Production deletion
An agent told to clean up or reset state can hit the wrong database if you hand it raw DB or shell access.
Teams want AI agents to help with releases, operations, and internal workflows. The danger is simple: if the agent has the raw shell, raw database access, or the raw publishing path, one mistake can become a catastrophic action. OpenScope prevents that by replacing raw power with narrow, approved actions.
$ agent: deploy the new release
raw path: ssh prod && run release script
risk: skipped checklist, uploaded source bundle
$ agent: fix the production incident
@agent_call: openscope release publish_build --agent claude --build 2026.04.02
Checks: signed artifact | checklist complete | source bundle forbidden
BROKER: Approved only after required release checks passed
A helpful agent can still delete the wrong database, restart the wrong service, or skip a publishing checklist and expose private source code. If the raw privileged path is available, the blast radius is available too.
An agent told to clean up or reset state can hit the wrong database if you hand it raw DB or shell access.
An agent can publish the wrong artifact or leak source if release safety steps live only in prompts or docs.
Agents often do exactly what seems locally useful, not what your broader operational intent required.
When an agent has raw power, mistakes happen at machine speed across sensitive systems.
Instead of giving the agent shell, database credentials, or a direct publishing path, you give it a brokered action like restart_service, publish_build, or refund_payment.
restart_service(service="api") publish_build(build="2026.04.02") refund_payment(charge_id="...")
The broker keeps the key material, enforces the checklist, and exposes only the smaller action surface you meant the agent to use.
Use OpenScope when prompts, checklists, and monitoring are not enough because one wrong action would be too costly.
If the agent can still reach the shell, production database, or release pipeline directly, catastrophic mistakes remain possible. OpenScope replaces that with a narrower action surface.
OpenScope keeps the key, token, database credential, or publishing control inside the broker instead of leaving it reachable through a raw tool path.
Best fit when a single wrong step could create a production, security, or customer-impacting incident.
A broker that translates high-level intents into safe, low-level calls.
If a mistaken delete, publish, refund, or restart would hurt, move that workflow behind brokered actions.
Routing, visibility, review, and broad traffic-plane control still matter.
Brokered actions help when the agent should never receive the raw primitive.
Governance and execution containment solve different trust problems.
The banner handles the external calls to action. The homepage keeps one repo-backed command path handy.
openscope init --force openscope status openscope notes list_notes --agent openclaw --folder Work openscope notes read_note --agent openclaw --folder Work --note "My Note"