An agent that cannot leak what it cannot hold.
Watch an enterprise travel agent book a hotel in Tokyo, end to end, while never holding a single credential it could lose.
The agent carries its rules with it.
A Smart Verifiable Credential, issued by Acme Corp through Agent Auth, defines what this agent is allowed to do. The policy travels with the request. The constraints on the left are not a UI suggestion. They are cryptographic.
A receipt. Nothing more.
The agent's context window receives a payment id, a booking reference, and a hash linking to the audit entry. No card number. No passport. No PII.
see receipt in the agent panel
Confirmation reaches the user, not the agent.
In parallel, the booking platform emails confirmation to the registered user address. The agent had no email access. The user has the full record.
Task complete.
From the user's perspective, the agent did its job within its authorisation. A booking exists. Sensitive data never entered the agent's context.
What the agent did
- Searched hotels in Shinjuku
- Applied VC constraints (4★, USD 200, non-smoking)
- Selected highest-rated qualifying option
- Built execution request with placeholders
- Received receipt object
What the agent never saw
- Passport number or expiry
- Credit card number, CVV, or expiry
- Payment authorisation token
- User's email address
- Cleartext booking confirmation
next: how did that actually work? →
Inside T3 Network.
Same flow, different vantage point. Here is what happened inside the TEE during the execution request.
The full picture.
Enterprise Claw turns "an agent doing something" into "an agent doing something you can prove, constrain, and audit". Three roles, one trust boundary.
What the agent did
- Applied VC constraints
- Selected hotel and room
- Built execution request
- Used placeholders, not values
What the agent never saw
- Passport details
- Card number, CVV
- Payment authorisation
- User's email
What T3N did inside the TEE
- Verified Smart VC
- Resolved placeholders from Private Storage
- Charged payment via Agent Connect
- Sealed audit entry on Merkle ledger
- Returned receipt to agent
amount: 75600
card: {user.default_card}
passport: {user.passport.*}
status: "succeeded"
id: "pi_3OQzXR7..."