Edictum

Features

Edictum feature map grouped by the runtime governance problem each feature solves.

AI Assistance

Right page if: you need the categorized feature map for Edictum across runtime decisions, rulesets, workflow gates, approvals, audit, replay, SDKs, Gate CLI, the reference stack, and security starters. Wrong page if: you need install commands -- see https://docs.edictum.ai/docs/quickstart. Gotcha: features are grouped by user problem. The reference API/app stack is optional; enforcement still happens in the agent runtime path.

Edictum is runtime governance for AI agents with real tool access.

It checks actions before tools execute: allow, block, ask for approval, warn, redact, and record the decision. This page groups the feature surface by the problem a team is trying to solve.

Runtime Decisions

Problem: Should this agent action run right now?

Runtime decisions are the center of Edictum. Every tool call enters the same decision path before the tool executes.

FeatureWhat it doesStart here
Pre-tool decisionsEvaluates an attempted tool call before side effects happenHow the pipeline works
Decision actionsReturns allow, block, ask, warn, or redact depending on rule type and modeRule types
Principal-aware evaluationUses caller, role, environment, and metadata context in rulesPrincipals
Side-effect aware rulesTreats read, pure, write, and irreversible tools differentlyArchitecture
Structured block reasonsGives agents a specific reason instead of a vague refusalDesigning block messages
Dry-run evaluationTests would-allow and would-block outcomes without executing the toolDry-run evaluation

Proof loop:

attempted action -> decision -> allow/block/approval -> audit record

Rulesets And Policy-As-Code

Problem: What is this agent allowed to read, write, call, or return?

Rulesets are policy-as-code for single tool-call boundaries. They are written as YAML and shared across Python, TypeScript, and Go.

FeatureWhat it doesStart here
YAML rulesetsDefines tool-call rules in kind: Ruleset documentsYAML rule reference
Pre rulesBlocks or asks before a tool executesPreconditions
Post rulesWarns, redacts, or blocks output after a tool returnsPostconditions
Session rulesCaps attempts, tool executions, and per-tool usageSession rulesets
Sandbox rulesRestricts paths, commands, and domainsSandbox rules
Operators and interpolationMatches arguments, metadata, principals, and dynamic message valuesOperators, variable interpolation
TemplatesStarts from common rule patterns instead of a blank fileTemplates
Schema validationValidates rules before rolloutCLI reference

Future ruleset work includes base ruleset inheritance and overlays where the shipped SDK surface supports it.

Workflow Gates

Problem: Did the agent follow the required process before moving forward?

Workflow Gates enforce ordered process with evidence. They are one feature family inside runtime governance, not the whole product.

FeatureWhat it doesStart here
Ordered stagesMoves an agent through named runtime stagesWorkflow Gates runtime
Entry conditionsBlocks a stage until required prior work existsWorkflow reference
ChecksEnforces tool and command constraints while a stage is activeWorkflow Gates runtime
Exit conditionsRequires proof before a stage can completeWorkflow reference
Evidence requirementsRecords file, command, approval, and MCP result evidenceWorkflow Gates runtime
Terminal stagesStops the agent after the workflow is doneWorkflow reference
Stage snapshotsRecords active stage, completed stages, and blocked reasonsAudit sinks
Conformance fixturesTests whether the workflow catches process violationsTesting rulesets

Workflow Gates are documented across the SDKs, but this page does not claim full feature parity. Verify the exact SDK version and workflow surface before depending on a workflow feature in production.

SDKWorkflow Gates surfaceParity note
Pythonworkflow_path, workflow_content, or a prebuilt WorkflowRuntimeReference implementation path; check the package version for the exact condition set.
TypeScriptWorkflowRuntime with loadWorkflowString()Documented runtime path; do not assume every Python helper exists in TypeScript.
Goworkflow.Load() plus guard.WithWorkflowRuntime()Documented runtime path; Gate uses Go, but SDK and Gate behavior should still be verified per release.

Human Approval Gates

Problem: Which actions need a human decision before execution?

Humans stay in the review path where it matters. Edictum can pause an action, route it for approval, and continue only when a decision is recorded.

FeatureWhat it doesStart here
ask decisionsConverts a rule match into a pending approval instead of immediate executionPreconditions
Timeout behaviorFails closed when approval is not granted in timeHuman-in-the-loop approvals
Approval backendsUses local or server-backed approval providersLifecycle callbacks
Approval queuesStores pending approvals for operator reviewReference API/app stack
Telegram approval pathSupports interactive approve/block buttons todayTelegram setup
Webhook and notification channelsSends approval notifications to Slack, Discord, webhook, or TelegramNotification channels
Approval audit trailRecords approval request, grant, block, and timeout eventsAudit sinks

Audit, Evidence, And Reporting

Problem: Can we prove what happened later?

Audit and evidence features make runtime governance inspectable after the run.

FeatureWhat it doesStart here
Structured audit eventsEmits decision records for allow, block, approval, observe, and execution outcomesDecision telemetry
Local audit sinksWrites audit data to memory, stdout, files, or OpenTelemetryObservability setup
Server-backed auditSends event streams to the optional reference API/app stackConnecting agents
Signed decision bundlesTies rule content and decision history together for later proofRuleset signing
Workflow snapshotsRecords stage state and evidence beside decisionsWorkflow Gates runtime
Run/session correlationConnects decisions back to runs, agents, sessions, and ruleset versionsDecision telemetry
Reporting queriesPlanned guidance for querying decision logs and SQL sinksRoadmap
guard.summary()Planned helper for local run summariesRoadmap

Replay And Blast-Radius Preview

Problem: What would this rule change have changed?

Replay and blast-radius preview let teams evaluate rule changes before promoting them.

FeatureWhat it doesStart here
Ruleset replayCompares historical events against a candidate rulesetCLI reference
Would-block analysisShows which actions would have been blocked in observe or replay modeObserve mode
Saved versionsKeeps ruleset versions available for comparisonReference stack rulesets
Promotion safetyUses replay before enforcing a stricter ruleTesting rulesets
Blast-radius summaryPlanned public summary of affected tools, principals, and runsRoadmap

SDKs And Framework Adapters

Problem: Can I use this with my current agent stack?

Edictum is framework-independent at the ruleset layer. SDK and adapter parity is documented per surface; do not assume every adapter or workflow helper exists in every language.

FeatureWhat it doesStart here
Python SDKReference SDK for rulesets, adapters, server connection, and local Workflow GatesPython SDK
TypeScript SDKNode/TypeScript SDK with shared YAML semantics and TypeScript adaptersTypeScript SDK
Go SDKGo rules engine, Gate CLI, adapters, and documented workflow runtime pathGo SDK
Shared schemasKeeps ruleset semantics aligned across SDKs; workflow parity is documented separatelyYAML rule reference
Conformance fixturesKeeps adapter behavior honest across languagesAdapter comparison
Python adaptersLangChain, LangGraph, OpenAI Agents, Claude SDK, CrewAI, Google ADK, Semantic Kernel, Agno, and Nanobot docsAdapter overview
TypeScript adaptersVercel AI SDK, Claude Agent SDK, LangChain.js, OpenAI Agents SDK, and OpenClaw docsTypeScript adapters
Go adaptersGoogle ADK Go, LangChainGo, Eino, Anthropic SDK Go, and Firebase Genkit docsGo adapters

Gate CLI And Coding Assistants

Problem: Can Edictum control coding agents and local tool runners?

Gate is the local enforcement path for coding assistants and other tool runners.

FeatureWhat it doesStart here
Go CLIShips the canonical edictum commandCLI reference
edictum validateValidates ruleset and workflow filesCLI reference
edictum checkEvaluates one tool-call envelope against a rulesetCLI reference
edictum replayReplays captured events against rulesetsCLI reference
edictum gate initCreates local Gate config for coding assistant enforcementGate guide
edictum gate runRuns a command under Gate enforcementGate guide
Local WALBuffers audit events locally before syncGate guide
Skill scannerReviews local skill directories for risky patternsSkill scanner
Self-protection rulesBlocks changes to enforcement files unless the workflow allows itGate guide
Ruleset signingVerifies that rules came from a trusted source where supportedRuleset signing

Reference API/App Stack

Problem: How do teams coordinate visibility, approvals, and audit across agents?

The reference API/app stack is optional. Enforcement still happens in the agent/runtime path.

FeatureWhat it doesStart here
API keysAuthenticates agent-to-API traffic for the hosted stackSetup
Events ingestionReceives decision and run events from agentsAPI reference
Runs and agentsGroups activity by run, agent, workspace, and sessionConnecting agents
Rulesets and versionsStores, versions, signs, and distributes rulesetsReference stack rulesets
ApprovalsStores approval requests and operator decisionsHuman-in-the-loop approvals
Audit feedGives teams a central decision streamReference API/app stack
SSE/hot reloadPushes ruleset updates to connected agentsHot reload
Notification channelsSends approval notifications to Telegram, Slack, Discord, or webhookNotification channels
Sample runCreates a quick reference run for app/API validationAPI reference
Signed bundle downloadPlanned proof bundle for ruleset and decision reviewRoadmap

Security And Compliance Starters

Problem: What common agent risks can I cover immediately?

Security starters turn common agent risk patterns into rulesets, tests, and evidence.

FeatureWhat it doesStart here
Adversarial testsTests whether rules hold up against bypass attemptsAdversarial testing
Secret redactionDetects and redacts sensitive outputData protection patterns
Destructive command blockingBlocks unsafe shell or deployment commandsChange control patterns
Data scope restrictionsRestricts what the agent can read, write, or sendAccess control patterns
Prompt-injection-adjacent tool controlsLimits the actions available after untrusted content is readDefense scope
OWASP Agentic starter controlsStarter control set for common agentic risksOWASP Agentic starter
EU AI Act mappingSupports compliance conversations after the runtime controls are in placeCompliance mapping

Feature Map

User problemFeature category
Should this agent action run right now?Runtime Decisions
What can the agent read, write, call, or return?Rulesets And Policy-As-Code
Did the agent follow the required process?Workflow Gates
Which actions need a human decision?Human Approval Gates
Can we prove what happened later?Audit, Evidence, And Reporting
What would this rule change have changed?Replay And Blast-Radius Preview
Can I use this with my agent stack?SDKs And Framework Adapters
Can this control coding agents and local runners?Gate CLI And Coding Assistants
How do teams coordinate across agents?Reference API/App Stack
What common risks can I cover immediately?Security And Compliance Starters

Last updated on

On this page