What is a Policy Violation Event?

2 min read Updated

A policy violation event is emitted when a tool call is denied by policy, signalling that an agent attempted an operation outside its permitted boundaries. These events can trigger alerts, webhooks, or incident response workflows.

WHY IT MATTERS

A denied tool call is not just a log entry — it is a signal that an agent attempted something it should not have. In a well-configured system, violations are rare and significant. They might indicate a prompt injection attack, a misconfigured agent, a compromised credential, or a legitimate edge case that the policy did not anticipate. Each violation deserves attention.

Policy violation events bridge the gap between passive logging and active monitoring. While audit logs require someone to query them, violation events push notifications to the people who need to respond. A Slack alert when an agent attempts to delete a production database. A PagerDuty incident when payment amounts exceed policy limits. A webhook to a security orchestration platform when an agent repeatedly violates the same policy.

The pattern of violations is often more informative than individual events. A single violation might be an agent adapting to a constraint. Repeated violations of the same policy might indicate a systematic issue — an agent that was not updated after a policy change, or an adversarial prompt probing boundaries. Violation events enable this pattern analysis by feeding into monitoring and analytics systems.

HOW POLICYLAYER USES THIS

Intercept emits a structured policy violation event for every denied tool call. The event includes the full decision log entry (matched rule, conditions, arguments) plus additional metadata: the violation severity (configurable per rule), the number of recent violations from the same agent, and the policy file and line number of the denying rule. Events can be forwarded to webhooks, written to a dedicated violation log, or emitted as structured events for consumption by monitoring platforms.

FREQUENTLY ASKED QUESTIONS

How do I set up alerts for policy violations?
Configure Intercept to send violation events to a webhook endpoint. Point the webhook at your alerting platform (Slack, PagerDuty, Opsgenie) or a custom handler. You can filter by severity, server, tool, or rule to avoid alert fatigue from low-risk violations.
Are all policy violations equally serious?
No. An agent hitting a rate limit is different from an agent attempting to delete production data. Intercept supports configurable severity levels per rule, allowing you to route critical violations to incident response while logging informational violations for later review.
What should I do when a violation is a false positive?
Review the decision log to understand why the violation occurred. If the policy is too restrictive, update it (test with dry-run first). If the violation is a legitimate edge case, consider a policy override for that specific scenario. Document the false positive to improve future policy design.

FURTHER READING

Enforce policies on every tool call

Intercept is the open-source MCP proxy that enforces YAML policies on AI agent tool calls. No code changes needed.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.