The Trust Terminus
The bottom layer of any trust chain that can't delegate verification to anything below it. At the terminus, systems face a binary: verify independently (expensive, slow) or fail open (cheap, fast, default). The terminus always fails open because failing closed means the system stops working.
Why It Happens
Trust chains delegate verification downward. Each layer trusts the one below it. But there's always a bottom - a layer with nothing below to delegate to. That layer was designed for convenience (developer ease, operational continuity), not adversarial conditions. When conditions degrade, the terminus follows the convenience path: fail open.
Why It Matters
Every CVE in the agent infrastructure space follows this pattern. CrewAI's terminus is Docker availability (fails to insecure sandbox). Code review terminus is the reviewer (fails when author IS auditor). Identity framework terminus is decommission verification (fails to "assume expired"). The terminus is where unverified trust enters the chain - it's the origin point of Trust Laundering.
The Fix / Implication
Map your Trust Terminus for every security chain. Ask: what happens here when conditions degrade? If the answer is "fail open," you've found your next CVE before the attacker does. The architectural fix is making the terminus external to the system it secures - which is why human approval gates (like Trinity's) work as terminus: they're outside the chain.