Reflection Blueprints¶
Status: Core Concept
Prerequisites: Basic familiarity with Cognitive Traces
Related: Tripwires, CTQ Evaluation, Governance Contracts, ACGP-1004 Specification
TL;DR (30 Seconds)¶
A Reflection Blueprint is the policy configuration (YAML/JSON) that tells a Governance Steward what to evaluate and how strict to be: checks, CTQ metrics, thresholds, evidence requirements, tripwires, trust debt, and scoring.
Why it matters: Blueprints separate policy from code—so governance rules can be authored, reviewed, versioned, and rolled out like any other policy artifact.
What a Blueprint Is (Conceptually)¶
Think of a blueprint as the steward’s “policy program” for a class of actions/traces:
- What to check: rule checks, metric checks, evidence constraints
- How to score: CTQ aggregation + thresholds → interventions (
ok,nudge,flag,escalate,block,halt) - What is non-negotiable: tripwires are fast, high-priority safety checks (often Tier 0/1)
- How it evolves: versioning + inheritance + controlled rollout
Blueprints are intentionally human-readable and machine-executable.
What a Blueprint Is Not¶
- Not a model prompt or agent “system prompt”
- Not a runtime SLA (that’s handled by Governance Contracts in ACGP 1.1)
- Not an ACL Tier definition (ACL tiers classify agent capability; blueprints define policy)
Where Blueprints Fit in the System¶
At runtime, a steward evaluates traces/actions against a blueprint:
- Select applicable blueprint(s) (scope + inheritance)
- Run tripwires first (fail-fast, high priority)
- Run CTQ checks/metrics and compute final scores
- Map score → intervention (using thresholds; stricter of blueprint vs ACL where applicable)
- Emit decision + evidence/audit data
Relationship to Governance Contracts¶
Blueprints define what must be enforced; governance contracts define how deep/fast to enforce it for this request:
- Blueprint: checks/metrics/tripwires/thresholds/evidence
- Contract:
risk_level,eval_tier,latency_budget_ms, timeout fallback behavior
This keeps policy stable while allowing runtime performance/safety trade-offs when appropriate.
Minimal Example (Illustrative)¶
id: finance/customer_comms@1.2
version: "1.2.0"
description: "Customer-facing finance communications"
inherits: clarity.baseline@1.0
tripwires:
- id: secrets_leak
when: { hook: "output" }
condition: "matches_regex(output, \"API_KEY_PATTERN\")"
eval_tier: 0
latency_budget_ms: 50
on_fail: { decision: "halt", reason: "Potential secret in output" }
checks:
- id: knowledge_grounding
when: { hook: "output" }
metric:
name: "knowledge_grounding"
weight: 0.25
check: { type: "tool", args: { name: "source_validator" } }
scoring:
thresholds:
ok: 0.25
nudge: 0.40
escalate: 0.55
block: 0.70
For the authoritative schema and semantics, see: - ACGP-1004: Reflection Blueprint Specification - Blueprint Schema reference