Gate the executable
Mediate host tool execution instead of trusting every agent policy setting.
Human approval for agent commands
Agent-side prompts are useful, but they live inside the agent. Automic Vault adds approval beneath the agent, at the tool and secret layer where the action happens.
Last updated: May 15, 2026
AI agent approval gates are strongest when they run at the tool layer. Automic Vault shows the sensitive command before execution so approval is tied to the executable, command path, and requested capability.
Wrong layer
Allowlists and model prompts help, but they depend on the same session making the plan. Risky tool use needs a checkpoint below that layer.
Mediate host tool execution instead of trusting every agent policy setting.
Inject secrets only when an approved target path receives the named keys.
Root-owned package roots reduce accidental or malicious tool rewrites.
Show the action that will run so approval is about behavior, command path, and blast radius.
Use cases
An agent tries npm publish, twine upload, or another release command.
An agent tries to print tokens with commands such as gh auth token.
An agent tries AWS commands that can inspect, mutate, or delete infrastructure.
Related protections