Show the hidden or ambient path first
Use Governance Audit to surface provider spend, browser-visible vendor actions, MCP authority or shell-level tool execution that already exists in the repo.
NORNR
Visibility first. Then one named control layer before the next consequential path hardens.
NORNR / Shadow AI discovery
Visibility-first wedgeThis is the easiest cold wedge because you are not asking a team to buy policy first. You are showing where consequential execution, provider spend and browser-visible actions already exist without a clear review boundary.
Discovery loop
Discovery only matters if it produces one exact control move. The strongest NORNR loop is still: exposed repo path, PR guardrail, right governed lane, then artifact-grade proof later.
Use Governance Audit to surface provider spend, browser-visible vendor actions, MCP authority or shell-level tool execution that already exists in the repo.
Budget Shield is the fastest proof because the team sees the control story inside engineering workflow before the risky path reaches main.
Use wrappers for provider spend, MCP for local tool authority and browser governance when the last consequential step is the web click itself.
Once the buyer is warm, use packets and monthly memo to show the same governed decision is still readable outside the product later.
What to look for
The point is not a score. The point is to say what the repo is already doing and where review or release ownership is missing.
These usually want a thin spend-aware wrapper first, then a fuller governed runtime lane once the team trusts the ingress.
When the last consequential moment is a click, form fill or confirmation step, the browser path itself is the first lane worth governing.
These usually want one reviewed tool boundary first so local power is named before the agent can act on it freely.
That is not “just API usage.” It is the beginning of a real counterparty and settlement story that needs one governed lane before it scales.
Best next move
The right discovery message is simple: here is the path, here is why it matters, here is the first move. NORNR comes in as the package for that first move, not the opening paragraph.
Use the audit when the team already has code and you need to show exposed paths in a repo-specific way instead of talking in abstractions.
Use the PR guardrail when you want the fastest possible proof that the team can review consequential changes before they merge.
This is the thinnest runtime move once discovery says the repo is mainly adding or widening paid provider calls.
Choose this when checkout, vendor confirmation, subscription changes or admin clicks are the clearest consequential step in the workflow.