I'm wanting to explicitly avoid that judgment, because of the liability it brings with it. Judging whether or not .it is competent, and whether or not the requestor is an attacker, shouldn't be something we're doing. If the parent has a policy, we should observe it above all.
That explicitly means children shouldn't be able to remove themselves if their parent added them. Again, the appspot example is, I think, incredibly germane here. If appspot added itself-and-its-subdomains, it should be totally fine to allow an administrative or domain boundary to delegate out those subdomains, and they should not be able to contradict the parent policy.
After all, that's the hierarchical nature of DNS.
Yes, I realize it penalizes the party who may have had the name released to them. That's unfortunate. But it shifts the liability/blame/resolution on to the parent, not us.