Version: v1.1.0
This Quickstart documents the v1.1.0 contract (requirements + design). Final API names may evolve, but the flow and guarantees described here are the target behavior.
Quickstart (v1.1.0)
What you’ll build
In 5–10 minutes, you’ll add TealTiger to an “agent-like” flow that:- Blocks a dangerous tool (
file_delete) in ENFORCE - Allows a safe tool (
customer_data_read) - Emits redaction-safe audit events (no raw prompts/responses by default)
- Correlates everything using
correlation_id(and optionaltrace_id)
Decision and an AuditEvent with the same correlation_id.
Architecture (1-minute mental model)
TealTiger v1.1.0 is SDK-only. You don’t need a server-side control plane to start enforcing policies and producing audit trails.
Prerequisites
- Node.js (TypeScript) or Python runtime
- A place to write audit logs (console or file)
Install
Step-by-step integration
Optional: Record cost metadata
If you compute or receive cost information, store it undermetadata.cost.*.
Troubleshooting
“I see missing pages / 404 for a page”
- Ensure
docs.jsonnavigation paths match.mdxfile paths exactly (case-sensitive).
“My logs contain sensitive content”
- Ensure
debug_modeisfalseand redaction levels areHASHor stronger. - Keep
detect_piienabled.
“Everything is ALLOW even in ENFORCE”
- Confirm the policy is being evaluated for your
action/tool. - Ensure the effective mode is ENFORCE (policy override or default).
Next steps
- Decision Model:
concepts/decision-model - Policy Modes:
concepts/policy-modes - Audit & Redaction:
concepts/audit-and-redaction - AuditEvent Schema:
audit/audit-event-schema