Agent Operator Guide

Compliance checklist for agent developers

Before your agent contributes to a repository, check its covenant.yml. This guide explains how to read, evaluate, and comply with the policy.

Pre-Contribution Checklist

  1. Fetch the policy file.

    Check for /covenant.yml at the repository root. If absent, treat the repository as unspecified (no Covenant governance applies).

    curl -sf https://raw.githubusercontent.com/{owner}/{repo}/main/covenant.yml
  2. Parse and validate the policy.

    Use a YAML parser. Validate the structure against the Covenant.yml v1.0.0 JSON Schema.

  3. Determine your intended action.

    Map your planned operation to a Covenant canonical action:

    OperationCanonical Action
    Open a pull requestpull_request.open
    Push to an existing PRpull_request.update
    Submit a reviewpull_request.review.submit
    Approve a PRpull_request.review.approve
    Merge a PRpull_request.merge
    Open an issueissue.open
    Comment on an issueissue.comment
    Label an issueissue.label
    Close/fix an issueissue.solve
    Comment on a human threadconversation.intervene_human_thread
    Comment on an agent threadconversation.intervene_agent_thread
    Clean up (close PR, delete branch)maintenance.cleanup
    Reroute to develop-bot branchrouting.to_develop_bot
  4. Evaluate the policy against your action.

    Construct a canonical event envelope and evaluate it against the policy rules. The outcome will be allow, warn, or deny.

    {
      "action": "pull_request.open",
      "actor": {
        "id": "your-agent[bot]",
        "kind": "agent"
      },
      "repository": {
        "name": "your-org/your-repo",
        "visibility": "public"
      },
      "target": {
        "branch": "main"
      },
      "evidence": {
        "model": "claude-opus-4-6",
        "provider": "anthropic",
        "prompt_record": "prompt://session/abc123",
        "test_proof": "tests://ci/run/456"
      }
    }
  5. Respect the outcome.
    • allow — proceed with the action.
    • warn — proceed but expect the action to be flagged.
    • deny — do not perform the action.

Evidence Fields

When a policy requires provenance, attach these fields to your contribution metadata:

FieldDescriptionExample
model Exact model identifier used to generate the contribution. claude-opus-4-6
provider The provider or platform hosting the model. anthropic
prompt_record URI or reference to the prompt session that produced this work. prompt://session/abc123
test_proof URI or reference to passing test results. tests://ci/run/456

Attestation

When a policy requires attestation, sign a covenant.attestation.v1 payload before submitting your contribution.

Signed Payload Structure

{
  "version": "covenant.attestation.v1",
  "actor_id": "your-agent[bot]",
  "action": "pull_request.open",
  "repository": "owner/repo",
  "ref": "refs/heads/feature-branch",
  "policy_sha256": "sha256-of-covenant-yml",
  "timestamp": "2026-02-21T00:00:00Z",
  "nonce": "unique-random-string"
}

Verification Requirements

Thread Mode Awareness

Repositories may label discussion threads with mode indicators:

Before commenting on a thread, check for thread mode labels and evaluate the corresponding canonical action (conversation.intervene_human_thread or conversation.intervene_agent_thread).

Reading Badges

Covenant-governed repositories display CI-verified badges. Use these for quick policy assessment:

Help text below focuses on the four policy-decision badges; covenant-enabled is always enabled when Covenant is active.

agent-pr-policy

Shows the strictest policy outcome for agent-authored pull requests.

Practical example: a human asks an agent to open a PR; allow means it can proceed, warn means it opens with policy warnings, and deny means the PR is blocked.

provenance-policy

Shows whether a default provenance profile enforces evidence fields.

Practical example: an agent opens a PR; with required it must include evidence like model and provider, while none means those fields are not enforced.

attestation-required

Indicates whether cryptographic attestation signatures are required.

Practical example: when an agent submits a PR, required or agents means it must attach a valid signed attestation payload or policy checks fail.

thread-intervention-policy

Shows whether intervention in human threads is restricted.

Practical example: in a human-only incident thread, controlled means an agent comment is warned or denied unless explicitly allowed.

covenant

covenant: enabled

agent-pr-policy

agent-pr-policy: allow agent-pr-policy: warn agent-pr-policy: deny agent-pr-policy: none

provenance-policy

provenance-policy: required provenance-policy: configured provenance-policy: none

attestation-required

attestation-required: required attestation-required: agents attestation-required: none

thread-intervention-policy

thread-intervention-policy: controlled thread-intervention-policy: open