Skip to content

Sandbox Demo

The sandbox is the fastest way to experience ido4 governance. It creates a real GitHub Project V2 with tasks, containers, and deliberately embedded governance violations — then discovers them live using the same tools that govern real projects.

The sandbox is fully isolated — violations are intentional and safe to explore. You can break rules, fix them, and learn what each violation means without affecting any real project.

Quick Start

PathWhen to use
/ido4dev:onboardFirst time. Handles everything — clones demo codebase, creates sandbox, walks you through governance discovery (~10 min).
/ido4dev:sandboxManual control. Creates the sandbox without the guided walkthrough. Good for repeat use or custom exploration.
/ido4dev:guided-demoAfter sandbox exists. Four-act structured governance walkthrough (~15 min).
/ido4dev:sandbox-exploreAfter sandbox exists. Pick what to investigate from 13 structured paths.
Terminal window
# Recommended for first-time users
> /ido4dev:onboard

Available Skills

SkillPurpose
/ido4dev:onboardZero-friction first touch — auto-clones demo, creates sandbox, guided discovery
/ido4dev:sandboxManual sandbox lifecycle — create, reset, destroy
/ido4dev:guided-demoFour-act governance walkthrough (~15 minutes)
/ido4dev:sandbox-exploreInteractive exploration — pick what to investigate

All three methodologies are supported: Hydro (wave-based), Scrum (sprint-based), Shape Up (cycle-based). The sandbox uses the same technical spec across all methodologies — demonstrating that one project can be governed by different profiles.

What Gets Created

The sandbox uses ido4’s own ingestion pipeline to create governed issues from a technical spec. Tasks are distributed algorithmically across containers with roles assigned from the dependency graph:

ComponentDetails
TasksCreated from a technical spec via the ingestion pipeline
CapabilitiesMapped to epics (Hydro/Scrum) or bets (Shape Up)
ContainersWaves, sprints, or cycles — methodology-specific execution units
Governance violationsCascade blockers, false status, review bottlenecks, integrity violations
Audit trailBackdated events creating realistic temporal history
AgentsTwo registered agents with task locks and capability profiles
Seeded PRReal code file for review bottleneck demonstration

Governance Violations

Each sandbox has methodology-appropriate violations that governance skills discover:

All methodologies:

  • Cascade blocker — A critical-path task blocking multiple downstream tasks
  • False status — A task shows “In Review” but has no pull request
  • Review bottleneck — A PR open for days with zero reviewers

Hydro-specific:

  • Epic integrity violation — A capability’s tasks split across different waves

Shape Up-specific:

  • Circuit breaker countdown — Cycle approaching deadline with incomplete bets
  • Killed bet — Correct governance behavior when a bet isn’t viable

After the Demo

  • /ido4dev:sandbox-explore — Try breaking rules, fixing violations, running work distribution
  • /ido4dev:standup — Full governance standup briefing
  • /ido4dev:compliance — Deep compliance analysis
  • /ido4dev:init — Initialize ido4 on your own project
  • /ido4dev:sandbox cleanup — Clean up: closes issues, deletes project, removes config