This week: 847 signups with a 12.3% conversion rate, up 23% week-over-week.
The biggest drop-off is between email verification and onboarding (38% abandon). Users from the organic_search channel convert at 18.1%, nearly 2x the average.
Built for product teams at B2B SaaS companies
Connect once. Then anyone can ask questions in plain English.
“Why are Acme Corp users complaining about being logged out?” Recon understands context, runs queries, reads code, and connects the dots.
Every SQL query run, every file read, every ticket checked — visible and auditable. No black boxes.
Postgres, GitHub, Notion, Linear, Jira. Read-only access, setup in minutes.
What used to take 4 hours of engineer time now takes 2 minutes of AI investigation.
Agencies manage multiple clients. Each workspace is isolated with its own connections.
From setup to first investigation in under 5 minutes.
Link your Postgres database, GitHub repos, Notion docs, and Linear tickets. Read-only access, set up in 5 minutes.
Type your question like you'd message a teammate. "Why are users complaining about logouts?" works perfectly.
Recon queries your database, reads your code, checks tickets, and returns a root cause analysis with full evidence.
The same investigation, two different realities.
Sessions expire after 30min instead of 7 days, caused by config change in last deploy
Read-only connections, encrypted credentials, and isolated sandboxes. Defense in depth at every layer.
All connections enforce read-only at multiple layers
Credentials encrypted at rest, injected ephemerally
Every query and file access logged and visible
Each investigation runs in its own Firecracker microVM
Your API key, your LLM costs, your data
Defense in depth: MCP read-only flags · PostgreSQL read-only role · OAuth read-only scopes · System prompt constraints · Network egress allowlist
Every plan includes a 14-day free trial. No credit card required.