anthonycoslett

...joined 2 days ago, and has 4 karma

submissions / comments / favourites

I work on Fall Risk AI / Trustfall, a runtime model-identity and AI supply-chain verification project.

Current focus: Trustfall Lite, an open-source CLI for checking local Hugging Face and Ollama model artifacts against a signed registry; and Trustfall Deep, a runtime model-identity protocol in design.

Interested in model provenance, runtime identity, AI security, signed evidence, and making infrastructure boring enough to trust.

https://www.fallrisk.ai

---

I built Trustfall Lite, an open-source CLI that scans local Hugging Face and Ollama model caches, computes artifact hashes, and checks them against a signed public registry.

https://github.com/fallrisk-ai/trustfall-lite

Install:

pipx install fallrisk-trustfall trustfall scan

By default, Trustfall can query the API with artifact hashes. It does not upload model bytes or file paths. There is also a local-only mode:

trustfall registry --refresh trustfall scan --local-only

It reports four states:

verified: artifact hash matches a signed registry record unknown_variant: model name appears in the registry, but local bytes differ not_enrolled: no registry record exists pilot_available: queued for enrollment

Important boundary: Trustfall Lite verifies artifact identity, not runtime identity.

It answers: "Do the bytes on disk match a signed record?"

It does not claim that the running process is structurally the same model. Runtime model identity is a separate layer.

Registry: https://fallrisk.ai/registry

Canonical signed JSON: https://attest.fallrisk.ai/registry.json

PyPI: https://pypi.org/project/fallrisk-trustfall

Project page: https://fallrisk.ai/trustfall-lite

Research / evidence boundary: https://fallrisk.ai/research

Founder scan: https://fallrisk.ai/articles/founder-scan

I’m especially interested in feedback from people running local model fleets, internal model caches, or AI supply-chain/security tooling.

anthony@fallrisk.ai