You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Adds explicit --execute --policy-ok guarded local execution for Agent Machine directory materialization and Office text generation/conversion evidence flows.
Copy file name to clipboardExpand all lines: README.md
+21-7Lines changed: 21 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ It should contain:
19
19
- guardrail/eval/evidence helpers;
20
20
- agent sandbox/run helpers;
21
21
- Agent Machine local mount and secure host-interface helpers;
22
-
- Office Plane dry-run, inspection, and evidence helpers;
22
+
- Office Plane dry-run, guarded execution, inspection, and evidence helpers;
23
23
- fingerprint and proof bundle tools;
24
24
- local-to-mesh registration helpers;
25
25
- release/operator install scripts.
@@ -38,7 +38,7 @@ It should not contain:
38
38
39
39
## sourceosctl CLI
40
40
41
-
`sourceosctl` is the read-only/dry-run CLI surface for SourceOS developer and AI operator workflows.
41
+
`sourceosctl` is the guarded CLI surface for SourceOS developer and AI operator workflows. Commands are read-only or dry-run by default. Narrow local mutations require explicit `--execute --policy-ok` and emit evidence.
| Generated documents / reports |`~/Documents/SourceOS/agent-output`|`/workspace/output`| read/write; created only by future explicit mutation|
116
+
| Generated documents / reports |`~/Documents/SourceOS/agent-output`|`/workspace/output`| read/write; created only by explicit guarded materialization|
The CLI does **not** mount `$HOME` wholesale and does **not** expose `.ssh`, `.gnupg`, browser profiles, keychains, cloud credential directories, token stores, or password stores by default.
114
120
121
+
Guarded materialization creates only the declared `createIfMissing` folders. It does not create Podman machines, Podman bind mounts, containers, or background services.
122
+
115
123
TopoLVM is treated as a Linux cluster-local backend profile for the same logical mount contract. It is not used for macOS/APFS local mode and it is not represented as cross-node shared storage.
116
124
117
125
### Office Plane local defaults
118
126
119
-
The first Office Plane slice is dry-run/read-only. It aligns with `SocioProphet/prophet-workspace`:
127
+
The Office Plane aligns with `SocioProphet/prophet-workspace`:
120
128
121
129
-`ProfessionalWorkroom`
122
130
-`OfficeArtifact`
@@ -137,11 +145,17 @@ Backends are modeled as an abstraction:
137
145
- Microsoft Graph / Office 365 and Google Workspace: compatibility adapters, not core authority.
The CLI does not create, convert, or modify files yet. It renders plans and inspects artifacts/evidence. Email sending and external publishing remain policy-gated side effects and are not enabled here.
148
+
Guarded Office execution is intentionally narrow:
149
+
150
+
-`office generate --execute --policy-ok` currently writes only `txt`, `md`, or `json` artifacts.
151
+
- Office binary generation (`docx`, `xlsx`, `pptx`, `odt`, `ods`, `odp`) remains disabled until template/render backends are hardened.
152
+
-`office convert --execute --policy-ok` uses local LibreOffice/`soffice` when available.
153
+
- All guarded Office execution emits or writes `OfficeArtifactEvidence`.
154
+
- Email sending, external publishing, and calendar modification remain policy-gated side effects and are not enabled here.
141
155
142
156
### Design constraints
143
157
144
-
All commands in the current surface are **read-only or dry-run**. No mutating command is implemented. Commands that would mutate host state are explicitly rejected at runtime.
158
+
All mutating commands require `--execute --policy-ok`. Commands that would mutate host state without both flags are rejected at runtime.
0 commit comments