KYE Discoverability Profile™ · v1.0
Make delegated agency findable.
It's not enough that KYE™ records authority. KYE™ must let authorised users, systems, auditors, regulators and runtime engines find the relevant authority chains, capabilities, entities, evidence packs, connectors and decisions. Discoverability is not public search — every query is purpose-bound, policy-filtered, audited, and masked.
1 · Six discovery types
Find what exists, not what is sensitive.
personEntityFind humans, organisations, agents, services, wallets, devices, models, tools, workflows.
verified_userAuthorityFind grants, scopes, delegated chains, approval rules; expiring, stale, over-broad.
extensionCapabilityFind tools, skills, APIs, workflows, prompts, models, MCP servers; by side-effect.
verifiedEvidenceFind audit events, Decision Maps™, evidence packs, replay records.
warningRiskFind high-risk chains, stale grants, compromised dependencies, blast radius.
grid_viewEcosystemFind profiles, connectors, apps, plugins, certified implementations.
2 · Six modes, in increasing breadth
Every mode is policy-filtered.
- private_tenant — one customer's KYE™ graph (“all active agents in my tenant”)
- workspace — one team / department / environment (“production payment capabilities owned by Finance”)
- cross_workspace — enterprise security / admin scope (“all high-risk agents across business units”)
- federated — trusted partner organisations (“does this TPP / agent have a valid public authority assertion?”)
- public_registry — public profiles / connectors / apps / badges (“all KYE Payment Profile™ conformant connectors”)
- certification_registry — verified implementations (“vendors with active KYE Authority Conformant™ status”)
3 · Schemas (Apache 2.0, public mirror)
Seven normative objects. Validated in CI.
discoverability-profile.json— profile manifestdirectory-entry.json— canonical discoverable recorddiscovery-query.json— policy-bound querydiscovery-result.json— masked, audited resultdiscovery-policy.json— role + purpose bindingauthority-path-discovery.json— principal → actor traversaldiscovery-audit-event.json— hash-chained record per query
Reproduce: git clone https://github.com/KYE-Protocol/schemas && cd schemas && npm ci && npm test
4 · Apps that compose this profile
Five planned apps.
menu_bookKYE Authority Directory™Searchable directory of entities, agents, capabilities, grants and profiles.
searchKYE Discovery Console™Enterprise search and investigation over the authority graph.
account_treeKYE Authority Path Finder™Principal → delegation → actor → capability traces.
verifiedKYE Evidence Finder™Search and verify evidence packs, decisions and audit events.
grid_viewKYE Connector Discovery Hub™Find profiles, connectors, apps, plugins, certified implementations.
5 · Open / paid boundary
The contracts are open. The discovery engine is paid.
Open under Apache 2.0
- All v1 schemas above
- Reason-code dictionaries
- Event / webhook schemas
- Sample fixtures + examples
- Conformance test vectors
- Validator SDK
- Sample local directory implementation
Proprietary (commercial licence)
- KYE Discovery Console™ (managed)
- Policy-filtered graph search engine
- Semantic authority search
- Risk-ranked discovery
- Over-permissioning detection engine
- Stale-authority detection heuristics
- Cross-tenant masking engine
- KYE Connector Discovery Hub™