Documentation Index
Fetch the complete documentation index at: https://docs.superblocks.com/llms.txt
Use this file to discover all available pages before exploring further.
Policy Agents are currently in beta. Contact support to get on the waitlist.
Why Policy Agents
Knowledge tells Clark what to do while it writes code, but instructions alone are not enough. You need multiple layers of defense:- Knowledge guides Clark during development
- Policy Agents verify that the output meets your standards before it ships
- Clark remediates any findings automatically so builders stay in flow
Two types of Policy Agents
Security Scans
Deterministic, built-in scanning that runs automatically at publish time. Checks for dependency vulnerabilities, leaked secrets, SQL injection, cross-site scripting, and other common security issues. Security scans are Superblocks-managed — no configuration required beyond enabling them and setting your blocking thresholds. Learn more about security scanningCustom Policy Agents
AI-powered agents configured by your IT admins. Each agent has its own instructions, context window, and access to your organization’s Knowledge. They handle multi-step checks that require deep analysis — evaluating data handling patterns, checking compliance requirements, or enforcing architecture standards. Learn more about custom agentsHow they work together
Every Policy Agent — whether a built-in scan or a custom agent — feeds into a unified publish readiness checklist. Builders see a single view of which checks passed, which are running, and which are blocking their deploy.Modes
Admins control how each Policy Agent enforces its findings:| Mode | Behavior |
|---|---|
| Blocking | Prevents publish until findings are remediated or an admin overrides |
| Advisory | Shows findings to the builder but allows publish to proceed |
- Policy Agent finds an issue and blocks publish
- Clark automatically attempts to fix the finding
- A fresh scan confirms the fix resolved the issue
- If Clark cannot remediate, the builder can escalate to an admin
- Authorized admins can force-push past the block when appropriate
Clark remediation
When a Policy Agent finds an issue, Clark can attempt to fix it automatically. The builder clicks Fix with Clark on any eligible finding, and Clark modifies the app to resolve the issue. A remediation attempt does not resolve the gate on its own. After Clark makes a fix, a fresh Policy Agent run verifies the new app state. Only a clean result unblocks publish. This ensures no finding is resolved by assumption — every fix is independently verified.Use cases
Policy Agents cover a range of enforcement categories:- Security — scan for vulnerabilities, leaked secrets, insecure patterns, and dependency issues
- Compliance — check that apps handling sensitive data meet your regulatory requirements (PCI, HIPAA, GDPR)
- Design enforcement — validate that generated UI follows your design system, component usage, and spacing tokens
- Code quality — enforce naming conventions, architectural patterns, and internal coding standards
- Performance — flag expensive queries, N+1 patterns, and rendering bottlenecks before they ship

