Technical audit & compliance

Without technical amnesia proof, your AI is not fundable

BPI, PIIEC, AI Act: they all require amnesia proof. Mathematical proof that your system forgets data after processing. Not a diagram. Not a pitch. Binary, sealed, opposable evidence.

0 byteGuaranteed residue post-purge
SHA-256Sealed report + RSA-PSS
88/100BPI/PIIEC eligibility score
32 pagesFull opposable report
Book a free 30-min scoping call

The proof gap: 90% of AI applications fail in the same place

It's not a technology problem. It's a proof problem. The evaluator opens your file, looks for independent certification, doesn't find it. File closed. Here are the four gaps that cause funding and compliance requests to fail.

💾

No RAM amnesia proof

Your AI processes sensitive data (PII, IBAN, trade secrets). After the session, what remains in memory? You don't know. The evaluator doesn't either. File rejected.

🔓

No integrity certificate

Your internal audit results aren't cryptographically signed. Anyone can modify a PDF. BPI and PIIEC committees know this.

🌍

No sovereignty proof

Your system is "sovereign"? Prove it. Not with an architecture diagram. With a network scan showing zero calls to US jurisdiction (Cloud Act).

⚖️

No independent third party

You self-certify. The BPI committee, PIIEC, and AI Act Article 10 require a technical trust tier. Not your CTO. Not your DPO. An external auditor.

Check my eligibility →

What you submit today vs what the evaluator expects

The difference between a rejected and an eligible application lies in the nature of the documents provided. Here's the concrete comparison.

Your logs & internal auditsSCANALIS report
PIIEC / BPI eligibilityRejected by evaluators88/100 score documented
Value to funding committeeNoneOpposable technical proof
Document integrityHash modifiable after the factSHA-256 seal + RSA-PSS 2048 bits
Trust tierSelf-certificationIndependent technical auditor
Proof of no residueDeclarative ("our system purges")8 canary tokens injected + post-purge memory scan
Gaia-X complianceNot documentedTrust Framework §4.2, §5.1, §6.1

Get my opposable report →

The Canary Protocol: we don't secure your AI, we prove it forgets

How do you technically prove that no sensitive data persists in memory after processing? SCANALIS uses a forensic method in four steps, with no subjective interpretation: a binary verdict, timestamped, reproducible.

A

Baseline capture

Memory fingerprint before session. PID, resident size, heap SHA-256.

B

8 canary injection

Email, phone, SSN, IBAN, API key, prompt injection, trade secret, medical data.

C

Purge + post-mortem

Session termination. Configurable wait. New memory fingerprint.

D

Forensic verification

Byte-by-byte scan: offset, HEX_DUMP, ASCII. Verdict: AMNESIA_CONFIRMED or AMNESIA_FAILED.

The sealed report (SHA-256 + RSA-PSS) constitutes the independent technical proof required by BPI evaluators, PIIEC committees, and AI Act Article 10 auditors.

Request forensic proof →

4 pillars, 1 opposable proof

Each pillar produces verifiable evidence. Not an opinion. Not a recommendation. Binary, timestamped, sealed proof.

01 / Exposure

Exposure Intelligence

Shadow APIs, unauthorized outbound flows, DLI v2. Your real exposure surface, mapped and quantified in euros. You know exactly where you're vulnerable.

02 / Amnesia

Canary Protocol

Injection of 8 canary tokens. Purge. Byte-by-byte forensic scan. Binary verdict: AMNESIA_CONFIRMED or AMNESIA_FAILED. Zero interpretation.

03 / Finance

Monte Carlo + IPE

Stochastic simulation of financial impact. IPE (Exposure Probability Index) calibrated to Scanalis Prudence Standard. You quantify risk in euros.

04 / Seal

Cryptographic seal

32-page report. SHA-256 hash. RSA-PSS 2048-bit signature. Embedded public key for offline verification by any third party. Guaranteed non-repudiation.

Assess my 4 pillars →

SCANALIS vs the 2026 ecosystem

Not a SaaS that generates noise. A trust tier that produces proof. Here's how SCANALIS positions against alternatives.

DimensionAutomated SaaS✦ SCANALISManual pentest
RAM amnesia proofNon-existentCanary Protocol 8 tokensOut of scope
Cryptographic sealSimple hashSHA-256 + RSA-PSSUnsigned PDF
BPI/PIIEC eligibilityNot recognized88/100 scoreVariable
Production impactAgent (risky)Zero impactIntrusive
Gaia-X complianceNot covered§4.2, §5.1, §6.1Not covered
Remediation deliverableDashboard30/60/90-day plan + scriptsStatic PDF report

Choose SCANALIS →

Use cases: who benefits from SCANALIS

Discover concrete situations where independent technical proof makes the difference between an approved and a rejected application.

AI startup / Fundraising

"We're targeting PIIEC funding of 2 to 5 M€"

Your application will be read by a committee looking for independent technical certification. Without RAM amnesia proof and a cryptographic seal, 90% of applications are rejected. SCANALIS provides the opposable report that proves your AI forgets data — and unlocks your eligibility.

Compliance firm / DPO

"We want to differentiate with concrete evidence"

Your clients ask for GDPR audits, but compliance often stays documentary. By adding a SCANALIS technical brick (Shadow APIs, data leak, prompt injection), you deliver a sealed report executives can present in committee. A differentiating factor against competition.

IT Director / Enterprise

"Our AI system is subject to AI Act Article 10"

AI Act requires documented management of persistent data for high-risk systems. An architecture diagram isn't enough. SCANALIS provides forensic proof (Canary Protocol) and network sovereignty scan — avoiding potential fines and reassuring the executive committee.

SaaS vendor / Data governance

"We must prove sovereignty for Gaia-X"

The Gaia-X Trust Framework requires zero Cloud Act dependency and documented compliance. A Scanalis network scan shows absence of calls to US jurisdictions. The SHA-256 + RSA-PSS sealed report documents your compliance for sovereign tenders.

Bank / Insurance / DORA

"DORA requires proof of operational resilience"

The financial sector must prove system robustness. SCANALIS provides a technical risk map (Exposure Intelligence), Monte Carlo simulation, and opposable report — elements expected by supervisors to demonstrate controlled data governance.

My case is similar to these →

Our process: 30 minutes to assess if your architecture can produce the required amnesia proof

A free scoping call. External intervention that doesn't touch production. An opposable report in 15 days.

1

Free 30-min scoping call

Eligibility + scope. Identification of critical flows, AI/API stack, and funding objective (BPI, PIIEC, raise). SCANALIS works with a limited number of partners per quarter. → Go/No-Go + personalized roadmap.

2

Audit T+5 to T+12 days

Canary Protocol + scan. Canary injection, memory scan, sovereignty verification, Monte Carlo simulation. Zero production impact. No access to internal systems. → Map + binary proofs.

3

Delivery T+15 days

Sealed 32-page report + briefing. SHA-256 + RSA-PSS seal. Presentation to your committee or PIIEC team. Correction scripts ready to deploy. → Opposable proof for BPI evaluator.

Start my free scoping call →

Standards covered

AI Act, GDPR, DORA, Gaia-X, OWASP API Top 10, NIS2. Bpifrance and France 2030 programmes. Technical data governance and compliance.

AI Act GDPR DORA Gaia-X OWASP API NIS2 Pionniers IA IPCEI AI France 2030 IA Booster ADD DeepTech Native amnesia RSA-PSS seal Zero impact

Prepare my BPI/PIIEC application →

Your application will be read in 90 days. With or without proof. 30 minutes of scoping. Free. To find out if your AI architecture can produce the amnesia proof required by BPI, PIIEC, and AI Act.

Book my slot now →

30 minutes to assess if your architecture can produce the required amnesia proof

Free scoping call. Zero production impact. Identify critical flows and your BPI, PIIEC and AI Act eligibility.

Book a free 30-min scoping call

Why RAHIZI partners with SCANALIS

RAHIZI is a legaltech platform. Our clients — law firms, enterprises, startups — increasingly need to demonstrate AI compliance for GDPR, AI Act, and funding applications (BPI, PIIEC). Yet regulation requires technical proof, not attestations.

We formed this partnership with SCANALIS to bridge that gap: legal and regulatory framing on one side, opposable forensic proof on the other. A coherent offering for those preparing funding applications or proving AI compliance.

Learn more about scoping →

Offered by RAHIZI in partnership with SCANALIS. API & AI audit, forensic proof, GDPR compliance, AI Act, BPI, PIIEC.

en_GBEnglish

Doing business in Africa or the Middle East today with Rahizi!

Do you have an entrepreneurial project for Africa or the Middle East and need to create your company online from home? Fill in this form!

if you have no idea, leave blank.

Check this box if you have already established your company in one of the countries on the list

In +xxxxx format