Announce your AI-readiness at the infrastructure level. Add a single DNS TXT record at _wab.yourdomain.com and any compatible AI agent will instantly find your wab.json capabilities — no HTTP probe required.
WAB DNS Discovery is a lightweight protocol that lets AI agents instantly know whether a domain supports WAB and where to fetch its capabilities document. It works exactly like SPF, DKIM, or DMARC for email — a single TXT record at a well-known subdomain advertises your protocol support.
/.well-known/wab.json blindly.v=wab1 prefix lets the protocol evolve without breaking older agents._wab.example.com.v=wab1; endpoint=https://example.com/.well-known/wab.jsonv= and endpoint= parameters, validates the version, then fetches the capabilities document directly.feat=, sig=, ttl=, etc.| Field | Value | Description |
|---|---|---|
| Type | TXT | Plain text record |
| Name / Host | _wab | Subdomain prefix → _wab.yourdomain.com |
| Value | v=wab1; endpoint=https://yourdomain.com/.well-known/wab.json | Protocol version + capabilities URL |
| TTL | 3600 / Auto | Standard cache lifetime |
_wab.yourdomain.com. 3600 IN TXT "v=wab1; endpoint=https://yourdomain.com/.well-known/wab.json"
The exact records the WAB site itself publishes. Each row is verified live against Cloudflare DoH (1.1.1.1) when this page loads.
| Live | Name / Host | Type | Value | TTL |
|---|---|---|---|---|
| … | _wab |
TXT |
"v=wab1; endpoint=https://www.webagentbridge.com/.well-known/wab.json" |
3600 |
| … | _wab-agent |
TXT |
"v=wab1; mcp=https://www.webagentbridge.com/api/v1/protocol; gateway=https://www.webagentbridge.com/api/v1" |
3600 |
| … | _wab-trust |
TXT |
"v=wab1; trust=https://www.webagentbridge.com/.well-known/wab.json; security=https://www.webagentbridge.com/.well-known/security.txt" |
3600 |
| … | _dmarc |
TXT |
"v=DMARC1; p=quarantine; rua=mailto:dmarc@webagentbridge.com; ruf=mailto:dmarc@webagentbridge.com; adkim=s; aspf=s; pct=100" |
3600 |
| … | @ (apex) |
TXT |
"v=spf1 -all" |
3600 |
| … | @ (apex) |
CAA |
0 issue "letsencrypt.org" |
3600 |
| … | @ (apex) |
CAA |
0 iodef "mailto:security@webagentbridge.com" |
3600 |
Verify after propagation: open the live verifier above dig _wab.webagentbridge.com TXT +short
Enter any domain to query its _wab TXT record live from a public DoH resolver. This runs entirely in your browser — no data is sent to our servers.
{}
WAB Discovery never uses plain UDP DNS. Every lookup of _wab.example.com uses DNS over HTTPS (DoH), so the query is encrypted between the agent and the resolver.
| Threat | Plain DNS | WAB DoH |
|---|---|---|
| ISP / network observer sees lookup | ✗ visible cleartext | ✓ encrypted (TLS 1.3) |
| DoH provider sees lookup | — (not used) | ⚠ visible to chosen resolver |
| Reply tampered in transit | ✗ trivial on-path | ✓ TLS prevents on-path tamper |
| Authoritative record forged at zone | ✗ no signature | ⚠ DNSSEC recommended |
| Provider link leaks via certificate | — | ✓ certificate pinning roadmap |
Bottom line: DoH moves the trust point from your ISP to your DoH resolver — a strict improvement, but you still pick whom to trust. Combine DoH with DNSSEC and certificate pinning for the strongest posture.
DNSSEC live status for webagentbridge.com: …
When a WAB-aware site advertises _wab and _wab-trust over DNS, the agent and site negotiate intent in the background — no privacy popup, no cookie banner, no consent click-fest.
_wab.{site} over DoH → discovers wab.json endpoint._wab-trust.{site} → reads contract: data scope, rate limits, complaint channel.wab.json, signs request with its key, site responds with structured commands.SEO upside: WAB-discoverable sites get prioritized by agent traffic, return data faster (less scraping overhead), and reduce server load. Opt-in sites surface first in agent search results — the opposite of the cookie-wall tax.
TXT, Name: _wabv=wab1; endpoint=https://yourdomain.com/.well-known/wab.json_wab (cPanel appends your domain automatically).v=wab1; endpoint=https://yourdomain.com/.well-known/wab.jsonTXT, Name: _wabv=wab1; endpoint=https://yourdomain.com/.well-known/wab.json_wabv=wab1; endpoint=https://yourdomain.com/.well-known/wab.json_wab — Record type: TXT"v=wab1; endpoint=https://yourdomain.com/.well-known/wab.json"300–3600The pattern is identical across all providers: create a TXT record with host _wab and the v=wab1; endpoint=… value. If your provider asks for the FQDN, use _wab.yourdomain.com. Some panels strip the trailing dot — that is OK.
DNS propagation can take a few minutes up to 48 hours. Verify with:
# macOS / Linux dig TXT _wab.yourdomain.com +short # Windows nslookup -type=TXT _wab.yourdomain.com # Anywhere (DoH via curl) curl -s -H 'accept: application/dns-json' \ 'https://cloudflare-dns.com/dns-query?name=_wab.yourdomain.com&type=TXT'
Expected output:
"v=wab1; endpoint=https://yourdomain.com/.well-known/wab.json"
endpoint URL is HTTPS and returns a valid wab.json (Content-Type: application/json)._wab.yourdomain.com.yourdomain.com.The most extensive guides, including provider-specific edge cases and the full discovery protocol spec, live in the GitHub repository: