Investor memo · v1 · 2026
Public memo · For investors + strategic buyers

The verifiable AI surface for every company.

Every reply backed by a typed function a human signed. Every receipt verifiable without trusting us.

10
Orgs on the platform
77
Signed Ctrls
Each: a typed callable function a human signed.
34
Receipts issued
One per successful invocation. Ed25519-signed.
34
Transparency-log entries
Chained-hash anchored. Tamper-evident.

Live as of May 14, 2026, 1:15 PM · Verifiable at /portal/acme-saas-demo · No vanity multipliers.

§1

The thesis

Why we exist

AI is shipping into every workplace. The current generation of tools — Copilot, ChatGPT Enterprise, internal RAG — answers questions by paraphrasing context. That works for drafts. It fails the moment a regulator, an auditor, or a procurement officer asks who is accountable for this answer.

Ctrl AI replaces the paraphrase with a typed call. Every reply our system gives is grounded in a Ctrl — a callable function with a name, an inputs schema, an outputs schema, and a signature from the human who took responsibility for it. The invocation produces a receipt — an Ed25519-signed proof that's appended to a public, chained-hash transparency log. Any third party can verify the receipt without trusting our servers.

This is the substrate the EU AI Act, DORA, SOC 2 Operating Effectiveness, and every internal audit team is moving toward. We're building the universal layer.

§2

The moat

Why it's defensible
  • Moat 1

    Open-source verifier

    Anyone can verify any receipt without running our code or trusting our servers. The verifier is open-source, the spec is frozen at v0.2.0, and the transparency-log roots are pinned. We win the standards game by being the surface that's worth standardising on — not by lock-in.

  • Moat 2

    Per-customer corpus

    Every customer's Ctrl library encodes their policies, departments, roles, and accountability chains. That corpus compounds — it gets more valuable the longer they're on the platform, and it doesn't transfer to a competitor. Switching cost lives in the corpus, not in the contract.

  • Moat 3

    Signed receipts on a public log

    Every successful Ctrl invocation produces a receipt anchored in a chained-hash log. The log is public. The signatures are Ed25519. Auditors, regulators, and prospects can verify the entire history of an org's AI actions in seconds. That artifact is the durable trust object — and it doesn't exist anywhere else.

§3

The architecture, in 30 seconds

How it works
  1. 01

    Surface

    User asks a question via /ask, MCP, or Slack — or an external AI client invokes a Ctrl directly.

  2. 02

    Retrieval

    The retrieval agent searches this org's Ctrl library for matches.

    Kebab-case slugs, typed input + output schemas, scoped to the caller's role and delegations.

  3. 03

    Dispatcher

    Single source of audit truth

    Single source of audit truth. Validates inputs, picks the runtime, invokes the Ctrl.

    Six implementation kinds, one dispatcher path. Every code route — agent loop, MCP, scheduled trigger, composed sub-call — goes through this function.

    Six implementation kinds, one dispatcher path
    • deterministicsandboxed JS, pure compute
    • grounded_llmLLM bounded to signed sources
    • data_lookupMCP connector tool call
    • composedorchestrates sub-Ctrls
    • human_in_looppauses for a human form
    • external_actionsend email, write back, etc.
  4. 04

    Receipt

    Validates outputs against the schema. Checks post-conditions. Issues an Ed25519-signed receipt.

    The receipt's actorChain records who signed, who delegated, what role they hold, what time window. Compliance teams stop reading logs and start reading receipts.

  5. 05

    Transparency log + verifier

    Receipt is appended to a public chained-hash log. Anyone can verify it offline.

    Open-source verifier. Public JWKS at /.well-known. No SDK, no vendor lock — cryptographic, not theatrical.

The dispatcher is the single source of audit truth. Every code path that wants to invoke a Ctrl — the /ask agent, the MCP server, scheduled triggers, composed sub-calls — goes through one function. Authority for every action is recorded in the receipt's actorChain: who signed, who delegated, what role they hold, what time window they were operating in. Compliance teams stop reading logs; they read receipts.

§4

Verify it yourself

No trust needed

Pick any receipt from the public Trust Portal. Verify the Ed25519 signature against the public JWKS. Re-derive the leaf hash. Walk the transparency-log chain up to the current head. If any of those checks fails, the system is lying. The steps below run against the seeded demo org acme-saas-demo — same mechanics in production.

1

Browse receipts

Open /portal/acme-saas-demo. Pick any receipt id from the feed.

2

Run the open-source verifier

npx @ctrl-ai/verify <receipt-id>
3

Or do it manually with curl + node

# Fetch the receipt + inclusion proof
curl https://ctrlai.com/api/receipts/<receipt-id>

# Fetch the public JWKS
curl https://ctrlai.com/.well-known/ctrlai/receipt-keys

# Fetch the current log head
curl https://ctrlai.com/api/transparency-log/head

# Verify Ed25519 signature locally + walk the chain
node verify.mjs <receipt-id>
4

Or open the verification page

Pre-rendered at /verify. Paste a receipt id; we show every check and let you copy the curl commands.

§5

Distribution

How we reach customers
  • Magic-moment onboarding. Drop a folder of policy docs at /try/upload. 90 seconds later: org structure extracted, Ctrls proposed, first cited answer rendered. Conversion to a real workspace is one magic link.
  • Compliance Packs. EU AI Act Starter (Articles 12/13/14) is live. DORA, SOC 2, GDPR, HIPAA, B2B SaaS Rev-Ops are next. Each Pack is a versioned, expert-co-signed bundle of Ctrl templates a customer installs with one click. Tier-priced.
  • MCP-first integration. Cursor, Claude Code, Claude Desktop, and any future MCP client invoke our Ctrls through /api/mcp/[orgSlug]. The destructive ones still flow through the gate loop — every external AI client respects the same human-in-the-loop contract.
  • Open-source verifier as the wedge. We publish the verifier + the spec under a permissive licence. We don't win standards by hoarding them; we win by being the surface worth standardising on.
§6

Why now

The catalysts
  • EU AI Act applies from August 2026; high-risk systems need documented controls today.
  • DORA (financial-sector) and SEC AI risk-management guidelines force boards to ask: who is accountable for what our AI does?
  • SOC 2 Type II auditors increasingly fail orgs without AI-action audit trails. Receipts are the answer.
  • MCP standardised the AI-tool-call surface in 2025. The connectors are commoditising; the surface that decides who is allowed to call what is the next layer up — and it doesn't exist yet.
§7

The round

What we're raising

$1M on a SAFE at $10M post-money cap (10% dilution). YC-standard SAFE, no discount, no MFN. One round by design. The platform is built; we're funding distribution and the SF presence, not engineering. Target: default-profitable within 18 months. Any further raise is on customer revenue, not dilution.

Shape: one strategic anchor ($300–500K) plus 3–5 operator-angels who built compliance, AI-infra, or developer-tools companies. 30 days from first conversation to close.

Use of funds

  • 40%
    SF presence

    HQ + founder relocation + first US BD / content / frontend hire

  • 30%
    Product + Packs

    Magic-moment polish, 3 more industry Packs, open-source launch

  • 20%
    Runway

    18-month buffer to default-profitable

  • 10%
    Operations

    Legal, infrastructure, brand

Frontier-lab credits (~$350K committed pending close) cover ~12 months of inference for the free tier. Not load-bearing for the round; lets us run a generous free tier as marketing surface.

§8

Team

Who's building this
Rado Sukala
Rado Sukala
Founder & CEO

Solo by design. 30+ years building products. With AI as a multiplier, an experienced operator plus a 20%+ option pool for the first 15–30 hires beats 50/50 co-founder dilution upfront. The corpus thesis benefits from a single decision-maker on what gets signed and shipped.

Chief developer in the codebase daily; full architecture ownership. Engineering in Prague — lower cost base, deeper senior-engineer hiring pool. Leadership and BD in SF — where the buyers, the press, and the AI ecosystem live. Founder relocates Q3 2026.

Corporate

Entity
Ctrl AI, Inc.
Delaware C-Corp
Engineering
Prague, Czech Republic
Czech operating subsidiary
Cap table
75% issued · 25% reserved
Primarily option pool for first 30 hires

Want the deep-dive? It's a 30-minute call.

Architecture walkthrough, traction details we don't publish, customer pipeline, fundraise terms. Pick whichever entry-point lands first.