Contact · Controlled review · Walkthrough

Request a verification walkthrough.

Share your deployment context at a high level. CEYO supports evaluation without requesting model weights or proprietary internals by default.

Request form

Use high-level descriptions only. Do not submit secrets, keys, personal sensitive data, or proprietary internals through this form.

Public intake only
Submission boundary: this form is intended for public informational contact and walkthrough requests only.

What happens next

A short, structured process designed for institutional review.

Step 1 · Respond

We confirm the evaluation context and whether a public or controlled review path is more appropriate.

Step 2 · Scope

We align on policy boundaries, disclosure expectations, and verification posture at a high level.

Step 3 · Walkthrough

We provide a walkthrough using public materials, sample artifacts, and the deterministic verification procedure.

Controlled review: additional technical materials may be made available only under appropriate confidentiality or review terms.
View resources Verification steps
Public contact information

Contact information

This page serves as the public contact reference for CEYO. Privacy, Terms, and related legal pages may direct visitors here for current contact details.

General inquiries

Use the request form above for walkthrough requests, evaluation inquiries, and public-site questions.

Security disclosure

For vulnerability or security reporting procedures, refer to the Vulnerability Disclosure page.

View vulnerability disclosure information

Privacy / legal questions

Questions regarding the Privacy Statement, Terms of Use, or public-site handling may be submitted through this page.

Current status

No dedicated public email address is listed at this time. The website request form is the current public intake channel.