Skip to main content

Make.com Integration

Connect UAPK Gateway to Make.com (formerly Integromat) to build visual automation scenarios that enforce AI agent policies, route human approvals, and export audit logs — all with a no-code drag-and-drop interface.

What You Can Do

ModuleTypeDescription
Evaluate ActionActionCheck an agent's action against your policies (dry run)
Execute ActionActionEvaluate and execute the action if policy allows
Approve ActionActionApprove an escalated action pending human review
Deny ActionActionDeny a pending escalated action
Get ApprovalSearchFetch the current status of an approval request
List Pending ApprovalsSearchGet all approvals waiting for human decision
List Audit RecordsSearchQuery the audit log with date/type filters
Verify Audit ChainActionConfirm the hash chain has not been tampered with

Use Cases

Approval routing with human oversight Build a scenario where your AI agent submits an action → UAPK escalates it → Make.com sends an approval request via email or Slack → the human replies → Make.com calls UAPK to approve or deny. Full audit trail maintained automatically.

Scheduled compliance exports Run a scenario on a daily or weekly schedule that pulls audit records from UAPK and writes them to Google Sheets, Airtable, a database, or your compliance dashboard.

Multi-step AI workflows with policy gates Chain AI actions inside Make.com scenarios where each step passes through UAPK's policy engine before proceeding. If a step is denied, the scenario branches to an alert or alternative path.

Audit chain integrity monitoring Run a scheduled scenario that calls Verify Audit Chain and sends an alert if tampering is detected.

Setup

Prerequisites

  • A running UAPK Gateway instance (self-hosted or api.uapk.info)
  • Your organization ID and API key from the UAPK dashboard
  • A Make.com account (free tier works for testing)

Installing the Custom App

The UAPK Gateway Make.com app is distributed as a Custom App. Until it is listed in the official Make.com app directory, install it manually:

  1. Log into make.com and open your organization
  2. Go to Custom Apps in the left sidebar
  3. Click Create a new appImport from JSON
  4. Upload the app.json file (request it at [email protected])
  5. The UAPK Gateway app will appear in your scenario builder

Authentication

When you first use a UAPK Gateway module in a scenario, Make.com will prompt you to create a connection:

FieldWhere to find it
Base URLYour gateway URL, e.g. https://api.uapk.info
Organization IDDashboard → Settings → Organization ID
API KeyDashboard → Settings → API Keys → Create Key
Management TokenRequired for approval actions — Dashboard → Settings → Management Tokens

Make.com will verify the connection by calling your gateway's health endpoint before saving.

Module Reference

Evaluate Action

Checks an action against your configured policies without executing it. Use this as a gate before any sensitive operation in your scenario.

Input fields:

FieldRequiredDescription
UAPK IDAgent identifier from the manifest
Agent Instance IDUnique session or run ID
Action TypeAction category, e.g. send_email, file_delete
ToolConnector, e.g. email:send, s3:delete
ParametersJSON parameters for the action
Counterparty IDRecipient or target entity ID
Counterparty TypeType of counterparty, e.g. customer, vendor
JurisdictionISO country code, triggers jurisdiction checks
AmountFinancial amount for limit enforcement

Output: Decision (allow / deny / escalate), policy check details, approval ID if escalated.

Execute Action

Evaluates the policy and executes the action if allowed. Returns the connector's result.

Additional input: Override Token (one-time token issued after human approval, required to re-execute an escalated action).

Approve / Deny Action

Resolves a pending escalation. Use after a human has reviewed and decided.

FieldRequiredDescription
Approval IDUUID from the escalation response
CommentDecision rationale — stored in the audit log

List Pending Approvals

Returns all open approval requests for your organization. Useful as a scenario trigger (run on schedule, check if any are pending, notify).

List Audit Records

Query the tamper-evident audit log.

FieldRequiredDescription
Start TimeISO 8601, e.g. 2026-01-01T00:00:00Z
End TimeISO 8601
Action TypeFilter by action category
Decisionallow, deny, or escalate
LimitRecords per page (max 100)
OffsetPagination offset

Verify Audit Chain

Calls the gateway's integrity verification endpoint. Returns valid: true if the entire hash chain is intact, or details about which record was tampered with if anomalies are detected.

Example Scenario: Escalation → Slack → Human Decision

[Webhook] New escalation event

[UAPK Gateway] Get Approval (by ID from webhook payload)

[Slack] Post message: "Action pending approval: {action_type} by {agent_id}"
Buttons: Approve | Deny

[Router]
├── Approve path → [UAPK Gateway] Approve Action
└── Deny path → [UAPK Gateway] Deny Action

[Slack] Confirm: "Decision recorded. Audit entry created."

Getting Access

The UAPK Gateway Make.com integration is currently available as a private custom app. To request access:

  1. Email [email protected] with subject "Make.com Integration Access"
  2. You will receive the app.json file and installation instructions
  3. Once the Make Partner Program review is complete, the app will be listed publicly at make.com/en/integrations/uapk-gateway

Self-Hosting

The full Make.com app definition is included in the UAPK Gateway SDK:

git clone https://github.com/UAPK/gateway.git
# File: sdks/make/app.json

Import it into your Make.com organization under Custom Apps → Import from JSON. You own the app within your org and can customize it freely.