Close Menu
    Facebook X (Twitter) Instagram
    • Privacy Policy
    • Terms Of Service
    • Social Media Disclaimer
    • DMCA Compliance
    • Anti-Spam Policy
    Facebook X (Twitter) Instagram
    Bytecore News
    • Home
    • Crypto News
      • Bitcoin
      • Ethereum
      • Altcoins
      • Blockchain
      • DeFi
    • AI News
    • Stock News
    • Learn
      • AI for Beginners
      • AI Tips
      • Make Money with AI
    • Reviews
    • Tools
      • Best AI Tools
      • Crypto Market Cap List
      • Stock Market Overview
      • Market Heatmap
    • Contact
    Bytecore News
    Home»Crypto News»Blockchain»LangChain Splits AI Agents Into Two Security Classes With Fleet Update
    LangChain Launches LangSmith Fleet for Enterprise AI Agent Management
    Blockchain

    LangChain Splits AI Agents Into Two Security Classes With Fleet Update

    March 23, 20263 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    murf




    Darius Baruo
    Mar 23, 2026 18:08

    LangSmith Fleet introduces Assistants and Claws agent types, solving a critical authorization problem for enterprise AI deployments.





    LangChain has formalized two distinct authorization models for AI agents in its LangSmith Fleet platform, addressing what’s become a thorny problem as enterprises deploy autonomous systems that need to access sensitive company data.

    The framework, detailed in a March 23 blog post, splits agents into “Assistants” that inherit end-user permissions and “Claws” that operate with fixed organizational credentials—a distinction that emerged partly from how OpenClaw changed developer expectations around agent identity.

    Why This Matters for Enterprise Adoption

    The authorization question sounds technical but has real consequences. When an AI agent pulls data from Slack or searches your company’s Notion workspace, whose permissions should it use? The wrong answer creates either security holes or useless agents.

    Consider an onboarding bot with access to HR systems. If it uses Alice’s credentials when Alice asks questions, that’s appropriate. But if Bob can query the same bot and accidentally access Alice’s private salary information, you’ve got a compliance nightmare.

    livechat

    LangChain’s solution:

    Assistants authenticate through per-user OAuth. The agent inherits whatever access the invoking user already has—nothing more. Each user’s interactions remain siloed in their own Agent Inbox.

    Claws use a shared service account. Everyone interacting with the agent gets the same fixed permissions, regardless of who they are. This works for team-wide automations where individual identity doesn’t matter.

    The OpenClaw Factor

    The two-model approach reflects how agent usage patterns have evolved. Traditional thinking assumed agents always act “on-behalf-of” a specific user. Then OpenClaw popularized a different model—agents that creators expose to others through channels like email or social media.

    When someone creates an agent and shares it publicly, using the creator’s personal credentials becomes problematic. The agent could access private documents the creator never intended to expose. This pushed developers toward creating dedicated service accounts for their agents, effectively inventing the Claw pattern organically.

    Channel Limitations

    There’s a practical constraint: Assistants currently work only in channels where LangSmith can map external user IDs (like Slack) to LangSmith accounts. Claws face fewer restrictions but require more careful human-in-the-loop guardrails since they’re effectively opening fixed credentials to variable inputs.

    LangChain provided concrete examples from their own deployments. Their onboarding agent runs as an Assistant—it needs to respect individual Notion permissions. Their email agent operates as a Claw with human approval gates for sending messages, since it manages one person’s calendar regardless of who’s emailing.

    What’s Next

    The company flagged user-specific memory as an upcoming feature. Current memory permissions are binary—you either can edit an agent’s memory or you can’t. Future versions will prevent Assistants from leaking information learned from one user’s session into another’s.

    For enterprises evaluating agent platforms, the authorization model matters as much as the underlying AI capabilities. LangSmith Fleet launched March 19 with these identity controls baked in from the start.

    Image source: Shutterstock



    Source link

    notion
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    CryptoExpert
    • Website

    Related Posts

    KelpDAO: rsETH Records $936k Net Outflows One Month Post-Hack – Details

    May 16, 2026

    US Treasury yields surge to new highs as liquidity tightens, pushing Bitcoin back below $82,000 resistance

    May 15, 2026

    Tezos Developers Test quantum-Resistant Blockchain Privacy System

    May 14, 2026

    Moody’s Rates Fidelity’s Ethereum-Based USD Liquidity Fund at Highest Aaa-mf Level

    May 13, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    ledger
    Latest Posts

    Sharplink CEO Points out 3 Catalysts for Ethereum’s Price to Surge Higher

    May 16, 2026

    Meet the Quantum Computing Stock That Could Crush IonQ in 2026

    May 16, 2026

    Bitcoin Treasury Co Strategy Announces $1.5B Convertible Note Buyback

    May 16, 2026

    5 High Income ETFs that Could Pay Your Rent

    May 16, 2026

    Intercom, now called Fin, launches an AI agent whose only job is managing another AI agent

    May 16, 2026
    notion
    LEGAL INFORMATION
    • Privacy Policy
    • Terms Of Service
    • Social Media Disclaimer
    • DMCA Compliance
    • Anti-Spam Policy
    Top Insights

    Trump Adds Coinbase and Bitcoin Stocks to Portfolio

    May 17, 2026

    If You’re Holding XRP, This Pundit Says You Should See This

    May 16, 2026
    frase
    Facebook X (Twitter) Instagram Pinterest
    © 2026 BytecoreNews.com - All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.