Search papers, labs, and topics across Lattice.
The paper identifies a failure mode in unmasked policy gradient methods where valid actions are suppressed in unvisited states due to gradient propagation from invalid actions in visited states with shared network parameters. They prove an exponential decay bound on the probability of valid actions at unvisited states under softmax policies with shared features, highlighting a trade-off between entropy regularization and sample efficiency. Empirical validation on Craftax, Craftax-Classic, and MiniHack confirms the predicted exponential suppression and shows that feasibility classification can mitigate this issue without oracle masks.
Unmasked policy gradient methods can inadvertently suppress valid actions in unvisited states, creating a hidden exploration bottleneck that masking neatly avoids.
In reinforcement learning environments with state-dependent action validity, action masking consistently outperforms penalty-based handling of invalid actions, yet existing theory only shows that masking preserves the policy gradient theorem. We identify a distinct failure mode of unmasked training: it systematically suppresses valid actions at states the agent has not yet visited. This occurs because gradients pushing down invalid actions at visited states propagate through shared network parameters to unvisited states where those actions are valid. We prove that for softmax policies with shared features, when an action is invalid at visited states but valid at an unvisited state $s^*$, the probability $\pi(a \mid s^*)$ is bounded by exponential decay due to parameter sharing and the zero-sum identity of softmax logits. This bound reveals that entropy regularization trades off between protecting valid actions and sample efficiency, a tradeoff that masking eliminates. We validate empirically that deep networks exhibit the feature alignment condition required for suppression, and experiments on Craftax, Craftax-Classic, and MiniHack confirm the predicted exponential suppression and demonstrate that feasibility classification enables deployment without oracle masks.