Governance Control Catalog

Every control maps to a specific check in the pipeline

Controls are enforced at generation time, validation time, or CI gate time. Each one prevents a specific class of error. This page is designed for compliance officers, architects, and procurement teams.

Platform Capabilities

What the governance layer does today

These capabilities are built into the current platform and enforced across every governed delivery path.

Contracts evolve with your business

The authoring flow accepts requirements, bug reports, and change requests as governed inputs that update versioned contracts over time.

Every output traces to its source

Generation manifests record contract revision, author, timestamp, and outcome — so produced modules trace back to a governed revision.

Validated across business domains

The platform is tested against multiple distinct business domains — covering both deep domain complexity and broad generalization as managed projects with requirements, contracts, composition, and generated output.

AI Generation Guardrails

Controls that constrain AI-generated contract drafts

AI participates in one bounded step: drafting a contract plan. These controls validate the AI output against a deterministic baseline before the pipeline accepts it.

GC-001: Entity Field Coverage

AI-generated entity fields must overlap at least 60% with the deterministic baseline. Prevents the AI from inventing unsupported entity structures or removing required fields.

Enforcement: draft validation

GC-002: Identifier Normalization

Field identifiers are normalized and checked against a rejection list. Prevents descriptive names like "required" or "boolean" from becoming field identifiers.

Enforcement: draft validation

GC-003: Locale Preservation

AI drafts cannot remove required language locales. Prevents the AI from dropping internationalization support during draft enhancement.

Enforcement: draft validation

GC-004: Contribution ID Deduplication

Dashboard and widget contribution IDs are deduplicated against existing contributions. Prevents duplicate or conflicting contribution registrations.

Enforcement: draft validation

GC-005: Dashboard Card Canonicalization

Dashboard card structure is canonicalized against the deterministic baseline. Prevents the AI from producing cards with incorrect metric payloads or widget types.

Enforcement: draft validation

GC-006: Interoperability Function Preservation

Cross-module navigation and interoperability functions defined in the baseline cannot be removed by the AI draft. Prevents loss of existing cross-module integrations.

Enforcement: draft validation

GC-007: List Function Input Preservation

List function inputs (filters, sort fields, paging) defined in the baseline are preserved. Prevents the AI from simplifying list behavior below the required level.

Enforcement: draft validation

GC-008: AI Plan Schema Validation

The AI-produced plan must conform to the ContractDraftPlan JSON schema. Prevents malformed or structurally invalid AI output from entering the pipeline.

Enforcement: draft validation

Pattern Contract Rules

Structural constraints per application pattern

Each of the 16 application patterns defines required paths, types, and conditions that specs must satisfy. Specs violating pattern rules are rejected before generation.

PC-001: CRUD Standard

Requires list outputs, filter actions, toolbar configuration, and entity CRUD operations with proper field type declarations.

Enforcement: spec validation

PC-002: CRUD Popup / Drawer

Extends CRUD Standard with popup or drawer container configuration, including create-after behavior and host/target wiring.

Enforcement: spec validation

PC-003: Workflow

Requires state machine definition with named transitions, permitted status flows, and status-driven UI filtering.

Enforcement: spec validation

PC-004: Kanban Board

Requires column definitions, card field mappings, drag-drop status transitions, and board-specific data queries.

Enforcement: spec validation

PC-005: Calendar Schedule

Requires date field mappings, view configurations, event rendering rules, and calendar-specific data queries.

Enforcement: spec validation

PC-006: Dashboard

Requires widget host configuration, contribution slots, card layout definitions, and metric data sources.

Enforcement: spec validation

PC-007: Report

Requires data aggregation queries, output column definitions, filter parameters, and export format configuration.

Enforcement: spec validation

PC-008: Shell Navigation

Requires navigation structure with route declarations, menu hierarchy, and integration points for contributed content.

Enforcement: spec validation

Composition Validation

Cross-module integrity checks

When multiple feature packs compose into an application, these controls validate the integration points.

CV-001: Duplicate Route Detection

No two packs may register the same route path. Prevents runtime routing conflicts in the generated application.

Enforcement: composition validation

CV-002: Anchor Target Validation

Every cross-module anchor contribution must reference an anchor that exists in the target pack. Prevents broken navigation and widget integration.

Enforcement: composition validation

CV-003: Shell Integration Check

Packs declaring shell integration must reference a valid shell module and widget. Prevents orphaned navigation entries.

Enforcement: composition validation

CV-004: Widget Wiring Consistency

Widget host and contributor declarations must have matching interfaces. Prevents runtime widget rendering failures.

Enforcement: composition validation

Certification Scenarios

Scenario-based testing for generated code

Certification packs validate generated modules against representative scenarios. One test per category scales linearly with module count.

CC-001: Create

Validates that the create flow produces a valid record with required fields, validation enforcement, and correct persistence.

CC-002: Edit

Validates that the edit flow loads existing data, applies changes, enforces validation, and persists correctly.

CC-003: List

Validates that the list view loads, displays data, supports filtering, sorting, and pagination.

CC-004: Deactivate

Validates that records can be deactivated (soft delete) with proper status change and UI feedback.

CC-005: Relation Selector

Validates that foreign-key lookup fields display related records and persist the selected reference correctly.

CC-006: Permission Denied

Validates that users without the required capability see appropriate access-denied behavior, not broken UI.

Module Ship Gate

15 quality checks with compliance scoring

Every module receives a compliance score. The pipeline enforces a configurable minimum (default 90%) before a module can ship.

SG-001: Manifest Integrity

Manifest exists and contains valid spec hash and content hash.

SG-002: Content Hash Match

Generated file content matches the hash recorded in the manifest.

SG-003: Spec Hash Match

Source spec has not changed since generation (no undeclared drift).

SG-004: File Completeness

All 6 expected module files are present (Data, Security, Lang, Logic, Tests, UI).

SG-005: Schema Validation

Generated XML validates against the module schema.

SG-006: Security Definition

Security file defines required capabilities and access control rules.

SG-007: Test Coverage

Tests file contains at least one test per CRUD operation.

SG-008: i18n Completeness

Language file covers all required locales declared in the spec.

SG-009: Route Declaration

UI screens declare valid routes that match the composition plan.

SG-010: Entity Consistency

Data entities match the spec's entity definitions (fields, types, relations).

SG-011: Import Resolution

All module imports reference valid, existing modules.

SG-012: Function Signatures

Logic functions match the spec's declared input/output contracts.

SG-013: UI Binding Validity

UI bindings reference variables and functions that exist in scope.

SG-014: Certification Result

Module has a passing certification pack result within the cache window.

SG-015: Generator Version

Module was generated by a supported generator version.

How to read this catalog

Each control has an ID, a name, a description of what it prevents, and an enforcement point. Enforcement points are:

  • Draft validation — checked when AI produces a contract plan
  • Spec validation — checked when a spec is processed for generation
  • Composition validation — checked when packs are composed into an application
  • CI gate — checked in the continuous integration pipeline before merge

Enterprise compliance teams can map these controls to SOC 2, ISO 27001, or internal governance frameworks.