvement initiatives by maintaining comprehensive transaction data. On the legal side, it ensures audit readiness and provides robust documentation for dispute resolution, helping organizations maintain defensible positions in potential conflicts.</p></li></ul><h3>Practical UETA Compliance Strategies for LLM Agents</h3><p>To translate these capabilities into a compliant and user-friendly system, consider the following actionable strategies:</p><ul><li><p><strong>Establish Clear Security Procedures:</strong><br>Design your system with automated prompts or multi-factor confirmations for high-value or unusual transactions. For example, if an order exceeds a certain threshold, trigger an additional verification step. Document these procedures in your terms of service as evidence of adherence to UETA &#167;10(1).</p></li><li><p><strong>Provide a Human-in-the-Loop or Escalation Path:</strong><br>Even though LLM agents operate autonomously, allow for an optional human review on transactions deemed high-risk. This extra layer ensures users have the opportunity to detect and correct errors&#8212;fulfilling UETA &#167;10(2).</p></li><li><p><strong>Implement Transparent, Actionable Prompts:</strong><br>For every critical step, display clear, unambiguous prompts. For example, before finalizing a high-value transaction, show:<br><em>&#8220;You are about to purchase 100 self-heating mugs. Confirm or Cancel?&#8221;</em><br>This confirms that users have a genuine opportunity to reconsider their actions.</p></li><li><p><strong>Maintain Comprehensive Audit Trails:</strong><br>Record all user interactions and system responses&#8212;including timestamps, unique identifiers, and the exact text of prompts. This not only supports attribution under UETA &#167;9 but also provides critical evidence during dispute resolution.</p></li><li><p><strong>Highlight Error-Correction Procedures in Your Terms:</strong><br>While UETA does not allow for waivers of mandatory error correction rights, you can clearly outline the process for reporting and remedying errors. For example:<br><em>&#8220;If you notice an unintended transaction, please contact us at [Contact Info] within 48 hours. We will investigate and provide instructions for returning goods or funds.&#8221;</em></p></li><li><p><strong>Stay Vigilant for Regulatory Changes:</strong><br>Build a modular system that can adapt quickly to evolving legal and regulatory standards. This future-proofs your error handling architecture against potential AI-specific guidelines or enhanced transparency requirements.</p></li></ul><div><hr></div><h2>Building Error Prevention into LLM Agent Systems</h2><p>Error prevention is about striking the right balance&#8212;ensuring that safeguards are strong enough to prevent mistakes without impeding efficiency. A robust prevention strategy operates on three levels:</p><h3>The Three Layers of Error Prevention</h3><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/xqSCi/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c8acdb7-2617-40e5-be70-f245b030f101_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:278,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/xqSCi/1/" width="730" height="278" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><h4>Pre-Transaction Validation</h4><p>Pre-transaction validation is the first line of defense. This step ensures that the data input into the system is accurate and that the transaction parameters are valid. Key capabilities include:</p><ul><li><p>Input validation with clear user feedback</p></li><li><p>Identity and authorization verification</p></li><li><p>Parameter consistency checks</p></li><li><p>Contextual consistency assessments</p></li></ul><blockquote><p><strong>UETA Compliance Note:</strong><br>UETA Section 10(2) requires that electronic agents offer a genuine opportunity to prevent or correct errors. Robust pre-transaction validation is your first opportunity to satisfy this requirement.</p></blockquote><h4>Contextual Analysis</h4><p>Contextual analysis involves verifying the transaction&#8217;s context to ensure it reflects the user&#8217;s true intent. For example, consider factors such as: - Transaction timing and sequence<br>- User history and behavioral patterns<br>- Environmental or situational factors (e.g., a purchase attempt at an unusual time)<br>- Cross-transaction dependencies</p><blockquote><p><strong>Example:</strong><br>If a user typically makes purchases during business hours, a transaction attempted at 3 a.m. might be flagged as unusual. This not only protects the user from unintended transactions but also reinforces that the system is capturing the true intent&#8212;an essential element in meeting UETA requirements.</p></blockquote><h4>Progressive Confirmation</h4><p>As transaction complexity increases, so does the need for confirmation. The system should adjust its verification process based on the transaction&#8217;s risk level:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/n1B8h/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e4f1fbf-097c-4f28-b5e3-ea1e473874f0_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:229,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/n1B8h/1/" width="730" height="229" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>This tiered approach ensures that: - Low-risk transactions proceed efficiently. - Higher-risk transactions receive additional scrutiny. - A comprehensive audit trail is maintained for all confirmations.</p><div><hr></div><h2>Error Detection: When Prevention Isn&#8217;t Enough</h2><p>Despite robust prevention measures, errors may still occur. Rapid and accurate detection is essential for mitigating negative impacts.</p><h3>Detection Mechanisms</h3><p>Your system should incorporate multiple detection methods to catch errors as soon as they occur:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/6HIZV/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/324a1a7a-af5b-4288-afb9-2264ca8c4a4f_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:323,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/6HIZV/1/" width="730" height="323" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><ul><li><p><strong>Rule-Based Detection:</strong> Utilizes predefined rules to catch common error patterns.</p></li><li><p><strong>Anomaly Detection:</strong> Uses statistical models or machine learning to identify deviations from typical transaction behavior.</p></li><li><p><strong>User Feedback:</strong> Enables users to quickly report errors when they notice discrepancies.</p></li><li><p><strong>LLM Validation:</strong> Involves cross-checking responses for internal consistency and alignment with the user&#8217;s initial intent.<br><em><strong>Example:</strong> If the agent&#8217;s response contradicts earlier confirmations, the system can flag this for review.</em></p></li></ul><h4>Measuring Detection Effectiveness</h4><p>To ensure your error detection methods are working as intended, monitor these key metrics:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/NVjxs/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/901a8760-226f-4bd6-ac8e-dc119bb48f27_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:273,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/NVjxs/1/" width="730" height="273" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>For example, &#8220;Detection Speed&#8221; can be measured by tracking the time elapsed from when an error occurs to when it is detected.</p><h2>Designing Effective Error Correction Interfaces for LLM Agents</h2><p>When errors occur in transactions managed by LLM agents, the correction interface becomes the system&#8217;s moment of truth. It must balance ease of use with rigorous compliance. An effective error correction interface should enable users to quickly understand the error, explore correction options, and confirm that the intended changes have been made&#8212;all while maintaining detailed records for audit purposes.</p><h3>The Anatomy of Effective Error Correction</h3><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/jpVTy/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/95aea8f8-a038-468c-a44d-efd7681767e2_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:273,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/jpVTy/1/" width="730" height="273" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>Effective error correction requires a multi-layered approach:</p><ul><li><p><strong>Error Communication:</strong> Use plain language to explain what went wrong. For example, rather than showing a cryptic error code, the system might state, &#8220;It appears that there was a typo in your credit card number. Please review and correct the digits.&#8221;</p></li><li><p><strong>Correction Options:</strong> Offer users clear, actionable choices. For instance, a simple data error (such as an incorrect shipping address) can be corrected via a direct form, while more complex process errors (such as insufficient funds) might trigger a guided workflow.</p></li><li><p><strong>Verification Steps:</strong> Confirm that the corrected information is accurate. This could involve a two-step process or multi-factor verification for high-value transactions.</p></li><li><p><strong>Resolution Recording:</strong> Automatically log the correction process to create an audit trail that demonstrates compliance with UETA&#8217;s requirements and ensures transaction finality.</p></li></ul><h3>Three Levels of Error Correction</h3><p>Different types of errors require tailored approaches:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/eWdCl/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/75ccfb8a-3b06-4cc6-acc8-ae416a77574a_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:264,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/eWdCl/1/" width="730" height="264" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>This tiered approach ensures that: </p><p>- <strong>Simple Data Errors</strong> are quickly resolved, keeping the user experience smooth. </p><p>- <strong>Process Errors</strong> are handled with sufficient oversight through guided workflows. </p><p>- <strong>Complex Errors</strong> involving system integration benefit from human intervention, ensuring full documentation and resolution.</p><h3>LLM-Enhanced Error Correction</h3><p>LLM agents can improve the error correction process by: </p><p>- Generating plain-language explanations to help users understand the error. </p><p>- Suggesting likely corrections based on the transaction context. </p><p>- Guiding users through multi-step correction workflows. </p><p>- Maintaining contextual continuity so that corrections are appropriately applied.</p><p>For example, rather than simply alerting the user to an error, the agent might say, &#8220;We noticed a potential mismatch in your order details. Would you like to review your shipping address or update your payment method?&#8221; Such tailored prompts help ensure that the user can effectively resolve issues while the system logs every step for compliance purposes.</p><h3>Measuring Correction Effectiveness</h3><p>To ensure the correction interface works as intended, monitor these key performance metrics:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/SAbmM/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d066e60b-835d-4d05-885d-fd5187cb12a2_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:275,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/SAbmM/1/" width="730" height="275" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>For example, tracking the &#8220;Time to Resolution&#8221; metric can help determine whether the correction process is efficient enough to maintain user confidence while providing timely compliance evidence.</p><div><hr></div><h2>Record Keeping: The Foundation of Trust and Compliance</h2><p>Robust record keeping is critical&#8212;not only does it support business process improvements, but it is also essential for meeting legal requirements under UETA. In LLM agent systems, where transactions can be highly dynamic, comprehensive records serve as the backbone for transparency and accountability.</p><h3>Essential Record Types</h3><p>Different types of records are necessary to cover all aspects of a transaction:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/IUYxY/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ddc4e1d-472b-466b-b6ce-60848f5216f6_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:275,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/IUYxY/1/" width="730" height="275" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>Each record type provides a unique layer of insight: </p><p>- <strong>Transaction Records </strong>document the details of every interaction. </p><p>- <strong>Error Logs</strong> capture any discrepancies or issues that occur. </p><p>- <strong>Correction Trails</strong> offer a step-by-step account of how errors were resolved. </p><p>- <strong>System States</strong> track the performance and contextual environment at the time of the transaction.</p><h3>Record Keeping Architecture</h3><p>A robust record keeping system should incorporate:</p><ol><li><p><strong>Data Integrity:</strong></p><ol><li><p>Immutable storage (e.g., any write-once-read-many database will do, or blockchain if you really feel that need)</p></li><li><p>Version control and change tracking</p></li><li><p>Strict access controls</p></li></ol></li><li><p><strong>Accessibility:</strong></p><ol><li><p>Quick retrieval and searchable archives</p></li><li><p>Support for data export in standardized formats</p></li><li><p>Consistent format preservation to maintain context</p></li></ol></li><li><p><strong>Context Preservation:</strong></p><ol><li><p>Detailed logs of transaction states, user decisions, and system configurations</p></li><li><p>Mechanisms for preserving the intent behind changes or corrections</p></li></ol></li></ol><h3>Future-Proofing Your Records</h3><p>As LLM agent systems evolve, record keeping systems must adapt to emerging challenges:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/RR1as/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b2c7083b-c90b-4dfd-b7a2-c463d755fb75_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:324,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/RR1as/1/" width="730" height="324" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>To address these challenges, consider the following best practices:</p><ul><li><p><strong>Record Organization:</strong><br>Develop clear classification systems, retention policies, and disposal procedures. Regular audits can help ensure that records remain accurate and accessible.</p></li><li><p><strong>Context Management:</strong><br>Track decisions, preserve user intent, and document all system changes to create an effective historical record that supports dispute resolution.</p></li><li><p><strong>Access Control:</strong><br>Implement role-based permissions, audit trails, and robust security protocols to protect sensitive data and ensure that records can be retrieved efficiently in the event of an audit or legal dispute.</p></li></ul><h2>Best Practices for LLM Agent Systems: Beyond Basic Compliance</h2><p>While UETA provides the legal framework for error handling, truly effective LLM agent systems go well beyond minimal compliance. A robust system not only satisfies legal requirements but also drives business value through superior user experience and operational excellence.</p><h3>System Design Principles</h3><p>Adopt these design principles to ensure your LLM agent system remains resilient and adaptable:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/h2e36/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1038a920-1ca8-4808-b6f7-2d04b50fde21_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:275,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/h2e36/1/" width="730" height="275" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><ul><li><p><strong>Transparency:</strong> Ensure that all system processes are visible to users, including error handling and confirmation steps. This not only builds trust but also simplifies regulatory audits.</p></li><li><p><strong>Predictability:</strong> Design processes that behave consistently under similar conditions, reducing unexpected errors.</p></li><li><p><strong>Adaptability:</strong> Build modular architectures that can incorporate new technologies or comply with updated legal standards as they emerge.</p></li><li><p><strong>Accountability:</strong> Maintain thorough records and audit trails to support both internal review and external regulatory scrutiny.</p></li></ul><h3>Measuring Success in LLM Agent Systems</h3><p>Quantitative metrics are essential for evaluating system performance over time:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/HWbub/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8da2b7ec-b9b1-4410-855f-568a3feb21fc_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:390,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/HWbub/1/" width="730" height="390" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>For instance, a high adoption rate coupled with low dispute frequency suggests that the system is both efficient and legally robust.</p><div><hr></div><h2>Advanced Use Cases and Future Considerations</h2><p>As LLM agent systems continue to evolve, new challenges and opportunities will emerge. Understanding these future trends is key to staying ahead in the rapidly evolving landscape of automated commerce.</p><h3>Agent-to-Agent Interactions</h3><p>The future of automated commerce increasingly involves interactions between autonomous agents. This introduces new technical and legal complexities:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/EREQ9/2/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/46a94b68-108d-4392-ba5a-67382dceb0a0_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:308,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/EREQ9/2/" width="730" height="308" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><ul><li><p><strong>Protocol Standards:</strong> Establish clear, standardized protocols for agent-to-agent interactions to ensure smooth operations.</p></li><li><p><strong>Error Propagation:</strong> Implement safeguards that prevent errors from cascading between systems.</p></li><li><p><strong>Intent Preservation:</strong> Use contextual analysis to track and maintain the original intent behind transactions.</p></li><li><p><strong>Conflict Resolution:</strong> Develop frameworks for resolving disputes between agents, thereby minimizing business interruptions.</p></li></ul><h3>Evolution of User Intent</h3><p>Over time, user preferences and behaviors may evolve as use and reliance upon AI agent systems deepens and becomes more complex and integrated. An effective system must adapt without compromising compliance or operational efficiency:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/Jz7kQ/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a23a5845-02ad-4db0-aea6-be9bcdd0e61c_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:275,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/Jz7kQ/1/" width="730" height="275" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><ul><li><p><strong>Basic example:</strong> An LLM agent that tracks previous purchase behaviors might proactively suggest complementary products. However, it must also ensure that any changes in user intent are clearly documented to avoid misinterpretation of transactions.</p></li></ul><h3>Emerging Standards and Future Readiness</h3><p>To prepare for the evolving landscape of automated transactions, it is essential to monitor emerging standards and align your system accordingly:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/Zhm7S/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/33e4cb06-b2f5-4c84-a739-0f8202e67a8f_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:275,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/Zhm7S/1/" width="730" height="275" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><ul><li><p><strong>Preparing for the Future:</strong></p><ul><li><p><strong>Design for Evolution:</strong> Adopt modular architectures and extensible protocols that can quickly adapt to new standards.</p></li><li><p><strong>Plan for Complexity:</strong> Incorporate advanced analytics and comprehensive logging to manage increasing transaction volumes.</p></li><li><p><strong>Maintain Transparency:</strong> Keep detailed, traceable records to support compliance with evolving regulations.</p></li></ul></li></ul><p>If your organization has the resources and talent to actively participate in relevant standards development, being part of such processes can both ensure awareness/readiness as well as offer the opportunity to help shape future standards.</p><div><hr></div><h2>The Future of Transaction Finality in Agent Systems</h2><p>A critical challenge for LLM agent systems is ensuring true transaction finality&#8212;where errors are not only prevented or corrected but also the final state of a transaction is clearly established and legally binding.</p><h2>Transaction Finality: The Path Through Error Handling</h2><p>The challenge of establishing transaction finality in AI agent systems reveals a critical business reality: without proper error handling, there can be no true finality. This isn&#8217;t just about good practice&#8212;it&#8217;s about legal certainty under UETA.</p><h3>Key Relationships and Roles</h3><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/jwzxo/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c6494d3f-8ad8-42ea-b2e7-8714b1bcd774_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:262,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/jwzxo/1/" width="730" height="262" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p><em>Note: In some arrangements, the Third Party may also serve as the Agent Provider, offering an agent for users to interact with their own services.</em></p><h3>The Legal Framework for Finality</h3><p>UETA Section 10(2) provides a crucial right: users can &#8220;avoid the effect&#8221; of electronic records (essentially reverse transactions) if they weren&#8217;t given proper opportunity to prevent or correct errors. This means:</p><ol><li><p>Without robust error handling, there is no true transaction finality</p></li><li><p>Users retain a statutory right to reverse transactions if proper error prevention/correction wasn&#8217;t available</p></li><li><p>This right cannot be waived by contract or agreement</p></li></ol><h3>Practical Implications</h3><p>For businesses deploying AI agents, this creates a clear imperative. Organizations must first implement strong error prevention mechanisms throughout their transaction flows. They need to provide and document clear error correction pathways that users can easily access and understand. Importantly, they must maintain records of when and how these capabilities were made available to users during each transaction. Only after meeting these requirements can a business confidently establish transaction finality. These aren&#8217;t optional best practices&#8212;they&#8217;re essential steps for achieving legally defensible completion of transactions.</p><h3>Two Implementation Models</h3><ol><li><p><strong>Three-Party Arrangement:</strong></p><ol><li><p>User engages with Third Party merchant through Agent Provider&#8217;s system</p></li><li><p>Agent Provider implements error handling for both parties</p></li><li><p>Clear documentation of error prevention/correction opportunities</p></li></ol></li><li><p><strong>Two-Party Arrangement:</strong></p><ol><li><p>Merchant provides agent for users to interact with their own services</p></li><li><p>Merchant directly responsible for error handling</p></li><li><p>Simplified implementation but same legal requirements</p></li></ol></li></ol><h3>The Business Value of True Finality</h3><p>Implementing proper error handling delivers concrete business value beyond mere legal compliance. When organizations build robust error prevention and correction capabilities into their agent systems, they establish legally defensible transaction finality that protects all parties. This approach significantly reduces the risk of statutory transaction reversals, providing the certainty needed for efficient business operations. It creates clear, documented completion points that support reliable accounting and fulfillment processes. Perhaps most importantly, this framework builds genuine user confidence in automated transactions, paving the way for broader adoption of AI agent systems in commerce.</p><h3>Understanding Practical Finality</h3><p>While we speak of achieving &#8220;transaction finality&#8221; through proper error handling, it&#8217;s worth noting that finality in digital transactions is more of a practical business construct than an absolute state. As Patrick McKenzie expertly explains in his analysis of payment systems, true finality is more of a &#8220;probability distribution&#8221; influenced by technical infrastructure, relationships between parties, and governing laws rather than an absolute condition. For the purposes of AI agent transactions, we&#8217;re focused on reaching a clear point where all parties can confidently treat the transaction as complete for practical business purposes&#8212;whether that&#8217;s booking revenue, initiating fulfillment, or closing the accounting period. This framework of error prevention and correction helps establish that practical finality, even if philosophical arguments about absolute finality remain. </p><p>For a fascinating deeper dive into the broader concept of finality in payment systems, see McKenzie&#8217;s &#8220;<a href="https://www.bitsaboutmoney.com/archive/no-payments-are-final/">Finality does not exist in payments</a>&#8221; and I thank <a href="https://x.com/AlexReibman">Alex Reibman</a> of <a href="https://www.agentops.ai/">AgentOps</a> for his feedback on this larger point.  While absolute finality in transactions is philosophically complex, for business and legal purposes, the goal is to establish practical finality where transactions are recognized as complete and legally binding. Achieving that practical goal, and adding deeper context on the road ahead, is the purpose of this piece.</p><h3>A Trust Protocol Stack</h3><p>This notional &#8220;Trust Protocol Stack,&#8221; is a way to approaching assurance of transaction finality by integrating multiple layers of assurance:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/ehdYx/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/65d5b3cb-1e51-4ff4-9ea2-1bc2ae0a3bf5_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:341,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/ehdYx/1/" width="730" height="341" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>This layered approach not only enhances confidence in the system but also opens new business models around premium, verified transaction services.</p><h3>Protocol Standards for the Future</h3><p>Developing and implementing standardized protocols is essential for future-proofing automated transactions:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/KmOSp/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bed57ef7-0709-43dc-833c-b43200d4e209_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:341,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/KmOSp/1/" width="730" height="341" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><ul><li><p><strong>Implementation Challenge:</strong> Achieving consensus or working agreed practices among stakeholders to ensure business and technical interoperability among different agent platforms, frameworks, or services will be critical in the agent-to-agent transactional context.</p></li></ul><div><hr></div><h2>Bringing It All Together: A Call to Action</h2><p>The evolution of LLM agent systems demands that businesses and legal professionals alike view error handling as a strategic investment rather than a regulatory checkbox. The following steps provide a roadmap for organizations looking to lead in this new era of automated commerce:</p><h3>Key Takeaways</h3><ol><li><p><strong>For Business Leaders:</strong></p></li><li><p><strong>Strategic Investment:</strong> Robust error handling drives user trust and creates competitive differentiation.</p></li><li><p><strong>Innovative Opportunities:</strong> Premium verification and advanced correction capabilities open new revenue streams.</p></li><li><p><strong>Market Leadership:</strong> Early adoption of best practices positions your organization at the forefront of automated commerce.</p></li><li><p><strong>For Legal/Risk Professionals:</strong></p></li><li><p><strong>Defensible Processes:</strong> UETA compliance is a baseline that can be enhanced through transparent, robust error handling.</p></li><li><p><strong>Clear Documentation:</strong> Detailed audit trails and correction records provide strong evidence in dispute resolution.</p></li><li><p><strong>Regulatory Readiness:</strong> A future-proof system is essential for adapting to evolving legal and technological landscapes.</p></li></ol><h3>Strategic Implementation Path</h3><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/ci0xD/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2105e856-7bdf-4558-8779-cc09fa3ead56_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:308,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/ci0xD/1/" width="730" height="308" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><ul><li><p><strong>Action Steps:</strong></p><ul><li><p><strong>Assess Your Current State:</strong> Conduct a thorough review of your existing error handling capabilities.</p></li><li><p><strong>Plan Your Evolution:</strong> Identify key enhancement opportunities and set a timeline for implementation (e.g., assess within 30 days, plan within 90 days).</p></li><li><p><strong>Implement Changes:</strong> Roll out modular improvements, starting with high-risk areas.</p></li><li><p><strong>Lead the Change:</strong> Engage with industry bodies to help shape future protocol standards.</p></li></ul></li></ul><h3>The Opportunity Ahead</h3><p>The future of automated commerce hinges on our ability to build transparent, trustworthy systems. By integrating robust error prevention, detection, correction, and record keeping, you not only comply with UETA&#8217;s mandatory requirements but also drive user confidence and operational excellence. The time to act is now&#8212;embrace these practices and lead the way in a new era of automated transactions.</p>]]></content:encoded></item><item><title><![CDATA[From Ideas to Reality: A First Look at Autonomous Innovation]]></title><description><![CDATA[See how modular design and deep agent collaboration are transforming innovation]]></description><link>https://www.dazzagreenwood.com/p/autonomous-ai-agents-for-continuous-innovation-live-demo</link><guid isPermaLink="false">https://www.dazzagreenwood.com/p/autonomous-ai-agents-for-continuous-innovation-live-demo</guid><dc:creator><![CDATA[Dazza Greenwood]]></dc:creator><pubDate>Fri, 17 Jan 2025 10:11:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/TxBCxPVlYwo" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hey everyone,</p><p>I&#8217;m excited to share a sneak peek of a project I&#8217;ve been deeply involved in &#8211; a multi-agent system designed to unlock autonomous innovation. I&#8217;ll be demonstrating this system at Davos later this month, and I&#8217;m thrilled to give you, my cherished subscribers, an early look!</p><p>Before we dive in, I want to extend a huge thank you to everyone who responded to my call on LinkedIn for feedback on this demo. Your insights were invaluable in refining the presentation.</p><h2>Live Demo from Earlier Today:</h2><div id="youtube2-TxBCxPVlYwo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;TxBCxPVlYwo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/TxBCxPVlYwo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1>What is Agento and GenSpring?</h1><p>This system, which I&#8217;m calling Agento, is all about harnessing the power of AI agents to not just chat, but to actually bring those ideas to life. It&#8217;s built on three core innovations:</p><ol><li><p><strong>Modular Architecture:</strong> This allows for rapid experimentation and seamless integration of new technologies. Think of it like building with LEGOs &#8211; you can easily swap out parts and add new ones without rebuilding the entire structure.</p></li><li><p><strong>Deep Agent Collaboration:</strong> The agents in this system are designed to work together in a way that mirrors successful human collaboration. They can reason deeply about complex problems, provide constructive criticism, and iterate towards a high-quality solution.</p></li><li><p><strong>GenSpring - The Idea Engine:</strong> This is where things get really exciting. The most innovative modules is called GenSpring, which is designed to continuously generate new ideas, evaluates them, and feed the most promising ones into the development pipeline through all the other modules. It&#8217;s like having a perpetual brainstorming machine!</p></li></ol><h2>Why This Matters</h2><p>I believe this technology has the potential to revolutionize how we innovate across a wide range of fields. Imagine a future where:</p><ul><li><p>AI agents can autonomously generate and develop solutions to complex problems, like disaster response or affordable housing.</p></li><li><p>New products and services can be brought to market faster than ever before, thanks to the accelerated innovation cycles enabled by this system.</p></li><li><p>Organizations can become more agile and adaptable, thanks to the modular architecture and the ability to integrate new technologies seamlessly.</p></li></ul><h1>Demo in Action</h1><p>To complement the conceptual design above, here are key moments from the actual system demonstration. In this practice run, you&#8217;ll see:</p><ul><li><p>A slide deck and key talking points outlining this approach to using AI agents.</p></li><li><p>A demo of the system taking a user-defined goal and breaking it down into an actionable plan.</p></li><li><p>Multiple agents, powered by models like GPT&#8211;4o, Claude 3.5 and Gemini 1.5, working together to refine the plan through a process of revision requests and evaluations.</p></li><li><p>The importance of clear communication and well-defined evaluation criteria for successful agent collaboration.</p></li><li><p>The final output in both JSON and Markdown formats, demonstrating the system&#8217;s ability to produce structured, machine-readable, and human-readable results.</p></li><li><p>The role of GenSpring is as a kind of initialization module that can be swapped in instead of the user-defined goal input, so as to enable a fully autonomous general purpose innovation pipeline prototype.</p></li></ul><h1>Presentation Deck &amp; Key Moments</h1><p>These slides and talking points form the foundation of how I am currently communicating the system&#8217;s capabilities, novel design, and broader potential:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CNce!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CNce!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png 424w, https://substackcdn.com/image/fetch/$s_!CNce!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png 848w, https://substackcdn.com/image/fetch/$s_!CNce!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png 1272w, https://substackcdn.com/image/fetch/$s_!CNce!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CNce!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png" width="1392" height="804" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:804,&quot;width&quot;:1392,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:91606,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CNce!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png 424w, https://substackcdn.com/image/fetch/$s_!CNce!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png 848w, https://substackcdn.com/image/fetch/$s_!CNce!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png 1272w, https://substackcdn.com/image/fetch/$s_!CNce!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91355cce-ad6c-4c9f-9513-36345827cbdf_1392x804.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>&#8220;What innovative challenges can we solve together?&#8221;</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!62tH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!62tH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png 424w, https://substackcdn.com/image/fetch/$s_!62tH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png 848w, https://substackcdn.com/image/fetch/$s_!62tH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png 1272w, https://substackcdn.com/image/fetch/$s_!62tH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!62tH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png" width="1420" height="818" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:818,&quot;width&quot;:1420,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:97708,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!62tH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png 424w, https://substackcdn.com/image/fetch/$s_!62tH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png 848w, https://substackcdn.com/image/fetch/$s_!62tH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png 1272w, https://substackcdn.com/image/fetch/$s_!62tH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ad8c163-ef07-4aec-8fc4-1c2bc7aa8239_1420x818.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>"What if AI agents could continuously generate breakthrough ideas AND autonomously develop them into real solutions? I've created a system that does exactly that through three key innovations: First, a modular architecture that enables rapid experimentation and seamless integration of new technologies without disrupting the whole system. Second, a sophisticated approach to AI agent collaboration that enables deep reasoning and effective handling of complex challenges. And third - perhaps most exciting - GenSpring, an 'idea engine' that constantly generates and evaluates new opportunities, feeding promising innovations directly into development."</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UfZI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UfZI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png 424w, https://substackcdn.com/image/fetch/$s_!UfZI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png 848w, https://substackcdn.com/image/fetch/$s_!UfZI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png 1272w, https://substackcdn.com/image/fetch/$s_!UfZI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UfZI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png" width="1054" height="610" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:610,&quot;width&quot;:1054,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:73761,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UfZI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png 424w, https://substackcdn.com/image/fetch/$s_!UfZI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png 848w, https://substackcdn.com/image/fetch/$s_!UfZI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png 1272w, https://substackcdn.com/image/fetch/$s_!UfZI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b570bf5-59ee-4799-b1b8-4f53f9118cb1_1054x610.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>"This modular architecture isn't just about flexibility - it's about enabling a new paradigm for AI innovation. Each module accepts structured inputs and produces structured outputs, creating clear interfaces where teams can plug in their preferred approaches. This means you can rapidly experiment with different technologies, frameworks, or entirely new approaches without rebuilding the whole system.</p><p>But here's where it gets interesting: this modularity ALSO opens the door to something bigger. Any team that believes they have superior agent technology can prove it by taking standard inputs from one module and showing they can produce better outputs. It's an open invitation to demonstrate real capabilities rather than just talk assert the superiority of a given implementation or approach."</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RENr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RENr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png 424w, https://substackcdn.com/image/fetch/$s_!RENr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png 848w, https://substackcdn.com/image/fetch/$s_!RENr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png 1272w, https://substackcdn.com/image/fetch/$s_!RENr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RENr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png" width="1056" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:608,&quot;width&quot;:1056,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59247,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RENr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png 424w, https://substackcdn.com/image/fetch/$s_!RENr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png 848w, https://substackcdn.com/image/fetch/$s_!RENr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png 1272w, https://substackcdn.com/image/fetch/$s_!RENr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1263b77-3c20-447a-8fb1-1d33150cac1c_1056x608.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>"What makes this system unique is how it orchestrates AI conversations in a way that mirrors successful human-AI collaboration patterns. The agents can guide each other back to relevant topics, seek revision of outputs that don't meet quality benchmarks, and engage in deeper reasoning about complex challenges. By finding that crucial balance between steering and enabling, these agent conversations can adapt to tackle virtually any problem. Think of it as creating the conditions for AI creativity to flourish while ensuring the results remain practical and focused.</p><p>The power isn't in controlling every interaction, but in establishing the right design patterns for productive collaboration. Think of it as creating the conditions for AI creativity to flourish while ensuring the results remain practical and focused.&#8221;</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bur7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bur7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png 424w, https://substackcdn.com/image/fetch/$s_!bur7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png 848w, https://substackcdn.com/image/fetch/$s_!bur7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png 1272w, https://substackcdn.com/image/fetch/$s_!bur7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bur7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png" width="1046" height="602" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:602,&quot;width&quot;:1046,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:68876,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bur7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png 424w, https://substackcdn.com/image/fetch/$s_!bur7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png 848w, https://substackcdn.com/image/fetch/$s_!bur7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png 1272w, https://substackcdn.com/image/fetch/$s_!bur7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5b189f-bb6b-4d42-b99d-73142c6b8778_1046x602.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>"GenSpring is where this system truly breaks new ground. Imagine having access to a perpetual wellspring of innovative ideas - not just random concepts, but carefully validated opportunities that are novel, useful, and crucially, achievable. This isn't just an idea generator - it's a complete pipeline that continuously identifies promising innovations and filters them through sophisticated analysis to ensure real-world value creation.</p><p>What makes GenSpring transformative is its seamless integration with our modular architecture. Each idea is structured precisely to flow into subsequent modules - from detailed planning to implementation, testing, and eventual deployment. As the system runs, successful innovations feed back into the process, creating an ever-evolving fountain of refined, practical solutions."</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0Y_O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0Y_O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png 424w, https://substackcdn.com/image/fetch/$s_!0Y_O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png 848w, https://substackcdn.com/image/fetch/$s_!0Y_O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png 1272w, https://substackcdn.com/image/fetch/$s_!0Y_O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0Y_O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png" width="1048" height="606" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:606,&quot;width&quot;:1048,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:64572,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0Y_O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png 424w, https://substackcdn.com/image/fetch/$s_!0Y_O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png 848w, https://substackcdn.com/image/fetch/$s_!0Y_O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png 1272w, https://substackcdn.com/image/fetch/$s_!0Y_O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c3dfaaa-b37c-4a72-84ab-f82735c7dd1a_1048x606.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>"The implications of this modular, agent-driven approach extend far beyond any single organization or industry. By establishing clear interfaces for AI systems to exchange value - whether that's ideas, services, or solutions - we're laying the groundwork for an entirely new kind of innovation economy.</p><p>Imagine a future where AI-driven companies can seamlessly exchange specialized capabilities, where breakthrough ideas can flow freely between organizations, and where innovation isn't limited by organizational boundaries. This isn't just about accelerating R&amp;D or reducing costs - it's about creating the fundamental infrastructure for a new era of open, collaborative innovation. Just as standardized shipping containers revolutionized global trade, standardized AI interfaces could transform how we create and exchange value in the digital age."</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kje6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff063f356-2a85-4655-8441-62bac06398ed_1052x596.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kje6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff063f356-2a85-4655-8441-62bac06398ed_1052x596.png 424w, https://substackcdn.com/image/fetch/$s_!kje6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff063f356-2a85-4655-8441-62bac06398ed_1052x596.png 848w, https://substackcdn.com/image/fetch/$s_!kje6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff063f356-2a85-4655-8441-62bac06398ed_1052x596.png 1272w, https://substackcdn.com/image/fetch/$s_!kje6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff063f356-2a85-4655-8441-62bac06398ed_1052x596.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kje6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff063f356-2a85-4655-8441-62bac06398ed_1052x596.png" width="1052" height="596" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f063f356-2a85-4655-8441-62bac06398ed_1052x596.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:596,&quot;width&quot;:1052,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:395661,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kje6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff063f356-2a85-4655-8441-62bac06398ed_1052x596.png 424w, https://substackcdn.com/image/fetch/$s_!kje6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff063f356-2a85-4655-8441-62bac06398ed_1052x596.png 848w, https://substackcdn.com/image/fetch/$s_!kje6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff063f356-2a85-4655-8441-62bac06398ed_1052x596.png 1272w, https://substackcdn.com/image/fetch/$s_!kje6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff063f356-2a85-4655-8441-62bac06398ed_1052x596.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>&#8220;What innovative challenges can we solve together?&#8221;</p></blockquote><div><hr></div><h2>I&#8217;d Love Your Feedback!</h2><p>This is just a first glimpse, and I&#8217;m eager to hear your thoughts. What aspects of the system are most exciting to you? What questions do you have? What potential applications do you see? Let me know in the comments.</p><h1>Want a One-on-One Demo and Chat?</h1><p>If you&#8217;re a paid subscriber and would like a personalized demo and a chance to discuss this technology further, I&#8217;d love to connect! I&#8217;d be happy to answer any questions and talk through how these approaches to AI agents could be useful in your contexts. Please reach out to me using this form, <a href="https://forms.gle/8LnVNGEs6u9n5UGT6">https://forms.gle/8LnVNGEs6u9n5UGT6</a>, and be sure to use the same email and name you use for your Substack subscription so I know it&#8217;s you.</p><h1>Looking Ahead</h1><p>I believe that multi-agent systems like Agento and components like GenSpring have the potential to transform the way we approach innovation. By combining the creative power of AI agents with the structure and rigor of modular design, we can unlock new levels of productivity, problem-solving, and even new value creation. I&#8217;m excited to continue developing this technology and exploring its possibilities with you.</p><p>Thanks for being a part of this journey!</p><p>Best,</p><p>Dazza Greenwood</p><p><strong>P.S.</strong> For a deeper dive into the legal aspects of LLM-powered agents, check out my Stanford CodeX project site: <a href="https://law.stanford.edu/codex-the-stanford-center-for-legal-informatics/projects/agentic-genai-transaction-systems/">https://law.stanford.edu/codex-the-stanford-center-for-legal-informatics/projects/agentic-genai-transaction-systems/</a> and the first of three blog posts as part of that research on issues and opportunities for transactional AI Agents is now live at: <a href="https://law.stanford.edu/2025/01/14/from-fine-print-to-machine-code-how-ai-agents-are-rewriting-the-rules-of-engagement">https://law.stanford.edu/2025/01/14/from-fine-print-to-machine-code-how-ai-agents-are-rewriting-the-rules-of-engagement</a>.</p><p>And for insights on empowering consumers with personal AI agents, see these posts I wrote with Consumer Reports Innovation Lab: <a href="https://innovation.consumerreports.org/empowering-consumers-with-personal-ai-agents-legal-foundations-and-design-considerations/">https://innovation.consumerreports.org/empowering-consumers-with-personal-ai-agents-legal-foundations-and-design-considerations/</a> and <a href="https://innovation.consumerreports.org/engineering-loyalty-by-design-in-agentic-systems/">https://innovation.consumerreports.org/engineering-loyalty-by-design-in-agentic-systems/</a>.</p><p>Also, earlier today, some MIT colleagues and I published a pre-print of a new research paper on a potential way to use and extend OAuth 2 and OpenID Connect technical specifications to enable &#8220;Authenticated Delegation and Authorized AI Agents&#8221;. You can learn about that here: <a href="https://arxiv.org/abs/2501.09674">https://arxiv.org/abs/2501.09674</a></p>]]></content:encoded></item><item><title><![CDATA[When AI Agents Conduct Transactions]]></title><description><![CDATA[Dazza Greenwood, On Agents]]></description><link>https://www.dazzagreenwood.com/p/when-ai-agents-conduct-transactions</link><guid isPermaLink="false">https://www.dazzagreenwood.com/p/when-ai-agents-conduct-transactions</guid><dc:creator><![CDATA[Dazza Greenwood]]></dc:creator><pubDate>Sat, 23 Nov 2024 00:26:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7WiN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>From a business, legal, and technical perspective, there&#8217;s no more important LLM agent activity than conducting transactions. As someone deeply involved in crafting the Uniform Electronic Transactions Act (UETA) and a long-time advocate for responsible AI development, I&#8217;m struck by how much the world has changed since those UETA drafting meetings. We were grappling with e-commerce back then, but little did we know our work would be so remarkably prescient for today&#8217;s LLM agents 25 years later.</p><h2><strong>Key Terms and Definitions</strong></h2><p>Before diving into the infrastructure and frameworks that enable AI agent transactions, it&#8217;s essential to understand a few key terms and concepts:</p><h3><strong>Core Concepts</strong></h3><ul><li><p><strong>AI Agent:</strong> The technology program that autonomously performs tasks and interacts with third parties, in this context, including use of Large Language Models (LLMs)</p></li><li><p><strong>AI Agent System:</strong> The AI agent technology plus the technology provider who operates the agent and acts as an intermediary, forming a legal agency relationship with the user</p></li><li><p><strong>Agent (Legal):</strong> A person or entity authorized to act on behalf of another (the principal)</p></li><li><p><strong>Principal (Legal):</strong> The person or entity for whom an agent acts and who exercises principal authority, some of which can be delegated to the agent</p></li><li><p><strong>Third Party (Legal):</strong> Any person who is a counter-party in a transaction with the agent who is acting on behalf of the principal</p></li><li><p><strong>Contract:</strong> A legally binding agreement between two or more parties</p></li><li><p><strong>Electronic Contract (UETA):</strong> A contract formed through electronic means</p></li><li><p><strong>Human:</strong> A natural person</p></li><li><p><strong>Organization:</strong> A legal entity, such as a corporation, business, or government agency (also known legally as an &#8220;artificial person&#8221;)</p></li></ul><h3><strong>Legal Definitions from UETA</strong></h3><ul><li><p><strong>Transaction:</strong> &#8220;&#8216;Transaction&#8217; means an action or set of actions occurring between two or more persons relating to the conduct of business, commercial, or governmental affairs.&#8221; (UETA &#167; 2(16))</p></li><li><p><strong>Person:</strong> &#8220;&#8216;Person&#8217; means an individual, corporation, business trust, estate, trust, partnership, limited liability company, association, joint venture, governmental agency, public corporation, or any other legal or commercial entity.&#8221; (UETA &#167; 2(12))</p></li><li><p><strong>Electronic Signature:</strong> &#8220;&#8216;Electronic signature&#8217; means an electronic sound, symbol, or process attached to or logically associated with a record and executed or adopted by a person with the intent to sign the record.&#8221; (UETA &#167; 2(8))</p></li><li><p><strong>Automated Transaction:</strong> (Defined in detail in Legal Framework section below)</p></li><li><p><strong>Electronic Agent:</strong> (Defined in detail in Legal Framework section below)</p></li></ul><h3><strong>Digital Identity Concepts</strong></h3><ul><li><p><strong>Digital Identity (Wyoming):</strong> The intangible digital representation of, by and for a person, over which they have principal authority and through which they intentionally communicate or act. Can be:</p><ul><li><p><strong>Personal Digital Identity:</strong> For individuals</p></li><li><p><strong>Organizational Digital Identity:</strong> For legal entities (See WY Stat. &#167; 8-1-102(a)(xviii-xix) (2022))</p></li></ul></li><li><p><strong>Attribution:</strong> The process of establishing that an action or communication originated from a specific person or entity</p></li><li><p><strong>Impersonation:</strong> The act of falsely representing oneself as another person or entity, especially in a digital context. Doing so to commit a crime or fraud carries specific penalties.</p></li></ul><h2><strong>Building the Legal Infrastructure: A Bridge to the Future</strong></h2><p>While use of AI agents is undeniably a novel situation for almost all people at this moment in history, there is an all-but-forgotten existing legal framework that nicely supports and reflects use of this technology, including for transactions.</p><p>Back in the late 1990s, I spent nearly two years in drafting meetings for Uniform Electronic Transactions Act (UETA), attending every session but one. During this time, we were grappling with how to create a legal framework that could adapt to the rapid evolution of technology and support the rise of e-commerce. I also co-chaired the American Bar Association group that advised on electronic agents provisions and later testified before Congress on related federal legislation (the E-SIGN Act).</p><p>The legal infrastructure we built&#8212;UETA and the federal Electronic Signatures in Global and National Commerce Act (E-SIGN)&#8212;is like a massive, invisible 50-lane highway bridge supporting today&#8217;s digital economy. We designed it with the future in mind, anticipating &#8220;lanes&#8221; for autonomous agents long before the technology existed. Those seemingly excessive &#8220;lanes&#8221; are now proving essential.</p><p>Well, we suddenly need that bridge to traverse a slightly different type of traffic. Now that we finally have tons of autonomous agents and many people want to deploy them, UETA is like that bridge with perfectly suited lanes for autonomous traffic. Those wide shoulder lanes that have been gathering dust for 25 years are exactly what we need for LLM agents conducting transactions for people and organizations. They just didn&#8217;t know it!</p><h2><strong>The Legal Framework: UETA and Electronic Agents</strong></h2><p>UETA provides explicit provisions for electronic agents to conduct transactions autonomously. The law defines several key concepts that are remarkably relevant to today&#8217;s AI landscape:</p><h3><strong>Core Definitions</strong></h3><blockquote><p><strong>Electronic Agent:</strong> &#8220;&#8216;Electronic agent&#8217; means a computer program or an electronic or other automated means used independently to initiate an action or respond to electronic records or performances in whole or in part, without review or action by an individual.&#8221; (UETA &#167; 2(6))</p><p><strong>Automated Transaction:</strong> &#8220;&#8216;Automated transaction&#8217; means a transaction conducted or performed, in whole or in part, by electronic means or electronic records, in which the acts or records of one or both parties are not reviewed by an individual in the ordinary course in forming a contract, performing under an existing contract, or fulfilling an obligation required by the transaction.&#8221; (UETA &#167; 2(2))</p></blockquote><h3><strong>Attribution and Legal Effect</strong></h3><p>The most important concept from these frameworks is attribution. Automated systems that ensure clear attribution to responsible legal persons help avoid an accountability gap for potential harm and damage these systems could cause. The federal ESIGN Act states that electronic agent actions are legally valid &#8220;so long as the action of any such electronic agent is legally attributable to the person to be bound.&#8221; UETA offers further guidance:</p><blockquote><p>&#8220;An electronic record or electronic signature is attributable to a person if it was the act of the person. The act of the person may be shown in any manner, including a showing of the efficacy of any security procedure applied to determine the person to which the electronic record or electronic signature was attributable.&#8221; (UETA &#167; 9)</p></blockquote><p>Just as vehicles are required to have clearly visible license plates when they enter upon public roads, we need appropriate measures for attribution of the acts of automated and autonomous systems back to responsible parties.</p><h2><strong>The Iron Triangle: Principal, Agent, and Third Party</strong></h2><p>The relationships between users and their AI agents and external parties forms what I call the &#8220;iron triangle&#8221; of roles:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7WiN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7WiN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png 424w, https://substackcdn.com/image/fetch/$s_!7WiN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png 848w, https://substackcdn.com/image/fetch/$s_!7WiN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png 1272w, https://substackcdn.com/image/fetch/$s_!7WiN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7WiN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png" width="880" height="616" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:616,&quot;width&quot;:880,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Screenshot 2024-11-22 at 11 13 48&#8239;AM&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Screenshot 2024-11-22 at 11 13 48&#8239;AM" title="Screenshot 2024-11-22 at 11 13 48&#8239;AM" srcset="https://substackcdn.com/image/fetch/$s_!7WiN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png 424w, https://substackcdn.com/image/fetch/$s_!7WiN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png 848w, https://substackcdn.com/image/fetch/$s_!7WiN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png 1272w, https://substackcdn.com/image/fetch/$s_!7WiN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78c91f5a-e00c-4820-bdce-b5521a06cdee_880x616.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ol><li><p><strong>The Principal</strong> (the user/consumer/employee)</p></li><li><p><strong>The Agent</strong> (the intermediary providing the AI agent tech for the Principal/user)</p></li><li><p><strong>Third Parties</strong> (companies or other entities the AI agent interacts with)</p></li></ol><p>The term &#8220;agent&#8221; itself can cause confusion, holding different meanings in the realms of software development and law. In software, it broadly refers to systems that perform tasks on behalf of users. However, the legal definition is much more specific, encompassing obligations that AI systems alone cannot fulfill. According to the Restatement (Second) of Agency &#167; 1(1) (1958), agency is defined as &#8220;the fiduciary relation which results from the manifestation of consent by one person to another that the other shall act on his behalf and subject to his control, and consent by the other so to act.&#8221;</p><p>That definition might leave you scratching your head! Let&#8217;s break it down. In simpler terms, &#8216;agency&#8217; means one person agrees to act for another, like a personal assistant handling tasks for their boss. It&#8217;s about a relationship built on trust, where the &#8216;agent&#8217; is loyal to the &#8216;principal&#8217; and follows their instructions. The three fundamental roles, legally, are the principal, the agent, and third parties, with whom the agent interacts on behalf of the principal to get tasks done. You can think of these three roles as a kind of iron triangle. Fiduciary duties owed by agents to principals, like the duty of loyalty, ensure the agent is legally obligated to act in the principal&#8217;s best interests. I want to emphasize that both individuals (like in our role as consumers) as well as organizations (operating through employees) using AI agent systems would be wise to prioritize working with fiduciary providers and operators of AI Agent Systems.</p><p>Now, consider this legal concept in the context of today&#8217;s rapidly evolving AI landscape. AI agents, particularly those powered by large language models (LLMs), are quickly becoming more sophisticated and widely deployed. They&#8217;re handling increasingly complex tasks for their users, including making purchases, managing finances, and even making significant decisions with real-world consequences. However, the current models governing these AI-powered interactions are often murky and lack clarity regarding the roles, responsibilities, and legal relationships between all the players involved. This lack of clarity creates uncertainty and potential risks for both consumers and businesses, hindering the widespread adoption and beneficial potential of these powerful tools.</p><p>When you rely upon an AI Agent to conduct transactions for you which involve your duty to pay and that form other legal obligations, you should confirm that you are in fact the principal and the provider of the technology has not arrogated the role of principal to itself, leaving you as a user of their system who is relegated to operate under their principal authority. Arguably, the entire framework of hundreds of years of agency law and practice exists to support and advance precisely such relationships of trust and reliance. It is not only reasonable, but recommended, that these frameworks be applied to AI agent intermediated transactons as well, in order to ensure alignment with the user&#8217;s interests and expected legal and business relationships and results.</p><p>To address this challenge, we can apply the robust legal framework of agency to structure the unique context of AI Agent Systems. By clarifying the roles and relationships of each party involved &#8211; the consumer or employee as principal, the intermediary that provides the AI as a tool as Agent&#8211; we can create a model that fosters trust, predictability, and accountability. The role of the intermediary combined with the AI Agent can be called an &#8220;AI Agent System.&#8221; This allows us to build on the iron triangle of agency, leveraging hundreds of years of well-understood precedent. This approach not only provides principals with greater certainty but also empowers third-parties to engage in AI-powered interactions with greater confidence and clarity, unlocking the tremendous benefits of this technology for all.</p><p>This structure should be supported by five critical levels of system design:</p><ol><li><p><strong>Governance</strong>: Rules and bylaws ensuring transparency and accountability</p></li><li><p><strong>Data Stewardship</strong>: Protection and ethical use of consumer data</p></li><li><p><strong>Instructions &amp; Tooling</strong>: Mechanisms to control and direct agent actions</p></li><li><p><strong>Agent-to-Agent Communication</strong>: Secure interaction protocols (mostly coming soon)</p></li><li><p><strong>Identity &amp; Payments</strong>: Secure verification and transaction processing</p></li></ol><h2><strong>Key Considerations for Agent Transactions</strong></h2><h3><strong>Confidentiality and Data Protection</strong></h3><p>Within the fiduciary model, robust data protection is paramount. The AI Agent System provider has a high duty of care and loyalty to the user, which includes maintaining strict confidentiality of their private information and commercial transactions. This reinforces the trust essential for users to reasonably rely upon AI agents to manage sensitive tasks.</p><h3><strong>Security and Error Prevention</strong></h3><p>LLM agents may make unexpected errors when conducting automated transactions. UETA provides a framework for addressing these very issues through specific mechanisms for error prevention and correction. For example:</p><ul><li><p>Security procedures can establish spending limits</p></li><li><p>Error detection mechanisms can trigger alerts</p></li><li><p>Failed security procedures may provide grounds for transaction reversal</p></li></ul><h3><strong>Fiduciary Duty and Trust</strong></h3><p>The most compelling use case for AI Agent Systems is their ability to act as fiduciaries, prioritizing user interests above all else. The party providing the AI Agent technology to users, in this context, also forms a legal principal-agent relationship with that user. These agents can be bound by a &#8220;duty of loyalty&#8221; to their users, creating a trustworthy foundation for autonomous transactions. This fiduciary approach is especially important in the context of transactions, where financial and legal ramifications can be significant.</p><h2><strong>Parallel Tracks: Individuals and Organizations</strong></h2><p>These principles apply equally to individuals and organizations using LLM agents. The Wyoming Digital Identity Act provides a framework for recognizing and managing digital identities, further strengthening the legal foundation for AI agent transactions. The Act recognizes this duality:</p><blockquote><p><strong>Personal Digital Identity:</strong> &#8220;the intangible digital representation of, by and for a natural person&#8230;over which he has principal authority&#8221; (WY Stat. &#167; 8-1-102(a)(xviii) (2022))</p><p><strong>Organizational Digital Identity:</strong> &#8220;the intangible digital representation of, by and for a corporation, business trust&#8230;or any other legal or commercial entity&#8230;over which it has principal authority&#8221; (WY Stat. &#167; 8-1-102(a)(xix) (2022))</p></blockquote><p>The Act provides strong protections against impersonation, including injunctive relief and the potential for triple damages:</p><blockquote><p>&#8220;Any person with a personal or organizational digital identity may proceed by suit to enjoin the use of any impersonations&#8230;and may require the defendants to pay to such person all profits derived from or all damages suffered by reason of such wrongful use&#8230;the court, in its discretion, may enter judgment for an amount not to exceed three (3) times any profits or damages and reasonable attorneys&#8217; fees&#8230;&#8221; (WY Stat. &#167; 40-30-103 (2022))</p></blockquote><p>Wyoming statute provides crisp clarity on these specific points, but every state of the US has legal frameworks that can be used in combinations to achieve the same results. While the legal foundations are in place, the field of AI agent transactions is rapidly evolving. Recent developments highlight the growing momentum and practical applications of this technology.</p><h2><strong>Recent Developments in Agent Transactions: The Stripe Agent Toolkit</strong></h2><p>The landscape of agent transactions has shifted dramatically with the recent release of Stripe&#8217;s Agent Toolkit. This development, from the dominant player in online payments, is poised to accelerate the adoption of AI agents for real-world commerce. This isn&#8217;t a future prediction; it&#8217;s happening right now. Stripe&#8217;s massive reach means this technology will quickly become embedded within the core transactional fabric of the digital economy.</p><p>The Stripe Agent Toolkit enables developers to integrate Stripe&#8217;s powerful financial services directly into agentic workflows, empowering agents to not just <em>facilitate</em> transactions but to actively <em>participate</em> in them through secure, controlled mechanisms built on Stripe&#8217;s robust financial infrastructure.</p><h3><strong>Key Capabilities</strong></h3><ol><li><p><strong>Creating and Managing Stripe Objects</strong><br>Agents can now programmatically create payment links, manage products and prices, generate invoices, and handle other essential Stripe objects. This streamlines payment workflows and automates key business processes.</p><p><em>Use Cases:</em></p><ul><li><p>Generating dynamic payment links for e-commerce purchases</p></li><li><p>Creating and managing invoices for freelancers</p></li><li><p>Automating product catalog management</p></li><li><p>Streamlining customer support workflows</p></li></ul></li><li><p><strong>Metered Billing (Usage-Based Billing)</strong><br>Businesses can easily implement usage-based pricing for their agent services, tracking and charging customers based on metrics like token counts or execution time. This opens up new possibilities for monetizing AI agent platforms.</p><p><em>Use Cases:</em></p><ul><li><p>Billing for chatbot usage (messages or tokens)</p></li><li><p>Charging for API calls</p></li><li><p>Tracking and billing agent execution time</p></li><li><p>Usage-based pricing for AI services</p></li></ul></li><li><p><strong>Online Purchasing with Stripe Issuing</strong><br>Perhaps the most transformative capability, agents can now generate single-use virtual cards to make purchases online. This eliminates the need for consumers to share their primary card details with multiple merchants, significantly enhancing security while streamlining procurement processes.</p><p><em>Use Cases:</em></p><ul><li><p>Automating travel booking with controlled spending limits</p></li><li><p>Managing company expenses through virtual cards</p></li><li><p>Dynamically managing ad campaign budgets</p></li><li><p>Secure online purchasing with transaction-specific cards</p></li></ul></li></ol><h3><strong>Technical Implementation</strong></h3><p>The toolkit is designed for broad compatibility and ease of integration:</p><ul><li><p><strong>Framework Support:</strong> Native support for popular agent frameworks including LangChain, CrewAI, and Vercel&#8217;s AI SDK</p></li><li><p><strong>Language Options:</strong> Available in both Python and TypeScript</p></li><li><p><strong>LLM Compatibility:</strong> Works with any LLM provider that supports function calling</p></li><li><p><strong>Security Controls:</strong> Fine-grained access control through configurable actions</p></li><li><p><strong>Error Prevention:</strong> Built-in safeguards and monitoring capabilities</p></li></ul><p>Stripe is known for its excellent developer documentation and support, making the integration process even smoother. For detailed implementation guidance, the <a href="https://docs.stripe.com/agents">Stripe documentation</a> provides comprehensive examples and best practices.</p><h3><strong>Integration Examples</strong></h3><p>Here are two practical examples of how the Stripe Agent Toolkit enables sophisticated transaction scenarios:</p><h4><strong>Consumer Purchase via Intermediary Service</strong></h4><p>A consumer uses a shopping agent service to find and purchase products. The agent searches for the best deals, and upon consumer approval, completes the purchase using a virtual card issued by Stripe through the intermediary service.</p><p><em>Key Components:</em></p><ul><li><p>Consumer-facing interface (app/website)</p></li><li><p>AI shopping agent powered by LLMs</p></li><li><p>Stripe Agent Toolkit integration</p></li><li><p>Virtual card issuance for secure purchases</p></li><li><p>Order tracking and fulfillment</p></li></ul><h4><strong>Employee Procurement System</strong></h4><p>An employee uses a company-provided procurement tool (powered by an LLM agent) to purchase office supplies. The agent identifies approved vendors and products, and after employee confirmation, completes the purchase using a virtual card issued by Stripe.</p><p><em>Key Components:</em></p><ul><li><p>Company intranet/procurement portal</p></li><li><p>AI procurement agent with policy enforcement</p></li><li><p>Stripe Agent Toolkit integration</p></li><li><p>Automated budget tracking and reporting</p></li><li><p>Integration with accounting systems</p></li></ul><p>These developments represent a significant step forward in making agent transactions practical and secure for both consumers and businesses. The Stripe Agent Toolkit provides the crucial infrastructure needed to bridge the gap between AI agents and real-world financial transactions.</p><h3><strong>Perplexity&#8217;s Direct-to-Consumer Shopping Agent</strong></h3><p>Just days after Stripe&#8217;s announcement, Perplexity introduced a new AI-powered ecommerce feature called &#8220;Buy with Pro,&#8221; marking another significant milestone in agent transactions. While Stripe enables developers to build agent-powered commerce solutions, Perplexity is taking a direct-to-consumer approach, offering U.S. Pro users the ability to purchase items through their AI agent without visiting retailer websites.</p><h3><strong>Key Features of &#8220;Buy with Pro&#8221;</strong></h3><ul><li><p><strong>One-Click Checkout:</strong> Users can store their billing and shipping information securely within Perplexity, enabling them to complete purchases with a single click. This streamlined process includes automatic tax calculations based on the user&#8217;s address. Unlike the Stripe agent API, this new Perplexity shopping agent is provided direct-to-consumer by Perplexity itself, and it will conduct the transaction on behalf of the user including handling payment.</p></li></ul><p>Here are the key business components of this new agent transaction service:</p><ul><li><p><strong>Free Shipping:</strong> Pro subscribers benefit from free shipping on all purchases made through the &#8220;Buy with Pro&#8221; feature.</p></li><li><p><strong>Visual Product Cards:</strong> For shopping-related queries, Perplexity displays visual cards that provide detailed product information, including pricing, seller details, and pros and cons. These cards are designed to offer unbiased recommendations without sponsored content.</p></li><li><p><strong>Snap to Shop:</strong> This visual search tool allows users to upload a photo of a product they are interested in. Perplexity then identifies and displays similar items available for purchase, enhancing the shopping experience even when users lack specific product names or descriptions.</p></li><li><p><strong>Integration with Shopify:</strong> By integrating Shopify&#8217;s API, Perplexity gains access to a wide range of products and merchants, allowing it to provide comprehensive shopping options directly within its platform.</p></li></ul><p>This new feature positions Perplexity as a competitor to major ecommerce platforms like Amazon and Google Shopping by offering a seamless shopping experience directly through its AI search engine. The company is currently focusing on growing its search query volume rather than monetizing this feature immediately, with advertising business remaining the primary revenue stream focus.</p><h3><strong>The Inflection Point</strong></h3><p>Between the Stripe Agent API and Perplexity&#8217;s shopping agent both launching within the last week (as of November 20, 2024), it is clear that transactional AI agents are no longer a future possibility but have reached broad scale availability. These complementary approaches - Stripe&#8217;s developer toolkit and Perplexity&#8217;s direct-to-consumer service - demonstrate how quickly this technology is being commercialized and made available at population-scale.</p><h2><strong>The Future of Agent Transactions</strong></h2><p>As transactional AI agent technology matures, two key areas (among others) that will shape its evolution are:</p><ol><li><p>The development of common protocols for agent-to-agent communication, enabling seamless and efficient automated transactions</p></li><li><p>Sophisticated mechanisms for managing the delegation of authority from the principal user to the AI agent, balancing automation with user control</p></li></ol><p>This will ensure that agents act within clearly defined boundaries while maximizing their utility. The foundation we laid with UETA has proven remarkably prescient, providing crucial guardrails for responsible innovation while protecting user interests. The challenge now is to build upon this foundation, creating systems that maintain trust while unleashing the transformative potential of autonomous agents.</p><div><hr></div><p><strong>Note</strong>: This is a beta version preview of materials that will be released shortly on my new site <a href="https://onagents.org/">OnAgents.org</a> site, so check there for the most up to date versions of this and other AI Agent topics.</p><p><strong>Also</strong>: For more detailed discussion, including the role of zero-knowledge proofs and other emerging legal considerations for transactional AI agents, standby for an upcoming white paper I&#8217;m co-authoring with the ever-awesome <a href="https://www.linkedin.com/in/dianajstern/">Diana Stern</a>, titled: &#8220;From Fine Print to Machine Code: How AI Agents are Rewriting the Rules of Engagement&#8221;.  I&#8217;ll post a link to it here in the OnAgents section of DazzaGreenwood.com.  </p>]]></content:encoded></item></channel></rss>