Research
OperationsUpdated May 1, 20267 min

From Audit Mode to Enforcement Without Breaking Developers

The best first policy is often observe. Passed actions, warnings, and blocks show teams where enforcement will help and where it will create avoidable friction.

Thesis

Agent enforcement should be staged from real telemetry, not guessed from a blank policy screen.

audit moderolloutdeveloper experience

Technical readout

Audit-to-block measurements

A mature enforcement ramp uses real event distributions, not guesses from a blank policy screen.

pass baseline

What does normal agent work look like by user, group, repo, and tool?

Log passed events when audit is enabled and aggregate by normalized action, policy candidate, and surface.

would-block analysis

Which rules would have blocked real work during the audit window?

Run candidate policies in simulation and show impacted users, sessions, repos, and false-positive review queues.

warning behavior

Did the user change course after a warning, or continue into risk?

Record warning display, user acknowledgement, next action, and resulting verdict inside the session timeline.

rollback safety

Can teams revert enforcement while keeping the evidence and policy history?

Version packs and assignments separately from event records so rollback changes future verdicts only.

Passed events are the baseline

A product that only shows blocks makes the environment look quieter than it is. Passed actions reveal which agents are active, which tools are common, which repositories matter, and which policies would have fired if enforcement were stronger.

For a buyer comparing tools, full audit logging is a core capability. It is how security learns the difference between normal AI-assisted work and the small set of actions that deserve friction.

Warning is a useful middle state

Blocking is not the only meaningful control. A warning can give the developer immediate context while preserving an event for the security team. That is useful for risky but recoverable behavior, such as reading unusual paths or calling a sensitive MCP tool in a non-production repo.

The warning should name the policy and the action. Vague warnings teach users to ignore the product.

Policy rollout should be measurable

Teams should be able to answer how many events would move from pass to warn or block, which users or groups would be affected, and which agent surfaces generate the most noise.

That impact view keeps enforcement from becoming a surprise. It also helps platform teams explain why a rule exists when developers ask.

The product should make rollback boring

Enterprise buyers should look for scoped policy changes, named packs, clear assignment state, and durable audit logs. If a rollout causes friction, the team should adjust a pack or assignment without losing the evidence that led to the change.

Good controls feel calm because they are reversible, explainable, and based on observed behavior.

Technical model

Enforcement ramp

A rollout should move individual risk classes forward as confidence grows.

Signals in the model

Observe

Capture pass, warn, block candidates and real usage volume

Tune

Adjust paths, tools, groups, repositories, false positives

Warn

Tell the user in context and preserve the evidence trail

Block

Enforce high-confidence controls with clear explanations

Developers keep moving while risky behavior becomes easier to govern.