Use this guide when you need to assess the repository quickly as a reviewer, grant program, or external evaluator.
- Read
../README.mdUnderstand what the repository publishes and what it intentionally excludes. - Read
../PUBLIC_PROJECT_PROFILE.jsonGet a machine-readable snapshot of maintainer ownership, public-surface counts, and health signals. - Read
../PUBLIC_REPOSITORY_IDENTITY.jsonConfirm the canonical public slug, package identity, release URL, and schema/example URL alignment rules. - Read
../PUBLIC_EVALUATION_PACKET.jsonUse the condensed external-review packet when you need the shortest bounded summary of scope, strongest evidence, and review commands. - Read
../PUBLIC_BOUNDARY_MAP.jsonSee which boundaries are published here and which ones remain intentionally deferred. - Read
../PUBLIC_CAPABILITY_MATRIX.jsonSee what an outside reader can concretely do with the public surface right now. - Read
public-contract-index.mdJump to the highest-signal public artifacts without browsing the whole tree. - Read
../PUBLIC_TRACEABILITY_MATRIX.jsonConfirm that key public claims are tied to concrete docs, schemas, examples, and verification commands. - Read
../PUBLIC_EXAMPLE_COVERAGE.jsonConfirm that the public example set covers schema, validator routes, graph links, and bounded negative paths. - Read
../PUBLIC_MAINTENANCE_MODEL.jsonConfirm that the public intake, review, and release posture is explicit rather than inferred. - Read
../PUBLIC_CHANGE_CONTROL_MODEL.jsonConfirm that additive, deprecated, and breaking public changes are described explicitly instead of being inferred from changelog noise. - Read
../PUBLIC_OWNERSHIP_MAP.jsonConfirm which public artifact families are actually maintained here and which stronger surfaces outrank reviewer-facing summaries or examples. - Read
../PUBLIC_DEPENDENCY_GRAPH.jsonConfirm the shortest safe reading path through the public stack and which reviewer-facing summaries depend on stronger contract surfaces. - Read
../PUBLIC_ASSURANCE_CASE.jsonConfirm the bounded public claims, strongest evidence, explicit limits, and non-claims in one reviewer-facing surface. - Read
../PUBLIC_UPDATE_COHERENCE_MAP.jsonConfirm which public review, release, contract, and governance surfaces are expected to move together when the public stack changes. - Read
../PUBLIC_LIMITATIONS_REGISTER.jsonConfirm which important domains remain deferred, which guarantees are not being made, and where reviewer-facing summaries intentionally stop. - Read
../PUBLIC_EVIDENCE_TIMELINE.jsonConfirm that active maintenance and public-surface hardening are visible as a bounded reviewer-facing history instead of only as raw git output. - Read
../PUBLIC_REVIEW_SCORECARD.jsonConfirm that the public surface can be assessed against explicit bounded reviewer criteria instead of only by intuition or raw counts. - Read
../PUBLIC_VERIFICATION_MATRIX.jsonConfirm that the repository-local checks protect explicit public surfaces instead of existing as an opaque verify command. - Read
../PUBLIC_AUDIENCE_PATHS.jsonConfirm that different public audiences can follow bounded role-specific entry paths instead of guessing from folder layout or maintainer folklore. - Read
../PUBLIC_EVIDENCE_STRENGTH_MAP.jsonConfirm which public surfaces are strongest, which are secondary, and which are illustrative before treating any reviewer summary as authoritative. - Read
../PUBLIC_ADOPTION_READINESS.jsonConfirm which public audience paths are ready today, which prerequisites apply, and where hosted-runtime expectations remain explicitly deferred. - Read
../PUBLIC_FRESHNESS_MODEL.jsonConfirm which public summary layers go stale under which triggers and how freshness stays tied to release evidence. - Read
../PUBLIC_ECOSYSTEM_VALUE_MAP.jsonConfirm why this public surface is concretely useful to reviewers, integrators, tool-builders, contributors, and OSS-support programs without relying on vague aspiration. - Read
../PUBLIC_DECISION_LOG.jsonConfirm the major public design decisions and why this repository is a bounded projection surface with explicit rationale. - Read
../PUBLIC_EVIDENCE_GAPS_REGISTER.jsonConfirm which high-signal public evidence still remains intentionally incomplete so maturity claims stay bounded and honest. - Read
../PUBLIC_PROGRAM_FIT_MAP.jsonConfirm why this public surface is already credible for OSS-support and reviewer-program evaluation without treating that as proof of acceptance. - Read
../PUBLIC_PUBLICATION_READINESS.jsonConfirm why this repo is already coherent as a published public surface while keeping adoption and support-program outcomes explicitly out of scope. - Read
release-evidence.mdSee how provenance, release review, and verification evidence fit together. - Read
../PUBLIC_FAILURE_MODEL.jsonConfirm that the public surface documents bounded negative paths instead of only happy-path behavior. - Read
../PUBLIC_PORTABILITY_PROFILE.jsonConfirm that portability and archive trust are described as governed public contracts rather than as vague product claims. - Read
community-health.mdConfirm that contributor intake and maintainer expectations are explicit.
If you only have a few minutes, inspect these surfaces first:
../PUBLIC_PROJECT_PROFILE.json../PUBLIC_REPOSITORY_IDENTITY.json../PUBLIC_EVALUATION_PACKET.json../PUBLIC_TRACEABILITY_MATRIX.json../PUBLIC_FAILURE_MODEL.json../PUBLIC_EXAMPLE_COVERAGE.json../PUBLIC_MAINTENANCE_MODEL.json../PUBLIC_CHANGE_CONTROL_MODEL.json../PUBLIC_OWNERSHIP_MAP.json../PUBLIC_DEPENDENCY_GRAPH.json../PUBLIC_ASSURANCE_CASE.json../PUBLIC_UPDATE_COHERENCE_MAP.json../PUBLIC_LIMITATIONS_REGISTER.json../PUBLIC_EVIDENCE_TIMELINE.json../PUBLIC_REVIEW_SCORECARD.json../PUBLIC_VERIFICATION_MATRIX.json../PUBLIC_AUDIENCE_PATHS.json../PUBLIC_EVIDENCE_STRENGTH_MAP.json../PUBLIC_ADOPTION_READINESS.json../PUBLIC_FRESHNESS_MODEL.json../PUBLIC_ECOSYSTEM_VALUE_MAP.json../PUBLIC_DECISION_LOG.json../PUBLIC_EVIDENCE_GAPS_REGISTER.json../PUBLIC_PROGRAM_FIT_MAP.json../PUBLIC_PUBLICATION_READINESS.json../PUBLIC_BOUNDARY_MAP.json../PUBLIC_CAPABILITY_MATRIX.json../PUBLIC_PORTABILITY_PROFILE.json../PUBLIC_CONTRACT_CATALOG.json../PUBLIC_RELEASE_METADATA.json../PUBLIC_RELEASE_REVIEW.md../schemas/capsule-schema.json../schemas/validator-api-envelopes.schema.json../openapi/validate.openapi.json
- the repository has a clear public boundary
- the repository explains both published and deferred boundaries explicitly
- the maintainer identity is explicit
- docs, schemas, examples, and release evidence are all present
- repo-local verification is not symbolic; it is wired to actual files
- the public surface is usable by both humans and tools
This repository should read as a deliberately maintained public contract surface, not as a bulk export of a private repo. The best indicators are:
- strong front-door docs
- machine-readable provenance
- machine-readable contract discovery
- release metadata and review evidence
- explicit projection doctrine and domain-boundary posture
- explicit capability coverage for consumers and reviewers
- contributor intake templates
- client-facing examples and schema-backed API envelopes
This guide helps reviewers assess the public projection surface only. It does not claim to expose the full private N1Hub runtime or all internal development history.