Show the consequential code paths first
List the code locations where provider spend, tool authority, vendor actions, billing changes, transfers or irreversible shell effects already exist.
NORNR
Governance audit before the first integration call, not after the first incident.
NORNR / Governance audit
Repo audit wedgeThe point is not to produce a generic scanner score. The point is to show exposed paths, review-required surfaces, missing control layers and one exact integration patch that moves the repo toward NORNR.
Output shape
If it cannot name the lane, the missing control and the next patch, it is still too generic to sell NORNR.
List the code locations where provider spend, tool authority, vendor actions, billing changes, transfers or irreversible shell effects already exist.
Each finding should state what NORNR would enforce there: intent, review, counterparty scope, packet survival or finance-safe export.
The point of the audit is to make the first NORNR lane obvious enough that a buyer or engineer can move immediately.
GitHub URL in
This is the sales-engineering wedge version: one repo URL in, one named NORNR audit out, one patch path forward.
Paste a public GitHub repo to produce the first report.
The returned audit will name the repo, the high-risk exposures and the missing NORNR layers.
The first report should show exposed paths, not a generic score.
# NORNR Governance Audit
Paste a public GitHub repo URL above to generate the first report.
CLI
The page and CLI run the same audit motor, so outbound scans and internal analysis do not drift.
npm run audit:governance -- --root . --output reports/governance-audit.md
npm run audit:governance -- apps/api packages/sdk-py --max-findings 12
npm run audit:governance -- --format json
npm run audit:governance -- --github https://github.com/owner/repo --max-findings 8