Moreover, in this particular usage of sip128-1-3 the keys are constant (k0=0, k1=0)--which to my understanding reduces the randomness.
What randomness and compared to what kind of random function?
When you have a static key then there cannot be any domain separation. Having a secret key, i.e. a keyed hash / PRF would mean that it is hard for an adversary to find collisions under the same key, as the adversary doesn't know the key to create the output in the first place. With a random but public key this would be possible to create a (rainbow) table and to find collisions for that specific key.
With a specific key such as an all-zero key it would be possible to do this just as easily, but the result would be applicable to all messages that use that specific key. For that specific key the function would indeed have the same message space and constantly sized output parameter as a cryptographic hash such as SHA-256.
The problem here is that the output size is way too small to be taken seriously for a cryptographic hash. As such there is no need to test SipHash as a cryptographic hash. Nobody seems to have claimed that it has collisions resistance. A 128 bit output would indicate 64 bit collision resistance for generic brute force attacks that treat the algorithm as a black box. This is far below the minimum of 128 bits of security we normally aim for. As such there is simply no incentive to study the collision resistance.
As a MAC with a random, secret key the security in bits is only slightly smaller than the size of the authentication tag, so in that case SipHash-1-3 may have enough security at around 128 bits assuming that no efficient attack is found. I'd rather opt for a well studied HMAC, CMAC or an authenticated cipher though.