Policy stop
Secret material remains forbidden in operator-facing UI
The console must never become a secret viewer.
credentials
linked surface
Decision
forbidden
policy outcome
Severity
critical
operator urgency
Action class
secret-read
governed action
Owner
emily
resolution path
Policy rationale
Scope
raw credential exposure
Trigger
Runtime console may expose health and binding state, but never secret values.
Required action
Keep vault state abstracted to metadata, health, usability and required recovery actions only.
Runtime pressure
• pending approvals: 2
• related alerts: 2
• active exceptions: 2
Linked approvals & alerts
• Approval: Approve first runtime queue data model for brandgym-dev
• Approval: Approve Browser Ops takeover workflow v1
• Alert: Approval queue model needs first real data layer
• Alert: Browser Ops needs MFA / re-auth queue view
Exception lane
Temporary operator-assisted browser takeover for Meta setup
requestedbrowser / meta / operator-assisted · Only allowed with explicit approval, audit evidence and no autonomous final submit.
Seed-backed runtime console access for architecture validation
activebrandgym-dev / internal control plane · Clearly framed as pre-live operator validation; no claims of production-backed queue truth.