Why it matters
Transactional agents have the highest blast radius if compromised: they often have write access. Inviolet’s Postgres path narrows every query to the column allowlist on the matched purpose, and (with Vault binding) issues a short-lived role per intent token instead of using the application’s persistent password.1. Create a read-only role
2. Add the data source in Inviolet
App dashboard → Data Sources → Add → Postgres. Paste:- Host, port, database name
- Username (
inviolet_svc) + password - SSL mode (
requirefor managed Postgres)
3. Wrap a query with intent evaluation
4. Verify
Decision-feed entries for this source carrydata_source_id = postgres_app_prod. The query pattern map shows tables and columns
touched. Anything outside the matched purpose’s element list should
fall to the lower-confidence “ambient” cluster — that’s the cohort to
watch when promoting to enforcement.
Read next
- Connect Vault — wire the credential broker so each intent token gets a fresh Postgres role
- Salesforce
- Snowflake