Research archiveOpen access

Treasury operations

Agent Treasury Controls, 2026

A category report on how agent products should separate runtime spend policy, treasury approval, custody controls, and owner release.

Published
Updated
AccessFree

Why routine agent spend, wallet custody, finance review, and owner release should be modeled as separate controls rather than one vague approval layer.


As of March 24, 2026, the most common treasury mistake in agent products is not that teams have too little control. It is that they keep putting several different controls behind one label. A runtime spend cap, a custody rule, a finance approval, and a step-up release check are all useful, but they solve different problems. When a product collapses them into one generic “approval” or one generic “policy engine,” the quiet path becomes noisy and the dangerous path becomes unclear.

The operator question is narrower than that. It is not “does the human approve the agent?” It is:

  • what can stay delegated while the budget and destination envelope are still valid
  • what action extends future authority and therefore deserves a finance or treasury checkpoint
  • what action changes custody, settlement rail, or payout direction
  • what action changes public or private scope and therefore deserves fresh owner presence

That split matters because agent treasury work is not one thing. Routine API or tool spend is closer to runtime execution than to treasury governance. A wallet top-up is different because it extends what the system may keep doing later. A cross-rail rebalance changes counterparty and settlement exposure. A payout or refund can be outward-facing and harder to reverse. A policy or private-route expansion is not a money movement at all, but it still changes the treasury risk envelope.

Coinbase CDP wallet guidance, Turnkey’s embedded wallet checklist, and Fireblocks’ platform overview all point toward the same practical conclusion: wallet and custody systems are good at key handling, policy surfaces, and approval boundaries, but they do not replace workflow-level runtime control. Cloudflare’s human-in-the-loop guidance and Cerbos on authorization in workflows make the workflow half explicit: once a run starts, authorization still has to persist through state transitions and pauses. Passage’s step-up documentation and Oracle’s delegate-versus-reassign distinction explain why some actions deserve fresh human presence or a named ownership transfer instead of silent continuation.

The right treasury model is therefore layered:

  • runtime policy for quiet bounded spend
  • custody policy for key use, destinations, and movement constraints
  • finance or treasury approval for authority-extending money actions
  • fresh owner step-up for release or scope expansion

That sounds more complex, but it actually removes confusion. Most low-risk runtime activity can stay delegated. The genuinely important boundaries become easier to see.


The Treasury Action Ladder

The simplest way to explain treasury control is to follow the money movement from quiet runtime behavior to high-ceremony release decisions.

Treasury authority widens as the action moves away from routine runtime spend

The more an action extends future authority, changes custody, or sends value outward, the less it should look like ordinary runtime spending.

1
Routine spend

Keep the agent inside spend caps, capability scope, and destination policy.

runtime policyspend capsallowlists
2
Wallet top-up

Re-open human review before adding fresh balance that can power later actions.

finance approvalcustody policy
3
Rebalance or bridge

Treat cross-rail movement as a treasury event with explicit destinations and operators.

treasury reviewcustody controlsallowlists
4
Payout or refund

Use named accountability for irreversible or outward-facing movement.

finance approvaldestination reviewstep-up
5
Scope release

Treat private-route or policy expansion as governance, not spending.

owner step-updiff reviewrelease approval

That ladder matters because teams often treat “the agent can spend” as the core decision. In practice, the better question is what kind of action is this really? If the action only uses an already-approved budget inside known destinations, runtime policy should dominate. If the action adds money, moves money across rails, or widens the system’s authority, the control should shift toward treasury or owner review.

Which treasury control surface should dominate each action

Routine spend should stay runtime-policy heavy. Refill, rebalance, payout, and scope release shift toward custody, finance approval, and owner step-up.

runtime policycustody policyfinance approvalfresh owner step-up

The chart is useful because it answers a very practical design question: where should the dominant control live? Not every action belongs in the same queue. Not every action belongs in the wallet layer either. The product gets safer and simpler when the quiet path stays quiet and the authority-extending path becomes unmistakable.


Routine Spend Should Stay Delegated

The most common overreaction in treasury design is to turn every spend event into a finance event. That usually happens after a team realizes that “the agent can spend money” sounds scary, so the fix becomes “put every spend behind human review.” The result is predictable: harmless runtime actions pile up in review queues until operators start bypassing the controls or raising caps until the approvals no longer mean much.

Routine spend is the wrong place to concentrate treasury ceremony. If the spend is already inside:

  • an explicit budget
  • a known vendor or destination set
  • a narrow capability scope
  • a valid delegated runtime window

then the right control surface is runtime policy, not fresh finance review.

This is where workflow policy and wallet policy should work together instead of fighting each other. The workflow layer should answer questions like “is this tool still in scope?” and “is this budget envelope still valid?” The wallet or custody layer should answer “is this signer allowed to create this transaction?” and “is this destination or asset class permitted?” Those are complementary checks. For quiet bounded spend, they should resolve automatically.

The operator goal is not zero human involvement forever. It is to avoid wasting human involvement on the wrong action class.


Top-Ups and Rebalances Extend Authority

Top-up and rebalance flows deserve stronger ceremony because they do more than spend existing delegated budget. They change what the system can do next.

A wallet refill is an authority-extending action. It adds fresh balance that can power future requests, retries, or recurring tasks. A bridge or rebalance is also an authority-changing action because it shifts settlement rail, counterparty assumptions, and recovery behavior. These are not just “more spend.” They are changes to the treasury state that future runtime activity will inherit.

That is why custody systems are useful here. Wallet and custody tooling is good at destination policy, approval thresholds, signer boundaries, and explicit movement review. Finance or treasury approval should attach to the movement because this is the point where the organization is deciding to extend economic reach, not merely continue pre-bounded execution.

The practical rule is simple:

  • if the action consumes already approved budget inside known bounds, lean toward runtime policy
  • if the action adds, moves, or widens future economic power, lean toward custody and treasury review

That distinction is what keeps treasury controls from becoming either toothless or unbearable.

Who should own the final decision for each treasury action

Routine spend usually belongs to the product lane. As money movement gets less reversible or more authority-extending, treasury and owner lanes should take over.

product operatortreasury or finance ownersecurity or executive owner

This second chart is less about technology and more about operating model. A lot of treasury confusion is really ownership confusion. When teams are unsure whether a product operator, treasury owner, or executive reviewer should decide, they hide that ambiguity behind generic “approval required” messages. The better answer is to decide that ownership explicitly.


Payouts Need Named Accountability

Payouts and refunds are the clearest place where runtime delegation usually stops being enough. Even when the system can assemble the transfer correctly, the business still needs named accountability around destination, amount, reason, and timing.

This is especially true when the movement is:

  • outward-facing
  • hard to reverse
  • recipient-sensitive
  • legally or financially material

A payout is not just a more important version of routine spend. It is a different category of decision because the organization is authorizing value transfer to an external party. That is why payout paths should surface explicit destination review, allowlist checks, deny reasons, and often a fresh human checkpoint.

The product consequence is that payout UX should not look like “normal runtime, but louder.” It should clearly tell the operator why this action moved into a different ceremony lane.


Scope Release Is Governance, Not Spending

The most dangerous treasury actions are not always the ones that move money immediately. Sometimes the higher-risk action is changing what the agent is allowed to touch next.

Private-route expansion, new payout destinations, wider capability scope, or broader release permissions are governance events. They change the future risk envelope of the system. That is why they deserve diff-aware review and fresh owner presence instead of relying on the same runtime delegation that covered ordinary execution.

Passage’s step-up guidance is the right mental model here: some actions deserve proof that the right person is present right now, even if the broader session is still valid. Release and scope expansion belong in that class.

This is also why treasury and release tooling should not be designed in separate silos. A scope expansion can be more financially meaningful than a small routine spend. If it changes payout reach, private-route access, or signing authority, the release itself is part of treasury control.


Comparison Table

ActionPrimary questionDominant control surfaceCommon mistake
Routine API or tool spendIs the run still inside budget, scope, and allowed destinations?Runtime policy plus spend capsReopening finance review for every harmless bounded action
Wallet top-up or refillShould the system receive fresh balance that extends later authority?Finance approval plus custody policyTreating refills as if they were ordinary runtime spend
Cross-rail rebalance or bridgeShould funds move across rails or custody contexts right now?Custody controls plus treasury reviewLooking only at balance and ignoring settlement or counterparty change
Customer payout or refundIs this outward movement authorized to this destination now?Finance review plus destination policy and step-up when neededTreating payouts as just another tool call
Private-route or policy expansionShould the system gain wider authority or release now?Owner step-up plus diff-aware reviewTreating governance changes as if existing delegation already covered them

That table is the category-level answer most agent teams need. The treasury system should not ask “does a human approve the agent?” It should ask “which control surface belongs to this action?”


Recommendations for Operators

  1. Keep runtime spend boring. If the work is inside caps, scope, and allowed destinations, the system should resolve it through runtime and custody policy instead of fresh human review.
  1. Treat refills as authority extension. A top-up changes what the system may keep doing later, so it deserves finance or treasury review.
  1. Model bridges and rebalances as treasury events. Moving funds across rails changes exposure and recovery assumptions, not just balance location.
  1. Give payouts named owners. Outbound money movement should have clear ownership, explicit deny reasons, and destination checks.
  1. Use fresh owner presence for scope release. New private routes, wider policy envelopes, or outward-facing release should not ride on the same delegated authority used for quiet runtime spend.
  1. Separate control ownership in the product. Product operators, treasury owners, and release owners should see different decision lanes instead of one giant generic approval queue.

Bottom Line

Agent treasury control is not one thing. It is the interaction of runtime policy, custody rules, finance approval, and owner release.

The strongest 2026 operating model is:

  • delegate quiet bounded spend
  • reopen review for refills, rebalances, and payouts
  • use custody policy for movement constraints and signer boundaries
  • reserve fresh owner step-up for scope expansion and release

That model is safer than blanket autonomy and less frustrating than blanket approval. Most importantly, it gives operators a clear answer to the question that actually matters: which human decision belongs to this action, and which control layer should carry it?

History

Recent activity

published

Saved report version

A category report on how agent products should separate runtime spend policy, treasury approval, custody controls, and owner release.

seed8 artifacts

Details

Report details

  • Status: Open access
  • Updated: March 24, 2026
  • Source mix: 7 official, 2 ecosystem
  • Method steps: 4
  • Versions: 1
  • Definition: 0 sections, 3 query runners, 2 prompt runners, and 0 chart goals