veto guard check command validates a tool call against your policies without executing it or running an agent.
Syntax
Description
Tests a tool call against your rules to see if it would be allowed, blocked, or require approval. Useful for:- Testing policy rules before deployment
- Debugging why a tool call was blocked
- CI/CD validation of policy behavior
- Exploring policy coverage
Required Options
Tool Name
Arguments
Optional Settings
Context
Mode
local- Use local rules (default)cloud- Use Veto Cloud ruleskernel- Use kernel-mode validationcustom- Use custom provider
JSON Output
Examples
Basic Check
Check with Context
JSON Output
Cloud Mode
Multiple Checks (Scripted)
Decision Types
ALLOW
Tool call is permitted.BLOCK
Tool call is denied.REQUIRE_APPROVAL
Tool call needs human approval.Testing Workflows
Test New Policy
Debug Blocked Call
CI/CD Validation
Common Use Cases
Financial Validation
Access Control
Time-Based Rules
Troubleshooting
No Rules Matched
Invalid JSON Arguments
Cloud Connection Failed
Best Practices
1. Test Edge Cases
2. Use JSON Output for Scripting
3. Test with Real Arguments
4. Include Context
Next Steps
- Generate Policies - Create rules to test
- Apply Policies - Deploy rules
- Scan Coverage - Find untested tools
- Launch Studio - Interactive testing

