Skip to content
dualflame

The diagnostic · two to three weeks

Find what your operators couldn't see.

Your stack ingested into a private cluster. A forensic fleet against your real KPIs. A memo with receipts you hand to your board, your auditor, your acquirer.

How it runs

Your data never leaves your perimeter without permission.

  • 01

    Read-only OAuth ingest

    Your tokens. Your data. Nothing leaves your perimeter without permission.

  • 02

    Ephemeral private compute

    Confidential VMs · VPC-SC · CMEK · 72-hour TTL. The cluster disappears on exit.

  • 03

    Skeptic + Validator

    ~40% of compute spent attacking findings. Every dollar links to a SQL row.

  • 04

    Hash-chained evidence

    Findings are re-derivable from your data three years from now.

What you keep

A private repo — your bible for the next 12 months.

  • MEMO5 cross-system, material, actionable findings — written for your board.
  • EVIDENCE LEDGERmanifest.json · sha256-anchored · every claim back to source.
  • WORKFLOW SPECOne day-90 install path. Ready to hand to engineering.
  • REASONING TRACESEvery step of every finding. Portable on 30 days' notice. Yours.

Once the memo lands

What changes for your team.

Your CFO

Has line-item evidence under every dollar in the memo. Re-derivable three years out.

Your COO

Gets one day-90 workflow spec. Ready to install — not a 60-slide deck to interpret.

Your CEO

Walks into the next board meeting with answers your board hadn't even asked yet.