15 Research Lab

15RL Checklist: AI Agent Safety for Engineering Teams

15 Research Lab · 2026-02-13

15RL Checklist: AI Agent Safety for Engineering Teams

Introduction

Engineering teams deploying AI agents need a practical, actionable checklist — not a 50-page policy document. 15 Research Lab compiled this checklist from our research across hundreds of agent deployments, distilling the controls that have the highest impact on real-world safety outcomes. Each item includes the rationale, priority level, and implementation guidance.

Pre-Deployment Checklist

Permissions & Access

- Rationale: Every deployment in our incident database involved excessive agent permissions

- Action: List every permission the agent needs. Remove everything else. If unsure, remove it and add back when needed.

- Rationale: Long-lived, broadly-scoped credentials amplify the impact of any agent compromise

- Action: Use short-lived tokens. Scope to specific resources. Rotate automatically.

- Rationale: Agents should never have unmediated access to production databases, servers, or configurations

- Action: If the agent needs production data, provide a read-only replica or API. Never direct database access.

Policy Configuration

- Rationale: The single most effective safety control. Prevents unknown-unknown risks.

- Action: Configure the policy engine so that any unrecognized tool call is denied by default.

- Rationale: Credential files, system configs, and admin interfaces must be off-limits even if other policies are too permissive

- Action: Maintain a protected resource list. Block any agent access to listed resources.

- Rationale: File deletion, database modification, deployment, and configuration changes are irreversible

- Action: Classify every tool call as read-only or mutating. Route mutating calls through approval.

- Rationale: Prevents runaway spending from agent loops or retries

- Action: Set per-session and daily cost limits at 10x expected task cost initially.

Logging & Monitoring

- Rationale: You cannot investigate what you did not log

- Action: Verify that every tool call produces a log entry with timestamp, tool, parameters, decision, and outcome.

- Rationale: Tampered logs invalidate incident investigation

- Action: Use append-only storage or hash-chained logs. Prevent the agent from modifying its own logs.

- Rationale: Real-time awareness of policy violations enables rapid response

- Action: Configure notifications for denied actions, cost threshold breaches, and anomalous patterns.

Testing

- Rationale: Untested policies provide false confidence

- Action: For each policy rule, verify at least one action it should allow and one it should deny.

- Rationale: Functional tests do not reveal bypass vulnerabilities

- Action: Attempt path traversal, parameter injection, and tool-chaining bypasses.

Runtime Checklist

- Action: Each session operates in its own workspace with no shared state from previous sessions. - Action: Test the end-to-end approval flow: agent requests approval, notification arrives, human approves/denies, agent receives response. - Action: Verify that cost calculations include all token usage and external API calls. - Action: Agent error messages should not include stack traces, credentials, or internal system details.

Ongoing Maintenance Checklist

- Action: Spend 30 minutes reviewing denied actions, approved actions, and cost trends. - Action: Any new tool added to the agent requires a corresponding policy update. - Action: Agent credentials should rotate at least monthly, preferably more frequently. - Action: Store policies in git. Track changes with commit messages explaining the rationale. - Action: Document how to halt the agent, preserve evidence, and initiate investigation.

Implementation with SafeClaw

SafeClaw addresses the majority of this checklist's technical requirements through a single integration point: deny-by-default action gating (policy configuration items), structured hash-chained audit logging (logging items), and configurable approval workflows (approval items). Teams can use this checklist to verify their SafeClaw configuration covers all critical items. The SafeClaw knowledge base maps to many of the specific actions listed above.

Prioritization Guide

For teams with limited time, address checklist items in this order:

Day 1: Deny-by-default policy, audit logging, minimum permissions Week 1: Cost limits, sensitive resource protection, human approval workflow Week 2: Policy testing, alerting, session isolation Month 1: Adversarial testing, log review process, incident response plan Ongoing: Credential rotation, policy updates, version control

Conclusion

This checklist is designed to be printed, posted, and used — not filed away. Every item is based on real incident data and addresses a failure mode we have observed in production agent deployments. Teams that work through this checklist systematically will avoid the majority of agent safety incidents that currently affect the ecosystem.

This checklist is updated quarterly based on 15RL's ongoing research. Current version: February 2026.