Searching protocol for "anomaly-investigation"
Delegate financial tasks to sub-agents.
Systematic data exploration to discover insights.
Trace authentication flows