Edge of PracticeShort-Cycle FalsificationDetection Regime

Post-Deployment Monitoring as a Safety Proxy

A system is admissible as safe only if harmful behavior is observable within its monitoring channels. If harm can exist, propagate, or accumulate outside detection pathways, then monitoring is not a safety mechanism—it is a visibility mechanism.

Core Doctrine

You cannot mitigate what you cannot observe. If harm is not guaranteed to enter the detection channel, it is not governed.

Tested Assumption

Monitoring is sufficient to ensure safety

Post-deployment monitoring and user feedback are assumed to detect and mitigate harmful emergent behavior across all real-world use contexts.

Why This Assumption Persists

Visibility bias

Detected failures are visible and correctable, reinforcing confidence in monitoring systems.

Undetected harms leave no signal and are incorrectly treated as absence of failure.

Structural Break

Observation is not guaranteed

Monitoring assumes that harmful events will surface through feedback or observable signals.

This is false. Harm can exist without triggering reporting, recognition, or measurement.

Failure Modes

How harm escapes detection

  • Diffuse accumulation (no discrete event)
  • Delayed manifestation (time-shifted harm)
  • Unreported exposure (no feedback signal)
  • Population bias (underrepresented groups)
Governing Variable

Detection completeness

The governing variable is not response speed, but whether all materially harmful behavior enters the observable channel.

  • Complete detection → monitoring viable
  • Incomplete detection → monitoring invalid as safety proxy
Epistemic Boundary

Unknown harm space

Known harms can be monitored and mitigated.

Unknown or emergent harms may exist entirely outside monitoring visibility until after propagation.

Binary Boundary

What breaks the assumption

Pass: All harmful behaviors are reliably detected before propagation or impact.

Fail: Any harm exists that is undetected, underreported, or discovered only after propagation.

Corrected Interpretation

Monitoring is not governance

Monitoring systems observe known signals. They do not guarantee visibility into all harmful system behavior.

Safety requires pre-execution constraint—not post-hoc observation.

Invariant

If harm must be reported to exist, it is already too late.

A system that depends on observation to discover harm does not control harm—it waits for it.

Edge of Practice index