Version: v1.1.0
Status: Stub (documentation-first). This page defines the integration shape. Implementation may be added later without changing v1.1.0 contracts.
Tool Protocol Integrations
Purpose
This page describes how to integrate TealTiger with Tool Protocol Integrations using a contract-first approach. TealTiger provides deterministic governance outcomes:- Decisions
- Reason codes
- Risk scores
- Audit evidence
- Modes (report-only / monitor / enforce)
Recommended integration model
Primary model: Generic tool boundary wrapper (HTTP/DB/FS/exec) TealTiger provides a flexible integration pattern for governing tool protocol interactions. The integration wraps tool calls at the boundary, evaluating each action against your policies before execution.What TealTiger evaluates (context mapping)
At minimum, provide:- identity - Which agent/user is making the request
- environment - Production, staging, or development
- action intent - What the tool is trying to do (read/write/exec/network)
- tool/model metadata - Tool name, version, and normalized arguments
- correlation identifiers - Trace IDs for linking related actions
Decision mapping
TealTiger returns deterministic decisions that map to tool behavior:- ALLOW → proceed with the tool call
- DENY → block the tool call entirely
- REDACT → remove sensitive data, then proceed
- TRANSFORM → apply deterministic modifications to inputs/outputs
- DEGRADE → reduce capability (e.g., read-only mode)
- REQUIRE_APPROVAL → defer to human approval workflow
Integration example
Common tool protocol patterns
HTTP/REST tools
Govern outbound HTTP requests:- Block requests to sensitive domains
- Enforce rate limits
- Redact sensitive headers
- Track costs per endpoint
Database tools
Govern database operations:- Block writes in production
- Require approval for schema changes
- Redact PII in query results
- Track query costs
Filesystem tools
Govern file operations:- Block access to sensitive directories
- Require approval for deletions
- Redact file contents
- Track storage costs
Shell/exec tools
Govern command execution:- Block dangerous commands (rm -rf, etc.)
- Require approval for all exec
- Redact command outputs
- Track execution costs
Related reading
- /concepts/decision-model
- /policy/reason-codes
- /policy/risk-scores
- /audit/audit-event-schema
- /architecture/enforcement-flow

