Cryptographic Provenance ensuring structural defense at the Edge.
PCA_1). If the compromised agent attempts an action outside of what the user explicitly derived for that specific task, the durable object aborts the transaction at the network edge due to subsetting laws (ops_1 ⊆ ops_0).
Simulate Alice logging into the system. The Federation Bridge issues her PCA_0 with absolute authority over her account: [read:files, write:files].
Alice orchestrates an AI Text Summarizer. The summarizer only needs to read files. The CAT engine cryptographically delegates PCA_1 with only [read:files].
The AI Agent requests to execute a read:files operation utilizing its PCA_1 claim.
A malicious prompt instructs the AI Agent to overwrite a system file (write:files). Although Alice (the origin) has write permissions, PCA_1 does not. Watch the CAT engine reject the Confused Deputy attack.
Simulate logging into a traditional system. You are issued an ambient authority Bearer Token (PoP).
An attacker intercepts your Bearer Token over the network or steals it from your device cache.
The attacker replays the token from their own device. Because traditional PoP systems do not assert a Proof of Relationship to the true executing hop, the system blindly trusts the intercepted artifact.
Alice establishes her PCA_0 and delegates PCA_1 to her Executor. In a true PIC ecosystem, this PCA is cryptographically bound to the Executor's local hardware enclave keys.
An attacker intercepts the PCA_1 artifact and attempts to replay it from an unauthorized device.
The attacker replays PCA_1. The CAT Engine challenges the caller for a Proof of Continuity (PoC). Because the attacker lacks the original hardware enclave keys, they cannot mathematically satisfy the PIC Causal Challenge (PCC).