Make.com Integration
Connect UAPK Gateway to Make.com (formerly Integromat) to build visual automation scenarios that enforce AI agent policies, route human approvals, and export audit logs — all with a no-code drag-and-drop interface.
What You Can Do
| Module | Type | Description |
|---|---|---|
| Evaluate Action | Action | Check an agent's action against your policies (dry run) |
| Execute Action | Action | Evaluate and execute the action if policy allows |
| Approve Action | Action | Approve an escalated action pending human review |
| Deny Action | Action | Deny a pending escalated action |
| Get Approval | Search | Fetch the current status of an approval request |
| List Pending Approvals | Search | Get all approvals waiting for human decision |
| List Audit Records | Search | Query the audit log with date/type filters |
| Verify Audit Chain | Action | Confirm the hash chain has not been tampered with |
Use Cases
Approval routing with human oversight Build a scenario where your AI agent submits an action → UAPK escalates it → Make.com sends an approval request via email or Slack → the human replies → Make.com calls UAPK to approve or deny. Full audit trail maintained automatically.
Scheduled compliance exports Run a scenario on a daily or weekly schedule that pulls audit records from UAPK and writes them to Google Sheets, Airtable, a database, or your compliance dashboard.
Multi-step AI workflows with policy gates Chain AI actions inside Make.com scenarios where each step passes through UAPK's policy engine before proceeding. If a step is denied, the scenario branches to an alert or alternative path.
Audit chain integrity monitoring Run a scheduled scenario that calls Verify Audit Chain and sends an alert if tampering is detected.
Setup
Prerequisites
- A running UAPK Gateway instance (self-hosted or
api.uapk.info) - Your organization ID and API key from the UAPK dashboard
- A Make.com account (free tier works for testing)
Installing the Custom App
The UAPK Gateway Make.com app is distributed as a Custom App. Until it is listed in the official Make.com app directory, install it manually:
- Log into make.com and open your organization
- Go to Custom Apps in the left sidebar
- Click Create a new app → Import from JSON
- Upload the
app.jsonfile (request it at [email protected]) - The UAPK Gateway app will appear in your scenario builder
Authentication
When you first use a UAPK Gateway module in a scenario, Make.com will prompt you to create a connection:
| Field | Where to find it |
|---|---|
| Base URL | Your gateway URL, e.g. https://api.uapk.info |
| Organization ID | Dashboard → Settings → Organization ID |
| API Key | Dashboard → Settings → API Keys → Create Key |
| Management Token | Required for approval actions — Dashboard → Settings → Management Tokens |
Make.com will verify the connection by calling your gateway's health endpoint before saving.
Module Reference
Evaluate Action
Checks an action against your configured policies without executing it. Use this as a gate before any sensitive operation in your scenario.
Input fields:
| Field | Required | Description |
|---|---|---|
| UAPK ID | ✅ | Agent identifier from the manifest |
| Agent Instance ID | ✅ | Unique session or run ID |
| Action Type | ✅ | Action category, e.g. send_email, file_delete |
| Tool | ✅ | Connector, e.g. email:send, s3:delete |
| Parameters | ✅ | JSON parameters for the action |
| Counterparty ID | ❌ | Recipient or target entity ID |
| Counterparty Type | ❌ | Type of counterparty, e.g. customer, vendor |
| Jurisdiction | ❌ | ISO country code, triggers jurisdiction checks |
| Amount | ❌ | Financial amount for limit enforcement |
Output: Decision (allow / deny / escalate), policy check details, approval ID if escalated.
Execute Action
Evaluates the policy and executes the action if allowed. Returns the connector's result.
Additional input: Override Token (one-time token issued after human approval, required to re-execute an escalated action).
Approve / Deny Action
Resolves a pending escalation. Use after a human has reviewed and decided.
| Field | Required | Description |
|---|---|---|
| Approval ID | ✅ | UUID from the escalation response |
| Comment | ❌ | Decision rationale — stored in the audit log |
List Pending Approvals
Returns all open approval requests for your organization. Useful as a scenario trigger (run on schedule, check if any are pending, notify).
List Audit Records
Query the tamper-evident audit log.
| Field | Required | Description |
|---|---|---|
| Start Time | ❌ | ISO 8601, e.g. 2026-01-01T00:00:00Z |
| End Time | ❌ | ISO 8601 |
| Action Type | ❌ | Filter by action category |
| Decision | ❌ | allow, deny, or escalate |
| Limit | ❌ | Records per page (max 100) |
| Offset | ❌ | Pagination offset |
Verify Audit Chain
Calls the gateway's integrity verification endpoint. Returns valid: true if the entire hash chain is intact, or details about which record was tampered with if anomalies are detected.
Example Scenario: Escalation → Slack → Human Decision
[Webhook] New escalation event
↓
[UAPK Gateway] Get Approval (by ID from webhook payload)
↓
[Slack] Post message: "Action pending approval: {action_type} by {agent_id}"
Buttons: Approve | Deny
↓
[Router]
├── Approve path → [UAPK Gateway] Approve Action
└── Deny path → [UAPK Gateway] Deny Action
↓
[Slack] Confirm: "Decision recorded. Audit entry created."
Getting Access
The UAPK Gateway Make.com integration is currently available as a private custom app. To request access:
- Email [email protected] with subject "Make.com Integration Access"
- You will receive the
app.jsonfile and installation instructions - Once the Make Partner Program review is complete, the app will be listed publicly at
make.com/en/integrations/uapk-gateway
Self-Hosting
The full Make.com app definition is included in the UAPK Gateway SDK:
git clone https://github.com/UAPK/gateway.git
# File: sdks/make/app.json
Import it into your Make.com organization under Custom Apps → Import from JSON. You own the app within your org and can customize it freely.