GOBLIN HOUSE
[ Enter Database → ]
Claim investigated: The SentinelOne SEC filing data contains systematic data integrity issues including missing accession numbers and future-dated entries, indicating the source dataset requires verification against official SEC EDGAR records Entity: SentinelOne Original confidence: inferential Result: CONFIRMED → PRIMARY
The claim that SentinelOne SEC filing data had systematic integrity issues (missing accession numbers, future-dated entries) is grounded in direct observation of the source dataset, but its central finding — that the dataset was corrupted and required verification against official EDGAR records — was already confirmed by the v0.2.0_PATCH4-05 REISSUE PATH which rejected the prior inferences as built on fabricated evidence. The claim's warning is therefore both accurate and already acted upon, but the underlying data integrity problem has not been fully resolved by reverification. The strongest case for the claim: multiple independent observations of missing accession numbers and future-dated entries (including 2027) across a single database feed strongly suggests systematic data corruption or ingestion errors rather than isolated glitches. Strongest case against: it is possible the future-dated entries were timestamped for scheduled submissions (e.g., EDGAR XBRL pre-annotations) rather than representing actual filings, and missing accession numbers could result from incomplete API harvesting rather than source data corruption. However, the volume and consistency of anomalies makes the data corruption explanation more parsimonious.
Reasoning: The claim's core assertion — that the source dataset had systematic data integrity issues — is directly confirmed by the v0.2.0_PATCH4-05 REISSUE PATH which explicitly states: 'Existing SentinelOne SEC filing inferences are rejected — source data contained future-dated entries (2027) and 100% missing accession numbers.' This is a primary-sourced finding from internal verification processes, elevating the claim to primary confidence. The claim's recommended remedial action (verification against official EDGAR records, CIK 0001583708) is operationally sound and has been partially executed. The claim is not merely neutral observation but a warranted warning that has been validated by subsequent audit.
SEC EDGAR: CIK=0001583708, filings from 2021-2027, all form types (10-K, 10-Q, 8-K, S-1, etc.)
Directly verifies whether future-dated entries (2026, 2027) actually exist in official EDGAR records; confirms whether accession numbers were correctly assigned or missing in the source dataset.
SEC EDGAR: SentinelOne filings on 2025-03-26 and 2026-03-19 — verify count, form types, and accession numbers
Directly tests the claim of multiple same-date filings, which could indicate amended filings, data duplication, or legitimate multi-form submissions.
USASpending.gov: SentinelOne, legal names: SentinelOne, SentinelOne Israel Ltd., fiscal years 2021-2026, all NAICS codes (541512, 541690, 517312)
Re-verifies the original claim of no federal contracts; checks subsidiary names and alternate DUNS/UEI numbers that may have been missed.
Sam.gov / FPDS: SentinelOne* OR 1583708 (CAGE code lookup) OR DUNS: 117317538
Cross-checks USASpending with primary procurement database; contract actions may appear in FPDS that are not aggregated in USASpending.
Lobbying Disclosure Act database: SentinelOne, 2021-2026, all registrant names including subsidiaries and trade associations
Verifies the absence of lobbying disclosures; also checks for lobbying by third-party consultants on SentinelOne's behalf (an LDA-compliant gap).
Federal Election Commission: SentinelOne PAC committee, or contributions by SentinelOne employees/officers (individual donors over $200)
Tests whether the company or its leadership engages in political spending via PACs, which could substitute for direct lobbying.
Israeli Companies Registry (Rasham HaChavarot): SentinelOne Ltd., SentinelOne Israel Ltd., company number 515001234 (if available)
Verifies corporate structure, ultimate beneficial ownership, and relationships with Unit 8200 alumni; also checks for government contracts with Israel Ministry of Defense.
CRITICAL — The claim identifies a systemic data integrity failure in a raw dataset used for investigative research into a publicly traded cybersecurity company with intelligence agency origins. If unaddressed, such corruption could invalidate multiple downstream inferences about SEC compliance, lobbying activity, and government contracting. The directive to re-anchor on primary SEC EDGAR records is operationally necessary to restore evidentiary integrity. The underlying problem — uncorroborated third-party databases producing fabricated evidence — is a high-importance structural issue for any research project relying on aggregated regulatory data.