GitHub
Reliability & Eval emerging

Versioned Constitution Governance

By Nikola Balic (@nibzard)
Add to Pack
or

Saved locally in this browser for now.

Cite This Pattern
APA
Nikola Balic (@nibzard) (2026). Versioned Constitution Governance. In *Awesome Agentic Patterns*. Retrieved March 11, 2026, from https://agentic-patterns.com/patterns/versioned-constitution-governance
BibTeX
@misc{agentic_patterns_versioned-constitution-governance,
  title = {Versioned Constitution Governance},
  author = {Nikola Balic (@nibzard)},
  year = {2026},
  howpublished = {\url{https://agentic-patterns.com/patterns/versioned-constitution-governance}},
  note = {Awesome Agentic Patterns}
}
01

Problem

When agents can modify policy/constitution text, safety regressions can be introduced gradually and go unnoticed. Without versioning, signatures, and policy review gates, teams cannot prove who changed what, why it changed, or whether critical safeguards were weakened.

02

Solution

Store the constitution in a version-controlled, signed repository:

  • YAML/TOML rules live in Git for automated rule enforcement; natural language principles guide LLM-based evaluation.
  • Each commit is signed (e.g., Sigstore); CI runs automated policy checks.
  • Only commits signed by approved reviewers or automated tests are merged.
  • The agent can propose changes, but a gatekeeper merges them.
  • Use semantic versioning: MAJOR for core safety principle changes, MINOR for additions, PATCH for clarifications.

Combine policy-as-code with release discipline: every constitutional change is diffable, reviewable, and test-gated before activation. This gives governance history, rollback capability, and auditable control over alignment policy evolution.

03

How to use it

  • Require git commit -S or similar.
  • Run diff-based linting to flag deletions of critical rules.
  • Expose constitution HEAD as read-only context in every agent episode.
04

Trade-offs

  • Pros: Strong auditability, safer policy evolution, and fast rollback of bad constitutional changes.
  • Cons: Slower policy iteration and extra operational burden for signing, review, and CI checks.
06

References