// Use Cases

30 real-world architectures

Production and enterprise workflows where the ecosystem integrates into day-to-day operations.

01 FINTECH

FinTech — PSD2/PCI-DSS Payment Gateway

European financial entity implements a payment gateway compliant with PSD2 and PCI-DSS level 1.

★★★ ★★★ ★★★ ★★★
Critical
02 E-COMMERCE

E-commerce — Monolith to Microservices Migration

Marketplace with a 200K-line Django monolith progressively extracts services with 60% AI-generated code.

★★★ ★★★ ★★☆ ★★☆
High
03 HEALTHTECH

HealthTech — HIPAA-Compliant Clinical API

Electronic health records API compliant with HIPAA and EU AI Act as a high-risk system.

★★★ ★★★ ★★★ ★★★
Critical
04 SAAS

SaaS B2B — Multi-Tenant Platform with CI/CD

Multi-tenant SaaS platform with automated end-to-end CI/CD pipeline using all 4 tools.

★★★ ★★★ ★★★ ★★★
High
05 PLATFORM

Platform Engineering — IaC with Terraform and Kubernetes

Infrastructure as code with specialized Terraform agents, verified and with provenance tracking.

★★★ ★★★ ★★☆ ★★☆
High
06 MLOPS

Data Engineering / MLOps — ML Pipeline in Production

ML pipeline with fraud detection model, a high-risk system under the EU AI Act.

★★★ ★★★ ★★☆ ★★★
Critical
07 CYBERSECURITY

Cybersecurity — SOAR and Incident Response

SOAR platform with AI agents to automate security incident response playbooks.

★★★ ★★☆ ★★★ ★★★
Critical
08 IOT

IoT / Edge Computing — Fleet Device Management

IoT telemetry pipeline with MQTT gateway, Kafka consumer, and device management API.

★★★ ★★☆ ★★☆ ★★☆
High
09 GOV

Public Administration — Citizen Portal with ENS

Citizen portal with Cl@ve authentication, ENS medium category, EU AI Act, and Spanish AI Law 15/2024.

★★★ ★★★ ★★★ ★★★
Critical
10 CODE REVIEW

Automated Code Review on Every PR

Automated review pipeline with security, spec compliance, provenance, and auto-fix on every pull request.

★★☆ ★★★ ★★★ ★★☆
Medium
11 TESTING

Testing and QA — From Zero Coverage to 80%

Automated test generation with test theater detection and AI-generated test provenance.

★★☆ ★★★ ★★★ ★☆☆
Medium
12 DOCS

Continuous Technical Documentation

Automated generation and updating of technical documentation, ADRs, and regulatory Annex IV.

★★☆ ★★★ ☆☆☆ ★★☆
Medium
13 REFACTORING

Large-Scale Legacy Code Refactoring

Massive legacy code migration with checkpoints, rollback, and provenance of 87% AI-generated changes.

★★☆ ★★★ ★★★ ★★☆
High
14 API

API-First Development — OpenAPI to Production

Endpoint implementation from OpenAPI spec with automatic verification via schemathesis.

★★★ ★★★ ★★☆ ★☆☆
Low
15 MONOREPO

Monorepo Management — Coordinated Multiple Services

Monorepo management with cascading shared library updates and cross-service compliance.

★★☆ ★★★ ★★★ ★★☆
High
16 ONBOARDING

Developer Onboarding — Codebase Intelligence

Automated onboarding guide with compliance status and codebase provenance.

★★☆ ★★★ ☆☆☆ ★☆☆
Low
17 TECH DEBT

Technical Debt — Systematic Detection and Resolution

Weekly analysis of technical, security, and compliance debt with automated resolution.

★★☆ ★★★ ★★☆ ★★☆
Medium
18 AI AGENTS

Custom AI Agent Development

An AI agent builds another AI agent: meta provenance, mandatory FRIA, and complete OWASP Agentic.

★★★ ★★★ ★★★ ★★★
Critical
19 MCP

Multi-Agent Orchestration with MCP

Complete Jira-to-PR-to-Slack pipeline with MCP and multi-agent activity tracking.

☆☆☆ ★★★ ☆☆☆ ★★★
High
20 OPEN SOURCE

Open Source — Project and Contribution Management

Automated issue triage, PR review, and AI-generated contribution provenance.

★★☆ ★★★ ★★☆ ★★☆
Medium
21 DATABASE

Database Engineering — Safe Migrations

Alembic migration generation with upgrade/downgrade verification and provenance.

★★☆ ★★★ ★★☆ ★☆☆
Low
22 FRONTEND

Frontend — Design System to Components

Parallel UI component implementation from Figma exports and design tokens.

★★☆ ★★★ ★☆☆ ★☆☆
Low
23 DEVSECOPS

DevSecOps — Continuous Security Pipeline

Shift-left security with vigil, Semgrep, Snyk, licit compliance, and weekly dependency review.

☆☆☆ ★★☆ ★★★ ★★★
High
24 BENCHMARKING

AI Model Evaluation and Benchmarking

Competitive execution of the same task with multiple models: security and provenance comparison.

☆☆☆ ★★★ ★★☆ ★★☆
Medium
25 INCIDENT

Incident Response — From Alert to Postmortem

Automated diagnosis, hotfix with verification, and postmortem generation with provenance.

★★☆ ★★★ ★★☆ ★☆☆
Medium
26 COMPLIANCE

Compliance as Code — SOC 2 / ISO 27001

licit as the central compliance tool: provenance, changelog, FRIA, Annex IV, and monthly evidence bundle.

★☆☆ ☆☆☆ ★★★ ★★★
Critical
27 SDK

SDK / Library Development — Multi-Language

4 SDKs generated in parallel from OpenAPI: Python, TypeScript, Go, and Java with independent provenance.

★★★ ★★★ ★★☆ ★☆☆
Low
28 STARTUP

Early-Stage Startup — MVP in 48h

From founder vision to working MVP in a weekend with basic compliance for investors.

★★★ ★★★ ★★☆ ★☆☆
Low
29 CONSULTING

Consulting / Agency — Multi-Client Delivery

Reusable pipeline for multiple clients with compliance docs as part of the delivery.

★★★ ★★★ ★★★ ★★★
High
30 GAMING

Gaming — Real-Time Multiplayer Backend

ELO matchmaker, Redis leaderboards, event sourcing replay, and Agones health checks.

★★★ ★★★ ★★☆ ★☆☆
Low