Core Concepts
Understanding the ABS Governance Model
Core Concepts
The Governance Loop
ABS operates on a continuous loop of Monitor, Evaluate, and Act.
- Monitor: Capture events from agents (Prompts, Tool Calls, API Requests).
- Evaluate: Run events through the Policy Engine and Trust Layer.
- Act: Enforce the decision (Allow, Block, Redact, Escalate).
Key Components
Magic Proxy
The Magic Proxy is a transparent HTTP reverse proxy that intercepts all agent-to-LLM traffic. It is deployed at the edge (Cloudflare Workers, 300+ locations).
Pro-Tip: The proxy can inject provider API keys server-side via the Secret Vault, so agent code never touches real credentials.
- Endpoint:
https://api.abscore.app/v1/proxy(replaces your LLM provider'sbase_url) - Required Headers:
Authorization: Bearer <ABS_PAT>, standard LLM request headers - Provider Failover: If the upstream LLM provider is unreachable, the proxy returns a
502 Bad Gatewaywith a structured error body including the trace ID. Requests are never silently dropped.
Elite Kernel (Policy Engine)
The Elite Kernel is the decision engine — a Rust binary compiled to WebAssembly that runs synchronously on every intercepted request.
- Input: Structured event envelope (agent ID, action type, payload hash, entropy score, semantic intent)
- Output: A Decision Envelope containing the verdict (
ALLOW,DENY,HOLD,SLASH) plus the matched rule ID and trace - Policy Format: JSON-based policy contracts versioned per agent. See Policy Authoring for the schema and examples.
Forensic Ledger
The Forensic Ledger is an append-only, hash-chained (SHA-256) audit trail. Every governance decision is recorded as an immutable entry.
- Mechanism: Each entry contains the event hash, decision, timestamp, and the hash of the previous entry — forming a Merkle chain. This ensures tamper evidence: modifying any entry invalidates all subsequent hashes.
- Fields per Entry:
event_id,agent_id,action,verdict,rule_id,timestamp,payload_hash,prev_hash,signature - Retention: Configurable per workspace (default: 90 days). Enterprise plans support unlimited retention with cold storage export.
- Export: Available via the Events API (
GET /v1/events) or CSV export from the Dashboard.
Bond (Financial Accountability)
A Bond is a financial collateral mechanism for high-stakes agent deployments. When an agent is "bonded," a monetary amount is staked against policy compliance.
- Creating a Bond:
POST /v1/agents/:agentId/bondwith{ amount: 1000, currency: "USD" } - State Change: Bonding activates SLASH mode for that agent. Policy violations trigger automatic fund deduction (slashing).
- Revoking a Bond:
DELETE /v1/agents/:agentId/bond— releases remaining funds. Requires admin role. Pending violations must be resolved first.
Trust Hierarchy
Policies are applied in layers:
- Kernel Layer (Highest): Immutable invariants (e.g., "Never expose private keys").
- Profile Layer: Domain-specific rules (e.g., "Financial", "Healthcare").
- Workspace Layer: Team specific rules (e.g., "Dev Environment allow-list").
Agent Identification
To enforce stateful policies (like velocity), ABS must identify the "agent". We use the following priority for AgentID:
- Metadata Field: Explicit
agent_idoruser_idin the event payload. - Auth Token: Extracted from
Authorizationheader. - IP Affinity: Hash of the incoming IP (Fallback).
In v4.8.1, we recommend providing an explicit agent_id in the request metadata for highest accuracy across multi-device sessions.
The Envelope Protocol
All decisions are wrapped in a Decision Envelope (ADR-008). This ensures that every Allow/Block decision is:
- Cryptographically Signed: Cannot be forged.
- Traceable: Linked to a specific Event ID and Trace ID.
- Auditable: Stored in the immutable Write-Ahead Log.
Entropy & Semantic Intent
ABS uses two real-time analysis techniques on every intercepted payload:
- Shannon Entropy: Measures the randomness/information density of the payload. High entropy (>4.5 bits/char) suggests obfuscated content (base64-encoded data, encrypted payloads, steganographic tunnels). Triggers a
HIGH_ENTROPYflag for the Kernel to evaluate. - Semantic Intent: A specialized small language model classifies the purpose of the request (e.g., "data retrieval", "financial transaction", "deletion"). This classification is compared against the agent's allowed action types in its policy contract.