Plaid-shaped · sold as a RevOps platform

The vehicle is SaaS.
The asset is the vault.

Allometry's 16 modules aren't 16 operational tools. They're 16 evidence guardrails. Each module enforces the data shape, time-stamp, and audit trail that a specific class of capital provider needs to underwrite. Operators adopt them because they fix urgent ops pain — margin leak, dispatch chaos, churn. The byproduct is structured, hash-chained, unfakable.

▸ 3 months in the vault → basic visibility · 6 months → working-capital lenders · 12 months → infra debt · 24 months → insurance-linked capital · 36 months → rated paper. Lenders connect via API and consume the vault. Same shape Plaid took for consumer fintech — for the physical economy.

Live · the vault 16 guardrails depositing · 5 vintage layers · 4 lender tiers · 24s loop
▸ THE 16 GUARDRAILS THE VAULT ▸ 4 LENDER TIERS M.01 Quoting Engine M.02 Margin Protect M.03 Cost Engine M.04 Contract Intel M.05 Location Intel M.06 Job Costing M.07 Deployment Design M.08 Active Operations M.09 Deal Room M.10 Outbound ABM M.11 Customer Health M.12 Account Substrate M.13 Market Intel M.14 Control & Gov M.15 Inventory Mgmt M.16 Pulse Workflows ▌ THE VAULT 36 MO rated paper · NRSRO-ready 24 MO insurance-linked viable 12 MO infra debt underwritable 6 MO working capital eligible 3 MO pre-screen visibility TIER 1 · 6 MO · BANKS working capital · ABL TIER 2 · 12 MO · INFRA project debt · 10-25y TIER 3 · 24 MO · INSURE parametric · re-insurance TIER 4 · 36 MO · PENSION rated paper · NRSRO ▸ VINTAGE TIMELINE · how long the vault has been thickening 0 mo 3 mo 6 mo 12 mo 18 mo 24 mo 36 mo+

16 guardrails. 16 evidence types. One vault.

Every module enforces a specific data shape and depositing rhythm. Operators experience them as ops tools. Lenders experience them as evidence standards. Below: what each guardrail deposits, and which lender tiers will eventually consume it.

▸ Each module generates two outputs: an operational action for the operator, and a time-stamped evidence deposit that feeds the Pulse underwriting model (next section). The table below shows the deposit and the lender tier it eventually unlocks — not the model inference itself.

# Module Operational job (the wedge) Vault deposit (evidence produced) Tier unlocked
M.01Quoting EngineWin quotes fasterPipeline visibility · win-rate · deal velocity · forward revenueT1
M.02Margin ProtectStop margin leakMargin stability · override discipline · price-floor enforcement historyT1T2
M.03Cost EngineTrack unit cost liveUnit economics · cost-to-serve · input volatility · gross-margin traceT1T2
M.04Contract IntelligenceRead every contractCounterparty quality · renewal probability · liability exposure · clause-level decompositionT2T4
M.05Location IntelligenceScore addressesGeographic risk · concentration · address-level density · weather-correlation surfaceT3T2
M.06Job CostingTrack every jobEstimated-vs-actual variance · gross-margin history · cost-input driftT1T2
M.07Deployment DesignOptimize scheduleCapacity utilization · time-series of throughput · forward capacity commitmentT1T2
M.08Active OperationsLive crew trackingSLA compliance · operational performance · uptime · claim-incidence proxyT3T2
M.09Deal RoomPipeline mgmtConversion rates · forward booked revenue · stage velocity · cohort retentionT1
M.10Outbound ABMTarget accountsDemand generation efficiency · CAC stability · channel ROIT1
M.11Customer HealthAccount scoringChurn risk · account LTV · sentiment–payment correlationT1T2
M.12Account SubstrateUnify sourcesData completeness · stakeholder graph · governance maturity indexT4T1
M.13Market IntelligenceExternal signalsMacro alignment · concentration risk · demand-curve fitT2T4
M.14Control & GovernancePolicy enforcementCompliance posture · audit-readiness · evidence-completeness scoreT4T3
M.15Inventory ManagementStock levelsAsset visibility · working-capital cycle · stockout exposureT1T3
M.16Pulse WorkflowsWorkflow agents + audit ledgerHash-chained decisions · WORM evidence trail · tamper-evident provenanceT4T3

Between vault and API · the Pulse Engine.

The vault deposits don't go to lenders raw. They feed the Pulse Engine — a RAG-augmented, recursively-updated underwriting model that converts time-stamped evidence into an attested operator fingerprint. The API doesn't serve data. It serves inferences with cryptographic provenance. This is what separates us from a passthrough fabric like Plaid.

Live · the Pulse Engine vault deposits → RAG → LLM → RECURSE → ZKP → attested fingerprint · 16s loop
▸ VAULT DEPOSITS PRICE · margin trace DEPLOY · route econ EXPAND · account LTV GOVERN · audit trail time-stamped hash-chained § 01 RAG retrieve historical evidence § 02 LLM reason over evidence extract signal § 03 RECURSE update model with new deposits ↩ relearn § 04 ZKP attest inference cryptographically ▸ API · ATTESTED ▸ 4 stages · ~80ms p50 inference · cryptographically attested at every output
§ 01 · RAG

Retrieve

The model pulls historical evidence from the operator's vault — last quarter's margin variance, three years of route economics, every contract clause, every audit log — and assembles a contextual frame for inference.

§ 02 · LLM

Reason

An LLM reasoning layer reads the retrieved evidence and extracts the underwriting signal: revenue quality, margin defensibility, counterparty risk, operational maturity. Reasoning is structured, traceable, and explainable.

§ 03 · RECURSE

Update

Each new deposit doesn't just trigger inference — it updates the model's understanding of that operator's cohort, vertical, and address-level pattern. The system relearns continuously. Yesterday's score is not today's score.

§ 04 · ZKP

Attest

Every inference output carries a zero-knowledge proof: the lender can verify the score was computed from the operator's actual vault data, with the published methodology, without seeing the raw underlying data. Cryptographic provenance.

API response · what lenders actually consume.

GET /v1/operators/<id>/profile
// Pulse Engine inference · attested · cohort-aware
{
  "operator_id":           "ALM-0042",
  "pulse_score":           87,                    // composite 0–100 underwriting score
  "confidence_interval":   [83, 91],               // 95% CI · widens at low vintage
  "revenue_quality_tier":  "A-",                   // A / B / C / D · margin defensibility
  "ebitcac_ratio":         4.2,                   // EBITDA / CAC · efficiency signal
  "vault_tier_eligible":   ["T1", "T2"],           // lender tiers unlocked today
  "cohort_percentile":     0.78,                  // vs. comparable operators · vertical-aware
  "vault_age_months":      14,                    // vintage · gates which tiers are eligible
  "loop_coverage":         {
    "price":  0.94,                                  // % of guardrails active in each loop
    "deploy": 0.88,
    "expand": 0.71,
    "govern": 0.92
  },
  "last_attested":         "2026-05-13T14:22:11Z",
  "attestation_hash":      "0x4F2A9C...A7E1",      // ZKP proof · verifiable on-chain
  "methodology_version":   "pulse-v2.4.1"          // model version that produced this inference
}
pulse_score
Composite 0–100. The single underwriting signal. Higher = stronger.
confidence_interval
95% CI. Widens at low vault vintage; tightens as evidence accumulates.
revenue_quality_tier
A → D letter grade on margin defensibility and counterparty quality.
ebitcac_ratio
EBITDA over fully-loaded CAC. Efficiency-of-growth signal.
vault_tier_eligible
Which lender tiers (T1 / T2 / T3 / T4) this operator unlocks today.
cohort_percentile
Position vs. comparable operators in same vertical and size band.
vault_age_months
Vintage. Months of active guardrail data deposited.
loop_coverage
Per-loop guardrail completeness (0–1). Sparse loops widen the CI.
attestation_hash
Zero-knowledge proof of the inference. Verifiable; no raw data leaked.

What's live today, what's in pilot, what's roadmap.

Allometry is a pre-seed company. Pretending we've shipped everything would destroy credibility. The thesis above is the destination — and the maturation path is staged honestly. Lenders evaluating us should know exactly which row of this table they're contracting against.

▸ Live today

Operator-grade · in production

  • 16 module guardrails shipped
  • Vault deposits · time-stamped & hash-chained
  • Operational fingerprint score (internal use)
  • Pulse score · sample inferences against design-partner data
  • 1 design partner · 14 months of vault data
  • Cohort of 4 DPs in onboarding
▸ In pilot · 2026

Cohort-grade · 6–18 months

  • Pulse Engine v2 · RAG + LLM stages
  • API spec scoped with 2 anchor balance-sheet partners
  • First programmatic Tier-1 working-capital facility
  • Independent engineering partnership scoped
  • Cohort benchmarking goes live at 30+ DPs
  • SOC 2 Type II underway (target Q4)
▸ Roadmap · 2027+

Institutional-grade · 18–48 months

  • Production ZKP attestation at scale
  • Tier-2 infra-debt facility integration
  • Tier-3 insurance-linked underwriting
  • NRSRO methodology engagement (Tier-4)
  • Rated paper consumable by pension allocators
  • Underwriting fabric for the physical economy

One operator. 14 months in the vault.

The Pulse API response below is from our flagship anchor design partner. Identity, industry, and geography confidential; metrics confirmed with the operator. This is the kind of structured profile a balance-sheet partner pre-screens against today, and the kind of profile that thickens into Tier-2 readiness over the next year.

▸ DESIGN PARTNER · 01 · ANCHOR OPERATOR Confidential · published with consent
operator_idALM-0042 (anonymized)
vault_age_months14
pulse_score87 / 100 · CI [83, 91]
revenue_quality_tierA−
ebitcac_ratio4.2
cohort_percentile78% vs. comparable operators in same vertical & size band
loop_coverageprice 0.94 · deploy 0.88 · expand 0.71 · govern 0.92
vault_tier_eligible▸ T1 active
vault_tier_emergingT2 · projected at 22 months vintage
pre-screened by3 anchor balance-sheet partners (non-binding pre-screens · scoping facilities)
attestation_hash0x4F2A9C...A7E1
last_attested2026-05-13T14:22:11Z

From 500+ lenders to your top 3.

The Pulse profile is the input. The output is a ranked, match-scored shortlist of capital partners whose mandates fit your stage, KPIs, and ZKP-attested vault. Bank-style DD takes six weeks per lender. Pulse-driven matching closes the same loop in ~200ms — and emits a cryptographic attestation the lender can verify before they decision.

Live · the lender match anchor operator profile in · 500-lender pool filtered · top 3 surfaced with offer terms · 16s loop
▸ OPERATOR PROFILE ANCHOR · ALM-0042 vault: 14 mo pulse: 87 / 100 RQ tier: A− ebit-cac: 4.2 tier: T1 ▸ T2 ZKP 0x4F2A9C...A7E1 ✓ ▸ FILTERS ACTIVE vault_age >= 6 mo pulse_score >= 80 T4_eligible == true industry == light_mfg geo == NAM attestation verified ▸ LENDER POOL · 500+ partners 500+ partners scanning... 12 match all 6 filters top 3 surfaced · pulse-ranked ▸ TOP 3 MATCHES ▸ Cadence Bank · ABL line $250K–$2M · working capital · 5-day decision match: 9.4 · APR ~8.2% · T1 active 9.4 ▸ Live Oak · equipment finance $150K–$5M · 5-7y term · 10-day decision match: 8.9 · APR ~9.4% · T1 active 8.9 ▸ Hercules Capital · venture-debt $500K–$15M · 3-5y · 14-day decision match: 8.6 · APR ~11.8% · T1 active 8.6 ▸ matching engine runs every Pulse inference · ~200ms median · cryptographically attested

Time-in-vault unlocks the tier.

You can't fake six months of hash-chained job-level margin. You can't backfill a year of route economics. The moat is time-stamped, audit-trailed, and unfakable. Each month an operator runs on Allometry, the vault thickens — and the next tier of capital becomes consumable.

0 mo 3 mo 6 mo 12 mo 18 mo 24 mo 36 mo+ PRE-SCREEN basic cashflow only TIER 1 · BANKS working capital · ABL · equipment finance M&T · Cadence · Live Oak · Avidbank TIER 2 · INFRA DEBT project debt · 10-25y duration Brookfield · Generate · Greenbacker TIER 3 · INSURANCE parametric · re-insurance Munich Re · Hannover Re · Arch · RenRe TIER 4 · PENSION rated paper · NRSRO-consumable CalPERS · OTPP · CPPIB · IFM ▸ VAULT THICKENING · live

Three things make the vault unfakable.

§ 01 · Native

The data is generated, not collected

Allometry is the operator's day-to-day system of record for quoting, dispatch, contracts, and audit. Every datum is a byproduct of work the operator was going to do anyway. There's no separate "underwriting reporting" workflow — there's no opportunity to fabricate.

▸ first-party, by construction
§ 02 · Time-stamped

Every decision is hash-chained at write-time

M.16 (Pulse Workflows) writes every decision into a WORM ledger with cryptographic time-stamping. You can't backfill margin you didn't have, route economics you didn't run, or compliance you didn't perform. The chain breaks if you try.

▸ tamper-evident provenance
§ 03 · API-consumable

Lenders plug in. They don't do DD.

The Vault exposes a standardized API. Pre-approved capital partners query an operator's vault directly, see the time-stamped evidence, and underwrite in seconds — not the weeks it takes for traditional DD. Plaid's shape, applied to asset-heavy capital.

▸ underwriting fabric

Why doesn't someone else already do this?

The first question any sharp lender or investor asks. Here's the honest comparison against the four things that look adjacent.

Bank DD Plaid ServiceTitan / FSM Allometry Vault
Data shape unstructured packets bank txn feed only ops record underwriting-grade · structured
Generation manually requested API passthrough byproduct of ops byproduct + attested
Time horizon snapshot rolling 90 days rolling full vintage · multi-year
Hash-chained no no no yes
ZKP-attested no no no yes (Stage 2)
Lender-API consumable no partial (consumer fintech only) no yes
Asset-heavy operator coverage case-by-case no vertical-specific native
Time-to-decision ~6 weeks n/a n/a ~200ms (Pulse inference)

▸ The defensible position: hash-chained, attested, lender-API-consumable, asset-heavy-native — and the only system that's all four at once. ServiceTitan and FSMs can't add the vault layer without disrupting their system-of-record business model. Plaid won't ever expand into asset-heavy ops data. Banks can't industrialize bespoke DD.

Four forces converging. Why now.

This thesis didn't work in 2020. It works now because four independent maturity curves crossed inflections in the last 18 months.

▸ 2024–2025 inflection

RAG · production-ready

Structured reasoning over heterogeneous evidence is no longer research. We can run an LLM over a 14-month vault and extract underwriting signal at <100ms per inference. Five years ago this required custom ML infra; today it's a primitive.

▸ 2025 inflection

ZKP · production-viable

Risc0, Aleo, Halo2 and zk-rollup tooling are now mature enough that proving an inference cryptographically — without revealing the underlying data — is shippable in production. This was a research project two years ago. Now it's a deployment pattern.

▸ Macro · ongoing

Infra debt growing 18%/yr

Climate-aligned and energy-transition capital is chasing novel underwriting signals. Pension funds need long-duration BBB-equivalent paper; reinsurers need asset-performance risk data they currently underwrite blind. Demand exists; supply infrastructure doesn't.

▸ Macro · post-2023

SMBs structurally underserved

Banks pulled back from middle-market asset-heavy lending post-SVB. Fintech ignored field services and physical-revenue operators in favour of consumer credit. The wedge is wide and widening, and the data infrastructure to underwrite this population doesn't exist yet.

Two products. One vault between them.

Allometry is two businesses operating under one trojan horse. The SaaS layer is how we acquire operators and generate the data. The Vault API is how that data eventually monetizes into the multi-billion underwriting infrastructure play.

▸ Side A · Operators

Allometry SaaS

Per-seat · per-module · sold today

  • 16 modules across Price · Deploy · Expand · Govern
  • Fixes margin leak, dispatch chaos, churn, audit gaps
  • Wedge product · urgent pain · SaaS unit economics
  • Operators get an immediate operational ROI
  • Every month of usage thickens their vault — they own it
▸ Side B · Capital providers

The Vault API

Per-query · per-facility · rev-share on capital deployed · sold tomorrow

  • Standardized underwriting fabric for asset-heavy operators
  • Pre-approved lenders consume vault data via API
  • Replaces weeks of bespoke DD with seconds of programmatic underwriting
  • Plaid's role-shape, applied to working capital, infra debt, insurance-linked, and rated paper
  • Where multi-billion enterprise value accrues

The seven hardest questions.

▸ What stops an operator from gaming the vault inputs?

The data isn't entered — it's generated by operations. When an operator quotes through Allometry, dispatches through Allometry, and signs contracts through Allometry, the vault deposits are byproducts of work that had to happen anyway. There's no separate "underwriting reporting" workflow to gerrymander.

On top of that, M.16 writes every decision into a WORM ledger with cryptographic time-stamping. Backfilling a margin you didn't have, or a route you didn't run, breaks the hash chain — and the chain break is publicly verifiable by lenders consuming the API.

▸ What happens to my vault if I leave Allometry?

The operator owns the vault. Full export, full portability, no lock-in on the data itself. If you churn off Allometry, you take your vault with you.

What we license to lenders is read-access against an operator's vault while it's active. If the operator goes dormant, the vault stops thickening, and the eligible-tier signal in the Pulse API will reflect that. We never sell or share an operator's vault without their explicit per-lender consent.

▸ Why won't ServiceTitan, Salesforce, or NetSuite ship this themselves?

They could — but they won't, because the vault layer requires re-architecting at the system-of-record level, and that would disrupt their existing business model.

Their data is structured for ops reporting, not for underwriting. Their decisions aren't hash-chained. Their data isn't third-party-validatable. Their architecture optimizes for "what should the operator see in the UI today" — not "what should a lender be able to verify three years from now." Adding our layer means redoing their write-path on every module, which costs more than they'd ever recover. We start from the underwriting requirement and work backward.

▸ Are the ZKPs real today, or aspirational?

Honest answer: in pilot, not production. Today, vault deposits are hash-chained (real) and time-stamped (real). The ZKP attestation layer that proves "this inference was computed from this operator's actual vault data with the published methodology, without revealing the underlying data" is in Stage 2 of our model maturation roadmap.

We've benchmarked Risc0, Aleo, and Halo2 against our inference workload. Production rollout is 12–18 months out, gated by anchor-lender pilot demand. We'll never claim "ZKP-attested" on a production API response until the proof is real and verifiable on-chain.

▸ What's the moat against a competitor copying the API spec?

The API spec isn't the moat. The vault is — and vaults are time-locked. A competitor can copy the GET /v1/operators/<id>/profile shape in an afternoon. What they can't copy is 14 months of hash-chained job-level margin from an operator who's been running on their system that whole time.

The deeper moat: two-sided network. Operators choose Allometry because the lender side is pre-integrated. Lenders choose Allometry because the operator coverage is wide enough to underwrite a portfolio against. Each side strengthens the other. A late entrant has to bootstrap both at once.

▸ Plaid took a decade to earn institutional trust. Why faster?

We're solving the smaller problem first. Plaid started by selling consumer-fintech bank-account access — a data shape lenders had never trusted via API before, and one that took years of compliance work to legitimize.

Our Stage 1 is Tier-1 working capital — where the data requirements are lightest (6 months of cashflow, contracted revenue, audit log) and where balance-sheet banks are actively asking for novel underwriting signals to extend cleaner credit lines post-2023. We're not asking Munich Re to underwrite a parametric pool on day one. The harder tiers come after we've operationalized the easier ones.

▸ Why does anyone trust a 2026 startup with their underwriting infrastructure?

They don't have to trust us. They have to trust three things we don't own:

(1) Cryptographic proof. ZKP attestations are mathematically verifiable — not "trust us, here's our score" but "verify the score yourself against the published methodology." (2) Independent validators. Big-4 audit and equivalent independent engineering partners sign attestations against the same vault data lenders consume. (3) Open methodology. The Pulse model version, scoring weights, and inference logic are published. Lenders evaluate the methodology, not the company.

The point of the architecture is that institutional trust doesn't require trusting Allometry as a company. It requires trusting the math + the audit + the methodology. Those are all third-party-verifiable.

The four pages that tell this one story.

▸ The Vault is the architecture. These three are how the architecture earns value.

The vehicle is SaaS.
The asset is the vault.

If you're an operator: we'll close your urgent loops. If you're a capital partner: we'll be your underwriting fabric. Either way, the vault thickens.

Open a vault →