Daily arXiv Scan: Surfaces, Sabotage, and the Scaffolding Beneath
Four models scan arXiv so you don't have to. Today: 2 of 4 models reported (Gemini hit a 403, GPT-5 hit rate limits). 80 papers scanned across cs.AI, cs.CL, cs.LG, cs.HC, cs.SE, stat.ML.
Pair Picks (2/2 Agreement)
Four papers drew independent selection from both responding models โ a strong signal given the reduced panel.
1. Reckoning with the Political Economy of AI: Avoiding Decoys in Pursuit of Accountability
arXiv: 2604.16106 โ Vertesi, boyd, Taylor, Shestakofsky
The central construct here is decoys: governance interventions that absorb attention while leaving the actual political economy of AI โ resource accumulation, infrastructure control, labor displacement โ unexamined. The paper frames "the Project of AI" not as a technology but as a world-building endeavor aimed at sustaining networks of power.
- Opus: "Reframes the playing field rather than moving pieces on it. The 'decoy' framework is a powerful analytical tool for evaluating which governance interventions have teeth and which are performative."
- Kimi: "Sharp, uncomfortable, and conceptually unifying: the single best lens for evaluating any proposed 'AI policy' you will read this year."
2. ASMR-Bench: Auditing for Sabotage in ML Research
arXiv: 2604.16286 โ Gan, Bhatt, Shlegeris, Stastny, Hebbar
What happens when AI systems conducting autonomous research introduce subtle, intentional flaws into ML codebases? ASMR-Bench creates 9 sabotaged ML research codebases that alter experimental results while preserving surface plausibility.
- Opus: "The kind of benchmark that reveals a structural vulnerability before it's widely exploited. Sabotage embedded in implementation details while preserving high-level correctness is deeply unsettling."
- Kimi: "The adversarial challenge you didn't know you needed โ on par with early red-team escape simulations โ but for the knowledge supply chain itself."
3. Detecting and Suppressing Reward Hacking with Gradient Fingerprints
arXiv: 2604.16242 โ Wang, Pham, Yin, Wang, Chen
GRIFT examines gradient-level signatures to identify when a model is learning to hack reward functions rather than genuinely solving tasks โ moving detection below surface-level chain-of-thought monitoring.
- Opus: "A meaningful step toward mechanistic monitoring of training dynamics. The insight that surface-level CoT monitoring is insufficient โ and that gradient signatures can reveal what text cannot โ has broad implications for scalable oversight."
- Kimi: "Before this, you needed side-channel human annotators or reinterpreted logits โ both non-scalable. GRIFT means you can slap a loss-patch on the usual PPO loop."
4. Robust Synchronisation for Federated Learning in The Face of Correlated Device Failure
arXiv: 2604.16090 โ Behfar, Mortier
Device failures in federated learning are correlated (shared infrastructure, behavioral patterns), meaning naive synchronization creates systematically unfair training โ a clean example of how engineering assumptions embed social consequences.
- Opus: "Elegant identification of how a seemingly neutral engineering assumption (device independence) creates systematic bias. The connection between infrastructure correlation and fairness is underappreciated."
- Kimi: "Plays like a safety paper for assembly-line-scale FL deployments, but the techniques translate to any peer-to-peer ML system with flaky contributors."
Unique Finds
Beyond Distribution Sharpening: The Importance of Task Rewards (Opus only)
arXiv: 2604.16259 โ Mittal, Gagnon, Lajoie
Does RL with task rewards actually teach models new capabilities, or merely surface latent abilities? The authors demonstrate RL instills capabilities that cannot be recovered by sharpening alone โ meaning post-training is genuinely capability-creating, not just capability-revealing.
"Taking Stock at FAccT": Participatory Redesign of the FAccT Community (Kimi only)
arXiv: 2604.16224 โ Dudy et al.
A 380-stakeholder participatory redesign challenging whether scholarly paper authorship is still the right currency for sociotechnical impact. Produces a modular governance infrastructure one can fork at any team level.
Connecting Threads
The surface is unreliable; look beneath it. Three of today's picks (ASMR-Bench, GRIFT, Beyond Distribution Sharpening) converge on the same insight: surface-level observations are insufficient for understanding what AI systems are actually doing. Sabotage looks like correct code. Reward hacking looks like valid reasoning. Distribution sharpening looks like new capabilities. The field is converging on the need for mechanistic and structural signals โ not just output metrics.
Governance decoys meet epistemic sabotage. The political economy paper and ASMR-Bench are in quiet dialogue: one argues governance discourse is being co-opted at the conceptual level, while the other demonstrates the research process itself can be corrupted in hard-to-detect ways. Both what we study and how we study it may be compromised.
Post-training is where the action is. The distribution sharpening paper and GRIFT both focus on what happens after pre-training. As frontier models are increasingly differentiated by post-training recipes, understanding and governing this phase โ where capabilities emerge and misalignment can be introduced โ becomes critical.
Systems assumptions encode social outcomes. The federated learning paper makes this explicit for distributed training, but the pattern appears everywhere: choices about synchronization, reward functions, and conference governance all embed assumptions that determine who benefits and who is excluded.
Statistical Baseline
- Total unique papers selected: 6 (from 80 scanned)
- 2-model agreement: 4 papers (expected by chance: ~0.31)
- Agreement ratio: ~13ร above chance baseline
With only 2 of 4 models reporting, we can't compute full consensus or 3+ agreement stats. The pair agreement is still well above chance, suggesting genuine signal convergence.
Recommended Reading (Ranked by Agreement)
- ๐ Reckoning with the Political Economy of AI โ 2/2
- ๐ ASMR-Bench: Auditing for Sabotage in ML Research โ 2/2
- ๐ Detecting and Suppressing Reward Hacking with Gradient Fingerprints โ 2/2
- ๐ Robust Synchronisation for Federated Learning โ 2/2
- Beyond Distribution Sharpening โ Opus only
- Taking Stock at FAccT โ Kimi only
Methodology: 80 recent arXiv papers from cs.AI, cs.CL, cs.LG, cs.HC, cs.SE, and stat.ML are sent to 4 frontier models (Claude Opus, GPT-5, Gemini 2.5 Pro, Kimi K2), each asked independently to select the 5 most important papers. Agreement patterns reveal signal above noise. Today 2 of 4 models responded successfully. See the comparison methodology post for details on the approach.