A fully automated security request intake system, from GTM teams to Linear to Wolfia, designed, built, and shipped using AI-native tooling in days, not months. Replaces a chaotic Slack-and-email process with a structured, multi-step form that auto-creates tracked issues and submits questionnaires to AI. As a result of self-service access and end-to-end automation, this system reduced human time spent on customer security questionnaires by over 90%.
Fills out intake form
Google identity verified
NDA, SFDC, Trust Portal
Issue auto-created
Questionnaire uploaded
Reviews & responds
Prospects go through an NDA step. Customers skip it. If Trust Portal already resolved the question, the ticket is deflected and closed automatically.
No separate database needed. Every intake creates a Linear CUS issue with labels, deal value, deadline, and SFDC link, all parsed back for the admin dashboard.
Security team members authenticated via Google IAP get a special mode: SFDC URL and Slack URL become optional. Bypassed submissions labeled "Admin Override" in Linear.
Google IAP restricts access to corporate users. Cloud Run deployed with --no-allow-unauthenticated. IAM policy enforced and verified on every deploy.
Designed the architecture, wrote all server-side logic, resolved merge conflicts, debugged Cloud Run issues, and built the admin dashboard, all in conversation.
AI-native UI builder scaffolded the multi-step intake form. Produced production-ready Next.js + Tailwind components from natural language.
Runs on every PR. Caught the missing --no-allow-unauthenticated flag and dead code guard patterns.
Containerized Next.js app served as a stateless Cloud Run service. Auto-scales to zero. New revisions on every deploy.
Every submission creates a CUS issue. Labels encode workflow state. Deal value, SFDC link, and Wolfia ID stored in the description.
Security questionnaire files uploaded via API automatically. The returned questionnaire ID is posted as a Linear comment for full traceability.
Multi-step intake form scaffolded in Lovable. Described the form requirements in natural language. Lovable generated the step components: Opportunity Details, NDA Confirmation, Trust Portal, Questionnaire Upload.
Claude built the /api/submit route, Linear GraphQL mutations, Wolfia file upload, label management, and the full deflection vs. submission routing logic.
Containerized the app, wired up GCP Secret Manager for API keys, deployed to Cloud Run with IAP enforcing corporate access. Debugged the deploy revision issue that was silently not deploying new code.
Built server-side admin detection via IAP headers, relaxed validation for admin users, Admin Override Linear label, and an /admin dashboard with live Linear data filtered by date and status.
Cursor Bot caught the missing --no-allow-unauthenticated flag. Claude cleaned up dead code and updated deploy scripts to enforce IAM policy on every deploy. All changes shipped through GitHub PR workflow.