Capability Reference
Conductor's execution environment provides composable capabilities for page observation, interaction, and data capture with comprehensive validation and audit trails.
Page Observation
Read and extract structured information from web pages without modifying state.
Content Extraction
Extract visible and semantic content from pages including text, structure, links, and metadata. Supports scoped extraction within page regions.
Security Model
Read-only access with configurable scope boundaries
Validations
- ·Element existence
- ·Visibility state
- ·Content stability
Element Queries
Locate elements using stable selectors and return structured metadata including attributes, positions, and relationships.
Security Model
Non-mutating queries with result limiting
Validations
- ·Selector validity
- ·Result set bounds
- ·DOM stability
State Inspection
Read current page state including form values, selections, and dynamic content without triggering observers or events.
Security Model
Passive inspection with no side effects
Validations
- ·State consistency
- ·Read isolation
- ·No event dispatch
Page Interaction
Simulate user interactions with deterministic execution and reversibility.
Element Activation
Trigger interactive elements with precise timing control. Operations wait for stability before execution and validate actionability.
Security Model
Explicit element targeting with interactability validation
Validations
- ·Element clickability
- ·Visibility
- ·Interactivity state
- ·Event propagation
Text Input
Insert text into form fields and editable regions with control over clearing, appending, and event simulation.
Security Model
Targeted input with explicit field identification
Validations
- ·Field editability
- ·Input constraints
- ·Value persistence
Control Manipulation
Modify form controls including selections, checkboxes, and radio buttons with state validation.
Security Model
Direct state modification with constraint checking
Validations
- ·Control accessibility
- ·Valid values
- ·State consistency
Navigation & Timing
Control page lifecycle, navigation, and execution timing with deterministic waiting primitives.
Navigation Control
Navigate to URLs with configurable load strategies and completion detection. Supports various waiting strategies for page readiness.
Security Model
Same-origin enforcement with configurable cross-origin policies
Validations
- ·URL validity
- ·Navigation success
- ·Final state verification
Synchronization
Wait for page conditions including element presence, visibility, content changes, and network quiescence.
Security Model
Timeout-bounded waiting with explicit conditions
Validations
- ·Condition satisfaction
- ·Timeout handling
- ·State consistency
Viewport Control
Manipulate viewport position and focus to specific elements or coordinates with smooth or instant scrolling.
Security Model
Bounded viewport manipulation
Validations
- ·Target reachability
- ·Scroll boundaries
- ·Position accuracy
Data Capture
Extract and persist structured data, media, and network activity for analysis.
Visual Capture
Capture viewport or element screenshots with configurable quality and full-page support. Returns encoded image data.
Security Model
Viewport-only or element-scoped capture
Validations
- ·Capture bounds
- ·Size constraints
- ·Format validation
Network Observation
Monitor network activity with filtering, timing data, and request/response capture. Supports HAR export.
Security Model
Passive monitoring with no request modification
Validations
- ·Filter compliance
- ·Data retention limits
- ·Privacy boundaries
Structured Extraction
Parse and extract structured data from tables, lists, and semantic HTML into normalized JSON.
Security Model
Read-only parsing with schema validation
Validations
- ·Structure validity
- ·Data consistency
- ·Type safety
Session Artifacts
Persist session-scoped data with versioning, encryption, and export capabilities.
Artifact Creation
Store named artifacts with content type hints, metadata, and automatic versioning. Supports text, JSON, and binary data.
Security Model
Session-scoped with encryption at rest
Validations
- ·Name uniqueness
- ·Size limits
- ·Type consistency
Artifact Retrieval
Query and retrieve artifacts by identifier or metadata filters. Supports versioned access and partial reads.
Security Model
Session isolation with access controls
Validations
- ·Artifact existence
- ·Permission checks
- ·Integrity verification
Export & Archive
Export artifacts individually or as session bundles with manifest and audit trail. Supports compression and signing.
Security Model
Authenticated export with tamper detection
Validations
- ·Completeness
- ·Integrity
- ·Format compliance
Execution Framework
All capabilities operate within a unified execution framework that enforces security boundaries, resource limits, and comprehensive logging.
Explicit Capability Declaration
All operations require explicit capability grants at session start. No dynamic capability escalation. Operations outside granted capabilities fail immediately.
Bounded Execution
Operations include timeout bounds, retry limits, and resource constraints. Execution is interruptible at defined cancellation points.
Validation Pipeline
Each operation passes through pre-execution validation, runtime monitoring, and post-execution verification stages.
Audit Completeness
All operations generate structured audit records including parameters, results, timing, and error context for forensic analysis.
Capability Integration
For guidance on composing capabilities into workflows or understanding security boundaries, review the Architecture overview or consult the Documentation for session configuration patterns.