Skip to main content
Autopilot reads your scan, generates a .drako.yaml pre-configured with your real agents and tools, and starts everything in audit mode. Nothing is blocked until you’re ready.

Init commands

drako init                     # autopilot (default) — audit-first
drako init --balanced          # enforcement active with escape hatches
drako init --strict            # maximum governance for enterprise
drako init --manual            # full YAML with all sections
drako init --template fintech  # start from an industry template
All levels start from the same autopilot base. --balanced and --strict apply progressive overrides on top.
drako init automatically runs a scan if no cached results are found, so you don’t need to run drako scan . separately.

What autopilot generates

Autopilot analyzes your scan results and produces a config with sensible defaults for every policy:
PolicyAutopilot default
ODDEach agent locked to its discovered tools, enforcement_mode: audit
DLPmode: audit — logs PII, does not block
Circuit BreakerThreshold 5 failures / 60s window / 30s recovery
HITLActive for write, execute, and payment tools; timeout_action: allow
AuditEnabled, standard (non-cryptographic) logging
FinOpsCost tracking enabled; routing and cache disabled
For agents with no detected tool assignments, autopilot permits all discovered tools. For agents with explicit tool associations, it sets forbidden_tools for everything outside that set. Magnitude limits are computed from your project’s agent count, tool count, and model selection. Projects using expensive models (GPT-4, Claude 3 Opus, o1/o3) receive tighter per-action limits.

Upgrade path

Start in audit mode to observe behavior without blocking anything, then upgrade when you’ve reviewed the logs.
1

Start in autopilot

drako init
Everything logs. Nothing blocks. Review audit logs and tune your permitted_tools lists.
2

Upgrade to balanced

drako upgrade --balanced
Applies these changes to your existing .drako.yaml:
PolicyChange
DLPauditenforce (blocks critical PII)
ODDauditenforce (blocks unauthorized tools)
HITLtimeout_action: allowreject (no-response = block)
3

Upgrade to strict

drako upgrade --strict
Applies these additional changes:
PolicyChange
HITLmodeenforce + timeout_action: reject
Intent verificationmodeenforce + anti_replay: true
Auditcryptographic: true + retention_days: 90
Magnitudeenforcement_modeenforce
Run drako status after upgrading to verify your configuration is valid and in sync with the platform.

Governance levels

LevelODDDLPHITL timeoutIntent verificationCryptographic audit
autopilotauditauditallowoffno
balancedenforceenforcerejectoffno
strictenforceenforcerejectenforceyes
customyou decideyou decideyou decideyou decideyou decide
custom disables the managed upgrade path entirely. Use it when you need full control over every field and don’t want Drako’s upgrade commands to touch your config.

Manual mode

If you prefer to write the config by hand, --manual generates a full YAML with all sections, most commented out:
drako init --manual
This produces a governance_level: custom config with every policy section included as comments, ready for you to uncomment and fill in. Use this as a starting point when the autopilot defaults don’t match your project structure.

Build docs developers (and LLMs) love