Glossary

Quick reference for terms used across the docs. Links point to detailed pages.

Full systems approach paper — https://www.arxiv.org/abs/2601.17744


Action -> A single effectful operation an agent wants to perform (e.g. stripe.refund, shell.run, http.get). Submitted as JSON with agent_id, tool, operation, params, and optional context. Every action passes through the authorization boundary and execution gate.

ABSTAIN -> Decision outcome meaning “require human approval.” The action does not run until a human approves or denies. See Execution gate.

Authorization boundary -> The single, non-bypassable point where every tool execution is evaluated. Nothing runs until the boundary returns allow or approved. See Authorization boundary.

CAR (Canonical Action Representation) -> The normalized, deterministic form of an action used for hashing and policy evaluation. Same logical action ⇒ same CAR ⇒ same request_hash. Defined in Faramesh Core Spec v1.0 §4 and summarized in CAR.

Decision -> The authorization result for an action: EXECUTE, ABSTAIN, or HALT. One decision per action; version-bound (policy_hash, profile_hash, provenance_id) for audit and replay.

Default deny -> If no policy rule matches an action, the outcome is HALT. There is no “allow by default.” See Policies overview and Execution gate.

DPR (Decision Provenance Record) -> An immutable record for each decision, with request_hash, policy_hash, decision, and hash chaining (prev_hash, record_hash) for tamper-evident audit. See Cryptographic provenance and Core Spec §11.

EXECUTE -> Decision outcome meaning “allowed.” The action proceeds to execution (or to approval flow if your setup requires it).

Execution gate -> The component that produces the decision (EXECUTE / ABSTAIN / HALT) from CAR, policy, and optional profile. See Execution gate.

Execution profile -> Optional allowlist of tools/operations and per-tool constraints. If enabled, tools not in the profile yield HALT. See Core Spec §6.

Fail-closed -> When the policy engine or gateway is unreachable or errors, the action is denied (HALT). No execution on ambiguity or failure. See Concepts and Security & compliance.

HALT -> Decision outcome meaning “denied.” The action must not execute.

High-risk upgrade -> If risk scoring returns “high” and the policy would otherwise allow (EXECUTE), the final decision is upgraded to ABSTAIN (require approval). See Core Spec §8.3 and Execution gate.

Horizon -> Faramesh’s managed cloud offering: dashboard, API, approvals, billing. Use your Horizon URL and API key to connect agents.

policy_hash -> SHA-256 of the normalized policy program used for a decision. Stored with the action for version binding and replay.

profile_hash -> SHA-256 of the execution profile (if used). Otherwise zero. See Core Spec §6.2.

Provenance -> The chain of evidence for why a decision was made: request_hash, policy_hash, profile_hash, DPR, and optional Merkle proof and replay. See Cryptographic provenance.

provenance_id -> Unique identifier tying a decision to its request, policy, and profile versions. Used for audit and replay.

request_hash -> SHA-256 of the canonical JSON of the action (CAR). Same action ⇒ same hash. Used in DPR, permits, and replay. See CAR and Core Spec §5.

Replay -> Re-evaluating a past decision with the same (or overridden) policy/state, without executing again. Used for audit and compliance. See Provenance and Core Spec §15.

Risk scoring -> Independent rule set that assigns risk_level (low, medium, high). Can upgrade EXECUTE to ABSTAIN when risk is high. See Core Spec §8.

Status -> Lifecycle state of an action: e.g. pending_decision, allowed, denied, pending_approval, approved, executing, succeeded, failed. No execution until approved (or allowed for immediate EXECUTE). See Core Spec §10.2–10.3.

Was this helpful?

Was this helpful?

Was this helpful?

Previous

More

Previous

More

Previous

More

Next

More

Next

More

Next

More

Table of content

Table of content

Table of content

Glossary

Glossary