From agent-capability-standard
Emit a message or event to an external system with policy enforcement and approval gates. Use when publishing messages, calling APIs, sending notifications, or triggering external workflows. REQUIRES EXPLICIT APPROVAL.
npx claudepluginhub synaptiai/synapti-marketplace --plugin agent-capability-standardThis skill is limited to using the following tools:
Send a message, event, or payload to an external destination with full policy enforcement, approval gates, and audit trail. This capability handles external side effects that cannot be undone.
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Generates original PNG/PDF visual art via design philosophy manifestos for posters, graphics, and static designs on user request.
Send a message, event, or payload to an external destination with full policy enforcement, approval gates, and audit trail. This capability handles external side effects that cannot be undone.
CRITICAL: This capability requires explicit user approval before execution.
Success criteria:
Compatible schemas:
schemas/output_schema.yaml| Parameter | Required | Type | Description |
|---|---|---|---|
destination | Yes | string | Target endpoint, queue, API, or address |
message | Yes | object | Payload to send |
protocol | Yes | string | Communication protocol (http, grpc, smtp, amqp, etc.) |
approval_token | Yes | string | Token confirming user approved this send (MANDATORY) |
checkpoint_ref | Yes | string | Reference to checkpoint before send (MANDATORY) |
constraints | No | object | Rate limits, size limits, allowed destinations |
timeout | No | integer | Send timeout in milliseconds |
retry_policy | No | object | Retry configuration on failure |
Verify approval: Confirm explicit user approval exists
approval_token is valid and recentVerify checkpoint: Confirm recovery point exists
checkpoint_ref references valid checkpointValidate destination: Ensure target is permitted
Apply constraints: Enforce policy limits
constrain capability rulesPrepare payload: Format message for transmission
Execute send: Transmit to destination
Verify delivery: Confirm successful transmission
Audit trail: Record complete send operation
Return a structured object:
sent:
destination: string # Where message was sent
payload_type: string # Type of content sent
payload_summary: string # Non-sensitive summary of payload
timestamp: string # ISO timestamp of send
message_id: string | null # Tracking ID if available
delivery:
status: sent | queued | failed # Delivery outcome
confirmation: string | null # Delivery receipt or acknowledgment
retry_count: integer # Number of retry attempts
response_code: integer | null # HTTP status or protocol response
error: string | null # Error message if failed
constraints_applied:
- constraint: string # What constraint was checked
enforced: boolean # Whether it passed
details: string | null # Additional context
approval:
token: string # Approval token used
timestamp: string # When approval was given
scope: string # What was approved
confidence: 0..1 # Confidence in successful delivery
evidence_anchors: ["log:timestamp", "api:response"]
assumptions: [] # Explicit assumptions
| Field | Type | Description |
|---|---|---|
sent | object | Details of what was sent |
delivery | object | Outcome of send operation |
constraints_applied | array | Policy checks performed |
approval | object | Approval gate information |
confidence | number | 0.0-1.0 based on delivery confirmation |
evidence_anchors | array | Logs, responses, confirmations |
assumptions | array | Explicit assumptions (e.g., "network stable") |
Input:
destination: "https://api.partner.com/webhooks/order-updates"
message:
event: "order.completed"
order_id: "ORD-12345"
timestamp: "2024-01-15T10:30:00Z"
customer_notified: true
protocol: "http"
approval_token: "approve-send-2024-01-15-001"
checkpoint_ref: "checkpoint-2024-01-15-001"
constraints:
rate_limit: "100/hour"
allowed_domains: ["api.partner.com"]
Output:
sent:
destination: "https://api.partner.com/webhooks/order-updates"
payload_type: "order.completed event"
payload_summary: "Order completion notification for ORD-12345"
timestamp: "2024-01-15T10:30:15Z"
message_id: "msg-abc123"
delivery:
status: sent
confirmation: "HTTP 200 OK, body: {\"received\": true}"
retry_count: 0
response_code: 200
error: null
constraints_applied:
- constraint: "rate_limit: 100/hour"
enforced: true
details: "Current rate: 45/hour"
- constraint: "allowed_domains"
enforced: true
details: "api.partner.com is in allowlist"
approval:
token: "approve-send-2024-01-15-001"
timestamp: "2024-01-15T10:30:00Z"
scope: "Send order notification to partner API"
confidence: 0.95
evidence_anchors:
- "log:2024-01-15T10:30:15Z:send-success"
- "api:response:200-OK"
assumptions:
- "Partner API is available and processing webhooks"
Evidence pattern: HTTP response code and body confirmation, timestamped log entry.
Input:
destination: "smtp://mail.company.com:587"
message:
to: "user@example.com"
subject: "Action Required: Review pending"
body: "You have 3 items awaiting review..."
protocol: "smtp"
approval_token: "approve-email-2024-01-15-002"
checkpoint_ref: "checkpoint-2024-01-15-002"
timeout: 30000
Output:
sent:
destination: "smtp://mail.company.com:587"
payload_type: "email"
payload_summary: "Email to user@example.com regarding pending review"
timestamp: "2024-01-15T11:00:05Z"
message_id: null
delivery:
status: failed
confirmation: null
retry_count: 3
response_code: null
error: "Connection timeout after 30s - SMTP server unreachable"
constraints_applied:
- constraint: "recipient_validation"
enforced: true
details: "Email format valid"
approval:
token: "approve-email-2024-01-15-002"
timestamp: "2024-01-15T11:00:00Z"
scope: "Send review notification email"
confidence: 0.0
evidence_anchors:
- "log:2024-01-15T11:00:05Z:smtp-timeout"
- "error:connection-refused"
assumptions:
- "SMTP server should be available on port 587"
next_actions:
- "Verify SMTP server status"
- "Check network connectivity"
- "Retry with backup mail server if available"
Verification tools: Read (for logs), Bash (for health checks)
mutation: truerequires_checkpoint: truerequires_approval: truerisk: highCapability-specific rules:
APPROVAL GATE REQUIREMENT: Before any send operation, the user must explicitly approve:
The approval must be captured with a token that is referenced in this operation.
Commonly follows:
constrain - Apply policy limits before sending (REQUIRED)checkpoint - Create recovery point before external send (REQUIRED)plan - Sends are typically part of a larger plantransform - Format data before sendingCommonly precedes:
audit - Record what was sent for complianceverify - Confirm delivery where possiblereceive - May expect response from destinationAnti-patterns:
constrain check (policy bypass)checkpoint (no state recovery)Workflow references:
reference/composition_patterns.md#anti-patterns for send safety rulesreference/composition_patterns.md#digital-twin-sync-loop for send in sync context