Change control foragent actions
Built for Platform/SRE teams deploying agents into production.
Every tool call is allow / block / require approval before it can touch prod.
Approve in Slack. Export an evidence trail.
See it work
One tool call, end to end
Tool Call
Policy
Approval
Execute
Receipt
Incoming request
$k8s:deploy
{
"image": "app:v2.4.1",
"namespace": "production"
}
Integrations
Works with your stack
Kubernetes
Terraform
ArgoCD
GitHub Actions
Slack
Terraform Apply
Agentinfra-agentActionterraform applyEnvironmentproduction
Policyrequire-approval (workspace: production)DecisionREVIEW→APPROVED
APPROVED
Receiptsha256:a3f2c9e8d1b7...Approve the exact plan. Apply requires the receipt.
Terraform Block
Agentinfra-agentActionterraform apply -auto-approveEnvironmentproduction
Policyblock-auto-approveDecisionBLOCK
BLOCKED
Reason-auto-approve flag not permitted in productionHow it works
Four stages. Every tool call. Fully auditable.
Security
Built for Platform + Security
SOC 2 Type II
In preparation
Encryption
AES-256 at rest, TLS 1.3 in transit
Audit Trails
Immutable, append-only, exportable
HMAC Receipts
Tamper-evident decision binding
Ready to govern agent actions in prod?
- Slack approvals + Axite inbox
- Receipt bound to exact action
- Evidence timeline export