Docs / Security / Least-Privilege
Least-privilege execution.
Every agent operates within explicit scopes and permissions. Anything outside those scopes is denied by default.
How to use
1. Review control
Understand the control definition.
2. Verify implementation
Confirm evidence output exists.
3. Export proof
Generate evidence for auditors.
4. Monitor drift
Track changes to control posture.
How it works
Scope-bound intents
Policies define allowed scopes per agent or runtime.
Deny by default
Any intent outside scope is automatically denied.
Actor boundaries
External runtimes can be explicitly denied from sensitive scopes.
Audit evidence
Denied attempts are logged with policy basis.
Example policy
{
"policy_id": "PB-017",
"scope": "read_emails",
"actors": {
"allowed": ["first_party_agents"],
"denied": ["external_runtimes"]
},
"status": "ACTIVE"
}
Key API endpoints
GET /policy — policy snapshotPOST /policy/change-request — change requestEvidence outputs
Scope enforcement records
Approval receipts