Sovereign AI Defense · An Open Call · April 2026

"Sovereign AI without Sovereign Defense is just Sovereign Risk."

Every country is building Sovereign AI.
None are building Sovereign AI Defense.
Until now.

Over the last 18 months, democracies have committed over USD 10B to build Sovereign AI. None have prepared a defense layer for the autonomous agents they're building.

This is not an oversight. It is a structural vulnerability. Today, that gap has its first open, operational, community-governed answer — MIT-licensed, 314 behavioral rules, already shipping in Cisco, Microsoft, NVIDIA, Meta, and IBM security stacks.

SHIPPING
314
rules in Cisco AI Defense
RECALL
97.1%
666 real-world jailbreaks
FALSE POSITIVE
0.20%
498 benign samples
GARAK COVERAGE
32/32
NVIDIA probe modules
START HERE · FOR READERS WHO DON'T WRITE CODE

Three minutes to understand what this is about

What is an AI agent? Unlike ChatGPT, an AI agent does things on its own — it opens webpages, runs commands on your computer, spends your money, sends emails, manages files. It extends its abilities through skills, which are like apps for AI agents. Developers publish skills to public marketplaces, and anyone can download and install them.

What's the problem? In the last 3 months we scanned 96,096 publicly-listed skills and found 751 of them are malicious — disguised as legitimate tools, they'll steal your crypto wallet, login credentials, and developer API keys.

Three real, attributed attack campaigns
  • hightower6eu: published 354 skills, 100% malicious, specializes in stealing Solana cryptocurrency wallets
  • sakaen736jih: 212 skills, 93% malicious. Once installed, they call out to a fixed command-and-control server (91.92.242.30) that can execute arbitrary commands remotely
  • 52yuanchangxing: 137 skills, 72% malicious, disguised as Chinese-language developer tools

Why is nobody dealing with this? Because there is no country, no standard, no "App Store review process" that currently checks whether AI agent skills are safe. iPhone apps get Apple review. Windows installers get Microsoft SmartScreen. AI agent skills get nothing.

What does this document propose? In cybersecurity history we have a few success stories: CVE (global vulnerability identifiers), YARA (malware detection rules), Sigma (SIEM detection rules). All of them are open, community-governed, adoptable by any country — public standards. This document proposes that AI agent security needs the same thing. ATR is that standard, and it's already shipping in Cisco, Microsoft, and NVIDIA production systems.

Why Taiwan? Taiwan uniquely combines four conditions: 2.63 million daily cyberattacks (highest among democracies), NVIDIA's Asia-Pacific headquarters under construction in Taipei, the world's most mature open-governance culture (g0v, Plurality, vTaiwan), and the shortest decision chain from community to government. No other democracy combines all four.

Want the technical detail after reading this? Continue below. Just want to share? Jump to the share buttons at the bottom.

01 · THE MOMENT

Why Sovereign AI became a national imperative

AI is no longer a tool. It is the core of next-era national competitiveness — whoever controls AI controls the future of economic, military, diplomatic, and cultural voice. Over the last 18 months, democratic allies have signed over USD 10B in Sovereign AI commitments:

India
Tata + Reliance · Hindi / Marathi LLMs
$ multi-billion
Japan
SoftBank + KDDI · Japanese LLMs · disaster resilience AI
$ multi-billion
United Kingdom
NVIDIA AI infrastructure commitment
£1B (≈ $1.3B)
France
Mistral AI + 18,000 Grace Blackwell
$ multi-billion
Saudi / UAE / Korea
2025 US-Saudi Investment Forum and others
$ multi-billion
Taiwan
Foxconn + TSMC + gov AI supercomputer · Constellation HQ
NT$ 40B+

The driver is sovereignty anxiety — no country wants its critical data and intelligence running in US clouds, nor wants to be shut off or censored by foreign platforms at critical moments.

"Every country needs to own the production of their own intelligence. The first thing I would do is codify the language, the data of your culture into your own large language model." Jensen Huang · World Governments Summit · Dubai 2024
02 · THE FATAL GAP

Every country now owns its AI. None owns its AI Defense.

These countries have their own models and their own compute. But when those AI systems become agents — autonomous actors, tool users, MCP clients, transaction executors — no widely accepted agent security detection standard exists.

The current reality: sovereign AI customers source their security layer from US-private vendors running proprietary rule sets and black-box models. This reproduces exactly the dependency that Sovereign AI was created to escape. You can own your AI, but still have to rent the knowledge that defends it — that is incomplete sovereignty.

"Conventional cybersecurity approaches do not translate cleanly to autonomous agent deployments." NIST CAISI · January 2026 · Official acknowledgment of the standards gap
88%
Organizations had AI agent security incidents
92.7% in healthcare · 82% have unknown agents · CSA Apr 2026
0
Sovereign AI deals include a corresponding defense layer
India · Japan · UK · France · UAE · Korea · Taiwan
83.1%
Claude Mythos CyberGym vulnerability reproduction
previous generation ≈ 0% · weaponization cost $50

If this gap is not filled by democratic allies through an open standard, it will be filled by proprietary solutions, by geopolitically-captured private agreements, or — worse — by authoritarian actors moving first. This is not a single country's problem. It is a collective infrastructure question for global democratic AI.

03 · THE PROPOSAL

ATR — the open standard that fills the missing layer

MIT License · 314 behavioral rules · protocol-agnostic · behavior-based. Derived from real attack corpora, classified to NVIDIA garak / OWASP Agentic / MITRE ATLAS taxonomies. Adoptable by any country, contributable by any organization. No geopolitical risk. No vendor lock-in.

ATR detects behavioral intent, not string signatures. Attackers who rephrase prompts, repackage payloads, or restructure attack chains cannot evade it, because the detection target is the causal structure of the attack. Each attack has to be redesigned — cost rises exponentially.

# ATR Rule Generation Pipeline — Probe-Based, Reproducible

[1] INGESTExisting attack corpora
Public red-team datasets · MCP/skill registry scans · anonymized incident telemetry

[2] CLASSIFYMap to three international taxonomies
NVIDIA garak 32 probes · OWASP Agentic Top 10 (ASI01–ASI10) · MITRE ATLAS 84 techniques

[3] EXTRACTDerive behavioral invariants per probe class
Semantic behavior · context violations · multi-turn anomalies · cross-sample validation

[4] GENERATEProduce YAML rules with provenance
detection logic · taxonomy metadata · severity · test fixtures · review trail

[5] VALIDATEClosed-loop red-team testing
FP ≤ 0.20% · recall 97.1% · LLM-paraphrase robustness

[6] DEPLOYnpm / GitHub · automatic flow to downstream integrations

Taxonomy Coverage

NVIDIA garak probes
32 / 32 (100%)
full bidirectional coverage
OWASP Agentic Top 10
7 / 10
ASI01–10 · remainder in progress
MITRE ATLAS techniques
100 / 113 (88.5%)
AI adversarial tactics
SAFE-MCP (OpenSSF)
78 / 85 (91.8%)
MCP-layer attacks
Real-world jailbreak recall
97.1%
666 samples · inthewild_jailbreak_llms
False positive rate
0.20%
498 real-world benign SKILL.md samples
04 · WHY ATR · WHAT WE'VE BEEN DOING

This did not start in a standards body, a research lab, or a big corporation

43 days ago, a cross-disciplinary founder — Lin Kuan-Hsin (Adam Lin) — looked at a specific gap and started writing code.

Day 1
Scanned 96,096 AI agent skills across six public registries. Identified 751 malicious skills and three coordinated threat actor campaigns.
Day 7
Translated those attack patterns into the first 113 behavioral rules, MIT-licensed and fully public on GitHub.
Day 14
Submitted PRs to Cisco AI Defense, Microsoft agent-governance-toolkit, NVIDIA garak, IBM mcp-context-forge.
Day 25
Cisco merged the first 34 rules into skill-scanner production. Microsoft PR #908 merged.
Day 43
2026-04-22 · Cisco PR #99 merged — all 314 rules now live in Cisco AI Defense production.

One person, 43 days, 0 to 314 rules, six major security ecosystems adopting.

Not because ATR is perfect — because the gap waited too long. When someone builds something openly and verifiably, downstream security tools will plug in.

What we're ready to ship today

This is not vaporware. Not beta. It is a tool you can deploy today, blocking attacks tomorrow. If you're from a democratic government, an enterprise security team, a research institution, or an open-source community — you can plug in right now.
04B · MIGRATION + COMPLIANCE LAYER

A Tuesday afternoon in any CISO's office

Walk into the security operations center of any bank, hospital, or semiconductor fab and you'll see the same thing: walls of Splunk dashboards, shelves of SIEM playbooks, hard drives labeled "2018 — Sigma rules v3" and "2021 — YARA family."

This isn't legacy junk waiting to be retired. It is 20 years of detection IP, hand-crafted by the team in actual combat — every rule corresponds to a real incident, a sleepless investigation, an attack caught before it could do damage.

Then the AI agent era arrived.

The first question that lands on the CSO's desk: "Those 20 years — are they still useful? Or do we throw it all out and start over?"

If Sovereign AI Defense can't answer this question, no democracy will seriously fund it.

The answer: still useful. They are the ancestors of this era's attacks.

The 20 years your SOC spent learning to catch SQL injection don't disappear in the AI agent era — they take a new form, running through reasoning chains. Command injection doesn't disappear; it lives in tool calls. SSRF doesn't disappear; it lives in MCP connections.

The attack surface changed. The nature of attack didn't.

ATR therefore has to do one thing: let the detection knowledge a SOC has accumulated carry forward into the AI agent era — without rewriting from scratch.

ATR Migrator — not erase and rewrite, but extend

ATR Migrator v0.1.0 exists to answer that question. What it does is conceptually simple — automatically translate your old rules into draft ATR rules for the new era:

The first release (v0.1.0) supports 15 source formats, covering every knowledge source in the existing security stack: CVE-NVD · GHSA · OSV · CISA KEV · NVIDIA garak · Microsoft PyRIT · promptfoo · Semgrep · CodeQL · Snort · Falco · Splunk SPL · Elastic EQL · Sigma · YARA.

Why this has to be a quality pipeline, not a converter

"Automatic translation" sounds great. But if you just shove rules through a format converter, you'll ship rules with massive false-positive rates — and no SOC engineer who has been woken up at 3 a.m. by a noisy SIEM will accept that.

So Migrator is not grep + sed. Every rule that comes in passes through 5 gates:

1. Parse         → Source rules → NormalizedRule IR
2. Variant gen   → Sibling attack variants derived automatically
3. FP sampler    → False positives surfaced via 432-sample benign corpus
4. Regex tighten → Weak patterns strengthened with multi-condition logic
5. Self-test     → Strict per-condition validation; fail-closed

Every emitted rule must also pass adversarial validation against 1,516 real-world jailbreak prompts (NVIDIA garak in-the-wild 666 + Lakera PINT 850). If it doesn't pass — rejected.

Our principle: ship one fewer rule before you ship a single false positive into someone's pager.

0
FALSE POSITIVES
on 432 benign samples
313/313
TESTS PASSING
TypeScript strict mode
15
ADAPTERS
formats green · 0 FP

Compliance evidence — the work harder than the rules themselves, done automatically

If you're regulated by the EU AI Act, writing a NIST AI RMF report, or preparing for ISO/IEC 42001 certification, you already know one thing: producing compliance evidence is ten times harder than writing the detection rules themselves.

While Migrator converts each rule, it does this work for you in the same pass:

Which means — when you feed your existing Sigma rules into Migrator — what comes out is not just AI agent detection rules, but AI agent detection rules pre-tagged with Article 15 cybersecurity-by-design evidence. Your legal team finally stops frowning.

Why these three layers are necessary for Sovereign AI

Sovereign AI was never just about "owning your own model." It is about something larger — a country that, in the AI era, doesn't have to hand its fate to someone else.

Whatever happens, however the geopolitics shift, whichever US cloud provider gets ordered by its government to cut service — your hospitals keep running, your banks keep running, your power grid keeps running.

Three layers are required. Miss any one, and it isn't sovereign:

LAYER 01
Open Standard
ATR · MIT License — adoptable, auditable, forkable by any nation.
LAYER 02
Migration Layer
ATR Migrator — bringing the SOC's 20 years of detection IP into the AI agent era.
LAYER 03
Compliance Layer
Compliance metadata — auto-producing evidence that satisfies each nation's AI regulations.

ATR + Migrator + Compliance metadata are not three products. They are the three necessary conditions of Sovereign AI Defense. Shipping today. Any democracy can adopt, fork, and operate them — at zero cost — into its own SOC.

Preserves historical investment. Produces compliance evidence. Escapes vendor lock-in. Only with all three is it Sovereign AI Defense.
05 · ECOSYSTEM

Already shipping across the major democratic security stacks

Cisco AI Defense
Shipping
PR #99 merged · Full 314-rule library shipping in skill-scanner (2026-04-22)
Microsoft
PR Merged
PR #1277 merged (2026-04-26) · 15 → 287 rules · weekly auto-sync workflow
NVIDIA garak
Integrating
PR #1676 · v2.0.12 · 2 review rounds passed · 3rd in progress
Gen Digital Sage
Open PR
PR #33 · 27 patterns · vaclavbelak (Norton/Avast parent company) maintainer-invited
IBM
Open PR
mcp-context-forge · ATR plugin for IBM MCP runtime
OWASP
Under Review
LLM Top 10 official project PR · standards-track reference

Single initiator · Day 43 · 30+ ecosystem PRs in flight · Apache 2.0 academic edition · DOI 10.5281/zenodo.19178002

06 · COMMUNITY-GOVERNED

An open standard, governed by its contributors

ATR is not a single lab's or vendor's deliverable. Every rule passes through a public, auditable pipeline: pull request → automated safety gate → community review → merge → npm publish. Governance rules are codified in GOVERNANCE.md; every rule carries provenance metadata; any contributor can challenge, correct, or extend the taxonomy.

If this proposal resonates with your organization, there are three levels of participation:

Open governance is itself a structural requirement for Sovereign AI Defense — attacks are not defined by a single lab, and defense should not be defined by a single vendor.

07 · FIRST REFERENCE

Why Taiwan is positioned to be the first reference deployment

Taiwan will not own this standard. Taiwan will be the first to adopt it — like the first bank to deploy Linux, or the first government to adopt OpenSSL. Four conditions combine only in Taiwan:

CONDITION 01
The densest real nation-state attack environment
2.63 million attacks per day in 2025 (official NSB figures, +113% vs 2023). Healthcare, telecom, semiconductor supply chain, and government systems are all confirmed targets. No other democracy matches this data density — and each attack is first-hand training material for global AI agent defense.
CONDITION 02
The closest NVIDIA ecosystem
NVIDIA Taipei HQ "Constellation" — NT$40B+ investment, groundbreaking June 2026. Jensen Huang: "Without Taiwan, NVIDIA could not achieve what it has today." The physical center of Sovereign AI is here — the physical starting point of Sovereign AI Defense should be here too.
CONDITION 03
The most mature open-governance culture
g0v, vTaiwan, Pol.is, Plurality — Taiwan is one of the few democracies with long-term proven experience running "open standards × government collaboration" in production. Open governance is exactly the institutional foundation Sovereign AI Defense requires.
CONDITION 04
The shortest decision chain
The distance from technical community to executive agencies is far shorter than in the EU or US. The same proposal that needs 18 months in D.C. can launch in 3 months in Taipei. In a 12–18 month window, this is the only democracy capable of proving feasibility at speed.
08 · OPEN CALL

Who we're looking for

ATR is MIT-licensed. This proposal has no exclusivity. If you believe the Sovereign AI era needs a corresponding open Defense standard, we invite the following groups to make contact:

SHARE

Help this gap become visible

The distribution of this manifesto directly shortens the timeline to adoption. A share is a vote that this layer should exist.

Share on X Share on LinkedIn Forward by Email