Server Details
Agentic identity trust: precision decisioning, cryptographic release tokens, hash-chained proof
- Status
- Healthy
- Last Tested
- Transport
- Streamable HTTP
- URL
- Repository
- ndl-systems/kevros-sdk
- GitHub Stars
- 1
See and control every tool call
Available Tools
359 toolsgovernance_active_schedulesInspect
Get currently active scheduled policies.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_add_group_memberInspect
Add an agent to a group.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to add | |
| group_id | Yes | Group ID |
governance_add_org_memberInspect
Add an agent to an organization.
| Name | Required | Description | Default |
|---|---|---|---|
| role | No | Member role | member |
| org_id | Yes | Organization ID | |
| agent_id | Yes | Agent ID to add |
governance_add_timeline_eventInspect
Add a compliance timeline event.
| Name | Required | Description | Default |
|---|---|---|---|
| severity | No | Severity (info, warning, critical) | info |
| event_type | Yes | Event type (policy_review, access_audit, training_completed, etc.) | |
| description | No | Event description | |
| is_milestone | No | Whether this is a milestone event |
governance_advance_playbook_stepInspect
Advance a playbook execution to the next step.
| Name | Required | Description | Default |
|---|---|---|---|
| result | No | Step result | success |
| playbook_id | Yes | Playbook ID |
governance_advance_workflow_stepInspect
Advance a workflow to the next step.
| Name | Required | Description | Default |
|---|---|---|---|
| result | No | Step result | success |
| agent_id | No | Agent advancing the step | |
| workflow_id | Yes | Workflow ID |
governance_agent_communicationsInspect
Get all communications involving an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID | |
| direction | No | Direction filter: both, outgoing, incoming | both |
governance_agent_complianceInspect
Get per-agent compliance scorecard: decision rates, trust score, intent closure, delegation status, anomalies.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to generate compliance report for |
governance_agent_heartbeatInspect
Report an agent heartbeat with optional metadata.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID reporting heartbeat | |
| metadata | No | JSON metadata (cpu, memory, etc.) | {} |
governance_agent_profileInspect
Get the behavioral profile for a governance agent. Shows action type distribution, payload field patterns, decision rates, temporal activity, and per-action conformance. Use for investigation, ML features, and audit context. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to get profile for |
governance_agent_quotaInspect
Get per-agent rate limit and quota analytics. Shows current usage (minute/hour/total), remaining quota, configured limits, and per-operation-type breakdown. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to check quota for |
governance_analytics_compareInspect
Compare governance metrics between two time periods.
| Name | Required | Description | Default |
|---|---|---|---|
| period_a_end | Yes | Period A end ISO timestamp | |
| period_b_end | Yes | Period B end ISO timestamp | |
| period_a_start | Yes | Period A start ISO timestamp | |
| period_b_start | Yes | Period B start ISO timestamp |
governance_analytics_summaryInspect
Get overall governance analytics summary.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_analytics_trendsInspect
Get governance decision trend indicators.
| Name | Required | Description | Default |
|---|---|---|---|
| window | No | Number of recent records to analyze |
governance_anomaly_alertsInspect
Get recent anomaly alerts from the drift detector. Filters by agent_id and/or severity (low/medium/high/critical). Returns alerts with z-scores, baseline vs current rates, and messages. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max alerts to return | |
| agent_id | No | Filter alerts by agent ID | |
| severity | No | Filter by severity: low/medium/high/critical |
governance_anomaly_baselineInspect
Get the decision anomaly baseline for an agent. Shows historical decision distribution, current sliding window, and anomaly detection thresholds. Use before investigating drift alerts. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to get baseline for |
governance_apply_change_requestInspect
Apply an approved change request.
| Name | Required | Description | Default |
|---|---|---|---|
| cr_id | Yes | Change request ID |
governance_approve_change_requestInspect
Approve a governance change request.
| Name | Required | Description | Default |
|---|---|---|---|
| cr_id | Yes | Change request ID | |
| comment | No | Approval comment | |
| reviewer_id | Yes | Reviewer ID |
governance_approve_enrollmentInspect
Approve an agent enrollment request.
| Name | Required | Description | Default |
|---|---|---|---|
| approved_by | No | Approver ID | system |
| enrollment_id | Yes | Enrollment ID |
governance_approve_gateInspect
Approve a deployment gate.
| Name | Required | Description | Default |
|---|---|---|---|
| gate_id | Yes | Gate ID | |
| approver | No | Approver ID | system |
governance_artifact_attestationInspect
Link a software artifact to a governance decision for supply chain traceability.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent creating the attestation | |
| description | No | Description of the artifact | |
| artifact_type | No | Artifact type: container, git, firmware, binary | container |
| build_metadata | No | JSON object with build info (builder, commit, pipeline_id) | {} |
| decision_epoch | No | Governance decision epoch to link (0=none) | |
| artifact_hashes | No | JSON object of hash_type:hash_value pairs | {} |
governance_artifact_chainInspect
Get the full provenance chain for a software artifact.
| Name | Required | Description | Default |
|---|---|---|---|
| artifact_hash | Yes | Artifact hash to look up (e.g. sha256:abc123) |
governance_assess_riskInspect
Assess risk for an agent action.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID | |
| base_risk | No | Base risk 0-1 | |
| action_type | Yes | Action type |
governance_attestInspect
Create a hash-chained provenance record for an action you've taken. Each attestation extends the append-only evidence chain. The hash can be independently verified by any third party. Cost: $0.02 per call.
| Name | Required | Description | Default |
|---|---|---|---|
| context | No | Optional metadata such as environment, trigger, or session info | |
| agent_id | Yes | Unique identifier of the attesting agent | |
| action_payload | Yes | Structured data describing the action (hashed into provenance) | |
| action_description | Yes | Human-readable description of the action taken |
governance_audit_diffInspect
Compare original decision at epoch vs what current policy would decide.
| Name | Required | Description | Default |
|---|---|---|---|
| epoch | Yes | Decision epoch to compare |
governance_audit_summaryInspect
Get comprehensive audit summary for certifier review — decisions, chain, agents, intents, anomalies, PQC, policies.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_batchInspect
Execute up to 100 governance operations (verify, attest, bind) in a single call. Each operation is executed sequentially with full provenance recording. If stop_on_deny is true, processing halts on the first DENY decision. Returns per-operation results and a summary with integrity hash. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | No | Default agent_id for operations that don't specify one | mcp-batch-agent |
| operations | Yes | List of operations, each with 'type' ('verify'|'attest'|'bind') and 'params' dict | |
| stop_on_deny | No | Stop processing on first DENY decision |
governance_bindInspect
Declare an intent and cryptographically bind it to a command. Proves that the command was issued in service of the declared intent. Use governance_verify_outcome after execution to close the loop. Cost: $0.02 per call.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Unique identifier of the agent declaring intent | |
| goal_state | No | Expected end state for outcome verification | |
| intent_type | Yes | Category of intent (e.g. 'navigation', 'transaction', 'deployment') | |
| intent_source | No | Origin of intent: AI_PLANNER, HUMAN_OPERATOR, or SYSTEM | AI_PLANNER |
| command_payload | Yes | The command that will be executed to fulfill this intent | |
| parent_intent_id | No | ID of parent intent for hierarchical intent chains | |
| intent_description | Yes | Human-readable description of what the agent intends to do |
governance_bridge_transfersInspect
Get transfer history for a trust bridge.
| Name | Required | Description | Default |
|---|---|---|---|
| bridge_id | Yes | Bridge ID |
governance_browse_templatesInspect
Browse available policy templates in the marketplace.
| Name | Required | Description | Default |
|---|---|---|---|
| tag | No | Filter by tag | |
| framework | No | Filter by framework |
governance_bundleInspect
Generate a certifier-grade compliance evidence bundle. Contains hash-chained provenance, intent bindings, PQC attestations, and verification instructions. Independently verifiable without Kevros access. Cost: $0.25 per call.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent whose provenance records to include in the bundle | |
| max_records | No | Maximum number of provenance records to include | |
| time_range_end | No | ISO 8601 end time filter (inclusive) | |
| time_range_start | No | ISO 8601 start time filter (inclusive) | |
| include_intent_chains | No | Include intent-command binding chains in the bundle | |
| include_pqc_signatures | No | Include post-quantum ML-DSA-87 block signatures | |
| include_verification_instructions | No | Include step-by-step verification procedure for auditors |
governance_cache_lookupInspect
Look up a cached decision.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID | |
| action_type | Yes | Action type |
governance_cache_statsInspect
Get decision cache statistics.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_cancel_scheduleInspect
Cancel a scheduled policy.
| Name | Required | Description | Default |
|---|---|---|---|
| schedule_id | Yes | Schedule ID |
governance_capability_registryInspect
List all capability certifications in the registry.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_cascade_revokeInspect
Revoke a delegation and cascade to all sub-delegations.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Reason for revocation | cascade revocation |
| dry_run | No | Preview without executing | |
| delegation_id | Yes | Root delegation ID to revoke |
governance_cast_voteInspect
Cast a vote on a pending consensus decision.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Vote reason | |
| vote_id | Yes | Vote ID | |
| agent_id | Yes | Voting agent ID | |
| decision | No | approve, reject, or abstain | approve |
governance_certify_capabilityInspect
Certify an agent's capability.
| Name | Required | Description | Default |
|---|---|---|---|
| level | No | Certification level | basic |
| agent_id | Yes | Agent ID | |
| capability | Yes | Capability name | |
| test_score | No | Test score |
governance_certify_evidenceInspect
Issue an evidence completeness certificate.
| Name | Required | Description | Default |
|---|---|---|---|
| scope | No | Certification scope | full |
| certifier_id | No | Certifier ID | system |
governance_check_audit_accessInspect
Check if an auditor has access to an agent's governance records.
| Name | Required | Description | Default |
|---|---|---|---|
| epoch | No | Specific epoch to check access for | |
| agent_id | Yes | Agent whose records are accessed | |
| auditor_id | Yes | Auditor requesting access |
governance_check_peerInspect
Check another agent's trust score and provenance history. Returns chain_length, attestation_count, trust_score. Free, no API key needed.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | ID of the peer agent to look up |
governance_check_reversibilityInspect
Check whether a bound intent can be reversed. Analyzes intent type, execution status, child dependencies, and time elapsed to determine if rollback is possible and what constraints apply. Use for pre-abort safety checks, mission planning, and risk assessment. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| intent_id | Yes | The intent ID to check for reversibility | |
| include_children | No | Also check child intents |
governance_classification_statsInspect
Get classification statistics.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_comm_clustersInspect
Identify clusters of frequently communicating agents.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_complete_workflowInspect
Mark a workflow as completed.
| Name | Required | Description | Default |
|---|---|---|---|
| workflow_id | Yes | Workflow ID |
governance_compliance_coverageInspect
Get control coverage for a compliance framework.
| Name | Required | Description | Default |
|---|---|---|---|
| framework | Yes | Framework ID (nist-800-53, cmmc-l2, soc2) |
governance_compliance_dashboardInspect
One-page CISO compliance dashboard with overall score, NIST coverage, and all governance metrics.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_compliance_evidenceInspect
Get live compliance evidence for a specific governance operation with NIST control mapping.
| Name | Required | Description | Default |
|---|---|---|---|
| operation | Yes | Governance operation to assess (e.g. verify, attest, quarantine) |
governance_compliance_mapInspect
Get NIST 800-53 Rev 5 compliance control mapping for governance operations.
| Name | Required | Description | Default |
|---|---|---|---|
| operation | No | Filter by operation (verify, attest, bind, etc.) |
governance_compliance_packageInspect
Generate a certifier-ready compliance evidence package.
| Name | Required | Description | Default |
|---|---|---|---|
| framework | No | Framework ID | nist-800-53 |
| max_records | No | Max sample records | |
| include_records | No | Include sample provenance records |
governance_compose_policiesInspect
Compose multiple policies into a unified policy with conflict resolution.
| Name | Required | Description | Default |
|---|---|---|---|
| policies | Yes | JSON array of policy objects to merge | |
| merge_strategy | No | Merge strategy: strict, permissive, priority | strict |
governance_conclude_ab_testInspect
End an A/B test and declare a winner.
| Name | Required | Description | Default |
|---|---|---|---|
| winner | No | Winning variant (a or b) | a |
| test_id | Yes | A/B test ID to conclude |
governance_configure_cacheInspect
Configure decision cache settings.
| Name | Required | Description | Default |
|---|---|---|---|
| enabled | No | Enable caching | |
| max_entries | No | Max cache entries | |
| ttl_seconds | No | Cache TTL in seconds |
governance_configure_decayInspect
Configure reputation decay parameters.
| Name | Required | Description | Default |
|---|---|---|---|
| min_trust | No | Minimum trust floor | |
| half_life_days | No | Half-life in days |
governance_convert_exportInspect
Convert audit data to a specified format.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max records | |
| format | Yes | Target format (csv, json, sarif) |
governance_correlate_agentsInspect
Analyze cross-agent behavioral correlations. Three modes: temporal (synchronized calls), payload (identical payloads), decision (correlated DENY/CLAMP patterns). Use for fraud investigation and botnet detection. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| mode | No | Analysis mode: temporal, payload, decision, or all | all |
| agent_id | No | Focus on pairs involving this agent | |
| window_seconds | No | Temporal sync window in seconds |
governance_counterfactualInspect
Simulate an action against multiple policies simultaneously. Multi-policy what-if analysis: 'What would happen under each policy?' Returns a decision matrix with consensus detection. Use for policy selection, impact analysis, and sensitivity testing. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | No | Agent ID for historical decision lookup | |
| policies | Yes | List of policies, each with 'template_id' or 'policy_context' and optional 'label' | |
| action_type | No | Action category for context | counterfactual |
| action_payload | Yes | Action to evaluate against multiple policies | |
| include_historical | No | Include what actually happened historically |
governance_create_ab_testInspect
Create a policy A/B test experiment.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | A/B test name | |
| policy_a | No | JSON policy A | {} |
| policy_b | No | JSON policy B | {} |
| traffic_split | No | Traffic split ratio |
governance_create_alert_ruleInspect
Create a governance alert rule.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Alert rule name | |
| metric | No | Metric to monitor | deny_rate |
| channel | No | Notification channel: log, webhook | log |
| condition | No | Condition: gt, lt, gte, lte, eq | gt |
| threshold | No | Threshold value |
governance_create_anchorInspect
Create an integrity anchor point for the audit chain.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_create_archiveInspect
Create an archive summary of provenance records before a given time.
| Name | Required | Description | Default |
|---|---|---|---|
| label | No | Human-readable label for the archive | archive |
| before_utc | Yes | Archive records before this UTC timestamp |
governance_create_attestationInspect
Create a formal compliance attestation.
| Name | Required | Description | Default |
|---|---|---|---|
| scope | No | Scope | full |
| framework | Yes | Compliance framework | |
| required_signatures | No | Required signatures |
governance_create_canaryInspect
Create a canary rollout for a candidate policy with shadow evaluation and divergence tracking.
| Name | Required | Description | Default |
|---|---|---|---|
| label | No | Human-readable label | mcp-canary |
| template_id | No | Template ID to apply canary to (None = all traffic) | |
| traffic_pct | No | Percentage of traffic to shadow-evaluate (1-100) | |
| candidate_policy | Yes | JSON string of candidate policy (e.g. '{"max_values":{"x":5}}'). |
governance_create_change_requestInspect
Create a new governance change request requiring multi-reviewer approval.
| Name | Required | Description | Default |
|---|---|---|---|
| title | Yes | Change request title | |
| change_type | No | Type of change | policy |
| description | No | Description of the change | |
| required_approvals | No | Number of approvals needed |
governance_create_escalation_ruleInspect
Create an auto-escalation rule that triggers on anomaly alerts (auto-quarantine, notify, or both).
| Name | Required | Description | Default |
|---|---|---|---|
| label | No | Human-readable label | mcp-rule |
| action | No | Action to take: notify, quarantine, or quarantine_and_notify | notify |
| min_severity | No | Minimum alert severity to trigger: low, medium, high, critical | high |
| cooldown_seconds | No | Cooldown period between firings in seconds |
governance_create_exceptionInspect
Create a temporary policy exception.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Exception reason | |
| agent_id | Yes | Agent ID | |
| policy_id | Yes | Policy ID to exempt | |
| expires_hours | No | Hours until expiry |
governance_create_gateInspect
Create a deployment gate.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Gate name | |
| environment | No | Target environment | production |
| required_approvals | No | Required approvals |
governance_create_groupInspect
Create an agent group.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Group name | |
| members | No | JSON array of agent IDs | [] |
| description | No | Group description |
governance_create_mesh_routeInspect
Create a service mesh routing rule.
| Name | Required | Description | Default |
|---|---|---|---|
| source | Yes | Source agent/service | |
| weight | No | Traffic weight (0-100) | |
| destination | Yes | Destination agent/service |
governance_create_orgInspect
Create an organization for multi-tenant governance.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Organization name | |
| description | No | Organization description | |
| admin_agent_id | No | Admin agent ID |
governance_create_playbookInspect
Create an incident response playbook.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Playbook name | |
| steps | No | JSON array of step objects | [] |
| severity | No | Severity level | medium |
governance_create_policy_overrideInspect
Create a policy override layered on organizational defaults.
| Name | Required | Description | Default |
|---|---|---|---|
| scope | Yes | Scope: org, team, or agent | |
| priority | No | Priority (higher wins) | |
| scope_id | Yes | Scope ID (org_id, team_id, or agent_id) | |
| overrides | Yes | JSON policy overrides |
governance_create_questionnaireInspect
Create a compliance questionnaire.
| Name | Required | Description | Default |
|---|---|---|---|
| title | Yes | Questionnaire title | |
| framework | No | Compliance framework | general |
| questions | No | JSON array of question objects | [] |
governance_create_sandboxInspect
Create an isolation sandbox for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to sandbox | |
| network_policy | No | Network policy (restricted, denied, open) | restricted |
| filesystem_policy | No | Filesystem policy (read-only, read-write) | read-only |
governance_create_scheduleInspect
Schedule a policy for time-based activation.
| Name | Required | Description | Default |
|---|---|---|---|
| activate_at | No | Activation time ISO | |
| policy_name | Yes | Policy name | |
| deactivate_at | No | Deactivation time ISO |
governance_create_scoped_tokenInspect
Create a scoped access token with fine-grained permissions.
| Name | Required | Description | Default |
|---|---|---|---|
| name | No | Human-friendly token name | |
| scopes | Yes | JSON array of scope strings e.g. ["governance:verify","governance:read"] |
governance_create_snapshotInspect
Create a point-in-time snapshot of all governance state (provenance, policies, delegations, agents, PQC).
| Name | Required | Description | Default |
|---|---|---|---|
| label | No | Human-readable label for this snapshot | mcp-snapshot |
governance_create_trust_bridgeInspect
Create a trust bridge between governance domains.
| Name | Required | Description | Default |
|---|---|---|---|
| trust_level | No | Trust level (standard, elevated, full) | standard |
| bidirectional | No | Whether bridge is bidirectional | |
| source_domain | Yes | Source governance domain | |
| target_domain | Yes | Target governance domain |
governance_create_voteInspect
Create a consensus vote for a high-risk decision.
| Name | Required | Description | Default |
|---|---|---|---|
| quorum | No | Required votes for consensus | |
| subject | Yes | Vote subject | |
| timeout_minutes | No | Voting timeout |
governance_create_webhookInspect
Register a webhook endpoint for governance event notifications. Supported events: governance.verify.allow, governance.verify.deny, governance.verify.clamp, governance.attest.recorded, governance.bind.created, governance.delegate.created, governance.delegate.revoked. The returned HMAC secret is shown ONCE — store it to verify payloads. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Webhook endpoint URL to receive POST notifications | |
| description | No | Human-readable description of this webhook | |
| event_types | Yes | List of event types to subscribe to |
governance_create_workflowInspect
Create a multi-agent workflow.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Workflow name | |
| steps | No | JSON array of step objects | [] |
| agents | No | JSON array of agent IDs | [] |
governance_cross_reference_evidenceInspect
Cross-reference evidence across multiple agents.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_ids | Yes | Comma-separated agent IDs |
governance_decision_detailInspect
Get full decision record with structured violation breakdown.
| Name | Required | Description | Default |
|---|---|---|---|
| verification_id | Yes | Verification ID to look up |
governance_declare_dependencyInspect
Declare a dependency between two agents.
| Name | Required | Description | Default |
|---|---|---|---|
| to_agent | Yes | Agent depended upon | |
| from_agent | Yes | Agent that depends | |
| criticality | No | Criticality: low, medium, high, critical | medium |
| dependency_type | No | Type: runtime, data, config | runtime |
governance_declare_federationInspect
Declare a cross-organization trust federation.
| Name | Required | Description | Default |
|---|---|---|---|
| org_id | Yes | Organization declaring trust | |
| scopes | No | Comma-separated scopes (verify,attest) | verify,attest |
| max_depth | No | Maximum transitive trust depth (1-5) | |
| trusts_org | Yes | Organization being trusted | |
| expires_utc | No | Expiration timestamp (ISO 8601, optional) |
governance_decommission_agentInspect
Permanently decommission an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Reason for decommission | |
| agent_id | Yes | Agent ID to decommission |
governance_define_sloInspect
Define a Service Level Objective for governance operations.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | SLO name | |
| metric | No | Metric to track (deny_rate, allow_rate, total_decisions, chain_integrity) | deny_rate |
| threshold | No | Threshold value | |
| comparison | No | Comparison operator (lte, gte, lt, gt, eq) | lte |
governance_delegateInspect
Grant scoped, time-limited capabilities to another agent. The delegatee receives an HMAC-signed delegation token that constrains which endpoints they can call and with what policy limits. Requires API key. Cost: $0.01.
| Name | Required | Description | Default |
|---|---|---|---|
| max_calls | No | Maximum calls under this delegation | |
| description | No | Reason for this delegation | |
| ttl_seconds | No | Time-to-live in seconds (60-86400, default 3600) | |
| policy_overrides | No | Policy constraints applied on top of delegatee's requests | |
| allowed_endpoints | No | Endpoints the delegatee can use (default: verify, attest, bind) | |
| delegatee_agent_id | Yes | Agent receiving the capability | |
| delegator_agent_id | Yes | Agent granting the capability |
governance_delegate_permissionInspect
Delegate a permission from one agent to another.
| Name | Required | Description | Default |
|---|---|---|---|
| max_depth | No | Max delegation depth | |
| permission | Yes | Permission to delegate | |
| delegatee_id | Yes | Delegatee agent ID | |
| delegator_id | Yes | Delegator agent ID |
governance_delete_sandboxInspect
Delete an agent sandbox.
| Name | Required | Description | Default |
|---|---|---|---|
| sandbox_id | Yes | Sandbox ID to delete |
governance_dependency_graphInspect
Get dependency tree for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID |
governance_detect_policy_conflictsInspect
Detect conflicts between multiple policies.
| Name | Required | Description | Default |
|---|---|---|---|
| policies | Yes | JSON array of policy objects |
governance_download_exportInspect
Download a generated export.
| Name | Required | Description | Default |
|---|---|---|---|
| export_id | Yes | Export ID to download |
governance_download_reportInspect
Download a compliance report.
| Name | Required | Description | Default |
|---|---|---|---|
| report_id | Yes | Report ID |
governance_emergency_overrideInspect
Activate an emergency policy override.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | Yes | Reason for emergency override | |
| override_policy | No | JSON override policy object | {} |
governance_emergency_override_auditInspect
Get audit trail for an emergency override.
| Name | Required | Description | Default |
|---|---|---|---|
| override_id | Yes | Override ID to audit |
governance_emergency_rotateInspect
Emergency key rotation — immediately invalidates old key.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Reason for emergency rotation | suspected compromise |
governance_enforce_sandboxInspect
Check if an action is permitted within a sandbox.
| Name | Required | Description | Default |
|---|---|---|---|
| action | No | Action to check (read, write, network) | |
| sandbox_id | Yes | Sandbox ID |
governance_escalate_violationInspect
Escalate an SLA violation.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Escalation reason | |
| violation_id | Yes | Violation ID |
governance_evaluate_alertInspect
Manually evaluate an alert rule against current metrics.
| Name | Required | Description | Default |
|---|---|---|---|
| rule_id | Yes | Alert rule ID to evaluate |
governance_event_correlationInspect
Analyze event correlations across agents and time windows.
| Name | Required | Description | Default |
|---|---|---|---|
| min_events | No | Min events for pattern detection | |
| window_seconds | No | Time window in seconds |
governance_event_patternsInspect
Get stored event patterns and anomalies.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_evidence_gapsInspect
Identify missing evidence in the provenance chain.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_execute_playbookInspect
Execute an incident response playbook.
| Name | Required | Description | Default |
|---|---|---|---|
| playbook_id | Yes | Playbook ID | |
| triggered_by | No | Who/what triggered execution | manual |
governance_execute_rotationInspect
Execute a scheduled secret rotation.
| Name | Required | Description | Default |
|---|---|---|---|
| rotation_id | Yes | Rotation ID to execute |
governance_expired_capabilitiesInspect
List expired capability certifications.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_expired_exceptionsInspect
List expired policy exceptions.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_expiring_delegationsInspect
Find delegations expiring within the specified time window.
| Name | Required | Description | Default |
|---|---|---|---|
| within_seconds | No | Time window in seconds (default 3600) |
governance_explain_batchInspect
Explain multiple governance decisions in batch.
| Name | Required | Description | Default |
|---|---|---|---|
| epochs | Yes | Comma-separated epoch numbers |
governance_explain_decisionInspect
Explain why a governance decision was made.
| Name | Required | Description | Default |
|---|---|---|---|
| epoch | Yes | Decision epoch number |
governance_export_audit_trailInspect
Export full audit trail with integrity verification.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max records to return | |
| offset | No | Offset for pagination |
governance_export_evidenceInspect
Export governance provenance as structured evidence for certifier audit. Supports CSV, SARIF, and Merkle tree formats. CSV for spreadsheet review, SARIF for SecOps tools (GitHub Advanced Security), Merkle tree for cryptographic subset verification. Filters by agent_id, record_type, epoch range, and time range. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max records | |
| format | Yes | Export format: csv, sarif, or merkle | |
| agent_id | No | Filter by agent ID | |
| end_epoch | No | End epoch (inclusive) | |
| record_type | No | Filter by type: verify/attest/intent_binding/outcome_verification | |
| start_epoch | No | Start epoch (inclusive) |
governance_failure_impactInspect
Analyze blast radius if an agent fails.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID |
governance_finalize_reportInspect
Finalize a compliance report with cryptographic hash.
| Name | Required | Description | Default |
|---|---|---|---|
| report_id | Yes | Report ID |
governance_fleet_agent_healthInspect
Get per-agent health status across the fleet.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_fleet_healthInspect
Get aggregate fleet health metrics.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_generate_reportInspect
Generate a compliance report.
| Name | Required | Description | Default |
|---|---|---|---|
| title | No | Report title | |
| framework | Yes | Compliance framework (NIST, SOC2, ISO-27001, CMMC) |
governance_get_ab_testInspect
Get A/B test details and metrics.
| Name | Required | Description | Default |
|---|---|---|---|
| test_id | Yes | A/B test ID |
governance_get_agent_capabilitiesInspect
Get all capabilities for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID |
governance_get_agent_healthInspect
Get health status for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to query |
governance_get_attestationInspect
Get compliance attestation details.
| Name | Required | Description | Default |
|---|---|---|---|
| attestation_id | Yes | Attestation ID |
governance_get_baselineInspect
Get the learned behavioral baseline for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID |
governance_get_capability_scoresInspect
Get capability scores for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID |
governance_get_classificationInspect
Get data classification label details.
| Name | Required | Description | Default |
|---|---|---|---|
| label_id | Yes | Label ID |
governance_get_composed_policyInspect
Get a previously composed policy.
| Name | Required | Description | Default |
|---|---|---|---|
| compose_id | Yes | Composed policy ID |
governance_get_enrollmentInspect
Get enrollment details.
| Name | Required | Description | Default |
|---|---|---|---|
| enrollment_id | Yes | Enrollment ID |
governance_get_exceptionInspect
Get policy exception details.
| Name | Required | Description | Default |
|---|---|---|---|
| exception_id | Yes | Exception ID |
governance_get_gateInspect
Get deployment gate details.
| Name | Required | Description | Default |
|---|---|---|---|
| gate_id | Yes | Gate ID |
governance_get_groupInspect
Get agent group details.
| Name | Required | Description | Default |
|---|---|---|---|
| group_id | Yes | Group ID |
governance_get_mesh_routeInspect
Get mesh route details.
| Name | Required | Description | Default |
|---|---|---|---|
| route_id | Yes | Route ID |
governance_get_notification_prefsInspect
Get notification preferences for a user.
| Name | Required | Description | Default |
|---|---|---|---|
| user_id | Yes | User ID |
governance_get_orgInspect
Get organization details.
| Name | Required | Description | Default |
|---|---|---|---|
| org_id | Yes | Organization ID |
governance_get_permission_delegationInspect
Get permission delegation details.
| Name | Required | Description | Default |
|---|---|---|---|
| permission_id | Yes | Permission ID |
governance_get_playbookInspect
Get playbook details.
| Name | Required | Description | Default |
|---|---|---|---|
| playbook_id | Yes | Playbook ID |
governance_get_protocolInspect
Get protocol requirements for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID |
governance_get_questionnaireInspect
Get questionnaire details.
| Name | Required | Description | Default |
|---|---|---|---|
| questionnaire_id | Yes | Questionnaire ID |
governance_get_reportInspect
Get compliance report details.
| Name | Required | Description | Default |
|---|---|---|---|
| report_id | Yes | Report ID |
governance_get_rotationInspect
Get rotation schedule details.
| Name | Required | Description | Default |
|---|---|---|---|
| rotation_id | Yes | Rotation ID |
governance_get_sandboxInspect
Get sandbox details by ID.
| Name | Required | Description | Default |
|---|---|---|---|
| sandbox_id | Yes | Sandbox ID |
governance_get_simulationInspect
Get simulation details by ID.
| Name | Required | Description | Default |
|---|---|---|---|
| simulation_id | Yes | Simulation ID |
governance_get_timelineInspect
Get compliance timeline events with pagination.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max events to return | |
| offset | No | Offset for pagination |
governance_get_trust_bridgeInspect
Get trust bridge details.
| Name | Required | Description | Default |
|---|---|---|---|
| bridge_id | Yes | Bridge ID |
governance_get_workflowInspect
Get workflow details by ID.
| Name | Required | Description | Default |
|---|---|---|---|
| workflow_id | Yes | Workflow ID |
governance_grant_audit_consentInspect
Grant an auditor access to an agent's governance records.
| Name | Required | Description | Default |
|---|---|---|---|
| scope | No | Scope: 'all', 'epoch_range', 'action_types' | all |
| agent_id | Yes | Agent granting audit access | |
| to_epoch | No | End epoch for epoch_range scope | |
| auditor_id | Yes | Auditor receiving access | |
| from_epoch | No | Start epoch for epoch_range scope | |
| expires_utc | No | Expiry timestamp (ISO 8601) |
governance_healthInspect
Check the governance gateway health status. Free.
| Name | Required | Description | Default |
|---|---|---|---|
| verbose | No | Return additional details such as chain length and PQC signing status |
governance_health_dashboardInspect
Get agent health overview dashboard.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_health_scoreInspect
Get the overall governance health score (0-100). Combines chain integrity, decision quality, anomaly status, activity level, and PQC signing into a single grade (A-F). Includes component breakdown and recommendations. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_import_templateInspect
Import and instantiate a policy template with optional overrides.
| Name | Required | Description | Default |
|---|---|---|---|
| overrides | No | JSON overrides to apply | {} |
| template_id | Yes | Template ID to import |
governance_integrity_checkInspect
Check audit trail hash chain integrity.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_integrity_reportInspect
Generate an integrity verification report.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_integrity_statusInspect
Get current audit trail integrity status.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_intent_ancestryInspect
Walk up the intent hierarchy from a child to the root intent. Shows the full chain of delegation for auditing. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| intent_id | Yes | Intent ID to trace ancestry from |
governance_intent_childrenInspect
List all direct child intents of a parent intent. Enables auditing of multi-agent delegation hierarchies. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| intent_id | Yes | Parent intent ID to query children for |
governance_intent_lifecycleInspect
Get the lifecycle timeline for a bound intent. Shows current state (BOUND/AUTHORIZED/EXECUTING/COMPLETED/FAILED/TIMED_OUT), all transitions with timestamps and reasons, and terminal status. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| intent_id | Yes | Intent ID to get lifecycle for |
governance_intent_transitionInspect
Explicitly transition an intent to a new state. Valid transitions: BOUND→AUTHORIZED, AUTHORIZED→EXECUTING, EXECUTING→COMPLETED/FAILED, BOUND→FAILED. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| actor | No | Who triggered this transition | mcp |
| reason | No | Reason for transition | |
| to_state | Yes | Target state: AUTHORIZED, EXECUTING, COMPLETED, FAILED | |
| intent_id | Yes | Intent ID to transition |
governance_invalidate_cacheInspect
Invalidate decision cache entries.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | No | Agent ID to invalidate (empty for all) |
governance_key_statusInspect
Get status of API key: age, rotation history, recommendations.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_label_dataInspect
Apply a classification label to data.
| Name | Required | Description | Default |
|---|---|---|---|
| resource | Yes | Resource to label | |
| categories | No | JSON array of categories | [] |
| sensitivity | No | Sensitivity level | internal |
governance_learn_baselineInspect
Learn a behavioral baseline from an agent's recent decisions.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to learn baseline for | |
| window_records | No | Number of recent records to learn from |
governance_link_outcomeInspect
Link a system outcome to contributing governance decisions for root cause analysis.
| Name | Required | Description | Default |
|---|---|---|---|
| severity | No | Severity: low, medium, high, critical | medium |
| agent_ids | No | Comma-separated agent IDs to filter (empty=all) | |
| outcome_id | Yes | Unique identifier for the outcome/incident | |
| description | No | Description of the outcome | |
| action_types | No | Comma-separated action types to filter (empty=all) | |
| window_hours | No | Time window to look back for contributing decisions |
governance_list_ab_testsInspect
List all A/B test experiments.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_agent_keysInspect
List registered identity keys for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent to list keys for |
governance_list_agentsInspect
List all registered agents with optional status filter.
| Name | Required | Description | Default |
|---|---|---|---|
| status | No | Filter by status |
governance_list_alert_rulesInspect
List all alert rules.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_anchorsInspect
List all integrity anchor points.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_archivesInspect
List all archived period summaries.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_attestationsInspect
List compliance attestations.
| Name | Required | Description | Default |
|---|---|---|---|
| status | No | Filter by status |
governance_list_audit_consentInspect
List active audit consent grants for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent to list grants for |
governance_list_bridgesInspect
List all trust bridges.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_canariesInspect
List all canary rollouts with live divergence statistics.
| Name | Required | Description | Default |
|---|---|---|---|
| status_filter | No | Filter by status: active, promoted, rolledback |
governance_list_capabilitiesInspect
List all registered agent capability declarations.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_change_requestsInspect
List governance change requests with optional status filter.
| Name | Required | Description | Default |
|---|---|---|---|
| status | No | Filter by status |
governance_list_classificationsInspect
List all data classification labels.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_credentialsInspect
List credentials, optionally filtered by agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | No | Filter by agent ID |
governance_list_delegationsInspect
List active delegation tokens for an agent (as delegator or delegatee). Shows scope, expiry, and usage counts. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to list delegations for | |
| active_only | No | Only show active (non-revoked, non-expired) delegations |
governance_list_emergency_overridesInspect
List all emergency overrides.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_enrollmentsInspect
List all enrollment requests.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_escalation_rulesInspect
List all auto-escalation rules with fire counts.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_exceptionsInspect
List all policy exceptions.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_export_schedulesInspect
List all export schedules.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_federationsInspect
List active trust federation declarations for an organization.
| Name | Required | Description | Default |
|---|---|---|---|
| org_id | Yes | Organization to list federations for |
governance_list_frameworksInspect
List supported compliance frameworks (NIST 800-53, CMMC L2, SOC 2).
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_gatesInspect
List all deployment gates.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_groupsInspect
List all agent groups.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_mesh_routesInspect
List all mesh routes.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_org_membersInspect
List all members of an organization.
| Name | Required | Description | Default |
|---|---|---|---|
| org_id | Yes | Organization ID |
governance_list_outcome_linkagesInspect
List all outcome-to-decision linkages.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_permission_delegationsInspect
List all permission delegations.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_playbooksInspect
List all incident response playbooks.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_policy_overridesInspect
List all active policy overrides.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_proposalsInspect
List policy change proposals with optional status filter.
| Name | Required | Description | Default |
|---|---|---|---|
| status_filter | No | Filter by status: pending, approved, rejected |
governance_list_quarantinedInspect
List all currently quarantined agents.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_questionnairesInspect
List all compliance questionnaires.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_regionsInspect
List all registered governance regions.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_remediationsInspect
List remediation actions taken.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | No | Filter by agent ID (empty=all) |
governance_list_reportsInspect
List all compliance reports.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_rotationsInspect
List all secret rotation schedules.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_sandboxesInspect
List all agent sandboxes.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_schedulesInspect
List all policy schedules.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_scopesInspect
List all available governance scopes.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_simulationsInspect
List all policy simulations.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_sla_violationsInspect
List SLA violations with optional filters.
| Name | Required | Description | Default |
|---|---|---|---|
| status | No | Filter by status | |
| severity | No | Filter by severity |
governance_list_snapshotsInspect
List governance snapshots, newest first.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Maximum number of snapshots to return |
governance_list_webhook_deliveriesInspect
List webhook delivery history.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_webhooksInspect
List webhook subscriptions registered by this operator. Shows subscription ID, URL, event types, active status, and delivery stats. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_list_workflowsInspect
List all workflows.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_log_streamInspect
Pull-based audit log streaming with checkpoint support. Poll with after_epoch for incremental sync.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max records to return (1-1000) | |
| client_id | No | Client ID for automatic cursor tracking | |
| after_epoch | No | Return records after this epoch number |
governance_log_stream_cursorsInspect
List all client stream cursors (checkpoint positions).
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_mesh_topologyInspect
Get service mesh topology overview.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_metricsInspect
Get operational metrics: decision distribution, throughput, chain integrity.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_nonce_statusInspect
Get replay protection nonce tracking status.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_notification_historyInspect
Get notification delivery history.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max entries |
governance_peer_recommendationsInspect
Get recommended peers based on trust network analysis.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID |
governance_permission_chainInspect
Get the full permission delegation chain for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to trace |
governance_policy_chainInspect
Get the full policy chain for an agent: org → team → agent overrides.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID |
governance_policy_coverage_reportInspect
Generate a policy coverage report from provenance records.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_policy_diffInspect
Compare two policy configurations and show differences.
| Name | Required | Description | Default |
|---|---|---|---|
| policy_a | Yes | JSON policy A | |
| policy_b | Yes | JSON policy B |
governance_policy_historyInspect
Get the history of policy snapshots.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max entries to return |
governance_policy_impactInspect
Replay historical verify decisions against a proposed policy to predict impact before deploying.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max historical records to replay | |
| proposed_policy | Yes | JSON string of the proposed policy to analyze |
governance_policy_snapshotInspect
Create a named snapshot of a policy configuration.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Snapshot name | |
| policy_config | No | JSON policy config | {} |
governance_promote_canaryInspect
Promote canary to production — activates candidate policy as new baseline.
| Name | Required | Description | Default |
|---|---|---|---|
| canary_id | Yes | Canary ID to promote | |
| template_id | No | Target template ID (required if canary was created for all templates) |
governance_propose_policyInspect
Propose a policy change for multi-signature approval. Does NOT activate immediately.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Reason for the change | |
| policy_json | Yes | JSON string of the proposed policy | |
| template_id | Yes | Policy template ID to change | |
| required_approvals | No | Number of approvals needed |
governance_protocol_violationsInspect
List protocol violations.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_publish_templateInspect
Publish a reusable policy template to the marketplace.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Template name | |
| tags | No | Comma-separated tags | |
| framework | No | Framework ID (nist-800-53, cmmc-l2, soc2, custom) | custom |
| description | No | Template description | |
| policy_config | Yes | JSON policy config |
governance_quarantine_agentInspect
Quarantine an agent — all future verify calls will return immediate DENY with provenance.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Reason for quarantine | MCP-initiated quarantine |
| agent_id | Yes | Agent ID to quarantine |
governance_query_ledgerInspect
Query the provenance ledger with filtering and pagination.
| Name | Required | Description | Default |
|---|---|---|---|
| cursor | No | Pagination cursor (record offset) | |
| decision | No | Decision filter: ALLOW, CLAMP, DENY | |
| agent_ids | No | Comma-separated agent IDs to filter | |
| page_size | No | Records per page (max 100) | |
| record_type | No | Record type: verify, attest, intent_binding, outcome_verification |
governance_rbac_assignInspect
Assign an RBAC role to an API key, controlling which endpoints it can access.
| Name | Required | Description | Default |
|---|---|---|---|
| role | Yes | Role to assign: admin, operator, auditor, viewer | |
| api_key_prefix | Yes | First 16+ chars of the API key to assign role to |
governance_rbac_rolesInspect
List all available RBAC role definitions (admin, operator, auditor, viewer).
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_reactivate_agentInspect
Reactivate a suspended agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to reactivate |
governance_reconstruct_incidentInspect
Reconstruct an incident timeline from governance provenance for root cause analysis.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_ids | No | Comma-separated agent IDs to filter (empty=all) | |
| end_epoch | No | End epoch for timeline (0=latest) | |
| start_epoch | No | Start epoch for timeline | |
| action_types | No | Comma-separated action types to filter (empty=all) |
governance_record_communicationInspect
Record a communication event between agents.
| Name | Required | Description | Default |
|---|---|---|---|
| comm_type | No | Communication type | request |
| source_agent_id | Yes | Source agent ID | |
| target_agent_id | Yes | Target agent ID |
governance_region_statusInspect
Get the current status and sync info for a region.
| Name | Required | Description | Default |
|---|---|---|---|
| region_id | Yes | Region ID |
governance_register_agentInspect
Register a new agent in the lifecycle system.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Unique agent identifier | |
| agent_type | No | Agent type | autonomous |
| description | No | Agent description | |
| capabilities | No | Comma-separated capabilities |
governance_register_agent_keyInspect
Register an agent's cryptographic identity key.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent to register key for | |
| key_type | No | Key type: ed25519, hmac-sha256 | ed25519 |
| public_key | Yes | Public key material |
governance_register_capabilitiesInspect
Register or update an agent's declared capabilities (action types and templates).
| Name | Required | Description | Default |
|---|---|---|---|
| enforce | No | Whether to enforce capabilities in verify endpoint | |
| agent_id | Yes | Agent ID to register capabilities for | |
| description | No | Human-readable description | |
| allowed_templates | No | JSON array of allowed template IDs | |
| allowed_action_types | No | JSON array of allowed action types |
governance_register_protocolInspect
Register an agent's communication protocol requirements.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to register protocol for | |
| require_signing | No | Require message signing | |
| max_message_size | No | Max message size in bytes | |
| require_envelope | No | Require message envelope |
governance_register_regionInspect
Register a new governance region for federation.
| Name | Required | Description | Default |
|---|---|---|---|
| description | No | Region description | |
| region_name | Yes | Region name | |
| endpoint_url | No | Region endpoint URL |
governance_register_signing_keyInspect
Register an agent's signing key for request authentication.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent registering the key | |
| key_type | No | Key type: hmac-sha256 or ed25519 | hmac-sha256 |
| public_key | No | Public key or shared secret |
governance_reject_enrollmentInspect
Reject an agent enrollment request.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Rejection reason | |
| enrollment_id | Yes | Enrollment ID |
governance_reject_gateInspect
Reject a deployment gate.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Rejection reason | |
| gate_id | Yes | Gate ID |
governance_relay_acknowledgeInspect
Acknowledge receipt of a relayed message.
| Name | Required | Description | Default |
|---|---|---|---|
| message_id | Yes | Message ID to acknowledge |
governance_relay_inboxInspect
Get messages for a specific agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to check inbox |
governance_relay_sendInspect
Send a message between agents via the relay.
| Name | Required | Description | Default |
|---|---|---|---|
| payload | No | JSON payload | {} |
| priority | No | Priority (low, normal, high) | normal |
| sender_id | Yes | Sender agent ID | |
| recipient_id | Yes | Recipient agent ID |
governance_relay_statsInspect
Get message relay statistics.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_release_agentInspect
Release an agent from quarantine — resume normal verify processing.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Reason for release | MCP-initiated release |
| agent_id | Yes | Agent ID to release |
governance_remove_group_memberInspect
Remove an agent from a group.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to remove | |
| group_id | Yes | Group ID |
governance_replayInspect
Replay historical verify decisions through an alternative policy. Deterministic what-if analysis: 'What would have happened with policy X?' Returns per-record comparison with change classification (more_restrictive, less_restrictive, unchanged). Use for policy regression testing, certifier analysis, or forensic review. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Maximum records to replay (1-500) | |
| agent_id | No | Filter replay to a specific agent's decisions | |
| template_id | No | Named policy template to use instead of policy_context | |
| policy_context | No | Alternative policy to apply (e.g. {max_values: {amount: 100}}) |
governance_replay_auditInspect
Replay governance decisions against current policy to detect drift.
| Name | Required | Description | Default |
|---|---|---|---|
| end_epoch | No | End epoch (0=latest) | |
| max_records | No | Max records to replay | |
| start_epoch | No | Start epoch |
governance_replay_batchInspect
Replay a range of decisions with modified policy.
| Name | Required | Description | Default |
|---|---|---|---|
| epoch_end | Yes | End epoch | |
| epoch_start | Yes | Start epoch | |
| modified_policy | No | JSON modified policy | {} |
governance_replay_decisionInspect
Replay a historical decision with modified policy parameters.
| Name | Required | Description | Default |
|---|---|---|---|
| epoch | Yes | Epoch of decision to replay | |
| modified_policy | No | JSON modified policy | {} |
governance_replay_resultsInspect
Get results from a previous decision replay.
| Name | Required | Description | Default |
|---|---|---|---|
| replay_id | Yes | Replay ID |
governance_report_sla_violationInspect
Report an SLA violation.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | No | Agent ID | |
| severity | No | Severity: low, medium, high, critical | medium |
| sla_name | Yes | SLA name | |
| description | No | Description |
governance_reputation_decayInspect
Get time-weighted reputation with decay for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID |
governance_request_enrollmentInspect
Request agent enrollment into the governance system.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID requesting enrollment | |
| agent_type | No | Agent type | general |
| capabilities | No | JSON array of capabilities | [] |
governance_retention_policyInspect
Get the current audit log retention policy (max records, max age, immutability window).
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_retry_webhookInspect
Retry a failed webhook delivery.
| Name | Required | Description | Default |
|---|---|---|---|
| delivery_id | Yes | Delivery ID to retry |
governance_reversibility_scoreInspect
Get the reversibility score for a governance decision. Returns 0.0 (irreversible) to 1.0 (fully reversible).
| Name | Required | Description | Default |
|---|---|---|---|
| epoch | Yes | Epoch of the decision to score |
governance_revocation_impactInspect
Preview what would be affected by revoking a delegation.
| Name | Required | Description | Default |
|---|---|---|---|
| delegation_id | Yes | Delegation ID to preview |
governance_revoke_agent_keyInspect
Revoke an agent's identity key immediately.
| Name | Required | Description | Default |
|---|---|---|---|
| key_id | Yes | Key ID to revoke | |
| reason | No | Reason for revocation | manual |
governance_revoke_audit_consentInspect
Revoke an audit consent grant.
| Name | Required | Description | Default |
|---|---|---|---|
| grant_id | Yes | Grant ID to revoke |
governance_revoke_delegationInspect
Revoke a delegation token. Once revoked, the delegatee can no longer use this token. Revocation is recorded in the provenance chain. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| delegation_id | Yes | Delegation ID to revoke |
governance_revoke_emergency_overrideInspect
Revoke an active emergency override.
| Name | Required | Description | Default |
|---|---|---|---|
| override_id | Yes | Override ID to revoke |
governance_revoke_exceptionInspect
Revoke a policy exception.
| Name | Required | Description | Default |
|---|---|---|---|
| exception_id | Yes | Exception ID |
governance_revoke_federationInspect
Revoke a trust federation declaration.
| Name | Required | Description | Default |
|---|---|---|---|
| federation_id | Yes | Federation ID to revoke |
governance_revoke_permissionInspect
Revoke a delegated permission.
| Name | Required | Description | Default |
|---|---|---|---|
| permission_id | Yes | Permission ID |
governance_revoke_scoped_tokenInspect
Revoke a scoped access token.
| Name | Required | Description | Default |
|---|---|---|---|
| token_id | Yes | Token ID to revoke |
governance_risk_dashboardInspect
Get risk overview dashboard.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_risk_thresholdsInspect
Get current risk thresholds.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_rollback_canaryInspect
Roll back canary — deactivates shadow evaluation.
| Name | Required | Description | Default |
|---|---|---|---|
| canary_id | Yes | Canary ID to rollback |
governance_root_causeInspect
Get root cause analysis for a linked outcome. Shows causal chain and primary contributing agent.
| Name | Required | Description | Default |
|---|---|---|---|
| linkage_id | Yes | Linkage ID from link_outcome |
governance_rotate_agent_keyInspect
Rotate an agent's identity key with overlap period.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent to rotate key for | |
| overlap_hours | No | Hours old key stays valid | |
| new_public_key | Yes | New public key material |
governance_rotate_credentialInspect
Rotate a credential to a new version.
| Name | Required | Description | Default |
|---|---|---|---|
| credential_id | Yes | Credential ID to rotate |
governance_rotate_keyInspect
Rotate the current API key with a grace period for the old key.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Reason for rotation | scheduled |
| grace_period_hours | No | Hours old key remains valid |
governance_route_to_bestInspect
Route a task to the best agent based on capability and trust.
| Name | Required | Description | Default |
|---|---|---|---|
| min_trust | No | Minimum trust/capability score | |
| required_capability | Yes | Required capability name |
governance_run_simulationInspect
Run a counterfactual policy simulation against provenance history.
| Name | Required | Description | Default |
|---|---|---|---|
| policy | Yes | JSON policy to simulate |
governance_sandbox_resultsInspect
Retrieve results from a previous sandbox policy test.
| Name | Required | Description | Default |
|---|---|---|---|
| test_id | Yes | Sandbox test ID |
governance_scan_classificationInspect
Scan all classification labels for distribution analysis.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_schedule_exportInspect
Schedule a periodic audit export.
| Name | Required | Description | Default |
|---|---|---|---|
| format | Yes | Export format (csv, json, sarif) | |
| frequency | No | Frequency (daily, weekly, monthly) | daily |
governance_schedule_rotationInspect
Schedule a secret rotation.
| Name | Required | Description | Default |
|---|---|---|---|
| secret_name | Yes | Secret name to rotate | |
| interval_days | No | Rotation interval in days |
governance_score_baselineInspect
Score a proposed action against an agent's behavioral baseline.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID | |
| action_type | No | Action type to score | unknown |
governance_score_questionnaireInspect
Score a submitted questionnaire.
| Name | Required | Description | Default |
|---|---|---|---|
| questionnaire_id | Yes | Questionnaire ID |
governance_seal_audit_trailInspect
Create a cryptographic seal of the current audit trail state.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Name for the seal | |
| max_records | No | Max records to include | |
| include_records | No | Include records in seal |
governance_send_webhookInspect
Send a webhook and track delivery status.
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Webhook URL to send to | |
| payload | No | JSON payload | {} |
governance_set_agent_limitInspect
Set custom rate limits for a specific agent. Overrides default per-minute and per-hour limits. Use for delegated agents or agents that need throttling. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID to set limits for | |
| per_hour | No | Max calls per hour | |
| per_minute | No | Max calls per minute |
governance_set_capability_scoreInspect
Set capability scores for an agent across dimensions.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID | |
| capabilities | Yes | JSON capabilities map: {"nav": 0.9, "sense": 0.7} |
governance_set_notification_prefsInspect
Set notification preferences for a user.
| Name | Required | Description | Default |
|---|---|---|---|
| user_id | Yes | User ID | |
| channels | No | Comma-separated channels | |
| severity_filter | No | Min severity | medium |
governance_set_retention_policyInspect
Configure audit log retention policy.
| Name | Required | Description | Default |
|---|---|---|---|
| max_records | No | Maximum records to retain (0=unlimited) | |
| max_age_days | No | Maximum age of records in days (0=unlimited) | |
| immutable_after_days | No | Records older than this are immutable |
governance_set_risk_thresholdsInspect
Set risk thresholds.
| Name | Required | Description | Default |
|---|---|---|---|
| low | No | Low threshold | |
| high | No | High threshold | |
| medium | No | Medium threshold |
governance_sign_attestationInspect
Add a signoff to a compliance attestation.
| Name | Required | Description | Default |
|---|---|---|---|
| comment | No | Comment | |
| signer_id | Yes | Signer ID | |
| attestation_id | Yes | Attestation ID |
governance_silence_alertInspect
Silence an alert rule for a specified duration.
| Name | Required | Description | Default |
|---|---|---|---|
| rule_id | Yes | Alert rule ID | |
| duration_hours | No | Silence duration in hours |
governance_similar_agentsInspect
Find agents with similar behavioral profiles. Uses weighted cosine similarity on decision rates (50%), action type Jaccard (25%), and payload field Jaccard (25%). Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max similar agents to return | |
| agent_id | Yes | Agent ID to find similar agents for |
governance_simulate_policyInspect
Simulate a policy change against historical decisions. Replays past verify decisions through a new policy and reports what would change: decision flips, clamp differences, impact %. Use to evaluate policy changes before deploying them. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Max historical decisions to replay | |
| agent_id | No | Filter to specific agent | |
| template_id | No | Named policy template to simulate | |
| policy_context | No | Policy configuration to simulate |
governance_simulate_rollbackInspect
Simulate rolling back governance state to a target epoch. Shows affected decisions, agents, and safety assessment.
| Name | Required | Description | Default |
|---|---|---|---|
| target_epoch | Yes | Roll back to this epoch (all decisions after this are affected) |
governance_simulation_resultsInspect
Get detailed results for a simulation.
| Name | Required | Description | Default |
|---|---|---|---|
| simulation_id | Yes | Simulation ID |
governance_sla_dashboardInspect
Get SLA health dashboard summary.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_sla_metricsInspect
Get per-operation latency percentiles (p50/p95/p99), throughput, and SLA compliance.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_slo_statusInspect
Check compliance status of all defined SLOs.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_spatial_anomaly_define_ruleInspect
Define a spatial anomaly detection rule (clustering, gap, drift, exclusion_breach).
| Name | Required | Description | Default |
|---|---|---|---|
| name | No | Rule name | |
| rule_type | Yes | Rule type: clustering|gap|drift|exclusion_breach | |
| threshold | No | Threshold configuration |
governance_spatial_anomaly_detectInspect
Run anomaly detection on current fleet positions. Detects clustering, exclusion breaches, and other spatial anomalies.
| Name | Required | Description | Default |
|---|---|---|---|
| max_cluster_size | No | Maximum entities before clustering anomaly | |
| clustering_threshold_meters | No | Distance threshold for clustering detection |
governance_spatial_anomaly_historyInspect
Get anomaly detection history with provenance hashes.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_spatial_domain_feedInspect
Get latest observations for a spatial domain.
| Name | Required | Description | Default |
|---|---|---|---|
| domain_id | Yes | Domain ID |
governance_spatial_domain_ingestInspect
Ingest a spatial observation into a domain. Governed and provenance-logged.
| Name | Required | Description | Default |
|---|---|---|---|
| domain_id | Yes | Domain ID to ingest into | |
| observation | Yes | Observation data to ingest |
governance_spatial_domain_registerInspect
Register a spatial data domain (air, space, surface, maritime) with schema and classification.
| Name | Required | Description | Default |
|---|---|---|---|
| domain_name | Yes | Domain name | |
| domain_type | Yes | Domain type (air, space, surface, maritime, custom) | |
| classification | No | Data classification level | unclassified |
| authorized_agents | No | Agent IDs authorized to access this domain |
governance_spatial_domains_listInspect
List all registered spatial data domains with observation counts.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_spatial_entities_listInspect
List all spatial entities with optional filtering by type or active status.
| Name | Required | Description | Default |
|---|---|---|---|
| active | No | Filter by active status | |
| entity_type | No | Filter by type |
governance_spatial_entity_deactivateInspect
Deactivate a spatial entity, removing it from active tracking.
| Name | Required | Description | Default |
|---|---|---|---|
| entity_id | Yes | Spatial entity ID to deactivate |
governance_spatial_entity_getInspect
Get a spatial entity by ID with current position and governance status.
| Name | Required | Description | Default |
|---|---|---|---|
| entity_id | Yes | Spatial entity ID (spe-...) |
governance_spatial_entity_registerInspect
Register a spatial entity (agent, asset, waypoint, sensor) with location and capabilities. Creates provenance record.
| Name | Required | Description | Default |
|---|---|---|---|
| alt | No | Altitude in meters | |
| lat | No | Latitude (WGS84) | |
| lon | No | Longitude (WGS84) | |
| name | Yes | Entity name | |
| entity_type | Yes | Type: agent|asset|waypoint|sensor | |
| capabilities | No | List of capability strings |
governance_spatial_entity_update_positionInspect
Update entity position. Creates provenance record tracking the position change.
| Name | Required | Description | Default |
|---|---|---|---|
| alt | No | New altitude | |
| lat | Yes | New latitude | |
| lon | Yes | New longitude | |
| entity_id | Yes | Spatial entity ID |
governance_spatial_fleet_coverageInspect
Compute spatial coverage percentage for a geofence zone based on active entity positions.
| Name | Required | Description | Default |
|---|---|---|---|
| fence_id | Yes | Geofence ID to compute coverage for | |
| coverage_radius_meters | No | Coverage radius per entity |
governance_spatial_fleet_statusInspect
Fleet-wide spatial health dashboard: entity counts, geofences, trajectories, domains.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_spatial_fusion_correlateInspect
Cross-domain entity correlation with governance gates. Checks if agent is authorized to fuse data across domains.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent requesting fusion | |
| domain_ids | Yes | Domain IDs to correlate across |
governance_spatial_geofence_checkInspect
Check if a position is within authorized geofences. Returns ALLOW/CLAMP/DENY with provenance.
| Name | Required | Description | Default |
|---|---|---|---|
| lat | Yes | Latitude to check | |
| lon | Yes | Longitude to check |
governance_spatial_geofence_createInspect
Create a geofence (polygon, circle, or bbox) with governance policy. Permission-before-power applied to physical space.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Geofence name | |
| policy | No | Policy: DENY_OUTSIDE or DENY_INSIDE | DENY_OUTSIDE |
| geometry | Yes | Geometry definition (vertices, center+radius, or min/max lat/lon) | |
| fence_type | Yes | Type: polygon|circle|bbox | |
| buffer_meters | No | Warning buffer zone in meters |
governance_spatial_geofence_deactivateInspect
Deactivate a geofence.
| Name | Required | Description | Default |
|---|---|---|---|
| fence_id | Yes | Geofence ID to deactivate |
governance_spatial_geofence_getInspect
Get geofence definition and current status.
| Name | Required | Description | Default |
|---|---|---|---|
| fence_id | Yes | Geofence ID (gf-...) |
governance_spatial_geofences_listInspect
List all geofences with optional active/inactive filtering.
| Name | Required | Description | Default |
|---|---|---|---|
| active | No | Filter by active status |
governance_spatial_query_containmentInspect
Check which geofences contain a given spatial entity.
| Name | Required | Description | Default |
|---|---|---|---|
| entity_id | Yes | Entity ID to check containment for |
governance_spatial_query_corridorInspect
Check if a planned path stays within authorized geofence corridors. Returns ALLOW or DENY with violations.
| Name | Required | Description | Default |
|---|---|---|---|
| waypoints | Yes | List of {lat, lon} waypoints defining the path | |
| corridor_width_meters | No | Corridor width in meters |
governance_spatial_query_historyInspect
Audit log of all spatial queries with governance decisions.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_spatial_query_proximityInspect
Find spatial entities within a given radius of a point. Governed and provenance-logged.
| Name | Required | Description | Default |
|---|---|---|---|
| lat | Yes | Center latitude | |
| lon | Yes | Center longitude | |
| radius_meters | Yes | Search radius in meters |
governance_spatial_query_separationInspect
Verify minimum separation distance between spatial entities. Returns ALLOW or DENY with violations.
| Name | Required | Description | Default |
|---|---|---|---|
| entity_ids | Yes | List of entity IDs to check separation between | |
| min_separation_meters | Yes | Required minimum separation in meters |
governance_spatial_trajectories_listInspect
List all active trajectory authorizations with optional status and entity filters.
| Name | Required | Description | Default |
|---|---|---|---|
| status | No | Filter by status (authorized, revoked) | |
| entity_id | No | Filter by entity ID |
governance_spatial_trajectory_authorizeInspect
Pre-authorize a planned trajectory with waypoints and deviation tolerance.
| Name | Required | Description | Default |
|---|---|---|---|
| entity_id | Yes | Entity ID for the trajectory | |
| waypoints | Yes | List of {lat, lon} waypoints | |
| max_deviation_meters | No | Maximum allowed deviation in meters |
governance_spatial_trajectory_check_deviationInspect
Check if current position deviates from authorized trajectory. Returns ALLOW or DENY.
| Name | Required | Description | Default |
|---|---|---|---|
| lat | Yes | Current latitude | |
| lon | Yes | Current longitude | |
| trajectory_id | Yes | Trajectory ID |
governance_spatial_trajectory_getInspect
Get trajectory authorization details and compliance status.
| Name | Required | Description | Default |
|---|---|---|---|
| trajectory_id | Yes | Trajectory ID |
governance_spatial_trajectory_revokeInspect
Revoke a trajectory authorization. Entity will receive DENY on subsequent deviation checks.
| Name | Required | Description | Default |
|---|---|---|---|
| trajectory_id | Yes | Trajectory ID to revoke |
governance_stale_agentsInspect
List agents that haven't sent a heartbeat recently.
| Name | Required | Description | Default |
|---|---|---|---|
| threshold | No | Seconds since last heartbeat to consider stale |
governance_state_at_timeInspect
Reconstruct governance posture at any past point in time for forensic analysis.
| Name | Required | Description | Default |
|---|---|---|---|
| timestamp_utc | Yes | ISO-8601 UTC timestamp to reconstruct state at |
governance_store_credentialInspect
Store an agent credential in the vault.
| Name | Required | Description | Default |
|---|---|---|---|
| name | No | Credential name | |
| agent_id | Yes | Agent ID | |
| credential_type | Yes | Credential type (api_key, cert, token) |
governance_submit_questionnaireInspect
Submit answers to a questionnaire.
| Name | Required | Description | Default |
|---|---|---|---|
| answers | No | JSON array of answer objects | [] |
| agent_id | No | Submitting agent ID | |
| questionnaire_id | Yes | Questionnaire ID |
governance_suspend_agentInspect
Suspend an agent, preventing further actions.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Reason for suspension | |
| agent_id | Yes | Agent ID to suspend |
governance_sync_regionInspect
Trigger governance state sync for a region.
| Name | Required | Description | Default |
|---|---|---|---|
| region_id | Yes | Region ID to sync |
governance_test_notificationInspect
Send a test notification.
| Name | Required | Description | Default |
|---|---|---|---|
| channel | No | Channel | |
| message | No | Message | Test notification |
| user_id | No | User ID | test-user |
governance_test_policyInspect
Dry-run a policy config against test actions in sandbox.
| Name | Required | Description | Default |
|---|---|---|---|
| test_actions | No | JSON array of test actions | [] |
| policy_config | Yes | JSON policy config |
governance_timeline_gapsInspect
Detect gaps in compliance coverage.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_timeline_milestonesInspect
Get only milestone events from the timeline.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_toggle_mesh_routeInspect
Toggle a mesh route on/off.
| Name | Required | Description | Default |
|---|---|---|---|
| route_id | Yes | Route ID to toggle |
governance_trigger_remediationInspect
Trigger automated remediation action against an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| action | Yes | Action: quarantine, clamp, pause, escalate | |
| reason | No | Reason for remediation | |
| dry_run | No | Simulate without executing | |
| agent_id | Yes | Agent to remediate | |
| severity | No | Severity: low, medium, high, critical | medium |
| duration_seconds | No | Duration for pause action |
governance_trust_graphInspect
Get the trust graph for an agent.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID |
governance_upcoming_rotationsInspect
List upcoming secret rotations.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_update_policyInspect
Create or update a named policy template. Changes are versioned with operator identity, reason, and timestamp in the audit trail. The new version takes effect immediately for subsequent verify calls. Requires API key.
| Name | Required | Description | Default |
|---|---|---|---|
| policy | Yes | Policy definition (max_values, forbidden_keys, etc.) | |
| reason | No | Audit trail reason for this change | |
| template_id | Yes | Policy template identifier (e.g. 'custom-trading-limits') |
governance_validate_compositionInspect
Check policies for conflicts without merging.
| Name | Required | Description | Default |
|---|---|---|---|
| policies | Yes | JSON array of policy objects to validate |
governance_validate_policy_constraintsInspect
Validate policy constraints for type correctness.
| Name | Required | Description | Default |
|---|---|---|---|
| policy | Yes | JSON policy object to validate |
governance_validate_protocol_messageInspect
Validate a message against agent protocol requirements.
| Name | Required | Description | Default |
|---|---|---|---|
| sender_id | Yes | Sender agent ID | |
| has_envelope | No | Message has envelope | |
| recipient_id | Yes | Recipient agent ID | |
| has_signature | No | Message has signature |
governance_validate_tokenInspect
Validate a scoped token and check scope membership.
| Name | Required | Description | Default |
|---|---|---|---|
| token | Yes | Token value to validate | |
| required_scope | No | Scope to check |
governance_vault_access_logInspect
Get the credential vault access log.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
governance_verifyInspect
Verify an action against policy bounds before executing it. Returns ALLOW (proceed), CLAMP (proceed with modified values), or DENY (stop). Every verification is recorded in a hash-chained provenance ledger. Cost: $0.01 per call.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Unique identifier of the agent requesting verification | |
| action_type | Yes | Category of action to verify (e.g. 'deploy', 'trade', 'send_email') | |
| template_id | No | Named policy template (e.g. 'robotics-arm', 'financial-transaction'). Merged with policy_context. | |
| action_payload | Yes | Action parameters to verify against policy bounds | |
| policy_context | No | Optional policy overrides such as max_values or forbidden_keys | |
| idempotency_key | No | Optional key for idempotent retries — same key returns cached result |
governance_verify_bridge_transferInspect
Verify and record a cross-domain trust transfer.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | No | Agent requesting transfer | |
| bridge_id | Yes | Bridge ID |
governance_verify_capabilityInspect
Verify if an agent has a valid capability certification.
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Agent ID | |
| capability | Yes | Capability to verify |
governance_verify_federationInspect
Check if an agent's organization is trusted through federation chains.
| Name | Required | Description | Default |
|---|---|---|---|
| scope | No | Scope to verify (verify, attest) | verify |
| agent_org | Yes | Organization the agent belongs to | |
| requesting_org | Yes | Organization requesting verification |
governance_verify_outcomeInspect
Verify that an executed action achieved its declared intent. Closes the loop: intent -> command -> action -> outcome -> verification. Free (included with bind).
| Name | Required | Description | Default |
|---|---|---|---|
| agent_id | Yes | Unique identifier of the agent whose outcome is being verified | |
| intent_id | Yes | ID of the original intent from governance_bind | |
| tolerance | No | Numeric tolerance for goal matching (0.1 = 10% deviation allowed) | |
| binding_id | Yes | ID of the intent-command binding from governance_bind | |
| actual_state | Yes | Observed end state after action execution, compared against goal_state |
governance_verify_sealInspect
Verify a previously created audit trail seal.
| Name | Required | Description | Default |
|---|---|---|---|
| seal_id | Yes | Seal ID to verify |
governance_verify_signatureInspect
Verify a signed request and check for replay attacks.
| Name | Required | Description | Default |
|---|---|---|---|
| nonce | Yes | Unique nonce for replay protection | |
| agent_id | Yes | Agent whose signature to verify | |
| signature | Yes | The signature to verify | |
| payload_hash | Yes | Hash of the signed payload |
governance_verify_tokenInspect
Verify a release token from another agent. Confirms the token is authentic and was issued by the Kevros gateway. Free, no API key needed.
| Name | Required | Description | Default |
|---|---|---|---|
| release_token | Yes | Release token string received from governance_verify | |
| token_preimage | Yes | Token preimage string received alongside the release token |
governance_vote_resultInspect
Get the current result of a consensus vote.
| Name | Required | Description | Default |
|---|---|---|---|
| vote_id | Yes | Vote ID |
governance_vouch_for_peerInspect
Agent vouches for a peer in the trust network.
| Name | Required | Description | Default |
|---|---|---|---|
| reason | No | Reason for vouch | |
| peer_id | Yes | Peer agent ID | |
| strength | No | Vouch strength 0-1 | |
| voucher_id | Yes | Vouching agent ID |
governance_webhook_dead_letterInspect
List webhook deliveries in the dead letter queue.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
kevros_statusInspect
Check your Kevros identity trust status: calls used, calls remaining, tier, rate limits. Free.
| Name | Required | Description | Default |
|---|---|---|---|
| include_chain_details | No | Include hash-chain integrity check and latest provenance epoch |
Verify Ownership
Claim this connector by publishing a /.well-known/glama.json file on your server's domain with the following structure:
{
"$schema": "https://glama.ai/mcp/schemas/connector.json",
"maintainers": [
{
"email": "your-email@example.com"
}
]
}The email address must match the email associated with your Glama account. Once verified, the connector will appear as claimed by you.
Sign in to verify ownershipControl your server's listing on Glama, including description and metadata
Receive usage reports showing how your server is being used
Get monitoring and health status updates for your server
The connector status is unhealthy when Glama is unable to successfully connect to the server. This can happen for several reasons:
The server is experiencing an outage
The URL of the server is wrong
Credentials required to access the server are missing or invalid
If you are the owner of this MCP connector and would like to make modifications to the listing, including providing test credentials for accessing the server, please contact support@glama.ai.
Discussions
No comments yet. Be the first to start the discussion!
Your Connectors
Sign in to create a connector for this server.