The blast radius
One bad plan or one poisoned tool output can open security groups, drop databases, or promote a build to the wrong region. "We will roll back" is an availability story, not a control. You need a deterministic permit on the path to the API that does the damage.
The TrigGuard interlock
Model each dangerous integration as a surface—for example ci.deploy or infra.terraform_apply. The runtime calls TrigGuard before the IaC or cloud client runs. Output is PERMIT, DENY, or SILENCE plus a receipt. Wire this into GitHub Actions and your agents so SILENCE maps to a hard stop, not a silent continue.
- System layout: /architecture (gateways, proxies, local verify).
- Regulatory context for your entity: /compliance (DORA, operational resilience).
NEXT
See the GitHub Actions integration and hello-world middleware path.