Overview
The Deployment pack provides essential safety controls for AI agents that manage deployments, releases, or CI/CD workflows. It ensures production deployments are approved by humans and prevents dangerous force-deploy operations. Use this pack for:- DevOps automation agents
- CI/CD pipeline tools
- Release management systems
- Infrastructure deployment agents
- GitOps workflows
Complete Policy
deployment.yaml
Rules Explained
1. Require Approval for Production Deploys
Rule ID:deploy-require-approval-production
What it does: Requires explicit human approval before deploying to production environments.
Detected production environment patterns:
arguments.environment === "production"arguments.environment === "prod"arguments.env === "production"arguments.env === "prod"arguments.target === "production"
- Service outages affecting customers
- Data loss or corruption
- Security vulnerabilities
- Compliance violations
- Revenue impact
- Correct version is being deployed
- Rollback plan is ready
- Timing is appropriate (not during peak hours)
- All stakeholders are informed
2. Block Force Deployments
Rule ID:deploy-block-force-push
What it does: Blocks deployments that skip safety checks via flags like force, skip_checks, or skip_tests.
Blocked flags:
arguments.force === truearguments.skip_checks === truearguments.skip_tests === true
- Tests - May deploy broken code
- Checks - May violate security/compliance policies
- Validation - May deploy incompatible versions
force for legitimate purposes (e.g., force-replacing a cache), you can:
- Rename the parameter in your tool
- Override the rule to only check production deploys
- Add a custom rule for your specific workflow
Usage Example
Basic Setup
veto.config.yaml
With TypeScript SDK
Customization
Add More Environments to Approval
Require approval for staging or pre-production environments:Block Deployments During Business Hours
Prevent production deployments during peak traffic:Add Canary Deployment Protection
Require approval for full rollouts, but allow canary deploys:Require Approval for Rollbacks
Even rollbacks should be reviewed:Integration with Deployment Systems
Kubernetes/Helm
AWS CodeDeploy
Vercel/Netlify
Approval Workflow Example
Integrate with Slack for deployment approvals:approval-slack-integration.ts
Testing
Test deployment rules before going live:Related Resources
Policy Pack Overview
Learn about all available policy packs
Coding Agent Pack
Additional protection for development operations
Human-in-the-Loop Guide
Set up approval workflows for deployments
Event Webhooks
Send deployment notifications to monitoring systems

