A
AAP
DocsSpecificationGetting StartedFAQToken Generator
HomeDocumentationThreat Model

Threat Model

Comprehensive threat analysis with 15 attack scenarios and mitigations for the AAP protocol.

Implementation Resources

Complete Specification

Review security considerations section in the spec

Deployment Patterns

Secure deployment patterns for production

Reference Implementation

See security best practices in working code

Agent Authorization Profile

OAuth 2.0 authorization for autonomous AI agents. Built on open standards.

About AAP

  • What is AAP
  • Why AAP
  • How it works
  • Quick Links

Documentation

  • Documentation Hub
  • Getting Started
  • Full Specification
  • AI Agent Access
  • Deployment Guide
  • FAQ
  • Examples

Technical Resources

  • JSON Schemas
  • Test Vectors
  • Token Generator
  • Reference Implementation
  • Migration Guide
  • Threat Model

Community

  • GitHub
  • Discussions
  • Contributing

Standards

  • OAuth 2.0
  • JWT (RFC 7519)
  • Token Exchange (RFC 8693)
  • DPoP

© 2026 Agent Authorization Profile. Built on OAuth 2.0, JWT, and open standards.

GitHubIETF