The system does not use a fixed agent sequence. The workflow is dynamically selected based on task type, required skills, risk, tools, confidence score, and approval rules.
Full Enterprise ProposalSecurity ReviewLegal Contract ReviewCloud Operations ReviewPre-Sales SolutioningFinance ReviewHR Policy ReviewCustom
Workflow
Name
Security Review Workflow
Use case
Customer or internal team wants only a security assessment (controls, risks, exposure, compliance posture).
Lead agent
IT-Security Agent
Why selected
Task explicitly asks for a security assessment; commercial, legal and delivery agents are not relevant unless escalated.
Agents
Involved
Coordinator AgentIT-Security Agent
Optional
Legal Agent — Engaged only if security finding implies a contractual / DPA change.
MD / Leadership Agent — Engaged only if risk is High or policy exception is requested.
Excluded
Sales Agent — No commercial opportunity or customer commitment in scope.
Finance Agent — No pricing or commercial decision is required.
Product Agent — No product fitment question.
Legal Agent — No contract terms involved (engaged only on escalation).
Operations Agent — No delivery scoping required.
HR Agent — No HR data or employee concern.
Approvals & escalations
Approval agents
Human Security Reviewer / CISO
Escalation agents
MD / Leadership AgentHuman CISO
Tools required
Compliance framework RAGRisk scannerPolicy library RAG
Flow
Coordinator Agent
→IT-Security Agent
→Security Risk Summary
→Human Security Reviewer / MD if needed
Agent inclusion reasons
- IT-Security Agent — Task mentions data privacy, access control or security posture.