KYA Standard v1.1 · Technical Whitepaper

Securing the “Shanghai Model”
of Agentic Delegation

Technical Requirements for Agent Identity Attribution

To: Technical Sales & Product Engineering Teams

March 2026 · Lifetime Oy / DWS IQ 6 Engineering · Risto Anton

The KYA Standard v1.1 Whitepaper Partner


1. Executive Summary

As AI transitions from “Chat” to “Action,” the industry faces a critical visibility gap. In 2026, the Shanghai Model — where Parent Agents delegate tasks to autonomous Sub-Agents — has become the standard for industrial climate intelligence.

DWS IQ 6 has pioneered the KYA (Know Your Agent) framework to bridge this gap. We seek to integrate L1/L2 identity signals directly into our Firecracker MicroVM hypervisor to provide cryptographically verified accountability for autonomous agent chains.


2. The Problem: The Delegation Liability

Traditional KYC verifies humans at login. However, in industrial workflows, a verified human may authorize an Architect Agent, which then spawns a Compliance Agent, which in turn triggers a Sensor Bot.

The Risk: If a sub-agent executes an unauthorized transaction or data breach, who is liable?

The Solution: A recursive identity chain where every sub-agent inherits a “Leash” from a KYC-verified human. The chain is cryptographically bound and immutable.


3. The “Shanghai” Technical Framework

Our v1.1 Security Standard implements four critical layers of agentic control:

3.1 Recursive Identity Attribution (TC-1)

Every agent execution generates a trust_chain_hash. This Merkle-style hash binds the Sub-Agent to the Parent Agent and, ultimately, to the IDV-verified Human Operator.

Human Operator (IDV Verified, KYA Score: 87)
    |
    +-- trust_chain_hash: 0xA3F...
    |
    +-- Architect Agent (L2 Provenance Verified)
        |
        +-- trust_chain_hash: 0xB7C...
        |
        +-- Compliance Agent (L3 Capability Gated)
            |
            +-- trust_chain_hash: 0xD1E...
            |
            +-- Sensor Bot (L4 Runtime Monitored)

3.2 The Digital Leash (Intersection Logic)

Sub-Agent Sandbox = Parent Permissions ∩ Sub-Agent Manifest
An agent can never “outgrow” the permissions of its handler.

TC-2

Permission Inheritance Rule

If the parent agent has egress to api.tencent.com and microsoft.com, but the child’s manifest only requests api.tencent.com, the child gets only api.tencent.com. The intersection is enforced at the Firecracker VMM layer — not in application code.

3.3 Cascade Termination (The 500ms SLA)

If the identity provider signals a risk change for a Human Operator (e.g., AML hit or credential theft), DWS IQ 6 triggers a Cascade Termination.

ControlRequirementSLA
TC-3Single agent session termination< 50 ms
TC-4Cascade termination (all child agents, max 3 levels)< 500 ms
TC-5Maximum delegation depth enforced3 levels
IDV Risk Webhook --> DWS Policy Engine --> Firecracker SIGKILL
                                |
                                +-- Level 1: Parent Agent    [FROZEN: 12ms]
                                +-- Level 2: Child Agent     [FROZEN: 89ms]
                                +-- Level 3: Grandchild Bot  [FROZEN: 340ms]
                                                              Total: < 500ms

4. Forensic Observability & NIS2 Compliance

Under NIS2 Art. 23, industrial platforms must provide sub-second telemetry for automated decisions. Our Firehorse Telemetry Schema captures full delegation chains:

LayerData CapturedRetention
Parent/Child LinkageFull delegation depth visibility (max 3 levels), trust_chain_hash5 years
Syscall CaptureEvery file I/O and network request mapped to a Trust Hash90 days (configurable)
Identity EventsKYA score changes, permission adjustments, cascade terminations5 years (EU AI Act Art. 12)
MCP Tool InvocationsTool calls, parameters, responses per agent per session1 year
Fault AttributionLOGIC_FAULT, INTEGRATION_FAULT, MANIFEST_FAULT, OPERATOR_FAULT5 years (Supabase)
Retention consistency: All identity-related events are retained for 5 years per EU AI Act Article 12 requirements. Syscall-level telemetry follows a 90-day default with configurable extension. This tiered approach balances compliance with storage efficiency.

5. Agent Trust Score (ATS) — The Go/No-Go Gate

The ATS is calculated before any external IDV API call, saving cost by killing low-trust sessions early.

Formula: ATS = max(0, 1.0 − V×0.25 − L − D×0.05)
Where V = KYA violations, L = latency penalty (0.10 if avg > 500ms), D = denied path attempts.
Hard kill: ATS = 0.0 if manifest unsigned or TTL expired. 4 violations = zero trust.

ATSKYA ScorePermission LevelDecision
≥ 0.80≥ 80Full sandbox — egress, all MCP toolsGO
0.50–0.7950–79Restricted sandbox — no egress, read-onlyGO (limited)
< 0.50< 50Suspended — human review requiredNO_GO
= 0.00= 0Frozen — agent terminatedNO_GO

6. Partnership Opportunity: “Agent ID”

We propose a deep integration where the identity provider acts as the Identity Anchor for our Control Room:

L1

Real-Time Facial Liveness

Agent “Power-On” events require L1 verification: document + face match + AML screening. This gates the trust chain — no verification, no agent spawn.

L2

Business Verification (KYB)

Third-party BYO agents require organization verification. The agent’s provider (Microsoft, Tencent, OpenClaw) must pass KYB before their agents can register.

L5

Low-Latency Signal Bridge

Continuous risk monitoring via webhook. When risk signals change, sandbox permissions adjust in < 5 seconds. Cascade termination within 500ms.


7. Technical Metadata

MetricRequirement
Max Delegation Depth3 Levels (TC-5)
Single Termination Latency< 50ms (TC-3)
Cascade Termination Latency< 500ms (TC-4)
Identity Event Retention5 Years (EU AI Act Art. 12)
Syscall Retention90 days (configurable)
Isolation LayerFirecracker MicroVM (hardware-level)
ATS Formulamax(0, 1.0 - V×0.25 - L - D×0.05)
Fault Attribution StorageSupabase (kya_fault_attribution)
Industrial Models16 EU-regulated industries (Fit for 55)

8. Next Steps

We have prepared a Mock Telemetry Test environment on our Helsinki-based Acer Veriton nodes. We invite the partner technical team to witness a “Leash Snap” demonstration where a sub-agent is terminated mid-execution following a simulated identity revocation.

  1. Schedule architecture call to review integration points (L1, L2, L5 signal bridge)
  2. Helsinki benchmark: Live cascade termination demo on Acer Veriton GN100
  3. PoC scope agreement: Adapter, score engine, webhook listener

9. Contact

Lifetime Oy · Helsinki, Finland
risto@onelifetime.world
dws10.com/kya-standard/ · onelifetime.world

Related: KYA Standard v1.1 · Legal Hub