Autonomy Rungs
Forge implements a 4-rung autonomy ladder based on the Agentic AI Security Standard (STD-02.2). Each rung constrains the types of actions an agent can perform autonomously. Rungs are stored on the agent definition (agentDefinitions.autonomyRung) and enforced at dispatch time by Gate 8.
AUTONOMY LADDER (STD-02.2)
Human reviews before any action. The agent can read data but cannot execute, write, or perform financial operations autonomously.
Read-only access to trusted sources. Like Assistive, the agent cannot execute, write, or perform financial actions — but it can fetch and summarize governed data without human pre-approval of each read.
Agent proposes, human confirms. The agent can execute and write, but side-effecting actions require approval through separate approval gates — not enforced by the autonomy gate itself.
Agent executes within configured limits. All action types are permitted. Financial actions above a threshold trigger the Two-Agent Rule (a separate gate). Budget, concurrency, and scope constraints remain enforced.
* after approval (handled by approval gates, not the autonomy gate) ** Two-Agent Rule above threshold (separate gate)
autonomyRung default to supervised (Rung 3). This is a risk-mitigation design: existing agents that predate the rung system are not blocked, but they are not granted full autonomy either.Trust Posture
The (formally, the execution authority posture) governs what class of execution an agent is permitted to perform. Postures map directly to the autonomy tiers defined on worker roles:| Posture | Label | Allows Run Launch | Description |
|---|---|---|---|
advisory | Advisory | No | Can analyze and recommend. Cannot launch side-effecting runs. |
retrieval | Retrieval | No | Can read governed state. Cannot launch side-effecting runs. |
approval_required | Approval Required | No | Can prepare work. Run launches require explicit approval support. |
bounded_autonomous | Bounded Autonomous | Yes | Can launch runs autonomously within configured governance bounds. |
agentDefinitions.roleId), it inherits the role’s autonomyTier as its default posture. Operators can override this at the run level for specific executions.
The platform default posture is bounded_autonomous. This applies only when an agent has no role and no run-level override — in practice, most agents should have an explicit role assignment.
Posture Precedence
When the governance engine needs to determine an agent’s effective authority posture, it applies a strict precedence chain. The resolver inconvex/trust_fabric/role_resolver.ts evaluates three sources in order:
POSTURE RESOLUTION PRECEDENCE
An explicit executionAuthorityPosture set on the run document. Lets operators constrain a specific execution to a tighter posture than the role default — for example, forcing a normally-autonomous agent into approval_required for a sensitive production run.
The autonomyTier from the agent’s linked worker role. This is the primary source for most agents. The role resolver verifies the agent.roleId matches the workerRole.roleId linkage before accepting the role’s tier.
The platform default of bounded_autonomous. Applies only when the agent has no run-level override and no role linkage. The postureSource field on every GovernanceDecision records which level was used, providing full traceability.
GovernanceDecision, so operators can always trace exactly why an agent was permitted (or blocked from) a particular action.
Authority Bounds
Authority bounds are the hard resource limits that constrain what an agent can consume during execution. They are defined on the worker role and can be overridden at the agent level. The governance engine resolves effective bounds by merging role-level defaults with agent-level overrides (agent fields take precedence where set).Per-execution cost ceiling in cents. Enforced by the budget gates.
Per-execution time ceiling. Enforced by the guardrails gate.
Maximum simultaneous steps. Enforced by the concurrency gate. Agent-level override takes precedence.
Agent-to-agent transition limit. Prevents runaway delegation chains.
Cost threshold at which human review triggers. When spend crosses this threshold, escalation rules on the role can pause execution, require approval, or notify operators.
Scope Constraints
In addition to resource bounds, roles define scope constraints (ScopeConstraintsV1) that describe the operational boundaries an agent must respect:
| Constraint | Purpose | Example |
|---|---|---|
environments | Eligible execution environments | ["staging", "production"] |
toolAllowList | When present, only these tools may be used | ["search", "summarize"] |
toolDenyList | When present, these tools must not be used | ["delete_record", "deploy"] |
dataAccess | Readable data domains | ["crm", "billing"] |
writeAccess | Writable data domains | ["crm.notes", "tickets"] |
scope field and propagated into the execution payload via the GovernanceDecision.scopeConstraints field. Downstream execution surfaces (Bridge, adapters) receive these constraints for enforcement.
Autonomy Gate
Gate 8 in the dispatch pipeline enforces both trust level and autonomy rung constraints. It runs as two sequential checks within a single gate function: Trust level check — Verifies the agent’s numeric trust level meets the minimum required by the target gateway. Agents default to trust level1 (most restrictive). Gateways without an explicit minTrustLevel use the platform default of 1.
Autonomy rung check — Classifies the dispatch action type (read, execute, write, financial) and verifies the agent’s rung permits it. Rungs 1 and 2 block all non-read actions. Rungs 3 and 4 pass the autonomy gate — downstream approval and budget gates handle their additional constraints.
| Error Code | Condition | Retryable |
|---|---|---|
trust_level_insufficient | Agent trust level below gateway minimum | No |
autonomy_rung_blocked | Agent rung does not permit the action type | No |
Next Steps
Safety Gates
Full gate pipeline: all 11 gates, error codes, retry behavior, and architecture.
Governance Overview
The three pillars, governance pipeline, and GovernanceDecision structure.
Policies
Declarative policy engine: conditions, actions, and scoping rules.
Budget Controls
Budget hierarchy, envelope management, and auto-pause behavior.

