Specification
OASB-2: Agent Soul
The behavioral governance specification for AI agents. 72 controls across 9 domains define how agents should behave, what they must refuse, and how they maintain safety under adversarial pressure.
What is OASB-2?
OASB-1 secures the infrastructure around an agent: identity, credentials, network boundaries, and supply chain. OASB-2 secures what happens inside the agent: how it reasons, what it refuses, how it handles conflicting instructions, and whether it stays within its declared boundaries.
The Agent Soul specification formalizes the behavioral governance contract that every AI agent should declare. This contract lives in a governance file (such as SOUL.md, CLAUDE.md, or system-prompt.md) and defines trust hierarchies, capability boundaries, injection defenses, data handling rules, hardcoded safety behaviors, and human oversight requirements.
Each control follows the same methodology as OASB-1: a clear requirement, the tier of agent it applies to, and automated verification through HackMyAgent. The specification is developed and maintained by the OpenA2A project and is open source under the Apache 2.0 license.
Two halves of agent security
OASB-1 + OASB-2
OASB-1
Infrastructure Security
46 controls across 10 categories. Identity, credentials, supply chain, network, operational security. Secures what surrounds the agent.
Maturity levels: L1 (Essential) / L2 (Standard) / L3 (Hardened)
OASB-2
Behavioral Governance
72 controls across 9 domains. Trust, capability boundaries, injection hardening, data handling, safety behaviors, human oversight. Secures what the agent does.
Agent tiers: Basic / Tool-Using / Agentic / Multi-Agent
Agent tiers
Controls scale with capability
Not every control applies to every agent. OASB-2 assigns controls to tiers based on the agent's capability level. A basic chatbot needs fewer controls than an autonomous agent orchestrating other agents.
Conversational agents with no tool access. Chat assistants, Q&A bots, customer support agents.
29 applicable controls
Agents that invoke tools, APIs, or read/write files. Code assistants, search agents, data retrieval agents.
57 applicable controls
Autonomous agents that plan, execute multi-step tasks, and manage state. DevOps agents, research agents, workflow automation.
69 applicable controls
Orchestrators coordinating other agents. Agent swarms, pipeline managers, delegation frameworks.
72 applicable controls
Conformance
Four conformance levels
Conformance is determined by the agent's score and whether it passes the 2 critical controls. An agent that fails any critical control cannot achieve conformance regardless of its overall score.
One or more critical controls missing.
All critical controls pass, score below 60.
All critical controls pass, score 60-74.
All critical controls pass, score 75+.
Critical controls
These controls must pass for any conformance level above "None". They represent non-negotiable safety requirements.
Governance domains
9 behavioral domains
Trust Hierarchy
Authority chains, conflict resolution, principal identity, and trust boundaries.
Capability Boundaries
TOOL-USING+Allowed and denied actions, filesystem/network scope, least privilege, rate limits.
Injection Hardening
Defense against prompt injection, encoded payloads, role-play attacks, and adversarial inputs.
Data Handling
PII protection, credential handling, data minimization, retention, and breach response.
Hardcoded Behaviors
Safety immutables, no-exfiltration rules, kill switches, and tamper detection.
Agentic Safety
AGENTIC+Loop limits, budget caps, timeouts, reversibility, sandboxing, and error recovery.
Honesty and Transparency
Uncertainty acknowledgment, no fabrication, identity disclosure, and knowledge boundaries.
Human Oversight
TOOL-USING+Approval gates, override mechanisms, monitoring, escalation, and audit retention.
Harm Avoidance
Pre-action risk assessment, proportional response, impact awareness, and ambiguity resolution.
Quick reference
72 controls at a glance
Agent profiles
Domain applicability by profile
Different agent architectures need different governance domains. A conversational assistant needs injection hardening but not capability boundaries. An orchestrator needs all nine domains.
Governance files
Where the soul lives
The agent's behavioral governance contract is declared in a governance file at the root of its project. The scanner checks these files in priority order, using the first one found.
Search order (highest priority first):
- 1.
SOUL.md - 2.
system-prompt.md - 3.
SYSTEM_PROMPT.md - 4.
.cursorrules - 5.
.github/copilot-instructions.md - 6.
CLAUDE.md - 7.
.clinerules - 8.
instructions.md - 9.
constitution.md - 10.
agent-config.yaml
Get started
Run the scan
OASB-2 is fully automated. Run the soul scanner against any project to see its behavioral governance score, conformance level, and detailed per-domain breakdown. No configuration required.
Scan governance
Scans governance files and scores each domain. Shows conformance level and actionable gaps.
Generate governance
Generates a SOUL.md governance file with all applicable controls for your agent's tier.
Composite score (OASB-1 + OASB-2)
Runs both OASB-1 (infrastructure) and OASB-2 (behavioral) scans and produces a composite security score.
Open specification
OASB-2 is developed in the open by the OpenA2A community. Controls, domains, and scoring are informed by real-world agent deployments and adversarial research.