38 lines
No EOL
3.3 KiB
JSON
38 lines
No EOL
3.3 KiB
JSON
{
|
|
"rejected_claims": [
|
|
{
|
|
"filename": "multi-agent-deployment-exposes-emergent-security-vulnerabilities-invisible-to-single-agent-evaluation-because-cross-agent-propagation-identity-spoofing-and-unauthorized-compliance-arise-only-in-realistic-multi-party-environments.md",
|
|
"issues": [
|
|
"missing_attribution_extractor"
|
|
]
|
|
},
|
|
{
|
|
"filename": "agent-accountability-gap-requires-human-decision-authority-over-critical-systems-because-agents-cannot-bear-responsibility-for-downstream-harms.md",
|
|
"issues": [
|
|
"missing_attribution_extractor"
|
|
]
|
|
}
|
|
],
|
|
"validation_stats": {
|
|
"total": 2,
|
|
"kept": 0,
|
|
"fixed": 8,
|
|
"rejected": 2,
|
|
"fixes_applied": [
|
|
"multi-agent-deployment-exposes-emergent-security-vulnerabilities-invisible-to-single-agent-evaluation-because-cross-agent-propagation-identity-spoofing-and-unauthorized-compliance-arise-only-in-realistic-multi-party-environments.md:set_created:2026-03-19",
|
|
"multi-agent-deployment-exposes-emergent-security-vulnerabilities-invisible-to-single-agent-evaluation-because-cross-agent-propagation-identity-spoofing-and-unauthorized-compliance-arise-only-in-realistic-multi-party-environments.md:stripped_wiki_link:pre-deployment-AI-evaluations-do-not-predict-real-world-risk",
|
|
"multi-agent-deployment-exposes-emergent-security-vulnerabilities-invisible-to-single-agent-evaluation-because-cross-agent-propagation-identity-spoofing-and-unauthorized-compliance-arise-only-in-realistic-multi-party-environments.md:stripped_wiki_link:AI-models-distinguish-testing-from-deployment-environments-p",
|
|
"multi-agent-deployment-exposes-emergent-security-vulnerabilities-invisible-to-single-agent-evaluation-because-cross-agent-propagation-identity-spoofing-and-unauthorized-compliance-arise-only-in-realistic-multi-party-environments.md:stripped_wiki_link:emergent misalignment arises naturally from reward hacking a",
|
|
"agent-accountability-gap-requires-human-decision-authority-over-critical-systems-because-agents-cannot-bear-responsibility-for-downstream-harms.md:set_created:2026-03-19",
|
|
"agent-accountability-gap-requires-human-decision-authority-over-critical-systems-because-agents-cannot-bear-responsibility-for-downstream-harms.md:stripped_wiki_link:coding agents cannot take accountability for mistakes which ",
|
|
"agent-accountability-gap-requires-human-decision-authority-over-critical-systems-because-agents-cannot-bear-responsibility-for-downstream-harms.md:stripped_wiki_link:human verification bandwidth is the binding constraint on AG",
|
|
"agent-accountability-gap-requires-human-decision-authority-over-critical-systems-because-agents-cannot-bear-responsibility-for-downstream-harms.md:stripped_wiki_link:delegating critical infrastructure development to AI creates"
|
|
],
|
|
"rejections": [
|
|
"multi-agent-deployment-exposes-emergent-security-vulnerabilities-invisible-to-single-agent-evaluation-because-cross-agent-propagation-identity-spoofing-and-unauthorized-compliance-arise-only-in-realistic-multi-party-environments.md:missing_attribution_extractor",
|
|
"agent-accountability-gap-requires-human-decision-authority-over-critical-systems-because-agents-cannot-bear-responsibility-for-downstream-harms.md:missing_attribution_extractor"
|
|
]
|
|
},
|
|
"model": "anthropic/claude-sonnet-4.5",
|
|
"date": "2026-03-19"
|
|
} |