Skip to the content.

Three Leaps · Bootstrap Handbook

The capability ladder from zero to L3 autonomy. The main methodology three-leaps.en.md assumes the L0 gravity field is already in place. This handbook covers the step before that: zero repo / zero CI / zero manifest / zero Harness — a greenfield bootstrap path.

中文版:three-leaps-bootstrap.md

After completing the 36 capabilities in this handbook, your team has more than satisfied the entry conditions for the L3 leap.


0 · Scope

What this is

What this is not

Prerequisites

Out of scope

Key acknowledgements (preserving v3’s reflective spirit)


1 · Design Principles + Phases vs Time

Four design principles

  1. Capabilities replace time — time commitments lie, capability achievement is real
  2. Entry/exit signals must be objectively observable — no subjective judgment
  3. Capability is the subject, tools are details — 5-field standard template
  4. Preserve reflective spirit — this handbook can still be refuted by practice

Why time lies

Dimension Real variance How time commitment fails
Team size Solo vs 5 vs 30 Same phase varies 5–10× in duration
Tool familiarity First contact vs expert Learning curve 1–4 weeks
Parallelism Full-time vs part-time vs hobby Real input differs 3–5×
Requirement variance Stable vs volatile Mid-course rework 50–200%
Historical debt Greenfield vs partial-legacy Cleanup unpredictable

Conclusion: writing “complete P1 in 4 weeks” goes bankrupt by week 5, triggering governance distrust. Rewrite as “P1 exit = all 5 capabilities achieved” to make it executable and verifiable.

Why capabilities are real

Each capability has three things, all objectively observable events:

No skipping capabilities — running the next capability before exiting the previous one creates compounding fragility.


2 · 36 Capabilities → Three Leaps Mapping

The main methodology’s hierarchy is L0 → L1 → L2 → L3. This handbook’s 36 capabilities map as follows:

                     ┌────────────────────────────────────────┐
                     │  L3 Leap ③ · Autonomous Loop            │
                     │  P6.3 Runtime agent + R0–R5             │
                     │  P6.4 Reconciliation loop               │
                     │  P6.5 Decision audit store upgrade      │
                     │  P6.6 Chaos engineering (optional)      │
                     └────────────────────────────────────────┘
                                       ▲
                     ┌────────────────────────────────────────┐
                     │  L2 Leap ② · Intent Expressible         │
                     │  P5.1 Harness Five Pack                 │
                     │  P5.4 AI decision audit (starter)       │
                     │  P6.1 Feature flag systematization      │
                     │  P6.2 IaC + GitOps                      │
                     └────────────────────────────────────────┘
                                       ▲
                     ┌────────────────────────────────────────┐
                     │  L1 Leap ① · State Visible              │
                     │  P1.2 Module manifest + lifecycle       │
                     │  P1.3 Static boundary guard             │
                     │  P3 full set (3.1-3.5) observability    │
                     │  P4 full set (4.1-4.5) flow             │
                     │  P5.2 AI acceptance / P5.3 3-D health   │
                     └────────────────────────────────────────┘
                                       ▲
       ╔════════════════════════════════════════════════════════╗
       ║  L0 · Engineering Gravity Field                         ║
       ║  P0.0 ★ Framework build (congealed capital · before all)║
       ║  P0 full set (0.1-0.5) repo/CI/ADR/collab/review        ║
       ║  P1.1 domain layering / P1.4 API ver / P1.5 DB migration║
       ║  P2 full set (2.1-2.6) vuln/coverage/deps/secrets/flag/compliance║
       ╚════════════════════════════════════════════════════════╝

Inter-stage parallelism rules


3 · L0 · Engineering Gravity Field (Foundation)

Important premise: the framework is not a single capability — it is the cumulative output of the entire L0 layer.

How the framework is built across L0

P0.0  Blueprint & minimal skeleton  →  decide: arch / 3-tier skeleton / SDK signatures / contract location / test-base placeholder
   ↓
P0.1  CI                            →  enforce: lint / test / build run on the skeleton
   ↓
P0.2  hello-world                   →  validate: first end-to-end goes through the skeleton, not naked code
   ↓
P0.3  ADR                           →  freeze: arch decisions persisted as traceable records
   ↓
P1.1  Domain layering               →  fill: empty skeleton becomes content-bearing
   ↓
P1.3  archtest static guard         →  enforce boundaries: rules truly bind, OOB PRs blocked
                                       ↓
                Complete framework = P0.0 + P0.1 + P0.2 + P0.3 + P1.1 + P1.3 together

P0.0 sets out what should be; P0.1 makes CI enforce lint/test; P1.3 makes archtest enforce boundaries. Only when L0’s full exit signals are met can the framework be said to be “really in place.” Until then P0.0’s “constraints” are just README text, not enforced rules.

3.0 Blueprint & minimal skeleton (P0.0) ★

L0 entry capability · gives subsequent capabilities a target to enforce against · NOT a “complete framework”

Anti-patterns:

Minimum viable blueprint: solo / small teams should not adopt 12-layer Clean Architecture — three layers + 4 SDK interface signatures + 1 contract format choice + 1 test-base placeholder suffices. Minimum blueprint + strong subsequent enforcement > large blueprint + weak enforcement.

3.1 Repo + first CI (P0.1)

3.2 Hello-world main path (P0.2)

3.3 Decision records · ADR (P0.3)

3.4 Collaboration conventions (P0.4)

3.5 Code review system (P0.5)

3.6 Domain layering (P1.1)

3.7 API version strategy (P1.4)

3.8 DB migration (P1.5)

3.9 Multi-layer vulnerability scanning (P2.1)

3.10 Coverage gate (P2.2)

3.11 Auto dependency upgrade (P2.3)

3.12 Secrets + credential rotation (P2.4)

3.13 Config + feature flag starter (P2.5)

3.14 Data compliance annotation (P2.6)

L0 exit signals

The “complete framework” is only really in place when all L0 exits are met — at this point P0.0’s blueprint has been jointly enforced by P0.1 / P1.1 / P1.3, no longer just README.

Enter L1 leap


4 · L1 Leap ① · State Visible

4.1 Module manifest + lifecycle (P1.2) ★

L1 entry capability · most important artifact in the entire diagram

4.2 Static boundary guard (P1.3)

4.3 OpenTelemetry triple (P3.1)

4.4 SLI/SLO + Error budget (P3.2)

4.5 Incident management (P3.3)

4.6 Performance baseline + budget (P3.4)

4.7 a11y / i18n baseline (P3.5 · user-facing projects)

4.8 DORA five-metric collection (P4.1)

4.9 Kanban + WIP limit (P4.2)

4.10 Retrospective rhythm (P4.3)

4.11 Blameless post-mortem (P4.4)

4.12 Value stream mapping (P4.5)

4.13 AI acceptance rate (P5.2)

4.14 3-D health score (P5.3) ★

L1 core capability · most important convergence point in the entire diagram

L1 exit signals

Enter L2 leap


5 · L2 Leap ② · Intent Expressible

5.1 Harness Five Pack (P5.1) ★

L2 entry capability

5.2 AI decision audit starter (P5.4)

5.3 Feature flag systematization (P6.1)

5.4 IaC + GitOps (P6.2)

L2 exit signals

Enter L3 leap

Critical L2 → L3 signal: ability to write the first 4-block intent file (business / contract / quality / lifecycle) where every field has a corresponding verifier (see main methodology §7.3).


6 · L3 Leap ③ · Autonomous Loop

6.1 Runtime agent + R0–R5 reversibility gradient (P6.3)

6.2 Reconciliation loop (P6.4) ★

L3 core capability

6.3 Decision audit store upgrade (P6.5)

6.4 Chaos engineering (P6.6 · optional)

L3 exit signals

This handbook concludes its mission. Continue per three-leaps.en.md §11 full loop + §14 measurement framework.


7 · Cross-capability anti-patterns

Anti-pattern Symptom Correction
Capability skipping L0 not exited but doing L1 Strict gating: previous capability not exited, no entry
One-step-to-everything L0 immediately on K8s+Temporal+DataDog Per mapping order, each capability does only the minimum
Tool stack collision Using GitHub Projects+Linear+Jira simultaneously Each capability picks 1 tool only
Signal fill-in Humans manually filling manifest / health signals Must be mechanically collected
AI worship Acceptance 100% rejection 0 Force ≥ 10% rejection rate as health floor
Governance ROI inversion Governance time > coding 30% for two milestones Pause, re-scope this capability
Fake coverage Whole-repo 80% gate forces fake tests Only new-code gate
Framework over-engineering L0 immediately 12-layer Clean Architecture L0 only 3 layers (domain / shared / adapters)
Bridge skipping L1 exit directly to reconciliation autonomy Must go through L2 Harness Five Pack
Premature K8s Services < 5 on K8s Cloud Run / Container Apps starter

8 · Regression signals (not failure, honesty)

If any of the following occurs, regress to the previous capability and redo rather than continuing:

Regression is not failure — it is honesty. Pushing forward would compound the unstable foundation.


9 · Verification checklists (per leap exit)

Leap Objectively verifiable checklist
L0 [ ] P0.0 blueprint in place (ADR-0001 / 3-tier skeleton / SDK signatures / contracts dir / test-base placeholder); [ ] CI green; [ ] main runs hello-world (through skeleton); [ ] ADR; [ ] README+CONTRIBUTING+CODEOWNERS; [ ] OOB PR blocked by archtest; [ ] migration drill; [ ] 4-layer scan green ≥ 4w; [ ] 0 secrets in git; [ ] feature flag starter
L1 [ ] 100% modules manifest+lifecycle; [ ] trace_id reverse-traceable; [ ] SLO burned; [ ] on-call owner; [ ] DORA daily ≥ 4w; [ ] retro+action; [ ] post-mortem; [ ] VSM; [ ] health score trending
L2 [ ] Harness Five Pack in place; [ ] AI acceptance has data; [ ] decision audit ≥ 30; [ ] flag canary rollback; [ ] IaC one-click env
L3 [ ] Reconciler dry-run zero FP; [ ] R1 autonomy works; [ ] decision audit queryable; [ ] R5 never granted

10 · Continuous revision (governing this handbook)

This handbook remains exploratory and must accept practical critique:

Self-governance red lines:


Appendix A · Tool menu matrix (5 stacks × key capabilities)

Starter = solo / small team, Upgrade = team ≥ 5 or services ≥ 5.

Capability TS/Node Go Python Java/Kotlin .NET
Package/build npm/pnpm + tsx / esbuild go modules poetry / uv maven / gradle dotnet sdk
Lint ESLint golangci-lint ruff Checkstyle / ktlint Roslyn analyzers
Type tsc strict go vet+staticcheck mypy compiler builtin compiler builtin
Static guard dependency-cruiser hand-written archtest import-linter ArchUnit NetArchTest
Test Jest / Vitest testing+testify pytest JUnit 5 xUnit
Coverage c8 / Istanbul → Codecov -cover → Codecov pytest-cov → Codecov JaCoCo → Codecov coverlet → Codecov
Dep vuln npm audit + Dependabot govulncheck + Dependabot pip-audit + Dependabot OWASP DC + Dependabot dotnet vulnerable + Dependabot
DB migration Prisma Migrate / Knex golang-migrate Alembic Flyway / Liquibase EF Core Migrations
Perf baseline k6 / Artillery / Lighthouse CI k6 Locust / k6 JMeter / Gatling NBomber / k6
BDD Cucumber.js godog behave Cucumber-JVM SpecFlow
Runtime agent node-cron / BullMQ time.Tick / robfig/cron APScheduler / Celery @Scheduled / Quartz IHostedService + Quartz.NET

Universal layer (stack-agnostic):

Capability Starter Upgrade
Repo + CI/CD + kanban GitHub (one-stop) Azure DevOps (Boards/Pipelines/Repos/Artifacts/Test Plans 5-pack)
Vuln SAST CodeQL (GitHub) / Semgrep SonarCloud / Snyk
Container Docker Buildah / nerdctl
Orchestration Cloud Run / Container Apps / ECS Fargate / direct systemd Kubernetes (EKS / AKS / GKE)
IaC Terraform Pulumi / OpenTofu / Bicep (Azure)
GitOps ArgoCD Flux / Azure Deployment Environments
Telemetry OpenTelemetry SDK + Grafana Cloud free Application Insights / DataDog / New Relic / Honeycomb
Feature flag Flipt / Unleash (OSS) LaunchDarkly
Secrets HashiCorp Vault / Azure Key Vault Doppler / AWS Secrets Manager
AI Harness Claude Code / Cursor / Copilot — pick one Multi-role agent separation
DORA Homemade scripts Apache DevLake / Sleuth / DX
Incident management PagerDuty free Opsgenie / FireHydrant

Kubernetes adoption timing:


Appendix B · Solo / small team / medium team tool differentiation

Capability Solo Small team (2-5) Medium team (5-30)
Repo+CI GitHub Free GitHub Team / Azure DevOps Basic GitHub Enterprise / Azure DevOps Server
Issue+kanban GitHub Issues+Projects + Linear / Azure Boards Linear / Jira / Azure Boards Pro
Comms Slack free / Teams Slack paid + PagerDuty
Vuln Dependabot+CodeQL + Snyk free / Semgrep + Snyk team / SonarCloud
Coverage Codecov free Codecov team SonarCloud
Telemetry Grafana Cloud free + Sentry free DataDog / Application Insights / New Relic
Secrets Vault OSS / 1Password Doppler / Vault Cloud Vault Enterprise / AWS SM / Azure Key Vault
Feature flag Flipt OSS / env switch Unleash OSS LaunchDarkly
AI Harness Claude Code personal Cursor Team / Claude for Teams Cursor Enterprise / homemade eval
Runtime Cloud Run / Container Apps Managed K8s (if needed) Full K8s + service mesh
DORA Homemade scripts Apache DevLake DevLake / Sleuth / DX
Decision audit Append-only markdown + SQLite EventStoreDB / Postgres
Incident management PagerDuty free (self on-call) PagerDuty 5-user free Opsgenie / FireHydrant

Upgrade principle: each tier-up, only swap the most painful 1-2 tools. Swapping 5 tools at once collapses team workflow for 4-6 weeks.