Expand description
Policy evaluation engine for the Vellaveto MCP tool firewall.
Evaluates Action requests against
configured Policy rules and returns a
Verdict (Allow, Deny, or RequireApproval).
Supports glob/regex path matching, domain/IP rules, ABAC attribute constraints,
call-chain validation, decision caching (LRU+TTL), and Wasm policy plugins.
The engine is synchronous by design — all evaluation completes in <5ms P99.
Modules§
- abac
- ABAC (Attribute-Based Access Control) engine — Cedar-style policy evaluation.
- acis
- ACIS action fingerprinting.
- adaptive_
rate - Adaptive rate limiting — adjusts thresholds based on behavioral patterns.
- agent_
baseline - Agent behavioral baseline and rogue agent detection (OWASP ASI10).
- behavioral
- Behavioral anomaly detection for agent tool call patterns (P4.1 / OWASP ASI).
- cache
- Decision cache for policy evaluation results.
- cascade_
graph - Cascading failure propagation graph (OWASP ASI08).
- cascading
- Cascading failure circuit breakers for multi-hop tool call chains (Phase 62).
- circuit_
breaker - Circuit breaker for cascading failure protection (OWASP ASI08).
- collusion
- Multi-agent collusion detection (Phase 62 — OWASP ASI04, ASI07).
- contagion
- Phase 3: Context-learning contagion controls.
- coverage
- Policy coverage analysis — identifies dead policies and coverage gaps.
- cross_
session_ leak - Cross-session data leak detection.
- cumulative_
harm - STAC (Sequences of Tool-Chaining Attacks) cumulative harm scoring.
- delegation
- Phase 3: Multi-agent delegation control.
- denial_
of_ wallet - Denial of Wallet (DoW) / unbounded consumption detection (OWASP LLM10).
- deputy
- Confused deputy prevention (OWASP ASI02).
- exfil_
path - Data exfiltration path analysis.
- impact
- Policy Impact Analysis
- least_
agency - Least-agency enforcement — tracks permission usage per agent session and detects unused permissions for scope narrowing recommendations.
- lint
- Policy linting and best-practices engine.
- nhi_
overpermission - Non-Human Identity (NHI) overpermission detection.
- sequence
- Phase 6.3: Behavioral sequence analysis.
- verified_
constraint_ eval - Verified constraint-evaluation kernel.
- verified_
core - Verified core verdict computation.
- wasm_
plugin - Wasm policy plugin system for Vellaveto.
Structs§
- Compiled
IpRules - Pre-compiled IP access control rules for DNS rebinding protection.
- Compiled
Network Rules - Pre-compiled network rule domain patterns for a single policy.
- Compiled
Path Rules - Pre-compiled path rule glob matchers for a single policy.
- Compiled
Policy - A policy with all patterns pre-compiled for zero-lock evaluation.
- Policy
Engine - The core policy evaluation engine.
- Policy
Validation Error - Error during policy compilation at load time.
Enums§
- Compiled
Constraint - A single pre-compiled parameter constraint with all patterns resolved at load time.
- Compiled
Context Condition - A pre-compiled context condition for session-level policy evaluation.
- Compiled
Tool Matcher - Pre-compiled tool:function matcher derived from policy ID.
- Engine
Error - Errors that can occur during policy evaluation.
- Pattern
Matcher - Pre-compiled pattern matcher for tool/function ID segments.
Constants§
- DEFAULT_
MAX_ PATH_ DECODE_ ITERATIONS - Default maximum percent-decoding iterations for path normalization. Paths requiring more iterations fail-closed with an error.