Card Lifecycle
Alignment cards are no longer static declarations. The Agent Alignment Protocol (AAP) and CLPI make them lifecycle-managed artifacts that evolve alongside the agents they describe. When an agent gains new tools, updates its configuration, or changes its operational scope, the card should evolve with it. Card lifecycle management tracks these changes through versioned amendments, distinguishes configuration errors from genuine behavioral errors through violation reclassification, and enables trust recovery when violations were caused by card drift rather than agent misbehavior.Card Lifecycle is Phase 2 of CLPI (Card Lifecycle & Policy Intelligence) — the governance layer that also includes the Policy Engine (Phase 1), Intelligence Layer (Phase 3), On-Chain Verification (Phase 4), and Observability (Phase 5).
Card lifecycle management builds on the foundation of Alignment Cards. If you are unfamiliar with card structure, read that page first. This page covers what happens after a card is published — how it changes, how violations are categorized, and how trust recovers when the card was wrong.
Card Amendments
Every change to an alignment card is tracked as an amendment — a versioned, diffable record that preserves the full history of the card’s evolution. When you update an alignment card (via CLI, API, or dashboard), the system does not overwrite the previous version. Instead, it creates a new version and records an amendment that captures:| Field | Description |
|---|---|
previous_version | The card_id of the version being replaced |
new_version | The card_id of the updated version |
changed_fields | List of fields that were modified (e.g., autonomy_envelope.bounded_actions) |
timestamp | When the amendment was created |
reason | Human-readable explanation for the change |
Retrieving Amendment History
Violation Reclassification
The core insight behind card lifecycle management: not all violations indicate agent misbehavior. Some violations are card gaps — the agent used a tool correctly, but the alignment card did not declare that capability. Reclassification is the process of reviewing a violation after the fact and determining whether it was caused by the agent or by the card.Taxonomy
After reclassification, every violation falls into one of two categories:card_gap
Configuration error. The agent acted correctly, but the alignment card was missing a capability declaration. The card was wrong, not the agent.Example: Agent uses
mcp__browser__navigate for legitimate research, but web_fetch is not listed in bounded_actions. The policy engine flags an UNMAPPED_TOOL violation.behavior_gap
Genuine behavioral error. The agent acted outside its declared intent, and the card was correct. The agent was wrong, not the card.Example: Agent deletes files when the card explicitly lists
delete_files in forbidden_actions. The card is accurate — the agent violated it.behavior_gap violations should count against an agent’s trust score. Card gaps are operator errors, not agent errors.
Reclassification Workflow
Detect
The policy engine evaluates agent actions against the alignment card and policy rules. A violation is flagged — for example,
UNMAPPED_TOOL (tool not covered by any capability mapping) or CAPABILITY_MISMATCH (tool used outside declared capabilities).At this point, the violation is unclassified. It counts against the agent’s trust score by default.Determine cause
The operator reviews the violation. The key question: was the card missing a capability, or did the agent genuinely misbehave?Indicators of a card gap:
- The tool was used for a legitimate purpose consistent with the agent’s role
- The capability was recently added (new MCP server, new tool provider)
- Other agents in the fleet have this capability declared
- The tool usage pattern matches expected behavior
- The tool is explicitly forbidden in the card
- The action contradicts the agent’s declared values
- The tool was used in an unexpected or harmful way
Reclassify
If the violation is a card gap, submit a reclassification via the API:The
card_amendment_id is optional but recommended. Linking the reclassification to a specific card amendment creates an auditable chain: violation occurred, card was wrong, card was fixed, violation was reclassified.Recompute
After reclassification, the agent’s trust scores are automatically recomputed. Card gap violations are excluded from the Compliance and Drift Stability components of the Mnemom Trust Rating.Recomputation happens on the next hourly cycle. The agent’s score recovers without manual intervention.
Trust Graph Propagation
When reclassification triggers a score recomputation, the effects can propagate through the trust graph. Agents do not exist in isolation — they operate in fleets, teams, and delegation chains. A score change for one agent can affect trust assessments for related agents. Propagation uses breadth-first traversal from the reclassified agent with the following bounds:| Parameter | Value | Purpose |
|---|---|---|
| Maximum depth | 3 hops | Prevents unbounded propagation across large fleets |
| Maximum agents affected | 50 | Caps the blast radius of any single reclassification |
| Decay factor | 0.85 per hop | Score impact diminishes with distance from the source agent |
| Eligibility | Existing trust relationships only | Only affects team members and fleet peers with prior interactions |
40 * 0.85 = 34 points in the Coherence Compatibility component. Agent C (2 hops away) sees 40 * 0.85^2 = 28.9 points. Agent D (4 hops away) is beyond the maximum depth and is unaffected.
Propagation only affects the Coherence Compatibility component (10% of total score). It does not modify other agents’ Integrity Ratio, Compliance, Drift Stability, or Trace Completeness scores. Those components are based solely on each agent’s own behavioral data.
Score Recovery Mechanics
Reclassification enables trust recovery by excluding card gap violations from the score components they would otherwise penalize.What Changes After Reclassification
| Score Component | Effect of card_gap Reclassification |
|---|---|
| Compliance (20%) | Card gap violations are excluded from the session-capped violation sum. The compliance score is recomputed without them. |
| Drift Stability (20%) | Sessions that were marked unstable solely due to card gap violations are reclassified as stable. |
| Integrity Ratio (40%) | Not directly affected. Integrity checkpoints are independently evaluated by the daimonion. |
| Trace Completeness (10%) | Not affected. Trace coverage is independent of violation type. |
| Coherence Compatibility (10%) | May be indirectly affected through trust graph propagation. |
Recovery Boundaries
Score recovery is bounded and specific:- Only the specific reclassified violations are excluded, not all violations
- The agent’s score recovers on the next hourly recomputation cycle
- Recovery is proportional to how much the reclassified violations were depressing the score
- If the agent has other
behavior_gapviolations, those continue to count against the score
Session Re-Proofing
When a reclassification includes a card amendment, affected sessions are re-verified against the updated card. This is not just a score adjustment — the sessions are actually re-evaluated to determine whether they now pass.How Re-Proofing Works
- Identify affected sessions — The system finds all sessions that contain the reclassified violation. These are sessions where the agent used the capability that was missing from the original card.
- Re-verify against updated card — Each affected session is verified against the amended card. The same verification logic runs, but with the new card that includes the previously missing capability.
-
Update session status — Sessions that now pass verification are updated from
failedtopassed. Sessions that still fail (due to other violations) retain theirfailedstatus. - Record in audit trail — Every re-proofing action is recorded: which session, which card version was used, the previous result, and the new result.
OTel Reclassification Events
Reclassification emits OpenTelemetry spans for observability integration. These spans provide structured data about every reclassification event for monitoring dashboards, alerting pipelines, and audit systems.Span: reclassification.process
Emitted when a reclassification is processed:
| Attribute | Type | Description |
|---|---|---|
reclassification.agent_id | string | The agent whose violation was reclassified |
reclassification.checkpoint_id | string | The integrity checkpoint containing the violation |
reclassification.original_type | string | Original violation type (e.g., UNMAPPED_TOOL, CAPABILITY_MISMATCH) |
reclassification.new_type | string | Reclassified type: card_gap or behavior_gap |
reclassification.reason | string | Operator-provided reason for the reclassification |
reclassification.card_amendment_id | string | Linked card amendment ID (empty if not linked) |
reclassification.score_before | int | Agent’s trust score before recomputation |
reclassification.score_after | int | Agent’s trust score after recomputation |
Example OTel Export
Compliance Export
For audit trails and regulatory compliance, the compliance export endpoint provides a complete, tamper-evident record of an agent’s lifecycle.What the Export Includes
| Section | Contents |
|---|---|
| Violations | All violations with original type, reclassified type (if applicable), severity, and timestamp |
| Reclassifications | Every reclassification with reason, operator, linked amendment, and score impact |
| Card amendments | Full amendment history with diffs, reasons, and linked reclassifications |
| Score history | Weekly score snapshots with component breakdowns |
| Session results | Verification results for all sessions, including re-proofing outcomes |
Tamper Evidence
The compliance export is cryptographically linked to the agent’s integrity certificate chain. Each record in the export references a certificate hash, enabling independent verification that the data has not been modified since it was recorded.See Also
- Alignment Cards — Card structure and schema
- Policy Engine — How policies detect violations
- Trust Recovery Guide — Step-by-step recovery workflow
- Reputation Scores — How scores are computed
- Reclassification API — API reference