Company

The process layer for research-driven decisions

Bloomberg provides data. Morningstar provides conviction. Celadon provides the process — source scoring, adversarial testing, and confidence decomposition — that tells you how much to trust what you're reading.

What we build

The general market uses automated research tools that can only retrieve information and generate hallucinated prose. They cannot tell you which sources to trust, what evidence argues against their own conclusions, or how confident you should be in each part of the analysis. Those are the capabilities that matter when the output informs a trade, a deal, or a regulatory filing.

Celadon's research pipeline scores every source by authority, recency, and independence. It searches for contradictions deliberately. It decomposes uncertainty into data confidence, inferential confidence, regime risk, and semantic clarity. The result is a structured research artifact with a full evidence trail — not a chat response reformatted as a document.

The platform is designed for professionals who advise, invest, and decide under uncertainty — independent financial advisors who need to supplement their Bloomberg terminal, mid-market PE analysts who need comparable sector screening, compliance teams who need auditable research trails, and strategy functions who need structured competitive intelligence. Celadon doesn't replace the research tools these professionals already use. It adds the process layer that none of those tools provide.

Methodology

Celadon's value is in its methodology, not its model. The source scoring, adversarial search, confidence decomposition, and monitoring variable identification are pipeline logic — not prompt tricks. If the underlying model changes, the methodology stays. This is infrastructure, not a wrapper.

Every Celadon report is generated by a multi-pass research pipeline:

  1. Source search across five evidence categories
  2. Explicit source scoring on authority, recency, independence, and incentive risk
  3. Thesis-led synthesis with verified citations
  4. Deliberate adversarial search for counter-evidence
  5. Structured counter-thesis with strength assessment
  6. Uncertainty decomposition across four categories
  7. Monitoring variables with quantified triggers

Source citations are verified programmatically — every claim traces to specific text in a specific source document.

See how the pipeline works →

Principles

01

Source hierarchy over source counting

Not all evidence is equal. A Tier 1 filing carries more weight than ten Tier 4 blog posts. The scoring is explicit and visible in every report.

02

Adversarial by design

The pipeline searches for evidence against its own thesis. If the counter-evidence is strong, the report says so. Confirmation momentum is a structural failure mode, not a stylistic choice.

03

Calibration over accuracy

No research tool is 100% accurate. Morningstar downgrades companies it rated as wide-moat for years. Goldman revises price targets quarterly. The question isn’t whether analysis is right — it’s whether you know how much to trust it and under what conditions it breaks. Celadon’s confidence assessment answers that question for every report.

04

The output supplements your existing tools

Celadon reports are designed to sit alongside your Bloomberg data, your Morningstar ratings, and your internal models — not replace them. The source table, counter-thesis, and confidence decomposition add the process audit that no existing tool provides. The IC gets the thesis and its stress test in the same artifact.

What Celadon is and what it is not

Celadon is automated research synthesis that finds, scores, and structures publicly available information faster and more systematically than a human can manually. It produces structured, source-scored reports with adversarial counter-evidence and decomposed confidence.

Celadon is not a replacement for Bloomberg Terminal, Morningstar, FactSet, or licensed sell-side research. It does not have proprietary pricing data, real-time market feeds, or named analyst opinions with track records. It does not produce investment recommendations.

The competitive wedge is time, cost, and consistency. A structured analysis that took a junior analyst eight hours is produced in thirty minutes. It is not better than what a senior analyst at Goldman Sachs produces — but it is comparable quality at a fraction of the cost and time, with an evidence trail that the Goldman report doesn't include.

For the independent financial advisor who cannot afford $24,000 per year for a Bloomberg seat, Celadon provides structured research on any public entity that doesn't exist anywhere else. For the PE analyst who already has Bloomberg, Celadon provides the stress-test layer that no existing tool offers.

Data Handling

Research questions and generated reports are used to deliver the service and are not used to train models. Reports are stored for delivery and dashboard access only. Free-tier reports are automatically deleted after 90 days. Account holders can delete reports at any time from their dashboard. Enterprise deployments run in the customer's own environment with no data leaving their network.

Celadon does not sell, share, or license customer data or research outputs. Source content retrieved during research is cached only for the duration of report generation and is not retained. Rate-limiting data (IP address hashes and request counts) is collected to prevent abuse and is not used for any other purpose.

No single point of vendor failure

A well-funded AI legal tech company — backed by major technology and investment firms, serving Fortune 500 clients — entered receivership within months of a failed funding round. Clients faced immediate workflow disruption.

Celadon's architecture is designed to survive any single vendor's failure. The research pipeline is model-agnostic, with access to multiple foundation models through a unified interface. If one model provider changes pricing or availability, the pipeline switches providers — not architectures. Source retrieval is similarly abstracted behind a pluggable layer, replaceable without pipeline changes. Enterprise deployments run in the customer's own environment. The pipeline logic lives in configuration files, not in proprietary infrastructure that disappears with the vendor.

Read a report. Decide for yourself.

The methodology is in the output, not the marketing. Generate a free report and see whether the source table, counter-thesis, and confidence assessment are worth your time.

Generate Report