Actions, not full sessions.
Agents request named app actions. Arc rejects anything outside the user grant.
Arc is designed for teams that want agents to help users without granting broad sessions, raw API keys, or invisible permissions.
A human account can do many things. An agent grant should only allow the actions a user selected, with extra approval for sensitive work.
Agents request named app actions. Arc rejects anything outside the user grant.
Sending, creating, refunding, or changing state can require a user decision before execution.
Revoking a grant blocks future agent requests immediately.
Arc is not a replacement for your application security program. It reduces the specific risk of AI agents receiving too much authority.
Arc uses plain language around agent access so security does not live only in developer docs.
| Control | What it does | Why it matters |
|---|---|---|
| Agent identity | Records which agent client requested the action. | Teams can separate Claude, ChatGPT, Cursor, and custom agents in logs. |
| Action policy | Maps each app action to allow, ask, or block. | Users grant the task, not the whole account. |
| Approval request | Pauses ask actions for user confirmation. | External side effects stay under human control. |
| Audit log | Stores request, decision, result, and timestamp. | Product and security teams can review agent behavior. |
| Revocation | Turns off future requests for a grant. | Users can stop access when trust changes. |
Arc is designed to avoid giving agents raw user credentials. The app keeps its own user and API security model while Arc stores the grant and policy information needed to enforce agent actions.
Yes. Revocation is a core part of the product loop. After revocation, future agent requests for that grant are blocked.
No. Arc is for controlled app actions through defined APIs and adapters. It is not a browser automation product.
Start with explicit actions and clear permission defaults.