Replies: 2 comments 1 reply
-
|
Interesting idea. I’ve been working on some adjacent issues around supervised policy promotion, but from the perspective of a governance/control-plane layer above the OpenShell/NemoClaw enforcement substrate rather than something necessarily implemented inside core NemoClaw. The overlap I see is the same one you point to here: preserving deny-by-default while allowing repeated operator decisions to become evidence-backed, reviewable policy intelligence instead of disappearing after each session. |
Beta Was this translation helpful? Give feedback.
-
|
That split is exactly where I think the design should land. I would not want “learned policy” inside the enforcement substrate itself. OpenShell/NemoClaw should stay deterministic and fail-closed: given a policy, it enforces that policy; it should not infer trust, mutate durable allowlists, or silently promote behavior. Where I think this belongs is an approval-evidence/control-plane layer that produces policy proposals. A possible lifecycle:
That preserves the existing safety property: repeated approvals become evidence, not authority. I also think the substrate/control-plane boundary is important:
In that model, OpenShell does not need to become “smart.” It only needs stable event emission, policy patch validation, and maybe a proposal API. The intelligence lives above it, where it can be audited, disabled, versioned, and governed. The key distinction I’d want to preserve is:
That would make long-running assistants much more usable without changing the deny-by-default trust model. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
OpenShell already gets the hard part right: deny-by-default enforcement with explicit operator approval for blocked requests. What seems missing is a policy persistence memory layer that can safely transform repeated human-approved behavior into reviewable, scoped, durable policy knowledge.
Today there is a sharp gap between:
That is a good security default, but it means repeated real operator decisions do not accumulate into operational policy intelligence.
Proposed feature:
A supervised Policy Persistence Memory layer that would:
The key idea is not convenience alone. It is giving OpenShell a supervised memory layer so repeated human decisions can become evidence-backed policy recommendations rather than being lost after each session.
That would make OpenShell much more practical for long-running assistants while preserving the security model.
A possible architecture split:
Questions:
I think this would be a strong future direction because it improves operator ergonomics, auditability, and production-readiness without weakening deny-by-default.
Cheers,
Scott
Beta Was this translation helpful? Give feedback.
All reactions