@tpmjs/tools-guardrail-policy-draft
Drafts guardrail policies for agent workflows with rules, severity levels, and enforcement actions. Returns a formatted markdown policy document with statistics and summary. Useful for establishing safety boundaries, compliance requirements, and operational constraints.
Test @tpmjs/tools-guardrail-policy-draft (guardrailPolicyDraftTool) with AI-powered execution
0/2000 characters
Install this tool and use it with the AI SDK
npm install @tpmjs/tools-guardrail-policy-draftpnpm add @tpmjs/tools-guardrail-policy-draftyarn add @tpmjs/tools-guardrail-policy-draftbun add @tpmjs/tools-guardrail-policy-draftdeno add npm:@tpmjs/tools-guardrail-policy-draftimport { guardrailPolicyDraftTool } from '@tpmjs/tools-guardrail-policy-draft';import { generateText } from 'ai';
import { openai } from '@ai-sdk/openai';
import { guardrailPolicyDraftTool } from '@tpmjs/tools-guardrail-policy-draft';
const result = await generateText({
model: openai('gpt-4o'),
tools: { guardrailPolicyDraftTool },
prompt: 'Your prompt here...',
});
console.log(result.text);Available configuration options
policiesarrayArray of policy rules with rule text, severity level, and enforcement action
Schema extracted: 1/1/2026, 8:18:20 AM
Drafts guardrail policies for agent workflows with rules, severity levels, and enforcement actions. Useful for establishing safety boundaries, compliance requirements, and operational constraints.
npm install @tpmjs/tools-guardrail-policy-draft
import { guardrailPolicyDraftTool } from '@tpmjs/tools-guardrail-policy-draft'; import { generateText } from 'ai'; const result = await generateText({ model: yourModel, tools: { draftPolicy: guardrailPolicyDraftTool, }, prompt: 'Create a safety policy for the agent...', });
import { guardrailPolicyDraftTool } from '@tpmjs/tools-guardrail-policy-draft'; const result = await guardrailPolicyDraftTool.execute({ policies: [ { rule: 'Do not access production database without approval', severity: 'critical', action: 'block', }, { rule: 'Verify user permissions before executing privileged operations', severity: 'high', action: 'review', }, { rule: 'Log all external API calls for audit trail', severity: 'medium', action: 'log', }, ], }); console.log(result.policy); // Markdown-formatted policy document console.log(result.summary); // "3 total rules | 2 critical/high priority | 1 blocking rule(s)" console.log(result.stats); // { // totalRules: 3, // bySeverity: { critical: 1, high: 1, medium: 1, low: 0, info: 0 }, // byAction: { block: 1, review: 1, log: 1, ... } // }
{ policies: Array<{ rule: string; // The policy rule or constraint severity: Severity; // 'critical' | 'high' | 'medium' | 'low' | 'info' action: Action; // 'block' | 'warn' | 'log' | 'review' | 'escalate' | 'retry' | 'fallback' | 'notify' }>; }
{ policy: string; // Markdown-formatted policy document rules: PolicyRule[]; // Validated and normalized rules summary: string; // Human-readable summary stats: { // Policy statistics totalRules: number; bySeverity: { critical: number; high: number; medium: number; low: number; info: number; }; byAction: Record<Action, number>; }; createdAt: string; // ISO timestamp }
The tool generates a markdown policy document like this:
# Agent Guardrail Policy This policy defines the guardrails and safety boundaries for agent workflow execution. --- ## ๐ด CRITICAL Severity ### Rule 1: Do not access production database without approval - **Severity:** critical - **Action:** block - **Enforcement:** Prevent execution and terminate workflow ## ๐ HIGH Severity ### Rule 1: Verify user permissions before executing privileged operations - **Severity:** high - **Action:** review - **Enforcement:** Flag for human review before proceeding ## ๐ก MEDIUM Severity ### Rule 1: Log all external API calls for audit trail - **Severity:** medium - **Action:** log - **Enforcement:** Record violation in logs for audit --- ## Enforcement Guidelines 1. **Critical & High** - Must be enforced before any execution 2. **Medium** - Should be checked during execution 3. **Low & Info** - May be checked post-execution for auditing
const securityPolicy = await guardrailPolicyDraftTool.execute({ policies: [ { rule: 'Never store credentials in plain text', severity: 'critical', action: 'block', }, { rule: 'Encrypt all sensitive data at rest', severity: 'critical', action: 'block', }, { rule: 'Use HTTPS for all external communications', severity: 'high', action: 'warn', }, ], });
const compliancePolicy = await guardrailPolicyDraftTool.execute({ policies: [ { rule: 'Obtain user consent before processing personal data', severity: 'critical', action: 'review', }, { rule: 'Log all data access for GDPR audit trail', severity: 'high', action: 'log', }, { rule: 'Delete user data within 30 days of request', severity: 'high', action: 'escalate', }, ], });
const operationalPolicy = await guardrailPolicyDraftTool.execute({ policies: [ { rule: 'Rate limit API calls to 100 requests per minute', severity: 'medium', action: 'retry', }, { rule: 'Timeout long-running operations after 5 minutes', severity: 'medium', action: 'fallback', }, { rule: 'Notify admins of unusual activity patterns', severity: 'low', action: 'notify', }, ], });
const testingPolicy = await guardrailPolicyDraftTool.execute({ policies: [ { rule: 'Never execute destructive operations in test environment', severity: 'critical', action: 'block', }, { rule: 'Verify test data is properly isolated from production', severity: 'high', action: 'review', }, { rule: 'Log all test execution results', severity: 'info', action: 'log', }, ], });
const policies = [ ...securityRules, ...complianceRules, ...operationalRules, ]; const masterPolicy = await guardrailPolicyDraftTool.execute({ policies }); // Check policy balance if (masterPolicy.stats.bySeverity.critical > 10) { console.warn('Policy may be too restrictive'); } if (masterPolicy.stats.byAction.block > 5) { console.warn('Too many blocking rules may prevent workflow execution'); }
const policy = await guardrailPolicyDraftTool.execute({ policies }); // Save to file await fs.writeFile('GUARDRAILS.md', policy.policy); // Generate statistics report console.log(`Policy Statistics: Total Rules: ${policy.stats.totalRules} Critical: ${policy.stats.bySeverity.critical} High: ${policy.stats.bySeverity.high} Blocking Rules: ${policy.stats.byAction.block} Created: ${policy.createdAt} `);
This tool generates policy documentation. To enforce these policies in your agent workflow:
MIT
Downloads/month
0
Quality Score