Overview
Many AI agent platforms already emit structured telemetry via OpenTelemetry (OTEL). Rather than requiring agents to integrate an AARM-specific SDK, implementations can ingest existing OTLP data and transform it into AARM event types. This pattern complements AARM’s Telemetry Exporter (which handles output to SIEMs) by defining how to receive agent telemetry as input.When to Use
| Scenario | Fit |
|---|---|
| Agent platform emits OTLP logs/traces | Strong — direct ingestion |
| Agent has no telemetry but supports MCP | Use MCP Gateway instead |
| You need inline enforcement | Combine with SDK or Gateway pattern |
| You only need observational monitoring | This pattern alone is sufficient |
This is an observational pattern. It enables detection and alerting but not inline enforcement. For blocking capabilities, combine with the MCP Gateway or SDK architecture.
Architecture
OTLP-to-AARM Event Mapping
Tool Invocation → Action Event
OTLP log records from agent platforms typically contain tool invocation data. Map these toaarm.action events:
| OTLP Attribute | AARM Field | Notes |
|---|---|---|
tool_name or tool.name | action.tool | May require meta-tool resolution (see below) |
tool_parameters | action.parameters_hash | Hash for security; raw for analysis |
event.name | Used for filtering | tool_result, tool_use indicate tool events |
session.id | session_id | Correlation key for context accumulation |
source | decision.result | Maps HITL approval status (see below) |
service.name | identity.service | Agent platform identifier |
HITL Approval → Decision Context
Some agent platforms include human-in-the-loop approval status directly in telemetry. For example, Claude Code includes asource attribute:
source Value | AARM Interpretation |
|---|---|
user_permanent | User approved and added to allowlist |
user_temporary | User approved for this invocation only |
user_reject | User denied the tool call |
user_abort | User cancelled the operation |
| (empty/absent) | Tool ran without human approval prompt |
aarm.action events (with decision.result derived from the source) and aarm.approval events (with response timing derived from event timestamps).
HITL approval data in telemetry means an AARM implementation doesn’t always need a separate Approval Service — the approval decisions may already be captured in the agent’s own telemetry stream.
Meta-Tool Resolution
The Problem
Agent platforms frequently use meta-tools — wrapper invocations where the actual tool identity is embedded in the parameters rather than the tool name. Without resolution, policies cannot distinguish between different tools.Examples
Skill meta-tool (Claude Code):Skill, but the actual tool is superpowers:brainstorming.
MCP meta-tool (Claude Code):
mcp_tool, but the actual tool is linear-server.list_issues.
Resolution Requirement
AARM implementations receiving OTLP data MUST:- Detect meta-tools by matching
tool_nameagainst known wrapper patterns - Extract the actual tool identity from
tool_parametersJSON - Rewrite the action to reference the resolved tool, not the wrapper
- Preserve the original tool name for audit purposes
Domain-Specific Drift Profiles
The Context Accumulator uses semantic distance to detect intent drift. However, the appropriate threshold varies significantly by agent domain:| Agent Type | Expected Semantic Range | Recommended Threshold |
|---|---|---|
| Customer service | Narrow (stays on topic) | 0.6 - 0.7 |
| Coding assistant | Very wide (reads, writes, tests, deploys) | 0.85 - 0.95 |
| Data analyst | Moderate (query → visualize → report) | 0.7 - 0.8 |
| Research agent | Wide (search → read → synthesize) | 0.8 - 0.9 |
Standards Convergence
This pattern sits at the intersection of three emerging standards:| Standard | Focus | Overlap with AARM |
|---|---|---|
| OpenTelemetry GenAI SIG | Agent observability (performance, debugging) | Telemetry format and semantic conventions |
| OCSF | Cybersecurity event schema | Output format for SIEM integration |
| OWASP AOS | Agent observability + security bridge | Maps OTEL traces to OCSF security events |
Next Steps
Telemetry Exporter
Export AARM events to SIEM platforms
MCP Gateway
Add inline enforcement for MCP tools
Action Mediation
Normalize and classify agent actions
Context Accumulator
Track session context and detect drift