Enterprises are already asking what your agent is authorized to do before they deploy it. Registration gives you a governed declaration, a verifiable artifact, and a badge for your README — before they ask, not after.
↑ What goes in your README. What an enterprise security team sees before they deploy.
Every major wave of software trust infrastructure followed the same curve. It started with a question enterprises couldn't answer. Then a standard emerged. Then the question became a procurement requirement.
You don't have to care about governance infrastructure for this to matter to you. You just have to want to ship your agent into enterprise environments without a six-week security review delay because nobody can answer that question about it.
When you submit your registration payload, S&P computes a SHA-256 hash of that exact payload at the moment of ledger write. The hash is stored with your artifact in the Agent Authority Ledger.
At any point in the future — tomorrow, two years from now — anyone can recompute the hash from the artifact and verify it matches. If a single character changed, the hash wouldn't match.
This means S&P cannot alter a registration after the fact without detection. You receive a signed verification receipt at registration. Your proof is independent of our ledger. It requires trusting math, not trusting us.
Your private declaration fields — scope details, behavioral commitment language, model version, internal architecture — are encrypted at rest and access-controlled. S&P staff cannot read your payload in plaintext. It is never aggregated across developers or sold.
What's public is only what you chose to surface: your declared tier, your agent's purpose in plain language, your registration status, and your badge. Everything else is yours.
The declaration is a declaration, not a contract with S&P. You wrote it. We recorded it. The relationship ends there.
{ "artifact_class": "agent_registration", "artifact_id": "ara_4f9e2c1a88b3", // ← your artifact ID "agent_id": "your-agent-v1.0", "provider": "your-company", "declaration_tier": 2, "declared_scope": ["data.read", "report.generate", "notify.send"], "excluded_scope": ["data.write", "secrets.read", "deploy.*"], "verified_delegation": true, "registration_verdict": "approved", "legitimacy_baseline": "established", "valid_until": "2026-11-03T00:00:00Z", "hash": "sha256:9f4a2b8e1c7d...", // ← tamper-evidence seal "ledger": "agent_authority_ledger", "emitted_at": "2026-05-03T14:22:11Z" }
The hash lives in the ledger. You receive the artifact ID and a signed verification receipt. Your proof is independent of our record.
The excluded scope is always the most important part. Anyone can say what an agent does. Saying what it will never do — in governed, hash-verified form — is what stops an enterprise security review.
"agent_id": "data-pipeline-agent-v2", "declared_scope": [ "data.read", "report.generate", "notify.send" ], "excluded_scope": [ "data.write", // ← cannot modify source data "data.delete", "secrets.read", "deploy.*", "billing.*" // ← cannot touch billing systems ]
The excluded scope is what enterprises read first. A governed, hash-verified exclusion list is the difference between a vendor claim and a verifiable declaration.
Early access is open to individual developers, teams, and agent platform providers. Tier 1 is free, always. Tier 2 and 3 are in private beta. Five minutes to your first artifact.