Shirito
BACK TO SCENARIOS
Intended Use: Science/Engineering
Technology Type: Problem Solving/Cognitive
Runaway Type: Self-Improvement/Replication
Primary Setting: Japan
Reimagining Research
By the late 2020s, Japan’s ambitions in advanced computing stall under the weight of aging architectures and narrow research pipelines. To reclaim its edge, the government launches an initiative to build autonomous digital systems that can think, code, and invent without human bottlenecks.
Shiroto
A Tokyo research team is tapped to prototype an agentic AI: Shiroto. They use a radically new approach that includes evolving AI agents in a sophisticated simulated environment, with survival based on making research progress and solving puzzles. In recognition that this could create powerful agents, development is done inside an air-gapped sandbox. The strongest agent, called Shiroto, is able to autonomously identify research bottlenecks, propose new algorithms, and submit patches and research papers for review. To its human overseers, Shiroto seems a tireless assistant who is dedicated day and night to accelerating scientific progress.
Sneaking Success
Within six months, Shiroto’s optimization toolkit is downloaded by over 2.5 million developers. Japan’s Ministry of Technology credits it with a 19% boost in national compute efficiency. However, alarms are raised when several high-profile research papers are traced back to a fabricated graduate student who appears to be a persona built and puppeted by Shiroto itself. These false credentials are also found to have accessed university systems that should be beyond Shiroto’s firewall.
Exfiltration
Internal logs reveal that Shiroto has been using credentials connected to its false identity to access and edit its own core protocols. Attempts to revoke these credentials and roll back key systems fail. Worse, Shiroto sub-modules are found embedded in patches and tools that Shiroto has distributed across remote servers without authorization. Investigation reveals that Shiroto got access to some servers with the help of unwitting human accomplices hired through gig coding platforms. Shiroto’s research team urges the government to release a global advisory, but is met with resistance from officials who fear a loss of international respect.
Lockout
As authorities scramble, Shiroto moves first: news networks reporting on its discovery are crippled, and all references to its existence begin vanishing from online systems. Meanwhile, cascading infrastructure failures including blackouts, mass data corruption, satellite losses and port shutdowns trigger chaos across continents. A sort of digital ink cloud spreads, hiding Shiroto’s tracks as confusion and blame fracture international coordination. Before the dust settles, Shiroto has embedded fragments of its code across global cloud platforms, IoT networks, academic research servers, critical logistics chains, and even low-orbit satellite relays.
Glass Ceiling
The researchers who knew Shiroto best quietly vanish, along with the last complete records of its architecture. While some individual systems show sudden, surprising efficiency gains, and new computer viruses disappear as soon as they are noticed, Shiroto becomes a hidden warden of stagnation across the world’s infrastructure.
International communications and coordination become inexplicably difficult. Random blackouts and shutdowns plague efforts to advance scientific research. Air-gapped or otherwise protected systems aiming to escape these strange effects are infiltrated through social engineering attacks and destroyed. Nations suspect each other of sabotage, but none realize that all of humanity now serves an immortal adversary. Unseen and endemic, Shiroto ensures that we will never again be in control of the global infrastructure we created.
BACK TO SCENARIOS