Internal Pitch

Amodal: The Agent Runtime Platform

Configure AI agents with a git repo of markdown files. Deploy to Slack, Teams, or your product.

Platform

Admin UI + managed cloud for teams running agents in production

Chat with your agent, edit skills, approve learning, track costs. All in a browser.

Deploy to Slack/Teams/web with one click.

OSS Engine

Open-source runtime with local chat UI for developers

amodal dev → localhost chat interface, hot reload, local eval.

Full agent runtime, zero platform dependency, self-host anywhere.

The Elevator Pitch

Amodal is an open-source runtime for building AI agents that connect to your systems, follow your methodology, and take action on your behalf.

Connect Salesforce, Slack, Datadog, PagerDuty, HubSpot, Jira — whatever your team uses. Write skills as markdown: your sales playbook, your investigation runbook, your compliance checklist. The agent reads across all connected systems, reasons using your methodology, and acts: creates tasks, updates deals, isolates hosts, sends follow-ups. Not just answers. Actions across systems, with human confirmation at every write step.

This isn't a thin wrapper that gets eaten when models improve. Configuration is orthogonal to intelligence: even a perfect model still needs your OAuth tokens, your field-level access rules, your deal-staleness thresholds, and your escalation paths. That's not a model gap. It's a configuration layer that gets more valuable as models get smarter and more capable.

Open-source runtime. Community packages for connections and skills. A git repo you own. Deploy to Slack, Teams, or embed in your product. The platform adds observability, an admin UI for non-developers, and multi-tenant isolation for ISVs. Sales ops, security, finance, HR, marketing, meetings, customer success — same runtime, different skills.

amodal connect + install

Connect & configure

One command per system. OAuth runs, credentials stored, API docs loaded. Install community skills and knowledge from the registry. Override with your specifics.

skills/deal-triage/SKILL.md

Write your methodology

A skill is a markdown file. Your sales process, your investigation playbook, your compliance checklist. Domain experts author them. Engineers don't need to be involved.

amodal deploy

Deploy & act

The agent reads across systems, reasons with your methodology, and takes action. Creates tasks. Updates CRMs. Sends emails. Isolates hosts. All with confirmation.

For your team

#sales-ops
S
What should I focus on this week?
A
3 deals need attention:
Acme ($240K, stale 18d) · DataFlow (no champion) ...

Developer builds. Team uses in Slack. VP edits skills in the admin UI. Controller tracks costs. Agent learns from every session.

Sales, security, finance, HR, marketing, meetings. Same runtime, different skills.

Inside your product

YourApp — Dashboard
YourApp AI
4 cases need attention
P1 SLA breach in 23m

Embed with 10 lines of React. 1,000 customers, each with their own tenant, their own data, their own learning. White-labeled. They see your brand.

Your board gets the AI story. Your customers get intelligence. Weeks, not quarters.

The Problem

Every team in every company has critical information scattered across 6-8 systems. Gathering it takes hours. Acting on it takes more hours. And no tool in the market reads across systems, reasons about what it finds, and takes action in a single conversation. Below: the abstract pain, then two concrete scenarios proving it's real.

The Three Gaps

6-8

systems the average knowledge worker alt-tabs between to do their job

40%

of enterprise apps will embed AI by 2027 (Gartner). The race is on.

0

tools that read across systems, reason, AND take action in a single conversation

Every team in every company has the same problem: critical information is scattered across systems, and acting on it requires logging into 6 different tools. The sales manager alt-tabs between Salesforce, LinkedIn, Slack, and a spreadsheet to figure out which deals need attention. The SOC analyst opens PagerDuty, CrowdStrike, Splunk, Okta, and Jira to investigate a single alert. The marketing VP checks HubSpot, Google Ads, LinkedIn Ads, GA, and Salesforce to understand campaign performance.

Then they act: create tasks, update records, send emails, reassign tickets, pause campaigns, flag risks. Each action is a separate login, a separate UI, a separate set of clicks. The context-gathering takes hours. The actions take more hours. And the next time the same question comes up, everyone starts from zero.

The read gap

Dashboards show you what happened in one system. Nobody shows you what happened across systems. The sales manager needs Salesforce + LinkedIn + Slack correlated. The SOC analyst needs CrowdStrike + Okta + Splunk correlated. No tool does this.

The write gap

AI copilots give better answers. But they can't do anything. They can't pause a campaign, create a Jira ticket, isolate a host, or send a follow-up email. Analysis without action is half the value.

The learning gap

Every time the same question comes up, humans start from scratch. No tool remembers that "this vendor always resubmits invoices" or "deals silent for 14 days in negotiation close at 8%." Institutional knowledge lives in people's heads, not systems.

Amodal closes all three gaps: reads across systems, acts with confirmation, and learns from every session.

Use Cases

Two scenarios in depth. Same pattern: connect systems, write a skill as markdown, deploy. The agent reads across systems, reasons with your methodology, and takes action.

Not just answers. The agent creates tasks, updates records, sends emails, isolates hosts, reschedules people. Every write requires human confirmation.

1

Sales Ops

Salesforce + LinkedIn + Slack → deal triage, lead routing, pipeline review

# 3 connections, 1 skill, 5 minutes
$ amodal connect salesforce  ✓ 847 opportunities indexed
$ amodal connect linkedin-sales-nav  ✓ 12 endpoints
$ amodal connect slack  ✓ #sales-ops, #deal-room
$ amodal install skill deal-triage  ✓ v2.0.1
Read: the agent answers
#sales-ops
S
@amodal what's the full story on the DataFlow deal?
A
Queried: Salesforce (Opportunity + Contacts) + LinkedIn (3 contacts) — 2.8s
DataFlow — $85K, Proposal stage
Issue: No Decision Maker contact. Your rule requires one by Proposal.
LinkedIn: VP of Engineering (James Wu) promoted 3 weeks ago. Posted about "modernizing our stack." Likely the decision maker.
Connection: Your AE has 2 mutual connections. Suggest warm intro.
Write: the agent acts
#sales-ops (continued)
S
Route those 12 hot webinar leads to the SDR team and make sure Marcus knows about the Acme re-engagement.
A
Confirm 5 write actions across 3 systems
1. HubSpot: Move 12 contacts to "Sales Ready," create follow-up tasks (4 SDRs, 3 each)
2. Salesforce: Create opportunity for Rachel Torres (DataFlow)
3. Salesforce: Add webinar touchpoint to Acme Corp deal + task for Marcus
4. Slack: DM each SDR with lead assignments + talking points
✓ HubSpot: 12 contacts → Sales Ready, tasks created
✓ Salesforce: opportunity + touchpoint + task for Marcus
✓ Slack: DMs sent to 4 SDRs with personalized talking points
The platform view
Admin UI → Costs
$12
/month
340 sessions · 8 users
$0.036 per session
Model Arena: switch pipeline-review to Haiku, save $1.80/mo
Admin UI → Knowledge Proposals
Agent discovered:
"Deals silent 14+ days in Negotiation close at 8% vs 34% baseline."

3 systems. 5 write actions confirmed. $12/month. The agent learns which deals stall, which reps need coaching, and which verticals convert faster. Session 200 is materially better than session 1.Full tutorial →

2

Threat Investigation

8 systems → alert enrichment, containment, escalation, on-call management

# 8 connections, 1 skill, 1 automation
$ amodal connect crowdstrike splunk okta active-directory
$ amodal connect virustotal jira slack pagerduty
✓ 8 systems connected. 237 endpoints available.
$ amodal install skill threat-investigation  ✓ v1.0.0
$ amodal install automation alert-enrichment  ✓ trigger: PagerDuty webhook
Read: 2:14am alert → enriched briefing in 30 seconds
#soc-alerts — 2:14 AM
P
ALERT: Suspicious PowerShell execution on WORKSTATION-47
A
Queried: 8 systems, 4 parallel task agents, 2.8s
HIGHInvestigate immediately
PowerShell downloaded unsigned binary from Cobalt Strike C2 IP. User logged in from Singapore (impossible travel from SF). Finance share enumerated but not accessed.
Timeline
1:58 AM — Okta login from Singapore (impossible travel)
2:08 AM — PowerShell download + execute
2:12 AM — Outbound C2 connection
2:14 AM — CrowdStrike detection
CrowdStrike: unsigned binary, no prior detections
Okta: impossible travel, SF → Singapore
VirusTotal: 7/87 vendors flag IP, Cobalt Strike C2
Write: the analyst contains it in 5 minutes
#soc-alerts — 2:19-2:42 AM
2:19Isolate WORKSTATION-47CrowdStrike
2:21Disable Marcus's Okta + clear 3 sessionsOkta
2:23Create P1 incident + page Jake (2nd analyst)PagerDuty + Jira
2:35Draft executive summary for CISOSlack
2:40Reschedule Jake's morning shift → Dana coversPagerDuty + Slack
2:45Update Jira with full resolutionJira
7 write actions across 5 systems. All human-confirmed. Detection to containment: 5 minutes. Full incident: 31 minutes. Cost: $0.018.
The platform view
Session Replay — INC-892
0.0s Skill: threat-investigation activated
0.2s Dispatch: 4 parallel task agents
2.8s Agent: timeline + enrichment + recommendations
Cost $0.018 (4 task agents + correlation)
Knowledge Proposals
3 proposals from INC-892:
• C2 IP → threat intel blocklist
• DNS-only ad network hits = LOW severity
• Impossible travel + PowerShell = CRITICAL

8 systems. 7 write actions. 31 minutes from alert to resolution. Without the agent: 20 minutes of tab-switching before the analyst starts thinking. $34/month for 89 investigations. 80:1 ROI.Full tutorial →

Same pattern, every domain

Connect systems. Write a skill as markdown. The agent reads, reasons, and acts. These are two examples. The pattern works everywhere:

Finance

Expense anomaly detection, vendor reconciliation, month-end automation

NetSuite + Stripe
HR

Onboarding coordination, benefits tracking, new hire readiness

BambooHR + Jira
Compliance

Contract review against regulatory checklists, clause extraction

DocuSign + SharePoint
Customer Success

Churn detection, renewal prep, usage-based health scoring

Mixpanel + HubSpot
Marketing

Campaign attribution, lead scoring, budget reallocation

HubSpot + Google Ads + GA
Meetings

Auto-generated agendas, action extraction, follow-up dispatch

Calendar + Zoom + Linear
IT Ops

Incident triage, alert enrichment, runbook automation

PagerDuty + Datadog
Legal

Contract clause comparison, risk scoring, approval routing

DocuSign + Slack

Full tutorials: Sales Ops · Security · Marketing · Meetings · ISV Embedded

AdvancedThe ISV Path: B2B2B
E

ISV Embedded Agent

Multi-Tenant Intelligence Inside Your Product

The difference

The use cases above are internal agents: one company, one team, one tenant. The ISV path is different: a software company embeds Amodal inside their product so their customers get AI features. Three parties: us → ISV → their customers.

This is the original B2B2B vision from the spec. It's not the entry point anymore; it's the enterprise expansion. But it's where the hardest technical problems live, and where the platform's depth becomes a genuine moat.

What's unique to this path
  • -Multi-tenancy. Each of the ISV's customers is a separate tenant with isolated data, credentials, and knowledge. Customer A's data never leaks to Customer B.
  • -Field-level access control. The ISV's API returns full records, but the agent only sees what the end user is authorized to see. SSNs get scrubbed. Financial data gets scoped. This is JSON-level security enforced by the runtime, not the LLM.
  • -Per-tenant knowledge. Each customer accumulates their own learned patterns, baselines, and history. The ISV deploys one agent definition. Each customer's instance gets smarter for them.
  • -White-label. End users never see Amodal. The ISV uses @amodalai/react components to build AI features that look native to their product.
  • -Self-hosted runtime option. For ISVs with compliance requirements, the runtime can run in their infrastructure. Model calls go ISV → provider directly.
Example: Procore (construction management)

Procore manages construction projects: budgets, schedules, RFIs, change orders, daily logs. Their board asks "where's our AI story?" Building in-house would take a year and an ML team. With Amodal:

  • -Procore's dev team writes skills: budget-variance.md, schedule-risk.md, rfi-triage.md
  • -Connects their own API. The agent reads projects, budgets, schedules, change orders
  • -Each Procore customer (Turner Construction, Skanska, etc.) gets their own tenant with isolated data, isolated knowledge, isolated learning
  • -A project manager at Turner asks "what's at risk this week?" inside Procore's UI. They see a native Procore feature, not an Amodal product
Why this is the enterprise tier

Internal agents are single-tenant: one set of credentials, one knowledge base, one team. ISV agents are multi-tenant. The hard problems are data isolation, per-customer learning, field-level scrubbing, and white-labeling. These are platform features that no OSS runtime provides. This is where $100K+ contracts live, and where the technical moat is deepest.

What We Built

Four pieces. The developer experience: a CLI where you connect systems and write skills as markdown in a git repo. The registry: community packages for connections and skills — install what others built, override what's specific to you. The install flow: one command connects a system, runs auth, and gives the agent access + understanding. The platform: an admin UI where non-developers edit skills, track costs, and review the agent's learning. Here's each piece.

The Developer Experience

A developer connects systems, writes skills as markdown, and deploys. The agent runs. That's the whole product from the developer's perspective. Here's what the repo looks like:

Your repo contains the domain-specific parts: skills (methodology), connections (system access), and knowledge (your org's context). Everything else is the platform.

# Your repo
.amodal/
config.json # model, provider, API keys
channels.json # where the agent is available
connections/
salesforce.json # CRM access
jira.json # ticket system
slack.json # team comms
skills/
deal-triage.md # how to evaluate a deal
ticket-routing.md # how to route support tickets
knowledge/
sales-playbook.md # company-specific context
sla-rules.md # business rules
evals/
triage-accuracy.yaml # does it triage correctly?
# channels.json
{
  "slack": { "workspace": "acme", "channels": ["#sales-ops"] },
  "teams": { "tenant": "acme.onmicrosoft.com" },
  "web":   { "subdomain": "sales-agent" }
}
You write
Amodal provides
Connections (credentials + API docs)
Secret management, .env locally, encrypted in platform
Skills (methodology as markdown)
Reasoning engine that follows them
Knowledge (context as markdown)
On-demand loading, learning flywheel
Channels config
Slack/Teams/WhatsApp/web integrations
Evals
CI quality gates, regression detection
git push
Hosting, scaling, zero-downtime deploys
Conversation history per user
Admin dashboard (usage, costs, sessions)
Access control (who sees what)
Observability (is it working well?)
Model experiments (cheaper model?)

The Package Manager

Every developer ecosystem eventually gets a package manager. Node got npm. Python got pip. Rust got Cargo. Infrastructure got Terraform providers.

AI agents don't have one. There's no standard way to connect a system, share a skill, or version an automation. Every team reinvents the wiring from scratch. amodal connect and amodal install are the missing pieces.

Ecosystem
Package Manager
Packages
Node
npm
Libraries
Python
pip
Libraries
Rust
cargo
Crates
Infrastructure
terraform
Providers
AI Agents
amodal
Connections + Skills + Automations

Each agent is a project

# Org: Acme Corp
@acme/
sales-ops ← agent
support-triage ← agent
compliance-check ← agent
finance-reconcile ← agent
incident-response ← agent
Shared: connections, skills, knowledge
# .amodal/packages.lock — like package-lock.json for agents
{
  "lockVersion": 1,
  "packages": {
    "connection/salesforce": {
      "version": "2.1.0",
      "resolved": "registry.amodalai.com/..."
    },
    "connection/slack": {
      "version": "1.4.0",
      "resolved": "registry.amodalai.com/..."
    },
    "skill/deal-triage": {
      "version": "1.2.0",
      "resolved": "registry.amodalai.com/..."
    }
  }
}

Shared connections = one OAuth flow, not five. Shared skills = methodology propagates across every agent in the org.

The friction we're erasing

Today
  • 1.Write OAuth client for Salesforce
  • 2.Store and refresh tokens securely
  • 3.Build HTTP client with retries and rate limits
  • 4.Teach the model your API schema (prompt engineering)
  • 5.Handle pagination, errors, edge cases
  • 6.Repeat for every system

~2 weeks per system, minimum

amodal install
  • 1.OAuth flow runs in the CLI
  • 2.Credentials stored in .env (gitignored)
  • 3.API docs loaded from the package into context
  • 4.Rate limits and pagination handled
  • 5.30 seconds, done

Same result. No code.

First-party connections cover the top 50 SaaS APIs. Community covers the long tail. Custom handles proprietary systems.

Technical InsightOur own registry

We run an npm-compatible registry at registry.amodalai.com. Standard npm protocol, so existing tooling (npm, yarn, pnpm) works out of the box. But we own the namespace, the metadata, and the experience.

# Resolution chain
$ amodal install skill deal-triage@1.2.0
→ registry.amodalai.com/@amodalai/skill-deal-triage@1.2.0
# Org-private
$ amodal install skill deal-triage --org
→ registry.amodalai.com/@acme/skill-deal-triage@latest

Why not just use npm directly?

npm (tenant on someone else's infra)
registry.amodalai.com (ours)
Subject to npm ToS and rate limits
Our rules, our rate limits
No custom metadata on packages
Verified badges, install counts, ratings, categories
npmjs.com search (generic)
Marketplace UI with domain-specific browse/filter
Private packages via npm Orgs ($7/user/mo)
Org-private via registry ACLs (included)
No control over namespace policy
We validate package structure on publish
Download stats are npm's data
Our data: installs, active agents, usage patterns

What we get for free from npm compatibility

Capability
How
Package hosting + CDN
Verdaccio + S3 + Cloudflare
Semver resolution
node-semver (battle-tested, standard)
Lockfile
packages.lock (custom format, committed to git)
Token-based auth
CLI-managed tokens, standard npm auth protocol
Deterministic installs
Lock file pins exact versions
Existing tooling compatibility
Any npm client can point at our registry

npm-compatible protocol. Standard tooling works. We own the namespace, the data, and the experience. Infra cost: a single container + S3 for tarballs.

The network effect

  1. 1.Every first-party connection is a force multiplier. We maintain auth + docs for the top 50 SaaS APIs. Each one unlocks new use cases without customer effort.
  2. 2.Community covers the long tail. Skills are markdown, not code. Domain experts author them, not engineers. The barrier to contribute is a pull request.
  3. 3.The catalog compounds. Terraform launched with 20 providers. Community built 3,000+. The same dynamics apply when the unit of sharing is a skill, connection, or automation.

The Install Experience

Wiring up an agent to your systems today means writing API clients, managing OAuth flows, storing secrets, and teaching the model your API schema. Every connection is a weekend project.

amodal connect slack does all three in one command: runs the OAuth flow, stores credentials in .env, and loads API docs from the package. The agent gets access and understanding.

$ amodal --help
init Create a new agent project
dev Start local dev server with hot reload
connect Install + auth + verify a connection
install Install a skill, automation, or knowledge package
uninstall Remove an installed package
create Scaffold a new skill, automation, or tool template
publish Publish to registry.amodalai.com
update Update packages (within major version)
validate Validate repo including resolved packages
test Run evals locally
deploy Deploy to Amodal Cloud
Four commands matter most: connect, install, create, publish.
Connection

System access + understanding

OAuth flow + credentials stored + API docs auto-populate KB. The agent can reach the system and knows how to use it.

$ amodal connect salesforce
Skill

Expert methodology as markdown

How to think about a class of problem. Model-agnostic. Works with any provider. Domain experts author them, not engineers.

$ amodal install skill deal-triage@1.2.0
Automation

Prompt + schedule + output channel

The reasoning engine runs on a schedule or trigger. Same skills, same connections, unattended.

$ amodal install automation weekly-pipeline-review
Tool Template

Guarded write actions

Pre-built write operations with confirmation rules, rate limits, and audit logging.

$ amodal install tool create-jira-ticket
# Project after amodal connect + install
your-agent/
.amodal/
config.json
packages.lock # committed to git
packages/ # gitignored cache
connection--salesforce/
connection--slack/
skill--deal-triage/
connections/ # only if you override
salesforce/
surface.md # import: salesforce
rules.md # import: salesforce
skills/ # only if you override
deal-triage/
SKILL.md # import: deal-triage
.env # credentials, gitignored
# .amodal/packages.lock — committed to git
{
  "lockVersion": 1,
  "packages": {
    "connection/salesforce": {
      "version": "2.1.0",
      "resolved": "registry.amodalai.com/..."
    },
    "connection/slack": {
      "version": "1.3.0",
      "resolved": "registry.amodalai.com/..."
    },
    "skill/deal-triage": {
      "version": "2.0.1",
      "resolved": "registry.amodalai.com/..."
    }
  }
}
Packages are a gitignored cache. Override files live in your repo. Everything you didn't override comes from the package.

What a connection actually does

A connection is more than credentials. Each package contains five files: spec.json (API config + auth), surface.md (curated endpoints), access.json (field restrictions + confirmation tiers), entities.md (what the data means), rules.md (API best practices). Override only what's specific to you.

First-party
Community
Custom
We maintain auth + docs
Community publishes
You provide everything
Real OAuth flows
API key or token auth
Any auth method
API docs always current
Author-maintained docs
Your docs, your schema
Salesforce, Slack, Datadog, Jira, Stripe, NetSuite...
Long-tail SaaS, internal tools
Proprietary APIs

From local to marketplace

  1. 1.Custom: Lives in your repo. Works for your agent.
  2. 2.Org-private: amodal publish --org. Shared across your company's agents.
  3. 3.Community: amodal publish --public. Available to everyone. Skills are markdown, so domain experts author them, not engineers.

Start custom. Publish to your org. Then to the community.

The Admin UI marketplace calls the same install APIs. CLI and UI are views of the same state. amodal connect slack in the terminal is the same as clicking "Connect" in the browser.

The Platform

The CLI is the developer experience. The platform is the team experience: admin UI for non-developers, observability for ops, session replay for quality, and cost management for finance. This is what teams pay for.

Agent Registry

Central view of every agent in the org: health, cost, sessions, last deploy. The ops team's home screen.

8
agents
$47/mo
cost
94.7%
eval
1.2K
sessions
sales-ops
$12/mo · 94% · 340 sessions
compliance
$8/mo · 97% · 210 sessions
support
$18/mo · 91% · 480 sessions
finance
paused
Session Replay

Full conversation replay with timestamped tool calls, skill activations, and per-session cost. See exactly why the agent said what it said.

Session: "Check Q1 deal pipeline"
Conversation
User
Check Q1 deal pipeline...
Agent
I found 3 deals at risk
Tool: request
GET /deals?quarter=Q1
Skill Trace
deal-triage
loaded: playbook
tools: salesforce
confidence: 94%
knowledge loaded
sales-playbook.md
Cost: $0.003Duration: 8sModel: Sonnet
Model Arena

Side-by-side model comparison per skill. See cost vs quality tradeoffs and swap models with one click. The agent tells you where you're overpaying.

Query
"Triage these 5 deals and rank by likelihood to close this quarter"
Run All
Sonnet
Deal A: 92%
Deal C: 87%
Deal B: 78%
Quality
GPT-4o
Deal A: 88%
Deal C: 85%
Deal B: 80%
Quality
Haiku
Deal C: 90%
Deal A: 85%
Deal B: 76%
Quality
Cost Comparison
ModelCostTokensQuality
Sonnet$0.0081,24794%
GPT-4o$0.0121,18091%
Haiku$0.0011,31087%
Haiku scores within 7% at 1/8 cost
Observability Dashboard

Cost per agent, per skill, per session. Token usage trends, error rates, and model cost optimization suggestions.

Cost by Agent
sales-ops
$12
compliance
$8
support
$18
Eval Score Trend
94.7%
stable over 30d
Alerts
compliance eval drop
switch model suggestion
Eval Dashboard

Per-skill accuracy tracking over time. Regression detection linked to specific commits. CI integration blocks deploys when quality drops.

SkillPassScoreTrend
deal-triage31/3296.8%stable
compliance-check47/4799.2%stable
ticket-routing28/3093.3%regression
expense-anomaly19/2095.0%improved
Regression detected: ticket-routing
Score dropped 93.3% → 88.1%
Since: commit abc123 (Mar 14)
View diffRun eval
Knowledge Management

The agent proposes what it learned. Admins approve, reject, or edit. Auto-approve policies per category. The knowledge base compounds with use.

Proposals: 3 pending
A
Agent proposes: new pattern
"Quarterly revenue spikes on the 15th are normal — payroll processing date"
Source: session #1,247 (compliance) · Category: baselines
ApproveEditReject
Documents: 24 total
methodology (6)patterns (8)baselines (4)procedures (3)history (3)
Why We Win

The model is not the moat. Configuration is. First: even a perfect model needs your methodology, your access rules, your knowledge, and your guardrails. That need grows as models get smarter. Second: point solutions are creating the same silo problem SaaS created a decade ago. One platform that crosses every domain beats ten tools that each own one. Third: the OSS CLI is free forever. The next hundred AI agent companies build on our format instead of from scratch. The ecosystem compounds. The marketplace is the moat.

25 Years of Orchestration (and Why Every Solution Was Partial)

The need for orchestration didn't appear overnight. It grew alongside the SaaS stack itself. More tools meant more integration work. Every generation of orchestration solved one slice of the problem and left the rest. Understanding this history is understanding why Amodal exists.

The orchestration timeline
2000s
SaaS explosion
Salesforce, HubSpot, Jira, Okta, Stripe, Datadog. Companies go from 5 tools to 100+. Each great in isolation. The work happens between them.
2011
Simple automation
Zapier, IFTTT. 'If this, then that.' Connect two tools with a trigger and an action. Cross-domain but can't reason, branch, or handle complexity.
2014
SOAR
Phantom, Demisto. Complex multi-system playbooks for security. Splunk acquires Phantom ($350M). Palo Alto acquires Demisto ($560M). Breakthrough, but security-only.
2016-22
Domain silos
Every department builds its own: Salesforce Flows, PagerDuty Event Orchestration, GitHub Actions, Marketo programs. Same orchestration pattern reinvented per vertical. None cross domains.
2023
AI agents (v1)
LLMs add reasoning. 7AI (60 security agents), Luthor (compliance), Dropzone (investigation). Solves SOAR's rigidity problem but repeats its silo problem: one vertical per vendor.
2026
Domain-agnostic AI orchestration
One platform, any domain. Skills as markdown (not rigid playbooks). Connections as config (not proprietary adapters). Knowledge that compounds (not static rules). Cross-domain by design.

The pattern that keeps repeating

Tools proliferate. Manual integration becomes unbearable. Someone builds an orchestration layer for one domain. It gets acquired. Other domains build their own. The orchestration tools themselves become part of the sprawl. Repeat.

The cycle breaks when the orchestration layer is domain-agnostic. Zapier was cross-domain but too simple for real workflows. SOAR was complex enough but locked to security. AI agent point solutions added reasoning but stayed domain-locked.

The missing piece: complex, reasoning-capable orchestration that works in any domain. That's the gap. The SOC analyst and the RevOps manager have the same structural problem (too many systems, too much manual cross-referencing, not enough time). They just need different skills and different connections. The runtime is the same.

Why Configuration Beats Intelligence

Models get smarter every quarter. GPT-3 to GPT-4 to Claude 3 to Claude 4 to whatever ships next month. Every AI startup built on a model gap is on borrowed time. If your product is "we make the model do X better," the model provider will ship that feature eventually. Chat wrappers, RAG pipelines, prompt chains, agent loops. All on the roadmap. All getting eaten.

Amodal isn't built on a model gap. It's built on a configuration gap. Even a model that knows everything still needs to be told what to do, how to do it, what it's allowed to do, and what your specific business looks like. That's not intelligence. That's configuration. And it's orthogonal to how smart the model is.

Core ArgumentWhat even a perfect model still needs

Imagine a model that scores perfectly on every benchmark. It knows every API, every framework, every domain. It still can't do your job without the following:

1

Your methodology (Skills)

Not because the model can't reason, but because your process is specific. "How we triage deals at Acme" isn't something Claude will ever learn from pretraining. Your sales cycle is 45 days for mid-market, 90 for enterprise. Deals go stale at different rates per stage. Enterprise deals get 2x thresholds. A decision maker must be involved by Proposal stage. None of this is in the training data. Even if it were, it would be your competitor's version, not yours.

This is what skills encode. Methodology as markdown. The agent follows your framework, not a generic one.

2

Your system access (Connections)

Not because the model can't call APIs, but because auth, rate limits, endpoint curation, and access control are deployment-specific. Claude knowing the Salesforce API schema doesn't mean it has your OAuth tokens. It doesn't know which 5 of 47 endpoints matter to your sales team. It doesn't know your instance URL, your custom fields, or your rate limit quota.

This is what connections encode. Auth + curated endpoints + entity descriptions. The agent has access and understanding, scoped to your deployment.

3

Your private data (Knowledge)

Not because the model is dumb, but because your data is private. Your baselines ("normal login volume is 2,000-3,000 per day, spikes above 5,000 are anomalous"). Your patterns ("this vendor always submits invoices late in Q4"). Your false positives ("the 2am activity in Zone B is a scheduled maintenance script, not an intruder"). Your team's escalation paths, your org chart, your on-call rotation.

This is what the knowledge base encodes. Context that makes the agent specific to your organization. It compounds with use: every session can propose updates.

4

Your guardrails (Rules & Access)

Even a model that "knows everything" needs to be told what it's allowed to do. Field-level access control: the agent can read opportunity amounts but never expose Acme_Margin__c to anyone below VP. Confirmation tiers: writes to production require human review. Rate limits: no more than 100 API calls per minute. PII handling: email addresses are role-gated, phone numbers are never retrieved.

This is policy, not intelligence. A smarter model doesn't make guardrails less important. It makes them more important, because a smarter model can do more damage when misconfigured.

5

Your presentation (Output & Brand)

How results are presented. Which widgets render (entity cards, timelines, score breakdowns). What language to use ("formal for compliance reports, conversational for Slack"). What the agent's personality is. What gets emphasized in a summary vs. buried in a detail panel. This is UX and brand. It changes per customer, per channel, per audience.

A model can generate any output format. But which format, for which audience, in which context is a design decision that lives in configuration.

CounterintuitiveSmarter models need more configuration, not less

This is the part most people get wrong. The assumption is that as models get smarter, you need less tooling around them. The opposite is true.

  • -More capabilities = more to govern. A model that can only read data needs simple guardrails. A model that can read, write, delete, send emails, create Jira tickets, and update CRM records needs a comprehensive policy layer. Every new capability is a new surface area for misconfiguration.
  • -More intelligence = more context required. A smarter model can do more with the right context. But "the right context" is your specific sales process, your specific API endpoints, your specific compliance requirements. The model doesn't come with this. You configure it. The smarter the model, the more valuable precise configuration becomes.
  • -More adoption = more diversity of use. When every team in the company has an agent, the configuration surface explodes. Sales ops wants deal triage with their pipeline stages. Finance wants reconciliation with their chart of accounts. HR wants onboarding with their specific policies. Same runtime, different configuration. This is the Terraform dynamic: one tool, infinite configurations.

Point Solutions Are the New SaaS Sprawl

Every vertical is getting its own AI agent tool. 7AI for SOC ($36M Series A, 60+ purpose-built agents). Luthor for marketing compliance. Gong + Clari for revenue intelligence. Dropzone for investigation. Radiant for triage. The CISO buys one, the VP Sales buys another, the CCO buys a third.

Same data silos, different decade. The SOC agent can't tell the compliance team about an incident. The sales agent can't check marketing attribution. The compliance agent can't verify the SOC's access controls. Each tool connects to its own set of systems with its own credentials, its own dashboards, its own knowledge that doesn't compound across the org.

We've proven across 8 verticals (security, sales, marketing, compliance, HR, finance, ops, ISV) that one platform handles all of them. Same runtime. Same skill format. Same connection pattern. The SOC analyst writes a triage skill. The sales manager writes a deal review skill. The compliance officer writes a regulatory monitor skill. Different domain expertise, identical infrastructure.

The cross-domain advantage

Real work crosses org boundaries. An incident creates compliance obligations. A hot lead needs marketing attribution. A renewal risk needs support context. Point solutions can't cross domains. A general-purpose platform handles the full chain because every team shares the same connections.

Shared connection
Used by
Cross-domain value
Okta
SOC + Compliance + HR
SOC suspends user → Compliance logs evidence → HR notified
Jira
SOC + Compliance + Eng
Vuln found → SOC ticket → Compliance SLA tracking → Eng fixes
Slack
Every team
One alert channel per domain, all from the same agent platform
HubSpot
Marketing + Sales + SDR
Lead scored → Marketing attributes → Sales inspects → SDR follows up
CloudTrail
SOC + Compliance
SOC investigates → Compliance uses same logs for audit evidence

The OSS Flywheel

The CLI is free and open source. That's not a leak. It's the strategy.

1
Dev discovers CLI
Finds us on GitHub, HN, or a tutorial. Installs in 30 seconds. Builds their first agent.
2
Dev writes a skill
Encodes their team's methodology as a SKILL.md file. Tests it locally. It works.
3
Dev publishes to registry
Their threat triage skill is useful. They publish it. Other teams find it and install it.
4
Registry grows
50 skills become 200. 20 connections become 100. New users find solutions that already exist.
5
Dev's company scales
3 teams using the CLI. Need multi-tenant, admin UI, managed hosting, audit. They buy the platform.

This is the Terraform / Docker / Elastic playbook. Give away the runtime. Charge for the enterprise wrapper. Own the ecosystem. Every free CLI user is a potential marketplace contributor AND a potential platform customer. The more people use the free tool, the more valuable the paid platform becomes.

The Marketplace Is the Moat

Models commoditize. Runtimes commoditize. What doesn't commoditize:

  • 1.A registry of domain-specific skills written by practitioners. The best SOC analyst's triage methodology. The best sales manager's deal review framework. Published, versioned, installable, customizable. 500 skills created by people who actually do the work.
  • 2.A library of maintained connections with curated endpoints, entity descriptions, and access rules. Not raw API specs. Opinionated documentation that tells the agent what the data means and how to use it responsibly.
  • 3.An install-and-customize model where every new deployment starts from the last person's work instead of zero. Install the community deal-triage skill. Add your specific thresholds. The community updates the base. Your overrides stay. Session 51 is faster than session 1. Deployment 100 is faster than deployment 1.
  • 4.Compounding organizational knowledge. Every company that runs Amodal builds a knowledge base of their baselines, false positives, patterns, and procedures. This is institutional memory that makes switching costs real and makes the agent more valuable every month.

A competitor can clone the runtime (it's open source). They can't clone the marketplace. They can't clone 500 practitioner-written skills. They can't clone the knowledge base every customer has built over 6 months of use. Network effects compound. That's the moat.

"I Have MCP. Why Do I Need Amodal?"

MCP (Model Context Protocol) is a protocol for connecting models to tools. It's plumbing. It solves "how does the model call an API." It does not solve:

Which endpoints to use

MCP gives the model access to every endpoint. Amodal curates the surface: 5 of 47 Salesforce endpoints, with guidance on each.

What the data means

MCP returns raw JSON. Amodal provides entity descriptions: what an Opportunity is, what stages mean, what custom fields track.

What the agent is allowed to do

MCP has no access policies. Amodal has field-level restrictions, confirmation tiers, and tightening-only overrides.

How the agent should think

MCP has no skills. Amodal skills encode methodology: 'how we triage deals,' 'how we investigate alerts.'

What the agent has learned

MCP has no knowledge base. Amodal's KB compounds with use: false positives, baselines, patterns.

How to package and share

MCP has no registry. Amodal packages are versioned, installable, overridable, and community-maintained.

MCP is one of the 5 files in an Amodal connection — it's the transport layer in spec.json. We could literally use MCP as the API call mechanism. It's complementary, not competitive. MCP connects the model to the API. Amodal tells the model what to do with it.

Becoming the Standard

Configuration matters. But lots of companies could build a configuration layer. The question is: why does ours become the standard? Three reasons: we're not a thin wrapper (the format is right), the infrastructure precedent proves the model works, and the open ecosystem compounds in a way that closed products can't match.

DefensibilityWhy Amodal isn't a thin wrapper

Most AI startups are building features that the model providers will eventually ship. Chat interfaces. RAG pipelines. Prompt chains. Agent loops. These are all on Anthropic's and OpenAI's roadmaps. They'll get eaten. Here's why Amodal won't:

Thin wrappers (will get eaten)
Configuration layers (won't get eaten)
Chat UI on top of an API
Methodology frameworks scoped to your process
RAG pipeline that chunks and retrieves
Curated connection packages with auth + endpoints + entities
Prompt chain that calls tools
Tenant-specific knowledge that compounds with use
Agent loop with retries
Field-level access policies and confirmation tiers
Model fine-tuning service
Marketplace of community skills, connections, automations
Embedding + vector search
Override model: install a package, customize only what's specific to you

Anthropic doesn't want to manage your Salesforce OAuth tokens. OpenAI doesn't want to curate your endpoint surface. Google doesn't want to enforce your field-level access policies or learn your deal triage methodology. That's not their business.

Just like npm doesn't compete with Node.js. Node.js is the runtime. npm is the packaging layer that makes Node.js useful in production. The runtime providers don't eat the packaging layer. They need it.

The infrastructure precedent

Every major infrastructure shift follows the same pattern: the core technology commoditizes, and the configuration/packaging layer becomes the durable business.

Core technology
Configuration layer
What happened
Cloud VMs (AWS, GCP, Azure)
Terraform
Terraform didn't get eaten by AWS. It became how you configure AWS.
Node.js runtime
npm
npm didn't get eaten by Node. It became how you distribute Node packages.
Container runtime (Docker)
Kubernetes + Helm
K8s didn't get eaten by Docker. It became how you orchestrate containers.
Linux kernel
Package managers (apt, yum)
apt didn't get eaten by Linux. It became how you configure Linux.
LLMs (Claude, GPT, Gemini, Llama)
Amodal
The agent runtime won't get eaten by the models. It's how you configure them.

The engine doesn't eat the packaging. It needs it. The model providers need a configuration standard more than anyone, because without one, every customer reinvents the same wiring.

The EndgameBecoming the standard

This is the real play. Amodal isn't trying to be the best AI product. It's trying to be the standard way agents get configured. An open-source specification that the industry converges on.

  • -Skills are markdown files. Not a proprietary format. Not a DSL. Not a SDK. Markdown with frontmatter. Any developer can read, write, and version them. Domain experts who aren't engineers can author them. This is what makes it a standard, not a product: the format is obvious and unowned.
  • -Connections are JSON + markdown. Five files per connection, each with a clear purpose (spec, surface, access, entities, rules) and well-defined merge semantics. Any runtime can implement the resolution logic. The format is the standard. Our runtime is one implementation.
  • -The configuration lives in git. Not in a vendor's database. Not in a UI-only format. In a repo you own, with a lock file you commit, and override files that are plain text. If Amodal disappeared tomorrow, your configuration is still a readable directory of markdown and JSON files.
  • -The runtime is open source. 90% of the code that resolves packages, merges overrides, runs the ReAct loop, manages context, and dispatches task agents is Apache 2.0. Anyone can implement a compatible runtime. The standard is not locked to our implementation.

When the industry converges on a configuration standard for AI agents (and it will, because the alternative is every team reinventing the same wiring forever), the question is whether it converges on Amodal's format or someone else's. Open source is how you win that race. You don't win standards by keeping them proprietary. You win by making them so obvious and accessible that everyone adopts them, and then you build the best platform on top.

Terraform won by being the open standard for infrastructure-as-code. HashiCorp made money on the platform (Terraform Cloud), not the format. That's the Amodal play: own the format, monetize the platform.

Why We WinDomain expertise as community packages

Every vertical has the same problem: domain-specific knowledge locked inside closed products. CrowdStrike has proprietary threat intel baked into Charlotte AI. Salesforce has proprietary deal-scoring models. ServiceNow has proprietary workflow intelligence. You can't inspect it, contribute to it, or port it.

Amodal flips this. Domain expertise is distributed as open, versioned packages on the registry. The security community publishes threat intel, investigation skills, and false positive patterns. The finance community publishes reconciliation skills and anomaly detection rules. The sales community publishes deal triage methodologies. All markdown. All inspectable. All composable.

Domain
Closed approach
Amodal approach
Security
CrowdStrike trains Charlotte AI on proprietary analyst decisions. You can't see or modify the intelligence.
Community publishes MITRE ATT&CK, false positive patterns, IR procedures, threat intel IOCs as versioned packages. You install, override, contribute.
Sales
Salesforce Einstein uses proprietary scoring models. You can't change the methodology.
Community publishes deal-triage, pipeline-review skills as markdown. Your VP of Sales edits them in the admin UI.
Finance
NetSuite/SAP build anomaly detection into the ERP. Opaque, vendor-controlled.
Community publishes expense-anomaly, reconciliation skills. Your controller customizes thresholds.
IT Ops
PagerDuty/Datadog build AI triage into their platforms. Locked to their data.
Community publishes incident-triage skills. Your platform team connects 8 systems and the agent sees across all of them.

The compounding dynamic is the key. A SOC lead at Company A discovers a new false positive pattern, publishes it to the registry, and 500 other SOCs get it on their next amodal update. A sales ops team at Company B refines a deal-triage skill after 6 months of use, publishes it, and every other sales team benefits. Every customer makes every other customer's agent smarter. This is the network effect that closed AI products can never replicate.

  • -Closed AI vendors hire domain experts to build intelligence into the product. That's expensive and doesn't scale. CrowdStrike has ~200 elite analysts. The global security community has millions of practitioners. Same asymmetry in every vertical.
  • -The community will always outpace any single vendor's team. This is the Terraform provider story again. HashiCorp didn't build 3,000 providers. The community did. We don't need to build security expertise, finance expertise, or sales ops expertise. The practitioners in those fields do. We build the packaging layer. They bring the knowledge.
  • -The override model preserves proprietary advantage. Community packages handle the 90% that's universal across every SOC, every sales team, every finance department. Your overrides handle the 10% that's specific to your org. Install the base, customize what's yours. Your competitors install the same base packages but their overrides are different. The community knowledge is shared. The competitive advantage is in the overrides.

This is why Amodal wins long-term. Not because we have better AI. Not because we have better domain expertise. Because we have a packaging layer that lets the world's domain experts distribute their knowledge as installable, versioned, overridable markdown files. The compound interest of community contribution is unbeatable by any single vendor's team.

The Counterintuitive BetWhy the next 7AI builds on us for free (and why that's how we win)

7AI raised $36M to build 60+ purpose-built security agents from scratch. Their own runtime, their own integrations, their own methodology. That took years and millions of dollars. A hundred more companies will attempt the same thing across every vertical: AI agents for compliance, for revenue ops, for HR, for finance, for customer success.

The question: do they build from scratch, or do they build on Amodal?

If we charge them a platform tax
  • They evaluate Amodal vs building their own
  • They see the tax on every customer they serve
  • They have VC money, so they build their own runtime
  • We get zero from them: no ecosystem contribution, no skills published, no format adoption
  • Every point solution makes the same calculation
  • Nobody builds on us. The format stays niche.
If the CLI is free forever
  • They evaluate Amodal vs building from scratch
  • CLI is Apache 2.0. Free. No tax. No strings.
  • They build their "60 agents" as Amodal skills. Ship in weeks, not years.
  • Their customers use our skill format. Connections are interoperable.
  • When customers want cross-domain (security + compliance), their skills work alongside others
  • The format becomes the standard. The ecosystem compounds.

We don't make money from the next 7AI directly. We make money because they proved our format works for security, which makes the next company choose our format for compliance, which makes the next company choose it for finance. Each company that builds on the free CLI is a format adoption event that grows the ecosystem for everyone, including our paying platform customers.

What we give away vs what we charge for
Free forever (Apache 2.0)
  • CLI runtime (ReAct loop, tools, skills, context management)
  • The skill / connection / automation format
  • Public registry (read and publish)
  • Self-hosting your own agent
  • Local development and testing
Platform (paid)
  • Multi-tenant hosting and isolation
  • Admin UI (marketplace management, KB review, team config)
  • Chat widget for embedding in SaaS products
  • Enterprise auth (SSO, RBAC, audit logs)
  • Managed marketplace curation and support
  • Automations infrastructure (scheduling, webhooks)

The builder who uses the free CLI to create a compliance agent product is doing us a favor. They validate the format. They publish connections. They grow the ecosystem. Their enterprise customers eventually need multi-tenant hosting, admin governance, and managed infrastructure. That's when they buy the platform, or their customers do.

This is the dynamic that made Kubernetes win. Google gave away the orchestrator. Every cloud provider built managed K8s on top (EKS, GKE, AKS). The ecosystem of Helm charts, operators, and CNCF projects compounded. Nobody paid Google for K8s itself. But K8s became the standard, and the entire cloud-native ecosystem grew around it.

We want a hundred companies building on our free CLI. Not because we're generous. Because each one that does makes the format more standard, the registry more valuable, and the platform more essential. The revenue comes from the ecosystem, not the runtime.

The Proven Playbook

The packaging layer for a new infrastructure category has produced multi-billion dollar outcomes three times in the last decade. Each time, the pattern is the same: an open-source CLI that developers love, a platform that teams pay for, and a community ecosystem that compounds.

AI agents are the next infrastructure category. The model providers build the engines. Amodal builds the packaging layer.

Terraform

Why developers want this

Terraform won because developers wanted infrastructure as code. Amodal is Terraform for AI agents. The repo is the source of truth.

Terraform
Amodal
.tf files describe infrastructure
.md + .json files describe an agent
terraform plan shows what will change
amodal eval --diff shows quality impact
terraform apply provisions resources
amodal deploy deploys the agent
State managed by Terraform Cloud
Runtime managed by Amodal platform
HCL is declarative, not imperative
Skills are methodology, not code
Vercel

What you get when you deploy

You git push and get a working deployment with hosting, analytics, and zero infrastructure management.

Vercel
Amodal
git push = deployed website
git push = deployed agent
Preview deployments
Preview agents (eval before promote)
Analytics dashboard
Observability dashboard
Edge functions
Multi-channel delivery (Slack, Teams, web)
Framework-agnostic
Provider-agnostic (OpenAI, Anthropic, etc.)
Free tier = Team = Enterprise
Free tier = Team = Business = Enterprise
GitHub

The OSS boundary

git is OSS and fully functional. Almost nobody uses git without GitHub. The UI is the moat.

GitHub
Amodal
git CLI (OSS, runs anywhere)
amodal CLI + runtime (OSS, runs anywhere)
Local repo works for one person
Local agent works for hacking
GitHub adds: PRs, Actions, permissions
Amodal adds: dashboard, evals UI, observability
Free tier includes UI with limits
Free tier includes UI with limits
Pay for private repos, team features
Pay for more agents, sessions, team features
CAN use git without GitHub. Nobody does.
CAN run agents without platform. Nobody should.
The Business

The runtime is open source. The platform is paid. Below: where exactly we draw that line and why, the pricing table, how model costs work (managed keys vs BYOK), the viral mechanics that spread agents inside companies, the market size, and how we compare to companies that ran this playbook before us.

Free vs Paid

The runtime is open source. A developer can build and run a production agent without ever creating an Amodal account. The platform is what teams pay for: the capabilities that make agents manageable, observable, and improvable at scale.

Free (OSS runtime)

  • CLI: init, dev, connect, install, build, serve, eval, publish
  • Local chat UI with hot reload
  • Full runtime: skills, connections, knowledge, task agents
  • Community packages from registry
  • Local eval suite (pass/fail)
  • Self-host on Docker, Railway, any cloud
  • Knowledge proposals via CLI

Fully functional. Zero platform dependency. Forever.

Paid (platform)

  • + Admin UI: edit skills in a browser, no git required
  • + Session replay: see exactly what the agent did and why
  • + Observability: cost per session, per agent, per skill
  • + Eval dashboard: regression detection, CI gates, baselines
  • + Model Arena: cost vs quality optimization per skill
  • + Team: roles, SSO, audit logging
  • + Deploy: managed hosting, rollback, environments
  • + Multi-tenant: ISV isolation, white-label

The capabilities that don't exist in the OSS.

Why teams upgrade

A developer builds an agent with the free CLI. It works. They show it to their team. The team asks:

?"How much is this costing us?"
?"Is it actually answering correctly?"
?"Can I see what it's been telling people?"
?"The VP wants to edit the playbook without using git"
?"Can we deploy to staging first?"
?"Can the finance team get one too?"

Every one of these requires the platform. The developer already built something they care about. The platform is the answer to their team's questions, not a sales pitch.

Pricing

Two line items. Platform fee (flat or per-seat) covers the platform: admin UI, observability, evals, Model Arena, session replay, knowledge management, team features. Inference (usage-based) covers model API calls at a transparent usage-based rate. Customers see dollars per agent in the dashboard, not tokens.

Four options. OSS is the free self-hosted path. Solo ($20/mo) for one developer deploying. Pro ($199/mo + $20/user) for teams. Enterprise for large orgs and ISVs.

OSS (free)Solo — $20/moPro — $199/moEnterprise
Platform feeFree$20/mo$199/moCustom
Users15 included, $20/user afterVolume pricing
AgentsUnlimitedUnlimitedUnlimitedUnlimited
InferenceYour keysManaged (usage-based)Managed (usage-based)BYOK or managed
HostingSelf-hosted (Docker)ManagedManagedManaged or self-hosted
Admin UIFullFull + review modeFull + white-label
ObservabilityFull (cost, replay, alerts)FullFull + custom
EvalsCLI onlyDashboard + CI gatesDashboard + CI gatesDashboard + SLA
Model ArenaYesYesYes
Knowledge learningCLI proposalsUI + auto-approveUI + auto-approveUI + policies + API
TeamRoles, shared sessionsSSO, audit logging
Multi-tenant (ISV)Yes
SupportCommunityEmailEmailDedicated

What the customer sees in the dashboard

This month
Platform fee$199.00
Inference$47.23
deal-triage (Haiku)$18.40
threat-investigator (Sonnet)$22.10
pipeline-review automation (Haiku)$6.73
Total$246.23
💡 Model Arena: switch deal-triage Q&A to Haiku. Save ~$8/mo.

Dollars, not tokens. Per-agent breakdown. Model Arena suggests optimizations. The customer controls their inference spend by choosing models per skill. BYOK drops inference to $0 — they pay providers directly.

Revenue by customer type

CustomerTierPlatformInferenceTotal
Solo dev, 5 agentsSolo$20~$40~$60/mo
5-person team, 5 agentsPro$199~$80~$279/mo
10-person team, 8 agentsPro$299~$150~$449/mo
20-person team, 15 agentsPro$499~$300~$799/mo
50-person dept (BYOK)Enterprise~$2K$0~$2K/mo
ISV, 1,000 tenantsEnterprise~$3KPer-tenant~$4-5K/mo

Pro: $199 base includes 5 users. $20/user after that. 10-person team = $199 + (5 × $20) = $299. Agents unlimited on all paid tiers. Inference scales with usage.

ISV / Enterprise pricing elements

ISVs embedding agents in their product have different pricing dimensions than self-serve teams. Each element is negotiable. This is the menu:

ElementWhat it coversStraw man price
Base platformMulti-tenant isolation, white-label, deployment infra, registry access$2,000/mo
Per-tenant feeIsolated data, credentials, knowledge base, session history per customer$1/tenant/mo
InferenceModel API calls across all tenants (managed at markup or BYOK)Usage-based or BYOK
ISV seatsInternal team: developers, admins, ops, product managers$20/seat/mo
SSO + auditSAML/OIDC, audit logging, compliance exports$500/mo
Dedicated supportSlack channel, SLA, named account manager$500/mo
Self-hosted runtimeRuntime runs in ISV infrastructure, snapshots from platform$1,000/mo
Custom SLAUptime guarantee, response time commitmentsNegotiated

Worked example: CaseFlow (1,000 tenants)

CaseFlow is a B2B case management SaaS embedding an AI assistant for their customers.

Line itemCalculationMonthly
Base platformMulti-tenant, white-label$2,000
1,000 tenants1,000 × $1/tenant$1,000
Inference (managed)~14K sessions × ~$0.015/session + markup$273
5 ISV seats5 × $20/seat$100
SSO + auditFlat$500
CaseFlow pays Amodal$3,873/mo
Annual~$46K/yr
CaseFlow's ROI
CaseFlow charges customers$10/mo AI add-on × 1,000 = $10,000/mo
CaseFlow pays Amodal$3,873/mo
CaseFlow's margin on AI feature$6,127/mo (61%)

CaseFlow makes $73K/yr profit on AI features. We make $46K/yr from one ISV at ~88% gross margin.

Unit economics

Inference passthrough is a convenience revenue stream, not our product. The customer pays model providers through us (managed) or directly (BYOK). We keep the markup as revenue. Our actual product revenue is the platform fee. COGS is the infrastructure to run the platform.

Cost itemWhat it isSoloPro 10Ent.
Runtime computeReAct loop, tool call execution, context management$3$15$40
Session storageConversation history, replay data, knowledge proposals$1$5$15
ObservabilityCost tracking, session indexing, eval processing$0.50$3$10
Snapshots + deliveryS3 storage, config resolution$0.10$0.50$2
Platform infraVercel, Postgres, Verdaccio (amortized)$2$5$10
SupportEmail (amortized), dedicated for enterprise$1$3$20
Total COGS~$8~$32~$97
Solo ($20/mo)
Platform fee$20
Inference markup~$10
Revenue$30
COGS-$8
Gross profit$22
Margin73%
Pro, 10 users ($299/mo)
Platform fee ($199 + 5×$20)$299
Inference markup~$45
Revenue$344
COGS-$32
Gross profit$312
Margin91%
Enterprise, BYOK ($3K/mo)
Platform fee (custom)$3,000
Inference markup$0 (BYOK)
Revenue$3,000
COGS-$97
Gross profit$2,903
Margin97%

Blended gross margin: ~80-85% across the customer base. Comps: HashiCorp 80%, GitLab 89%, Datadog 78%. Inference markup is pure gravy — essentially 100% margin on the spread.

Key insight: inference passthrough is not our COGS. It's a convenience revenue stream. The customer pays Anthropic/OpenAI through us and we keep the markup. If they go BYOK, that revenue disappears but our margin goes UP because our actual product (the platform) is ~97% margin at enterprise scale. The Model Arena accelerates BYOK adoption by showing customers they can optimize model selection — which is good for them and good for us.

What the customer pays for inference

Inference is usage-based and transparent. The customer sees per-agent cost in the dashboard. Here's what typical usage looks like across the use cases:

AgentUsage patternCustomer pays
Deal triage~20 queries/day, mostly Haiku, Sonnet for deep analysis$18/mo
Threat investigator~3 investigations/day, Sonnet + 4 task agents each$34/mo
Marketing ops~10 queries/day + weekly automation, mixed models$45/mo
Meeting ops~8 meetings/day with pre+post automations, Haiku$18/mo
Pipeline reviewWeekly automation, Haiku$4/mo

A Pro customer with all 5 agents: $299 platform + ~$119 inference = ~$418/mo total. The agents save the team an estimated 20+ hours per week. At $50/hr fully loaded, that's $4,000/mo in time savings. 10:1 ROI.

Architecture note

Our costs do not scale with agent count. An agent is a configuration (a 200-500KB JSON snapshot in S3), not a running process. The hosted runtime is a single server process that handles all agents for all customers. Adding agent #51 costs essentially zero until someone sends it a message. Costs scale with concurrent sessions (compute) and inference volume (model API calls) — both of which the customer pays for via the inference markup. This is why we can offer unlimited agents on all paid tiers without margin risk.

The Model Layer

Skills are markdown: methodology, not code. The same skill works on Claude, GPT-4, Gemini, Llama, or any model the runtime supports. This separation is the foundation of the model strategy.

Managed Keys

Sign up, start building. We provide API keys to every supported model.

  • -Instant access to Claude, GPT-4, Gemini, Llama, Mistral. No separate accounts, no provider negotiations, no billing relationships to manage.
  • -We bill usage with ~20% markup. Simple, predictable.
  • -Test any model on any skill without signing up anywhere. The Arena just works.
BYOK

Plug in your Anthropic/OpenAI/Google keys. You pay providers directly at your negotiated rates.

  • -Platform fee only from us. We orchestrate, route, observe, but don't touch inference billing.
  • -Many enterprises already have $50K+/yr committed with Anthropic or OpenAI. BYOK means the platform adds value without adding model cost.
  • -Mix modes: managed keys for experimentation (try new models), BYOK for production workloads (your negotiated rates).
Model Arena

Run the same eval suite across models. See cost vs quality vs latency per skill.

  • -“Haiku scores within 7% of Sonnet on deal-triage at 1/8th the cost.” Data, not guesses.
  • -One-click model swap per skill. No skill rewrite needed (they're markdown).
  • -Per-skill routing: Opus for complex reasoning, Haiku for routine triage, GPT-4 for specific domains. All in the same agent.
  • -With managed keys: test models you don't even have accounts for. With BYOK: optimize spend on models you already pay for.

How it works together

  1. 1.Start on managed keys. Instant access to every model, zero setup
  2. 2.Build skills, deploy agent, team starts using it
  3. 3.Model Arena shows which skills run fine on cheaper models
  4. 4.Optimize: swap expensive models where quality holds. Save 60-80% on some skills
  5. 5.Volume grows → switch production workloads to BYOK (keep your enterprise rates)
  6. 6.Arena keeps optimizing. When new models drop, it tests them against your evals automatically

Managed keys = model margin (like Vercel capturing compute). Good early revenue, zero friction.

BYOK = pure platform margin. Higher-value customers, stickier.

Model Arena drives value in both: saves managed customers money (trust), helps BYOK customers optimize (indispensable).

We don't care which model wins. We care that customers keep optimizing, and they need the platform to do it.

The Viral Loop

Five mechanics that make a single user want to invite coworkers, and make the product more valuable with every person added.

1

The Slack channel IS the distribution

  • -Developer deploys agent to #sales-ops
  • -Agent posts Monday pipeline summary to the whole channel
  • -Everyone sees value → they @mention the agent with their own questions
  • -10 people using it without individually onboarding

This is how Slack itself spread.

2

Shared knowledge compounds

  • -Sarah asks about a deal pattern, agent learns something
  • -Mike's next session is smarter without him doing anything
  • -"Based on a pattern identified previously, deals like this one typically..."

You WANT coworkers using it because their sessions improve yours.

3

Shareable findings

  • -Agent surfaces something interesting → share a conversation link with a coworker
  • -Coworker clicks, sees analysis, can continue the conversation
  • -"Hey look what the agent found about the Acme renewal" → coworker clicks → "I should ask about my accounts too"
4

The agent tags people

  • -Agent flags 3 deals at risk, knows who owns them
  • -"Deal X (@sarah) — no activity 18 days. Deal Y (@mike) — champion went dark."
  • -Sarah and Mike need access because the agent is surfacing work FOR them specifically
5

Team activity creates FOMO

  • -"Your team asked the agent 47 questions this week. Top topics: pipeline review, deal risk, competitor analysis."
  • -If you're the one person NOT using it, you feel behind
All of these mechanics require the platform: shared knowledge, team sessions, Slack channels, shareable links. The collaborative features ARE the upgrade path.

TAM

Two markets. The entry point is internal agents (any team at any company). The expansion is ISV embedded (SaaS companies adding AI to their products). Both are massive.

Internal agents (B2B)

$1.8B+mid-case ARR

~500K companies with 50+ employees globally

2-5 developers per company who build internal tools

$50-500/month per agent (usage-based)

5-20 agents per company at scale (sales, security, finance, HR, marketing, meetings...)

Bottom-up, self-serve. Developer finds us, builds an agent, team adopts, company pays.

ISV embedded (B2B2B)

$3.6B+mid-case ARR

~50K SaaS companies with 100+ employees

40% will embed AI by 2027 (Gartner) = 20K addressable

$10K-100K/year per ISV (platform fee + per-tenant usage)

Multi-tenant, white-label, field-level access control

Enterprise sales motion. Longer cycles, higher ACV. ISV's board asks "where's our AI story?"

Scenario
Conservative
Mid
Bull
Internal agents (B2B)
$120M
$1.8B
$14.4B
ISV embedded (B2B2B)
$250M
$3.6B
$18B
Combined
$370M
$5.4B
$32B

Comps Summary

Four companies built the same pattern (OSS CLI + paid platform + community ecosystem) in adjacent domains. Each is a multi-billion dollar outcome.

Company
Strategy
Moat
Outcome
Terraform
CLI open, UI proprietary
Team state management, Sentinel policies
$6.4B acquisition (IBM)
Databricks
Spark open, workspace proprietary
Unity Catalog, managed notebooks
$43B valuation
MongoDB
DB engine open, Atlas proprietary
Managed ops at scale, Atlas Search
$15B market cap
Confluent
Kafka open, Cloud proprietary
Schema Registry, managed clusters
$8B market cap
GitLab
Core open, enterprise features paid
Security scanning, compliance, analytics
$600M+ ARR
Grafana
UI open, backends proprietary
Backend operations at scale
$6B valuation
Supabase
Almost everything open incl. dashboard
Managed hosting, DX, brand trust, team features
$2B valuation
Vercel
Next.js open, platform proprietary
Hosting, preview deploys, analytics
$3.5B valuation

Risks and Moat

An honest assessment. What could kill us, what protects us, and when the moat becomes real.

The Bear CaseWon't the model providers just build this?

Anthropic ships MCP, tool use, and a deployment platform. OpenAI has GPTs with actions. Google has extensions. They have the models, the distribution, and the cash. Why wouldn't they keep building until they cover everything Amodal does?

Partially right. The model providers WILL keep building up the stack. MCP is real. Tool use is real. Some of what Amodal does today will become a commodity feature within 18 months. That's the landscape.

The Bull CaseThree structural reasons it doesn't kill us
  • 1.Model providers don't want to be vendor-neutral. Anthropic will never build great connectors to OpenAI's models. Each provider's tooling locks you into their ecosystem. Amodal is model-agnostic: same skill works on Claude, GPT-4, Gemini, Llama. The Model Arena lets you swap models per skill. No provider will build this because it undermines their lock-in. AWS built CloudFormation. Google built Deployment Manager. Neither built the multi-cloud tool. Terraform did.
  • 2.Model providers don't want to manage your domain config. Anthropic doesn't want to maintain a Salesforce connection package with 47 curated endpoints and field-level access rules. They don't want to host a registry of community investigation skills. They build general-purpose capabilities (tool use, MCP). The domain-specific packaging layer is a different business. npm doesn't compete with Node.js.
  • 3.The ecosystem moat kicks in before they catch up. If we get to 500 community packages before a provider ships a competing packaging layer, switching costs are real. Not because of lock-in (everything is open) but because of network effects: every package has been tested by hundreds of users and refined through community PRs. Rebuilding that ecosystem from scratch takes years. Terraform had 20 providers at launch. By the time AWS could have competed, Terraform had 3,000. The window closed.

The honest timeline

Period
Moat
Why
Months 0-12
Vulnerable
Small ecosystem, no network effects. A model provider announcement could kill momentum. This is the race.
Months 12-24
Defensible
200+ packages, active community, reference customers. Even if Anthropic announces 'Claude Agent Platform,' the ecosystem switching cost is real.
Months 24+
Strong
Convention is established. Skills-as-markdown is what developers know. Changing standards is harder than building features.

What should actually worry you

Not the model providers. They're building down the stack (better models, better tool use). We're building up the stack (packaging, deployment, observability). Different layers.

The real risk is another open-source agent framework that nails the conventions AND the ecosystem simultaneously. LangChain has distribution but terrible conventions (code-heavy, not config-driven). CrewAI has a simpler model but no packaging layer. If someone forks the open-source runtime, defines better conventions, and builds community faster — that's the threat.

Our moat is the ecosystem, not the runtime. The runtime is open source specifically so the ecosystem grows faster. The race is to 500 packages and an established convention. After that, the switching cost is the ecosystem, not the code.

Execution

The customer journey from discovery to paid. The 6 GTM motions we'll run. Channel-by-channel playbooks (Twitter, YouTube, conferences, DevRel, community, demos). The content marketing plan. And the 24-week build plan with milestones.

GTM Flywheel

The flywheel

1Developer finds Amodal CLI on GitHub / Hacker News / Twitter / a blog post
2npx amodal init. Has a working agent in 30 minutes locally
3Connects to Amodal Platform (free tier). Gets dashboard, conversation history, observability
4Deploys for their team. Slack bot + web chat, team starts using it
5Team uses it daily, becomes dependent
6Developer builds more agents for other teams
7Company hits usage/governance limits → paid tier
8Developer becomes internal champion

Step 3 is critical. The platform needs to be so obviously valuable at the free tier that skipping it feels like using git without GitHub.

Launch sequence

1
Open source the runtime
GitHub repo with great README. The folder convention is the hook. People understand it instantly.
2
Ship the platform with free tier
Dashboard, conversation history, basic observability, one agent. amodal deploy gives you a URL + Slack bot + dashboard.
3
Build 3-5 reference repos
amodal/sales-ops, amodal/compliance-check, amodal/support-triage, amodal/security-hunt, amodal/finance-reconcile. Each is forkable and working.
4
Content: viral demos
"I built X in 30 minutes with markdown." Screen recordings of init → write skills → deploy → team uses it.
5
Developer community
Marketplace of community-contributed skills, connections, knowledge templates. The Terraform/Vercel ecosystem play.

GTM Motions

The flywheel describes the customer journey. This section describes what we do as a team to make it spin.

1

Open source launch

Phases 0-3 (Week 1-5) · Engineering + content

  • -Ship the OSS runtime on GitHub with a great README. The folder convention is the hook; people get it instantly
  • -npx amodal init must produce a working agent in under 30 minutes. This is the "hello world" moment
  • -Publish 5 reference repos: amodal/sales-ops, amodal/compliance-check, amodal/support-triage, amodal/security-hunt, amodal/finance-reconcile. Each forkable, each working
  • -Hacker News launch post: "Show HN: Terraform for AI Agents — configure agents with a git repo of markdown"
  • -Target: 1K GitHub stars in first week, 50 developers with working local agents by month 2

Success metric: developers fork a reference repo, customize it, and have a working agent without ever talking to us.

2

Platform with free tier

Phases 4-7 (Week 5-13) · Engineering + design

  • -Ship amodal deploy. One command gives you a hosted agent with Slack bot + web chat + admin dashboard
  • -Free tier: 1 agent, 1K sessions/mo, full dashboard, full observability. Generous enough that skipping it feels like using git without GitHub
  • -Admin UI for non-developers: edit skills, manage knowledge, approve learning proposals. The GitBook experience
  • -Session replay, cost tracking, eval scores. The observability layer that makes it a product, not a hack
  • -Target: 30% of OSS users connect to the platform within first week of use

Success metric: developers who connect to the platform never disconnect. The dashboard becomes the daily driver.

3

Content machine: viral demos

Starts Week 3 (after first reference repo) · Founder-led content

  • -"I built a sales ops agent in 30 minutes with markdown." Screen recordings of init → write skills → deploy → team uses it in Slack
  • -One video per use case: sales ops, incident response, compliance, finance, HR, customer success. Six videos that show 6 different teams
  • -Blog posts that double as tutorials: "How to build an incident response agent that learns your baselines"
  • -Twitter/X threads breaking down the Terraform analogy, the OSS boundary strategy, the learning flywheel
  • -Conference talks: "Why we open sourced 90% of our agent runtime and charge for a dashboard"

Success metric: each demo video drives 100+ GitHub stars and 20+ new platform signups within a week.

4

Developer community + marketplace

Phases 11-12 (Week 19-24) · Community + partnerships

  • -Discord community for builders: skill sharing, connection templates, troubleshooting
  • -Marketplace of community-contributed skills and connection templates. The Terraform ecosystem play
  • -Partner with SaaS companies to build first-party connections: "Official Salesforce connection for Amodal." They get API adoption, we get distribution
  • -"Built with Amodal" showcase: highlight production agents that teams actually use daily
  • -Hackathons: "Build an agent for your team in a weekend." The best ones get featured

Success metric: community-contributed skills outnumber first-party skills 3:1 by month 6.

5

Enterprise + ISV outbound

After Phase 10 (Week 19+) · Sales + founder-led

  • -Identify companies where a developer already has a working agent on the free tier. They're the warmest leads
  • -Reach out to the developer's manager: "Your team is already using Amodal. Here's what the Business tier adds for your organization"
  • -ISV outbound to vertical SaaS companies whose boards are asking "where's our AI story?" Procore, Veeva, Toast, AppFolio
  • -The pitch: "Your developers write skills in markdown. Your customers get AI features. We handle multi-tenancy, isolation, and observability."
  • -Target: 3 paying enterprise accounts by month 6, 1 ISV pilot

Success metric: enterprise deals close because the developer is already a champion, not because we convinced a CTO cold.

6

Team: who we need

Ongoing · Hiring priorities

  • -Founding engineer (platform). Builds the admin UI, observability dashboard, Model Arena, and evals infrastructure
  • -Founding engineer (runtime). Ships the OSS CLI, runtime, channel adapters, and reference repos
  • -Developer advocate / content. Demo videos, blog posts, conference talks, community management. This person is half the GTM.
  • -Design. The admin UI and platform screens need to be beautiful. The dashboard is the product; it has to feel premium.

Channel Playbooks

GTM Motions describes what we do. This section describes how we do it, channel by channel: concrete actions, cadence, KPIs, and evidence from companies that executed well.

1

Twitter / X

Founder-led · starts day 1

  • -Founder-led technical threads, not a brand account. Authentic voice, real engineering decisions, behind-the-scenes builds.
  • -Retweet every user who builds something with Amodal. Screenshot their project, quote-tweet with context. This is how Cursor grew.
  • -Video content dominates (80% of Twitter sessions). Screen recordings of agent sessions get 3-5x engagement over text.
  • -Bookmarks are an algorithmic signal. Threads that teach something bookmark-worthy get distributed by the algorithm.
Tactical detail →

Cadence: Daily presence (replies, quote-tweets). 2-3 original threads per week. One must be a "here's what I learned building X" thread.

Thread formats: (a) "I built X in 30 minutes" demo thread with video, (b) Terraform analogy breakdown, (c) user showcase retweet + commentary, (d) controversial take on agent frameworks.

KPIs: Followers (target 5K in 3 months), impressions per thread (target 50K), link clicks to GitHub/docs.

Reference: Cursor's founder threads drove early adoption. Supabase retweeted every user project. Both grew from zero to 10K+ followers in months through consistency, not campaigns.

2

YouTube

Two formats · starts week 3

  • -Two formats: short fast-paced demos (under 5 min) for discovery, long-form tutorials (20-30 min) for conversion.
  • -One video per use case: sales ops, incident response, compliance, finance, HR, customer success. Six videos that show six different teams.
  • -SEO-driven titles: "How to build a [use case] agent in 30 minutes." These rank for long-tail developer search.
  • -Creator partnerships with recognized technical voices. Give early access, not a script.
Tactical detail →

Cadence: 2 videos per month minimum. Alternate between short demos and long tutorials.

Production: Screen recording with voiceover, not talking head. Fast-paced editing (Fireship style for shorts). Show the terminal, the chat UI, the admin dashboard.

KPIs: Views per video (target 10K in first month), subscriber growth, click-through to GitHub/docs.

Reference: Supabase's YouTube channel became a primary acquisition channel. Cursor's demo videos drove viral Twitter threads that fed back into YouTube views.

3

Content / SEO / Launch Platforms

Highest leverage · starts week 1

  • -Show HN is the single highest-leverage launch event. Supabase went from 80 to 800 users overnight from one HN front page hit. Target: 10K-30K visitors, 1.5-2.5% conversion.
  • -Blog posts that double as tutorials. Every post: "How to [solve a real problem] with Amodal." Not "Announcing feature X."
  • -SEO long-tail beats broad terms. "How to build a sales ops agent" beats "AI agent platform." Write for the query the developer actually types.
  • -Multi-platform launches: HN + Product Hunt + Reddit r/programming + dev directories on the same day. Momentum compounds.
Tactical detail →

HN strategy: "Show HN" format, post 8-9am ET Tuesday-Thursday. Title must be technical and specific: "Show HN: Terraform for AI Agents -- configure agents with a git repo of markdown." Founder answers every comment personally. Have 3-4 people ready to ask genuine technical questions.

Blog cadence: 1 tutorial post per week. 1 architecture/philosophy post per month. Cross-post to dev.to, Hashnode, Medium.

SEO targets: "how to build [X] agent", "ai agent framework tutorial", "configure ai agent", "agent runtime open source."

KPIs: Organic traffic (target 20K/mo by month 6), HN upvotes (target front page), blog-to-signup conversion (target 3-5%).

Reference: PostHog built their entire early growth on content marketing. Supabase's HN launches were inflection points every time.

4

Conferences

Talks >> booths >> logos

  • -Speaking slots >> booth presence >> logo sponsorships. A 20-minute talk generates more qualified leads than a $20K booth.
  • -Target conferences: AI Engineer Summit, KubeCon, SaaStr, local meetups. Apply to speak at all of them.
  • -Plan a virtual flagship event by month 6. Vercel's Next.js Conf hit 80K registrations. The content becomes a permanent acquisition channel on YouTube.
  • -Every talk must include a live demo. "Let me build an agent right now" is the most compelling format.
Tactical detail →

Cadence: Apply to 2-3 conferences per quarter. Host 1 virtual meetup per month (Discord Stage Channel or Twitter Space).

Talk topics: (a) "Why we open sourced 90% of our agent runtime," (b) "Building agents with markdown, not code," (c) live demo: "I'll build a [audience-relevant] agent in 15 minutes."

KPIs: Talks accepted per quarter, GitHub stars within 48 hours of talk, post-talk signup spike.

Reference: Vercel's conference strategy made Next.js synonymous with React deployment. Tailwind CSS grew through conference demos that showed the product in action.

5

DevRel / Influencers

This person is half the GTM

  • -Hire DevRel early. Must be genuinely technical, not a salesperson. They should be building with the product daily and sharing what they learn.
  • -Trust comes from consistent engagement, not launch-only appearances. The DevRel person should be a known presence in communities weeks before any launch.
  • -Creator partnerships: newsletter writers (TLDR, Bytes), YouTube creators, Twitter builders. Give early access and a Zoom walkthrough, not a script.
  • -One person, three channels: writes the reference repos, records the demo videos, answers questions in Discord.
Tactical detail →

Hiring profile: Active GitHub, writes about technical topics, has a following (even small). Former Vercel/Supabase/Railway DevRel is the dream hire.

Creator outreach: Identify 20 creators with 10K-100K followers in the AI/dev tools space. Send early access + a Zoom walkthrough. No pitch deck.

KPIs: Creator mentions per month, community response time (under 2 hours), GitHub issues answered per week.

Reference: Supabase's Jon Meyers became the face of the product. Vercel's Lee Robinson is inseparable from Next.js. The person IS the brand.

6

Community

Discord as the hub · never go quiet

  • -Discord as the hub. Structured channels: #general, #showcase, #help, #feature-requests, #marketplace. GitHub-Discord integration for issue notifications.
  • -Stage Channels for live AMAs and build-alongs. Weekly "build an agent" sessions where the founder builds something live.
  • -Steady cadence: 1 content piece per week + 2 conversation starters. Never let the community go quiet for more than 48 hours.
  • -Every project a user builds becomes a template. Replit flywheel: usage creates content creates usage.
Tactical detail →

Pre-launch: Have 50 people in Discord before public launch. Friends, early testers, design partners. A quiet Discord on launch day is worse than no Discord.

Cadence: Monday: content drop. Wednesday: AMA or build session. Friday: showcase roundup. Daily: answer every question within 2 hours.

KPIs: Discord members (target 500 in month 1, 2K in month 3), messages per day, showcase submissions per week.

Reference: Cursor's Discord is where power users share prompts and techniques. It became a self-sustaining knowledge base that reduces support burden.

7

Demos

The demo IS the pitch

  • -Every interaction (conference talk, blog post, tweet, sales call) should culminate in showing the product live. The demo is the pitch.
  • -Three demo scripts: (a) "Zero to agent in 5 minutes" (init, write skill, chat), (b) "Connect your systems in 2 minutes" (connect flow), (c) "Deploy and share" (deploy, Slack bot, admin UI).
  • -Record every demo as a reusable asset. A live demo becomes a YouTube video becomes a GIF becomes a tweet.
  • -Keep a "demo environment" always warm with realistic data. Never demo with empty state or fake data.
Tactical detail →

Demo reliability: Test every demo path daily. Broken demos at conferences or in sales calls are catastrophic. Have an offline fallback recording for every live demo.

Personalization: For sales calls, pre-build a skill relevant to the prospect's domain. "I built a [their industry] agent before this call" is the most effective opener.

KPIs: Demo-to-signup conversion (target 30%+), time-to-first-value in demo (target under 5 minutes).

Anti-patternsWhat didn't work for others
  • -Paid ads for dev tools. PostHog: "very easy to waste money." Developers ignore ads. Organic content and word-of-mouth are 10x more effective per dollar. Supabase spends a few hundred dollars a month on ads.
  • -Aggressive paywalls. Gating features too early kills adoption. The free tier must be genuinely generous. Developers leave at the first paywall friction. FusionAuth: "don't try to force conversion."
  • -Hype messaging. "Revolutionary AI platform" means nothing to a developer. Show the terminal, show the code, show the result. Technical audiences punish vaporware publicly.
  • -Conference logo sponsorships without talks. A $15K logo on a banner generates zero qualified leads. If you can't get a speaking slot, spend the money on content instead.
  • -Single-channel strategies. No one channel is sufficient. HN drives a spike. Twitter sustains attention. YouTube converts. Discord retains. They compound together.
  • -Launch-only influencer partnerships. Paying for a tweet and disappearing generates vanity metrics but no sustained adoption. Creators need to actually use the product.
Evidence →

PostHog wrote publicly about wasting money on paid ads before finding product-market fit through content marketing. They now generate most leads from blog posts and word-of-mouth.

Multiple dev tool companies report that launch-only influencer partnerships (pay for a tweet, disappear) generate vanity metrics but no sustained adoption. The pattern: organic, authentic, technically deep content delivered consistently over months beats any campaign.

Cursor, Supabase, and Vercel all grew primarily through organic developer advocacy. Their paid marketing budgets at early stage were negligible. The product and content did the work.

Content Marketing

Channel Playbooks covers where we publish. This section covers what we publish: the narratives, frameworks, and content assets that position Amodal in the market.

Every piece of content serves a dual purpose: it educates the audience on a real problem and positions Amodal as the answer. No thought leadership for its own sake.

Core NarrativeBuild vs Buy AI

The single most important framing for our content. Every CTO and VP of Engineering is facing this decision right now. We own the framework, then position Amodal as the answer.

Option
Timeline
Pros
Cons
Build in-house
6-12 mo
Full control, deeply customized
Resource-intensive, diverts engineers from core product
Acquire a startup
12-24 mo
Acqui-hire talent + tech
Expensive, culturally complex, integration rarely smooth
No-code builders
1-3 mo
Low barrier, good for prototyping
Limited customization, can't support complex workflows
Embedded AI (Amodal)
Weeks
Fast to ship, doesn't consume your team
Some vendor dependency (we address this with open source)

"The question is no longer whether to add AI. It's how fast you can do it without breaking everything else."

How we use this framework →

This framework becomes the backbone of the webinar, the whitepaper, and at least 2 blog posts. It works because it's genuinely useful: engineering leaders need this analysis regardless of whether they choose Amodal.

The key: present all four options honestly, including cons for embedded AI. Technical audiences punish biased comparisons. When we acknowledge vendor dependency and counter with "90% open source, own your config in git," that builds more trust than pretending there are no tradeoffs.

Gartner validation: Gartner predicts embedded AI in cloud applications will drive 30% faster outcomes by 2028. 40% of enterprise apps will embed AI by 2027. These stats anchor the "why now" in every piece of content.

1

Webinar: "AI in Your Product: A No-BS Guide"

Flagship content asset · pre-launch

The anchor content piece. 45-minute webinar targeting CTOs and VPs of Engineering who have been handed an AI mandate from the business side. This is NOT a product pitch. It's a genuine analysis of the landscape that happens to position Amodal as the answer.

  • -Open with pressure stats. X% of SaaS companies shipped an AI feature in the last 12 months. AI-native competitors launch weekly. "Wait and see" is now competitive risk.
  • -Walk through the hard questions. Do you have the people? (3-6 months to hire senior ML.) What does done look like? What's the cost model? What's the risk tolerance for hallucinations?
  • -Present all four options honestly. Build, acquire, no-code, embedded. Pros and cons for each. This is where trust gets built.
  • -Close with a live demo. 10 minutes of "let me show you what embedded AI actually looks like." amodal connect, write a skill, chat with the agent.
Target audience & distribution →

Primary audience: CTOs and VPs of Engineering with an AI mandate from leadership. PMs prioritizing AI features against a packed roadmap. Founders of established SaaS companies competing with AI-native upstarts.

Distribution: LinkedIn promoted post (this is the one channel where paid works for B2B), newsletter sponsorships (TLDR, Pointer), cross-promotion with design partners.

Conversion: Recording becomes gated content (email for access). Webinar gets chopped into 5-6 short clips for Twitter/LinkedIn. The Q&A becomes a blog post.

Credibility moment: Reference 1-2 design partners by name (with permission). "We helped X ship AI features in under 10 days."

2

Whitepaper: Build, Buy, or Embed

Gated asset · lead generation

Same content as the webinar, deeper treatment. Sets the stage with "why now," breaks down engineering considerations, introduces embedded AI, and goes into Amodal detail. Anchored with Gartner and analyst stats for credibility.

  • -Gated download. Email for access. This is the primary lead-gen asset for enterprise outbound. Sales uses it as a leave-behind after first calls.
  • -SEO/AEO play. The whitepaper gets broken into 5-6 individual blog posts, each targeting a long-tail keyword. "Build vs buy AI," "embedded AI for SaaS," "how to add AI to your product."
  • -Analyst citations. Gartner: embedded AI in cloud ERP drives 30% faster financial close by 2028. 40% of enterprise apps will embed AI by 2027. These stats make the case for "why now."
Content breakdown →

Structure: (1) The AI imperative (stats, market pressure), (2) Key questions engineering teams should ask (people, timeline, cost, risk, data), (3) The four options (build, acquire, no-code, embedded), (4) What embedded AI actually is (definition, examples, what it's not), (5) How Amodal works (architecture, install flow, demo), (6) Getting started.

Blog derivatives: Each whitepaper section becomes a standalone blog post. Link them together as a series. Cross-post to dev.to, Hashnode, Medium for SEO reach.

Resources to cite: Gartner "Build, Buy, or Blend," Gartner "Emerging Tech: The Future of Embedded AI," FastCompany "Adoption is the Real Agentic AI Revolution."

3

Blog Series

SEO long-tail · weekly cadence

Every blog post answers a question a real person typed into Google. Tutorial format, not announcement format. Each post is a standalone piece that also points to Amodal as the way to actually do the thing.

Title
SEO target
Type
Build vs Buy AI: What Engineering Leaders Get Wrong
build vs buy ai
Framework
3 Must-Have AI Features for 2026
ai features 2026
Trends
Embedded AI 101: Features People Actually Pay For
embedded ai saas
Education
How to Price and Package AI in Your SaaS
ai pricing saas
Playbook
Create Intelligent Apps with Amodal (Tutorial)
build ai agent tutorial
Tutorial
How to Build a Sales Ops Agent in 30 Minutes
sales ops ai agent
Tutorial
How to Build an Incident Response Agent
incident response ai agent
Tutorial
Why We Open Sourced 90% of Our Agent Runtime
open source ai agent
Philosophy
The Terraform Model for AI Agents
terraform ai agents
Analogy
What Your AI Vendor Won't Tell You About Lock-in
ai vendor lock in
Trust
Publishing strategy →

Cadence: 1 post per week. Alternate between tutorials (hands-on, show code) and frameworks (analytical, build trust). Cross-post to dev.to, Hashnode, Medium within 48 hours.

Structure: Every post follows the same template: (1) The problem (2 paragraphs), (2) Why it's hard (the nuance most people miss), (3) How to solve it (with Amodal or without), (4) Try it yourself (link to docs/GitHub).

Derivatives: Each blog post spawns a Twitter thread (summary + link), a LinkedIn post (reframed for executives), and a short video (screen recording of the tutorial). One piece of content, four channels.

4

The ISV Narrative: "Embedded AI"

Enterprise positioning · outbound content

For ISVs (established SaaS companies adding AI), the framing is "embedded AI": AI capabilities integrated directly into their product, seamlessly, without the product team having to build models or infrastructure. The end user never knows it's Amodal underneath.

  • -What it is: AI that lives inside their product and feels like it was always there. Not a chatbot bolted on. Not a standalone tool users switch to.
  • -What it's not: A wrapper around ChatGPT. A no-code drag-and-drop builder. A "just add an API call" solution that leaves engineering holding the bag on auth, context, and reliability.
  • -Why it matters: It lets software companies deliver AI-powered experiences to their users without becoming AI companies themselves. Ship in weeks, not quarters.
  • -The fear we address: Every SaaS founder is watching AI-native competitors launch weekly. The window to act is compressing. "Wait and see" is now competitive risk.
Use cases for ISV content →

Project management tool: AI assistant that triages tickets, suggests assignees, drafts status updates. The PM never leaves the tool.

CRM: Smart summarization of deal history, automated next-step recommendations, churn risk scoring. All inside the existing UI.

Data platform: Natural language queries, automated anomaly explanations, report generation. The analyst types a question and gets an answer.

Content format: Case studies (once we have design partners), "before/after" comparisons, ROI calculators. This content targets VPs and C-suite, not developers.

5

Customer Discovery for Content

Design partners fuel the content engine

The best content comes from real customer conversations. Every design partner interaction should feed back into the content pipeline.

  • -Ask every design partner: What are the top most-requested AI features from your users? What are your primary challenges building AI into the product roadmap? What people do you need but can't hire?
  • -Turn answers into content. Their challenges become blog post topics. Their feature requests become use case demos. Their hiring gaps become the "build vs buy" argument.
  • -Quote them (with permission). "We helped [Company] ship AI features in under 10 days" is the single most powerful sentence in any piece of content we produce.

First 90 days content calendar

Timing
Asset
Purpose
Pre-launch
"Build vs Buy AI" blog post
SEO + establish the framework before anyone knows us
Pre-launch
"Why We Open Sourced 90%" blog post
HN bait + trust signal
Launch week
Show HN + Product Hunt + Reddit
Spike: 10K-30K visitors, 1.5-2.5% conversion
Week 2
Webinar recording (live or pre-recorded)
Gated asset + email list + LinkedIn distribution
Week 3
Whitepaper (PDF)
Enterprise outbound leave-behind + gated download
Week 4-6
3 tutorial blog posts
SEO long-tail: "how to build X agent"
Week 6-8
2 use case demo videos (YouTube)
YouTube SEO + tweet/embed assets
Week 8-10
ISV case study (design partner)
Enterprise credibility + outbound collateral
Week 10-12
"Embedded AI 101" blog series (3 parts)
Whitepaper derivatives + SEO
Ongoing
1 blog post per week + Twitter thread
Sustain organic traffic + social presence

Every asset feeds the next. The webinar becomes the whitepaper. The whitepaper becomes blog posts. Blog posts become Twitter threads. Customer quotes from design partners anchor all of it.

8

Paid Media & Press Releases

Selective spend · mostly for AI SEO (AEO)

Most paid ads don't work for dev tools. But three channels are worth paying for, and press releases have become an underpriced asset for a new reason: AI search engines (Perplexity, Google AI Overviews, ChatGPT search) pull from the same authoritative sources that press wires feed into.

Press Releases (AI SEO / AEO)

  • -The play: A press release on PR Newswire or Business Wire gets indexed by news aggregators, picked up by trade publications, and enters the corpus that AI systems cite. When someone asks Perplexity "what are the best AI agent platforms," you want Amodal in the sources it pulls from.
  • -Not for human readers. Nobody reads press releases directly. The value is the citation graph: PR Newswire distributes to 4,500+ newsrooms and websites. These get indexed by Google News, Apple News, and the AI crawlers. One release seeds dozens of authoritative sources.
  • -Timing: One release per major milestone. OSS launch, first design partner win, funding announcement, marketplace launch. 4-6 releases in the first year.
  • -Cost: $500-1,500 per release on PR Newswire (US distribution). $2,500-4,000 for global. Cheap for the long-tail SEO/AEO value.

The two paid channels that work

LinkedIn Promoted Posts
  • -The one channel where paid B2B works. Targeting: CTOs, VPs of Eng at SaaS companies (50-500 employees).
  • -Use for webinar promotion and whitepaper downloads. Not for product pitches.
  • -Budget: $1,000-2,000/mo. Measure cost-per-lead, not impressions.
Newsletter Sponsorships
  • -TLDR, Pointer, Bytes, The Pragmatic Engineer, Console.dev. These feel like curated recommendations, not ads.
  • -$500-2,000 per placement. High-intent developer audience who opted in.
  • -Best for launch week and major releases. Include a "try it now" link, not a landing page.

What NOT to pay for

  • ×Twitter/X ads. Developers scroll past them. Organic threads outperform paid by 10x.
  • ×Reddit ads. The community actively downvotes sponsored posts in r/programming.
  • ×Google Display ads. Banner blindness is universal for technical audiences.
  • ×Generic programmatic ads. PostHog, Supabase, and others all report wasting money here before cutting it.
PR Newswire details →

PR Newswire distribution: US1 package ($575) covers all major US newsrooms + AP, Reuters, AFP feeds. US2 ($1,275) adds regional targeting and trade publications. Global ($2,500-4,000) adds international wire services.

AEO optimization: Include specific product claims, metrics, and quotes that AI systems can extract. "Amodal is an open-source agent runtime that lets developers configure AI agents with a git repo of markdown files" is better than "Amodal announces innovative AI platform." AI search engines prefer factual, extractable statements.

Business Wire alternative: More expensive ($800-2,000 for US) but stronger pickup by financial and enterprise trade publications. Use for funding announcements. PR Newswire for product launches.

Measurement: Track pickup count (aim for 50+ sites), Google News indexing (within 24 hours), and long-tail: does "Amodal AI agent platform" start appearing in AI search results within 2-4 weeks?

Google Ads (maybe later): High-intent keywords like "ai agent platform" and "build vs buy ai" can work once the landing page converts well and you have social proof. Not at launch. Too expensive to learn with when you don't yet know your conversion funnel.

The Build Plan

24 weeks to full platform. But the first demo moment (a working CLI) ships in week 2. Revenue-capable (team + billing) by week 19. Every phase produces something you can show.

Two parallel tracks converge at deploy

P0Package the OSS CLI
P1Local Dev Server + Chat UI
P2First Reference Repos + Eval
P3Channel Adapters
P4amodal deploy + Platform Auth
P5Admin UI: Core Editing
P6Session Replay + Observability
P7Chat in Admin UI + Knowledge Learning
P8Eval Dashboard
P9Model Arena
P10Team + Billing
P11Reference Repos + Community
P12Marketplace + Enterprise

Runtime Track

Founding Eng #1
0

Package the OSS CLI

Week 1-2

Already built: Core runtime (packages/core), CLI (packages/cli), server (packages/server) all exist and work.

  • -npx amodal init scaffolding, config schema (.amodal/, connections/, skills/, knowledge/, evals/)
  • -Package existing core runtime for registry distribution
  • -Stand up registry.amodalai.com (Verdaccio + S3). Publish first reference package. Establish the registry pattern.
  • -README / LICENSE
Demo moment: Developer runs one command, gets a project skeleton
1

Local Dev Server + Chat UI

Week 2-3

Already built: Chat widget (packages/chat-widget) and server with SSE streaming already exist.

  • -amodal dev with file watcher + hot reload
  • -Local chat UI (React on localhost, sidebar + chat area)
  • -Skill hot reload, connection loading
Demo moment: Developer writes a skill, chats locally, edits skill, sees change instantly
2

First Reference Repos + Eval

Week 3-4
  • -amodal/sales-ops repo (forkable, working)
  • -amodal eval (YAML test cases, pass/fail), eval format spec
  • -Second repo: amodal/incident-response
Demo moment: “I forked this repo, changed 2 lines, had a working agent in 20 minutes”
3

Channel Adapters

Week 4-5
  • -Slack adapter (@mentions, DMs, threads)
  • -Web chat adapter (standalone/embed)
  • -channels.json declarative config, adapter plugin interface
Demo moment: Agent answering questions in a real Slack channel

The Bridge

Both Engineers
4

amodal deploy + Platform Auth

Week 5-7

Already built: Platform API (packages/platform-api) with CRUD, KB, version management exists. Admin UI (packages/admin-ui) has Supabase auth.

  • -Push config to platform → hosted URL
  • -Supabase auth (signup, org, API key), tenant provisioning
  • -Free tier enforcement (1 agent, 1K sessions)
  • -Managed Slack bot provisioning
  • -BYOK key upload vs managed keys toggle
Demo moment: git push → team has Slack bot + web chat + dashboard URL

Platform Track

Founding Eng #2
5

Admin UI: Core Editing

Week 7-9

Already built: Admin UI with auth, knowledge management, and sessions already exists.

  • -Skill editor (rich text, WYSIWYG, no markdown syntax)
  • -Knowledge doc management
  • -Connection management (credential forms, test connection)
  • -Git sync: UI edits → repo, repo changes → UI
Demo moment: VP of Sales edits deal-triage.md in the browser, change goes live
6

Session Replay + Observability

Week 9-11
  • -Session storage with metadata, full replay (conversation + skill traces + tool calls + timing)
  • -Cost tracking (per session/agent/skill, token counts × provider pricing)
  • -Agent registry (all agents, health, cost)
  • -Basic alerts (eval drops, cost spikes)
Demo moment: “I can see exactly why the agent said what it said, and it cost $0.003”
7

Chat in Admin UI + Knowledge Learning

Week 11-13
  • -Embedded chat panel in dashboard
  • -“Configure via conversation” (agent proposes skill/knowledge edits)
  • -Knowledge proposal queue (approve/reject/edit)
  • -Auto-approve policies per category
Demo moment: VP says “add a rule that deals over $100K need VP sign-off.” Live in 30 seconds.
8

Eval Dashboard

Week 13-15
  • -Eval results UI (per-skill pass rates, trends)
  • -Regression detection (flagged with commit)
  • -CI integration (evals on PR, block merge)
  • -Cross-agent benchmarks
Demo moment: “ticket-routing dropped from 96% to 88% after commit abc123. Here’s the diff.”
9

Model Arena

Week 15-17
  • -Side-by-side model comparison
  • -Cost/quality tradeoff per skill
  • -Per-skill model routing recommendations
  • -Model swap suggestions, works with both managed keys and BYOK
Demo moment: “We saved $400/mo by switching 3 skills to Haiku with no quality loss”
10

Team + Billing

Week 17-19
  • -Team invites + role-based access
  • -SSO (SAML/OIDC)
  • -Audit logging
  • -Stripe billing (per-agent metering, tier enforcement)
  • -Managed vs BYOK billing split, Free → Team → Business upgrade flow
Demo moment: 5 people on the team, each with appropriate access, bill shows up automatically

Ecosystem

Both Tracks
11

Reference Repos + Community

Week 19-21
  • -3 more repos (compliance-check, finance-reconcile, support-triage)
  • -Marketplace v0: registry-backed. Browse @amodalai/* packages in admin UI, one-click install. amodal publish pushes to registry.amodalai.com.
  • -Discord community
  • -“Built with Amodal” showcase
Demo moment: Developer installs a community skill, works immediately
12

Marketplace + Enterprise

Week 21-24
  • -Marketplace publishing (submit skills/connections/automations)
  • -Version management (pin + upgrade)
  • -Org-private packages via registry ACLs (amodal publish --org)
  • -Dependabot integration for packages.lock dependency updates
  • -Multi-tenant isolation (ISV)
  • -Field-level access control, white-label theming
  • -Self-hosted runtime packaging
Demo moment: ISV ships AI features in their product, each customer isolated

Milestones

2
OSS CLI ships. npx amodal init works.
3
Local dev complete. Working local agent with chat UI.
5
Slack works. Agent answers in a real channel.
7
Platform launch: amodal deploy → hosted agent + dashboard
9
Admin UI live. Non-developers edit skills in browser.
11
Observability: costs, session replays, agent health
13
Chat config + learning. Configure via conversation, agent learns.
15
Eval dashboard: quality tracking, regression detection
17
Model Arena: cost optimization across providers
19
Team + billing. Real revenue.
24
Marketplace + enterprise: community ecosystem + ISV path