Risk & Deflation¶
How threats, vulnerabilities, and violations reduce your effective trust
Trust in KTP isn't just earned through good behavior—it's actively deflated by risk. The system applies risk as a multiplicative friction coefficient, ensuring that operational excellence cannot mask underlying vulnerabilities.(1)
- Risk deflation mechanics are specified in KTP-CORE Section 5.3, "Risk Factor Calculation."
The Deflation Formula¶
Your effective trust is always less than or equal to your base performance:
Multiple risks compound—they don't simply add
Risk Categories¶
KTP recognizes four distinct risk categories, each measured and applied independently:(1)
- Risk category taxonomy aligns with the Context Tensor dimensions. See KTP-TENSORS Section 4, "Heat Dimension."
Vulnerabilities and active threats that expose the system to compromise.
- Unpatched CVEs (High)
- Exposed credentials (Critical)
- Active threat indicators (Critical)
- Missing encryption (High)
Regulatory and policy violations that create legal or governance exposure.
- Regulatory violations (High)
- Audit failures (Medium)
- Expired certifications (Low)
- Data residency violations (High)
Anomalous patterns that deviate from established baselines.
- Sudden capability changes (Medium)
- Baseline deviation (Variable)
- Unusual access patterns (Medium)
- Timing anomalies (Low)
Infrastructure and reliability concerns that affect availability.
- Single points of failure (Medium)
- Insufficient redundancy (Low)
- Capacity exhaustion (Medium)
- Dependency vulnerabilities (High)
How Risks Compound¶
Risks multiply rather than add. This prevents agents from offsetting severe risks with excellence elsewhere.
Compounding Example
Three risks, one result
Why Multiplication Matters
If risks simply added (25% + 10% + 5% = 40%), an agent could game the system by achieving excellence in one area to offset failures elsewhere. Multiplication ensures that every risk category matters—you can't hide a critical vulnerability behind perfect compliance.
Risk Thresholds¶
Different trust tiers have different risk tolerances. As risk increases, agents are automatically demoted to lower-privilege tiers:(1)
- Trust tier definitions and transitions are specified in KTP-CORE Section 6, "Trust Tiers."
Mitigation Strategies¶
Risk can be reduced through four primary strategies:
Related¶
-
Context Tensor
See how risk is measured through the Heat dimension.
-
Telemetry
Understand how risk signals flow through the pipeline.
-
Core Concepts
Learn about trust tiers and the Zeroth Law.