The Ironclad Proposal Drafter
Customize your Proposal Assumptions & Exclusions below.
Step 1: Scope Boundaries
Select your preferences for Scope Boundaries below.
Step 2: Client Input Dependencies
Select your preferences for Client Input Dependencies below.
Step 3: Timeline & SLA Assumptions
Select your preferences for Timeline & SLA Assumptions below.
Step 4: Financial & Expense Exclusions
Select your preferences for Financial & Expense Exclusions below.
Step 5: Technical & Environmental Baselines
Select your preferences for Technical & Environmental Baselines below.
Step 6: Third-Party Integrations
Select your preferences for Third-Party Integrations below.
Step 7: Data Migration & Handling
Select your preferences for Data Migration & Handling below.
Step 8: Change Control & Revisions
Select your preferences for Change Control & Revisions below.
Step 9: Legal & Compliance Exemptions
Select your preferences for Legal & Compliance Exemptions below.
Step 10: Security & Privacy Assumptions
Select your preferences for Security & Privacy Assumptions below.
Step 11: Quality Assurance & Testing
Select your preferences for Quality Assurance & Testing below.
Step 12: IP, Licensing & Rights
Select your preferences for IP, Licensing & Rights below.
Step 13: Training & Post-Go-Live Support
Select your preferences for Training & Post-Go-Live Support below.
Step 14: Risk Allocation & Mitigation
Select your preferences for Risk Allocation & Mitigation below.
Step 15: Context & Specifics
Enter any specific details, project background, or custom conditions here.
Step 16: Your Custom Prompt
Copy your prompt below and paste it into your AI assistant.
MiraclePrompts.com is designed as a dual-engine platform: part Creation Engine and part Strategic Consultant. Follow this workflow to engineer the perfect response from any AI model.
-
1. Navigate the 14 Panels
The interface is divided into 14 distinct logical panels. Do not feel pressured to fill every single oneβonly select what matters for your specific task.
Use the 17 Selectors: Click through the dropdowns or buttons to define parameters such as Role, Tone, Audience, Format, and Goal.
Consult the Term Guide
Unsure if you need a "Socratic" or "Didactic" tone? Look at the Term Guide located below/beside each panel. It provides instant definitions to help you make the pro-level choice.
-
3. Input Your Data (Panel 15)
Locate the Text Area in the 15th panel.
Dump Your Data: Paste as much information as you wish here. This can be rough notes, raw data, pasted articles, or specific constraints.
No Formatting Needed: You donβt need to organize this text perfectly; the specific parameters you selected in Phase 1 will tell the AI how to structure this raw data.
- 2. The Pro Tip Area (Spot Check) Before moving on, glance at the Pro Tip section. This dynamic area offers quick, high-impact advice on how to elevate the specific selections youβve just made.
4. Miracle Prompt Pro: The Insiderβs Playbook
Master the Mechanics: This isn't just a help file; it contains 10 Elite Tactics used by expert engineers. Consult this playbook to unlock advanced methods like "Chain of Thought" reasoning and "Constraint Stacking."
- 5. NotebookLM Power User Strategy Specialized Workflow: If you are using Googleβs NotebookLM, consult these 5 Tips to leverage audio overviews and citation features.
-
6. Platform Deployment Guide
Choose Your Weapon: Don't just paste blindly. Check this guide to see which AI fits your current goal:
- Select ChatGPT/Claude for creative reasoning.
- Select Perplexity for real-time web search.
- Select Copilot/Gemini for workspace integration.
- 7. Generate Click the Generate Button. The system will fuse your Phase 1 parameters with your Phase 2 context.
-
8. Review (Panel 16)
Your engineered prompt will appear in the 16th Panel.
Edit: Read through the output. You can manually tweak or add last-minute instructions directly in this text box.
Update: If you change your mind, you can adjust a panel above and hit Generate again. - 9. Copy & Deploy Click the Copy Button. Your prompt is now in your clipboard, ready to be pasted into your chosen AI platform for a professional-grade result.
Need a refresher? Check the bottom section for a rapid-fire recap of this process and answers to common troubleshooting questions.
Strategic Masterpiece: The Ultimate 16-Step Miracle Prompts Pro
The Proposal Assumptions & Exclusions Drafter is your definitive bridge from novice to expert in safeguarding agency margins and preventing scope creep. By deploying this forensic tool, you architect ironclad boundaries and enforce absolute precision in your contracts, establishing total dominance over project deliverables and client expectations.
Step Panel Term Reference Guide
Step 1: Scope Boundaries
Why it matters: Explicitly detailing what is NOT built prevents "assumed" free labor and keeps the project anchored to its original blueprint.
- Legacy Data Migration Excluded: Protects against untangling undocumented, corrupted client databases.
- Post-Launch Marketing / PR Excluded: Ensures the technical team is not roped into go-to-market execution.
- Custom Third-Party API Development: Avoids writing bespoke middleware for unsupported external platforms.
- Organizational Change Management: Shifts the burden of internal staff training and adoption back to the client.
- End-User Hardware Procurement: Eliminates liability for supply chain issues or device warranties.
- Phased Rollout / Staged Delivery Excluded: Anchors the budget to a single, consolidated deployment event.
- Multi-Language / Localization Support: Prevents unexpected translation, RTL layout, and string management overhead.
- Accessibility Retrofitting (WCAG): Clarifies that strict compliance audits require a separate specialized budget.
- Physical Site Visits / Travel: Locks engagement to remote delivery, removing hidden travel and lodging expenses.
- Graphic Design / Asset Creation: Forces the client to provide ready-to-use visual assets and brand elements.
- Copywriting / Content Generation: Shields the agency from endless narrative revisions and content blank-page syndrome.
- Disaster Recovery Plan Creation: Keeps enterprise-level business continuity planning out of standard scope.
- Load / Stress Testing Beyond Baselines: Excludes enterprise-scale concurrency testing without dedicated cloud budgets.
- Shadow IT / Undocumented Integration: Refuses liability for systems the client failed to disclose during discovery.
- Bespoke Mobile Application Development: Ensures web app scopes do not secretly morph into native app expectations.
- Patent / Trademark Registration Setup: Completely removes legal and IP filing responsibilities from the tech team.
- Executive Coaching / Leadership Training: Maintains focus on software delivery rather than corporate consulting.
- Other: Custom boundary constraints specific to your unique agency service model.
Step 2: Client Input Dependencies
Why it matters: Tying project momentum to client deliverables legally pauses the timeline when the client inevitably ghosts you.
- Single Point of Contact Appointed: Eliminates conflicting feedback loops from multi-headed client committees.
- Brand Guidelines Provided Before Kickoff: Stops design phases from stalling due to missing hex codes or fonts.
- Subject Matter Expert (SME) Availability: Mandates that client experts show up to unblock technical queries.
- Timely Provision of API Keys / Credentials: Prevents development halts caused by missing staging environment access.
- Clean, Formatted Data Sets (CSV / JSON): Forces the client to sanitize their own data before handing it over.
- Approval Turnaround Within 48 Hours: Establishes a strict SLA for feedback to maintain development sprint velocity.
- Access to Existing Analytics / Historic Data: Ensures baseline metrics are available before establishing KPIs.
- Client-Provided Staging Environment: Shifts infrastructure provisioning costs to the client's internal IT team.
- Vector Logos / High-Res Assets Supplied: Prevents pixelated assets from ruining high-fidelity interface designs.
- Finalized Copy / Text Documents: Mandates "Lorem Ipsum" replacement text is signed off before layout begins.
- Legal / Compliance Review by Client Team: Offloads regulatory approval of interfaces and copy to client counsel.
- User Testing Cohort Supplied by Client: Ensures the agency isn't responsible for recruiting beta testers.
- VPN / Intranet Access Granted Pre-Launch: Prevents launch-day blockages due to corporate firewall restrictions.
- Architectural Diagrams of Current State: Forces the client to map their own legacy mess before you touch it.
- Prior Vendor Contracts / SLAs Disclosed: Protects against stepping on existing third-party legal landmines.
- Dedicated QA Personnel Assigned: Mandates the client provides warm bodies for User Acceptance Testing.
- Steering Committee Formed for Escalations: Creates an immediate escalation path when the SPOC goes rogue.
- Other: Custom dependency triggers necessary for your specific project onboarding.
Step 3: Timeline & SLA Assumptions
Why it matters: Protects your team from artificial emergencies and ensures the clock only runs when conditions are met.
- Clock Starts Only Upon Contract Signature: Kills the "we gave verbal approval yesterday, where is it" dynamic.
- Timeline Pauses for Client Feedback Delays: Automatically pushes the launch date if the client takes a week to reply.
- Standard Business Hours Only (9am - 5pm): Protects team burnout and establishes boundaries for communication.
- Excludes Federal / Public Holidays: Mathematically removes non-working days from the SLA calculation.
- No Expedited / Rush Delivery Assumed: Pre-frames any request for faster delivery as a premium, billable event.
- Dependencies on Third-Party Timelines: Pauses your SLA if an external vendor fails to deliver their API on time.
- SLA Valid Only on Supported Architectures: Voids the warranty if the client moves the code to a cheap shared host.
- Downtime for Maintenance Scheduled Off-Hours: Pre-approves maintenance windows without requiring emergency sign-off.
- Agile Sprints Variable Based on Velocity: Protects against rigid waterfall deadlines in fluid, agile environments.
- Go-Live Date Contingent on UAT Sign-Off: Forbids launching a product that hasn't been formally accepted in writing.
- Time-Boxing Applied to Design Phases: Caps endless creative exploration to a set number of allocated hours.
- Emergency Support Excluded from Base SLA: Forces clients to buy a premium retainer for 3 AM server crashes.
- Hardware Shipping / Customs Delays Excluded: Removes liability for physical supply chain logistical nightmares.
- Availability Subject to Force Majeure Events: Standard legal protection against global catastrophes impacting delivery.
- Resolution Time Starts After Triage Phase: Clarifies that the fix SLA clock begins only after the bug is replicated.
- Maximum Concurrent Projects Limited: Prevents the client from dumping three new scopes on you simultaneously.
- Sunset Dates Fixed Regardless of Launch: Ensures long-delayed projects are eventually killed or renegotiated.
- Other: Additional temporal constraints specific to your operational tempo.
Step 4: Financial & Expense Exclusions
Why it matters: Prevents silent profit erosion by explicitly stating which hard costs are passed directly to the client.
- Software Licensing / SaaS Fees Excluded: Client pays for their own Shopify, Vercel, or CRM subscriptions.
- Cloud Hosting / AWS Usage Costs Excluded: Protects against unpredictable infrastructure scaling bills.
- Travel & Accommodation Billed Separately: Reimburses the agency for any mandatory on-site visits.
- Payment Gateway / Transaction Fees: Clarifies that Stripe/PayPal cuts are the client's financial burden.
- Third-Party Stock Imagery / Fonts / Music: Requires the client to purchase their own creative asset licenses.
- Hardware / Server Procurement Costs: Keeps physical capital expenditures completely off the agency's books.
- Foreign Exchange Rate Fluctuation Risk: Shields profits from currency devaluation on international contracts.
- Taxes, VAT / Duties Excluded from Quote: Ensures the quoted price is net, with taxes applied transparently on top.
- Legal Consultation / Escrow Fees: Forces the client to pay for third-party code escrow setup if requested.
- Rush Rates Applied for Off-Hours Requests: Automatically triggers a 1.5x or 2x multiplier for weekend heroics.
- Inflation Adjustment Clause Applied Annually: Protects multi-year retainers against macroeconomic cost-of-living spikes.
- Premium Plugin / Theme Subscriptions: Client holds the license keys and renewal costs for CMS extensions.
- API Call Overage Charges Borne by Client: Protects the agency if a viral event spikes third-party API billing.
- Insurance / Bond Premiums Excluded: Client pays if they require bespoke cyber-liability policy extensions.
- Post-Project Storage / Archival Fees: Charges a fee if the client expects you to store 5TB of video assets forever.
- Penetration Testing / Specialized Security Audits: Excludes $20k external security audits from standard web builds.
- Translation / Localization Per-Word Costs: Ensures human translators are billed directly to the client's budget.
- Other: Unique financial boundaries native to your specific billing model.
Step 5: Technical & Environmental Baselines
Why it matters: Establishes the exact technological sandbox, preventing clients from demanding support for decade-old devices.
- Current Stable OS Version Support Only: Eliminates the nightmare of debugging for iOS 12 or Android 9.
- Modern Browser Support (No IE11 / Legacy): Frees developers to use modern CSS grid and ES6 JavaScript.
- Standardized CI / CD Pipeline Usage: Mandates modern deployment practices rather than FTP cowboy coding.
- Mobile Responsive Limit: 320px Minimum: Sets a hard floor for screen width testing (iPhone SE baseline).
- Baseline Server Configuration Assumed: Requires standard Linux/Nginx setups, excluding esoteric legacy servers.
- RESTful / GraphQL API Architecture Standard: Forbids dealing with archaic SOAP or XML-RPC endpoints.
- No Support for Deprecated Frameworks: Refuses to build on top of unsupported versions of Angular or React.
- Assumes High-Speed Broadband Connectivity: Removes liability for performance issues on 3G or spotty edge networks.
- No Offline Mode / Sync Support Out-of-Box: Excludes complex PWA service worker caching unless specifically scoped.
- Standard Video / Image Codec Compatibility: Guarantees support for MP4/WebP, ignoring proprietary media formats.
- Relational Database (SQL) Architecture Assumed: Sets the data expectation to structured SQL over complex NoSQL graphs.
- Microservices Topology Excluded from Base: Keeps the architecture monolithic and manageable for standard budgets.
- Hardware Acceleration Dependent on Client Device: Waives liability if WebGL lags on a client's 10-year-old laptop.
- Cookie Dependency for Session Tracking: Assumes standard web session management without esoteric cookieless hacks.
- Single Region Cloud Deployment (No Multi-Region): Avoids the extreme complexity of multi-continent database synchronization.
- Assumes Unrestricted Outbound Port Access: Expects standard port 80/443 availability without draconian firewall bypassing.
- Standard UTF-8 Character Encoding Only: Protects the database from bizarre legacy text encoding corruptions.
- Other: Any hyper-specific technical constraints required by your stack.
Step 6: Third-Party Integrations
Why it matters: External APIs are out of your control. These clauses legally detach your success from vendor failures.
- APIs Assumed Fully Documented & Stable: Protects against integrating with undocumented "spaghetti" endpoints.
- No Custom Code for Proprietary Legacy Systems: Avoids writing adapters for 20-year-old AS/400 mainframes.
- Authentication via OAuth 2.0 / Standard JWT: Mandates modern, secure handshake protocols for integrations.
- Vendor Sandbox / Staging Env is Required: Refuses to develop directly against a live, production payment gateway.
- Webhooks Available for Event Notification: Assumes real-time syncing is supported native by the vendor platform.
- Integration Testing Bounded by Rate Limits: Protects the SLA if the vendor API throttles testing velocity.
- Client Manages Vendor Contract & Disputes: Keeps the agency out of legal fights between the client and Salesforce.
- SSO (SAML / OIDC) Included Standard Only: Excludes custom identity provider setups outside of normal protocols.
- ERP / CRM Integrations Require Scoping Phase: Forces massive data syncs to be treated as their own paid discovery project.
- Bi-Directional Sync Conflicts Handled Manually: Refuses to build complex automated conflict resolution algorithms.
- Third-Party Outages Excusable Delay: If AWS goes down, the project deadline automatically extends.
- No Liability for Third-Party Deprecation: Agency isn't responsible if Twitter suddenly changes their API pricing.
- Data Transformation / ETL Mapped 1-to-1: Excludes complex data mutation scripts; expects fields to match cleanly.
- Payment Gateways Limited to Stripe / PayPal: Prevents integrating obscure, regional, or high-risk merchant processors.
- Social Login Assumes Standard Graph API: Relies on out-of-the-box Google/Apple/Facebook login configurations.
- No Liability for Third-Party Data Breaches: Shields you if the client's chosen CRM gets hacked.
- Vendor Tech Support Escalation by Client: Forces the client to sit on hold with vendor support, not your developers.
- Other: API-specific exclusions tailored to the platforms you are bridging.
Step 7: Data Migration & Handling
Why it matters: Data migration is a notorious black hole. These bounds force the client to take ownership of their data hygiene.
- Data Cleansing Performed by Client: Forbids developers from manually fixing typos in 10,000 client records.
- Migration Limited to One Primary Database: Stops the client from merging five disjointed legacy databases into one.
- Historical Data Capped at [X] Years: Prevents migrating 15 years of irrelevant, bloated legacy analytics.
- No Real-Time / Zero-Downtime Migration: Sets the expectation that the site will go offline during the final database cutover.
- Media Asset Migration Excluded: Requires the client to manually re-upload PDFs and images to the new CMS.
- Data Deduplication Handled Manually by Client: Forces the client to resolve duplicate user accounts before handoff.
- Schema Mapping Requires Final Client Sign-Off: Makes the client legally responsible if a field maps incorrectly.
- Corrupted Records Dropped, Not Salvaged: Gives permission to abandon broken data rows rather than forensic recovery.
- Password Hashes Unmigratable (Force Reset): Sets the expectation that users will need to click "Forgot Password" on day one.
- Only Structured Data (Tables / JSON) Handled: Refuses to scrape unstructured data out of Word documents or PDFs.
- Testing Uses Anonymized / Masked Data Only: Complies with privacy laws by keeping live PII out of staging environments.
- Rollback Strategy Bounded by Backup Integrity: States that if the client's backup is flawed, the rollback will be flawed.
- No Guarantee Against SEO Link Degradation: Clarifies that migrating a massive site will result in some temporary SEO flux.
- Log Files / Audit Trails Excluded from Migration: Leaves bulky, useless server logs behind on the old infrastructure.
- Batch Processing Scripts Have Extended Run Times: Sets realistic expectations for how long a 10GB database takes to parse.
- Migration Validated via Sampling, Not 100% Audit: Agency checks 50 random records, not all 50,000, for validation.
- Post-Migration Delta Updates Require Change Order: If the client changes data on the old site post-migration, syncing it costs extra.
- Other: Unique data manipulation guardrails for your specific technical stack.
Step 8: Change Control & Revisions
Why it matters: Without revision limits, projects bleed out. This establishes a strict cadence for feedback and finality.
- Maximum of Two (2) Revision Rounds Included: Puts a hard numerical cap on the endless design feedback loop.
- "Scope Creep" Handled via Formal Change Request: Forces new ideas to go through a rigorous, paid approval process.
- Feature Additions Reset Delivery Timeline: Mathematically pushes the deadline back when new features are injected.
- Design Approvals are Final (No Backtracking): Prevents the client from changing the wireframe after the backend is built.
- Consolidated Feedback Mandatory (No Drip Feed): Refuses to accept feedback scattered across 40 different emails and Slacks.
- Changes Post-Sign-Off Billed Hourly (T&M): Converts fixed-bid scopes into lucrative Time & Materials billing when boundaries break.
- Change Orders Require Written Authorization: Nullifies "he said, she said" verbal feature requests made on Zoom.
- Architectural Shifts Constitute New Project: Moving from Shopify to Magento mid-project requires an entirely new contract.
- Agile Backlog Grooming Replaces Formal Changes: Allows swapping features of equal size without contract amendments.
- Budget Impact Assessed Before Any Change Work: Pauses coding until the client agrees to the financial cost of their new idea.
- UI / UX Wireframe Sign-Off Locks Development Path: Makes the black-and-white prototype the unalterable blueprint for coding.
- Micro-Copy / Typo Fixes Exempt During UAT: Allows for minor text tweaks without triggering a massive change order panic.
- Third-Party Mandated Changes Borne by Client: If Apple rejects the app, the cost to fix their arbitrary demands is on the client.
- Auto-Approval of Milestones After 5 Days Silence: Prevents the project from stalling indefinitely; silence equals legal consent.
- Prioritization Matrix Determines Revision Order: Forces the client to rank bugs by severity rather than panicking over everything.
- Prototype Discarded After Feedback Phase: Clarifies that Figma files are not maintained alongside production code permanently.
- Zero Bug Tolerance vs. Feature Enhancement Rules: Differentiates a true broken feature from a "wouldn't it be nice if..." request.
- Other: Revision control mechanisms specific to your agency's account management style.
Step 9: Legal & Compliance Exemptions
Why it matters: Your agency builds software, not law. These clauses deflect ruinous legal liabilities back to the client's legal counsel.
- Not Liable for GDPR / CCPA Fines: Places the burden of privacy compliance entirely on the client's Data Protection Officer.
- HIPAA / PHI Compliance Requires Specialized SOW: Excludes military-grade healthcare encryption from standard web builds.
- PCI-DSS Handled Strictly via Tokenized Gateway: Keeps the agency out of credit card processing compliance by using Stripe tokens.
- ADA / WCAG Legal Liability Resides with Client: Shields the agency from drive-by lawsuit trolls targeting accessibility flaws.
- End-User License Agreement (EULA) Crafted by Client: Forces the client's lawyers to write the Terms of Service.
- No Tax Calculation Guarantee (Use External Tax API): Refuses liability if the eCommerce store miscalculates state sales tax.
- Export Control / ITAR Exemptions Applied: Avoids federal compliance issues regarding international software distribution.
- Financial (SOX) Audits Excluded from Scope: Keeps developers away from Sarbanes-Oxley corporate financial reporting rules.
- Industry-Specific Regulatory Approvals by Client: Client must get FDA or SEC approval for their platform, not the agency.
- Disclaimer of Consequential Damages: Legally prevents the client from suing you for "lost revenue" if the site goes down.
- Limitation of Liability Capped at Project Value: Ensures the maximum you can be sued for is the amount they paid you.
- No Guarantee of SEO Rankings or Metrics: Protects against clients demanding refunds because they aren't #1 on Google.
- User Generated Content (UGC) Moderation by Client: Client is responsible for deleting illegal or offensive forum posts.
- Algorithm / AI Bias Liability Waived: Protects the agency if an integrated AI model produces biased or hallucinated outputs.
- Open Source License Compliance Assumed "As Is": Transfers the inherent risks of using MIT/GPL software to the client.
- Governing Law and Jurisdiction Pre-Defined: Forces any legal disputes to be fought in your home state/country.
- Warranties Limited to Executed Code Only: You warrant the code works, not that the client's business idea is profitable.
- Other: Jurisdictional legal shields specific to your geography.
Step 10: Security & Privacy Assumptions
Why it matters: Cyber risks are infinite. These boundaries define exactly what layer of security the agency is responsible for provisioning.
- Client Manages Own SSL / TLS Certificates: Puts the responsibility of renewing HTTPS certificates on the client IT team.
- No Custom Cryptography (Standard Libraries Only): Prevents liability from attempting to invent unproven encryption algorithms.
- WAF / DDoS Protection Provided by Cloud Vendor: Relies on Cloudflare or AWS Shield for attack mitigation, not custom code.
- Role-Based Access Control (RBAC) Bounded: Limits user roles to standard Admin/Editor/User, excluding infinite custom matrices.
- MFA / 2FA Uses Standard Authenticator Apps: Integrates Google Auth/Authy, rejecting bespoke SMS gateway builds.
- Zero Trust Architecture Requires Separate Scope: Keeps highly complex, enterprise-grade network security out of base scope.
- Incident Response Plan Authored by Client: Client must decide who to call and what to say during a massive data breach.
- Data at Rest Encrypted via Standard Cloud KMS: Utilizes AWS KMS for database encryption rather than complex local keys.
- Biometric Authentication Dependent on Device OS: FaceID/TouchID is handled by Apple/Android, not via custom biometric analysis.
- Social Engineering / Phishing Risks Exempt: Agency cannot be blamed if a client employee hands over their admin password.
- Log Retention Policy Maxes at 90 Days Base: Prevents the server from filling up with terabytes of endless security logs.
- Vulnerability Patching Subject to Maintenance SLA: Zero-day exploits are patched on a scheduled retainer, not as free emergency work.
- Endpoint Security (Antivirus / MDM) Out of Scope: Agency does not secure the client's physical laptops or mobile devices.
- Third-Party Libraries Subject to CVE Disclosures: Agency uses NPM packages "as-is" and relies on the community for security alerts.
- Hardware Token (YubiKey) Support Excluded: Keeps physical security key integration out of standard authentication scopes.
- Privacy Policy / Terms of Service Supplied by Client: Forces the client to dictate how user data is legally handled.
- Anonymous Telemetry Collected for Debugging: Grants the agency the right to track crashes using tools like Sentry.
- Other: Unique infosec boundary parameters for your specific architecture.
Step 11: Quality Assurance & Testing
Why it matters: Testing can be a bottomless pit. Defining the exact hardware, software, and duration of QA prevents infinite refinement.
- Testing Limited to Current + 1 Previous Major OS: Validates against iOS 17 and 16, but wholly ignores iOS 12.
- Automated E2E Testing Requires Additional Budget: Keeps expensive Cypress/Selenium test suites as a premium add-on.
- UAT Phase Time-Boxed to 10 Business Days: Forces the client to finish their testing rather than dragging it out for months.
- Bug Severity Classification Agreed Pre-Test: Defines what is a "Critical Showstopper" versus a "Low Priority Tweak."
- Cosmetic Issues Cannot Block Go-Live (Showstoppers Only): Ensures a slightly misaligned button doesn't delay a million-dollar launch.
- No Testing on Jailbroken / Rooted Devices: Validates standard, secure devices only, ignoring hacked operating systems.
- Network Emulation (3G / Offline) Testing Excluded: Excludes extreme performance profiling for rural or subway network conditions.
- Client Must Provide Representative Test Data: Forces the client to create dummy accounts rather than testing with live PII.
- Load Testing Assumes Peak Concurrent User Cap: Defines success as handling 5,000 users, not infinite viral traffic.
- A / B Testing Variations Handled as Separate Scope: Keeps conversion rate optimization variations out of the core build.
- Crowdsourced Testing Platforms Not Utilized: Relies on internal QA rather than hiring 500 random people on UserTesting.com.
- Accessibility Testing Relies on Automated Tools (Axe): Uses programmatic scanners rather than expensive human screen-reader audits.
- Hardware / IoT Emulators Used Over Physical Assets: Tests on BrowserStack rather than buying a physical Samsung Fridge to test on.
- Defect Leakage Margin Acceptable at 5% for Low Sev: Acknowledges that all software has minor bugs and sets a realistic threshold.
- Post-Release Bugs Handled Under Warranty Period: Establishes a strict cutoff for free bug fixes after launch.
- Regression Testing Scope Restricted to Critical Paths: Tests checkout and login, but doesn't re-test the entire app for a typo fix.
- Beta User Feedback Triage Handled by Client: Client must filter the complaints from beta users before handing them to devs.
- Other: QA methodology constraints matched to your agency's testing protocol.
Step 12: IP, Licensing & Rights
Why it matters: Who owns the code? These clauses ensure you retain your proprietary tools while transferring final assets only upon payment.
- IP Transfers ONLY Upon Full Final Payment: Holds the code hostage legally until the final invoice clears the bank.
- Pre-Existing Base Code / Libraries Retained by Agency: Ensures you can reuse your proprietary starter themes on the next project.
- Open Source Component Licenses Inherited by Client: Transfers the MIT/Apache license requirements smoothly to the client.
- Right to Display in Portfolio / Case Studies Reserved: Guarantees your right to show off the work to win future business.
- White-Labeling Rights Restrict Agency Branding: Defines if the agency is allowed to put "Built by X" in the website footer.
- Stock Media Licenses Non-Transferable: Clarifies that the client cannot use your Getty Images license for a billboard.
- Client Warrants Ownership of Provided Assets: Client swears they didn't steal the logo they handed you from Google Images.
- No Exclusivity Clause / Non-Compete Agreed: Allows the agency to build a website for the client's direct competitor next week.
- Patent Development / Filing Rights Reside with Client: Client owns the business logic patent, not the agency.
- AI-Generated Code Bears No Absolute IP Protection: Acknowledges the legal gray area of Copilot code and waives liability.
- Raw Source Files (Figma / PSD) Included in Handoff: Defines whether the client gets the raw design files or just the flat exports.
- Font Licensing Costs Paid Directly by Client: Client buys the web fonts so the license is registered in their corporate name.
- Domain Name Registration Held in Client's Name: Agency refuses to act as the legal registrant for the client's dot-com.
- Moral Rights Waived (Subject to Jurisdiction): Allows the client to alter the code in the future without your permission.
- Indemnification by Client for IP Infringement Claims: If the client forces you to clone a competitor, they pay the legal fees when sued.
- Third-Party EULA Acceptance Mandated for Handoff: Client must accept Stripe's terms before the site goes live.
- Escrow Agreement for Source Code Requires Client Setup: If the client wants the code in escrow, they pay the lawyer to set it up.
- Other: Unique intellectual property retention rules for your firm.
Step 13: Training & Post-Go-Live Support
Why it matters: Projects don't end at launch. This defines exactly what "support" means so developers aren't acting as free IT helpdesk staff forever.
- Warranty Period Strictly Limited to 30 Days Post-Launch: Creates a hard cutoff for free bug fixes. Day 31 requires a retainer.
- Ongoing Maintenance Requires Separate Retainer Contract: Shifts the relationship from project-based to subscription billing.
- Training Sessions Capped at [X] Virtual Hours: Prevents the client from demanding endless Zoom tutorials.
- No On-Site / Physical In-Person Training Provided: Keeps training remote, avoiding expensive travel and hotel arrangements.
- Documentation Handed Over "As Is" (No Future Updates): Clarifies that the PDF manual isn't updated for free when the site changes.
- End-User Support Tier 1 Handled Exclusively by Client: Forces the client to answer their own customers' "forgot password" emails.
- Feature Enhancements Excluded from Warranty Fixes: Prevents clients from disguising new feature requests as "warranty bugs."
- Server Patching / OS Updates Reside with Client IT: Leaves Ubuntu security patches to the client's DevOps team.
- Content / CMS Updates Borne by Client After Training: Agency refuses to act as a free data-entry clerk post-launch.
- SEO Monitoring / Analytics Reporting Dropped Post-Launch: Stops free monthly traffic reports unless a marketing retainer is signed.
- Video Tutorials Capped at Standard Feature Walkthroughs: Limits Loom video creation to basic CMS operations.
- Emergency Hotfixes Post-Warranty Billed at Premium Rate: Establishes a $250/hr rate for panic calls six months after launch.
- Knowledge Base Creation Handled Internally by Client: Client must write their own Zendesk articles for their users.
- Handoff Excludes Access to Agency Internal Repo Histories: Client gets the clean final code, not the messy git commit history.
- New Employee Onboarding Training Billed Separately: When the client hires a new marketing manager, training them costs money.
- Response Times Post-Launch Bounded by Business Hours: Protects developers' weekends from non-critical support tickets.
- Client Responsible for Renewing Domain / SSL Certs: Agency is not liable if the client's credit card expires and the site drops.
- Other: Customized off-boarding and support transition rules.
Step 14: Risk Allocation & Mitigation
Why it matters: Acts of God, market shifts, and third-party failures happen. These clauses pre-determine who eats the financial loss.
- Force Majeure Applies to Acts of God / Pandemics: Pauses the contract legally during global emergencies.
- Client Assumes Risk of Unforeseen API Deprecation: If a core API dies mid-project, the client pays to pivot to a new one.
- Supply Chain Hardware Delays Exempt from SLA: Agency is not penalized if a physical kiosk screen is stuck on a cargo ship.
- Currency Fluctuation Risk > 5% Triggers Renegotiation: Protects international contracts from sudden economic crashes.
- Staff Attrition Requires 30-Day Re-Resource Buffer: Grants the agency time to hire a replacement if the lead developer quits.
- Market Shift / Competitor Launch Pivot Not Assumed: Client pays a change order if they want to redesign because a rival launched.
- Client Bears Risk for Utilizing Bleeding-Edge Tech Stacks: Agency is not liable if an alpha-stage framework proves unstable.
- Regulatory Change (Law Passed Mid-Project) Requires CR: If the government changes a compliance law, retrofitting it costs extra.
- Data Loss Due to Client Override Not Recoverable: Agency isn't liable if the client accidentally deletes their own database.
- Third-Party IP Disuptes Halt Project Clock Automatically: Pauses work if the client gets hit with a patent troll lawsuit.
- Termination for Convenience Includes Kill Fee (50%): Guarantees profit if the client abandons the project halfway through.
- Cyberattack on Client Network Halts Dev Integrations: Protects developers from connecting to a compromised client intranet.
- Hosting Provider Outages Borne by Hosting SLA: Agency is not responsible for refunding money if AWS goes offline.
- Beta Software Usage Disclaimed from Any Liability: If the client insists on using beta tools, they assume all crash risks.
- Dispute Resolution Mandates Binding Arbitration First: Keeps legal fights out of expensive public courts.
- Inflation Hedge Component Built into Long-Term Milestone Payments: Adjusts year-two payments upwards to match CPI inflation.
- Non-Payment Pauses Project After 15 Days Arrears: Developers legally drop tools and stop coding if the invoice goes unpaid.
- Other: Specialized risk mitigation tactics tailored to your high-stakes environments.
Execution & Deployment
- Step 15: Context Injection: Provide the exact nature of the project (e.g., "Enterprise Magento build for a B2B hardware supplier"). Include specific red flags discovered during sales calls to ensure the AI generates hyper-targeted exclusions.
- Step 16: Desired Output Format: The tool outputs a structured prompt that forces the AI to construct a "Master Plan," a "Pre-Mortem Analysis," and measurable "Success Metrics" specifically grounded in the assumptions you selected.
β¨ Miracle Prompts Pro: The Insiderβs Playbook
- The "Vaporware" Clause: Exclude liability for integrating with third-party systems that are currently promised but not yet released by the vendor.
- The 48-Hour Auto-Approval Hack: Embed a clause stating that if a milestone is delivered and the client remains silent for 48 hours, it is legally deemed "Approved" and the next invoice is triggered.
- The "Bleeding Edge" Waiver: Force the client to sign a specific waiver if they demand the use of alpha/beta frameworks, absolving you of performance SLA requirements.
- The "Black-Box" Exemption: Explicitly state that any legacy code provided by the client without 100% test coverage is integrated "As-Is" with zero warranty.
- The Hostage Data Protocol: Include an assumption that migration formatting (CSV/JSON) must strictly adhere to your supplied template, or data is rejected.
- The Drip-Feed Defense: Mandate that revisions must be consolidated into a single document; ad-hoc feedback via Slack or text is legally ignored.
- The "CEO Swoop" Protection: Require that the appointed Single Point of Contact (SPOC) has final financial authority, preventing a late-stage CEO veto without a Change Order.
- The Open-Source Inheritance: Explicitly state that all open-source libraries used transfer their inherent MIT/GPL licenses to the client, removing you from long-term liability.
- The Browser Sunset Rule: Tie your browser support matrix directly to vendor support (e.g., "Only browsers officially supported by their manufacturer").
- The Launch-Day Freeze: Establish a 72-hour code freeze prior to launch where absolutely zero cosmetic or non-critical changes will be entertained.
π NotebookLM Power User Strategy
- Source Selection: Upload your 5 most catastrophic past projects (post-mortems, angry email threads, out-of-scope SOWs).
- Audio Overview: Generate a podcast overview specifically asking the hosts to "discuss the hidden scope creep patterns in these failed projects."
- Cross-Examination: Prompt NotebookLM: "Based on the uploaded SOWs, what assumptions did we fail to include that cost us the most money?"
- Gap Analysis: Upload the AI-generated Master Plan from Step 16 and ask NotebookLM to compare it against your standard Master Services Agreement to find legal contradictions.
- Synthesis: Command NotebookLM to generate a "Top 10 Red Flags Checklist" for your sales team to use during discovery, based entirely on the exclusions the AI just generated.
π Platform Deployment Guide
- Claude 3.5 Sonnet: The undisputed champion for this tool. Claude's nuanced understanding of corporate "legalese" and client relationship dynamics allows it to draft exclusions that are ironclad but narratively polite, preserving the client relationship.
- ChatGPT-4o: Best for bulk structuring. Use 4o when you need to quickly map these 17 assumptions into a beautifully formatted, multi-page PDF or Markdown table for an immediate client presentation.
- Gemini 1.5 Pro: Unmatched for deep context. Paste an entire 50-page RFP or legacy Master Services Agreement into Gemini and ask it to adapt the generated assumptions strictly to the existing legal framework.
- Microsoft CoPilot: Ideal for enterprise alignment. Use CoPilot to format the generated assumptions directly into a corporate Word document template or a PowerPoint deck for stakeholder review.
- Perplexity: Deploy Perplexity to benchmark your generated assumptions against current industry standards. (e.g., "Are 30-day warranty periods standard for enterprise Magento builds in 2024?").
β‘ Quick Summary
The Proposal Assumptions & Exclusions Drafter is an elite, 16-step tool designed to help digital agencies, freelancers, and consultants architect ironclad project boundaries, eliminate scope creep, and protect their profit margins from endless client revisions.
π Key Takeaways
- Define the Negative Space: Explicitly detailing what you will not do (exclusions) is just as critical to project profitability as defining your core deliverables.
- Lock Down Dependencies: Legally pause your project timelines if clients fail to provide necessary assets, API keys, or feedback within a strict SLA.
- Isolate Third-Party Liability: Protect your agency from legal and financial fallout caused by external API deprecations, vendor outages, or legacy data corruption.
β Frequently Asked Questions
Q: Why do I need to strictly define Technical & Environmental Baselines?
A: Setting technical baselines (like supporting only modern browsers or current OS versions) prevents clients from demanding free, time-consuming support for decade-old devices or deprecated frameworks.
Q: How should I handle "Scope Creep" and feature additions post-sign-off?
A: Your assumptions should clearly mandate that all feature additions require a formal, written Change Request, mathematically reset the delivery timeline, and are billed at an hourly Time & Materials rate.
β The Golden Rule: You Are The Captain
MiraclePrompts gives you the ingredients, but you are the chef. AI is smart, but it can make mistakes. Always review your results for accuracy before using them. It works for you, not the other way around!
Transparency Note: MiraclePrompts.com is reader-supported. We may earn a commission from partners or advertisements found on this site. This support allows us to keep our "Free Creators" accessible and our educational content high-quality.
Strategic MEP Interface Gap Analyzer: The Ultimate 16-Step Guide
[dsm_content_toggle heading_one=" " heading_two="Quick Summary & FAQs" custom_content_two="β‘ Quick Summary The...
The Ultimate Pre-Bid Clarification RFI Strategist: Master Your Qualifications
[dsm_content_toggle heading_one=" " heading_two="Quick Summary & FAQs" custom_content_two="β‘ Quick Summary The Pre-Bid...
Strategic Dominance: The Ultimate 16-Step Automated Bid Leveling Assistant Miracle Prompts Pro
[dsm_content_toggle heading_one=" " heading_two="Quick Summary & FAQs" custom_content_two="β‘ Quick Summary The...


