Capability Reference

Conductor's execution environment provides composable capabilities for page observation, interaction, and data capture with comprehensive validation and audit trails.

Page Observation

Read and extract structured information from web pages without modifying state.

Content Extraction

Extract visible and semantic content from pages including text, structure, links, and metadata. Supports scoped extraction within page regions.

Security Model

Read-only access with configurable scope boundaries

Validations

  • ·Element existence
  • ·Visibility state
  • ·Content stability

Element Queries

Locate elements using stable selectors and return structured metadata including attributes, positions, and relationships.

Security Model

Non-mutating queries with result limiting

Validations

  • ·Selector validity
  • ·Result set bounds
  • ·DOM stability

State Inspection

Read current page state including form values, selections, and dynamic content without triggering observers or events.

Security Model

Passive inspection with no side effects

Validations

  • ·State consistency
  • ·Read isolation
  • ·No event dispatch

Page Interaction

Simulate user interactions with deterministic execution and reversibility.

Element Activation

Trigger interactive elements with precise timing control. Operations wait for stability before execution and validate actionability.

Security Model

Explicit element targeting with interactability validation

Validations

  • ·Element clickability
  • ·Visibility
  • ·Interactivity state
  • ·Event propagation

Text Input

Insert text into form fields and editable regions with control over clearing, appending, and event simulation.

Security Model

Targeted input with explicit field identification

Validations

  • ·Field editability
  • ·Input constraints
  • ·Value persistence

Control Manipulation

Modify form controls including selections, checkboxes, and radio buttons with state validation.

Security Model

Direct state modification with constraint checking

Validations

  • ·Control accessibility
  • ·Valid values
  • ·State consistency

Navigation & Timing

Control page lifecycle, navigation, and execution timing with deterministic waiting primitives.

Navigation Control

Navigate to URLs with configurable load strategies and completion detection. Supports various waiting strategies for page readiness.

Security Model

Same-origin enforcement with configurable cross-origin policies

Validations

  • ·URL validity
  • ·Navigation success
  • ·Final state verification

Synchronization

Wait for page conditions including element presence, visibility, content changes, and network quiescence.

Security Model

Timeout-bounded waiting with explicit conditions

Validations

  • ·Condition satisfaction
  • ·Timeout handling
  • ·State consistency

Viewport Control

Manipulate viewport position and focus to specific elements or coordinates with smooth or instant scrolling.

Security Model

Bounded viewport manipulation

Validations

  • ·Target reachability
  • ·Scroll boundaries
  • ·Position accuracy

Data Capture

Extract and persist structured data, media, and network activity for analysis.

Visual Capture

Capture viewport or element screenshots with configurable quality and full-page support. Returns encoded image data.

Security Model

Viewport-only or element-scoped capture

Validations

  • ·Capture bounds
  • ·Size constraints
  • ·Format validation

Network Observation

Monitor network activity with filtering, timing data, and request/response capture. Supports HAR export.

Security Model

Passive monitoring with no request modification

Validations

  • ·Filter compliance
  • ·Data retention limits
  • ·Privacy boundaries

Structured Extraction

Parse and extract structured data from tables, lists, and semantic HTML into normalized JSON.

Security Model

Read-only parsing with schema validation

Validations

  • ·Structure validity
  • ·Data consistency
  • ·Type safety

Session Artifacts

Persist session-scoped data with versioning, encryption, and export capabilities.

Artifact Creation

Store named artifacts with content type hints, metadata, and automatic versioning. Supports text, JSON, and binary data.

Security Model

Session-scoped with encryption at rest

Validations

  • ·Name uniqueness
  • ·Size limits
  • ·Type consistency

Artifact Retrieval

Query and retrieve artifacts by identifier or metadata filters. Supports versioned access and partial reads.

Security Model

Session isolation with access controls

Validations

  • ·Artifact existence
  • ·Permission checks
  • ·Integrity verification

Export & Archive

Export artifacts individually or as session bundles with manifest and audit trail. Supports compression and signing.

Security Model

Authenticated export with tamper detection

Validations

  • ·Completeness
  • ·Integrity
  • ·Format compliance

Execution Framework

All capabilities operate within a unified execution framework that enforces security boundaries, resource limits, and comprehensive logging.

Explicit Capability Declaration

All operations require explicit capability grants at session start. No dynamic capability escalation. Operations outside granted capabilities fail immediately.

Bounded Execution

Operations include timeout bounds, retry limits, and resource constraints. Execution is interruptible at defined cancellation points.

Validation Pipeline

Each operation passes through pre-execution validation, runtime monitoring, and post-execution verification stages.

Audit Completeness

All operations generate structured audit records including parameters, results, timing, and error context for forensic analysis.

Capability Integration

For guidance on composing capabilities into workflows or understanding security boundaries, review the Architecture overview or consult the Documentation for session configuration patterns.