Skip to content

post-launch wave-4: compliance / SOX domain (regulated-industry beachhead) #8

@DubovskiyIM

Description

@DubovskiyIM

Why

Wave-1 (invest) and wave-2 (deploy-pipeline, see #3) target the dev/AI-engineer audience: HN, X-tech-Twitter, npm-installers. Wave-4 changes target. Compliance / SOX-aligned controls is the beachhead into regulated industries — fintech, healthcare, government — where ACVs jump from $0 (open-source quickstart) to $50-500K (enterprise SaaS).

Research findings (~/Desktop/IDF/2026-05-03-market-research-provenance-explainable.html):

  • EU AI Act high-risk obligations active 2 Aug 2026
  • Colorado AI Act effective 30 Jun 2026
  • Revised MRM guidance (Fed/FDIC/OCC) 17 Apr 2026
  • GDPR Article 22 enforcement post CJEU C-203/22 (Feb 2025)
  • FDA AI/CDS guidance 6 Jan 2026

Six independent regulators converge on the same primitive: per-decision logged, explainable, contestable. Existing GRC platforms (AuditBoard $300M ARR, Workiva $1B revenue, Vanta $300M ARR) sell process-automation + evidence-aggregation. Nobody offers «the application itself answers why was this decision made? at runtime», which is exactly what Φ + anchoring + witness-of-proof + irreversibility gives.

Domain shape

The compliance domain already exists in idf repo (15 invariants — 5 expression, 5 __irr intents, 6 roles). It's the most mature ontology in the project. Wave-4 doesn't require new domain authorship — it requires packaging the existing one.

Six roles in current compliance:

  • preparer — drafts journal entries
  • reviewer — reviews & flags
  • approver — approves journal entries (SoD: ≠ preparer)
  • controlOwner — owns specific controls
  • auditor — read-only across the firm
  • cfo — agent-role with cycle-level scope (sign_off_cycle_404)

Five __irr.high intents: approve_je, submit_attestation, amend_attestation, sign_off_cycle_404, file_amendment.

Three rejection types this domain showcases (versus wave-1/2/3):

  1. SoD triplet expression invariantapprove_je blocked when approver === preparer || approver === reviewer. Already implemented in current ontology — first wild example of kind: expression in production-grade fixture.
  2. Dynamic threshold expressionsign_off_cycle_404 requires Σ(approved attestations) / Σ(total attestations) ≥ 0.95 of cycle. Real ICFR threshold from SOX 404 audits.
  3. Cycle-close hard gatesubmit_attestation blocked after cycle.status = "closed_with_findings". Cardinality + transition combined.

Why this is wave-4 and not wave-3

This is content-strategy, not new code. The compliance ontology already exists. Wave-4 = repackaging + targeted GTM:

  1. Domain bundleBOOTSTRAP_DOMAIN=compliance env-var override (same Docker pattern as wave-2/wave-3)
  2. Domain-specific demo scripts:
    • demo:rogue-self-approve-je — preparer tries to approve own journal entry → SoD blocked
    • demo:rogue-cycle-close-late — auditor tries to submit attestation after cycle closed → transition blocked
    • demo:rogue-cfo-signoff-incomplete — CFO tries to sign off SOX-404 cycle with 80% completion → threshold expression rejects
  3. Compliance-tuned landing variant at compliance.fold.software (or similar subdomain) with messaging:
    • Hero: «Your audit log doesn't explain decisions. Φ does.»
    • Proof: 5 __irr intents, 5 expression invariants, 6 roles, witness-of-proof on every effect
    • Demo: 3 rejection types above
  4. First case study — pick a friendly mid-market fintech / regulated SaaS as design partner. Real SOX-404 close-cycle compliance use-case.

When to ship

Not soon. This is a 6-12-month wave, not a 2-week wave. Reasons:

  • Enterprise sales cycle 12-18 months
  • SOC 2 Type II is procurement gate ($15-100K, 3-6 months)
  • ISO 42001 is emerging procurement gate for AI vendors ($50-150K)
  • Compliance bundles need legal review before commercial offering
  • Big4 channel partners (Deloitte / EY / KPMG) effectively mandatory for top-200 banks/insurers — and they'll wrap or compete

Triggers for opening this issue:

  • Wave-1 launch metrics validate runtime-explainability framing (≥1K npm downloads first week, ≥3 enterprise inbound DMs «can this work for our compliance?»)
  • One credible mid-market design partner volunteers
  • Decision: «we have bandwidth for an enterprise sales motion in parallel with dev-tool growth»

Triggers for NOT opening this:

  • Launch flops (pivot to messaging fixes, not enterprise expansion)
  • Anthropic / OpenAI / ServiceNow ship native «AI Control Tower» that absorbs this category before we have a beachhead
  • We choose to stay developer-tool focused

Risks specific to this wave

  1. «Explainable Runtime» has zero category mindshare in 2026 (research finding). Sales requires riding existing AI Governance / Model Risk Management / GRC categories — not creating new one. Wave-4 messaging must lead with «Compliance-as-code» or «Runtime explainability for regulated AI», not «Fold».
  2. Tier-1 banks build inhouse (post April 2026 MRM revision). ICP must be mid-market. Top-200 sells through Big4.
  3. GRC tool fatigue is documented (60% of firms cite overwhelmed staff). Wave-4 must position as consolidation of existing tools, not addition.
  4. Sales-led GTM ≠ developer-led GTM. Wave-1-3 work via npm/HN. Wave-4 needs enterprise AE, certifications, customer references. Different motion entirely.

Implementation path

Phase 1 (post-launch, 2-3 weeks): Repackage existing compliance ontology into Docker quickstart. Three demo-scripts. Internal test only.

Phase 2 (4-8 weeks post-launch): One mid-market design partner. Free 90-day pilot. Goal: case study + reference.

Phase 3 (3-6 months post-launch): SOC 2 Type II + ISO 42001 audits. $50-150K spend. Hire compliance-aware enterprise AE.

Phase 4 (6-12 months post-launch): Compliance bundles (SOX-pack, MiFID-pack, GDPR-pack) priced at $50-500K ACV. Channel partnerships.

Open questions

  1. Subdomain or separate landing? compliance.fold.software vs fold.intent-design.tech/compliance. Lean: separate landing — different ICP, different sales motion, different brand voice.
  2. License model? BSL 1.1 currently on runtime — that's already enterprise-friendly (no-resell-as-SaaS). For compliance bundles: add commercial-use clause in each domain-pack. Or paid hosted-only via separate SaaS.
  3. Do we sell or license the ontologies themselves? I.e., the compliance ontology with 15 invariants + 6 roles is a work product of months of research. Sell as a product? Or open-source as community-good and sell hosting? Lean: open-source the ontology (BSL 1.1 keeps SaaS resale blocked), sell hosting + integrations + cert helpers.
  4. Big4 partnership now or later? Lean: not now. Direct mid-market pilot first, then approach Big4 with referenceable case-study — or skip Big4 entirely and target post-Big4-engaged customers.

Source narrative

Wave-4 is the enterprise-grade unlock. Wave-1/2/3 are about reach. Wave-4 is about ACV.

«Your audit log records what happened. Φ explains why.»

This issue stays closed until Phase 1 trigger (≥3 enterprise inbound DMs after launch) is met.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions