@coreason-ai/coreason-manifest 0.50.10 → 0.52.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/ontology.d.ts +141 -5
- package/package.json +1 -1
package/dist/ontology.d.ts
CHANGED
|
@@ -1809,6 +1809,14 @@ export type TopologyClass61 = "federated_discovery";
|
|
|
1809
1809
|
* @maxItems 1000
|
|
1810
1810
|
*/
|
|
1811
1811
|
export type DomainFilter = string[];
|
|
1812
|
+
/**
|
|
1813
|
+
* A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
|
|
1814
|
+
*/
|
|
1815
|
+
export type BundleContentHashState = string;
|
|
1816
|
+
/**
|
|
1817
|
+
* The maximum number of P2P network hops allowed.
|
|
1818
|
+
*/
|
|
1819
|
+
export type MaxNetworkHops = number;
|
|
1812
1820
|
/**
|
|
1813
1821
|
* The minimum security clearance required from the discovered execution substrates.
|
|
1814
1822
|
*/
|
|
@@ -1887,6 +1895,10 @@ export type ComputeTier = string;
|
|
|
1887
1895
|
* The absolute physical minimum Video RAM required to load this node's latent space.
|
|
1888
1896
|
*/
|
|
1889
1897
|
export type MinVramGb = number;
|
|
1898
|
+
/**
|
|
1899
|
+
* The networking mode defining the P2P boundary for enterprise compliance.
|
|
1900
|
+
*/
|
|
1901
|
+
export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
|
|
1890
1902
|
/**
|
|
1891
1903
|
* The rigid silicon precision format required to execute this node's neural circuits.
|
|
1892
1904
|
*/
|
|
@@ -1896,9 +1908,21 @@ export type AcceleratorType = string;
|
|
|
1896
1908
|
*/
|
|
1897
1909
|
export type ProviderWhitelist = string[];
|
|
1898
1910
|
/**
|
|
1899
|
-
* The level of hardware-enforced cryptographic isolation required
|
|
1911
|
+
* The level of hardware-enforced cryptographic isolation required.
|
|
1912
|
+
*/
|
|
1913
|
+
export type EpistemicSecurityPolicy = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
|
|
1914
|
+
/**
|
|
1915
|
+
* A list of mathematical scalars representing the exact data sensitivity levels this node is authorized to process. Allows discrete horizontal compartmentalization (e.g., [50, 100] but not 0).
|
|
1900
1916
|
*/
|
|
1901
|
-
export type
|
|
1917
|
+
export type ClearanceTiers = number[];
|
|
1918
|
+
/**
|
|
1919
|
+
* The maximum allowed physical network egress boundary for the data.
|
|
1920
|
+
*/
|
|
1921
|
+
export type NetworkBoundary = "INTERNET" | "VPC_INTERNAL" | "LOCAL_ENCLAVE";
|
|
1922
|
+
/**
|
|
1923
|
+
* If True, mathematically forces the Tier 1 orchestrator to execute an EpistemicFirewall mask over the payload before it can be passed to any LLM or external API.
|
|
1924
|
+
*/
|
|
1925
|
+
export type PiiQuarantineRequired = boolean;
|
|
1902
1926
|
/**
|
|
1903
1927
|
* The strict Boolean constraint mandating a fully isolated subnet or eBPF mesh.
|
|
1904
1928
|
*/
|
|
@@ -1964,6 +1988,30 @@ export type TradeoffPreference = "latency_optimized" | "cost_optimized" | "capab
|
|
|
1964
1988
|
* The maximum operational carbon intensity of the physical data center grid allowed for this agent's routing.
|
|
1965
1989
|
*/
|
|
1966
1990
|
export type MaxCarbonIntensityGco2EqKwh = number | null;
|
|
1991
|
+
/**
|
|
1992
|
+
* The mathematical scalar representing minimum hardware execution rigor (0=CPU, 255=Max GPU). Allows enterprises to inject custom gradient mappings.
|
|
1993
|
+
*/
|
|
1994
|
+
export type MinimumRigidityTier = number;
|
|
1995
|
+
/**
|
|
1996
|
+
* The maximum number of times the CPU orchestrator is authorized to bounce structurally invalid generation back to the Cloud Oracle.
|
|
1997
|
+
*/
|
|
1998
|
+
export type MaxRetriesOnSemanticTax = number;
|
|
1999
|
+
/**
|
|
2000
|
+
* A list of structured output protocols that the orchestrator is permitted to push to a remote Oracle. This explicitly allows the orchestrator to pick and choose how to offload constrained decoding (e.g., via STRICT_JSON_SCHEMA) rather than executing it purely on local bare-metal.
|
|
2001
|
+
*/
|
|
2002
|
+
export type PermittedRemoteDecodingProtocols = string[];
|
|
2003
|
+
/**
|
|
2004
|
+
* The minimum Lattice-Based Access Control (LBAC) network perimeter required for the hardware.
|
|
2005
|
+
*/
|
|
2006
|
+
export type EpistemicSecurityPolicy1 = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
|
|
2007
|
+
/**
|
|
2008
|
+
* Minimum VRAM required on the target substrate to load the tensor topology.
|
|
2009
|
+
*/
|
|
2010
|
+
export type MinimumVramGb = number | null;
|
|
2011
|
+
/**
|
|
2012
|
+
* Maximum acceptable round-trip network latency to the Substrate to guarantee SLA.
|
|
2013
|
+
*/
|
|
2014
|
+
export type MaximumLatencyMs = number | null;
|
|
1967
2015
|
/**
|
|
1968
2016
|
* Unique identifier for the requested LoRA adapter.
|
|
1969
2017
|
*/
|
|
@@ -4564,6 +4612,14 @@ export type MutuallyExclusiveClusters = string[][];
|
|
|
4564
4612
|
* The deterministic action the orchestrator must take if a bipartite cycle is detected.
|
|
4565
4613
|
*/
|
|
4566
4614
|
export type EnforcementAction = "halt_and_quarantine" | "sever_causal_chain";
|
|
4615
|
+
/**
|
|
4616
|
+
* A deterministic array of DIDs authorized to validate this manifest.
|
|
4617
|
+
*/
|
|
4618
|
+
export type TrustedValidators = NodeCIDState[];
|
|
4619
|
+
/**
|
|
4620
|
+
* The logarithmic market scoring rule threshold for thermodynamic execution.
|
|
4621
|
+
*/
|
|
4622
|
+
export type ExecutionFeeLmsr = number;
|
|
4567
4623
|
/**
|
|
4568
4624
|
* Strict Boolean indicating if BOTH agents mathematically agree on factual alignment.
|
|
4569
4625
|
*/
|
|
@@ -5115,7 +5171,7 @@ export type PrmEvaluations = ProcessRewardContract[];
|
|
|
5115
5171
|
*
|
|
5116
5172
|
* MCP ROUTING TRIGGERS: TEE Enforcement, Hardware Isolation, Secure Enclave, Zero-Trust Execution
|
|
5117
5173
|
*/
|
|
5118
|
-
export type
|
|
5174
|
+
export type EpistemicSecurityPolicy2 = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
|
|
5119
5175
|
export type SimilarityThresholdAlpha = number;
|
|
5120
5176
|
export type RelationDiversityBucketSize = number;
|
|
5121
5177
|
/**
|
|
@@ -5123,7 +5179,7 @@ export type RelationDiversityBucketSize = number;
|
|
|
5123
5179
|
*/
|
|
5124
5180
|
export type TraceCid2 = string;
|
|
5125
5181
|
/**
|
|
5126
|
-
* Unique identifier for the specific execution of this
|
|
5182
|
+
* Unique identifier for the specific execution of this actionSpaceCId. Must be a ULID or UUIDv7.
|
|
5127
5183
|
*/
|
|
5128
5184
|
export type SpanCid = string;
|
|
5129
5185
|
/**
|
|
@@ -5203,6 +5259,14 @@ export type TimestampUnixNano = number;
|
|
|
5203
5259
|
*/
|
|
5204
5260
|
export type Events = SpanEvent[];
|
|
5205
5261
|
export type FaultCategoryProfile = "context_overload" | "incorrect_context" | "format_corruption" | "latency_spike" | "token_throttle" | "network_degradation" | "temporal_dilation" | "dependency_blackout";
|
|
5262
|
+
/**
|
|
5263
|
+
* Discriminator for fetching assets via CID.
|
|
5264
|
+
*/
|
|
5265
|
+
export type TopologyClass127 = "cid_fetch";
|
|
5266
|
+
/**
|
|
5267
|
+
* Network timeout in milliseconds.
|
|
5268
|
+
*/
|
|
5269
|
+
export type TimeoutMs1 = number;
|
|
5206
5270
|
/**
|
|
5207
5271
|
* The explicit array of strictly bounded MCP URI broadcast endpoints.
|
|
5208
5272
|
*
|
|
@@ -5729,6 +5793,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5729
5793
|
BoundedJSONRPCIntent?: BoundedJSONRPCIntent;
|
|
5730
5794
|
BrowserDOMState?: BrowserDOMState;
|
|
5731
5795
|
BudgetExhaustionEvent?: BudgetExhaustionEvent;
|
|
5796
|
+
BundleContentHashState?: BundleContentHashState;
|
|
5732
5797
|
BypassReceipt?: BypassReceipt;
|
|
5733
5798
|
CapabilityForgeTopologyManifest?: CapabilityForgeTopologyManifest;
|
|
5734
5799
|
CapabilityPointerState?: CapabilityPointerState;
|
|
@@ -5836,9 +5901,10 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5836
5901
|
EpistemicQuarantineSnapshot?: EpistemicQuarantineSnapshot;
|
|
5837
5902
|
EpistemicRejectionReceipt?: EpistemicRejectionReceipt;
|
|
5838
5903
|
EpistemicRewardGradientPolicy?: EpistemicRewardGradientPolicy;
|
|
5904
|
+
EpistemicRigidityPolicy?: EpistemicRigidityPolicy;
|
|
5839
5905
|
EpistemicSOPManifest?: EpistemicSOPManifest;
|
|
5840
5906
|
EpistemicScanningPolicy?: EpistemicScanningPolicy;
|
|
5841
|
-
EpistemicSecurityPolicy?:
|
|
5907
|
+
EpistemicSecurityPolicy?: EpistemicSecurityPolicy2;
|
|
5842
5908
|
EpistemicSecurityProfile?: EpistemicSecurityProfile1;
|
|
5843
5909
|
EpistemicSeedInjectionPolicy?: EpistemicSeedInjectionPolicy;
|
|
5844
5910
|
EpistemicStarvationEvent?: EpistemicStarvationEvent;
|
|
@@ -5871,6 +5937,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5871
5937
|
FaultCategoryProfile?: FaultCategoryProfile;
|
|
5872
5938
|
FaultInjectionProfile?: FaultInjectionProfile;
|
|
5873
5939
|
FederatedBilateralSLA?: FederatedBilateralSLA2;
|
|
5940
|
+
FederatedCIDFetchIntent?: FederatedCIDFetchIntent;
|
|
5874
5941
|
FederatedCapabilityAttestationReceipt?: FederatedCapabilityAttestationReceipt;
|
|
5875
5942
|
FederatedDiscoveryIntent?: FederatedDiscoveryIntent;
|
|
5876
5943
|
FederatedDiscoveryManifest?: FederatedDiscoveryManifest;
|
|
@@ -8628,6 +8695,11 @@ export interface StateMutationIntent {
|
|
|
8628
8695
|
export interface FederatedDiscoveryIntent {
|
|
8629
8696
|
topology_class?: TopologyClass61;
|
|
8630
8697
|
domain_filter: DomainFilter;
|
|
8698
|
+
/**
|
|
8699
|
+
* The content-addressed hash of the capability being searched for via P2P mesh.
|
|
8700
|
+
*/
|
|
8701
|
+
target_capability_cid?: BundleContentHashState | null;
|
|
8702
|
+
max_network_hops?: MaxNetworkHops;
|
|
8631
8703
|
required_security_clearance: RequiredSecurityClearance;
|
|
8632
8704
|
}
|
|
8633
8705
|
/**
|
|
@@ -8690,6 +8762,10 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8690
8762
|
* The dynamic spot-market compute requirements for this agent.
|
|
8691
8763
|
*/
|
|
8692
8764
|
compute_frontier?: RoutingFrontierPolicy | null;
|
|
8765
|
+
/**
|
|
8766
|
+
* The mathematical bounds defining acceptable probabilistic drift, hardware requirements, and remote decoding protocols for this agent's execution routing.
|
|
8767
|
+
*/
|
|
8768
|
+
epistemic_rigidity?: EpistemicRigidityPolicy | null;
|
|
8693
8769
|
peft_adapters?: PeftAdapters;
|
|
8694
8770
|
/**
|
|
8695
8771
|
* The cryptographic identity passport and AI-BOM for the agent.
|
|
@@ -8839,6 +8915,7 @@ export interface MarkovBlanketRenderingPolicy {
|
|
|
8839
8915
|
export interface SpatialHardwareProfile {
|
|
8840
8916
|
compute_tier?: ComputeTier;
|
|
8841
8917
|
min_vram_gb?: MinVramGb;
|
|
8918
|
+
coreason_network_mode?: CoreasonNetworkMode;
|
|
8842
8919
|
accelerator_type?: AcceleratorType;
|
|
8843
8920
|
provider_whitelist?: ProviderWhitelist;
|
|
8844
8921
|
}
|
|
@@ -8847,6 +8924,9 @@ export interface SpatialHardwareProfile {
|
|
|
8847
8924
|
*/
|
|
8848
8925
|
export interface EpistemicSecurityProfile {
|
|
8849
8926
|
epistemic_security?: EpistemicSecurityPolicy;
|
|
8927
|
+
clearance_tiers?: ClearanceTiers;
|
|
8928
|
+
network_boundary?: NetworkBoundary;
|
|
8929
|
+
pii_quarantine_required?: PiiQuarantineRequired;
|
|
8850
8930
|
network_isolation?: NetworkIsolation;
|
|
8851
8931
|
egress_obfuscation?: EgressObfuscation;
|
|
8852
8932
|
}
|
|
@@ -8930,6 +9010,25 @@ export interface RoutingFrontierPolicy {
|
|
|
8930
9010
|
tradeoff_preference: TradeoffPreference;
|
|
8931
9011
|
max_carbon_intensity_gco2eq_kwh?: MaxCarbonIntensityGco2EqKwh;
|
|
8932
9012
|
}
|
|
9013
|
+
/**
|
|
9014
|
+
* CoReason Shared Kernel Ontology
|
|
9015
|
+
*
|
|
9016
|
+
* AGENT INSTRUCTION: Defines the acceptable bounds of probabilistic drift for an execution task, establishing the exact hardware and physics requirements for LLM inference.
|
|
9017
|
+
*
|
|
9018
|
+
* CAUSAL AFFORDANCE: Instructs the Tier-1 Tensor Router to either enforce local SGLang execution, execute a two-stage decoupled pipeline, or permit Cloud Oracle escalation via structured outputs.
|
|
9019
|
+
*
|
|
9020
|
+
* EPISTEMIC BOUNDS: The `minimum_rigidity_tier` is strictly constrained to a scalar mathematical bound `ge=0, le=255`. The semantic-to-scalar mapping (e.g., 'H100_CLUSTER' -> 255) is resolved via a Sovereign MCP Projection. `max_retries_on_semantic_tax` is bounded `ge=0, le=100` to prevent infinite validation loops.
|
|
9021
|
+
*
|
|
9022
|
+
* MCP ROUTING TRIGGERS: Epistemic Rigidity Matrix, Execution Routing Policy, Logit Suffocation, Probabilistic Escalation, Semantic Tax Bounding
|
|
9023
|
+
*/
|
|
9024
|
+
export interface EpistemicRigidityPolicy {
|
|
9025
|
+
minimum_rigidity_tier?: MinimumRigidityTier;
|
|
9026
|
+
max_retries_on_semantic_tax?: MaxRetriesOnSemanticTax;
|
|
9027
|
+
permitted_remote_decoding_protocols?: PermittedRemoteDecodingProtocols;
|
|
9028
|
+
required_epistemic_security?: EpistemicSecurityPolicy1;
|
|
9029
|
+
minimum_vram_gb?: MinimumVramGb;
|
|
9030
|
+
maximum_latency_ms?: MaximumLatencyMs;
|
|
9031
|
+
}
|
|
8933
9032
|
/**
|
|
8934
9033
|
* CoReason Shared Kernel Ontology
|
|
8935
9034
|
*
|
|
@@ -12805,6 +12904,16 @@ export interface CognitiveActionSpaceManifest {
|
|
|
12805
12904
|
* The bipartite graph constraint preventing toxic tool combinations.
|
|
12806
12905
|
*/
|
|
12807
12906
|
kinetic_separation?: KineticSeparationPolicy | null;
|
|
12907
|
+
/**
|
|
12908
|
+
* The content-addressed SHA-256 hash of the capability.
|
|
12909
|
+
*/
|
|
12910
|
+
capability_cid?: BundleContentHashState | null;
|
|
12911
|
+
/**
|
|
12912
|
+
* The content-addressed SHA-256 hash of the FAIR metadata.
|
|
12913
|
+
*/
|
|
12914
|
+
metadata_cid?: BundleContentHashState | null;
|
|
12915
|
+
trusted_validators?: TrustedValidators;
|
|
12916
|
+
execution_fee_lmsr?: ExecutionFeeLmsr;
|
|
12808
12917
|
}
|
|
12809
12918
|
/**
|
|
12810
12919
|
* The State Space (S) of the MDP, indexed by their unique capability CIDs.
|
|
@@ -14059,6 +14168,9 @@ export interface StructuralGrammarHashes {
|
|
|
14059
14168
|
*/
|
|
14060
14169
|
export interface EpistemicSecurityProfile1 {
|
|
14061
14170
|
epistemic_security?: EpistemicSecurityPolicy;
|
|
14171
|
+
clearance_tiers?: ClearanceTiers;
|
|
14172
|
+
network_boundary?: NetworkBoundary;
|
|
14173
|
+
pii_quarantine_required?: PiiQuarantineRequired;
|
|
14062
14174
|
network_isolation?: NetworkIsolation;
|
|
14063
14175
|
egress_obfuscation?: EgressObfuscation;
|
|
14064
14176
|
}
|
|
@@ -14257,6 +14369,25 @@ export interface FederatedBilateralSLA2 {
|
|
|
14257
14369
|
*/
|
|
14258
14370
|
pq_signature?: PostQuantumSignatureReceipt | null;
|
|
14259
14371
|
}
|
|
14372
|
+
/**
|
|
14373
|
+
* CoReason Shared Kernel Ontology
|
|
14374
|
+
*
|
|
14375
|
+
* AGENT INSTRUCTION: Triggers the zero-copy streaming of a binary or metadata blob from a discovered peer based on its Content Identifier (CID).
|
|
14376
|
+
*
|
|
14377
|
+
* CAUSAL AFFORDANCE: Physically executes the download of decentralized assets into the local embedded LanceDB and WASM runtime.
|
|
14378
|
+
*
|
|
14379
|
+
* EPISTEMIC BOUNDS: Bounded to strict RFC 8785 CIDs.
|
|
14380
|
+
*
|
|
14381
|
+
* MCP ROUTING TRIGGERS: Content Addressing, Zero-Copy Streaming, Decentralized Fetch, IPFS, FlatBuffers
|
|
14382
|
+
*/
|
|
14383
|
+
export interface FederatedCIDFetchIntent {
|
|
14384
|
+
topology_class?: TopologyClass127;
|
|
14385
|
+
/**
|
|
14386
|
+
* A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
|
|
14387
|
+
*/
|
|
14388
|
+
target_cid: string;
|
|
14389
|
+
timeout_ms?: TimeoutMs1;
|
|
14390
|
+
}
|
|
14260
14391
|
/**
|
|
14261
14392
|
* CoReason Shared Kernel Ontology
|
|
14262
14393
|
*
|
|
@@ -14313,6 +14444,10 @@ export interface FederatedSecurityMacroManifest {
|
|
|
14313
14444
|
target_endpoint_uri: TargetEndpointUri;
|
|
14314
14445
|
required_clearance: SemanticClassificationProfile3;
|
|
14315
14446
|
max_liability_budget: MaxLiabilityBudget;
|
|
14447
|
+
/**
|
|
14448
|
+
* Content-addressed identity of the capability bundle for zero-trust verification.
|
|
14449
|
+
*/
|
|
14450
|
+
content_hash?: BundleContentHashState | null;
|
|
14316
14451
|
}
|
|
14317
14452
|
/**
|
|
14318
14453
|
* CoReason Shared Kernel Ontology
|
|
@@ -15112,6 +15247,7 @@ export interface SimulationEscrowContract1 {
|
|
|
15112
15247
|
export interface SpatialHardwareProfile1 {
|
|
15113
15248
|
compute_tier?: ComputeTier;
|
|
15114
15249
|
min_vram_gb?: MinVramGb;
|
|
15250
|
+
coreason_network_mode?: CoreasonNetworkMode;
|
|
15115
15251
|
accelerator_type?: AcceleratorType;
|
|
15116
15252
|
provider_whitelist?: ProviderWhitelist;
|
|
15117
15253
|
}
|
package/package.json
CHANGED