the enforcement layer for AI agents

Phinn sits between your agents and tools (HTTP + MCP), enforcing default-deny, requiring human approvals for risky actions, and generating tamper-evident audit receipts for every call.

Agent
Phinn
Gateway
#
phinn-approvals
Agent requests DELETE
Tools
Receipts

Enterprise-grade enforcement for AI agents

01

Default-deny enforcement

Phinn issues short-lived, capability-scoped tokens per action. No token → no execution.

02

Human approvals where work happens

Slack approvals for deletes, wires, and other risky actions. Policies define approvers. Every decision is recorded with identity.

03

Tamper-evident receipts

Hash-chained, signed receipts for every action. Verify offline with phinnctl verify.

04

SIEM-ready telemetry

Structured events stream to Splunk or Datadog using OTel semantics for full agent visibility.

Deploy anywhere

Same gateway, multiple topologies.

Kubernetes sidecar

Run the gateway beside each agent workload. Route HTTP/MCP calls with minimal config changes.

Cluster gateway

Operate Phinn as a central ingress so agent traffic routes through one enforcement point.

VM in your VPC

Drop it on a VM for non-Kubernetes environments. Same enforcement, simpler stack.

Contact Us