CI/CD Policy Gates
Policy gates prevent misconfigurations from reaching production. By embedding policy checks directly into your CI/CD pipeline, you catch violations before they affect live agent traffic — not after. There are two types of gates:- Static validation —
smoltbot policy validatechecks schema correctness. It is fast, offline, and makes no API calls. - Policy evaluation —
smoltbot policy evaluatechecks the policy against live agent data. It requires an API key and network access.
0 on pass, 1 on failure. This means any CI system that interprets exit codes (GitHub Actions, GitLab CI, Jenkins, CircleCI, etc.) will correctly pass or fail the pipeline step.
Static Validation Gate
Static validation checks that yourpolicy.yaml conforms to the Policy DSL schema without making any API calls. This makes it fast, safe to run on every pull request, and suitable for environments without API credentials.
Static validation catches structural errors — missing required fields, invalid enum values, malformed glob patterns, and schema version mismatches. It does not verify that capability mappings reference real tools or that coverage is adequate. Use policy evaluation for that.
- GitHub Actions
- GitLab CI
policy.yaml or files under policies/ change, keeping CI fast for unrelated pull requests.Policy Evaluation Gate
Policy evaluation goes beyond schema validation. It evaluates your policy against the agent’s actual state — checking capability mapping coverage, verifying that referenced tools exist, and scoring the policy against recent traces. This requires an API key.- GitHub Actions
- GitLab CI
main, making it a pre-deploy gate. The MNEMOM_API_KEY is read from GitHub Secrets and exposed as an environment variable.Exit Codes and Error Handling
Bothpolicy validate and policy evaluate use standard exit codes that CI systems interpret automatically:
| Exit Code | Meaning | CI Behavior |
|---|---|---|
0 | All checks pass | Pipeline continues |
1 | Validation or evaluation failures | Pipeline fails |
1, the pipeline step fails, and downstream steps (like deployment) are skipped.
JSON Output for CI
Use--format json to get machine-readable output for programmatic parsing in complex pipelines:
Combining with Reputation Gates
For comprehensive pre-deploy checks, combine policy gates with reputation gates. Policy gates verify that your governance configuration is correct. Reputation gates verify that your agent’s trust score meets your organization’s threshold. Together, they ensure both policy correctness and operational trustworthiness before code reaches production.The
reputation-gate job uses the mnemom/reputation-check@v1 GitHub Action, which is a standalone action that checks the agent’s reputation score against a minimum threshold. See Embeddable Trust Badges for full configuration options.Setting Up the Full Pipeline
Here is a complete end-to-end workflow that validates on every PR and evaluates on merge tomain:
In GitHub, go to Settings > Secrets and variables > Actions, then add
MNEMOM_API_KEY with your API key. In GitLab, go to Settings > CI/CD > Variables and add it there with the “Masked” option enabled.Add a workflow file that runs static validation on every pull request that modifies policy files. This catches schema errors before code review.
Add a second workflow file that runs policy evaluation on pushes to
main. This confirms the policy is valid against the live agent state before deployment proceeds.If your organization enforces minimum trust scores, add the
mnemom/reputation-check action as a parallel job in your deploy workflow.Best Practices
- Run validation on every PR that touches policy files. Static validation is fast and catches the most common mistakes before human review begins.
- Run evaluation on main branch merges (pre-deploy). Evaluation confirms the policy works against real agent data, not just schema correctness.
- Store policy.yaml in version control alongside application code. This gives you diff visibility, rollback capability, and a clear audit trail for every policy change.
- Use
--format jsonfor programmatic parsing in complex pipelines. JSON output integrates cleanly withjq, custom scripts, and downstream CI steps. - Set up notifications for evaluation failures. Route CI failures to Slack, email, or your incident management tool so the team responds quickly.
- Keep validation fast by running it first. Since static validation needs no API call, it should always be the first gate. If it fails, there is no reason to run the slower evaluation step.
See Also
- Policy CLI Reference — CLI command details for
validate,evaluate,test, andpublish - Policy Management — Full policy workflow from init to publish
- Policy DSL Specification — Schema reference for
policy.yaml - Embeddable Trust Badges — GitHub Action for reputation gates