Visca
Products/Trust Lifecycle Management

Warrant

Zero-trust access for autonomous actors.

Brokers every access from an autonomous actor to a consequential resource — identity-bound, scoped, time-limited, audited. Long-lived credentials disappear.

What it is

The role Warrant plays.

An actor that needs to call an API, query a database, post to a channel, charge a card, or command a robot requests a Capability Grant from Warrant. Warrant authenticates the requesting Sigil, consults policy, optionally requires human consent, and vends an ephemeral, scoped credential bound to that single Capability Grant. The actor never holds the underlying secret. The actor never sees the network path. Every access is identity-bound, scoped, time-bound, and audited. Prompt injection becomes irrelevant: there is no broad-scope credential to exfiltrate.

The problem

What goes wrong without it.

Production agents today operate with credentials too broad and too long-lived — admin tokens, service accounts with wildcard permissions, database passwords in environment variables. Prompt injection becomes credential exfiltration. A runaway agent becomes a runaway-with-admin-keys agent. A breach of the runtime becomes a breach of every system the actor could touch.

Capabilities

What Warrant does.

Requesting a capability

What Warrant looks like in code.

// The actor never sees a secret. It requests a capability.
const grant = await warrant.request({
  capability: "stripe:refund",
  resource:   "customer:cus_K1g9...",
  constraint: { max_amount_usd: 50 },
  duration:   "30m",
  reason:     "Customer reported duplicate charge",
})

// grant.token is short-lived, scoped, audit-logged on every use.
await stripe.refund(charge.id, { amount: 4500 }, { auth: grant.token })

Open and commercial

Built in the open. Run anywhere.

Warrant is delivered through two surfaces: an open-source reference in Lattice Runtime (MPL 2.0), and a managed, enterprise-grade delivery in Visca Cloud. Features in the open never move behind the paywall.

Open

Lattice Runtime — open foundation

MPL 2.0 · self-hostable · foundation-track governance

  • ·Capability Grant protocol specification
  • ·Reference broker
  • ·Local policy engine
  • ·Common provider integrations
  • ·Consent flow primitives

Commercial

Visca Cloud — managed delivery

Hosted SaaS · self-managed · hybrid · air-gapped

  • ·Hosted multi-tenant Warrant broker
  • ·Enterprise IdP federation for human consent
  • ·Architectural readiness for FedRAMP / HIPAA / SOC 2 (certifications on roadmap)
  • ·Cross-organization access federation
  • ·Premium provider integrations for regulated industries
  • ·Forensic credential-trail analysis

TLM · same pillar

Warrant works with

Across the platform

Composing with the other pillars.

The autonomy economy is shipping

Do autonomy right.

Build, run, and trust autonomous systems on an integrated platform — software, embodied, and hybrid. Open foundation. Enterprise cloud. No license rug-pulls, ever.