Govern agent writes.Approve.Audit.

Policy gateway for AI agent write actions. Control writes into CRM and ticketing systems, with human approvals and audit-ready signed receipts.

IdentityApprovalAuditSecurity
Relynt dashboard — receipts, policies, and agent activity

The problem

AI agents are powerful.
But power without governance is liability.

Without a gateway, agents write directly to production systems. No policy. No approval. No receipt. No proof.

Unchecked Agent Actions

AI agents execute write operations directly against production systems. No policy evaluation. No human oversight. No audit trail.

88%of AI incidents from uncontrolled writes

Invisible Risk Exposure

High-value transactions, sensitive data modifications, and irreversible actions happen without visibility into what agents are doing.

3.2xrisk increase without write controls

Compliance Blind Spots

When regulators ask for proof of authorization and decision lineage, there's no cryptographic evidence to provide.

67%of orgs fail agent audit readiness

The solution

What Relynt does.

A policy-first gateway that turns agent intent into controlled, auditable actions. Every write is evaluated, authorized, and receipted.

01
IDENTIFY

Agent Identity

Every request is tied to a verifiable agent_id and instance_id. Track which agent instance made each request.

request headers
agent_id: "sales-copilot"
instance: "i-3fa8b"
auth: Bearer rly_sk•••
02
EVALUATE

Policy Evaluation

Versioned policy rules run before every write. Action match, resource patterns, deny fields, thresholds.

policy evaluation
action_match: pass
deny_fields: pass
threshold: $50k > $10k limit
→ decision: pending_approval
03
APPROVE

Slack Approvals

High-risk actions are routed to your Slack channel. Approve or deny with one click.

#approvals
Relynt 2:34 PM
Agent sales-copilot wants to update_deal amount to $50k
Approve
Deny
04
RECEIPT

Signed Receipts

HMAC-SHA256 signed, append-only receipt for every decision. Tamper-evident audit log.

receipt
id: rct_8f3a…e91d
decision: approved
sig: hmac-sha256:9c1f…
append_only: true
05
EXECUTE

Connector Execution

Allowed actions execute via configurable HTTP connector. Response hashes stored on receipts.

connector
POST crm.api/deals/123
status: 200 OK
response_hash: sha256:4b2e…
06
VERIFY

Receipt Verification

Verify any receipt cryptographically. Prove what happened, when, and who approved it.

verification
GET /v1/receipts/rct_8f3a/verify
valid: true

How it works

From request to receipt,
in three steps.

agent.ts

The dashboard

Every action. Visible. Controllable.

Real-time visibility into every agent write, policy decision, and approval across your organization.

Total receipts
1,247+12%
Approval rate
94%+2.1%
Avg latency
23ms-8ms
Active agents
8+3
Search receipts...
All decisionsApprovedDeniedHigh risk
ReceiptAgentActionDecisionTime
rct_8f3a...e91dsales-copilotupdate_dealapproved2m ago
rct_c21b...f4a2support-botclose_ticketallowed5m ago
rct_7e9d...b83cdata-syncmodify_contactdenied8m ago
rct_4f1a...d7e5sales-copilotupdate_dealapproved12m ago
rct_a93f...c2b1ops-agentcreate_recordallowed15m ago
Showing 5 of 1,247 receipts
123...42

FAQ

Common questions.

Everything you need to know about how Relynt governs AI agent write actions.

Relynt is a gateway that controls AI agent write actions. Agents send writes to Relynt instead of calling your CRM, ticketing system, or internal APIs directly. Relynt enforces policy, routes high-risk changes for Slack approval, and records a signed receipt for every attempt.

You add a small call at the point where your agent performs a write. Instead of calling the tool API directly, your agent calls the Relynt gateway with an action, resource, and payload. Relynt returns allow, deny, or pending approval.

No. Relynt is framework-agnostic. It sits at the tool execution boundary and works with any agent or workflow system that can make an HTTP request.

When a request is high risk, Relynt sends an approval message to your configured Slack channel with the details and Approve or Deny buttons. If approved, Relynt executes the write. If denied, the write is blocked and the agent receives the decision.

A signed receipt is an append-only record of an attempted action. It includes the agent and instance, what was attempted, the policy version used, the decision, the approver when relevant, and hashes of the request and response so the record is tamper-evident.

We start with CRM and ticketing write actions because they are high frequency and high impact. The gateway model extends to any internal API or system of record that agents can write to.

Relynt stores policy configuration, approval decisions, and receipts. Receipts can be configured to store hashes only for sensitive fields, so you can prove what happened without storing raw payloads.

If a policy requires approval and Slack is not configured, Relynt blocks the request and returns a clear error. You can still allow low-risk actions that do not require approvals.

Ready to govern your AI agents?

Policy-driven authorization, optional human approval in Slack, and a signed receipt for every decision. Get the gateway your AI agents need.

HMAC-SHA256 signatures|Append-only audit log|Per-tenant isolation