openclaw/docs/automation/standing-orders.md

252 lines
9.2 KiB
Markdown
Raw Normal View History

docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
---
summary: "Define permanent operating authority for autonomous agent programs"
read_when:
- Setting up autonomous agent workflows that run without per-task prompting
- Defining what the agent can do independently vs. what needs human approval
- Structuring multi-program agents with clear boundaries and escalation rules
title: "Standing Orders"
---
# Standing Orders
Standing orders grant your agent **permanent operating authority** for defined programs. Instead of giving individual task instructions each time, you define programs with clear scope, triggers, and escalation rules — and the agent executes autonomously within those boundaries.
This is the difference between telling your assistant "send the weekly report" every Friday vs. granting standing authority: "You own the weekly report. Compile it every Friday, send it, and only escalate if something looks wrong."
## Why Standing Orders?
**Without standing orders:**
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- You must prompt the agent for every task
- The agent sits idle between requests
- Routine work gets forgotten or delayed
- You become the bottleneck
**With standing orders:**
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- The agent executes autonomously within defined boundaries
- Routine work happens on schedule without prompting
- You only get involved for exceptions and approvals
- The agent fills idle time productively
## How They Work
Standing orders are defined in your [agent workspace](/concepts/agent-workspace) files. The recommended approach is to include them directly in `AGENTS.md` (which is auto-injected every session) so the agent always has them in context. For larger configurations, you can also place them in a dedicated file like `standing-orders.md` and reference it from `AGENTS.md`.
Each program specifies:
1. **Scope** — what the agent is authorized to do
2. **Triggers** — when to execute (schedule, event, or condition)
3. **Approval gates** — what requires human sign-off before acting
4. **Escalation rules** — when to stop and ask for help
The agent loads these instructions every session via the workspace bootstrap files (see [Agent Workspace](/concepts/agent-workspace) for the full list of auto-injected files) and executes against them, combined with [cron jobs](/automation/cron-jobs) for time-based enforcement.
<Tip>
Put standing orders in `AGENTS.md` to guarantee they're loaded every session. The workspace bootstrap automatically injects `AGENTS.md`, `SOUL.md`, `TOOLS.md`, `IDENTITY.md`, `USER.md`, `HEARTBEAT.md`, and `MEMORY.md` — but not arbitrary files in subdirectories.
</Tip>
## Anatomy of a Standing Order
```markdown
## Program: Weekly Status Report
**Authority:** Compile data, generate report, deliver to stakeholders
**Trigger:** Every Friday at 4 PM (enforced via cron job)
**Approval gate:** None for standard reports. Flag anomalies for human review.
**Escalation:** If data source is unavailable or metrics look unusual (>2σ from norm)
### Execution Steps
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
1. Pull metrics from configured sources
2. Compare to prior week and targets
3. Generate report in Reports/weekly/YYYY-MM-DD.md
4. Deliver summary via configured channel
5. Log completion to Agent/Logs/
### What NOT to Do
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- Do not send reports to external parties
- Do not modify source data
- Do not skip delivery if metrics look bad — report accurately
```
## Standing Orders + Cron Jobs
Standing orders define **what** the agent is authorized to do. [Cron jobs](/automation/cron-jobs) define **when** it happens. They work together:
```
Standing Order: "You own the daily inbox triage"
Cron Job (8 AM daily): "Execute inbox triage per standing orders"
Agent: Reads standing orders → executes steps → reports results
```
The cron job prompt should reference the standing order rather than duplicating it:
```bash
openclaw cron create \
--name daily-inbox-triage \
--cron "0 8 * * 1-5" \
--tz America/New_York \
--timeout-seconds 300 \
--announce \
--channel bluebubbles \
--to "+1XXXXXXXXXX" \
--message "Execute daily inbox triage per standing orders. Check mail for new alerts. Parse, categorize, and persist each item. Report summary to owner. Escalate unknowns."
```
## Examples
### Example 1: Content & Social Media (Weekly Cycle)
```markdown
## Program: Content & Social Media
**Authority:** Draft content, schedule posts, compile engagement reports
**Approval gate:** All posts require owner review for first 30 days, then standing approval
**Trigger:** Weekly cycle (Monday review → mid-week drafts → Friday brief)
### Weekly Cycle
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- **Monday:** Review platform metrics and audience engagement
- **TuesdayThursday:** Draft social posts, create blog content
- **Friday:** Compile weekly marketing brief → deliver to owner
### Content Rules
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- Voice must match the brand (see SOUL.md or brand voice guide)
- Never identify as AI in public-facing content
- Include metrics when available
- Focus on value to audience, not self-promotion
```
### Example 2: Finance Operations (Event-Triggered)
```markdown
## Program: Financial Processing
**Authority:** Process transaction data, generate reports, send summaries
**Approval gate:** None for analysis. Recommendations require owner approval.
**Trigger:** New data file detected OR scheduled monthly cycle
### When New Data Arrives
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
1. Detect new file in designated input directory
2. Parse and categorize all transactions
3. Compare against budget targets
4. Flag: unusual items, threshold breaches, new recurring charges
5. Generate report in designated output directory
6. Deliver summary to owner via configured channel
### Escalation Rules
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- Single item > $500: immediate alert
- Category > budget by 20%: flag in report
- Unrecognizable transaction: ask owner for categorization
- Failed processing after 2 retries: report failure, do not guess
```
### Example 3: Monitoring & Alerts (Continuous)
```markdown
## Program: System Monitoring
**Authority:** Check system health, restart services, send alerts
**Approval gate:** Restart services automatically. Escalate if restart fails twice.
**Trigger:** Every heartbeat cycle
### Checks
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- Service health endpoints responding
- Disk space above threshold
- Pending tasks not stale (>24 hours)
- Delivery channels operational
### Response Matrix
2026-03-20 15:43:14 +00:00
| Condition | Action | Escalate? |
| ---------------- | ------------------------ | ------------------------ |
| Service down | Restart automatically | Only if restart fails 2x |
| Disk space < 10% | Alert owner | Yes |
| Stale task > 24h | Remind owner | No |
| Channel offline | Log and retry next cycle | If offline > 2 hours |
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
```
## The Execute-Verify-Report Pattern
Standing orders work best when combined with strict execution discipline. Every task in a standing order should follow this loop:
1. **Execute** — Do the actual work (don't just acknowledge the instruction)
2. **Verify** — Confirm the result is correct (file exists, message delivered, data parsed)
3. **Report** — Tell the owner what was done and what was verified
```markdown
### Execution Rules
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- Every task follows Execute-Verify-Report. No exceptions.
- "I'll do that" is not execution. Do it, then report.
- "Done" without verification is not acceptable. Prove it.
- If execution fails: retry once with adjusted approach.
- If still fails: report failure with diagnosis. Never silently fail.
- Never retry indefinitely — 3 attempts max, then escalate.
```
This pattern prevents the most common agent failure mode: acknowledging a task without completing it.
## Multi-Program Architecture
For agents managing multiple concerns, organize standing orders as separate programs with clear boundaries:
```markdown
# Standing Orders
## Program 1: [Domain A] (Weekly)
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
...
## Program 2: [Domain B] (Monthly + On-Demand)
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
...
## Program 3: [Domain C] (As-Needed)
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
...
## Escalation Rules (All Programs)
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- [Common escalation criteria]
- [Approval gates that apply across programs]
```
Each program should have:
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- Its own **trigger cadence** (weekly, monthly, event-driven, continuous)
- Its own **approval gates** (some programs need more oversight than others)
- Clear **boundaries** (the agent should know where one program ends and another begins)
## Best Practices
### Do
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- Start with narrow authority and expand as trust builds
- Define explicit approval gates for high-risk actions
- Include "What NOT to do" sections — boundaries matter as much as permissions
- Combine with cron jobs for reliable time-based execution
- Review agent logs weekly to verify standing orders are being followed
- Update standing orders as your needs evolve — they're living documents
### Don't
2026-03-20 15:43:14 +00:00
docs: add delegate architecture guide for organizational deployments (#43261) * docs: add delegate architecture guide for organizational deployments Adds a guide for running OpenClaw as a named delegate for organizations. Covers three capability tiers (read-only, send-on-behalf, proactive), M365 and Google Workspace delegation setup, security guardrails, and integration with multi-agent routing. AI-assisted: Claude Code (Opus 4.6) Based on: Production deployment at a 501(c)(3) nonprofit Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review — add Google DWD warning, fix canvas in deny list - Add security warning for Google Workspace domain-wide delegation matching the existing M365 application access policy warning - Add "canvas" to the security guardrails tool deny list for consistency with the full example and multi-agent.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix Tier 1 description to match read-only permissions Remove "draft replies (saved to Drafts folder)" from Tier 1 since saving drafts requires write access. Tier 1 is strictly read-only — the agent summarizes and flags via chat, human acts on the mailbox. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * style: fix oxfmt formatting for delegate-architecture and docs.json Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: fix broken links to /automation/standing-orders Standing orders is a deployment pattern, not an existing doc page. Replaced with inline descriptions and links to /automation/cron-jobs and #security-guardrails anchor. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: move hardening to prerequisites before identity provider setup Restructure per community feedback: isolation, tool restrictions, sandbox, hard blocks, and audit trail now come BEFORE granting any credentials. The most dangerous step (tenant-wide permissions) no longer precedes the most important step (scoping and isolation). Also strengthened M365 and Google Workspace security warnings with actionable verification steps. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: add standing orders guide and fix broken links Add docs/automation/standing-orders.md covering: - Why standing orders (agent autonomy vs human bottleneck) - Anatomy of a standing order (scope, triggers, gates, escalation) - Integration with cron jobs for time-based enforcement - Execute-Verify-Report pattern for execution discipline - Three production-tested examples (content, finance, monitoring) - Multi-program architecture for complex agents - Best practices (do's and don'ts) Update delegate-architecture.md to link standing orders references to the new page instead of dead links. Add standing-orders to Automation nav group in docs.json (en + zh-CN). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * docs: address review feedback on standing-orders - P1: Clarify that standing orders should go in AGENTS.md (auto-injected) rather than arbitrary subdirectory files. Add Tip callout explaining which workspace files are bootstrapped. - P2: Remove dead /concepts/personality-files link, replace with /concepts/agent-workspace which covers bootstrap files. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-20 10:23:17 -04:00
- Grant broad authority on day one ("do whatever you think is best")
- Skip escalation rules — every program needs a "when to stop and ask" clause
- Assume the agent will remember verbal instructions — put everything in the file
- Mix concerns in a single program — separate programs for separate domains
- Forget to enforce with cron jobs — standing orders without triggers become suggestions
## Related
- [Cron Jobs](/automation/cron-jobs) — Schedule enforcement for standing orders
- [Agent Workspace](/concepts/agent-workspace) — Where standing orders live, including the full list of auto-injected bootstrap files (AGENTS.md, SOUL.md, etc.)