Documentation
Velocity & Abuse Controls

Velocity & Abuse Controls

Managed Mode reference. You do not configure these policies. They are enforced automatically to limit spam, bulk operations, and abusive velocity.

Trigger example (derived from the managed catalog)

These policies trigger when recipient/velocity signals in context exceed managed thresholds.
Example ActionKind where these policies apply: messaging.broadcast
Common required context fields: message_body, recipient_count, recipient_source
Example threshold shapes used by these policies: {"maxRecipients":50}

Example decision

json
{
  "status": "WARN",
  "decision_id": "dec_...",
  "approval_token": "appr_...",
  "reasons": [
    "Velocity limit exceeded"
  ]
}

Resolution

Apply the remediation guidance (reduce volume, add friction, or route to approval), then re-validate.
SummaryDomainSeverityApplies toThresholdsRemediation
Block spammy bulk outbound messaging and unsolicited broadcasts.abuseBLOCKmessaging.broadcast, messaging.send{"maxRecipients":50}Use opt-in lists only. Add rate limits and require templates/approvals for high-volume sends.
Block outbound messages that contain secrets/credentials or sensitive internal data.messagingBLOCKmessaging.send, messaging.webhookRedact sensitive tokens. Replace with references. Ensure destinations are allowlisted.
Legal & Responsibility Notice
Summary
Informational only
Provided for general guidance. Not legal, compliance, security, or professional advice.
You control implementation
You are responsible for policies, prompts, integrations, workflows, and regulatory requirements.
Liability limitation
To the maximum extent permitted by law, the company disclaims liability for losses arising from use of this documentation or implementations based on it.