Skip to content

Portfolio & Org

When you manage multiple repos, Taste Engine provides automated onboarding:

Terminal window
taste onboard run --dir /path/to/repo

The onboarding engine:

  1. Scans sources — Finds READMEs, docs, architecture notes with priority detection
  2. Classifies repo shape — Library, CLI tool, desktop app, documentation, etc.
  3. Recommends a policy preset — Based on repo shape and source coverage
PresetForStarts With
advisory-starterNew repos, low canon confidenceAll surfaces advisory
docs-heavyDocumentation-rich reposREADMEs and docs on warn
product-copyProduct/marketing reposHigh enforcement on customer-facing surfaces
Terminal window
taste onboard report --dir /path/to/repo # Detailed onboarding report
taste onboard recommend --dir /path/to/repo # Get a recommendation

Across a portfolio directory containing multiple repos:

Terminal window
taste portfolio matrix --dir /path/to/portfolio # Overview of all repos
taste portfolio findings --dir /path/to/portfolio # Cross-repo findings
taste portfolio export --dir /path/to/portfolio # Export as JSON

The engine detects drift families — groups of repos that share the same type of drift. If three repos all have voice/naming drift, that’s a systemic issue, not three independent problems.

Tracks which repos have successfully promoted surfaces from advisory → warn → required, and identifies repos that are stuck.

Re-evaluates whether each repo’s policy preset still matches its current state. A repo that started as advisory-starter but now has strong canon might be ready for docs-heavy or product-copy.

For organization-wide governance:

Terminal window
taste org matrix --dir /path/to/portfolio # Org-wide status matrix
taste org queue --dir /path/to/portfolio # Promotion + demotion queues
taste org alerts --dir /path/to/portfolio # Active alerts
taste org recommendations --dir /path/to/portfolio # Suggested actions

Surfaces that meet promotion criteria (strong canon, consistent verdicts, low overrides) appear in the promotion queue with a confidence assessment.

Surfaces with rising override rates or degrading verdicts appear in the demotion queue — a signal that canon may need revision before enforcement can continue.

7 alert categories with configurable thresholds:

CategoryTrigger
promotion_readySurface meets promotion criteria
newly_staleRepo hasn’t been scanned recently
override_spikeOverride rate exceeds threshold
canon_changedCanon version changed
policy_changedGate policy was modified
alert_resolvedPrevious alert condition cleared
alert_newNew condition detected

Preview, apply, and rollback policy changes across repos:

Terminal window
taste org actions queue --dir /path/to/portfolio
taste org actions preview <repo> <surface> <mode>
taste org actions apply <action-id>
taste org actions rollback <action-id> --reason "..."
taste org actions history --dir /path/to/portfolio

Every action creates an audit receipt with before/after policy snapshots.

For ongoing operational awareness:

Terminal window
taste watchtower scan --dir /path/to/portfolio # Take a snapshot
taste watchtower history --dir /path/to/portfolio # View scan history
taste watchtower delta --dir /path/to/portfolio # Changes since last scan
taste watchtower digest --dir /path/to/portfolio # Full digest with action items
taste watchtower digest --dir /path/to/portfolio --json # Machine-readable

A dark-theme React UI for daily operations:

Terminal window
taste workbench --dir /path/to/portfolio --port 3200

Open http://localhost:3200 to see:

  • Org matrix with repo status cards
  • Promotion and demotion queues
  • Repo detail with review history
  • Action management (preview, apply, rollback)
  • Alert dashboard