Integrations

WitnessOps Catalog

How the WitnessOps catalog describes available governed execution capabilities.

The WitnessOps catalog is the authoritative list of governed execution capabilities available to operators. Each entry is a runbook -- a versioned workflow definition that the execution engine can validate, run, and produce evidence for. If a capability is not in the catalog, the engine cannot execute it.

What the catalog controls

The catalog enforces three constraints:

  1. Available capabilities are explicit. Operators can only request runbooks that exist in the catalog. There is no ad-hoc execution path.
  2. Each runbook declares its category and scope. The engine uses this metadata to apply the correct policy gates, tool wrappers, and evidence capture rules.
  3. Versioning is pinned. Each runbook has a version number. Receipts record which version was executed. Changes to a runbook produce a new version, not an in-place mutation.

Listing the catalog

Operators view the catalog with:

bash automation/helpers/runbook-list.sh

Output format:

ID                       VERSION  CATEGORY        SUMMARY
attack-surface-discovery 2        recon           External attack surface discovery
initial-external-recon   2        recon           Quick external recon workflow
web-recon                2        recon           Scoped web reconnaissance workflow
tls-review               2        recon           TLS configuration review
web-content-discovery    2        recon           Web content and directory discovery
ad-enumeration           2        enumeration     Active Directory enumeration
smb-share-enum           2        enumeration     SMB share enumeration
linux-basic-enum         2        enumeration     Linux host basic enumeration
web-exploitation         2        exploitation    Web exploitation workflow
campaign-orchestrator    2        orchestration   Multi-phase campaign orchestration

Runbook coverage by threat phase

The catalog maps to the WitnessOps threat operations lifecycle. Current coverage:

Threat phaseRunbooksCategory
Target discoveryattack-surface-discovery, initial-external-reconrecon
Reconnaissanceweb-recon, tls-review, web-content-discoveryrecon
Enumerationad-enumeration, smb-share-enum, linux-basic-enumenumeration
Vulnerability identificationtls-review, web-exploitationrecon / exploitation
Exploitationweb-exploitationexploitation
Campaign orchestrationcampaign-orchestratororchestration

Phases not yet covered by dedicated runbooks: post-exploitation, privilege escalation, lateral movement, and impact validation. These phases are planned but do not have first-class catalog entries today.

Runbook detail

Recon category

attack-surface-discovery (v2) -- Identifies reachable targets and external infrastructure. Runs DNS discovery, subdomain enumeration, and HTTP probing. Produces asset inventories under recon/.

initial-external-recon (v2) -- Quick external reconnaissance combining port scanning, service fingerprinting, and basic enumeration. Designed as the standard first runbook for new engagements.

web-recon (v2) -- Scoped web reconnaissance including port scanning, technology detection, content discovery, and vulnerability scanning. Produces structured scan output and a runbook summary.

tls-review (v2) -- Evaluates TLS configuration, certificate validity, cipher suites, and known TLS weaknesses. Produces TLS-specific scan artifacts.

web-content-discovery (v2) -- Directory and file discovery against web targets using wordlist-driven fuzzing. Captures discovered paths and response codes.

Enumeration category

ad-enumeration (v2) -- Active Directory enumeration for domain-joined environments. Covers user, group, GPO, and trust enumeration.

smb-share-enum (v2) -- SMB share discovery and access-level enumeration. Identifies readable and writable shares.

linux-basic-enum (v2) -- Basic Linux host enumeration including users, services, network configuration, and file system review.

Exploitation category

web-exploitation (v2) -- Web exploitation workflow covering SQL injection, authentication bypass, and other web attack vectors. This runbook includes approval-gated steps -- intrusive actions pause for explicit operator approval before execution proceeds.

Orchestration category

campaign-orchestrator (v2) -- Multi-phase campaign workflow that sequences child runbooks into a coordinated operation. Current orchestration chain:

campaign-orchestrator
  -> attack-surface-discovery
  -> web-recon
  -> tls-review
  -> web-exploitation
  -> ad-enumeration

Each child run produces independent evidence. The parent run aggregates campaign-level artifacts including campaign-manifest.json and campaign-receipt.json.

Catalog governance

The catalog is not a convenience index. It is a governance boundary:

  • Adding a runbook requires defining its steps, tool wrappers, evidence capture rules, and policy gates. Undeclared capabilities cannot execute.
  • Removing a runbook removes the ability to run that workflow. Existing receipts referencing the removed runbook remain valid historical evidence.
  • Modifying a runbook increments its version. Old receipts reference old versions; new runs reference the current version. Version history is never rewritten.