Users, agents, policy, MCP. Four streams — one loom. powerloom weaves your fleet into a governed fabric with hash-chained audit on every pass.
Engineering wants Claude in the SDLC. Marketing wants agents writing copy. Legal has its own quiet three. IT has two options today: block them and slow the company down, or wave them through and inherit the audit failure. Powerloom is the third option — agents in production with the same identity, scope, and audit story you have for every other privileged workload.
Say no — engineering ships anyway with a personal API key. Say yes — there is no record of what was agreed, what the agent can reach, or who approved its access. Either path ends in the same room with the same auditor and the same uncomfortable question.
Every agent has an owner, a scope, and an approval trail. Provisioning is a single command. Permissions inherit from the directory you already run. Every action — every allow, every deny, every tool call — lands in a hash-chained log. The auditor reads it without you in the room.
Describe your org as YAML manifests. Plan the diff against live state. Apply with a single command. Every change lands in the hash-chained audit log. Runs in GitHub Actions, GitLab CI, or any pipeline.
YAML. Multi-document. Version-controlled. One file per resource or one per fleet. Same manifest shape IT already knows from Terraform and Kubernetes.
weave plan reads your manifests, diffs each resource against live state, and prints exactly what will change. Create, update, noop — field by field. Nothing applied yet.
weave apply reconciles in dependency order. Each resource applied independently. Every decision lands in the append-only, SHA-256 hash-chained log. Modify any historical row and every subsequent hash breaks.
Nest agents, groups, and MCP deployments. Inheritance flows down. The tree your admin team already operates.
5 built-in roles, custom roles scoped to OU or org. Deny precedence. Last-admin protection. Simulator before enforcement.
High-impact actions require a second approver. The approval is itself a first-class audit event.
Every tool call, every policy decision, SHA-256 linked. Modify one row and every subsequent hash breaks. SOC 2 ready.
17 templates — Postgres, Slack, GitHub, Jira, S3, more. Per-call policy evaluation before every tool invocation.
Everything is a YAML manifest. Plan, apply, diff. Drift detection. CI/CD native — runs in any pipeline.
Your own VPC, your own KMS key, your own database. No shared compute. AWS, IaC via Terraform.
Hebbian learning. 4-D Kairos validation. Injection-hardened. Every session makes every agent smarter.
41+ versioned builds. 760+ tests. Deployed on AWS. Invite-only beta.