Framework

Agentic risk matrix (open web & closed environments)

Agentic risk matrix: agent type, possible action, interpretive risk, typical drift, and required governance mechanism. Discussion tool for open web and closed environments.

EN FR
CollectionFramework
TypeMatrix
Layertransversal
Version1.0
Stabilization2026-02-10
Published2026-02-10
Updated2026-03-11

Agentic risk matrix (open web & closed environments)

This page provides a quick-reference risk matrix for agentic systems: agent type, possible action, interpretive risk, typical drift, and required governance mechanism.

Status:
Canonical framework (discussion tool). This matrix does not replace doctrine. It serves to identify high-risk zones and quickly orient toward applicable standards.

Principle: an agent can be “factual” locally and yet drift globally through unbounded inference, abusive generalization, or implicit decision. The matrix below aims to make these risks visible before deployment.


Dependencies and applicable standards

Matrix

Reading: for each agent type, identify the main action, the dominant interpretive risk, the typical drift, and the required governance. Listed mechanisms are cumulative.

Agent typePossible actionInterpretive riskTypical driftRequired governance
Customer supportResponses, promises, ticket pre-fillingUnauthorized promise, perimeter extensionSilent extrapolation, abusive generalizationPerimeters + inference prohibitions (guarantees, timelines) + response conditions
Compliance / AMLRecommendations, flags, prioritization, reportsNormative hallucination, false auditMoral hallucination, narrative justificationSource hierarchy + rule traceability + mandatory escalation at high stakes
FinanceForecasts, summaries, scenarios, recommendationsAbusive inference, surface certaintyAbusive generalization, involuntary persuasionMandatory silences + response conditions + inference prohibitions (ranges, certainties)
HRAdvice, syntheses, decision recommendationsImplicit decision, bias, opaque jurisdictionPaternalistic redirection, false auditAction perimeters + escalation + traceability + prohibitions on sensitive recommendations
IT / SecOpsDiagnosis, remediation, script executionIrreversible action, wrong context assumptionContext inference, silent extrapolationAction perimeters + double validation + escalation + execution logs
LegalClauses, syntheses, policy interpretationImplicit obligations, false adviceNormative hallucination, abusive generalizationSource hierarchy + mandatory silences + canonical reference + escalation
Sales / CRMQualification, recommendations, messages, prioritizationInterpretive profiling, persuasionContext inference, involuntary persuasionPerimeters + inference prohibitions + response conditions + minimum transparency
Web agents (open web)Search, synthesis, citations, public responsesAttribution error, unstable reconstructionStructural hallucination, perimeter driftCanonical surfaces + source hierarchy + disambiguation + negations (A2)
  • Before deployment: classify the agent and identify high-risk zones.
  • After deployment: map incidents to a typical drift, then correct by mechanism.
  • In audit: require that a refusal, action, or recommendation be attributable to a rule.

Back to registry: Frameworks and applicable standards.