Templates
5
Agent policy guide
Author policies that tell product, engineering, QA, security, and support agents exactly what they may do, which approvals are needed, which actions are blocked, when to escalate, and what audit evidence must exist before work is trusted.
Templates
5
Scope rules
8
Validation rules
6
Troubleshooting
5
Policy templates
Templates start from job-specific risk. Each one names the owner, scope, approvals, blocked actions, escalation rules, and audit outcomes expected before the agent can execute.
Converts product intent into scoped issues, dependencies, acceptance criteria, and launch notes.
Escalates: Conflicting priorities, Unclear requirements, Launch-blocking gap
Implements assigned issues with code, tests, local docs, and review evidence.
Escalates: Failing required tests, Missing context, Unsafe migration, Permission mismatch
Validates browser journeys, acceptance checks, regression risk, and evidence quality.
Escalates: Flaky test, Missing acceptance criteria, Uncovered critical journey
Reviews auth, export, token, audit, tenant boundary, and policy exception risk.
Escalates: Data exposure risk, Tenant isolation ambiguity, Missing audit trail, Unreviewed secret path
Routes support intake, severity, account recovery, billing questions, and customer-safe replies.
Escalates: S0 or S1 impact, Legal or security concern, Billing dispute, Unclear requester authority
Scopes and controls
| Scope | Authoring rule | Validation rule | Audit evidence |
|---|---|---|---|
| Workspace | Name the workspace and role boundary before the agent can act. | Missing workspace or broad all-workspace language blocks activation. | Workspace ID, role, policy version, and author. |
| Project | Limit work to named projects or milestones. | Unknown project, archived project, or cross-workspace reference blocks activation. | Project ID, milestone, and linked issue IDs. |
| Issue | Bind execution to assigned issues and task contracts. | Agents cannot act on unrelated issues without a new approval request. | Issue ID, task contract version, claim, and lease window. |
| Tool | List allowed tools and denied tools separately. | Any requested tool outside the allowlist is rejected before execution. | Tool grant, requested action, denial or approval, and reviewer. |
| Environment | Separate local, preview, staging, and production permissions. | Production action requires explicit environment approval. | Environment, deploy or run ID, approval, and rollback reference. |
| Data | Define safe data classes, redaction, exports, retention, and customer boundaries. | Secrets, payment data, and private workspace content require stricter controls. | Data class, redaction decision, export ID, and retention note. |
| Billing | Name allowed billing reads and blocked billing mutations. | Refunds, plan changes, and invoice changes require human approval. | Stripe object reference, support issue, approver, and summary. |
| Audit | Define which events must be emitted for policy decisions. | Missing audit outcome blocks policy approval. | Event type, actor, policy version, affected resource, and request ID. |
Validation and troubleshooting
Policy has no accountable owner or backup owner.
Fix: Assign a human policy owner before the policy can be used by an agent.
Policy scope is broader than the workspace role, project, issue, environment, or plan allows.
Fix: Narrow scope to named resources before adding permissions.
Risky action, export, production, billing, or security work lacks required approval.
Fix: Add the required approval owner or block the action until approval exists.
An action appears in both allowed and blocked sections.
Fix: Remove the action from one section and record the decision in audit outcomes.
A trigger exists without a named human escalation owner.
Fix: Assign the human owner and response expectation before activation.
Policy omits actor, resource, request ID, policy version, or evidence link.
Fix: Add the missing audit field and verify it is emitted by the workflow.
Need help?
Keep the policy owner, assigned agent, workspace, issue ID, policy version, request ID, and redacted examples available before asking for help.