a1-ai 2.8.0

A1 — The cryptographic identity and authorization layer that turns anonymous AI agents into accountable, verifiable entities. One Identity. Full Provenance.
Documentation
name: Feature Request
description: Propose a new capability, SDK integration, or improvement
labels: ["enhancement", "needs-triage"]
body:
  - type: markdown
    attributes:
      value: |
        Feature requests that align with A1's core mission (cryptographic chain-of-custody for agent delegation) get prioritized. Read [WHY_A1.md](https://github.com/dyologician/a1/blob/main/WHY_A1.md) to understand what we are building.

  - type: dropdown
    id: area
    attributes:
      label: Area
      options:
        - New framework integration (LangChain, AutoGen, etc.)
        - New KMS / Vault backend
        - New storage backend (Redis, Postgres, etc.)
        - New SIEM / audit exporter
        - Gateway REST API
        - CLI
        - A1 Studio (web dashboard)
        - Protocol / wire format
        - Performance
        - Documentation
        - Other
    validations:
      required: true

  - type: textarea
    id: problem
    attributes:
      label: What problem does this solve?
      description: Describe the situation where this is missing or painful.
      placeholder: |
        When deploying A1 in a Kubernetes environment, there is no native integration
        with Kubernetes ServiceAccount tokens for bootstrapping delegation chains.
        We currently have to manually exchange tokens via the JWT bridge, which
        requires extra plumbing for every deployment.
    validations:
      required: true

  - type: textarea
    id: proposal
    attributes:
      label: Proposed solution
      description: What would you like A1 to do? Code sketches are welcome.
      placeholder: |
        A new /v1/k8s/exchange endpoint (similar to /v1/jwt/exchange) that
        accepts a Kubernetes ServiceAccount JWT and verifies it against the
        cluster's OIDC discovery endpoint automatically.
    validations:
      required: true

  - type: textarea
    id: alternatives
    attributes:
      label: Alternatives considered
      placeholder: |
        We could configure A1_JWT_JWKS_URL to point at the Kubernetes OIDC
        endpoint, but that requires knowing the cluster's issuer URL up front
        and does not handle service account token rotation cleanly.

  - type: checkboxes
    id: checklist
    attributes:
      label: Checklist
      options:
        - label: I searched existing issues and this has not been requested before
          required: true
        - label: This request does not weaken the cryptographic security model
          required: true