Local-First Agent Containment
Contain Your Agents.
Verify Locally.
The Lemma Firewall sits between your agent and the APIs it calls. Every action is verified locally via signed credentials. Zero server calls per request.
Issue a signed credential from the control plane. The local firewall verifies it in <1ms via Ed25519 signature check. Scope, path, and method containment enforced locally. Taint epoch denies credentials after context poisoning. Revocation propagates in seconds. Kill switch included.
Proof-First Control Plane • Same action. Different trust state. Instant containment.
Checking credentials...
How Lemma.id Works
Connect a runtime, enforce policy on every privileged request, and monitor or stop activity from one control plane.
Connect Runtime
Run one command to register a runtime with Lemma.id and turn on proof-first defaults.
Enforce Per Request
The gateway checks proof, scope, audience, and runtime state before any privileged action runs.
Monitor + Contain
Track decisions live, investigate allow or deny results, and trigger kill switches to stop unsafe behavior immediately.
Proof-Native Authorization
Signed proofs and claim checks authorize sensitive actions, with compatibility paths only where policy allows them.
PPID-Bound Identity
Runtime controls and delegation are tied to pairwise identifiers (PPIDs), so identity stays site-specific instead of globally trackable.
Runtime Policy Defaults
Every connected runtime inherits a policy profile and risk defaults (`low`, `high`, `critical`) with server-side enforcement.
Kill Switch Controls
Revoke or kill runtime access instantly and deterministically in the request path.
Decision Explainability
See why a request was allowed or denied with decision logs, runtime context, and the policy snapshot used at the time.
Local-First + Hosted Control Plane
Keep low-latency local verification where possible while using a hosted control plane for governance, revocation, and runtime operations.
Deploy Runtime Authorization Without Building It Yourself
Ship per-request authorization, runtime monitoring, and kill-switch controls without standing up a separate authz stack.
Proof-first • Site-specific identity • Runtime controls