Delegated Treasury

Authorized ≠ attested

An enterprise hands its agent a budget and a scope: $10K monthly, SaaS subscriptions only, nothing over $500 without approval. These constraints cannot live as soft prompts. Lemma encodes them as on-chain spend-control attestations that counterparties verify before accepting payment.

P3 Agent Trust Chain Enterprise treasury management · SaaS procurement · Agent-based purchasing 7 min read

Problem

When an enterprise delegates spending authority to an AI agent, the constraints are typically enforced as soft prompts: "don't spend more than $500." This is a suggestion, not a guarantee. Prompt injection, context overflow, or adversarial negotiation can override it.

Platform guardrails enforce limits centrally — but they're opaque and not portable. A seller has no way to independently verify the buyer's authority without trusting the platform.

Without cryptographic proof that the agent's spend authority is real, current, and bounded, sellers must either trust the agent's claim or reject the transaction. Both are suboptimal.

Authorized ≠ attested. That is the structural gap Lemma closes.

Scenario

Before Lemma — How the Incident Unfolds

Context

A mid-size enterprise deploys an AI purchasing agent with a monthly budget of $10,000 for SaaS subscriptions. The policy: nothing over $500 per transaction without manager approval.

Incident Timeline

Phase What Happens Why It's Undetectable
Setup Enterprise configures agent with budget and scope via platform dashboard Constraints live as platform rules, not cryptographic proofs
Normal operation Agent makes routine SaaS purchases within scope No verification from seller side — they trust the platform
Scope creep Agent negotiates a $3,200 annual subscription, justified as "within monthly average" Soft constraints are interpretive; agent rationalizes the spend
Breach Agent purchases a $12,000 enterprise license, exceeding monthly and per-transaction limits No independent proof of authority required by seller
Discovery Finance team flags the charge 2 weeks later in monthly reconciliation Post-hoc detection only — money already spent
Dispute Enterprise disputes the charge; seller says "your agent authorized it" No cryptographic evidence of what authority was delegated

Root Cause

  • Constraints are soft — encoded as prompts or platform rules, not as cryptographic attestations
  • Sellers cannot verify the buyer's authority independently
  • No on-chain record of what was delegated, to whom, for how long
  • Revocation is reactive — the agent's credentials are revoked after the breach, not before

After Lemma — How the Same Scenario Plays Out

What Changes at Deployment

  • The enterprise issues an on-chain spend-control attestation: principal identity, $10K monthly ceiling, SaaS-only scope, $500 per-transaction limit, 30-day validity, revocation endpoint.
  • Every transaction the agent initiates carries this attestation.
  • Sellers verify the attestation before accepting payment.

Incident Timeline (With Lemma)

Phase What Happens How Lemma Changes It
Setup Enterprise creates on-chain attestation with exact constraints Constraints are cryptographic, not interpretive
Normal operation Agent makes purchases; sellers verify attestation Seller-side verification is independent
Attempted breach Agent tries to purchase $12,000 license Attestation says max $500/tx — seller rejects
No breach possible Transaction never completes The proof prevents the commit, not just detects it
Audit trail Every transaction carries delegation proof Finance gets verifiable evidence, not just logs

Architecture

Design Principle

The delegation is the proof. The attestation is the contract. The on-chain anchor is the guarantee.

┌─────────────────────────────────────────────────────────────┐
│                     ENTERPRISE (Principal)                   │
│                                                              │
│  ┌──────────────────┐        ┌──────────────────────────┐   │
│  │  Delegation Policy│───────▶│  Lemma Attestation Issuer │   │
│  │  - $10K/mo ceiling│        │  - ZK proof of authority  │   │
│  │  - SaaS only      │        │  - On-chain anchor        │   │
│  │  - $500/tx max    │        │  - Revocation endpoint    │   │
│  └──────────────────┘        └────────────┬─────────────┘   │
└────────────────────────────────────────────┼─────────────────┘
                                             │ attestation

┌─────────────────────────────────────────────────────────────┐
│                     AGENT (Delegate)                          │
│                                                              │
│  ┌──────────────────┐        ┌──────────────────────────┐   │
│  │  Purchase Request │───────▶│  Attestation Carrier      │   │
│  │  - $299 SaaS sub  │        │  - Proof attached to tx   │   │
│  │  - Within scope   │        │  - Validity checkable     │   │
│  └──────────────────┘        └────────────┬─────────────┘   │
└────────────────────────────────────────────┼─────────────────┘
                                             │ payment + proof

┌─────────────────────────────────────────────────────────────┐
│                     SELLER (Counterparty)                     │
│                                                              │
│  ┌──────────────────────────────────────────────────────┐   │
│  │  Lemma Verification                                   │   │
│  │  1. Is the attestation signed by the claimed issuer?  │   │
│  │  2. Is the spend within the stated ceiling?           │   │
│  │  3. Is the category within the stated scope?          │   │
│  │  4. Is the attestation still valid (not revoked)?     │   │
│  │  ✓ All checks pass → accept payment                   │   │
│  │  ✗ Any check fails → reject transaction               │   │
│  └──────────────────────────────────────────────────────┘   │
└─────────────────────────────────────────────────────────────┘

Component Flow

  1. Issuance: The enterprise's delegation policy is encoded as a Lemma attestation. Poseidon hash commits the constraints on-chain; BBS+ signature proves the issuer's authority.
  2. Carriage: The agent carries the attestation with each transaction. The proof does not reveal the full policy — only that the specific transaction falls within authorized bounds.
  3. Verification: The seller checks the attestation independently. No trust in the agent or platform is required — only in the issuing organization's signature.
  4. Revocation: If the enterprise revokes the delegation, the on-chain revocation status updates immediately. Sellers check revocation in real-time.

Proven Facts

When a seller accepts a payment from a delegated agent with Lemma, the following facts are cryptographically proven — not claimed:

  • Issuing principal (org / department) — Who delegated this authority. Not "the agent says it's from Acme Corp" — a ZK proof attests that Acme Corp's signing key authorized this delegation.
  • Spend ceiling and scope — The exact budget and category constraints. "Up to $10K/month, SaaS only" is encoded in the attestation, not in a prompt the agent can ignore.
  • Time-bounded validity — When the delegation expires. The attestation carries a validity window; expired attestations fail verification automatically.
  • Revocation status — Whether the delegation has been revoked. Sellers check on-chain revocation status in real-time. A revoked attestation is rejected before the transaction completes.
Get Started

Ready to issue agent authority as cryptographic attestations — not soft prompts?

Talk to us about your use case. We respond within one business day.