When Convenience Becomes Risk: A Semantic View of Under-Specification in Host-Acting Agents

📅 2026-03-22
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the critical security challenge that arises when host-based autonomous agents, given only high-level user objectives, generate execution plans without sufficient semantic constraints—such as process boundaries or safety limits—leading to potentially high-risk behaviors. We propose the first semantics-aware threat model specifically tailored for host agents, systematically analyzing the semantic completion process from abstract goals to executable plans and identifying multiple risk-inducing completion patterns. Through execution trace analysis, a case study on OpenClaw, and explicit modeling of safety boundaries, we derive defensive design principles that constrain hazardous semantic completions and clarify operational boundaries. Our findings offer both theoretical foundations and practical guidance for developing secure and reliable autonomous agent systems.

Technology Category

Application Category

📝 Abstract
Host-acting agents promise a convenient interaction model in which users specify goals and the system determines how to realize them. We argue that this convenience introduces a distinct security problem: semantic under-specification in goal specification. User instructions are typically goal-oriented, yet they often leave process constraints, safety boundaries, persistence, and exposure insufficiently specified. As a result, the agent must complete missing execution semantics before acting, and this completion can produce risky host-side plans even when the user-stated goal is benign. In this paper, we develop a semantic threat model, present a taxonomy of semantic-induced risky completion patterns, and study the phenomenon through an OpenClaw-centered case study and execution-trace analysis. We further derive defense design principles for making execution boundaries explicit and constraining risky completion. These findings suggest that securing host-acting agents requires governing not only which actions are allowed at execution time, but also how goal-only instructions are translated into executable plans.
Problem

Research questions and friction points this paper is trying to address.

semantic under-specification
host-acting agents
goal specification
execution semantics
security risk
Innovation

Methods, ideas, or system contributions that make the work stand out.

semantic under-specification
host-acting agents
goal-to-plan translation
execution semantics completion
security threat model
🔎 Similar Papers
No similar papers found.
Di Lu
Di Lu
Mphil of Computer Science
Evolutionary ComputationNeural Network
Y
Yongzhi Liao
School of Computer Science and Technology, Xidian University, Xi’an, Shaanxi 710071, China; and Shaanxi Key Laboratory of Network and System Security, Xi’an, Shaanxi 710071, China
Xutong Mu
Xutong Mu
Xidian University
Artificial intelligenceFederated learning
L
Lele Zheng
School of Computer Science and Technology, Xidian University, Xi’an, Shaanxi 710071, China; and Shaanxi Key Laboratory of Network and System Security, Xi’an, Shaanxi 710071, China
Ke Cheng
Ke Cheng
Xidian University
Secure Multi-Party Computation
Xuewen Dong
Xuewen Dong
Xidian University
Yulong Shen
Yulong Shen
Xidian University
computer security
J
Jianfeng Ma
School of Cyber Engineering, Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi’an, China