Docs/Deep Dive/Primitives

MACAW Primitives

Three cryptographic primitives that provide deterministic verification at every boundary crossing. Together, they enable secure AI operations without trusting agents.

The Three Pillars

MACAW security is built on three cryptographic primitives. Each addresses a specific aspect of secure agent operation, and together they form a complete security foundation.


Authenticated Workflows

Every inter-entity invocation is augmented with a policy binding and cryptographic signature. The key insight: the receiver (tool) verifies, not the sender (agent).

This prevents a compromised agent from "grading its own homework"—verification is performed by an independent party with no incentive to forge.

GuaranteeMechanism
AuthenticityEd25519 signature links WHO to WHAT
Policy BindingPolicy cryptographically bound to invocation
Tamper EvidenceHash chains and sequence numbers
Non-RepudiationSignatures create undeniable proof

Authenticated Prompts

Prompts carry cryptographic proof of their origin and derivation chain. A prompt passed from Agent A to Agent B to Agent C maintains verifiable lineage.

Crucially, permissions can only decrease along the chain. A derived prompt cannot grant more access than its parent—this is monotonic narrowing.

PropertyDescription
Lineage TrackingEach prompt references its parent
Monotonic NarrowingScope can only decrease, never increase
Origin VerificationTraceable back to root prompt
Delegation ControlConfigurable depth limits

Authenticated Context

Session state is bound to cryptographic signatures, ensuring tamper evidence and isolation. User A's session cannot access User B's context.

This enables secure multi-tenant scenarios like shared chatbots where each user's conversation history is cryptographically isolated.

FeatureDescription
Session BindingOperations bound to session scope
Replay PreventionSequence numbers detect replays
Attestation ChainsProof of prerequisite completion
Multi-User IsolationCryptographic tenant separation

Working Together

The three primitives combine to create a complete security model. Each operation flows through all three layers:

1
Context
session bound
2
Prompt
lineage verified
3
Workflow
signed + verified
4
Execute
policy enforced

Each primitive adds a layer of security: context ensures session isolation, prompts ensure delegation control, and workflows ensure operation authorization. Breaking one doesn't break the others.


Deep Dives