All articles
Company NewsApril 2026·7 min read

HDP for Agentic Function Calls Is Now in the Google Gemma Cookbook

A public example in `google-gemma/cookbook` now shows Gemma 4 function calls being gated by Human Delegation Provenance before execution. That is a meaningful step for agent authorization.

Illustrated robot reading a Gemma cookbook in a kitchen scene

AI generated image, no copyrights.

At a Glance

Gemma

public cookbook example live

HDP

open protocol, free to implement

2604.04522

formal HDP paper on arXiv

HDP-P

physical AI companion spec on Zenodo

HDP is no longer only a draft, a paper, and a reference repository. A public example has now landed in the Google Gemma cookbook, showing how Gemma 4 function calls can be checked against human-issued delegation before a tool executes.

The significance is not that a single repository path exists. The significance is that the problem of human authorization in agentic systems is becoming concrete enough to show up inside a mainstream open-model developer workflow. The current cookbook README frames the example as Gemma 4 plus HDP for securing agentic function calls, with a notebook and middleware that place verification in the path before execution rather than after the fact.

That is exactly where this problem belongs. Once a model can call tools, move data, send messages, or trigger downstream agents, the question is no longer just whether the call is syntactically valid. The question is whether the system can prove a human principal actually authorized that action and the scope in which it was meant to occur.

What Actually Merged

The public Gemma cookbook example does not present HDP as abstract theory. It shows the security model in operational terms:

A Gemma 4 walkthrough notebook showing HDP issuance, scope checks, and gated function execution.

A drop-in middleware layer that verifies a delegation token before any tool call runs.

A practical irreversibility model, from read-only actions through physical actuation.

A public reference path from software agents today to HDP-P for physical systems tomorrow.

The README also connects the software-side control path to edge and physical deployments. It explicitly points readers from HDP toward HDP-P for cases where Gemma 4 is directing physical actuators on devices such as a Jetson Nano or Raspberry Pi based robotics stack.

Why This Matters Beyond One Merge

Why It Matters
  • It moves HDP from protocol text into a public implementation path developers can inspect, run, and adapt.
  • It makes human authorization a first-class part of the function-calling control path instead of a policy note buried in prompt text.
  • It gives the broader Gemma ecosystem a concrete example of pre-execution security rather than post-incident audit alone.

Security categories usually become real in stages. First the risk is named. Then it is researched. Then it gets a reference implementation. Only after that does it become normal engineering work. The Gemma cookbook example matters because it helps push human provenance and delegated authority one step further along that path.

For Helixar, this is also strategically important. We are a commercial company focused on agentic threat detection, response, and behavioral visibility. HDP is not our commercial moat. HDP is an open protocol contribution that helps define the infrastructure layer this market is going to need. The company and the protocol have different roles, and that distinction matters.

Open Protocol, Commercial Company, Different Jobs

HDP is open. It is published publicly, free to implement, and documented through the IETF draft, the arXiv paper, and the reference repository. It is designed to answer one narrow but important question: what did the human authorize, and can every downstream participant verify that chain?

Helixar is commercial. The company is building agentic threat detection: behavioral monitoring, drift detection, out-of-scope action analysis, and operational controls for AI systems running in real environments. Those layers sit adjacent to protocol work rather than replacing it. In our view, the future of agentic security needs both: provenance for what should have happened, and detection for what actually did.

That is why this cookbook inclusion matters as more than a branding moment. It shows that human provenance is not a side topic. It belongs in the practical stack developers reach for when they wire models to tools.

Helixar's Open Strategy for the Agentic Future

The cookbook example starts with function calls, but the market does not stop there. The same control problem gets sharper as agents move from software actions into financial workflows, supply chains, infrastructure changes, and eventually physical systems where rollback is limited or impossible. That is why HDP matters beyond one implementation example. It is part of the rules layer this category still needs to build.

Helixar's view is straightforward: new threat categories need shared awareness, shared controls, and shared language before they can be defended properly. That is why part of our strategy is open. Open protocols and open-source tools accelerate adoption, make the problem legible to the market, and help establish the standards people will need before agentic systems are operating at machine speed across enterprises, developer pipelines, and robotics environments.

Three Open Signals, One Direction

HDP

Defines verifiable human delegation for agentic systems so downstream actions can be checked against what was actually authorized.

ReleaseGuard

Hardens release artifacts and strips unknown or risky payloads before they ship, reducing the attack surface around agentic software supply chains.

Sentinel

Verifies MCP security posture and helps teams find protocol-level exposure before an agentic workflow turns into an incident.

Those contributions are not separate stories. They are early pieces of the same thesis: the agentic future will need provenance, release integrity, protocol hygiene, and behavioral detection working together. HDP helps define what should have been allowed. Helixar's commercial platform is being built to detect what actually happened in production, including drift, misuse, and emerging attack paths that no static rule set will catch on its own.

The hook for the market is simple: if agents are going to execute more human work at machine speed, the security model has to be designed before that operating model is everywhere. That is the future Helixar is building for. If you are shaping agentic infrastructure, deploying tool-calling models, or thinking about robotics and irreversible AI actions, this is the right time to talk to us at press@helixar.ai.

References

  1. Google Gemma Team. (2026). Gemma 4 + HDP: Securing Agentic Function Calls. Google Gemma Cookbook. github.com/google-gemma/cookbook
  2. Google. (2026). Google Gemma 4 Model Family. Google Developers Blog. blog.google
  3. Dalugoda, A. (2026). HDP: A Lightweight Cryptographic Protocol for Human Delegation Provenance in Agentic AI Systems. arXiv:2604.04522. arxiv.org
  4. IETF Internet-Draft. (2026). draft-helixar-hdp-agentic-delegation-00. datatracker.ietf.org
  5. Dalugoda, A. (2026). HDP-P: Human Delegation Provenance for Physical AI Agents. Zenodo. DOI: 10.5281/zenodo.19332440. doi.org/10.5281/zenodo.19332440
  6. Helixar Labs. (2026). HDP Reference Repository. github.com/Helixar-AI/HDP

Human provenance should be part of the agent stack

Read the protocol work, inspect the public cookbook example, and talk to Helixar if you need behavioral controls around real agent deployments.

Explore Helixar Labs