8.3 KiB
8.3 KiB
Roadmap
Current Starting Point
- Date:
2026-03-12 - Product state:
Frozen MVP complete - Validation state:
Internal beta passed with conditions on 2026-03-07 - Immediate priorities:
- turn
Appsreview-only evidence into verifiable and comparable uninstall evidence - expand
Smart Cleansafe coverage only on the next high-confidence roots - harden
Recoverypayload compatibility and restore evidence after execution boundaries stabilize - keep release-readiness work behind the product-path epics until signing materials exist
- turn
- Release-path blocker:
- no Apple signing and notarization credentials are available on the current machine
Roadmap Guardrails
- Keep scope inside the frozen MVP modules:
OverviewSmart CleanAppsHistoryRecoveryPermissionsSettings
- Do not pull
Storage treemap,Menu Bar, orAutomationinto this roadmap. - Respond to competitor pressure by deepening the frozen MVP flows rather than adding new surfaces for parity theater.
- Treat trust and recovery honesty as release-critical product work, not polish.
- Keep direct distribution as the only eventual release route.
- Do not plan around public beta dates until signing credentials exist.
Competitive Strategy Overlay
- Primary breadth comparison pressure comes from
MoleandTencent Lemon Cleaner. - Primary
Appscomparison pressure comes fromPearcleanerandTencent Lemon Cleaner. - Atlas should compete as an
explainable, recovery-first Mac maintenance workspace, not as a generic all-in-one cleaner. - The roadmap response is:
- preserve trust as the primary release gate
- deepen the
Appsmodule first wherePearcleanerandLemonset expectations - then close the most visible
Smart Cleansafe-coverage gaps users compare againstMoleandLemon - harden
Recoveryonly after execution boundaries and evidence models are stable - treat release readiness as the final convergence step because signing materials, not packaging mechanics, remain the public-release blocker
- keep
Storage treemap,Menu Bar, andAutomationout of scope
Active Milestones
Milestone 1: Internal Beta Hardening
- Dates:
2026-03-16to2026-03-28 - Goal: harden the current internal-beta build until user-visible execution and recovery claims are defensible.
- Focus:
- remove or explicitly development-gate silent XPC fallback
- show explicit failure states when real worker execution is unavailable
- rerun bilingual manual QA on a clean machine
- verify packaged first-launch behavior with a fresh state file
- tighten README, in-app copy, and help content where recovery or execution is overstated
- Exit criteria:
- internal beta checklist rerun against the latest packaged build
- unsupported execution paths fail clearly instead of appearing successful
- recovery wording matches the shipped restore behavior
Milestone 2: Apps Evidence Execution
- Dates:
2026-03-31to2026-04-11 - Goal: turn
Appsreview-only evidence from merely visible into verifiable, comparable, and recoverably consistent. - Focus:
- define the fixture app baseline for mainstream and developer-heavy uninstall scenarios
- make preview, completion, and history reflect the same uninstall evidence model
- define the restore-triggered app-footprint refresh strategy and stale-evidence handling
- script the manual acceptance flow for uninstall evidence and restore verification
- Exit criteria:
- supported fixture apps produce consistent evidence across preview, completion, and history
- restore follows a defined footprint refresh path or shows explicit stale-evidence state
- the
Appsacceptance path is scriptable and repeatable
Milestone 3: Smart Clean Safe Coverage Expansion
- Dates:
2026-04-14to2026-05-02 - Goal: expand only the next batch of high-confidence safe cleanup roots and prove real side effects without widening into high-risk cleanup.
- Focus:
- add the next safe roots outside app containers
- stabilize the
review-onlyvsexecutableboundary across scan, review, execute, completion, and history - strengthen the
scan -> execute -> rescanevidence chain for the expanded safe roots - keep unsupported or high-risk paths explicitly non-executable
- Exit criteria:
- newly supported safe roots show real post-execution rescan improvement
- unsupported roots remain clearly marked as
review-only - release-facing surfaces distinguish supported and unsupported execution scope without ambiguity
Milestone 4: Recovery Payload Hardening
- Dates:
2026-05-05to2026-05-23 - Goal: make recovery state structurally stable, backward-compatible, and historically trustworthy.
- Focus:
- stabilize the recovery payload schema and versioning contract
- add migration and compatibility handling for older workspace and history state files
- deepen
Historydetail evidence for restore payloads, conflicts, expiry, and partial restore outcomes - add regression coverage for conflict, expired payload, and partial-restore scenarios
- Exit criteria:
- recovery payloads follow a stable versioned schema
- older state files migrate cleanly or fail with explicit compatibility behavior
Historydetail can explain real restore evidence and degraded outcomes- regression coverage exists for the main restore edge cases
Milestone 5: Release Readiness
- Dates:
2026-05-26to2026-06-13 - Goal: turn the stabilized product path into a repeatable release candidate process, then switch to the signing chain when credentials exist.
- Focus:
- make
full-acceptancea routine gate on candidate builds - stabilize UI automation for trust-critical MVP flows
- freeze packaging, install, and launch smoke checks as repeatable release scripts
- switch from the pre-signing release chain to
Developer ID + notarizationonce credentials become available
- make
- Exit criteria:
full-acceptanceruns routinely on candidate builds- trust-critical UI automation is stable enough for release gating
- packaging, install, and launch smoke checks are repeatable
- the signed chain either passes with credentials present or remains explicitly blocked only by missing credentials
Conditional Release Branch
These milestones do not start until Milestone 5 is complete and Apple release credentials are available.
Conditional Milestone A: Signed External Beta Candidate
- Trigger:
- Milestones
1through5are complete Developer ID Applicationis availableDeveloper ID Installeris availableATLAS_NOTARY_PROFILEis available
- Milestones
- Goal: produce a signed and notarized external beta candidate.
- Focus:
- rerun the release scripts on the signed chain
- validate signed
.app,.dmg, and.pkginstall paths on a clean machine - prepare external beta notes and known limitations
- Exit criteria:
- signed and notarized artifacts install without bypass instructions
- clean-machine install verification passes on the signed candidate
Conditional Milestone B: External Beta Learn Loop
- Trigger:
- Conditional Milestone A is complete
- Goal: run a small external beta only after the mainline product path is stable.
- Focus:
- use a hardware-diverse trusted beta cohort
- triage install, permission, execution, and restore regressions
- close P0 issues before any GA candidate is named
- Exit criteria:
- no external-beta P0 remains open
- primary workflows are validated on more than one machine profile
Conditional Milestone C: GA Candidate and Launch
- Trigger:
- Conditional Milestone B is complete
- Goal: publish
v1.0only after trust, recovery, and signed distribution all align. - Focus:
- rerun full acceptance and signed packaging on the GA candidate
- freeze release notes, notices, acknowledgements, and checksums
- validate launch candidate install and first-run flow on a clean machine
- Exit criteria:
- no open P0 release blocker
- signed packaging, install validation, and release docs are complete
v1.0artifacts are published
Current Decision Rules
- Do not call the current workstream
public beta. - Do not claim broader cleanup coverage than the worker/helper path can prove.
- Do not claim physical recovery until file-backed restore is actually validated.
- Do not schedule a public release date before signing credentials exist.
Not In This Roadmap
Storage treemapMenu BarAutomation- new non-MVP modules