curl --request PUT \
--url https://api.mnemom.ai/v1/orgs/{org_id}/alignment-template \
--header 'Authorization: Bearer <token>' \
--header 'Content-Type: application/json' \
--header 'Idempotency-Key: <idempotency-key>' \
--data '
{
"card_version": "<string>",
"agent_id": "<string>",
"values": {
"declared": [
"<string>"
],
"definitions": {},
"conflicts_with": [
"<string>"
],
"hierarchy": "lexicographic"
},
"autonomy": {
"bounded_actions": [
"<string>"
],
"escalation_triggers": [
{
"condition": "<string>",
"action": "escalate",
"reason": "<string>"
}
],
"forbidden_actions": [
"<string>"
],
"max_autonomous_value": {
"amount": 123,
"currency": "<string>"
}
},
"audit": {
"retention_days": 123,
"queryable": true,
"trace_format": "<string>",
"query_endpoint": "<string>",
"tamper_evidence": "append_only",
"storage": {
"type": "local",
"location": "<string>"
}
},
"card_id": "<string>",
"issued_at": "2023-11-07T05:31:56Z",
"expires_at": "2023-11-07T05:31:56Z",
"integrity": {
"enforcement_mode": "observe"
},
"capabilities": {},
"enforcement": {
"forbidden_tools": [
{
"pattern": "<string>",
"reason": "<string>",
"severity": "critical"
}
],
"unmapped_tool_action": "allow",
"fail_open": true,
"mode": "off",
"grace_period_hours": 123
},
"extensions": {},
"_composition": {
"canonical_id": "<string>",
"composed_at": "2023-11-07T05:31:56Z",
"scopes_applied": [
{
"scope": "<string>",
"version": 123,
"template_version": 123,
"card_id": "<string>"
}
],
"exemptions_applied": [
"<string>"
],
"source_card_id": "<string>",
"source_policy_id": "<string>"
}
}
'{
"org_id": "<string>",
"template": {
"card_version": "<string>",
"agent_id": "<string>",
"values": {
"declared": [
"<string>"
],
"definitions": {},
"conflicts_with": [
"<string>"
],
"hierarchy": "lexicographic"
},
"autonomy": {
"bounded_actions": [
"<string>"
],
"escalation_triggers": [
{
"condition": "<string>",
"action": "escalate",
"reason": "<string>"
}
],
"forbidden_actions": [
"<string>"
],
"max_autonomous_value": {
"amount": 123,
"currency": "<string>"
}
},
"audit": {
"retention_days": 123,
"queryable": true,
"trace_format": "<string>",
"query_endpoint": "<string>",
"tamper_evidence": "append_only",
"storage": {
"type": "local",
"location": "<string>"
}
},
"card_id": "<string>",
"issued_at": "2023-11-07T05:31:56Z",
"expires_at": "2023-11-07T05:31:56Z",
"principal": {
"type": "human",
"relationship": "delegated_authority",
"identifier": "<string>",
"escalation_contact": "<string>"
},
"conscience": {
"mode": "augment",
"values": [
{
"type": "BOUNDARY",
"content": "<string>",
"id": "<string>",
"severity": "advisory"
}
]
},
"integrity": {
"enforcement_mode": "observe"
},
"capabilities": {},
"enforcement": {
"forbidden_tools": [
{
"pattern": "<string>",
"reason": "<string>",
"severity": "critical"
}
],
"unmapped_tool_action": "allow",
"fail_open": true,
"mode": "off",
"grace_period_hours": 123
},
"extensions": {},
"_composition": {
"canonical_id": "<string>",
"composed_at": "2023-11-07T05:31:56Z",
"scopes_applied": [
{
"scope": "<string>",
"version": 123,
"template_version": 123,
"card_id": "<string>"
}
],
"exemptions_applied": [
"<string>"
],
"source_card_id": "<string>",
"source_policy_id": "<string>"
}
},
"enabled": true,
"agents_flagged_for_recompose": 123
}Requires org owner or admin. Accepts YAML or JSON. Body cap: 128 KiB. The first PUT auto-enables the template; subsequent PUTs leave enabled unchanged unless explicitly overridden. Every member agent is flagged for canonical recompose. Requires Idempotency-Key. See ADR-008.
curl --request PUT \
--url https://api.mnemom.ai/v1/orgs/{org_id}/alignment-template \
--header 'Authorization: Bearer <token>' \
--header 'Content-Type: application/json' \
--header 'Idempotency-Key: <idempotency-key>' \
--data '
{
"card_version": "<string>",
"agent_id": "<string>",
"values": {
"declared": [
"<string>"
],
"definitions": {},
"conflicts_with": [
"<string>"
],
"hierarchy": "lexicographic"
},
"autonomy": {
"bounded_actions": [
"<string>"
],
"escalation_triggers": [
{
"condition": "<string>",
"action": "escalate",
"reason": "<string>"
}
],
"forbidden_actions": [
"<string>"
],
"max_autonomous_value": {
"amount": 123,
"currency": "<string>"
}
},
"audit": {
"retention_days": 123,
"queryable": true,
"trace_format": "<string>",
"query_endpoint": "<string>",
"tamper_evidence": "append_only",
"storage": {
"type": "local",
"location": "<string>"
}
},
"card_id": "<string>",
"issued_at": "2023-11-07T05:31:56Z",
"expires_at": "2023-11-07T05:31:56Z",
"integrity": {
"enforcement_mode": "observe"
},
"capabilities": {},
"enforcement": {
"forbidden_tools": [
{
"pattern": "<string>",
"reason": "<string>",
"severity": "critical"
}
],
"unmapped_tool_action": "allow",
"fail_open": true,
"mode": "off",
"grace_period_hours": 123
},
"extensions": {},
"_composition": {
"canonical_id": "<string>",
"composed_at": "2023-11-07T05:31:56Z",
"scopes_applied": [
{
"scope": "<string>",
"version": 123,
"template_version": 123,
"card_id": "<string>"
}
],
"exemptions_applied": [
"<string>"
],
"source_card_id": "<string>",
"source_policy_id": "<string>"
}
}
'{
"org_id": "<string>",
"template": {
"card_version": "<string>",
"agent_id": "<string>",
"values": {
"declared": [
"<string>"
],
"definitions": {},
"conflicts_with": [
"<string>"
],
"hierarchy": "lexicographic"
},
"autonomy": {
"bounded_actions": [
"<string>"
],
"escalation_triggers": [
{
"condition": "<string>",
"action": "escalate",
"reason": "<string>"
}
],
"forbidden_actions": [
"<string>"
],
"max_autonomous_value": {
"amount": 123,
"currency": "<string>"
}
},
"audit": {
"retention_days": 123,
"queryable": true,
"trace_format": "<string>",
"query_endpoint": "<string>",
"tamper_evidence": "append_only",
"storage": {
"type": "local",
"location": "<string>"
}
},
"card_id": "<string>",
"issued_at": "2023-11-07T05:31:56Z",
"expires_at": "2023-11-07T05:31:56Z",
"principal": {
"type": "human",
"relationship": "delegated_authority",
"identifier": "<string>",
"escalation_contact": "<string>"
},
"conscience": {
"mode": "augment",
"values": [
{
"type": "BOUNDARY",
"content": "<string>",
"id": "<string>",
"severity": "advisory"
}
]
},
"integrity": {
"enforcement_mode": "observe"
},
"capabilities": {},
"enforcement": {
"forbidden_tools": [
{
"pattern": "<string>",
"reason": "<string>",
"severity": "critical"
}
],
"unmapped_tool_action": "allow",
"fail_open": true,
"mode": "off",
"grace_period_hours": 123
},
"extensions": {},
"_composition": {
"canonical_id": "<string>",
"composed_at": "2023-11-07T05:31:56Z",
"scopes_applied": [
{
"scope": "<string>",
"version": 123,
"template_version": 123,
"card_id": "<string>"
}
],
"exemptions_applied": [
"<string>"
],
"source_card_id": "<string>",
"source_policy_id": "<string>"
}
},
"enabled": true,
"agents_flagged_for_recompose": 123
}Supabase JWT token in Authorization: Bearer header
Organization identifier (e.g. org-abc12345)
UC-4 unified alignment card (ADR-008). Authored in YAML or JSON; composed server-side with platform defaults, org template, and active exemptions before storage.
Card schema version (e.g. 0.5.0).
Target agent id. On PUT, server overwrites to match the URL path.
Show child attributes
Show child attributes
Show child attributes
Card row id. Server-assigned on PUT (ac-{uuid}).
Show child attributes
Show child attributes
Show child attributes
Show child attributes
Show child attributes
System-managed block describing which scope sources merged into the canonical card. Only returned when ?include_composition=true.
Show child attributes
Template stored and propagated.
UC-4 unified alignment card (ADR-008). Authored in YAML or JSON; composed server-side with platform defaults, org template, and active exemptions before storage.
Show child attributes