OPEN PROTOCOL · PRE-ALPHA

Before an AI agent acts,
it should be authorized

Tessera Guard verifies human-delegated permissions for email, payments, shell, and publishing at execution time.

The Roman tessera hospitalis was a token split between two strangers. Reuniting the pieces proved trust across distance.

The missing boundary for agent actions

Agents can already act across tools and services. What is missing is a portable runtime check for who authorized them, what they can do, and whether that authority is still valid.

01

Ambient authority

If an agent has a token or tool handle, it can often act with no further authorization check. That works for demos and fails for real systems.

02

Approval fatigue

Asking the human to approve every step avoids some risk, but it also destroys the utility of autonomy. Delegation needs to be bounded, not constant.

03

Fragmented permission models

Every runtime reinvents authorization differently. There is still no standard execution-time permission layer for agent actions.

Tessera Guard

Tessera Guard blocks sensitive agent actions unless a valid human-delegated credential authorizes them. It verifies scope, expiry, and revocation at execution time.

ACTION

Guarded classes

message.send, payment.intent, exec.shell, and content.publish are the first protected classes.

CHECK

Execution-time verification

Guard evaluates the request at the moment the action executes, not from stale login state or ambient tool access.

DENY

Structured feedback

When an action is blocked, the runtime gets a reason and a suggestion that the agent can surface directly to the user.

// guarded tool invocation
import { createGuard } from '@tessera-protocol/openclaw';

const guard = createGuard({
  credential: process.env.TESSERA_AGENT_CREDENTIAL,
  trustedIssuerKeys: [process.env.TESSERA_ISSUER_PUBLIC_KEY],
  offlineMode: false,
  issuerUrl: 'http://localhost:3001',
});

const result = await guard.check('email.send', {
  recipientCount: 5,
  recipientDomains: ['example.com'],
});

if (!result.allowed) {
  console.error(result.reason);
  console.error(result.suggestion);
  return;
}

// Safe to proceed with the sensitive action.

The protocol underneath Guard

Guard is the product surface. The protocol underneath is intentionally small: human root credential, agent identity, scoped delegation, execution-time verification, and revocation.

01

Human root credential

A human principal obtains a root credential from an issuer. Verifiers do not need civil identity at runtime; they need to know the delegator is valid.

02

Agent identity

Each agent has its own public key and stable identifier. The agent becomes a cryptographic subject rather than a session with ambient access.

03

Scoped delegation

The human signs a delegation covering action classes, limits, expiry, and revocation. No child delegation may exceed the permissions of its parent.

04

Execution-time verification

At runtime, Tessera checks signature integrity, scope match, expiry, revocation, and policy constraints before allowing the action to execute.

OpenClaw first. Cross-runtime next.

OpenClaw is the first wedge because it already exposes sensitive tool calls and gives Tessera a fast product-feedback loop. The long-term direction is broader runtime and gateway infrastructure.

FIRST WEDGE

OpenClaw

Tessera Guard already maps OpenClaw tools to guarded action classes and provides human-legible denials inside the agent conversation.

LONG-TERM

Cross-runtime authorization

The same model extends to MCP servers, gateways, coding agents, workflow runtimes, and API platforms that need execution-time authorization for agent actions.

Build with Guard

Start with the OpenClaw integration today, then carry the same authorization model into the rest of your agent stack.