Agentic AI systems face a growing class of threats based on social and context engineering, in which adversaries manipulate what a system believes rather than exploiting what it can do. Policy-based governance, periodic audits, and human-in-the-loop oversight share a structural limitation: they operate within the same context as the systems they govern, leaving them vulnerable to the same forms of context manipulation that compromise operations. This paper presents the Governance Twin, a two-plane architecture for intrinsic governance of agentic AI systems that maintains structural separation between operations and governance. The architecture is organised as a closed-loop system comprising an observational layer (Sentinel), an aggregation and decision layer (Council), a persistent memory (Historian), and a feedback mechanism (Guidance Injection). Using a sustained apprenticeship analogy — teaching a teenager to drive — the paper maps each architectural component to its functional counterpart in a universally familiar governance scenario, making the structural principles (separation of context, influence over control, pattern detection across chains) accessible without formal notation. The analysis distinguishes three kinds of change that governance must treat differently — misalignment, authorized override, and drift — and defines governance as the real-time ability to influence decisions before they are executed, rather than after-the-fact evaluation. Drawing on recent evidence from the first documented AI-orchestrated cyber espionage campaign, LLM poisoning attacks, and Model Context Protocol vulnerabilities, the paper shows how multi-step context manipulation can bypass traditional safeguards and why structurally separate observation improves the detectability of such patterns. This paper provides the first unified conceptual treatment of the Governance Twin, establishing the theoretical foundation that connects a seven-paper series spanning philosophical foundations, ethical frameworks, adaptive governance mechanisms, architectural blueprints, and security models. It is conceptual; the technical specification of components, data flows, and system interfaces appears in the accompanying technical papers referenced in the bibliography.
Building similarity graph...
Analyzing shared references across papers
Loading...
Wolfgang Rohde
ASIS Foundation
Building similarity graph...
Analyzing shared references across papers
Loading...
Wolfgang Rohde (Fri,) studied this question.
www.synapsesocial.com/papers/69f19f9cedf4b468248066aa — DOI: https://doi.org/10.5281/zenodo.19823671
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context: