AURA

Boundaries and Risks

A classic wiki often has these problems:

← Back to the overview

Boundaries and Risks

1. Why AURA is not a classic wiki

A classic wiki often has these problems:

  • information is maintained manually
  • documentation is decoupled from the code
  • freshness is unclear
  • ownership is unclear
  • diagrams are often outdated
  • AI can hardly tell which information is trustworthy
  • changes are not cleanly tied to PRs, commits, and releases

AURA differs in:

repo-native
versioned
reviewable
CI-validated
source-based
centrally findable
machine-readable
AI-usable
with ownership
with trust status

2. Why AURA is not just a developer portal

A developer portal or service catalog is an important part of AURA, but AURA goes further.

A classic developer portal often shows:

services
teams
APIs
documentation
links
ownership

AURA adds:

PR-based architecture review
documentation duty for architectural changes
architecture snapshots
AI context layer
MCP server
feature impact analysis
architectural drift detection
trust status
human-reviewed AI documentation

3. AURA and Jira

AURA should not replace Jira.

ToolAnswers
JiraWhat should happen functionally? Why is it planned? When will it be implemented? Who is working on it?
AURAWhich systems are affected? What architecture changes? Which decisions were made? Which risks emerge? Which repositories are relevant? Which documentation and diagrams were updated?
Gitcode and change context

Together you get:

Jira  = work and product context
AURA  = architecture and system context
Git   = code and change context

4. Risks for AURA

AURA itself can fail if certain risks are not addressed.

Risk 1: too much bureaucracy

If AURA is too strict too early, teams will route around the system.

Counter-measure:

  • staged rollout
  • warnings before errors
  • good templates
  • automatic suggestions
  • clear rules
  • fast feedback loops

Risk 2: AI generates pretty but wrong documentation

Counter-measure:

  • human review
  • mandatory sources
  • trust status
  • CI checks
  • never mark unchecked AI texts as "validated"

Risk 3: central documentation becomes the new truth

Counter-measure:

  • the repo remains the source of truth
  • AURA always shows source, commit, and snapshot
  • no manual edits only in the portal

Risk 4: diagrams age

Counter-measure:

  • version diagram sources
  • C4 minimum standard
  • PR checks on dependency changes
  • drift detection

Risk 5: security issues from AI access

Counter-measure:

  • permission model
  • audit logs
  • no secrets
  • targeted code context instead of full repo access
  • roles and visibilities

5. Open decisions

Several decisions still need to be made for AURA.

Documentation standard

  • Which files are mandatory?
  • Which files are optional?
  • Which structure applies to all repos?
  • How do we differentiate service, library, frontend, and infrastructure repos?

Diagram standard

  • Mermaid, PlantUML, or Structurizr?
  • Which C4 levels are mandatory?
  • How are central system landscapes generated?

Metadata model

  • What does architecture.yaml look like exactly?
  • Which fields are mandatory?
  • How are products, systems, services, and teams modeled?

PR governance

  • When does AURA only comment?
  • When does AURA block?
  • Who can approve exceptions?
  • How are false positives handled?

AI context

  • Which content is embedded?
  • Which content is only retrievable through tools?
  • How are sources cited?
  • How are permissions verified?

MCP

  • Which resources does AURA expose?
  • Which tools may an AI assistant use?
  • Which tools are read-only?
  • Which tools may trigger actions?

Continue reading

← Back to the overview