SecurePath Wayne Howlett

ROADMAP

Roadmap - demos with proof

Everything here is designed to be reviewable: clear outcomes, verification, and public-safe artifacts.

Lane
Now

Work in progress - focusing on verification signals + artifacts.

Lane
Next

Queued items that unlock strong demos and portfolio credibility.

Lane
Later

Shipped items and future expansions once the core is stable.

Now

Now

Public API hardening pass

In Progress

Rate limiting, input validation, safer error strategy, and audit-style logging.

Deliverables
  • Clear demo outcome (visible on the site)
  • Short writeup: scope → threats → controls → verification
  • API notes: validation, safer errors, edge cases
  • Telemetry signal captured (public-safe examples)
Evidence
  • Screenshots/config snippets (public-safe)
  • Before/after notes where possible
  • Verification step documented
APIHardeningLogging

Next

Next

Evidence blocks everywhere

Planned

Attach artifacts (screenshots, configs, notes) to projects/skills/blog posts.

Deliverables
  • Clear demo outcome (visible on the site)
  • Short writeup: scope → threats → controls → verification
  • Artifacts linked from Projects/Skills pages
Evidence
  • Screenshots/config snippets (public-safe)
  • Before/after notes where possible
  • Verification step documented
EvidenceUX
Next

AI chatbot (site assistant)

Planned

Skill-context prompts + project context for recruiter-friendly Q&A.

Deliverables
  • Clear demo outcome (visible on the site)
  • Short writeup: scope → threats → controls → verification
Evidence
  • Screenshots/config snippets (public-safe)
  • Before/after notes where possible
  • Verification step documented
AIRecruiterUX

Later

No “Later” items yet.

How roadmap items become “Shipped”

Items move from Planned → In Progress → Shipped only when there is verifiable output. Each completed roadmap item produces artifacts such as architecture notes, verification steps, or public-safe screenshots so the work can be reviewed.

The goal isn’t to list ideas, it’s to show how real security work moves from concept to documented system behavior.