Metagov is intended to support rapid prototyping of different governance systems. This use-case explores that value proposition through the idea of a governance hackathon. Namely: how do we think hackers will tend to use Metagov? It is inspired by the needs of the Open Web hackathon, a governance hackathon focused on DAOs and blockchains.
I assume that hackers will be familiar with a set of programming languages (e.g. Python, Rust, JS) as well as technical tools like APIs, webhooks, and code. Typically, a hackathon team will be composed of small groups of hackers, sometimes complemented by designers and other specialists.
User flow: use for planning
- Hacker skims the Metagov documentation and sees the list of supported tools along with descriptions of how they can be used.
- Hacker decides to use SourceCred, PolicyKit, and Discourse as components of their governance experiment.
- Hacker reads the Metagov documentation, which includes install directions for Metagov, documentation of modules APIs and ways of configuring different modules, as well as links to further, module-specific documentation.
- Hacker downloads and installs Metagov on their computer / server.
- Installing Metagov = installing PolicyKit, SourceCred, and everything else.
- Hacker, referring occasionally to the documentation, starts testing their local instance of PolicyKit, SourceCred, and Discourse.
Alternate flow: use for testing / exploration
- Hacker skims the Metagov documentation and sees the list of supported tools along with descriptions of how they can be used.
- Hacker decides to play with every available tool without looking too closely at their documentation.
- Hacker installs Metagov.
- Installing Metagov = installing PolicyKit, SourceCred, and everything else.
- Hacker, without referring to the documentation, interacts with and discovers each plugin.
TBD: what additional information or resources does a hacker typically need to build during a hackathon?