๐Ÿงถ Weave โ€” Plugins, Knowledge, Scopes & Connectors

The fabric that connects AI to your organization's tools, data, and rules โ€” woven per user, per team, per company

PLUGIN LIFECYCLE โ€” Build, Install, Configure, Enable ๐Ÿ”จ Build No-code wizard or ZIP upload manifest.json + Python code ๐Ÿ“ฆ Install Upload to MCP engine Auto-register tools + resources โš™๏ธ Configure Connectors + credentials Security toggles + scopes โป Enable Live in the agent loop Tools available to LLM ๐Ÿช Marketplace (Future) Publish ยท Discover ยท Revenue share Certified plugins with security audit HIERARCHICAL KNOWLEDGE โ€” 5 Priority Levels P5 Personal P4 Group / Team P3 Organization P2 Plugin-level P1 Engine-level โ†‘ Most specific wins ยท Personal overrides everything What Each Level Contains P5 Personal: Seat preferences, loyalty numbers, personal notes P4 Group: Team budgets, department policies, shared docs P3 Org: Company handbook, approved vendors, compliance rules P2 Plugin: Plugin-specific config, API docs, tool instructions P1 Engine: Global defaults, currency, language, audit policies Index naming: {engine}-{plugin}-{scope}-index Azure AI Search ยท ACL per index ยท identity-scoped queries Scope Examples ๐Ÿฉบ Dr. Chen's allergy notes Only Dr. Chen can see this ๐Ÿ‘ฅ Engineering travel budget: $1000 Visible to engineering team ๐Ÿข Approved airlines: United, Delta Company-wide policy ๐Ÿ”Œ Amadeus uses departure โ‰ฅ24h rule Plugin-level knowledge ๐ŸŒ Default currency: USD CONNECTORS โ€” Wire Plugins to External Services ๐Ÿ”— Connector Framework Each connector defines: fields (API keys, tokens, URLs) + credential cascade (user โ†’ group โ†’ org) + OAuth flows ๐Ÿ“ง Gmail OAuth2 ยท app_password ๐Ÿ’ณ Stripe secret_key ยท webhook_secret ๐Ÿ™ GitHub personal_token ยท org โœˆ๏ธ Amadeus api_key ยท api_secret ๐Ÿ“‹ Jira email ยท api_token ยท domain ๐Ÿ’ฌ Slack bot_token ยท signing_secret โ€ฆ + Any OpenAPI Service Import spec โ†’ auto-generate connector CREDENTIAL VAULT โ€” Per-User Key Resolution ๐Ÿ‘ค User Key Most specific โ€” checked first miss? ๐Ÿ‘ฅ Group Key Team/department shared key miss? ๐Ÿข Org Key Company-wide fallback miss? โŒ No Credential Tool call blocked SECURITY TOGGLES โ€” Code-Enforced, Not Prompt-Based ๐Ÿ›ก๏ธ Per-Plugin Toggles โป Enable/Disable ๐Ÿ”‘ Require Creds โœ๏ธ Write Ops โฑ Rate Limit ๐Ÿ“ Audit Each toggle enforced at code level โ€” cannot be bypassed by prompt injection โš™๏ธ Per-Engine Toggles โป Engine Enable ๐Ÿšซ Cross-Engine Calls ๐Ÿ” Require MFA ๐Ÿ”’ Maintenance Mode ๐Ÿ“ Audit All Calls
Plugin Lifecycle
Hierarchical Knowledge (RAG)
Connectors
Credential Vault Cascade
Security Toggles
โœ•

๐Ÿ”จ Build Plugins

No-code wizard: Import an OpenAPI spec โ†’ auto-generates a plugin with tools, connectors, and security settings.

Code option: Write Python, create a manifest.json defining tools, resources, prompts, and security requirements. Package as a ZIP.

Manifest includes: Tool definitions (name, description, parameters), required connectors, minimum role, security toggles, knowledge sources.

โœ•

๐Ÿ“ฆ Install Plugins

Upload: Drag a ZIP into the Visual Designer or upload via POST /api/plugins/upload

Auto-registration: The MCP engine reads the manifest, registers all tools with FastMCP, creates connector entries, and sets up knowledge indexes.

2-click install: Upload โ†’ Enable. That's it. No server restarts needed.

โœ•

โš™๏ธ Configure Plugins

Connectors: Define which external services the plugin talks to. Each connector has credential fields (API keys, tokens, OAuth).

Credentials: Set at user, group, or org level. The vault cascade resolves the right key at runtime.

Security toggles: Enable/disable write operations, require credentials, set rate limits, enable audit logging โ€” all per plugin.

Knowledge sources: Add documents, URLs, or text to the plugin's RAG index. Scoped by user/group/org.

โœ•

โป Enable Plugins

Flip the power switch โ†’ the plugin's tools become available in the agent loop. The LLM can now discover and call them.

Disable: Flip it off โ†’ tools instantly disappear from the LLM's toolset. No prompt changes, no code changes. The security wrapper blocks all calls.

Hot-reload: No pod restart needed. Enable/disable is immediate.

โœ•

๐Ÿช Plugin Marketplace (Future)

Publish: Package your plugin and list it in the marketplace with description, pricing, and security audit report.

Discover: Browse plugins by industry, capability, or rating. One-click install.

Revenue share: Plugin developers earn 70% of sales. ContextWeaver takes 30% platform fee.

Certified: Plugins undergo security audit before listing. Certified badge = meets ContextWeaver security standards.

โœ•

๐Ÿ“š Hierarchical Knowledge (RAG)

When the AI needs context to answer a question, it searches across 5 priority levels. The most specific knowledge wins:

P5 Personal: Your private notes, preferences, saved items. Only you can see these.

P4 Group: Your team's shared knowledge โ€” budgets, protocols, team docs. Visible to team members only.

P3 Organization: Company-wide policies, handbooks, vendor lists. Everyone in the org sees these.

P2 Plugin: Knowledge specific to a plugin โ€” API documentation, tool instructions.

P1 Engine: Global defaults โ€” currency, language, audit policies. Broadest scope.

Deduplication: If the same topic appears at multiple levels, higher priority wins. Personal preferences always override company defaults.

โœ•

๐Ÿ” Knowledge Scopes

Each piece of knowledge is stored in a scoped index with ACLs. The search layer filters results by the requesting user's identity and group membership.

Index naming: {engine}-{plugin}-{scope}-index

ACL enforcement: Even if someone guesses an index name, the search API checks _user_email and _user_groups before returning results.

โœ•

๐Ÿ”— Connector Framework

Connectors define HOW a plugin talks to an external service. Each connector specifies credential fields, OAuth flows, and endpoint URLs.

Per-user credentials: Each user can configure their own API keys for a connector. The vault cascade finds the right key at runtime.

OAuth support: Google, Microsoft, GitHub OAuth flows built in. Users click "Connect with Google" and their token is stored in the vault.

Extensible: Import any OpenAPI spec โ†’ auto-generate a connector with all required fields.

โœ•

๐Ÿ” Credential Vault Cascade

When a tool needs an API key, the vault checks three levels in order:

1๏ธโƒฃ User key โ€” Does this specific user have their own key? (most secure)

2๏ธโƒฃ Group key โ€” Does their team/department have a shared key?

3๏ธโƒฃ Org key โ€” Is there a company-wide fallback key?

If no key found at any level โ†’ tool call is blocked. The AI reports "credentials required" and suggests the user configure their key in settings.

Storage: Azure Key Vault (production), HashiCorp Vault, or local encrypted file. The AI never sees raw keys.

โœ•

๐Ÿ›ก๏ธ Security Toggles

Every toggle is enforced in the MCP engine's security wrapper โ€” at the code level, not in prompts. No amount of clever prompting can bypass them.

Per-plugin: Enable/disable, require credentials, allow/block write operations, rate limiting, audit logging.

Per-engine: Enable/disable entire engine, block cross-engine calls, require MFA for admin, maintenance mode, audit all calls.

Visual Designer: Toggle switches are visible right on the canvas. Click ๐Ÿ” to toggle auth, ๐Ÿ”’ for read-only, ๐Ÿ’ฐ for approval required.