Skip to main content

Workstream 01: Trust Boundaries

Status On develop

  • Workstream 01 is only partially shipped on develop.

Paired Research

Shipped On develop

  • tool policy modes for safe, balanced, and full
  • MCP access modes for disabled, approval, and full
  • approval gates for high-risk actions in chat and WebSocket flows
  • structured audit logging for tool calls, tool results, approvals, and runtime events
  • secret egress redaction for surfaced responses and errors
  • vault CRUD with audit visibility
  • session-scoped secret references for safer downstream tool usage
  • explicit execution-boundary metadata and approval behavior surfaced for tools and reusable workflows
  • forced approval wrapping for reusable workflows that cross high-risk or approval-mode MCP boundaries
  • approval records now preserve fingerprints, resume context, and thread labels so replay and resume surfaces can recover safely instead of guessing the target thread

Working On Now

  • this workstream has now shipped both execution-safety-hardening-v1 and execution-safety-hardening-v2
  • explicit secret-reference containment now blocks raw secret injection into non-injection-safe tools while leaving MCP and future explicit injection surfaces available
  • this workstream now also ships execution-safety-hardening-v5
  • reduce reliance on raw secret retrieval in favor of narrower secret-injection paths

Still To Do On develop

  • tighten isolation between planning, privileged execution, approval replay, and future workflow layers beyond the current metadata and recovery hardening passes
  • add deeper policy distinctions inside MCP and external execution paths
  • keep trust UX strict without making approvals noisy or unusable

Non-Goals

  • a fake sense of safety based only on prompt instructions
  • broadening high-risk execution before policy paths are clear

Acceptance Checklist

  • privileged reusable workflows now expose an explicit policy path through approval behavior and execution-boundary metadata
  • high-risk actions are pauseable and resumable with audit visibility
  • secret references are now scoped to explicit injection-safe execution surfaces instead of resolving across the whole tool surface
  • secret use is fully scoped and auditable end to end