Agents need app access.
Teams are hearing the same request: "Let my AI use your product." The risk is giving the agent more authority than the task requires.
Arc lets apps safely allow AI agents like Claude, ChatGPT, OpenClaw, Cursor, and custom agents to act on behalf of users without giving them full access.
API keys, shared sessions, and broad OAuth grants were built for software and people. AI agents need a narrower action layer: who is acting, what action they can take, whether the user must approve it, and how to turn it off.
Teams are hearing the same request: "Let my AI use your product." The risk is giving the agent more authority than the task requires.
A user may trust an agent to read orders or draft an email, but not to send, delete, refund, or change account settings without consent.
Agent identity, action permissions, approval screens, audit logs, and revocation become a full security product fast.
Developers define the actions. Users choose what agents can do. Arc enforces allow, ask, or block before the action reaches your app.
Expose safe action names such as read_email, draft_reply, send_email, create_event, or request_return.
actionsEach action can be allowed automatically, require approval, or be blocked for that agent.
allow / ask / blockClaude, ChatGPT, OpenClaw, Cursor, or a custom agent asks Arc to perform one approved app action.
agent requestArc allows safe actions, asks the user for sensitive actions, and blocks actions outside the grant.
policy checkThe app and user can inspect who acted, what happened, when it happened, and which permission allowed it.
audit logArc turns agent access into a table users and developers can reason about. Read operations can be automatic. Sensitive writes can ask. Dangerous actions can be blocked.
| App | Allow | Ask | Block |
|---|---|---|---|
| read_email, draft_reply | send_email | delete_email | |
| Calendar | read_calendar | create_event | delete_event |
| Account and commerce | read_orders | request_return | delete_account |
The user lets an agent help across multiple apps while Arc keeps every action inside a visible permission boundary.
Read and draft are allowed. Send requires approval. Delete is blocked.
Read is allowed. Create event asks. Delete event is blocked.
Read orders is allowed. Return requests ask. Delete account is blocked.
Arc is not an agent framework. You keep your app and APIs. Arc provides the permission system around the actions agents are allowed to request.
import { geostack } from "@geostack/sdk";
const app = geostack.app("Email", {
description: "Scoped email actions for AI agents."
});
app.tool("send_email", sendEmail, {
description: "Send a prepared email reply.",
scope: "email:send",
input: {
to: { type: "string", required: true },
subject: { type: "string", required: true },
body: { type: "string", required: true }
},
annotations: {
readOnlyHint: false,
destructiveHint: false
}
});
export default app;
Arc keeps the long-term vision in view, but V1 stays focused: agent identity, action permissions, approvals, audit logs, and revocation.
Arc treats Claude, ChatGPT, OpenClaw, Cursor, and custom agents as clients requesting scoped actions.
Ask policies turn high-impact actions into explicit user approval moments before the action reaches your app.
Users can revoke an agent grant. Future requests fail until the user reconnects and grants access again.
MCP is supported as an adapter detail where useful. Arc is the auth and control layer around app actions, not a protocol pitch.
Expose the same controlled action surface to the AI clients your users ask for.
Start with a few actions, then expand permissions as users prove what they trust agents to do.
Use MCP where the client expects it. Use Arc policies for the authorization decision that matters.
Arc is auth for AI agents. It lets apps safely allow agents to act for users with action-level permissions, approval flows, audit logs, and revocation.
MCP is a way for clients to connect to tools. Arc controls whether an agent is allowed to perform a specific app action. Arc can use MCP as an adapter, but the product is the permission and enforcement layer.
OAuth grants app access. Arc adds agent-aware action controls: allow, ask, block, audit, and revoke at the action level.
API keys are usually broad, persistent, and hard for users to understand. Agents need limited, revocable permission to perform specific actions.
Define actions, set permission defaults, and give users a control layer they can understand.