airunidentity.com

Concept

What Is Run Identity?

Run identity is not a log entry, a trace ID, or an output. It is the record of what an AI run declared itself to be — before execution, independently of the system that ran it.

01 — Computation

What Identity Means for a Computation

Every computation has a composition. Something executes. That something has properties — a runtime, a set of instructions, inputs, configuration. Identity is the stable record of that composition. Not the record of what happened during execution. The record of what the execution was.

In traditional software, identity is implicit. A function's identity is its source code. A container's identity is its image. A build's identity is its manifest. You do not need to construct identity separately because the system's structure provides it. The code is readable. The configuration is static. The environment is controlled.

An AI run has no such implicit identity. The model cannot be read. The configuration is assembled dynamically. The context window is constructed and destroyed within the span of a single execution. There is no artifact that persists to say: this is what this run was.

For an AI run, identity would need to be constructed explicitly. It does not emerge from the system's architecture. It would need to be defined, captured, and preserved as a deliberate act.

02 — Failure

Why Standard Identifier Systems Fail for AI Runs

Trace IDs identify a request's path through a distributed system. They connect log entries across services. They tell you that the same request touched service A, then service B, then service C. They do not tell you what any of those services were configured to do. A trace ID for an AI run tells you that inference was called. It does not tell you what was in the context window, what system prompt was active, or what tools were available.

Log entries record events. A log might say: model GPT-4 was called at 14:32:07 with 3,847 tokens of input. This is operational telemetry. It does not capture the composition of the run. It does not record the system prompt. It does not record which retrieved documents were injected. It does not record the tool definitions. If any of these changed between runs, the log entries would look identical.

UUIDs identify instances. A UUID assigned to a run is a label — a unique string attached to an event. It has no semantic relationship to the run's composition. Two runs with completely different configurations receive equally opaque UUIDs. The identifier says nothing about what it identifies.

All three systems share the same limitation. They identify that a run occurred. None of them identify what the run was.

03 — Requirements

What Run Identity Would Actually Require

Any valid approach to run identity would need to satisfy constraints that no current system addresses.

It would need to capture the full composition of the run — not metadata about the run, but the actual components that constituted it. The model, the configuration, the system prompt, the retrieved context, the tool definitions, the parameters. All of them. Partially captured composition is not identity. It is a fragment that cannot be distinguished from a different fragment.

It would need to be captured at the point of execution — not reconstructed afterward from logs and outputs. Reconstruction is inference. Identity is declaration. The distinction matters because reconstruction depends on what was logged, and what was logged is determined by the operator, not by any standard of completeness.

It would need to be portable beyond the system that produced it. An identity that exists only within the operator's infrastructure is an internal record. It cannot be inspected by a downstream consumer, an auditor, or a counterparty. For identity to function across boundaries, it must travel with the output.

It would need to be independently confirmable. A receiving party must be able to check the identity without relying on the producing party's infrastructure or cooperation. If confirmation requires trusting the operator, it is not verification. It is deference.

04 — The Gap

Why the Absence Is Not a Gap in Tooling

The temptation is to frame this as a tooling problem. If logging platforms captured more data, the problem would be solved. If observability tools added an AI-specific module, the gap would close. If model registries expanded to include runtime configuration, identity would emerge.

This framing is wrong. The problem is not that tools capture too little. The problem is that the thing they would need to capture has no definition. There is no standard for what constitutes an AI run's identity. There is no convention for its structure. There is no agreement on what fields it contains, when it is captured, or how it is verified.

You cannot build a tool to capture something that has not been defined. You can build tools that capture more logs, richer traces, deeper telemetry. But more telemetry is not identity. It is more assertion by the same system, in the same format, with the same limitations. The quantity changes. The category does not.

The gap is in definition. Until the category exists, every tool that claims to address it is addressing something else.

What Breaks Without Identity

See what the absence of identity costs — in debugging, audit, and cross-system operation.