Surface
User asks a question via /ask, MCP, or Slack — or an external AI client invokes a Ctrl directly.
Every reply backed by a typed function a human signed. Every receipt verifiable without trusting us.
Live as of May 14, 2026, 12:38 PM · Verifiable at /portal/acme-saas-demo · No vanity multipliers.
AI is shipping into every workplace. The current generation of tools — Copilot, ChatGPT Enterprise, internal RAG — answers questions by paraphrasing context. That works for drafts. It fails the moment a regulator, an auditor, or a procurement officer asks who is accountable for this answer.
Ctrl AI replaces the paraphrase with a typed call. Every reply our system gives is grounded in a Ctrl — a callable function with a name, an inputs schema, an outputs schema, and a signature from the human who took responsibility for it. The invocation produces a receipt — an Ed25519-signed proof that's appended to a public, chained-hash transparency log. Any third party can verify the receipt without trusting our servers.
This is the substrate the EU AI Act, DORA, SOC 2 Operating Effectiveness, and every internal audit team is moving toward. We're building the universal layer.
Anyone can verify any receipt without running our code or trusting our servers. The verifier is open-source, the spec is frozen at v0.2.0, and the transparency-log roots are pinned. We win the standards game by being the surface that's worth standardising on — not by lock-in.
Every customer's Ctrl library encodes their policies, departments, roles, and accountability chains. That corpus compounds — it gets more valuable the longer they're on the platform, and it doesn't transfer to a competitor. Switching cost lives in the corpus, not in the contract.
Every successful Ctrl invocation produces a receipt anchored in a chained-hash log. The log is public. The signatures are Ed25519. Auditors, regulators, and prospects can verify the entire history of an org's AI actions in seconds. That artifact is the durable trust object — and it doesn't exist anywhere else.
User asks a question via /ask, MCP, or Slack — or an external AI client invokes a Ctrl directly.
The retrieval agent searches this org's Ctrl library for matches.
Kebab-case slugs, typed input + output schemas, scoped to the caller's role and delegations.
Single source of audit truth. Validates inputs, picks the runtime, invokes the Ctrl.
Six implementation kinds, one dispatcher path. Every code route — agent loop, MCP, scheduled trigger, composed sub-call — goes through this function.
deterministicsandboxed JS, pure computegrounded_llmLLM bounded to signed sourcesdata_lookupMCP connector tool callcomposedorchestrates sub-Ctrlshuman_in_looppauses for a human formexternal_actionsend email, write back, etc.Validates outputs against the schema. Checks post-conditions. Issues an Ed25519-signed receipt.
The receipt's actorChain records who signed, who delegated, what role they hold, what time window. Compliance teams stop reading logs and start reading receipts.
Receipt is appended to a public chained-hash log. Anyone can verify it offline.
Open-source verifier. Public JWKS at /.well-known. No SDK, no vendor lock — cryptographic, not theatrical.
The dispatcher is the single source of audit truth. Every code path that wants to invoke a Ctrl — the /ask agent, the MCP server, scheduled triggers, composed sub-calls — goes through one function. Authority for every action is recorded in the receipt's actorChain: who signed, who delegated, what role they hold, what time window they were operating in. Compliance teams stop reading logs; they read receipts.
Pick any receipt from the public Trust Portal. Verify the Ed25519 signature against the public JWKS. Re-derive the leaf hash. Walk the transparency-log chain up to the current head. If any of those checks fails, the system is lying. The steps below run against the seeded demo org acme-saas-demo — same mechanics in production.
Open /portal/acme-saas-demo. Pick any receipt id from the feed.
npx @ctrl-ai/verify <receipt-id>
# Fetch the receipt + inclusion proof curl https://ctrlai.com/api/receipts/<receipt-id> # Fetch the public JWKS curl https://ctrlai.com/.well-known/ctrlai/receipt-keys # Fetch the current log head curl https://ctrlai.com/api/transparency-log/head # Verify Ed25519 signature locally + walk the chain node verify.mjs <receipt-id>
Pre-rendered at /verify. Paste a receipt id; we show every check and let you copy the curl commands.
/api/mcp/[orgSlug]. The destructive ones still flow through the gate loop — every external AI client respects the same human-in-the-loop contract.$1M on a SAFE at $10M post-money cap (10% dilution). YC-standard SAFE, no discount, no MFN. One round by design. The platform is built; we're funding distribution and the SF presence, not engineering. Target: default-profitable within 18 months. Any further raise is on customer revenue, not dilution.
Shape: one strategic anchor ($300–500K) plus 3–5 operator-angels who built compliance, AI-infra, or developer-tools companies. 30 days from first conversation to close.
HQ + founder relocation + first US BD / content / frontend hire
Magic-moment polish, 3 more industry Packs, open-source launch
18-month buffer to default-profitable
Legal, infrastructure, brand
Frontier-lab credits (~$350K committed pending close) cover ~12 months of inference for the free tier. Not load-bearing for the round; lets us run a generous free tier as marketing surface.

Solo by design. 30+ years building products. With AI as a multiplier, an experienced operator plus a 20%+ option pool for the first 15–30 hires beats 50/50 co-founder dilution upfront. The corpus thesis benefits from a single decision-maker on what gets signed and shipped.
Chief developer in the codebase daily; full architecture ownership. Engineering in Prague — lower cost base, deeper senior-engineer hiring pool. Leadership and BD in SF — where the buyers, the press, and the AI ecosystem live. Founder relocates Q3 2026.
Architecture walkthrough, traction details we don't publish, customer pipeline, fundraise terms. Pick whichever entry-point lands first.