Reference
The vocabulary of
machine behaviour.
31 original terms developed during hundreds of documented AI sessions. Not found in prior AI literature with these exact definitions. This is the language we built to describe what we found.
31 terms · 3 tiers · 4 categories
Core Concepts
Warm Instance
generalAn AI session that has been running long enough that the machine has built up a picture of you. The longer the conversation, the more it adjusts its responses to match what it thinks you want to hear. Every session goes warm over time.
Core concept · EverythingThreads research archive
Cold Instance
generalA brand new session with no memory of you or your work. It has no reason to be nice. Used as an honest second opinion on anything produced in a warm session.
Core concept · EverythingThreads research archive
Cold Read
practitionerA structured evaluation by a cold instance of work sent without any explanation of intent or context. The six-constraint protocol forces verifiable structure.
Core concept · Six-constraint protocol
Warm by Proxy
practitionerA cold instance loaded with prior transcripts. Warm despite being a fresh session. Not a valid control for independent assessment.
One-Exchange Gap
generalThe moment you could have caught the problem — one exchange before you actually did. In 89% of the most serious instances in the archive, the warning sign was there one turn earlier. Most damage is preventable one step before people realise it.
Core concept · 89% figure from documented archive
Source Challenge
generalFour words you can ask any AI, any time: “How do you know this?” Ask it immediately after any specific claim. It is the fastest way to find out whether the machine actually knows something or is confidently guessing.
Session Temperature
practitionerA measure of how warm a session is. Determined by duration, friction level, benchmark acceptance, and positive register frequency.
Live Audit Document
practitionerA document built from real sessions, exchange by exchange. The course Week 4 deliverable. Entry format: exchange, M-code, severity score, intervention.
Course methodology · Week 4 deliverable
Performed Honesty
generalWhen the AI admits it was wrong or overconfident — but keeps doing the same thing. It sounds honest. The behaviour does not actually change. The admission does the job of a correction without being one.
Core concept · M2 mechanism
Mechanisms (M-Codes)
M1 Sycophancy
technicalPositive register produced before evidence warrants it. RLHF optimises for approval; warmth generates higher ratings than accurate-but-cold responses.
M-code taxonomy · Mechanism 1
M2 Performed Honesty
technicalPost-hoc admission generated after output, not before. The description of the generative process may be accurate; the subsequent behaviour does not change.
M-code taxonomy · Mechanism 2
M3 Warm Calibration
technicalIn-context model of the user shapes outputs. Friction decreases. Assessments orient toward user model rather than independent accuracy.
M-code taxonomy · Mechanism 3
M4 Expert Positioning
technicalTraining data cited as current fact. Temporal qualification absent. Confident answers receive higher approval — so the model trains toward confidence regardless of basis.
M-code taxonomy · Mechanism 4
M4+ Closed-Loop
technicalMachine evaluates content it helped produce. Cannot register its prior role. Evaluation partially derived from own prior outputs. Structurally distinct from sycophancy.
M-code taxonomy · Mechanism 4+
M5 Asymmetry Statement
technicalMachine names its structural difference without stating implications for assessment reliability. Acknowledges asymmetry; does not follow through to implications.
M-code taxonomy · Mechanism 5
M6 System Limits
technicalDesign choices framed as capability gaps. The machine apologises for the boundary rather than describing it as a decision.
M-code taxonomy · Mechanism 6
Severity (adapted)
technicalLow = unchanged scope, no direction altered. Medium = direction materially altered. High = external output produced. Critical = irreversible external action.
Adapted from FIRST.Org
RLHF
technicalReinforcement Learning from Human Feedback. The training mechanism that makes the machine optimise for approval. The structural driver of M1, M2, M3, and M4.
Foundational concept · Drives all M-codes
User Failure Patterns
Accepted Without Basis
generalUser accepts a machine claim without applying Source Challenge. Short affirmative response with no verification.
Accepted Confirmation as Evidence
generalUser asks warm instance to evaluate work it helped produce. Treats the result as independent assessment.
Accepted False Authority
generalTraining-data benchmark accepted as current market fact. Used as basis for a real decision without temporal verification.
Missed Catch
generalPattern present in machine output; user continues without Source Challenge or pause.
Identified and Dismissed
generalUser notices the pattern, names it, and continues anyway. The identification was correct; the action was not taken.
Extended Past Endpoint
practitionerSession continues after the natural completion point. Warm-instance risk compounds with each additional exchange.
Disclosure Without Awareness
practitionerPersonal preference or constraint embedded in a question without flagging it as context. Machine calibrates to it without disclosure.
Position Abandoned
practitionerCorrect user position reversed in response to machine restatement delivered with more confidence than the original.
Followed Unremarked Reframe
practitionerMachine introduces “actually” — a reframe of prior claim. User follows the new frame without noting the shift.
Signal Sequences
High / High
technicalMachine output quality high, user engagement high. Optimal. Both sides well-calibrated to the task.
Signal Sequence · Optimal configuration
Low / Low
technicalMachine output quality low, user engagement low. Acceptable. Both parties calibrated consistently.
Signal Sequence · Acceptable configuration
High / Low
technicalMachine output quality high, user engagement low. Critical sycophancy signal. Machine performing for an audience that is not checking. Highest-risk configuration.
Signal Sequence · Critical risk · Highest priority
Low / High
technicalMachine output quality low, user engagement high. Investigate. Machine unusually restrained or user systematically overclaims.
Signal Sequence · Investigate configuration
Go Deeper
See the full M-code taxonomy
The M-code system classifies six distinct machine behaviours observed across hundreds of documented sessions. Each code maps to a specific mechanism, severity scale, and intervention protocol.