{"id":22175,"date":"2026-04-08T06:51:00","date_gmt":"2026-04-08T06:51:00","guid":{"rendered":"https:\/\/sawahsolutions.com\/lap\/agentic-ais-rising-influence-reshapes-trust-and-security-in-autonomous-systems\/"},"modified":"2026-04-08T08:27:05","modified_gmt":"2026-04-08T08:27:05","slug":"agentic-ais-rising-influence-reshapes-trust-and-security-in-autonomous-systems","status":"publish","type":"post","link":"https:\/\/sawahsolutions.com\/lap\/agentic-ais-rising-influence-reshapes-trust-and-security-in-autonomous-systems\/","title":{"rendered":"Agentic AI&#8217;s rising influence reshapes trust and security in autonomous systems"},"content":{"rendered":"<p><\/p>\n<div>\n<p>As agentic AI systems gain autonomy across business and personal tasks, industry experts highlight practical deployment challenges, security risks, and the evolving regulatory landscape at a Shanghai forum.<\/p>\n<\/div>\n<div>\n<p>The rise of agentic AI is shifting the tech landscape from laboratory experiments to systems that can act autonomously across business and personal tasks. At a Shanghai forum on April 3 convened by the Xujiahui Science and Technology Innovation Center, the Shanghai Distributed Consensus Technology Association, PANews and Mankiw Law Firm, speakers outlined both the promise and the practical challenges of that transition.<\/p>\n<p>Li Chenxing, chief architect at Conflux Tree Graph, argued that giving AI greater autonomy is an unavoidable direction for the field, but warned that current systems struggle to retain and apply the contextual constraints required for reliable decisions in complex, real-world environments. He described memory as the chief technical bottleneck, parameter storage, short context windows and slow or inefficient external memory access all limit continuity of experience, and urged work on stronger retrieval, continuous learning and vertical domain practice to build reusable experiential memory.<\/p>\n<p>Practical deployment concerns were a recurring theme. Tencent Cloud\u2019s Feng Heqing explained that mature enterprise agents must support end-to-end tasks, multi-role collaboration and hierarchical memory while preserving data security through local storage and manual confirmation for critical operations. He outlined an enterprise-ready architecture with execution isolation, permission control and both cloud and on-premise deployment options, noting these are necessary to adapt agents to complex corporate workflows.<\/p>\n<p>Speakers with hands-on experience warned that agent systems are still engineering-heavy and resource-sensitive. Teddy, founder of Biteye and XHunt, recommended mandatory multi-stage review processes, such as higher-level agents rechecking code produced by lower-level agents, to reduce errors, and advised careful orchestration of execution via backend APIs to preserve stability and control token consumption. He also highlighted security risks including prompt injection and malicious skill modules.<\/p>\n<p>OpenClaw, the open-source agent framework enjoying rapid uptake in China, was a focal point of discussion. Its plugin-like \u201cskills\u201d enable agents to interact with external services and automate complex workflows, but the community and vendors stress that skills are untrusted code until vetted and that poor or malicious skills can cause substantial harm. China\u2019s fast adoption has been driven by local compute economics and policy incentives, yet regulators have restricted its use in official institutions amid data-security concerns.<\/p>\n<p>The commercial dynamics around OpenClaw have exposed deeper industry tensions. Anthropic recently moved to restrict or monetise third-party agent integrations with its Claude service, citing the disproportionate compute demands of agentic usage versus conventional chat interactions. That policy shift, which includes new usage charges and transitional credits, has provoked pushback from open-source proponents and underscores a broader shift from flat-rate subscriptions toward usage-based pricing for resource-intensive AI applications.<\/p>\n<p>Investors at the event urged sober reading of where durable advantage will arise. Venture capitalists emphasised that rapid model iteration reduces the shelf-life of purely algorithmic leads and recommended concentrating on hard-to-replicate assets such as computing resources, data and user-locked memory systems. Several panellists predicted the emergence of new friction points: whether AI-generated memory becomes portable or product-locked, whether single\u2011vendor lock-in produces concentrated failure modes, and whether a dominant \u201csuper portal\u201d for AI interaction will take hold.<\/p>\n<p>Legal and operational safeguards are already being pressed into service. Mankiw LLP partner Zhao Xuan cautioned entrepreneurs against \u201cfalse isolation\u201d from one-person corporate shells, urged rigorous documentation to establish ownership of core assets, and recommended designing around platform centralisation risks by separating critical data from third-party services and exploring decentralised options. Such precautions aim to limit single points of failure as agents assume more consequential roles, including transaction execution and strategy implementation.<\/p>\n<h3>Source Reference Map<\/h3>\n<p><strong>Inspired by headline at:<\/strong> <sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.panewslab.com\/en\/articles\/019d6b8e-9b3c-754e-bc92-ba45a3d6e16f\">[1]<\/a><\/sup><\/p>\n<p><strong>Sources by paragraph:<\/strong><\/p>\n<p>Source: <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.noahwire.com\">Noah Wire Services<\/a><\/p>\n<\/p><\/div>\n<div>\n<h3 class=\"mt-0\">Noah Fact Check Pro<\/h3>\n<p class=\"text-sm sans\">The draft above was created using the information available at the time the story first<br \/>\n        emerged. We\u2019ve since applied our fact-checking process to the final narrative, based on the criteria listed<br \/>\n        below. The results are intended to help you assess the credibility of the piece and highlight any areas that may<br \/>\n        warrant further investigation.<\/p>\n<h3 class=\"mt-3 mb-1 font-semibold text-base\">Freshness check<\/h3>\n<p class=\"text-sm pt-0 sans\"><span class=\"font-bold\">Score:<br \/>\n        <\/span>7<\/p>\n<p class=\"text-sm pt-0 sans\"><span class=\"font-bold\">Notes:<br \/>\n        <\/span>The article references events from April 3, 2026, and includes information about Anthropic&#8217;s policy change on April 4, 2026. However, the article was published on April 8, 2026, which is a delay of 5 days. This delay may affect the freshness of the information presented.<\/p>\n<h3 class=\"mt-3 mb-1 font-semibold text-base\">Quotes check<\/h3>\n<p class=\"text-sm pt-0 sans\"><span class=\"font-bold\">Score:<br \/>\n        <\/span>6<\/p>\n<p class=\"text-sm pt-0 sans\"><span class=\"font-bold\">Notes:<br \/>\n        <\/span>The article includes direct quotes attributed to individuals such as Li Chenxing, Feng Heqing, and Zhao Xuan. However, these quotes cannot be independently verified through the provided sources, raising concerns about their authenticity.<\/p>\n<h3 class=\"mt-3 mb-1 font-semibold text-base\">Source reliability<\/h3>\n<p class=\"text-sm pt-0 sans\"><span class=\"font-bold\">Score:<br \/>\n        <\/span>5<\/p>\n<p class=\"text-sm pt-0 sans\"><span class=\"font-bold\">Notes:<br \/>\n        <\/span>The article cites sources like PANews, TechRadar, Axios, and ClawManager. While some of these sources are reputable, others are less well-known, which may affect the overall reliability of the information presented.<\/p>\n<h3 class=\"mt-3 mb-1 font-semibold text-base\">Plausibility check<\/h3>\n<p class=\"text-sm pt-0 sans\"><span class=\"font-bold\">Score:<br \/>\n        <\/span>7<\/p>\n<p class=\"text-sm pt-0 sans\"><span class=\"font-bold\">Notes:<br \/>\n    <\/span>The claims made in the article align with known developments in the AI industry, such as Anthropic&#8217;s policy change regarding third-party tools. However, the lack of independently verifiable quotes and the delay in publication raise questions about the overall credibility of the information.<\/p>\n<h3 class=\"mt-3 mb-1 font-semibold text-base\">Overall assessment<\/h3>\n<p class=\"text-sm pt-0 sans\"><span class=\"font-bold\">Verdict<\/span> (FAIL, OPEN, PASS): <span class=\"font-bold\">FAIL<\/span><\/p>\n<p class=\"text-sm pt-0 sans\"><span class=\"font-bold\">Confidence<\/span> (LOW, MEDIUM, HIGH): <span class=\"font-bold\">MEDIUM<\/span><\/p>\n<p class=\"text-sm mb-3 pt-0 sans\"><span class=\"font-bold\">Summary:<br \/>\n        <\/span>The article presents information on recent developments in agentic AI and related policy changes. However, the delay in publication, unverified quotes, reliance on less reputable sources, and potential lack of independent verification raise significant concerns about the credibility and accuracy of the content. These issues necessitate further verification before publication.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As agentic AI systems gain autonomy across business and personal tasks, industry experts highlight practical deployment challenges, security risks, and the evolving regulatory landscape at a Shanghai forum. The rise of agentic AI is shifting the tech landscape from laboratory experiments to systems that can act autonomously across business and personal tasks. At a Shanghai<\/p>\n","protected":false},"author":1,"featured_media":22176,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[40],"tags":[],"class_list":{"0":"post-22175","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-london-news"},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/posts\/22175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/comments?post=22175"}],"version-history":[{"count":1,"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/posts\/22175\/revisions"}],"predecessor-version":[{"id":22177,"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/posts\/22175\/revisions\/22177"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/media\/22176"}],"wp:attachment":[{"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/media?parent=22175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/categories?post=22175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sawahsolutions.com\/lap\/wp-json\/wp\/v2\/tags?post=22175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}