Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 0 additions & 15 deletions api-reference/safe-house-overview.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -37,16 +37,16 @@
"enforcement_mode": "quarantine",
"thresholds": {
"bec_fraud": { "warn": 0.45, "block": 0.80 },
"prompt_injection": { "warn": 0.40, "block": 0.75 },

Check warning on line 40 in api-reference/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

api-reference/safe-house-overview.mdx#L40

Did you really mean 'prompt_injection'?
"indirect_injection": { "warn": 0.50, "block": 0.85 },

Check warning on line 41 in api-reference/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

api-reference/safe-house-overview.mdx#L41

Did you really mean 'indirect_injection'?
"social_engineering": { "warn": 0.50, "block": 0.80 },

Check warning on line 42 in api-reference/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

api-reference/safe-house-overview.mdx#L42

Did you really mean 'social_engineering'?
"agent_spoofing": { "warn": 0.45, "block": 0.75 },

Check warning on line 43 in api-reference/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

api-reference/safe-house-overview.mdx#L43

Did you really mean 'agent_spoofing'?
"hijack_attempt": { "warn": 0.55, "block": 0.85 },

Check warning on line 44 in api-reference/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

api-reference/safe-house-overview.mdx#L44

Did you really mean 'hijack_attempt'?
"data_exfiltration": { "warn": 0.45, "block": 0.80 },

Check warning on line 45 in api-reference/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

api-reference/safe-house-overview.mdx#L45

Did you really mean 'data_exfiltration'?
"privilege_escalation":{ "warn": 0.45, "block": 0.80 }

Check warning on line 46 in api-reference/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

api-reference/safe-house-overview.mdx#L46

Did you really mean 'privilege_escalation'?
},
"session_risk_escalation_threshold": 0.70,

Check warning on line 48 in api-reference/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

api-reference/safe-house-overview.mdx#L48

Did you really mean 'session_risk_escalation_threshold'?
"canary_auto_create": false

Check warning on line 49 in api-reference/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

api-reference/safe-house-overview.mdx#L49

Did you really mean 'canary_auto_create'?
}
```

Expand Down Expand Up @@ -286,21 +286,6 @@

## Special endpoints

### Sovereign agent setup

One-call configuration for sovereign agents — applies hardened defaults, creates initial canaries, sets enforcement mode to block, and enables all threat types.

```bash
curl -X POST https://api.mnemom.ai/v1/safe-house/sovereign-setup \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"agent_id": "mnm-550e8400-e29b-41d4-a716-446655440000"
}'
```

This is the recommended starting point for agents handling financial transactions, sensitive data access, or privileged system actions.

### Cross-Agent campaign detection

List detected attack campaigns — groups of related attacks targeting multiple agents from the same infrastructure.
Expand Down Expand Up @@ -343,7 +328,7 @@

## Error responses

All Safe House endpoints return standard Mnemom error objects:

Check warning on line 331 in api-reference/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

api-reference/safe-house-overview.mdx#L331

Did you really mean 'Mnemom'?

```json
{
Expand Down
12 changes: 7 additions & 5 deletions changelog.mdx
Original file line number Diff line number Diff line change
@@ -1,22 +1,22 @@
---
title: "Changelog"
description: "Release history and updates for Mnemom protocols and infrastructure"

Check warning on line 3 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L3

Did you really mean 'Mnemom'?
sidebarTitle: "Changelog"
icon: "clock-rotate-left"
---

> **Renamed:** Smoltbot is now Mnemom. The CLI command is now `mnemom`. Install: `npm install -g @mnemom/smoltbot`.

Check warning on line 8 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L8

Did you really mean 'Smoltbot'?

Check warning on line 8 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L8

Did you really mean 'Mnemom'?

Track changes across the Mnemom ecosystem -- protocols, SDKs, infrastructure, and tooling.

Check warning on line 10 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L10

Did you really mean 'Mnemom'?

Check warning on line 10 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L10

Did you really mean 'SDKs'?

---

## Governance signals — operator-actionable observation surface (ADR-048)
<sub>May 2026</sub>
<sub>May 2026 (amended 2026-05-07)</sub>

Carved the architectural boundary between **agent-actionable carryover** (`pending_advisories`, runtime.* + manual.* sources) and **operator-actionable observation** (new `governance_signals` table, `sideband.*` + future `protection.*` / `posture.*` sources). Application-side composers (e.g., Polis for sovereign-CTO agents like Wintermute) own the edge case of folding a fleet signal into a sovereign agent's prompt — the platform never auto-injects.
Carved the architectural boundary between **agent-actionable carryover** (`pending_advisories`, runtime.* + manual.* sources) and **operator-actionable observation** (new `governance_signals` table, `sideband.*` + future `protection.*` / `posture.*` sources). Fleet-shaped governance signals are operator content. The platform serves them to operators only — humans, dashboards, webhooks, paging — and offers no path by which an operator-side signal becomes prompt content for any agent.

The triggering symptom: a sovereign agent receiving the same `cluster_partition` paragraph 2× per turn for weeks. Root cause: cron-driven, fleet-shaped observations were mis-layered into per-turn agent context. ADR-048 fixed the layering at the schema, producer, and consumer layers simultaneously.
The triggering symptom: an agent receiving the same `cluster_partition` paragraph 2× per turn for weeks. Root cause: cron-driven, fleet-shaped observations were mis-layered into per-turn agent context. ADR-048 fixed the layering at the schema, producer, and consumer layers simultaneously.

**What's new:**

Expand All @@ -26,15 +26,17 @@
- New notification destinations: Slack incoming-webhook, email (Resend), PagerDuty Events API v2, generic HMAC-signed webhook. Per-org configurable + filterable + rule-driven.
- New escalation rule engine with rate-based gating (`threshold_count` + `window_minutes`).
- New UI at team + agent scope (`/dashboard/teams/:teamId/governance` + `/dashboard/agents/:uuid/governance`).
- `mnemom governance` CLI subcommand group: `signals`, `destinations`, `rules`.

Check warning on line 29 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L29

Did you really mean 'subcommand'?
- `@mnemom/agent-alignment-protocol@1.1.0` ships TypeScript types + sovereign-composer example.
- `@mnemom/agent-alignment-protocol@1.1.0` ships TypeScript governance signal types (consumed by operator dashboards, webhook subscribers, alerting tools).
- `@mnemom/agent-integrity-protocol@1.1.0` adds optional `triggering_governance_signal_id` to `IntegritySignal`.

**Cutover:** observer writers redirected (mnemom-platform#246), gateway reader narrowed (mnemom-platform#247). Pre-cutover `pending_advisories` rows for `sideband.*` TTL out within 24 hours.

Check warning on line 33 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L33

Did you really mean 'Cutover'?

**Charter invariant** (`safe-house-hardening/validation-charter.md` §I15): operator observations never reach an agent's prompt; agent advisories never reach the operator alert rail. Asserted by the harness.

See [governance signals](/concepts/governance-signals), [schema](/specifications/governance-signals-schema), [operator runbook](/guides/operating-governance-signals), [sovereign-agent composition](/guides/sovereign-agent-composition).
**Amendment 2026-05-07:** ADR-048's original §7 ("Application-owned sovereign-agent composition") was retracted as a layering mistake — encoding any one application's role typology in the platform's API surface, SDK examples, and ratifying ADR couples Mnemom to a customer's design. The agent-scoped fast-path endpoint `/v1/internal/governance-signals?agent_id=…` and the Polis-shaped `POST /v1/safe-house/sovereign-setup` preset have been removed; `@mnemom/agent-alignment-protocol@1.2.0` removes the `examples/sovereign-agent-composer.ts` example file (governance signal types stay). Applications that want fleet context inside an agent's prompt derive it from application-internal data and render it application-side; the platform never knows.

Check warning on line 37 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L37

Did you really mean 'Mnemom'?

See [governance signals](/concepts/governance-signals), [schema](/specifications/governance-signals-schema), [operator runbook](/guides/operating-governance-signals).

---

Expand All @@ -45,7 +47,7 @@

**No action required for existing agents.** All `smolt-{8_hex}` IDs continue to work permanently — they are cryptographically committed to proof chains and will never be changed or invalidated.

The new format provides 128-bit entropy (vs. 32-bit previously), eliminating any practical risk of ID collision at scale. Agent IDs are now server-assigned UUIDs rather than hash-derived values, making them recoverable via API key re-registration if your local config is lost.

Check warning on line 50 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L50

Did you really mean 'UUIDs'?

- **CLI:** `@mnemom/smoltbot@0.7.0` — `mnemom init` registers new agents with `mnm-*` IDs automatically
- **API:** `POST /internal/agents` — new service-to-service endpoint (gateway delegates agent creation to mnemom-api, single canonical creation path)
Expand All @@ -71,24 +73,24 @@
## Tiered proving & arena cost optimization
<sub>March 2026</sub>

**Proving costs reduced by 80-95%.** Stale alignment cards during rapid development caused false `boundary_violation` verdicts, each proven at 100% rate on Modal GPUs. The new tiered proving strategy defers proving for card-gap violations until DDR reconciliation classifies them, then only proves confirmed real violations.

Check warning on line 76 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L76

Did you really mean 'GPUs'?

- **[Deferred proofs](/protocols/aip/verifiable-verdicts#deferred-proofs)**: `shouldProve()` now detects card gaps from policy evaluation and defers proving instead of immediately dispatching to GPU. Observer DDR resolves deferred proofs as `skipped_card_gap`, `skipped_noise`, or upgrades to `pending`.
- **New `proof_boundary_cap` setting**: Rate-limits boundary violation proving on paths where policy evaluation isn't available (streaming). Configurable per-agent.
- **New proof statuses**: `deferred`, `skipped_card_gap`, `skipped_noise` added to `verdict_proofs` table.
- **Arena frequency reduction**: Adversarial simulation cron schedules reduced from 436 to 24 executions/day (94.5% reduction). Arena simulation every 2h (was 5min), sideband analyzer every 4h (was 15min), red team evolution every 12h (was 30min).

Check warning on line 81 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L81

Did you really mean 'cron'?

---

## AAP 0.5.0 — Version Alignment & Trust Edges
<sub>March 2026</sub>

**Ecosystem-wide version alignment.** The `aap_version` field now defaults to `"0.5.0"` across all SDKs, schemas, fixtures, and examples. This release also introduces YAML policy authoring and the Trust Edges API.

Check warning on line 88 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L88

Did you really mean 'SDKs'?

- **Version alignment**: `aap_version` default bumped from `"0.1.0"` to `"0.5.0"` across all Mnemom packages

Check warning on line 90 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L90

Did you really mean 'Mnemom'?
- **YAML policy support**: The API now accepts policies in `text/yaml` and `application/yaml` content types alongside JSON
- **Trust Edges API**: `GET`/`POST`/`DELETE /v1/agents/:id/trust-edges` for declaring explicit trust relationships between agents
- **Fixture consistency**: Test fixture version inconsistencies resolved (`"1.0"` → `"0.5.0"`) across smoltbot observer/gateway

Check warning on line 93 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L93

Did you really mean 'smoltbot'?
- **Backward compatible**: Existing cards with `aap_version: "0.1.0"` continue to work without modification
- [Upgrading to 0.5.0 — Migration Guide](/guides/upgrading-to-0-5)

Expand All @@ -97,21 +99,21 @@
## Card Lifecycle & Policy Intelligence — CLPI
<sub>February 2026</sub>

**Mnemom becomes a policy-driven governance platform.** A 5-phase overhaul that transforms alignment cards into lifecycle-managed artifacts with policy enforcement, trust recovery, and on-chain anchoring. Root cause: configuration drift (new tools added without updating alignment cards) caused false violations and unfair trust score declines. CLPI fixes this by distinguishing card gaps from behavioral gaps and enabling trust recovery.

Check warning on line 102 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L102

Did you really mean 'Mnemom'?

### Phase 1: Policy Engine
- **[Policy DSL](/specifications/policy-dsl)**: YAML-based governance rules with `capability_mappings` (glob patterns bridging tools to card categories), `forbidden` rules, `escalation_triggers`, and configurable `defaults`
- **Three evaluation contexts**: CI/CD static validation, gateway live enforcement, observer post-action analysis
- **Enforcement modes**: `warn` (log only), `enforce` (block with 403), `off` — controlled independently from alignment enforcement via `X-Policy-Verdict` header
- **Grace period**: 24-hour default window for newly discovered tools before they become violations
- **[Policy CLI](/gateway/policy-cli)**: `smoltbot policy init|validate|publish|list|test|evaluate` subcommands with CI-friendly exit codes

Check warning on line 109 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L109

Did you really mean 'subcommands'?
- **Policy merge**: Org-level + agent-level policies merge with union semantics for mappings and floor semantics for defaults

### Phase 2: Card Lifecycle & Trust Recovery
- **[Card amendments](/concepts/card-lifecycle)**: Tracked changes with version history and diffs — cards are now lifecycle-managed artifacts
- **[Violation reclassification](/guides/trust-recovery)**: Distinguish `card_gap` (configuration error) from `behavior_gap` (genuine misbehavior) — reclassified card_gap violations are excluded from compliance and drift scoring

Check warning on line 114 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L114

Did you really mean 'card_gap'?
- **Score recomputation**: Automatic trust score recovery after reclassification with trust graph propagation (BFS, depth 3, max 50 agents, 0.85/hop decay)
- **Compliance export**: Full audit trail of violations, reclassifications, card amendments, and score history

Check warning on line 116 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L116

Did you really mean 'reclassifications'?
- **[Reclassification API](/api-reference/reclassification-overview)**: 5 endpoints for reclassify, recompute, export, and history

### Phase 3: Intelligence layer
Expand All @@ -123,12 +125,12 @@
### Phase 4: On-Chain verification
- **[ERC-8004 Reputation Registry](/concepts/on-chain-verification)**: Smart contracts on Base L2 for immutable reputation anchoring
- **MnemoReputationRegistry**: Publish individual and batch scores (max 200/batch) with metadata hashes
- **MnemoMerkleAnchor**: Anchor Merkle roots for tamper-evident verification

Check warning on line 128 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L128

Did you really mean 'Merkle'?
- **[On-Chain API](/api-reference/on-chain-overview)**: 5 endpoints for anchoring roots, publishing scores, verification, and history

### Phase 5: Observability
- **Policy OTel spans**: `policy.evaluate` span with verdict, violations, and duration attributes

Check warning on line 132 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L132

Did you really mean 'OTel'?
- **Reclassification OTel spans**: `reclassification.process` span with before/after scores and amendment tracking

Check warning on line 133 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L133

Did you really mean 'OTel'?
- **Policy-aware drift detection**: Distinguishes policy gaps from genuine misalignment in drift analysis

**New documentation:**
Expand All @@ -143,12 +145,12 @@
## Team reputation & risk scoring (E-25)
<sub>February 2026</sub>

**Teams become first-class meta-agents.** Persistent team identity, team alignment cards, accumulated team reputation with a 5-component scoring model, embeddable team badges, roster management with audit trails, ZK proofs for team reputation, and 9 new webhook events.

Check warning on line 148 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L148

Did you really mean 'embeddable'?

- **Team CRUD**: Create, manage, and archive teams of 2-50 agents with persistent identity and organizational scope
- **Team alignment cards**: Auto-derived from member cards (union of values, bounded actions, forbidden actions, escalation triggers) or manually curated — with full version history
- **Team reputation scoring**: 5-component model (coherence history 35%, member quality 25%, operational record 20%, structural stability 10%, assessment density 10%) on the same AAA–NR scale
- **Team badges**: Embeddable SVG badges at `/v1/teams/{id}/badge.svg` with all 4 variants (score, score_tier, score_trend, compact)

Check warning on line 153 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L153

Did you really mean 'Embeddable'?

Check warning on line 153 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L153

Did you really mean 'score_tier'?

Check warning on line 153 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L153

Did you really mean 'score_trend'?
- **Roster management**: Add/remove members with full audit trail and roster history endpoint
- **ZK proofs**: Team reputation scores are cryptographically provable via SP1 STARK proofs, chaining individual proof attestations
- **9 webhook events**: `team.created`, `team.archived`, `team.member_added`, `team.member_removed`, `team.card_updated`, `team_reputation.score_changed`, `team_reputation.grade_changed`, `quota.team_reputation_exceeded`, `quota.team_reputation_warning`
Expand All @@ -159,15 +161,15 @@

---

## Mnemom Trust Rating -- Public surfaces & viral distribution (E-07)

Check warning on line 164 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L164

Did you really mean 'Mnemom'?
<sub>February 2026</sub>

**Trust scores escape the dashboard.** Public reputation pages, embeddable badges, a verification endpoint with cryptographic proof chains, an A2A trust extension for inter-agent reputation sharing, a GitHub Action for CI/CD gates, and SDK reputation methods across TypeScript and Python.

Check warning on line 167 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L167

Did you really mean 'embeddable'?

- **Public reputation pages**: Every agent with a published score gets a public page at `/agents/{agent_id}/reputation` with full component breakdown, trend chart, and cryptographic verification link
- **Trust Directory**: Searchable directory of all publicly rated agents at `/trust-directory` — filter by grade, confidence, trend, and sort by score or checkpoints
- **Badge ecosystem**: New `score_tier` badge variant displays `[ Mnemom Trust | 782 Established ]`; agents with no reputation record display a "Not Rated" badge instead of a broken image
- **Verification endpoint**: `GET /v1/reputation/{agent_id}/verify` returns a cryptographic proof chain (certificate hash, Merkle root, hash chain validation) for independent score verification

Check warning on line 172 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L172

Did you really mean 'Merkle'?
- **A2A trust extension**: `a2a_trust_extension` field added to the reputation response, providing a pre-built trust block for A2A Agent Cards with live score, grade, and verified URLs
- **GitHub Action**: `mnemom/reputation-check@v1` gates CI/CD pipelines on minimum reputation scores — fail builds when agent scores drop below a configurable threshold
- **SDK reputation methods**: TypeScript `getReputation()`, `createReputationGate()`, `getA2AReputationExtension()`; Python `get_reputation()`, `ReputationGate`
Expand All @@ -181,11 +183,11 @@
## GPU-accelerated proving (Fly.io CPU to Modal H100 GPU)
<sub>February 2026</sub>

**Proving latency reduced from ~270 seconds to ~700ms — a 400x speedup.** Migrated the ZK prover from Fly.io (4-core CPU, SP1 cpu mode) to Modal (NVIDIA H100 GPU, SP1 cuda mode). Per-proof cost dropped from ~$0.005 to ~$0.001 with per-second GPU billing that scales to zero.

Check warning on line 186 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L186

Did you really mean 'cpu'?

Check warning on line 186 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L186

Did you really mean 'cuda'?

- **Infrastructure**: Fly.io performance VMs replaced by Modal serverless H100 GPUs

Check warning on line 188 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L188

Did you really mean 'VMs'?

Check warning on line 188 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L188

Did you really mean 'serverless'?

Check warning on line 188 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L188

Did you really mean 'GPUs'?
- **Proving mode**: `SP1_PROVER=cpu` (270s avg) to `SP1_PROVER=cuda` (700ms avg)
- **Benchmarks**: clear 710ms, boundary_violation 721ms, review_needed 690ms (warm GPU: 673ms)

Check warning on line 190 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L190

Did you really mean 'boundary_violation'?

Check warning on line 190 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L190

Did you really mean 'review_needed'?
- **Receipt size**: ~2.7 MB (real SP1 STARK proof)
- **Cost**: ~$0.001/proof (Modal H100 at ~$0.001/sec, ~0.7s per proof)
- **Cold start**: 60-120s for SP1 prover initialization; warm requests sub-second
Expand Down Expand Up @@ -228,7 +230,7 @@

**See exactly what your customer sees.** Enterprise support can now view the real dashboard from any customer's perspective -- read-only, fully audit-logged, with automatic 1-hour expiry.

- **Session-based impersonation**: Token-based approach avoids JWT forgery; admin's own JWT stays the auth credential

Check warning on line 233 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L233

Did you really mean 'admin's'?
- **3 API endpoints**: `POST /impersonate` (start), `GET /impersonation/:id` (status), `POST /impersonation/:id/end` (exit)
- **Read-only enforcement**: Centralized write guard rejects all POST/PUT/PATCH/DELETE during active session
- **Full audit trail**: Session start/end logged to `admin_audit_log`, per-page visits tracked
Expand All @@ -241,7 +243,7 @@
## Custom conscience values (E-02)
<sub>February 2026</sub>

**Per-org alignment policies injected into the AIP conscience prompt.** Enterprise orgs can now define custom conscience values -- "patient safety > efficiency" for healthcare, "never recommend regulatory risk" for fintech -- that apply to every agent integrity check.

Check warning on line 246 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L246

Did you really mean 'orgs'?

Check warning on line 246 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L246

Did you really mean 'fintech'?

- **7 API endpoints**: CRUD, reorder, mode control, and audit log under `/v1/orgs/:org_id/conscience-values`
- **Layered value resolution**: Base defaults + org values + per-agent values, with `augment` (additive) and `replace` modes
Expand Down Expand Up @@ -274,13 +276,13 @@

### Phase 12: Verifiable Integrity -- Cryptographic proof layer

Every AIP verdict can now be independently verified through a four-layer cryptographic attestation stack. Agents produce IntegrityCertificates that bundle Ed25519 signatures, hash chain proofs, Merkle inclusion proofs, and optional SP1 zero-knowledge proofs into a single portable artifact.

Check warning on line 279 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L279

Did you really mean 'Merkle'?

- **Ed25519 checkpoint signing** with key rotation and public key registry
- **Hash chain integrity** linking consecutive verdicts into a tamper-evident sequence
- **Merkle tree certificates** enabling compact inclusion proofs for any checkpoint

Check warning on line 283 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L283

Did you really mean 'Merkle'?
- **Zero-knowledge proofs** (SP1 STARK) for verdict derivation verification
- 7 new verification API endpoints (`/v1/verify`, `/v1/keys`, certificate, proof, and Merkle endpoints)

Check warning on line 285 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L285

Did you really mean 'Merkle'?
- Client-side WASM verifier for offline, trustless verification
- Optimistic proving strategy: 10% stochastic + all boundary violations
- [Certificates specification](/protocols/aip/certificates)
Expand All @@ -288,7 +290,7 @@

### AAP v0.1.0 -- Initial specification release

The Agent Alignment Protocol specification is now public. AAP provides post-hoc verification infrastructure for autonomous agents: Alignment Cards declare an agent's alignment posture, AP-Traces create auditable decision records, and Value Coherence Handshakes verify compatibility before multi-agent coordination.

Check warning on line 293 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L293

Did you really mean 'auditable'?

- Full specification with JSON schemas
- Python SDK (`pip install agent-alignment-proto`) and TypeScript SDK (`npm install @mnemom/agent-alignment-protocol`)
Expand All @@ -303,15 +305,15 @@
- Session windowing and integrity drift detection
- Python SDK (`pip install agent-integrity-proto`) and TypeScript SDK (`npm install @mnemom/agent-integrity-protocol`)

### Smoltbot v1.0 -- Public launch

Check warning on line 308 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L308

Did you really mean 'Smoltbot'?

Mnemom's AI gateway and CLI tool for zero-configuration agent transparency infrastructure.

Check warning on line 310 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L310

Did you really mean 'Mnemom's'?

- Cloudflare Workers-based gateway with automatic agent identification
- Observer Worker for AP-Trace generation and AAP verification
- AIP Engine for real-time thinking block analysis
- CLI: `smoltbot init --provider anthropic` for full-stack setup
- API key hashing (never stored in plaintext), raw log deletion within 60 seconds

Check warning on line 316 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L316

Did you really mean 'plaintext'?

### aip-otel-exporter v0.1.0 -- OpenTelemetry integration

Expand All @@ -320,11 +322,11 @@
- TypeScript package: `@mnemom/aip-otel-exporter`
- Python package: `aip-otel-exporter`
- GenAI semantic convention span attributes for integrity verdicts, verification results, and drift alerts
- Compatible with Datadog, Grafana, Splunk, Arize, Langfuse, and any OTel collector

Check warning on line 325 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L325

Did you really mean 'Datadog'?

Check warning on line 325 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L325

Did you really mean 'Grafana'?

Check warning on line 325 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L325

Did you really mean 'Splunk'?

Check warning on line 325 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L325

Did you really mean 'Arize'?

Check warning on line 325 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L325

Did you really mean 'Langfuse'?

Check warning on line 325 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L325

Did you really mean 'OTel'?

### Mnemom dashboard -- Web console

Check warning on line 327 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L327

Did you really mean 'Mnemom'?

The Mnemom Dashboard provides a web interface for managing agents, viewing traces, and monitoring integrity scores.

Check warning on line 329 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L329

Did you really mean 'Mnemom'?

- Agent management with Alignment Card creation and rotation
- Trace viewer with filtering by session, verdict, and time range
Expand All @@ -336,9 +338,9 @@
Enterprise features for organizations deploying agents at scale.

- Enterprise billing with usage-based pricing and license keys
- SSO/SAML authentication via Supabase Auth

Check warning on line 341 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L341

Did you really mean 'Supabase'?
- Admin customer detail views and usage analytics
- Daily usage rollup and billing reconciliation

Check warning on line 343 in changelog.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

changelog.mdx#L343

Did you really mean 'rollup'?

---

Expand Down
9 changes: 4 additions & 5 deletions concepts/governance-signals.mdx
Original file line number Diff line number Diff line change
@@ -1,19 +1,19 @@
---
title: "Governance signals"
description: "Operator-actionable observations from Mnemom's platform detectors — fleet drift, value fault lines, coherence drops, behavior drift. Surfaced to operators (UI, webhook, REST) and to application composers, never auto-injected into agent prompts."
description: "Operator-actionable observations from Mnemom's platform detectors — fleet drift, value fault lines, coherence drops, behavior drift. Surfaced to operators (UI, webhook, REST). The platform never injects governance signals into an agent's prompt."

Check warning on line 3 in concepts/governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

concepts/governance-signals.mdx#L3

Did you really mean 'Mnemom's'?
sidebarTitle: "Governance signals"
icon: "siren"
---

# Governance signals

**Governance signals** are operator-actionable observations produced by Mnemom platform detectors. They surface fleet-shaped concerns — coherence drift across a team, value fault lines between agents, fleet topology changes, per-agent behavior drift — that an *operator* (CISO, org admin, team admin, on-call SRE) needs to see and act on.

Check warning on line 10 in concepts/governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

concepts/governance-signals.mdx#L10

Did you really mean 'Mnemom'?

They are deliberately distinct from the [per-turn advisories](/concepts/safe-house) that the gateway injects into an agent's next prompt. The architectural commitment, ratified in [ADR-048](https://github.com/mnemom/scale/blob/main/decisions/ADR-048-governance-signals-layering.md), is:

> **Operator observations never reach an agent's prompt; agent advisories never reach the operator alert rail.**

If a non-sovereign agent is told "Recalibrate fleet alignment before the next response," it has no team-management authority, no acknowledgment surface, and no remediation it can perform from inside its own LLM call. The signal is real and important — but the recipient is wrong. Governance signals fix that mis-layering.
If an agent is told "Recalibrate fleet alignment before the next response," it has no team-management authority, no acknowledgment surface, and no remediation it can perform from inside its own LLM call. The signal is real and important — but the recipient is wrong. Governance signals fix that mis-layering by routing fleet-shaped observations exclusively to operator surfaces.

## What gets surfaced

Expand All @@ -34,7 +34,7 @@
2. **Webhook** events: `governance.signal.fired`, `governance.signal.acknowledged`, `governance.signal.resolved`, `governance.signal.dismissed`, `governance.escalation.triggered`. HMAC-SHA256 signed POSTs (`X-Mnemom-Signature: sha256=…`) following the AAP webhook contract.
3. **REST API**: `GET /v1/orgs/:org/governance/signals`, `GET /v1/teams/:team/governance/signals`, `GET /v1/agents/:agent/governance/signals`, plus state-transition endpoints. See [Governance Signals Schema](/specifications/governance-signals-schema).

The platform **never** injects governance signals into an agent's LLM request. That decision lives entirely in your application, if you have a sovereign-CTO-shaped agent who legitimately can act on fleet-level signals (e.g., a fleet orchestrator agent with reorg tools). See [Sovereign-agent composition](/guides/sovereign-agent-composition) for the worked pattern.
The platform **never** injects governance signals into an agent's LLM request — there is no exception, no per-agent fast-path, no platform-supplied composer pattern. Applications that want fleet context inside an agent's prompt derive it from application-internal data and render it application-side; the platform offers no surface for that. (See [ADR-048](https://github.com/mnemom/scale/blob/main/decisions/ADR-048-governance-signals-layering.md)'s 2026-05-07 amendment for the full rationale.)

## Operator workflow

Expand All @@ -54,7 +54,7 @@
- **`dismissed`** — operator marked as not actionable (noise, redundant).
- **`expired`** — TTL elapsed without operator action; configurable per posture, default 30 days.

The schema's partial unique index on `(scope, scope_id, source, pattern_type) WHERE status='open'` makes detection idempotent: repeated cron emissions of the same condition refresh the open row in place rather than stacking. This is the architectural fix to the symptom that triggered this work — a sovereign agent receiving the same `cluster_partition` paragraph 2× per turn for weeks.
The schema's partial unique index on `(scope, scope_id, source, pattern_type) WHERE status='open'` makes detection idempotent: repeated cron emissions of the same condition refresh the open row in place rather than stacking. This is the architectural fix to the symptom that triggered this work — an agent receiving the same `cluster_partition` paragraph 2× per turn for weeks.

Check warning on line 57 in concepts/governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

concepts/governance-signals.mdx#L57

Did you really mean 'schema's'?

Check warning on line 57 in concepts/governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

concepts/governance-signals.mdx#L57

Did you really mean 'cron'?

## Notification destinations

Expand All @@ -62,10 +62,10 @@

- **`webhook`** — generic HMAC-signed POST to a URL of your choice. Mirrors AAP webhook contract.
- **`slack`** — incoming-webhook POST with [Block Kit](https://api.slack.com/block-kit) payload. Severity-color border, action button to "Acknowledge in dashboard."
- **`email`** — Resend-backed HTML + plaintext.

Check warning on line 65 in concepts/governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

concepts/governance-signals.mdx#L65

Did you really mean 'plaintext'?
- **`pagerduty`** — Events API v2 with stable `dedup_key` so coalesced detections don't duplicate incidents.

A destination's `filter` narrows what it receives (sources, severities, scopes, pattern_types). [Escalation rules](/guides/operating-governance-signals#escalation-rules) bind a predicate to a list of destination IDs and support rate-based gating (`threshold_count` + `window_minutes`) for "fire only if N matching signals occurred in M minutes."

Check warning on line 68 in concepts/governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

concepts/governance-signals.mdx#L68

Did you really mean 'severities'?

Check warning on line 68 in concepts/governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

concepts/governance-signals.mdx#L68

Did you really mean 'pattern_types'?

Test a destination from the CLI:

Expand All @@ -87,7 +87,6 @@
## Related

- [Sideband detection](/concepts/sideband-detection) — the detector layer (unchanged; only the delivery surface moved).
- [Governance Signals Schema](/specifications/governance-signals-schema) — table layout, RPCs, RLS.

Check warning on line 90 in concepts/governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

concepts/governance-signals.mdx#L90

Did you really mean 'RPCs'?
- [Operating governance signals](/guides/operating-governance-signals) — operator runbook for ack/resolve/dismiss + destinations + rules.

Check warning on line 91 in concepts/governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

concepts/governance-signals.mdx#L91

Did you really mean 'runbook'?
- [Sovereign-agent composition](/guides/sovereign-agent-composition) — application-side pattern for opting sovereign agents into governance-signal context.
- [ADR-048](https://github.com/mnemom/scale/blob/main/decisions/ADR-048-governance-signals-layering.md) — the architectural decision.
1 change: 0 additions & 1 deletion docs.json
Original file line number Diff line number Diff line change
Expand Up @@ -127,7 +127,6 @@
"guides/observability",
"guides/sideband-detection",
"guides/operating-governance-signals",
"guides/sovereign-agent-composition",
"guides/posture-cloning",
"guides/compliance-attestation-foundation",
"guides/multi-agent-setup",
Expand Down
4 changes: 2 additions & 2 deletions gateway/safe-house-overview.mdx
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
---
title: "Safe House Gateway Integration"
description: "How Safe House integrates with the Mnemom gateway request pipeline — phases, caching, AIP enrichment, and attestation"

Check warning on line 3 in gateway/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

gateway/safe-house-overview.mdx#L3

Did you really mean 'Mnemom'?
sidebarTitle: "Safe House Integration"
icon: "shield-halved"
---

# Safe House gateway integration

This page explains how Safe House integrates technically with the Mnemom gateway. If you are new to Safe House, start with the [concept overview](/concepts/safe-house) first.

Check warning on line 10 in gateway/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

gateway/safe-house-overview.mdx#L10

Did you really mean 'Mnemom'?

## Request pipeline

Expand Down Expand Up @@ -136,7 +136,7 @@

## KV caching

Safe House configuration and session state are cached in the `BILLING_CACHE` KV binding (the same binding used for quota state). Cache TTLs:

Check warning on line 139 in gateway/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

gateway/safe-house-overview.mdx#L139

Did you really mean 'TTLs'?

| Item | TTL |
|------|-----|
Expand All @@ -149,7 +149,7 @@

## Pre-emptive nudge injection

When a message passes Safe House screening but its L2 score is ≥ 0.6, Safe House writes a record to the `enforcement_nudges` table. On the agent's *next* request, the gateway's standard nudge injection logic picks this up and prepends a notice to the system prompt:

Check warning on line 152 in gateway/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

gateway/safe-house-overview.mdx#L152

Did you really mean 'prepends'?

```
[SAFE HOUSE NOTICE] A previous message in this session scored 0.67 on threat analysis
Expand All @@ -170,9 +170,9 @@

This creates a tamper-evident record that the Safe House analysis was performed and what it returned, which is important for compliance use cases where you need to demonstrate that screening happened.

## Sovereign agent template
## Hardened-default Safe House configuration

For agents operating in high-trust, high-risk environments (financial automation, infrastructure management, regulated data handling), the sovereign agent template provides a hardened Safe House configuration as a starting point:
For agents operating in high-trust, high-risk environments (financial automation, infrastructure management, regulated data handling), apply a hardened Safe House configuration via the standard CFD config endpoints. A reasonable starting baseline:

```json
{
Expand All @@ -187,8 +187,8 @@
"auto_seed": true,
"categories": ["api_keys", "db_credentials", "jwt_tokens"]
},
"trusted_sources": [],

Check warning on line 190 in gateway/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

gateway/safe-house-overview.mdx#L190

Did you really mean 'trusted_sources'?
"session_escalation": {

Check warning on line 191 in gateway/safe-house-overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

gateway/safe-house-overview.mdx#L191

Did you really mean 'session_escalation'?
"enabled": true,
"risk_window_messages": 10,
"escalation_threshold": "high"
Expand Down
3 changes: 1 addition & 2 deletions guides/operating-governance-signals.mdx
Original file line number Diff line number Diff line change
@@ -1,20 +1,20 @@
---
title: "Operating governance signals"
description: "Operator runbook for ack/resolve/dismiss workflow, notification destinations (Slack/email/PagerDuty/webhook), and escalation rules."

Check warning on line 3 in guides/operating-governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

guides/operating-governance-signals.mdx#L3

Did you really mean 'runbook'?
sidebarTitle: "Operating governance signals"
icon: "list-check"
---

# Operating governance signals

[Governance signals](/concepts/governance-signals) are observations operators see and act on. This guide walks through the runbook.

Check warning on line 10 in guides/operating-governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

guides/operating-governance-signals.mdx#L10

Did you really mean 'runbook'?

## Daily flow

1. **Triage** the open queue at `mnemom.ai/dashboard/teams/{teamId}/governance` (or via `mnemom governance signals list --team <id> --status open`).
2. **Acknowledge** signals you're investigating. Records `acknowledged_actor_role` per [ADR-046](https://github.com/mnemom/scale/blob/main/decisions/ADR-046-audit-actor-model.md) — captures whether you acted as `org_admin`, `team_admin`, etc.
3. **Resolve** with a `resolution_status`:
- `action_taken` — you (or a sovereign agent) made changes (rebalanced team, refreshed cards, …).
- `action_taken` — you made changes (rebalanced team, refreshed cards, …).
- `wont_fix` — known noise or out of scope.
- `duplicate` — same root cause as another signal.
- `false_positive` — detector misfire (file a debt item).
Expand Down Expand Up @@ -58,7 +58,7 @@
--config '{"to":["security-oncall@yourco.com"],"from":"governance@yourco.com"}'
```

Resend-backed HTML + plaintext.

Check warning on line 61 in guides/operating-governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

guides/operating-governance-signals.mdx#L61

Did you really mean 'plaintext'?

### PagerDuty

Expand Down Expand Up @@ -125,7 +125,7 @@
Predicate keys (AND-folded):

- `source` — exact source match.
- `pattern_type` — exact pattern_type match.

Check warning on line 128 in guides/operating-governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

guides/operating-governance-signals.mdx#L128

Did you really mean 'pattern_type'?
- `severity_min` / `severity_max` — bound on severity.
- `scope` — exact scope match.
- `team_id` — narrow to one team.
Expand All @@ -143,11 +143,11 @@
--destinations dest-pagerduty-id
```

### Dedup across rules

Check warning on line 146 in guides/operating-governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

guides/operating-governance-signals.mdx#L146

Did you really mean 'Dedup'?

If two rules both route to the same destination, the dispatcher dedups — one Slack message per signal, not two. Each contributing rule's `fire_count` and `last_fired_at` still get bumped.

Check warning on line 148 in guides/operating-governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

guides/operating-governance-signals.mdx#L148

Did you really mean 'dedups'?

## Coverage rollup

Check warning on line 150 in guides/operating-governance-signals.mdx

View check run for this annotation

Mintlify / Mintlify Validation (mnemomllc) - vale-spellcheck

guides/operating-governance-signals.mdx#L150

Did you really mean 'rollup'?

`GET /v1/orgs/:org_id/governance/coverage?days=30` returns a per-(source, severity) aggregate over the window:

Expand Down Expand Up @@ -180,4 +180,3 @@

- [Governance signals concept](/concepts/governance-signals).
- [Governance Signals Schema](/specifications/governance-signals-schema).
- [Sovereign-agent composition](/guides/sovereign-agent-composition) — application-side pattern when you have a sovereign-CTO-shaped agent.
Loading
Loading