Three modes
Each action resolves to exactly one of three modes:| Mode | Behavior |
|---|---|
| allow | The action executes immediately without human intervention. |
| require_approval | The action blocks until a human approves or denies it. |
| deny | The action is rejected. The agent is informed and cannot retry. |
Mode resolution
Permissions are resolved through a three-tier cascade. The first match wins:
This means you can set broad defaults at the org level and override them per automation when needed.
Action permissions
Configure action modes at the automation or organization level. Here is an example configuration:<source>:<action>. Sources include built-in integrations (linear, sentry, slack) and MCP connectors (connector:<uuid>).
Automation-level overrides take priority over org-level defaults:
Approval workflows
When an action resolves torequire_approval, the agent pauses and a notification is sent.
Where approvals appear:
- Web dashboard — The inbox tray in the session view shows pending approvals with full parameter details.
- Slack — If notifications are configured, the approval request is posted to the automation’s Slack channel.
- Approve Once — Approves this specific invocation only.
- Approve & Always Allow — Approves this invocation and updates the org-level permission to
allowfor future invocations of this action. - Deny — Rejects the invocation. The agent is notified and adapts.
Scope limits
Beyond action permissions, you can restrict which repositories, branches, and files an automation can touch:Connector drift detection
When you connect an MCP server, Proliferate hashes each tool’s schema. If a tool’s schema changes after you have configured its permissions, the system detects the drift and adjusts:| Previous mode | After drift | Reason |
|---|---|---|
| allow | require_approval | Downgraded until an admin re-reviews the changed tool. |
| require_approval | require_approval | No change — already requires human review. |
| deny | deny | Stays denied. Drift never upgrades a denied tool. |
Drift detection prevents a connected MCP server from silently expanding what it can do. When you see a “needs re-review” indicator in the automation permissions UI, check the tool’s updated schema and confirm the permission.
Roadmap
Planned improvements to the permission system:- Granular per-user permissions — Allow different team members to have different approval authorities.
- Audit logging improvements — Detailed logs of every permission resolution, approval, and denial for compliance.
- Custom approval chains — Multi-step approval workflows where sensitive actions require sign-off from multiple reviewers.
