GOBLIN HOUSE
[ Enter Database → ]
Claim investigated: The systematic data corruption pattern affecting SentinelOne records suggests broader reliability issues with the third-party aggregator database that may affect multiple companies' regulatory data Entity: SentinelOne Original confidence: inferential Result: STRENGTHENED → INFERENTIAL
The strongest case for the claim is the conjunction of multiple anomalous observations: future-dated filings (2026, 2027), missing accession numbers on all records, duplicated dates, and missing government records for a cybersecurity company that should logically appear in USASpending. The pattern is consistent with a database ingestion error where timestamp fields are corrupted (possibly shifted forward by one or more years) and accession numbers are dropped or not imported. The strongest case against: Each anomaly individually could have benign explanations (forward-scheduled SEC submissions do exist for complex corporate actions; missing accession numbers could be a metadata omission; the lack of USASpending records could reflect the legal limit that prevented SentinelOne from selling to the US federal government as a foreign-owned company pre-2023). However, the coherence across anomalies makes a systematic corruption pattern more likely than independent coincidences.
Reasoning: The inferential claim moves from mere speculation to a well-supported hypothesis because: (1) The simultaneously rejected path (v0.2.0_PATCH4-05) explicitly states the data contained 2027 entries and had 100% missing accession numbers—this is primary evidence of a pattern, even though the previous conclusion was rejected. (2) The 2026-03-19 future date appears both as an observation and as part of the rejected path, establishing temporal consistency in the corruption. (3) Multiple observation types (future dates, missing accession numbers, duplicate dates) triangulate on the same root cause: a database ingestion/transformation failure. The claim cannot be elevated to secondary because the corruption pattern has not been independently verified against the raw SEC EDGAR data—it remains a strong hypothesis requiring direct comparison of aggregator output to primary EDGAR records.
SEC EDGAR: CIK 0001583708, filings from 2023-01-01 to 2026-12-31
Directly verify whether the 2026-03-19 filing exists in primary records. If it does not, the aggregator fabricated or corrupted a date. If it does, determine whether it is a legitimate forward-looking submission (e.g., Form 8-K for a delayed event) or a data error.
USASpending.gov: SentinelOne (and alternative legal names: SentinelOne Inc., SentinelOne Israel, SentinelOne Ltd.) with date range 2020-01-01 to 2026-12-31
Confirm whether any federal contract exists under any corporate entity name. If none found, check whether the company is flagged as a 'foreign-owned' entity precluding federal awards—this would explain the absence and confirm the data is accurate, not corrupted.
Lobbying Disclosure Act Database (Senate Office of Public Records): SentinelOne (client name) — 2020-2026
Determine if the aggregator's absence of lobbying disclosures is a data loss or reflects actual non-reporting. Cross-check against trade association membership—if SentinelOne pays dues to the Software Alliance, that lobbying activity may appear under the alliance's filings, not the company's name.
ProPublica Nonprofit Explorer or IRS Form 990: SentinelOne Foundation (if exists) or SentinelOne public charity filings
Check if the company established a charity or PAC that would appear in separate databases—this would test whether the aggregator has systematic blind spots for non-SEC regulatory records.
PACER (Public Access to Court Electronic Records): SentinelOne Inc. as party — 2020-2026, all district courts and federal circuits
Validates the 'absence of court records' observation. If any litigation appears, it suggests the aggregator dropped litigation records—expanding the corruption pattern from SEC filings to court records.
SIGNIFICANT — This finding matters because it identifies a potential systemic data integrity failure in a database that journalists, researchers, and investors rely upon for regulatory analysis. If the corruption pattern affects multiple companies' records, it could silently distort public understanding of corporate compliance across the technology sector. Additionally, it highlights a structural blind spot in the public record infrastructure: no standard audit mechanism exists for these third-party aggregators.