Skip to content

ExecGov

Governed AI Execution

Start with Python scripts as the first mature execution asset. The web console already supports Python and Shell script onboarding so scattered and risky automation can move into one governed entry with traceable execution records.

demo/smart-execution.flow.tsrequest
01const request = 'Help me clean up the server logs'
02const matchedSkill = 'log_cleanup'
03const trace = ['audit_log', 'runtime_cost', 'result_view']
04// Start with the public entry, then decide on signup, a scoped conversation, or formal delivery
05return smartExecution('public_entry')
Co-Build Program

We are looking for the first design partners who want to shape governed AI execution in production. If you are dealing with control, audit, integration, or local-bridge challenges, let's keep talking and define the next generation of enterprise workflows together.

Design Partners

Looking for 1-3 design partners

If your team is already struggling with a large script estate and a growing pile of automation tasks, the current limited deep-collaboration plan is meant for you. The goal is not to sell a large platform first. The goal is to take one real workflow and turn it into a repeatable sample that can be requested, confirmed, executed, and reviewed later.

1-3 real paid slotsBest for teams with many scripts alreadyTime-limited deep collaboration

Brand Signal

Bring scattered and risky team scripts under explicit control

Bring scattered and risky team scripts under explicit control. Who ran what, when it happened, and what the result was all stay on record, and when something breaks there is a traceable path back.

ExecGov is a multi-tenant capability-governance and execution platform that treats Python scripts as its first mature execution asset.

Exec comes from Execution and Gov comes from Governance. This is not a government-project label. It means AI, scripts, local resources, and online capabilities should all execute inside governance boundaries. If a capability cannot actually land inside rules, it is outside the scope of what ExecGov is trying to solve.

Many teams do not lack scripts. They lack a unified entry point, permission boundaries, confirmation before risky actions, and result traceability. Scripts end up scattered across personal laptops, shared drives, servers, and chat history, and nobody can clearly answer who is allowed to run what, when it should run, or where the result goes.

ExecGov currently stabilizes the most common and most reusable capability shape first: Python scripts. You can already walk through a simplified public experience flow before deciding whether to connect a real scenario.

The current web upload entry already accepts Python and Shell text scripts in one place. The public experience page deliberately shows Python task_brief_demo.py on the left and Shell clean_log_demo.sh on the right. The real experience scripts come from exec-gov-ai-skill-platform-script/tenant_1000/experience/ and are hot-swapped through the manifest mapping.

The platform has already completed its first compatibility upgrade: a general resource layer and an executor registry layer are in place, and the first non-script sample, HTTP capability access, has already landed in the public super-admin domain to verify the new path of resource model + executor + audit chain. The tenant side currently exposes only a read-only ledger so users can see summaries of HTTP resources, authentication style, and write boundaries that have already been granted to them. That does not mean tenants can already self-serve generic API onboarding. For now, configuration, credential governance, and dry-run verification still stay inside the public governance domain. The more urgent commercial priority remains stabilizing the 1.1 low-support loop for registration, payment, renewal, and expiry recovery.

That 1.1 line has already landed first on the public side: order creation, payment confirmation, activation and renewal, renewal-reminder scans, and expiry shutdown scans all feed customer and tenant status updates back into the system. That still does not mean end users already have a complete self-service payment experience. Real third-party payment gateways, a user-facing billing center, and outbound reminder channels are still being added.

At the same time, the standard shared-SaaS tenant frontend has already been established. From tenant_1003+ onward, standard SaaS customers no longer default to cloning a dedicated frontend project per customer. They first enter the shared tenant frontend instead. It can already carry formal tenant entry, while branding, initialization, and finer menu boundaries are still being tightened.

Script governanceExecution traceabilityAudit trailLocal bridgeSecurity boundaryShared SaaS
First mature execution assetPython scripts
First problem to solve wellUnifying scattered scripts and governing execution risk

Whether you are an individual developer, a team lead, or an enterprise IT manager, the first goal here is to tell you which problems ExecGov can solve for you now, which entry path fits you first, and what the lowest-friction next step is.

ENTRY SYSTEMSYNC 01

From the no-login experience path to design partners and then real onboarding, every entry is designed to help you confirm first whether scripts can be controlled, run safely, and stay reviewable before deciding how to land them.

EntryFree path, local expansion, team edition, enterprise delivery
CapabilityGoverned execution, audit trail, local bridge
Unified EntryPolicy Inside
Mature AssetPython scripts are the first mature execution asset

Stabilize onboarding, execution, result return, and traceability for the script shape first, then expand to more capability types.

Next StepStart by turning scattered scripts into one formal entry

Clarify directories, boundaries, risky actions, and result return first, then decide how the real team environment should connect.

Design Partner1-3 design-partner slots are open now

This is a better fit for teams that already have many scripts, automation jobs, and boundary problems and want to build one delivery-grade governance sample first.

Audit TrailWho ran what, when it happened, and what the result was should all stay reviewable

The point is not to move scripts somewhere else. The point is to connect the entry point, permission boundaries, execution process, result return, and later accountability into one traceable chain.

OriginEntry path, tenant, and operator all stay attributable
BoundaryScripts, parameters, permissions, and risky actions remain checkable
ResultLogs, artifacts, status, and failure reasons remain reviewable
AccountabilityAfter an incident, you know who to find and what to fix

Platform Thesis

Move from "AI can chat" to "AI can execute inside rules"

At the project layer, ExecGov is positioned as An Open & Secure AI Agent Execution Layer. At the product layer, it is presented externally as ExecGov. The real problem it wants to solve is not the chat experience itself. It is how real tasks can be executed reliably inside rules.

For the current public site, the most stable way to explain it is in three layers: the foundation layer handles multi-tenancy, security, permissions, and audit; the abstraction layer expresses capability units as Skills; and the implementation layer is currently led by Python scripts while HTTP resources are already validating the second capability shape.

This round also tightened the permission boundary: the whitelisted tenant admin now keeps only the minimal cross-tenant console entry, and no longer sees platform-governance pages such as HTTP capability access. Runtime and menu logic also no longer rely on unsafe shortcuts such as user_id == 1 to infer administrator status.

From the commercial point of view, the practical progress right now is not "the platform already has a complete SaaS billing desk." It is that the operator-side billing and lifecycle skeleton is already running. The end-user self-service path is still being completed.

Formal customers also no longer have only one option. Standard SaaS customers can start on the shared tenant frontend first. When stronger isolation, exclusive pages, exclusive branding, or deeper deployment control is needed, the path can continue into single-tenant delivery or private deployment.

Controlledexecution

Critical actions require confirmation before they run, which prevents AI from directly overreaching into real operations.

Auditableprocess trace

From request input to final result, the chain can stay on record for governance, review, and compliance needs.

Bridgeablelocal capability

Scripts, intranet APIs, and private resources can be pulled gradually into one governed entry.

Evolvablegrowth path

The path is clear from the free path to local script slots, the team edition, and enterprise delivery without rewriting from scratch.

Commercial Route

Start from the entry path that matches the problem you actually have

The more stable explanation today is not "try it first and decide later" in the abstract. It is to judge first whether you belong to the free path, local script-slot expansion, standard team edition, or enterprise delivery.

Free

Individual developers and technical early adopters

You do not need to understand the full architecture first. Start by trying one governed script-dispatch flow, then decide whether that model deserves formal adoption.

Team

Team managers and technical leads

Judge first whether you only need personal-space expansion or whether you have already entered formal team collaboration. For multi-user collaboration, start from the shared-SaaS tenant path.

Enterprise

Enterprise decision makers and IT managers

Judge private deployment, intranet access, data security, and compliance fit first, then decide whether to move into formal deployment and delivery.

Showroom

Not a hello demo, but three sample cases you can use in project conversations

These cases are not here to prove that a button can be clicked through. They are here to show how ExecGov can turn complex, risky, failure-prone script flows into a service that can be requested, confirmed, executed, and reviewed later.

Best Fit

The current priority is serving these three customer types well

This is not the moment to spread the line too wide. For a platform still being pushed forward continuously by one founder, it matters more to go deep on the three customer types that are easiest to close, easiest to reuse, and closest to the current code capability.

01

E-commerce, content, and operations data automation

Best for teams that already have many spreadsheet, reporting, scraping, cleaning, import, and export scripts but suffer from fragmented entry points, unstable execution, and poor traceability.

02

Technical-team script governance and automation operations

Best for teams doing log cleanup, inspections, batch jobs, scheduled reports, script governance, and execution traceability.

03

Smaller formal customers who need intranet or private deployment

Best for customers who care about tenant isolation, permission boundaries, intranet constraints, and private deployment but do not want to buy a heavy system on day one.

Brand Position

Brand positioning

Externally, use ExecGov as one unified brand instead of splitting it into separate project-name and product-name narratives. The repository slug and existing technical identifiers can keep their historical naming for now.

Brand

ExecGov

Position: an enterprise AI execution and governance platform

Slogan: make every automation reliable and governed.

Use this framing across the website, materials, proposals, contracts, and formal delivery conversations.

Method

Govern first, execute for real

Current strategy: stabilize script-shaped capability first, then expand toward APIs, templates, connectors, and approval flows.

Naming note: ExecGov = Execution + Governance, and Gov means governance, not a government project.

Current state: the main repository slug exec-gov-ai-skill-platform has already been unified, while the directory path execgov-cli/ keeps historical naming and the external CLI command is already unified as execgov-cli.

Founder Note

Who is building ExecGov, and why the platform is worth understanding further

I am currently based in Hangzhou and continuing this as a bootstrapped micro-business. My long-term mainline is 8 years of frontend delivery, with the last 2 years focused on strengthening Python automation and small full-stack execution loops. The core goal is not to tell a giant platform story. It is to turn the delivery problems I kept running into script onboarding, permission boundaries, execution traceability, and local bridging into a product that actually saves people time and reduces rework.

If this has to collapse into one sentence, it is this: turn the platform into a small business that keeps solving real problems and can sustain itself through stable operation.

Hangzhoubootstrapped build

This is not a funding-driven large project. The goal is to keep solving real problems and make the platform capable of supporting itself as a business.

8 + 2years frontend / years reinforcement

The long-term line is frontend, GIS visualization, and enterprise admin work, with the last two years focused on Python automation and small full-stack loops.

Web + CLI + Localpractical bridge first

The current focus is getting the web entry and local bridge truly usable before talking too much about farther capabilities.

Four pathsclear way in

Start from the free path, then move through local script slots, the standard team edition, and enterprise delivery instead of forcing everyone into the same route.

Execution Flow

How the platform turns a request into deliverable execution

01

Intent understanding and plan generation

Understand the task first and produce an execution plan instead of directly calling low-level capability with unchecked privilege.

02

Capability matching and security decision

Organize scripts, Skills, templates, and later capability packs into a formal catalog controlled by permissions and rules.

03

Human confirmation and real execution

Critical actions need confirmation first, and the current focus is making the cloud and local execution positions explicit.

04

Result return and audit trail

From output artifacts to logs and audit, the platform is built around traceability instead of a one-off run that disappears.

Delivery Toolkit

Three pages formal projects often read first

This group is meant for visitors who are already preparing to move into a real project. It explains the file chain, deliverables, and onboarding preparation in one pass.

Who It Fits

It is a stronger fit for these roles

Enterprise delivery teams

They need one tenant per customer, one delivery entry, and a sustainable way to expand to multiple customers without mixing them into one backend.

Platform operators

They need to manage templates, announcements, audit, customer ledgers, and release rollback centrally while keeping tenant boundaries explicit.

Developers and small teams

They need to turn existing scripts into callable, describable, maintainable capability units and choose between the free path, shared SaaS, or local execution as the starting point.

Deployment Modes

One governance logic across different deployment shapes

Single-tenant delivery

For enterprise customers who need stronger isolation, dedicated pages, dedicated branding, or deeper deployment control: one customer, one tenant, one entry, and one maintainable capability boundary.

Standard shared-SaaS tenant

From tenant_1003+ onward, standard SaaS customers enter the shared tenant frontend first. What is shared is the release cadence, not tenant data, permissions, or results.

Platform-level governance

Manage tenants, templates, announcements, and logs centrally while keeping the isolation line between customers explicit.

Free experience entry

Provide a low-friction first experience and upgrade entry for individual users and smaller teams.

Local and edge execution

The current focus is local environments and the CLI bridge, which is a better fit for scenarios that must connect local scripts and intranet resources.

Roadmap

Why now, and what gets built next first

The current route has two steps: stabilize delivery, experience, and onboarding first, then keep expanding collaboration, capability types, and product support.

1.0

Stabilize the current delivery version first

Make customer delivery, the public experience path, the personal entry, and the minimal CLI chain truly usable before widening scope.

Next

Then decide what deserves productization

Small-team collaboration, quota packages, and more general capability onboarding will keep improving in the next stage.

Contact

The free path, team-edition judgment, and formal delivery consultation are open now.

If you already have scripts, local environments, permission boundaries, or delivery problems that need a cleaner path, this is the most direct public entry right now. It is designed to receive free-path judgment, local script-slot expansion judgment, team-edition evaluation, and delivery consultation.

---

Make every automation reliable and governed.