Agent Identity Is Not Model Identity — Why authenticating the software is not the same as proving which model is actually computing
Description
Modern AI deployment stacks authenticate artifacts, credentials, and agents. They do not verify which neural network is actually computing at inference time. This technical note identifies the distinction between agent identity and model identity, presents a four-question taxonomy for the identity surface of deployed AI systems, and situates recent public incidents within the resulting gap. It draws on the formal admissibility framework and frontier-scale measurement results from the accompanying research series.
This is a technical note, not a numbered entry in the research series.
The Neural Network Identity Series — Mathematical foundations, empirical validation, and governance frameworks for verifying which model is running
-
Paper 1: The δ-Gene: Inference-Time Physical Unclonable Functions from Architecture-Invariant Output Geometry (DOI: 10.5281/zenodo.18704275)
-
Paper 2: Template-Based Endpoint Verification via Logprob Order-Statistic Geometry (DOI: 10.5281/zenodo.18776711)
-
Paper 3: The Geometry of Model Theft: Distillation Forensics, Adversarial Erasure, and the Illusion of Spoofing (DOI: 10.5281/zenodo.18818608)
-
Paper 4: Provenance Generalization and Verification Scaling for Neural Network Forensics (DOI: 10.5281/zenodo.18872071)
-
Paper 5: Beneath the Character: The Structural Identity of Neural Networks — Mathematical Evidence for a Non-Narrative Layer of AI Identity (DOI: 10.5281/zenodo.18907292)
- Paper 6: Which Model Is Running?: Structural Identity as a Prerequisite for Trustworthy Zero-Knowledge Machine Learning (DOI: 10.5281/zenodo.19008116)
-
Paper 7: The Deformation Laws of Neural Identity (DOI: 10.5281/zenodo.19055966)
- Paper 8: What Counts as Proof? — Admissible Evidence for Neural Network Identity Claims (DOI: 10.5281/zenodo.19058540)
-
Paper 9: Composable Model Identity — Formal Hardening of Structural Attestations in the Enterprise Identity Stack (DOI: 10.5281/zenodo.19099911)
- Paper 10:Where Identity Comes From: Path Sensitivity and Endpoint Underdetermination in Neural Network Training (DOI: 10.5281/zenodo.19118807)
-
Paper 11: Post-Hoc Disclosure Is Not Runtime Proof: Model Identity at Frontier Scale (DOI: 10.5281/zenodo.19216634)
- Paper 12: Family-Dependent Response to Reasoning Distillation Across Structural and Functional Identity Layers (DOI: 10.5281/zenodo.19298857)
- Paper 13: Safety-Alignment Removal as a Model-Identity Failure — Structural Evidence from Published Weight-Level Mutation Checkpoints (DOI: 10.5281/zenodo.19383019)
- Technical Note: Agent Identity Is Not Model Identity (DOI: 10.5281/zenodo.19240883)
- Technical Note: Gap Invariance: Why PPP Measurements Are Domain-Independent by Construction (DOI: 10.5281/zenodo.19275524)
- Technical Note: Measured Model Substitution Under Valid Agent Credentials (DOI: 10.5281/zenodo.19342848)
- Technical Note: Artifact Identity Is Not Runtime Identity — Trustfall Lite and the Boundary of File-Level Model Verification (DOI: 10.5281/zenodo.20019127)
- Formal Verification Stack for Neural Network Structural Identity (IT-PUF Coq Proofs) (DOI: 10.5281/zenodo.18930621)
Copyright (c) 2026 Anthony Ray Coslett / Fall Risk AI, LLC. All Rights Reserved.
Confidential and Proprietary.
Patent Pending (Applications 63/982,893, 63/990,487, 63/996,680, 64/003,244).
Files
agent_identity_is_not_model_identity.pdf
Files
(154.7 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:e48a3f69b35bdb872623b1d56b4bf4c9
|
154.7 kB | Preview Download |
Additional details
Identifiers
Software
- Repository URL
- https://github.com/fallrisk-ai/trustfall-lite
- Development Status
- Active