The Evaluation Trap: Benchmark Design as Theoretical Commitment

arXiv cs.AI Papers

Summary

This paper identifies the 'evaluation trap' where AI benchmarks inadvertently stabilize dominant paradigms by narrowing what counts as progress, and introduces Epistematics, a meta-evaluative methodology to ensure evaluation criteria discriminate true capability from proxy behaviors.

arXiv:2605.14167v1 Announce Type: new Abstract: Every AI benchmark operationalizes theoretical assumptions about the capability it claims to assess. When assumptions function as unexamined commitments, benchmarks stabilize the dominant paradigm by narrowing what counts as progress. Over time, narrow evaluation reorganizes capability concepts: architectures and definitions are selected for benchmark legibility until evaluation ceases to track an independent object and instead produces a version of the target defined by its own operational assumptions. The result is a trap: evaluation frameworks treat self-reinforcing assessments as valid, both creating and obscuring structural limits on what the current paradigm can accomplish. We introduce Epistematics, a methodology for deriving evaluation criteria directly from technical capability claims and auditing whether proposed benchmarks can discriminate the claimed capability from proxy behaviors. The contribution is meta-evaluative: an audit procedure, a failure mode taxonomy, and benchmark-design criteria for evaluating capability-evaluation coherence. We demonstrate the procedure through a worked audit of Dupoux et al. (2026), a proposal that revises the dominant paradigm's theoretical assumptions at the architectural level while reproducing them in its evaluation criteria, thereby entrenching the constraint it seeks to overcome in a form the evaluation cannot detect.
Original Article
View Cached Full Text

Cached at: 05/15/26, 06:21 AM

# Benchmark Design as Theoretical Commitment
Source: [https://arxiv.org/html/2605.14167](https://arxiv.org/html/2605.14167)
## The Evaluation Trap: Benchmark Design as Theoretical Commitment

###### Abstract

Every AI benchmark operationalizes theoretical assumptions about the capability it claims to assess\. When assumptions function as unexamined commitments, benchmarks stabilize the dominant paradigm by narrowing what counts as progress\. Over time, narrow evaluation reorganizes capability concepts: architectures and definitions are selected for benchmark legibility until evaluation ceases to track an independent object and instead produces a version of the target defined by its own operational assumptions\. The result is a trap: evaluation frameworks treat self\-reinforcing assessments as valid, both creating and obscuring structural limits on what the current paradigm can accomplish\. We introduceEpistematics, a methodology for deriving evaluation criteria directly from technical capability claims and auditing whether proposed benchmarks can discriminate the claimed capability from proxy behaviors\. The contribution is meta\-evaluative: an audit procedure, a failure mode taxonomy, and benchmark\-design criteria for evaluating capability\-evaluation coherence\. We demonstrate the procedure through a worked audit ofDupouxet al\.\([2026](https://arxiv.org/html/2605.14167#bib.bib6)\), a proposal that revises the dominant paradigm’s theoretical assumptions at the architectural level while reproducing them in its evaluation criteria, thereby entrenching the constraint it seeks to overcome in a form the evaluation cannot detect\.

## 1 Introduction

It is well established that evaluation does not neutrally measure performance; it shapes research and development\(Rajiet al\.,[2021](https://arxiv.org/html/2605.14167#bib.bib20)\), contaminating the object of study\. What remains underexplained are the mechanisms by which this occurs and how it might be addressed\.

This paper investigates evaluation within AI, arguing that benchmarks shape the field because they operationalize implicit theoretical assumptions that govern how capabilities are modeled, evaluated, and ultimately judged valid\. As benchmark success becomes the dominant signal of progress, it becomes the de facto interpretation of capability, obscuring the distinction between performance and the capacities it is taken to represent\. This dynamic blinds the discipline to its own boundaries, causing it to treat structural dead\-ends as mere technical hurdles\. We name this contamination the*evaluation trap*and propose a methodological response\. This dynamic is continuous with the epistemic laundering mechanisms described inKalaitzidis \([2026](https://arxiv.org/html/2605.14167#bib.bib13)\), in which contested theoretical commitments are stabilized and naturalized through AI discourse\.

We introduce Epistematics as a meta\-evaluative framework for addressing this problem\. The methodology proceeds in four steps: \(1\) specify the claimed capability; \(2\) extract the theoretical assumptions that define what it requires; \(3\) derive the architectural and environmental requirements those assumptions imply; and \(4\) test whether the proposed evaluation criteria can discriminate the claimed capability from simpler proxy behaviors\. The output is tractable design input: discriminative evaluation criteria, predicted failure modes, and candidate benchmark specifications\. Existing benchmark analysis typically identifies evaluation failure after the fact; Epistematics derives evaluative conditions from the capability claim itself, prior to benchmark construction\.

We demonstrate the procedure through a worked audit ofDupouxet al\.\([2026](https://arxiv.org/html/2605.14167#bib.bib6)\), whose proposal for “autonomous learning” attempts to revise the dominant AI paradigm’s theoretical assumptions at the architectural level while reproducing them in its evaluation criteria\. Through this demonstration, we make three contributions to evaluation science: a formalized audit procedure for diagnosing capability\-evaluation incoherence; a worked analysis demonstrating how evaluation failure persists even within state\-of\-the\-art research; and design criteria for constructing benchmarks capable of detecting the capabilities they claim to measure\.

## 2 The mechanisms of the evaluation trap: transferability, circularity, and behavioral approximation

To assess any capability, a benchmark must specify what counts as evidence, what performances are diagnostic, and what conditions would reveal its absence\. These specifications encode theoretical assumptions about the target; once operationalized, they function as theoretical commitments that determine what the framework can and cannot detect\(Bowker and Star,[1999](https://arxiv.org/html/2605.14167#bib.bib2)\)\. Evaluation that does not examine its own assumptions cannot detect the structural limits of its own methods\. A field that relies on such evaluation cannot generate the revisions required to surpass those limits\. This dynamic operates through three interdependent mechanisms: thetransferability assumptionthat converts benchmark performance into capability attribution, thecircularitythrough which evaluation progressively reorganizes its own object, and thebehavioral approximationthat results\.

### 2\.1 The transferability assumption

In AI, theoretical assumptions permeate the design stack\. Objective functions determine optimization targets, training data delimit relevant evidence, evaluation conditions define valid tests, and metrics specify success\. Together, these choices instantiate a specific theory of the target capacity and foreclose alternative theories\. For example, a benchmark that rewards output similarity to a target distribution does not measure the capability in general; it measures the capabilityas defined by a distributional performance theoryand motivates the construction of architectures to realize it\.

A benchmark that operationalizes such ade factotheory cannot distinguish between a system that improves on its own criteria and one that instantiates the capacity it claims to measure\(Chollet,[2019](https://arxiv.org/html/2605.14167#bib.bib4); Rajiet al\.,[2021](https://arxiv.org/html/2605.14167#bib.bib20)\)\. This limitation is structural: making the distinction would require a comparative theory the framework does not encode\.

Inference from benchmark performance to capability attribution depends on an assumption of*transferability*: that performance on a benchmark licenses inference to the broader capability\(Cartwright,[1999](https://arxiv.org/html/2605.14167#bib.bib3)\)\. Without this theoretical assumption, the gap between what the benchmark measures and what the capability requires would be visible and addressable\. With it, observable performance is treated as evidence of capability, even when the mechanisms that would justify that inference are absent\. Under optimization pressure, this inference reshapes the original target\. Once performance is treated as sufficient evidence of capability, optimization operates on the benchmark’s operationalization rather than the capability itself\. This establishes a reinforcing feedback loop: the transferability assumption licenses performance as capability, optimization follows, and the target reorganizes around what the benchmark can detect\.

### 2\.2 The circularity problem

We call this loop the*circularity problem*\. It differs from data contamination, which describes test\-set leakage from training data, and extends beyond Goodhart’s Law, which assumes a stable target that proxy measures fail to track\(Goodhart,[1984](https://arxiv.org/html/2605.14167#bib.bib10)\)\. While Goodhart’s Law identifies the divergence between a stable target and an increasingly manipulated proxy, circularity identifies a feedback loop in which the act of evaluation participates in the conceptual and technical constitution of the target itself\. This is a “looping effect”\(Hacking,[1999](https://arxiv.org/html/2605.14167#bib.bib11)\)in which classifications participate in bringing into being the phenomena they describe\. As evaluation frameworks stabilize, they reshape what counts as the capability\(Porter,[1995](https://arxiv.org/html/2605.14167#bib.bib19)\), producing systems that satisfy evaluation criteria while stabilizing those criteria as the capability itself\. This stabilization process operates through mechanisms analyzed inKalaitzidis \([2026](https://arxiv.org/html/2605.14167#bib.bib13)\)as epistemic laundering: the naturalization of misrecognition through double concealment\.

This produces a “lossy compression” of capability concepts in which the diverse theoretical commitments required to instantiate a capability are discarded while tractable benchmark\-legible proxies are retained\. This reduction generates a*structural ceiling*: a limit on what a paradigm can achieve or recognize as achievement\. Because the underlying assumptions fix \(1\) the problem space, \(2\) the space of legible solutions, and \(3\) the criteria for evidence of progress, the ceiling is not visible from within the paradigm; it appears not as a boundary but as the horizon of the possible\(Kuhn,[1962](https://arxiv.org/html/2605.14167#bib.bib14)\)\.

### 2\.3 The lossiness of behavioral approximation

Structural ceilings create blind spots in the field: some capabilities sought by frontier research may require theoretical commitments that are incommensurable with those assumed by dominant benchmarks\. The incompatibility is expressed at the level of architecture\. For example, a distributional theory is typically operationalized through fixed\-weight deployed models, while a cybernetic theory111Cybernetics, developed by Wiener \[1948\], treats learning as real\-time error correction through feedback loops coupling system outputs to environmental states\.requires closed feedback loops coupling system outputs to environmental states\. Optimization within the distributional evaluation framework not only fails to approach cybernetic capabilities; it creates the appearance that existing approaches are sufficient with enough scale\(Chollet,[2019](https://arxiv.org/html/2605.14167#bib.bib4); Marcus,[2020](https://arxiv.org/html/2605.14167#bib.bib17); Agre,[1997](https://arxiv.org/html/2605.14167#bib.bib1)\)\. Evaluation and engineering become mutually reinforcing, obscuring the alternative theoretical frameworks, architectures, and evaluations that might support them\.

This reinforcing circularity produces a specific class of systems\. Current benchmarks evaluate defined problem spaces with stable conditions and verifiable outputs; many capabilities AI engineers seek \(e\.g\., autonomous learning, genuine reasoning, adaptive world\-modeling\) operate under open\-ended, context\-dependent conditions and resist predefined success criteria\. Benchmarks measure these adaptive capabilities by converting ill\-structured problems into well\-structured proxies\(Jonassen,[1997](https://arxiv.org/html/2605.14167#bib.bib12)\), and systems optimized against the proxies learn to succeed under the conditions the proxies define\(Chollet,[2019](https://arxiv.org/html/2605.14167#bib.bib4); Geirhoset al\.,[2020](https://arxiv.org/html/2605.14167#bib.bib8)\)\. We call the resulting systems*behaviorally approximate*: they produce outputs that resemble those of a genuinely capable system under benchmark conditions without instantiating the mechanisms those outputs require\.

Behavioral approximation arises from benchmark design under the transferability assumption and from optimization within a circular, lossy evaluation regime\. It is the form in which structural ceilings manifest\. Performance fails to transfer not because the system failed to learn, but because it learned precisely what the benchmark made legible\.

This categorical oversight evades the evaluation framework that produces it\. When failures occur, practitioners address them through the technical rationality of engineering practice\(Schön,[1983](https://arxiv.org/html/2605.14167#bib.bib23)\): more data, architectural refinement, extended training\. But if the ceiling is structural rather than technical, these responses cannot resolve it\. They further optimize within the same assumptions that produced the limitation, which is why the field’s most ambitious capabilities may remain out of reach despite continued progress within dominant evaluation regimes\. The field is caught in an evaluation trap: its evaluative frameworks cannot detect the gap between claimed and instantiated capability, and the only solutions available are those the paradigm can generate\.

## 3 Epistematics: a meta\-evaluative procedure

CapabilityClaimTheoreticalAssumptionsDesign and EvaluationRequirementsDiscriminativeValidity Testfailure modes identified hereFigure 1:The Epistematics procedure: a four\-step process from capability claim to discriminative validity test, with a feedback arrow identifying failure modes\.Epistematics treats capability definitions as theoretical commitments that must be specified before evaluation\. It proceeds in four steps: \(1\) specify the capability claim as used in technical and public discourse; \(2\) extract the theoretical assumptions the claim invokes or implies; \(3\) derive the architectural and environmental requirements necessitated by those assumptions; and \(4\) test whether proposed evaluation criteria can discriminate the target capability from proxy behaviors\. A benchmark fails the discriminative validity test if a system lacking the target mechanism can satisfy it, or if a system possessing the target mechanism cannot be uniquely identified by it\. Discriminative validity therefore concerns not whether a benchmark predicts performance, but whether it distinguishes the target mechanism from alternative routes to benchmark success\.

The procedure is designed to be reproducible: independent researchers applying the four steps should converge on comparable architectural requirements, with disagreements traceable to differences in theoretical interpretation or constraint derivation\. Such disagreement is itself a finding rather than a defect\. The output is tractable design input: discriminative evaluation criteria, predicted failure modes, and candidate benchmark specifications that engineers can evaluate, contest, and develop\. These outputs specify the conditions under which a benchmark can validly attribute a claimed capability\.

Specifically, the failure modes of the discriminative validity tests are not generic benchmark flaws; they are specific signatures of the circularity problem\. Each names a way the assumption of transferability sustains structural blindness in evaluation design\.

Proxy substitution\.The benchmark measures task convergence rather than the targeted capability\. A system that achieves criterion performance by exploiting statistical regularities in the proxy task is indistinguishable from one that genuinely instantiates the target mechanism\.

Architectural indistinguishability\.Some mechanisms are structurally impossible within certain architectures regardless of training history\. A fixed\-weight, non\-recurrent system cannot instantiate real\-time feedback coupling, but trials\-to\-criterion measures outcome rather than mechanism and cannot register the structural absence\. A system approximating feedback\-driven behavior and one instantiating it become evaluatively equivalent\.

Context blindness\.A benchmark that does not vary context cannot detect whether competence is context\-sensitive or task\-specific\. Performance on a fixed task family establishes only that the benchmark’s own task was solved; the conditions under which general competence would distinguish itself from task\-specific optimization never arise\.

Criterion leakage\.Statistical parity does not imply mechanistic equivalence\. A system achieving human\-level metrics \(e\.g\., learning speed\) through brute\-force distributional optimization is indistinguishable from one achieving it through genuine adaptive coupling, because the criterion registers only the output and not the mechanism that produced it, allowing alternative mechanisms to pass undetected\.

Approximation ceiling\.A system optimized against a well\-structured proxy learns to satisfy benchmark criteria under the conditions the proxy defines\. Because those conditions are within the system’s design envelope, the benchmark cannot detect failure at the point where the ill\-structured capability the proxy represents would actually be required\. A system exhibiting genuine adaptive capacity and one exhibiting behavioral approximation are indistinguishable within the benchmark’s defined conditions; they diverge only outside them, which the benchmark cannot reach\.

### 3\.1 Falsifiability and generalizability

If Epistematics\-derived criteria fail to distinguish systems with the target mechanism from proxy\-performing systems, or fail to improve discriminative validity over standard benchmarks, the framework should be rejected\. Empirical falsification would require demonstrating that standard benchmarks predict capability\-relevant behavior in genuinely novel conditions at least as well as Epistematics\-derived criteria; that is, that mechanism\-level discrimination offers no predictive advantage over performance\-level evaluation\.

The procedure is also domain\-general: the four steps apply to any capability claim whose theoretical sources yield derivable architectural requirements\. Applied to reasoning, Epistematics requires distinguishing inferential operations that preserve validity across novel compositional structures from pattern completion within the training distribution\(Chollet,[2019](https://arxiv.org/html/2605.14167#bib.bib4); Marcus,[2020](https://arxiv.org/html/2605.14167#bib.bib17)\)\. Applied to world\-modeling, it requires distinguishing representations updated through prediction error against environmental states from distributional fit\.

## 4 Case analysis: autonomous learning and captured evaluation

Dupouxet al\.\([2026](https://arxiv.org/html/2605.14167#bib.bib6)\)propose an architecture intended to transcend the dominant AI paradigm’s limitations\. Because the proposal correctly diagnoses the field’s structural problem, the lossiness that reappears across its design stack and evaluation is especially diagnostic\.

The proposal argues current AI lacks autonomous learning because current learning remains externalized through human\-managed pipelines, and it responds by proposing lessons from cognitive science, namely an A/B/M architecture intended to integrate observation, action, and meta\-control\. System A handles unsupervised observation\-based learning, System B handles action\-based reinforcement learning, and System M provides meta\-control over when and how each mode is engaged\. The following analysis unpacks the proposal’s operative theoretical commitments to show how they shape both its evaluation criteria and its viable engineering directions\.

### 4\.1 Specifying the capability claim

The claimed capability is “autonomous learning”: the ability of a system to learn adaptively from real\-world interaction without requiring human\-orchestrated training pipelines\.Dupouxet al\.\([2026](https://arxiv.org/html/2605.14167#bib.bib6)\)define this in explicit contrast to current AI systems, which “learn essentially nothing” \(p\. 2\) once deployed and whose learning “is outsourced to human experts instead of being an intrinsic capability” \(p\. 15\)\. To overcome this limitation, the authors claim new architectures should instantiate a fundamentally different kind of learning, one that is self\-directed, feedback\-coupled, and adaptive across genuinely novel situations\.

### 4\.2 Extracting theoretical assumptions

The dominant learning theory implicit in current AI and benchmark design is distributional and performance\-based\. We call this the*distributional performance theory*: learning is improvement on specified tasks measured against held\-out data from the same distribution\.

Dupouxet al\.\([2026](https://arxiv.org/html/2605.14167#bib.bib6)\)invoke multiple traditions of learning beyond this theory\. These traditions are not interchangeable\. They offer distinct and partially incompatible accounts of what learning requires, including mechanisms the distributional framework was not designed to capture\.

The authors acknowledge that the distributional account is historically contingent rather than conceptually necessary, and that learning has been studied across a “rich set of traditions and methods in the natural, social, and formal sciences,” but then decline to review those traditions\. Specifically, cybernetic accounts\(Wiener,[1948](https://arxiv.org/html/2605.14167#bib.bib28)\)require real\-time error correction through feedback loops coupling system outputs to environmental states\. Situated and sociocultural accounts\(Lave,[1988](https://arxiv.org/html/2605.14167#bib.bib15); Vygotsky,[1978](https://arxiv.org/html/2605.14167#bib.bib27)\)treat competence as an achievement of person\-in\-setting rather than a property of an isolated agent\. Ecological accounts\(Gibson,[1966](https://arxiv.org/html/2605.14167#bib.bib9)\)locate learning in active perceptual engagement with a real environment\.

The paper gestures toward this broader space through “active SSL,” in which System B directs System A’s attention across portions of a sensory stream\. But this preserves the language of active perception while foreclosing its structural requirement\. For Gibson, the structure available to perception is not antecedently given; it is progressively disclosed through the organism’s movement through a real environment, such that the space of perceivable affordances cannot be specified in advance of the engagement that produces them\. Active SSL, by contrast, operates over a sensory stream whose distribution is fixed prior to attention allocation\. The available “action” is selection within a pre\-specified input space, not the generative coupling through which ecological structure becomes perceivable in the first place\. This formalization of the ecological account does not satisfy the architectural requirements specified by the theory\.

More broadly, the paper’s central distinction of “autonomous learning” \(observation\-based versus action\-based learning\) draws from AI subfield divisions\. Operationally, both System A and System B are primarily supported by computational citations\(Saffranet al\.,[1996](https://arxiv.org/html/2605.14167#bib.bib22); Rao and Ballard,[1999](https://arxiv.org/html/2605.14167#bib.bib21); Sutton and Barto,[2018](https://arxiv.org/html/2605.14167#bib.bib25); Schultzet al\.,[1997](https://arxiv.org/html/2605.14167#bib.bib24)\)\. The operational theoretical assumptions are therefore narrower than the authors’ claimed capability\. This constitutes a lossy compression of the cited traditions: the mechanisms that define those accounts are reduced to forms legible within the distributional paradigm\.

This resulting lossiness cannot be defended as ordinary engineering simplification\. Because the capability claim is grounded in the traditions the authors themselves cite, any simplification must preserve the mechanisms those traditions treat as constitutive of learning\. Here it does not: a distributional formalization of learning is not a tractable approximation of cybernetic feedback coupling; it omits the closed loop that defines cybernetic learning\. A reward\-optimized policy is not a tractable approximation of mediated activity; it is the formalism mediated\-activity theorists developed their accounts against\. This creates a critical instability: if autonomous learning requires mechanisms beyond distributional curve\-fitting, substituting a reward\-optimized policy undermines the claim to have instantiated it; if it does not, the proposal never departs from the paradigm it opposes\.

Because the mechanism is replaced at the level of theoretical assumption, the instability propagates through the design stack, becoming visible at the level of evaluation\. Autonomous learning, as defined here, is an ill\-structured capability: open\-ended, context\-dependent, and not reducible to predefined success criteria\(Jonassen,[1997](https://arxiv.org/html/2605.14167#bib.bib12)\)\. The proposed evaluation criteria instead treat it as a well\-structured proxy with fixed solution spaces and convergent performance metrics\. The framework therefore converts an ill\-structured capability into a well\-structured form and stabilizes success on that form as evidence of the capability\.

### 4\.3 Deriving architectural and evaluative requirements

These theoretical differences define different units of analysis and therefore imply different requirements of architecture, training, and evaluation\. The distributional account that dominates current AI systems is operationalized through loss minimization over static datasets: objective functions reward output similarity to a target distribution, and evaluation tests performance on held\-out samples from that same distribution\.

Autonomous learning requires more than this framework can detect\. A cybernetic account requires real\-time feedback pathways through which system behavior is updated by environmental response, not weights fixed at deployment\. A situated account requires competence to be assessed in context, not abstracted from it\. An ecological account requires active perceptual coupling with an uncontrolled environment, not performance on recorded or synthetic inputs\. These are not alternative measures of the same capacity\. They imply different mechanisms and therefore different evaluative conditions\. Evaluation must therefore test performance under structurally different settings rather than generalization within a distribution\.

The substitution emerges in the paper’s treatment of action\. In the A/B framework, action is intervention directed toward a specified objective, a formalization inherited from reinforcement learning\. In Vygotskian terms, by contrast, action is mediated by tools, signs, and social relations that transform both actor and activity\(Vygotsky,[1978](https://arxiv.org/html/2605.14167#bib.bib27); Leont’ev,[1978](https://arxiv.org/html/2605.14167#bib.bib16); Engeström,[1987](https://arxiv.org/html/2605.14167#bib.bib7)\)\. Learning is not policy adjustment toward reward, but participation in culturally mediated practice\. An agent optimizing reward over state\-action trajectories is therefore not a Vygotskian subject\. The cited theoretical traditions are not operationalized at the level of architectural or evaluative mechanism\.

The same gap appears in the paper’s appeal to cybernetics\. ForWiener \([1948](https://arxiv.org/html/2605.14167#bib.bib28)\), learning requires closed\-loop error correction: system behavior modifies the environment, and environmental response modifies subsequent behavior\. System B is action\-based, but not cybernetically coupled in this sense\. The authors are explicit that System B’s policies are “learned over the organism’s lifetime via gradient descent or reinforcement”\(Dupouxet al\.,[2026](https://arxiv.org/html/2605.14167#bib.bib6), p\. 10\): optimization over stored experience, not real\-time environmental updating\. The paper positions itself as heir to the 1950s cybernetic tradition it invokes in its foreword, then proposes an architecture that reproduces the very absence of environmental coupling that distinguished Wiener’s program from its behaviorist contemporaries\.

The capability claim also implies a stronger form of meta\-regulation than System M is designed to satisfy\. Second\-order cybernetics would require not merely switching among pre\-specified learning modes, but revising the criteria by which such switching is governed\(von Foerster,[1974](https://arxiv.org/html/2605.14167#bib.bib26); Maturana and Varela,[1980](https://arxiv.org/html/2605.14167#bib.bib18)\)\. The authors specify the opposite: System M’s “core routing policy is hardwired, an evolutionarily fixed transition table that dictates when to explore, when to plan, and when to act”\(Dupouxet al\.,[2026](https://arxiv.org/html/2605.14167#bib.bib6), p\. 10\)\. Meta\-regulation in their architecture is fixed at the evolutionary timescale, not adaptive at the lifetime of the agent\. Even on this stronger reading, however, the core evaluative problem remains unchanged: the proposed criteria cannot distinguish genuinely self\-revising meta\-control from pre\-specified mode switching\. Trials\-to\-criterion and hours of language exposure are therefore blind not only to first\-order feedback coupling, but also to whether the system’s regulation of learning is itself adaptive in the required sense\.

The analysis here is not that reinforcement learning should be rewritten to incorporate sociocultural theory; it is that a capability claim grounded in a cited tradition cannot be operationalized through a formalism that tradition was developed to refute\. More precisely: these traditions do not prescribe different methods for instantiating competence; they deny that competence is the kind of thing that can be extracted from context, generalized, and transferred, which is precisely what autonomous learning, as a field\-level capability claim, requires\. Taking these traditions seriously as theoretical commitments would require not a different architecture within the current paradigm, but a more radical reconception of what the capability claim means and whether it is coherent on the terms the traditions themselves supply\. Each of these traditions, taken seriously, undermines the notion of a singular autonomous cognitive agent; this is the very unit of analysis the capability claim presupposes\.

### 4\.4 Testing discriminative validity

Operationally, discriminative validity requires contrastive conditions under which systems lacking the target mechanism can succeed while systems possessing it remain uniquely identifiable\. The evaluation trap inDupouxet al\.\([2026](https://arxiv.org/html/2605.14167#bib.bib6)\)is double: the proposed criteria do not test the broader theoretical traditions the paper invokes, nor do they discriminate the narrower conception it actually operationalizes\.

Dupouxet al\.\([2026](https://arxiv.org/html/2605.14167#bib.bib6)\)propose two integration tests: trials required to learn a new task compared to human performance, and hours of exposure needed to acquire language at child level\(Dupoux,[2018](https://arxiv.org/html/2605.14167#bib.bib5)\)\. Both operationalize learning as performance change on specified tasks\. This introducescriterion leakage: although the benchmarks are framed as approximating developmental learning, the criteria register output equivalence while allowing the learning process itself to drop out of evaluation\.

This is the transferability assumption in operation\. Because the benchmark relies onproxy substitution, measuring task convergence rather than the learning process the capability claim requires, performance on the benchmark is treated as sufficient warrant for the broader capability\. Under optimization pressure, this produces systems that succeed under benchmark conditions while remaining behaviorally approximate with respect to the capability itself\.

The unit tests reproduce the same pattern at the component level: System A is evaluated on distributional generalization, System B on reward optimization, System M on switching efficiency, each operationalized within the theoretical vocabulary of its source subfield rather than derived from the capability claim\. The result iscontext blindness\. The cybernetic requirement for real\-time feedback disruption, the sociocultural requirement for mediated task structure, and the ecological requirement for uncontrolled environment coupling each go untested because the evaluation cannot vary the conditions required to detect them\.

Taken together, these failures reveal an implicit functionalism in the evaluation criteria: the assumption that if a system produces outputs indistinguishable from those of a genuinely capable system, it instantiates the capability\. This extends the transferability assumption to the level of mechanism: functional equivalence is taken to license inference to mechanism equivalence, even when mechanism equivalence is precisely what the capability claim requires\. The traditionsDupouxet al\.\([2026](https://arxiv.org/html/2605.14167#bib.bib6)\)invoke were each developed in explicit rejection of functionalist output equivalence as the criterion of competence\. Evaluating claims grounded in those traditions through functionalist criteria reproduces the reduction those traditions were constructed to refute\.

This is the circularity problem made concrete\. The benchmark does not merely fail to detect the capability; it reorganizes what counts as the capability in terms of its own evaluative criteria\. The result is a structural ceiling: systems optimized within the benchmark regime converge on what the evaluation can detect, while the capability the benchmark claims to measure remains out of reach but no longer visible as absent\. Because evaluation criteria determine what counts as successful instantiation, they also determine which architectures can function as viable research directions\.

### 4\.5 Epistematics applied: derivation table

Table[1](https://arxiv.org/html/2605.14167#S4.T1)summarizes the Epistematics audit: the theoretical accounts invoked by the capability claim, the architectural requirements they imply, the evaluative mismatches produced by the proposed criteria, and the conditions required for discriminative validity\.

Table 1:Epistematics audit ofDupouxet al\.\([2026](https://arxiv.org/html/2605.14167#bib.bib6)\)\. Each row applies the procedure to a theoretical source invoked by the autonomous learning claim, deriving the architectural requirement, identifying the evaluation criterion used, predicting the resulting false positive, and specifying the condition required for discriminative validity\.

## 5 Design criteria for autonomous learning evaluation

The required discriminative conditions identified in Table[1](https://arxiv.org/html/2605.14167#S4.T1)generate the benchmark design criteria that follow\. The claim is not that autonomous learning cannot be benchmarked, but that valid benchmarks must be derived from the requirements of the capability rather than inherited performance proxies\. At minimum, evaluation must satisfy the following conditions:

Discriminate online adaptation from pretraining effects\.Evaluation must include conditions unreachable through prior distributional optimization, with performance improvement under those conditions treated as necessary evidence of genuine online adaptation\.

Verify feedback\-loop structure\.Evaluation must include interventions that selectively disrupt feedback pathways; sensitivity to disruption is necessary evidence of feedback\-coupled learning\.

Test context\-sensitivity across genuine context change\.Evaluation must include transfer conditions in which task, environment, and social context vary in ways not predictable from training, and stable performance across such variation is necessary to distinguish context\-sensitive competence from task\-specific optimization\.

Assess self\-directed data selection and mode switching\.Evaluation must compare system behavior against externally controlled baselines, treating divergence from baseline behavior as evidence that data selection and mode transitions are internally generated\.

Probe the boundary of the design envelope\.Evaluation must include conditions genuinely novel relative to training rather than held\-out from the same distribution; failure under such conditions, alongside success within\-distribution, is diagnostic of behavioral approximation rather than general adaptive capacity\.

### 5\.1 Open\-world evaluation

Open\-world interactive environments \(e\.g\., large\-scale sandbox video games\) provide one possible substrate for the evaluative conditions required by autonomous learning\. These environments are formally specified causal systems with dynamic states, open\-ended task structures, emergent context, and consequences that are immediate and interpretable\. They also permit human performance baselines to be established across a range of tasks and contexts\.

Their value lies in context sensitivity and the capacity for contrastive testing\. For example, feedback pathways can be selectively disrupted to distinguish adaptive coupling from pretraining effects\. Environmental affordances and task contexts can be altered to separate context\-sensitive competence from task\-specific optimization\. Mediated task structures can be varied to determine whether competence depends on the forms of mediation invoked by the capability claim\. Baselines can be constructed against pretraining\-only systems, externally controlled systems, and systems optimized directly on the environment to determine whether data selection and mode switching are internally generated\.

However, open\-world environments can themselves become proxies if their task structures, scoring systems, and training distributions stabilize as the evaluation target\. The environment must therefore function as an experimental substrate for contrastive mechanism testing, not as a leaderboard for aggregate performance\.

## 6 Scope and limitations

Epistematics audits capability\-evaluation coherence; it does not replace empirical benchmark validation\. Its validity depends on the alignment between evaluative criteria and the theoretical requirements of the capability being assessed\. This alignment presupposes capability claims specified at the level of mechanism rather than behavior, and theoretical traditions that yield derivable architectural requirements\. The procedure produces candidate criteria, not validated benchmarks; empirical work determines whether the derived criteria behave as predicted\. Disagreement in translating theoretical accounts into design constraints is diagnostic of competing interpretations\.

## 7 Conclusion

Benchmark design and its accompanying theoretical commitments structure AI research by determining what can be recognized as progress, what can be pursued as a viable research direction, and what structural limitations remain invisible\. The case of autonomous learning illustrates this mechanism: a proposal that attempts to depart from the dominant paradigm at the architectural level is reabsorbed at the level of evaluation, which imposes the assumptions that define success\.

Epistematics addresses this by making the derivation from capability claim to evaluation criterion explicit, reproducible, and auditable\. The procedure does not demand abandoning existing benchmarks or importing external normative standards\. It requires asking whether the criteria used to assess a claimed capability are coherent with what that capability implies, and constructing evaluation frameworks that answer that question\.

The failure mode taxonomy and design criteria produced here are specific to autonomous learning\. The procedure that generates them is general\. Applied systematically across AI capability claims \(e\.g\., reasoning, world\-modeling\), Epistematics produces a diagnostic method for determining whether benchmark success means what it claims to mean, and if not, why\.

## References

- P\. E\. Agre \(1997\)Computation and human experience\.Cambridge University Press\.Cited by:[§2\.3](https://arxiv.org/html/2605.14167#S2.SS3.p1.1)\.
- G\. C\. Bowker and S\. L\. Star \(1999\)Sorting things out: classification and its consequences\.MIT Press\.Cited by:[§2](https://arxiv.org/html/2605.14167#S2.p1.1)\.
- N\. Cartwright \(1999\)The dappled world: a study of the boundaries of science\.Cambridge University Press\.Cited by:[§2\.1](https://arxiv.org/html/2605.14167#S2.SS1.p3.1)\.
- F\. Chollet \(2019\)On the measure of intelligence\.arXiv preprint arXiv:1911\.01547\.Cited by:[§2\.1](https://arxiv.org/html/2605.14167#S2.SS1.p2.1),[§2\.3](https://arxiv.org/html/2605.14167#S2.SS3.p1.1),[§2\.3](https://arxiv.org/html/2605.14167#S2.SS3.p2.1),[§3\.1](https://arxiv.org/html/2605.14167#S3.SS1.p2.1)\.
- E\. Dupoux, Y\. LeCun, and J\. Malik \(2026\)Why AI systems don’t learn and what to do about it: lessons on autonomous learning from cognitive science\.arXiv preprint arXiv:2603\.15381\.Cited by:[§1](https://arxiv.org/html/2605.14167#S1.p4.1),[§4\.1](https://arxiv.org/html/2605.14167#S4.SS1.p1.1),[§4\.2](https://arxiv.org/html/2605.14167#S4.SS2.p2.1),[§4\.3](https://arxiv.org/html/2605.14167#S4.SS3.p4.1),[§4\.3](https://arxiv.org/html/2605.14167#S4.SS3.p5.1),[§4\.4](https://arxiv.org/html/2605.14167#S4.SS4.p1.1),[§4\.4](https://arxiv.org/html/2605.14167#S4.SS4.p2.1),[§4\.4](https://arxiv.org/html/2605.14167#S4.SS4.p5.1),[Table 1](https://arxiv.org/html/2605.14167#S4.T1),[Table 1](https://arxiv.org/html/2605.14167#S4.T1.1.6.5.1.1.1),[§4](https://arxiv.org/html/2605.14167#S4.p1.1)\.
- E\. Dupoux \(2018\)Cognitive science in the era of artificial intelligence: a roadmap for reverse\-engineering the infant language\-learner\.Cognition173,pp\. 43–59\.Cited by:[§4\.4](https://arxiv.org/html/2605.14167#S4.SS4.p2.1)\.
- Y\. Engeström \(1987\)Learning by expanding: an activity\-theoretical approach to developmental research\.Orienta\-Konsultit\.Cited by:[§4\.3](https://arxiv.org/html/2605.14167#S4.SS3.p3.1)\.
- R\. Geirhos, J\. Jacobsen, C\. Michaelis, R\. Zemel, W\. Brendel, M\. Bethge, and F\. A\. Wichmann \(2020\)Shortcut learning in deep neural networks\.Nature Machine Intelligence2\(11\),pp\. 665–673\.Cited by:[§2\.3](https://arxiv.org/html/2605.14167#S2.SS3.p2.1)\.
- J\. J\. Gibson \(1966\)The senses considered as perceptual systems\.Houghton Mifflin\.Cited by:[§4\.2](https://arxiv.org/html/2605.14167#S4.SS2.p3.1),[Table 1](https://arxiv.org/html/2605.14167#S4.T1.1.5.4.1.1.1)\.
- C\. A\. E\. Goodhart \(1984\)Problems of monetary management: the U\.K\. experience\.InMonetary Theory and Practice,pp\. 91–121\.Cited by:[§2\.2](https://arxiv.org/html/2605.14167#S2.SS2.p1.1)\.
- I\. Hacking \(1999\)The social construction of what?\.Harvard University Press\.Cited by:[§2\.2](https://arxiv.org/html/2605.14167#S2.SS2.p1.1)\.
- D\. H\. Jonassen \(1997\)Instructional design models for well\-structured and ill\-structured problem\-solving learning outcomes\.Educational Technology Research and Development45\(1\),pp\. 65–94\.Cited by:[§2\.3](https://arxiv.org/html/2605.14167#S2.SS3.p2.1),[§4\.2](https://arxiv.org/html/2605.14167#S4.SS2.p7.1)\.
- T\. J\. Kalaitzidis \(2026\)Epistemic laundering: generative ai and the naturalization of misrecognition\.AI & Society,pp\. 1–16\.Cited by:[§1](https://arxiv.org/html/2605.14167#S1.p2.1),[§2\.2](https://arxiv.org/html/2605.14167#S2.SS2.p1.1)\.
- T\. S\. Kuhn \(1962\)The structure of scientific revolutions\.University of Chicago Press\.Cited by:[§2\.2](https://arxiv.org/html/2605.14167#S2.SS2.p2.1)\.
- J\. Lave \(1988\)Cognition in practice: mind, mathematics and culture in everyday life\.Cambridge University Press\.Cited by:[§4\.2](https://arxiv.org/html/2605.14167#S4.SS2.p3.1),[Table 1](https://arxiv.org/html/2605.14167#S4.T1.1.3.2.1.1.1)\.
- A\. N\. Leont’ev \(1978\)Activity, consciousness, and personality\.Prentice\-Hall\.Cited by:[§4\.3](https://arxiv.org/html/2605.14167#S4.SS3.p3.1)\.
- G\. Marcus \(2020\)The next decade in AI: four steps towards robust artificial intelligence\.arXiv preprint arXiv:2002\.06177\.Cited by:[§2\.3](https://arxiv.org/html/2605.14167#S2.SS3.p1.1),[§3\.1](https://arxiv.org/html/2605.14167#S3.SS1.p2.1)\.
- H\. R\. Maturana and F\. J\. Varela \(1980\)Autopoiesis and cognition: the realization of the living\.Reidel\.Cited by:[§4\.3](https://arxiv.org/html/2605.14167#S4.SS3.p5.1)\.
- T\. M\. Porter \(1995\)Trust in numbers: the pursuit of objectivity in science and public life\.Princeton University Press\.Cited by:[§2\.2](https://arxiv.org/html/2605.14167#S2.SS2.p1.1)\.
- I\. D\. Raji, E\. M\. Bender, A\. Paullada, E\. Denton, and A\. Hanna \(2021\)AI and the everything in the whole wide world benchmark\.arXiv preprint arXiv:2111\.15366\.Cited by:[§1](https://arxiv.org/html/2605.14167#S1.p1.1),[§2\.1](https://arxiv.org/html/2605.14167#S2.SS1.p2.1)\.
- R\. P\. N\. Rao and D\. H\. Ballard \(1999\)Predictive coding in the visual cortex: a functional interpretation of some extra\-classical receptive\-field effects\.Nature Neuroscience2\(1\),pp\. 79–87\.Cited by:[§4\.2](https://arxiv.org/html/2605.14167#S4.SS2.p5.1)\.
- J\. R\. Saffran, R\. N\. Aslin, and E\. L\. Newport \(1996\)Statistical learning by 8\-month\-old infants\.Science274\(5294\),pp\. 1926–1928\.Cited by:[§4\.2](https://arxiv.org/html/2605.14167#S4.SS2.p5.1)\.
- D\. A\. Schön \(1983\)The reflective practitioner: how professionals think in action\.Basic Books\.Cited by:[§2\.3](https://arxiv.org/html/2605.14167#S2.SS3.p4.1)\.
- W\. Schultz, P\. Dayan, and P\. R\. Montague \(1997\)A neural substrate of prediction and reward\.Science275\(5306\),pp\. 1593–1599\.Cited by:[§4\.2](https://arxiv.org/html/2605.14167#S4.SS2.p5.1)\.
- R\. S\. Sutton and A\. G\. Barto \(2018\)Reinforcement learning: an introduction\.2nd edition,MIT Press\.Cited by:[§4\.2](https://arxiv.org/html/2605.14167#S4.SS2.p5.1)\.
- H\. von Foerster \(1974\)Cybernetics of cybernetics\.Biological Computer Laboratory, University of Illinois\.Cited by:[§4\.3](https://arxiv.org/html/2605.14167#S4.SS3.p5.1)\.
- L\. S\. Vygotsky \(1978\)Mind in society: the development of higher psychological processes\.Harvard University Press\.Cited by:[§4\.2](https://arxiv.org/html/2605.14167#S4.SS2.p3.1),[§4\.3](https://arxiv.org/html/2605.14167#S4.SS3.p3.1),[Table 1](https://arxiv.org/html/2605.14167#S4.T1.1.4.3.1.1.1)\.
- N\. Wiener \(1948\)Cybernetics: or control and communication in the animal and the machine\.MIT Press\.Cited by:[§4\.2](https://arxiv.org/html/2605.14167#S4.SS2.p3.1),[§4\.3](https://arxiv.org/html/2605.14167#S4.SS3.p4.1),[Table 1](https://arxiv.org/html/2605.14167#S4.T1.1.2.1.1.1.1)\.

Similar Articles

Unsteady Metrics and Benchmarking Cultures of AI Model Builders

arXiv cs.AI

This paper introduces Benchmarking-Cultures-25, a dataset analyzing how AI model builders selectively highlight benchmarks in press releases. It finds a fragmented evaluation landscape with limited cross-model comparability, arguing that benchmarks are used as narrative devices for market positioning rather than standardized scientific measurement.

An Empirical Study of Automating Agent Evaluation

arXiv cs.CL

This paper introduces EvalAgent, a system that automates the evaluation of AI agents by encoding domain-specific expertise, addressing the limitations of standard coding assistants in this task. It also presents AgentEvalBench, a benchmark for testing evaluation pipelines, and demonstrates significant improvements in evaluation reliability.

Designing AI-resistant technical evaluations

Anthropic Engineering

Anthropic engineer Tristan Hume discusses the challenges of designing AI-resistant technical take-home tests for hiring performance engineers, detailing how recent Claude models have begun to outperform human candidates.