Network Boundaries and Isolation

Clear network boundaries are fundamental to secure system design.

One of the common concerns when introducing a new integration technology is whether it:

  • bypasses existing network controls
  • expands the blast radius of failures
  • or silently introduces new trust zones

Graftcode is designed to do none of these.

This section explains how network boundaries are preserved, how isolation works, and how Graftcode fits into existing network topologies.


Execution stays inside network boundaries

All execution in Graftcode happens inside the network where the code is deployed.

Business logic:

  • runs in your processes
  • inside your runtimes
  • within your private networks

Invocation intent may cross network boundaries, but execution never does.

There is no central execution plane and no shared runtime outside your infrastructure.


Gateways define explicit network entry points

The Graftcode Gateway acts as a well-defined network boundary.

It is:

  • the only component that accepts incoming invocation intent
  • the only place where external connections terminate
  • the point where authentication, authorization, and transport security are enforced

From a network boundary perspective, the Graftcode Gateway is comparable to:

  • a traditional API gateway
  • a reverse proxy
  • or a service ingress

in that it defines an explicit entry point—but unlike those components, it does not proxy or forward traffic. It hosts runtimes and executes calls directly.


No implicit lateral movement

Graftcode does not enable implicit service-to-service trust.

A service:

  • cannot call another service
  • unless a Gateway is reachable
  • and invocation is explicitly allowed

There is no hidden mesh behavior and no automatic peer discovery.

All network paths must be:

  • explicitly configured
  • reachable through network policy
  • and permitted by security rules

Isolation between services and runtimes

Each service instance:

  • runs its own Gateway
  • hosts its own Hypertube runtime
  • loads only the modules it is configured to expose

There is no shared memory, shared runtime, or shared execution context across services.

Isolation is enforced by:

  • process boundaries
  • runtime boundaries
  • and network boundaries

Blast radius remains contained

Failures in one service:

  • do not propagate automatically
  • do not crash other services
  • do not compromise unrelated runtimes

If a Gateway becomes unavailable:

  • invocation routing to that service fails
  • callers receive errors
  • other services continue operating normally

There is no cascading execution dependency.


Edge clients and perimeter boundaries

For edge clients, the Gateway typically sits:

  • behind a load balancer
  • behind an ingress
  • or behind a traditional API gateway

This ensures that:

  • only intended traffic reaches the Gateway
  • perimeter security controls remain intact
  • existing WAF, firewall, and rate-limiting rules apply

The Gateway does not bypass or weaken these controls.


Internal networks and private connectivity

Within private networks or cloud environments:

  • Gateways can communicate over private IPs
  • traffic can stay entirely within a VPC or VNet
  • TLS can be terminated or passed through as required

Graftcode adapts to the network topology—it does not redefine it.


No hidden control plane traffic

Beyond metadata exchange and tooling:

  • there is no background communication
  • no control-plane traffic involved in execution
  • no dependency on external connectivity at runtime

If outbound internet access is restricted or disabled, production execution continues to function normally.


Compatibility with zero-trust architectures

Graftcode works well in zero-trust environments because:

  • every call is explicit
  • every boundary is enforced
  • identity is validated per invocation or per session

There is no assumption of trust based on network location alone.


Deployment-time responsibility

Network boundaries in Graftcode are defined at deployment time, not at code time.

This allows:

  • DevOps teams to control exposure
  • security teams to define trust zones
  • developers to remain focused on logic

Each concern remains in its proper layer.


Closing perspective

Graftcode does not flatten networks or blur trust zones.

It respects:

  • existing boundaries
  • existing controls
  • existing isolation models

By making invocation explicit and execution local, it keeps network architecture understandable, auditable, and secure.