← Back to Guide

The Pitch

What you're proving, how to say it, and why it works

THE ONE SENTENCE

You're not selling a product. You're proving you saw the problem before the market did, built a working solution, and belong on a team shipping this at scale.

What You're Proving

PROOF POINT 1 — YOU SAW THE GAP EARLY

Before Viberails shipped, before the big vendors started talking about "agentic firewalls," you identified the architectural gap: runtime enforcement without pre-runtime trust verification is incomplete. Everyone is now building the enforcement layer. Almost nobody is building the verification layer that should feed it.

This matters because it shows you think at the architecture level — you see where systems need to go, not just where they are.

PROOF POINT 2 — YOU BUILT IT, NOT JUST THEORIZED

Credence isn't a whitepaper. It's a working trust registry with:

You shipped working code that implements controls against real CoSAI threat categories. That's practitioner credibility you can't fake.

PROOF POINT 3 — YOU UNDERSTAND THE ECOSYSTEM

You can articulate exactly how trust verification relates to runtime enforcement, where it sits in the stack, and why both layers need to exist. You're not competing with Viberails or CrowdStrike — you understand how the pieces fit together. That's the thinking companies hire for.

how to say it

Conversation Framings

THE OPENING (10 SECONDS)
"Everyone's building the enforcement layer for agentic AI. I built the trust verification layer that should sit underneath it — cryptographic attestation and adversarial analysis of tool definitions before they hit production."

This positions what you built, not what you're selling. It invites "tell me more" without triggering "I'm being pitched."

THE FOLLOW-UP (30 SECONDS)
"The core insight is that runtime enforcement asks 'should this action be allowed' — but someone needs to answer 'should this entity be trusted at all' before that question even comes up. I built a working trust registry that does that. Multi-agent adversarial analysis, cryptographic attestation, structured framework. It works. Now I'm looking at where this thinking needs to go next."

The last line is the pivot — it signals you're thinking about your next move, not asking them to buy something.

THE PEER CONVERSATION (WHEN THEY'RE ENGAGED)
"I built this because I saw the gap and nobody was filling it. The big players are moving into this space now, which validates the thesis. The question I'm thinking about is: where does this kind of thinking have the most leverage — as an independent tool, as part of a platform, or as the foundation for something bigger?"

This is honest, self-aware, and invites them to give you strategic advice. People love giving advice. It also subtly signals you're evaluable — open to the right opportunity.

by audience

Audience-Specific Plays

TO A CISO / SECURITY LEADER (GERCHOW, ELLIS)
"I've been implementing pre-runtime trust verification for MCP tool definitions — the layer that answers 'should this tool be trusted' before your enforcement layer ever sees it. I built a working system. I'd love your take on where this fits in the stack you're building."

You're asking for their expertise, showing yours. The demo on your phone is backup if they want to see it — don't lead with it.

TO A STARTUP FOUNDER (TINKER, GUPTA, BLUEROCK)
"I built a trust registry that does adversarial analysis of MCP tool definitions before production — the pre-runtime piece your enforcement layer assumes someone else handles. I've been studying your approach. Where do you see the trust verification layer living long-term?"

Peer to peer. You built something, they built something. The question is genuine and opens a real technical conversation.

TO A PLATFORM PLAYER (GOOGLE, ANTHROPIC, COSAI)
"I've been implementing controls against your threat taxonomy in a live trust registry — cryptographic attestation and adversarial analysis for MCP tool definitions. I have concrete implementation findings about which mitigations work and where the gaps are. I'd like to contribute those upstream."

This positions you as a contributor, not a vendor. You have data they want. The implicit message: "I'm the kind of person who builds and ships against your frameworks."

TO VIBERAILS / LC CROWD (SPEAKEASY)
"You built the enforcement layer — that's the piece the market needed to see first. I built the trust verification layer that should feed it. Attestation scores, adversarial analysis of tool definitions, the pre-runtime piece. I've been thinking about how these layers talk to each other. Want to compare notes?"

Not "use my product." It's "I built the other half of this architecture, let's talk about how the full stack works." Peer conversation, not a pitch.

TO AN ANALYST (POLLARD, FORRESTER)
"I'm implementing controls across several AEGIS domains for MCP trust infrastructure — pre-runtime attestation and adversarial analysis. I have practitioner data on what works and what doesn't. Are you accepting case studies from builders in this space?"

You're offering research data, not asking for coverage. Analysts are starved for practitioner-level implementation data.

what not to do

Lines to Avoid

DON'T SAY

"Credence is a trust registry that does X. Can I show you?"

This frames you as a vendor with a product. You'll get a polite nod and a dead-end card exchange.

DO SAY

"I built a trust registry that does X. Here's what I learned."

This frames you as a practitioner with insight. You'll get a real conversation.

DON'T SAY

"We provide the trust intelligence that policies should be based on."

"We provide" is vendor language. There is no "we" — and that's actually a strength.

DO SAY

"I've been working on the trust intelligence layer — the piece that should inform policy decisions."

First person. Builder language. Invites collaboration.

DON'T SAY

"Complementary layers — we do trust verification, they do enforcement."

Partnership framing when you don't have a partnership. Sounds presumptuous.

DO SAY

"I think the full stack needs both layers. I built one, they built the other. I'm curious how they should connect."

Humble, curious, architecturally sharp.

the real ask

What You're Actually Going For

THE STRATEGIC OUTCOME

You walk out of RSA with people who know you as "the person who built the trust verification layer before anyone else was talking about it." Not "that guy with the startup." Not "someone who pitched me something."

The conversations you want lead to:

Credence is the proof you can point to. It's your portfolio piece. The outcome isn't "they want to use Credence" — it's "they want to work with the person who built it."

THE EXIT LINE (UNCHANGED — IT STILL WORKS)
"This deserves more time — can I send you a writeup this week?"

Still perfect. The writeup just shifts from "here's my product" to "here's what I found building this."

THE FOLLOW-UP REFRAME

Post-RSA article becomes: "What I Learned Building a Trust Verification Layer for MCP" — not a product announcement, but a practitioner story. Tag everyone. Share findings. Position yourself as the person who did the work.