1
Open support cases
TR-2517 internal admin shell
This admin slice stays read-heavy by default. It now maps more directly to the intended shell structure so support review, sensitive exceptions, trust surfaces, and audit posture do not collapse into one blurry ops page.
Open support cases
Escalation-flagged assistant events
Aging open cases
Billing-sensitive cases
The launch-default shell should feel like one coherent control surface, not a pile of disconnected internal tools.
Attention now, aging work, degraded states, and pending review signals.
Support intake, escalations, repeated blockers, and incident-adjacent review.
Sensitive exception review separated from normal support inspection.
Public-trust review, parity posture, and content approval awareness.
Bounded launch toggles with visible owner, scope, and consequence.
Canonical metrics and actionable signals, not vanity dashboards.
Evidence-first timelines for what happened already.
Privilege-sensitive references isolated from routine admin flow.
Operator-first slices for the most likely review lanes.
Separate the queue by work type before any review action exists.
Seeing a record should not imply broad change rights, and sensitive areas should feel structurally distinct.
Direct filters still exist when you want a narrower slice than the saved views.
Rows expose lane, age, sensitivity, status, and a safe drill-in path.
| Case | Lane | Category | Urgency | Status | Sensitivity | Created | Age | Next safe action |
|---|---|---|---|---|---|---|---|---|
| tr-72zuwbby Transparent QA Church · Transparent Test User Trial start | Transparent QA Church | Transparent Test User | path:self_serve | General support | trial_start | medium | submitted | Normal admin visibility | Apr 28, 10:20 PM | 2d old | Open detail → |
Sensitive exception workflows should be visible as distinct review lanes even before mutation flows exist.
Billing-sensitive cases: 0
Hardship lane: 0
Billing lane: 0
Assistant behavior stays visible so weak grounding and sensitive topics do not disappear into polished prose.
partially grounded use caution
How does the two-month trial work if our church may need guided migration help?
Public-trust promises need visible review posture even before a full approval queue exists.
Canonical metrics, evidence-first history, and privilege-sensitive references should stay distinct.
Canonical metrics should lead. AI explanation, if it appears later, should remain visually secondary to governed reporting truth.
Evidence-first presentation should make actor, target, action, and result status easy to scan before any mutation tool exists.
Privilege-sensitive references should stay isolated from routine support operations and never blur into casual navigation.
The internal shell should make final readiness review explicit before any real go-live claim exists.
Recent evidence-first activity for queue and assistant flows.
Target: support_event · 841fbad0-6878-4585-b581-328934200ac9
Result: success · Actor: public_user · Surface: support_assistant
Target: support_case · tr-72zuwbby
Result: success · Actor: public_user · Surface: public_intake
This slice stays read-heavy, but the admin shell should still make the future mutation classes explicit.
The queue shell also anchors the first macro and severity map so operations stay consistent.
| S0 | Critical trust or platform emergency |
|---|---|
| S1 | Major service-impact incident |
| S2 | Blocked high-value workflow or meaningful degradation |
| S3 | Normal support issue or localized defect |
| S4 | Informational or low-impact request |