meetLab/ Docs/ INT · 12 — Agent tools & model relay

Agent tools & model relay protocols.

Two Tier-2 statutory protocols govern off-surface execution at meetLab. ATL-001 binds tool-call events to authority. MRP-001 binds model relay and MCP messages to artifact-anchored payloads. Together they define the connector boundary: nothing crosses the plane without an active envelope hash.

StatusStable
DocINT · 12 / 12
SourceAGENT_TOOLS_PROTOCOL.md ·
MODEL_RELAY_PROTOCOL.md
AuthorityATL-001 · MRP-001
FrameworkmeetLab Governance v4.1.0
I.

Why two protocols

Off-surface execution — anything that leaves the runtime through a tool call or a model relay — is the most permissive boundary in the system and therefore the most strictly governed. The two protocols partition the surface:

  • ATL-001 (Agent Tools & Logic Protocol) governs executable tool logic that a runtime agent invokes.
  • MRP-001 (Model Relay & MCP Protocol) governs the message-class interface between models, relays, and MCP handlers.

Both are Tier 2 — Statutory. Both have status ACTIVE. Neither grants execution authority on its own; authority remains artifact-derived per the governance framework.

II.

Plane boundary

The two protocols overlap at runtime/scripts/agent_tools/relay/mcp/. ATL-001 owns tool logic; MRP-001 owns relay/MCP framing. A handler that lives at the overlap is bound by both.

ProtocolScope pathSubsystem
ATL-001runtime/scripts/agent_tools/runtime_agent_tools
ATL-001runtime/scripts/agent_tools/relay/mcp/runtime_agent_tools
MRP-001runtime/scripts/model_relay/model_relay_mcp
MRP-001runtime/agents/mcp/model_relay_mcp
MRP-001runtime/scripts/agent_tools/relay/mcp/model_relay_mcp
connector plane runtime agent ATL tool MRP relay / MCP external surface | no envelope hash → HALT
III.

ATL-001 · agent tools

Header (verbatim)

Governance Tier: Tier 2 — Statutory
Authority ID:    ATL-001
Subsystem:       runtime_agent_tools
Status:          ACTIVE

Scope

This protocol governs executable logic under runtime/scripts/agent_tools/ and runtime/scripts/agent_tools/relay/mcp/. It does not grant execution authority. Authority remains artifact-derived per governance documents.

Structural requirements (verbatim)

  • Tools MUST run through governed orchestration surfaces for Gate-Exec claims.
  • MCP-facing tools MUST enforce active_envelope_hash gating before mutation-capable operations.
  • Tool outputs intended for governance/audit surfaces MUST be deterministic and machine-parseable.
  • Drift or heartbeat outputs are evidentiary/diagnostic and MUST NOT be treated as permission artifacts.
IV.

MRP-001 · model relay

Header (verbatim)

Governance Tier: Tier 2 — Statutory
Authority ID:    MRP-001
Subsystem:       model_relay_mcp
Status:          ACTIVE

Scope

This protocol governs runtime/scripts/model_relay/, runtime/agents/mcp/, and runtime/scripts/agent_tools/relay/mcp/.

Interface compliance (verbatim)

  • MCP handlers/messages MUST remain schema-compatible with canonical message classes in MCP message modules.
  • Relay and observer outputs (for example dist/rael_observe_report.json) are diagnostic/evidentiary only.
  • Any mutation-capable MCP path MUST enforce active_envelope_hash and fail closed when invalid.
V.

Envelope-hash gate

Both protocols name the same gate: active_envelope_hash. This is the load-bearing connector control. Every mutation-capable path through ATL-001 or MRP-001 must:

  1. Read the active envelope hash from the runtime state.
  2. Verify the envelope is current and the path is admitted under it.
  3. Fail closed when the envelope hash is missing, expired, or does not admit the path.

An expired or missing envelope is not a soft warning. The mutation path must abort. Read-only and observer paths are exempt because they cannot affect governed state.

no execution authority from the protocol itself
ATL-001 and MRP-001 describe what tools and relays must enforce — not what they may do. Execution authority comes from a persisted ACK envelope at runtime/airlock/envelopes/, derived through Phase-6 admission, as described in meetLab Operations.
VI.

Diagnostic vs authority

Both protocols draw a hard line between evidentiary outputs and permission artifacts. Diagnostic outputs are useful for audit, replay, and operator triage. They do not grant authority and may not be substituted for an envelope.

ClassExamplesAuthority?
Permission artifactACK envelope, active envelope hash, NTA sealYes — required to mutate
Evidentiary / diagnosticDrift outputs, heartbeat outputs, dist/rael_observe_report.json, relay observer logsNo — never substitute for an envelope
Audit-grade tool outputDeterministic, machine-parseable governance output from ATL-compliant toolsNo — read-only evidence for adjudication
VII.

Adjudication

Violations are governance boundary breaches. Both protocols escalate identically:

  • ATL-001 §3: violations are treated as governance boundary breaches and must be escalated through Phase 6/6.5 controls.
  • MRP-001 §3: contract violations, envelope-gate bypass, or failed relay integrity checks trigger Phase 6/6.5 compliance escalation.

Phase 6/6.5 admission is documented in meetLab Operations · IX. Both protocols are authorized under the meetLab Governance Framework v4.1.0.

VIII.

Readiness checklist

Before promoting a tool, relay, or MCP handler to a governed surface, walk this list. Every item must be satisfied; none may be deferred.

integration readiness · ATL-001 + MRP-001
  • Path placement. The connector lives under one of the scoped paths in §II. Cross-path components are bound by both protocols.
  • Orchestration surface. Tool execution routes through a governed orchestration surface for any Gate-Exec claim.
  • Envelope gate wired. Every mutation-capable code path reads active_envelope_hash, verifies admission, and fails closed on miss/expiry.
  • Schema compliance. MCP messages and handlers match canonical message classes in the MCP message modules. Schema drift is rejected at handler entry.
  • Determinism. Audit-bound outputs are deterministic and machine-parseable. No timestamps, PRNG, or environment dependencies in the hashed surface.
  • Diagnostic isolation. Drift, heartbeat, and observer outputs (e.g. dist/rael_observe_report.json) are emitted as evidentiary and never treated as permission artifacts.
  • Fail-closed default. Absence of an envelope, schema mismatch, or relay integrity failure halts the path. There is no degraded-mode permit.
  • Adjudication path known. The on-failure escalation route is Phase 6/6.5 controls; the operator knows where the violation surfaces.
  • Authority sourced elsewhere. The connector consumes authority — it does not mint it. Authority comes from a persisted ACK envelope.
end of doc set start-here lifecycle reference operations integrations · INT · 12
doc · 12 · build 2026-04-25 event → enforce(event) → invariant → PASS | HALT meetLab · 2026