Skip to main content

Glossary

Canonical domain terms for Syndicate Code documentation.

Audit chain

Append-only, hash-linked, HMAC-signed event sequence used as governance evidence.

Defined in: audit_and_evidence_model.md §2

Do not use: logs, history

Bounded autonomy

Workflow behavior constrained by policy, permits, checkpoints, and explicit boundary rules.

Defined in: product_system_definition.md §6 (G6)

Do not use: unrestricted autonomy, free-running execution

Canonical form

Deterministic normalized representation of a proposal used for policy evaluation and binding.

Defined in: governed_execution_spec.md §3

Do not use: canonical request text, normalized task

Checkpoint

Mandatory control-plane re-evaluation boundary requiring renewed approval, revalidation, or both.

Defined in: governed_execution_spec.md §3 and §7

Do not use: pause, confirmation prompt

Control plane

Authoritative enforcement component that evaluates policy, issues permits, and records evidence.

Defined in: product_system_definition.md §5

Do not use: server, backend, daemon

Delegation depth

Maximum allowed nesting level for specialist delegation chains within a governed workflow.

Defined in: autonomy_and_specialist_orchestration_spec.md

Do not use: unlimited delegation

Evidence

Durable records that support non-repudiation, completeness, immutability, and reconstruction.

Defined in: audit_and_evidence_model.md §2 and §5

Do not use: generic logs

Execution envelope

Bounded authorization scope that can allow multiple steps without per-step approval when policy allows.

Defined in: governed_execution_spec.md §3 and §6

Do not use: batch, task group

Fingerprint

Binding digest over permit-relevant context that prevents reuse outside approved scope.

Defined in: canonicalization_binding_and_approval_spec.md

Do not use: loose identifier

Governed execution

Lifecycle in which proposals pass canonicalization, policy evaluation, checkpointing, permit issuance, and evidence recording before side effects.

Defined in: governed_execution_spec.md §5

Do not use: autonomous execution, ungated automation

Operator

Human participant interacting through the TUI or CLI.

Defined in: syndicatecode-docs-site-spec.md §2.1

Do not use: user, developer, engineer

Permit

Control-plane-issued authorization object bound to approved canonical form or execution envelope.

Defined in: governed_execution_spec.md §3 and §8

Do not use: token, access token

Policy

Versioned authoritative rule bundle used by the control plane to allow, restrict, or deny behavior.

Defined in: policy_and_capability_model.md

Do not use: local preference config

Proposal

Structured request for work from operator, runtime, specialist, or workflow engine.

Defined in: governed_execution_spec.md §3

Do not use: task, request, command

Provider

Inference endpoint selected through policy-governed routing.

Defined in: provider_routing_and_model_abstraction_spec.md

Do not use: hardcoded model path

Session

Bounded interaction context for one operator and one workspace with explicit creation and terminal events.

Defined in: session_and_turn_model.md §3

Do not use: shell lifetime, process lifetime

Side-effect class

Risk classification for operations such as read, write, exec, network, secret, and delegate.

Defined in: governed_execution_spec.md §3

Do not use: permission bucket

Specialist

Bounded work unit with declared capabilities and constraints under governed execution.

Defined in: syndicatecode-docs-site-spec.md §2.1

Do not use: agent, subagent, assistant

Step

Single tool invocation within a turn; smallest auditable execution unit.

Defined in: session_and_turn_model.md ST-002a

Do not use: opaque action

Trust boundary

Independent dimension where trust is evaluated (tool, path scope, specialist, provider, workflow class).

Defined in: governed_execution_spec.md §3 and §7.2

Do not use: global trust bucket

Trust state

Per-boundary control state that determines whether execution can proceed with reduced friction.

Defined in: governed_execution_spec.md §3 and §7.2

Do not use: static trust score

Trust tier

Policy-configurable classification that adjusts approval friction without bypassing permits or evidence requirements.

Defined in: policy_and_capability_model.md

Do not use: trust level, permission level

Turn

Complete execution loop from one operator intent to terminal response or checkpoint.

Defined in: session_and_turn_model.md §5

Do not use: partial loop

Workflow

Named execution intent submitted through syndicate run and processed through governed execution stages.

Defined in: cli_command_reference.md §6

Do not use: ad hoc script run