AI Agent Spending Controls

When AI agents make purchases or transfer funds, spending controls prevent runaway costs. OpenLeash policies can set per-transaction limits, daily spending caps, or vendor-specific thresholds. When an agent attempts a purchase that exceeds the policy limit, the decision escalates to REQUIRE_APPROVAL — the owner is notified and must approve before the action proceeds.

Spending controls work across any payment context: e-commerce purchases, SaaS subscriptions, API usage with metered billing, or cryptocurrency transfers. Policies can combine cost thresholds with trust levels, so a $10 purchase from a known vendor auto-approves while the same amount from an unknown vendor requires confirmation.

MCP Tool Authorization

The Model Context Protocol (MCP) gives AI agents access to external tools — databases, APIs, file systems, and more. But MCP has no built-in governance layer. Any tool the server exposes is available to the agent without restriction.

OpenLeash fills this gap. Running as a sidecar (via OpenClaw integration), it intercepts every MCP tool call and evaluates it against your policies. You can allow read-only database queries while blocking writes, permit API calls to approved domains while denying others, or require human approval for file system operations.

Learn more about how this works in the MCP Authorization concept page.

Human-in-the-Loop Approvals

For high-stakes actions, automated policies are not enough. OpenLeash supports human-in-the-loop approval workflows where agents pause and wait for explicit owner authorization. The owner receives a notification (via the web portal or webhooks), reviews the action details, and approves or denies.

Approval requests include full context: what the agent wants to do, the cost, the counterparty, and why the policy flagged it. Once approved, OpenLeash issues a time-limited approval token that the agent uses to complete the action. Denials are logged and the agent is informed immediately.

Audit & Compliance

Every authorization decision, approval, and key event is recorded in an append-only JSONL audit log. The log captures the full evaluation trace: which policies matched, which conditions were checked, what the decision was, and whether a proof token was issued. This provides a complete, tamper-evident record for compliance and forensic analysis.

For regulated industries — finance, healthcare, government — the audit log satisfies requirements for action traceability and access logging. The log is queryable via the REST API and visible in the admin dashboard.

Multi-Agent Orchestration

When multiple AI agents collaborate on a task, each agent needs its own identity, keys, and policy scope. OpenLeash supports multi-agent setups where each agent registers independently, has its own Ed25519 keypair, and is subject to agent-specific policies.

An orchestrator agent can coordinate work across specialist agents — one for research, one for purchasing, one for communication — while each operates under its own authorization constraints. Policies can target individual agents, groups of agents, or all agents under a specific owner.

Counterparty Verification

When an AI agent interacts with an external service, the service needs to verify that the agent was actually authorized by its owner. OpenLeash proof tokens solve this: the agent presents a PASETO v4.public token that the counterparty verifies offline using the owner's public key.

This is especially valuable for B2B agent interactions, marketplace transactions, and regulatory submissions where the receiving party needs cryptographic proof of authorization. No callback to OpenLeash is required — verification is fully offline and instant.

> Frequently Asked Questions

What is AI agent authorization?

AI agent authorization is the process of evaluating whether an AI agent should be allowed to perform a specific action on behalf of its owner. Unlike traditional access control, it considers the context of the action — cost, risk level, counterparty trust, and more — to produce a decision (allow, deny, require approval, or require step-up authentication).

How does OpenLeash differ from traditional RBAC?

Traditional role-based access control (RBAC) grants broad permissions based on user roles. OpenLeash evaluates each action individually against expressive YAML policies that consider context like cost thresholds, trust levels, time windows, and counterparty reputation. It also issues cryptographic proof tokens that third parties can independently verify.

Does OpenLeash require a database?

No. OpenLeash is local-first and file-based. All state — policies, agents, owners, keys, and audit logs — is stored in a ./data/ directory as YAML and JSONL files. There is no database dependency, no cloud service, and no external network calls required for authorization decisions.

What programming languages are supported?

OpenLeash provides official SDKs for TypeScript, Python, and Go. The server exposes a REST API, so any language that can make HTTP requests can integrate. The SDKs handle Ed25519 request signing and PASETO proof verification.

Is OpenLeash free to use?

Yes. OpenLeash is open source under the Apache-2.0 license. You can use, modify, and distribute it freely. There are no paid tiers, no usage limits, and no telemetry.

Can I use OpenLeash with MCP?

Yes. OpenLeash works as an authorization sidecar for MCP (Model Context Protocol) servers. Through integration with OpenClaw, every MCP tool call passes through OpenLeash for policy evaluation before reaching external services. See the MCP Authorization concept page for details.

How do proof tokens work?

When OpenLeash allows an action, it issues a PASETO v4.public token signed with an Ed25519 key. The token contains claims about the action, agent, and decision. Any counterparty can verify the token offline using the public key — no callback to OpenLeash is required. This provides cryptographic proof that the agent was authorized.