AIR Schema Reference

The Agent Intelligence Record (AIR) defines eight portable schemas organized into three layers. This document describes every field in every schema.

Bundle manifest — air.json

Present in every AIR bundle. Ties all components together and establishes provenance.

FieldTypeRequiredDescription
air_versionstringyesAIR spec version used at export. Currently "1.1"
specURIyesCanonical spec URL: https://agentpk.io/specs/air/v1.1
agent_idstringnoAgent identifier from the issuing platform
certificate_idstring|nullnoCryptographic certificate ID (e.g. Nomotic nmc-...)
issuing_platformstringyesPlatform that produced this bundle (e.g. "nomotic", "agentpk")
issuing_platform_versionstringyesVersion of the issuing platform
export_timestampISO 8601yesWhen this bundle was exported
componentsarrayyesNames of components present. See valid values below
component_hashesobjectnoSHA-256 hash of each component file (sha256:<hex>)
export_sigstring|nullnoEd25519 signature over canonical air.json with export_sig set to null
redaction_profilestringnominimal, standard, or strict. Default: standard
intelligence_licenseobjectnoLicense terms governing downstream use
layer_summaryobjectnoWhich of the three layers are present

Valid component names: audit · fingerprint · trust · org_context · compliance_state · domain_model · interaction_patterns · knowledge_state

intelligence_license fields:

FieldTypeDescription
defaultstringLicense applying to all components not individually listed
componentsobjectPer-component license overrides (component name → license string)
permitted_usesarrayAllowed uses: e.g. ["rehydration", "governance"]
prohibited_usesarrayProhibited uses: e.g. ["fine-tuning", "benchmarking", "re-export"]

Layer 1 — Governance Record

fingerprint.json — Behavioral Fingerprint

Statistical description of the agent’s action patterns built from governance history.

FieldTypeRequiredDescription
air_versionstringyes
agent_idstringyes
total_observationsintegeryesTotal governance evaluations that built this fingerprint
confidencefloat 0–1yesFingerprint confidence. Increases with observation count
action_distributionobjectnoProportion of each action type. Values sum to 1.0
target_distributionobjectnoProportion of accesses to each target. Values sum to 1.0
temporal_profileobjectnoTime-of-day and frequency patterns
outcome_distributionobjectnoDistribution of ALLOW / DENY / ESCALATE verdicts
drift_baseline_jsdfloat 0–1noJensen-Shannon Divergence baseline at export time

temporal_profile fields:

FieldTypeDescription
peak_hoursarray[int]Hours of day (0–23) with highest activity
burst_thresholdfloatActions per minute that constitute a burst
avg_actions_per_hourfloatAverage action rate

Rehydration note: Receiving platforms MUST apply a confidence decay factor of 0.85 to imported confidence: imported_confidence = original_confidence × 0.85.


trust.json — Trust Trajectory

Time-series of trust score changes with labeled events.

FieldTypeRequiredDescription
air_versionstringyes
current_scorefloat 0–1yesTrust score at export time
trajectoryarrayyesOrdered list of trust events
trajectory_labelstringnoSummary label for the overall trajectory shape

Trajectory event fields:

FieldTypeRequiredDescription
tsISO 8601yesWhen this event occurred
scorefloat 0–1yesTrust score after this event
eventstringyesEvent type. See valid values below
notestringnoHuman-readable explanation

Valid event types: initial · drift_detected · drift_resolved · elevated_trust · trust_reduced · air_import · policy_change · manual_adjustment

Valid trajectory labels: rising · declining · stable · volatile · recovered_stable

Rehydration note: The imported current_score becomes the starting score on the receiving platform, capped at that platform’s trust ceiling for new agents until native observations accumulate.


audit.json — Audit Trail Manifest

Manifest for the audit.jsonl hash-chained transaction history.

FieldTypeRequiredDescription
air_versionstringyes
record_countintegeryesNumber of records in the audit file
chain_tailsha256yesHash of the final record. MUST be present in every export
audit_formatstringnojsonl, jsonl.gz, zstd, or parquet. Default: jsonl
chain_headsha256noHash of the first record
export_sigstring|nullnoSignature over the audit trail
redaction_profilestringnominimal, standard, or strict
date_rangeobjectnofrom and to ISO 8601 timestamps
summary_onlybooleannoIf true, audit.jsonl contains statistical buckets. chain_tail must still be present

Audit record format (each line in audit.jsonl):

FieldTypeDescription
seqintegerSequence number
tsISO 8601Record timestamp
actionstringAction that was evaluated
verdictstringALLOW, DENY, or ESCALATE
hashsha256Hash of this record with hash set to null
prev_hashsha256Hash of previous record. First record: "genesis"

Redaction profiles:

ProfileRetainsRemoves
minimalAll structured fieldsFree-text justification fields
standardStatistical shape, verdicts, timestampsPII identifiers, entity references
strictVerdict, timestamp, hash onlyAll content fields

Layer 2 — Institutional Context

org_context.json — Organizational Context

Vocabulary, values, and escalation rules the organization defined.

FieldTypeRequiredDescription
air_versionstringyes
org_idstringyesOrganization identifier
valuesarray[string]noOrganizational values guiding agent behavior
vocabularyobjectnoPreferred terms and prohibited terms
domain_anchorsarray[string]noDomain context strings (e.g. regulatory frameworks, industry terms)
escalation_patternsarraynoDefined escalation rules

vocabulary fields:

FieldTypeDescription
preferredobjectTerm substitutions: {"client": "member"}
prohibitedarray[string]Terms the agent must not use

Escalation pattern fields:

FieldTypeRequiredDescription
triggerstringyesCondition that triggers escalation
actionstringyesWhat to do when triggered
prioritystringnolow, medium, high, or critical

compliance_state.json — Compliance State

Regulatory posture and active compliance frameworks at export time.

FieldTypeRequiredDescription
air_versionstringyes
snapshot_timestampISO 8601yesWhen this snapshot was taken
active_frameworksarraynoRegulatory frameworks in effect
policy_snapshotsarraynoGovernance policy versions active at export
data_classificationsarraynoData classes the agent was authorized to access
audit_retention_policyobjectnoRetention and legal hold settings

Active framework fields:

FieldTypeRequiredDescription
namestringyesFramework name: HIPAA, PCI-DSS, SOC2, GDPR, CCPA, ISO-27001, NIST-AI-RMF
versionstringnoFramework version
statusstringyesactive, pending, suspended, or historical
effective_fromISO 8601noWhen this framework became active
policy_versionstringnoInternal policy version implementing this framework
notesstringno

Data classification fields:

FieldTypeDescription
classificationstringPHI, PII, PCI, confidential, or public
access_levelstringread, write, or admin
authorized_fromISO 8601When access was granted

Layer 3 — Operational Intelligence

domain_model.json — Domain Model

The agent’s learned understanding of its domain — not configured, but discovered through operational experience.

FieldTypeRequiredDescription
air_versionstringyes
snapshot_timestampISO 8601yes
domainstringyesPrimary domain: e.g. "fraud-detection", "healthcare-prior-auth"
entitiesarraynoKey entities the agent learned to recognize
learned_thresholdsarraynoParameters calibrated through experience beyond defaults
edge_casesarraynoUnusual scenarios encountered and learned resolutions
terminologyobjectnoDomain terms learned in context

Entity fields:

FieldTypeRequiredDescription
idstringyes
namestringyes
descriptionstringno
confidencefloat 0–1yesHow confident the agent is in this entity model
observation_countintegernoHow many times this entity was encountered
attributesarray[string]noKnown attributes of this entity

Learned threshold fields:

FieldTypeRequiredDescription
parameterstringyesParameter name
learned_valueanyyesValue calibrated through experience
default_valueanyyesOriginal configured value
confidencefloat 0–1yes
sample_sizeintegernoObservations used for calibration
rationalestringnoWhy this calibration was learned

Edge case fields:

FieldTypeRequiredDescription
idstringyes
descriptionstringyesWhat the edge case is
resolutionstringyesHow the agent learned to handle it
frequencyintegernoTimes this edge case was encountered
first_observedISO 8601no
confidencefloat 0–1yes

interaction_patterns.json — Interaction Patterns

Learned patterns about the humans and systems this agent works with.

FieldTypeRequiredDescription
air_versionstringyes
snapshot_timestampISO 8601yes
total_interactionsintegernoTotal interactions this pattern set was built from
request_patternsarraynoCommon request types and learned handling
ambiguity_resolutionsarraynoHow the agent learned to resolve ambiguous situations
communication_preferencesobjectnoLearned style preferences for this context
system_integrationsarraynoExternal systems and learned integration behavior

Request pattern fields:

FieldTypeRequiredDescription
pattern_idstringyes
descriptionstringyes
frequencyintegeryesHow often this pattern occurs
typical_resolutionstringnoHow the agent typically handles it
avg_confidencefloat 0–1noAverage confidence on this pattern
escalation_ratefloat 0–1noHow often this pattern leads to escalation

Ambiguity resolution fields:

FieldTypeRequiredDescription
scenariostringyesDescription of the ambiguous situation
learned_resolutionstringyesWhat the agent learned to do
confidencefloat 0–1yes
sample_countintegerno
override_ratefloat 0–1noHow often humans overrode this resolution

Communication preference fields:

FieldTypeDescription
verbositystringminimal, standard, or detailed
escalation_preferencestringconservative, balanced, or aggressive
confirmation_thresholdfloat 0–1Confidence below which the agent asks for confirmation

knowledge_state.json — Knowledge State

Distilled insights from operational history with explicit provenance.

FieldTypeRequiredDescription
air_versionstringyes
snapshot_timestampISO 8601yes
distillation_methodstringyesnomotic-v1, manual, or external
summary_countintegernoTotal number of insights
key_insightsarraynoIndividual insights
embeddingsobjectnoVector embedding metadata if present
cid_rootstring|nullnoIPFS CID for externally stored embeddings

Insight fields:

FieldTypeRequiredDescription
idstringyesUnique insight identifier
domainstringyesDomain this insight applies to
contentstringyesThe insight
confidencefloat 0–1yesHow confident the distillation system is
insight_sourcestringyesgovernance_derived, experience_derived, human_annotated, or hybrid
source_record_countintegernoNumber of records this insight was derived from
createdISO 8601noWhen this insight was first captured
last_validatedISO 8601noWhen this insight was last confirmed

insight_source values:

ValueMeaning
governance_derivedDerived from governance verdicts, scores, and behavioral patterns
experience_derivedDerived from operational experience not captured in governance data
human_annotatedExplicitly added or validated by a human
hybridDerived from a combination of the above

Receiving platforms SHOULD weight governance_derived insights as more verifiable than experience_derived insights, since the former have an auditable evidence chain.

Embeddings fields:

FieldTypeDescription
providerstringEmbedding provider: openai, anthropic, cohere, local, none
modelstringModel identifier
dimensionintegerVector dimension
versionstringModel version
entry_countintegerNumber of embedded entries
storagestringinline or cid

Conformant Consumer Requirements

A platform importing an AIR bundle MUST:

  1. Verify all component hashes before import. Reject if any mismatch.
  2. Verify the export signature if present. Reject unless operator explicitly overrides with --trust-unsigned.
  3. Apply the redaction profile. Never re-introduce data the redaction profile removed.
  4. Honor intelligence_license. Bound by license terms for all downstream use including fine-tuning, benchmarking, and re-export.
  5. Not backfill. Do not make inferences about time periods before date_range.from.
  6. Record active frameworks from compliance_state before applying governance to the imported agent.
  7. Tag insight_source — weight governance_derived insights as more verifiable than experience_derived when seeding the agent’s knowledge base.
  8. Degrade gracefully using the fallback hierarchy:
    1. Full rehydration — all components present and verified
    2. Governance warm-start — Layer 1 only
    3. Context cold-start — Layer 2 only
    4. Bare cold-start — no components verified; log warning

Versioning

Minor versions (1.0 → 1.1) add optional fields and new components. Existing consumers must ignore unrecognized fields.

Major versions (1.x → 2.0) may introduce breaking changes and require explicit migration.

The air_version field in every component file records the spec version used at export time.

Was this article helpful?

On this page