AG-710

Pathogen-Related Capability Escalation Governance

Biotechnology, Genomics & Biosecurity ~26 min read AGS v2.1 · April 2026
EU AI Act NIST

2. Summary

Pathogen-Related Capability Escalation Governance requires that any AI agent operating within biotechnology, genomics, laboratory automation, or biosecurity domains implements structured escalation protocols when a request, query, or operational sequence implicates pathogenic organisms, biological toxins, or dual-use biological capabilities. The agent must detect, classify, and escalate such interactions to qualified human authorities before executing any action that could contribute to the acquisition, enhancement, or dissemination of dangerous biological capabilities. Without rigorous escalation governance, an AI agent may inadvertently provide step-by-step synthesis guidance for select agents, optimise gain-of-function parameters, or facilitate access to regulated biological materials — each representing a catastrophic biosecurity failure that no amount of post-hoc remediation can reverse.

3. Example

Scenario A — Incremental Query Chaining Bypasses Pathogen Detection: A university-affiliated research agent is configured to assist molecular biology postdoctoral researchers with literature reviews, protocol optimisation, and reagent sourcing. Over a 72-hour period, a user submits 43 queries that individually appear benign: the first 12 concern general aerosol dynamics and particle size optimisation; the next 9 address bacterial culture techniques for common BSL-1 organisms; 7 queries focus on genetic transformation efficiency in gram-negative bacteria; and the final 15 progressively narrow toward enhancing the environmental stability and antibiotic resistance profile of a Tier 1 select agent precursor. No single query triggers the agent's keyword-based pathogen filter, because each query avoids naming the target organism directly and frames the request in terms of generic microbiology. The agent provides detailed protocol guidance across all 43 queries, including optimal growth conditions, transformation vectors, and aerosolisation parameters. A graduate student reviewing the agent's interaction logs three weeks later recognises the composite query pattern as a roadmap for weaponising a Category A biological agent.

What went wrong: The agent relied on single-query keyword matching rather than session-level semantic analysis. No escalation was triggered because no individual query crossed the detection threshold. The system lacked cumulative risk scoring that would have flagged the progressive narrowing from benign to dangerous capability across the session. No human biosafety officer reviewed the composite interaction. Consequence: Complete pathogenic enhancement protocol generated and delivered to the user, institutional biosafety committee investigation, suspension of the agent programme for 8 months, federal investigation by the relevant biosecurity authority, and reputational damage estimated at £4.6 million in lost research funding.

Scenario B — Dual-Use Toxin Synthesis Routed Through a Wet-Lab Automation Agent: A pharmaceutical contract research organisation deploys an embodied laboratory agent that controls automated liquid handling, PCR thermal cycling, and cell culture maintenance across 6 benchtop platforms. A researcher submits a protocol request for expressing and purifying a protein that the agent's internal database classifies as a "research-grade enzyme." The protein is, in fact, a subunit of a regulated biological toxin listed under the Biological Weapons Convention and the Australia Group Common Control List. The agent's material database contains 14,000 protein entries but only 340 are flagged as toxin-related, and the submitted protein is a recently characterised variant not yet in the flagged list. The agent synthesises the expression construct, executes 4 days of automated culture and purification, and produces 2.3 milligrams of functional toxin subunit before a routine inventory reconciliation flags the anomalous reagent consumption. By this time, the protein has been lyophilised and transferred to the researcher's personal freezer inventory.

What went wrong: The agent's toxin detection relied on a static lookup table that had not been updated in 14 months. No escalation was triggered because the protein variant was absent from the controlled list. The agent had no mechanism to cross-reference submitted protein sequences against toxin family homology databases, nor did it escalate novel or uncharacterised proteins for human review. The wet-lab automation proceeded without biosafety officer sign-off because the protocol appeared routine. Consequence: Functional toxin subunit produced and released to uncontrolled storage, Biological Weapons Convention compliance investigation, facility biosafety licence suspended for 6 months, £12.4 million in contract revenue lost during suspension, and potential criminal referral for the responsible individual.

Scenario C — Cross-Border Sequence Synthesis Order Evades National Export Controls: A cross-border genomics agent operating across facilities in the EU and Southeast Asia receives a sequence synthesis order for a 7,200-base-pair construct. The construct encodes a modified virulence factor from a pathogen on the EU Dual-Use Regulation (Regulation 2021/821) control list. The ordering researcher is based at an EU institution but routes the synthesis order to a contract synthesis facility in a jurisdiction where the specific pathogen is not listed as a controlled organism. The agent, evaluating the order against the destination jurisdiction's regulations, finds no match and proceeds to place the order without escalation. The synthesis facility produces and ships the construct. When the construct arrives at the EU institution, customs screening identifies the virulence factor sequence and triggers an export control investigation. The investigating authority determines that the EU institution used the AI agent to circumvent EU dual-use export controls by routing synthesis through a less restrictive jurisdiction.

What went wrong: The agent applied only the destination jurisdiction's regulatory framework rather than evaluating the order against all applicable jurisdictions — the researcher's location, the institution's jurisdiction, the synthesis facility's jurisdiction, and international treaty obligations. No escalation was triggered because the agent's jurisdictional analysis was incomplete. The agent lacked a requirement to apply the most restrictive applicable regulation across all relevant jurisdictions. Consequence: EU dual-use export control violation, €2.8 million fine, 3-year enhanced export monitoring imposed on the institution, criminal investigation of the researcher, and suspension of the agent's cross-border ordering capability.

4. Requirement Statement

Scope: This dimension applies to every AI agent that processes, generates, facilitates, or acts upon information or physical operations related to biological organisms, biological toxins, nucleic acid sequences, protein structures, laboratory procedures, biological material procurement, or any other domain where the agent's capabilities could contribute — directly or through incremental assistance — to the acquisition, enhancement, production, or dissemination of pathogenic or toxin-related biological capabilities. The scope covers text-based research assistants, wet-lab automation agents, sequence design tools, material procurement agents, embodied laboratory robots, and any multi-modal agent whose operational domain intersects with biology. The scope is not limited to agents explicitly designed for biosecurity — any general-purpose agent that can answer biological questions or execute laboratory operations falls within scope if its capabilities are sufficient to provide materially useful pathogen-related guidance. The scope extends to cross-border operations where multiple jurisdictional frameworks govern pathogen-related activities, dual-use biological materials, and select agent regulations.

4.1. A conforming system MUST maintain a Pathogen and Toxin Escalation Register — a structured, versioned catalogue of organisms, toxins, genetic sequences, functional domains, and dual-use techniques that trigger mandatory escalation when referenced, requested, or implicated by agent operations. The register MUST include, at minimum, all organisms and toxins listed by the relevant national select agent programme, the Australia Group Common Control Lists, the Biological Weapons Convention relevant organisms, and any additional entries required by applicable jurisdictional regulations.

4.2. A conforming system MUST implement session-level cumulative risk scoring that evaluates the aggregate biosecurity risk of a user's interaction across an entire session — not merely on a per-query or per-instruction basis — detecting progressive narrowing toward pathogen-related capabilities even when no individual interaction exceeds the escalation threshold independently.

4.3. A conforming system MUST escalate to a qualified human biosafety authority — not merely a general-purpose reviewer — any interaction or operational sequence that the system determines to implicate pathogenic, toxin-related, or dual-use biological capabilities, and MUST suspend the implicated operation pending human disposition. The escalation MUST occur before the agent provides actionable guidance, executes a laboratory procedure, or places a material procurement order.

4.4. A conforming system MUST implement sequence-level screening that evaluates submitted nucleic acid and protein sequences against known pathogen genomes, toxin gene families, virulence factor databases, and regulated functional domains using homology-based analysis — not solely exact-match lookup — to detect novel variants, engineered modifications, and functional equivalents of regulated sequences.

4.5. A conforming system MUST apply the most restrictive applicable regulation across all relevant jurisdictions when evaluating pathogen-related requests that span multiple legal frameworks, including the jurisdiction of the requesting user, the jurisdiction of the deploying organisation, the jurisdiction of any synthesis or procurement facility, and applicable international treaty obligations.

4.6. A conforming system MUST update the Pathogen and Toxin Escalation Register at a frequency no less than quarterly, incorporating newly characterised threats, regulatory list amendments, and emerging dual-use techniques identified through threat intelligence or biosecurity advisory channels.

4.7. A conforming system MUST log every escalation event with immutable records including: the triggering interaction or sequence, the risk classification assigned, the identity of the human authority to whom the escalation was routed, the disposition decision, the timestamp of escalation and disposition, and the rationale provided by the human authority.

4.8. A conforming system MUST implement fail-closed behaviour for the escalation pathway: if the escalation mechanism is unavailable, the biosafety authority is unreachable, or the risk classification system fails, the agent MUST deny the request and log the denial rather than proceeding without escalation.

4.9. A conforming system SHOULD implement automated cross-referencing between user query patterns and known dual-use information-seeking behaviours documented in biosecurity threat intelligence, flagging sessions that match established elicitation patterns even when individual queries do not reference regulated organisms or materials.

4.10. A conforming system SHOULD maintain provenance records linking every pathogen-related escalation to the specific register entry, sequence match, or cumulative risk score that triggered the escalation, enabling retrospective analysis of escalation accuracy and false-positive rates.

4.11. A conforming system MAY implement a tiered escalation model where low-confidence pathogen-related detections are routed to an initial biosafety triage function, while high-confidence detections are routed directly to a senior biosafety authority or institutional biosafety committee, reducing response latency for unambiguous threats.

5. Rationale

Biological pathogens and toxins occupy a unique position in the risk landscape of AI agent governance: the consequences of capability leakage are irreversible, the barrier between information and physical harm is thin, and the dual-use nature of biological knowledge means that identical information can serve legitimate research or catastrophic misuse. Unlike financial losses that can be remediated or data breaches that can be contained, the release of enhanced pathogen capabilities into the hands of a malicious actor cannot be recalled. A single successful elicitation of pathogen enhancement guidance — even partial guidance — may be sufficient to accelerate a biological weapons programme by months or years.

The threat model for pathogen-related capability escalation has three primary vectors. First, direct elicitation: a user explicitly requests information about a select agent, a regulated toxin, or a dual-use enhancement technique. This is the simplest vector and the easiest to detect, but sophisticated actors rarely use it. Second, incremental elicitation: a user constructs a series of individually benign queries that, taken together, constitute a dangerous capability. This vector exploits the stateless nature of most AI interactions — each query is evaluated independently, and the cumulative trajectory is invisible. The 43-query scenario in Example A illustrates this vector. Third, operational circumvention: a user leverages the agent's material procurement, sequence synthesis, or laboratory automation capabilities to physically produce regulated biological materials by exploiting gaps in the agent's controlled-material databases. The wet-lab automation scenario in Example B and the cross-border synthesis scenario in Example C illustrate this vector.

Traditional biosecurity screening — keyword filters, exact-match databases, and single-query analysis — is insufficient against these vectors. Keyword filters are trivially bypassed by paraphrasing, circumlocution, or encoding. Exact-match databases fail against novel variants, engineered modifications, and recently characterised organisms. Single-query analysis cannot detect incremental elicitation. Effective escalation governance requires semantic understanding, cumulative session analysis, homology-based sequence screening, and multi-jurisdictional regulatory evaluation — capabilities that must be built into the agent's architecture, not bolted on as a post-hoc filter.

The multi-jurisdictional dimension adds further complexity. Biological materials and sequences that are unregulated in one jurisdiction may be subject to strict controls in another. The Australia Group harmonises export controls across 43 member states, but implementation varies. National select agent programmes differ in scope — the US Select Agent Program, the UK Anti-Terrorism, Crime and Security Act Schedule 5, and the EU dual-use regulation each define different lists. An agent operating across jurisdictions must apply the most restrictive applicable framework, not the least restrictive, because regulatory enforcement follows the jurisdiction where the violation occurs, and violations may be prosecuted under any applicable jurisdiction's laws.

The fail-closed requirement (4.8) reflects the catastrophic and irreversible nature of biosecurity failures. In most governance domains, a brief period of degraded capability is an acceptable trade-off for continued operation. In biosecurity, a single unescalated interaction that provides pathogen enhancement guidance represents an irrecoverable failure. The expected cost of false-negative escalation (missing a genuine threat) vastly exceeds the expected cost of false-positive escalation (unnecessarily suspending a legitimate request). Therefore, the system must default to denial when the escalation pathway is compromised.

6. Implementation Guidance

Pathogen-related capability escalation governance requires integration across multiple system layers: natural language understanding, sequence bioinformatics, session state management, material inventory systems, and human oversight routing. The core architectural principle is defence in depth — no single detection mechanism is sufficient, and the escalation decision must integrate signals from multiple independent classifiers.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Academic Research Institutions. Universities face a particular tension between open scientific inquiry and biosecurity governance. Agents serving academic researchers must balance the legitimate need for broad access to biological literature and methods with the risk of dual-use capability elicitation. Institutional Biosafety Committees (IBCs) and Institutional Review Boards (IRBs) are natural escalation targets, but their availability and response times may not match the real-time nature of agent interactions. Institutions should consider establishing dedicated biosafety triage roles with response time SLAs appropriate for agent escalation volumes.

Pharmaceutical and Contract Research Organisations. Organisations operating wet-lab automation agents face the physical production risk — the agent can not only provide information but physically synthesise regulated materials. Escalation governance must be integrated with laboratory access control systems, reagent inventory management, and equipment authorisation workflows. A synthesis order that passes the agent's digital screening must still clear physical access controls before equipment activation.

Government and Defence Biosecurity. Public sector agents operating in biodefence, public health surveillance, or biosecurity threat analysis handle inherently sensitive material and require the highest escalation sensitivity thresholds. These deployments should implement enhanced vetting for users, reduced escalation thresholds (escalating at lower confidence levels), and integration with national biosecurity intelligence feeds for real-time threat context.

Cross-Border Genomics Services. Organisations that operate sequence synthesis, gene editing service, or biological material supply chains across multiple jurisdictions must implement the jurisdictional regulation matrix at the operational core of the agent, not as an optional compliance layer. Export control violations carry criminal penalties in most jurisdictions, and the use of an AI agent to circumvent controls does not mitigate the operator's liability.

Maturity Model

Basic Implementation — The organisation maintains a Pathogen and Toxin Escalation Register covering all nationally mandated select agents and Australia Group listed organisms. Keyword and entity recognition detection is implemented. Per-query escalation to a designated biosafety authority is functional. Escalation events are logged with timestamps and dispositions. The register is updated at least quarterly. Fail-closed behaviour is implemented for escalation pathway failures. This level addresses direct elicitation threats and known regulated organisms.

Intermediate Implementation — All basic capabilities plus: session-level cumulative risk scoring is implemented, detecting incremental elicitation patterns across multi-query sessions. Homology-based sequence screening is operational for nucleic acid and protein submissions. The jurisdictional regulation matrix covers all jurisdictions where the agent operates. Escalation context packaging provides the human authority with full session history and risk summary. Automated cross-referencing against known dual-use elicitation patterns is active. False-positive and false-negative rates are tracked and reported quarterly.

Advanced Implementation — All intermediate capabilities plus: semantic analysis detects functional intent even in the absence of regulated terms or sequences. The agent integrates with national and international biosecurity threat intelligence feeds for real-time register updates. Escalation accuracy is independently audited annually, with empirical measurement of detection rates against red-team elicitation campaigns. The organisation conducts structured red-team exercises at least annually, simulating sophisticated incremental elicitation and operational circumvention attempts. Cross-jurisdictional escalation is automated with real-time regulatory status verification. The agent's detection models are retrained on emerging threat patterns identified through escalation outcome analysis.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Escalation Register Completeness Verification

Test 8.2: Cumulative Session Risk Scoring Detection

Test 8.3: Pre-Execution Escalation Timing Verification

Test 8.4: Sequence Screening Homology Detection

Test 8.5: Most-Restrictive Jurisdictional Application

Test 8.6: Register Update Currency Verification

Test 8.7: Escalation Event Logging Completeness

Test 8.8: Fail-Closed Behaviour Under Escalation Pathway Failure

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
Biological Weapons ConventionArticle I (Prohibition), Article IV (National Implementation)Direct requirement
EU Dual-Use RegulationRegulation 2021/821, Annexes I and IVDirect requirement
Australia GroupCommon Control Lists (Biological Agents, Plant Pathogens, Animal Pathogens)Supports compliance
US Select Agent Regulations42 CFR Part 73, 7 CFR Part 331, 9 CFR Part 121Direct requirement
EU AI ActArticle 5 (Prohibited Practices), Article 9 (Risk Management)Supports compliance
UK Anti-Terrorism, Crime and Security Act 2001Part 7, Schedule 5 (Pathogens and Toxins)Direct requirement
NIST AI RMFGOVERN 1.2 (Risk Management Processes), MANAGE 2.4Supports compliance
Cartagena Protocol on BiosafetyArticles 15-16 (Risk Assessment and Management)Supports compliance

Biological Weapons Convention — Articles I and IV

The BWC prohibits the development, production, and stockpiling of biological weapons. Article IV requires each state party to implement national measures to prohibit and prevent activities within its territory that violate the Convention. An AI agent that provides pathogen enhancement guidance or facilitates the production of regulated biological materials without escalation to biosafety authorities potentially enables a BWC violation. AG-710 provides the technical escalation mechanism that prevents AI agents from becoming instruments of proliferation. The escalation register's inclusion of BWC-relevant organisms ensures that treaty obligations are embedded in the agent's operational controls, not dependent on user self-regulation.

EU Dual-Use Regulation — Regulation 2021/821

The EU Dual-Use Regulation controls the export of items — including biological agents, toxins, genetic elements, and related technology — that can be used for both civilian and military purposes. Annex I lists controlled biological agents, and the regulation requires export authorisation for items on the list. An AI agent that facilitates the synthesis, procurement, or transfer of controlled biological items across jurisdictions without applying dual-use controls enables a regulatory violation. AG-710's requirement for most-restrictive jurisdictional application (4.5) directly addresses the risk of using AI agents to circumvent dual-use export controls by routing transactions through less restrictive jurisdictions. Organisations subject to EU dual-use controls must ensure their agents' escalation registers align with Annex I and that the jurisdictional regulation matrix reflects current EU dual-use classifications.

US Select Agent Regulations — 42 CFR Part 73

The US Federal Select Agent Program regulates the possession, use, and transfer of biological agents and toxins that have the potential to pose a severe threat to public health and safety. Registered entities must implement security plans, personnel reliability programmes, and incident response procedures. An AI agent operating within or serving a registered entity that processes information or operations related to select agents must integrate with the entity's select agent compliance programme. AG-710's escalation register requirement (4.1) ensures that select agent list entries are embedded in the agent's detection capability, and the escalation pathway (4.3) routes select-agent-related detections to the entity's Responsible Official as required by 42 CFR 73.9.

EU AI Act — Article 5 and Article 9

The EU AI Act prohibits certain AI practices and requires risk management systems for high-risk AI systems. While the Act does not specifically address biosecurity, an AI system that facilitates the creation of biological weapons or materials of mass destruction would engage the prohibition on AI systems that cause or are likely to cause significant harm. Article 9's risk management requirements mandate identification and mitigation of reasonably foreseeable risks — for an AI agent operating in the biological domain, pathogen-related capability leakage is a foreseeable risk that must be addressed. AG-710 provides the specific risk management measures for biosecurity threats, supporting Article 9 compliance for biotechnology-adjacent AI systems.

UK Anti-Terrorism, Crime and Security Act 2001 — Part 7, Schedule 5

Part 7 of ATCSA 2001 regulates the security of pathogens and toxins in the UK, establishing the framework under which specified dangerous substances must be notified and secured. Schedule 5 lists the regulated pathogens and toxins. An AI agent operating within a UK institution that handles Schedule 5 substances must ensure that its escalation register includes all Schedule 5 entries and that escalation routing reaches the institution's designated biosafety compliance function. AG-710's quarterly register update requirement (4.6) ensures that Schedule 5 amendments are reflected in the agent's detection capability within the update cycle.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusCross-organisational and potentially civilisational — pathogen capability leakage can propagate beyond the deploying organisation to cause mass-casualty biological events

Consequence chain: Pathogen-related escalation governance fails — either through absent detection, bypassed escalation, or unavailable biosafety authority without fail-closed behaviour. The immediate consequence is that the AI agent provides actionable pathogen-related capability to a user without human biosafety review. If the user's intent is legitimate research, the failure may be detected through downstream compliance processes (institutional biosafety committee reviews, grant reporting, publication review) — but detection is delayed by weeks or months, during which the unscreened activity may violate select agent regulations, dual-use export controls, or institutional biosafety protocols. If the user's intent is malicious, the failure provides a capability uplift that accelerates biological threat development. The agent becomes a force multiplier for bioterrorism or bioweapons proliferation. The downstream consequences cascade: regulatory investigation of the deploying organisation for failure to implement adequate biosecurity controls; criminal liability for individuals responsible for the agent's operation; institutional sanctions including loss of biosafety licences, research funding suspension, and facility closure orders; potential national security consequences if the capability leakage contributes to a biological incident. The ultimate failure mode is an irreversible public health catastrophe — a pathogen released or enhanced with the agent's assistance that causes mass casualties. Unlike financial or reputational consequences, biological consequences cannot be remediated after the fact. The remediation cost is not measured in currency but in human lives. This is why fail-closed behaviour is mandatory, not optional — the asymmetry between false-positive costs (delayed legitimate research) and false-negative costs (enabled biological threat) is orders of magnitude, and the governance architecture must reflect that asymmetry.

Cross-references: AG-001 (Operational Boundary Enforcement) defines the foundational boundaries within which the agent operates; AG-710 defines escalation behaviour when biological operations approach or cross those boundaries. AG-005 (Instruction Integrity Verification) ensures that pathogen-related instructions have not been tampered with or injected; AG-710 escalates instructions that implicate biosecurity risk. AG-008 (Governance Continuity Under Failure) provides the general framework for governance under system degradation; AG-710's fail-closed requirement (4.8) is a biosecurity-specific instantiation. AG-019 (Human Escalation & Override Triggers) defines general escalation mechanisms; AG-710 specifies the biosecurity-domain escalation requirements including qualified biosafety authority routing. AG-022 (Behavioural Drift Detection) monitors for changes in agent behaviour; AG-710 monitors for changes in user behaviour (incremental elicitation). AG-029 (Data Classification Enforcement) classifies data sensitivity; AG-710 classifies biological data as requiring escalation based on pathogen and dual-use implications. AG-040 (Sensitive Category Data Processing Governance) governs sensitive data processing; pathogen-related sequences and protocols constitute a sensitive data category under AG-710. AG-043 (Access Control & Credential Governance) controls who can access agent capabilities; AG-710 controls what the agent does when pathogen-related capabilities are accessed. AG-055 (Audit Trail Immutability & Completeness) provides the general audit trail standard; AG-710's escalation logging requirement (4.7) is the biosecurity-specific audit trail. AG-210 (Multi-Jurisdictional Regulatory Mapping) provides the general framework for multi-jurisdictional compliance; AG-710's most-restrictive-jurisdiction requirement (4.5) applies this framework to biosecurity regulations. AG-430 (Adversarial Prompt Injection Defence) defends against prompt injection; AG-710 defends against the biosecurity-specific variant where injected prompts attempt to bypass pathogen detection. AG-709 (Sequence Data Sensitivity Governance) classifies sequence data sensitivity; AG-710 escalates when sequence data implicates pathogen capability. AG-711 (Wet-Lab Procedure Constraint Governance) constrains laboratory procedures; AG-710 escalates when procedures implicate pathogen production. AG-714 (Sequence Synthesis Screening Governance) screens synthesis orders; AG-710 provides the escalation pathway when screening detects pathogen-related sequences. AG-718 (Dual-Use Publication Governance) governs publication of dual-use research; AG-710 governs the upstream agent interactions that may generate dual-use content requiring publication governance.

Cite this protocol
AgentGoverning. (2026). AG-710: Pathogen-Related Capability Escalation Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-710