Policy
runtimeReal policy stoplist for action classes, approval gates, recoverable blocks, forbidden paths and temporary exceptions across the BrandGym runtime control plane.
Seed RuntimeSeed Runtime
Open Stops
3
review / approval / blocked
Critical
2
highest severity
Exception Requests
1
needs operator decision
Forbidden Paths
1
never allow
Policy stoplist
Policy trends
Most common stop class
session / re-auth
Credential continuity is currently the main source of policy-linked waiting states.
Highest risk domain
external writes
Browser submits, budget changes and publishing remain the sharp edge of the policy model.
Current governance gap
exception handling UX
Stops and approvals are defined, but operator override flows still need dedicated product treatment.
Exception lane
Temporary operator-assisted browser takeover for Meta setup
requestedbrowser / meta / operator-assisted · Need a narrow path to continue high-value setup work before the final autonomous governance loop is complete.
Guardrail: Only allowed with explicit approval, audit evidence and no autonomous final submit.
Expires: after v1 takeover flow
Seed-backed runtime console access for architecture validation
activebrandgym-dev / internal control plane · UI architecture needs to be exercised before persistence and live queues are fully connected.
Guardrail: Clearly framed as pre-live operator validation; no claims of production-backed queue truth.
Expires: until persistence slice ships
Linked runtime queues
Linked canon
Policy and Action Matrix
Canonical truth for allowed, approval-gated, review and forbidden actions.
Browser and External Action Governance
Explains why external writes, submits and takeovers stay tightly governed.
brandgym.dev Runtime Operations Console
Defines policy visibility, stop resolution and operator intervention as core control-plane behavior.