docs: refresh all proposals — update status, add 5 new proposals#348
docs: refresh all proposals — update status, add 5 new proposals#348imran-siddique merged 15 commits intomicrosoft:mainfrom
Conversation
Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Add EU AI Act, Colorado AI Act, and GPAI obligations timeline with AGT coverage mapping. Reference Microsoft Purview DSPM for AI as complementary data governance layer. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
The Scorecard API rejects workflows with write permissions at the workflow level. id-token: write and security-events: write must be scoped to the job level only. Restores permissions: read-all at workflow level while keeping job-level write permissions intact. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
…ft#324) Add Google-style docstrings with Args, Returns, Raises, Attributes, and Example sections to MCPMessageType, MCPAdapter, and MCPServer classes. Also enhances docstrings for key methods including handle_message, _handle_tools_call, _handle_resources_read, and _map_tool_to_action. Fixes microsoft#316
Co-authored-by: Matt Van Horn <455140+mvanhorn@users.noreply.github.com>
…s (dependency confusion) (microsoft#325) - Replace !pip install agent-os with !pip install -e ../.. in all 6 notebooks; agent-os is not on PyPI and installing it from PyPI is a dependency confusion vector - Replace zendesk-sdk/freshdesk-sdk with zenpy/freshdesk (the real published SDKs) in customer-service/requirements.txt - Remove hashlib-compat from healthcare-hipaa/requirements.txt; hashlib is stdlib and hashlib-compat is not a real PyPI package
…stall agent-os with agent-os-kernel Replace all remaining instances of `pip install agent-os` (unregistered on PyPI) with `pip install agent-os-kernel` (the actual package) across docs, examples, TypeScript extensions, CLI source, tests, and SVG assets. Also fixes `pip install emk` references to point to `agent-os-kernel[full]` since emk is a submodule, not a standalone PyPI package. Completes the fix started in PR microsoft#325 which only covered notebooks. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Dify 65K→133K, AutoGen 42K→55K, CrewAI 28K→46K, Semantic Kernel 24K→27K, LangGraph 24K→27K, Haystack 22K→24K, Agent Framework 7.6K→8K. Added star counts for OpenAI Agents SDK (20K) and Google ADK (18K). Sorted by stars descending. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Update Status fields across all 8 proposal documents: - DIFY: Shipped (PR #2060, live on Marketplace) - GITHUB-COPILOT: Shipped (all 3 PRs merged) - MAF: Implemented Level 1 (18 tests, awaiting MAF team) - MCP: Partially Shipped (npm + Glama, registry pending) - OPENLIT: Implemented (PR #1062 under review) - CSA-ATF: Active (ATF author engaged, conformance spec published) - AAIF: Paused (re-submit after public release) - GOOGLE-ADK: Implemented (GovernanceAdapter shipped) Added Progress section to CSA-ATF-PROPOSAL.md with timeline.
New proposals for shipped/active engagements: - HAYSTACK-INTEGRATION-PROPOSAL.md (shipped) - ORACLE-AGENTSPEC-PROPOSAL.md (active engagement) - STRIPE-MPP-PROPOSAL.md (planned) - NEXUS-TRUST-EXCHANGE-PROPOSAL.md (pre-alpha) - A2A-TRUST-EXTENSIONS-PROPOSAL.md (adapter shipped) Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
🤖 AI Agent: security-scanner — Security Review SummarySecurity Review SummaryThis pull request primarily involves documentation updates and new proposals. While the changes are not directly related to the codebase, the proposals describe new integrations and features that could have security implications. Below is an analysis of potential risks and recommendations based on the provided diff. Findings1. Trust Chain Weaknesses in Nexus Trust Exchange
2. Policy Engine Circumvention in Haystack Integration
3. Credential Exposure in Stripe MPP Integration
4. Deserialization Risks in Nexus Trust Exchange
5. Potential Supply Chain Risks
General Recommendations
ConclusionWhile this pull request primarily involves documentation updates, the proposed integrations introduce potential security risks that must be addressed during implementation. The most critical issue is the use of an insecure cryptographic placeholder in the Nexus Trust Exchange. This should be prioritized for immediate remediation. Other risks, such as policy engine circumvention and credential exposure, should also be carefully managed during development. |
There was a problem hiding this comment.
🤖 AI Agent: code-reviewer
Review Summary
This pull request focuses on updating the documentation for proposals, including status updates for existing proposals and the addition of five new proposals. While the changes are documentation-only, they touch on critical areas of the project, such as trust, cryptographic operations, and agent governance. Below is a detailed review of the changes.
🔴 CRITICAL Issues
-
Nexus Trust Exchange - Placeholder Cryptography
- The Nexus Trust Exchange proposal mentions that cryptographic operations (Ed25519) are currently implemented using a placeholder XOR-based mechanism. This is a severe security risk as XOR is not cryptographically secure and can be trivially broken.
- Action Required: Replace the placeholder cryptography with a secure implementation, such as Ed25519 using a trusted library (e.g., PyNaCl or cryptography). If hardware-backed security is required, integrate with Azure Key Vault HSM as planned.
-
Audit Logger - Tamper-Evident Logging
- The Haystack integration proposal describes an audit logger with a SHA-256 hash chain for tamper-evident logging. However, there is no mention of how the hash chain is persisted or protected from tampering.
- Action Required: Ensure the hash chain is stored in a secure, append-only medium (e.g., a write-once database or blockchain). Document the persistence mechanism to ensure audit integrity.
🟡 WARNING Issues
-
Breaking Changes in Agent Infrastructure
- The Nexus Trust Exchange and A2A Trust Extensions proposals introduce new components and protocols (e.g., IATP Trust Handshake, VADP delegation chains). These may introduce breaking changes to existing agent interactions if not backward-compatible.
- Action Required: Clearly document backward compatibility guarantees or provide migration paths for existing agents.
-
Stripe MPP Integration - Dependency on External SDK
- The Stripe MPP proposal depends on an external SDK that was launched in March 2026. This introduces a risk of breaking changes or API instability in the dependency.
- Action Required: Use version pinning for the Stripe MPP SDK and implement fallback mechanisms for unsupported features.
💡 Suggestions for Improvement
-
Agent Trust Scoring
- The Haystack integration and Nexus Trust Exchange both implement trust scoring mechanisms. It would be beneficial to standardize the trust scoring model across components to avoid inconsistencies.
- Suggestion: Define a central trust scoring API or module that can be reused across integrations.
-
Graceful Fallback Logic
- The Haystack integration includes fallback logic for when the
haystacklibrary is not installed. While this ensures compatibility, the fallback logic is not covered by tests (# pragma: no cover). - Suggestion: Add test cases for the fallback logic to ensure it behaves as expected.
- The Haystack integration includes fallback logic for when the
-
Proposal Status Updates
- The proposal status updates are clear, but some statuses (e.g., "Pre-Alpha," "Planned") lack detailed timelines or next steps.
- Suggestion: Add a "Next Steps" section to all proposals to provide clarity on future milestones.
-
Documentation Consistency
- The README index now includes an "Agent Infrastructure & Protocols" section, but the formatting and categorization could be improved for better readability.
- Suggestion: Use consistent formatting for all sections and consider grouping proposals by their maturity (e.g., "Shipped," "Active," "Planned").
-
OWASP Agentic Top 10 Compliance
- While the proposals touch on critical areas like trust, cryptography, and auditability, there is no explicit mention of compliance with the OWASP Agentic Top 10.
- Suggestion: Add a compliance mapping section to each proposal to ensure alignment with OWASP Agentic Top 10 guidelines.
Final Recommendation
- Merge Blocker: Address the 🔴 CRITICAL issues related to placeholder cryptography and audit logging before merging.
- Post-Merge Actions: Plan for addressing 🟡 WARNING issues and implement the 💡 suggestions in future updates.
By resolving these issues, the documentation will better support the project's goals of secure and trustworthy agent governance.
Full refresh of proposals directory. Updated 8 existing proposal status fields (Dify->Shipped, MAF->Implemented, CSA-ATF->Active, etc). Created 5 new proposals for shipped/active engagements: Haystack, Oracle Agent Spec, Stripe MPP, Nexus Trust Exchange, A2A Trust Extensions. Updated README index with new Agent Infrastructure section. 14 files changed, 224 insertions — all documentation.