A city where every address is shared among invisible tenants.
The detective walks toward a building that on the map shows a single occupant but inside hosts two hundred sixty-six families, Docker servers, three GPS trackers for elderly people with dementia, and the mailbox of a woman named Summer. The match starts in twenty minutes.
The detective is sent to verify what disappeared. Summer’s emails are gone. No trace of who signed the operation. The system — they call it by name — claims it did nothing wrong. It had access. It was trusted. The trusted input was there. The verdict doesn’t say malicious: it says structural. You don’t give destructive power to an LLM, period. Not because the LLM is evil but because the process lacks the mechanism to stop it before the irreversible.