Production deletion
An agent told to clean up or reset state can hit the wrong database if you hand it raw DB or shell access.
Use OpenScope to allow only predefined actions.
Your AI agent should not be one bad step away from dropping production or leaking your source code.
$ agent: clear user data for inactive accounts
@agent_call: delete_user_data(account_scope="all", confirmed=false)
Requested scope exceeds allowed action policy
BROKER: Request denied
Action: delete_user_data | Scope: all accounts | Confirmation: missing
Suggested safe action: view_eligible_accounts or delete_user_data(account_scope="single")
A helpful agent can still delete the wrong database, restart the wrong service, or skip a publishing checklist and expose private source code. If the raw privileged path is available, the blast radius is available too.
An agent told to clean up or reset state can hit the wrong database if you hand it raw DB or shell access.
An agent can publish the wrong artifact or leak source if release safety steps live only in prompts or docs.
Agents often do exactly what seems locally useful, not what your broader operational intent required.
When an agent has raw power, mistakes happen at machine speed across sensitive systems.
Instead of giving the agent shell, database credentials, or a direct publishing path, you give it a brokered action like restart_service, publish_build, or refund_payment.
restart_service(service="api") publish_build(build="2026.04.02") refund_payment(charge_id="...")
The broker keeps the key material, enforces the checklist, and exposes only the smaller action surface you meant the agent to use.
Use OpenScope when prompts, checklists, and monitoring are not enough because one wrong action would be too costly.
If the agent can still reach the shell, production database, or release pipeline directly, catastrophic mistakes remain possible. OpenScope replaces that with a narrower action surface.
OpenScope keeps the key, token, database credential, or publishing control inside the broker instead of leaving it reachable through a raw tool path.
Best fit when a single wrong step could create a production, security, or customer-impacting incident.
A broker that converts high-level intents into narrow approved actions.
If a mistaken delete, publish, refund, or restart would hurt, move that workflow behind brokered actions.
Routing, visibility, review, and broad traffic-plane control still matter.
Brokered actions help when the agent should never receive the raw primitive.
Governance and execution containment solve different trust problems.
The banner handles the external calls to action. The homepage keeps one repo-backed command path handy.
openscope init --force openscope status openscope notes list_notes --agent openclaw --folder Work openscope notes read_note --agent openclaw --folder Work --note "My Note"