Developer Platform

Build on Verified Intent.

Control execution before it happens. Every action is evaluated, authorized, and verified before it runs.

authorize.ts
import { Yebo } from '@yebo/sdk';

const yebo = new Yebo({
  apiKey: process.env.YEBO_API_KEY,
  gateway: 'https://gateway.yebo.dev'
});

// 1. Submit an action for authorization
const mandate = await yebo.intent.execute({
  capability: 'payment',
  amount: '5000.00',
  currency: 'USD',
  counterparty: 'vendor_acct_123',
});
// Returns: mandate_id, decision, challenge_url

// 2. After human approves via biometric
const receipt = await yebo.receipt.get(mandate.mandate_id);
// Returns: verifiable authorization record

// 3. Verify the authorization independently
const verification = await yebo.receipt.verify(receipt.receipt_id);
// Returns: { valid: true }

Native SDKs

Built for the modern stack with type-safety first.

TS
TypeScript
v4.2.1
SW
Swift
v2.1.0
RS
Rust
v0.9.8-beta
GO
Go
v1.4.0
PY
Python
v3.1.2

The 7-Stage Authorization Pipeline

Every authorization request passes through all 7 stages. No shortcuts, no bypasses.

💡
INTENT
Agent or user submits an action via API - what they want to do, with what constraints.
📝
MANDATE
Intent is formalized into an immutable mandate - sealed, time-limited, and single-use.
⚖️
POLICY
Enterprise policy engine evaluates the action against your rules, limits, and allowlists.
🔏
BIOMETRIC
If required, human approves via secure biometric verification on their device.
🛡️
SENTINEL
System invariants are verified. If any check fails, execution is blocked.
EXECUTE
Only verified actions reach your systems - routed to the appropriate adapter.
📜
AUDIT
A verifiable, tamper-evident authorization record is generated and stored.

API Overview

Six core endpoints handle every integration. Submit actions, check decisions, approve requests, and retrieve verifiable records.

Request Sandbox Access
POST /intent/execute

Submit an action for authorization. Yebo evaluates the request and returns a mandate with a decision.

POST /preflight

Check if an action would be allowed before submitting. Preview decisions without triggering execution.

POST /verify

Verify that an authorization is valid before execution. Checks policy compliance, expiration, and replay protection.

POST /challenge/:id/approve

Approve a pending action. The user reviews the exact action and authorizes it via secure biometric verification.

GET /authorization-receipt/:id

Retrieve a verifiable authorization record - what was requested, who approved it, what policy applied.

GET /authorization-receipt/:id/bundle

Export a complete authorization record for auditors, compliance teams, or external verification.

The Mandate

Every action is converted into a mandate - the core authorization primitive. A mandate defines the action, the scope, and the governing policy. Mandates are immutable once created, time-limited, and single-use. Any change requires a new mandate.

Immutable

Sealed on creation

Time-limited

Short expiry window

Single-use

Cannot be replayed

Decision Model

Yebo returns one of three outcomes for every action:

ALLOW

Action executes immediately.

REQUIRE APPROVAL

Action pauses until approved.

DENY

Action is blocked and never executes.

Verification

Before execution, Yebo verifies that the action matches the approved mandate, the authorization is valid, the request has not expired, and the request has not been replayed. If any check fails, execution is blocked and a clear reason is returned.

New

Yebo MCP Server

Add Yebo authorization to Claude Desktop, Cursor, or any MCP-compatible AI tool in one line.

Claude Desktop config

~/Library/Application Support/Claude/claude_desktop_config.json
{
  "mcpServers": {
    "yebo": {
      "command": "npx",
      "args": ["-y", "@yebo-auth/mcp-server"],
      "env": { "YEBO_API_KEY": "yk_live_..." }
    }
  }
}

Cursor config (.cursor/mcp.json)

{
  "mcpServers": {
    "yebo": {
      "command": "npx",
      "args": ["-y", "@yebo-auth/mcp-server"],
      "env": { "YEBO_API_KEY": "yk_live_..." }
    }
  }
}
yebo_preflight

Check decision before execution.

yebo_authorize

Request approval.

yebo_verify

Confirm authorization.

yebo_receipt

Retrieve proof of authorization.

New

npx create-yebo

One command to create your Yebo identity and generate your config. Works on Mac, Windows, and Linux.

Terminal
$ npx create-yebo

  ◆  Yebo Authorization Setup

  ◆  Your display name
  │  Alex Johnson
  ◆  Your Yebo handle
  │  @alex
  ◆  Yebo gateway URL
  │  https://gateway.yebo.dev

  ◇  Creating your Yebo identity...

  ◆  Your Yebo Identity
  │  identity_id:  did:yebo:...
  │  handle:       @alex
  │  config:       ~/.config/yebo/config.json

  ◇  Done!

After running npx create-yebo, install the Yebo iOS app and sign in with your handle to bind your device key. Your config is written to ~/.config/yebo/.

Yebo does not replace your systems.

It controls what they are allowed to execute.

If an action cannot be verified, it does not run.

Request Sandbox Access