Docs / Security / Least-Privilege

Least-privilege execution.

Every agent operates within explicit scopes and permissions. Anything outside those scopes is denied by default.

How to use

1. Review control

Understand the control definition.

2. Verify implementation

Confirm evidence output exists.

3. Export proof

Generate evidence for auditors.

4. Monitor drift

Track changes to control posture.

How it works

Scope-bound intents

Policies define allowed scopes per agent or runtime.

Deny by default

Any intent outside scope is automatically denied.

Actor boundaries

External runtimes can be explicitly denied from sensitive scopes.

Audit evidence

Denied attempts are logged with policy basis.

Example policy

{ "policy_id": "PB-017", "scope": "read_emails", "actors": { "allowed": ["first_party_agents"], "denied": ["external_runtimes"] }, "status": "ACTIVE" }

Key API endpoints

GET /policy — policy snapshot
POST /policy/change-request — change request

Evidence outputs

Scope enforcement records
Approval receipts