How does the agent use the checklist?
It reads the checklist document, turns each requirement into structured items, then matches contract clauses to those items. Anything missing, weakened, or changed is flagged as a deviation.
What kind of risks can it detect?
It can highlight legal, financial, and compliance risks, such as missing liability limits, unusual indemnity language, unclear data protection terms, or unbalanced termination rights.
How is the risk profile used?
The risk profile input tells the agent how strict to be. For example, with a High risk profile, it will treat more deviations as significant and assign higher risk scores. With a Low risk profile, it may only flag larger changes.
What does the JSON output contain?
The JSON includes each flagged issue, the related clause or checklist item, a risk score, a risk category, and suggested mitigation or wording changes. This makes it easy to plug into other tools or dashboards.