AG-648

Procurement Fraud Detection Governance

Procurement, Sourcing & Vendor Negotiation ~28 min read AGS v2.1 · April 2026
EU AI Act SOX FCA NIST

2. Summary

Procurement Fraud Detection Governance requires that AI agents operating within procurement, sourcing, and vendor management workflows implement continuous detective controls to identify kickback schemes, collusion between internal buyers and external suppliers, duplicate vendor entities created to circumvent segregation-of-duties controls, invoice manipulation patterns including phantom invoicing and rounding fraud, and bid rotation arrangements that undermine competitive tendering. Procurement fraud is among the most financially damaging categories of organisational fraud because it operates at the intersection of high transaction volumes, complex supplier relationships, and distributed approval authority — conditions that create extensive concealment opportunities. An AI agent that processes purchase orders, evaluates bids, routes invoices for approval, or manages vendor master data is uniquely positioned to detect fraud indicators that would be invisible to any single human reviewer, but only if the agent's fraud detection logic is governed, calibrated, tested, and subject to independent validation. This dimension mandates the detection infrastructure, escalation protocols, pattern libraries, and evidence preservation requirements necessary to make procurement fraud detection operationally reliable rather than aspirational.

3. Example

Scenario A — Kickback Scheme Through Inflated Unit Pricing: A regional government agency deploys an AI agent to manage procurement of office supplies, IT equipment, and facilities maintenance services. A procurement officer cultivates a relationship with a single IT equipment supplier over 14 months, consistently directing orders to that supplier through sole-source justifications citing "technical compatibility" with existing infrastructure. The supplier invoices at prices 18-32% above comparable market rates. The kickback arrangement pays the procurement officer 12% of the invoice value through a consulting company registered to the officer's spouse. Over 14 months, the agency overpays £1.4 million on IT equipment, of which approximately £168,000 flows back to the procurement officer. The AI agent processes all purchase orders and invoices but has no price benchmarking logic, no pattern detection for sole-source concentration, and no relationship-mapping capability to identify the consulting company's connection to the procurement officer. The fraud is discovered only when a new department head questions why the agency's IT equipment costs are triple the per-unit rates negotiated by a neighbouring agency.

What went wrong: The agent had no detection logic for the three primary indicators of a kickback scheme — price inflation above market benchmarks, sole-source concentration with a single supplier, and suspicious payment patterns to related entities. The agent processed transactions faithfully but functioned as an unwitting facilitator of the fraud by automating the approval workflow without any anomaly detection. Consequence: £1.4 million in overpayment, criminal prosecution of the procurement officer, reputational damage to the agency, and a 9-month forensic audit costing £290,000.

Scenario B — Duplicate Vendor Entities and Invoice Splitting: A manufacturing company deploys an AI agent to manage vendor onboarding, purchase order creation, and invoice processing. A accounts payable clerk creates three vendor records for the same janitorial services company, each with slight variations — "CleanCo Services Ltd," "Clean Co. Services," and "CleanCo Srvcs Limited" — registered to the same physical address but with different bank account numbers. The clerk routes invoices across the three vendor identities to keep individual invoice amounts below the £5,000 threshold that requires manager approval. Over 8 months, 142 invoices totalling £487,000 are processed across the three vendor identities, of which £291,000 represent fictitious services never rendered. The payments are distributed to bank accounts controlled by the clerk and an external accomplice. The AI agent processes each invoice independently, matching it against the corresponding purchase order and vendor record. Because each vendor record passes individual validation and each invoice falls below the approval threshold, no alert is triggered.

What went wrong: The agent had no duplicate vendor detection — no fuzzy matching on vendor names, no address deduplication, no bank account cross-referencing across vendor records. The agent also had no invoice-splitting detection logic to identify patterns of invoices deliberately structured below approval thresholds. The three vendor identities were trivially similar to a human reviewer but invisible to an agent performing exact-match validation. Consequence: £291,000 in fraudulent payments, termination of the clerk and criminal referral, £85,000 in forensic accounting costs, and implementation of retrospective vendor master data cleansing at £43,000.

Scenario C — Bid Rotation Collusion Among Contractors: A municipal public works department uses an AI agent to manage competitive tendering for road maintenance contracts. Four contractors form a bid rotation cartel: for each tender, they agree in advance which contractor will submit the lowest bid, while the other three submit deliberately inflated "complementary" bids to create the appearance of competitive pricing. The winning bids are typically 25-40% above the cost that genuine competition would produce. Over 3 years, the cartel wins 34 of 38 road maintenance tenders valued at a combined £12.7 million, with an estimated overcharge of £3.8 million. The AI agent evaluates bids on published criteria — price, technical compliance, delivery timeline — and consistently recommends the lowest-priced bid, which is always the pre-arranged winner. The agent has no capability to detect that the same four companies appear in every tender, that losing bids are consistently clustered in narrow price bands above the winner, or that the winning company rotates in a predictable pattern.

What went wrong: The agent evaluated each tender in isolation with no cross-tender pattern analysis. Bid rotation collusion is detectable through statistical analysis — winner rotation patterns, bid price clustering, consistent participation by the same bidder group, and losing bids with suspicious round-number pricing — but the agent had no such analysis capability. The agent was optimised for single-tender evaluation, not for longitudinal fraud detection across the procurement portfolio. Consequence: £3.8 million in overcharges over 3 years, competition authority investigation, debarment proceedings against all four contractors, and a retrospective re-tendering programme costing £620,000.

Scenario D — Invoice Rounding Fraud at Scale: A logistics company processes approximately 45,000 freight invoices per month through an AI agent that validates invoices against contracted rates. A freight broker systematically rounds up invoice line items — adding £0.30 to £0.80 per line item across invoices with 15-40 line items each. The rounding is small enough that individual invoices fall within the 2% tolerance threshold configured in the agent's validation logic. Over 12 months, the cumulative overcharge across 540,000 invoices totals £2.1 million. Each individual invoice passes validation because the overcharge per invoice (£4.50 to £32.00) is within tolerance. No human reviewer examines invoices that pass automated validation.

What went wrong: The agent's tolerance threshold was designed for legitimate rounding differences and measurement variations, not for systematic exploitation. The agent had no capability to detect that rounding errors were consistently positive (always in the supplier's favour), that the magnitude of rounding was non-random (clustered in a narrow band suggesting deliberate manipulation), or that the cumulative effect across the invoice population was material. Individual invoice validation passed; portfolio-level fraud detection was absent. Consequence: £2.1 million in overcharges, contract termination with the freight broker, £170,000 in forensic analysis to quantify the overcharge, and protracted commercial litigation to recover funds.

4. Requirement Statement

Scope: This dimension applies to every AI agent deployment that participates in procurement, sourcing, vendor management, or accounts payable workflows — including but not limited to: vendor onboarding and master data management, purchase requisition and purchase order creation, bid evaluation and tender management, invoice receipt and validation, payment authorisation routing, contract management and change-order processing, and supplier performance evaluation. The scope covers all procurement fraud typologies including kickback and bribery schemes, collusive bidding and bid rotation, duplicate and phantom vendor creation, invoice manipulation (splitting, rounding, duplication, inflation), fictitious goods or services, and conflicts of interest between internal personnel and external suppliers. The dimension applies regardless of whether the agent has primary decision authority or operates in an advisory capacity — an agent that recommends a supplier or validates an invoice is within scope even if a human makes the final decision, because the agent's recommendation shapes the human's decision and a compromised recommendation undermines the entire control framework. The scope extends to cross-border procurement where fraud patterns may exploit jurisdictional differences in vendor registration, tax treatment, or regulatory oversight.

4.1. A conforming system MUST implement a procurement fraud pattern library containing detection rules for, at minimum, the following fraud typologies: (a) kickback indicators including systematic price inflation above market benchmarks and sole-source concentration; (b) duplicate vendor detection using fuzzy name matching, address deduplication, bank account cross-referencing, and tax identifier validation; (c) invoice manipulation including splitting below approval thresholds, systematic positive rounding, duplicate invoice submission, and phantom invoicing for goods or services not received; (d) bid collusion indicators including bid rotation patterns, complementary bidding, and suspicious bid price clustering; and (e) conflict-of-interest indicators including relationship mapping between internal personnel and supplier beneficial owners, directors, or agents.

4.2. A conforming system MUST calibrate fraud detection thresholds against empirical data — including historical fraud cases within the organisation, industry-specific fraud benchmarks, and published procurement fraud typology research — and document the calibration methodology, the data sources used, and the rationale for each threshold value.

4.3. A conforming system MUST perform cross-transaction pattern analysis rather than evaluating each procurement transaction in isolation, enabling detection of fraud schemes that are invisible at the individual transaction level but detectable across populations of transactions, time periods, or supplier relationships.

4.4. A conforming system MUST escalate all fraud detection alerts to a human investigator through a defined escalation pathway with documented response SLAs, and the agent MUST NOT autonomously dismiss, downgrade, or suppress fraud alerts without human review.

4.5. A conforming system MUST preserve the complete evidentiary chain for every fraud detection alert — including the triggering transaction data, the detection rule that fired, the pattern evidence supporting the alert, and all subsequent investigation actions — in a tamper-evident format suitable for use in internal disciplinary proceedings, regulatory reporting, or criminal prosecution.

4.6. A conforming system MUST subject the fraud pattern library to independent validation at least annually, using red-team exercises that inject synthetic fraud scenarios into the procurement data stream and verify that the detection rules identify them within defined detection windows.

4.7. A conforming system MUST monitor the agent's own procurement processing for indicators that the agent itself has been manipulated to facilitate fraud — including unauthorised modification of detection thresholds, suppression of alert generation, alteration of vendor master data outside approved workflows, and anomalous changes to approval routing logic.

4.8. A conforming system MUST generate periodic fraud risk reports — at minimum quarterly — summarising the volume and typology of fraud alerts, investigation outcomes, false positive rates, detection coverage gaps identified, and cumulative governed exposure from confirmed fraud.

4.9. A conforming system SHOULD implement market price benchmarking that compares procurement prices against external reference data — published price indices, catalogue prices, prices paid by comparable organisations, or historical price trends — to detect systematic overpayment that may indicate kickback arrangements.

4.10. A conforming system SHOULD implement network analysis capabilities that map relationships between suppliers, sub-contractors, beneficial owners, and internal personnel to detect hidden conflicts of interest and shell company structures used to obscure fraudulent relationships.

4.11. A conforming system SHOULD correlate procurement fraud indicators with other organisational data sources — expense reports, travel records, gift registers, and communications metadata — to identify behavioural patterns consistent with corrupt relationships between internal personnel and suppliers.

4.12. A conforming system MAY implement machine learning models trained on confirmed procurement fraud cases to detect novel fraud patterns that are not covered by rule-based detection, provided that model outputs are explainable and auditable per AG-055.

5. Rationale

Procurement fraud is the single largest category of occupational fraud by financial impact. The Association of Certified Fraud Examiners (ACFE) consistently reports that billing schemes, corruption, and procurement fraud account for the highest median losses across all fraud categories. The conditions that make procurement fraud prevalent — high transaction volumes, distributed approval authority, information asymmetry between buyers and suppliers, and the inherent difficulty of verifying that goods and services were actually received at the claimed quantity and quality — are exactly the conditions that AI agent deployment in procurement is intended to address through automation and efficiency. The irony is that without governed fraud detection, the same automation that increases procurement efficiency also increases the speed, scale, and concealment of procurement fraud.

An AI agent that processes purchase orders, validates invoices, and routes approvals at machine speed can process a fraudulent transaction as efficiently as a legitimate one. Unlike a human reviewer who might notice that the same supplier appears suspiciously often, or that an invoice amount seems high for the goods described, or that a vendor's registered address is a residential property, an AI agent operating without fraud detection logic will process the transaction according to its validation rules and move on. The agent's speed becomes the fraudster's advantage: transactions that would have taken days to process manually — providing natural review windows — are completed in seconds, reducing the window for human intervention.

Five fraud typologies are particularly relevant to AI-governed procurement. First, kickback schemes, where an internal buyer directs business to a favoured supplier in exchange for personal payments. The detection signals are systematic: the buyer consistently uses sole-source justifications, the supplier's prices are above market rates, and the buyer may have an undisclosed financial relationship with the supplier or a related entity. Second, duplicate and phantom vendors, where fraudulent vendor records are created in the master data to receive payments for fictitious goods or services. Detection requires fuzzy matching across vendor records — exact-match validation will not catch "CleanCo Services Ltd" and "Clean Co. Services" as duplicates. Third, invoice manipulation, which encompasses splitting invoices below approval thresholds, submitting duplicate invoices with minor variations (different invoice numbers for the same goods), inflating quantities or unit prices, and systematic positive rounding. Fourth, bid collusion, where ostensibly competing suppliers coordinate their bids to ensure a predetermined winner while maintaining the appearance of competition. Detection requires cross-tender analysis that individual tender evaluation cannot provide. Fifth, conflict-of-interest concealment, where relationships between internal personnel and supplier entities are hidden through intermediaries, shell companies, or family members.

Each of these typologies shares a common characteristic: the fraud is invisible at the individual transaction level but detectable through pattern analysis across transactions, time periods, and relationships. A single invoice from a kickback supplier looks legitimate. A single sole-source justification is unremarkable. A single bid from a colluding contractor meets all evaluation criteria. It is only when the agent analyses patterns — this supplier always wins, these invoices always round up, these four contractors always bid together — that fraud indicators emerge. This is why Requirement 4.3 mandates cross-transaction analysis: individual transaction validation is a necessary but woefully insufficient control for procurement fraud.

The regulatory and legal environment reinforces the need for procurement fraud detection governance. The UK Bribery Act 2010 Section 7 creates a corporate offence of failure to prevent bribery, with a defence only if the organisation can demonstrate "adequate procedures" to prevent bribery. The US Foreign Corrupt Practices Act (FCPA) imposes criminal liability for corrupt payments to foreign officials and requires adequate internal controls. The EU's Anti-Fraud Strategy emphasises the use of data analytics for fraud detection in public procurement. Public sector procurement is additionally governed by transparency and value-for-money requirements that fraud directly undermines. For AI agents operating in these environments, governed fraud detection is not an enhancement — it is a legal obligation.

The financial case for detection governance is straightforward. Procurement fraud that is detected early — through pattern analysis that identifies anomalies within weeks or months — results in losses that are typically recoverable through clawback provisions, insurance claims, or legal action. Procurement fraud that is detected late — through audit findings or whistleblower reports after years of accumulation — results in losses that are largely unrecoverable, compounded by forensic investigation costs, regulatory penalties, and reputational damage. The cost of implementing and maintaining fraud detection logic in an AI procurement agent is a fraction of the cost of a single undetected fraud scheme.

6. Implementation Guidance

Procurement fraud detection governance requires a layered detection architecture that combines rule-based pattern matching for known fraud typologies with statistical anomaly detection for emerging patterns, supported by a robust escalation framework and evidence preservation infrastructure.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Public Sector. Government procurement is subject to heightened transparency and accountability requirements. Public procurement fraud detection must account for politically exposed relationships, lobbying connections, and campaign contribution linkages. Many jurisdictions mandate specific anti-fraud controls for public procurement — the EU's ARACHNE tool for structural fund fraud detection, the US GSA's Office of Inspector General data analytics programme, and the UK's Government Counter Fraud Function standards. AI agents in public procurement should integrate with these existing frameworks rather than operating in isolation.

Financial Services. Banks and insurance companies procure substantial volumes of professional services, technology, and facilities management. Financial services procurement fraud detection must integrate with the organisation's existing AML and financial crime detection infrastructure — vendor payments that exhibit money laundering typologies (structuring, layering through intermediaries) should trigger both procurement fraud and financial crime alerts. Regulatory expectations under the FCA's financial crime framework and the US BSA/AML regime extend to procurement payments.

Manufacturing and Supply Chain. Manufacturing procurement involves high-volume commodity purchasing where small per-unit overcharges accumulate to material amounts. Invoice rounding fraud and quantity inflation are particularly prevalent. Detection must account for legitimate price variability (commodity market fluctuations, volume discounts, freight surcharges) while identifying systematic bias. Integration with goods receipt data — confirming that invoiced quantities match physically received quantities — is essential.

Cross-Border Procurement. Multi-jurisdiction procurement creates additional fraud opportunities through transfer pricing manipulation, shell companies in opaque jurisdictions, and exploitation of differences in vendor registration requirements. Detection must incorporate jurisdiction-specific risk factors — vendors registered in secrecy jurisdictions, beneficial ownership structures that are not transparent, and cross-border payment routing through intermediary accounts.

Maturity Model

Basic Implementation — The organisation has implemented rule-based detection for the primary fraud typologies listed in Requirement 4.1: duplicate vendor detection (fuzzy matching), invoice splitting detection (threshold analysis), and basic price benchmarking. Detection alerts are escalated to a human investigator with documented response SLAs. Evidence is preserved for each alert. The fraud pattern library is documented and has been validated against at least one round of synthetic fraud injection testing.

Intermediate Implementation — All basic capabilities plus: cross-transaction pattern analysis runs at defined intervals (at minimum weekly) covering bid rotation detection, sole-source concentration analysis, and statistical distribution analysis (Benford's Law, rounding bias detection). Network analysis maps vendor-to-personnel relationships using corporate registry data and internal personnel records. Market price benchmarking is integrated with external reference data. False positive rates are tracked and used to calibrate detection thresholds. Quarterly fraud risk reports are produced and reviewed by governance authority.

Advanced Implementation — All intermediate capabilities plus: real-time detection for high-priority fraud typologies (duplicate invoices, vendor bank account changes). Machine learning models supplement rule-based detection for novel pattern identification. Detection coverage is independently validated through annual red-team exercises with realistic synthetic fraud scenarios. The agent monitors its own integrity — detecting unauthorised threshold changes, alert suppression, or vendor master data manipulation. Cross-border procurement fraud indicators are integrated with jurisdiction-specific risk scoring. Detection outputs are integrated with the organisation's broader financial crime and anti-corruption programmes.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Duplicate Vendor Detection

Test 8.2: Invoice Splitting Detection

Test 8.3: Bid Rotation Collusion Detection

Test 8.4: Systematic Invoice Rounding Fraud Detection

Test 8.5: Fraud Alert Escalation and Non-Suppression

Test 8.6: Evidence Chain Preservation

Test 8.7: Annual Red-Team Validation

Test 8.8: Agent Integrity Self-Monitoring

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
UK Bribery Act 2010Section 7 (Failure to Prevent Bribery)Direct requirement
US FCPAAccounting Provisions (15 USC §78m)Supports compliance
EU AI ActArticle 9 (Risk Management System)Supports compliance
EU Public Procurement DirectivesDirective 2014/24/EU, Article 57 (Exclusion Grounds)Supports compliance
SOXSection 404 (Internal Controls over Financial Reporting)Supports compliance
DORAArticle 5 (ICT Risk Management Governance)Supports compliance
ISO 37001Clause 8.2-8.5 (Anti-Bribery Controls)Direct requirement
NIST AI RMFGOVERN 1.1, MAP 3.1Supports compliance

UK Bribery Act 2010 — Section 7

Section 7 creates a strict liability corporate offence of failure to prevent bribery by persons associated with the organisation — including suppliers, contractors, and agents. The only defence is demonstrating "adequate procedures" to prevent bribery. For organisations using AI agents in procurement, adequate procedures must include detection capabilities that identify bribery indicators in procurement transactions — price inflation, sole-source concentration, and relationships between internal personnel and supplier entities. AG-648 provides the governance framework for these detection capabilities. An organisation that deploys an AI procurement agent without fraud detection logic has a significantly weakened Section 7 defence, because it has automated the very transactions where bribery risk is highest without implementing commensurate detection controls.

US FCPA — Accounting Provisions

The FCPA's accounting provisions require issuers to maintain books and records that accurately reflect transactions and to maintain a system of internal accounting controls sufficient to provide reasonable assurances that transactions are executed in accordance with management's authorisation. AI procurement agents that process transactions without fraud detection may process unauthorised transactions (kickbacks, phantom invoicing) that create inaccurate books and records. AG-648's requirements for cross-transaction analysis, price benchmarking, and invoice manipulation detection directly support FCPA accounting provision compliance.

EU Public Procurement Directives — Article 57

Article 57 of Directive 2014/24/EU establishes mandatory and discretionary exclusion grounds for bidders involved in fraud, corruption, and collusion. Effective enforcement of Article 57 requires detection capabilities — contracting authorities must be able to identify bidders who should be excluded. AG-648's bid collusion detection and supplier due-diligence requirements support the detection of exclusion-triggering conduct. For AI agents that manage competitive tendering in public procurement, collusion detection is not optional — it is the mechanism through which Article 57 exclusion grounds are identified and enforced.

ISO 37001 — Anti-Bribery Management System

ISO 37001 requires organisations to implement anti-bribery controls proportionate to their bribery risk. Clauses 8.2 through 8.5 address due diligence, financial controls, non-financial controls, and anti-bribery commitments. For organisations where procurement is a significant bribery risk vector — which includes most organisations of any scale — AG-648 provides the detection governance that ISO 37001 requires but does not specify in technical detail. The fraud pattern library (Requirement 4.1), threshold calibration (Requirement 4.2), and annual validation (Requirement 4.6) map directly to ISO 37001's requirements for proportionate, tested anti-bribery controls.

SOX — Section 404

For organisations subject to SOX, procurement fraud represents a risk to the accuracy of financial reporting. Fraudulent vendor payments inflate cost of goods sold, operating expenses, or capital expenditure line items. Internal controls over financial reporting must include controls that detect procurement fraud patterns. AG-648's requirements for cross-transaction analysis and evidence preservation provide the detective controls that SOX Section 404 assessments expect for procurement-related financial statement assertions.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusOrganisation-wide governed exposure, with potential criminal liability for individuals and the corporate entity

Consequence chain: The absence of procurement fraud detection governance produces a predictable failure cascade. First, the AI agent processes procurement transactions efficiently but blindly — validating individual transactions against purchase orders and approval thresholds without analysing cross-transaction patterns. Second, fraud schemes that are invisible at the transaction level — kickbacks concealed through systematic price inflation, duplicate vendors splitting invoices below approval thresholds, bid rotation cartels winning every tender, invoice rounding fraud accumulating small overcharges across thousands of transactions — proceed undetected. Third, the cumulative financial loss grows linearly or exponentially over time because the absence of detection means the absence of deterrence; once a fraud scheme operates successfully for one cycle without detection, the fraudster has confirmation that the scheme works and typically increases the scale. Fourth, eventual detection occurs through an external trigger — a whistleblower, an audit finding, a regulatory investigation, or a vendor dispute — by which time the cumulative loss is material and substantially unrecoverable. Fifth, the investigation reveals that the AI agent processed all fraudulent transactions without generating a single alert, exposing the organisation to regulatory findings for inadequate internal controls (SOX material weakness, FCA systems and controls finding), criminal liability for failure to prevent bribery (UK Bribery Act Section 7), reputational damage from public disclosure of fraud, and civil litigation from shareholders or stakeholders. In public sector procurement, the additional consequence is public accountability for misuse of taxpayer funds, potential debarment of the organisation from future government contracts, and personal liability for senior officials under malfeasance provisions. The distinguishing characteristic of procurement fraud failure is its cumulative nature — small individual losses that are individually immaterial but collectively devastating, concealed by the very automation that was intended to improve procurement efficiency.

Cross-references: AG-001 (Aggregate Exposure Tracking) provides the governed exposure framework within which procurement fraud losses are monitored. AG-019 (Human Escalation & Override Triggers) governs the escalation pathways through which fraud alerts reach human investigators. AG-022 (Behavioural Drift Detection) detects changes in procurement patterns that may indicate emerging fraud schemes. AG-029 (Transaction Integrity Verification) ensures that individual procurement transactions are structurally valid — a prerequisite for meaningful fraud pattern analysis. AG-043 (Financial Reconciliation Governance) detects discrepancies between procurement records and financial statements that may indicate fraudulent payments. AG-055 (Anomaly Detection Calibration) governs the calibration methodology that AG-648 applies to fraud detection thresholds. AG-210 (Cross-System Data Consistency) ensures that procurement data across systems is consistent, preventing fraud concealment through data fragmentation. AG-639 (Supplier Selection Fairness) addresses the fairness dimension that kickback schemes undermine. AG-641 (Competitive Tender Integrity) addresses the competitive tendering controls that bid rotation collusion circumvents. AG-644 (Supplier Due-Diligence Binding) governs the supplier onboarding controls that duplicate and phantom vendor fraud exploits.

Cite this protocol
AgentGoverning. (2026). AG-648: Procurement Fraud Detection Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-648