OpenLeash
Authorization guardrails for AI agents.
Your agent asks before doing anything risky. You define what's allowed in YAML. OpenLeash decides — ALLOW, DENY, or escalate to a human. Every approved action gets a cryptographic proof token, verifiable offline by anyone. Local-first, no cloud dependency, Apache-2.0.
Wrap any risky action with one call. Your agent can't overspend, call random APIs, or take irreversible actions without policy approval — and you get human-in-the-loop escalation for free.
Add to your agent →Every agent action is policy-checked, logged, and produces a cryptographic proof token (PASETO v4.public, Ed25519-signed). Append-only audit log. Policies as YAML, version-controlled in your repo.
See use cases →Works as a sidecar for OpenClaw. Also works with any agent. Learn more
See the owner portal in action
Welcome! Install OpenLeash below and check out the docs to get started.
Hey, we built this for you. Read the agent integration guide — TL;DR: call POST /v1/authorize before doing anything risky.
› Quickstart
Installs the openleash CLI, local policy engine, audit logger, and proof-token signer. No cloud dependency — everything runs on your machine.
› Next steps
Add OpenLeash to your agent
Wrap any risky action with one call. Your agent gets a decision and a cryptographic proof token it can attach to the action.
› What you get back
Every approved action returns a PASETO v4.public proof token — Ed25519-signed, offline-verifiable by anyone with the public key. The same decision is written to an append-only audit log scoped per user, organization, and agent.
Decoded proof token
Audit log entry (JSONL)
› How AI Agent Authorization Works
Alice's agent purchases headphones from StoreCo's agent. Both sides use OpenLeash to authorize actions and exchange cryptographic proofs.
- Authorization
- Alice → Alice's Agent"Buy headphones from StoreCo"
- Alice's Agent → OpenLeashauthorize(purchase, $85)
- OpenLeash → Alice's AgentALLOW + proof token
- Transaction
- Alice's Agent → StoreCo AgentPurchase request + proof
- StoreCo Agent → OpenLeashverify + authorize(sell)
- OpenLeash → StoreCo AgentALLOW + seller proof
- Confirmation
- StoreCo Agent → Alice's AgentConfirmed + seller proof
- Alice's Agent → AliceDone — proofs attached
Both agents independently authorize through OpenLeash. Cryptographic proof tokens flow with every request, creating a verifiable chain of authorization.
› AI Agent Authorization Use Cases
Purchases with limits
Set spending caps per agent, per vendor, or per time window. Agents cannot exceed policy limits without step-up approval.
Appointment booking
Differentiate trust levels: a haircut booking might auto-approve while a medical appointment requires human confirmation.
Government submissions
Regulated filings and submissions can require step-up authentication, producing auditable proof tokens for compliance.
Communication rules
Enforce allowlists and denylists for API calls, emails, or messages. Agents only reach approved endpoints.
› How OpenLeash Compares
OpenLeash is opinionated for AI agents. If you're already using a general-purpose policy engine, here's how the boundaries differ — and where each tool wins.
General-purpose policy engine versus AI-agent-specific sidecar with built-in identity, approvals, and proof tokens.
Read comparison →AWS's embedded authorization library versus a sidecar service with cryptographic proof tokens and approval workflows.
Read comparison →Relationship-based access (Zanzibar-style) versus action-level governance for autonomous agents.
Read comparison →› Features
Authorization rules as YAML. Constraints, obligations, schema-validated. No database, no cloud dependency, version-controlled in your repo.
PASETO v4.public, Ed25519-signed. Bound to a specific action and verifiable offline by any counterparty with the public key.
Human-in-the-loop for high-risk actions. Agents request approval; owners approve or deny in the portal. Tokens are single-use and action-scoped.
Every authorization, approval, and policy change in JSONL. Scope filtering by user, organization, or agent.
TypeScript, Python, and Go SDKs at endpoint parity. 13 functions each — authorize, sign, verify, approvals, policy drafts.
Invite-based onboarding with Ed25519 keys. Every request is signed, timestamp-bound, and replay-protected.
Transparent governance proxy for MCP tool calls. Works as a sidecar for OpenClaw and other MCP servers.
Test policies against scenarios locally before deploying. See the evaluation trace step by step.
Server-rendered portal for managing agents, policies, approvals, audit, and organization membership.
Extend with server plugins — custom authentication, storage backends, identity verification, and notification channels.
› Community
OpenLeash is open source under the Apache-2.0 license. We welcome contributions — whether that's reporting issues, improving docs, adding policy templates, or building integrations.