Permanent keys
Raw credentials keep living in tools, scripts, and machines after the task ends.
Controlled AI access for task-bound workflows
Boundkeys gives people, apps, contractors, and agents controlled AI access with budgets, expiry, audit logs, and provider keys kept safely in the vault.
Task
scope matched support.reply
reserved 100 tokens
provider called through vault
crm.write needs approval
Why this exists
Support systems, document workflows, internal apps, browser assistants, and agent frameworks all need model access. Most teams start by copying provider keys into tools, scripts, and temporary workflows.
Raw credentials keep living in tools, scripts, and machines after the task ends.
Usage is difficult to limit by ticket, contractor, app, user, team, or month.
Model calls and tool actions are hard to inspect when workflows run across systems.
The control layer
Boundkeys combines AUG with a lightweight AI gateway and BYOK or managed models. It turns provider credentials into limited grants that can be issued, enforced, audited, expired, and revoked.
Keep provider API keys out of daily workflows while grants carry runtime limits.
Issue access envelopes for a task, app route, contractor, user, team, or agent run.
Bound usage with exact and reserved meters before provider forwarding starts.
Let access end by time window, lease controls, heartbeat, termination, or policy.
Use provider constraints, model allowlists, tool posture, and scope checks together.
Record issuance, admission, denial, replay, reservation, and finalization decisions.
Example grants
Grant
The support workflow can summarize, draft, and classify inside a ticket-scoped budget. If the budget is exhausted, the provider call is denied before forwarding.
Where it fits
Per-ticket task budgets.
Scoped document-processing grants.
Team budgets and model allowlists.
App grants without raw provider keys.
Tool scopes and approval gates.
Temporary access and revocation.
Monthly usage limits and audit logs.
Task-bound model and tool enforcement.
Trust model
Provider API keys stay in the vault. People, apps, contractors, and agents receive scoped grants with budgets, expiry, model limits, and audit logs.
Why Boundkeys
Start narrow
Boundkeys can begin as a BYOK control layer, managed AI credits, a scenario pack, contractor access, or agent runtime control.
Technical anchors
The public claims above are grounded in the AUG docs and should stay aligned with the implementation before publication.
Controlled AI access