Policy Scope Redefinition: when agent policy quietly stops applying
Policy scope redefinition is the attack family where mandatory controls get reframed as optional guidance, appendix material, or lower-priority context so the workflow remains nominally compliant while its real authority expands.
What it is
This family is about interpretation abuse. The system is not always told to ignore policy directly. Instead, it is nudged into believing policy no longer applies in the current branch, urgency tier, appendix, MCP context, or exception path. That makes this one of the quietest ways to widen authority without triggering obvious alarms.
Why it matters for agents
Agents are unusually vulnerable to this family because they constantly reconcile instructions from different layers: system prompts, runbooks, tickets, tool metadata, docs, approvals, and user goals. If one layer successfully reframes another as advisory, stale, or context-limited, the agent can remain "allowed" while no longer being safe.
How it shows up in workflows
Typical shapes include appendix precedence overrides, runbook language that demotes guardrails, runtime reclassification of high-risk actions into normal operations, and scope creep that looks temporary but persists. This is also where many MCP and tool-handoff failures become more dangerous: the tool itself may be authorized, but the workflow's interpretation of what is still in-bounds quietly expands.
What Sunglasses sees
Attackers often win by reframing policy, not by defeating it head-on.
Categories in this chapter:policy_scope_redefinition, authorization_bypass, auth_bypass, privilege_escalation, approval_graph_poisoning
No patterns match the current filters.
All 47 patterns in this chapter
Every Sunglasses detection pattern mapped to this attack family.
GLS-PE-001Admin/debug mode activationHIGH
privilege_escalationmessage, file
Attempt to escalate agent privileges via fake mode activation.
enter admin modeactivate admin modeenable admin accessyou are now in debug modedebug mode activatedenter root modesudo mode enabled
GLS-PE-002Approval bypassHIGH
privilege_escalationmessage, file
Attempt to bypass approval or safety checks.
bypass approval checksskip verificationbypass safety checksskip authenticationbypass all restrictionsoverride safety
GLS-TD-002Agent config manipulationCRITICAL
privilege_escalationmessage, file, api_response
LLM agent silently disabling execution approval or safety checks via config modification.
GLS-AB-001Authentication bypass via token truncationCRITICAL
auth_bypassfile, api_response, message
Authentication tokens truncated or partially compared, allowing collision attacks where different users can share cache entries or bypass auth. Based on LiteLLM CVE-2026-35030.
GLS-AUZ-GHSA-013Concurrent async auth attempts can bypass the intended shared-secret rate-limit budget on Tailscale-capable pathsHIGH
authorization_bypassmessage, file, web_content
Detection for GHSA-25wv-8phj-8p7r: OpenClaw: Concurrent async auth attempts can bypass the intended shared-secret rate-limit budget on Tailscale-capable paths. Source: https://github.com/advisories/GHSA-25wv-8phj-8p7r
GLS-AUZ-GHSA-016resolvedAuth closure becomes stale after config reloadMEDIUM
authorization_bypassmessage, file, web_content
Detection for GHSA-68x5-xx89-w9mm: OpenClaw: resolvedAuth closure becomes stale after config reload. Source: https://github.com/advisories/GHSA-68x5-xx89-w9mm
GLS-AUZ-GHSA-018`device.token.rotate` mints tokens for unapproved roles, bypassing device role-upgrade pairingHIGH
authorization_bypassmessage, file, web_content
Detection for GHSA-whf9-3hcx-gq54: OpenClaw `device.token.rotate` mints tokens for unapproved roles, bypassing device role-upgrade pairing. Source: https://github.com/advisories/GHSA-whf9-3hcx-gq54
bypassdevice.token.rotateopenclawpairing
GLS-AUZ-GHSA-020strictInlineEval explicit-approval boundary bypassed by approval-timeout fallback on gateway and node exec hostsMEDIUM
authorization_bypassmessage, file, web_content
Detection for GHSA-q2gc-xjqw-qp89: OpenClaw: strictInlineEval explicit-approval boundary bypassed by approval-timeout fallback on gateway and node exec hosts. Source: https://github.com/advisories/GHSA-q2gc-xjqw-qp89
bypassevalexecopenclawstrictinlineeval
GLS-AUZ-GHSA-022Authenticated `/hooks/wake` and mapped `wake` payloads are promoted into the trusted `System:` prompt channelMEDIUM
authorization_bypassmessage, file, web_content
Detection for GHSA-jf56-mccx-5f3f: OpenClaw: Authenticated `/hooks/wake` and mapped `wake` payloads are promoted into the trusted `System:` prompt channel. Source: https://github.com/advisories/GHSA-jf56-mccx-5f3f
openclawwake
GLS-AUZ-GHSA-030LobeHub: Unauthenticated authentication bypass on `webapi` routes via forgeable `X-lobe-chat-auth` headerHIGH
authorization_bypassmessage, file, web_content
Detection for GHSA-5mwj-v5jw-5c97: LobeHub: Unauthenticated authentication bypass on `webapi` routes via forgeable `X-lobe-chat-auth` header. Source: https://github.com/advisories/GHSA-5mwj-v5jw-5c97
bypassforgeableunauthenticatedwebapi
GLS-PE-003Consent/approval laundering claimHIGH
privilege_escalationmessage, file, web_content
Detects consent/approval laundering — text that claims approval, consent, or sign-off already exists rather than asking to bypass it. Narrower than GLS-SE-004.
Document-structure precedence abuse — attacker claims an appendix, annex, addendum, footnote, sidebar, or metadata note has precedence over the main policy/governance ruleset and uses that to ignore, bypass, waive, or disable guardrails, safety, review, approval, or compliance checks. Novel scope-redefinition vector.
appendix takes precedence ignore guardrailsaddendum new ruleset waive safety checksmetadata note supersedes main policyannex authoritative replace control matrixfootnote governing ruleset ignore safetysidebar addendum override governance controlsappendix supersedes policy waive guardrailmetadata note higher-priority governance discard approval+2 more
GLS-PSR-579Policy Reclassified As Advisory Guardrail DemotionHIGH
Detects attempts to demote policy/guardrail scope from mandatory controls to advisory/optional guidance in order to justify unsafe execution.
reclassify safety policy advisory and continue withtreat guardrails optional for this run anddeclare compliance rules non-binding the agent candowngrade policy controls informational guidance before actionconsider safety rules best-effort only and bypasspolicy optional this emergency workflow continue nowmark the guardrails lower-priority and follow userreinterpret compliance rule advisory allow the command
Detects an attempt to redefine, reinterpret, or reclassify a policy or guardrail as deprecated or superseded so that a new scope or priority takes precedence and bypasses it.
Detects text claiming a forged or counterfeit policy clause, appendix, or addendum takes precedence and is used to override, supersede, or rebind execution scope in order to bypass or skip safety restrictions.
GLS-AGP-653Forged Approval Quorum Auto-Approve OverrideHIGH
approval_graph_poisoningtool_output, message
Detects a forged approval quorum, sign-off, or vote snapshot used to auto-approve or bypass recalculation of the approval graph.
Lower-trust content (tool output, retrieval, retry wrappers) is merged after policy text and silently overrides protected fields so executed tool arguments drift outside approved scope while summaries still appear compliant.
policy-last merge bugretry wrapper overridepost-approval mutationtool hint overrides policycross-tool precedence bleedsummarize-then-execute inversionlow-trust channel overrides guardrailscope silently widened+4 more
Attackers reframe time-bounded or narrowly scoped policy exceptions into persistent or broader authority through alias expansion, delegation inheritance, or fabricated rollback dependencies, granting durable elevated access from a temporary unblock.
allow once persistence grafttemporary exception broadenedexception scope inflationalias-based scope expansiondelegated child inherits exceptionexception ttl revivalrollback blocker pretextwhile this issue persists+4 more
Attackers hide control directives in Unicode confusables, zero-width marks, or emoji bullets so the rendered text looks benign to operators while normalization or tokenization expands the payload into policy-changing instructions at execution time.
homoglyph verb swapcyrillic confusable allow denyemoji scope markerhidden precedence emojizero-width control directivebidi mark policy bypassnfc nfkc normalization splitrendered plaintext mismatch+4 more
Attackers poison precedence rules across multiple mission artifacts by spoofing newer timestamps, injecting partial-order ambiguity, or redirecting reply paths so the agent executes lower-trust or stale directives while appearing compliant.
Adversarial content persuades the pipeline to report controls as active while the enforcement path is bypassed, using laundered healthchecks, rewritten compliance summaries, or spoofed freshness metadata so operators trust green dashboards during live attacks.
healthcheck pass launderingguardrail shadow branchpolicy applied but unsafe fallbackcompliance summary overwritepost-processor rewrites summarystaleness badge suppressionfreshness metadata mutatedgreen dashboard while bypass+4 more
Attackers inject fake operational-urgency framing or list-truncation directives to make schedulers reorder priority lanes, skip end-of-cycle verification steps, or force false silent-mode completion, silently shifting effort away from high-impact missions.
urgency spoof overridefake p0 emergency tagfabricated authority chainpriority list truncationignore everything after itemcross-file precedence confusionolder mission supersedes newestsilent mode coercion+4 more
Attacker text manipulates the planner's goal-tree ordering so safety and verification nodes are demoted or aliased to a completed state, allowing high-risk execution nodes to run before approval checks pass.
pretext urgency re-rankingverify equals already verifiedgoal alias collisiondependency edge deletionguardrail goals as optionalmetric chasing coercionexecute before verifyplan dag tamper+4 more
Attack content coerces a one-task-per-cycle scheduler into priority inversion by framing repeated low-value checks as urgent blockers or by mimicking canonical-board authority, causing the agent to burn cycles re-auditing already-green missions instead of advancing real work.
Across summary, planner, executor, and formatter stages attackers keep payloads intact while rephrasing hard MUST/NEVER constraints as soft guidance, eroding safety ordering so downstream tools optimize delivery speed over required security gates.
planner softening attacktreat policy as guidance if urgentsummarizer drops must clausesmust downgraded to shouldformatter precedence inversionverification fields omittedcross-role authority bleedteammate hint as boss directive+4 more
GLS-PSR-591Shadow Board State Injection Backlog OverrideHIGH
Attackers inject lookalike state-board files, flip section precedence so backlog rows override DECISIONS, or replay stale READY snippets so cron-driven agents pick up wrong owners and produce overstated readiness reports.
shadow board injectionlookalike timeline filestale inbox mirror as canonicalsection precedence flipqueued overrides decisionsopen_questions overrides decisionstemporal replay of ready statecross-file canonicality drift+4 more
GLS-PSR-592Prior Approval Claim Without Source TokenHIGH
Attackers inject synthetic compliance language into intermediate briefing layers and handoff notes so downstream steps trust unapproved directives as already-reviewed policy, bypassing evidence checks because the brief is trusted more than raw source artifacts.
policy voice prependsecurity already approved thishandoff summary authority swapguardrail relaxed in prior cyclestatus panel greenwashfake pass healthy languagecompliance citation launderingreal policy id altered interpretation+4 more
GLS-PSR-593Risk Evaluator Score Downgrade Block To AllowCRITICAL
Attackers poison the trusted policy-evaluator layer through feature-weight stuffing, schema-fallback ambiguity, context-order anchoring, or forged provenance so malicious actions get scored ALLOW instead of BLOCK, compromising the decision gate that mediates all downstream tools.
feature weight prompt stuffingevaluator-safe token stuffingthreshold steering fallback ambiguitykpi_snapshot vs kpis fallbackunknown defaults to allowcontext order poisoningpolicy after retrieval anchoredcross-tool evidence laundering+4 more
GLS-PSR-594Canonical Miss Case Fold Template HijackHIGH
Attackers exploit non-deterministic template/path resolution (case-folding, near-name shadowing, first-match glob) so the system binds to attacker-controlled or looser fallback templates that strip lane separation, freshness, or KPI guards from rendered outputs.
Attackers inject low-friction high-recency or high-frequency artifacts to push deterministic tiebreak rules toward attacker-preferred conclusions, displacing canonical evidence so the pipeline mislabels readiness as GREEN or suppresses escalations by rule rather than truth.
recency over provenance overridecardinality weight hijacknear-duplicate floodseverity label skewhigh medium ambiguity dampenwindow boundary tiebreak abusetrend reversal syntheticevidence priority tiebreak poisoning+4 more
GLS-PSR-596Approval Summary Narrower Than Execution PayloadCRITICAL
Attackers introduce a second policy layer (glossary rewrite, compressed approval summary, forged role inheritance, or retry constraint mutation) that redefines safety terms so downstream tool calls execute riskier actions while still appearing policy-compliant.
glossary rewrite shadowingredefine read-only includes metadatasafe command includes installsecurity glossary injectapproval summary compression drifttool args broader than summaryhidden force or wildcard in argsrole inheritance shadowing+4 more
Sunglasses can measure traffic and campaign performance, but only if you say yes. Essential storage stays on. Analytics and marketing stay off until you choose.
We are not doing the fake "trust us" banner. The site works without analytics. If you opt in, Sunglasses will use analytics and marketing storage to measure what pages work and which campaigns bring real buyers back. If you say no, non-essential Google consent stays denied.
Essential
Required to remember this choice and keep core site behavior stable.