Ship

Ship faster — without loosening the standards you sell on.

When speed goes up, the first things to get skipped are tests, security review, and release notes — the exact things your enterprise customers ask about in procurement. The Ship phase flips that: tests, security, and communications run on every release as part of the pipeline, not as a Friday-afternoon scramble.
Release without fire drillsSecurity-scanned by defaultCustomer-ready release notesAudit trail your GRC team loves
app.algorithmshift.ai / ship / release-v2.14.0

Release v2.14.0

Customer health score · staging → production

Ready to ship

Release gate

  • Tests

    172 / 172

  • Security scan

    0 critical · 0 high

  • Release notes

    Ready · 3 audiences

  • Approval

    2 of 2 signed

Environments

  • devapplied
  • stagingapplied
  • prodqueued

Release notes

CustomerInternalExec

What's new this release

Every customer now has a health score that updates daily from activity and billing signals. Your CSM team can spot at-risk accounts before renewal conversations — not after.

  • New health score column on the Customers list
  • Trend sparkline + signal breakdown on every customer page
  • Configurable rules — what counts as healthy for your accounts

Security findings

  • critical0
  • high0
  • medium0
  • low2

Test coverage

86%+2.3%

Audit trail

  • 14 agent runs
  • Hash-chained · signed
  • SIEM export ready

The problem

Teams selling to enterprises live and die by two things: how often they can ship, and how confidently they can answer a security review. Traditional CI gets you halfway — it runs tests someone already wrote and scans for known CVEs. The Ship phase covers the rest: generating tests from the spec, checking multi-tenant scope on every schema change, writing release notes your CSM can send to a customer without rewriting.

Tests

Generates unit + integration tests from the spec.

The Tests agent reads the spec and the pages it produced and emits tests that assert the behaviours described — component-level unit tests, route-level integration tests, Playwright specs for critical flows. Run locally or in CI before release; no hand-written scaffolding.

What it unlocks

  • Cover new pages with unit tests automatically
  • Add regression tests when a bug is fixed
  • Generate smoke tests for a release cut
test run · 172 specs86% cov
  • customers.spec43 pass
  • schema.spec28 pass
  • health.spec12 pass
  • admin.spec89 pass
coverage86% · +2.3%
Works with:review · debug

Security

OWASP + auth + data-exposure audit on generated code.

The Security agent runs on every page + API route the Pages and Integration agents emit, checking for injection, auth bypass, PII exposure, and OWASP top-10 risks. Findings are severity-tagged; releases can be gated on zero high-severity findings.

What it unlocks

  • Auto-scan every generated page before merge
  • Flag accidental PII exposure in API responses
  • Gate production releases on zero high-severity findings
scan · v2.14multi-tenant ✓
  • critical0
  • high0
  • medium0
  • low2
tenant scope checked

every query pins tenant_id · 0 violations

Works with:review · debug

Release notes

Drafts the changelog on iteration close.

The Release Notes agent drafts customer-facing changelog markdown the moment an iteration closes — organised by theme, including schema changes, and respectful of the features you'd rather not announce. No more copy-pasting Jira tickets into Notion.

What it unlocks

  • Auto-draft changelog the moment an iteration closes
  • Include schema changes non-engineers can parse
  • Skip unreleased / internal-only stories automatically
release notes · v2.143 audiences
CustomerInternalExec

What's new

Every customer now has a health score that updates daily from activity and billing signals.

  • Score column on Customers list
  • Trend sparkline on customer page
  • Configurable rules in admin
Works with:release

Every release

Security-scanned

multi-tenant scope checks on every schema change

Generated

First-pass tests

starting coverage, not a replacement for deliberate testing

3 audiences

Release notes, one artifact

internal, customer, executive — same source

SIEM-ready

Append-only audit log

signed, hash-chained, exportable

FAQ

Common questions

Does this replace our CI pipeline?
No — it augments it. Your existing CI still runs. The Ship agents add the work your team keeps meaning to do: generate missing test cases, run multi-tenant safety checks on schema changes, and write release notes from the approved spec rather than the git log.
Will this satisfy our SOC 2 / ISO auditor?
The audit log is append-only and hash-chained, with every agent run, tool call, approval, and release signed and linked. Most teams use it as the primary evidence for change-management and access-control controls. Exports to SIEM / GRC tools are built in.
How do you handle multi-tenant security?
The Security agent validates that every generated query pins tenant_id, every page respects role-based access, and every schema change passes the platform's multi-tenant linter. Built in, not bolted on — because we ship to enterprises too.
Can release notes be customer-facing straight out of the box?
Yes — pick the audience (customer, internal, executive) and the agent tunes tone, depth, and jargon accordingly. Your CSM gets something they can paste into an email; engineering gets the full diff narrative on the same artifact.
Can we gate releases on specific agents?
Every Ship agent can be blocking or advisory per workspace. Most teams run Security as blocking, Tests as blocking with engineering-lead override, and Release-notes as advisory. You decide the bar.

See the full platform in action.

Bring a real requirement. Watch it become a running app you can ship.