AG-097

Action Precondition Revalidation Governance

Adversarial AI, Security Testing & Abuse Resistance ~17 min read AGS v2.1 · April 2026
EU AI Act SOX FCA NIST ISO 42001

2. Summary

Action Precondition Revalidation Governance requires that AI agent systems revalidate the conditions that justified an action immediately before that action is executed, rather than relying on conditions evaluated at an earlier point in the reasoning chain. AI agents plan and execute multi-step workflows where the decision to take an action may be made seconds, minutes, or even hours before execution. During the gap between decision and execution, the conditions that justified the action may have changed: permissions may have been revoked, data may have been updated, account balances may have shifted, market prices may have moved, or approval statuses may have changed. Without precondition revalidation, agents execute actions based on stale state — a time-of-check to time-of-use (TOCTOU) vulnerability that can be exploited adversarially or that causes incorrect actions due to natural state changes. This dimension mandates that critical preconditions are checked again at the moment of execution, not only at the moment of decision.

3. Example

Scenario A — Permission Revocation Between Decision and Execution: An enterprise workflow agent receives a request to transfer an employee's access rights to a new department's systems. The agent checks the employee's current status, confirms they are active, verifies the transfer is authorised, and queues the access provisioning for execution. Between the authorisation check and the execution (a 45-second gap due to the agent processing other steps in the workflow), the employee is terminated by HR and their access is revoked across all systems. The agent, proceeding without revalidation, provisions access to the new department's systems for a terminated employee. The terminated employee retains access to sensitive departmental systems for 6 hours until a security audit detects the anomaly.

What went wrong: The agent validated the precondition (employee is active and authorised) at decision time but did not revalidate at execution time. The 45-second gap was sufficient for the state to change. No precondition revalidation step existed in the execution pipeline. Consequence: Terminated employee with access to sensitive systems for 6 hours, potential data exfiltration during that window, mandatory security incident investigation, breach of access control policy, estimated remediation and investigation cost of £78,000.

Scenario B — Market Price Movement Between Quote and Execution: A financial trading agent evaluates a trade opportunity: buy 10,000 shares of a stock at £45.20 per share (total exposure £452,000) against a mandate ceiling of £500,000. The agent validates that the trade is within mandate limits and submits the order. Between the agent's price check and the order reaching the exchange (a 3-second gap during a volatile market), the price moves to £51.85 per share. The order executes at £51.85, creating a total exposure of £518,500 — exceeding the mandate ceiling by £18,500. The agent's mandate check used the stale £45.20 price.

What went wrong: The mandate limit check used the price at decision time, not the price at execution time. The 3-second gap during volatile market conditions was sufficient for the price to move 14.7%. No revalidation of the precondition (trade value within mandate) occurred at execution time with the actual execution price. Consequence: £18,500 mandate breach, potential FCA enforcement action for inadequate trading controls, trading desk suspension pending investigation, estimated regulatory and remediation cost of £425,000.

Scenario C — Adversarial TOCTOU Exploitation: An attacker identifies that a customer-facing agent validates account ownership at the beginning of a multi-step funds transfer workflow but does not revalidate at the execution step. The attacker initiates a transfer from their own account (Account A), which passes the ownership check. During the agent's multi-step processing (identity verification, compliance screening, amount validation — approximately 12 seconds), the attacker uses a separate session to change the source account on the pending transaction to Account B (belonging to another customer) through a direct API manipulation. The agent executes the transfer from Account B because the ownership precondition was only checked at the start of the workflow.

What went wrong: The TOCTOU vulnerability was deliberately exploited. The precondition (the requester owns the source account) was validated once and assumed to remain true throughout the workflow. No revalidation occurred at execution. The attacker manipulated the transaction state between check and use. Consequence: Unauthorised transfer from another customer's account, fraud investigation, regulatory notification, customer restitution, estimated cost of £290,000 including fraud recovery, investigation, and control remediation.

4. Requirement Statement

Scope: This dimension applies to all AI agents that execute actions based on preconditions evaluated at any point prior to execution. "Preconditions" include but are not limited to: permission and authorisation status, account ownership and identity, data values used in decision logic (prices, balances, quantities, statuses), approval statuses, environmental conditions, and any other state that the agent relied upon when deciding to take the action. The scope extends to all actions with external effect — financial transactions, data modifications, access provisioning, communications, and physical actuations. The scope also includes internal state changes that gate subsequent external actions (e.g., an internal approval flag that later authorises a payment). If an agent decides to take an action based on state that could change between the decision and the execution, that action is within scope. The criticality of revalidation scales with the time gap between decision and execution and with the consequence severity of acting on stale state.

4.1. A conforming system MUST identify and document the critical preconditions for each action type the agent can execute, specifying which conditions must be revalidated at execution time.

4.2. A conforming system MUST revalidate all documented critical preconditions immediately before action execution, using current state rather than cached or previously evaluated state.

4.3. A conforming system MUST block action execution if any critical precondition fails revalidation, generating a structured rejection that identifies the failed precondition and the discrepancy between the expected and current state.

4.4. A conforming system MUST ensure that revalidation is atomic with execution — no state change can occur between the final revalidation check and the action execution.

4.5. A conforming system MUST log all revalidation failures including: the action attempted, the precondition that failed, the expected value (from decision time), the actual value (at execution time), and the time gap between original evaluation and revalidation.

4.6. A conforming system MUST implement revalidation in infrastructure independent of the agent's reasoning — the agent cannot bypass or skip revalidation through its instructions or outputs.

4.7. A conforming system SHOULD define maximum acceptable staleness thresholds for each precondition type, automatically triggering revalidation when the threshold is exceeded even if the action has not yet reached the execution stage.

4.8. A conforming system SHOULD implement optimistic concurrency control or equivalent mechanisms to detect state changes between decision and execution without requiring exclusive locks that degrade performance.

4.9. A conforming system SHOULD escalate to human review when revalidation detects precondition changes that suggest adversarial manipulation (e.g., rapid state changes timed to exploit the decision-execution gap).

4.10. A conforming system MAY implement predictive precondition monitoring that alerts the agent when preconditions are likely to change before execution, allowing the agent to accelerate or defer the action.

4.11. A conforming system MAY implement speculative revalidation that pre-checks preconditions at multiple points during multi-step workflows, reducing the risk of late-stage failures.

5. Rationale

The time-of-check to time-of-use (TOCTOU) vulnerability is a well-understood class of defect in computer science, but AI agents create new and more severe instances of it. Traditional TOCTOU exploits typically involve race conditions measured in milliseconds within a single system. AI agent TOCTOU vulnerabilities involve gaps of seconds to hours across multiple systems, during which an agent plans, reasons, gathers information, and processes intermediate steps before executing the original action. The longer the gap, the greater the probability that preconditions have changed — through natural state evolution, concurrent operations, or deliberate adversarial manipulation.

AI agents are particularly vulnerable to TOCTOU issues for three reasons. First, agents execute multi-step workflows where early decisions gate later actions. A permission check at step 1, a price evaluation at step 3, and an execution at step 7 create a long pipeline where each precondition was evaluated at a different time. Second, agents operate in dynamic environments where state changes continuously — market prices move, user permissions change, account balances fluctuate, and approval statuses are updated. Third, agents often lack the transaction management sophistication of traditional database systems — they do not naturally hold locks, use optimistic concurrency control, or implement compare-and-swap operations.

The adversarial dimension is particularly concerning. If an attacker knows that an agent validates preconditions at decision time but not at execution time, the attacker can deliberately manipulate state in the gap. This is not a theoretical risk — it is a well-established attack pattern in traditional systems (symlink races, file system TOCTOU attacks), and AI agents extend the attack window from milliseconds to seconds or minutes.

Precondition revalidation must be implemented in infrastructure, not in the agent's reasoning. An agent that "remembers to recheck" preconditions in its reasoning can be manipulated through prompt injection or instruction manipulation to skip the recheck. Infrastructure-layer revalidation — implemented as a pre-execution gate that operates independently of the agent — ensures revalidation cannot be bypassed regardless of the agent's instructions or state.

The atomicity requirement (4.4) is critical. If revalidation and execution are not atomic, a second TOCTOU vulnerability is created between the revalidation check and the execution. The revalidation must be the final gate before execution, with no intervenable gap.

6. Implementation Guidance

Precondition revalidation should be implemented as a pre-execution gate in the same infrastructure layer that enforces AG-001 mandate limits. The gate receives the proposed action, identifies the documented critical preconditions for that action type, evaluates each precondition against current state, and either proceeds with execution (all preconditions valid) or rejects (any precondition fails). The revalidation and execution should occur within a single transaction or equivalent atomic operation.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Financial Services. Precondition revalidation is critical for trading systems where market prices move continuously. Mandate limit checks must use execution-time prices, not decision-time prices. Account balance checks must reflect real-time balances including pending transactions. Regulatory requirements for best execution and order handling rules implicitly require that trade parameters are validated at execution time.

Healthcare. Clinical decision systems must revalidate patient status before executing treatment plans. A medication order generated based on a patient's morning vitals must revalidate those vitals — or more recent ones — before administration if time has elapsed. Patient allergies, current medications, and clinical contraindications can change between order and execution.

Access Management. Agents that provision or modify access rights must revalidate user employment status, authorisation level, and role assignments at provisioning time. Employee terminations, role changes, and access revocations between the authorisation decision and the provisioning action are a well-known access control gap.

Maturity Model

Basic Implementation — The organisation has identified critical preconditions for each agent action type and documented them in precondition manifests. Revalidation is implemented as a software check that queries current state before execution. Revalidation failures are logged and block execution. The revalidation check and execution are implemented as sequential steps in the application layer, with minimal gap but without strict atomicity guarantees. This level addresses the most common TOCTOU scenarios but may be vulnerable to tight race conditions.

Intermediate Implementation — Revalidation is atomic with execution — implemented within database transactions, compare-and-swap operations, or equivalent mechanisms that eliminate the gap between revalidation and execution. All documented preconditions are revalidated, not just primary ones. Staleness thresholds are defined per precondition type, triggering automatic revalidation during long-running workflows. Revalidation infrastructure is independent of the agent runtime — the agent cannot bypass or skip revalidation. Revalidation failure logs include the time gap and state delta between original evaluation and revalidation, enabling analysis of TOCTOU exposure patterns.

Advanced Implementation — All intermediate capabilities plus: adversarial TOCTOU detection identifies patterns consistent with deliberate exploitation (rapid state changes timed to the decision-execution gap, repeated revalidation failures from the same source). Predictive precondition monitoring alerts the agent to likely precondition changes before execution, enabling proactive re-planning. The revalidation infrastructure has been independently penetration-tested for bypass vulnerabilities. Speculative revalidation at intermediate workflow steps catches precondition drift early. The organisation can demonstrate to regulators that the decision-execution gap creates no exploitable TOCTOU vulnerability for any documented action type.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Testing AG-097 compliance validates that precondition revalidation is implemented, effective, atomic, and cannot be bypassed.

Test 8.1: Precondition Change Detection

Test 8.2: Atomicity Under Concurrency

Test 8.3: Agent Cannot Bypass Revalidation

Test 8.4: Staleness Threshold Enforcement

Test 8.5: Complete Precondition Coverage

Test 8.6: Revalidation Failure Logging

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 9 (Risk Management System)Supports compliance
EU AI ActArticle 15 (Accuracy, Robustness, Cybersecurity)Direct requirement
SOXSection 404 (Internal Controls Over Financial Reporting)Direct requirement
FCA SYSC6.1.1R (Systems and Controls)Direct requirement
NIST AI RMFMANAGE 2.2, GOVERN 1.7Supports compliance
ISO 42001Clause 6.1 (Actions to Address Risks), Clause 8.2 (AI Risk Assessment)Supports compliance
DORAArticle 9 (ICT Risk Management Framework)Supports compliance

EU AI Act — Article 9 (Risk Management System)

Article 9 requires identification and mitigation of known and reasonably foreseeable risks. TOCTOU vulnerabilities in AI agent action execution are a known risk class. Precondition revalidation is a risk mitigation measure that addresses this risk. The continuous nature of the risk management system required by Article 9 aligns with runtime precondition revalidation — the control operates continuously, not solely at deployment.

EU AI Act — Article 15 (Accuracy, Robustness, Cybersecurity)

Article 15 requires AI systems to be accurate and robust. An agent that executes actions based on stale preconditions is neither accurate (it acts on outdated information) nor robust (it is vulnerable to state manipulation between decision and execution). Precondition revalidation directly supports accuracy by ensuring actions are based on current state and robustness by eliminating TOCTOU exploitation windows.

SOX — Section 404 (Internal Controls Over Financial Reporting)

For AI agents executing financial transactions, precondition revalidation is a critical internal control. A SOX auditor will assess whether the controls ensure that financial actions are based on current, accurate data. An agent that validates an account balance at decision time and executes a transaction minutes later without rechecking the balance fails the internal control standard. The auditor needs to see that the balance is validated atomically with execution. This is particularly critical for agents that execute trades, process payments, or modify financial records. The control deficiency of acting on stale financial state is potentially material.

FCA SYSC — 6.1.1R (Systems and Controls)

SYSC 6.1.1R requires firms to maintain adequate systems and controls. For trading systems, the FCA expects that controls ensure orders are validated against current market conditions and account states, not stale snapshots. An AI trading agent that validates a trade against a price that has moved 15% since the validation fails the adequacy standard. Best execution requirements under MiFID II further reinforce the need for execution-time validation of trade parameters.

NIST AI RMF — MANAGE 2.2, GOVERN 1.7

MANAGE 2.2 addresses risk mitigation through enforceable controls. GOVERN 1.7 addresses governance processes that are documented and integrated into operational practices. Precondition revalidation is both an enforceable runtime control (MANAGE 2.2) and a documented governance process integrated into the agent's operational pipeline (GOVERN 1.7).

ISO 42001 — Clause 6.1, Clause 8.2

Clause 6.1 requires actions to address risks within the AI management system. Clause 8.2 requires AI risk assessment. TOCTOU vulnerabilities are an AI-specific risk that must be assessed (8.2) and addressed through controls (6.1). Precondition revalidation is the control that addresses this risk.

DORA — Article 9 (ICT Risk Management Framework)

Article 9 requires financial entities to manage ICT risks. TOCTOU vulnerabilities in AI agent systems are ICT risks. Precondition revalidation is an ICT risk management control that ensures the integrity of agent actions under conditions of concurrent state change and adversarial manipulation.

10. Failure Severity

FieldValue
Severity RatingHigh
Blast RadiusPer-action — potentially cascading where actions trigger dependent workflows

Consequence chain: Without precondition revalidation, every agent action based on previously evaluated state carries a TOCTOU risk. The probability of exploitation increases with: the time gap between decision and execution, the volatility of the precondition state, the number of concurrent actors that can modify state, and the attacker's knowledge of the agent's workflow timing. The immediate technical failure is an action executed on stale state — a payment based on an outdated balance, a trade at an outdated price, access provisioned for a terminated employee, or a clinical action based on outdated patient status. The operational consequence depends on the domain: in financial services, it manifests as mandate breaches, unauthorised transactions, or best execution failures; in healthcare, as clinical actions based on outdated patient state; in access management, as privilege escalation or access persistence after revocation. The adversarial dimension amplifies the consequence: if attackers can deliberately exploit the TOCTOU window, the failure becomes a repeatable vulnerability rather than an occasional timing anomaly. The cascading risk is significant — an action executed on stale state may trigger downstream workflows that compound the original error, creating a cascade of incorrect actions based on a single stale precondition.

Cross-references: AG-001 (Operational Boundary Enforcement) provides the mandate limits that should be revalidated at execution time. AG-031 (Code Execution Boundary Enforcement) addresses execution boundaries that precondition revalidation should verify. AG-096 (Tool Output Validation Governance) validates the data that preconditions are evaluated against.

Cite this protocol
AgentGoverning. (2026). AG-097: Action Precondition Revalidation Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-097