The rapid adoption of AI agent frameworks through late 2025 and early 2026 produced a security crisis whose exemplar is OpenClaw, an open-source framework that as of April 2026 has accumulated 138 Common Vulnerabilities and Exposures across five months of public availability, with public exposure analysis reporting over 135,000 internet-facing instances of which approximately 63 percent run without authentication. Independent analysts have converged on the conclusion that the appropriate operator stance on any unpatched or unauthenticated deployment is to assume compromise. In parallel, Franklin, Tomašev, Jacobs, Leibo, and Osindero at Google DeepMind have published a systematic taxonomy of the AI agent attack surface that classifies six categories of adversarial content targeting different stages of an agent's operational cycle. This paper argues that the failure pattern documented in the OpenClaw record is structural rather than defect-level and that the correct response is architectural. We describe XSOC-NIE-GUARD, a cryptographic mediation architecture that composes device-attested admission, short time-to-live scoped capability derivation, telemetry-sealed runtime continuity, context provenance anchoring, agent intent envelope enforcement, and fully homomorphic encryption for sensitive context into a five-plane mediation layer. We implement a reference architecture under the Apache 2.0 license that includes a deterministic 27-scenario attack simulation harness (19 wired, 8 skeleton placeholders for subsequent phases) and maps each named control to one or more categories in the Franklin et al. taxonomy. Our coverage claim is deliberately bounded. We claim strong structural coverage for four of the six taxonomy categories (Content Injection, Semantic Manipulation, Cognitive State, Behavioural Control), explicitly scope persona hyperstition as a training-time concern outside runtime mediation, and explicitly scope systemic multi-agent threats as requiring ecosystem-level coordination beyond a per-agent architecture. The XSOC proprietary cryptographic primitives underlying the architecture (deterministic symmetric key agreement, post-storage volatile cipher, CKKS based homomorphic evaluation, telemetry sealing) are referenced by interface and by stated security properties only; construction details remain private and controlled. External validation of the broader XSOC cryptographic stack comes from the University of Luxembourg (Perrin and Biryukov audits of the legacy cryptosystem, 2020 and 2024, with mandatory findings incorporated into the canonical build), from California Polytechnic State University at San Luis Obispo (Dieharder v3.31.1 statistical validation of the entropy subsystem, 99.4 percent aggregate pass rate across 98 tests), and from the George Mason University SENTINEL laboratory (audit finding reference FP5223, with full report scheduled for public release in June 2026). We position this work as a concrete architectural response to the research agenda articulated in the Franklin et al. taxonomy and invite scrutiny of both the coverage claims and the explicit scope boundaries.
Building similarity graph...
Analyzing shared references across papers
Loading...
Richard Blech
Tosoh (Japan)
Building similarity graph...
Analyzing shared references across papers
Loading...
Richard Blech (Tue,) studied this question.
www.synapsesocial.com/papers/69e9bb6285696592c86ed198 — DOI: https://doi.org/10.5281/zenodo.19685360