Integrations

Integrations

Catalogs, tooling boundaries, and external systems that attach to WitnessOps.

This page defines integrations as governed boundary contracts between WitnessOps execution paths and external systems.

1. Problem this page solves

Without explicit boundary contracts, integration guidance collapses into tool lists and capability claims. That makes it hard to audit which behavior is governed by WitnessOps, which behavior depends on external systems, and what evidence can actually support review.

This page establishes the integration contract model so integration claims stay bounded, testable, and receipt-compatible.

2. Reader outcome

After this page, you should understand:

  • why integrations are treated as boundary contracts, not catalog marketing
  • how integrations attach to governed execution and evidence paths
  • what WitnessOps controls vs what external systems control
  • what proof/evidence compatibility requires for integrations
  • where observed facts stop and inferred conclusions begin

3. Mechanism-first integration model

Integrations attach to existing governed paths. They do not create a parallel execution lane.

Path stageIntegration attachment pointGovernance/evidence effect
Runbook step definitionStep declares the integration contract (inputs, outputs, error shape, allowed scope)Invocation behavior is versioned and reviewable through the runbook contract
Policy and authorization gatesIntegration call is allowed only after normal scope/approval checks passIntegrations inherit governed authorization boundaries
Adapter executionWitnessOps wrapper executes the external call and records structured success/failure stateExecution outcome becomes auditable as step-level evidence
Artifact captureAdapter output is captured as evidence artifacts with stable metadataCaptured artifacts can be linked into receipts for replay and review
Receipt bindingReceipt records hashes, references, and contract identifiers for captured artifactsVerifiers can check integrity and linkage of what was captured

4. Ownership and boundary split (WitnessOps-controlled vs external-controlled behavior)

Boundary areaWitnessOps-controlled behaviorExternal-controlled behavior
Contract and invocation rulesinterface schema, scope constraints, gate ordering, failure-state recordingwhether the remote API/system honors its own semantics
Call transport and identity usagewrapper behavior, configured auth path, retry/timeout policy in runbook contextupstream availability, remote auth backend decisions, remote rate limits
Evidence capture and receipt linkageartifact capture policy, metadata normalization, hash/link recordingtruthfulness/completeness of remote payload contents
Operator-facing interpretationhow results are framed in governed workflows and decisionsreal-world meaning of remote telemetry beyond captured fields

5. Evidence/proof compatibility model for integrations

Integration output is proof-compatible only when all of the following are explicit and captured:

RequirementMinimum auditable signal
Contract identityintegration/runbook step identifier and version in execution metadata
Invocation outcomeexplicit success/failure state with timestamps and error class when failed
Artifact integritystored artifact references with hashes and deterministic paths/IDs
Receipt linkagereceipt fields that bind invocation metadata to captured artifacts
Verification scope statementexplicit note that verification attests capture/integrity, not external truth

If any required signal is missing, treat the integration result as operational input, not as strong proof.

6. Observed vs inferred separation

LayerWhat is observedWhat is inferred
Integration executiongate outcomes, request context metadata, adapter exit state, captured artifactsthat the external system's internal state is correct or complete
Receipt/proof verificationintegrity and linkage of captured artifacts to a governed runthat captured external outputs are globally true outside capture scope
Operational conclusionsdocumented analyst interpretation based on captured signalsattacker intent, full impact, or root cause certainty without additional evidence

7. Trust assumptions and limits

Keep these assumptions explicit:

  • external systems may return incomplete, delayed, or misleading data
  • network path, identity providers, and remote availability are outside WitnessOps control
  • host integrity, key custody, and wrapper correctness remain required trust assumptions
  • evidence and receipts attest what was captured and linked, not that external systems were truthful
  • human review is still required before high-confidence operational claims

For broader trust-boundary context, see Threat Model.

8. Next-page handoff to /docs/integrations/witnessops-catalog

Next, read WitnessOps Catalog for the concrete integration surface inventory and its versioned governance boundaries.