defense 2026

From Craft to Kernel: A Governance-First Execution Architecture and Semantic ISA for Agentic Computers

Xiangyu Wen 1, Yuang Zhao 2, Xiaoyu Xu 3, Lingjun Chen 4, Changran Xu 1, Shu Chi 5, Jianrong Ding 1, Zeju Li 1, Haomin Li 2, Li Jiang 2, Fangxin Liu 2, Qiang Xu 1

0 citations

α

Published on arXiv

2604.18652

Insecure Plugin Design

OWASP LLM Top 10 — LLM07

Excessive Agency

OWASP LLM Top 10 — LLM08

Key Finding

Achieves 76% to 95% unsafe action interception rate, representing a 92.79% absolute improvement over native safety policies

Arbiter-K

Novel technique introduced


The transition of agentic AI from brittle prototypes to production systems is stalled by a pervasive crisis of craft. We suggest that the prevailing orchestration paradigm-delegating the system control loop to large language models and merely patching with heuristic guardrails-is the root cause of this fragility. Instead, we propose Arbiter-K, a Governance-First execution architecture that reconceptualizes the underlying model as a Probabilistic Processing Unit encapsulated by a deterministic, neuro-symbolic kernel. Arbiter-K implements a Semantic Instruction Set Architecture (ISA) to reify probabilistic messages into discrete instructions. This allows the kernel to maintain a Security Context Registry and construct an Instruction Dependency Graph at runtime, enabling active taint propagation based on the data-flow pedigree of each reasoning node. By leveraging this mechanism, Arbiter-K precisely interdicts unsafe trajectories at deterministic sinks (e.g., high-risk tool calls or unauthorized network egress) and enables autonomous execution correction and architectural rollback when security policies are triggered. Evaluations on OpenClaw and NanoBot demonstrate that Arbiter-K enforces security as a microarchitectural property, achieving 76% to 95% unsafe interception for a 92.79% absolute gain over native policies. The code is publicly available at https://github.com/cure-lab/ArbiterOS.


Key Contributions

  • Governance-First execution architecture that encapsulates LLMs as Probabilistic Processing Units controlled by a deterministic neuro-symbolic kernel
  • Semantic ISA that reifies probabilistic model outputs into discrete instructions with Security Context Registry and runtime Instruction Dependency Graph
  • Active taint propagation mechanism that tracks data-flow pedigree of reasoning nodes to interdict unsafe trajectories at deterministic sinks

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
inference_time
Datasets
OpenClawNanoBot
Applications
agentic ai systemsautonomous agentsllm tool use