Skip to content
Longterm Wiki

Also known as: Writer.com, Writer AI

Policy & Governance
Scorecards1

Grades from external scorecards. We mirror published grades only; per-source methodology lives at the link in each panel header. See the scorecards directory for cross-org comparison.

Foundation Model Transparency Index

by Stanford CRFMPublished 2025-12-01Source ↗
Overall:72
Agent Protocols
100
AI bug bounty
100
Amount of usage
100
AUP enforcement frequency
0
AUP enforcement process
100
Basic model properties
100
Benchmarked inference
100
Benefits Assessment
100
Capabilities evaluation
100
Capabilities taxonomy
100
Carbon emissions for final training run
100
Change log
100
Classification of usage data
100
Code access
0
Compute hardware for final training run
100
Compute provider
100
Compute usage for final training run
100
Compute usage including R&D
100
Consumer/enterprise usage
100
Crawling
0
Data acquisition methods
100
Data domain composition
0
Data laborer practices
100
Data language composition
100
Data processing methods
100
Data processing purpose
100
Data processing techniques
100
Data replicability
0
Data retention and deletion policy
100
Data size
100
Deeper model properties
0
Detection of machine-generated content
100
Development duration for final training run
100
Distribution channels with usage data
100
Documentation for responsible use
100
Downstream
83.3
Acceptable use policy
80
Accountability
66.7
Downstream mitigations
100
Impact
85.7
Model Behavior Policy
50
Post-deployment monitoring
85.7
Usage data
100
Energy usage for final training run
100
Enterprise mitigations
100
Enterprise users
100
External data access
0
External developer mitigations
100
External products and services
100
External reproducibility of capabilities evaluation
0
External reproducibility of mitigations evaluation
0
External reproducibility of risks evaluation
0
External risk evaluation
0
Feedback mechanisms
100
Foundation model roadmap
0
Geographic statistics
100
Government commitments
100
Government use
0
Instructions for data generation
100
Intermediate tokens
100
Internal compute allocation
100
Internal product and service mitigations
100
Internal products and services
100
Licensed data compensation
0
Licensed data sources
0
Misuse incident reporting protocol
100
Mitigations efficacy
0
Mitigations taxonomy
100
Mitigations taxonomy mapped to risk taxonomy
0
Model
60
Capabilities
50
Model cost
100
Model dependencies
100
Model access
50
Model information
75
Model Mitigations
40
Model objectives
0
Release
87.5
Model response characteristics
100
Risks
40
Model stages
100
Model theft prevention measures
100
New human-generated data sources
0
Notice of usage data used in training
100
Open weights
0
Organization chart
100
Oversight mechanism
100
Permitted and prohibited users
100
Permitted, restricted, and prohibited model behaviors
0
Permitted, restricted, and prohibited uses
100
Post-deployment coordination with government
100
Pre-deployment risk evaluation
100
Public datasets
0
Quantization
100
Regional policy variations
100
Release stages
100
Researcher credits
100
Responsible disclosure policy
100
Risks evaluation
0
Risks taxonomy
100
Risk thresholds
100
Safe harbor
100
Security incident reporting protocol
0
Specialized access
0
Synthetic data purpose
100
Synthetic data sources
100
System prompt
0
Terms of use
100
Top distribution channels
100
Train-test overlap
0
Upstream
70.6
Compute
100
Data Acquisition
58.3
Data Processing
100
Data Properties
40
Methods
33.3
Other resources
100
Usage data used in training
100
Users of internal products and services
100
Versioning protocol
100
Water usage for final training run
100
Whistleblower protection
0
Grade trajectory (2 waves)
v1.2 December 2025latest
72
v1.1 May 2024
110.9