Edictum

Runtime Governance

How Edictum maps documented agent rules to executable runtime checks.

AI Assistance

Right page if: you need the product framing for Edictum as runtime governance for AI agents, or you need to map agent rules to runtime decisions, Workflow Gates, rulesets, approvals, and audit evidence. Wrong page if: you only need installation commands -- see https://docs.edictum.ai/docs/quickstart. Gotcha: Edictum records runtime behavior against declared rules and workflow evidence. It does not replace output-quality evals for accuracy, relevance, coherence, or answer quality.

Edictum is runtime governance for production AI agents.

Agent frameworks build the agent. Edictum checks what the agent is about to do before the tool executes: allow, block, ask for approval, warn, redact, and record the decision.

Runtime Boundary Levels

A runtime policy starts by naming how much operational freedom the agent should have.

LevelWhat the agent can doRuntime boundary
Read-onlyInspect approved context, summarize, search, or answer without changing stateRead-only tools, tight data scopes, low session limits, audit-only process evidence
Bounded actionExecute bounded work inside a declared workflowRead/write tools inside sandbox boundaries, stage evidence, approvals for critical transitions
Broad actionOperate across broad systems with material side effectsStrong sandboxing, explicit approval points, terminal stages, stricter session limits, audit review

The demand center is bounded action: agents useful enough to do production work, but constrained enough that teams can review, approve, and audit what happened.

Data Operations

Runtime policies should also declare what kind of data operations the agent can perform.

Operation shapeMeaningTypical Edictum boundary
Read-onlyThe agent can inspect approved data but cannot mutate systemsRulesets allow read tools, block write tools, and sandbox paths, commands, or domains
Write-onlyThe agent can submit bounded writes without reading broad contextWorkflow Gates require evidence from trusted inputs, rulesets restrict write targets and payload shape
Read/writeThe agent can read context and then change stateWorkflow Gates enforce read-before-write, rulesets limit both read scope and write scope

Read/write agents need the strongest process checks because the agent can use retrieved information to decide what to change. That is where Workflow Gates matter most.

From Policy To Runtime

A documented policy becomes executable when each claim maps to an enforcement point.

Policy claimRuntime boundary
The agent may read only approved sourcesSandbox rules for paths, commands, domains, and data tools
The agent may write only within a scopePre-execution checks and sandbox boundaries for write tools
The agent must inspect evidence before changing stateWorkflow Gate entry or exit conditions such as file_read(...) and command_matches(...)
A human must approve critical transitionsWorkflow Gate approval blocks or action: ask rules
The behavior must be auditableAudit events, workflow snapshots, and observed ruleset events

Edictum turns documented agent rules into executable runtime checks.

Rulesets And Workflow Gates

Rulesets and Workflow Gates enforce different parts of the same runtime policy.

Rulesets enforce single tool-call boundaries:

  • Is this tool allowed for this principal?
  • Is this file path, command, domain, query, or payload inside the declared boundary?
  • Has this session exceeded a tool-call or attempt limit?
  • Should this output warn, redact, or block?

Workflow Gates enforce ordered process with evidence:

  • Has the agent read the required source before writing?
  • Has the agent produced command evidence before advancing stages?
  • Has a human approved a critical transition?
  • Has the session reached a terminal stage where more action should stop?

Rulesets answer whether one call is in bounds. Workflow Gates answer whether the agent is allowed to be at this point in the process.

Behavioral Conformance

Edictum records runtime behavior against declared rules and workflow evidence.

Useful metrics include:

  • allowed vs blocked tool-call rate by ruleset version
  • observed would-block rate before switching a ruleset to enforce mode
  • stage completion rate by Workflow Gate
  • blocked stage advances caused by missing evidence
  • approval request, approval grant, and approval timeout rate
  • session attempt-to-execution ratio for retry loops
  • ruleset, workflow, principal, and adapter version tied to each audit event

These metrics show whether the agent stayed inside its runtime rules. They also show where the policy is too loose, too strict, or missing evidence.

What Edictum Does Not Measure

Edictum does not replace output-quality evals.

It does not measure:

  • accuracy
  • correctness
  • relevance
  • coherence
  • answer quality
  • task success
  • user satisfaction

Use Edictum for runtime enforcement and behavioral conformance. Use output-quality evals to judge the quality of what the model says or produces.

Example Policy

policy:
  name: support-refund-agent
  data_operations: read_write
  boundaries:
    reads:
      - customer_case
      - order_status
    writes:
      - refund_request
  required_process:
    - read_case_before_refund
    - evidence_before_stage_advance
    - approval_before_refund_over_250

The policy becomes executable through:

  • a ruleset that allows only approved read and write tools
  • sandbox rules that restrict data sources and mutation targets
  • a Workflow Gate that requires case evidence before refund creation
  • an approval boundary before high-value refunds
  • audit events that record every decision

Last updated on

On this page