Appearance
Acceptance Scenarios
Tool approval
Given a high-risk shell command, the policy layer returns ask, the UI renders an approval request, the user approves once, runtime receives a scoped grant, and evidence can link the decision, approval, grant, tool call, and trace.
Artifact export
Given an artifact export containing sensitive fields, policy returns allow with redact_before_export and keep_audit_shape obligations. The exporter transforms payloads, preserves ids and hashes, and evidence records the redaction.
Model routing
Given a sensitive task and external model candidate, policy returns deny for the external model and allow for a local or private model under a purpose-bound grant.
Remote delegation
Given a delegated task to a peer agent, policy issues a non-transferable grant with required returned refs. If the peer cannot enforce redaction, the origin system records indeterminate or defer.
Waiver
Given a blocked production action, an authorized reviewer creates a waiver with expiry and review requirement. Runtime executes only within the waiver scope and evidence keeps the original denial visible.
Retention expiry
Given a memory write, policy sets payload retention and audit metadata retention separately. When payload expires, audit shape remains available for review.