Bootstrap installs the governed front door
PR #7 adopts the receiver-local governed front door in a clean controlled Rails receiver.
powered by Software Dark Factory
Controlled demo proof
A Rails receiver is bootstrapped with the governed front door, then a real bounded change is completed through the full Software Dark Factory PR anatomy.
The demo proof page shows controlled proof of the operating model. It does not claim hosted enforcement, production/customer governance, automatic approval, automatic merge, or guaranteed correctness.
Controlled proof only. No hosted enforcement, production/customer governance, automatic approval, automatic merge, or guaranteed correctness is claimed.
Core proof line
Homepage proof stays buyer-friendly. This page carries the technical evidence chain and boundaries.
Demo walkthrough
A short Loom walkthrough shows the current controlled path from assisted assessment context to governed front door adoption and completed governed PR proof.
Some browsers block embedded Loom playback. The direct link remains the reliable demo path.
Video not loading? Watch on Loom
The recording is a walkthrough of controlled proof surfaces. The written sections below remain the claim-bounded technical evidence record.
This is a controlled proof walkthrough. It does not claim hosted enforcement, production/customer governance, automatic approval, automatic merge, billing-grade cost, or measured savings.
What the walkthrough proves
The walkthrough proves the full path from adoption to governed work without turning the GTM site into an execution surface.
This is what governed AI-assisted delivery looks like in practice: a bounded change, a visible brief, a reviewable PR, and committed evidence for drill-down.
PR #7 adopts the receiver-local governed front door in a clean controlled Rails receiver.
The receiver owns the local SDF factory commands after installation. This is tooling run inside the controlled receiver, not hosted enforcement.
PR #8 delivers a tiny /factory-proof change through the full governed work anatomy.
PR #8 uses a production-style governed PR body with prompt/run log, criteria, playbooks, preflight, risk, verification, evidence, and AI usage.
The readable PR body points reviewers to committed evidence records for audit and drill-down.
Next step
Start with a scoped readiness assessment. We will review where your repo stands today, what evidence is missing, and what a governed front-door adoption path could look like.
Rails two-PR flow
The strongest current demo is a controlled Rails receiver flow where adoption lands before the bounded governed work slice.
main
<- PR #7: adopt governed front door
<- PR #8: complete governed work slice
Purpose: adoption/factoryization proof
Shows: Bootstrap can install the governed front door
Status: draft/open controlled proof
Purpose: completed governed work proof
Shows: a real bounded Rails change completed through the full SDF anatomy
Status: draft/open controlled proof
Governed PR anatomy
The PR body is the reviewer decision surface. The committed files remain the audit trail.
This is reviewer context and evidence packaging. It is not automatic approval, automatic merge, or automatic trust judgement.
Token economics / AI usage
The demo PR captures AI usage/economics evidence from local tool logs. Cost remains unavailable / not billing-grade, and no measured savings are claimed.
If capture is disabled or unavailable, SDF records unavailable values rather than inventing numbers.
reported_by_provider_through_local_tool_logs
921,936
1,213
923,149
unavailable / not billing-grade
not claimed
Completed governed work proofs
These are controlled receiver proofs, not a claim of all-stack coverage or native tooling for every receiver language.
completed_governed_work_slice_proven_in_controlled_rails_receiver
completed_governed_work_slice_proven_in_controlled_typescript_receiver
Runtime / tooling boundary
Governed PR output modes
Capability lifecycle
The controlled proof also includes receiver-local capability status, drift/status detection, recovery-plan preview, and runtime alignment guidance.
These are operator review tools, not automatic repair, automatic apply, hosted monitoring, or continuous monitoring.
Proof sources
These references name the controlled proof path without adding live Bootstrap calls, GitHub API access, repo scanning, receiver mutation, hosted enforcement, or automatic PR creation.
What this does not claim
This proof does not claim: