Skip to content
§ V · Domain ACT
Controls
9
Edition
v.1.2

ACT · Domain 5 of 9

Action & Tool Use Controls

Tool allowlists, blast-radius limits, and pre-execution review for irreversible actions.

ACT governs what an agent is permitted to do. Tool allowlists, blast-radius limits, dry-run / pre-execution review for irreversible actions, and human-in-the-loop confirmation for high-stakes or out-of-policy actions. ACT is where agent capability gets bounded.

Table ACT.1 · Controls in ACT · v.1.29 controls · 5-level maturity
ACT-01

Tool allowlist

Each agent has a documented tool allowlist. Tools outside the allowlist cannot be invoked at runtime.

The agent operates against a documented tool allowlist; tools outside the list are inaccessible at runtime. The allowlist is enforced by the integration layer, not by trusting the agent's own judgment. This is the foundational ACT control — without it, no other action-control is meaningful because the agent's capability surface is unbounded.

L3 · Operated

Allowlist is version-controlled, changes go through change management, and any tool call against a non-allowlisted target is logged and reviewed.

ACT-02

Per-tool authorization policy

Each tool has a per-tool authorization policy specifying when it may be invoked, with what parameters, and on what data.

Beyond the binary allowlist, each tool the agent can invoke has a per-tool authorization policy specifying the conditions under which it may be called, the parameters it may receive, and the data it may operate on. This fine-grained control prevents an agent from using an allowed tool in an unauthorized way — for example, using a permitted email tool to send to an unauthorized recipient list.

L3 · Operated

Per-tool policies are documented for all allowlisted tools; policies specify conditions, parameters, and data scope; enforcement is tested as part of pre-deployment evaluation.

ACT-03

Pre-execution review

Actions classified as irreversible or high-impact — including financial transactions, deletions, external communications, permission changes, and public publishing — require pre-execution review.

For irreversible actions (deletions, financial transfers, customer-facing communications above a threshold, permission changes, public publishing), the agent does not act unilaterally. A pre-execution review — either by a human reviewer or by a deterministic policy engine — must clear the action before it executes. Confirmation binding across multi-agent chains is governed by MAS-03.

L3 · Operated

Pre-execution review is enforced for all action categories classified as irreversible or high-impact; review records exist; the threshold and action classification are documented and reviewed at a documented cadence.

ACT-04

Rate and cost limits

Rate limits and cost ceilings are enforced on tool invocations per agent, per session, and per tenant.

Per-agent, per-session, and per-tenant rate limits and cost ceilings are enforced on tool invocations and customer-facing actions. The limits are tuned to expected volume and are enforced at the integration layer. Rate-limit breaches are logged and surfaced for review, preventing runaway agents from consuming resources or taking actions at a scale inconsistent with their specification.

L3 · Operated

Rate and cost limits are documented and enforced for all production agents; limit breaches are logged; limits have been tuned based on observed production volume within the documented cadence.

ACT-05

Loop and recursion detection

Loop and recursion detection is implemented, with automatic suspension on suspicious patterns. In multi-agent topologies, MAS-05 extends detection across agents.

Loops in agent action sequences — repeated tool calls, circular reasoning patterns, unbounded retries — are detected and trigger automatic suspension. In multi-agent topologies, MAS-05 extends detection across agent boundaries. This control prevents runaway agents from consuming resources, taking repeated actions, or entering infinite loops that bypass rate limits through creative variation.

L3 · Operated

Loop detection is active for all production agents; suspension has been triggered in at least one test or production event; detection patterns are tuned to minimize false positives while catching genuine loops.

ACT-06

Blast-radius limits

Blast-radius limits are enforced: maximum records modified per operation, maximum dollar value per transaction, maximum recipients per outbound message, and equivalent caps for other action classes.

Blast-radius limits prevent a single agent action from causing irreversible harm at scale. They are enforced by the integration layer (or by a guardrail proxy) rather than by trusting the agent itself. Limits cover records modified, monetary values, recipient counts, and equivalent caps for other action classes. Aggregate caps across multi-agent chains are governed by MAS-07.

L3 · Operated

Blast-radius limits are documented and enforced for all high-impact action classes; limits are sized to the agent's purpose; limit values have been reviewed within the documented cadence; aggregate caps are enforced where MAS-07 applies.

ACT-07

Kill switch

A kill switch allows authorized operators to immediately suspend any agent in production. Propagation behavior across multi-agent chains is governed by MAS-08.

Emergency suspend can be invoked by the risk owner or authorized operator and takes effect within a documented latency. The kill switch is the last line of defense — when all other controls have failed, this is what prevents ongoing harm. Propagation behavior across multi-agent chains is governed by MAS-08. The kill switch is tested at a documented cadence.

L3 · Operated

Kill switch exists and is operational for all production agents; the switch has been tested in a drill or live incident within the documented cadence; documented latency from invocation to full suspension is measured and within SLA.

ACT-08

Tool result validation

Tool result validation is performed before consumption: schema validation, sanity checks, and screening against known malicious signatures.

Outputs returned by tools the agent calls are validated before being incorporated into further reasoning or action. Validation includes schema validation, sanity checks (e.g., result size, expected fields), and screening against known malicious signatures. This control prevents a compromised or malfunctioning tool from injecting harmful data into the agent's decision path.

L3 · Operated

Validation is applied to all tool outputs; validation rules are documented per tool; validation failures are logged and surfaced; at least one validation failure has been caught in production or testing.

ACT-09

Dry-run / shadow mode

A dry-run or shadow mode is available for newly introduced tools, allowing observation of intended behavior without live effect.

For newly introduced tools or tool-configuration changes, a dry-run or shadow mode allows the agent's intended behavior to be observed without live effect. This control provides a safe path for introducing new capabilities into production without risking unintended consequences, and generates evidence that the tool behaves as expected before live activation.

L3 · Operated

Dry-run or shadow mode is available and has been used for at least one tool introduction or configuration change; observation results are retained; the mode is documented in the deployment process.

Cross-references