This page is the shortest truthful answer to:
Use it like a capability ledger, not like a promise that every logged-in site is already a deep integration target.
| Site | Strongest layer today | Current repo role | What is already real | What still stays bounded |
|---|---|---|---|---|
| Google Account | DOM / page-state proof | repo-owned Chrome login-persistence anchor | repo-owned browser root, restart persistence, and login sanity checks | stays a proof anchor, not a source adapter or account-automation target |
| YouTube | hybrid: Data API + DOM / page-state proof | strongest source lane plus live browser proof target | API probes, strict preflight, comments collector, live-smoke path, and browser-proof runbooks | the strict end-to-end live lane still depends on operator-managed YouTube API access when the lane is reopened |
| Bilibili account center | DOM today, hybrid later | account-proof anchor for the strong-supported Bilibili source lane | repo-owned Chrome proof, source intake copy, and route-health diagnostics | stronger proof still depends on human login; account-side writes remain out of scope |
| Resend dashboard | admin UI + provider configuration | operator-side notification and sender-identity proof surface | provider-health checks, ops diagnostics, settings routes, and notification readiness gates | sender/domain/mailbox setup remains external provider-admin work |
| RSSHub / generic RSS | HTTP / API substrate | generalized source-universe intake substrate | adapters, fetcher, normalizer, runtime probes, and honest intake/front-door copy | route-by-route proof still needs route-level evidence instead of blanket claims |
If you want to keep pushing read-only capability work without crossing into external-account writes, the safest next layer is:
docs/project-status.md, docs/runbook-local.md, and docs/runtime-truth.md aligned/ops and the intake front doorThese steps stay human-only or policy-gated even when the surrounding repo code is already real:
Do not treat these as allowed: