Integrations

WitnessOps Catalog

How the WitnessOps catalog describes available governed execution capabilities.

The WitnessOps catalog is the governed description layer for executable runbooks. It constrains what can be requested, how capability boundaries are declared, and what evidence contracts must exist before execution is allowed.

1. Problem this page solves

Without a formal catalog boundary, capability claims drift into ad hoc execution and undocumented operator expectations. That breaks review because a verifier cannot tell which behavior was declared, which behavior actually executed, and which evidence requirements were in force.

This page defines the catalog as a governance mechanism so capability scope and evidence expectations stay explicit and testable.

2. Reader outcome

After this page, you should be able to:

  • explain what the WitnessOps catalog governs and what it does not govern
  • identify the minimum contract fields each catalog entry must declare
  • separate catalog description from runtime truth and analyst judgment
  • apply observed-vs-inferred boundaries when reading catalog-backed execution results

3. Mechanism-first catalog model

Treat the catalog as a versioned control contract, not as a feature brochure.

Catalog roleWhat it isWhat it is not
Capability declarationA bounded, versioned runbook entry that can be authorized for executionA promise that execution will always succeed
Governance anchorThe source of declared scope, authority requirements, and evidence expectationsA substitute for policy gates, approvals, or runtime enforcement
Evidence contract pointerA declaration of what artifacts and receipt linkage must exist when the run executesProof that captured artifacts are globally true beyond their capture context

If a capability is not declared in the catalog, it is outside the governed execution lane.

4. What catalog entries must specify

Each entry must specify the following at minimum:

Required fieldMinimum declarationWhy it matters
ScopeAllowed target boundary, action boundary, and disallowed operationsPrevents scope creep and ad hoc execution expansion
AuthorityRequired policy state, approval requirements, and identity/role assumptionsMakes authorization preconditions auditable
Artifacts and evidence expectationsExpected outputs, capture format, and receipt-linkage requirementsDefines what must be present for downstream review and verification
Failure and escalation behaviorFailure classes, stop/continue rules, and escalation pathEnsures failure handling is governed rather than improvised

Entries that omit any of these fields should be treated as incomplete control contracts, not production-ready capability definitions.

5. Ownership boundary

The catalog describes allowed and expected behavior. It does not replace runtime facts.

Boundary areaCatalog responsibilityOutside catalog responsibility
Definition layerDeclares capability contract, version, and required governance metadataProves that a specific execution instance met real-world objectives
Runtime layerProvides the reference contract used to evaluate execution conformanceGuarantees environment stability, remote system truth, or tool correctness
Operational judgmentSupplies bounded terms for interpreting run outcomesDecides final risk significance without human review

Use the catalog to frame review, then use receipts and execution evidence to test what actually happened.

6. Observed vs inferred separation

LayerObservedInferred
Catalog recordDeclared runbook contract, version, and governance fieldsThat every future execution will satisfy intent
Execution evidenceCaptured artifacts, timestamps, receipt references, and status outcomesThat external systems were truthful or complete in all dimensions
Operational conclusionAnalyst statement tied to observed evidence and stated assumptionsBroad certainty claims beyond captured scope

Keep this separation explicit to avoid promoting policy metadata into factual runtime certainty.

7. Trust assumptions and limits

Catalog use depends on bounded assumptions:

  • catalog data is maintained under change control and version integrity
  • runtime enforcement correctly applies the declared catalog contract
  • evidence capture pipelines preserve artifact integrity and linkage
  • external systems and environments may still fail, drift, or misreport
  • human review is required before elevating execution output into high-confidence operational conclusions

A catalog entry can narrow ambiguity, but it cannot remove uncertainty outside captured evidence and governed controls.

8. Next-page handoff to /docs/evidence/execution-chains

Next, read Execution Chains for how receipt-level events are connected into continuity that can be verified as an ordered proof story.