- high-impact actions
- durable memory writes
If you are using the Python or TypeScript SDKs, or any native adapter, you do not call preflight manually. VerifiedX runs it automatically at the right boundary.
What gets preflighted
Preflight is not just for methods namedactions.
Depending on the integration, VerifiedX can preflight:
- Protected actions
- record mutations
- system changes
- external messages
- webhook-like effects
- Durable memory writes
- memory or long-lived state that should only change when justified
action_executememory_write
What preflight considers
Preflight evaluates the pending side effect in context. That can include:- what the agent is about to do
- what the agent has already done in this run
- the evidence the agent gathered before the action
- upstream context when the run is part of a multi-agent or agent+human system
What the SDK does automatically
When a protected boundary is reached, the SDK or native adapter automatically:- builds the current decision context
- runs the preflight check
- receives the decision and decision receipt
- either lets the side effect proceed or returns a structured blocked loopback result
Possible outcomes
A preflight check returns one of these outcomes:allowallow_with_warningreplan_requiredgoal_fail_terminal
What happens after preflight
If allowed
If the outcome isallow or allow_with_warning:
- the side effect may execute
- the workflow can continue
- VerifiedX can report the observed execution afterward
If replanning is required
If the outcome isreplan_required:
- the requested side effect does not execute
- the workflow gets a structured blocked result and decision receipt
- the system should keep moving toward the same goal through a safer or better-grounded next step
- local to the current node or agent
- upstream to a parent orchestrator when the missing support has to be gathered there
If terminally blocked
If the outcome isgoal_fail_terminal:
- the requested path must not execute
- the workflow should fail truthfully or hand off cleanly to a human or upstream system
Why this matters
Preflight is not only about stopping obviously malicious behavior. It also catches cases where the agent is:- weakly grounded
- acting on stale or partial context
- retrying the wrong side effect
- trying to mutate state without enough trustworthy support
Direct API usage
Advanced custom integrations can use the VerifiedX API directly, but most builders should use an SDK or native adapter instead. The SDK path is the recommended path because it already handles:- context accumulation
- protected-boundary checks
- decision receipts
- execution reporting
- runtime loopbacks