Frequently Asked Questions¶
Common questions about the Agentic Cognitive Governance Protocol.
General Questions¶
What is ACGP?¶
ACGP is a protocol for governing AI agents through continuous evaluation of their reasoning and actions. See What is ACGP? for details.
When should I use ACGP?¶
Use ACGP when you have autonomous agents that: - Make decisions without constant oversight - Take actions with real-world consequences - Need governance beyond simple access controls
When should I NOT use ACGP?¶
Don't use ACGP for: - Simple scripted bots (if/else logic) - Read-only systems - Sub-10ms latency requirements
Implementation Questions¶
Which conformance level should I use?¶
- Minimal: Development and testing only
- Standard: Production systems (recommended for most)
- Complete: Mission-critical, regulated industries
What ACL tier should I choose?¶
Use the ARS Calculator to determine the appropriate tier based on your agent's autonomy, adaptability, and continuity.
How much latency does ACGP add?¶
- ACL-0: ~10ms typical, <50ms max
- ACL-1: ~20ms typical, <100ms max
- ACL-2: ~50ms typical, <150ms max (recommended for production)
- ACL-3: ~100ms typical, <200ms max
- ACL-4: ~200ms typical, <350ms max
- ACL-5: ~500ms typical, <1000ms max
Technical Questions¶
Can I use ACGP with my existing agent?¶
Yes! ACGP is framework-agnostic. See Custom Protocol Integration.
Does ACGP work with MCP?¶
Yes! See MCP Integration Guide.
How do I handle interventions?¶
Implement handlers for all six intervention types (five primary levels: OK, Nudge, Escalate, Block, Halt, plus orthogonal Flag that can be combined with any primary level). See Interventions.
Can agents recover from HALT?¶
HALT stops the agent completely. Recovery requires manual investigation and restart.
Trust and Security¶
How does trust scoring work?¶
Trust scores (0.0-1.0) track agent behavior over time. Good behavior increases trust, poor behavior decreases it. See Trust System.
Is ACGP secure?¶
ACGP includes security best practices. For high-security needs, use Complete Conformance. See Security Hardening.
Are audit logs tamper-proof?¶
Standard Conformance uses structured logging. Complete Conformance adds cryptographic proofs and immutable storage.
Getting Help¶
Still have questions?
- Join Discord for real-time help
- Email support
- Report issues