Walk the UI before a sales call.
The sandbox shows the dashboard, policy editor, approval queue, and decision ledger populated with realistic fixture data — enough to evaluate UX, controls, and audit evidence without scheduling time with a human.
Axiru is passwordless by design — Stripe Connect, magic links, or zero-account CSV preview. For procurement teams and auditors who need a shared credential to evaluate the UI, this page documents the dedicated reviewer identity and the sandbox workspace it sees.
Live tenants don't expose a password field — Stripe Connect OAuth or magic link only. That's the right default for production. But security auditors, SOC-2 evaluators, and Stripe Marketplace reviewers regularly need a shared credential to walk a UI without asking the seller for a meeting. This page is how we close that gap.
The sandbox shows the dashboard, policy editor, approval queue, and decision ledger populated with realistic fixture data — enough to evaluate UX, controls, and audit evidence without scheduling time with a human.
Same code path as production. The kill-switch panel, the merchant-freeze controls, the SIEM export endpoints, and the policy-version diff view all behave exactly as they would for a paying tenant. Real money is never at risk.
Stripe Marketplace certification submissions include this page as the documented review path. The reviewer identity maps to a sandbox Stripe Connect account that the reviewer can poke at without affecting any real merchant.
Use the contact form with topic = reviewer-access and include your procurement or audit context. We pre-approve Stripe Marketplace reviewer requests, SOC-2 auditor requests from a corporate email, and named enterprise procurement contacts.
reviewer@axiru.comWe forward the reviewer magic link to the email you supplied. The link drops you into the sandbox tenant — a workspace tagged reviewer-sandbox with fixture data and the full set of UI surfaces enabled. The link expires in 24 hours; you can request a fresh one any time.
Sandbox loads showing a yellow banner ("Demo mode — no data is written to a real Stripe account"). When you're done, the same banner has a "Generate review packet" button that bundles the policy-version diff, the kill-switch demonstration, the audit ledger sample, and the SOC-2 control narrative into a single PDF for your files.
Reviewer sandbox runs the production codebase against fixture data, with a few specific affordances designed for review:
What's not in the sandbox: real Stripe API keys, real customer data, and the production billing meter. None of those are relevant to review and including them would introduce risk you don't need to evaluate.
A shared password on the production sign-in form is a credential-stuffing target the day it leaks — and shared passwords always leak. The reviewer path above is functionally identical for the auditor (one click from email → inside the UI) but the underlying token is short-lived, tenant-scoped to the sandbox, and revocable from the operator dashboard without code changes.
If your security team has a hard requirement for a password-form login, we can issue a per-engagement time-limited credential as a one-off. Note the request when you fill out the contact form and we'll route it to the on-call engineer.
If you're an active Stripe Marketplace reviewer, a SOC-2 auditor on a paid engagement, or a procurement contact at a Fortune 1000, we expedite. Mention the urgency on the form.
Start in shadow mode first. Move to live enforcement later.