Keycard released an execution-time identity layer for coding agents, issuing short-lived credentials tied to user, agent, runtime, and task. It targets the gap between noisy permission prompts and unsafe skip-permissions workflows.

Keycard says its new system resolves a "four-part identity" for every coding session: user, agent, runtime, and task launch thread. From that, it mints credentials that are "short-lived" and scoped only to the tool call being executed, rather than leaving static API keys in local files or handing an agent broad admin access launch thread. The company’s announcement post positions policy enforcement at execution time, not just at login.
The operational pitch is to separate routine and sensitive actions. Keycard’s product details say routine actions can run autonomously, while higher-risk operations trigger real-time step-up approval. The same keycard run flow is presented as a cross-agent wrapper for Claude Code, Codex, Cursor, ChatGPT, and OpenClaw, and the thread says those policies carry across laptops, sandboxes, and CI.
The launch is targeting a failure mode many teams already recognize: approval spam and over-privileged secrets. Keycard’s problem statement says developers click "Allow" so often that prompts stop functioning as real control, while the thread argues that static keys copied into .env files leave policy and credentials "completely disconnected."
That framing lines up with early practitioner response. In one reaction, Cedric Chee summarized the model as "task-scoped credentials" plus execution-time policy, which he said gets closer to "yolo mode without giving up control." A separate discussion from swyx described identity-based authorization as the key way to move beyond the binary choice between human-in-the-loop for everything and --dangerously-skip-permissions.
Routine actions run autonomously. Sensitive operations trigger real-time step-up approval. One command, keycard run, works across Claude Code, Codex, Cursor, ChatGPT, and OpenClaw. Same policy on laptops, sandboxes, and CI.
Your coding agents inherit your credentials and your permissions. No identity system in the stack can tell the difference between you and the agent acting in your name. Today: Keycard for Coding Agents 🧵
I've been thinking about this problem a lot, so it is good to see a strong team put forward a serious solution. The real unlock for agent security is identity-based access. Give agents task-scoped credentials, enforce policy at execution time, and you finally get something close Show more
Your coding agents inherit your credentials and your permissions. No identity system in the stack can tell the difference between you and the agent acting in your name. Today: Keycard for Coding Agents 🧵