Lyna enforces your compliance policies and business rules before agents can execute high-consequence actions.
For regulated industries deploying autonomous agents
Works with your entire stack
Lyna sits at the protocol layer. Any MCP server, API, or internal tool.
Linear“How do we demonstrate we have controls in place?”
“What prevents an agent from exceeding approval limits?”
“Can we enforce separation of duties for autonomous actions?”
Verifiable authorization that audit teams can review, risk teams can configure, and regulators can verify.
Architecture
Your organizational policies apply consistently whether agents use Anthropic, OpenAI, or your internal systems. One authorization layer for all agent actions.
Agent layer
Planning and reasoning
Execution layer
Credentials injected. Action executed.
Every action evaluated. Every decision logged. Every credential scoped.
Every tool call evaluated against your policies before it executes.
Agents hold credentials directly. Every tool call executes immediately with no policy checks. Problems discovered after the fact.
Every tool call evaluated against your organizational policies. Credentials injected only after authorization. Complete decision history for auditors and regulators.
Your agents don't know Lyna exists. No SDK. No rewrites. Agents make the same tool calls they always did. Lyna evaluates requests as they're made.
Works with your existing vault. Lyna integrates with what you already use.
Start in observe mode alongside your existing infrastructure. No changes to your agent code required.
Simple, reliable, and invisible until needed.
The agent proposes a tool call (e.g., stripe.create_charge) based on its reasoning. It does not have the API key to execute this.
The request is caught by the Lyna Control Plane. It is evaluated against your organizational policies: approval thresholds, role-based permissions, business hours, risk limits (the rules your business requires).
Agents receive a filtered list of available tools based on their authorization scope. Lyna doesn’t hide capabilities, it filters them by authorization. This prevents agents from hallucinating tools they can’t access.
Lyna either Blocks, Allows, or Escalates the request. If allowed, Lyna injects the credentials and executes the action server-side.
The result is returned to the agent, and the entire transaction (reasoning, policy decision, and outcome) is logged immutably. Complete decision log for compliance and internal review.
Apply transaction limits, trading controls, and payment approval workflows for critical financial operations.
Use cases
Control claims adjudication and underwriting decisions with traceable approval workflows and authority limits.
Use cases
Govern factory automation and supply chain agents with safety controls and operational boundaries.
Use cases
Prove separation of duties and maintain decision records for SOC 2, SOX, and internal governance requirements.
Use cases
Lyna routes high-risk requests directly to Slack or Teams. Your team sees the full context: payload, risk score, and reasoning. Then approves or denies with one click.
Implemented without slowing agents down.
Approvers see the full JSON payload and agent reasoning.
Permissions stay valid only while the conditions that granted them remain true.
Require multiple approvers for high-risk operations.
Lyna continuously validates conditions while actions are held. If context changes, the approval is automatically invalidated.
Condition-aware, not clock-driven.
Approvals stay open until resolved. Lyna continuously validates the conditions that were true when the action was escalated. A balance drop, a new incident, a revoked agent: any material change automatically invalidates the approval. No countdown timers, no artificial urgency.
export const financePolicy = new Policy({ resource: 'stripe', actions: ['refund.create'], rule: (ctx, action) => { // Escalate refunds over $200 if (action.amount > 200) { return Decision.ESCALATE; } return Decision.ALLOW; } });
Approval required: high value refund
Policy finance.ts triggered escalation.
Trust & governance
Built for organizations that need visibility, control, and traceability when deploying AI agents at scale.
Every authorization decision is logged with full context: what was requested, which policy applied, approval status, and outcome. Export reports for SOC 2, SOX, GDPR, EU AI Act, or internal governance.
Self-host in your AWS, GCP, or Azure VPC with your own security controls, or use our managed infrastructure. SOC 2 Type II certification underway.
Lyna exchanges vault secrets for short-lived tokens. Credentials are injected server-side only after authorization. Lyna never stores secrets (it applies policy, not credential custody).
Pricing
Lyna is a single platform with two operating modes. Observe for visibility, enforce for control. Pricing scales with your agent operations.
Observe
Visibility into every agent action
Enforce
Block, approve, and prove governance
Every agent action is evaluated against your organizational policies, whether you're observing or enforcing. Start in observe mode to inform your governance framework, then enable enforcement when policies are defined. No migration. No re-integration.
Pricing is based on evaluation volume and deployment scope.
Get started
Start in observe mode. See what your agents are doing. Enable enforcement when you're ready.
About Lyna
Product