ECC currently helps at the point of tool invocation, but it still lacks a strong governance model for what happens after the tool call. This includes understanding who invoked a tool, what changed, what outputs were produced, and what approvals were required or bypassed.
## Problem ECC currently helps at the point of tool invocation, but it still lacks a strong governance model for what happens after the tool call. Recurring product pressure is concentrated around questions like: - who or what invoked a tool - what changed as a result - what outputs were produced - what approvals were required, bypassed, or satisfied - what policy/security state applied after execution completed This gap affects both ECC 1.x and the ECC 2.0 control-plane direction. ## Scope Define a concrete governance model for post-tool execution visibility across local harness workflows. First-pass deliverables should cover: - actor identity for tool invocations (human, agent, subagent, automation) - execution records and artifact trails - approval and policy event modeling - post-call state transitions for sessions, tasks, and deliverables - how this appears in ECC 1.x docs/runtime versus ECC 2.0 operator surfaces ## Non-Goals - Full hosted governance backend in the same