Skip to content
Longterm Wiki
About
People9
Policy & Governance
Scorecards2
Output & Research
Announcements9

Grades from external scorecards. We mirror published grades only; per-source methodology lives at the link in each panel header. See the scorecards directory for cross-org comparison.

Foundation Model Transparency Index

by Stanford CRFMPublished 2025-12-01Source ↗
Overall:41
Agent Protocols
100
AI bug bounty
100
Amount of usage
0
AUP enforcement frequency
0
AUP enforcement process
100
Basic model properties
0
Benchmarked inference
0
Benefits Assessment
100
Capabilities evaluation
100
Capabilities taxonomy
0
Carbon emissions for final training run
0
Change log
100
Classification of usage data
0
Code access
0
Compute hardware for final training run
0
Compute provider
100
Compute usage for final training run
0
Compute usage including R&D
0
Consumer/enterprise usage
0
Crawling
100
Data acquisition methods
0
Data domain composition
0
Data laborer practices
0
Data language composition
0
Data processing methods
0
Data processing purpose
100
Data processing techniques
0
Data replicability
0
Data retention and deletion policy
0
Data size
0
Deeper model properties
0
Detection of machine-generated content
100
Development duration for final training run
0
Distribution channels with usage data
0
Documentation for responsible use
100
Downstream
55.6
Acceptable use policy
80
Accountability
100
Downstream mitigations
100
Impact
28.6
Model Behavior Policy
75
Post-deployment monitoring
42.9
Usage data
0
Energy usage for final training run
0
Enterprise mitigations
100
Enterprise users
0
External data access
0
External developer mitigations
100
External products and services
100
External reproducibility of capabilities evaluation
0
External reproducibility of mitigations evaluation
0
External reproducibility of risks evaluation
0
External risk evaluation
0
Feedback mechanisms
0
Foundation model roadmap
100
Geographic statistics
0
Government commitments
100
Government use
0
Instructions for data generation
0
Intermediate tokens
100
Internal compute allocation
0
Internal product and service mitigations
100
Internal products and services
0
Licensed data compensation
0
Licensed data sources
0
Misuse incident reporting protocol
0
Mitigations efficacy
0
Mitigations taxonomy
100
Mitigations taxonomy mapped to risk taxonomy
0
Model
43.3
Capabilities
25
Model cost
0
Model dependencies
0
Model access
50
Model information
0
Model Mitigations
40
Model objectives
100
Release
87.5
Model response characteristics
100
Risks
20
Model stages
100
Model theft prevention measures
100
New human-generated data sources
0
Notice of usage data used in training
100
Open weights
0
Organization chart
0
Oversight mechanism
100
Permitted and prohibited users
100
Permitted, restricted, and prohibited model behaviors
100
Permitted, restricted, and prohibited uses
100
Post-deployment coordination with government
0
Pre-deployment risk evaluation
0
Public datasets
0
Quantization
0
Regional policy variations
100
Release stages
100
Researcher credits
100
Responsible disclosure policy
100
Risks evaluation
0
Risks taxonomy
100
Risk thresholds
100
Safe harbor
0
Security incident reporting protocol
100
Specialized access
0
Synthetic data purpose
100
Synthetic data sources
100
System prompt
0
Terms of use
100
Top distribution channels
100
Train-test overlap
0
Upstream
23.5
Compute
11.1
Data Acquisition
33.3
Data Processing
33.3
Data Properties
0
Methods
66.7
Other resources
0
Usage data used in training
0
Users of internal products and services
0
Versioning protocol
100
Water usage for final training run
0
Whistleblower protection
100
Grade trajectory (3 waves)
v1.2 December 2025latest
41
v1.1 May 2024
93.1
v1.0 October 2023
40