Question
Show me sprint velocity across all teams for the last 6 sprints — which teams are slowing down and why?
6 teams analyzed. Platform velocity down 23% over 3 sprints — root cause: 40% of sprint time going to unplanned on-call work. Payments team stable. Mobile team spiking due to reduced scope, not increased output. Recommendation: rotate on-call burden, protect sprint commitments.
Automation
Every morning: check Datadog for error rate >1% or p99 >500ms — correlate with recent deploys, post to #on-call
Morning check complete. 2 alerts: payments-service error rate at 2.3% (up from 0.4% yesterday, correlated with deploy #1847 at 4pm), and search-api p99 at 620ms. Root cause candidates and rollback instructions attached. Posted to #on-call with runbook links.
Investigation
Pull delivery metrics, support ticket trends, and open risks for my quarterly board review — summarize in 1 page
Q1 Summary: 94% of committed features shipped. Mean cycle time improved from 14→9 days. Support volume down 18% (docs improvements). 3 open risks: auth migration 2 weeks behind, 1 unfilled senior role blocking mobile roadmap, vendor contract renewal pending for monitoring stack. Formatted as 1-page PDF.
Automation
When a Zendesk ticket is tagged "feature-request" — find the related Jira epic, add customer context, update the epic
Matched ticket ZD-8842 to epic PLAT-291 (Webhook v2). Added: Acme Corp requesting retry config, 3rd request this quarter. Updated epic priority score. Notified PM in #product-requests. Running on all new feature-request tags.
Digest
Weekly leadership digest: cross-team risks, blockers, stalled RFCs, and anything that needs my attention
3 risks: 1) Auth migration — 2 of 5 services not started, deadline in 3 weeks. 2) Platform team blocked on vendor contract renewal. 3) RFC-47 (event bus redesign) stalled — unresolved security review. 2 items need your decision: budget approval for staging env expansion, tie-breaker on API versioning approach.
Question
Which teams have the most unresolved security vulnerabilities? What's blocking remediation?
Payments: 4 critical CVEs, oldest 31 days — blocked on Redis 7 upgrade (needs infra team). Platform: 2 critical, remediation PRs open but stuck in review. Mobile: clean. API team: 1 critical, fixed in staging, waiting on release train. Total: 7 critical across org, 3 blocked on cross-team dependencies.
Question
Show me sprint velocity across all teams for the last 6 sprints — which teams are slowing down and why?
6 teams analyzed. Platform velocity down 23% over 3 sprints — root cause: 40% of sprint time going to unplanned on-call work. Payments team stable. Mobile team spiking due to reduced scope, not increased output. Recommendation: rotate on-call burden, protect sprint commitments.
Automation
Every morning: check Datadog for error rate >1% or p99 >500ms — correlate with recent deploys, post to #on-call
Morning check complete. 2 alerts: payments-service error rate at 2.3% (up from 0.4% yesterday, correlated with deploy #1847 at 4pm), and search-api p99 at 620ms. Root cause candidates and rollback instructions attached. Posted to #on-call with runbook links.
Investigation
Pull delivery metrics, support ticket trends, and open risks for my quarterly board review — summarize in 1 page
Q1 Summary: 94% of committed features shipped. Mean cycle time improved from 14→9 days. Support volume down 18% (docs improvements). 3 open risks: auth migration 2 weeks behind, 1 unfilled senior role blocking mobile roadmap, vendor contract renewal pending for monitoring stack. Formatted as 1-page PDF.
Automation
When a Zendesk ticket is tagged "feature-request" — find the related Jira epic, add customer context, update the epic
Matched ticket ZD-8842 to epic PLAT-291 (Webhook v2). Added: Acme Corp requesting retry config, 3rd request this quarter. Updated epic priority score. Notified PM in #product-requests. Running on all new feature-request tags.
Digest
Weekly leadership digest: cross-team risks, blockers, stalled RFCs, and anything that needs my attention
3 risks: 1) Auth migration — 2 of 5 services not started, deadline in 3 weeks. 2) Platform team blocked on vendor contract renewal. 3) RFC-47 (event bus redesign) stalled — unresolved security review. 2 items need your decision: budget approval for staging env expansion, tie-breaker on API versioning approach.
Question
Which teams have the most unresolved security vulnerabilities? What's blocking remediation?
Payments: 4 critical CVEs, oldest 31 days — blocked on Redis 7 upgrade (needs infra team). Platform: 2 critical, remediation PRs open but stuck in review. Mobile: clean. API team: 1 critical, fixed in staging, waiting on release train. Total: 7 critical across org, 3 blocked on cross-team dependencies.
Automation
Triage every incoming issue — classify by team, attach relevant code and docs, route automatically
Triaged 12 new issues. 4 routed to Platform (infra-related), 3 to API team (endpoint bugs), 5 to Frontend. Attached relevant source files, related PRs, and runbook links to each. Average triage time: 8 seconds. No human intervention needed.
Automation
Enforce release readiness gates — test coverage, security scans, required approvals — before every deploy
Release v2.14.0 gate check: Test coverage 94% (pass). Security scan: 0 critical, 2 medium (known, tracked). Approvals: 2/2 required reviewers signed off. Changelog generated. All gates green — ready to deploy.
Automation
When a PR hasn't been reviewed in 48h — nudge the reviewer. If still pending after 72h, escalate to the team lead
Monitoring all open PRs. PR #2201 hit 48h — pinged @alex in #api-team. PR #2187 hit 72h — escalated to @sarah (team lead) with context: 3 other PRs depend on this, release train is Thursday. Current queue: 14 PRs tracked, 2 in escalation, avg review time this week: 22h.
Automation
Recurring compliance checks — license audits, security scans, R&D hour tracking — on schedule, fully logged
Weekly compliance run complete. License audit: 2 new AGPL dependencies flagged for legal review. Security: all critical CVEs patched. R&D hours logged: 847h across 3 projects (tax credit eligible). Full audit trace in OpenTelemetry dashboard.
Automation
Hourly: enrich new Jira tickets with Zendesk customer context, related code paths, and similar past issues
Processed 8 new tickets this cycle. PROJ-1924: linked to 3 Zendesk reports from enterprise clients, attached relevant auth service code, found similar issue fixed in PROJ-1801. PROJ-1925: first-time report, no matches. Enrichment saves ~15 min per ticket of manual triage.
Onboarding
New hires should get self-serve codebase walkthroughs — save our architecture, service boundaries, and deploy process as runbooks
Created 5 runbooks: "Architecture Overview" (12 services, data flow), "Service Boundaries" (ownership, APIs, contracts), "Deploy Pipeline" (CI stages, canary, rollback), "On-call Guide", "Local Dev Setup". Referenced 47 source files, 8 Confluence pages. Available to all team members — new hires can ask follow-up questions directly.
Automation
Triage every incoming issue — classify by team, attach relevant code and docs, route automatically
Triaged 12 new issues. 4 routed to Platform (infra-related), 3 to API team (endpoint bugs), 5 to Frontend. Attached relevant source files, related PRs, and runbook links to each. Average triage time: 8 seconds. No human intervention needed.
Automation
Enforce release readiness gates — test coverage, security scans, required approvals — before every deploy
Release v2.14.0 gate check: Test coverage 94% (pass). Security scan: 0 critical, 2 medium (known, tracked). Approvals: 2/2 required reviewers signed off. Changelog generated. All gates green — ready to deploy.
Automation
When a PR hasn't been reviewed in 48h — nudge the reviewer. If still pending after 72h, escalate to the team lead
Monitoring all open PRs. PR #2201 hit 48h — pinged @alex in #api-team. PR #2187 hit 72h — escalated to @sarah (team lead) with context: 3 other PRs depend on this, release train is Thursday. Current queue: 14 PRs tracked, 2 in escalation, avg review time this week: 22h.
Automation
Recurring compliance checks — license audits, security scans, R&D hour tracking — on schedule, fully logged
Weekly compliance run complete. License audit: 2 new AGPL dependencies flagged for legal review. Security: all critical CVEs patched. R&D hours logged: 847h across 3 projects (tax credit eligible). Full audit trace in OpenTelemetry dashboard.
Automation
Hourly: enrich new Jira tickets with Zendesk customer context, related code paths, and similar past issues
Processed 8 new tickets this cycle. PROJ-1924: linked to 3 Zendesk reports from enterprise clients, attached relevant auth service code, found similar issue fixed in PROJ-1801. PROJ-1925: first-time report, no matches. Enrichment saves ~15 min per ticket of manual triage.
Onboarding
New hires should get self-serve codebase walkthroughs — save our architecture, service boundaries, and deploy process as runbooks
Created 5 runbooks: "Architecture Overview" (12 services, data flow), "Service Boundaries" (ownership, APIs, contracts), "Deploy Pipeline" (CI stages, canary, rollback), "On-call Guide", "Local Dev Setup". Referenced 47 source files, 8 Confluence pages. Available to all team members — new hires can ask follow-up questions directly.