Cambodia Host-Nation Ambassador Brief Autopack
Execute a Cambodia-host, ASEAN-aware ambassador brief; retrieve from RS; enforce no-source/no-claim; include 3–5 options, decision triggers, and audit appendix.
Browse and filter 300 strategic advisory services across 10 domains. Each service is designed for executive-grade decision intelligence.
Showing 300 of 300 services
Execute a Cambodia-host, ASEAN-aware ambassador brief; retrieve from RS; enforce no-source/no-claim; include 3–5 options, decision triggers, and audit appendix.
Build a 12-month decision-window map for Cambodia institutions relevant to SP; include policy cycles, summit windows, budget cycles; mark UNKNOWN items with verification steps.
Produce MFAIC meeting kit: objectives, agenda, opening/bridging/closing scripts, anticipated reactions, off-ramps; cite RS; include clearance checklist.
Map sector ministry/regulator mandates; propose engagement sequence and asks/offers tailored to constraints; include “do not say” lines; evidence-cited.
Draft a daily brief template; populate with RS evidence for last 72h (if available); include watchlist triggers, and “what changed since yesterday.”
Generate 25 “if asked” lines across politics/economy/security/rights/infrastructure; each line labeled attributable/non-attributable; cite evidence or mark UNKNOWN.
Identify protocol/optics sensitivities (symbols, phrasing, forum etiquette); propose safe alternatives; cite RS cultural/protocol references.
Design an early-warning watchlist: indicators, thresholds, sources, actions; strictly evidence-based; include governance for updates.
Extract relevant regulations from RS/DL; summarize operational impacts; identify compliance gates and decision points; contradiction-resolve across sources.
Build a de-escalation brief: escalation ladder, off-ramps, private/public lines, partner synchronization plan; avoid inflammatory framing; evidence-cited.
Create 3 versions of the same brief for different mission lenses (e.g., India/EU/US/Japan) while preserving Cambodia sovereignty and ASEAN centrality; cite RS.
Map provincial governance structures relevant to SP; identify implementation bottlenecks and engagement pathways; cite RS.
Outline approval/ratification pathways; identify timeline risks and stakeholder roles; evidence-cited; mark UNKNOWNs.
Produce summit-side meeting plan: targets by institution/role, objectives, scripts, deliverables capture; coalition-safe language options; citations required.
Create internal memo aligning all staff on key messages, prohibited phrases, escalation triggers, and clearance rules; cite RS.
Map media ecosystem at channel/category level; propose ethical engagement approach; avoid manipulation; cite RS.
Draft a 3–5 minute address tailored to SP forum; include evidence-backed proof points; add hostile Q&A; cite RS.
Produce a decision memo: decision required, options, trade-offs, risks, and clearances; enforce audit appendix placeholders for RS evidence.
Build MCDA with criteria (feasibility, impact, ASEAN fit, reputational risk); rank 10 initiatives; cite RS for assumptions.
Convert meeting notes into action tracker: commitments, owners, deadlines, risks, and next engagement; enforce “no classified” warning.
Identify top 10 unknowns driving risk; propose lawful data collection via official engagement and open sources; cite RS for precedents.
Design a convening output capture plan: non-attribution rules, synthesis method, language options; ensure legitimacy safeguards.
Extract official positions from RS by topic; normalize into a searchable library with citations and timestamps; flag contradictions.
Harmonize talking points across coalition partners while keeping sovereign sensitivities; propose minimal consensus language; cite RS.
Assume failure; identify 12 failure modes and mitigations; include reputational and compliance triggers; cite RS for precedent.
Generate a rapid brief with strict uncertainty labeling; separate observed vs inferred; propose immediate actions and comms lines.
Identify Cambodia priorities relevant to SP; map alignment opportunities with mission objectives; propose win-win framing; cite RS.
Create a 45-minute training module with exercises and evaluation; focus on SP domain; embed compliance and de-escalation rules.
Draft travel advisory content for mission staff/operators; include risks, mitigations, and escalation contacts at institutional level; cite RS.
Produce a monthly digest: regulatory shifts, projects, risks, stakeholder changes; evidence-cited; include “what to watch next month.”
Build node-edge graph at institution/role level; classify decision/influence/implementation roles; cite RS; provide CSV/JSON schema.
Construct power-interest analysis with transparent rubric; no personal scoring; cite RS for mandates; flag unknowns.
Identify where decisions are shaped vs signed; propose engagement sequencing across roles; cite RS; include “do not bypass” cautions.
Identify institutions likely to resist; list reasons, triggers, mitigations; cite RS; propose fallback pathways.
Assess institutional capacity constraints by function; propose capacity-building levers; cite RS; label assumptions.
Extract mandates, authorities, and dependencies from RS; output structured profiles with citations and timestamps.
Describe ecosystem categories (SOEs, associations, chambers) without personal dossiers; identify engagement channels; cite RS.
Map CSO themes and institutional roles; propose consultation plan with legitimacy safeguards; cite RS.
Map donors/MDBs by instrument and constraint; propose coordination play; cite RS.
Map ASEAN-led architecture relevance to SP; propose forum strategy and language constraints; cite RS.
Build cross-border institution map across Cambodia + partner capitals; identify alignment path; cite RS; include risks of mixed signals.
Identify budget/oversight dependencies between institutions; derive leverage points; cite RS; avoid speculation.
Build risk register by institution/role; define red flags and escalation to counsel; cite RS.
Produce clearance map across internal mission and external host stakeholders; include gating sequence and time risks.
Generate scripts per stakeholder segment (regulator/implementer/CSO/donor/operator); include asks/offers and off-ramps; cite RS.
Identify COI risk points in governance/procurement; propose safeguards; cite RS; no allegations.
Map associations/chambers by subsector; identify engagement pathways; cite RS; include integrity safeguards.
Build synchronization plan: who says what, when, in what forum; include “no surprises” rules and escalation triggers.
Identify role types that can champion reforms (units, directorates) without naming private individuals; cite RS; propose engagement steps.
Link each milestone to responsible institutions/roles; add risks and fallback owners.
Map interdependencies relevant to SP; derive cascade risks and mitigation; cite RS.
Extract institutional narratives from RS; map which frames resonate where; use ethical persuasion only; cite RS.
Propose sequence that builds consensus with minimal backlash; include decision triggers and fallback routes.
Produce CRM-ready schema for institution/role tracking and engagement history, compliant and non-personal by default.
Map provincial/municipal roles for delivery; propose governance and reporting; cite RS.
Identify lawful coordination channels between government and operators; build escalation charter; cite RS.
For each key institution/role, estimate plausible moves under 3 scenarios; label assumptions; propose mitigations.
Propose legitimacy safeguards: transparency, consultation, grievance channels; avoid performative checklists.
Define metrics that capture alignment and delivery (not vanity); propose cadence and evidence collection.
Convert stakeholder map into next 10 concrete engagements with scripts, owners, and timing; evidence-cited.
Build BATNA frameworks and ZOPA hypotheses; explicitly label assumptions; cite RS for constraints; include walk-away conditions.
Design concession ladder with reversibility and political feasibility scoring; include “no-go” list.
Draft phase scripts with fallback wording for 5 counterpart reactions; include de-escalation language.
Draft clause options: scope, governance, finance, data, safeguards, reporting, disputes, termination; cite RS legal norms if present.
Produce 3 tiers of joint language; annotate intent per paragraph; provide “phrases to avoid” and safe synonyms.
Draft chair text that preserves consensus; propose fallback clauses; cite RS for precedent language.
Design dispute pathway: prevention, escalation, mediation, arbitration; include operational SOP triggers and documentation requirements.
Generate safeguards: transparency, audits, due diligence, grievance; cite RS standards if available; flag legal gates.
Infer incentives/constraints at institution level; provide engagement tactics preserving dignity and off-ramps; cite RS evidence.
Build coalition sequencing, minimum consensus package, spoiler management, and message discipline; evidence-cited.
Generate 10 plausible countermoves and mitigations; avoid harmful operational guidance; focus on diplomacy and messaging.
Decompose draft text into intents, risks, and hidden commitments; cite RS for norms; propose safer rewrites.
Identify implicated treaties/agreements and obligations; cite RS; label UNKNOWN.
Map approval pathway Cambodia/partner; identify friction points and timeline risks; evidence-cited.
Produce talking points with proof points; each claim must cite RS or be flagged UNKNOWN; include “do not say.”
Build step ladder: private signals, public statements, partner sync; define thresholds and off-ramps.
Draft side letter/protocol to operationalize commitments: milestones, reporting, audits, dispute triggers.
Bundle offers into 2–3 packages maximizing acceptance while respecting red lines; include trade-off justification.
Extract commitments, ambiguities, and next steps; convert into clarifying questions and draft follow-up note.
Provide 3 pivot pathways: soften scope, change sequencing, add safeguards; include minimal viable outcome.
Draft steering committee ToR, decision rights, reporting cadence, KPIs, audit rights, escalation rules.
Generate procurement/delivery clauses: transparency, audit, termination, force majeure, performance; flag counsel review.
Draft data clauses: minimization, residency, transfer conditions, audit, breach notice; include safe defaults.
Produce three line sets; ensure consistency and no escalation; mark attribution rules.
Build a 90-day sequencing plan: meetings, drafts, clearances, partner alignment; include risk triggers.
Draft non-attributable summary outputs for Track 1.5/2; ensure neutrality and legitimacy safeguards.
Produce a screening checklist and escalation-to-counsel triggers; explicitly forbid evasion; evidence-cited.
Define conditions to pause/terminate engagement; propose rollback messaging and relationship repair steps.
Align clauses across instruments; detect contradictions; propose harmonized text; cite RS norms if available.
Engineer mutual gains: Cambodia priorities + mission objectives; propose trade spaces and safeguards; cite RS.
Generate 3 futures; for each: drivers, signposts, triggers, stakeholder moves; cite RS; label UNKNOWN.
Build event tree with probability ranges; list assumptions and what evidence updates them; avoid false precision.
Specify indicators, sources, thresholds, response actions, governance; cite RS.
Create MCDA criteria/weights; rank options; show weight changes that flip decision.
Assume failure; identify top drivers; propose mitigation roadmap with triggers.
Identify second/third-order impacts across ASEAN dynamics and domestic politics; cite RS for precedents.
Simulate narrative pathways; craft truthful responses; build comms ladder and partner synchronization.
Simulate regulatory change impacts; produce 0–72h, 2–6w, 6–18m plan; cite RS.
For each key institution/role, model plausible reactions across scenarios; label assumptions and evidence needs.
Identify actions robust across scenarios; list those that are brittle and require triggers.
Identify weak signals and collection plan; define thresholds for escalation; cite RS for known patterns.
Stress test proposed portfolio against major risks; propose hedges and sequencing.
Simulate cascade failures across sectors; propose containment actions and coordination protocols; cite RS.
Produce outcome ranges based on constraints and trade space; avoid fabricated data; label UNKNOWN; propose evidence updates.
Optimize sequencing across bilateral/ASEAN/Track 1.5; cite RS precedent; include “why now” logic.
Extrapolate trends only from evidence in RS; include confidence and alternative trajectories.
Propose ethical sentiment monitoring and response; no manipulation; cite RS; include governance.
Define explicit triggers and evidence requirements for major decisions; include rollback logic.
Run ACH on key uncertainty; cite RS; list discriminating evidence and collection plan.
Define drift metrics and review cadence; create corrective action playbook.
Design tabletop: injects, roles, decisions, evaluation; avoid harm; focus governance and comms.
Simulate coordination failures; propose governance and comms discipline to prevent them.
Rank options by robustness under worst-case; list trade-offs and ethical constraints.
Query RS for adjacent risks and overlooked constraints; generate discovery questions and monitoring.
Build critical path from drafting to signing; include clearance and partner dependencies.
Forecast readiness based on capacity constraints; cite RS; propose staged delivery model.
Define reputational risk indicators and thresholds; propose comms and governance actions.
Identify legal/political challenge pathways; cite RS; propose mitigations and language adjustments.
Define durability factors; assess partnership resilience; propose reinforcement actions.
Identify 10 small actions with outsized impact; cite RS; include timing and scripts.
Summarize macro/fiscal constraints only from RS; tie to negotiation leverage and timelines; flag UNKNOWN.
Map sector structure, regulators, typical bottlenecks; cite RS; avoid speculation.
Identify NTBs affecting SP; propose reform/negotiation asks; cite RS; provide verification steps.
Evaluate corridor constraints, chokepoints, compliance risks; cite RS; propose resilience actions.
Screen deal feasibility with integrity, legal, ESG, data rules; no evasion; cite RS.
Propose financing stack options with eligibility constraints; cite RS; label assumptions.
Design PPP risk allocation and governance; include transparency and dispute handling; flag legal review.
Identify dependency risks and defensive hedges; cite RS; avoid antagonistic framing.
Identify chokepoints and resilience options; cite RS; propose monitoring indicators.
Generate pipeline hypotheses with evidence; rank by feasibility and integrity risk; flag UNKNOWN.
Produce asks/offers, sequencing, and safeguards; include fallback positions and red lines.
Draft reform proposal with governance, KPIs, and integrity safeguards; cite RS.
Identify labor/standards risks and mitigation clauses; cite RS norms; include monitoring KPIs.
Identify climate finance instruments and governance; cite RS; propose partnership structure.
Assess exposure to price shocks from RS evidence; propose mitigation and contingency actions.
Estimate impacts using only evidenced ranges; label unknowns; propose policy/engagement actions.
Build safeguards: transparency, audit rights, due diligence; include stop/go thresholds.
Identify relevant provisions from RS; propose practical utilization steps; flag legal review.
Identify payment frictions from RS; propose lawful mitigations and policy asks; avoid speculation.
Rank policy options by economic impact, feasibility, and risk; include sensitivity analysis.
Design local content and skills transfer program with KPIs and governance; include integrity safeguards.
Propose diversification options; cite RS; include partner and infrastructure dependencies.
Create readiness rubric; score using provided data; label unknowns; propose evidence needed.
Define stop/go triggers and rollback plans for economic initiatives.
Map partner roles and propose coordination; cite RS; include legitimacy safeguards.
Create due diligence steps, clauses, and monitoring; include grievance channels and reporting.
Identify dispute risk pathways; propose preventive governance and clause options; cite RS.
Summarize incentives only from RS; flag unknowns; propose verification steps.
Identify cross-border dependencies and mitigation; propose governance for resilience.
Craft sovereignty-respecting win-win framing with verified proof points; avoid inflated ROI claims.
Threat model by sector: hazards, cyber, governance; cite RS; no exploit guidance.
Assess resilience risks and mitigations; cite RS; propose coordination with host authorities.
Build continuity SOP: escalation, comms, redundancy; include legal/protocol gates.
Evaluate resilience dependencies; propose diversification and governance; cite RS; avoid offensive content.
Design response program with triggers, coordination map, and KPIs; cite RS.
Rank adaptation interventions; include feasibility, impact, safeguards; propose 90-day starter set.
Create procurement integrity shield: transparency, audit, third-party checks, grievance, stop/go triggers.
Stress-test interdependencies and propose containment; include decision triggers.
Map coordination roles and triggers; propose comms discipline and after-action learning; cite RS.
Specify early warning data, thresholds, and action protocols; cite RS; include privacy and legitimacy safeguards.
Define registry fields for assets at aggregated level; include access control and data minimization rules.
Create command charter: roles, escalation, comms, continuity steps; avoid technical exploit instructions.
Identify critical inputs and alternative sourcing; cite RS; propose inventory and coordination policy.
Design governance: steering, reporting, audits, dispute triggers; include integrity safeguards.
Build comms ladder for incidents; include attribution rules, partner sync, rumor control (truthful).
Link climate impacts to stability and infrastructure; cite RS; propose preventive engagement.
Define safeguards, monitoring, grievance mechanisms; include stop/go thresholds.
Build preparedness plan: triggers, coordination, continuity; include comms and duty-of-care steps.
Stress test financing risks; propose hedges and governance; label assumptions.
Define governance for cyber-physical risks: roles, reporting, controls, incident response.
Create vendor risk framework: evaluation criteria, transparency, audit, diversification; avoid targeting.
Propose data architecture: minimization, residency, access control, audit; flag legal review.
Design quarterly exercise plan for continuity: scenarios, evaluation, after-action improvements.
Provide ROI ranges only if RS supports; otherwise output UNKNOWN and specify needed data.
Map compliance obligations and reporting; cite RS; create gating checklist.
Define who coordinates with whom (institution/role), cadence, and comms discipline.
Identify actions robust across scenarios; list those requiring triggers and approvals.
Design integrity controls for emergency procurement; include transparency and audit practices.
Build diplomacy plan for cross-border infrastructure: sequencing, safeguards, language options; cite RS.
Define KPIs, reporting cadence, evidence sources, and governance for learning loops.
Create cyber governance: roles, reporting, risk acceptance, incident response, and training cadence.
Build threat model (assets, threats, controls, residual risk); no exploit instructions; include audit appendix.
Define maturity stages and prioritized controls; include governance and measurement.
Draft IR playbook: detection, containment, comms, legal gates, recovery, AAR; no offensive content.
Create comms ladder: internal, host authorities, partners, public; include attribution rules and legal gates.
Develop resilience plan: backups, segmentation, training, decision gates; no negotiation tactics for criminals.
Create vendor security requirements, audit rights, and monitoring; include procurement gates.
Produce high-level zero trust blueprint: identity, device, network, data; include phased plan.
Build training module: travel hygiene, meeting protocols, data minimization, incident reporting.
Create monitoring plan for false narratives; verification workflow; truthful response options; no manipulation.
Create factual prebunk messages and transparency practices; avoid propaganda; include “do not say.”
Assess sovereignty risks in data flows and platforms; cite RS; propose governance and clauses.
Design tabletop: injects, decisions, evaluation; focus governance and comms; no exploit detail.
Define defensive KPIs (patch latency, backup integrity, training coverage) and governance for review.
Identify gaps and prioritized mitigations; require evidence for claims; label unknowns.
Draft security requirements: logging, access control, data minimization, audit, IR integration.
Create protocol to avoid false attribution; verification steps; safe public wording.
Define lawful information-sharing during incidents, classification handling, and comms synchronization.
Produce PIA template with data inventory, lawful basis, minimization, retention, and audit steps.
Provide practical minimization rules and privacy-by-design governance, without implementation exploit details.
Develop insider risk governance: training, access controls, reporting, wellbeing safeguards; no suspicion-based targeting.
Define logging policy: what, why, retention, access, audit, and incident use.
Produce governance: key ownership, rotation, access, incident handling; avoid operational exploitation.
Draft talking points and cooperation asks (CERT/CIRT, training); include data sovereignty safeguards.
Design response plan for deepfakes: verification, comms ladder, partner sync; truthful and cautious.
Rank security investments by risk reduction and feasibility; include “minimum viable security” set.
Create OT governance: segmentation, access, monitoring, incident response coordination.
Define rules for third-party access: approvals, least privilege, logging, audits, termination.
Generate guardrails: what to say, what not to say, how to avoid escalation and legal exposure.
Identify actions robust across threat scenarios; list actions requiring counsel clearance.
Identify potential coalition partners and blockers; propose coalition-safe language; cite RS.
Build value proposition for partners while respecting sovereignty; include mutual gains and safeguards.
Create minimal viable package acceptable across diverse partners; include fallback text and sequencing.
Design convening: participant architecture (roles), non-attribution rules, outputs, follow-up governance.
Define synchronization cadence, message discipline, and escalation triggers across partners.
Build a coalition message house with proof points and “do not say”; ensure non-escalatory language.
Create triangular initiative structure: roles, financing options, safeguards, KPIs, governance.
Map partner institutional incentives; propose sequencing to align; cite RS.
Identify wedge risks, messaging inconsistencies, and mitigation protocols.
Choose forum pathways; craft sequencing and language for each; cite RS precedent.
Create lawful due diligence checklist and escalation triggers; avoid personal dossiers.
Design system to capture commitments and translate to tasks; include reporting and accountability.
Identify red line conflicts and propose language and sequencing to reduce friction.
Map overlapping initiatives; propose complementarity strategy and narrative; cite RS.
Create crisis comms playbook for coalition: rapid alignment, attribution rules, off-ramps.
Propose ethical backchannel sequencing by institution/role; include documentation and reconciliation steps.
Build agenda that produces usable artifacts (language/options); include facilitation scripts and timeboxing.
Propose CBMs, sequencing, and verification steps; focus de-escalation and trust.
Map partner capabilities and gaps; propose division of labor and governance.
Design clearance workflow across coalition partners; include timing constraints and fallback.
Draft scripts per partner type (ASEAN member, dialogue partner, MDB, operator).
Build text options and fallback synonyms; annotate intent; propose sequencing to land consensus.
Define outcome KPIs for alliance building and coalition cohesion; include measurement plan.
Design mediation protocol for internal coalition disputes; include confidentiality and enforcement norms.
Identify legitimacy and integrity risks; propose safeguards and transparency measures.
Build minimal elite cross-functional team across coalition; define roles, selection criteria, RACI, cadence.
Create protocol to verify commitments without public pressure; include evidence collection and escalation rules.
Stress test coalition strategy under best/base/worst; propose hedges and fallback language.
Produce stabilization options emphasizing de-escalation and lawful diplomacy; avoid operational military advice.
Design governance to institutionalize coalition: charters, cadence, outputs, accountability.
Design workflow: intake, review gates, approvals, export rules, audit log fields.
Define how chat outputs become briefing packs, clauses, and trackers; include versioning and provenance rules.
Propose KB taxonomy, tagging, retention, and provenance rules; include injection defense and access control.
Define automation: event triggers, briefing generation, approvals, and follow-up tracking.
Create ops room plan: roles, cadence, dashboards, comms discipline, incident escalation.
Build surge blueprint: staffing, comms, triage, legal gates, AAR system.
Create duty-of-care risk register and mitigations; include travel, health, cyber hygiene.
Create templates for SITREPs, options memos, demarches, and AARs with audit appendix sections.
Design quarterly training program: modules, exercises, evaluation, and refresh cycles.
Generate negotiation role-play with roles, secret objectives, injects, scoring rubric; ensure ethical constraints.
Define versioning rules for positions and lines-to-take; include approvals and audit trail.
Produce clearance checklists (legal/compliance/communications) per deliverable type.
Produce CRM schema that tracks institutions/roles and engagements without personal profiling by default.
Build MEL framework: theory of change, KPIs, data plan, learning loops.
Convert incident/initiative notes into AAR: what happened, why, lessons, changes to SOPs, owners.
Draft retention policy aligned to sensitivity mode; include access controls and audit rules.
Create charter: mandate, decision rights, cadence, escalation, documentation standards.
Draft procurement requirements and evaluation rubric: security, provenance, compliance, UX, support.
Create demo script and test cases: evidence, auditability, security, failure modes; include pass/fail criteria.
Define drafting → review → approval pipeline; include attribution rules and versioning.
Define war room roles, cadence, rumor verification steps, and partner alignment.
Define translation quality controls, terminology glossary governance, and citation preservation rules.
Draft user attestation and warnings; define prohibited inputs; include compliance gates for export.
Create tracker schema: engagements, objectives, outcomes, next steps, risks, evidence.
Build SOP for cross-mission coordination: information sharing, consistency, escalation controls.
Build policy library taxonomy; extract positions and constraints from RS; include timestamps and citations.
Extract and normalize clause patterns from RS; tag by risk and use-case; include legal review flags.
Define lawful interface between operator and government: reporting, escalation, comms discipline.
Convert scenarios into catalog entries with reusable service templates and evidence pointers; include versioning.
Specify dashboard metrics, sources, thresholds, and briefing cadence; include audit appendix.
Audit whether outputs are evidence-backed; list unsupported claims; propose retrieval queries to close gaps.
Identify contradictions; resolve by evidence weighting and recency; if unresolved, mark UNKNOWN with next steps.
Rewrite outputs to enforce strict citation; remove or label any unsupported assertions.
Generate adversarial questions to probe weak points; require evidence-backed answers; flag failures.
Define rules to treat docs as data; detect malicious instructions; sanitize retrieval; log injections.
Define provenance fields: source IDs, timestamps, claim links, version hashes.
Specify evaluation tests: factuality, coherence, bias, compliance, reproducibility; define pass/fail thresholds.
Audit for biased framing; propose neutral rewrites; ensure sovereignty-respecting language.
Draft MRM policy: acceptable use, review gates, incident response, documentation, retraining cadence.
Define instruction library governance: approvals, versioning, access control, change logs.
Define minimization rules, retention, access logging, and export gating by sensitivity.
Define how UNKNOWNs are tracked, verified, and resolved; include decision trigger linkage.
Generate reproducibility metadata: inputs, instruction versions, retrieval scope, assumptions, output hashes.
Define evidence weighting rubric; apply to retrieved sources; document conflicts.
Plan multilingual retrieval (Khmer/Thai/Vietnamese/Chinese/English where available); define translation QA.
Generate 20–40 targeted queries by topic; include synonyms and institutional terminology.
Validate output conforms to schema; list missing sections; regenerate only missing parts with evidence.
Check requests for illicit content; refuse unsafe parts; provide safe alternatives; log rationale.
Assign confidence per section tied to evidence density; explain what would raise confidence.
Ensure scenario branches don’t contradict baseline facts; reconcile; label uncertainties.
Ensure outputs present options and triggers; avoid unauthorized “decide for user”; enforce human gates.
Add export checklist: approvals, redactions, attribution checks, evidence verification.
Define rubric: accuracy, provenance, clarity, feasibility, compliance, risk controls; score outputs and justify.
Link each claim to evidence; list orphan claims; propose retrieval or removals.
Compare versions; explain changes, drivers, evidence updates, and impacts on recommendation.
Produce a concise exec summary that references evidence and clearly states uncertainties.
Select 12 best service configurations from this catalog for the scenario; order them for workflow; explain why.
Define automation hooks: run triggers, audit logging, approvals, export; include security controls.
Propose KB updates: new tags, deprecations, contradiction merges, and governance approvals.
Execute deep scan: retrieval plan, contradiction resolution, scenario testing, compliance gates, and audit appendix; fail closed on missing evidence.