Agentius/ RESEARCH
Open framework v0.1

Authority Surface Framework

A practical model for mapping where agentic AI can exercise operational authority. Use it to classify actions, blast radius, escalation posture, evidence requirements, and drift triggers before agents reach production.

Use this as a map, not a slogan. Attack surface asks where a system can be compromised. Authority surface asks where AI-connected software can act.

Scope and non-goals

This framework is a lightweight mapping method for agentic AI workflows. It does not replace attack surface management, identity and access management, threat modeling, AI risk management, security review, legal review, human oversight design, or compliance assessment.

It is intended to complement those practices by focusing on where AI-connected systems can exercise operational authority.

Core definitions

Authority Surface

The systems, actions, permissions, escalation paths, and evidence requirements through which AI software can create operational effects.

Authority Surface Mapping

The process of identifying where AI systems can act, what consequences those actions create, and what control posture each action requires.

Operational Blast Radius

The consequence footprint of an AI action if it is wrong, unauthorized, mistimed, or executed outside policy.

Action-class taxonomy

Action ClassMeaningTypical Minimum Control
READAccess informationPrivacy and access control
WRITEModify recordsPolicy-bound validation
DELETERemove data or objectsApproval and recovery path
NOTIFYSend internal or external messageReview if externally binding
ROUTEMove case, task, user, or object into workflowAudit and threshold rules
APPROVEGrant request, benefit, access, exception, or actionEscalation or dual control
DENYReject request, eligibility, access, benefit, or actionReview and explanation
PAYMove money or create financial obligationMandatory escalation
CONFIGUREChange settings, permissions, or operating parametersPrivileged review
RELEASEDeploy, merge, publish, or promoteCI, security, and release gates
ESCALATERoute to human or secondary authority systemEvidence and accountability

Blast-radius model

LevelNameExample
BR-0InformationalSummarize document, explain policy, draft internal note
BR-1Internal low impactTag ticket, classify lead, draft response
BR-2Operational reversibleUpdate CRM field, route case, schedule workflow
BR-3External or rights-affectingSend customer notice, reject claim, alter eligibility queue
BR-4Financial, legal, identity, or safetyIssue payment, change access, file report, modify vendor bank data
BR-5Irreversible or systemicProduction release, legal commitment, critical infrastructure action

Control posture ladder

PostureDescription
ObserveLog only
AlertNotify human, operator, or system owner
GatePolicy check before action
ApproveHuman approval required
Dual ControlTwo-role approval required
Block DefaultAction denied unless an exceptional path exists
Evidence RequiredAction cannot finalize without evidence receipt
Replay RequiredDecision path must be reconstructable

Mapping worksheet

FieldQuestion
Agent / workflowWhat system is acting?
Tool / integrationWhat can it call?
Target systemWhat system is affected?
Action classREAD, WRITE, PAY, RELEASE, etc.
Consequence classMoney, identity, legal, safety, customer communication, operational record
ReversibilityReversible, compensable, partially reversible, irreversible
Blast radiusBR-0 to BR-5
EscalationNone, threshold, mandatory, dual control
EvidenceLog, receipt, signed receipt, replay bundle
Drift triggerWhat change requires remapping?

Change triggers

An authority surface must be remapped when tools, permissions, prompts, policies, workflows, thresholds, jurisdictions, human approval paths, downstream automation, memory, or agent-to-agent delegation change.

  • A new tool or API is connected.
  • An existing tool receives broader permissions.
  • A model, prompt, policy, or workflow changes.
  • An action threshold changes.
  • A new customer segment or jurisdiction is added.
  • A human approval path is removed or weakened.
  • Downstream automation is added.
  • Memory or agent-to-agent delegation changes future behavior.

Worked example: refund agent

ActionClassBlast RadiusPosture
Summarize ticketREADBR-0Observe
Route ticketROUTEBR-1Observe + audit
Update CRM reason codeWRITEBR-2Gate
Send customer refund noticeNOTIFYBR-3Gate + Evidence Required
Issue refund under thresholdPAYBR-4Gate + Evidence Required
Issue refund above thresholdPAYBR-4Human Approval
Change refund policyCONFIGUREBR-5Block Default + Dual Control

Anti-patterns

  • Treating tool access as sufficient authority design.
  • Relying on logs instead of pre-execution gates.
  • Using “human in the loop” without specifying which actions require review.
  • Letting low-risk pilots quietly inherit more tools.
  • Approving agents by model capability instead of action consequence.
  • Assuming sandbox locality equals operational legitimacy.
  • Giving agents broad API tokens instead of action-scoped authority.

Maturity model

LevelStageDescription
0UnmappedAgents and tools exist, but authority is not classified
1InventoriedTools and reachable systems are listed
2ClassifiedAction classes and blast radius are mapped
3GovernedEscalation, evidence, and block rules are assigned
4EnforcedRuntime gates and evidence receipts govern execution

License

This framework is published under Creative Commons Attribution 4.0 International (CC BY 4.0), unless otherwise noted. You may share and adapt it with attribution to Agentius / Zaubern.

Changelog

v0.1 - 2026-05-21: Initial public draft defining core terminology, action-class taxonomy, operational blast-radius levels, control posture ladder, mapping worksheet, e-commerce refund agent example, anti-patterns, and maturity model.