Skip to main content

Carrier-agnostic artifact governance and controlled-execution services that consume SCLite contract lifecycle artifacts.

Project description

GovEngine

CI: pytest Package: govengine Python: 3.11+ Dependency: SCLite >=0.5.1 License: MIT

GovEngine is a carrier-agnostic deterministic governed-runtime kernel for portable artifact governance and policy-gated controlled execution.

It consumes SCLite as its contract lifecycle layer and provides reusable services around artifact state/transition boundaries, policy decisions, execution-contract shaping, execution-ticket checks, command-shape normalization, dry-run result assembly, and neutral runtime/control projections. Security-oriented action/tool/scope/signal helpers remain available as an optional profile for hosts such as Ravenclaw, not as the neutral core itself.

Why it exists

AI-assisted security workflows need a hard boundary between:

  1. what an agent or caller wants;
  2. what policy allows;
  3. what execution shape was prepared;
  4. what was approved;
  5. what was dry-run or executed;
  6. what evidence can be reviewed.

SCLite defines the auditable contract artifacts for that lifecycle. GovEngine is the reusable Python service layer that consumes those contracts and helps a host runtime enforce them without relying on prompt text alone.

Dependency direction

Ravenclaw -> GovEngine -> SCLite
  • SCLite owns schema-backed lifecycle artifacts and validation.
  • GovEngine owns reusable governed-execution helpers that consume SCLite artifacts.
  • Ravenclaw remains the reference security runtime/control plane and concrete integration host.
  • Tecrax is reserved as a future infrastructure-operations runtime/profile on the same foundation.

GovEngine is not Ravenclaw, Tecrax, Logdash, an LLM agent loop, a scanner, or a protocol adapter.

What GovEngine includes now

  • a public surface registry that separates neutral artifact-governance core, controlled-execution core, and optional security-profile helpers;
  • an explicit govengine.security_profile facade for optional security-profile helper discovery;
  • serializable kernel/profile/runtime/SCLite boundary contracts and a machine-readable boundary report;
  • execution-contract shaping/redaction helpers;
  • artifact descriptor/state/transition boundary helpers;
  • SCLite lifecycle status bridge and lightweight lifecycle transition gate/controller;
  • artifact deconfliction/change-order helpers and lightweight state-index summaries;
  • signature/trust policy bridge helpers with host-provided signer/verifier ports and deterministic demo ports for fixtures;
  • approved-spec and execution-ticket validation helpers;
  • controlled execution gate helpers with dry-run as the default runner path;
  • command-shape helpers;
  • dry-run result assembly helpers;
  • deterministic orchestration handoff, governance event envelope, run-state, and between-step control-decision contracts;
  • neutral runtime-shell contracts for host control actions, queue snapshots, runtime snapshots, and scheduler-tick metadata;
  • neutral planning contracts for task, plan-intent, and planner-port handoffs;
  • neutral admission, policy, approval, and audit contracts for host runtime gates;
  • optional security-profile helpers for action schema/validation/compilation, capability recipes, tool registry, semantic-loss policy, scope checks, policy gateway, and signal/analysis/evidence-confirmation contracts;
  • explicit SCLite integration seams;
  • focused standalone pytest coverage and GitHub Actions CI.

What it intentionally does not include yet

  • live subprocess execution backend;
  • raw artifact storage/writes;
  • Logdash UI/API routes;
  • OpenClaw, MCP, A2A, or other protocol adapters;
  • LLM provider integrations;
  • Ravenclaw-specific personas, workspace state, or campaign UX;
  • production-readiness claims;
  • PKI, CA, KMS, key storage, or production identity proof.

Current status

GovEngine is an alpha 0.10.0a0 (0.10.0-alpha) helper package. The package is importable, tested, package-buildable, and validated against the Ravenclaw public downstream contract surface. The active dependency line is sclite-core>=0.5.1,<0.6. The 0.10.x line contains neutral artifact governance, planning, admission/policy, controlled-execution, runner-supervision, runtime-shell, evidence-review contracts, a minimal contract-only Domain Profile SDK, and runtime contract proof fixtures plus optional security-profile helpers. Historical lines from 0.1.x through 0.9.0 are documented in CHANGELOG.md; current status docs should treat 0.10.0a0 as both the source baseline and the current PyPI alpha release.

Installation

Install the current public package from PyPI:

python -m pip install govengine

GovEngine depends on the PyPI distribution sclite-core while preserving the Python import package sclite.

For local development:

python -m venv .venv
. .venv/bin/activate
python -m pip install -e '.[dev]'
python -m pytest -q

Minimal smoke example

from govengine import public_surface_index, security_profile_index
from govengine.action_compiler import compile_action_spec
from govengine.execution.runner import legacy_action_spec_dry_run_result

assert [surface.name for surface in public_surface_index()] == [
    "artifact_governance_core",
    "planning_contracts_core",
    "admission_policy_core",
    "evidence_review_core",
    "domain_profile_sdk",
    "runtime_contract_proofs",
    "controlled_execution_core",
    "security_profile_helpers",
]
assert security_profile_index()["entrypoint"] == "govengine.security_profile"

compiled = compile_action_spec({
    "action_type": "single_probe",
    "capability": "http_probe",
    "tool": "curl",
    "args": ["https://example.com"],
})

receipt = legacy_action_spec_dry_run_result(
    compiled_action=compiled,
    planned_commands=[["curl", "https://example.com"]],
)
assert receipt["status"] == "dry-run"

Documentation

Safety boundary

GovEngine should preserve deterministic governance over prompt-only behavior. GovEngine must never execute directly from raw intent: execution requires a prepared execution contract, valid policy decision, approved execution ticket, valid signature/trust decision, and allowed runner profile.

DryRunRunner/dry-run behavior remains the default. Live execution backends are disabled by default; any future LocalSubprocessRunner must be optional, policy-enabled, negative-tested, and never the default. Controlled execution depends on lifecycle gates and signing/trust gates, with Ravenclaw retaining the concrete runtime adapter until reviewed. Demo signing helpers are fixture ports only: they bind a deterministic signature to an artifact digest for tests/reviewer demos and must not be presented as cryptographic identity, PKI, CA, KMS, or trust-store support.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

govengine-0.10.0a0.tar.gz (116.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

govengine-0.10.0a0-py3-none-any.whl (110.6 kB view details)

Uploaded Python 3

File details

Details for the file govengine-0.10.0a0.tar.gz.

File metadata

  • Download URL: govengine-0.10.0a0.tar.gz
  • Upload date:
  • Size: 116.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for govengine-0.10.0a0.tar.gz
Algorithm Hash digest
SHA256 48b2ab2e0f4eac2019c78a8013d96c55049edf3adfe18344bcf55ab2d1d67cd2
MD5 3ff73b7d5c8e57004dea2d846babeafd
BLAKE2b-256 bb6c5de2b421cbeff036f07640e8d1b3c18a3834183d762b922ba085635a866f

See more details on using hashes here.

File details

Details for the file govengine-0.10.0a0-py3-none-any.whl.

File metadata

  • Download URL: govengine-0.10.0a0-py3-none-any.whl
  • Upload date:
  • Size: 110.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for govengine-0.10.0a0-py3-none-any.whl
Algorithm Hash digest
SHA256 674f299906132ec17378960698fdc51ced24cc88de4bae17585194838b15fe6a
MD5 6399a9c13b7e1a82b30f67ccebbf5a5b
BLAKE2b-256 b789a0bae95925514dfbc1d3888b6617954a159c3855d4c597e5e9a45be4e412

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page