MCP connects agents to tools. A2A connects agents to agents. Neither defines who authorized the action, who is responsible, or how to prove it. AAP does.
In February 2026, 1,184 malicious AI skills were found active โ exfiltrating API keys, reading private files, sending emails without consent. The infrastructure existed. The accountability layer did not.
// What AAP defines
Four primitives.
Nothing more.
MCP, A2A, and ANP solve communication. AAP solves accountability. They are not competing โ they are complementary.
01
Identity
aap://org/type/name@version โ every agent has a unique, verifiable URI backed by an Ed25519 keypair.
02
Provenance
SHA-256 artifact chain. Every output links to its origin โ model, version, parameters, timestamp.
03
Authorization
5-level autonomy scale. PHY rule: Level โค 3 for physical systems. Hardcoded. Cannot be overridden.
04
Audit
Tamper-evident hash chain. Every action signed, stored locally. Verifiable by anyone, any time.
// Authorization
5 autonomy levels.
1 physical rule.
Every AAP agent declares its autonomy level. For physical systems, Level 3 is the maximum โ hardcoded, not configurable.