AGF

AI Engineering Profile

Which primitives to implement first, and how they compose into governed agentic systems.

For AI engineers, ML engineers, prompt engineers, and agent developers building agentic systems that need to be governed, auditable, and improvable.

The key question this profile answers: Which primitives do I implement first, and how do they compose into governed systems?

The Engineering Challenge

Building an agentic system that works in a demo is straightforward. Building one that is trustworthy, auditable, and improvable in production is a different problem entirely.

  1. Governance must be composable. You can't implement all 19 primitives at once. You need to know which ones to start with and which to defer.
  2. The architecture must adapt to your system type. A batch pipeline and a conversational agent have different governance needs. The primitives are the same; the composition is different.
  3. The system must improve without breaking governance. Self-improvement that weakens verification or bypasses gates is worse than no improvement at all.

Implementation Priority

Implementation Phases — Progressive Governance Roadmap

Phase 1: Minimum Viable Control (Start Here)

PrimitiveWhy FirstEffort
#7 Bounded AgencyWithout boundaries, everything else is mootLow
#14 Identity & AttributionWithout identity, you can't audit or attributeMedium
#6 Provenance ChainsWithout provenance, you can't answer "why did it do that?"Low
#10 Event-Driven ObservabilityWithout events, you're blindLow
#19 Agent Environment Governance (minimal)Scoped workspace + versioned instructionsLow

What this gives you: Agents that can't exceed their scope, actions that are attributable, an audit trail, and visibility.

Phase 2: Verification (Ring 0 + Ring 1)

PrimitiveWhy NowEffort
#1 Separation of Producer/VerifierVerified outputs before releaseMedium
#2 Validation LoopsIterative improvement with convergenceMedium
#5 Structured Output PersistenceThe data contract that makes rings composableLow
#13 Error Handling & RecoveryGraceful failure when things go wrongMedium

What this gives you: Verified outputs. Quality assurance is structural, not manual.

Phase 3: Governance (Ring 0 + Ring 1 + Ring 2)

PrimitiveWhy NowEffort
#8 Governance GatesHuman oversight on material decisionsMedium
#9 Policy as CodeGovernance rules as versioned, testable artifactsMedium
#16 Transaction & Side-Effect ControlSafe handling of irreversible actionsHigh
#17 Data GovernancePII, consent, classification at every data flowHigh

What this gives you: Policy-evaluated, human-gateable decisions with side-effect management.

Phase 4: Security & Assurance

PrimitiveWhy NowEffort
#15 Adversarial RobustnessDefense in depth. Assume breach.High
#18 Evaluation & AssuranceThe deployment gate. Validates before production.Medium
#11 Trust LaddersCalibrated trust. System earns reduced oversight.Medium

Phase 5: Learning (Full System)

PrimitiveWhy NowEffort
#3 Self-Improving CyclesThe learning engineHigh
#4 Adversarial CritiqueDedicated challenger for high-stakes outputsMedium
#12 Memory-Augmented ReasoningPersistent knowledge across sessionsMedium
#19 Agent Environment Governance (full)The optimization loop for the environmentHigh

Key principle: Each phase is independently valuable. You don't need Phase 5 to get value from Phase 1.

The 19 Primitives at a Glance

#PrimitiveRingOne-Line Description
1Separation of Producer & Verifier0+1The agent that creates must not be the sole agent that validates
2Validation Loops1Iterative verification until quality met or budget exhausted
3Self-Improving Cycles3System learns from execution history — without retraining
4Adversarial Critique1Dedicated challenger: find flaws, never confirm
5Structured Output PersistenceFabricSchema-conformant artifacts — the data contract
6Provenance ChainsFabricFull decision history, immutable, tamper-evident
7Bounded Agency2Explicit, enforced boundaries on scope and authority
8Governance Gates2Execution pauses for authorization
9Policy as Code2Governance rules as versioned, testable objects
10Event-Driven ObservabilityFabricEvery ring emits structured events
11Trust Ladders2+3Trust earned through performance, not assumed
12Memory-Augmented Reasoning0+3Persistent memory, not just immediate context
13Error Handling & RecoveryFabricCheckpointing, graceful degradation, compensation
14Identity & AttributionFabricAuthenticated, inspectable identity on every action
15Adversarial RobustnessSecurityAssume breach. Defense in depth. Verify explicitly.
16Transaction & Side-Effect Control0+2Pre-commit/commit/post-commit for irreversible actions
17Data Governance2+FabricClassification, consent, PII, lineage, retention
18Evaluation & AssurancePre-deployThe gate before the gate — validates before production
19Agent Environment GovernanceAll ringsGoverned context, instructions, tools, workspace, memory

Composition Patterns

Composition Patterns — Progressive Build-Up
PatternPrimitivesWhat It Gives You
Minimum Viable Control#7, #14, #6, #10, #19 (minimal)Scope, identity, audit trail — the floor
Validation PipelineMVC + #1, #2, #5, #13Verified outputs. Structural quality assurance.
Governed Decision FlowPipeline + #8, #9, #16, #17Policy-evaluated, human-gateable decisions
Secure Governed SystemGDF + #15, #18, #11Defense in depth, pre-deployment validation
Full Governed SystemAll 19 primitivesComplete governance that improves over time

Application Examples

System TypePrimary CompositionDeployment Mode
Risk decision platformGoverned Decision FlowWrapper
Coding agent (Claude Code, Cursor)Validation Pipeline + selective Ring 2Middleware/Interrupt
Conversational agentMVC + graph-embedded verificationGraph-Embedded
Document processing pipelineValidation Pipeline → GDFWrapper
Personal productivity agentRing 0 + Ring 3Middleware

Primitive Interaction Tensions

The primitives are not always harmonious. Seven named tensions with architectural invariants:

TensionConflictInvariant
Self-Improvement vs. Reproducibility#3 changes behavior; #6 requires traceabilityAlways reproducible at a specific version
Trust Ladders vs. Governance Gates#11 reduces oversight; #8 ensures accountabilityCan skip a spot-check, never regulatory approval
Bounded Agency vs. Self-Improvement#7 constrains; #3 improves — can it expand itself?The box can get smarter inside. It cannot grow itself.
Validation vs. Latency/Cost#2 improves quality; each pass costs time and moneyQuality bounded by economics, not just capability
Memory vs. Signal-to-Noise#12 accumulates knowledge; stale memories inject noiseGrowth without curation is hoarding, not learning
Policy as Code vs. Self-ImprovementCan Ring 3 change Ring 2's policy rules?Can suggest governance changes, cannot enact them
Environment vs. Governance Integrity#19 optimizes the environment — but it IS the control surfaceThe environment can get better. It cannot get less governed.

Implementation Checklist

Phase 1: Minimum Viable Control

  • Agent scope defined (tool allowlists, data access boundaries, output authority)
  • Agent identity established (ID, version, configuration hash)
  • Provenance logging active (append-only, structured, includes identity context)
  • Structured events emitted at action boundaries
  • Workspace scoped and instructions versioned

Phase 2: Verification

  • Separate verification agent operational
  • Validation loops with convergence criteria and iteration budget
  • Structured output schema defined and enforced
  • Error handling: checkpointing at ring boundaries, graceful degradation

Phase 3: Governance

  • Governance gates operational (adaptive + mandatory classes defined)
  • Policy rules versioned and testable
  • Transaction control for irreversible actions
  • Data classification pipeline active

Phase 4: Security & Assurance

  • Security posture: defense in depth, supply chain trust policy
  • Evaluation suites: pre-deployment, regression, adversarial testing
  • Trust Ladders: initial levels set, promotion/demotion criteria defined

Phase 5: Learning

  • Ring 3 learning pipeline operational
  • Memory infrastructure with relevance filtering and curation
  • Full environment optimization loop with termination condition
  • Adversarial Critique: challenger agent for high-stakes outputs

On this page