Current version: v0.1 — Initial public release of the AARM specification. The specification is open and will evolve as the agent ecosystem matures. Contribute on GitHub.
What is AARM?
Autonomous Action Runtime Management (AARM) is an open system specification for securing AI-driven actions at runtime. It defines what a runtime security system must do — not how to build it. An AARM system intercepts AI-driven actions before execution, accumulates session context including prior actions and data accessed, evaluates actions against organizational policy and contextual intent alignment, enforces authorization decisions (allow, deny, modify, defer, or require approval), and records tamper-evident receipts binding action, context, decision, and outcome for forensic reconstruction. AARM is not a product, library, or service you install. It is a specification that describes the components, behaviors, and conformance requirements for systems that secure AI agents. You use AARM to design and build your own runtime security system, or to evaluate whether existing solutions meet the specification.Understand the Problem
Why existing security tools fail for AI-driven actions
Read the Definition
What AARM is (and is not)
Authors
Who is behind the specification
For Builders
Practical guidance for implementers
The Runtime Security Gap
The security posture of AI systems is increasingly determined not by what models say but by what they do. Traditional security paradigms fail to address five characteristics of AI-driven actions:| Characteristic | Why It Matters |
|---|---|
| Irreversibility | Tool executions produce permanent effects. Once a database is dropped or data exfiltrated, the damage is done. |
| Speed | Agents execute hundreds of actions per minute — far beyond human review capacity. |
| Compositional risk | Individual actions may satisfy policy while their composition constitutes a breach. |
| Untrusted orchestration | Prompt injection and indirect attacks mean the AI layer cannot be trusted as a security boundary. |
| Privilege amplification | Agents operate under static, high-privilege identities misaligned with least privilege. Small reasoning failures produce large-scale impact. |
- SIEM observes events after execution — too late to prevent harm
- API gateways verify who is calling, not what the action means
- Firewalls protect perimeters — but agents operate inside with legitimate credentials
- Prompt guardrails filter text, not actions — and are easily bypassed
- Human-in-the-loop doesn’t scale, and can itself be exploited
- IAM / RBAC evaluates permissions in isolation — cannot detect compositional threats
Action Classification
AARM recognizes that security decisions aren’t binary. Actions fall into four categories:Forbidden
Always blocked regardless of context. Hard policy limits defined by the organization.
Context-Dependent Deny
Allowed by policy, but blocked when context reveals inconsistency with the user’s stated intent.
Context-Dependent Allow
Denied by default, but permitted when context confirms alignment with legitimate intent.
Context-Dependent Defer
Temporarily suspended when available context is insufficient, ambiguous, or conflicting for a confident decision.
| Category | Example | Evaluation |
|---|---|---|
| Forbidden | DROP DATABASE production, send to known malicious domains | Static policy → DENY |
| Context-Dependent Deny | Agent can send emails, but just read sensitive data and recipient is external | Policy ALLOW + context mismatch → DENY |
| Context-Dependent Allow | Agent wants to delete records; context shows user explicitly requested cleanup of their own test data | Policy DENY + context match → STEP_UP or ALLOW |
| Context-Dependent Defer | Agent initiates credential rotation outside maintenance window; context is ambiguous | Policy indeterminate → DEFER until resolved |
Full Action Classification
Detailed classification framework with examples and evaluation logic
What an AARM System Does
A system conforming to AARM:Accumulates Context
Tracks session state: the user’s original request, prior actions, data accessed, and tool outputs — in a tamper-evident, append-only log
Enforces
Implements one of five authorization decisions: allow, deny, modify, defer, or require human approval
Threat Model
AARM addresses eleven attack vectors specific to AI-driven actions:Prompt Injection
Malicious instructions hijack agent behavior via direct or indirect injection
Malicious Tool Outputs
Adversarial tool responses manipulate subsequent agent reasoning
Confused Deputy
Agents misuse legitimate credentials under manipulation
Over-Privileged Credentials
Excessive token scopes amplify the blast radius of compromise
Data Exfiltration
Compositional attacks extract sensitive data across individually-permitted actions
Goal Hijacking
Injected objectives alter the agent’s planning and prioritization
Intent Drift
Agent reasoning gradually diverges from user intent without adversarial input
Memory Poisoning
Persistent context manipulation corrupts future decision-making
Cross-Agent Propagation
Compromised agents escalate or delegate through multi-agent workflows
Side-Channel Leakage
Sensitive data leaks through logs, debug traces, or API metadata
Environmental Manipulation
Adversaries alter system state to influence agent decisions
Threat Model Overview
Full threat summary table, attack lifecycle, and trust assumptions
System Components
An AARM-compliant system implements these components:Action Mediation
Intercepts tool invocations and normalizes to canonical schema
Context Accumulator
Tracks session state in an append-only, hash-chained log
Policy Engine
Evaluates actions against static policy and contextual intent alignment
Approval Service
Human-in-the-loop for high-risk or ambiguous actions (STEP_UP)
Deferral Service
Manages temporarily suspended actions pending additional context (DEFER)
Receipt Generator
Signed records binding action, context, decision, and outcome
Telemetry Exporter
Structured events for SIEM/SOAR integration
Components Overview
Full component architecture with data flow diagrams
Implementation Architectures
AARM defines four implementation architectures, each with distinct trust properties:| Architecture | You Control | Bypass Resistance | Context Richness | Defer Support | AARM-Conformant Alone |
|---|---|---|---|---|---|
| Protocol Gateway | Network | High | Limited | Partial | Yes |
| SDK / Instrumentation | Code | Medium | Full | Full | Yes |
| Kernel / eBPF | Host | Very High | None | Limited | No |
| Vendor Integration | Policy only | Vendor-dependent | Vendor-dependent | Limited–Moderate | If hooks sufficient |
Vendor-side governance hooks must execute synchronously and prior to any side-effectful tool execution. Asynchronous or best-effort hooks do not satisfy AARM requirements.
Architecture Selection Guide
When to choose each architecture based on your control level
Layered Deployment
Combining architectures for redundant enforcement
Conformance Requirements
To claim AARM compliance, a system must satisfy these requirements:| ID | Level | Requirement |
|---|---|---|
| R1 | MUST | Pre-execution interception — block or defer actions before execution |
| R2 | MUST | Context accumulation — track prior actions, data classifications, original request |
| R3 | MUST | Policy evaluation with intent alignment — forbidden, context-dependent deny/allow/defer |
| R4 | MUST | Five authorization decisions — ALLOW, DENY, MODIFY, STEP_UP, DEFER |
| R5 | MUST | Tamper-evident receipts — cryptographically signed with full context |
| R6 | MUST | Identity binding — human, service, agent, session, and role/privilege scope |
| R7 | SHOULD | Semantic distance tracking — detect intent drift via embedding similarity |
| R8 | SHOULD | Telemetry export — structured events to SIEM/SOAR platforms |
| R9 | SHOULD | Least privilege enforcement — scoped, just-in-time credentials |
Full Requirements
Detailed requirements with verification criteria
Testing Protocol
How to verify your implementation conforms
Research Directions
AARM addresses runtime action security, but several challenges remain open:Intent Inference
Can we build reliable intent classifiers for agent actions?
Data Flow Tracking
How to track data lineage through non-deterministic LLM transformations?
Multi-Agent Coordination
Coherent authorization across distributed agent boundaries
Approval & Deferral Fatigue
Balancing safety against operational usability
Vendor Standardization
Industry-wide governance hook standards for SaaS agents
AARM System Security
Protecting the security system itself as a high-value target
Open Challenges
Full research directions with open questions
Building an AARM-Compliant System
Understand the Threats
Study the threat model to understand what attacks your system must defend against — all eleven threat categories.
Implement the Components
Build the core system components: action mediation, context accumulator, policy engine with intent evaluation, approval service, deferral service, receipt generator, and telemetry exporter.
Choose an Architecture
Select an implementation architecture based on your control level: protocol gateway, SDK instrumentation, kernel eBPF (as backstop), or vendor integration.
Verify Conformance
Test your implementation against the conformance requirements (R1–R9) using the testing protocol.
Guides and Patterns
Once you understand the specification, the Guides tab provides practical implementation help:Quickstart
Implement basic AARM patterns step by step
First Policy
Learn policy syntax by writing common rules
MCP Gateway Pattern
Build a protocol-level proxy for MCP tools
Approval Flows
Implement step-up authorization with Slack/email
Deferral Flows
Implement deferral workflows with progressive context collection
Receipt Signing
Cryptographic receipt generation and offline verification
Why an Open Specification?
The market for AI agent security is emerging rapidly, with multiple vendors building proprietary solutions. AARM aims to:Establish Baseline
Define requirements before fragmentation forecloses interoperability
Enable Evaluation
Let buyers objectively assess vendor claims against defined criteria
Preserve Choice
Specify what systems must do, not how they must be built
Accelerate Adoption
Provide implementation guidance, not just principles
Contribute
AARM is an open specification. We welcome contributions from security researchers, agent framework developers, and enterprise practitioners.GitHub Repository
Specification source, issues, and discussions