Kali Tool Documentation Portal — Burp Suite Community Edition
This page now functions as a documentation shell rather than a single static guide. It supports portal-style navigation, a Burp-specific deep dive, shared glossary terminology, a validation matrix, and a reusable documentation generator pattern for additional Kali tools.
Burp Suite Community Edition
Fully expanded current guide with architecture, trust model, workflow, parsing, troubleshooting, and integration layers.
Bettercap
Now expanded with classification, runtime architecture, module model, safe examples, defensive perspective, and automation fit.
Additional Kali Tools
Designed for future drop-in guides using the shared navigation, glossary, matrix, and template generator pattern.
Documentation Dashboard
Deepest current track with architecture, state, trust, adapters, troubleshooting, and new summary tabs.
Parallel track with runtime, module model, defensive framing, and new status tabs.
High-level architecture is stable, but version-sensitive flags and module inventories remain gated.
Additional Kali tools can be added using the shared generator pattern and dashboard model.
Tool Portal
Tool Portal
This portal layer organizes broad reference material above any one tool. The current active implementation is Burp Suite Community Edition, but the structure is intentionally reusable for other Kali tools that need the same progression from executive summary to nuanced internals.
Portal Scope
Shared navigation, print support, copy actions, terminology normalization, and validation tracking.
Current Tool
Burp Suite Community Edition is the anchor document and reference implementation for layout and depth.
Expansion Path
Additional tools can be inserted as parallel modules without rebuilding the shell or navigation logic.
Portal Design Goals
- Keep the highest-level navigation stable as more tools are added.
- Separate shared documentation concepts from tool-specific content.
- Track what is verified, what is inferred, and what remains gated.
- Allow a broad summary layer to flow into deeper technical modules without becoming cluttered.
Burp Suite Community Edition — Interception, Inspection, and Manual Analysis
Community Edition documentation module for controlled local HTTP/S traffic review, replay, trust-model understanding, and downstream normalization planning.
01Executive Summary
Burp Suite Community Edition is a locally operated web application traffic inspection platform centered on an intercepting proxy model. It enables observation, pausing, review, controlled modification, and replay of HTTP and HTTPS messages as they move between a client application and an upstream service. In the Community Edition, the principal strength is manual visibility and iterative inspection rather than broad automation.
Primary Function
Local interception and inspection of HTTP/S request and response flows, plus manual testing support through built-in tools.
Edition Positioning
Community Edition provides the core interactive analysis surface while omitting or restricting advanced automation and scanning features associated with higher-tier editions.
Navigation Map
| Category | Web application traffic interception and inspection |
|---|---|
| Primary Interface | GUI with local proxy listener |
| Core Modules | Proxy, Repeater, Intruder, Decoder, Comparer |
| Automation Posture | Manual-first in Community Edition |
| Validation Pattern | Wrapper flags and edition boundaries remain gated until locally confirmed |
What this document now includes
- Searchable sidebar navigation
- Print/PDF stylesheet for export-ready formatting
- Copy buttons on code blocks
- Collapsible technical subsections
- Additional tabs for workflow, state, listeners, and troubleshooting
Tool Classification
Category
Web application traffic inspection, proxy-based analysis, request/response manipulation.
Core Purpose
To expose the structure and behavior of web traffic through a local interception layer.
Workflow Position
Used during lab validation, protocol review, input/output testing, and local HTTP/S analysis.
Operational Envelope
- Local proxy binding is the normal inspection boundary.
- Traffic is observed through a client configured to use the Burp listener.
- Community Edition is strongest in analyst-driven manual review.
Architecture Overview
Burp operates as a local intermediary positioned between a client application and a destination service. Traffic enters through a configured listener, is normalized into request/response objects, optionally paused for analyst review, then stored in history and forwarded or replayed within module-specific contexts.
Internal Components
- Proxy listener
- Intercept engine
- HTTP history storage
- Request editor / response viewer
- Module workspaces
- Project storage layer
Execution Model
- GUI-driven local application
- Loopback listener model
- Event-based request processing
- Project file or temporary in-memory workspace
Installation & Verification
Kali Install
sudo apt update
sudo apt install burpsuite -y
Launch
burpsuite
Help
burpsuite --help
Command Syntax Reference
Base Invocation
burpsuite [OPTIONS]
Representative Wrapper Structure
burpsuite --project-file=<PROJECT_FILE> --user-config-file=<CONFIG_FILE>
Configuration / Session Inputs
--project-file=<PROJECT_FILE>--user-config-file=<CONFIG_FILE>
Verification / Usage
burpsuite --help- Version commonly checked through the UI “About” dialog
Safe Usage Examples (Local-Only)
These examples illustrate structure, bindings, and expected behavior without operational testing guidance.
Example 1 — Launch Default Local Proxy
burpsuite- Internal action: Initializes UI, project context, and default proxy listener.
- Expected output: Application window with proxy workspace available.
- What can fail: Local port conflicts, GUI startup failure, JVM/resource issues.
Example 2 — Open Project File
burpsuite --project-file=<PROJECT_FILE>- Internal action: Loads saved session context and stored artifacts.
- Expected output: Restored history and prior settings where supported.
- What can fail: Corrupt file, incompatible version, permissions.
Example 3 — Local Browser Proxy Configuration
Proxy Host: 127.0.0.1
Proxy Port: <PORT>- Internal action: Client routes local traffic through Burp listener.
- Expected output: Traffic visible in HTTP history.
- What can fail: Wrong proxy settings, certificate trust issues for HTTPS, no listener bound.
Example 4 — Launch with Project and User Config
burpsuite --project-file=<PROJECT_FILE> --user-config-file=<CONFIG_FILE>- Internal action: Loads both session state and user preferences before UI initialization completes.
- Expected output: Preconfigured listener behavior and restored project workspace.
- What can fail: Config incompatibility, malformed file structure, launcher argument handling differences.
Output & Data Interpretation
Common Output Forms
- HTTP history tables
- Raw request views
- Raw response views
- Diff/compare panes
- Exported project/history artifacts
Core Fields
- Method
- Path / URL segmenting
- Status code
- Headers
- Cookies
- Body / payload
- Timing and length metadata
Parsing Considerations
- Message bodies may be compressed or encoded before interpretation.
- Chunked transfer handling can affect raw body reading.
- Header presence and order are not semantically fixed across implementations.
- UI displays may normalize content that differs from literal transport representation.
Validation Checks
- Confirm Content-Length against displayed body length when applicable.
- Confirm transfer/content encoding before parser assumptions.
- Verify whether modifications were applied before replay results are interpreted.
Defensive & Monitoring Insights
Endpoint Indicators
- Local listener process bound to loopback
- Browser or client proxy configuration changes
- Local CA certificate installation for HTTPS inspection
Monitoring Considerations
- Track certificate store changes
- Track proxy-aware application startup profiles
- Observe local traffic routing changes to 127.0.0.1 listeners
Automation & Integration
Community Edition is mainly manual. Integration usually occurs through project reuse, exported data, external parsers, and analyst-assisted workflows rather than full built-in automation.
Pipeline Fit
Use as a capture, normalization, or review stage before exporting artifacts into other systems.
Script Fit
Launch with predefined project/config files, then parse downstream exports with custom tooling.
Structured Extraction
Transform exported request/response records into normalized JSON for indexing and search.
# conceptual wrapper launch
burpsuite --project-file=<PROJECT_FILE> --user-config-file=<CONFIG_FILE>
Burp Community — Capabilities & Limits
Core request/response interception, local listener operation, and history review are central strengths.
Repeater and related manual workflows support iterative request study and response comparison.
Decoder and Comparer support representation review and low-noise differential analysis.
Available in constrained form for structured permutations, but not positioned here as unrestricted automation.
Do not present Community Edition as if it includes broad built-in scanner or unrestricted workflow automation.
Output schemas and any API-adjacent assumptions require version-aware validation.
Burp Community — Errors & Fixes
Listener port conflict at startup
Another local process may already be bound to the expected proxy port. Resolve by changing the configured port or stopping the conflicting listener before launch.
HTTPS sessions fail with certificate warnings
The local trust path is incomplete or the client is using a separate validation model. Re-check local CA trust handling and client-specific certificate behavior.
Expected traffic not shown in history
Confirm proxy routing, confirm the correct loopback listener, and verify that any filters or intercept states are not hiding traffic from the current view.
Saved project behaves differently after reopen
Project persistence details can vary by file state and version. Validate whether the project was temporary, file-backed, or opened under a different package release.
Burp Community — Dashboard
| Tool Scope | Manual web traffic interception and analysis |
|---|---|
| Best-Fit Modules | Proxy, Repeater, Decoder, Comparer |
| Key Risks | TLS trust assumptions, version-specific wrapper behavior, overclaiming automation features |
| Primary Outputs | History views, edited requests, comparison artifacts, export-oriented downstream data |
| Recommended Reader Path | Overview → Architecture → Safe Examples → TLS / CA → Troubleshooting → Adapters |
Limitations & Validation Gates
- Community Edition is intentionally constrained relative to Professional.
- GUI-centric workflows limit direct CLI-only automation.
- Launcher options and export details may vary by platform package.
- Some feature boundaries require confirmation against the installed version and official vendor documentation.
Module Deep Dive — Proxy
The Proxy tool is the central ingestion surface. It accepts client traffic, decodes message structure, exposes interception controls, stores message history, and hands traffic to downstream Burp modules.
Subcomponents
- Listener configuration
- Intercept on/off state
- HTTP history indexing
- WebSocket or upgraded traffic views [GATE]
- Message editors
Data Lifecycle
- Receive request
- Parse message
- Pause if interception enabled
- Allow analyst review/modification
- Forward request
- Capture response and persist history
Research-Relevant Details
- Request normalization can change how raw traffic is visually represented in the UI.
- Listener binding scope matters for containment; loopback-only is the preferred safety posture.
- History is both a review surface and a source dataset for exports, comparison, or manual replay.
Module Deep Dive — Repeater
Repeater is a manual request workspace. It clones a captured request into an editable pane and enables controlled replay after analyst modification. It is optimized for close iteration, payload observation, and differential response review.
Internal Model
- Message clone from history or proxy
- Editable request buffer
- Send action to upstream destination
- Response render and side-by-side review
Analytical Value
- Header/body differential testing
- Formatting validation
- Response normalization study
- Manual stateful observation
Module Deep Dive — Intruder (Community Edition Context)
Intruder is the Burp component for parameterized request generation and repeated submission, but in Community Edition it is intentionally constrained. Documentation should frame it as a structured request permutation workspace with edition-specific limitations, not as a high-throughput automation layer.
Conceptual Subsystems
- Base request template
- Insertion point markers
- Payload position model
- Results table
Community Constraints
- Rate-limited operation
- Reduced automation utility relative to Pro
- Not appropriate to treat as unrestricted bulk engine
Decoder & Comparer
Decoder
Utility workspace for converting data representations and examining encoded forms. Use it to document transformations, inspect serialized fragments, and validate format assumptions.
Comparer
Diff-oriented workspace for evaluating two artifacts side by side, useful for response variation review or request version tracking.
Documentation Value
- Decoder supports representation awareness during message analysis.
- Comparer supports low-noise visibility into how two messages differ structurally or semantically.
- Both tools extend manual analysis without requiring high-volume automation.
TLS / CA Trust Architecture
HTTPS inspection requires a local trust model adjustment because the client must accept a Burp-generated certificate chain for the intercepted session. Burp effectively terminates the client-side TLS session locally, then establishes a separate upstream TLS session toward the destination service.
Trust Model Layers
Client-Side Requirement
The client must trust the Burp CA or presented chain to avoid certificate validation failures during intercepted HTTPS sessions.
Upstream Requirement
Burp separately validates and negotiates with the upstream service, maintaining an independent TLS context.
Observed Effects
- Certificate stores may be modified to include a local CA.
- Applications with stricter pinning or custom trust behavior may not accept interception.
- Certificate warnings indicate trust-chain mismatch, not necessarily transport failure alone.
Validation Layers
- Verify whether the client is using the expected OS trust store or its own embedded trust model.
- Verify whether upstream certificate details are being separately surfaced in the UI or history views.
- Confirm that failures are attributable to trust issues rather than general proxy misconfiguration.
Automation Adapters
This section extends the base documentation into integration-oriented design. The focus is safe transformation of Burp-generated artifacts into reusable structured data for indexing, correlation, and internal documentation systems.
Adapter Pattern 1 — Export Normalizer
<BURP_EXPORT> -> parser -> normalized JSON -> local datastoreAdapter Pattern 2 — Request Catalog Builder
history items -> header/body extraction -> fingerprint fields -> searchable inventoryAdapter Pattern 3 — Diff Pipeline
request A + request B -> field comparator -> delta report -> analyst notesUseful Fields to Extract
- Method
- Host / authority placeholder
- Path
- Status
- Header map
- Body hash
- Length
Normalization Targets
- Stable JSON schema
- Consistent header casing policy
- Decoded/encoded body metadata
- Timestamp standardization
Pipeline Consumers
- Knowledge bases
- Local search systems
- Documentation repositories
- Analyst comparison workflows
Suggested Normalized JSON Skeleton
{
"timestamp": "<ISO8601>",
"request": {
"method": "<METHOD>",
"path": "<PATH>",
"headers": {"<HEADER>": "<VALUE>"},
"body_hash": "<HASH>"
},
"response": {
"status": "<STATUS>",
"headers": {"<HEADER>": "<VALUE>"},
"body_hash": "<HASH>"
},
"meta": {
"source": "burp_export",
"project": "<PROJECT_NAME>"
}
}Workflow Model
The Burp workflow can be described as a staged analyst interaction loop: ingest traffic, classify messages, inspect structure, fork selected messages into dedicated workspaces, compare results, and optionally export artifacts for downstream review.
Stage 1 — Ingest
Traffic enters through a configured listener and is normalized into message objects.
Stage 2 — Review
Messages are sorted visually through history, editor panes, and filtering controls.
Stage 3 — Derive
Selected items are branched into Repeater, Comparer, or export-oriented workflows.
Data Model
At a practical level, Burp represents activity as structured request/response objects with additional transport, timing, and UI-associated metadata. Exact internal storage formats are implementation-specific, but the visible analyst model is consistent enough for documentation and integration planning.
Request Object Concepts
- Method
- Authority/host context
- Path
- Header collection
- Cookie material
- Optional body payload
Response Object Concepts
- Status line
- Headers
- Cookies / set-cookie material
- Body payload
- Size / timing metadata
Interpretation Risk Points
- Display normalization can obscure literal wire formatting.
- Decoding or decompression state affects what the analyst perceives.
- Repeated requests may reflect client state drift rather than request-only differences.
Project Files & State
Burp sessions can be temporary or file-backed. The distinction matters for reproducibility, persistence, and evidence-style documentation practices because history, configuration, and analyst state may either remain ephemeral or be saved into a reusable project context.
Temporary Project Characteristics
- Fast startup
- Short-lived workspace
- Less persistence across sessions
File-Backed Project Characteristics
- Stored analyst state
- Reusable session context
- Supports repeatable documentation and review
Listener Model
The proxy listener is the intake boundary. A listener defines where the client connects, how traffic is accepted, and what interception scope is possible within the local environment. For safe documentation and lab work, loopback-only listeners remain the preferred model.
Bind Address
Determines local exposure scope. Loopback restricts access to the local host.
Port
Defines the client connection endpoint and must not conflict with existing local services.
Interception State
Controls whether messages are paused for review or allowed to pass directly into history.
10Troubleshooting
Startup Failures
- Launcher errors
- JVM/runtime resource issues
- Invalid project or config files
Traffic Visibility Failures
- Proxy misconfiguration
- No active listener
- HTTPS trust chain not accepted
Troubleshooting Sequence
- Confirm Burp starts successfully.
- Confirm a local listener is active on the expected loopback address and port.
- Confirm the client is actually using that listener.
- Confirm HTTPS trust requirements are satisfied where applicable.
- Confirm traffic appears in history before moving into tool-specific debugging.
Application starts but no traffic appears
Check that the client is explicitly configured to use the Burp loopback listener, that the correct port is selected, and that the current view is not filtered too narrowly.
HTTPS requests fail before reaching history
Confirm the local trust anchor is installed where required and verify that the client is not using certificate pinning or a separate trust store that bypasses the expected validation path.
Project reopens with missing expected artifacts
Confirm whether the session was temporary or file-backed, and validate whether the stored project format is compatible with the current installed version.
Analyst Validation Checklist
- Is the listener correctly bound?
- Is the proxy configured on the client?
- Is intercept on or off as intended?
- Is the certificate trust path in place for HTTPS?
- Is the current view filtered too narrowly to show the traffic?
Glossary
Glossary
Shared terminology supports consistency across tool guides, especially when additional Kali documentation modules are added later.
Validation Matrix
Validation Matrix
This section separates documentation confidence levels from presentation. It makes future review easier when features change between package versions or editions.
| Area | Claim Type | Status | Validation Source |
|---|---|---|---|
| Package launcher flags | Platform/package dependent | [GATE] | Validate via local burpsuite --help |
| Community vs Professional boundaries | Edition dependent | [GATE] | Official vendor documentation |
| Core proxy workflow | Stable architectural behavior | Documented | Tool behavior / official docs |
| TLS trust model | General architectural model | Documented | General HTTPS interception model |
| Export schemas / file internals | Implementation dependent | [GATE] | Official docs + local version inspection |
| Bettercap portal section set | Initial documentation pass | Drafted | Portal-authored; validate with local help and upstream docs |
Documentation Generator Pattern
Documentation Generator Pattern
This module turns the current page into a repeatable authoring pattern for additional Kali tools. The goal is to keep structure consistent while allowing tool-specific nuance to vary.
Required Sections
- Executive summary
- Classification
- Architecture overview
- Installation and verification
- Syntax reference
- Safe examples
- Output interpretation
- Defensive considerations
- Automation and limits
Optional Extended Modules
- Trust architecture
- State and persistence
- Data model
- Troubleshooting
- Validation matrix entries
- Glossary term additions
Reusable Section Stub
<section id="<tool-section>" class="panel">
<h3><Section Title></h3>
<p><Tool-specific summary></p>
<div class="grid two">
<div class="card">...</div>
<div class="card">...</div>
</div>
<details class="collapsible" open>
<summary><Deep-dive topic></summary>
<div class="collapsible-body">...</div>
</details>
</section>Recommended Authoring Workflow
- Draft the stable architecture first.
- Mark uncertain implementation details with
[GATE]. - Add safe examples using loopback or placeholders only.
- Separate tool-specific claims from shared glossary language.
- Update the validation matrix before publishing.
Bettercap — Modular Network Interaction and Session-Based Observation
Initial portal-authored documentation module for controlled runtime setup, module framing, safe invocation structure, and defensive interpretation.
01Bettercap — Executive Summary
Bettercap is a modular network interaction and traffic inspection framework used for real-time observation and protocol interaction in controlled environments. Within this portal it is documented as a modular runtime rather than a single-purpose binary, with emphasis on interface binding, session control, module loading, caplets, and structured observation.
| Runtime Style | Interactive session with module dispatch |
|---|---|
| Primary Inputs | Interface context, caplets, inline commands |
| Primary Outputs | Console events, logs, module-specific reporting |
| Documentation Risk | Flags and modules can vary by packaged version |
| Research Focus | Architecture, module model, output normalization, defensive observability |
Bettercap — Classification
Category
Network inspection, protocol interaction, session-based modular analysis.
Core Purpose
To provide a runtime for loading modules that observe, process, and report on network-layer and protocol-layer behaviors.
Workflow Position
Used during controlled network observation, protocol research, and modular traffic instrumentation.
Bettercap — Architecture Overview
Bettercap operates through a session-centric runtime. An interface or input context is bound, the core engine initializes capture and event handling, modules are loaded or invoked, and output is emitted through the console, logs, caplets, or optional API surfaces depending on the deployed version and configuration.
Internal Components
- Session runtime
- Packet capture and processing layer
- Module loader
- Caplet/script execution support
- Logging and event output surface
Execution Modes
- Interactive console
- Inline command evaluation
- Caplet-driven startup flow
- Version-dependent API exposure [GATE]
Bettercap — Installation & Verification
sudo apt update
sudo apt install bettercap -ybettercap --version
bettercap --helpBettercap — Command Syntax Reference
bettercap [OPTIONS]
bettercap -iface <INTERFACE>
bettercap -iface <INTERFACE> -caplet <INPUT_FILE>
bettercap -iface <INTERFACE> -eval "<COMMAND>"Common Argument Categories
- Interface selection
- Caplet/script loading
- Inline evaluation
- Logging / debug output
Interpretation Note
Bettercap’s practical syntax depends on runtime invocation, then in-session commands and module settings. Documentation should separate startup flags from session commands.
Bettercap — Safe Usage Examples
Example 1 — Start Interactive Session on Placeholder Interface
bettercap -iface <INTERFACE>- Internal action: Initializes session runtime and binds capture context to the selected interface.
- Expected output: Interactive prompt and status information.
- What can fail: Invalid interface, permissions, unsupported runtime conditions.
Example 2 — Start with Caplet
bettercap -iface <INTERFACE> -caplet <INPUT_FILE>- Internal action: Loads scripted startup instructions into the session.
- Expected output: Session startup with command/script execution messages.
- What can fail: File not found, syntax errors, unsupported commands in caplet content.
Example 3 — Inline Command Evaluation
bettercap -iface <INTERFACE> -eval "help"- Internal action: Executes an in-session command after startup.
- Expected output: Help or module listing in the console.
- What can fail: Command parsing issues or version-specific command differences.
Bettercap — Module Model
Bettercap should be understood as a host for modules rather than a fixed, monolithic utility. Modules are invoked within the session and may expose their own settings, output, and event handling behavior.
Session/Utility Layer
Core commands, logging, session state, caplets, and interactive runtime control.
Protocol/Observation Layer
Modules oriented around observing network and protocol information in the current context.
Output/Integration Layer
Log surfaces, console reporting, and externally consumable session outputs.
Bettercap — Output & Interpretation
Output Forms
- Interactive console text
- Session log files
- Module-specific event lines
- Version-dependent API/structured surfaces [GATE]
Parsing Considerations
- Output may mix structured and human-readable content.
- Module event schemas are not always uniform.
- Timestamps and runtime context should be normalized before indexing.
Bettercap — Defensive & Monitoring Insights
Host-Level Indicators
- Running bettercap process
- Interface interaction and capture activity
- Log file generation where configured
Operational Observations
- Resource usage may rise during active module processing.
- Interface selection and binding behavior are relevant for auditability.
- Module-specific output can create recognizable local artifacts.
Bettercap — Automation & Integration
Caplet Integration
Caplets provide a reusable startup and configuration pattern for repeatable sessions.
Log Normalization
Session output can be normalized into structured records for indexing, correlation, or documentation.
Wrapper Scripts
Startup, logging, and session preparation can be orchestrated externally through scripts.
Bettercap — Limitations & Validation Gates
- Module inventory and flags vary by version and packaging.
- Interface access commonly depends on permissions and environment.
- Some output and API capabilities may differ across releases.
Bettercap — Capabilities & Limits
Strong fit for session-based observation and module-driven runtime control.
Caplets support repeatable startup patterns and structured session preparation.
Console and log-centric outputs can be adapted into external normalization workflows.
Useful breadth exists, but exact module inventory and behavior must be checked against installed help and upstream docs.
Packaged versions may expose different startup flags, defaults, or supported runtime surfaces.
Treat any API or structured output claims as gated until validated on the local version.
Bettercap — Errors & Fixes
Startup fails on selected interface
Check interface name accuracy, environment permissions, and whether the interface is actually present in the local runtime context.
Caplet does not execute as expected
Validate caplet path, syntax, and command compatibility with the installed Bettercap version before assuming runtime failure.
Inline evaluation returns unexpected behavior
Separate startup flag parsing from in-session command expectations. Some issues come from command syntax or version-specific session semantics.
Output is difficult to normalize
Expect mixed human-readable and module-specific output. Build parsers that account for timestamps, prefixes, and non-uniform event formatting.
Bettercap — Dashboard
| Tool Scope | Interactive modular network observation and session orchestration |
|---|---|
| Best-Fit Concepts | Runtime model, caplets, session control, logging, module dispatch |
| Key Risks | Version-sensitive flags, module inventory drift, parser assumptions about output structure |
| Primary Outputs | Interactive console text, logs, module event streams, gated structured surfaces |
| Recommended Reader Path | Overview → Architecture → Syntax → Safe Examples → Modules → Defensive → Limitations |
Key Takeaways & Research Notes
Strongest as a manual inspection and replay platform with a clear trust and listener model.
Strong architecture layer is present, but module-level specifics still need local validation against installed help output.
Reusable for additional tools with shared glossary, matrix, copy controls, and print styling.
Wrapper arguments, export schemas, and version-sensitive behaviors without validating the installed tool build.
# Per-tool publication checklist
- Add document header metadata
- Add numbered section flow
- Add at least one capability/limitation grid
- Add issue/fix records for troubleshooting
- Gate version-sensitive claims
- Keep all examples loopback-only or placeholder-based