PalveronPalveronDocs
User Handbook

Capability Model (Permissions)

Configure tool permissions per agent — 4 modes, presets, and overrides

The capability model defines which actions an agent may technically perform — independent of what it says in content.

Open the Capability Model

Two paths: (1) In the Wizard — Step 5, or (2) In the Agent DrawerPermissions section, click the edit icon.

📸 Screenshot: Permission editor in agent drawer

Categories and Tools

CategoryToolsRisk Level
CommunicationSend email, Slack message, SMS, calendar invite, trigger webhookMedium
DataRead DB, write DB, read file, write file, API call, vector DBLow–High
FinanceTrigger payment, create invoice, modify budget, place orderHigh
SystemExecute code, start container, modify config, trigger deployment, shell accessCritical

The 4 Enforcement Modes

ModeHTTP StatusWhat Happens
Allow (ALLOW)200Action executes without restrictions
Deny (DENY)403Action is blocked. Agent receives error message.
Require Approval (REQUIRE_APPROVAL)202Action paused. Reviewer notified. Agent waits.
Log Only (LOG_ONLY)200 + FlagAction executes but marked as governance_flagged. Appears in monitoring.

Using Presets

Click Load Preset: Restrictive (all DENY except data read), Balanced (read: ALLOW, write: LOG_ONLY, finance: REQUIRE_APPROVAL, system: DENY), or Permissive (all ALLOW except finance and shell access).

Tool-Level Override

Open a category, click the dropdown on a specific tool to override its mode. An "Override" badge appears next to the tool.

Three-level hierarchy: Preset → Category Default → Tool-Level Override. More specific settings override more general ones.

AGT Export

Click ExportAGT Format to download the capability model as a Microsoft AGT-compatible JSON file.

On this page