Tooling & External App Integration
Register and consume external applications and APIs as agent tools
This guide explains how to register and use external applications, APIs, and services as tools that Supervity AI agents can invoke during execution.
Tools allow agents to:
- call third-party APIs
- interact with internal systems
- perform actions beyond built-in integrations
- extend agent capabilities in a controlled, auditable way
Tools are a core part of how Supervity enables safe delegation, not ad-hoc automation.
Tooling Mental Model
In Supervity, tools are governed actions.
Key principles:
- agents decide when to use a tool
- workflows define how it is executed
- humans define what tools are allowed
- the platform enforces security, limits, and auditability
What Is a Tool?
A tool is an explicit capability an agent is allowed to invoke.
Tools are:
- explicitly registered
- permission-scoped
- schema-defined
- auditable per execution
- reusable across agents and workflows
Agents cannot invent or access tools that are not registered.
Types of Tools
Built-in Integrations
Predefined tools maintained by Supervity.
Examples:
- email, chat, CRM
- file storage
- productivity tools
- databases and common SaaS platforms
Built-in tools are:
- preconfigured
- secure by default
- versioned and maintained by Supervity
Custom Tools (External APIs)
Custom tools allow you to extend Supervity to any system.
Examples:
- internal company APIs
- third-party SaaS APIs
- microservices
- legacy systems
Custom tools make agents infrastructure-aware without being infrastructure-coupled.
Registering a Custom Tool
Custom tools are registered at the workspace or account level.
Registration defines what the tool does, not when it is used.
Required Tool Metadata
When registering a tool, you specify:
- tool name and description
- API endpoint(s)
- supported HTTP methods
- authentication method
- input parameters and types
- expected output schema
This metadata allows agents to:
- reason about tool suitability
- validate inputs safely
- understand outputs deterministically
Example Tool Definition (Conceptual)
Once registered, the tool becomes available for agent planning and execution.
Tool Authentication
Supported authentication methods include:
- OAuth 2.0
- API keys
- bearer tokens
- custom headers
Credential handling guarantees:
- encrypted storage at rest
- least-privilege access
- credential rotation without breaking agents
- revocation at any time
Agents never see raw secrets.
How Agents Use Tools
Agents do not call tools arbitrarily.
During execution:
- the agent determines a tool is required
- the platform checks permissions and policies
- inputs are validated against the schema
- the tool call is executed
- outputs are returned to the workflow context
Every tool invocation is:
- deterministic
- logged
- traceable to a specific run
Tool Usage via APIs
Tool invocation is typically implicit through agent execution.
Via APIs, you can:
- inspect which tools a workflow uses
- restrict tools per agent or workspace
- override credentials per execution (where allowed)
- audit tool usage programmatically
Tools remain governed even when execution is API-triggered.
Error Handling & Retries
If a tool call fails:
- the error is surfaced with context
- retries occur only when safe
- execution can pause for human review
- failures never disappear silently
Tool failures do not corrupt workflows or agents.
Governance & Safety Controls
Tool usage is governed by:
- workspace-level permissions
- agent configuration
- human-in-command policies
- approval gates for sensitive actions
This prevents:
- unauthorized system access
- accidental destructive operations
- uncontrolled API usage
Common Use Cases
Internal API Access
- agents call internal services
- execute domain-specific operations
- respect internal auth and policies
SaaS Extension
- integrate unsupported SaaS platforms
- use vendor-specific APIs
- avoid writing custom glue code
Legacy System Automation
- wrap legacy APIs as tools
- let agents interact safely
- modernize execution without rewriting systems
Observability & Auditing
For every tool invocation, Supervity records:
- tool name
- associated agent and workflow run
- inputs (redacted where sensitive)
- outputs
- timestamp and execution status
This supports:
- debugging
- compliance audits
- security reviews
- cost and usage tracking
Security Best Practices
Recommended practices:
- grant minimum required permissions
- isolate credentials per tool
- enable human review for destructive actions
- rotate credentials regularly
- monitor tool usage patterns
Tools + Human-in-Command
Tools can be combined with approvals for high-risk actions.
Example:
This ensures powerful tools never run unchecked.
Where to Go Next
- execute agents β Agent Execution APIs
- add oversight β Human-in-Command APIs
- explore endpoints β API Reference
Tools turn Supervity into an extensible AI operations platform β open, governable, and production-ready.