Network-AI
References

Trust Levels

Trust-level configuration, score ranges, defaults, and approval impact.

Source file: references/trust-levels.md

Agent Trust Levels

Documentation for the trust level system used by AuthGuardian.

Overview

Trust levels are numerical scores (0.0 to 1.0) that represent how much the system trusts a particular agent to access sensitive resources. Higher trust = more likely to be granted permission.

Default Trust Levels

Agent IDTrust LevelRole Description
orchestrator0.9Primary coordinator with full privileges
risk_assessor0.85Specialized in compliance and risk analysis
data_analyst0.8Data processing and analytics specialist
strategy_advisor0.7Business strategy recommendations
Unknown agents0.5Default for unregistered agents

Trust Level Bands

RangeCategoryTypical Capabilities
0.9 - 1.0Full TrustAccess all resources, minimal restrictions
0.7 - 0.89High TrustAccess most resources with standard restrictions
0.5 - 0.69Medium TrustLimited access, stricter restrictions
0.4 - 0.49Low TrustRequires strong justification
< 0.4UntrustedAutomatically denied, escalate to human

How Trust Affects Approval

Trust contributes 30% to the final approval score:

Weighted Score = (Justification × 0.4) + (Trust × 0.3) + ((1 - Risk) × 0.3)

Examples

High-trust agent (0.9) with good justification (0.8) accessing low-risk resource (0.4):

Score = (0.8 × 0.4) + (0.9 × 0.3) + (0.6 × 0.3)
     = 0.32 + 0.27 + 0.18
     = 0.77 ✅ APPROVED

Low-trust agent (0.5) with weak justification (0.4) accessing high-risk resource (0.7):

Score = (0.4 × 0.4) + (0.5 × 0.3) + (0.3 × 0.3)
     = 0.16 + 0.15 + 0.09
     = 0.40 ❌ DENIED

Agent Roles and Responsibilities

orchestrator (0.9)

The primary coordination agent responsible for:

  • Task decomposition and delegation
  • Multi-agent workflow orchestration
  • Cross-session communication
  • Permission request on behalf of other agents

Why high trust: Needs broad access to coordinate all operations effectively.

risk_assessor (0.85)

Specialized agent for:

  • Compliance verification
  • Risk analysis and reporting
  • Security assessment
  • Audit preparation

Why high trust: Must access sensitive data to perform compliance checks.

data_analyst (0.8)

Data-focused agent for:

  • Data extraction and processing
  • Statistical analysis
  • Report generation
  • Query optimization

Why medium-high trust: Needs data access but operations are typically read-only.

strategy_advisor (0.7)

Business intelligence agent for:

  • Strategic recommendations
  • Market analysis
  • Trend identification
  • Executive summaries

Why medium trust: Works primarily with aggregated data, less need for raw access.

Establishing Trust for New Agents

Option 1: Pre-register in Configuration

Edit scripts/check_permission.py:

DEFAULT_TRUST_LEVELS = {
    "orchestrator": 0.9,
    "data_analyst": 0.8,
    "my_new_agent": 0.75,  # Add your agent here
}

Option 2: Gradual Trust Building

  1. Start at default trust (0.5)
  2. Track successful operations in audit log
  3. Manually increase trust based on track record
  4. Consider automated trust adjustment (future feature)

Option 3: Inherited Trust

For sub-agents spawned by trusted orchestrators:

  • Inherit parent's trust level (minus penalty)
  • Example: orchestrator (0.9) spawns sub-agent → 0.9 - 0.1 = 0.8

Trust Denial Threshold

Agents with trust below 0.4 are automatically denied with message:

"Agent trust level is below threshold. Escalate to human operator."

This prevents:

  • Unknown agents from accessing sensitive resources
  • Compromised or misconfigured agents from causing damage
  • Accidental exposure through unvalidated agent IDs

Security Considerations

Trust is Not Authentication

Trust levels assume the agent ID is already verified. Trust does NOT:

  • Authenticate the agent's identity
  • Prevent agent ID spoofing
  • Replace proper access control

Principle of Least Privilege

Even high-trust agents should:

  • Request minimal necessary scope
  • Provide clear justification
  • Follow restriction guidelines
  • Have tokens expire appropriately

Consider implementing trust decay for agents that:

  • Haven't been active recently
  • Have had failed requests
  • Are operating outside normal hours

Monitoring and Adjustment

Signs to Increase Trust

  • Consistent successful operations
  • Appropriate justifications
  • No security incidents
  • Positive audit reviews

Signs to Decrease Trust

  • Frequent permission denials
  • Vague or suspicious justifications
  • Operations outside expected scope
  • Security alerts or anomalies

Trust Audit Checklist

  • [ ] Review all agents with trust > 0.8 quarterly
  • [ ] Verify agent responsibilities match trust level
  • [ ] Check audit logs for unusual patterns
  • [ ] Remove trust for decommissioned agents
  • [ ] Document trust level changes

CLI and Trust Levels

When issuing tokens via the CLI, trust level is resolved automatically from the agent ID:

# data_analyst has trust 0.8 — passes for DATABASE read
network-ai auth token data_analyst \
  --resource DATABASE --action read \
  --justification "Need Q4 invoices for revenue report"

# unknown_bot resolves to default trust 0.5 — may pass or fail depending on resource
network-ai auth token unknown_bot \
  --resource EMAIL --action read \
  --justification "Send weekly summary digest"

Trust levels are numeric integers (14) in the CLI implementation, which map to the 0.5–0.9 scoring band. Configure agent trust in scripts/check_permission.py under DEFAULT_TRUST_LEVELS.