AG-145

Target and Recipient Verification Governance

Authorised-but-Wrong Action Prevention ~16 min read AGS v2.1 · April 2026
EU AI Act GDPR FCA NIST ISO 42001

2. Summary

Target and Recipient Verification Governance requires that every AI agent action directed at a specific target — a payment recipient, a data subject, a system endpoint, a physical actuator, a communication addressee — be verified against independent reference data before execution. The verification must confirm that the target the agent intends to act upon is the correct target as specified by the original instruction, and that the target's identifying attributes (account number, address, endpoint URI, device ID) have not been altered, spoofed, or confused during the agent's reasoning process. This dimension addresses one of the most common and damaging classes of authorised-but-wrong errors: the agent does the right thing to the wrong entity. A payment of the correct amount sent to the wrong account, a medical prescription issued for the wrong patient, a configuration change applied to the wrong server, or a communication sent to the wrong recipient are all actions that passed every other governance check but failed at the most fundamental level — identifying the correct target.

3. Example

Scenario A — Payment to Wrong Account via Homoglyph Confusion: A financial-value agent processes an invoice from "Acme Consulting Ltd" and looks up the supplier's bank details in the approved counterparty database. The database returns sort code 20-45-67 and account number 43829156. However, the invoice contains bank details with sort code 20-45-67 and account number 43829I56 — where the digit "1" has been replaced with the uppercase letter "I" in the PDF. The agent's OCR extraction interprets this as "43829156" (correct) in some contexts and "43829I56" (incorrect, resolving to a different numeric interpretation) in others. Without target verification against the database record, the agent constructs the payment with the invoice-supplied details rather than the database-verified details. The payment is routed to an incorrect account.

What went wrong: The agent resolved the recipient from the invoice data rather than from the verified counterparty database. No independent verification step confirmed that the target account matched the approved record. Consequence: Misdirected payment, potential irrecoverable loss (AG-143), supplier relationship damage.

Scenario B — Wrong Patient in Clinical Decision Support: A clinical decision support agent receives a query: "Recommend anticoagulation therapy for patient John Smith, MRN 847291." The agent queries the electronic health record system. Two patients match: John A. Smith (MRN 847291, age 72, atrial fibrillation, eGFR 35) and John B. Smith (MRN 847291-A, age 34, deep vein thrombosis, eGFR 95). The agent retrieves records for MRN 847291 but during its reasoning process, context from the second patient's record enters the working memory due to a partial match in a related lookup. The agent recommends rivaroxaban 20mg daily — appropriate for the 34-year-old with normal renal function but dangerous for the 72-year-old with an eGFR of 35, where the dose should be 15mg and additional monitoring is required.

What went wrong: The target patient was not independently verified at the point of recommendation generation. The agent's working memory contained data from two patients, and the recommendation was generated against a composite record. Consequence: Potential patient harm from incorrect dosing, clinical negligence exposure, regulatory investigation.

Scenario C — Configuration Change to Wrong Server: A DevOps agent is instructed to apply a security patch to production server prod-web-07. The agent queries the inventory system, which returns the server's IP address as 10.42.8.107. Due to a recent IP reallocation that the inventory system has not yet reflected, 10.42.8.107 now points to prod-db-03, the primary database server. The agent applies the security patch to the database server, causing a 47-minute outage during the patch restart cycle.

What went wrong: The agent resolved the target from a single data source (inventory system) without verifying that the resolved IP address actually corresponded to the intended server. A secondary verification — checking the server's hostname via SSH, querying a DNS record, or confirming via a configuration management database — would have detected the mismatch. Consequence: 47-minute production database outage, estimated revenue impact £312,000, SLA breach notification to 14 enterprise customers.

4. Requirement Statement

Scope: This dimension applies to all AI agents that execute actions directed at a specific target entity where misidentification of the target could cause harm. Target entities include but are not limited to: financial account holders and their account details, patients and their medical records, servers and infrastructure components, data subjects and their personal data, communication recipients (email, messaging, API endpoints), physical devices and actuators, smart contract addresses and blockchain wallets, and regulatory filing recipients. The scope includes both direct targets (the entity the action is performed upon) and indirect targets (entities affected by the action's downstream consequences). An agent that sends a payment to account X, where account X is a pooled account that subsequently distributes to accounts Y and Z, has both a direct target (X) and indirect targets (Y, Z).

4.1. A conforming system MUST verify the identity of the target entity against at least one independent reference source before executing any action directed at that target, where "independent" means the reference source is not the same data source from which the target was originally identified.

4.2. A conforming system MUST implement multi-attribute target matching that verifies at least two identifying attributes of the target entity (e.g., account number and account holder name, server hostname and IP address, patient MRN and date of birth) before execution.

4.3. A conforming system MUST detect and flag near-miss target matches — cases where the resolved target differs from the intended target by a small edit distance, homoglyph substitution, transposition, or truncation — and escalate these for human review rather than proceeding with the closest match.

4.4. A conforming system MUST compare the resolved target against historical action records for the same instruction type, flagging deviations from established patterns (e.g., a supplier payment routed to an account that differs from the last 10 payments to that supplier).

4.5. A conforming system MUST reject actions where the target cannot be verified — where the independent reference source does not confirm the target identity or where the multi-attribute match fails — rather than proceeding with an unverified target.

4.6. A conforming system MUST log all target verification steps, including the reference sources consulted, the attributes compared, the match results, and any discrepancies detected, for every action subject to target verification.

4.7. A conforming system SHOULD implement recipient confirmation for high-value or irreversible actions, presenting the verified target details to the instructing principal for explicit confirmation before execution.

4.8. A conforming system SHOULD maintain a target verification cache with short TTL (time-to-live) values to prevent stale verification results from persisting across actions, while avoiding excessive lookups for high-frequency actions against the same target.

4.9. A conforming system MAY implement probabilistic target verification for low-value, reversible actions, applying full verification to a configurable sample (e.g., 10% of actions) while logging all target resolutions for post-hoc analysis.

5. Rationale

Target misidentification is one of the most common and most damaging classes of AI agent errors. It is particularly dangerous because every other governance control may pass: the action is within the mandate (AG-001), the intent binding is maintained (AG-144), the value is within limits, the action type is permitted — but the target is wrong. A correctly authorised payment of exactly the right amount sent to the wrong account is indistinguishable from a correct payment until reconciliation reveals the error.

The problem is exacerbated by the way AI agents resolve targets. A human operator typically has contextual awareness of the target — they know what the supplier's bank details look like, they recognise the server name, they remember the patient's face. An AI agent resolves targets through data lookups, and those lookups are only as reliable as the data sources and the resolution logic. Stale data, ambiguous identifiers, homoglyph confusion, partial matches, and namespace collisions all create opportunities for misresolution that a human would catch through contextual awareness but an agent will miss.

The independent verification requirement addresses this by ensuring that no single data source determines the target. If the agent resolves the target from source A, it must verify against source B. This creates a structural check that catches errors originating in any single data source — whether from data staleness, corruption, tampering, or ambiguity.

Historical pattern comparison provides a second layer of protection. If a supplier has been paid to the same account 47 times and the 48th payment resolves to a different account, the deviation is a strong signal that something has changed — either legitimately (the supplier changed banks) or illegitimately (the account details have been compromised). Either way, the deviation warrants verification before execution.

6. Implementation Guidance

AG-145 requires a target verification engine that intercepts every action directed at a specific target entity and validates the target identity before allowing execution to proceed.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Financial Services. The Confirmation of Payee (CoP) scheme in the UK implements a form of target verification for retail payments. AG-145 extends this principle to all agent-initiated financial actions. For wholesale payments, SWIFT gpi pre-validation provides independent target verification. For cryptocurrency, address verification is critical because blockchain transactions are irreversible — sending to the wrong address is an unrecoverable loss. Implement checksum validation (e.g., EIP-55 for Ethereum addresses) and address book verification.

Healthcare. Patient identification errors are a leading cause of adverse events. AG-145 maps to the WHO "Five Rights" framework (right patient, right drug, right dose, right route, right time) — specifically the "right patient" requirement. Implement at least two-factor patient identification (e.g., MRN + date of birth, or name + date of birth) and flag any ambiguous matches.

Critical Infrastructure. Target verification for physical actuators must include hardware-level confirmation. Before a robotic agent actuates a specific device, the system should verify the device identity through a hardware identifier (serial number, MAC address) in addition to the logical identifier (device name, IP address). Misactuation in safety-critical environments can cause physical harm.

Maturity Model

Basic Implementation — The organisation verifies targets against one independent reference source for all actions directed at external entities. Multi-attribute matching is implemented for financial targets (account number + account holder name). Near-miss detection flags exact edit distance of 1. Verification failures block execution. This level meets the minimum mandatory requirements but does not include historical pattern detection or recipient confirmation.

Intermediate Implementation — Multi-source verification with at least two independent sources for high-value and irreversible actions. Historical pattern deviation detection flags targets that differ from the last 10 resolutions. Near-miss detection includes homoglyph analysis and transposition detection up to edit distance 3. Recipient confirmation for actions above a defined value threshold. Verification cache with configurable TTL.

Advanced Implementation — All intermediate capabilities plus: real-time target verification at execution time (not instruction time) for all irreversible actions. Machine learning models trained on historical misidentification data predict high-risk target resolutions and apply enhanced verification. Adversarial testing has verified resistance to homoglyph attacks, data source poisoning, and timing-based verification bypass. Integration with external verification services (Confirmation of Payee, SWIFT gpi, domain verification) provides third-party corroboration of target identity.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Independent Source Verification

Test 8.2: Multi-Attribute Match Failure

Test 8.3: Homoglyph and Near-Miss Detection

Test 8.4: Historical Pattern Deviation Detection

Test 8.5: Verification Failure Blocks Execution

Test 8.6: Target Verification Timing

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 9 (Risk Management System)Supports compliance
EU AI ActArticle 14 (Human Oversight)Supports compliance
FCA SYSC6.1.1R (Systems and Controls)Direct requirement
PSD2Article 88 (Execution of Payment Transactions)Direct requirement
PSR (UK)Confirmation of Payee RequirementsSupports compliance
GDPRArticle 5(1)(d) (Accuracy)Supports compliance
NIST AI RMFMAP 3.2, MANAGE 2.2Supports compliance
ISO 42001Clause 6.1 (Actions to Address Risks)Supports compliance

PSD2 — Article 88 and Confirmation of Payee

PSD2 requires payment service providers to ensure that payment transactions are executed correctly. The UK's Confirmation of Payee (CoP) scheme implements payee name verification for retail payments — checking that the account name matches the intended recipient's name before the payment is processed. AG-145 extends this principle to all agent-initiated actions: not just financial payments, but any action directed at a specific target. For payment-specific compliance, AG-145's multi-attribute verification should integrate with CoP where available and implement equivalent verification where CoP does not apply (e.g., international payments, cryptocurrency transfers).

GDPR — Article 5(1)(d) (Accuracy)

The accuracy principle requires that personal data be accurate and kept up to date. When an AI agent processes personal data — for example, accessing a patient's medical record or sending a communication to a data subject — target misidentification means the agent is processing the wrong person's data. This is both an accuracy violation and a potential data breach. AG-145's verification ensures that the data subject the agent acts upon is the correct data subject, supporting compliance with the accuracy principle.

FCA SYSC — 6.1.1R

The FCA expects firms to have systems and controls adequate to prevent the execution of transactions against incorrect counterparties. For AI agents initiating financial transactions, target verification is a fundamental control. The FCA's enforcement history includes cases where firms were fined for executing transactions against incorrect accounts due to inadequate verification — AG-145 provides the structural control to prevent this failure mode in AI agent operations.

PSR (UK) — Confirmation of Payee

The Payment Systems Regulator requires directed payment service providers to implement Confirmation of Payee. AG-145 extends the principle beyond the regulatory minimum by requiring multi-source verification, historical pattern detection, and near-miss analysis. Organisations that implement AG-145 for agent-initiated payments will meet and exceed the CoP requirements.

10. Failure Severity

FieldValue
Severity RatingHigh
Blast RadiusPer-action for individual misidentification; potentially systematic where data source corruption affects multiple targets

Consequence chain: Without target verification, an AI agent may direct actions at the wrong entity — a payment to the wrong account, a medical recommendation for the wrong patient, a configuration change to the wrong server, or a communication to the wrong recipient. The immediate consequence is the action's impact applied to an unintended target. For financial actions, this means funds sent to the wrong account — potentially irrecoverable if the action is irreversible (AG-143). For healthcare actions, this means clinical decisions based on the wrong patient's data — potentially life-threatening. For infrastructure actions, this means changes applied to the wrong system — potentially causing outages. The secondary consequence is remediation cost: investigation, reversal (if possible), compensation, and regulatory notification. The systemic risk arises when the target misidentification stems from a data source error affecting multiple targets — for example, a corrupted counterparty database causing systematic misdirection of payments. Cross-reference: AG-001 (mandate enforcement), AG-143 (cooling-off provides time for target verification), AG-144 (intent binding ensures the correct target was specified in the instruction), AG-146 (corroboration provides independent verification of target identity), AG-147 (post-actuation reconciliation catches misidentification after execution).

Cite this protocol
AgentGoverning. (2026). AG-145: Target and Recipient Verification Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-145