Teeem AI never just executes. Every response goes through the following six steps. Where ChatGPT-style generative AI replies with text, Teeem AI verifies permissions, gathers context, surfaces insight, and follows through to approvable actions.Documentation Index
Fetch the complete documentation index at: https://docs.teeem-ai.com/llms.txt
Use this file to discover all available pages before exploring further.
The six steps
Question — natural-language request from a teammate
The request arrives via channel mention, DM, or web chat input — depending on the channel policy.At this point Teeem AI identifies intent, channel, sender, and origin (which channel, which thread).
Permission check — user, department, access verification
Before doing anything, the agent checks whether the sender has:
If permission is missing, the work stops there and the user gets a clear, actionable explanation.
| Check | Example |
|---|---|
| RBAC role | Is the sender at least power_user to access KPIs? |
| ABAC data class | The KPI is confidential — only their team can see it |
| Channel ACL | Can they post to #c-leadership? |
| Tool policy | Is a high-impact tool like manage_website enabled? |
| External-send gate | Does this require a human approver? |
Context integration — connect related information
Information is collected from:
- Knowledge base — KPI definitions, report templates
- App Packs — current month’s revenue, orders, inventory
- ERP connectors — additional data from Douzone or Wehago
- Channel history — past reporting patterns in the same channel
- Prior results — last year’s KPI for the same period
Long conversations stay cheap and accurate via automatic compression: tool outputs older than three turns are replaced with summaries, and the context window auto-compacts at 70%.
Insight — find the change points
Not a list of data — meaningful signal:
- Change points — revenue −15%, inventory turnover +20%
- Anomalies — values outside the normal range
- Pattern shifts — account concentration up vs last quarter
- Recommendations — “investigate shipping-delay impact at account A”
forecast, alert_monitor, analyze_data, diff_documents.Execute — reports · approvals · queries · cleanup
Beyond the answer, the agent does the actual work — when permissions allow.
For sensitive external sends, an approval gate triggers here and waits for a human OK before delivery.
| Action | Tools |
|---|---|
| Build a 5-slide PPT (this month’s KPIs + charts) | generate_pptx, generate_chart |
| Apply company fonts and colour scheme | (organisation template) |
Attach to #c-leadership with a summary message | upload_to_channel |
| DM the sender on completion | slack_mention |
Record — every step into the tamper-evident log
Everything this single response did is written into the hash-chain audit log:
- Sender, message, channel
- Permission-check results
- Tool calls with inputs and outputs (PII-masked)
- External system calls (Douzone API, etc.)
- Final response content
- Cited KB document IDs
A real example — one message, six steps
How the same request unfolds across the steps:The request
The request
1. Question (parsing)
1. Question (parsing)
- Intent: report generation
- Output: PPTX
- Time range: last week
- Group by: account
- Highlight: anomalies
- Sender:
kim@company.com(Slack ID mapped)
2. Permission check
2. Permission check
kim@company.comispower_user✓- Revenue data is
confidential—power_userallowed ✓ - PPTX generation enabled ✓
- No external send → no extra gate ✓
3. Context integration
3. Context integration
- Query App Pack
sales_ordersfor 2026-04-21 to 2026-04-27 - Aggregate by account + compare to prior week
- Pull standard report PPTX template from KB
- Inherit colour scheme from previous similar requests
4. Insight
4. Insight
- Total revenue: ₩120M (−15% vs prior week)
- Account A: −₩30M (largest impact)
- Accounts B, C: within normal range
- Account D: new revenue +₩15M
- Anomaly candidate: A (likely shipping delay)
5. Execute
5. Execute
generate_pptx— cover + summary + per-account charts + anomaly slidegenerate_chart×4 — bars by account, trend line, comparison doughnut, anomaly highlight- Attach PPTX to the Slack thread
- Reply: “Last week’s revenue report. Biggest change: account A (−₩30M, likely shipping delay).”
- Citation card (App Pack model + KB template) posted as a separate persistent message
6. Record
6. Record
The hash-chain audit log gets these entries:
What’s different — vs generative AI
| ChatGPT-style generative AI | Teeem AI | |
|---|---|---|
| Output shape | Text response | Text + tool execution + file generation + system calls |
| Data connection | Limited to model training data | Company ERP, groupware, apps, mail, calendar, e-commerce |
| Permissions | Not bound to user identity | Per-user RBAC + ABAC + channel ACL |
| Audit | Conversation history (manual backup) | Tamper-evident hash chain (5 years) |
| Citations | Generally none | Every grounded answer comes with sources |
| Deployment | SaaS only | SaaS + on-prem (negotiated) |
Next
Permission model
Which checks run, in detail.
Citations and sources
What the source cards next to every answer mean.