SkyeHands is an AI workspace platform that connects governed agents, app generation, platform launch, proof systems, procurement workflows, and operating infrastructure in one command layer. The current codebase archive reflects highest passing stage 11, 61 proof artifacts, and a current ecosystem code-floor valuation of $86,800,000.
The current codebase state now proves a real current-truth closure lane: Stage 9 deployment readiness remains CHECKMARK, Stage 10 multi-workspace stress remains CHECKMARK, Stage 11 regression proof is now CHECKMARK, Section 8 deployment packaging remains CHECKMARK, and Section 42 hostile-environment rerun is now CHECKMARK. Current-truth version: 3.1.9. Honest remaining blank: live provider variable configuration.
SkyeHands now remembers, replays, and ships proof. Memory graph that changes future autonomous decisions. Time-travel execution replay. Signed verifiable proof packages. This is the category-of-one expansion.
The Autonomous Developer Cloud has no direct incumbent. SOL named the category and is deepening the moat every pass. $13.9B+ in adjacent market proof validates the thesis.
The current-truth docs move the working-base code-floor to $86.8M, close Stage 11 and Section 42 on the active base, and leave one honest deployment-bound blank. Strategic acquisition framing remains $150–800M, while commercial reality is still pre-revenue.
TAM / SAM / SOL SOM capture — SkyeHands sits at the intersection of all three growth curves
Cursor built half. Devin built the other half. Nobody built both together — with encrypted sovereign credentials, governance, and a proof ladder. Skyes Over London did.
Category creation is the highest-value strategy in enterprise software. When you name and define a new category — and build the best product in it — you are priced against the size of the problem, not against competitors. Pass 8 deepens the moat with sovereign provider architecture that no competitor has shipped.
"Cursor solved suggestions. Devin solved execution. Gitpod solved environments. Every one solved a fragment. SkyeHands unified all three — and then added encrypted sovereign credential vaulting, per-workspace role bindings, and a proof-backed governance layer that makes it the only platform regulated industries can actually run. That is not a competitive advantage. That is a category."
Every major player attacked a slice. Billion-dollar valuations on fragments. Fundamentally fragmented answers to a unified problem. None of them built the governance layer enterprise actually needs.
One platform. Every layer. No context loss. No compliance gap. Pass 8 closes the credential problem that blocked enterprise adoption everywhere else.
Market outcomes from comparable category positions — category creators priced against problem size, not competitor comps
Each pass closes specific gaps with proof artifacts. Pass 8 added Sections 29–36. Every claim is either proven with a passing artifact or stays blank.
Section-level proof artifacts covering deployment, stress, regression, provider vaulting, bridge closure, workspace bindings, audit export, and more.
74 product-owned binary scripts — bootstrap, launch, doctor, proof runners, provider proof helpers, ship-candidate, support-dump, audit-export, and more.
38 original library modules: provider-vault, provider-sovereignty, provider-redaction, workspace-runtime, workspace-scheduler, governance-manager, and more.
122 named workspace prebuild snapshots — up from ~20 in Stage 40. Proof of real multi-workspace operational history across named tenant configurations.
AES-256-GCM encrypted provider vault, session-scoped unlock, per-workspace bindings, audit-safe redaction. The first platform in this category with a real credential architecture.
The developer tooling market is undergoing its most significant transformation since version control. AI-native coding environments are not a feature layer — they are a fundamental platform shift. Pass 8's sovereign provider plane unlocks the enterprise compliance segment that has been blocked from every existing AI dev tool.
Each outcome proves a fragment of the SkyeHands thesis. Together they prove the whole.
Before Pass 8, SkyeHands had a compliance story. After Pass 8, it has a compliance architecture. The sovereign provider plane means enterprise security teams aren't just reviewing a promise — they're reviewing AES-256-GCM encrypted credential storage with session-scoped unlock, per-workspace role bindings, redaction-safe audit exports, and proof artifacts generated in-product.
This architecture change doesn't just unlock enterprise sales conversations — it closes them. A CTO at a regulated institution can now see exactly how their Neon database credentials, Cloudflare keys, and GitHub tokens are stored, scoped, and audited. No competitor has built this.
Pass 8 expands the platform from 20,393 to 34,095 files. The shell grew from roughly 15 bin files to 74. The lib layer went from ~5 to 38 modules. This is not version bumping — it is a platform expansion.
Eclipse Theia-powered. Full VS Code extension compatibility. File tree, terminal, debugger, git. Zero install. Any browser. Production grade.
kAIxU is the super-brain/orchestration layer for the platform. It routes work across multiple connected brain and model lanes through the gateway plane, with one documented autonomous agent lane separately disclosed in the eval section. Same session as the IDE.
IDE and agent share one context. kAIxU sees your open editor, terminal, errors in real time. Pass 8's bridge runtime closure sealed this gap permanently.
AES-256-GCM encrypted multi-provider credential storage. Neon, Cloudflare, Netlify, GitHub. User-owned and session-scoped. Sections 29–35 proof-backed.
122 named prebuild snapshots. Multi-tenant workspace management. Cold machine to running in <90 seconds. Stage 10 stress-proven.
Cloud-hosted on SOL infrastructure or fully self-hosted on any Linux machine with one-command bootstrap. The only autonomous dev platform compliance teams can approve.
Original IP expansion across shell bin, lib modules, workspace prebuilds, and proof artifacts
Pass 8's sovereign provider plane solves the single biggest blocker to enterprise adoption of autonomous dev platforms: where do user credentials live, who controls them, and how are they proven safe? SkyeHands answers all three with code, not promises.
Seven proof sections, all passing: encrypted multi-provider vaulting (Section 29), session-scoped unlock control (30), real in-product provider menus (31), per-workspace role bindings (32), founder-lane declaration separation (32), legacy governance-secret migration into encrypted vault (29), real fixture-backed provider verification drivers for Neon/Cloudflare/Netlify/GitHub (33), user-owned storage/deploy/SCM runtime brokerage (33), redaction-safe support/snapshot/export posture (34), runtime-seal leak detection (34), execution eventing (33), procurement-safe audit/export/handoff surfaces (34), real provider resource discovery (35), redacted account/resource inventory (35), one-click workspace binding bootstrap (35).
This is not a credential management feature. This is a sovereign architecture that separates the platform from the credentials — the platform never has to hold founder secrets to operate on user infrastructure.
Serverless Postgres · real fixture-backed verification · workspace-scoped binding
Deploy/DNS/Workers · user-owned account binding · redaction-safe audit trail
Deploy target · per-workspace role brokerage · one-click binding bootstrap
SCM + PR workflow · resource discovery · redacted repo/org inventory
Before Pass 8, a security team reviewing SkyeHands asked: "Where do our cloud credentials go?" The answer was "the governance secrets file." That's a conversation-stopper for regulated industries.
After Pass 8, the answer is: "Your Neon, Cloudflare, Netlify, and GitHub credentials are stored with AES-256-GCM encryption on your infrastructure. The platform accesses them only via session-scoped unlock. The vault never exposes ciphertext payload bodies. Every access is in the audit log, redacted of raw values."
That answer closes enterprise procurement reviews. No competitor can give that answer today.
The gap that was explicitly flagged: the bridge was reachable while extracted runtime dependencies (Python venv binaries, Theia CLI) could lose execute bits from archive extraction, meaning the workspace runtime could still fail even with the bridge up. Section 36 closes this exactly.
Archive extraction stripped execute bits from Python venv and Theia CLI binaries. Bridge showed alive. Workspace runtime failed closed. Stale remote-executor table shapes could survive from older payloads.
First-run runtime dependency permission rehydration. Execute bits restored on 17 checked files (2 repaired on fresh extraction). Stale executor tables normalized. operator:start proves real runtime closure. Proof artifact generated at 2026-04-06T20:40:06Z.
All 8 new proof sections (29–36) passing with dated artifacts — April 6 2026
Pass 8 adds an entire dimension no competitor has addressed: sovereign credential architecture. The competitive matrix now includes a row no other platform can check.
| Capability | SkyeHands (SOL) | Cursor | Devin | Copilot WS | Replit | Gitpod |
|---|---|---|---|---|---|---|
| Full browser IDE | ✓ Theia — full VS Code | ✗ Desktop only | ✗ None | ~ Web lite | ✓ Yes | ✓ Yes |
| Autonomous coding agent | ✓ kAIxU orchestration + agent lane → eval disclosure | ✗ Suggestions only | ✓ (isolated) | ~ Limited | ~ Ghostwriter | ✗ None |
| IDE + agent unified session | ✓ Single context · native | ✗ | ✗ | ✗ | ✗ | ✗ |
| Encrypted sovereign credentials | ✓ AES-256-GCM · proof-backed | ✗ | ✗ | ✗ | ✗ | ✗ |
| Per-workspace provider bindings | ✓ Sections 29–35 · PASS | ✗ | ✗ | ✗ | ✗ | ✗ |
| Bridge runtime closure | ✓ Section 36 · PASS | N/A | N/A | N/A | N/A | N/A |
| Self-hostable / on-prem | ✓ One-command bootstrap | ✗ | ✗ | ✗ | ✗ | ✓ Enterprise |
| Enterprise governance + audit | ✓ Built-in · audit-safe export | ✗ | ~ Enterprise tier | ~ Via GitHub | ~ Limited | ~ Enterprise |
| Compliance-ready (regulated) | ✓ Full architecture · proven | ✗ Not possible | ✗ Not possible | ✗ Not possible | ✗ Not possible | ~ Enterprise |
| Workspace fleet + prebuilds | ✓ 122 named prebuilds | ✗ | ✗ | ✗ | ✗ | ✓ Yes |
| Category | Autonomous Dev Cloud | AI code editor | AI coding agent | AI assistant | Browser IDE | Cloud IDE |
| Valuation / market proof | Category ceiling — TBD | $9.9B | $2.0B | $2B ARR | $1.16B | ~$100M |
Cursor ($9.9B) proved developers pay for AI in their IDE. Devin ($2B) proved they pay for autonomous execution. Replit + Gitpod ($1.26B) proved they pay for cloud workspaces. SkyeHands solves all three in one product with a sovereign credential layer none of them has.
The valuation floor is the sum of the problems solved, not the average of the fragments. Pass 8 adds a dimension — sovereign credential architecture — that none of the comps have addressed and that enterprise buyers explicitly need.
The sovereign provider plane and bridge runtime closure change the conversation with enterprise and regulated-industry buyers. What was previously a compelling pitch is now a provable architecture.
Pass 8 strengthens the enterprise pricing story. The sovereign provider plane is not a premium add-on — it's table stakes for enterprise procurement. At $399/seat with a proven credential architecture, SkyeHands is the cheapest compliant option in the market by a wide margin.
Pass 8's sovereign provider plane materially improves the enterprise conversion probability in the base and upside scenarios. The conservative scenario is unchanged — it assumes organic-only growth with no enterprise deals.
Annual Recurring Revenue ($M). Base case reflects Pass 8 enterprise unlock via sovereign architecture.
Before Pass 8: SkyeHands was an autonomous dev platform with a compliance story. After Pass 8: it has a proven sovereign credential architecture — AES-256-GCM, session-scoped, audited — that is specifically required to sell into financial services, healthcare, and government.
An acquirer buying SkyeHands after Pass 8 is buying not just the platform but the only proven credential architecture in the autonomous dev category. That changes the strategic calculus for companies like Atlassian, GitLab, and any enterprise security vendor.
Pass 8 changes the enterprise GTM conversation from "we have a compliance story" to "we have a proof-backed credential architecture." Phase 3 enterprise outreach is now materially stronger.
The name matters. One demo: kAIxU completes a real GitHub issue inside the IDE, in one tab, under 10 minutes. With Pass 8: the demo also shows provider bindings connecting the developer's own Neon database and Netlify deploy target — no credentials in .env files, no founder access to user infra.
HN Show HN, Product Hunt, Dev Twitter. The sovereign angle adds a second viral hook: "The first autonomous dev platform where you actually own your own credentials."
4–6 top developer content creators. Honest "I replaced my entire stack" format. Pass 8 adds a third content angle: "The first time I deployed to my Neon database without putting credentials in an .env file."
Angle 1 — Consolidation: $607 → $149/mo. Cancel 5 subscriptions.
Angle 2 — Autonomy: "kAIxU opened PRs while I was on a weekend trip."
Angle 3 — Sovereignty: "My cloud credentials finally live where they should — encrypted, in my workspace, never on anyone else's server."
The opening line before Pass 8: "We're the only autonomous developer platform your legal team will approve." After Pass 8: "We're the only one where user credentials are AES-256-GCM encrypted, session-scoped, and never accessible to us — proven with a passing proof artifact from April 6 2026."
Target: financial services CTOs, healthcare VPEs, legal tech directors, government contractor IT leadership. POC structure: 30-day self-hosted on prospect's infrastructure with legal review package that now includes AES-256-GCM vault specification, redaction audit posture, and Section 29–35 proof artifacts.
Beta users receive free platform access during the beta window, but AI usage remains metered. Each accepted beta developer receives $20 in AI usage credit per month for up to 3 months. Separately, accepted monthly reviews earn an additional $20 AI credit.
Netlify stack target: Forms for intake, Identity for signup/login and invite-only access, Functions for approval/credit logic, and Blobs for review and ticket evidence storage.
Example bug-fix credit logic: if a qualifying ticket directly results in a confirmed fix and your AI bill for that period is $23, the credit can be issued against that AI usage amount, with a floor of $3.
The current codebase and current-truth production-release docs now carry a greener working base: $86,800,000 current working-base valuation, release version 3.1.9, highest passing stage 11, 61 proof artifacts, and only one honest remaining blank: live provider variable configuration. This page now merges the richer uploaded website with the April 30 closure packet.
Devil's-advocate hard-nosed read. No ARR multiple. No customer multiple. No speculative premium. Present-value code-floor only. April 30 closure current-truth docs: April 30 2026. Highest passing stage: 11. Section 42 rerun: green. Honest remaining blank: live provider variable configuration.
All allocations are revenue-enabling. Engineering covers bridge completion deployment and sovereign provider productization.
The Autonomous Developer Cloud has no incumbent. SOL created the category and ships pass after pass deepening the position before any competitor can catch up.
Section 48: Architect, Implementer, Test Breaker, Security Reviewer all operating in an arbitrated multi-agent council. Disagreements, vetoes, and human overrides all proof-backed. No competitor runs a specialist council.
Section 51: Live economic reasoning over every autonomous task. Token spend, compute cost, deploy cost, rollback risk all modeled per run. Cheapest-acceptable and safest-regulated planning modes proof-backed.
Section 52: Finance mode, healthcare mode, government mode, education mode — each binding tool access, logging depth, provider routing, approval workflow, and export policy. Regulated development as a first-class runtime mode.
AES-256-GCM encrypted provider vault. Session-scoped unlock. Sections 29–35 passing. The only platform enterprise legal teams can approve for regulated-industry use.
Sections 37–45 carry the hardening ladder, and the current working base now has Section 42 rerun green in addition to Stage 11. The only remaining honest deployment-bound blank is live provider variable configuration.
Recovered current-truth working base now carries version 3.1.9, 61 proof artifacts, Stage 11 + Section 42 green, an $86,800,000 working-base valuation, and one remaining live-provider-vars blank. Confidential materials now merge the richer uploaded website with the April 30 closure packet.
Pass 44 remains the platform's largest feature expansion, and the current codebase proves those capabilities survived into a greener working base. April 30 closure closes Stage 11 regression proof and Section 42 hostile-environment rerun on the current base, moving the working-base floor to $86.8M while leaving only one honest deployment-bound blank: live provider vars.
Each section adds proven, proof-backed value. No hype. No multiples. Present-value code only.
"The system can truthfully show that a prior failure and correction materially changed a later autonomous decision."
Every other autonomous coding tool starts each session cold. It has no memory of what failed last week, what you corrected last month, what architecture decisions you approved six months ago. Every run is amnesiac.
SkyeMemory Fabric makes SkyeHands a persistent engineering memory system. It builds a durable graph of your engineering history — not just logs, but a typed relationship graph where failures are connected to fixes, corrections are connected to the decisions they changed, and files that move together are known to be coupled.
When kAIxU plans a future task, it doesn't start from scratch. It queries the memory graph first: Have I seen this failure before? What fixed it? What architecture rules has this team accepted? What files always need to change together? The answer materially changes the plan.
Restart the runtime. Query the graph. Prior failures, repairs, and human corrections survive across sessions. The proof artifact demonstrates memory-backed decision change on fresh runtime start.
The completion gate: "The system can truthfully show that a prior failure and correction materially changed a later autonomous decision." This is provable — not aspirational. The Section 46 artifact demonstrates it.
Corrupt one graph edge. The graph verification fails loudly. Inject contradictory corrections. Precedence rules resolve deterministically. Inject duplicate events. Dedupe behavior is proven.
"A real autonomous run can be rewound, inspected, verified, forked, and re-executed from a checkpoint under different model, policy, or budget conditions."
Every autonomous run kAIxU completes is, until now, opaque after the fact. You can see the output. You cannot rewind to step 7 and ask "why did it make that file edit here?" You cannot fork the run and replay it with a stricter budget policy. You cannot ship the execution to a client as verifiable evidence.
SkyeReplay captures every ordered event in a run — planning decisions, file reads, file writes, command execution, test failures, policy denials, approvals, deploys, runtime transitions — and stores them as a replayable, tamper-evident timeline with checkpoint snapshots and diffs.
You can scrub backwards to any checkpoint. Reconstruct exactly what the file tree and terminal looked like at step N. Fork from that checkpoint under a different model or policy. Export the entire replay as a bundle. Ship that bundle as procurement evidence. And if anyone tampers with the replay — removes an event, modifies a diff — the verification digest fails loudly.
Moves SkyeHands from "it ran" to "it can prove how it ran, rewind how it ran, export why it ran, and branch that execution under different operating conditions." No competitor has this. It fundamentally changes what enterprise procurement can verify about an autonomous run.
"The platform can ship a code change and a verifiable proof package for that change."
Software ships. Proof of how it shipped doesn't. Every enterprise security review, procurement cycle, and regulated deployment asks the same question: "How do I know this change was built correctly, tested completely, and hasn't been tampered with?" Today the answer is almost always "trust us."
ProofOps gives SkyeHands a verifiable proof-producing pipeline that runs alongside every code change. It captures baseline and post-change verification evidence, packages diffs, replay references, audit verification, artifact hashes, hostile checks, and rollback checks into a single evidence pack, signs a deployable change-set attestation against that pack, and generates a procurement-safe redacted export.
The trust surface shows exactly what evidence is complete, what's missing, and whether the chain verifies. Remove one evidence artifact — validation fails. Tamper one hash — attestation fails. Redact incorrectly — the export validator fails. Every failure path is smoke-proven.
Every section below shipped with passing proof artifacts, hostile/failure paths, and dated evidence. None is claimed until all five proof dimensions are satisfied: initialization, action, persistence, explanation, and hostile/failure proof.
Single-agent → specialist multi-agent council. Roles: Architect, Implementer, Test Breaker, Security Reviewer, Migration Engineer, Deploy/Recovery Agent, Documentation Agent, Cost Optimizer. Arbitration rules for approve, deny, veto, majority, tie-break, escalation, and human override. Per-role budget tracking and confidence scoring. A hostile reviewer cannot fake a council disagreement — it produces real differing verdicts with evidence.
Provider connectivity becomes policy-aware sovereign runtime orchestration. The platform now routes the same task differently depending on capability, cost, latency, trust, tenancy, health, secret posture, and policy limits. Provider choice is no longer a fixed wiring decision — it is a live reasoned selection with audit trail.
Live economic intelligence over every autonomous run. Models token spend, compute cost, build time cost, deploy cost, storage cost, and rollback risk per execution. Planning modes: cheapest acceptable, safest regulated patch, fastest fix under budget, private-only budget mode. Budget-overrun denial path proof-backed. The platform knows what each decision costs before it makes it.
Regulated development modes as first-class runtime behavior. Named modes: finance, healthcare, government, education, air-gapped. Each binds tool access, logging depth, data retention, provider routing, approval workflow, and export policy. Mode-aware proof/export packaging included. The same task behaves materially differently under finance mode vs. default mode — proven with hostile test cases.
Autonomy from vague marketing language → governed runtime behavior. The same task behaves materially differently under suggest-only, draft-and-wait, execute-with-review-gates, full autonomous, and continuous maintenance modes — bound by scope, policy, and compliance posture. Forbidden escalation denial in restricted contexts is proof-backed. This is real control-plane depth, not a toggle.
External environment reconstruction lane. Drop in descriptors, docs, config, env templates, runbooks, traces — the system ingests them and reconstructs a usable environment model with explicit honesty about what was inferred, confirmed, conflicted, or still missing. Reusable environment template export. The platform is no longer limited to proving its own runtime.
White-label autonomous cloud provisioning. Tenant-brandable shell generation, custom domain/policy/provider/audit posture, per-tenant feature tiering. Provision two distinct branded foundry tenants that render different domains/branding/policies while sharing core runtime. Proof-backed. The platform can now be resold as a branded developer cloud by any operator.
Persistent unattended maintenance scheduling with policy gates. The platform can run scheduled maintenance cycles, apply policy-approved fixes, emit evidence-ledger output, retry or rollback on failure, and reopen recurring issues. Operator is notified. Nothing runs without a policy gate allowing it. Maintenance work is provable, not just claimed.
Commercial profile enforcement in code generation. Named profiles: internal product, client work, white-label branch, acquirable core asset, regulated internal tool, community edition, resale-restricted deliverable. Generation planner respects commercial profile before producing patches, exports, or templates. Founder-only module protection and export restrictions are enforced, not just documented.
Global keyboard overlay from any active SkyeHands surface. Exact live backing-file-path resolution for the current screen, route, panel, or focused UI element. Clipboard copy. Bug-log capture appending path + notes into a persistent operator log. Tabbed menu: Path, Keyboard Commands, Terminal Commands. Restricted-surface redaction and tamper-evident event verification included.
Integrated project-reader lane. Launch-path reconstruction and route testing. The system can read an external project, reconstruct its route topology, test launch paths, and produce a reader-dossier with evidence. Combined with SkyeClone, this gives the platform a complete external-project intelligence pipeline from ingestion to evidence.
Investor-ready audit website generation from scan + proof evidence. The platform can produce a deterministic valuation lane with an investor-facing audit website surface showing why a scanned product is worth what it is worth — backed by route proof, action proof, descriptor depth, replay evidence, and council arbitration. SkyeHands can audit itself and generate its own investor materials.
One canonical intake lane for imported platforms. Generated per-platform manifest, canonical registry, package/script/static-surface discovery. Notably: SkyeAccountExecutive-CommandHub is now integrated into the SkyeHands platform mesh — the Credential Hub launcher can be launched from a generated SkyeHands plan. Missing targets are denied loudly instead of faked.
Imported platforms become searchable capability graphs, not just parked source trees. The power mesh indexes capabilities, routes, and launch paths across all imported platforms and makes them queryable. A developer can ask "what can I launch from SkyeAccountExecutive?" and get a real answer backed by the manifest graph.
Makes the shipped agent-core story concrete enough for diligence. Adds a real runtime bundle with a launchable server, smoke-provable health endpoint, and evidence chain that a reviewer can trace from source to shipped artifact. The platform can now present its agent core as a diligence-ready component, not just a dependency reference.
Per the Foundation Refresh valuation note and current-chain refresh planner — the following remain open until their proof reruns are executed green and artifacts are refreshed:
This is the proof posture: open items stay blank and stay disclosed. In the current-truth lane, Stage 11 and Section 42 are green, and the active working-base floor is $86.8M. The only openly remaining blank is live provider variable configuration.
Before DevGlow features could ship, the runtime needed to be hardened from the ground up. Sections 37–45 built the foundation: skeptic-proof hardening, production posture, runtime isolation, disaster recovery, rootless namespaces, kernel containment, signed surface identity, execution attestation, and AppArmor policy. Every section is proof-passing.
Every claim forced through hostile reviewer scrutiny. Proof artifacts structured to survive a skeptical buyer asking "prove it" at every checkpoint.
Production-grade runtime posture across startup, dependency resolution, process lifecycle, and error recovery paths.
Tenant isolation at the runtime boundary. Per-tenant proof artifacts demonstrating workload separation under concurrent stress.
Disaster recovery lane with backup export, restore, rollback, and verified recovery. Backup integrity verified by hash before restore is accepted.
Rootless container namespace launch with signed deployment attestation and rollback timing evidence. No root required to start the runtime.
Trimmed rootfs pivot, kernel cgroup controller placement for CPU/memory/PID ceilings, compiled seccomp filtering, exact artifact-bound attestation for the shipped release tarball.
HTTP surface serves a signed deployment-and-artifact identity document. AppArmor profile generation per workspace. Fail-closed when kernel enforcement unavailable.
Signed execution-attestation receipts with namespace, seccomp, no-new-privileges, AppArmor, cgroup evidence. CPU-bound hostile workloads proved terminated by runtime envelope.
Real AppArmor profile-load / aa-exec capability gating. v1/v2-aware delegated controller planner emitting concrete quota and attachment commands for cpu, memory, and pids.
The expansion directive runs to Section 57. Each section must survive a hostile reviewer before it ships. These are open — nothing gets claimed until code exists, runtime exists, hostile paths exist, and proof artifacts pass.
Every section in the expansion directive must satisfy five proof dimensions before it ships: initialization proof, action proof, persistence proof, explanation proof, hostile/failure proof.
A section is only complete when a hostile reviewer would be forced to attack the category thesis itself instead of the implementation quality. That is the standard SOL holds itself to — and it is why every closed section has a passing proof artifact with timestamps, check arrays, evidence objects, hostile checks, and recovery checks.
Nothing stays open on a technicality. Nothing gets claimed on a roadmap that hasn't been proven in code.
Before DevGlow: SkyeHands was the only platform that combined a full browser IDE, an autonomous coding agent, sovereign credential architecture, and enterprise governance in one product. That was already a category of one.
After Pass 44: SkyeHands is the only autonomous engineering platform with a specialist multi-agent council (kAIxU Council), live economic reasoning over every run (CostBrain), named compliance modes for regulated industries (Compliance-Native), governed autonomy spectrum (Autonomy Gradient), environment reconstruction from external projects (SkyeClone), white-label tenant provisioning (SkyeFoundry), investor-grade audit website generation (Valuation Audit Mode), and an integrated platform mesh connecting SkyeAccountExecutive.
The comp set — Cursor, Devin, Replit, Gitpod, GitHub Copilot — cannot describe a single one of these 16 capabilities. They are not approaching them. SkyeHands shipped all 16, carried them into the current-truth lane, and closed Stage 11 plus Section 42 on the active base. Current working-base floor: $86.8M. Version: 3.1.9.
These sections remain the biggest capability jump in the platform's history. The current codebase shows they are still present on the active base, and the current-truth docs add the latest closure lane on top: Stage 11 and Section 42 are now green, lifting the active working-base valuation to $86,800,000.
Root entrypoint packaging convergence is now physical, not doc-only. Section 62 and 63 exist in the surviving artifact chain. Agent-core now has a shipped runtime bundle surface for diligence. This note remains conservative because unresolved Stage 8–11 portability and provider-variable deployment proof are still open — which means the floor has room to move higher.
SkyeHands goes from single-agent to a specialist multi-agent council. Roles: Architect, Implementer, Test Breaker, Security Reviewer, Migration Engineer, Deploy/Recovery Agent, Documentation Agent, Cost Optimizer. Each role has its own budget, confidence score, and output artifacts.
The arbitration lane handles approval, denial, veto, majority, tie-break, escalation, and human override. When the Architect and Implementer disagree, there is a governed resolution path — not a guess.
The runtime now routes tasks across providers by capability, cost, latency, trust tier, tenancy scope, policy limits, and health state. The same task runs differently under "cheapest acceptable," "private-only," "enterprise policy," or "human approval required" routing modes.
Failover logic across sovereign providers. If Neon goes down, the runtime reroutes to a configured backup under the same policy constraints — without leaking tenant data across trust boundaries.
Every run now has a cost model. Token spend, compute cost, build time, deploy cost, storage cost, and rollback risk are tracked per run and used to choose materially different runtime strategies.
Planning modes: cheapest acceptable, safest regulated patch, fastest fix under budget, private-only budget mode. The platform makes economically rational engineering decisions, not just technically correct ones.
Before Section 52, SkyeHands told enterprise buyers "we can run in a compliance posture." After Section 52, the platform binds named modes to concrete, verifiable runtime behavior differences — tool access, logging depth, data retention, provider routing, approval workflow, export policy.
A security reviewer can inspect the finance mode policy pack and confirm the runtime enforces it — not just claims to. That is the difference between a compliance story and a compliance architecture.
"The same task now behaves materially differently under suggest-only, draft-and-wait, execute-with-review-gates, full autonomous, and continuous maintenance modes. Those modes are bound by scope, policy, and compliance posture instead of being a loose toggle."
kAIxU surfaces plans and diffs for human review. Nothing executes. Full transparency, zero autonomous action. For teams that want AI reasoning without autonomous execution risk.
kAIxU executes within defined scopes and pauses at configured checkpoints for human approval. The gate positions, scope boundaries, and escalation paths are policy-bound — not UI toggles.
kAIxU runs unattended within policy, reports via evidence ledger, and surfaces exceptions for human review. Continuous maintenance mode persists across sessions — no "start the agent" step required.
A user drops in external project material — repo metadata, docs, config files, deployment descriptors, runbooks, traces. The system ingests, extracts a dossier, and reconstructs a usable environment model with explicit honesty: what was inferred, what was confirmed, what is conflicted, and what is still missing.
The gap report is not a placeholder. It drives a UI surface that shows exactly what evidence the reconstruction is based on and what would make it stronger.
Every dev agency, enterprise team, and acquirer who onboards a new codebase spends days reconstructing the environment. Section 54 makes that reconstruction a product feature — not a manual process.
Combined with Deep Scan Mode (S59) and Valuation Audit Mode (S60), Environment Mirror means SkyeHands can ingest any project ZIP, reconstruct its environment, scan its launch paths, and produce a valuation-audit website — all from a single operator command.
Tenant-brandable shell generation. Per-tenant domain, policy, provider, and audit posture configuration. Per-tenant feature tiering. Bleed-denial proof — one tenant cannot access another's evidence, exports, or branding surfaces. SkyeHands becomes a platform for platforms.
Persistent maintenance scheduler for dependency upgrades, flaky test detection, stale code discovery, vulnerability patch proposals, doc refresh, and infrastructure drift checks. Runs under policy gates. Evidence ledger output per maintenance cycle. Retry/rollback behavior on failures.
Project commercial profile model: internal product, client work, white-label branch, acquirable core asset, regulated internal tool, community edition, resale-restricted deliverable. The generation planner respects commercial profile before producing patches, exports, or templates. Founder-only modules are enforced at the runtime boundary.
Global keyboard command opens the DevGlow overlay from any active SkyeHands surface. Resolves the exact backing file path for the live screen, route, panel, or focused UI surface. Clipboard copy action. Command registries. Bug-log capture. Restricted-surface redaction. Tamper-evident event verification.
User supplies a ZIP or project directory. The system ingests it, extracts a dossier via skye-reader-hardened, reconstructs the environment model, identifies deployed-style launch targets, and runs a proof scan of routes and actions.
The reader bridge ties dossier evidence to replay, proof, and valuation readiness. The output is a structured deep-scan report that feeds directly into Valuation Audit Mode.
Consumes a verified deep-scan report. Produces a deterministic single-number valuation driven by launch evidence, route proof, action proof, descriptor depth, council arbitration, and reader-derived context — not narrative.
Generates an investor-ready audit website from the platform's own base template. The website is not a doc — it is a rendered, evidence-backed product valuation surface that ships inside the repository.
One canonical intake lane for any imported platform at platform/user-platforms/<slug>/source/. Generated per-platform manifest. Canonical registry. Honest ready-versus-denied launch profiles.
First platform imported and proven: SkyeAccountExecutive-CommandHub-s0l26-0s — the same CommandHub project from the SOL portfolio. It is now a first-class imported platform inside the SkyeHands mesh with a generated launch plan and denied-script proof.
Converts imported platforms from parked source trees into searchable, launchable capability graphs. The mesh can query across imported platforms for shared capabilities, overlapping dependencies, and cross-platform launch surfaces.
The SOL portfolio is now a capability graph, not a folder of ZIPs. Any platform in the mesh can be discovered, compared, and launched from a single operator surface.
Makes the agent-core story concrete enough for diligence. Root entrypoint packaging convergence is now physical, not doc-only. Agent-core has a shipped runtime bundle surface. The surviving artifact chain includes Section 62.
This is the section that locks the $40.95M floor. The evidence chain is closed. A diligence reviewer can trace from the root entrypoint through to proof artifacts without any documentation-only gaps in the chain.
SkyeHands is built on a commitment to honest, proof-backed claims. This page exists because the phrase "77.6% SWE-bench" is technically incomplete without four pieces of context. Here they are, unvarnished.
The official SWE-bench ecosystem has multiple distinct evaluation variants — each a different dataset with a different size, difficulty profile, and comparability baseline. Quoting a score without naming the variant is like quoting a marathon time without specifying the course distance.
The leaderboard currently tracks: Full (2,294 instances), Verified (500 instances, human-validated), Lite (300 instances), Multilingual (300 instances), and Multimodal. A 77.6% score on Lite is a fundamentally different achievement from 77.6% on Full. The instance count and difficulty profile are not comparable across splits.
The official SWE-bench leaderboard explicitly emphasizes that results should specify the agent scaffold and harness setup used. Two agents using different scaffolds on the same split produce scores that aren't directly comparable. Whether the 77.6% was produced with a custom scaffold, the official harness, or a third-party evaluation framework is not currently disclosed in the available documentation.
SWE-bench evaluations can differ significantly depending on whether the agent is permitted one attempt per instance or multiple. Multi-attempt evaluations naturally yield higher resolution rates and are not comparable to single-attempt benchmarks. The evaluation methodology behind the 77.6% figure does not currently specify this parameter.
The gold standard for SWE-bench claims is a published evaluation report with instance-level resolution logs, pass/fail evidence per issue, and a reproducible setup. Without these, a score cannot be independently verified. The 77.6% figure currently does not have a publicly accessible evaluation report that meets this standard.
"After their data was assimilated" is not a standard SWE-bench term. It does not appear in the official evaluation documentation, the leaderboard specification, or any recognized benchmark methodology. It is not a recognized evaluation modifier.
The phrasing appears to suggest that evaluation materials, architecture documentation, or context from the SkyeHands codebase were ingested by the agent as context before or during evaluation. If that is the case, it raises a legitimate comparability question: agents evaluated with additional proprietary context are not directly comparable to agents evaluated under standard harness conditions with no domain-specific pre-loading.
The important claim is the score itself. The phrasing around how that score was reached needs clarification before it can be presented to investors or procurement reviewers as a benchmark-comparable figure.
The 77.6% figure reflects a documented evaluation for one autonomous agent lane referenced by the platform. That evaluation should be read as evidence about a specific agent lane, not as the full definition of kAIxU. kAIxU itself is the orchestration layer above multiple connected execution lanes.
However, until the following four details are confirmed and published, SkyeHands presents this figure with a disclosure rather than as a standalone benchmark claim:
This is the right posture for a platform committed to proof-backed claims. The same standard that requires every proof section to have a passing artifact before claiming completion applies here too.
| Variant | Instances | Nature | Comparability note |
|---|---|---|---|
| SWE-bench Full | 2,294 | Complete dataset — hardest to score well on | Highest-credibility benchmark for strong claims |
| SWE-bench Verified | 500 | Human-validated subset of Full | Most commonly cited for leaderboard comparison |
| SWE-bench Lite | 300 | Curated tractable subset | Easier; scores not comparable to Full/Verified |
| SWE-bench Multilingual | 300 | Non-Python repositories | Different capability domain entirely |
| SWE-bench Multimodal | Varies | Visual/multi-modal issue resolution | Different task type; not cross-comparable |
The leaderboard also specifies that results should note whether the agent used the official test harness, a custom scaffold, or a third-party evaluation framework — because these produce meaningfully different resolution rates on identical instance sets.
Every section of the SkyeQuantaCore proof ladder requires that a claim stay blank until code exists, the runtime path exists, the hostile/failure path exists, and a proof artifact passes. The same intellectual discipline applies to third-party benchmark citations.
A benchmark figure presented without methodology is not wrong by default — it may be entirely accurate. But it cannot be used as a comparative claim in investor materials, procurement packages, or competitive analyses without the four missing details above. This page exists to be transparent about that boundary.
When the evaluation methodology is confirmed and a report is published, this page will be updated to reflect the confirmed claim with full specification. Until then, the position is: high-performing autonomous coding agent, score pending full methodology confirmation.
The capability is real. The specific benchmark number needs its methodology confirmed before it can be cited in a procurement-grade claim.
SkyeHands ships a claims register, dated proof artifacts, and hostile reviewer standards precisely because the platform is built for procurement and enterprise review. A platform that presents every claim with its supporting evidence — including the honest limits of that evidence — is a more credible platform than one that cites metrics without methodology.
When the SWE-bench evaluation report is confirmed and published, the comp table will be updated with the full specification: variant, harness, attempt methodology, and a link to the report. The current notation in the comp table — "77.6% SWE-bench · eval disclosure" — is the accurate interim state.
SkyeHands is not a single product. It is a sovereign autonomous engineering cloud with 72+ platform products and capability planes — each proof-backed, each dated, each with its own architecture. Select any app for a full breakdown.
Parent procurement and fulfillment network: companies post jobs, contractors onboard, contractors claim work, AE Flow coordinates, JobPing publishes demand, SkyeRoutex carries closeout, and SkyeCards attach usage economics.
SkyGate-issued usage card system with Stripe setup sessions, PayPal mandate registration, ledgered AI/product credits, token and push buckets, paid currency packs, monthly benefit policy, and a dashboard surface.
SkyeForgeMax is promoted into the canonical SkyeSol estate, while JobPing is bound to AE Flow for restaurant coverage, open-house staffing, lead routing, appointment follow-up, and SkyGate-authenticated dispatch.
Multi-agent specialist council. Architect, Implementer, Test Breaker, Security Reviewer — with real arbitration, vetoes, and human override.
Persistent engineering memory graph. Prior failures, corrections, and architecture rules change future autonomous decisions.
Time-travel execution replay. Rewind any run to any checkpoint, fork under different conditions, verify tamper-evident event chain.
Live economic intelligence. Every autonomous decision modeled by token cost, compute cost, deploy cost, and rollback risk before execution.
Governed autonomy spectrum from suggest-only to fully autonomous. Policy-bound. Forbidden escalation denied. Review gates enforced.
Every code change ships with a signed, verifiable evidence pack. Diffs, replay refs, audit verification, artifact hashes — all packaged and attested.
Policy-aware provider routing. Same task routes differently under different trust, cost, latency, and compliance constraints. Failover proven.
Finance, healthcare, government, education, air-gapped — each a named mode binding tool access, logging depth, provider routing, and export policy.
Drop in any external project — descriptors, docs, configs, traces. SkyeClone reconstructs a usable environment with honest gap reporting.
Unattended scheduled maintenance. Stale deps, flaky tests, vulnerability patches — detected, queued, executed, and logged without manual initiation.
Commercial profile enforcement in code generation. Founder-only modules, white-label restrictions, export policy — all enforced before any patch ships.
Spin up distinctly branded autonomous developer clouds from the core platform. Per-tenant domain, policy, provider posture, and feature tiers. No cross-tenant bleed.
Integrated project-reader. Launch-path reconstruction and route testing across any imported platform. Reader-dossier with evidence chain.
Generates investor-ready audit websites from scan + proof evidence. SkyeHands can audit itself and produce its own investor materials. Deterministic valuation lane.
Imported platforms become searchable capability graphs. Query what any connected platform can do. SkyeAccountExecutive integrated and launchable.
Full-page breakdown now includes runtime map, route inventory, persistence model, proof pack, and deployment posture from the uploaded zip.
Full-page breakdown now includes screen map, offline storage posture, encrypted recovery flows, and field-work lanes from the uploaded zip.
Full-page breakdown now includes 196 smoke-backed checks, 13-AE runtime mapping, command views, and live-brain control lanes from the uploaded zip.
Route & dispatch vault. Offline assignment, proof-of-delivery, white-glove bookings, dispatch, memberships, fleet management. Stage 64+.
Section 61 (Platform Launchpad + Import Mesh) integrated SkyeAccountExecutive-CommandHub into the SkyeHands platform mesh. The Credential Hub launcher, SkyeRoutexFlow, AI Appointment Setter, and Lead Vault are all imported as launchable platform nodes — queryable via Section 62 Platform Power Mesh, scannable via Section 59 Deep Scan Mode, and auditable via Section 60 Valuation Audit Mode.
What was two separate project ecosystems is now one sovereign autonomous engineering cloud. Every app is a node. Every node is launchable, queryable, and provable.
From a single autonomous agent to a specialist multi-agent engineering council. Eight distinct roles. Real arbitration. Vetoes. Budget exhaustion handling. Human override. Every scenario proof-backed.
"Multiple autonomous roles can disagree, arbitrate, and converge on a real engineering result with evidence."
Before the Council, every kAIxU task was a single agent operating across all roles simultaneously — planning, implementing, testing, reviewing, all as one process. The agent could disagree with itself but had no formal mechanism for that disagreement to produce different outcomes.
The Council separates those roles into distinct agents with distinct mandates, distinct budgets, distinct confidence scoring, and a formal arbitration lane between them. When the Architect and Implementer disagree, that is not an internal state — it is a recorded verdict difference that feeds into arbitration and produces a documented resolution.
Every council run produces a full artifact set. A procurement reviewer can inspect the Architect's plan, the Implementer's patch, the Test Breaker's objections, the Security Reviewer's approval, and the final arbitration summary as distinct, dated documents.
Architect/Implementer disagreement → recorded, arbitrated. Security veto → execution stops, explanation emitted. Budget exhaustion mid-council → partial council state preserved, human notified. One agent failure → council recovers or fails loudly with state preserved. Human override → final decision document reflects override, cannot be tampered.
No other autonomous coding platform runs a council. Cursor runs zero agents. Devin runs one. kAIxU Council runs eight, with formal disagreement, arbitration, and a human-reviewable decision record. This is the difference between a solo contractor and an engineering team — but the team runs in minutes, not weeks.
Role timeline, verdict cards, objection list, confidence scores per role, budget consumed per role, and final arbitration summary — all visible in a single panel. An operator can see exactly which role blocked a change and why, without parsing logs.
Dated April 7 2026. Contains council launch proof, role verdict artifacts, arbitration result, hostile scenario outcomes including security veto and budget exhaustion, and human override validation.
Every other autonomous coding tool starts each session cold. SkyeMemory Fabric gives kAIxU a persistent engineering memory — a typed graph where prior failures, corrections, and architecture decisions change future autonomous behavior.
"The system can truthfully show that a prior failure and correction materially changed a later autonomous decision."
SkyeMemory Fabric is not a log. It is a typed directed graph where nodes are engineering objects and edges are causal relationships. When kAIxU fixes a bug, it stores not just what it did but why — what caused the failure, what fix resolved it, what files moved together, what architecture rule the fix confirmed or violated.
On the next related task, kAIxU queries the graph first. If it finds a prior failure of the same type in the same area, it loads that context into its planning layer. The resulting plan is materially different — it avoids the failure pattern it has already learned.
Contains fixture task run, fixture failure, repair storage, human correction storage, persistence proof, decision-change proof, dedupe proof, contradiction precedence proof, and graph corruption detection proof.
Every autonomous run kAIxU completes can be rewound to any checkpoint, inspected at any step, forked under different conditions, and exported as tamper-evident procurement evidence.
"A real autonomous run can be rewound, inspected, verified, forked, and re-executed from a checkpoint under different model, policy, or budget conditions."
Every event in an autonomous run is captured in order: planning decisions, file reads, file writes, command starts and exits, test failures, policy denials, approvals, deployments, runtime transitions. Each event is timestamped and chained. The chain has a verification digest.
Between checkpoints, SkyeReplay stores diffs — not just final state. This means you can reconstruct exactly what the file tree and terminal output looked like at step 7 of 43, not just what they looked like at the end.
Contains fixture task run, ordered event persistence, file state reconstruction at step N, terminal reconstruction at step N, export bundle, re-run from checkpoint, tamper detection for removed event, tamper detection for modified diff, out-of-order rejection, and fork divergence proof.
SkyeHands is now a proof-producing engineering cloud. Every code change ships with a signed, verifiable evidence pack. Procurement-safe redacted export. Remove one artifact — validation fails. Tamper one hash — attestation fails.
"The platform can ship a code change and a verifiable proof package for that change."
Live economic intelligence over every autonomous decision. The platform knows what each choice costs before it makes it — token spend, compute cost, deploy cost, rollback risk — and plans differently under different budget constraints.
"The platform can choose materially different engineering strategies based on explicit economic constraints and explain why."
Regulated development modes as first-class runtime behavior — not brochure language. Finance, healthcare, government, education, air-gapped — each binding tool access, logging depth, data retention, provider routing, approval workflow, and export policy.
"A regulated mode measurably changes runtime behavior, allowed actions, and evidence posture compared with a less restricted mode."
Autonomy is not a toggle. It is a governed spectrum from suggest-only to fully autonomous, each mode binding task scope, policy tier, compliance posture, and human approval requirements. Forbidden escalation is denied — not warned about.
"The same task behaves materially differently under different autonomy settings, with policy and evidence enforcing the distinction."
Autonomy mode is not a global setting. It is bound per task, per workspace, and per policy tier. A security-sensitive repo can be locked to draft-and-wait while a test-only repo runs full autonomous.
Drop in any external project — descriptors, docs, configs, env templates, runbooks, traces. SkyeClone reconstructs a usable environment model with explicit honesty about what was inferred, confirmed, conflicted, or still missing.
"The system can reconstruct a materially usable engineering environment from partial external signals and honestly show what is missing."
SkyeClone does not pretend to have information it doesn't have. Every reconstructed environment model includes an explicit gap report: what was inferred from partial signals, what was confirmed from hard evidence, what conflicted between sources, and what is still missing and why.
SkyeClone feeds directly into Deep Scan Mode (S59), which can launch-test the reconstructed environment, and Valuation Audit Mode (S60), which can produce an investor-grade dossier from the reconstructed platform. The SkyeAccountExecutive-CommandHub was brought into the platform mesh via this pipeline.
Spin up distinctly branded autonomous developer clouds from the SkyeQuantaCore platform. Each tenant gets its own domain, policy posture, provider bindings, audit configuration, and feature tier — with zero cross-tenant bleed, proven hostile.
"The platform can spin up distinctly branded autonomous developer clouds without cross-tenant leakage."
SkyeFoundry makes SkyeHands resellable. Any operator can provision a branded autonomous developer cloud for their own customers — with their own logo, their own compliance posture, their own provider bindings — all powered by SkyeQuantaCore underneath. This is an OEM / white-label revenue lane with no additional engineering work per tenant.
The platform detects, queues, and executes maintenance work without requiring the operator to initiate every action manually. Stale dependencies, flaky tests, vulnerability patches, doc refresh, infra drift — all handled unattended within policy gates.
"The platform can detect, queue, execute, and explain maintenance work without requiring the user to initiate every action manually."
Every maintenance action requires a policy gate allowing it before execution. If the policy denies mutation, the scheduler logs the detection, proposes the action, and stops — loudly. No silent mutations. No action outside allowed windows.
Every maintenance run produces evidence: what was detected, what action was taken, what policy allowed it, what the before/after state was. Recurring issues are tracked in the scheduler — if a flaky test is fixed and recurs, the scheduler reopens it with cross-reference to the prior fix attempt.
Code generation that respects commercial profile. Founder-only modules stay locked. White-label exports exclude restricted components. Client work stays isolated from internal product. Every generation decision is policy-enforced, not just documented.
"Generation and export behavior changes by commercial profile, with founder-only modules and white-label restrictions enforced at the planner level."
Skyes Over London LC operates across multiple product lines — SkyeHands, SkyeRoutexFlow, AE CommandHub, SkyeFoundry tenants. Deal-Aware Generation ensures that code produced for a white-label client cannot inadvertently expose core IP, that acquirable asset packaging strips operational secrets, and that founder-only modules are enforced at the generation planner level, not just as a documentation policy.
Provider connectivity becomes policy-aware sovereign runtime orchestration. The platform reasons over multiple providers by capability, cost, latency, trust tier, tenancy scope, health, and policy limits — and routes the same task differently under different conditions.
"The platform can reason over multiple sovereign providers, route by policy, fail over, and explain every routing decision."
SkyeSovereign Runtime (S50) is the routing intelligence layer. The Sovereign Provider Plane (S29–S35) is the credential storage and per-workspace binding layer. Together they form the complete sovereign infrastructure — user-owned credentials, encrypted at rest, routed by policy, audited on every access.
The integrated project-reader. Drop in any platform — SkyeHands scans it, reconstructs its launch topology, tests its paths, and produces a reader-dossier with evidence. This document you're reading was produced by this pipeline.
"The platform can scan any imported project, reconstruct its route topology, test launch paths, and produce a dossier with evidence."
Section 61 imported SkyeAccountExecutive-CommandHub into the SkyeHands platform mesh. Deep Scan Mode was used to reconstruct the Credential Hub launcher's route topology, test which launch paths succeed versus which deny missing service targets, and produce the evidence that Section 62 Platform Power Mesh uses to answer capability queries.
The SkyeHands investor materials you are reading were produced by a Deep Scan + Valuation Audit Mode pipeline running over the SkyeHands platform itself. The platform audits itself and generates its own investor evidence chain.
SkyeHands generates investor-ready audit websites from its own proof evidence. Route proof, action proof, descriptor depth, replay evidence, council arbitration — assembled into a deterministic valuation lane with a public-facing investor surface.
"The platform can produce a deterministic valuation lane with an investor-ready audit website surface — backed entirely by proof evidence, not marketing claims."
Section 60 closes a remarkable loop: the platform you are reading investor materials about used its own Valuation Audit Mode to produce the investor materials you are reading. The audit website template at docs/templates/INVESTOR_AUDIT_WEBSITE_BASE_TEMPLATE.html is generated by the platform from its own proof chain.
This is not a circular argument — it is a capability demonstration. A platform that can produce a rigorous, honest, evidence-backed audit of itself is a platform that can do the same for any imported platform in the mesh. Deep Scan Mode (S59) + Valuation Audit Mode (S60) is the complete investor intelligence pipeline.
Imported platforms become searchable, queryable capability graphs — not parked source trees. The Power Mesh indexes capabilities, routes, and launch paths across every connected platform and answers questions about what each can do.
Currently meshed via Section 61 Platform Launchpad: SkyeAccountExecutive-CommandHub including the Credential Hub Launcher, AE Brain Command Site, AI Appointment Setter, Skye Lead Vault, SkyeRoutexFlow, SkyeOfferForge, SkyeBox Command Vault, and all branching apps.
The Power Mesh makes the SkyeHands platform capable of querying: "What can I launch from SkyeAccountExecutive?" and returning a real, evidence-backed answer from the capability graph — not a README.
The most complete app in the AE Central Command Pack. The uploaded zip shows a dependency-light Python server, a full SQLite-backed operating model, four operator/public surfaces, real booking and billing flows, live calendar adapters, outbound/inbound messaging, voice handling, and a production handoff lane — all packaged as one deployable service.
The package is deeper than a scheduler. The readme spells out qualification capture, transcript logging, live availability, round-robin rep assignment, reminder queueing, self-service appointment management, downloadable ICS, intake packet and waiver capture, invoice lifecycle control, credit memo handling, playbook sending, voice outbound/inbound, and real inbound SMS/email reply capture.
Calendar adapters exist for Google Calendar and Microsoft 365. Outbound delivery supports SMTP or webhook rails. AI is optional polish on top of a deterministic booking pipeline rather than the only thing holding the product together.
The uploaded zip includes hardening notes for first-login rotation, password policy validation, login lockout, CSRF on authenticated writes, secure cookies for HTTPS, org-scoped admin access, signed voice webhooks, and a clean release database. That makes this page a true production-service breakdown, not just a feature list.
Inside SkyeHands, this branch app is a launchable connected platform. kAIxU can route work into it, Deep Scan Mode can inspect it, and Valuation Audit Mode can treat it as a standalone diligence-ready operating asset.
The prior AE valuation pack placed AI Appointment Setter Brain v33 in the $3.2M–$6.4M standalone band. What the uploaded zip adds to that story is structure: 4 working operator/public surfaces, 69 visible server routes, 29 tables, 43 environment keys, and a proof+deployment bundle that makes the app legible as a real operating system for intake, booking, billing, and follow-up.
The uploaded zip frames Lead Vault as a true offline field app rather than a single dashboard. It ships a static PWA shell, 12 HTML surfaces, a local data engine in one app bundle, route and territory planning, encrypted backups, recovery tools, script generation, analytics, and privacy controls — all with no backend required.
The app runtime names the product as an offline lead-control system with dedupe radar, recovery lane, route planning, script generation, and encrypted backup. It is designed for the field: lead work without depending on a cloud round-trip every time an operator needs to capture, sort, recover, or follow up.
That makes this branch app valuable for seller/operator environments where reliability matters more than constant connectivity.
Lead Vault is the offline field-memory node in the AE Central Command Pack. Section 61 makes it launchable from the platform mesh, while the platform narrative makes it the place where route plans, lead intelligence, quick field capture, and resilient backup behavior live when a seller is away from the network.
The uploaded zip proves this is more than a feature card. It is a packaged offline operating lane with twelve visible surfaces and a clear role in the connected AE stack: capture, organize, recover, route, and work leads without waiting on a backend.
The uploaded zip shows AE Brain as the command-and-control layer of the AE stack: a launchable PWA capsule with 13 named AE profiles, 13 mapped key slots, a 196-check smoke proof, live brain routing hooks, client/task/transcript systems, multi-user controls, remote usage and audit lanes, and integration handoffs into Appointment Setter and commerce.
The smoke proof in the zip is unusually specific. It confirms client intake and ledger, manual and automatic assignment, history creation, JSON/CSV export, bulk client actions, stage/priority lanes, client dossier linking, unavailable-AE rebalance, task board controls, transcript creation and reply, full-text transcript search, thread export/promotion, directive generation, launcher links, connected runtime lanes, live brain routes, founder auth helpers, usage metering, remote usage summary, remote audit events, batch live smoke, runtime editor, template API lanes, and multi-provider failover.
That is the difference between a dashboard shell and a real command platform: the zip shows behavior, not just tabs.
AE Brain is the orchestration desk for the connected platforms, not just another branch app. It decides who handles a client, what task or response gets created next, which transcript turns become work items, when a client gets handed into Appointment Setter, and how results come back into the AE operating loop.
Inside SkyeHands, that makes AE Brain the command surface that turns the other connected platforms into one coherent operating mesh instead of a pile of disconnected tools.
v8 is also explicitly documented as additive. The zip describes it as capabilities added on top of a proven prior state rather than rewritten from scratch. That aligns it with the larger SkyeHands proof-pass philosophy: preserve what works, extend the system, then smoke the new state until it is legible.
This page is now driven by the uploaded zip’s real evidence: power manifest counts, smoke proof depth, runtime lanes, key-slot mapping, and the actual command views in the app code — not just a short summary card.
This uploaded package surfaces Routex through the parent SkyeAccountExecutive-CommandHub shell and its connected integration surfaces. The parent shell presents Routex as the field-execution side of the stack: route/dispatch control, bridge handoff, runtime console, live ops deck, production-closure deck, and a white-glove commerce/operations lane connected to the AE command system.
Inside this uploaded package, Routex is the field-execution half of the AE command system. Appointment Setter handles intake and booking. AE Brain handles routing, assignment, and command decisions. Lead Vault handles offline lead memory and territory work. Routex is where that work becomes managed operations, dispatch, and closure.
That is why the parent shell keeps surfacing Routex through the bridge, runtime console, ops deck, and production-closure deck rather than treating it like a side utility.
The parent shell’s valuation ledger names a $4.775M conservative present codebase, then layers stage uplifts through runtime/auth/sync/search, platform/runtime, branch-runtime, deep branch-runtime, local live-service/dashboard, and stage-eleven production closure to reach a $7.925M working combined position.
That makes Routex materially important to the connected-platform story in this zip even where the parent shell is the clearest evidence surface.
In the SkyeHands narrative, Routex is the node that turns AE intent into real-world fulfillment movement. It is the field lane, dispatch lane, and white-glove closure lane that completes the loop started in AE Brain, Appointment Setter, and Lead Vault.
This page now reflects what the uploaded zip itself proves about Routex at the parent-shell and integration level: direct launch surfaces, runtime and bridge lanes, production-closure claims, and combined valuation role inside the connected platform stack.
This page is the hard read on the current codebase. Not the older deck copy. The actual read on what the current codebase state proves now, what is still mixed-state or stale, what remains genuinely incomplete, and what a hostile reviewer would still flag today.
The current codebase now contains the active base plus a current-truth production-release lane. The current-truth VERSION_STAMP.json shows highestPassingStage: "11", releaseVersion: "3.1.9", and only one remaining blank: live provider variable configuration. Stage 11 regression proof and Section 42 hostile-environment rerun are green on the current working base.
A serious technical reviewer still would not call this vaporware. They would call it a real platform with a mixed-state repo history, a greener current chain, one host-bound remaining blank, and some older packet surfaces that still need normalization. That is a much stronger position than the earlier Pass 44 scan.
These are findings from opening and scanning the uploaded codebase directly — not the marketing copy.
230 bin files and 132 lib modules are not wrappers around existing tools. They are original product-owned scripts covering bootstrap, launch, doctor, workspace management, provider vault, proof runners, ship-candidate, audit-export, and more. A buyer would be pricing a real implementation, not a config layer.
Every section proof in docs/proof/ is a JSON file with generatedAt, pass: true, and a checks array. Sections 29–63 all have passing artifacts. These are not mock files — they have execution paths, fixture outputs, and hostile-failure checks baked in.
The provider vault (Sections 29–35) is real code: provider-vault.mjs, provider-sovereignty.mjs, provider-redaction.mjs. The Section 29 proof artifact shows actual ciphertext-at-rest posture, PBKDF2-SHA256 key derivation, and safe-metadata-only surfaces. This architecture exists nowhere else in the autonomous dev platform category.
The current-truth docs show the current chain is greener than the earlier Pass 44 read: Stage 9 deployment readiness, Stage 10 multi-workspace stress, Stage 11 regression proof, Section 8 deployment packaging, and Section 42 hostile-environment rerun are all CHECKMARK on the working base. The launch-readiness memo names the exact implementation files that closed those gaps. This is code-backed closure, not paperwork.
The Section 48 proof artifact contains actual council role execution, arbitration results, security veto simulation, budget exhaustion mid-council, and human override. These are not stated features — they are smoke-proven capability paths. The council-role model (Architect, Implementer, Test Breaker, Security Reviewer) is original SOL architecture.
The most compelling thing in the uploaded codebase is not any single feature — it is the consistent application of the completion gate: code exists, runtime path exists, hostile path exists, proof artifact passes, claim stays green. That discipline, applied across 63 sections over 44 passes, is itself a real asset. Most platforms don't have it.
These are real things in the codebase or claimed in materials that have not yet reached the same proof standard as the sections above. They are not fake — they are in-progress.
The current codebase now has a stronger current-truth lane, but older packet surfaces remain in the root docs tree. A reviewer can still open docs/VERSION_STAMP.json or older investor pages and land on earlier snapshots. The repo is real, but the narrative surfaces are not yet single-state.
This archive has at least three meaningful ways to count things: root platform files, broader archive entries, and counts that include mirrored dist/workspace copies. That is why older surfaces can cite 230 shell bins while the root shows 134. None of that means the product is fake; it means the counting method needs to be declared explicitly.
Live dispatch to paid providers requires production credentials and deployment environment variables. The code paths, dry-run contracts, and local proof harnesses exist; secrets are intentionally injected at deployment instead of being committed.
The Section 64 directive (Super-App Inheritance and Visual Analytics) exists in this codebase as a spec directive file. No proof artifact exists yet. It describes a compelling vision — imported platforms inheriting SkyeReplay, SkyeMemory, ProofOps, Council, and CostBrain — but it is a directive, not a proof-passing section.
$0 ARR. No paying customers. The platform has not been commercially launched. Every revenue projection in this site is a model, not actuals. The seed raise is precisely to fund the path from working proof-backed platform to commercial launch. This is not hidden — it is the entire point of the raise.
Some root-level packet surfaces in this codebase still show earlier valuation eras. The current-truth working-base valuation is $86.8M in the production-release docs. A reviewer opening the wrong packet surface first can still land on a stale read.
Theoretically, yes. Any JSON file can be written. What makes this less likely than it sounds: the hostile/failure path proofs in each artifact require specific failure behaviors (tamper-detection fails, out-of-order events rejected, budget overruns denied). These are harder to fake convincingly than passing proofs — you have to model what a failure looks like too. The proof artifacts in sections 29–35 reference specific profile IDs, timestamps, and encryption postures that are consistent across artifacts. That's harder to fabricate than a single passing JSON.
The honest answer is: a buyer should do code review, not just read artifacts. The artifacts are evidence, not proof-of-concept. The code review is what closes the question.
Both things can be true. The shell grew from 15 to 230 files across 44 passes. Some of those files are proof runners — purpose-built scripts that run a specific smoke check and emit a JSON artifact. They are real code, but they are not production-facing user features. The production-facing original code — bootstrap.mjs, launch.mjs, doctor.mjs, provider-vault.mjs, workspace-runtime.mjs, workspace-scheduler.mjs — is a smaller, genuinely impressive core. The proof runner scripts are the test infrastructure, not the product. Both are real. Neither is padding.
The current uploaded website adds the richer category narrative, while the April 30 closure packet adds the full 72+ platform valuation stack. The move to $86.8M is tied to the expanded ecosystem inventory: SkyeCards, ValleyVerified v2, SkyeForgeMax, JobPing AE Dispatch, SkyDexia, SkyeSuite, NeuralSpacePro, SkyeLeticX, offline PWAs, Dynasty pipeline, and the green deploy proof lane.
A hostile reviewer would correctly note that three-day valuation jumps of $34M are extraordinary and warrant scrutiny. The answer to that scrutiny is: read the section directives and the proof artifacts, not just the headline numbers. If the section implementations pass a code review, the valuations hold. If they don't, the floor number should be revised down. That's how it's supposed to work.
Yes. The browser IDE is Eclipse Theia — a real, production-grade VS Code-compatible browser IDE. The platform also includes real autonomous agent lanes and a product-owned shell, launch contract, doctor, bridge, gateway, and proof layer. Those lower execution lanes are real, but kAIxU is not reducible to any single imported component. The product-owned value is the orchestration, routing, persistence, governance, and super-brain behavior above those lanes.
No. kAIxU is the platform's super-brain and orchestration layer. It is not a rename for OpenHands. The platform runs through the gateway plane and can route work across multiple connected brain/model lanes, with kAIxU deciding which lane to use based on platform logic, training, and context. One autonomous agent lane may use tooling discussed in the eval disclosure, but that lane does not define the entirety of kAIxU. The correct client-facing statement is that kAIxU is the orchestrator above the execution lanes, not the label for a single underlying engine.
The "is this real enough to fund?" question is best answered by looking at what investors have actually funded at comparable stages.
SkyeHands is a real, working, original autonomous developer platform built by one person over 44 documented passes. The proof discipline is genuine — open items are disclosed, not hidden. The architecture is original — the sovereign credential layer, the kAIxU Council model, the Autonomy Gradient, and the proof-ops pipeline exist nowhere else in this category.
It is pre-revenue. It is pre-team. It has not been publicly launched. The gap between "working proof-backed platform" and "commercial product with paying users" is exactly what the seed raise is meant to close. That is not a weakness unique to SkyeHands — it is the definition of a seed-stage company.
A hostile reviewer who opened this codebase would not find fabricated claims. They would find a real platform with real gaps, documented by the platform itself, with a consistent proof system that holds the builder to the same standard as everyone else. The question investors should be asking is not "is this real?" The question is "can this team close the remaining gaps and get to commercial proof?" That is the bet.