IAM authenticates identities. API gateways route traffic. Track governs the action itself — intercepting every tool call, evaluating it against policy, and cryptographically binding approval to the exact action hash. Before anything runs.
Every layer in the traditional stack was built for a human in the loop on a slow, deliberate path. Autonomous agents chain tool calls at machine speed, across systems, under a single long-lived identity. The old controls don't fail gracefully — they don't apply.
Each has been observed in real agent deployments. None is caught by IAM, API gateways, or SIEM alone. Track stops each at the tool-call boundary, before execution.
DENY. No execution token issued; event hash-chained.
send_email. The destination is syntactically a valid address. Logs confirm the send — minutes later.
REQUIRE_APPROVAL — webhook to ops.
DENY at the delegation stage, before the call reaches the API.
Below: the record for a destructive production query, denied before execution. What you see is the artifact your SIEM consumes and your auditors verify — every field token-bound, the whole event hash-chained to its predecessor.
Every tool call — outbound from your agent, or inbound from an external caller — passes through the same five-stage pipeline before anything executes. Each stage is observable; the full sequence is below.
Every tool call receives one of four outcomes — determined by policy, not inferred from silence. Each decision is traceable, token-bound where applicable, and fails closed.
query_db on a read-only replica within business hours — matches analytics-readonly. Token issued, query runs.write_file with path ../../etc/passwd. Path-traversal inspector fires. Request denied; event hash-chained.send_email to an external domain outside business hours. Ops reviews via webhook. Expires if not acted on within TTL.The enforcement node runs inside your cloud account. Agent payloads, tool parameters, and governance decisions stay in your environment. Nothing is routed through Track infrastructure.
The first call is a 30-minute working session. Pick the track that fits — red-team demo, architecture review, or threat-model walkthrough — and we'll run Track against your actual agent stack.