Skip to main content
Guardrails are technical constraints enforced by platform code—not by LLM reasoning. This is a critical distinction: even if an agent is manipulated through prompt injection or given conflicting instructions, guardrails cannot be bypassed. The platform simply won’t execute the action.

Why guardrails matter

Telling an agent “don’t email external domains” in its instructions is helpful, but not foolproof. LLMs can be tricked, confused, or make mistakes. Guardrails provide a hard limit that works regardless of what the agent thinks it should do. The agent never gets a chance to override this—the check happens at the platform level before the action executes.

Capability-specific guardrails

Different capabilities have different guardrail options. Configure these in each capability’s settings.

Email

Email capability settings showing whitelist and approval options
SettingOptionsWhat it does
WhitelistDomains or specific addressesAgent can only email addresses on the list
ApprovalNo / Yes / Not on whitelistWhen human approval is required
The “Not on whitelist” option is particularly useful: the agent can email internal addresses freely, but external contacts require your approval. See User Approval for how the approval flow works.

Other capabilities

  • SMS and Phone calls — Similar guardrails (whitelists, approval, limits). See Email & SMS and Voice for details.
  • HTTP requests — Optional approval for each request. See HTTP Requests for details.

Configuring guardrails

  1. Open the agent and navigate to Capabilities in the sidebar
  2. Click on the capability you want to configure (Email, SMS, Phone, etc.)
  3. Set whitelists, approval requirements, and any limits
  4. Test by trying an action that should be blocked or require approval
You can see guardrail settings at a glance in the capability card. A shield icon indicates approval is required; a list icon indicates a whitelist is configured.

Organization-level controls

Organization administrators can control which capabilities are available to agents across the organization. This is configured in Agent Management.
Agent management capabilities tab showing organization-wide settings and capability toggles
ControlWhat it does
Capability togglesEnable or disable specific capabilities organization-wide
Default modeWhether new capabilities are allowed or blocked by default
Custom MCP serversAllow or block users from adding their own MCP servers
Capabilities disabled at the organization level cannot be enabled by individual agents—the toggle won’t appear.
If your organization uses groups, group administrators can set additional restrictions for their group, but cannot enable capabilities that are disabled at the organization level.

Best practices

Start restrictive. Begin with tight guardrails—require approval for external communication, limit capabilities to what’s needed. You can always loosen them as you gain confidence. Use “Not on whitelist” approval. This lets agents work freely within your organization while requiring approval for external contacts. It’s a good balance of autonomy and safety. Review blocked and approved actions. Check the activity log periodically to see what’s being blocked or approved. This helps you identify false positives (legitimate actions being blocked) and tune your configuration. Match guardrails to risk. A customer-facing agent needs tighter guardrails than an internal research assistant. See Risk & Autonomy for guidance on assessing risk.

FAQ

No. Guardrails are enforced by platform code, not LLM reasoning. The agent can’t talk its way past a whitelist check—the platform simply won’t execute the blocked action.
If approval is required, the action goes to the approval queue (see User Approval). If the whitelist is strict (no approval option), the action fails and the agent is notified that the recipient isn’t allowed.
Yes. Organization administrators can disable capabilities organization-wide in Agent Management. Per-agent guardrails (like whitelists) are still configured individually.

Learn more