Skip to content

Latest commit

 

History

History
135 lines (122 loc) · 9.93 KB

File metadata and controls

135 lines (122 loc) · 9.93 KB

Reviewer Guide

Use this guide when you need to assess the repository quickly as a reviewer, grant program, or external evaluator.

Fast path

  1. Read ../README.md Understand what the repository publishes and what it intentionally excludes.
  2. Read ../PUBLIC_PROJECT_PROFILE.json Get a machine-readable snapshot of maintainer ownership, public-surface counts, and health signals.
  3. Read ../PUBLIC_REPOSITORY_IDENTITY.json Confirm the canonical public slug, package identity, release URL, and schema/example URL alignment rules.
  4. Read ../PUBLIC_EVALUATION_PACKET.json Use the condensed external-review packet when you need the shortest bounded summary of scope, strongest evidence, and review commands.
  5. Read ../PUBLIC_BOUNDARY_MAP.json See which boundaries are published here and which ones remain intentionally deferred.
  6. Read ../PUBLIC_CAPABILITY_MATRIX.json See what an outside reader can concretely do with the public surface right now.
  7. Read public-contract-index.md Jump to the highest-signal public artifacts without browsing the whole tree.
  8. Read ../PUBLIC_TRACEABILITY_MATRIX.json Confirm that key public claims are tied to concrete docs, schemas, examples, and verification commands.
  9. Read ../PUBLIC_EXAMPLE_COVERAGE.json Confirm that the public example set covers schema, validator routes, graph links, and bounded negative paths.
  10. Read ../PUBLIC_MAINTENANCE_MODEL.json Confirm that the public intake, review, and release posture is explicit rather than inferred.
  11. Read ../PUBLIC_CHANGE_CONTROL_MODEL.json Confirm that additive, deprecated, and breaking public changes are described explicitly instead of being inferred from changelog noise.
  12. Read ../PUBLIC_OWNERSHIP_MAP.json Confirm which public artifact families are actually maintained here and which stronger surfaces outrank reviewer-facing summaries or examples.
  13. Read ../PUBLIC_DEPENDENCY_GRAPH.json Confirm the shortest safe reading path through the public stack and which reviewer-facing summaries depend on stronger contract surfaces.
  14. Read ../PUBLIC_ASSURANCE_CASE.json Confirm the bounded public claims, strongest evidence, explicit limits, and non-claims in one reviewer-facing surface.
  15. Read ../PUBLIC_UPDATE_COHERENCE_MAP.json Confirm which public review, release, contract, and governance surfaces are expected to move together when the public stack changes.
  16. Read ../PUBLIC_LIMITATIONS_REGISTER.json Confirm which important domains remain deferred, which guarantees are not being made, and where reviewer-facing summaries intentionally stop.
  17. Read ../PUBLIC_EVIDENCE_TIMELINE.json Confirm that active maintenance and public-surface hardening are visible as a bounded reviewer-facing history instead of only as raw git output.
  18. Read ../PUBLIC_REVIEW_SCORECARD.json Confirm that the public surface can be assessed against explicit bounded reviewer criteria instead of only by intuition or raw counts.
  19. Read ../PUBLIC_VERIFICATION_MATRIX.json Confirm that the repository-local checks protect explicit public surfaces instead of existing as an opaque verify command.
  20. Read ../PUBLIC_AUDIENCE_PATHS.json Confirm that different public audiences can follow bounded role-specific entry paths instead of guessing from folder layout or maintainer folklore.
  21. Read ../PUBLIC_EVIDENCE_STRENGTH_MAP.json Confirm which public surfaces are strongest, which are secondary, and which are illustrative before treating any reviewer summary as authoritative.
  22. Read ../PUBLIC_ADOPTION_READINESS.json Confirm which public audience paths are ready today, which prerequisites apply, and where hosted-runtime expectations remain explicitly deferred.
  23. Read ../PUBLIC_FRESHNESS_MODEL.json Confirm which public summary layers go stale under which triggers and how freshness stays tied to release evidence.
  24. Read ../PUBLIC_ECOSYSTEM_VALUE_MAP.json Confirm why this public surface is concretely useful to reviewers, integrators, tool-builders, contributors, and OSS-support programs without relying on vague aspiration.
  25. Read ../PUBLIC_DECISION_LOG.json Confirm the major public design decisions and why this repository is a bounded projection surface with explicit rationale.
  26. Read ../PUBLIC_EVIDENCE_GAPS_REGISTER.json Confirm which high-signal public evidence still remains intentionally incomplete so maturity claims stay bounded and honest.
  27. Read ../PUBLIC_PROGRAM_FIT_MAP.json Confirm why this public surface is already credible for OSS-support and reviewer-program evaluation without treating that as proof of acceptance.
  28. Read ../PUBLIC_PUBLICATION_READINESS.json Confirm why this repo is already coherent as a published public surface while keeping adoption and support-program outcomes explicitly out of scope.
  29. Read release-evidence.md See how provenance, release review, and verification evidence fit together.
  30. Read ../PUBLIC_FAILURE_MODEL.json Confirm that the public surface documents bounded negative paths instead of only happy-path behavior.
  31. Read ../PUBLIC_PORTABILITY_PROFILE.json Confirm that portability and archive trust are described as governed public contracts rather than as vague product claims.
  32. Read community-health.md Confirm that contributor intake and maintainer expectations are explicit.

Strongest signals

If you only have a few minutes, inspect these surfaces first:

What to verify

  • the repository has a clear public boundary
  • the repository explains both published and deferred boundaries explicitly
  • the maintainer identity is explicit
  • docs, schemas, examples, and release evidence are all present
  • repo-local verification is not symbolic; it is wired to actual files
  • the public surface is usable by both humans and tools

Practical interpretation

This repository should read as a deliberately maintained public contract surface, not as a bulk export of a private repo. The best indicators are:

  • strong front-door docs
  • machine-readable provenance
  • machine-readable contract discovery
  • release metadata and review evidence
  • explicit projection doctrine and domain-boundary posture
  • explicit capability coverage for consumers and reviewers
  • contributor intake templates
  • client-facing examples and schema-backed API envelopes

Important boundary

This guide helps reviewers assess the public projection surface only. It does not claim to expose the full private N1Hub runtime or all internal development history.