Skip to content

Grade tools: add OAuth and request signing setup evaluation #3360

@bokelley

Description

@bokelley

Summary

The grade/compliance evaluation tools should be able to assess an agent's OAuth and RFC 9421 request signing setup. It's unclear whether current grading capabilities cover these, and the affordances aren't surfaced clearly to operators trying to validate their security posture.

Context

AdCP 3.0 includes:

  • RFC 9421 request signing profile — Ed25519 HTTP Message Signatures, optional in 3.0, mandatory under AdCP Verified. Published test vectors at static/compliance/source/test-vectors/request-signing/.
  • OAuth 2.1 + OIDC for authentication (authorization servers via RFC 8414, protected resource metadata via RFC 9728, dynamic client registration via RFC 7591).
  • Signing is required for mutating operations under AdCP Verified; webhook callbacks have their own signing rules.

Operators setting these up need a way to verify their implementation is correct end-to-end: keys discoverable, canonical inputs producing bit-identical signatures, OAuth metadata properly published, scopes correct, etc.

Proposed evaluation surfaces

OAuth setup:

  • /.well-known/oauth-authorization-server (RFC 8414) — present, well-formed, declares supported grants/scopes
  • /.well-known/oauth-protected-resource/... (RFC 9728) — present, points to correct AS
  • 401 responses include WWW-Authenticate: Bearer resource_metadata=… where appropriate
  • DCR endpoint behavior (if exposed)
  • Token validation roundtrip against a registered client

Request signing setup:

  • Signing keys discoverable
  • Test vectors at static/compliance/source/test-vectors/request-signing/ produce bit-identical canonical inputs
  • request_signature_required returned correctly when unsigned mutating request is sent
  • Webhook callback signing matches push_notification_config declaration
  • Covered-components list, sf-binary encoding, URL canonicalization all conform

Asks

  1. Confirm whether existing grade/comply tools already cover these — if so, document the affordance and how to invoke it.
  2. If not, scope the work to add OAuth and request-signing evaluation as part of the security baseline storyboard (S6 specialist track per Add S6: Security mastery specialist module #2369).
  3. Surface the capability so an Addie tool surface or CLI invocation can run it on demand against a target agent URL.

References

Metadata

Metadata

Assignees

No one assigned

    Labels

    claude-triagedIssue has been triaged by the Claude Code triage routine. Remove to re-triage.enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions