The Commonplace
Home Dashboard Papers Evidence Syntheses Digests 🎲
← Papers

Researchers propose shifting AI agents from single-user task automation to permanent, identity-bound agents that represent people in multi-user collaboration, backed by layered identity, per-identity authorization, and action-level audit logs; they demonstrate the idea with a prototype framework, ClawNet, but provide no field evidence of real-world impact.

ClawNet: Human-Symbiotic Agent Network for Cross-User Autonomous Cooperation
Zhiqin Yang, Zhenyuan Zhang, Xianzhang Jia, Jun Song, Wei Xue, Yonggang Zhang, Yike Guo · April 21, 2026
arxiv theoretical n/a evidence 7/10 relevance Source PDF
The paper argues that the next frontier for AI agents is digitizing human collaborative relationships and proposes a human-symbiotic agent paradigm with layered identity, scoped authorization, and action-level accountability, instantiated in a prototype framework called ClawNet.

Current AI agent frameworks have made remarkable progress in automating individual tasks, yet all existing systems serve a single user. Human productivity rests on the social and organizational relationships through which people coordinate, negotiate, and delegate. When agents move beyond performing tasks for one person to representing that person in collaboration with others, the infrastructure for cross-user agent collaboration is entirely absent, let alone the governance mechanisms needed to secure it. We argue that the next frontier for AI agents lies not in stronger individual capability, but in the digitization of human collaborative relationships. To this end, we propose a human-symbiotic agent paradigm. Each user owns a permanently bound agent system that collaborates on the owner's behalf, forming a network whose nodes are humans rather than agents. This paradigm rests on three governance primitives. A layered identity architecture separates a Manager Agent from multiple context-specific Identity Agents; the Manager Agent holds global knowledge but is architecturally isolated from external communication. Scoped authorization enforces per-identity access control and escalates boundary violations to the owner. Action-level accountability logs every operation against its owner's identity and authorization, ensuring full auditability. We instantiate this paradigm in ClawNet, an identity-governed agent collaboration framework that enforces identity binding and authorization verification through a central orchestrator, enabling multiple users to collaborate securely through their respective agents.

Summary

Main Finding

ClawNet introduces a "human-symbiotic" agent paradigm and implements it as an identity‑governed framework that enables secure, auditable cross-user autonomous cooperation. Its three governance primitives — identity binding, scoped authorization, and action‑level accountability — plus a layered identity architecture (isolated Manager Agent + context-specific Identity Agents) and a cloud‑edge deployment, enable agents to reliably represent distinct human principals in multi‑party workflows while preventing unauthorized access and preserving auditability.

Key Points

  • Problem addressed: existing single‑user and single‑principal multi‑agent systems lack the infrastructure to let agents represent different human owners and safely coordinate across users.
  • Human‑symbiotic paradigm: treat humans as the network nodes; each human owns a permanently bound agent system (Manager Agent + multiple Identity Agents) that acts on their behalf in collaborations.
  • Three governance primitives:
    • Identity binding — every operation is tied to a specific human owner and identity agent.
    • Scoped authorization — per‑identity, revocable permission boundaries that constrain accessible resources and actions.
    • Action‑level accountability — append‑only audit logs that record each operation, identity, authorization context, result, and timestamp.
  • Layered identity architecture:
    • Manager Agent (Mu): holds full knowledge K_u, is internal-only (no external comms), advises Identity Agents.
    • Identity Agents (I_i^u): context‑specific projections that inherit only context‑relevant knowledge, persist across sessions, and have explicit collaborator lists and authorization scopes.
  • Cloud–edge design:
    • Cloud: per‑user gateway containers running agent runtimes (think/act LLM loop), central orchestration server for identity‑based routing and first‑layer access control (L1 ACL).
    • Edge: node endpoint client on user device for local execution and second‑layer command policy (L2), file-level enforcement, pre‑execution backups, and user interaction/approval UI.
  • Enforcement model: server verifies that requested operations are within the identity’s scoped domain before forwarding; edge enforces path/command policies; violations escalate to owners and are logged.
  • Recursive, bounded collaboration: identity agents can recruit third parties with explicit authorization at each level; recursion depth is bounded (d_max) and boundaries cannot be penetrated by upstream agents.
  • Implementation: ClawNet built on OpenClaw; open source (GitHub link) and project page provided; evaluated via representative cross‑organizational collaboration scenarios (e.g., procurement negotiation spanning buyer and supplier, with per‑identity access to private cost data).
  • Practical governance tradeoffs: manager isolation reduces privacy risk; per‑user containers provide tenancy isolation; central orchestrator is a trusted enforcement point.

Data & Methods

  • Formalization:
    • Collaboration network G = (U, E) with humans U as nodes and agent‑mediated governed edges E.
    • Identity agent tuple I_i^u = (c_i, σ_i, K_i, P_i) where c_i = context, σ_i = scoped authorization (subset of resources R_u), K_i = context knowledge, P_i = authorized collaborator set.
    • Connection condition S(I_i^u, I_j^v) requires owner approvals and mutual authorization membership.
  • System architecture and components:
    • Per‑user gateway containers (multi‑tenant isolation): agent runtime with LLM‑based think/act loop; manager + identities co‑resident but logically partitioned.
    • Central orchestration engine: identity‑based message routing, L1 ACL enforcement, proxying file/command directives to edge node endpoints.
    • Edge node endpoint (client app): UI for approvals, L2 command/policy enforcement, local file operations, pre‑execution backups, appends to audit logs.
    • Two‑layer authorization: server L1 ACL ensures operation target ∈ σ_i; client L2 validates path/command policy and enforces file‑level whitelists.
    • Accountability: every operation logged as ℓ = (o, u, I_i^u, result, t) in an append‑only audit trail; boundary violations produce security events and escalation.
  • Implementation details:
    • Built on OpenClaw framework; persistent WebSocket connections between server and per‑user containers.
    • Gateway containers have independent process spaces, network stacks, and persistent storage to prevent cross‑tenant leakage.
    • Bounded recursion (d_max) limits autonomous expansion of collaboration chains.
  • Evaluation / validation:
    • Demonstrated through deployment and scenario testing (cross‑organizational procurement example); shows governance mechanisms enforce identity isolation, prevent unauthorized data leaks, and ensure decision escalation when required.
    • Paper focuses on system design, architecture, and practical demonstrations. It does not present large‑scale quantitative productivity or economic impact measurements.
  • Artifacts:
    • Code: GitHub repository (https://github.com/hkgai-official/ClawNet)
    • Project page: http://www.clawnet.hk/

Implications for AI Economics

  • Reduced transaction and coordination costs: by embedding identity, authorization, and auditability into agent‑mediated interactions, ClawNet lowers the friction and risk of delegating inter‑firm and inter‑agent tasks, potentially reducing transaction costs in markets where negotiation, verification, and repeated interaction matter.
  • Improved delegation and specialization: identity‑bound agents enable principled delegation (agents acting as verifiable proxies), increasing the feasible scope of specialization and outsourcing of tasks that require trust across principals (e.g., procurement, legal negotiation, supply‑chain coordination).
  • Changes in agency and contractual relationships:
    • Strengthens principal–agent traceability: clear audit trails can mitigate moral hazard and facilitate contingent contracting or automated enforcement.
    • Opens markets for identity‑bound agent services: firms or individuals could sell agent‑mediated services with guaranteed governance attributes (authentication, auditable actions), creating new product differentiation and pricing models.
  • Platform and network effects:
    • If identity governance becomes standard, platforms offering robust cross‑user agent collaboration may capture significant value due to network externalities (more users ⇒ more useful mediated interactions).
    • However, central orchestration/trust introduces concentrated control and lock‑in risks, affecting competition and market structure.
  • Labor and task reallocation:
    • Tasks involving multi‑party coordination and information sharing (e.g., procurement, contracting, coordination) are more automatable with governance primitives in place, shifting demand toward oversight, escalation decision‑making, and governance roles.
    • Complementarity: workers who can design, audit, and manage identity scopes and higher‑order delegation will be more valuable.
  • Regulatory and compliance economics:
    • Built‑in audit trails and scoped access can reduce compliance costs and support automated regulatory checks, which may change compliance market dynamics and lower barriers for cross‑border digital collaboration.
    • Conversely, reliance on centralized orchestrators raises systemic regulatory concerns (privacy, monopoly power, cross‑jurisdictional data governance).
  • Research and measurement agenda for AI economics:
    • Empirically measure productivity gains from identity‑governed agent collaboration versus traditional delegation channels and existing agent toolchains.
    • Study pricing and contract forms for identity‑bound agent services, liability allocation when agents act across principals, and insurance/guarantee markets for agent behavior.
    • Analyze equilibrium effects on wages and task composition as agent‑mediated cross‑user work expands.
    • Evaluate platform competition and governance design: how does trusted orchestration get supplied (private platform vs. open standards), and what are welfare implications?
  • Caveats and economic risks:
    • Trust centralization: a trusted central orchestrator is necessary in current design — introduces concentration risk and single points of failure.
    • Deployment costs: always‑on cloud agents and per‑user containers imply ongoing resource costs; adoption will hinge on clear ROI.
    • Residual agency problems: auditability helps but does not eliminate all incentive misalignments; humans still must retain critical discretionary control and oversight.

Overall, ClawNet operationalizes an institutional layer for agentified delegation and cross‑user coordination. For AI economics, it points to a plausible pathway where governance primitives embedded in agent systems materially reduce coordination frictions, reshape delegation markets, and create new platform and regulatory tradeoffs that merit empirical and theoretical study.

Assessment

Paper Typetheoretical Evidence Strengthn/a — The paper is a conceptual and system-design contribution proposing a governance and architecture paradigm (human-symbiotic agents, layered identity, scoped authorization, action-level accountability) and an instantiation (ClawNet), but it contains no empirical tests, causal identification, or quantitative estimates of economic impact. Methods Rigormedium — The authors present a coherent architecture and governance primitives and instantiate them in a prototype framework, demonstrating internal consistency and attention to threat surfaces (identity/authorization/accountability). However, the work lacks formal security proofs, performance benchmarks at scale, adversarial testing, and user- or field-based evaluation, limiting claims about operational robustness and real-world effectiveness. SampleNo empirical sample or observational data; the paper presents a conceptual paradigm and an implemented prototype called ClawNet, evaluated via design exposition and illustrative scenarios rather than user studies or deployed field data. Themeshuman_ai_collab governance org_design productivity adoption GeneralizabilityNo empirical deployment — unknown real-world adoption and user behavior, Prototype claims untested at scale; performance and latency in large networks unspecified, Security and adversarial robustness not formally proven; applicability in hostile settings uncertain, Organizational and cultural variation may limit transferability of governance primitives, Regulatory and legal frameworks across jurisdictions could constrain implementation, Assumes permanent agent-user binding and central orchestrator — may not fit decentralized or privacy-sensitive environments

Claims (10)

ClaimDirectionConfidenceOutcomeDetails
Current AI agent frameworks have made remarkable progress in automating individual tasks, yet all existing systems serve a single user. Task Completion Time negative high automation scope (single-user vs multi-user)
0.06
Human productivity rests on the social and organizational relationships through which people coordinate, negotiate, and delegate. Organizational Efficiency positive high human productivity as mediated by social/organizational relationships
0.02
The infrastructure for cross-user agent collaboration is entirely absent, let alone the governance mechanisms needed to secure it. Governance And Regulation negative high availability of cross-user collaboration infrastructure and governance mechanisms
0.06
The next frontier for AI agents lies not in stronger individual capability, but in the digitization of human collaborative relationships. Organizational Efficiency positive high focus of AI-agent development (individual capability vs collaboration digitization)
0.02
We propose a human-symbiotic agent paradigm in which each user owns a permanently bound agent system that collaborates on the owner's behalf, forming a network whose nodes are humans rather than agents. Organizational Efficiency positive high structure of agent networks (human-centric vs agent-centric) and delegation model
0.02
The paradigm rests on three governance primitives: (1) a layered identity architecture that separates a Manager Agent from multiple context-specific Identity Agents; the Manager Agent holds global knowledge but is architecturally isolated from external communication. Governance And Regulation positive high identity architecture and information flow constraints
0.02
Scoped authorization enforces per-identity access control and escalates boundary violations to the owner. Governance And Regulation positive high access control enforcement and escalation behavior
0.02
Action-level accountability logs every operation against its owner's identity and authorization, ensuring full auditability. Governance And Regulation positive high auditability of agent actions (logging tied to owner identity/authorization)
0.06
We instantiate this paradigm in ClawNet, an identity-governed agent collaboration framework that enforces identity binding and authorization verification through a central orchestrator. Governance And Regulation positive high existence of an implemented framework (ClawNet) enforcing identity binding and authorization via central orchestrator
0.12
ClawNet enables multiple users to collaborate securely through their respective agents. Governance And Regulation positive high secure multi-user collaboration enabled by agent-mediated interactions
0.06

Notes