“audit-chained methodology”
What we do NOT claim
- audited methodology
- third-party audited
- certified
SHA-256 hash chain only; NOT external audit.
Convexly / Evidence
For each public Convexly claim, the table below shows the allowed wording we use externally, the wordings we explicitly do not claim, the receipt URL you can verify against, and the last-verified date. Stale receipts (older than 30 days, or never re-verified) are flagged so you know when to discount.
The same machine-checkable list backs the pre-publication audit guard inside the codebase. If a Convexly outbound email, paper, or social post references a wording that is not on this page's allowed list, tell us — that is a bug, and we want to fix it.
11 public claims
Methodology start-hereWhat we do NOT claim
SHA-256 hash chain only; NOT external audit.
What we do NOT claim
Public-ledger framing only.
What we do NOT claim
V1-M paper 2026-04-22.
What we do NOT claim
AsPredicted #287436 + #287442 + #287714.
What we do NOT claim
AsPredicted #287368.
What we do NOT claim
Phase 2B claim-discipline pass.
What we do NOT claim
B3 leaderboard correction shipped 2026-05-02.
What we do NOT claim
Public docket entry.
What we do NOT claim
Public X reply 2026-05-01; private cadence DM pending.
What we do NOT claim
Pre-registration planned for Mon 2026-05-04; do not claim filed until external receipt URL and AsPredicted ID are recorded. Gated by V0.1.6 backtest stack. Verdict expectation Q4 2026 / Q1 2027 (full envelope) with 30-pair floor potentially hit late July 2026 on the early-resolving subset. Once filed, follow-up migration writes the actual AsPredicted ID + receipt_url + last_verified_at.
What we do NOT claim
No sample exists today.
How this page is built
Every row above is a record in the claim_registry Postgres table. The same table powers a pre-publication audit guard inside the codebase: outbound copy is greppable against the union of allowed wordings, and any unsafe wording must come with an external receipt URL or a formal statistical test before it ships. The page reads from the same source so external readers and internal authors see identical state.
For the audit doctrine, see /research/start-here and the credibility-claim audit section of the project CLAUDE.md (mandatory for every external send).