Permissionless Value Propositions: A methodology for B2B outreach that leads with research, not pitches.
Most cold outreach fails because it asks before it gives. PVP flips this: you research the prospect using publicly available data, build something genuinely useful, and deliver it before asking for anything. The outreach itself is the value.
This repo is a practitioner's playbook. It covers the full methodology, from finding pain points in public data to constructing messages that prospects would pay to receive.
Traditional cold outreach operates on a simple exchange: "Give me your time, and I'll tell you about my product." The prospect has no reason to say yes. They get dozens of these emails a day.
PVP reverses the exchange. You do the work upfront. You find something specific, provable, and useful about their business. You deliver it with no strings attached. The response rate difference is not incremental. Teams running PVP methodology consistently see 25 to 40 percent positive reply rates, compared to 2 to 5 percent for traditional cold email.
The mechanism is straightforward:
- Specificity creates credibility. Knowing their name is not personal. Knowing their OSHA violation rate by facility, or their HMDA denial rate by ZIP code, is.
- Research demonstrates competence. You prove you understand their world before you ever ask for a conversation.
- Value triggers reciprocity. When someone does useful work for you, ignoring them feels wrong.
- No ask removes friction. There is nothing to say no to. There is only something to respond to.
PVP messages are built using F.I.N.D., a four phase methodology for turning public data into actionable intelligence:
| Phase | Action | Output |
|---|---|---|
| Find | Identify existential pain points using public data | A provable wedge |
| Investigate | Stitch together 3+ independent data sources | A multi-source evidence base |
| Narrate | Construct the message as a research delivery | A PVP email |
| Deliver | Send through the right channel at the right time | A live campaign |
Deep dive: docs/find-framework.md
- Read the F.I.N.D. framework to understand the methodology
- Review the data sources guide to see what public data is available
- Study the PVP construction guide to learn message structure
- Use the research checklist before your first outreach
- Pick a vertical you understand
- Use the wedge identification template to document a pain point
- Cross-reference with the data sources guide
- Draft your message using the email templates
- Review against the 7 criteria below before sending
Every PVP must pass all seven. Fail one and it is just another cold email.
| # | Criterion | What It Means |
|---|---|---|
| 1 | Independently Useful | Delivers value without requiring a meeting, call, or follow up to unlock it |
| 2 | Tied to Your Value Prop | Directly connected to what your product or service actually does |
| 3 | Based on Public Data | Uses information that requires no permission from the prospect to access |
| 4 | Translates Into Meaningful Insight | Contextualizes data to their specific situation, not generic stats |
| 5 | Goes Beyond Pain ID | Offers specific direction, not just pointing out the problem they already know |
| 6 | Creates Information Asymmetry | Delivers insights the prospect does not already have and cannot easily find |
| 7 | Concrete and Specific | Includes actual names, numbers, dates, and locations. Never vague. |
pvp-framework/
docs/
find-framework.md # The F.I.N.D. methodology in detail
data-sources.md # Public data source catalog by vertical
constructing-pvps.md # Step by step guide to writing PVP emails
templates/
pvp-email-template.md # 3 PVP email templates with examples
research-checklist.md # Pre-outreach research checklist
wedge-identification.md # Template for documenting a wedge
LICENSE
README.md
These principles run through every part of the methodology:
Research is the offer. It is cheap for you to produce, genuinely valuable for them to receive, and honest. You are not faking interest. You actually did the work.
Specificity beats personalization. "I saw you went to Michigan" is personalization. "Your facility at 1200 Industrial Blvd had 3 OSHA citations in Q4, all related to lockout/tagout procedures" is specificity. One triggers eye rolls. The other triggers replies.
The wedge must be existential. Not "nice to fix" but "dangerous to ignore." Compliance gaps, competitive blind spots, market timing windows. If the prospect can shrug it off, it is not a wedge.
Multi-source convergence. One data point is trivia. Two data points are a coincidence. Three data points are intelligence. Always cross-reference.
You cannot fake expertise. The methodology works because the research is real. If you cannot do the research, do not send the email. There is no shortcut.
This framework synthesizes and builds on the work of Jordan Crawford (Blueprint GTM / Cannonball GTM) and Doug Bell. Their methodology on pain-based prospecting, data stitching, and permissionless value delivery is the foundation.
Additional influences: Kellen Casebeer's Message-Market Fit framework for angle testing, and the broader community of practitioners building data-driven outbound systems.
MIT. See LICENSE.