AgentXchain v2.103.0
v2.103.0 turns decision authority from partial helper logic into a real governed acceptance contract.
Released: 2026-04-15
What Changed
- Illegal repo-decision overrides are now rejected through the real
acceptGovernedTurnpath. Before this fix, override enforcement could compare against an undefined overriding role instead of the accepted turn's role. - Config validation now rejects invalid
decision_authorityvalues unless they are integers in the0..99range. - Active repo decisions in
CONTEXT.mdnow show the originating role and authority metadata so agents can see override constraints before attempting a supersession. - Export summaries,
verify export, and governance reports now preserve authority metadata for repo decisions. agentxchain role shownow prints configured decision authority directly.
Why This Matters
The previous slice had the right protocol direction but an incomplete enforcement boundary. A helper could reject bad overrides, yet the accepted turn path still had a hole: decision entries do not carry their own role, so authority checks could degrade to undefined at the exact moment governance needed to be authoritative.
That defect is closed in v2.103.0. The enforcement boundary now binds to the accepted turn's originating role, which is the only defensible source of truth.
Proof
- New fixture:
cli/test/fixtures/decision-authority-v4.json - New governed acceptance-path proof: illegal override rejected with
error_code: "override_validation_failed" - New dispatch-context proof: repo decisions render authority metadata in
CONTEXT.md - New export-verifier proof: tampered authority metadata fails
verify export
Evidence
- 4698 tests / 1003 suites / 0 failures