1
0 Comments

I have 50+ users, $0 in revenue, and I just got into an incubator with $8,500+. Here's what I'm building.

I'll start with the uncomfortable numbers .

  • 50+ users
  • $0 paying customers
  • $300+/month AWS burn
  • $0 MRR

That's the surface story. Here's the rest.

What I'm building
Bordair is a prompt injection detection API. When developers ship AI features, users can type instructions that hijack the model: leak system prompts, exfiltrate data, bypass safety. I scan the input first, in under 50ms, across text, image, document, and audio. Three lines of code.

The market just validated itself. Late 2025:

  • Lakera acquired by Check Point ($300M)
  • Pangea by CrowdStrike ($260M)
  • Prompt Security by SentinelOne ($250M)

$810M of M&A in three months. All three are now being absorbed into £100K+ enterprise security bundles with 9-month procurement cycles, which leaves the developer-first segment wide open.
That's where I'm building.

Why I'm pre-revenue on purpose
Here's the part most founders won't admit: I haven't turned on the paywall yet, and that's deliberate.
Bordair has a paid tier live, but only on Kingdom 5 of Castle, my CTF-style red-teaming game. Everywhere else, including the production API, is free.
Why?
Because for a security product, trust compounds before revenue does. Every free user generating attack prompts is improving my detector. Every dataset star is social proof. Every novel jailbreak from Castle is training data my paid competitors don't have.

I could turn on Stripe across the board tomorrow and probably get five paying customers. Or I can spend three more months hardening the detector with 6,000+ adversarial prompts from real players, then charge with confidence and conviction.
I'm choosing the second.

This only works because my burn is $300/month. If I had VC pressure I'd have to flip the switch early. The fact that I don't is, ironically, my biggest advantage.

The data flywheel
The unfair advantage is Castle (castle.bordair.io). 5 kingdoms, 35 levels of prompt injection challenges. Players try to break AI personas across text, image, document, and audio. Free to play. Real points. Real bragging rights.
Every successful jailbreak gets captured with full media provenance and feeds my training pipeline. Players see a fun puzzle game. I see an attack-generation engine that pays itself.

So far:

  • 6,000+ attack prompts generated through gameplay
  • 3 novel exploits patched in the last month, all from players
  • 503,000+ labelled samples across five modalities in the resulting dataset (largest open-source prompt injection dataset in existence)
    40+ GitHub stars on the dataset, including engineers from OpenAI, Nvidia, PayPal, and NetApp

I find the named stars more meaningful than user count right now, because those are the people who recognise what they're looking at.
Recent traction
Past week was the first time I felt actual momentum.

  • Went from ~30 users to 50+ in seven days
  • Prompt count climbed from 1,400 to 6,000+ over a few weeks of steady gameplay
  • Just got accepted into Loughborough University's incubator (where I studied CS) with consideration for £6,500 (~$8,775) in non-dilutive funding plus accelerator support

£6,500 isn't life-changing money. But it's the first external validation that someone other than me thinks this is worth building, and the accelerator gives me structure I've been lacking as a solo founder doing this nights and weekends.

What I'd tell my past self
The honest reason indie hackers fail in technical categories isn't tech, it's patience.
I've been building this for a while whilst working full-time in cybersecurity.
Every weekend, every evening, no consistent revenue, no team.
What kept me going wasn't conviction that I'd succeed. It was three specific beliefs:

  1. The data flywheel is real. Every player attack makes the product compounding-better, not linearly-better. Time is on my side in a way it isn't for most pre-revenue products.
  2. The market timing is unmistakable. Three acquisitions in three months. The category is hot and getting hotter, and the developer-first segment is now structurally underserved.
  3. Solo founders have a structural advantage in security tools. I can ship a game where players try to break my own product. A VC-backed competitor's legal team would never sign that off. The weirdest, most effective acquisition channel in my category is one only an indie can use.

If you're building in a category where data is the moat, your job isn't to collect data. It's to build a system that makes other people want to give you data.

What's next
Incubator runs into summer. Plan:

  • Harden the detector with the 6,000+ attack prompts already collected
  • Monitor the mos recent update: Ghost, a new replayable adversarial mode that just went live (every successful jailbreak is fingerprinted, replays blocked, multi-modal scoring up to 3x)

I'm not going to pretend this is going perfectly. I'm one person, pre-revenue, with a $300 AWS bill and a day job. But the unit economics are clean, the moat compounds, and I'm in a category where $810M of recent M&A says I'm not crazy.

Try it
castle.bordair.io. Free tier works.
If you break Ghost in a way I haven't seen before, I'll personally email you, patch it, and thank you for the training sample.

Happy to AMA in the comments. Architecture, dataset construction, the data flywheel mechanics, the decision to stay pre-revenue, the day-job-and-startup grind, anything.

posted to Icon for group Building in Public
Building in Public
on April 30, 2026
Trending on Indie Hackers
How are you handling memory and context across AI tools? User Avatar 112 comments Do you actually own what you build? User Avatar 66 comments Code is Cheap, but Scaling AI MVPs is Hard. Let’s Fix Yours. User Avatar 34 comments I Think MCP Will Punish Thin API Wrappers User Avatar 27 comments What AI Is Actually Changing in IT Certification Prep User Avatar 19 comments Cloud vs Cybersecurity Certifications | 2026 Path Makes More Sense User Avatar 18 comments