Built for people who want to
--safely-skip-permissions
Only required network access. Every outbound connection is observed and controlled.
Only required folders. Mount access is explicit, remembered, and auditable.
Only required secrets. No blanket environment variable passthrough.
Agents can spawn secure workers via API. Each worker inherits at most the agent's policy.
The agent provides built-in application security. LOA enforces the boundaries around it.
Each loa run creates three containers: agent, proxy, and authz. No direct external routes.
GAP is an implementation-neutral protocol for governed agent execution. LOA is one implementation. The protocol is open — build your own.
Worker lifecycle. Spawn requests are signed by the authority and verified before execution. Replay and idempotency built in.
Permission state and activation. Bundles are hashed, activated append-only, and deny always takes precedence over allow.
Append-only audit events with hash chains. Every decision is correlated, every record is tamper-evident.