Helix Studio - The First Genome IDE
One edit program. One deterministic record. Replayable forever.
A professional development environment for designing CRISPR and Prime Editing edits, simulating outcomes, and interpreting sequencing results - all in one place.
Prevent costly genome editing mistakes before wet-lab spend and defend decisions with replayable, audit-ready evidence.
Enterprise governance licenses starting at $15k per edit program annually.
No wet-lab required to evaluate the Pilot Kit.
- Catch costly mistakes before wet-lab spend
- Answer “why did we choose this?” months later (even after turnover)
- Hand reviewers a single packet they can verify offline
- Designed to survive regulatory, IP, and audit scrutiny

A live Helix session showing edit intent, policy constraints, and cryptographically verifiable evidence bundles generated from a single edit program.
Live system snapshot
Intent
Targets · Edit intents
Policy
Evidence gates · Constraints
Evidence
Bundles · Hashes · Exports

Design gRNAs & pegRNAs
Scores · GC% · Off-target

Simulate Outcomes
Indels · Prime edits

NGS Read Analysis
Alignments · % Edited
Who this is for
Built for teams who must defend decisions.
If you don’t have to defend decisions in review, diligence, or post-mortems, Helix is probably overkill.
Genome Editing Platform Leads
Own the decision record. Prevent irreversible edits. Replay decisions months later.
Biotech & Pharma R&D
Reduce program risk. Defend rationale in diligence and QA.
CROs & Advanced Cores
Deliver auditable bundles to clients without custom glue code.
What goes wrong
What goes wrong without this
- Decisions made in Slack threads and notebooks
- Results drift with no deterministic replay path
- Policy violations discovered after wet-lab spend
- No defensible record of what was known when
Helix Studio exists to make these failure modes impossible.
Trust & Verification
Trust & Verification
- Deterministic execution and artifact hashes
- Reproducible CLI verification
- Offline-capable workflows
- Exportable provenance bundles
- Designed for regulated and partner-reviewed environments
Verification
Verification in one command
Download a public example evidence bundle and verify it offline with the Helix CLI.
Verify
helix verify --kind auto --manifest helix-example-evidence-bundle/manifest.jsonUnzip first: unzip helix-example-evidence-bundle.zip -d .
Products
Two products. One deterministic engine.
Helix exists to turn genome editing into a decision workflow: generate evidence, enforce a policy gate, and export a reviewable bundle. Helix Studio is the Genome IDE (GUI + CLI) for designing and defending decisions. Helix CLI is the headless toolchain for enforcing the same standards at scale.
Helix exists to block experiments that should never be run.
For scientists and platform leads designing and defending experiments.
Helix Studio (GUI + CLI)
- Interactive workspace for designing edits and reviewing evidence.
- Policy gates, deterministic exports, and audit-ready artifacts.
- Bundles the Helix CLI for headless replay and verification.
For infra teams enforcing standards at scale.
Helix CLI (headless)
- Run evidence generation in CI, HPC, or batch automation lanes.
- Deterministic verification, diffing, and bundle tooling.
- SDK-friendly outputs for integration and automation.
Governance guarantees
These are not features. These are things that cannot go wrong.
When millions of dollars and months of wet lab time are at stake.
Determinism
Same inputs. Same outputs. Or a signed explanation for why not.
Policy enforcement
If required evidence is missing, Helix refuses to produce a decision and tells you what is required.
Assumption visibility
Every outcome is tied to an explicit regime, calibration domain, and constraint set — no invisible defaults.
Replayability
Any reviewer can rerun the computation byte for byte and verify exported artifacts.
One buyer facing workflow.
Calm. Inevitable. Reviewable — built for QA, platform leads, and regulated teams.
Design intent defined
Target class and edit intent declared.
Start from what you are trying to change, not which tool you happened to open.
Constraints declared
Hard bounds and allowed regimes set.
Constraint sets make assumptions explicit and keep teams from drifting into undefined territory.
Policy selected
Evidence requirements chosen up front.
Policies define what must be present before a decision is allowed to exist.
Evidence computed
Computational evidence generated under declared assumptions.
Outcome simulation becomes decision evidence; predicted outcomes become implied distributions (assumption bound).
Decision gated
Policy enforced before export.
If required evidence is missing, Helix refuses the decision and tells you what to provide.
Artifact exported
Evidence bundle packaged for review.
Export replayable PDFs and machine-readable bundles with hashes, versions, and provenance.
Decision reviewed later
Rerun and verify byte for byte.
Auditors can reproduce results and trace every assumption back to its source regime.
The unit of value
The Unit of Value: An Edit Program
Helix prices, governs, and audits at this level — without needing to say “enterprise”.
An Edit Program is
- A decision boundary
- A regulatory surface
- A long-lived artifact stream
- Something that needs to be defended months or years later
What Helix makes durable
- Decision evidence bundles with hashes and provenance
- Risk enumeration gated by policy (including off-targets)
- Implied distributions (assumption bound) instead of “predictions”
- Exports ready for review by QA, platform, and procurement
Boundary conditions
What Helix Refuses to Do
Helix does not predict biological truth. It produces reviewable, reproducible computational evidence and enforces explicit boundaries on what is and is not known.
Ship uncertainty as certainty
Helix does not turn weak evidence into definitive claims. Outputs stay explicitly bounded by assumptions.
Hide policy or calibration regimes
No silent defaults. Decisions are always associated with an explicit policy and calibration domain.
Emit decisions without required evidence
If required inputs are missing, Helix blocks the decision and lists the missing evidence.
Make results non-reproducible
Every export carries IDs, versions, and hashes so reviewers can replay and verify results later.
Every UI action emits a cryptographically verifiable record.
Proof on page
Methods, benchmarks, and security receipts.
Big claims demand proof. Here are the artifacts teams review before every pilot, surfaced directly on the homepage.
Golden bundle (amplicon run).
Guide selection, governance grade
Guide selection is stable under plausible model uncertainty. Download the Golden Guide Sweep bundle (exports, verify logs, summaries, and decision.json).
Download guide sweep bundle →Example artifact format (redacted).
Example design bundle (PDF)
A redacted example of the design evidence bundle format Helix exports. Use it to understand the structure and what provenance fields you should expect in real bundles.
Download design bundle →Example NGS report format (redacted).
Example NGS outcome report (PDF)
A redacted example of the NGS outcome report format Helix exports (QC summaries, tables, and provenance fields).
Download NGS sample →Auditor-friendly steps and commands.
Offline verification (CLI)
Bundles are content-addressed with `manifest.json` + per-file SHA-256. `helix verify --kind auto --manifest …` checks hashes, schemas, and required policy gates without network access.
Audit walkthrough →Definitions + pack runner.
Determinism & conformance
Backends declare a determinism class: D0 (bitwise) or D1 (within tolerance). Conformance packs and verifiers make drift visible and block releases when invariants break.
Conformance packs →Benchmark methodology and trend logs.
Benchmark harness (public)
Reproducible benchmarks record commit SHA, dataset provenance, hardware fingerprints, and regression deltas. Run locally and compare against published CI history.
Benchmarks →Template for independent validation.
External attestation (third-party)
Helix supports independent reproduction: external labs/auditors can run the conformance packs, capture logs + hashes + SBOM, and publish signed attestation bundles.
Attestation template →Docs + commands published publicly.
Security & Supply Chain
Telemetry ships disabled, offline mode is first-class, installers are signed, and every drop has SBOM + checksum with copy/paste verification commands.
Security posture →Early Access / Beta Cohort
Built for defensible decisions.
Private beta is open now. General availability coming soon. If you need reproducible evidence, explicit policy gates, and an audit trail for genome editing decisions, let’s talk.
