Automic Vault icon Automic Vault

Human approval for agent commands

Approval gates for the commands AI agents actually run

Agent-side prompts are useful, but they live inside the agent. Automic Vault adds approval beneath the agent, at the tool and secret layer where the action happens.

Last updated: May 15, 2026

AI agent approval gates are strongest when they run at the tool layer. Automic Vault shows the sensitive command before execution so approval is tied to the executable, command path, and requested capability.

Automic Vault approval gate console

Wrong layer

If the agent is the control plane, the control can fail with the agent.

Allowlists and model prompts help, but they depend on the same session making the plan. Risky tool use needs a checkpoint below that layer.

Tool layer

Gate the executable

Mediate host tool execution instead of trusting every agent policy setting.

Secret layer

Gate credential use

Inject secrets only when an approved target path receives the named keys.

Package layer

Keep tools stable

Root-owned package roots reduce accidental or malicious tool rewrites.

Human layer

Make the choice concrete

Show the action that will run so approval is about behavior, command path, and blast radius.

Use cases

Gate the moments where the blast radius changes.

Publish

An agent tries npm publish, twine upload, or another release command.

Reveal

An agent tries to print tokens with commands such as gh auth token.

Cloud

An agent tries AWS commands that can inspect, mutate, or delete infrastructure.

Related protections

Approve the action before the blast radius changes.