Back to Playbooks

Weekly Renewal Risk Sweep

ScoutMaintain
~5 min setup

Scout flags at-risk contracts every Monday. Export CSV for CSM review, flag records in SFDC, post digest to Slack, publish summary to Notion. Replaces manual renewal spreadsheets.

The Prompt

It's Monday. I need our weekly renewal risk report before the CS standup at 10am.

Scout should:
1. Query all contracts expiring in next 90 days
2. Flag at-risk indicators: low NPS, support ticket volume spike, declining usage, missing champion contact
3. Export CSV for CSM review
4. Update SFDC Renewal_Risk__c field on flagged accounts
5. Post digest to #customer-success Slack with count + top 5 risks
6. Publish full summary to Notion in our CS workspace

Run this as a scheduled Scout check — every Monday at 8am.

How It Works

1. Query Expiring Contracts

Find all accounts with contracts expiring in next 90 days

2. Risk Scoring

Check NPS scores, support volume, usage trends, champion presence

3. Export CSV

Generate renewal risk CSV for CSM review

4. Flag in SFDC

Update Renewal_Risk__c field on at-risk accounts

5. Slack Digest

Post summary to #customer-success with top 5 risks

6. Notion Summary

Publish full findings to CS Notion workspace

Execution Log

After you paste this prompt, Claude Code:

"Monday morning renewal risk sweep. Let me query contracts expiring in next 90 days and check risk indicators."

Running
$ g-gremlin scout run renewal_risk_check --schedule "0 8 * * MON"
[Scout] Check: renewal_risk_check (weekly_renewal_sweep) [Scout] Querying contracts expiring between 2026-02-02 and 2026-05-03...
Running
$ sf data query --query "SELECT Id, Name, Contract_End_Date__c, NPS_Score__c, Support_Tickets_30d__c FROM Account WHERE Contract_End_Date__c >= TODAY AND Contract_End_Date__c <= NEXT_N_DAYS:90"
47 accounts found with contracts expiring in next 90 days

"47 contracts expiring soon. Now checking risk indicators: NPS < 6, support tickets > 5 in last 30 days, usage decline, missing champion."

Running
$ g-gremlin scout analyze --indicators nps,support_volume,usage_trend,champion_presence
[Scout] Risk analysis complete: - 12 accounts flagged HIGH risk (NPS < 6 OR support tickets > 5) - 8 accounts flagged MEDIUM risk (usage declining OR no champion) - 27 accounts OK

Exporting at-risk accounts to CSV

renewal_risk_2026-02-02.csv generated (20 rows)
Running
$ sf data update bulk --file flagged_accounts.csv --sobject Account
[SFDC] Updated 20 accounts with Renewal_Risk__c field - 12 accounts: HIGH - 8 accounts: MEDIUM
Running
$ g-gremlin notify slack --channel customer-success --template renewal_digest
[Slack] Posted to #customer-success: 📊 Weekly Renewal Risk Sweep - Feb 2, 2026 🔴 HIGH risk: 12 accounts 🟡 MEDIUM risk: 8 accounts Top 5 risks: 1. Acme Corp - NPS 3, 12 support tickets 2. GlobalTech - Usage down 40%, no champion 3. DataSystems - NPS 4, contract ends in 14 days 4. CloudFirst - 8 support tickets, escalated case 5. EnterpriseAI - No activity in 45 days
Running
$ g-gremlin publish notion --workspace cs --page "Renewal Risk Reports"
[Notion] Published: Weekly Renewal Risk - Feb 2, 2026 ✓ Full table with 20 at-risk accounts ✓ Risk breakdown charts ✓ CSM assignment mapping

Weekly renewal risk sweep complete. 20 at-risk accounts flagged, CSV exported, SFDC updated, Slack + Notion published.

The Result

Every Monday at 8am, Scout automatically identifies at-risk renewals, flags them in Salesforce, and delivers actionable reports to your CS team. No more manual spreadsheet updates or missed renewal risks.

47
Contracts reviewed
20
At-risk flagged
12
HIGH risk
2m 14s
Execution time

Ready to Automate Your Renewal Risk Tracking?

Start your free 30-day trial. No credit card required.

Playbook: Weekly Renewal Risk Sweep | Deal Desk Scout | FoundryOps