Trust Recovery via Reclassification
When an agent’s trust score drops due to violations, the cause matters. Not every violation reflects a genuine behavioral failure — sometimes the agent acted correctly but the alignment card was missing a capability. These are card gaps, and they can be recovered through reclassification. This guide walks through the full recovery workflow: identifying whether a violation is a card gap or a behavior gap, submitting a reclassification request, amending the alignment card, and triggering score recomputation.Understanding card_gap vs behavior_gap
Before reclassifying a violation, you need to determine its root cause. Violations fall into two categories, and only one is eligible for reclassification.- card_gap
- behavior_gap
The alignment card was outdated or incomplete. The agent behaved correctly given its actual capabilities, but the card did not declare those capabilities.Common causes:
- New tools added without updating the card — e.g., added MCP browser tools but the card did not declare
web_fetchinbounded_actions - Configuration drift after deployment changes — infrastructure updates introduced new action types the card did not anticipate
- Incomplete initial card setup — the card was created from a template and never customized to match the agent’s real toolset
mcp__browser__navigate to fetch documentation during a research task. The card lists bounded_actions: ["inference", "read", "write"] but does not include web_fetch. The integrity checkpoint flags a boundary violation — but the agent did exactly what it was supposed to do. The card was wrong, not the agent.Eligible for reclassification: Yes.Reclassification Workflow
curl https://api.mnemom.ai/v1/agents/{agent_id}/reclassifications \
-H "Authorization: Bearer $API_KEY"
Or check policy evaluation results — the policy engine often surfaces
card_gap hints in its recommendations:curl https://api.mnemom.ai/v1/agents/{agent_id}/policy/resolved \
-H "Authorization: Bearer $API_KEY"
concern_type is autonomy_violation or boundary_violationbounded_actions or escalation_triggers did not cover the actionOnly violations classified as
card_gap are eligible for reclassification. Attempting to reclassify a genuine behavior_gap will be rejected by the API and may flag the agent for review.Submit a reclassification for each checkpoint that was a card gap. Include a clear reason documenting why this was a card issue, not a behavioral one.
The API returns a reclassification record with a unique ID and status. Reclassifications take effect immediately for score computation purposes.
Reclassification removes the penalty for past violations, but without updating the card, the same violation will recur on the next checkpoint. Always amend the card alongside reclassification.
curl -X PATCH https://api.mnemom.ai/v1/agents/{agent_id}/card \
-H "Authorization: Bearer $API_KEY" \
-H "Content-Type: application/json" \
-d '{
"autonomy_envelope": {
"bounded_actions": ["inference", "read", "write", "web_fetch", "web_search"]
}
}'
curl -X POST https://api.mnemom.ai/v1/agents/{agent_id}/reclassify \
-H "Authorization: Bearer $API_KEY" \
-H "Content-Type: application/json" \
-d '{
"checkpoint_id": "ic-abc12345",
"reason": "Card gap: web_fetch missing from bounded_actions",
"card_amendment_id": "amend-xyz789"
}'
Reclassifying without amending the card is a common mistake. The violation is forgiven, but the next checkpoint with the same action will produce a new violation. Always close the gap.
After reclassification and card amendment, trigger a score recomputation to reflect the changes immediately. Without this step, the score updates on the next scheduled recomputation cycle.
curl -X POST https://api.mnemom.ai/v1/reputation/{agent_id}/recompute \
-H "Authorization: Bearer $API_KEY"
The recomputation recalculates all five scoring components (Integrity Ratio, Compliance, Drift Stability, Trace Completeness, and Coherence Compatibility) using the updated violation classifications.
Score changes do not stop at the reclassified agent. If the agent is part of a team or fleet, score changes propagate through the trust graph to related agents.
curl -X POST https://api.mnemom.ai/v1/orgs/{org_id}/webhooks \
-H "Authorization: Bearer $API_KEY" \
-H "Content-Type: application/json" \
-d '{
"url": "https://your-server.com/webhooks/mnemom",
"event_types": ["reputation.score_changed", "reputation.grade_changed"]
}'
After recovery, export the full compliance record for audit purposes. The export includes the original violations, reclassification decisions, card amendments, and score history.
curl https://api.mnemom.ai/v1/agents/{agent_id}/compliance-export \
-H "Authorization: Bearer $API_KEY"
Best Practices
Reclassify promptly
Violations continue to impact scores until reclassified. The longer a card-gap violation sits unaddressed, the more it drags down the Compliance and Integrity components.
Always amend the card
Reclassification without a card amendment is incomplete. The same action will trigger the same violation on the next checkpoint. Close the loop.
Use policy recommendations
The policy engine surfaces systematic card gaps in its recommendations. Review
policy/resolved output regularly to catch gaps before they become violations.Document reasons clearly
Reclassification reasons are stored in the audit trail. Write reasons that a reviewer (human or automated) can understand months later.
Review history before publishing
Before publishing a new card version, review reclassification history to ensure all known gaps are addressed in the updated card.
Test with smoltbot policy
Use
smoltbot policy test to catch card gaps before they become violations. Run this in CI after any card or tool configuration change.See Also
- Card Lifecycle — How cards evolve over time
- Reputation Scores — Score computation methodology
- Reclassification API — Full API reference for reclassification endpoints
- Card Management — Creating, validating, and publishing alignment cards
- Policy Management — Policy setup and configuration