Bring scripts under control
Turn loose scripts, scheduled jobs, and manual commands into one formal entry instead of relying on memory and tribal knowledge.
Governed AI Execution
Start with Python scripts as the first mature execution asset. The web console already supports Python and Shell script onboarding so scattered and risky automation can move into one governed entry with traceable execution records.
We are looking for the first design partners who want to shape governed AI execution in production. If you are dealing with control, audit, integration, or local-bridge challenges, let's keep talking and define the next generation of enterprise workflows together.
Brand Signal
Bring scattered and risky team scripts under explicit control. Who ran what, when it happened, and what the result was all stay on record, and when something breaks there is a traceable path back.
ExecGov is a multi-tenant capability-governance and execution platform that treats Python scripts as its first mature execution asset.
Exec comes from Execution and Gov comes from Governance. This is not a government-project label. It means AI, scripts, local resources, and online capabilities should all execute inside governance boundaries. If a capability cannot actually land inside rules, it is outside the scope of what ExecGov is trying to solve.
Many teams do not lack scripts. They lack a unified entry point, permission boundaries, confirmation before risky actions, and result traceability. Scripts end up scattered across personal laptops, shared drives, servers, and chat history, and nobody can clearly answer who is allowed to run what, when it should run, or where the result goes.
ExecGov currently stabilizes the most common and most reusable capability shape first: Python scripts. You can already walk through a simplified public experience flow before deciding whether to connect a real scenario.
The current web upload entry already accepts Python and Shell text scripts in one place. The public experience page deliberately shows Python task_brief_demo.py on the left and Shell clean_log_demo.sh on the right. The real experience scripts come from exec-gov-ai-skill-platform-script/tenant_1000/experience/ and are hot-swapped through the manifest mapping.
The platform has already completed its first compatibility upgrade: a general resource layer and an executor registry layer are in place, and the first non-script sample, HTTP capability access, has already landed in the public super-admin domain to verify the new path of resource model + executor + audit chain. The tenant side currently exposes only a read-only ledger so users can see summaries of HTTP resources, authentication style, and write boundaries that have already been granted to them. That does not mean tenants can already self-serve generic API onboarding. For now, configuration, credential governance, and dry-run verification still stay inside the public governance domain. The more urgent commercial priority remains stabilizing the 1.1 low-support loop for registration, payment, renewal, and expiry recovery.
That 1.1 line has already landed first on the public side: order creation, payment confirmation, activation and renewal, renewal-reminder scans, and expiry shutdown scans all feed customer and tenant status updates back into the system. That still does not mean end users already have a complete self-service payment experience. Real third-party payment gateways, a user-facing billing center, and outbound reminder channels are still being added.
At the same time, the standard shared-SaaS tenant frontend has already been established. From tenant_1003+ onward, standard SaaS customers no longer default to cloning a dedicated frontend project per customer. They first enter the shared tenant frontend instead. It can already carry formal tenant entry, while branding, initialization, and finer menu boundaries are still being tightened.
Whether you are an individual developer, a team lead, or an enterprise IT manager, the first goal here is to tell you which problems ExecGov can solve for you now, which entry path fits you first, and what the lowest-friction next step is.
From the no-login experience path to design partners and then real onboarding, every entry is designed to help you confirm first whether scripts can be controlled, run safely, and stay reviewable before deciding how to land them.
Platform Thesis
At the project layer, ExecGov is positioned as An Open & Secure AI Agent Execution Layer. At the product layer, it is presented externally as ExecGov. The real problem it wants to solve is not the chat experience itself. It is how real tasks can be executed reliably inside rules.
For the current public site, the most stable way to explain it is in three layers: the foundation layer handles multi-tenancy, security, permissions, and audit; the abstraction layer expresses capability units as Skills; and the implementation layer is currently led by Python scripts while HTTP resources are already validating the second capability shape.
This round also tightened the permission boundary: the whitelisted tenant admin now keeps only the minimal cross-tenant console entry, and no longer sees platform-governance pages such as HTTP capability access. Runtime and menu logic also no longer rely on unsafe shortcuts such as user_id == 1 to infer administrator status.
From the commercial point of view, the practical progress right now is not "the platform already has a complete SaaS billing desk." It is that the operator-side billing and lifecycle skeleton is already running. The end-user self-service path is still being completed.
Formal customers also no longer have only one option. Standard SaaS customers can start on the shared tenant frontend first. When stronger isolation, exclusive pages, exclusive branding, or deeper deployment control is needed, the path can continue into single-tenant delivery or private deployment.
Critical actions require confirmation before they run, which prevents AI from directly overreaching into real operations.
From request input to final result, the chain can stay on record for governance, review, and compliance needs.
Scripts, intranet APIs, and private resources can be pulled gradually into one governed entry.
The path is clear from the free path to local script slots, the team edition, and enterprise delivery without rewriting from scratch.
Commercial Route
The more stable explanation today is not "try it first and decide later" in the abstract. It is to judge first whether you belong to the free path, local script-slot expansion, standard team edition, or enterprise delivery.
You do not need to understand the full architecture first. Start by trying one governed script-dispatch flow, then decide whether that model deserves formal adoption.
Judge first whether you only need personal-space expansion or whether you have already entered formal team collaboration. For multi-user collaboration, start from the shared-SaaS tenant path.
Judge private deployment, intranet access, data security, and compliance fit first, then decide whether to move into formal deployment and delivery.
Showroom
These cases are not here to prove that a button can be clicked through. They are here to show how ExecGov can turn complex, risky, failure-prone script flows into a service that can be requested, confirmed, executed, and reviewed later.
From the inspection request to node-level checks, risk confirmation, and final report generation, the entire chain stays traceable and auditable.
Case 02Cross-cloud cost analysis and optimization recommendationsTurn cloud-bill pull, cleaning, aggregation, anomaly detection, and optimization advice into one governed execution service.
Case 03Operations data automation and anomaly trackingBring recurring reporting, file handling, import/export, and anomaly-tracking flows into one entry point and cut manual rework.
Best Fit
This is not the moment to spread the line too wide. For a platform still being pushed forward continuously by one founder, it matters more to go deep on the three customer types that are easiest to close, easiest to reuse, and closest to the current code capability.
Best for teams that already have many spreadsheet, reporting, scraping, cleaning, import, and export scripts but suffer from fragmented entry points, unstable execution, and poor traceability.
Best for teams doing log cleanup, inspections, batch jobs, scheduled reports, script governance, and execution traceability.
Best for customers who care about tenant isolation, permission boundaries, intranet constraints, and private deployment but do not want to buy a heavy system on day one.
Brand Position
Externally, use ExecGov as one unified brand instead of splitting it into separate project-name and product-name narratives. The repository slug and existing technical identifiers can keep their historical naming for now.
Position: an enterprise AI execution and governance platform
Slogan: make every automation reliable and governed.
Use this framing across the website, materials, proposals, contracts, and formal delivery conversations.
Current strategy: stabilize script-shaped capability first, then expand toward APIs, templates, connectors, and approval flows.
Naming note: ExecGov = Execution + Governance, and Gov means governance, not a government project.
Current state: the main repository slug exec-gov-ai-skill-platform has already been unified, while the directory path execgov-cli/ keeps historical naming and the external CLI command is already unified as execgov-cli.
Founder Note
I am currently based in Hangzhou and continuing this as a bootstrapped micro-business. My long-term mainline is 8 years of frontend delivery, with the last 2 years focused on strengthening Python automation and small full-stack execution loops. The core goal is not to tell a giant platform story. It is to turn the delivery problems I kept running into script onboarding, permission boundaries, execution traceability, and local bridging into a product that actually saves people time and reduces rework.
If this has to collapse into one sentence, it is this: turn the platform into a small business that keeps solving real problems and can sustain itself through stable operation.
This is not a funding-driven large project. The goal is to keep solving real problems and make the platform capable of supporting itself as a business.
The long-term line is frontend, GIS visualization, and enterprise admin work, with the last two years focused on Python automation and small full-stack loops.
The current focus is getting the web entry and local bridge truly usable before talking too much about farther capabilities.
Start from the free path, then move through local script slots, the standard team edition, and enterprise delivery instead of forcing everyone into the same route.
Execution Flow
Understand the task first and produce an execution plan instead of directly calling low-level capability with unchecked privilege.
Organize scripts, Skills, templates, and later capability packs into a formal catalog controlled by permissions and rules.
Critical actions need confirmation first, and the current focus is making the cloud and local execution positions explicit.
From output artifacts to logs and audit, the platform is built around traceability instead of a one-off run that disappears.
Delivery Toolkit
This group is meant for visitors who are already preparing to move into a real project. It explains the file chain, deliverables, and onboarding preparation in one pass.
Best for reporting, Excel, batch processing, and workflows that return result files. Explain the input-file and output-artifact chain clearly first.
DeliverablesDeliverables / document entryBest for formal delivery conversations so customers know exactly which URLs, accounts, instructions, and result entries they will receive.
ChecklistCustomer onboarding checklistBest for aligning script directories, README files, sample files, dependencies, and risky boundaries together with presales, implementation, and the customer.
Who It Fits
They need one tenant per customer, one delivery entry, and a sustainable way to expand to multiple customers without mixing them into one backend.
They need to manage templates, announcements, audit, customer ledgers, and release rollback centrally while keeping tenant boundaries explicit.
They need to turn existing scripts into callable, describable, maintainable capability units and choose between the free path, shared SaaS, or local execution as the starting point.
Deployment Modes
For enterprise customers who need stronger isolation, dedicated pages, dedicated branding, or deeper deployment control: one customer, one tenant, one entry, and one maintainable capability boundary.
From tenant_1003+ onward, standard SaaS customers enter the shared tenant frontend first. What is shared is the release cadence, not tenant data, permissions, or results.
Manage tenants, templates, announcements, and logs centrally while keeping the isolation line between customers explicit.
Provide a low-friction first experience and upgrade entry for individual users and smaller teams.
The current focus is local environments and the CLI bridge, which is a better fit for scenarios that must connect local scripts and intranet resources.
Roadmap
The current route has two steps: stabilize delivery, experience, and onboarding first, then keep expanding collaboration, capability types, and product support.
Make customer delivery, the public experience path, the personal entry, and the minimal CLI chain truly usable before widening scope.
Small-team collaboration, quota packages, and more general capability onboarding will keep improving in the next stage.
Align the entry paths, roles, and reading order first so you do not keep bouncing between pages without a frame.
Quick StartGetting StartedUnderstand as quickly as possible how to begin from the free path, how script onboarding works, and when the team or enterprise path is the better fit.
FAQFrequently Asked QuestionsClarify positioning, security boundaries, local onboarding, and who the platform currently fits in one pass.
ProductProduct OverviewUnderstand what the platform is doing, what it is not doing, and what the most accurate external definition is today.
CapabilitiesCore capabilitiesSee multi-tenancy, trusted execution, template distribution, announcement governance, and the CLI bridge on one page.
CLICLI guideSee exactly where local login, capability onboarding, Skill execution, and the Agent skeleton stand right now.
DeliveryCustomer flow / deliveryUnderstand how customers use the platform, how delivery works, and how hot update forms a formal closed loop.
BillingBilling and membershipSee how the personal free path pays, how the formal team monthly or annual registration path works, and how far the payment line has already landed.
FilesFile upload / result downloadBest for file-based tasks, reporting outputs, and projects that need downloadable artifacts instead of assuming every result is just text.
DeliverablesDeliverables / document entrySpell out the final entry points, instructions, and result artifacts customers receive so delivery and later use stay clear.
ChecklistCustomer onboarding checklistBest for people preparing real script-shaped capabilities and real scenarios: complete the onboarding materials first, then continue into the team or enterprise path.
MaterialsExternal materialsSeparate the platform introduction, value framing, and pitch materials for reading, review, and solution discussion.
Contact
If you already have scripts, local environments, permission boundaries, or delivery problems that need a cleaner path, this is the most direct public entry right now. It is designed to receive free-path judgment, local script-slot expansion judgment, team-edition evaluation, and delivery consultation.