Prompt redactor (F0.5) strips secrets, PII, and sensitivity-tagged context before the prompt leaves the box. Hash-only manifests — no plaintext on disk.
hooks.prompt_redactor: { sensitivity: restricted-blocked } Ship faster. With governance.
Vendor-agnostic control plane for AI-powered Dev with Claude Code Codex Gemini CLI Open Claude
Every line of AI-merged code traces back to a versioned PRD, ERD, and ADR — sample-ready for NIST AI RMF, ISO/IEC 42001, the EU AI Act, SOC 2, ISO 27001, and HIPAA change-management audits.
Every artifact you add to the repo gives the AI runtime better understanding. Code quality compounds as context layers up — and it all lives in git. Each tier produces stronger audit evidence too: by L5, every decision has a reviewable rationale on file.
Six dimensions, one grade. Each fix maps to a skill that closes the gap.
/fp-context-score alias: /fp-repo-quality Top-3 ranked fixes, each tied to a skill. Read-only.
fastpace context-score alias: fastpace repo-quality Deterministic, no LLM call. Drop into CI.
--explain --json --debug ⚡ fastpace repo quality · grade B (74) ✓ doc inventory 88 A (7/9 files present, glossary thin) ✓ why-density 71 B (18% of comments explain why; target 25%) ! decision links 42 D (0.4 refs/kLOC — sparse) ✓ docstring richness 79 B (61/77 exports rich) ! vocabulary 55 C (11/20 top terms in glossary) ✓ freshness 92 A weighted total: 74 / 100 · grade B top-3 fixes (impact / effort) 1 ▸ +6 pts · /fp-teach glossary — define 9 missing top-terms (~20 min) 2 ▸ +5 pts · /fp-write-adr — capture 3 large untracked calls (~45 min) 3 ▸ +3 pts · docstring sweep — src/billing/ · 9 of 11 exports bare (~30 min)
No more shuffling artifacts between Confluence, Jira, Slack, slide decks, GRC tools, and audit binders. Every team — from product to compliance — works against the same git-backed source of truth. Committable, reviewable, audit-ready.
/fp-write-prd fastpace ui /fp-prd-to-erd /fp-write-adr /fp-new-feature /fp-review-pr /fp-remember /fp-status-report fastpace ui /fp-write-adr /fp-extract-learnings /fp-review-pr /fp-write-adr fastpace why /fp-write-adr /fp-extract-learnings audit.log /fp-search fastpace why fastpace snapshot A customer install is more than a CLI. Each portal answers a different buyer's question and runs in a different trust boundary. The signed audit chain is the invariant connecting them.
Real terminal emulator. Type fastpace commands, see live-shape output. 60-second test-drive.
Per-install dashboard. 56 views across identity, audit chain, manifests, agents, exceptions, ROI, maturity. Live SSE updates.
Standalone Node server. Ingests signed audit summaries from every install, rolls up by repo / team / org. Never sees plaintext code.
Buyer-facing posture page per customer. Attestations, sub-processors, threat model, evidence-request flow. Opt-in publication.
14 reference pages: CLI, primitives, audit schema, hooks, framework mapping, threat model, runbooks. Single-source-of-truth markdown.
Whichever team you're on, the repo is your surface. Tab between Product and DevOps / SRE deep-dives below — and see the dedicated Security & Compliance section further down for the GRC angle.
Stop guessing. Stop pinging engineers for context. Stop writing PRDs in a vacuum. fastpace gives product folks direct, terminal-grade access to the same truth engineers see — no special tools, no permission slips, no waiting.
/fp-ask Slacking three engineers to find out how something works today.
$/fp-ask "how does our checkout retry logic work today?"› checked fastpace/context/architecture.md› checked fastpace/context/decisions.md Retries live in `processWithRetry()` (src/checkout/retry.js).3 attempts, exponential backoff (1s · 2s · 4s).Decision 2025-02-14: don't retry on 4xx errors. sources: retry.js · decisions.md:L42
/fp-write-prd PRDs that assume capabilities the codebase doesn't have — then bounce on review.
$/fp-write-prd partial-refunds› cross-referencing existing payments code› checking decisions.md for refund precedents Q: who hurts today?A: support agents — manual refunds take 8 minQ: success metric?A: 80% of partial refunds self-serve ✓ wrote fastpace/docs/prd/partial-refunds.md! flagged 2 conflicts with the existing capture flow
fastpace why "Why does the cart timeout after 15 minutes?" — answer buried in someone's head.
$fastpace why src/cart/session.js:42› traced through git log, ADRs, decisions.md PRDcart-abandonment-recovery · 2024-08-12ERDcart-session-designADR0004-15min-cart-timeoutCOMMITabc123 · PR #847 reason: avoid orphaned sessions blocking inventory
Already wrote the PRD? Pair with /fp-prd-to-erd to hand it to engineering — they'll get a contract-grade ERD in one step, with your acceptance criteria preserved.
Stop hand-writing runbooks nobody reads. Stop chasing "why is it configured this way" across Slack scrollbacks. fastpace turns deploy decisions, post-mortems, and policy changes into reviewable, traceable git artifacts.
/fp-write-adr We migrated ECS to Fargate last quarter — nobody fully remembers why.
$/fp-write-adr fargate-migration› cross-referencing infra/ for current config› checking decisions.md for prior infra choices Q: what changed?A: ECS-on-EC2 → FargateQ: why?A: ops burden of patching AMIsQ: cost impact?A: +12% (acceptable) ✓ wrote fastpace/docs/adr/0019-fargate-migration.md
/fp-extract-learnings Each incident produces a doc nobody reads. Same mistake six months later.
$/fp-extract-learnings incident-2026-04-12› reading post-mortem from docs/incidents/› extracting reversals, surprises, workarounds redis cluster failover takes 90s, not 30salarm thresholds were calibrated for old trafficTTLs on hot keys must be staggered ✓ appended 3 entries to fastpace/context/learnings.mdstatus: unreviewed · triage in fastpace ui
fastpace why Who tweaked the rate limiter at 3am Tuesday — and why?
$fastpace why infra/rate-limit.yaml› traced through git log, ADRs, decisions.md PRDrate-limit-endpointsERDrate-limit-designADR0011-token-bucketCOMMIT8a7f3 · PR #912 reason: throttle abusive scrapers without blocking legit traffic
Pair with /fp-doctor to verify install health on every host, or
fastpace status to summarize what's in flight before standup.
fastpace is in design-partner phase. References are by request only, under NDA — no public logo wall, no fabricated stats, no testimonials we didn't earn. The trust we offer is the score-pause guarantee, not someone else's logo.
We don't list customer names we don't have. The only way you find out who else uses fastpace is to ask, sign an NDA, and we'll connect you to a reference.
We won't tell you "47% faster" or "1,200 engineers" until that's real and audited. The metric we promise to move — your domain-context score — is one you measure yourself.
Every guardrail change is approved by you and logged to the hash-chained audit log. We will not silently weaken your audit signal — and you can verify it with a single command.
Every claim below pairs a publicly cited 2026 CISO concern with the fastpace primitive that closes it — and the framework control it satisfies.
Every fastpace agent has a declared identity, a bounded scope, and a circuit breaker on behavioral divergence.
Pre-prompt redaction strips secrets, PII, and tagged-sensitive content before any prompt leaves the box.
fastpace announces itself to your discovery stack with a manifest at a well-known path. No shadow AI by construction.
fastpace pairs deterministic Layer 1 controls (redaction, scope, blast-radius limits) with Layer 2 behavioral baselines and circuit breakers — so detection isn't the only line of defense.
Spec-driven dev usually stops at the spec. fastpace doesn't. PRDs become engineering designs (ERDs); ERDs become execution plans of waves, epics, and stories — grounded in your architecture, decisions, and patterns. Every artifact is a reviewable file in your repo, not a ticket in a separate tool. Tab through the steps.
Architectural pattern The lifecycle implements Plan-Then-Execute — tool calls are planned (PRD → ERD → execution-plan) before any agent is exposed to untrusted content during implementation. Specialist subagents (planner, reviewer, erd-guru) operate as Dual-LLM-shaped: a privileged coordinator orchestrates scoped specialists in fresh contexts.
PRD.md· ERD.md· execution-plan.json· watch-cards/· audit.log· status-reports/
Most PRDs get written in a vacuum — assumptions about what exists, vague success metrics,
no awareness of conflicting prior decisions. /fp-write-prd
runs a structured interview, then cross-references every
answer against the repo before writing the artifact.
/fp-write-prd credit-card-validation fastpace/docs/prd/credit-card-validation.md credit-card-validation.md · status draft /fp-prd-to-erd reads the PRD and your fastpace/context/.
The ERD that comes out already knows your decisions, your patterns, your domain terms.
decisions.md architecture.md POST /api/cart/submit · Express middleware chain.patterns.md withRetry(fn, { tries: 3, base: 200 })glossary.md POST /api/cart/submit pre-validates with validateCard(pan, month, year, cvc).
from architecture.md withRetry(fn, { tries: 3, base: 200 }).
from patterns.md cc_client_validation. Default off./fp-prd-to-erd credit-card-validationfastpace/docs/erd/credit-card-validation.md · 4 context files consulted /fp-erd-to-execplan breaks an ERD into waves, epics, and stories — but
sized by your architecture, patterns, learnings, and prior plans. Not generic estimates.
POST /api/cart/submit with validateCard(…)architecture.md @core/http for retries.patterns.md learnings.md exec-plans/prior.json /fp-erd-to-execplan credit-card-validationfastpace/exec-plans/credit-card-validation.json · opens in fastpace ui to assign names & track progressDomain context and spec is the new code Lock in the what and the why before any code gets written.
1 ⚡ planning problem: pasting card numbers is error-prone user: logged-in shoppers at checkout goal: reject invalid cards before submit ✓ approve planning? yes
2 ⚡ spec drafting fastpace/docs/erd/cc-validation.md… • contract: validateCard(pan, month, year, cvc) • data model: no schema change • security: no PAN logged; CVC never stored • acceptance: luhn pass, expiry future, cvc 3-4 digits ✓ approve spec? yes
3 ⚡ write tests
writing 14 failing tests in tests/cards.test.ts… ◐ phase 4 · implementing 0%
↳ state saved · watch-cards/credit-card-validation.json watch-cards/ — resume any time Start working on a feature. Close your laptop. Come back tomorrow. State is saved after every phase — branch name, base branch, risk class, completed phases — so any AI or any engineer can reconstruct the full context in flight.
fastpace/watch-cards/<feature>.json — Claude rehydrates the full state from this card.
fastpace reads your PRDs, ERDs, execution plans, git history, and in-flight features — then generates a structured report for leadership in seconds. Pick a period, an audience, the sections you want, and hit one button.
Configure the period and audience, pick what to include, then generate.
docs/status-reports/
Reports save as committable markdown in fastpace/docs/status-reports/ —
the team gets a permanent version-controlled record.
83% of CISOs are concerned about autonomous agent misuse. fastpace answers with four primitives mapped to the three security-architecture principles governing AI agents — identity and inventory (well-defined human controllers), scope (power limitations), and observability (auditable actions). All deterministic Layer 1 controls — built into the runtime, not retrofitted on top.
Every fastpace agent declares what it can do. Nothing implicit. Nothing ambient.
Blast-radius limits per session. Circuit breaker on behavioral divergence.
One command lists every agent, runtime, and identity on this machine.
Every action and approval lands in a hash-chained, signed audit log. Tamper-evident by construction.
Every fastpace install writes a discovery manifest at two well-known paths — one per machine, one per repo. CrowdStrike, Wiz, and Beyond Identity scans walk those paths and find every install. No agent crawler. No laptop-scraping. No shadow AI.
~/.fastpace/manifest.json rolls up every repo on the host.
<repo>/fastpace/manifest.json declares what's wired into that repo —
agents, hooks, runtimes, MCP servers, skills, integrations.
fastpace inventory aggregates across repos with provenance.
--json for machine output. Pipe it into your SIEM, or call it from a discovery scan.
Every manifest carries the install's Ed25519 fingerprint. Forge-resistant proof of which install wrote which row — the substrate F1.12 sanctioned-install attestation builds on.
NIST AI RMF · MAP-1.1 ISO/IEC 42001 · §7.4 SOC 2 · CC1.4 / CC8.1 GDPR · Art. 30
$ fastpace inventory install 3b63e2d3d7f44635 sha256:3b63e2d3…ccd7f3c7e38a9d78 machine acme-mbp-117 · version 0.4.0 last refresh 2026-04-29T02:50:38Z REPOS (2) acme-api /Users/d/work/acme-api 7 agents · 15 hooks · 14 skills · 2 runtimes · last activity 2026-04-29 acme-billing /Users/d/work/acme-billing 7 agents · 15 hooks · 14 skills · 2 runtimes · last activity 2026-04-28 AGENTS (7) doc-writer · erd-guru · execution-planner · onboarder · planner · prd-guru · reviewer RUNTIMES (2) bedrock-claude-opus-4.7 vertex-* HOOKS (15) on runtime-guard on audit-logger on dangerous-command-guard on secret-scanner … 11 more MCP SERVERS (3) jira · linear · github INTEGRATIONS (1) jira · issue-tracker
fastpace snapshot --since 2026-01-01 bundles the full
audit dossier into a single .tar.gz: every ADR, the
hash-chained audit log, the per-call run manifests, the discovery
manifest, and the framework-mapping doc. Auditors self-serve.
Engineers don't have to be in the room.
$ fastpace snapshot --since 2026-01-01 BUNDLING context 7 files · 12 KB ADRs 23 decisions · 84 KB audit log 1,847 entries · hash-chain valid manifests 412 receipts · all signed discovery 2 repos · 4.2 KB framework map 42 controls · 6 frameworks AI-BOM v3 · CycloneDX-AI · 412 calls · score 87 ✓ snapshot.acme-api.2026-04-29-10h17.2c8a4f.tar.gz (1.6 MB) VERIFY fastpace verify ✓ chain integrity: 1,847 entries ✓ signatures verified 1,847 fastpace verify-provenance 2c8a4f ✓ commit · trailers · manifest · signature · audit-link signed by sha256:3b63e2d3d7f44635…
Hand over the snapshot + the public key. They run fastpace verify
on their machine and confirm tamper-evidence themselves.
Every AI invocation writes a signed manifest with model · endpoint · training-opt-out · prompt-hash · response-hash. Plaintext never leaves the box — only sha256 digests.
NIST AI RMF · ISO/IEC 42001 · EU AI Act · SOC 2 · ISO 27001 · GDPR controls cross-referenced to the primitive that satisfies each, with an evidence link per row.
AI-attributed commits carry AI-Model:, AI-Manifest-Id:,
AI-Approver: trailers. fastpace verify-provenance <sha>
walks commit → trailers → F1.1 manifest → manifest signature → F0.2
audit-chain link and reports per-layer status. Five layers, all
tamper-evident.
One signed CycloneDX-AI envelope per release at
fastpace/aibom/<tag>-<ts>.json aggregating every
runtime invoked, training-opt-out status, total prompts, redaction
events, correction events, AI-attributed commits, and the reliability
score. The artifact for AI software supply chain.
Snapshot filename carries the git SHA + ISO timestamp.
Re-run with the same --since later and diff the bundles.
NIST AI RMF · MEASURE-2.7 ISO/IEC 42001 · §9.2 EU AI Act · Art. 12 SOC 2 · CC8.1
The 94% of CISOs who chose "safe enablement" over "block everything" meant: fastpace must give developers a path forward when a guardrail fires, not a wall. Here's the four-step path that ships in 0.8.0.
Each agent's identity manifest declares max_files,
max_commands, max_tokens, max_duration_seconds.
Per-session counters live at fastpace/.agent-sessions/.
The agent-scope-guard hook pauses on the call that would exceed
any cap.
$ # 41st file read this session [fastpace] agent "reviewer" denied: max_files exceeded (40 >= 40)
F1.3 circuit breaker reads the prior 14 days of audit-chain
entries, computes the average shape of a session for this agent, and pauses
when the current session diverges by 2.5× on any of files /
commands / duration. Refuses to fire below 3 sample sessions to avoid
new-install false positives.
$ fastpace agents log --agent reviewer --since 24h ! divergence: files is 3.2× baseline (current=16, baseline_mean=5.0) ⏸ session paused — awaiting human approval
Every block emits a structured coaching message with the exact
fastpace exception request command pre-filled for the
tool / path / agent. F1.9 is the answer to "blocked walls erode
trust" — the developer always knows what to do next.
[fastpace coach] What you can do: • Adjust the agent's scope: `fastpace grant max-files reviewer 80 --reason "..."` • Request a time-boxed exception: fastpace exception request --tool Read --agent reviewer \ --reason "investigating prod incident" --ttl 60
Per CISO 01: avoid prompt fatigue. Risk tiers low
(auto-pass), medium (self-approve), critical /
irreversible / exfil_eligible (named reviewer required). Every
exception writes a signed entry to the F0.2 audit chain, has a
mandatory TTL, and shows up in fastpace exception list.
The exception itself is the audit record.
$ fastpace exception list --json { "id": "a14b2c", "granted_at": "2026-04-29T14:21:08Z", "expires_at": "2026-04-29T15:21:08Z", "risk_tier": "medium", "reviewer": "self", "agent": "reviewer", "reason": "investigating prod incident" }
NIST AI RMF · MEASURE-2.6 / MANAGE-2.4 ISO/IEC 42001 · §9.1 EU AI Act · Art. 14 (human oversight) SOC 2 · CC8.1
Every time a developer edits AI-authored code, fastpace records a correction event — classified by severity (cosmetic / functional / security), tied to the agent that wrote the original, signed into the F0.2 audit chain. The events roll up into the AI reliability score — a single number, 0–100, that drops when the AI is making mistakes.
$ fastpace reliability score score 87 / 100 window 30 days AI lines 12,420 corrections 102 events · 1,623 lines BY SEVERITY cosmetic 41 functional 58 security 3 ← review the security column BY AGENT reviewer 64 planner 27 doc-writer 11 TOP FILES 18 src/auth/session.ts 14 src/billing/charge.ts 9 src/api/webhooks.ts
Every correction event signs into fastpace/audit.log
the same way an AI tool call does. The score has tamper-evident lineage.
Rotate the F0.1 key and old corrections still verify against the archive.
security fires when the changed text touches a sensitive
token (password, secret, api_key, token, eval, child_process, exec).
cosmetic requires every changed line to be whitespace,
comment, or import only. Everything else is functional.
Auditor-readable rule, no ML.
If reviewer generates 60% of the corrections,
fastpace grant the right scope or rewrite the agent's
prompt. The metric is actionable, not just a dashboard pretty-printer.
Score returns null when there's no AI authorship in
the window — no AI calls, no number to print. Fastpace doesn't fabricate
a score from nothing.
NIST AI RMF · MEASURE-2.5 / MEASURE-3.2 ISO/IEC 42001 · §9.1 (performance evaluation) EU AI Act · Art. 15 (accuracy + robustness)
Dev-hours saved, AI-call cost, ROI ratio — derived from the same
signed run manifests fastpace
already writes for every AI call. Per repo, per agent, per runtime.
Falls back to a clearly labeled
source: sample dataset until your
install has accumulated meaningful telemetry; flips to
source: measured automatically.
$ fastpace roi report source: sample — this install has < 3 run manifests in window. Showing illustrative dataset. ROI ratio 6.5× every $1 of AI-call spend returns $6.50 in dev-hours saved DEV-HOURS SAVED hours saved from calls 214 hours saved from audit 8 total hours 222 blended rate $150 / hour dollars saved $33,300 AI-CALL COST calls 1,184 tokens 4,200,000 (2,810,000 in / 1,390,000 out) total cost $5,110 by runtime bedrock-claude-opus-4.7 942 calls $4,820 bedrock-claude-sonnet-4.6 218 calls $290 bedrock-claude-haiku-4.5 24 calls $8 PER REPO acme-api 8.1× · saved $14,200 · spent $1,750 acme-web 5.4× · saved $9,400 · spent $1,740 acme-infra 4.9× · saved $6,200 · spent $1,260 acme-data 3.0× · saved $2,300 · spent $360
The cost numerator is the
F1.1 run manifest —
every AI call writes a signed receipt with model, runtime, and
input/output token counts. Pricing comes from an org-configured
table at fastpace/budgets/policy.json > pricing.
2 / 6 / 12 minutes saved per call by response complexity, plus
audit-prep hours saved per quarter (org-configurable). No ML — the
multiplier is stable, written down in
src/roi.js, and visible in the JSON output.
Until you have ≥ 3 run manifests in window, the dashboard
surfaces a clearly tagged illustrative dataset and switches to
source: measured automatically.
The master roadmap forbids the alternative — the failure mode
is fabricating ROI numbers customers can't trust.
@fastpace-ai/org-dashboard aggregates per-repo ROI
into a fleet view at /api/org/roi, with team-level
breakdowns when the agents → team mapping is configured.
Try it without installing →
type fastpace roi report in the sandbox
Configured in fastpace.config.yaml. Safe defaults out of the box.
fastpace will never silently weaken a guardrail — every change is approved by you and logged to fastpace/audit.log.
Stop being the tax. fastpace gives security, risk, and compliance teams a continuous, reviewable audit trail — every decision, every commit, every approval — already in the repo. Auditors love this.
fastpace search "Show me how data deletion meets GDPR Article 17" — week of digging.
$fastpace search "GDPR" 4 hits across 3 files:decisions.md:L17 — "data deletion within 30d (Art. 17)"docs/adr/0014-soft-delete.md:L8 — "supports right-to-be-forgotten"docs/adr/0023-pii-encryption.md:L4 — "GDPR-compliant at-rest"learnings.md:L41 — "legacy logs retained beyond 30d"
/fp-write-adr Security review surfaced a policy violation — but the policy lives in a Confluence page nobody reads.
$/fp-write-adr no-pii-in-logs› cross-referencing existing logging code Q: policy?A: PII fields must be redacted before loggingQ: scope?A: all services, all log levelsQ: enforcement?A: lint rule + code review ✓ wrote fastpace/docs/adr/0027-no-pii-in-logs.md✓ added guardrail entry to fastpace.config.yaml
fastpace snapshot Annual audit asks for full change history — pulling it from Jira + Slack + git takes weeks.
$fastpace snapshot --since 2025-04-01 --output evidence.tar › packaging fastpace/docs/adr/ (47 ADRs)› packaging fastpace/audit.log (12,847 entries)› packaging fastpace/context/decisions.md (89 decisions)› packaging git log + commit signatures ✓ wrote evidence.tar (12.4 MB)ready for SOC 2 · ISO 27001 · GDPR audits
Compliance frameworks supported by the audit trail: SOC 2,
ISO 27001, HIPAA,
GDPR, PCI-DSS.
Pair with /fp-review-pr to enforce policies on every change.
Built into the product, not retrofitted onto it. Every fastpace primitive maps to a control in the frameworks the 2026 audit cycle is centered on — including the three new AI-specific ones.
| Capability | AI-specific | Traditional infosec | ||||
|---|---|---|---|---|---|---|
| NIST AI RMF | ISO/IEC 42001 | EU AI Act | SOC 2 | ISO 27001 | HIPAA | |
| Discovery manifest | GOVERN-1.6 | §7.4 | Art. 12 | CC6.1 | A.5.9 | §164.308 |
| Agent identity & scope | GOVERN-3.2 | §6.1.4 | Art. 14 | CC6.6 | A.5.16 | §164.312 |
| Hash-chained audit log | MEASURE-3.1 | §9.2 | Art. 12 | CC7.2 | A.8.15 | §164.312(b) |
| Run manifest signing | MEASURE-2.7 | §8.5 | Art. 12 | CC8.1 | A.8.34 | §164.312(c) |
| Prompt redaction | MEASURE-2.10 | §8.3 | Art. 10 | CC6.7 | A.8.11 | §164.308(a)(4) |
| ADRs & decision ledger | GOVERN-1.4 | §7.5 | Art. 11 | CC8.1 | A.8.32 | §164.316(b) |
| Evidence snapshots | MEASURE-3.1 | §9.3 | Art. 11 | CC2.2 | A.5.32 | §164.316(b)(2) |
| NHI inventory export | GOVERN-1.6 | §7.4 | — | CC6.2 | A.5.16 | §164.308(a)(3) |
24 / 48 cells (50%) validated against the published framework text on 2026-05-03 — NIST AI RMF 1.0, EU AI Act (Regulation 2024/1689), and HIPAA Security Rule.
Cells marked • (ISO/IEC 42001, SOC 2, ISO 27001) remain illustrative pending validation against those paid standards. Specific requirements vary by audit firm, scope, and jurisdiction — confirm exact mappings with your auditor.
Beyond the CLI that lands in every developer's repo, fastpace ships two standalone surfaces — one customer-facing, one self-hosted. Each is its own npm package, deployable independently, and reuses the same signed-artifact substrate so trust never has to be re-established.
@fastpace-ai/trust-portal
Self-serve security posture. The page a CISO bookmarks once their procurement team starts an evaluation. Artifact-driven — attestations, sub-processors, and questionnaires live in version-controlled JSON so every change has a git history a procurement reviewer can audit.
THREAT-MODEL.md.npm install -g @fastpace-ai/trust-portal deploy on any static host (Cloudflare Pages, Vercel, Netlify, S3+CloudFront, your own NGINX) fastpace-org binary
Aggregate signed audit summaries across every fastpace install in your org. Stays inside your firewall — fastpace doesn't operate a SaaS for your fleet data. The same Ed25519 identity that signs per-repo audit chains signs the summary that lands here.
install_id → public key).npm install -g @fastpace-ai/org-dashboard terminate TLS at your reverse proxy; trusted-keys via Vault / AWS Secrets Manager / sops
Both packages depend on @fastpace-ai/fp via npm workspaces.
No new runtime deps — the trust portal adds Astro as a build-time
dep only, the org dashboard runs on Node http with zero external
dependencies.
Free of vendor dependence Committed to git. Works with any LLM runtime.
Business rules, ADRs, patterns, lessons — all plain markdown. Any AI runtime rehydrates instantly.
git cloneClick any file on the right to preview what the AI sees.
/fp-remember, or let it grow
organically as you use fastpace.
Markdown-defined skills the AI invokes contextually — every step of the
lifecycle gets a /fp-* command.
Click any tile.
A handful of focused commands that make the daily loop faster —
each one paired with a /fp-* skill so the same thing is one step
away inside Claude Code.
Hover a command to see details.
fastpace snapshot Bundles fastpace/ with the git SHA + branch in the filename. Excludes integrations secrets and rejected-learning archives. Hand it to an auditor, attach it to an issue, snapshot the change-management evidence in one command.
⚡ snapshot --since 2026-01-01
✓ wrote fastpace-snapshot-2026-04-24-a1b2c3d4.tar.gz
· git sha: a1b2c3d4…
· branch: feat/credit-card-validation
· files: ADRs, decisions.md, audit.log, manifests/
· size: 18.2KB fastpace search <query> /fp-search Instant, local full-text search across fastpace/context/, docs/, ADRs, exec-plans, and audit.log. No AI. Ranked file:line hits with 3-line context + term highlighting. The "show me how X meets control Y" answer in one command.
⚡ search "GDPR" · 4 hit(s)
fastpace/context/decisions.md:17 [context]
│ ## 2025-03-02 — Data deletion within 30d (Art. 17)
fastpace/docs/adr/0014-soft-delete.md:8 [adr]
│ supports right-to-be-forgotten fastpace why <path>[:line] /fp-why Traces a file back to the PRD/ERD/ADR/pattern/plan that touched it, plus the introducing commit + recent changes. Richer than git blame — grounded in your fastpace brain. Provenance answer for "why does this code exist?"
⚡ why src/handlers/checkout.ts:62
ERDs reference this
fastpace/docs/erd/credit-card-validation.md Credit card validation
Decisions touching the module
fastpace/context/decisions.md:14 ## 2025-02-14 — No ORM in handlers
Git history
introduced: 9c1a3f2 2025-02-10 priya · feat(checkout): wire card validator fastpace doctor /fp-doctor Checks Node version, config parseability, .claude install completeness, hook permissions, foundation context files, orphan watch cards, .gitignore posture. Reports pass / warn / fail with a concrete fix command per issue.
⚡ doctor · 9 ok · 1 warn · 0 fail
✓ fastpace.config.yaml parsed ok
✓ .claude/settings.json valid
! context/ foundation 4/7 present — missing: glossary.md, patterns.md
→ fix: run /fp-discover in Claude Code
✓ watch cards 3 tracked fastpace resume [slug] /fp-resume Prints a watch card's phase progress, branch diff vs base, next approval required, and the exact /fp-new-feature command to paste into Claude Code. Kills the 'where was I?' moment.
⚡ resume credit-card-validation
Credit card validation
feat/credit-card-validation → main · updated 2h ago
✓ planning ✓ spec ✓ write-tests ▸ implement tests docs PR push
████████████░░░░░░░░░░░░░░░░░ 3 of 8 · 37%
resume in Claude Code:
/fp-new-feature credit-card-validation fastpace validate /fp-validate Catches missing required sections, empty Security blocks, dead ADR links, stories > 16h, stories without acceptance criteria, and glossary casing drift. Exit 1 so CI gates merges.
⚡ validate · 2 error(s) · 1 warn(s)
✗ fastpace/docs/erd/oidc-migration.md [erd-sections]
ERD missing required section(s): security, acceptance criteria
→ fix: add "## Security" (and the others) — see /fp-write-erd
! fastpace/docs/erd/cc-validation.md [erd-adr-link]
references ADR 0012 which was not found fastpace pr-summary /fp-pr-summary Generates a grounded PR description (Summary · Linked artifacts · Acceptance · Security · Rollout · Changes) from the ERD and `git log`. Pipes straight into gh — never invents acceptance criteria.
## Summary
Client-side card validation to drop the 12% of checkouts
rejected by the processor as invalid.
## Linked artifacts
- ERD: `fastpace/docs/erd/credit-card-validation.md`
## Acceptance
- [ ] luhn checksum passes
- [ ] expiry in the future Skills sit on top of three primitives that ship with fastpace: agents (subagents that handle specialist work), hooks (local interceptors on every tool call), and guardrails (project-wide policies). Tab through to see each.
Each agent runs in a fresh context with a tight scope and minimal tool access.
plannerTurns a goal into a numbered plan.
reviewerReviews diffs vs. architecture and decisions.
prd-guruInterviews you and drafts a PRD.
erd-guruTranslates PRDs into ERDs.
execution-plannerWaves → epics → stories.
doc-writerUpdates docs without noise.
Pre-use hooks block the call before it runs. Post-use hooks observe and log. Each hook is also tagged by intent — audit & safety or velocity — so the compliance story stays legible.
secret-scanner audit & safety Blocks writes containing AWS keys, tokens, private keys, or Stripe secrets.
push-guard audit & safety Refuses force-push to protected branches. Refuses auto-push when disabled.
dangerous-command-guard audit & safety Blocks rm -rf /, git reset --hard, curl | sh, and a dozen other footguns.
commit-validator velocity Enforces conventional commit format (configurable).
branch-guard audit & safety Prevents commits directly to main/master or other protected branches.
dependency-alert audit & safety Alerts on new npm deps outside your approved scopes. Block or warn.
audit-logger audit & safety Appends every tool use to fastpace/audit.log — hash-chained for tamper evidence.
Configured in fastpace.config.yaml. Safe defaults out of the box.
fastpace will never silently weaken a guardrail — every change is approved by you and logged to fastpace/audit.log.
fastpace ui opens a 100% local dashboard with seven sidebar groups.
Each group is a column of work fastpace already does for you — no separate tool, no SaaS.
Click into the demo below to walk every panel; here's the inventory.
live Every metric below auto-updates as your team uses fastpace. Local reads are real-time; fleet rollups push every 5 min via F3.11 audit replication; webhooks fire instantly on hook events. No separate metrics pipeline — the data plane is the audit plane.
Tamper-evident evidence for every AI call, every commit, every session.
Numbers — not vibes — for whether the AI's getting better or worse.
Every agent declares what it can do — and the runtime enforces it.
Discoverable from day one — every install, every runtime, every key.
Roll fastpace across the org without losing per-repo autonomy.
PRDs, ERDs, ADRs, plans — versioned in your repo, not a separate tool.
100% local. Zero telemetry. Air-gap optional.
Source of truth: every capability above maps to a module in
packages/fp/src/ and a sidebar view in
packages/dashboard/. The numbered F-IDs trace to the
master roadmap.
Nine industry-standard competencies — Project Setup, Spec-Driven Development, Context Management, Testing, Harness, Architectural Guardrails, Review Maturity, AI SDLC, Prompt Engineering — rolled into one 0–100 score. Auto-updated as your team works: local reads are real-time, fleet rollups push every 5 min, webhooks fire instantly.
The audit plane is the metrics plane. Same primitives that prove
compliance to a CISO produce the velocity metric a CTO puts on a board
slide. fastpace maturity from the CLI, Maturity view
at the top of the local UI sidebar, fleet rollup on the org dashboard, opt-in
publication on trust.fastpace.net.
All 9 sub-scores measured in v0.30 — F4.4 test parity, F4.6 ADR drift,
F4.7 review maturity, F4.8 DORA-by-attribution, and F4.9 prompt effectiveness
shipped this sprint (see packages/fp/assets/docs/ai-native-maturity.md
for the rubric).
fastpace sits between you and your AI runtime. Nothing else changes.
your-repo/
├── .claude/
│ ├── skills/ markdown skills
│ ├── agents/ specialist agents
│ ├── hooks/ pre/post tool hooks
│ └── settings.json wires up hooks
└── fastpace/
├── fastpace.config.yaml
├── context/ domain brain
│ ├── architecture.md
│ ├── decisions.md append-only
│ └── learnings.md append-only
├── docs/
│ ├── prd/ erd/ adr/
│ └── status-reports/
├── exec-plans/ JSON, loads into UI
├── watch-cards/ in-flight state
└── audit.log append-only log /fp-* command loads the skill's markdown from .claude/skills/.fastpace/context/ first — decisions, patterns, glossary, learnings.audit.log.fastpace verify to walk the chain — tamper-evident by construction. NIST AI RMF MEASURE-2.7. Each repo gets its own 100% local UI.
Run fastpace ui inside any repo — a Node HTTP server boots on
localhost and opens a dashboard scoped to that project. Browse
the audit log, ADR ledger, decisions, and exception queue without leaving
the local UI. Zero cloud. Zero telemetry. Your code never leaves the machine.
Every feature started with /fp-new-feature persists to fastpace/watch-cards/.
Today — checkout-svc · L4
credit-card-validation — it's on phase implement.git commit2msrc/config.ts14mF4.12 — auto-updates as your team works. Local reads real-time; fleet pushes every 5 min via F3.11 audit replication.
Project metadata and guardrails · fastpace/fastpace.config.yaml
Pre-use hooks block; post-use hooks observe and log.
Who signs off on each phase of /fp-new-feature.
The team brain — plain markdown, committed to git.
Checkout service — layered REST with api/cart owning submit. Postgres 15 · Redis for sessions.
POST /api/cart/submit · POST /api/cart/validate
Six-dimension domain-context score. Locally computed.
/fp-teach glossarydefine 9 missing top-terms/fp-write-adrcapture 3 large untracked callsProduct requirements. Author with /fp-write-prd.
Engineering designs. Generate with /fp-prd-to-erd.
Architectural decisions · append-only history.
4×4 structure, grounded in artifacts.
Waves → epics → stories · critical path computed.
Sync execution plans to Jira or Linear. Secrets stay in fastpace/.integrations.local.json (gitignored).
ENG-100 Sync → Feeds /fp-status-report.
Computed from this repo's git history. No cloud calls.
Every entry lives in fastpace/context/learnings.md.
feat/rate-limitsWhat's installed, what's expected.
.claude/skills/.claude/agents/settings.jsonfastpace update to refreshF0.1 — Ed25519. Generated locally. Private key at ~/.fastpace/identity/private.pem with mode 0o600.
Tamper-evident by construction. fastpace verify walks the chain in seconds.
$ fastpace verify [ok] chain integrity: 1247 entries signatures verified 1247 unsigned entries 0 last entry seq 1246 ts 2026-04-30T14:21:08Z tool · phase Read · PostToolUse summary {"file_path":"src/auth/session.ts","agent":"reviewer"} entry hash a14b2c8f3d9e7c2a1b4f...
F1.1 — one signed receipt per AI tool call. Hashes only — never plaintext.
F2.1 — measure when AI is wrong. Every human edit to AI-authored code is a correction event.
F2.4 — CycloneDX-AI flavored. Goes into a regulated software supply chain alongside SBOMs.
F2.3 — every AI commit carries Fp-* trailers binding it to a manifest, agent, prompt hash. Five-layer verify in seconds.
$ fastpace verify-provenance HEAD [ok] commit a8f3c2b9 feat(billing): add idempotency keys [ok] trailers Fp-Run-Manifest, AI-Model, AI-Agent, AI-Prompt-Hash [ok] manifest 2026-04-30T14-21-08Z-a3b8c1.json [ok] signature verified against install fingerprint [ok] audit-link manifest_id present in audit chain at seq 1198 [ok] explanation retrieval context + approval chain present 5/5 layers verified.
F1.13 — fleet view across every repo on the org dashboard. Pulls signed audit summaries every 5 min via F3.11 replication; signature-verified at ingest using the F1.14 SAML envelope.
F1.13 — @fastpace-ai/org-dashboard standalone binary. Self-hosted aggregator: ingests signed audit shards from every install, verifies them against the org SAML envelope, computes per-repo / per-team / per-org rollups. No cloud.
$ fastpace-org-dashboard --port 8443 --store ./fp-org-store [ok] ingest endpoint POST /api/org/ingest [ok] rollup endpoint GET /api/org/rollup [ok] maturity endpoint GET /api/org/maturity [ok] baselines endpoint GET /api/org/baselines [ok] SAML envelope verified · 14 installs · 7 teams [ok] last ingest 2026-05-01T17:08:42Z · checkout-svc · 12 entries [ok] serving on https://0.0.0.0:8443
{
"ok": true,
"repo_count": 14,
"maturity": {
"aggregate": 68,
"reporting_repos": 14,
"total_repos": 14,
"status": "measured",
"sub_scores": [
{ "fId": "F4.1", "label": "Project Setup", "pct": 84, "reporting_repos": 14 },
{ "fId": "F4.2", "label": "Spec-Driven Development", "pct": 71, "reporting_repos": 14 },
{ "fId": "F4.3", "label": "Context Management", "pct": 62, "reporting_repos": 14 },
{ "fId": "F4.5", "label": "Harness Engineering", "pct": 76, "reporting_repos": 14 }
]
}
} F2.5 — separate Astro site at trust.fastpace.net built from your signed audit summaries. CISOs self-serve; you stay out of the email loop. Per-customer publication is consent-gated.
fastpace/ bundled into a tarball, delivered via signed URL. Re-uses F1.14 RBAC.This view is part of the live fastpace ui. Click around the sidebar to see the views included in this demo, or run fastpace ui in your own repo to see live data.
…
Every fastpace install ships a local dashboard that runs entirely on your employees' machine — no SaaS in the data path. Pick a persona above to walk only the views that matter to your role.
@fastpace-ai/org-dashboard is a thin Node HTTP server that
ingests signed audit summaries from every fastpace install, verifies
them against your SAML envelope, and rolls them up by repo / team /
org. Deploy it inside your VPC; fastpace.net never sees the data.
Aggregated from signed shards. Each install pushes via F3.11 every 5 min; the dashboard polls + recomputes on ingest.
checkout-svc · 12 audit entries · maturity Δ +138sbilling-api · 7 audit entries · maturity steady2macme-web · 21 audit entries · 1 new exception5mnotifications · circuit breaker tripped on doc-writer14mSortable. Click a repo to drill into its per-shard history, exception queue, and audit-chain offset. (Not interactive in demo.)
| Repo | Team | Maturity | Reliability | AI commits 30d | Last shard |
|---|---|---|---|---|---|
billing-api | payments | 81 | 94 | 312 | 1m |
checkout-svc | payments | 72 | 91 | 284 | 38s |
acme-web | growth | 64 | 87 | 421 | 5m |
notifications | platform | 55 | 72 | 198 | 14m |
internal-tools | infra | 42 | — | 54 | 2h |
| + 9 more · scroll or paginate in live UI | |||||
Team rollups average per-repo maturity weighted by AI activity. Provisioned via SCIM from your IdP.
| Team | Repos | Devs | Maturity | Reliability | Trend (30d) |
|---|---|---|---|---|---|
| payments | 2 | 11 | 76 | 92 | ↑ +4 |
| growth | 3 | 9 | 63 | 87 | ↑ +2 |
| platform | 4 | 14 | 58 | 74 | → 0 |
| infra | 2 | 6 | 44 | — | ↓ -3 |
| data | 1 | 8 | 61 | 89 | ↑ +5 |
| mobile | 1 | 7 | 71 | 90 | ↑ +1 |
| internal | 1 | 7 | 38 | — | ↓ -1 |
Every shard arrives signed. Verify failure → reject without ingest. Last 24h:
[2026-05-01T17:08:42Z] ingest checkout-svc sig ok entries=12 Δ-maturity=+1 [2026-05-01T17:06:11Z] ingest billing-api sig ok entries=7 Δ-maturity= 0 [2026-05-01T17:03:55Z] ingest acme-web sig ok entries=21 Δ-maturity=-1 [2026-05-01T16:54:30Z] ingest notifications sig ok entries=4 Δ-maturity= 0 [2026-05-01T16:54:30Z] alert notifications circuit_breaker tripped (doc-writer +37%) [2026-05-01T16:48:12Z] reject rogue-clone sig MISMATCH envelope=unknown_install [2026-05-01T16:42:06Z] ingest data-pipeline sig ok entries=15 Δ-maturity=+2 [2026-05-01T16:33:51Z] ingest mobile-ios sig ok entries=9 Δ-maturity=+1 [2026-05-01T16:21:18Z] ingest internal-tools sig ok entries=2 Δ-maturity=-1 …
F1.3 — per-agent behavioral baseline averaged across the fleet, weighted by sample size. Repos with too few samples fall back to fleet baseline.
| Agent | Avg edits / session | Avg duration (s) | Avg tokens | Samples |
|---|---|---|---|---|
planner | 0 (read-only) | 184 | 89,400 | 3,124 |
reviewer | 3.2 | 222 | 74,800 | 2,891 |
prd-guru | 1.1 | 318 | 52,300 | 1,408 |
erd-guru | 2.7 | 402 | 68,100 | 1,202 |
execution-planner | 1.8 | 271 | 71,400 | 1,184 |
doc-writer | 4.4 | 156 | 32,800 | 1,932 |
onboarder | 0.6 | 112 | 21,500 | 614 |
Read-only HTTP surface for the dashboard. Same shape as the local UI's /api/*; consumers just point at the org port instead of :7777.
| Method | Path | Returns | Auth |
|---|---|---|---|
POST | /api/org/ingest | ack of received shard | signed envelope |
GET | /api/org/rollup | fleet rollup + per-repo | SAML session |
GET | /api/org/maturity | F4.12 aggregate + sub-scores | SAML session |
GET | /api/org/installs | roster of every reporting install | SAML session |
GET | /api/org/baselines | per-agent fleet baselines | SAML session |
GET | /api/org/summary | single-repo build (dev) | local only |
POST | /api/auth/saml | verify envelope, return role | none |
Plug your IdP's public key in via env. Auto-provisioning via SCIM 2.0; role grants enforced at every endpoint.
Run it locally now: npm install -g @fastpace-ai/org-dashboard
then PORT=4444 fastpace-org. Same surface as this mockup,
reading from a sample store. Production deploys live in your VPC —
we never see the data plane.
A dedicated website for your business at trust.fastpace.net. You
can opt in to publish their org maturity number alongside the standard
attestation roadmap, sub-processor list, threat model, and self-serve
evidence-request flow. Built from signed audit summaries — your
auditor can verify what's on this page came from your install.
fastpace/ bundled into a tarball, delivered via signed URL. Re-uses F1.14 RBAC.
A 0–100 score across nine industry-standard competencies for
AI-native engineering. Auto-updated from this org's signed
audit shards — published here only with explicit consent. Spec
+ rubric: packages/fp/assets/docs/ai-native-maturity.md.
Honest about timing. We will not claim certifications we don't hold. Reports are available under NDA on completion.
| Framework | Status | Target | Note |
|---|---|---|---|
| SOC 2 Type I | in progress | Q3 2026 | Audit initiated; report under NDA on completion. |
| SOC 2 Type II | planned | Q1 2027 | Follows successful Type I + 6 months operating period. |
| ISO 27001 | planned | Q2 2027 | Stage 1 + Stage 2 audit. |
| ISO 42001 | planned | Q4 2027 | AI management system attestation. |
| NIST AI RMF | self-attested | — | Mapping at /framework-mapping. |
| EU AI Act | self-attested | — | Article-level mapping in framework doc. |
The complete list of third parties that touch fastpace data. Pass-through providers (model runtimes) are governed by your direct contract with them, not fastpace.
| Vendor | Purpose | Region | Status |
|---|---|---|---|
| GitHub | Source code repository for the open-source project. fastpace itself does not transit customer code through GitHub. | US | active |
| Cloudflare | DNS + static asset delivery for fastpace.net marketing site. | Global edge | active |
| Anthropic | Pass-through. fastpace mediates the developer's direct call to Claude; data flows are governed by the developer's own contract with Anthropic. | n/a | pass-through |
| OpenAI | Pass-through. Same as above for GPT. | n/a | pass-through |
| Pass-through. Same for Gemini / Vertex. | n/a | pass-through |
Walked against every shipped fastpace primitive. Full doc: THREAT-MODEL.md in the open-source repo.
Self-serve. Re-uses F1.14 RBAC + F1.13 org dashboard auth. Signs in via your IdP, request lands in your sales engineer's queue with full audit trail.
The live trust portal lives at trust.fastpace.net. Each customer can opt in to publish their org maturity card alongside the standard rubric — the same data that flows to the org dashboard above, just exposed read-only with explicit consent.
Before pointing it at your real repo, take fastpace for a spin in a throwaway directory. Five minutes, nothing touched outside the sandbox — just enough to feel the flow and decide if it's for you. The hash-chained audit log is on from minute one, even in the sandbox.
--sample writes a tiny demo PRD, ERD, and watch card so the dashboard isn't empty on first launch.
Every file fastpace touches gets recorded in a signed install-manifest. Uninstall reads that manifest and removes only what fastpace itself placed — your own hooks, agents, skills, and settings entries are provably untouched. Pick the scopes you want included; the command composes live below.
fastpace uninstall --all — shorthand for --repo --settings --fastpace-dir--everything / --nuke — shorthand for --all --user-identity (full back-out, double-confirm)--keep-modified — never delete files whose content diverges from what fastpace installed (default under --force)--force-delete-modified — delete modified files anyway (use sparingly)--skip-manifest-verify — proceed even if the manifest signature is invalid (recovery for tampering / corruption). Combine with --dry-run first to inspect. Heads up on --user-identity: this destroys the
F0.1 Ed25519 keypair. Past audit logs signed by that key remain verifiable
only against the archived public key. Run
fastpace identity show --json > identity.json first if you
want a copy for later forensic verification.
Nothing about fastpace phones home. Removing the CLI removes the binary; no server-side state to clean up. The licensing service auto-prunes inactive install_ids after 90 days, on our side — no action needed from you.
Test-drive on day one. Turn on phases as the team gets comfortable — and watch the audit signal compound alongside.
Test-drive, explore, learn.
Plan and review with fastpace.
Full lifecycle, audited.
Discoverable, scoped, attested. Mapped to NIST AI RMF, ISO/IEC 42001, and the EU AI Act.
Test-drive in a sandbox first — no commitment, nothing touched outside a throwaway directory. Works with Claude Code, Codex, Gemini CLI, or OpenCode. Your code never leaves your machine.