Appendix brief
Trust, legal, and procurement readiness
The repo shows awareness of trust and procurement issues, but the current state is still closer to pilot readiness than enterprise-commercial readiness. The near-term question is not whether trust matters. It is what minimum trust pack needs to exist before beta conversations can widen safely.
Key takeaways
- Trust posture is conceptually strong and partially scaffolded on the public site, but the external pack is still explicitly pilot-stage.
- The missing pieces are the buyer-facing legal and procurement pack, not a total absence of security thinking.
- This workstream is one of the few that can justifiably be called blocked for broader launch.
Related workstreams
What exists already
Security, shared services, governance, privacy, and terms already appear in the repo, which means the team is not ignoring trust. The platform also clearly values auditability and control as part of the product promise.
The current privacy and terms pages are explicit that they are pilot-stage placeholders. That honesty is useful internally because it shows the gap cleanly, even if it also makes the current trust posture visibly incomplete.
Why this remains blocked
What enterprise buyers will still ask for is not yet packaged: final company/legal identity, controller details, DPA availability, procurement FAQ, and a clearer answer to who exactly they are contracting with.
Until those pieces exist, the founder should assume this area can support limited beta conversations and bespoke diligence answers, but not confident procurement-heavy selling.
Most credible beta stance
The best short-term posture is likely controlled honesty: keep conversations limited, state clearly that policies are still pilot-stage, and answer diligence questions directly rather than pretending the full trust pack already exists.
That is strong enough for founder-led pilots. It is not strong enough for a broad enterprise push until the minimum company, policy, and procurement pack is published.