LOA launches and observes your agents — Claude, Codex, OpenClaw, and more. Based on observations it proposes restrictions. As the ruler of the Land of Agents, you approve.
It used to be your agents are in prison or running loose. Now there's a third option.
Get StartedMost people skip security configuration entirely because it takes weeks. The rest give agents unlimited access and hope for the best.
Agents with full network, filesystem, and secrets access. Every API call, every file write, completely unchecked. One bad prompt away from disaster.
Locked-down agents that can't do anything useful. Weeks spent configuring mounts, egress proxies, grants, and secrets injection. Productivity destroyed.
Agents roam with useful access. LOA observes what they actually do and proposes restrictions based on real behavior — not guesswork. You approve what makes sense.
LOA allows only required network access. Every outbound connection is observed and controlled.
LOA allows an agent to spawn secure workers via API. Each worker inherits at most the agent's policy, typically less.
LOA allows only required folders. Mount access is explicit, remembered, and auditable.
LOA allows only required secrets. No blanket environment variable passthrough.
The agent provides built-in application security. LOA enforces the boundaries around it.
Start observing with sane defaults. LOA runs your agents with safe defaults out of the box.
See what your agents actually do. Every network call, file access, and command is logged.
LOA monitors agent activity and proposes access to add or remove.
Review and approve interactively. One command to stage, activate, and enforce.
Create single agent or multi-agent policies. Share formally verifiable policies in AWS Cedar format.
Your land of agents scales with you.
LOA is not k8s for agents. No multi-region scheduling, no fleet management by infra teams. It's for people launching and tasking agents who want to do this in a controlled, safe way.