Choose the agent to run against your data. Each agent has built-in rules engine and detection logic.
Detects toxic role combinations across ERP systems
RFC lifecycle violations, self-approvals, missing testing
Terminated users, missing MFA, dormant accounts
Backup failures, job delays, incident SLA breaches
Missing UAT, self-reviewed code, dev-to-prod access
Baseline vs live ERP configuration drift detection
100% population testing — self-approvals, duplicates, tolerance
Duplicate vendors, bank fraud, shell company indicators
Source-to-target validation, hash/control totals, failed loads
Journal entry forensics, after-hours, round-dollar, reversals
Upload or connect your data. All processing runs locally in your browser — your data never leaves your environment.
or click to browse — file stays in your browser, never uploaded to any server
Package multiple CSV / XLSX / JSON files into one .zip and upload for batch
analysis.
Each file will be individually analyzed by the same audit agent.
ERP exports, audit reports, system screenshots — extract structured data for analysis
Screenshots, screen captures, scanned documents — AI extracts tabular data automatically
Connect to your S3 bucket via temporary credentials or IAM role
Connect via SAS token or storage account key
Secure file transfer over SSH — no plaintext FTP
Verify the auto-detected column mappings. Adjust if needed.
| Entity | Rule | Area | Severity | Fraud Scenario | T-Code(s) | Policy Rule | Logic Trace |
|---|