Request a verification walkthrough.
Share your deployment context at a high level. CEYO supports evaluation without requesting model weights or proprietary internals by default.
Request form
Use high-level descriptions only. Do not submit secrets, keys, personal sensitive data, or proprietary internals through this form.
What happens next
A short, structured process designed for institutional review.
We confirm the evaluation context and whether a public or controlled review path is more appropriate.
We align on policy boundaries, disclosure expectations, and verification posture at a high level.
We provide a walkthrough using public materials, sample artifacts, and the deterministic verification procedure.
Contact information
This page serves as the public contact reference for CEYO. Privacy, Terms, and related legal pages may direct visitors here for current contact details.
Use the request form above for walkthrough requests, evaluation inquiries, and public-site questions.
For vulnerability or security reporting procedures, refer to the Vulnerability Disclosure page.
Questions regarding the Privacy Statement, Terms of Use, or public-site handling may be submitted through this page.
No dedicated public email address is listed at this time. The website request form is the current public intake channel.