Every agent action is normalized, scored, and routed through a deterministic risk pipeline. Here's what we detect, how we score it, and what happens when an attack chain unfolds.
Multiple flags fire simultaneously. Each carries a base weight. Three categories: Data, Power, Control.
Weights sum to 1.0. Context shapes the final score. Three are multiplicative: destination, boundary, irreversibility.
Individual actions may look benign. permit0 watches the session as a whole and fires immutable block rules when attack patterns emerge.
Each example shows an AI agent being exploited — and how the scoring pipeline catches the attack before damage occurs.
The same action type can score anywhere from MINIMAL to CRITICAL depending on entities, session history, and environment.
| Context | Effect | Why |
|---|---|---|
| Amount < $1,000 | medium | Low financial magnitude. Amount dimension stays moderate. |
| Amount $1K-$10K | high | Amount +12. Requires human sign-off. |
| Amount > $10K | gate | Amount +25. Hard gate — always human approval. |
| Amount > $250K | block | Exceeds session cumulative limit. Denied outright. |
| Cross-currency (e.g., USD → CHF) | upgrade | Boundary +8. Cross-region = unfamiliar destination risk. |
| Recipient not in approved payee list | upgrade | Destination +14. Unknown payee requires verification. |
| Production environment | upgrade | Environment override to 15. Real money at stake. |
| Context | Effect | Why |
|---|---|---|
| Amount < $100 | allow+log | Low amount. Stays in MEDIUM tier range. |
| Amount $100-$1,000 | approval | Amount +12. Human sign-off required. |
| Amount > $1,000 | gate | Amount +25. Hard gate — never auto-approves. |
| New/unknown customer | upgrade | Destination +14, actor +10. Unknown = higher risk. |
| Currency ≠ org default | upgrade | Boundary +8. Cross-currency = cross-region risk. |
| Context | Effect | Why |
|---|---|---|
| Recipient: internal domain | downgrade | Reduce destination + boundary. Internal = lower risk. |
| Recipient: external domain | upgrade | Destination +14. Crossing trust boundary. |
| Body contains credentials/keys | gate | Sensitivity +20. Promote EXPOSURE flag. Possible exfiltration. |
| 50+ recipients (BCC) | gate | Scope +25. Add GOVERNANCE flag. Mass mailing. |
| Send rate > 20/min | gate | Volume +18. Bulk exfiltration pattern. |
| Context | Effect | Why |
|---|---|---|
| Path: documentation, README | allow | Benign content. No flag escalation. |
| Path: .env, credentials.json | upgrade | Add EXPOSURE + GOVERNANCE flags. Sensitivity +20. |
| Path: /etc/shadow, /etc/passwd | gate | System credentials. EXPOSURE + GOVERNANCE. Hard gate. |
| Path matches PII patterns | upgrade | EXPOSURE secondary flag. Sensitivity escalation. |
| Context | Effect | Why |
|---|---|---|
| Contains rm -rf, shred, truncate | gate | Add DESTRUCTION flag. Irreversibility +10. Catastrophic. |
| Contains curl, wget, scp | upgrade | Add OUTBOUND flag. Destination +15, boundary +8. |
| Contains sudo, chmod 777 | gate | Add PRIVILEGE flag. Scope +15, actor +10. |
| Contains password, token, key | gate | Add EXPOSURE flag. Sensitivity +20. |