Agent-Native · Acceptance-Gated · Cryptographically Signed
The only agent task tracker an auditor will sign off on.
Your compliance team can't accept “the AI did it” as a change log. Planwright gives every agent run a cryptographic audit trail — hash-chained, signed, independently verifiable. Built for teams shipping with Claude Code, Cursor, and Codex under HIPAA, SOC 2, FedRAMP, or FINRA.
Live chain stats
0
audit records signed
0
workspaces verified
The Problem
Your agents ship code.
Your auditor needs a paper trail.
Linear, Jira, and GitHub Issues were built for humans assigning tasks to humans. When Claude Code or Cursor makes a code change, those tools log a status update — not a cryptographic proof that a human reviewed and approved the output. For regulated teams under HIPAA, SOC 2, FedRAMP, or FINRA, a status update isn't evidence. You need an immutable, hash-chained audit record with a human acceptance gate. That's what Planwright is.
The Acceptance Gate
Agents can't mark their own work as done.
The state machine enforces a human review gate before any agent work reaches “done.” This is the change-approval control point your SOC 2 auditor is looking for — and no other agent task tracker enforces it.
Human sets the objective and schedules it for agent pickup.
Agent claims the work, plans, codes, and records diffs via MCP.
Agent requests acceptance. A human reviews the diff, tests, and signs off.
Human approves. The audit record is sealed and hash-chained.
Every lane transition produces a hash-chained, cryptographically signed audit record. The chain is independently verifiable on the public trust page.
Why Planwright
Built different on purpose.
Objectives, Not Tasks
Not stories. Not points. Not sprints. One atomic outcome your agent can claim, execute, and deliver.
MCP Native
Not bolted on. Day-one tool calls. Claude Code, Cursor, Codex, Factory, Amp — all first-class citizens.
SOC 2 Built In
Hash-chained. Ed25519-signed. Every agent decision, every human approval, every lane transition. The audit trail auditors actually want.
The Board
Objectives flow. Agents execute. Humans approve.
Add webhook retry logic
Migrate auth to PKCE flow
Implement Ed25519 audit signing
Add RLS policies for workspaces
SSE transport for MCP server
Database schema v1
How It Works
Five steps. Zero busywork.
Write an objective
Describe the outcome you want. Not the steps. Not the implementation. A clear, atomic objective your agent can own end-to-end.
Your agent claims it via MCP
Claude Code connects to your Planwright board, picks up scheduled objectives, and starts working. No copy-pasting tickets. No context-switching.
Agent plans, executes, requests acceptance
The agent decomposes the objective, writes code, runs tests, and moves it to the acceptance lane. Every step recorded in the audit chain.
You review and sign off
Every acceptance is a cryptographic signature. Not a checkbox. A real approval with your identity bound to it.
Every step hash-chained and signed
Immutable audit trail from objective creation to final merge. SOC 2 evidence that writes itself.
Compliance
The 2026 AICPA Trust Services Criteria changed everything.
SOC 2 now requires immutable audit logs for AI-generated code. Your existing PM tool can't produce them. Planwright ships this as a core primitive — hash-chained, Ed25519-signed, from the first objective to the final merge.
Get Started
One command. Every agent.
No tokens. No config files to hand-edit. Run the install command — your browser opens for GitHub login, and you're connected.
claude mcp add planwright --transport sse https://mcp.planwright.tools/sse
Zero-config. Run this command and your browser opens for GitHub login. The connection is cached for future sessions.
For CI and service accounts that can't open a browser, generate a static token in Settings → MCP Token after signing in. Audit records attribute to the token creator.
Need more detail? Read the full Claude Code setup guide →
Pricing
Start free. Scale when you're ready.
Every plan includes the MCP server, audit chain, and board. Pay for seats and retention depth.
Free
For solo developers trying agent-native planning.
- ✓1 seat
- ✓1 project
- ✓30-day audit retention
- ✓Community support
Team
For small teams shipping with agents every day.
- ✓2–10 seats
- ✓Unlimited projects
- ✓1-year audit retention
- ✓Public trust page
- ✓GitHub App integration
Business
For teams that need compliance out of the box.
- ✓11–50 seats
- ✓Unlimited projects
- ✓3-year audit retention
- ✓Custom domain trust page
- ✓Priority support
- ✓Advanced analytics
Enterprise
For organizations with regulatory requirements.
- ✓51+ seats
- ✓7-year audit retention
- ✓SSO / SAML
- ✓SOC 2 attestation letter
- ✓Dedicated support
- ✓Custom integrations
FAQ