veto policy generate command creates policy rules from natural language descriptions using AI.
Syntax
Description
Generates policy YAML rules from plain English descriptions. Uses AI to understand your intent and create appropriate conditions, actions, and constraints.Required Options
Tool Name
Prompt
Optional Settings
Save Path
Target
local- Generate for local use (default)cloud- Generate and push to Veto Cloud
Mode Hint
auto- Let AI decide (default)deterministic- Prefer rule-based conditionsllm- Prefer LLM-based evaluation
JSON Output
Examples
Generate Financial Rule
Generate and Save
Generate with Deterministic Hint
Generate with LLM Hint
Generate for Cloud
JSON Output
Prompt Examples
Financial
Communication
Browser Automation
Data Access
Filesystem/Shell
Deployment
How It Works
- Analysis: AI analyzes your prompt and tool name
- Tool Discovery: Checks workspace for tool definitions and parameters
- Rule Generation: Creates appropriate conditions and actions
- Validation: Validates generated YAML syntax
- Output: Returns formatted YAML or saves to file
Common Patterns
Block Pattern
Approval Pattern
Allow Pattern
Troubleshooting
Tool Not Found Warning
- Tool will still generate, but may be generic
- Add tool definition to your codebase
- Run
veto scanto verify tool discovery
Generation Failed
Invalid YAML Output
- Report this as a bug
- Manually edit the YAML
- Try a simpler prompt
Best Practices
1. Be Specific
❌ Bad:--prompt "secure this"
✅ Good: --prompt "block transfers over $500 to unverified recipients"
2. Include Thresholds
❌ Bad:--prompt "block large amounts"
✅ Good: --prompt "block amounts over $10000"
3. Specify Actions
❌ Bad:--prompt "handle sensitive data"
✅ Good: --prompt "require approval for queries with SSN"
4. Save Generated Rules
5. Review Before Applying
Next Steps
- Apply Policies - Deploy generated policies
- Test Policies - Validate policy behavior
- Scan Coverage - Find uncovered tools
- Launch Studio - Interactive policy editor

