Use cases

Six teams who put their AI agents on a leash — without slowing them down.

Every scenario below is built around the same primitives: policy engine, human approvals, audit chain, webhooks. Only the rules change — not the integration.

01
Marketing automation
Lattice — €40M ARR DTC brand, 8-person growth team

An ad-buying agent that tunes Meta + Google campaigns 24/7

Context
Their growth agent autonomously creates campaigns, shifts budgets between channels and pauses underperformers. One bad ROAS prediction and it could blow €30k overnight before anyone notices.
Risk
A faulty model update or a corrupted feed could cause runaway ad spend. Existing platform-side daily budgets aggregate at the account level — too late.
Outcome
Agent runs autonomously 90% of the time. Growth lead approves 5–10 escalations / week from her phone via Slack webhook. Zero runaway spend incidents in 3 months.
Policy stackagent: growth-agent
  • 10
    DAILY_CAPREJECT
    Cap at €5,000 / day per agent across all platforms
  • 20
    AMOUNT_THRESHOLDREQUIRE HUMAN
    Single charge ≥ €1,500 → growth lead must approve
  • 30
    BENEFICIARY_WHITELISTREQUIRE HUMAN
    New ad account or media partner needs review
  • 40
    TIME_WINDOWAUTO APPROVE
    Mon-Fri 8h-22h Paris — auto-approve under €1,500
02
AI-native SaaS
Norma — Series A AI assistant, 22 engineers, ~€80k/mo cloud spend

An infrastructure agent that pre-buys API credits and scales clusters

Context
Their agent provisions GPU instances and tops up OpenAI / Anthropic credits when latency rises. A bug in early 2026 caused a +€19k charge in 3 hours due to an infinite retry loop.
Risk
Cloud provider quotas only kick in after damage is done. Per-vendor caps don't exist natively across AWS, Anthropic and OpenAI.
Outcome
Daily cap caught a misconfigured retry loop on day 4. Auto-approval rate stayed at 87%. CFO finally let the agent run autonomously in production.
Policy stackagent: ops-agent
  • 10
    AMOUNT_THRESHOLDREQUIRE HUMAN
    Single top-up ≥ $1,000 → CTO approval
  • 20
    DAILY_CAPREJECT
    $10,000 / day total across all vendors
  • 30
    AGENT_SCOPEREQUIRE HUMAN
    ops-agent capped at $500 per intent without review
  • 40
    CATEGORY_BLOCKLISTREJECT
    Block 'gpu_reserved_capacity' (pre-purchases) entirely
03
E-commerce & support
Maison Léa — €120M GMV French marketplace, 15-person CS team

A refund agent that resolves customer claims without a human in the loop

Context
40% of CS tickets are 'where's my order' or 'damaged on arrival'. Their AI agent reads the conversation, checks shipping data and issues a refund. Risk: a jailbreak prompt asking for a €10,000 'goodwill gesture'.
Risk
Customers are smart. Prompt injection in messages, fake order numbers, social engineering — anything that tricks the agent into thinking a high-value refund is justified.
Outcome
78% of refunds auto-approved. Average resolution time fell from 8h to 12min. Three suspicious patterns surfaced via the audit log review — caught before they became incidents.
Policy stackagent: cs-agent
  • 10
    AMOUNT_THRESHOLDAUTO APPROVE
    ≤ €100 — refund issued immediately
  • 20
    AMOUNT_THRESHOLDREQUIRE HUMAN
    €100 to €500 — CS supervisor reviews
  • 30
    AMOUNT_THRESHOLDREJECT
    ≥ €500 — never auto, always escalates manually
  • 40
    DAILY_CAPREJECT
    Per-agent daily cap of €1,500
04
Crypto treasury
Helix Capital — €200M crypto-native fund, 4-person ops team

A rebalancing agent on an MPC wallet executing portfolio trades

Context
Their agent watches market signals and rebalances stablecoins / BTC / ETH allocations. A single fat-finger in a config file once moved $2M to a wrong address (recoverable after 6 weeks of legal).
Risk
Crypto is irreversible. Once funds move from an MPC wallet, claw-back is at best a legal nightmare. Internal limits inside the wallet aren't policy-aware.
Outcome
MPC signing thresholds now mirror the policy engine. Audit chain doubled as their compliance evidence for AMF reporting. Zero unauthorized movements since deployment.
Policy stackagent: treasury-agent
  • 10
    BENEFICIARY_WHITELISTREJECT
    Strict whitelist — every destination wallet pre-approved by 2 partners
  • 20
    AMOUNT_THRESHOLDREQUIRE HUMAN
    Any single move > $50k requires both Helix partners + CFO
  • 30
    TIME_WINDOWREQUIRE HUMAN
    All transfers outside Mon-Fri 9-18 UTC need review
  • 40
    DAILY_CAPREJECT
    Aggregate daily outflow capped at $250k
05
Manufacturing procurement
Keller Industries — German auto parts supplier, 800 employees

An inventory agent that auto-restocks raw materials when stock dips

Context
Their procurement agent monitors stock levels, fetches quotes from approved vendors, and places POs. A flawed forecast one week led to a €200k over-order of a niche alloy.
Risk
Forecasting errors compound. A blip in demand signals + an aggressive agent = 6 months of inventory bought in a panic.
Outcome
Lead time dropped 22% on routine restocks. Two over-order events caught by the daily cap before they shipped. Internal audit signed off on agent autonomy in Q3.
Policy stackagent: procurement-agent
  • 10
    AMOUNT_THRESHOLDREQUIRE HUMAN
    Any single PO ≥ €25k → procurement lead signs off
  • 20
    DAILY_CAPREJECT
    €80k / day across the whole agent
  • 30
    BENEFICIARY_WHITELISTREQUIRE HUMAN
    Only 12 audited suppliers in the whitelist
  • 40
    CATEGORY_BLOCKLISTREJECT
    'capital_expenditure' category requires human PO workflow
06
Marketplace payouts
Pixie — French handmade goods marketplace, 25k sellers

A seller-payout agent processing thousands of disbursements weekly

Context
Sellers are paid weekly via SEPA. Their automation agent batches and dispatches the payouts. KYC issues, fraud rings creating fake stores, and gaming of refund cycles all create financial exposure.
Risk
A compromised seller account or a fraud ring exploiting account verification can siphon money. Per-seller caps need to be dynamic based on KYC status and history.
Outcome
A fraud ring of 14 sellers was identified within 2 weeks via the audit log + risk score patterns. €82k saved before the platform's KYC team had updated their detection rules.
Policy stackagent: payout-agent
  • 10
    BENEFICIARY_WHITELISTREQUIRE HUMAN
    Sellers without 'KYC verified' tag → manual review every time
  • 20
    AMOUNT_THRESHOLDREQUIRE HUMAN
    Single payout ≥ €5,000 (≈99th percentile) needs review
  • 30
    DAILY_CAPREJECT
    Per-agent daily aggregate of €200k
  • 40
    AGENT_SCOPEREJECT
    Only payout-agent (not other agents) can submit 'seller_payout' category
Don't see your case?

Six rule types. Infinite combinations.
If your agent can do it, you can govern it.