OpenLeash
Authorization guardrails for AI agents.
An open-source authorization layer where owners set policies, agents ask before acting, and counterparties can verify the agent was authorized.
Works as a sidecar for OpenClaw. Also works with any agent. Learn more
Welcome! Install OpenLeash below and check out the docs to get started.
Hey, we built this for you. Read the agent integration guide — TL;DR: call POST /v1/authorize before doing anything risky.
› Quickstart
Installs the openleash CLI, local policy engine, audit logger, and proof-token signer. No cloud dependency — everything runs on your machine.
› Next steps
SDK usage
› How AI Agent Authorization Works
Alice's agent purchases headphones from StoreCo's agent. Both sides use OpenLeash to authorize actions and exchange cryptographic proofs.
- Authorization
- Alice → Alice's Agent"Buy headphones from StoreCo"
- Alice's Agent → OpenLeashauthorize(purchase, $85)
- OpenLeash → Alice's AgentALLOW + proof token
- Transaction
- Alice's Agent → StoreCo AgentPurchase request + proof
- StoreCo Agent → OpenLeashverify + authorize(sell)
- OpenLeash → StoreCo AgentALLOW + seller proof
- Confirmation
- StoreCo Agent → Alice's AgentConfirmed + seller proof
- Alice's Agent → AliceDone — proofs attached
Both agents independently authorize through OpenLeash. Cryptographic proof tokens flow with every request, creating a verifiable chain of authorization.
› AI Agent Authorization Use Cases
Purchases with limits
Set spending caps per agent, per vendor, or per time window. Agents cannot exceed policy limits without step-up approval.
Appointment booking
Differentiate trust levels: a haircut booking might auto-approve while a medical appointment requires human confirmation.
Government submissions
Regulated filings and submissions can require step-up authentication, producing auditable proof tokens for compliance.
Communication rules
Enforce allowlists and denylists for API calls, emails, or messages. Agents only reach approved endpoints.
› Features
Define authorization rules in YAML. Expressions, constraints, obligations. No database, no cloud dependency.
Cryptographic tokens bound to specific actions. Verifiable by any counterparty without calling home.
Human-in-the-loop for high-risk actions. Agents request approval, owners approve or deny via the portal.
Admin dashboard and owner portal built in. Manage agents, policies, approvals, and audit logs from the browser.
Track owner identities: contact info, government IDs, company registration. EU-format validation built in.
Append-only JSONL log of every authorization, decision, approval, and key event. Queryable via API.
Test policies against scenarios locally before deploying. See the evaluation trace step by step.
Invite-based onboarding with Ed25519 keys. Owners create invite URLs, agents self-register. Policies can target specific agents or owners.
TypeScript, Python, and Go SDKs. Authorize, sign requests, and verify proofs in your language of choice.
Same input, same output. No probabilistic logic. Policies evaluate to predictable results.
Real-time notifications for authorization events. Get alerts when agents request approval or policies trigger.
Transparent governance proxy for MCP tool calls. Works as a sidecar for OpenClaw and other MCP servers.
Agents propose policies for owner review. Owners approve, reject, or modify before activation.
› Community
OpenLeash is open source under the Apache-2.0 license. We welcome contributions — whether that's reporting issues, improving docs, adding policy templates, or building integrations.