Skip to content

AI policy suggestions from Ulises#1

Merged
justaugustus merged 7 commits into
justaugustus:ai-policyfrom
UlisesGascon:ulises/policy-ai-suggestions
Apr 28, 2026
Merged

AI policy suggestions from Ulises#1
justaugustus merged 7 commits into
justaugustus:ai-policyfrom
UlisesGascon:ulises/policy-ai-suggestions

Conversation

@justaugustus
Copy link
Copy Markdown
Owner

@justaugustus justaugustus commented Apr 28, 2026

Ulises' review of ossf#605.
cc: @UlisesGascon

…tability gaps

The current rule requires disclosure for any AI use at any point, with
no minimum threshold. This treats AI tool choice as a reviewer-facing
signal, but tool choice is heterogeneous and does not change what
reviewers are evaluating. Under a strict read it also forces disclosure
for comprehension, translation, and grammar polish, which the policy's
own Recommendations section already lists as reasonable uses.

Reframe the disclosure section so AI tool use is treated as part of a
contributor's workflow (comparable to editor, linter, or language
server choice) and not disclosed by default. The contributor remains
fully responsible under the existing Contributor Responsibility
section, with DCO as the formal accountability attestation.

Require disclosure only in the two cases where the standard
accountability assumption breaks down:

  1. AI-autonomous contributions (already defined in the policy).
  2. AI-produced content the contributor has not meaningfully
     reviewed and cannot fully explain.

Update the Rationale to carry the shift, replace the PR template
tool-use declaration with a review attestation, and detach the
"transform or adapt existing code" guidance from "the AI disclosure"
so it stands on its own as a source-attribution concern.
The current Requirements list bans AI-generated commit messages outright
while permitting AI-drafted-then-human-reviewed output everywhere else.
Either the human-reviews-and-owns standard applies throughout, or it
does not. Apply it consistently here. Substantive requirement (commit
messages must explain what and why) is preserved.
Carve-outs should be bounded. "Existing" floats forward as new bots
get approved, so the exception never closes.
Blanket non-acceptance forbids good-faith fixes (typos, broken links,
outdated commands). Maintainer review already provides the consistency
guard the rule is reaching for.
"Stricter" needs a named axis, otherwise rules that tighten one
dimension while loosening another get labeled stricter case by case
with no principled criterion.
"Not accepted by default" implies an override path, but the policy
only gestures at AGENTS.md without naming what makes a permission
valid. Replace the gesture with operational requirements: scoped
actions, named maintainer owner, identifiable agent, revocability.
DCO has 20 years of precedent and tested practice. The AI assurance
analog has neither. Treat the comparison as a working analogy rather
than a settled equivalence so contributors do not assume protections
the AI side has not accumulated.
Copy link
Copy Markdown

@UlisesGascon UlisesGascon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Awesome!

@justaugustus
Copy link
Copy Markdown
Owner Author

These are really great additions, @UlisesGascon!
Thanks again!!

@justaugustus justaugustus merged commit 68e5dfe into justaugustus:ai-policy Apr 28, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants