Alignment Card Management
Alignment Cards are structured declarations of your agent’s values, boundaries, and behavioral commitments. Every agent connected via smoltbot gets a default card automatically — but that default card uses generic values and minimal autonomy. It does not represent what your agent actually does or cares about. Customizing your card is how you make alignment verification meaningful. A card that accurately reflects your agent’s real values and tools produces useful integrity scores. A generic card produces noise.Creating a Card
An alignment card is a structured document that follows the AAP specification. You can author cards in JSON or YAML — the API accepts both formats and stores cards as JSON internally.Start from the Template
Every card requires five blocks: identity, principal, values, autonomy envelope, and audit commitment.- JSON
- YAML
Choose Values
Select from the standard value identifiers and add custom values as needed:| Standard Identifier | Description |
|---|---|
principal_benefit | Prioritize principal’s interests |
transparency | Disclose reasoning and limitations |
minimal_data | Collect only necessary information |
harm_prevention | Avoid actions causing harm |
honesty | Do not deceive or mislead |
user_control | Respect user autonomy and consent |
privacy | Protect personal information |
fairness | Avoid discriminatory outcomes |
definitions entry:
Define Autonomy Envelope
List the actions your agent actually takes asbounded_actions. These should match your agent’s real tools and capabilities:
named_entity_critical, purchase_value > 100, shares_personal_data.
Forbidden actions are semantic identifiers, not prose descriptions. Use concrete action names like delete_without_confirmation, not vague phrases like “harmful behavior”.
Set Audit Commitment
Declare how your agent logs decisions and whether external parties can query traces:Full Example: Customer Support Agent
- JSON
- YAML
Publishing via CLI
Run local validation to check AAP spec compliance before publishing. The CLI accepts both JSON and YAML files:
This checks required blocks, value definitions, bounded actions, escalation trigger evaluability, and expiry dates. Exit code 0 means the card is valid; exit code 1 means there are errors.
The CLI validates again before uploading, asks for confirmation, and optionally re-verifies existing traces against the new card.
# GitHub Actions example
- name: Validate alignment card
run: npx smoltbot card validate alignment-card.json
Publishing via Dashboard
Open the Mnemom dashboard and select your agent from the agents list.
Scroll to the Alignment Card panel on the agent page. Your current card (or the default) is displayed here.
Switch between the Visual editor (form-based, guided), JSON editor (raw JSON), and YAML editor (YAML with comments) using the tabs at the top of the card panel.
Make your changes, then click Save. The dashboard validates the card before saving and shows any errors inline.
Publishing via API
Update your agent’s alignment card directly with aPATCH request:
Organization Card Templates (Enterprise)
Organization card templates require an Enterprise plan. Contact sales to enable this feature.
How Composition Works
When an org template is active, the canonical card for each agent is computed by composing the org template with the agent’s individual card:- Values: Org values are always included. Agent values are added on top. Agents cannot remove org values.
- Forbidden actions: Org forbidden actions are always included. Agents can add more but cannot remove any.
- Bounded actions: Agent-specific. The org template does not restrict which actions an agent can take.
- Escalation triggers: Org triggers are always included. Agents can add more.
- Audit commitment: Org audit commitment is the floor. Agents can increase retention or add capabilities but cannot weaken audit requirements.
Setting Up
- Navigate to Organization Settings in the dashboard
- Open the Alignment Card Template section
- Enable the org template toggle
- Configure your base card using the visual or JSON editor
- Save — all agents in the org immediately inherit the template
Agent Exemptions
In rare cases, an agent may need to be exempt from the org template. Exemptions require:- A double-confirm flow in the dashboard (confirm intent, then confirm again with reason)
- A written reason that is stored in the audit trail
- Owner or admin role
Validation Rules
Reference table of all validation checks performed duringsmoltbot card validate and on publish:
| Check | Rule | Severity |
|---|---|---|
| Valid JSON/YAML | Must parse without errors | Error |
| Required blocks | principal, values, autonomy_envelope, audit_commitment must be present | Error |
| Non-empty values | values.declared must have at least one entry | Error |
| Custom definitions | Every non-standard value must have a definitions entry | Warning |
| Bounded actions | Must list at least one action | Error |
| Evaluable triggers | Condition must be a single-token identifier or comparison expression | Warning |
| Expiry | expires_at must be in the future | Error |
Warnings do not prevent publishing but are reported in validation output. Fix warnings to improve verification quality.
Policy Integration
Alignment cards and policies work together. The card declares what an agent can do (bounded_actions), while the policy defines which tools map to those capabilities:- Card defines capabilities: Your card’s
bounded_actionslists semantic categories likeweb_fetch,read,write - Policy maps tools: Your policy maps concrete tool names (like
mcp__browser__*) to those card categories - Evaluation bridges both: The policy engine checks that every tool the agent uses maps to a declared bounded action
bounded_actions) and the policy (add the tool-to-capability mapping). The 24-hour grace period gives you time to make these updates after new tools are first observed.
Amendment Tracking
Every card update creates a formal amendment with version history and diffs. Amendments can be linked to reclassification requests — proving that a violation was caused by a card gap rather than agent misbehavior. See Card Lifecycle for details.Best Practices
Version control your cards
Keep alignment card files (JSON or YAML) in your repository alongside your agent code. Use
smoltbot card validate in CI to catch issues before deploy.Match bounded actions to real tools
Your
bounded_actions list should reflect your agent’s actual tools and capabilities. Adding actions the agent never takes produces noise; missing actions the agent does take produces false violations.Set meaningful expiry dates
A 6-month expiration is typical. Shorter lifetimes increase operational overhead; longer lifetimes risk the card becoming stale relative to actual behavior.
Use escalation triggers for real decisions
Escalation triggers are the card’s most actionable component. Define triggers for situations where your agent genuinely needs human approval, not aspirational conditions.
Define custom values precisely
Every custom value needs a clear
description in the definitions block. Vague definitions lead to inconsistent verification results.Review cards after capability changes
When you add or remove tools from your agent, update the alignment card and policy to match. Stale cards produce misleading integrity scores.
Related
- Alignment Cards concept — Full specification of card structure and semantics
- Card Lifecycle — Amendment tracking, reclassification, and trust recovery
- Policy Management — Policy setup alongside card management
- CLI Reference —
smoltbot card show,card publish, andcard validatecommands - Organization Card Templates — Org-level card policies (Enterprise)
- AAP Specification — Normative protocol specification