Submissions:
- anthropics/skills#424 — Agent governance skill (Open PR)
- anthropics/claude-plugins-official#415 — Claude plugin proposal (Open Issue)
- anthropics/claude-cookbooks#384 — Governance cookbook (Open Issue) Date Submitted: March 2, 2026
Three complementary submissions to the Anthropic ecosystem providing governance patterns for Claude-based agent systems. Each targets a different integration point.
Status: Open PR — awaiting review Closes: anthropics/skills#412 (invited by @BennyTheBuilder)
| Pattern | Description |
|---|---|
| Governance Policy Model | Deny-by-default, tri-state decisions (allow/deny/review), YAML-based |
| Policy Composition | Org → Team → Agent layering, stricter always wins |
| Threat Detection | 5 categories: data exfiltration, prompt injection, privilege escalation, credential harvesting, destructive operations |
| Trust Scoring | Decay-based scores with asymmetric reward/penalty for multi-agent delegation |
| Audit Trail | Append-only, tamper-evident SHA-256 Merkle chain |
| Tool-Level Governance | Single decorator adds policy enforcement + audit to any tool function |
| Framework Integration | Examples for PydanticAI, CrewAI, OpenAI Agents SDK, Google ADK |
- Leads with the policy model (not frameworks or decorators)
- Includes a minimal working example (copy-paste YAML + Python)
- Audit trail design is front-and-center (Merkle chain with what/who/when/why)
- Fail-closed everywhere — any evaluation error returns deny
Status: Open issue — concept validation stage
agent-governance/
├── .claude-plugin/plugin.json
├── .mcp.json # Governance MCP server
├── commands/
│ ├── governance-check.md # /governance-check — audit current project
│ └── policy-init.md # /policy-init — scaffold governance config
├── agents/
│ └── governance-reviewer.md # Agent that reviews code for governance
├── skills/
│ └── agent-governance/SKILL.md
└── README.md
governance/check_policy— Validate tool calls against policiesgovernance/detect_threats— Scan code/prompts for threat patternsgovernance/audit_query— Query audit trail for compliance
Status: Open issue — awaiting approval
Sections:
- Introduction: Why Agent Governance Matters
- Defining a Governance Policy (YAML-based, composable)
- Tool Policy Enforcement (allowlists, blocklists, argument validation)
- Threat Detection Patterns (5 categories with Claude-based classification)
- Trust Scoring for Multi-Agent Delegation
- Building Append-Only Audit Trails
- Putting It Together: A Governed Agent Pipeline
import anthropic
async def governed_tool_use(client, policy, messages, tools):
response = await client.messages.create(
model="claude-sonnet-4-20250514",
messages=messages, tools=tools,
)
for block in response.content:
if block.type == "tool_use":
if block.name in policy.blocked_tools:
raise GovernanceViolation(f"Tool '{block.name}' blocked")
if policy.threat_detection:
threats = detect_threats(block.input)
if threats:
raise GovernanceViolation(f"Threat: {threats}")
return response