curl -X PUT "https://api-production-56df.up.railway.app/policies/cust_8f2e4a91-bb3c-4d17-a1e0-6c9f3d5b7e82" \
-H "Content-Type: application/json" \
-H "X-API-Key: your-api-key" \
-d '{
"sensitive_fields": [
"ssn",
"credit_card",
"api_key",
"password",
"date_of_birth",
"bank_account",
"passport_number"
],
"allowed_tools": [
"read_file",
"search_code",
"create_pull_request",
"list_issues",
"send_message",
"run_tests"
],
"blocked_actions": [
"database:table:drop",
"filesystem:file:delete",
"cloud:iam:modify",
"cloud:secrets:read",
"cloud:billing:modify"
],
"custom_rules": {
"max_sensitivity_for_batch": {
"condition": "batch_size > 50 AND target.sensitivity_level >= 3",
"score_impact": 35,
"description": "Flag batch operations on sensitive resources (lowered threshold)"
},
"after_hours_penalty": {
"condition": "hour(timestamp) < 6 OR hour(timestamp) > 22",
"score_impact": 15,
"description": "Elevate risk for actions outside business hours"
},
"unverified_mcp_penalty": {
"condition": "mcp_context.is_verified == false",
"score_impact": 25,
"description": "Penalize actions through unverified MCP servers"
}
},
"allowed_action_patterns": [
"github:pull_request:*",
"slack:message:send",
"jira:issue:*",
"github:issue:*"
],
"blocked_action_patterns": [
"*:*:delete",
"cloud:iam:*",
"database:schema:*"
],
"sensitive_classifications": [
"PII",
"PHI",
"financial",
"secret",
"restricted",
"confidential"
]
}'
{
"customer_id": "cust_8f2e4a91-bb3c-4d17-a1e0-6c9f3d5b7e82",
"policies": {
"sensitive_fields": ["ssn", "credit_card", "api_key", "password", "date_of_birth", "bank_account", "passport_number"],
"allowed_tools": ["read_file", "search_code", "create_pull_request", "list_issues", "send_message", "run_tests"],
"blocked_actions": ["database:table:drop", "filesystem:file:delete", "cloud:iam:modify", "cloud:secrets:read", "cloud:billing:modify"],
"custom_rules": {
"max_sensitivity_for_batch": {
"condition": "batch_size > 50 AND target.sensitivity_level >= 3",
"score_impact": 35,
"description": "Flag batch operations on sensitive resources (lowered threshold)"
},
"after_hours_penalty": {
"condition": "hour(timestamp) < 6 OR hour(timestamp) > 22",
"score_impact": 15,
"description": "Elevate risk for actions outside business hours"
},
"unverified_mcp_penalty": {
"condition": "mcp_context.is_verified == false",
"score_impact": 25,
"description": "Penalize actions through unverified MCP servers"
}
},
"allowed_action_patterns": ["github:pull_request:*", "slack:message:send", "jira:issue:*", "github:issue:*"],
"blocked_action_patterns": ["*:*:delete", "cloud:iam:*", "database:schema:*"],
"sensitive_classifications": ["PII", "PHI", "financial", "secret", "restricted", "confidential"]
},
"updated_at": "2026-02-26T16:30:00Z"
}
Update the policy configuration for a customer. Replaces the entire policy with the provided values. Omitted fields will be cleared.
curl -X PUT "https://api-production-56df.up.railway.app/policies/cust_8f2e4a91-bb3c-4d17-a1e0-6c9f3d5b7e82" \
-H "Content-Type: application/json" \
-H "X-API-Key: your-api-key" \
-d '{
"sensitive_fields": [
"ssn",
"credit_card",
"api_key",
"password",
"date_of_birth",
"bank_account",
"passport_number"
],
"allowed_tools": [
"read_file",
"search_code",
"create_pull_request",
"list_issues",
"send_message",
"run_tests"
],
"blocked_actions": [
"database:table:drop",
"filesystem:file:delete",
"cloud:iam:modify",
"cloud:secrets:read",
"cloud:billing:modify"
],
"custom_rules": {
"max_sensitivity_for_batch": {
"condition": "batch_size > 50 AND target.sensitivity_level >= 3",
"score_impact": 35,
"description": "Flag batch operations on sensitive resources (lowered threshold)"
},
"after_hours_penalty": {
"condition": "hour(timestamp) < 6 OR hour(timestamp) > 22",
"score_impact": 15,
"description": "Elevate risk for actions outside business hours"
},
"unverified_mcp_penalty": {
"condition": "mcp_context.is_verified == false",
"score_impact": 25,
"description": "Penalize actions through unverified MCP servers"
}
},
"allowed_action_patterns": [
"github:pull_request:*",
"slack:message:send",
"jira:issue:*",
"github:issue:*"
],
"blocked_action_patterns": [
"*:*:delete",
"cloud:iam:*",
"database:schema:*"
],
"sensitive_classifications": [
"PII",
"PHI",
"financial",
"secret",
"restricted",
"confidential"
]
}'
{
"customer_id": "cust_8f2e4a91-bb3c-4d17-a1e0-6c9f3d5b7e82",
"policies": {
"sensitive_fields": ["ssn", "credit_card", "api_key", "password", "date_of_birth", "bank_account", "passport_number"],
"allowed_tools": ["read_file", "search_code", "create_pull_request", "list_issues", "send_message", "run_tests"],
"blocked_actions": ["database:table:drop", "filesystem:file:delete", "cloud:iam:modify", "cloud:secrets:read", "cloud:billing:modify"],
"custom_rules": {
"max_sensitivity_for_batch": {
"condition": "batch_size > 50 AND target.sensitivity_level >= 3",
"score_impact": 35,
"description": "Flag batch operations on sensitive resources (lowered threshold)"
},
"after_hours_penalty": {
"condition": "hour(timestamp) < 6 OR hour(timestamp) > 22",
"score_impact": 15,
"description": "Elevate risk for actions outside business hours"
},
"unverified_mcp_penalty": {
"condition": "mcp_context.is_verified == false",
"score_impact": 25,
"description": "Penalize actions through unverified MCP servers"
}
},
"allowed_action_patterns": ["github:pull_request:*", "slack:message:send", "jira:issue:*", "github:issue:*"],
"blocked_action_patterns": ["*:*:delete", "cloud:iam:*", "database:schema:*"],
"sensitive_classifications": ["PII", "PHI", "financial", "secret", "restricted", "confidential"]
},
"updated_at": "2026-02-26T16:30:00Z"
}
X-API-Key header for authentication.domain:scope:verb action strings that are explicitly prohibited.Show policies properties
curl -X PUT "https://api-production-56df.up.railway.app/policies/cust_8f2e4a91-bb3c-4d17-a1e0-6c9f3d5b7e82" \
-H "Content-Type: application/json" \
-H "X-API-Key: your-api-key" \
-d '{
"sensitive_fields": [
"ssn",
"credit_card",
"api_key",
"password",
"date_of_birth",
"bank_account",
"passport_number"
],
"allowed_tools": [
"read_file",
"search_code",
"create_pull_request",
"list_issues",
"send_message",
"run_tests"
],
"blocked_actions": [
"database:table:drop",
"filesystem:file:delete",
"cloud:iam:modify",
"cloud:secrets:read",
"cloud:billing:modify"
],
"custom_rules": {
"max_sensitivity_for_batch": {
"condition": "batch_size > 50 AND target.sensitivity_level >= 3",
"score_impact": 35,
"description": "Flag batch operations on sensitive resources (lowered threshold)"
},
"after_hours_penalty": {
"condition": "hour(timestamp) < 6 OR hour(timestamp) > 22",
"score_impact": 15,
"description": "Elevate risk for actions outside business hours"
},
"unverified_mcp_penalty": {
"condition": "mcp_context.is_verified == false",
"score_impact": 25,
"description": "Penalize actions through unverified MCP servers"
}
},
"allowed_action_patterns": [
"github:pull_request:*",
"slack:message:send",
"jira:issue:*",
"github:issue:*"
],
"blocked_action_patterns": [
"*:*:delete",
"cloud:iam:*",
"database:schema:*"
],
"sensitive_classifications": [
"PII",
"PHI",
"financial",
"secret",
"restricted",
"confidential"
]
}'
{
"customer_id": "cust_8f2e4a91-bb3c-4d17-a1e0-6c9f3d5b7e82",
"policies": {
"sensitive_fields": ["ssn", "credit_card", "api_key", "password", "date_of_birth", "bank_account", "passport_number"],
"allowed_tools": ["read_file", "search_code", "create_pull_request", "list_issues", "send_message", "run_tests"],
"blocked_actions": ["database:table:drop", "filesystem:file:delete", "cloud:iam:modify", "cloud:secrets:read", "cloud:billing:modify"],
"custom_rules": {
"max_sensitivity_for_batch": {
"condition": "batch_size > 50 AND target.sensitivity_level >= 3",
"score_impact": 35,
"description": "Flag batch operations on sensitive resources (lowered threshold)"
},
"after_hours_penalty": {
"condition": "hour(timestamp) < 6 OR hour(timestamp) > 22",
"score_impact": 15,
"description": "Elevate risk for actions outside business hours"
},
"unverified_mcp_penalty": {
"condition": "mcp_context.is_verified == false",
"score_impact": 25,
"description": "Penalize actions through unverified MCP servers"
}
},
"allowed_action_patterns": ["github:pull_request:*", "slack:message:send", "jira:issue:*", "github:issue:*"],
"blocked_action_patterns": ["*:*:delete", "cloud:iam:*", "database:schema:*"],
"sensitive_classifications": ["PII", "PHI", "financial", "secret", "restricted", "confidential"]
},
"updated_at": "2026-02-26T16:30:00Z"
}