Give your agents identity and limits. Shield your tools and services from unauthorized access. Every decision signed and verifiable.
No credit card required.
Whether You Deploy Agents or Host What They Access
Your agents represent you. Give them cryptographic identity so every service they touch knows exactly who sent them and what they're authorized to do.
Stop trusting agent requests blindly. Require cryptographic proof of identity and authorization before granting access to anything.
Add trust infrastructure to your agent stack in minutes, not months.
Create your organization on Modus and generate cryptographic credentials for your agents or your services.
Deploying agents? Issue passports with scoped permissions. Hosting services? Create gates that define what’s allowed.
Plug in with the TypeScript or Python SDK. Modus is MCP-native — it works with Claude, GPT, and any MCP-compatible host.
From this point forward, every agent request is verified, every decision is signed, and every action is recorded.
{ "mcpServers": { "modus": { "command": "npx", "args": ["modus-mcp"], "env": { "MODUS_API_KEY": "mod_live_xxxxxxxx" } } }}Cryptographic identity bound to what the agent actually is — model, version, architecture. Not just who operates it. Issue in seconds. Verify in under a millisecond. Delegate with guaranteed attenuation.
Learn more about PassportsPolicy enforcement where it matters — between the agent and the resource. Permission catalogs, spend limits, rate controls, domain allowlists. Credentials pinned to specific catalog versions so terms can’t change without your awareness.
Learn more about GatesDecisions made before damage is done. Spend limits enforced at the gate, not tracked after. Revocation propagated in real time, even mid-execution. Four-decision model: permit, block, suspend, or output-hold.
Learn more about EnforcementHuman oversight from any device. See what your agents are doing in real time. Approve or deny suspended actions from your phone. Panic-stop a rogue agent on a remote server. Guardian mode for child safety. Managerial mode for operational oversight.
Learn more about SupravisionEvery action produces a signed receipt. Every receipt is hash-linked to the last. Both sides hold a copy. Gaps are detectable. Tampering is evident. Export the whole chain for compliance, accounting, or regulatory review.
Learn more about AuditEverything you need to secure agent actions at scale.
Every passport, attestation, and catalog is cryptographically signed with Ed25519. Verify trust without a network call.
Spending caps, rate limits, domain allowlists, approval workflows. 17 built-in constraint evaluators, all enforced automatically.
e.g., cap spending at $50/day, only allow calls to Stripe and GitHub
L1 for development, L2 for production with trusted issuers, L3 for high assurance with proof-of-possession.
e.g., require proof-of-possession for production APIs
Every enforcement decision creates a signed attestation. Sequential numbering prevents gap-filling. Export anytime.
First-class Model Context Protocol support. 22 tools available out of the box.
A governance protocol designed specifically for autonomous AI agents. Not a wrapper around existing standards — a new foundation for execution-grade identity.
Issue passports, configure gates, enforce guardrails, and monitor every agent action — all from one dashboard.

Deep IP. Real infrastructure — not a wrapper.
Provisional patents filed with USPTO
Native protocol integration
Pillars — Identity, Gates, Enforcement, Oversight, Audit
Cryptographically signed — every decision, every receipt
Start free. Scale when you're ready.
For testing and personal projects
For teams running agents in production
For organizations managing many agents and services
No credit card required.
Deploy trust infrastructure in minutes. Free to start. No credit card required.