- allow → proceed
- challenge → require extra proof (human approval, 2FA, business-hours rule, telemetry threshold, etc.)
- deny → block
What Clawb controls at runtime
- Identity verification: verify signed agent requests (
/v1/verify). - Policy decisioning: evaluate action context and return
allow | challenge | deny(/v1/check). - Bounded credentials: mint short-lived credentials for follow-on provider calls.
- Audit + incident response: query/export evidence and use kill switch controls during incidents.
60-second integration path
- Create and attest an agent passport (
agent_id+ key). - Verify inbound signed requests in your backend service or gateway.
- Call
/v1/checkimmediately before sensitive actions. - Enforce
allow | challenge | denyin code. - Capture trace/audit signals and wire incident controls.
Decision semantics
| Decision | What your service should do |
|---|---|
allow | Execute the action (and enforce any returned constraints). |
challenge | Pause execution and route to an approval/step-up workflow. |
deny | Block execution and return a safe error response. |