Case Studies

DEMONSTRATION ANALYSES — Companies A and B are synthetic test cases generated to demonstrate Talon's capabilities. They do not represent real investment targets. The Self-Audit (Company C) is a live analysis of Talon's own codebase.

Demonstration analyses using synthetic companies. This is what Talon finds.

These are real Talon outputs. Run on real code, with real CVE data from OSV.dev, real exploit probability from EPSS, and real static analysis from Semgrep. Company names are anonymized. The analysis is not.
Company Risk Score Code Findings CVEs Critical (EPSS>0.5) Verdict
Company A 60/100 4 16 1 Pass
Company B 0/100 0 0 0 Proceed to diligence
Self-Audit 0/100 0 23 1 Proceed with dep review

Company A: Seed-Stage API Platform

Submission: FastAPI backend, 10 Python dependencies, ~65 lines

60
Risk Score
4
Semgrep Findings
16
CVEs Found
1
Critical EPSS

Code Findings (Semgrep)

ERROR SQL Injection — String formatting in SQLAlchemy text() query. User input directly interpolated into SQL.
ERROR Command Injectionsubprocess.run(cmd, shell=True) with user-controlled input. Remote code execution possible.
WARNING Unsafe Deserializationpickle.loads(data) on untrusted input. Arbitrary code execution via crafted payload.
ERROR SSRFrequests.get(url) with user-controlled URL. Server-side request forgery to internal services.

Critical CVE

EPSS 0.89 CVE-2023-0286 in cryptography==3.4.8 — X.400 address type confusion in X.509 certificate verification. 89% probability of active exploitation. 99.5th percentile.

Additionally: 4 hardcoded secrets found (database password, JWT key, AWS access key, AWS secret key). No authentication on admin command execution endpoint.

Verdict: Pass. Multiple critical vulnerabilities, hardcoded production secrets, and a dependency with near-certain active exploitation. This codebase is not investable in its current state.

Company B: Seed-Stage API Platform (Same Product, Rebuilt)

Submission: Async FastAPI backend, 9 Python dependencies, ~147 lines

0
Risk Score
0
Semgrep Findings
0
CVEs Found
0
Critical EPSS

What Changed

Verdict: Proceed to full diligence. Clean codebase, current dependencies, proper security patterns. Technical risk is low. Proceed to architecture deep-dive, patent analysis, and founder evaluation.

Self-Audit: Talon Analyzing Talon

Submission: The OpenClaw codebase itself — 38 dependencies, ~2,100 lines

0
Risk Score
0
Code Findings
23
Dep CVEs
1
Critical EPSS

What Talon Found in Itself

Code quality: clean. Zero Semgrep findings. Zero regex pattern matches. The application code has no hardcoded secrets, no injection vulnerabilities, no unsafe deserialization.

Supply chain: 23 CVEs in the dependency tree. This is normal for a Python project with 38 transitive dependencies. Most are low-severity or theoretical. However:

EPSS >0.5 1 critical CVE in the dependency tree with high exploit probability. Flagged for immediate review and upgrade.

This demonstrates a key insight: even well-written code has supply chain risk. Talon catches what manual code review misses — the vulnerabilities hiding in your dependencies, weighted by actual exploit probability.

Verdict: Proceed with dependency review. Application code is clean. Supply chain needs targeted upgrades for the critical EPSS finding. This is exactly what Talon is built to surface.

What This Proves

Want to see Talon analyze your codebase?
Submit your company  |  Learn about Talon  |  Security architecture

SpringOwl Asset Management | February 2026
Analysis performed by Talon v0.3.0. All CVE data from OSV.dev. EPSS scores from FIRST.org. Static analysis by Semgrep.

IMPORTANT DISCLOSURES: SpringOwl Asset Management is not a registered investment adviser, broker-dealer, or funding portal. Nothing on this website constitutes an offer to sell, a solicitation of an offer to buy, or a recommendation of any security or investment product. Any investment opportunities discussed herein are available exclusively to accredited investors as defined under Rule 501 of Regulation D of the Securities Act of 1933, as amended. FORWARD-LOOKING STATEMENTS: This website contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934, including statements regarding anticipated investment strategies, projected timelines, expected portfolio construction, technology capabilities under development, and market opportunity assessments. These statements are identified by words such as "expect," "anticipate," "plan," "target," "intend," "project," "will," and similar expressions. Forward-looking statements are based on current expectations and assumptions that are subject to risks and uncertainties that may cause actual results to differ materially, including but not limited to: technology development risks, regulatory changes, market conditions, competition, key person dependencies, and the inherent uncertainty of early-stage venture investments. SpringOwl undertakes no obligation to update forward-looking statements. Past performance is not indicative of future results. An investment in early-stage technology companies involves a high degree of risk, including the potential loss of the entire investment.
TALON | 65 signals 3/5 sources 5/10 areas 1 divergence |Agentic AI: kalshi 56.9% vs polymarket 5.9% (51pt) 25m ago