Users, agents, policy, MCP. Four streams — one loom. powerloom weaves your fleet into a governed fabric with hash-chained audit on every pass.
When one team has seven agents and legal has its own quiet three, the question stops being “is the agent behaving” and starts being “who is allowed to deploy an agent here, against which data, with whose credentials, and where is the record.” That is an operations problem.
One IDE. One chat surface. One prompt interface. Fine for a prototype. Insufficient when the legal team has its own quiet three agents and nobody can list them.
Directory-shaped OUs. Role bindings with deny precedence. Hash-chained audit. The shapes your admin team already knows how to reason about — applied to agents.
Describe your org as YAML manifests. Plan the diff against live state. Apply with a single command. Every change lands in the hash-chained audit log. Runs in GitHub Actions, GitLab CI, or any pipeline.
YAML. Multi-document. Version-controlled. One file per resource or one per fleet. Same manifest shape IT already knows from Terraform and Kubernetes.
weave plan reads your manifests, diffs each resource against live state, and prints exactly what will change. Create, update, noop — field by field. Nothing applied yet.
weave apply reconciles in dependency order. Each resource applied independently. Every decision lands in the append-only, SHA-256 hash-chained log. Modify any historical row and every subsequent hash breaks.
Nest agents, groups, and MCP deployments. Inheritance flows down. The tree your admin team already operates.
5 built-in roles, custom roles scoped to OU or org. Deny precedence. Last-admin protection. Simulator before enforcement.
High-impact actions require a second approver. The approval is itself a first-class audit event.
Every tool call, every policy decision, SHA-256 linked. Modify one row and every subsequent hash breaks. SOC 2 ready.
17 templates — Postgres, Slack, GitHub, Jira, S3, more. Per-call policy evaluation before every tool invocation.
Everything is a YAML manifest. Plan, apply, diff. Drift detection. CI/CD native — runs in any pipeline.
Your own VPC, your own KMS key, your own database. No shared compute. AWS, IaC via Terraform.
Hebbian learning. 4-D Kairos validation. Injection-hardened. Every session makes every agent smarter.
41+ versioned builds. 760+ tests. Deployed on AWS. Invite-only beta.