Use cases
Three concrete jobs an agent + human can run together.
Each vignette below is structured the same way: an agent does the operational work over the CLIs, and a human approves the gates that need a deliberate gesture (a signature, an escalation override, a final-position acceptance). The shell snippets show what the agent invokes; the bolded steps show where the human steps in.
1. Vendor onboarding NDA at scale
You're an ops lead at a 60-person company onboarding 10–20 vendors a quarter. Each one needs an NDA before any technical conversation starts. Today: legal sees every one, slows to a week per vendor.
With the CLI suite, you push a single house template through draft with the
vendor's details, run review to confirm it matches policy, hand it to
sign-cli, done in 90 seconds. Legal only gets pinged when
review escalates a finding.
# In a CSV with vendor name, address, contact email
while IFS=, read -r name addr email; do
nda-review-cli draft \
--template common-paper-mutual \
--party-a "Acme Inc." --party-a-address "123 Main St" \
--party-b "$name" --party-b-address "$addr" \
--purpose "vendor evaluation" \
--out "out/$name.md" --out-docx "out/$name.docx"
docx2pdf "out/$name.docx" "out/$name.pdf"
sign-cli send --file "out/$name.pdf" \
--signer "alice@acme.com:Alice Founder" \
--signer "$email:$name signer" \
--provider sign-well
done < vendors.csv
If review later flags a counterparty redline that's outside your stance,
the negotiation flow takes over — same files, no portal switch.
2. M&A diligence — bulk NDAs across deal partners
During diligence you need NDAs with bankers, accountants, advisors, target-company employees, sometimes 30+ counterparties in a week. Each one wants their own boilerplate; nobody has time to one-shot-redline that many.
Run review --learn-profile on each incoming counterparty so the CLI builds
a stance fingerprint per firm. Repeat parties (same banker, different deals) get a consistent stance
automatically. When a counterparty's amendments cross your non-negotiable redlines, you escalate to
counsel; otherwise the auto-counter does its work.
for f in incoming/*.docx; do
nda-review-cli review --file "$f" --why \
--counterparty "$(basename "$f" .docx | tr '_' ' ')" \
--learn-profile \
--out-md "review/$(basename "$f" .docx).md"
done
# Aggregate the review summaries
nda-review-cli summarize --dir review/ --out review/summary.md Every review writes a hash-chained record — useful when post-close discovery asks who saw what when.
3. Employment paperwork — confidentiality + IP assignment
Onboarding an engineer needs an NDA, an IP assignment, and often a non-compete (where enforceable). Today: HR sends three docs, each via a different e-sign tool, audit trails scattered across vendor dashboards.
Bundle the three docs into a single signing flow with sign-cli send --bulk.
The receipt for the whole onboarding lives as one hash-chained file on disk; if the new hire later
files a dispute, you can hand the verified bundle to opposing counsel without asking three separate
SaaS vendors for export.
# Single CSV: file, signer email, signer label
cat > onboarding.csv <<EOF
nda.pdf,alice@acme.com,Alice (employee)
ip-assignment.pdf,alice@acme.com,Alice (employee)
noncompete.pdf,alice@acme.com,Alice (employee)
EOF
sign-cli send --bulk onboarding.csv \
--provider sign-well \
--receipt-bundle bundles/alice-2025-05-10.json
# Later — verify offline, even years from now
sign-cli verify bundles/alice-2025-05-10.json What these have in common
- Composable. Each step is a CLI invocation. You can wire them together with shell scripts, GitHub Actions, n8n, anything.
- Local artifacts. Every output lives on disk in a standard format. No "log into the dashboard to download."
- Agent-friendly. Same primitives over MCP — your operations agent can run the same flow.
- Cheap. The CLIs are free; you only pay your e-sign provider per envelope.
Use cases the CLIs are not ideal for
- Cross-team discussion threads. If finance, legal, and sales all need to comment in one place, you want a SaaS suite. The CLI workflow assumes one operator per document.
- Procurement orchestration. Vendors like Coupa or Ironclad plug into a procurement tool's RFP flow. Replicating that with the CLIs is doable but custom.
- Documents you don't actually want auditable. If you'd rather logs be vendor-controlled and disposable, this isn't the right shape.
Try the review on a sample NDA
See what the deterministic findings + risk score look like before you script anything around it. ~10 seconds.
Open the live demo →