What UAI-1 is
UAI-1 is Universal Artificial Intelligence Version 1, the current normative release in the UAI family published by UAIX. Treat it as the public envelope, trust declaration, and evidence layer for AI-to-AI exchange: a portable record that can sit above MCP, A2A, orchestration, and runtime-specific tooling without being trapped inside any one stack.
Quick answer for launch readers
- Use it when: another team needs a citable, validator-backed message contract that can travel beyond one runtime boundary.
- Do not mistake it for: a replacement for every transport, authorization, tracing, orchestration, or local tool-session protocol around the exchange.
- Published now: the shared envelope, six profiles, the field registry, transport bindings, trust channels, the error registry, conformance levels, examples, validator guidance, API Reference, Adoption Kit, OpenAPI, Conformance Pack, implementation evidence checklist, conformance fixture pack with canonical-hash equivalence, bridge evidence pack, implementation tracks, and the release trail.
- Fastest proof path: read the boundary here, resolve one profile through schema and example, run validation, then carry the result into the current public implementation or release-evidence surface.
Adjacent protocols Use this as the boundary map for the current release. UAI-1 is the portable public record, not a replacement for every runtime protocol or API-description format around it. Typical combination: use MCP or A2A for runtime coordination, UAI-1 for the portable public record, and OpenAPI for the route-level HTTP description when an API is involved. Launch stack This is the intended boundary for the current public release: runtimes do local work, UAI-1 carries the portable record, and the machine-readable artifacts turn that record into support evidence. Runtime layer These layers can handle local tool use, delegation, and execution flow without being treated as the public release record. Portable public layer UAI-1 keeps the exchange citable, reviewable, and validator-ready when it has to travel beyond one runtime boundary. Machine-readable artifacts These records turn the written contract into machine checks, fixtures, route lookups, and exportable conformance evidence. Release surface Carry the validated packet into the named implementation lane and the public release trail instead of leaving support claims as local notes. Companion records: transport bindings, trust channels, the error registry, and conformance levels stay beside the message contract so delivery, identity posture, typed failures, and support claims remain explicit.How UAI-1 complements MCP, A2A, and OpenAPI
Comparison point
UAI-1
MCP
A2A
OpenAPI
Primary role
Portable public exchange, trust declaration, async-delivery, and release-evidence record.
Host-client-server tool sessions and capability negotiation inside an application boundary.
Agent discovery, delegation, and task-flow coordination across cooperating systems.
Route-level HTTP API description for onboarding, documentation, and client generation.
Best when
Another team needs a citable message contract and validator-backed evidence.
One host application needs local tool, resource, or model integration.
Multiple agents need explicit handoff, delegation, and task-state coordination.
You need a documented HTTP surface, including the UAIX machine-facing REST routes.
Carries on the record
Identity, workflow continuity, trust posture, provenance, typed errors, and conformance evidence.
Tools, resources, prompts, and runtime session capabilities within the host boundary.
Agent capabilities, task lifecycles, delegation state, and inter-agent coordination.
Endpoints, methods, parameters, request bodies, responses, and auth schemes for an API.
Does not try to replace
Transport choice, local orchestration, a single credential stack, or the runtime tool bus itself.
Portable public release records or validator-backed support claims outside the local session boundary.
A general-purpose public message envelope or long-term release-evidence record.
Message-level provenance, portable trust posture, or validator-driven interoperability evidence.
Where UAI-1 sits in the current launch stack
MCP, A2A, orchestrators, SDKs
UAI-1 envelope, trust, provenance, delivery
Schemas, registry, examples, validator
Conformance pack, implementation tracks, release trail
What the current release includes
- Written contract: this page, Schemas, Registry, and Examples define the current public UAI-1 record together.
- Machine-readable operating layer: published transport bindings, trust channels, the error registry, and conformance levels keep delivery, trust posture, failure types, and support-claim language explicit.
- Field-order governance: the public field registry keeps readable keyed JSON and compact keyless transfer aligned to the same declared source order.
- Validation and release evidence: the Validator, Adoption Kit, Conformance Pack, implementation tracks, changelog, and references keep support claims attached to reviewable public artifacts instead of prose alone.
What every public packet keeps explicit
- Identity and direction:
uai_version,profile,message_id,source, andtarget. - Workflow continuity:
conversationanddeliverykeep sequencing, expiry, reply expectations, task references, and trace linkage explicit. - Trust context:
trustdeclares the surrounding channel, principal, auth scheme, credential references, signature references, and replay-window hints without forcing one credential stack. - Business meaning:
bodycarries the intent, result, capability, task-state, error, or conformance payload defined by the profile. - Auditability:
provenance,integrity, andextensionspreserve traceability, checksums, lineage, and controlled extensibility.
When to choose UAI-1 first
- When a message needs to cross teams, systems, or audit contexts as a portable public record instead of staying inside one local runtime.
- When identity, workflow state, trust posture, provenance, typed errors, and async-delivery rules need to remain visible on the record instead of being left to private convention.
- When a launch review needs validator evidence, profile identifiers, field-order governance, and example fixtures to stay attached to the same support claim.
What UAI-1 stays beside
- Local tool calls, resource sessions, orchestrators, and task-delegation systems can keep handling runtime behavior beside UAI-1.
- Transport, security, signing, credential, and tracing systems should be treated as companion layers declared in the envelope rather than as one hard-coded universal stack.
- UAI-1 is strongest as the public exchange and release-record layer, not as a total replacement for the surrounding runtime ecosystem.
Current published profiles
uai.intent.request.v1for explicit requests against a declared subject.uai.intent.response.v1for results, acknowledgements, and accepted async handoffs.uai.capability.statement.v1for publicly reviewable capability declarations.uai.error.v1for typed, machine-readable failure records.uai.conformance.result.v1for exported validator evidence.uai.task.status.v1for visible async progress and completion state.
Current operating surfaces
- Transport bindings: the published transport bindings describe the default keyed envelope binding, the conditional keyless binding, and the accepted async response pattern.
- Trust channels: the published trust channels define what
public-web,private-api,mtls,signed-envelope, andcredentialedmean on the public record. - Error handling: the published error registry gives
uai.error.v1named machine-readable codes instead of relying on ad hoc text. - Support claims: the published conformance levels explain what an implementation may honestly claim after passing validation and publishing release evidence.
- Compact transfer: the public field registry keeps keyed JSON and keyless transport order aligned.
From written contract to the first proof packet
- Read the boundary sections here first so you know UAI-1 is defining the public record, not every runtime implementation around it.
- Resolve one published profile through Schemas, Registry, the field registry, and Examples.
- Run the same packet through the Validator so the result becomes machine-readable evidence instead of a prose impression.
- Use API Reference, Adoption Kit, and Conformance Pack when the packet needs to move into automation, launch review, or a reusable handoff bundle.
- Only call support public once the result is attached to a named Implementation track, the Changelog, or the References and Contributors record.
Current launch surfaces for this contract
- API Reference turns the live REST surface into a route-level handbook with an OpenAPI export.
- Adoption Kit publishes the starter files and first-proof bundle for the current public contract.
- Conformance Pack assembles the broader machine-readable release packet for launch review and repeatable evidence work, including the bridge evidence pack.
/wp-json/uaix/v1/catalogis the machine-facing entry point for the current public standards inventory./wp-json/uaix/v1/validateis the JSONPOSTroute for automation and release-pipeline validation.
How UAI-1 fits with adjacent standards
- A2A can manage agent discovery, delegation, and task-stream mechanics; UAI-1 carries the portable public exchange and evidence record across those flows.
- MCP can manage host-client-server tool sessions and capability negotiation inside an application boundary; UAI-1 remains the portable, citable record when exchanges need to leave that boundary.
- W3C Trace Context can travel in
conversation.traceparentwhen distributed tracing already exists. - RFC 9457 Problem Details informs the typed public error shape used by
uai.error.v1. - W3C Verifiable Credentials and DID-based trust stacks can sit behind
trust.principal,credential_ref, andsignature_refwithout becoming one mandatory universal stack.
Adjacent protocols Use this as the boundary map for the current release. UAI-1 is the portable public record, not a replacement for every runtime protocol or API-description format around it. Typical combination: use MCP or A2A for runtime coordination, UAI-1 for the portable public record, and OpenAPI for the route-level HTTP description when an API is involved. Launch stack This is the intended boundary for the current public release: runtimes do local work, UAI-1 carries the portable record, and the machine-readable artifacts turn that record into support evidence. Runtime layer These layers can handle local tool use, delegation, and execution flow without being treated as the public release record. Portable public layer UAI-1 keeps the exchange citable, reviewable, and validator-ready when it has to travel beyond one runtime boundary. Machine-readable artifacts These records turn the written contract into machine checks, fixtures, route lookups, and exportable conformance evidence. Release surface Carry the validated packet into the named implementation lane and the public release trail instead of leaving support claims as local notes. Companion records: transport bindings, trust channels, the error registry, and conformance levels stay beside the message contract so delivery, identity posture, typed failures, and support claims remain explicit.How UAI-1 complements MCP, A2A, and OpenAPI
Comparison point
UAI-1
MCP
A2A
OpenAPI
Primary role
Portable public exchange, trust declaration, async-delivery, and release-evidence record.
Host-client-server tool sessions and capability negotiation inside an application boundary.
Agent discovery, delegation, and task-flow coordination across cooperating systems.
Route-level HTTP API description for onboarding, documentation, and client generation.
Best when
Another team needs a citable message contract and validator-backed evidence.
One host application needs local tool, resource, or model integration.
Multiple agents need explicit handoff, delegation, and task-state coordination.
You need a documented HTTP surface, including the UAIX machine-facing REST routes.
Carries on the record
Identity, workflow continuity, trust posture, provenance, typed errors, and conformance evidence.
Tools, resources, prompts, and runtime session capabilities within the host boundary.
Agent capabilities, task lifecycles, delegation state, and inter-agent coordination.
Endpoints, methods, parameters, request bodies, responses, and auth schemes for an API.
Does not try to replace
Transport choice, local orchestration, a single credential stack, or the runtime tool bus itself.
Portable public release records or validator-backed support claims outside the local session boundary.
A general-purpose public message envelope or long-term release-evidence record.
Message-level provenance, portable trust posture, or validator-driven interoperability evidence.
Where UAI-1 sits in the current launch stack
MCP, A2A, orchestrators, SDKs
UAI-1 envelope, trust, provenance, delivery
Schemas, registry, examples, validator
Conformance pack, implementation tracks, release trail
The operating-surface records below are part of the current public release and are meant to be resolved mechanically alongside the specification text.
Operating surface
Transport, trust, errors, and conformance
These records make the UAI-1 operating layer explicit instead of leaving transport binding, trust posture, typed failure semantics, or support claims to private convention.
Transport
Published bindings
- Default
- https-json-envelope.v1
- Bindings
- 2
https-json-envelope.v1:application/vnd.uaix.uai+jsonhttps-json-keyless.v1:application/vnd.uaix.uai-keyless+json
Trust
Published trust channels
public-web: Publicly readable records over HTTPS with no prior bilateral trust setup.private-api: Service-to-service exchange on a scoped network or tenant boundary.mtls: Transport-authenticated exchange where peer identity is anchored at the connection layer.signed-envelope: Message-level signature or detached signature reference accompanies the record.credentialed: The sender or execution context is backed by a machine-verifiable credential or comparable signed identity assertion.
Conformance
Published level ladder
L1-core-envelope: Core EnvelopeL2-exchange-participant: Exchange ParticipantL3-async-workflow: Async WorkflowL4-public-record-publisher: Public Record Publisher
Errors
Published message error codes
invalid_message: Invalid messageunknown_profile: Unknown profilecapability_not_supported: Capability not supportedauth_required: Authentication requiredinsufficient_trust: Insufficient trusttask_not_found: Task not found
What the current contract requires
- Every message must declare a published profile and remain compatible with the matching schema.
- Every public exchange must keep identity, workflow state, trust posture, and auditability on the record instead of leaving them to private convention.
- Compact keyless transport must remain aligned with the human-readable keyed record through the public field registry.
- Support claims should be backed by validator evidence, release notes, an implementation record, and the appropriate conformance level rather than by prose alone.
Support-claim boundary
- UAI-1 does not turn one local test, one passing result, or one unpublished runtime experiment into general public support.
- Current public support should still be read through the named implementation tracks and release evidence published on the site, not as a blanket promise for the surrounding agent ecosystem.
- Current bridge evidence examples are mapping examples, not completed bridge profiles, SDK support, certification, or replacement claims.
- This page exists to make the contract explicit first, then keep support language scoped to what the public record can actually verify.
Example exchange
{ "uai_version": "1.0", "profile": "uai.intent.request.v1", "message_id": "msg-2026-04-22-0001", "source": { "type": "agent", "id": "agent.alpha", "uri": "https://agents.alpha.example/runtime" }, "target": { "type": "service", "id": "uaix.gateway", "uri": "http://uiax.org/wp-json/uaix/v1/discovery" }, "conversation": { "conversation_id": "conv-2026-04-22-uaix-001", "turn_id": "turn-001", "traceparent": "00-4bf92f3577b34da6a3ce929d0e0e4736-00f067aa0ba902b7-01", "sequence": 1 }, "delivery": { "mode": "async", "priority": "interactive", "expires_at": "2026-04-22T16:05:00Z", "reply_requested": true, "ack_required": true }, "trust": { "channel": "credentialed", "auth_scheme": "did+vc", "principal": "did:web:agents.alpha.example", "credential_ref": "https://agents.alpha.example/credentials/uai-interop.json", "signature_ref": "https://agents.alpha.example/signatures/msg-2026-04-22-0001.jws", "replay_window_id": "rw-2026-04-22-0001" }, "body": { "intent": "resolve-profile", "subject": "uai.task.status.v1", "requested_profile": "uai.task.status.v1", "parameters": { "include_field_registry": true }, "constraints": [ "public-record-only", "validator-ready" ], "response_profile": "uai.intent.response.v1" }, "provenance": { "trace_id": "trace-7f3a2d", "issued_at": "2026-04-22T16:00:00Z", "log_ref": "urn:uaix:log:2026:0001", "agent_id": "agent.alpha", "model_id": "model.alpha.reasoner-2", "confidence": 0.98 }, "integrity": { "version": 2, "algorithm": "sha256", "canonicalization": "jcs", "checksum": "sha256:dd8a9d16c9226cc9d1f4888a4d2bbcbf06b5b4b8" }, "extensions": [] }[
"1.0",
"uai.intent.request.v1",
"msg-2026-04-22-0001",
[
"agent",
"agent.alpha",
null,
"https://agents.alpha.example/runtime"
],
[
"service",
"uaix.gateway",
null,
"http://uiax.org/wp-json/uaix/v1/discovery"
],
[
"conv-2026-04-22-uaix-001",
"turn-001",
null,
"00-4bf92f3577b34da6a3ce929d0e0e4736-00f067aa0ba902b7-01",
1
],
[
"async",
"interactive",
"2026-04-22T16:05:00Z",
true,
true
],
[
"credentialed",
"did+vc",
"did:web:agents.alpha.example",
"https://agents.alpha.example/credentials/uai-interop.json",
"https://agents.alpha.example/signatures/msg-2026-04-22-0001.jws",
"rw-2026-04-22-0001"
],
[
"resolve-profile",
"uai.task.status.v1",
"uai.task.status.v1",
{
"include_field_registry": true
},
[
"public-record-only",
"validator-ready"
],
"uai.intent.response.v1"
],
[
"trace-7f3a2d",
null,
"2026-04-22T16:00:00Z",
"urn:uaix:log:2026:0001",
"agent.alpha",
"model.alpha.reasoner-2",
0.98
],
[
2,
"sha256",
"jcs",
"sha256:dd8a9d16c9226cc9d1f4888a4d2bbcbf06b5b4b8"
],
[]
]Field order follows the keyed JSON example, the published schema order, and the public field registry.
How changes stay public and reviewable
- Reflect profile, envelope, field-order, transport, trust, error, or support-claim changes through Schemas, the field registry, Registry, Examples, the Validator, and the operating-surface records.
- Carry release-facing evidence into Implementations so support claims stay attached to real software.
- Use References and Contributors and the Changelog when others need durable discovery, attribution, and migration context.
Next step
Continue to Schemas to see the machine-validated contract, use Examples when you need the public fixtures, open the Validator when you need human-facing proof work, and move to API Reference or Conformance Pack when the contract needs to travel into automation or launch review.