When behaviour is unstable, trust must come from the architecture, not the model

31 March 2026

Run the same query multiple times and you may get different answers, different sources, different reasoning paths and all delivered with equal confidence with no traceable lineage.

๐—ฃ๐—ถ๐—น๐—น๐—ฎ๐—ฟ ๐Ÿฒ ๐—ผ๐—ณ ๐—ง๐—ฟ๐˜‚๐˜€๐˜๐˜„๐—ผ๐—ฟ๐˜๐—ต๐˜† ๐—™๐—ถ๐—ป๐—ฎ๐—ป๐—ฐ๐—ถ๐—ฎ๐—น ๐—”๐—œ: ๐——๐—ฒ๐˜๐—ฒ๐—ฟ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐—บ
By CTO & Co Founder, Simon Gregory

๐—ช๐—ต๐—ฒ๐—ป ๐—ฏ๐—ฒ๐—ต๐—ฎ๐˜ƒ๐—ถ๐—ผ๐˜‚๐—ฟ ๐—ถ๐˜€ ๐˜‚๐—ป๐˜€๐˜๐—ฎ๐—ฏ๐—น๐—ฒ, ๐˜๐—ฟ๐˜‚๐˜€๐˜ ๐—บ๐˜‚๐˜€๐˜ ๐—ฐ๐—ผ๐—บ๐—ฒ ๐—ณ๐—ฟ๐—ผ๐—บ ๐˜๐—ต๐—ฒ ๐—ฎ๐—ฟ๐—ฐ๐—ต๐—ถ๐˜๐—ฒ๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ, ๐—ป๐—ผ๐˜ ๐˜๐—ต๐—ฒ ๐—บ๐—ผ๐—ฑ๐—ฒ๐—น
In finance, trust isnโ€™t a UX feature, itโ€™s an ๐—ฎ๐—ฟ๐—ฐ๐—ต๐—ถ๐˜๐—ฒ๐—ฐ๐˜๐˜‚๐—ฟ๐—ฎ๐—น ๐—ฟ๐—ฒ๐—พ๐˜‚๐—ถ๐—ฟ๐—ฒ๐—บ๐—ฒ๐—ป๐˜.

The final pillar tackles ๐—ป๐—ผ๐—ป-๐—ฑ๐—ฒ๐˜๐—ฒ๐—ฟ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐—บ, one of the most misunderstood realities of LLMs. Identical queries can yield different outputs, all sounding equally certain with no reconstructible lineage.

This isnโ€™t a configuration issue.
Itโ€™s how probabilistic systems work and it puts them in direct conflict with the deterministic foundations that financial workflows depend on: ๐—ฎ๐˜‚๐—ฑ๐—ถ๐˜๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜†, ๐—ฟ๐—ฒ๐—ฝ๐—ฒ๐—ฎ๐˜๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜†, ๐˜€๐˜๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜†, ๐—ฎ๐—ป๐—ฑ ๐˜๐—ฒ๐—บ๐—ฝ๐—ผ๐—ฟ๐—ฎ๐—น ๐—ฐ๐—ผ๐—ป๐˜€๐—ถ๐˜€๐˜๐—ฒ๐—ป๐—ฐ๐˜†.

๐ŸŸข ๐—ช๐—ต๐˜† ๐—Ÿ๐—Ÿ๐— ๐˜€ ๐—ฎ๐—ฟ๐—ฒ ๐—ป๐—ผ๐—ป-๐—ฑ๐—ฒ๐˜๐—ฒ๐—ฟ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐˜๐—ถ๐—ฐ

LLMs explore ๐—ฝ๐—ผ๐˜€๐˜€๐—ถ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐˜€๐—ฝ๐—ฎ๐—ฐ๐—ฒ๐˜€, not fixed paths.
Thatโ€™s what gives them power.

Itโ€™s also what makes them untrustworthy unless the architecture ๐—ฐ๐—ผ๐—ป๐˜๐—ฎ๐—ถ๐—ป๐˜€ that variability.

Itโ€™s a butterfly effect system: small prompt changes can produce large shifts in tone, emphasis, or conclusion.

The consequence:
๐—˜๐˜ƒ๐—ฒ๐—ฟ๐˜† ๐—ฟ๐—ฎ๐˜„ ๐—Ÿ๐—Ÿ๐—  ๐—ผ๐˜‚๐˜๐—ฝ๐˜‚๐˜ ๐˜€๐—ต๐—ผ๐˜‚๐—น๐—ฑ ๐—ฏ๐—ฒ ๐˜๐—ฟ๐—ฒ๐—ฎ๐˜๐—ฒ๐—ฑ ๐—ฎ๐˜€ ๐˜‚๐—ป๐˜๐—ฟ๐˜‚๐˜€๐˜๐—ฒ๐—ฑ ๐—ถ๐—ป๐—ฝ๐˜‚๐˜ for any consequential downstream process.

You canโ€™t tune away randomness.
๐—ง๐—ต๐—ฒ ๐—ผ๐—ป๐—น๐˜† ๐˜€๐—ผ๐—น๐˜‚๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐˜€ ๐˜๐—ผ ๐—ฐ๐—ผ๐—ป๐˜๐—ฎ๐—ถ๐—ป ๐—ถ๐˜.

A safe financial AI architecture enforces a ๐—ฑ๐—ฒ๐˜๐—ฒ๐—ฟ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐˜๐—ถ๐—ฐ ๐˜๐—ฟ๐˜‚๐˜€๐˜ ๐—ฏ๐—ผ๐˜‚๐—ป๐—ฑ๐—ฎ๐—ฟ๐˜† around the generative layer with stable inputs, deterministic retrieval, authoritative lineage, and strict contextual integrity.

๐—ก๐—ผ๐—ป-๐—ฑ๐—ฒ๐˜๐—ฒ๐—ฟ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐—บ ๐—ถ๐˜€ ๐—ฎ ๐—ฝ๐—ฟ๐—ผ๐—ฝ๐—ฒ๐—ฟ๐˜๐˜†, ๐—ป๐—ผ๐˜ ๐—ฎ ๐—ณ๐—ฒ๐—ฎ๐˜๐˜‚๐—ฟ๐—ฒ.
๐—œ๐—ป ๐—ณ๐—ถ๐—ป๐—ฎ๐—ป๐—ฐ๐—ฒ, ๐—ถ๐˜ ๐—บ๐˜‚๐˜€๐˜ ๐—ฏ๐—ฒ ๐—ฐ๐—ผ๐—ป๐˜๐—ฎ๐—ถ๐—ป๐—ฒ๐—ฑ ๐—ฏ๐˜† ๐—ฑ๐—ฒ๐˜๐—ฒ๐—ฟ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐˜๐—ถ๐—ฐ ๐—ฎ๐—ฟ๐—ฐ๐—ต๐—ถ๐˜๐—ฒ๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ.

๐ŸŸข ๐—ช๐—ต๐˜† ๐˜๐—ต๐—ฒ ๐˜€๐—ถ๐˜… ๐—ฝ๐—ถ๐—น๐—น๐—ฎ๐—ฟ๐˜€ ๐—บ๐—ฎ๐˜๐˜๐—ฒ๐—ฟ

The first five pillars each describe a distinct failure mode. Together, they describe something larger: a system under a common pressure. Non-determinism is that pressure. It is what makes the other five necessary:

Auditability. Authority. Provenance. Context Integrity. Temporal Integrity.

Together they form the containment architecture that makes probabilistic systems safe, repeatable, and auditable.

๐—ง๐—ต๐—ฒ ๐—พ๐˜‚๐—ฒ๐˜€๐˜๐—ถ๐—ผ๐—ป ๐˜„๐—ฎ๐˜€ ๐—ป๐—ฒ๐˜ƒ๐—ฒ๐—ฟ ๐˜„๐—ต๐—ฒ๐˜๐—ต๐—ฒ๐—ฟ ๐˜๐—ผ ๐˜‚๐˜€๐—ฒ ๐—”๐—œ ๐—ถ๐—ป ๐—ณ๐—ถ๐—ป๐—ฎ๐—ป๐—ฐ๐—ฒ. ๐—œ๐˜ ๐˜„๐—ฎ๐˜€ ๐—ฎ๐—น๐˜„๐—ฎ๐˜†๐˜€ ๐˜„๐—ต๐—ฒ๐˜๐—ต๐—ฒ๐—ฟ ๐˜†๐—ผ๐˜‚ ๐—ต๐—ฎ๐˜ƒ๐—ฒ ๐˜๐—ต๐—ฒ ๐—ฎ๐—ฟ๐—ฐ๐—ต๐—ถ๐˜๐—ฒ๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ ๐˜๐—ผ ๐˜‚๐˜€๐—ฒ ๐—ถ๐˜ ๐˜€๐—ฎ๐—ณ๐—ฒ๐—น๐˜†.