← Back

Trust by Design

Trust & Security

Trust is enforced by architecture, not assumption.

Trust Is Architectural

Opscotch is designed to execute inside customer-controlled infrastructure without introducing hidden control planes, implicit permissions, or opaque dependencies.

Trust is enforced through explicit execution boundaries, cryptographic verification, deterministic runtime behavior, and locally validated commercial enforcement.

This page outlines the architectural guarantees that make distributed automation safe, verifiable, and governable.

Core Trust Guarantees

Explicit Execution Boundaries

Workflows operate strictly within customer-defined runtime policy.

  • Outbound HTTP hosts must be explicitly declared.
  • Runtime resources must be explicitly granted.
  • No ambient network access exists.
  • No implicit filesystem access exists.
  • No undeclared cross-deployment access is permitted.

If a host or resource is not declared in bootstrap configuration, it cannot be accessed.

There are no hidden backchannels.

No Mandatory Control Plane

Opscotch does not require a vendor-hosted SaaS control layer.

The runtime performs:

  • Artifact validation locally.
  • License validation locally.
  • Trust chain verification locally.

Opscotch can operate:

  • On-prem
  • In private cloud
  • In restricted networks
  • In air-gapped environments

Connectivity requirements are defined by the customer.

Cryptographic Artifact Verification

Workflow artifacts are signed and verified before execution.

  • Artifact signatures are validated locally.
  • Trusted signing keys are explicitly configured.
  • Invalid or untrusted artifacts are rejected.
  • Artifacts are immutable once signed.

Integrity is enforced before activation.

Scoped Trust Domains

Trust can be segmented and version-scoped.

  • Signing authority can be restricted to version ranges.
  • Separate keys can publish separate release streams.
  • Unauthorized version streams are rejected at load time.
  • Trust anchors are configurable per deployment.
  • Trust domains can be isolated per environment.

This enables controlled upgrade paths and blast-radius containment in case of key compromise.

Runtime-Enforced Licensing

Commercial enforcement is inseparable from execution.

  • Licenses are cryptographically validated locally.
  • Signature integrity is verified.
  • Expiry and validity are evaluated deterministically.
  • No mandatory outbound validation is required.

Commercial context travels with the artifact.

Note: Certain licensing categories may require connectivity. This is explicitly communicated before use.

Deterministic and Bounded Execution

Workflows cannot escalate their own privileges.

Execution is constrained by:

  • Explicit customer-side configuration
  • Declared host access
  • Controlled runtime capability surface

Workflows cannot:

  • Discover new network hosts implicitly
  • Access undeclared resources
  • Modify trust anchors
  • Extend runtime capabilities dynamically

There are no external runtime dependencies (no dynamic package resolution, no hidden extensions).

Runtime behavior is deterministic and bounded.

Data Stays Inside Customer Infrastructure

Opscotch executes within customer-defined boundaries.

  • No data passes through vendor infrastructure.
  • No mandatory telemetry is transmitted externally.
  • No automatic data relay to vendor systems occurs.

Any outbound communication must be explicitly declared.

Frequently Asked Questions

What happens if a signing key is compromised?

Deployments are recommended to maintain multiple signing keys.

Signing authority can be scoped to version ranges.

Keys can be rotated without invalidating unrelated release streams.

Trust domains are not global by default, limiting blast radius.

Who ultimately controls execution?

The customer.

Execution boundaries, trust anchors, and deployment targets are defined customer-side.

Opscotch does not assume authority.
It enforces what is configured.