Policies are the primary mechanism for governing what your AI agents are allowed to do. When an agent sends an event to Secureagentics, all policies assigned to that agent are evaluated in real time before the event is accepted. If a policy condition is met, the configured action — blocking, rate-limiting, flagging for approval, or filtering data — is applied immediately.Documentation Index
Fetch the complete documentation index at: https://docs.adrian.secureagentics.ai/llms.txt
Use this file to discover all available pages before exploring further.
Policy types
Secureagentics supports four policy types:| Type | What it does |
|---|---|
block_action | Rejects the event outright and returns a 403 to the agent. Use this to prohibit specific behaviors, such as tool calls to disallowed endpoints. |
rate_limit | Restricts the number of events of a given type per agent per time window. Exceeding the limit blocks further events until the window resets. |
data_filter | Inspects event payloads for sensitive data patterns (such as PII or credentials) and redacts or blocks the event. |
require_approval | Holds the event in a pending state until a human reviewer approves or rejects it from the dashboard. |
An agent can have multiple policies assigned simultaneously. Policies are evaluated in the order they were assigned. The first matching policy that triggers a blocking action stops evaluation — subsequent policies are not checked for that event.
Create a policy
- Dashboard
- API
Open the Policies page
In the Secureagentics dashboard, navigate to Settings → Policies. You will see a list of existing policies in your organization.
Set the policy name and type
Enter a descriptive name for the policy. Choose a Policy Type from the dropdown:
block_action, rate_limit, data_filter, or require_approval.Configure conditions
Conditions define when the policy fires. The available condition fields depend on the policy type:
- Event type — target a specific event type such as
promptortool_call. - Payload match — match on a field value in the event payload (for example,
tool == "external_api"). - Threshold — for
rate_limitpolicies, set the maximum event count and the time window (seconds).
Configure the action
Set what happens when the condition is met. For
block_action, the event is rejected. For rate_limit, specify the limit and window. For data_filter, choose whether to redact or block. For require_approval, optionally add a reviewer notification email.Save the policy
Click Save Policy. The policy is created but not yet active on any agent — you need to assign it to one or more agents (see Assign a policy to an agent below).
Example: rate-limit policy for 100 prompts per minute
The following policy blocks an agent from sending more than 100prompt events per 60-second window. This prevents runaway loops or abusive usage patterns from consuming excessive LLM resources.
Assign a policy to an agent
A policy has no effect until you assign it to one or more agents.- Dashboard
- API
What happens when a policy is violated
When an agent sends an event and a policy condition is met:-
The event is blocked. Secureagentics returns HTTP
403to the agent with a response body that includes"error": "policy_violation"and thepolicy_idthat triggered the block. -
An alert is fired (if the policy has
"alert": truein its actions). The alert appears in the Alerts feed in the dashboard, and any configured notification channels (email, Slack, webhook) receive a notification. -
The event is recorded in audit logs. Even though the event was blocked, Secureagentics stores a record of the attempted event and the policy that blocked it. You can retrieve these records via
GET /v1/audit-logs.