ARGOS Logo

Get Human Consent before AI takes |

GHC requires explicit human approval for sensitive operations executed by AI Agents, ensuring security and control.

import { createGHCVerification } from '@argos/hitl';

const verification = await createGHCVerification({

userId: 'user-123',

action: 'transfer_funds',

context: { amount: 5000, recipient: 'John Smith' },

expiresIn: 3600 // 1 hour

});

// Wait for user to click email link

const result = await verification.waitForResult();

Why GHC?

Solve security risks that can occur when AI Agents perform sensitive operations.

Session Hijacking

Malicious attackers can hijack user sessions to send unauthorized requests to AI Agents. GHC prevents this through separate channel authentication.

False Approvals

AI Agents may misinterpret user intent or be manipulated by malicious prompts to perform unauthorized actions. GHC requires explicit approval.

Lack of Audit

Without audit logs for sensitive operations, tracking issues becomes difficult. GHC automatically records all approval requests and results.

How It Works

GHC performs user verification in a simple 3-step process.

1. Create Request

Before performing sensitive operations, Agent creates authentication request including action details and context.

2. User Authentication

User receives authentication link via email or push notification. Email includes operation details and approval button.

3. Process Result

Authentication result is sent to Agent and requested operation is performed only upon approval. All steps are recorded in audit log.

Features

GHC ensures secure, explicit user consent before any AI action takes place.

Explicit Human-in-the-Loop Approval

Every sensitive AI operation requires explicit human consent. No action proceeds without real user intent.

Embeddable in MCP Agent Calls

Directly embed GHC verification into your Agent logic. Call createGHCVerification() wherever sensitive action is triggered.

Real User Authentication via Passkey

Consent flows are secured withr Passkey authentication. Only the verified user can approve or reject sensitive operations.

Expiration & Safety Window

Every consent request expires automatically. If users don’t respond in time, the operation is blocked by design.

Immutable Audit Logging

All consent requests and user responses are logged immutably. Track every action for compliance and debugging.

Free & Open Source SDK

The @argos/hitl SDK is open source and freely available on GitHub and NPM. Get started without friction.

Flexible Plans for Every Stage

From solo builders to enterprise teams — choose your GHC integration path.

Open Source

For individuals

No sign up

  • ✅ SDK, API suported
  • ✅ GHC auth supported
  • 1 MCP → 1 Contact
    Each MCP server can only connect to one contact. conatct owners can unbind in the dashboard.
View on GitHub
Most Popular

Starter

For small teams

Free

  • Includes all Open Source features
  • ✅ Bot Token provided
  • ✅ 5 MAU included
    Monthly Active Users (MAU) = unique users who complete GHC authentication per month.
  • ✅ 1 MCP → Multi Contact
Start Free

Enterprise

Custom at scale

Contact Us

  • ✅ Unlimited usage
  • ✅ Priority support
  • ✅ Custom SLA
Contact Sales

Live Demo

Experience how ARGOS GHC works firsthand.

Frequently Asked Questions

Common questions and answers about ARGOS GHC.

Which actions need GHC?

GHC is recommended for sensitive operations like fund transfers, personal information changes, important setting changes, and account deletion. Generally not needed for non-sensitive operations like data retrieval or simple information provision. Determine application scope according to your service's security policy.

How to integrate authentication in API?

Install ARGOS GHC SDK and connect to API endpoint as middleware. Supports major languages like Node.js, Python, Java, and integration possible in any environment via REST API. Refer to documentation for details.

Does it affect user experience?

While GHC introduces additional authentication step, proper design can provide users with sense of security. Apply only to sensitive operations, not all actions, and optimize authentication UI to minimize friction. Important to clearly explain why this step is necessary to users.

Support authentication methods besides email?

Yes, ARGOS GHC supports authentication through various channels besides email including SMS, push notifications, and messenger bots. Also integrates with advanced authentication methods like TOTP and WebAuthn. Choose based on user preference and security requirements.

Implement GHC Now

Securely manage user approvals for AI Agent's sensitive operations.
Set up in 5 minutes and use immediately.