CONFIDENTIALPre-Seed -- April 2026

The 30-Year Thesis

The problem of protecting proprietary code from AI systems is permanent. It gets worse with every improvement in AI capability. Pretense is building the company that owns this problem for three decades.

The Permanent Problem

Information asymmetry between creators and AI systems is a physics-level constraint, not a technology gap.

Every improvement in AI capability increases the value of the data it processes -- and the risk of exposing proprietary patterns. Better models extract more meaning from the same input. More capable agents access more sensitive systems. This is not a problem that better AI solves. Better AI makes it worse.

The only reliable approach is external boundary enforcement. You cannot control what an AI system learns from your data once it has access. You can only control what reaches it in the first place. This is the fundamental insight Pretense is built on.

AI gets better
More capable models extract deeper patterns from code. Variable names, architecture patterns, and business logic become readable signals.
Data gets more valuable
As AI drives more revenue, the proprietary code and data that feeds it becomes the core competitive asset. Exposure risk scales with business value.
Attack surface grows
Every new AI tool, agent, and integration is a new channel where proprietary data can leak. The surface area expands faster than security can cover it.

What Never Changes

The strongest businesses are built on things that stay constant. Three forces will be true in 2026, in 2036, and in 2056:

Companies will always protect proprietary IP

Trade secrets, algorithms, and architectural patterns are the moat. No CEO will voluntarily expose them. The security budget for IP protection has grown every year for 40 years. AI does not change this -- it accelerates it.

Companies will always want the best AI tools

Productivity gains from AI coding assistants are 30-55% (GitHub research, 2024). No engineering leader will ban AI tools -- the competitive cost is too high. Usage will only increase.

These two desires are in permanent tension

Using the best AI tools requires sending proprietary code to external systems. Protecting proprietary IP requires not sending it. This tension cannot be resolved by either side alone. It requires a boundary layer. Pretense is that layer.

Pretense resolves this tension. Developers use any AI tool, with any provider, at full capability -- and proprietary code never leaves the boundary. The mutation is invisible. The protection is absolute. This is not a feature. It is a permanent need.

Decade 1 -- AI Code Security (2026-2036)

$172BAI Cybersecurity TAM by 2029 (Gartner 4Q25)

The first decade is about owning AI code security. Developers are the entry point. Coding tools are the initial attack surface. The mutation proxy is the wedge.

2026-2028
Establish the category
  • +Mutation proxy for all major AI coding tools
  • +CLI + IDE integrations (VS Code, JetBrains, Neovim)
  • +Enterprise deployments (on-prem, SSO, SIEM)
  • +SOC2/HIPAA compliance artifacts
2029-2031
Expand the boundary
  • +Mutation beyond identifiers -- schemas, configs, API specs
  • +CI/CD pipeline integration (block unprotected API calls)
  • +Multi-language ML-assisted mutation engine
  • +Custom mutation policies per repo, per team
2032-2034
Own structured data protection
  • +Database query mutation (protect schema in AI analytics)
  • +API specification mutation (protect endpoints in AI design)
  • +Infrastructure-as-code mutation (protect topology in AI ops)
  • +Universal structured data boundary layer
2035-2036
Platform consolidation
  • +Single pane for all AI data governance
  • +Marketplace for third-party mutation plugins
  • +Acquisition of adjacent point solutions
  • +IPO-ready governance and compliance platform

Decade 2 -- AI System Governance (2036-2046)

$500B+Projected TAM -- AI governance across all business functions

By 2036, autonomous AI agents will operate across every business function -- not just code. Sales agents accessing CRM data. Finance agents processing transactions. Legal agents reviewing contracts. Every one of these agents needs a boundary layer governing what it can see, do, and learn.

From developer tools to enterprise AI operating system

The mutation engine that starts with code identifiers becomes a universal transformation layer for any structured data passing through any AI system. The audit trail that starts with developer prompts becomes the compliance backbone for every AI interaction in the enterprise.

Code
-> All structured data
Schemas, configs, contracts, financials
Developers
-> All business users
Sales, finance, legal, operations
Coding tools
-> All AI systems
Agents, copilots, autonomous workflows

The company that owns the AI code security category in Decade 1 has the trust, the data, and the enterprise relationships to expand into universal AI governance in Decade 2. This is not a pivot -- it is a natural expansion of the same boundary enforcement principle applied to a broader surface area.

Decade 3 -- Intelligence Boundary Protocol (2046-2056)

$1T+Projected TAM -- civilizational AI infrastructure

By 2046, the question is no longer which company governs AI boundaries. The question is which protocol does. The end state is not a product -- it is infrastructure. Like TCP/IP defined how machines communicate, the Intelligence Boundary Protocol defines how AI systems respect intellectual property boundaries.

01
Product
A company sells mutation-based AI security to enterprises. Revenue grows. Market share compounds.
02
Protocol
The mutation specification becomes an open standard. Multiple vendors implement it. Interoperability drives adoption.
03
Infrastructure
The protocol becomes invisible -- embedded in every AI interaction like HTTPS is embedded in every web request. One line of config. Always on.

Mathematically provable boundaries. As AI systems approach and exceed human-level capability, informal security measures become insufficient. The protocol must provide cryptographic guarantees that proprietary patterns cannot be extracted, even by systems more capable than their operators.

This is the long game. The company that establishes the mutation protocol today captures the infrastructure layer for AI trust tomorrow. Protocols outlive products. Standards outlive companies. The right protocol becomes permanent.

What Survives Each Transition

Four assets compound across all three decades. Each gets deeper every year, regardless of which decade the company is operating in.

Mutation Algorithm + Corpus

Every mutation processed trains the engine. Language coverage, edge-case handling, and reversal accuracy compound with volume. This is a data flywheel -- the more code Pretense protects, the better it protects the next line.

Year 1
5 languages, regex-based
Year 5
20+ languages, ML-assisted
Year 10
Universal structured data
Audit Trail + Compliance Artifacts

Every mutation logged is a compliance artifact. SOC2, HIPAA, and future AI governance frameworks require proof of data handling. Deleting Pretense means losing years of compliance history.

Year 1
SOC2/HIPAA audit export
Year 5
AI governance framework proof
Year 10
Regulatory-grade boundary attestation
Enterprise Relationships

Security vendors earn trust slowly and lose it instantly. Each deployment deepens integration into CI/CD pipelines, SSO, SIEM, and procurement workflows. Rip-out cost grows every quarter.

Year 1
10 design partners
Year 5
500+ enterprise logos
Year 10
Platform standard
Protocol Adoption

The Open Pretense Mutation Protocol starts as a product feature. With enough adoption, it becomes an industry standard. Protocol standards outlive the companies that create them.

Year 1
Internal protocol spec
Year 5
Open standard, multi-vendor
Year 10
Infrastructure primitive

The Scaling Law

Three forces scale exponentially with AI capability improvements. As models get better, the number of deployed agents, the volume of sensitive data they process, and the complexity of governing them all accelerate in lockstep.

Exponential Scaling -- AI Capability vs. Governance Demand

Indexed growth (2025 baseline) -- agents, data volume, governance complexity

Data Volume
Agent Count
Governance Complexity

This is why the governance market grows faster than AI itself. Each new agent multiplied by each new data source multiplied by each new compliance requirement creates combinatorial complexity. The boundary layer is the only chokepoint that scales linearly against exponential demand.

30-Year TAM Trajectory

Total Addressable Market -- $26B to $1.2T

AI security (2026) to AI governance (2036) to boundary infrastructure (2046+)

Gartner + projections
2026-2036
Decade 1
$172B by 2029
AI cybersecurity. Developers + coding tools. Mutation proxy.
2036-2046
Decade 2
$500B+
AI system governance. All business functions. Universal boundary layer.
2046-2056
Decade 3
$1T+
Intelligence Boundary Protocol. Civilizational-scale AI infrastructure.

From Product to Protocol

The end state is you forget it is there.

The Open Pretense Mutation Protocol already exists. Today it is a product feature -- one proxy, one config file, one command. Tomorrow it is an industry standard that multiple vendors implement. Eventually it becomes as invisible as HTTPS -- embedded in every AI interaction, enforced at the protocol level, never thought about by the end user.

One line of config. Every AI interaction protected. The best security is the security you never have to think about. That is the 30-year destination.

Like HTTPS for the web
In 2010, HTTPS was optional. By 2020, browsers would not load HTTP pages. The transition was gradual, then sudden. AI boundary enforcement will follow the same adoption curve.
Like containers for compute
In 2013, Docker was a startup product. By 2023, containers were invisible infrastructure. The mutation boundary follows the same path -- product to platform to primitive.
Simplicity as the end state
The goal is not complex enterprise software. The goal is one line of configuration that makes every AI interaction safe by default. Complexity is the enemy. Invisibility is the win.
Protocol economics
Companies that define protocols capture disproportionate value. The protocol creator becomes the reference implementation, the certification authority, and the ecosystem hub.

Contact

Pretense is raising a pre-seed round to fund the first three years of a 30-year category. If you invest in permanent problems, not temporary features, we should talk.

Ask me anything