Skip to content

ari-json/pvp-framework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

PVP Framework

Permissionless Value Propositions: A methodology for B2B outreach that leads with research, not pitches.

Most cold outreach fails because it asks before it gives. PVP flips this: you research the prospect using publicly available data, build something genuinely useful, and deliver it before asking for anything. The outreach itself is the value.

This repo is a practitioner's playbook. It covers the full methodology, from finding pain points in public data to constructing messages that prospects would pay to receive.


Why PVP Works

Traditional cold outreach operates on a simple exchange: "Give me your time, and I'll tell you about my product." The prospect has no reason to say yes. They get dozens of these emails a day.

PVP reverses the exchange. You do the work upfront. You find something specific, provable, and useful about their business. You deliver it with no strings attached. The response rate difference is not incremental. Teams running PVP methodology consistently see 25 to 40 percent positive reply rates, compared to 2 to 5 percent for traditional cold email.

The mechanism is straightforward:

  1. Specificity creates credibility. Knowing their name is not personal. Knowing their OSHA violation rate by facility, or their HMDA denial rate by ZIP code, is.
  2. Research demonstrates competence. You prove you understand their world before you ever ask for a conversation.
  3. Value triggers reciprocity. When someone does useful work for you, ignoring them feels wrong.
  4. No ask removes friction. There is nothing to say no to. There is only something to respond to.

The F.I.N.D. Framework

PVP messages are built using F.I.N.D., a four phase methodology for turning public data into actionable intelligence:

Phase Action Output
Find Identify existential pain points using public data A provable wedge
Investigate Stitch together 3+ independent data sources A multi-source evidence base
Narrate Construct the message as a research delivery A PVP email
Deliver Send through the right channel at the right time A live campaign

Deep dive: docs/find-framework.md


Quick Start

If you are new to PVP:

  1. Read the F.I.N.D. framework to understand the methodology
  2. Review the data sources guide to see what public data is available
  3. Study the PVP construction guide to learn message structure
  4. Use the research checklist before your first outreach

If you want to start building PVPs today:

  1. Pick a vertical you understand
  2. Use the wedge identification template to document a pain point
  3. Cross-reference with the data sources guide
  4. Draft your message using the email templates
  5. Review against the 7 criteria below before sending

The 7 Criteria

Every PVP must pass all seven. Fail one and it is just another cold email.

# Criterion What It Means
1 Independently Useful Delivers value without requiring a meeting, call, or follow up to unlock it
2 Tied to Your Value Prop Directly connected to what your product or service actually does
3 Based on Public Data Uses information that requires no permission from the prospect to access
4 Translates Into Meaningful Insight Contextualizes data to their specific situation, not generic stats
5 Goes Beyond Pain ID Offers specific direction, not just pointing out the problem they already know
6 Creates Information Asymmetry Delivers insights the prospect does not already have and cannot easily find
7 Concrete and Specific Includes actual names, numbers, dates, and locations. Never vague.

Repo Structure

pvp-framework/
  docs/
    find-framework.md        # The F.I.N.D. methodology in detail
    data-sources.md          # Public data source catalog by vertical
    constructing-pvps.md     # Step by step guide to writing PVP emails
  templates/
    pvp-email-template.md    # 3 PVP email templates with examples
    research-checklist.md    # Pre-outreach research checklist
    wedge-identification.md  # Template for documenting a wedge
  LICENSE
  README.md

Core Principles

These principles run through every part of the methodology:

Research is the offer. It is cheap for you to produce, genuinely valuable for them to receive, and honest. You are not faking interest. You actually did the work.

Specificity beats personalization. "I saw you went to Michigan" is personalization. "Your facility at 1200 Industrial Blvd had 3 OSHA citations in Q4, all related to lockout/tagout procedures" is specificity. One triggers eye rolls. The other triggers replies.

The wedge must be existential. Not "nice to fix" but "dangerous to ignore." Compliance gaps, competitive blind spots, market timing windows. If the prospect can shrug it off, it is not a wedge.

Multi-source convergence. One data point is trivia. Two data points are a coincidence. Three data points are intelligence. Always cross-reference.

You cannot fake expertise. The methodology works because the research is real. If you cannot do the research, do not send the email. There is no shortcut.


Attribution

This framework synthesizes and builds on the work of Jordan Crawford (Blueprint GTM / Cannonball GTM) and Doug Bell. Their methodology on pain-based prospecting, data stitching, and permissionless value delivery is the foundation.

Additional influences: Kellen Casebeer's Message-Market Fit framework for angle testing, and the broader community of practitioners building data-driven outbound systems.


License

MIT. See LICENSE.

About

Permissionless Value Propositions: Research-backed outreach that delivers value before asking for anything. F.I.N.D. framework, data source guide, email templates.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors