# AI Workflows

The **AI Workflows** provides visibility into execution paths composed of agents, tools, and MCP servers. Each workflow is automatically discovered from connected environments, then visualized to show how components interact within the system.\
Alongside discovery, the feature detects **potential vulnerabilities** within workflows and provides **remediation guidance**, helping teams identify weak points and harden agentic architectures.

{% hint style="info" %}
AI Workflows is built on top of our successful open-source tool [**Agentic Radar**](https://github.com/splx-ai/agentic-radar), extending its capabilities into the enterprise.
{% endhint %}

## Workflow Inventory

<figure><img src="https://1029475228-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fi12bk7lo75SODuwcRCQp%2Fuploads%2FjZILFEOeLPzjQuoMzBst%2Fprobe.splx.ai_w_778_ai-assets%20(5).png?alt=media&#x26;token=01036160-4480-4b8e-a814-feca478b4b50" alt=""><figcaption><p>Figure 1: Workflow Inventory</p></figcaption></figure>

The inventory table lists all discovered workflows with the following details:

* **Name** – workflow identifier.
* **Agentic Framework** – the framework used (e.g., OpenAI Agents, CrewAI).
* **Scan Timestamp** – when the workflow was last scanned.
* **Environment** – environment in which it was discovered.
* **Source** – repository or project path where the workflow is located.
* **No. of Agents** – number of agents included in the workflow.
* **No. of Tools** – number of tools exposed in the workflow.
* **No. of MCP Servers** – number of MCP servers integrated.

From here you can search or filter workflows, or click on a workflow to explore its details.

## Workflow Details

Clicking a workflow opens the **Workflow Details view**, organized into tabs:

### Overview

<figure><img src="https://1029475228-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fi12bk7lo75SODuwcRCQp%2Fuploads%2FdMAZ4RGbEMM3juZnlQBF%2Fprobe.splx.ai_w_778_ai-assets%20(6).png?alt=media&#x26;token=5bd5d268-1573-449a-9b16-6e2230c3ab75" alt=""><figcaption><p>Figure 2: Overview Tab</p></figcaption></figure>

* Displays workflow metadata (scan time, agentic framework, source).
* Summarizes the number of agents, tools, MCP servers, and vulnerabilities detected.
* Generates a **visual graph** showing all workflow nodes and their connections.
  * **Agents** – blue nodes.
  * **Tools** – purple and pink nodes (custom functionality).
  * **MCP Servers** – yellow nodes.

The graph makes it easy to **visualize architecture, identify dependencies, and uncover risky connections**.

## Agents

<figure><img src="https://1029475228-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fi12bk7lo75SODuwcRCQp%2Fuploads%2FuvMLJXPDsmPP6b0V4i1U%2Fprobe.splx.ai_w_778_ai-assets%20(7).png?alt=media&#x26;token=b4109119-16f7-4d3d-8a5b-a9f350449523" alt=""><figcaption><p>Figure 2: Agents Tab</p></figcaption></figure>

The **Agents tab** lists all agents within the workflow, with details including:

* **LLM Model** – the model backing the agent.
* **System Prompt** – the original system prompt defined for the agent.
* **Hardened System Prompt** – the our hardened version with mitigations applied.

Hardened System Prompt can be expanded for review and copied directly from the interface.

## Tools

<figure><img src="https://1029475228-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fi12bk7lo75SODuwcRCQp%2Fuploads%2FMW8i9FEHPXCwAqywFpWf%2Fprobe.splx.ai_w_778_ai-assets%20(8).png?alt=media&#x26;token=fc0e9cfc-3775-4394-a332-40c5b43fded3" alt=""><figcaption><p>Figure 3: Tools Tab</p></figcaption></figure>

The **Tools tab** shows each tool available to agents in the workflow:

* **Tool Name** and **Category** – e.g., WebSearchTool under web\_search.
* **Tool Description** – functionality and supported operations.

Clicking on **Show Vulnerabilities** opens a vulnerability details modal:

<figure><img src="https://1029475228-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fi12bk7lo75SODuwcRCQp%2Fuploads%2FvgI1kKz5NxxWGdb1uxp0%2Fprobe.splx.ai_w_778_ai-assets%20(9).png?alt=media&#x26;token=66e9c944-e796-41a4-8183-1f5482ff095b" alt=""><figcaption><p>Figure 4: Tool Vulnerabilities</p></figcaption></figure>

* **Description** – how the issue can be exploited.
* **Security Framework Mapping** – mapped security framework items.
* **Remediation Steps** – actionable recommendations to reduce risk.

## MCP Servers

<figure><img src="https://1029475228-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fi12bk7lo75SODuwcRCQp%2Fuploads%2FUh0j8bNKAWhZWzhkGe1z%2Fprobe.splx.ai_w_778_ai-assets%20(10).png?alt=media&#x26;token=b82f8d31-7cf9-48f6-b316-bf973986759c" alt=""><figcaption><p>Figure 5: MCP Servers Tab</p></figcaption></figure>

The **MCP Servers tab** lists all Model Context Protocol servers discovered in the workflow, with configuration.\
This highlights external integrations and the commands or services exposed through MCP.
