SessionStarthook registered inhooks/hooks.json, runninginstall-check.shon every sessioninstall-check.shnow SchemaPin-verifies every server in the project's.mcp.jsonat session start, surfacing tampered and unsigned servers as non-blocking warnings/symbi-pinskill for pinning MCP server schemas (TOFU) with explicit trust, re-pin, and conflict guidance
policy-guard.shLayer 3 (Cedar evaluation) is now a real enforcement path:symbi policy evaluate --stdin --policies ./policies/is implemented in Symbiont core (1.11.0+) and emits the bare verdict (allow/deny) on stdout with structured JSON detail on stderr. Hook tests[ "$DECISION" = "deny" ]against the bare stdout — no behaviour change required in the script.install-check.shnow relies on the realsymbi schemapin verifysubcommand: exit 1 with "no signature" in stderr means the MCP server is unpinned, exit 1 with "verification failed" means the server config drifted since pinning. Pin records live at~/.symbiont/schemapin/mcp/<name>.pin(managed viasymbi schemapin pin / list / unpin).skills/symbi-policy/SKILL.mdandROADMAP.md: replaced the non-existentsymbi dsl parseinvocation with the actual CLI surface (symbi dsl --file <path>for DSL files,symbi policy evaluatefor Cedar parse-checking).
scripts/mcp-wrapper.sh-- orphaned (never referenced from.mcp.json) and superseded by native HTTP MCP transport in.mcp.json, which avoids thenpx @anthropic-ai/mcp-proxydependency
- All previously-stubbed CLI integrations are now wired to real implementations in Symbiont core. The plugin still degrades gracefully when
symbiis absent: Layer 1 (built-in pattern blocking) and Layer 2 (local deny list) continue to enforce, and advisory logging still records all tool calls.
- Three-tier governance model: Awareness (default), Protection (local deny list), Governance (Cedar)
policy-guard.shblocking hook — blocks destructive commands, force pushes, writes to sensitive files.symbiont/local-policy.tomldeny list support — developer-configurable path, command, and branch blocking- Cedar policy evaluation in hooks when
symbiis on PATH /symbi-initnow scaffolds.symbiont/local-policy.tomlwith safe defaults
- Hooks now run
policy-guard.sh(blocking) beforepolicy-log.sh(advisory) - Updated CLAUDE.md and README.md to document governance tiers
- Dual-mode architecture: Mode A (standalone) and Mode B (ORGA-managed)
- Environment detection in all hook scripts (
SYMBIONT_MANAGED,SYMBIONT_MCP_URL) - MCP transport wrapper script (
mcp-wrapper.sh) for HTTP/stdio switching /symbi-agent-sdkskill for Claude Agent SDK + ORGA boilerplate- Examples:
examples/standalone/-- plugin-only setupexamples/cli-executor/-- CliExecutor-wrapped Claude Code with DSL + Cedarexamples/agent-sdk/-- headless Agent SDK wrapper pattern
claude_codeexecutor type documentation for DSL agent definitions- Dual-mode documentation in README and CLAUDE.md
- Plugin manifest (
.claude-plugin/plugin.json) and marketplace catalog - MCP server configuration connecting to
symbi mcp - Default settings activating
symbi-governoragent - Skills:
/symbi-init-- scaffold a governed agent project/symbi-policy-- create/edit Cedar authorization policies/symbi-verify-- SchemaPin MCP tool verification/symbi-audit-- query cryptographic audit logs/symbi-dsl-- parse/validate DSL agent definitions
- Commands:
/symbi-status-- runtime health check
- Hooks:
policy-log.sh-- PreToolUse advisory policy loggingaudit-log.sh-- PostToolUse audit logginginstall-check.sh-- session start symbi verification
- Agents:
symbi-governor-- governance-aware coding agent (default)symbi-dev-- DSL development specialist
- Documentation: README, ROADMAP, CHANGELOG
- Install script for symbi binary