1. The agent asks for a scoped action
The agent requests a predefined operation rather than a raw tool surface.
A thin client sends scoped requests to a broker daemon that holds privileged execution boundaries, enforces policy, and records decisions.
OpenScope separates the agent-facing interface from the privileged execution layer. The agent calls a small client surface. The broker daemon validates the request, applies policy, performs the approved action through a protected executor, and records the result.
Every OpenScope request follows a predictable flow.
The agent requests a predefined operation rather than a raw tool surface.
OpenScope checks agent identity, app, action, and parameter-specific allow rules.
Automation approvals, credentials, profiles, or targets stay in the broker boundary.
Allow and deny outcomes are auditable after the fact.
A capability is narrower than a raw tool surface. Instead of generic shell access or raw automation access, the broker exposes named actions whose parameters can participate in policy.
openscope notes list_notes --agent openclaw --folder Work openscope notes read_note --agent openclaw --folder Work --note "Sprint Plan" openscope mail list_messages --agent openclaw --mailbox Inbox --limit 20 --unread true
sudo openscope policy allow --agent my-agent --app notes --action list_notes --folder Work sudo openscope policy allow --agent my-agent --app notes --action read_note --folder Work sudo openscope policy deny --agent my-agent --app notes --action list_notes --folder Private
OpenScope starts with Notes and Mail and extends the same broker model to external systems through HTTP profiles, SSH targets, and YAML-defined custom apps.
Scoped actions for protected local apps instead of raw automation power.
Broker-owned base URLs and auth headers for integrations such as Jira.
Named targets and approved services rather than broad shell access.
YAML-defined actions that preserve the same trust boundary and policy model.
A Jira integration can be split into a broker-owned HTTP profile and a user-defined app manifest. The broker keeps the base URL and authorization header while the manifest defines narrow actions.
On macOS, OpenScope is designed to package a signed runtime so stable Automation approval attaches to the broker, not to the agent. The CLI stays lightweight while the privileged daemon remains the narrow execution boundary.