Your AI agent is fast. Its output isn't fast to ship.
1
No domain context
The agent doesn't know your bounded contexts, your ADRs, your conventions, or your terminology. So it produces code that compiles but doesn't fit. You spend the saved time rewriting.
2
No spec discipline
"Build the X feature" is the prompt. The agent guesses at requirements. Three days later you discover the missing edge case nobody wrote down.
3
No backlog connection
The agent has no idea this work corresponds to JIRA-4128. So traceability dies. Reviewers can't tell why the change was made. PRs lack context.
Context depth
Better domain context → better code
Every artifact you add to the repo gives the AI runtime better understanding.
Code quality compounds as context layers up — and it all lives in git.
Each tier produces stronger audit evidence too: by L5, every decision has a
reviewable rationale on file.
Code quality →
ExpertHighFairLow
L1 · code only
L2 · + architecture
L3 · + PRD / ERD
L4 · + execution plan
L5 · + ADRs & learnings
code only
+ architecture
+ PRD / ERD
+ execution plan
+ ADRs & learnings
Context depth →
Tier
Context added
What the AI can reason about
L1
Code only
AI ignores business intent, conventions, and history.
L2
+ architecture & patterns
AI follows conventions, but lacks business-domain awareness.
L3
+ PRD / ERD
AI respects acceptance criteria and interface contracts. ↳ ISO/IEC 42001 §8.4 evidence on file
L4
+ execution plan
AI respects phase boundaries and dependency ordering. ↳ phase boundaries = approval checkpoints · EU AI Act Art. 14
L5
+ ADRs & learnings
Complete institutional awareness. AI avoids repeating past mistakes. ↳ ADRs = SOC 2 CC8.1 + NIST AI RMF GOVERN-3.2 evidence
Measure & improve
Track and improve repo quality
Six dimensions, one grade. Each fix maps to a skill that closes the gap.
In Claude Code
/fp-context-scorealias: /fp-repo-quality
Top-3 ranked fixes, each tied to a skill. Read-only.
⚡ fastpace repo quality · grade B (74)✓ doc inventory 88 A (7/9 files present, glossary thin)✓ why-density 71 B (18% of comments explain why; target 25%)! decision links 42 D (0.4 refs/kLOC — sparse)✓ docstring richness 79 B (61/77 exports rich)! vocabulary 55 C (11/20 top terms in glossary)✓ freshness 92 A
weighted total: 74 / 100 · grade Btop-3 fixes (impact / effort)
1 ▸ +6 pts · /fp-teach glossary— define 9 missing top-terms (~20 min)
2 ▸ +5 pts · /fp-write-adr— capture 3 large untracked calls (~45 min)
3 ▸ +3 pts · docstring sweep — src/billing/ · 9 of 11 exports bare (~30 min)
Shared surface
One surface for product, eng, and compliance
No more shuffling artifacts between Confluence, Jira, Slack, slide decks, GRC tools,
and audit binders. Every team — from product to compliance — works against the same
git-backed source of truth. Committable, reviewable, audit-ready.
↳ hover any role to see what they author and read
Product
Write PRDs, not tickets
Draft PRDs with /fp-write-prd
Read status reports in fastpace ui
Set priorities in execution plans
docs/prd/status-reports/
Architects
Approve ERDs and ADRs
Convert PRDs with /fp-prd-to-erd
Record decisions via /fp-write-adr
Curate patterns.md + decisions.md
docs/erd/docs/adr/context/
Developers
Ship features with guardrails
Build features with /fp-new-feature
Review PRs with /fp-review-pr
Capture learnings with /fp-remember
watch-cards/learnings.mdaudit.log
Leaders
See reality, not slideware
Weekly status via /fp-status-report
Track DORA in fastpace ui
Tune guardrails + approval gates
status-reports/metrics.jsonconfig
DevOps
Codify deploys, runbooks, alerts
Capture deploy decisions with /fp-write-adr
Postmortems → learnings via /fp-extract-learnings
Audit who changed what in audit.log
docs/adr/learnings.mdaudit.log
Security
Review every decision
Audit ADRs with /fp-review-pr
Codify policies via /fp-write-adr
Trace a line back to source via fastpace why
docs/adr/audit.logdecisions.md
Risk
Track exposure, mitigations
Log risk decisions with /fp-write-adr
Capture incidents via /fp-extract-learnings
Read the audit trail in audit.log
docs/adr/learnings.mdaudit.log
Compliance
Audit-ready by default
Map controls to ADRs with /fp-search
Trace policy → code via fastpace why
Export evidence with fastpace snapshot
docs/adr/audit.logdecisions.md
Your repo
git · audit-ready
Spec-driven development, upgraded
PRD → ERD → execution plan, in your repo
Spec-driven dev usually stops at the spec. fastpace doesn't.
PRDs become engineering designs (ERDs);
ERDs become execution plans of waves, epics, and stories —
grounded in your architecture, decisions, and patterns. Every artifact is a reviewable
file in your repo, not a ticket in a separate tool. Tab through the steps.
Architectural pattern
The lifecycle implements Plan-Then-Execute — tool calls are
planned (PRD → ERD → execution-plan) before any agent is exposed to untrusted content
during implementation. Specialist subagents (planner, reviewer, erd-guru) operate as
Dual-LLM-shaped: a privileged coordinator orchestrates
scoped specialists in fresh contexts.
Each step commits a reviewable artifact:PRD.md·ERD.md·execution-plan.json·watch-cards/·audit.log·status-reports/
Better PRDs
PRDs the AI can verify against your code
Most PRDs get written in a vacuum — assumptions about what exists, vague success metrics,
no awareness of conflicting prior decisions. /fp-write-prd
runs a structured interview, then cross-references every
answer against the repo before writing the artifact.
interview/fp-write-prd credit-card-validation
Q. who hurts today?
usercheckout shoppers typing bad credit cards
Q. what triggers the pain?
userno client-side validation; payment service rejects on submit
Q. success metric?
metric40% fewer rejected card submissions
Q. in scope?
scopecard number, expiry, CVC format checks
Q. out of scope?
scope3DS, fraud scoring (later phase)
Q. rollout?
rollout10% canary → 100% over 2 weeks
outputfastpace/docs/prd/credit-card-validation.md
Problemshoppers · pain · trigger✓
Goalsmeasurable outcomes✓
Non-goalsexplicitly excluded✓
Userswho benefits, who doesn't✓
Successone north-star metric✓
Scopein / out / later✓
Open issuesunanswered questions✓
✓wrote credit-card-validation.md · status draft
Why "grounded"?The interview is just the input. The PRD is reconciled against your repo before it lands.
cross-refCompared answers to src/checkout/*.ts — flagged 2 capabilities already implemented.
glossaryUsed canonical term "checkout" (from glossary.md) instead of "purchase flow" from your input.
decisionsDetected conflict with ADR-0003 (no PII in client logs) — surfaced for review.
patternsSuggested following the existing retry-with-backoff pattern from patterns.md.
PRD → ERD
Grounded designs
/fp-prd-to-erd reads the PRD and your fastpace/context/.
The ERD that comes out already knows your decisions, your patterns, your domain terms.
PRDcredit-card-validation.mdapproved
Problem
Checkout submits fail for 12% of users because bad card numbers aren't caught until the processor rejects them.
Who
Logged-in shoppers at checkout.
Goal
Reject invalid cards client-side before submit. Drop rejection rate below 3%.
Non-goals
Fraud scoring. Chargeback handling.
Success metric
Checkout submit success ≥ 97% (7-day average).
DOMAIN CONTEXTfastpace/context/
decisions.md
2025-02-14 — No PAN in logs. CVC never stored.
→ decides the security section
architecture.md
Checkout handler is POST /api/cart/submit · Express middleware chain.
POST /api/cart/submit pre-validates with validateCard(pan, month, year, cvc).
from architecture.md
Acceptance criteria
• luhn checksum passes ·
• expiry in the future ·
• cvc is 3–4 digits
names from glossary.md
Security
PAN never logged. CVC never stored. Redact in all error paths.
from decisions.md (2025-02-14)
Reliability
External BIN lookup wrapped in withRetry(fn, { tries: 3, base: 200 }).
from patterns.md
Rollback
Feature-flag cc_client_validation. Default off.
/fp-prd-to-erd credit-card-validation
→ drafted ERD at fastpace/docs/erd/credit-card-validation.md · 4 context files consulted
grounded
ERD → Execution plan
Plans that know your codebase
/fp-erd-to-execplan breaks an ERD into waves, epics, and stories — but
sized by your architecture, patterns, learnings, and prior plans. Not generic estimates.
→ saved fastpace/exec-plans/credit-card-validation.json · opens in fastpace ui to assign names & track progress
calibrated
Feature lifecycle
Backlog → Done
Domain context and spec is the new code
Lock in the what and the why before any code gets written.
Planning
Spec
Write tests
Implement
Run tests
Document
Create PR
Push
/fp-new-feature · credit-card-validation
1⚡ planning
problem: pasting card numbers is error-prone
user: logged-in shoppers at checkout
goal: reject invalid cards before submit
✓ approve planning? yes
2⚡ spec
drafting fastpace/docs/erd/cc-validation.md…
• contract: validateCard(pan, month, year, cvc)
• data model: no schema change
• security: no PAN logged; CVC never stored
• acceptance: luhn pass, expiry future, cvc 3-4 digits
✓ approve spec? yes
3⚡ write tests
writing 14 failing tests in tests/cards.test.ts…
◐ phase 4 · implementing 0%↳ state saved · watch-cards/credit-card-validation.json
Every phase
produces a durable artifact
Planning
problem · user · goal
✓
Spec
ERD · contracts · security
✓
Write tests
failing tests
◐
Implement
code to make tests pass
Run tests
green suite
Document
README · inline docs
Create PR
PR draft from ERD
Push
branch + PR opened
Approval gate per phase (developer / lead / architect)
State saved to watch-cards/ — resume any time
No push or PR without your explicit approval — ever
Stop, leave, come back
Pick up where you left off
Start working on a feature. Close your laptop. Come back tomorrow. State
is saved after every phase — branch name, base branch, risk class,
completed phases — so any AI or any engineer can reconstruct the full
context in flight.
Artifacts persisted with the state
Watch cards at fastpace/watch-cards/<feature>.json
Swap models tomorrow — the card still works
Multiple features in flight at once — no merge conflicts in state
resume with — Claude rehydrates the full state from this card.
Status reports
No more Jira-to-slides
fastpace reads your PRDs, ERDs, execution plans, git history, and in-flight
features — then generates a structured report for leadership in seconds.
Pick a period, an audience, the sections you want, and hit one button.
localhost:7777 / status-reports
Status reports
Configure the period and audience, pick what to include, then generate.
Report criteria
Reporting period
last 7 days
Audience
VP of Engineering
Include in report
✓ saved to fastpace/docs/status-reports/2026-04-23-vp.md
Generated report↓ rendered preview · saved to docs/status-reports/
Period
last 7 days
Audience
VP of Engineering
Last 7 days · progress
3 features
Credit card validation44% → 62%implement · Priya
Migrate auth to OIDC6% → 14%spec · Lee
Rate-limit endpoints58% → 82%create-pr · Sam
Execution plan
on track
Q2 · 9 weeks
Apr 1 — Jun 3
W1W2W3W4W5W6W7W8W9
cc-validation
62%
oidc
14%
rate-limits
82%
doneactiveplannedblocked
Risks & blockers
1 red · 1 yellow
OIDC rolloutblocked
security sign-off pending
path to greensecurity team review · ETA Tue · owner: Lee
Rate-limit providerat risk
quota changes possible next quarter
path to greendraft fallback adapter · ETA this sprint · owner: Sam
Critical findingsclear
none open this period
Next 7 days · priorities
Mon → Fri
Ship cc-validationcanary 10%Mon · Priya
Close OIDC specsign-offTue · Lee + legal
Publish rate-limits post-mortemdraftWed · Sam
Reports save as committable markdown in fastpace/docs/status-reports/ —
the team gets a permanent version-controlled record.
25+ slash commands
Skills — daily-reach commands across five categories.
Skills are slash commands your AI agent runs against your repo.
Not generic prompts — they're scoped to a job, read your domain
context, and produce structured output. Drop your own in
.claude/skills/ and they show up immediately.
Spec discipline
/fp-discoverBootstrap domain context for a new repo. 5–10 minutes; outputs L1–L2.
/fp-write-prdInteractive PRD authoring. Agent drafts; you redline.
/fp-prd-to-erdReads the PRD, produces entities, relationships, decisions, edge cases.
/fp-erd-to-execplanSizes the work as waves → epics → stories with hour estimates.
/fp-write-adrCaptures an architectural decision with the context that produced it. Adds to L5.
Code quality
/fp-context-scoreGrade your repo's domain context (0–100) across coverage, freshness, vocabulary, decisions, patterns, learnings.
/fp-reviewRun code-reviewer agent against the current diff. Catches "contradicts ADR-007" issues.
/fp-refactorSuggests refactors aligned to your patterns + ADRs. Doesn't propose generic improvements.
/fp-test-genGenerates tests against your existing test patterns. Respects your conventions.
Backlog sync
/fp-pull-issuePulls a Jira / Linear issue into AI context. Body, comments, linked PRs.
/fp-link-commitAnnotates a commit with its source ticket ID + AI summary. Comments back on the issue.
/fp-pr-summaryGenerates the PR description from the run manifests + ticket context. No more "wip" PRs.
Reflection
/fp-statusOne-liner status: AI commits today, reliability, context score, in-flight stories.
/fp-explainWhy was this AI line of code generated? Walks back through the manifest + prompt hash.
/fp-bisectWhen AI-generated code broke something, find which run manifest produced the regression.
/fp-learningsCaptures a lesson learned. Adds to fastpace/context/learnings.md (L5).
Maintenance
/fp-context-refreshWalks fastpace/context/ for stale references, missing patterns, terminology drift.
/fp-doctorDiagnoses your install: identity, manifest, hooks, audit chain.
Most "AI for code" tools have a single chat agent. fastpace
ships seven specialists, each with explicit scope (allowed
tools, paths, command patterns) and a daily job to do.
/onboarder
Spins up new repos and engineers fast.
Daily use: New hire? /onboarder gives them a personalized walkthrough pulling from your real ADRs and patterns.
/architect
Drafts ERDs and execution plans from PRDs.
Daily use: Use it before any feature kickoff. /fp-prd-to-erd then /fp-erd-to-execplan.
Test-drive on day one. Turn on phases as the team gets comfortable —
and watch the audit signal compound alongside.
Day 1
Crawl
Test-drive, explore, learn.
Sandbox with
Ask around with
Open
audit milestoneAudit log starts logging from minute one. announces this install.
Week 1
Walk
Plan and review with fastpace.
ERDs via
PR review via
Capture with
audit milestoneFirst ADR committed. First prompt-redaction event captured. ISO/IEC 42001 §7.5 evidence on file.
Week 2+
Run
Full lifecycle, audited.
Ship with
Plan via
Reports via
audit milestoneFirst evidence snapshot exported via . NHI registry exported. NIST AI RMF MEASURE-3.1 satisfied.
Provenance · the governance kicker
Every AI call leaves a signed trail.
The trust edition leads with this; the build edition uses the
same trail for day-to-day reviewer leverage. Any reviewer can
trace any line of merged code back to the AI call that produced
it. Bisect any incident; explain any change in code review.
Run manifest — signed JSON receipt per AI call. Model, prompt-hash, response-hash, tokens, runtime, opt-out flag. Stored in fastpace/manifests/.
Provenance trailer — RFC-5322-style key:value lines on every AI-generated commit. Links back to the manifest hash.
Audit chain — hash-linked log at fastpace/audit.log. Tampering breaks the chain. fastpace verify validates.
AI BOM — per-release CycloneDX-AI envelope rolling the above up. Useful when you eventually need to answer your auditor.
Vendor-agnostic by design
No vendor lock-in — context stays in git
Free of vendor dependence
Committed to git. Works with any LLM runtime.
Your team's brain, in git
Business rules, ADRs, patterns, lessons — all plain markdown. Any AI runtime rehydrates instantly.
Swap models, keep context
Claude today, Codex tomorrow — same repo, same brain.
Onboard in one git clone
A new engineer inherits the institutional knowledge.
Remembered, not rediscovered
Review findings and reversals persist across sessions.
ADRs, not folklore
Decisions land with rationale, tradeoffs, and what was rejected. SOC 2 CC8.1 + NIST AI RMF GOVERN-3.2 evidence on file by default.
Business rules, not just code
Every session knows the why, not just the how.
Click any file on the right to preview what the AI sees.
fastpace / context /
Entry points, module boundaries, data flow.
Languages, frameworks, runtimes, pinned versions.
Naming, commits, test file locations, coding style.
ADR-lite: what was decided, why, what was rejected.
Hard-won knowledge from incidents and reviews.
architecture.md
Rendered markdown preview — this is what the AI reads
Capture knowledge manually with /fp-remember, or let it grow
organically as you use fastpace.
Underlying primitives
What's actually wired into your repo
Skills sit on top of three primitives that ship with fastpace: agents (subagents that handle specialist work),
hooks (local interceptors on every tool call), and guardrails (project-wide policies).
Tab through to see each.
Agents
Specialist agents
Each agent runs in a fresh context with a tight scope and minimal tool access.
planner
Turns a goal into a numbered plan.
reviewer
Reviews diffs vs. architecture and decisions.
prd-guru
Interviews you and drafts a PRD.
erd-guru
Translates PRDs into ERDs.
execution-planner
Waves → epics → stories.
doc-writer
Updates docs without noise.
Hooks
Hooks enforce guardrails
Pre-use hooks block the call before it runs.
Post-use hooks observe and log.
Each hook is also tagged by intent — audit & safety or velocity — so the compliance story stays legible.
Refuses force-push to protected branches. Refuses auto-push when disabled.
dangerous-command-guardaudit & safety
Blocks rm -rf /, git reset --hard, curl | sh, and a dozen other footguns.
commit-validatorvelocity
Enforces conventional commit format (configurable).
branch-guardaudit & safety
Prevents commits directly to main/master or other protected branches.
post-use · observe2
dependency-alertaudit & safety
Alerts on new npm deps outside your approved scopes. Block or warn.
audit-loggeraudit & safety
Appends every tool use to fastpace/audit.log — hash-chained for tamper evidence.
Guardrails
Policies, not pleases
Configured in fastpace.config.yaml. Safe defaults out of the box.
fastpace.config.yamlclick any tile above → the YAML updates live
fastpace will never silently weaken a guardrail — every change is approved by you and logged to fastpace/audit.log.
Local dashboard
100% local dashboard — click around or take the tour
Each repo gets its own 100% local UI.
Run fastpace ui inside any repo — a Node HTTP server boots on
localhost and opens a dashboard scoped to that project. Browse
the audit log, ADR ledger, decisions, and exception queue without leaving
the local UI. Zero cloud. Zero telemetry. Your code never leaves the machine.
http://localhost:7777
Dashboard/In-flight features
⌘K
In-flight features
Every feature started with /fp-new-feature persists to fastpace/watch-cards/.
The private key never appears in any audit entry, manifest, or transmitted artifact. Every signature is computed locally and verified against the public key.
Audit chain
Tamper-evident by construction. fastpace verify walks the chain in seconds.
What an auditor sees: deterministic verification. No "trust us" — every entry proves itself. The pre-merge audit gate (F2.9) runs this in CI on every PR.
Run manifests
F1.1 — one signed receipt per AI tool call. Hashes only — never plaintext.
F1.13 — fleet view across every repo on the org dashboard. Pulls signed audit summaries every 5 min via F3.11 replication; signature-verified at ingest using the F1.14 SAML envelope.
68
org maturity · 14 repos reporting · 7 teams · last shard 38 sec ago
By repo · sorted by maturity
checkout-svcpayments72
billing-apipayments81
acme-webgrowth64
notificationsplatform55
internal-toolsinfra42
… 9 more
Fleet posture
framework readiness82% (NIST AI RMF · ISO 42001 · SOC 2)
audit chains verified14 / 14
AI-attributed commits (30d)2,847
total audit entries (30d)187,392
fleet baselines published7 agents · weighted by sample size
Org dashboard self-hosted
F1.13 — @fastpace-ai/org-dashboard standalone binary. Self-hosted aggregator: ingests signed audit shards from every install, verifies them against the org SAML envelope, computes per-repo / per-team / per-org rollups. No cloud.
$ fastpace-org-dashboard --port 8443 --store ./fp-org-store[ok] ingest endpoint POST /api/org/ingest[ok] rollup endpoint GET /api/org/rollup[ok] maturity endpoint GET /api/org/maturity[ok] baselines endpoint GET /api/org/baselines[ok] SAML envelope verified · 14 installs · 7 teams[ok] last ingest 2026-05-01T17:08:42Z · checkout-svc · 12 entries[ok] serving on https://0.0.0.0:8443
F2.5 — separate Astro site at trust.fastpace.net built from your signed audit summaries. CISOs self-serve; you stay out of the email loop. Per-customer publication is consent-gated.
Maturity
68 / 100
org-wide · auto-updated · 14 repos
Attestations
in progress SOC 2 Type I · Q3 2026
planned SOC 2 Type II · Q1 2027
planned ISO 27001 · Q2 2027
Sub-processors
GitHub source code only · open source
Cloudflare DNS + edge
Anthropic / OpenAI / Google pass-through · your contract
Threat model
STRIDE walk against every shipped primitive. view →
Evidence request
Self-serve flow: signed snapshot of fastpace/ bundled into a tarball, delivered via signed URL. Re-uses F1.14 RBAC.
Frameworks mapped
NIST AI RMF · ISO 42001 · EU AI Act · SOC 2 · ISO 27001 · GDPR · PCI-DSS · HIPAA
Public mirror at trust.fastpace.net — same content, served from a static Astro build. Each customer can opt in to publish their org maturity number alongside the rubric.
View
This view is part of the live fastpace ui. Click around the sidebar to see the views included in this demo, or run fastpace ui in your own repo to see live data.
In the live UI, this view shows…
…
Want the full picture? Visit docs.fastpace.net/primitives for an index of every shipped primitive — what it does, what version shipped it, the artifact it produces.
Tour as:
1of 8· Tour for
The local UI
Every fastpace install ships a local dashboard that runs entirely on your employees' machine — no SaaS in the data path. Pick a persona above to walk only the views that matter to your role.
Org dashboard
Self-hosted fleet aggregator — your VPC, your data plane
@fastpace-ai/org-dashboard is a thin Node HTTP server that
ingests signed audit summaries from every fastpace install, verifies
them against your SAML envelope, and rolls them up by repo / team /
org. Deploy it inside your VPC; fastpace.net never sees the data.
fleet · acme-corp
⚡https://fastpace.acme-corp.com:4444self-hosted
org · overview
14 installs · last shard 38s
Fleet overview
Aggregated from signed shards. Each install pushes via F3.11 every 5 min; the dashboard polls + recomputes on ingest.
notifications · circuit breaker tripped on doc-writer14m
Repos · 14 reporting
Sortable. Click a repo to drill into its per-shard history, exception queue, and audit-chain offset. (Not interactive in demo.)
Repo
Team
Maturity
Reliability
AI commits 30d
Last shard
billing-api
payments
81
94
312
1m
checkout-svc
payments
72
91
284
38s
acme-web
growth
64
87
421
5m
notifications
platform
55
72
198
14m
internal-tools
infra
42
—
54
2h
+ 9 more · scroll or paginate in live UI
Teams · 7
Team rollups average per-repo maturity weighted by AI activity. Provisioned via SCIM from your IdP.
Team
Repos
Devs
Maturity
Reliability
Trend (30d)
payments
2
11
76
92
↑ +4
growth
3
9
63
87
↑ +2
platform
4
14
58
74
→ 0
infra
2
6
44
—
↓ -3
data
1
8
61
89
↑ +5
mobile
1
7
71
90
↑ +1
internal
1
7
38
—
↓ -1
Ingest log
Every shard arrives signed. Verify failure → reject without ingest. Last 24h:
[2026-05-01T17:08:42Z] ingest checkout-svc sig ok entries=12 Δ-maturity=+1
[2026-05-01T17:06:11Z] ingest billing-api sig ok entries=7 Δ-maturity= 0
[2026-05-01T17:03:55Z] ingest acme-web sig ok entries=21 Δ-maturity=-1
[2026-05-01T16:54:30Z] ingest notifications sig ok entries=4 Δ-maturity= 0
[2026-05-01T16:54:30Z] alert notifications circuit_breaker tripped (doc-writer +37%)
[2026-05-01T16:48:12Z] reject rogue-clone sig MISMATCH envelope=unknown_install
[2026-05-01T16:42:06Z] ingest data-pipeline sig ok entries=15 Δ-maturity=+2
[2026-05-01T16:33:51Z] ingest mobile-ios sig ok entries=9 Δ-maturity=+1
[2026-05-01T16:21:18Z] ingest internal-tools sig ok entries=2 Δ-maturity=-1
…
Fleet baselines
F1.3 — per-agent behavioral baseline averaged across the fleet, weighted by sample size. Repos with too few samples fall back to fleet baseline.
Agent
Avg edits / session
Avg duration (s)
Avg tokens
Samples
planner
0 (read-only)
184
89,400
3,124
reviewer
3.2
222
74,800
2,891
prd-guru
1.1
318
52,300
1,408
erd-guru
2.7
402
68,100
1,202
execution-planner
1.8
271
71,400
1,184
doc-writer
4.4
156
32,800
1,932
onboarder
0.6
112
21,500
614
API endpoints
Read-only HTTP surface for the dashboard. Same shape as the local UI's /api/*; consumers just point at the org port instead of :7777.
Method
Path
Returns
Auth
POST
/api/org/ingest
ack of received shard
signed envelope
GET
/api/org/rollup
fleet rollup + per-repo
SAML session
GET
/api/org/maturity
F4.12 aggregate + sub-scores
SAML session
GET
/api/org/installs
roster of every reporting install
SAML session
GET
/api/org/baselines
per-agent fleet baselines
SAML session
GET
/api/org/summary
single-repo build (dev)
local only
POST
/api/auth/saml
verify envelope, return role
none
SAML / SCIM / RBAC F1.14
Plug your IdP's public key in via env. Auto-provisioning via SCIM 2.0; role grants enforced at every endpoint.
Configuration
DASHBOARD_IDP_ISSUERhttps://acme.okta.com
DASHBOARD_AUDIENCEhttps://fastpace.acme-corp.com
DASHBOARD_SAML_ALGORITHMRS256
DASHBOARD_SAML_AUTO_PROVISIONtrue
DASHBOARD_SAML_CLOCK_SKEW60s
Active roles
admin3 users · all endpoints
auditor5 users · read-only · evidence-package
developer54 users · own-repo only
Run it locally now: npm install -g @fastpace-ai/org-dashboard
then PORT=4444 fastpace-org. Same surface as this mockup,
reading from a sample store. Production deploys live in your VPC —
we never see the data plane.
7 panels · ~60 seconds
1 / 7
Overview
Top-level KPIs across every repo reporting into this VPC instance.
AI-Native Maturity
A single number for whether your team is getting AI-native right.
Nine industry-standard competencies — Project Setup, Spec-Driven Development,
Context Management, Testing, Harness, Architectural Guardrails, Review Maturity,
AI SDLC, Prompt Engineering — rolled into one 0–100 score.
Auto-updated as your team works:
local reads are real-time, fleet rollups push every 5 min, webhooks fire instantly.
The audit plane is the metrics plane. Same primitives that prove
compliance to a CISO produce the velocity metric a CTO puts on a board
slide. fastpace maturity from the CLI, Maturity view
at the top of the local UI sidebar, fleet rollup on the org dashboard, opt-in
publication on trust.fastpace.net.
All 9 sub-scores measured in v0.30 — F4.4 test parity, F4.6 ADR drift,
F4.7 review maturity, F4.8 DORA-by-attribution, and F4.9 prompt effectiveness
shipped this sprint (see packages/fp/assets/docs/ai-native-maturity.md
for the rubric).
Test-drive — no commitment
Try fastpace in a sandbox first
Before pointing it at your real repo, take fastpace for a spin in a throwaway directory.
Five minutes, nothing touched outside the sandbox —
just enough to feel the flow and decide if it's for you. The hash-chained audit log
is on from minute one, even in the sandbox.
First, install globally
🧪
recommended first try
Test-drive in a sandbox repo
5 min
Spin up a fresh sandbox directory — nothing in your real repos is touched:
Scaffold fastpace and let it seed a sample feature:
--sample writes a tiny demo PRD, ERD, and watch card so the dashboard isn't empty on first launch.
Launch Claude Code (or Codex / Gemini CLI) inside the sandbox and try a command:
Once you've felt the flow, blow it away — no traces left:
Done!
Liked it? Move on to Brownfield or
Greenfield below to point fastpace at your real repo.
When you're ready for the real thing
🌳
existing repo
Brownfield
Clone your repo, enter it, and scaffold fastpace:
Launch Claude Code, then run:
Done!
Ask questions with or build with
🌱
new repo
Greenfield
Create your project directory, enter it, and scaffold fastpace:
Add your code repos as submodules:
Launch Claude and run:
Done!
Start with while fastpace watches over you.
🧹
when the evaluation ends
Uninstall cleanly
your files survive
Every file fastpace touches gets recorded in a signed install-manifest.
Uninstall reads that manifest and removes only what fastpace itself
placed — your own hooks, agents, skills, and settings entries are
provably untouched. Pick the scopes you want included; the command
composes live below.
Scopedefault = user-global only (gentle). Add scopes for more cleanup.
composed command
fastpace uninstall
removes user-manifest files; preserves your own .claude/ files, fastpace/, settings.json, and ~/.fastpace
+
Remove the CLI itselfdrops the global npm package after the cleanup above
Power-user flags + recovery
--all — shorthand for --repo --settings --fastpace-dir
--skip-manifest-verify — proceed even if the manifest signature is invalid (recovery for tampering / corruption). Combine with --dry-run first to inspect.
Heads up on --user-identity: this destroys the
F0.1 Ed25519 keypair. Past audit logs signed by that key remain verifiable
only against the archived public key. Run
fastpace identity show --json > identity.json first if you
want a copy for later forensic verification.
Nothing about fastpace phones home. Removing the CLI removes the binary; no
server-side state to clean up. The licensing service auto-prunes inactive
install_ids after 90 days, on our side — no action needed from you.
Keep it up to date
Stop rewriting AI output. Start shipping it.
Free for solo devs. $29/seat/mo for teams (first 5 seats free for 12 months).
Works with the AI agent you already pay for.