Scope and limitations
Shown publicly
- Sanitized architecture and release-workflow visuals.
- High-level system boundaries, key components, and delivery approach.
- Evidence references with explicit public or placeholder status.
Private/demo-only
- Live environment telemetry and operator traces.
- Detailed incident records and internal runbook material.
- Client-sensitive implementation details and environment configuration.