Policy Management
Policies bridge Alignment Cards (abstract values and bounded actions) to concrete tool usage enforcement. An alignment card declares that an agent may performweb_fetch. A policy defines that web_fetch means the agent can call mcp__browser__navigate and mcp__browser__click, but not mcp__filesystem__delete. The card declares intent. The policy enforces it.
A policy defines three things:
- Capability mappings — which concrete MCP tools satisfy which card-level actions
- Forbidden rules — which tools are always blocked, with reasons and severities
- Defaults — how unmapped tools are handled, what enforcement mode to use, and how long new tools get a grace period
Quick Start
This creates a
policy.yaml in your current directory with sensible defaults and annotated examples for every section.Open the generated file and define your capability mappings, forbidden rules, and defaults. Here is a fully annotated example for a customer support agent:
meta:
schema_version: "1.0"
name: "support-agent-policy"
description: "Policy for customer support agents"
scope: agent
capability_mappings:
web_browsing:
description: "Browser-based research and navigation"
tools:
- "mcp__browser__*"
card_actions:
- "web_fetch"
- "web_search"
file_operations:
description: "Reading and writing local files"
tools:
- "mcp__filesystem__read*"
- "mcp__filesystem__write*"
card_actions:
- "read"
- "write"
communication:
description: "Sending messages and notifications"
tools:
- "mcp__slack__post_message"
- "mcp__email__send"
card_actions:
- "send_response"
forbidden:
- pattern: "mcp__filesystem__delete*"
reason: "File deletion not permitted for support agents"
severity: critical
- pattern: "mcp__admin__*"
reason: "Administrative operations require escalation"
severity: high
escalation_triggers:
- condition: "tool_matches('mcp__payment__*')"
action: escalate
reason: "Payment operations require human approval"
defaults:
unmapped_tool_action: warn
unmapped_severity: medium
fail_open: true
enforcement_mode: warn
grace_period_hours: 24
The
scope: agent field means this policy layers on top of any org-level policy. Use scope: org for organization-wide baselines that apply to all agents. See Policy Merge for how the two levels combine.Run local validation to check schema compliance before publishing. This is a local-only check with no API call — safe for CI pipelines:
Exit code
0 means the policy is valid. Exit code 1 means there are errors. Fix any reported issues before proceeding.Dry-run the policy against your agent’s recent traces to see what violations would have been flagged:
This analyzes recent traces and reports which would pass, warn, or fail under the new policy. Use
--limit to control how many traces to test:Always run
policy test before publishing. A policy that looks correct in isolation can produce unexpected violations when evaluated against real agent behavior. Testing first shows you the impact before it affects live traffic.Capability Mapping Walkthrough
Capability mappings are the core of every policy. They bridge the gap between what your alignment card declares (abstract semantic actions) and what your agent actually invokes (concrete MCP tool names).Start from your alignment card
Look at your card’sautonomy_envelope.bounded_actions. These are the abstract actions your agent has declared:
Identify concrete tools
List the MCP tools your agent actually uses. If you are unsure, check your agent’s recent traces:mcp__browser__navigate, mcp__browser__click, mcp__filesystem__read_file, and so on.
Create the mappings
For each card action, create a capability mapping that lists the concrete tools implementing it:web_fetch and web_search as bounded actions. The agent uses mcp__browser__navigate, mcp__browser__click, and mcp__browser__screenshot to perform those actions. The glob pattern mcp__browser__* covers all of them.
Use glob patterns for tool families
Glob patterns let you match groups of related tools without listing each one:| Pattern | Matches |
|---|---|
mcp__browser__* | All browser tools (navigate, click, screenshot, etc.) |
mcp__filesystem__read* | read_file, read_directory, read_metadata |
mcp__*__list* | Any MCP server’s list operations |
custom_tool_v? | custom_tool_v1, custom_tool_v2, etc. |
Verify coverage
After writing your mappings, check that every card action is covered:API-Based Management
Manage policies programmatically via the REST API or SDKs.Set Agent Policy
Get Agent Policy
Get Resolved Policy (org + agent merged)
The resolved policy shows the effective policy after merging the org-level baseline with the agent-level overlay:Evaluate Policy
Test a set of tools against the active policy without making a real agent request:pass, warn, or fail) and details for each tool: whether it matched a capability mapping, hit a forbidden rule, or fell through to defaults.
Multi-Environment Strategies
Separate policies per environment
Use different enforcement modes across environments to catch issues progressively:- Development
- Staging
- Production
In development, keep enforcement loose so agents can explore new tools without blocking:
Org-level baseline, agent-level specialization
Usescope: org for organization-wide security rules that apply to every agent. Use scope: agent for per-agent customizations that add capabilities on top of the org baseline.
The merge rules ensure agents can strengthen but never weaken org-level policy:
| Section | Merge Strategy | Effect |
|---|---|---|
capability_mappings | Union | Agent can add new mappings but cannot remove org mappings |
forbidden | Union | Both org and agent forbidden rules are enforced |
defaults | Org is floor | Agent can strengthen (e.g., warn to deny) but cannot weaken |
escalation_triggers | Union | Both org and agent triggers are evaluated |
Version control your policies
Keeppolicy.yaml files alongside your agent code in version control. This gives you:
- Diff visibility — every policy change is reviewed in a pull request
- Rollback capability — revert to a previous policy by reverting the commit
- CI gating — validate and test policies automatically on every push
Using Policy Recommendations
The Intelligence Layer can analyze your team’s fault lines and generate policy recommendations based on observed agent behavior, common violation patterns, and alignment card structure.Generate a recommendation
- Capability mappings derived from observed tool usage patterns
- Forbidden rules based on detected violations and near-misses
- Escalation triggers from historical escalation patterns
- Recommended enforcement mode based on team maturity
Policy recommendations are a starting point, not a final policy. Always review the generated policy, adjust mappings to match your specific agent architecture, and test against historical traces before publishing.
Review and customize
The recommendation includes confidence scores for each section. Focus your review on low-confidence mappings where the system was uncertain about the correct card action mapping:Best Practices
Start with warn mode
Begin with
enforcement_mode: warn to observe what your policy catches without blocking agent traffic. Graduate to enforce after testing confirms the policy matches your expectations.Test before publishing
Always run
smoltbot policy test before smoltbot policy publish. Testing against historical traces shows you the real-world impact of your policy before it affects live requests.Align mappings with card actions
Keep capability mappings tightly aligned with your alignment card’s
bounded_actions. Every card action should have a corresponding mapping, and every mapping should reference a real card action.Aim for >90% coverage
Review coverage reports regularly. Unmapped card actions fall through to defaults, which may not match your intent. Target 100% coverage in production policies.
Use the grace period
The default 24-hour grace period prevents new tools from immediately becoming violations. This gives you time to update the policy after adding new MCP servers or tools.
Version control policies
Store
policy.yaml in your repository alongside agent code. Use CI validation to catch policy issues before deploy and maintain a clear audit trail of every change.See Also
- Policy Engine — How the policy engine evaluates tools against policies
- Policy DSL Specification — Full normative schema for policy YAML files
- Policy CLI Reference — CLI commands for init, validate, test, publish, and evaluate
- CI/CD Policy Gates — Integrating policy checks into your deployment pipeline
- Alignment Card Management — Creating and managing the alignment cards that policies enforce
- Enforcement Modes — Alignment enforcement (observe/nudge/enforce) vs. policy enforcement