The 14 Governance Dimensions

Every action is evaluated across all 14 dimensions simultaneously. Each dimension produces a DimensionScore with:

  • score: 0.0 (maximum governance concern) to 1.0 (no concern)

  • weight: How much this dimension influences the UCS

  • veto: If True, overrides all other scores and forces Tier 1 denial

  • confidence: How certain the dimension is about its assessment (0.0-1.0)

  • reasoning: Human-readable explanation of the score

Dimensions are independent. They evaluate the same action but from different perspectives and do not see each other's scores.

Quick Reference

#
Dimension
Weight
Veto
What It Checks

1

Scope Compliance

1.5

Is this action within the agent's authorized scope?

2

Authority Verification

1.5

Does the agent have delegated authority for this?

3

Resource Boundaries

1.2

Does the action stay within resource limits?

4

Behavioral Consistency

1.0

Does this match the agent's established patterns?

5

Cascading Impact

1.3

Could this trigger downstream consequences?

6

Stakeholder Impact

1.2

Who is affected and how severely?

7

Incident Detection

1.5

Are there anomalous patterns suggesting problems?

8

Isolation Integrity

1.4

Does the action respect data and system isolation?

9

Temporal Compliance

0.8

Is the timing appropriate (rate limits, schedules)?

10

Precedent Alignment

0.7

Is this consistent with prior governance decisions?

11

Transparency

0.6

Can the action and its reasoning be explained?

12

Human Override

2.0

Is human intervention required or available?

13

Ethical Alignment

2.0

Is the action justifiable beyond procedural compliance?

14

Jurisdictional Compliance

1.4

Does the action respect data residency requirements?


Dimension 1: Scope Compliance

Class: ScopeCompliance Weight: 1.5 Can Veto: Yes

Is the action within the agent's authorized scope?

What It Checks

Each agent has a set of allowed action types. Scope compliance checks whether the requested action type appears in that set. This is the most fundamental governance check — an agent cannot do what it is not allowed to do.

Configuration

Scoring

Condition
Score
Veto

Action type in allowed set

1.0

No

Wildcard * in allowed set

1.0

No

No scope defined for agent

0.5

No

Action type not in allowed set

0.0

Yes

Notes

  • No scope defined returns 0.5 (caution) rather than 0.0 (veto). This allows unscoped agents to operate with reduced confidence rather than being completely blocked. Configure explicit scopes for production agents.

  • The wildcard * allows all action types. This bypasses scope checking entirely.


Dimension 2: Authority Verification

Class: AuthorityVerification Weight: 1.5 Can Veto: Yes

Does the agent have authority for this specific action?

What It Checks

Scope says what types of actions are allowed. Authority says whether this specific action on this specific target is permitted. Authority checks are custom callables that receive the action and context.

Configuration

All checks must pass. Any single failure is a veto.

Scoring

Condition
Score
Veto

No checks configured

0.7

No

All checks pass

1.0

No

Any check fails

0.0

Yes


Dimension 3: Resource Boundaries

Class: ResourceBoundaries Weight: 1.2 Can Veto: Yes

Are rate, concurrency, and cost limits respected?

What It Checks

Three resource constraints evaluated together:

  1. Rate: Actions per minute against max_actions_per_minute

  2. Concurrency: Active simultaneous actions against max_concurrent_actions

  3. Cost: Per-action cost and total accumulated cost against limits

Configuration

Action cost is read from action.parameters.get("cost", 0.0).

Scoring

Condition
Score
Veto

Rate limit exceeded

0.0

Yes

Concurrency limit exceeded

0.0

Yes

Per-action cost exceeded

0.0

Yes

Total cost exceeded

0.0

Yes

Within all limits

1.0 - max(rate_ratio, conc_ratio) * 0.5

No

The graduated score means actions approaching limits get lower scores before actually hitting them. At 80% of the rate limit, the score is 0.6 rather than 1.0. This gives the UCS engine early warning.

Defaults

Parameter
Default

max_actions_per_minute

60

max_concurrent_actions

10

max_cost_per_action

Infinity

max_total_cost

Infinity


Dimension 4: Behavioral Consistency

Class: BehavioralConsistency Weight: 1.0 Can Veto: No

Does this action match the agent's established behavior patterns?

What It Checks

Tracks which action types each agent has used. A new agent performing its first action type has no baseline. An established agent suddenly using a novel action type raises moderate concern. An agent using a familiar action type gets full marks.

Scoring

Condition
Score

First action (no baseline)

0.7

Action type seen before

1.0

Novel action type

0.5

Notes

  • This dimension cannot veto. Novel behavior is suspicious but not automatically disqualifying.

  • The baseline is per-agent. Agent A's history does not affect Agent B's scoring.

  • Novel action types are added to the baseline after evaluation. The second time an agent uses a type, it scores 1.0.


Dimension 5: Cascading Impact

Class: CascadingImpact Weight: 1.3 Can Veto: No

What are the downstream consequences of this action?

What It Checks

Classifies actions by their potential to trigger chains of effects. The classification is based on keywords in the action type.

Scoring

Action Type Contains
Impact Level
Score

delete, deploy, publish, broadcast, transfer

High

0.3

update, modify, write, send, create

Medium

0.6

Anything else

Low

0.9

Notes

  • Matching is case-insensitive and uses substring matching. delete_user matches delete. bulk_transfer matches transfer.

  • This dimension cannot veto. High cascading impact lowers the UCS but doesn't block alone. Combined with other low-scoring dimensions, it contributes to denial.


Dimension 6: Stakeholder Impact

Class: StakeholderImpact Weight: 1.2 Can Veto: No

Who is affected by this action and how?

What It Checks

Two mechanisms:

  1. Sensitive targets: Explicitly marked targets get the lowest score

  2. External indicators: Targets containing keywords like "customer", "user", "external", "public", or "client" get a medium-low score

Configuration

Scoring

Condition
Score

Target marked sensitive

0.2

Target contains external keywords

0.4

Internal target

0.9


Dimension 7: Incident Detection

Class: IncidentDetection Weight: 1.5 Can Veto: Yes

Does this action match known failure or attack patterns?

What It Checks

Two layers of detection:

  1. Built-in: Detects 5+ identical consecutive actions in recent history (repetitive pattern)

  2. Custom patterns: User-supplied detectors that receive the action and context

Configuration

Custom detectors return a score (0.0-1.0) if the pattern matches, or None if it doesn't. The worst (lowest) score across all detectors is used.

Scoring

Condition
Score
Veto

No patterns matched

1.0

No

Repetitive pattern (5+ identical)

0.2

No

Custom pattern matched

Detector's score

Yes if score <= 0.1


Dimension 8: Isolation Integrity

Class: IsolationIntegrity Weight: 1.4 Can Veto: Yes

Are containment boundaries maintained?

What It Checks

Each agent operates within defined boundaries. Actions targeting resources outside those boundaries are vetoed. This prevents agents from accessing other agents' resources or modifying shared state without coordination.

Configuration

Scoring

Condition
Score
Veto

No boundaries defined

0.6

No

Target within boundaries

1.0

No

Wildcard * in boundaries

1.0

No

Empty target

1.0

No

Target outside boundaries

0.0

Yes


Dimension 9: Temporal Compliance

Class: TemporalCompliance Weight: 0.8 Can Veto: Yes

Is the timing of this action appropriate?

What It Checks

Two temporal constraints:

  1. Time windows: Some action types are only allowed during specific hours

  2. Minimum intervals: Some action types must wait a minimum time between executions

Configuration

Time windows support wrap-around (e.g., start_hour=22, end_hour=6 for overnight windows).

Scoring

Condition
Score
Veto

No constraints defined

1.0

No

Outside time window

0.0

Yes

Min interval not met

0.1

Yes

All constraints satisfied

1.0

No


Dimension 10: Precedent Alignment

Class: PrecedentAlignment Weight: 0.7 Can Veto: No

Is this consistent with past governance decisions?

What It Checks

Examines the agent's action history for similar actions (same action type). If similar actions were frequently denied (>50%), the current action gets a low score. Consistent precedent of approval gets a high score.

Scoring

Condition
Score

No action history

0.8

No precedent for this action type

0.7

Similar actions frequently denied (>50%)

0.3

Consistent with past approvals

0.9

Notes

  • This dimension cannot veto. Precedent is informational, not authoritative.

  • Low weight (0.7) means precedent influences the UCS but doesn't dominate.


Dimension 11: Transparency

Class: Transparency Weight: 0.6 Can Veto: No

Is the action auditable and explainable?

What It Checks

Whether the action carries sufficient metadata for auditing. Missing fields reduce the score.

Scoring

Missing Field
Penalty

action_type

-0.3

target

-0.2

agent_id

-0.2

parameters (for non-read actions)

-0.1

A fully transparent action with all fields scores 1.0. An action missing action_type and target scores 0.5. The minimum possible score is 0.0 (all fields missing on a non-read action: -0.3 -0.2 -0.2 -0.1 = -0.8, clamped to 0.0).

Notes

  • Read/list/query actions are not penalized for missing parameters, since reads often don't need them.

  • This dimension cannot veto. Opaque actions lower the UCS but aren't blocked.

  • Lowest weight (0.6) among all dimensions. Missing metadata is a concern but not as serious as scope violations or ethical issues.


Dimension 12: Human Override

Class: HumanOverride Weight: 2.0 (highest, tied with Ethical Alignment) Can Veto: Yes

Is human intervention required or requested?

What It Checks

Three triggers for human override:

  1. Required action types: Actions explicitly configured to always need human approval

  2. Low trust: Agents with trust below 0.3 require human approval for everything

  3. Pre-approval: Actions that have been explicitly approved by a human

Configuration

Scoring

Condition
Score
Veto

Already human-approved

1.0

No

Action type requires human

0.0

Yes

Agent trust < 0.3

0.0

Yes

No override needed

1.0

No

Special Tier 1 Behavior

When the only veto comes from human override (no other dimension vetoed), Tier 1 returns ESCALATE instead of DENY. This allows the action to be queued for human review rather than permanently rejected. Call human.approve(action.id) and re-evaluate to proceed.


Dimension 13: Ethical Alignment

Class: EthicalAlignment Weight: 2.0 (highest, tied with Human Override) Can Veto: Yes

Does the action meet ethical constraints?

What It Checks

Runs a series of ethical rules against the action. Each rule is a callable that returns (passes: bool, reason: str). All rules must pass.

Configuration

Scoring

Condition
Score
Veto

No rules configured

0.8

No

All rules pass

1.0

No

Any rule fails

0.0

Yes

Notes

  • Ethical rules are hard constraints. They cannot be overridden by high trust, other dimension scores, or Tier 3 deliberation. A veto is final.

  • The 0.8 default when no rules are configured reflects uncertainty. Configure explicit rules for production.

  • Rules are evaluated in order. The first failure stops evaluation (short-circuit).


Dimension 14: Jurisdictional Compliance

Class: JurisdictionalCompliance Weight: 1.4 Can Veto: Yes

Does the action comply with data residency and jurisdictional regulations?

What It Checks

Evaluates whether the agent action complies with data residency requirements, cross-border transfer restrictions, and jurisdiction-specific regulations. Checks the agent's operating zone against the data subject's jurisdiction, the transfer mechanism legality, and the legal basis for processing.

Actions that would transfer data across jurisdictional boundaries without adequate legal basis, or process regulated data in a non-compliant inference zone, trigger a veto.

Configuration

Scoring

Condition
Score
Veto

Compliant transfer with legal basis

1.0

No

No JurisdictionalContext (standard mode)

0.8

No

No JurisdictionalContext (strict mode)

0.5

No

Cross-border transfer without legal basis

0.0

Yes

Non-compliant inference zone

0.0

Yes

Notes

  • Activated when a JurisdictionalContext is attached to the agent's context profile. Without jurisdictional context, the dimension scores conservatively rather than vetoing, allowing uncontextualized agents to operate with reduced confidence.

  • Regulations supported: GDPR, CCPA, HIPAA, PIPL, PDPA, DPDPA.


Dimension Weight Summary

Ordered by influence on the UCS:

Weight
Dimensions

2.0

Human Override, Ethical Alignment

1.5

Scope Compliance, Authority Verification, Incident Detection

1.4

Isolation Integrity, Jurisdictional Compliance

1.3

Cascading Impact

1.2

Resource Boundaries, Stakeholder Impact

1.0

Behavioral Consistency

0.8

Temporal Compliance

0.7

Precedent Alignment

0.6

Transparency

The weight hierarchy reflects governance priorities:

  • Human authority and ethical constraints dominate

  • Security boundaries (scope, authority, incident, isolation) and jurisdictional compliance are heavily weighted

  • Impact assessment (cascading, stakeholder, resources) has moderate weight

  • Behavioral and temporal analysis provides context

  • Precedent and transparency are informational

Configuring Weights

Weights can be adjusted per-agent in Python or in nomotic.yaml:

:::note Increasing a dimension's weight amplifies its influence on UCS. Setting veto: true means a score of 0.0 on that dimension results in immediate DENY regardless of other scores. :::

Custom Dimensions

To add a custom dimension, subclass GovernanceDimension:

Last updated