Policy adherence code generation for guarding AI agent tools
Project description
📦 AI Agents Policy Adherence
This tool analyzes policy documents and generates deterministic Python code to enforce operational policies when invoking AI agent tools. This work is described in EMNLP 2025 Towards Enforcing Company Policy Adherence in Agentic Workflows.
Business policies (or guidelines) are normally detailed in company documents, and have traditionally been hard-coded into automatic assistant platforms. Contemporary agentic approaches take the "best-effort" strategy, where the policies are appended to the agent's system prompt, an inherently non-deterministic approach, that does not scale effectively. Here we propose a deterministic, predictable and interpretable two-phase solution for agentic policy adherence at the tool-level: guards are executed prior to function invocation and raise alerts in case a tool-related policy deem violated.
This component enforces pre‑tool activation policy constraints, ensuring that agent decisions comply with business rules before modifying system state. This prevents policy violations such as unauthorized tool calls or unsafe parameter values.
Step 1:
This component gets a set of tools and a policy document and generated multiple ToolGuard specifications, known as ToolGuardSpecs. Each specification is attached to a tool, and it declares a precondition that must apply before invoking the tool. The specification has a name, description, list of refernces to the original policy document, a set of declerative compliance_examples, describing test cases that the toolGuard should allow the tool invocation, and violation_examples, where the toolGuard should raise an exception.
The specifications are aimed to be used as input into our next component - described below.
The two components are not concatenated by design. As the geneartion involves a non-deterministic language model, the results need to be reviewed by a human. Hence, the output specification files should be reviewed and optionaly edited. For example, removing a wrong compliance example.
The OpenAPI document should describe agent tools and optionally include read-only tools that might be used to enforce policies. It’s important that each tool has:
- A proper
operation_idmatching the tool name - A detailed description
- Clearly defined input parameters and return types
- Well-documented data models
Step 2: Uses the output from Step 1 and the OpenAPI spec to generate Python code that enforces each tool’s policies.
🐍 Requirements
- Python 3.12+
🛠 Installation
-
Clone the repository:
uv install toolguard
-
Create a
.envfile:Copy the
.env.exampletosrc/.envand fill in your environment variables. ReplaceAZURE_OPENAI_API_KEYwith your actual API key. and add in TOOLGUARD_GENPY_ARGS your API_KEY.
▶️ Usage
PYTHONPATH=src python -m policy_adherence --policy-path <path_to_policy> --oas <path_to_oas> --out-dir <output_directory> [options]
Arguments
| Argument | Type | Description |
|---|---|---|
--policy-path |
str |
Path to the policy file. Currently in markdown syntax. Example: /Users/me/airline/wiki.md |
--oas |
str |
Path to an OpenAPI specification file (JSON/YAML) describing the available tools. The operation_ids should match tool names. Example: /Users/me/airline/openapi.json |
--out-dir |
str |
Path to an output folder where the generated artifacts will be written. Example: /Users/me/airline/outdir2 |
--force-step1 |
flag |
Force execution of step 1 even if artifacts already exist. Default: False |
--run-step2 |
flag |
Whether to execute step 2. Use --run-step2 to skip. Default: True |
--step1-dir-name |
str |
Folder name under the output folder for step 1. Default: Step1 |
--step2-dir-name |
str |
Folder name under the output folder for step 2. Default: Step2 |
--tools |
list |
Optional list of tool names to include. These should be a subset of the OpenAPI operation_ids. Example: --tools create_user delete_user |
Example
PYTHONPATH=src python -m policy_adherence \
--policy-path ./policy/wiki.md \
--oas ./spec/openapi.json \
--out-dir ./output \
--force-step1 \
--tools create_user delete_user
Development
uv pip install .[dev]
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file toolguard-0.1.19.tar.gz.
File metadata
- Download URL: toolguard-0.1.19.tar.gz
- Upload date:
- Size: 55.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ba3a3907ef1fc54069337c6892ae34b0b43aa52dcfa99157da6c37a19f55604e
|
|
| MD5 |
161106fcf31b1238c98ea3b2727f6a45
|
|
| BLAKE2b-256 |
6d5b738d1e51315c5122c6d8c609b5916d967c0acf9ef3672755b3f095ec1f57
|
Provenance
The following attestation bundles were made for toolguard-0.1.19.tar.gz:
Publisher:
python-publish.yml on AgentToolkit/toolguard
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
toolguard-0.1.19.tar.gz -
Subject digest:
ba3a3907ef1fc54069337c6892ae34b0b43aa52dcfa99157da6c37a19f55604e - Sigstore transparency entry: 813585410
- Sigstore integration time:
-
Permalink:
AgentToolkit/toolguard@692ef9fd97855bb2bf1dbf32849d258e79fdefbc -
Branch / Tag:
refs/tags/v0.1.19 - Owner: https://github.com/AgentToolkit
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
python-publish.yml@692ef9fd97855bb2bf1dbf32849d258e79fdefbc -
Trigger Event:
release
-
Statement type:
File details
Details for the file toolguard-0.1.19-py3-none-any.whl.
File metadata
- Download URL: toolguard-0.1.19-py3-none-any.whl
- Upload date:
- Size: 86.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
eb92c94bb7122e33203eba3bf3b513a1cc86f85cc957e1c50d4278fde8402b32
|
|
| MD5 |
c7cd844826218069c2c8055a7bf82aa1
|
|
| BLAKE2b-256 |
d55acbb1c3e7231c7369a00c1b83c67e927a0a68bf113bcb4280fe00a15e76fa
|
Provenance
The following attestation bundles were made for toolguard-0.1.19-py3-none-any.whl:
Publisher:
python-publish.yml on AgentToolkit/toolguard
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
toolguard-0.1.19-py3-none-any.whl -
Subject digest:
eb92c94bb7122e33203eba3bf3b513a1cc86f85cc957e1c50d4278fde8402b32 - Sigstore transparency entry: 813585411
- Sigstore integration time:
-
Permalink:
AgentToolkit/toolguard@692ef9fd97855bb2bf1dbf32849d258e79fdefbc -
Branch / Tag:
refs/tags/v0.1.19 - Owner: https://github.com/AgentToolkit
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
python-publish.yml@692ef9fd97855bb2bf1dbf32849d258e79fdefbc -
Trigger Event:
release
-
Statement type: