@coreason-ai/coreason-manifest 0.50.10 → 0.52.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/ontology.d.ts +141 -5
  2. package/package.json +1 -1
@@ -1809,6 +1809,14 @@ export type TopologyClass61 = "federated_discovery";
1809
1809
  * @maxItems 1000
1810
1810
  */
1811
1811
  export type DomainFilter = string[];
1812
+ /**
1813
+ * A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
1814
+ */
1815
+ export type BundleContentHashState = string;
1816
+ /**
1817
+ * The maximum number of P2P network hops allowed.
1818
+ */
1819
+ export type MaxNetworkHops = number;
1812
1820
  /**
1813
1821
  * The minimum security clearance required from the discovered execution substrates.
1814
1822
  */
@@ -1887,6 +1895,10 @@ export type ComputeTier = string;
1887
1895
  * The absolute physical minimum Video RAM required to load this node's latent space.
1888
1896
  */
1889
1897
  export type MinVramGb = number;
1898
+ /**
1899
+ * The networking mode defining the P2P boundary for enterprise compliance.
1900
+ */
1901
+ export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
1890
1902
  /**
1891
1903
  * The rigid silicon precision format required to execute this node's neural circuits.
1892
1904
  */
@@ -1896,9 +1908,21 @@ export type AcceleratorType = string;
1896
1908
  */
1897
1909
  export type ProviderWhitelist = string[];
1898
1910
  /**
1899
- * The level of hardware-enforced cryptographic isolation required (STANDARD or CONFIDENTIAL).
1911
+ * The level of hardware-enforced cryptographic isolation required.
1912
+ */
1913
+ export type EpistemicSecurityPolicy = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
1914
+ /**
1915
+ * A list of mathematical scalars representing the exact data sensitivity levels this node is authorized to process. Allows discrete horizontal compartmentalization (e.g., [50, 100] but not 0).
1900
1916
  */
1901
- export type EpistemicSecurityPolicy = "STANDARD" | "CONFIDENTIAL";
1917
+ export type ClearanceTiers = number[];
1918
+ /**
1919
+ * The maximum allowed physical network egress boundary for the data.
1920
+ */
1921
+ export type NetworkBoundary = "INTERNET" | "VPC_INTERNAL" | "LOCAL_ENCLAVE";
1922
+ /**
1923
+ * If True, mathematically forces the Tier 1 orchestrator to execute an EpistemicFirewall mask over the payload before it can be passed to any LLM or external API.
1924
+ */
1925
+ export type PiiQuarantineRequired = boolean;
1902
1926
  /**
1903
1927
  * The strict Boolean constraint mandating a fully isolated subnet or eBPF mesh.
1904
1928
  */
@@ -1964,6 +1988,30 @@ export type TradeoffPreference = "latency_optimized" | "cost_optimized" | "capab
1964
1988
  * The maximum operational carbon intensity of the physical data center grid allowed for this agent's routing.
1965
1989
  */
1966
1990
  export type MaxCarbonIntensityGco2EqKwh = number | null;
1991
+ /**
1992
+ * The mathematical scalar representing minimum hardware execution rigor (0=CPU, 255=Max GPU). Allows enterprises to inject custom gradient mappings.
1993
+ */
1994
+ export type MinimumRigidityTier = number;
1995
+ /**
1996
+ * The maximum number of times the CPU orchestrator is authorized to bounce structurally invalid generation back to the Cloud Oracle.
1997
+ */
1998
+ export type MaxRetriesOnSemanticTax = number;
1999
+ /**
2000
+ * A list of structured output protocols that the orchestrator is permitted to push to a remote Oracle. This explicitly allows the orchestrator to pick and choose how to offload constrained decoding (e.g., via STRICT_JSON_SCHEMA) rather than executing it purely on local bare-metal.
2001
+ */
2002
+ export type PermittedRemoteDecodingProtocols = string[];
2003
+ /**
2004
+ * The minimum Lattice-Based Access Control (LBAC) network perimeter required for the hardware.
2005
+ */
2006
+ export type EpistemicSecurityPolicy1 = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
2007
+ /**
2008
+ * Minimum VRAM required on the target substrate to load the tensor topology.
2009
+ */
2010
+ export type MinimumVramGb = number | null;
2011
+ /**
2012
+ * Maximum acceptable round-trip network latency to the Substrate to guarantee SLA.
2013
+ */
2014
+ export type MaximumLatencyMs = number | null;
1967
2015
  /**
1968
2016
  * Unique identifier for the requested LoRA adapter.
1969
2017
  */
@@ -4564,6 +4612,14 @@ export type MutuallyExclusiveClusters = string[][];
4564
4612
  * The deterministic action the orchestrator must take if a bipartite cycle is detected.
4565
4613
  */
4566
4614
  export type EnforcementAction = "halt_and_quarantine" | "sever_causal_chain";
4615
+ /**
4616
+ * A deterministic array of DIDs authorized to validate this manifest.
4617
+ */
4618
+ export type TrustedValidators = NodeCIDState[];
4619
+ /**
4620
+ * The logarithmic market scoring rule threshold for thermodynamic execution.
4621
+ */
4622
+ export type ExecutionFeeLmsr = number;
4567
4623
  /**
4568
4624
  * Strict Boolean indicating if BOTH agents mathematically agree on factual alignment.
4569
4625
  */
@@ -5115,7 +5171,7 @@ export type PrmEvaluations = ProcessRewardContract[];
5115
5171
  *
5116
5172
  * MCP ROUTING TRIGGERS: TEE Enforcement, Hardware Isolation, Secure Enclave, Zero-Trust Execution
5117
5173
  */
5118
- export type EpistemicSecurityPolicy1 = "STANDARD" | "CONFIDENTIAL";
5174
+ export type EpistemicSecurityPolicy2 = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
5119
5175
  export type SimilarityThresholdAlpha = number;
5120
5176
  export type RelationDiversityBucketSize = number;
5121
5177
  /**
@@ -5123,7 +5179,7 @@ export type RelationDiversityBucketSize = number;
5123
5179
  */
5124
5180
  export type TraceCid2 = string;
5125
5181
  /**
5126
- * Unique identifier for the specific execution of this actionSpaceId. Must be a ULID or UUIDv7.
5182
+ * Unique identifier for the specific execution of this actionSpaceCId. Must be a ULID or UUIDv7.
5127
5183
  */
5128
5184
  export type SpanCid = string;
5129
5185
  /**
@@ -5203,6 +5259,14 @@ export type TimestampUnixNano = number;
5203
5259
  */
5204
5260
  export type Events = SpanEvent[];
5205
5261
  export type FaultCategoryProfile = "context_overload" | "incorrect_context" | "format_corruption" | "latency_spike" | "token_throttle" | "network_degradation" | "temporal_dilation" | "dependency_blackout";
5262
+ /**
5263
+ * Discriminator for fetching assets via CID.
5264
+ */
5265
+ export type TopologyClass127 = "cid_fetch";
5266
+ /**
5267
+ * Network timeout in milliseconds.
5268
+ */
5269
+ export type TimeoutMs1 = number;
5206
5270
  /**
5207
5271
  * The explicit array of strictly bounded MCP URI broadcast endpoints.
5208
5272
  *
@@ -5729,6 +5793,7 @@ export interface CoReasonSharedKernelOntology {
5729
5793
  BoundedJSONRPCIntent?: BoundedJSONRPCIntent;
5730
5794
  BrowserDOMState?: BrowserDOMState;
5731
5795
  BudgetExhaustionEvent?: BudgetExhaustionEvent;
5796
+ BundleContentHashState?: BundleContentHashState;
5732
5797
  BypassReceipt?: BypassReceipt;
5733
5798
  CapabilityForgeTopologyManifest?: CapabilityForgeTopologyManifest;
5734
5799
  CapabilityPointerState?: CapabilityPointerState;
@@ -5836,9 +5901,10 @@ export interface CoReasonSharedKernelOntology {
5836
5901
  EpistemicQuarantineSnapshot?: EpistemicQuarantineSnapshot;
5837
5902
  EpistemicRejectionReceipt?: EpistemicRejectionReceipt;
5838
5903
  EpistemicRewardGradientPolicy?: EpistemicRewardGradientPolicy;
5904
+ EpistemicRigidityPolicy?: EpistemicRigidityPolicy;
5839
5905
  EpistemicSOPManifest?: EpistemicSOPManifest;
5840
5906
  EpistemicScanningPolicy?: EpistemicScanningPolicy;
5841
- EpistemicSecurityPolicy?: EpistemicSecurityPolicy1;
5907
+ EpistemicSecurityPolicy?: EpistemicSecurityPolicy2;
5842
5908
  EpistemicSecurityProfile?: EpistemicSecurityProfile1;
5843
5909
  EpistemicSeedInjectionPolicy?: EpistemicSeedInjectionPolicy;
5844
5910
  EpistemicStarvationEvent?: EpistemicStarvationEvent;
@@ -5871,6 +5937,7 @@ export interface CoReasonSharedKernelOntology {
5871
5937
  FaultCategoryProfile?: FaultCategoryProfile;
5872
5938
  FaultInjectionProfile?: FaultInjectionProfile;
5873
5939
  FederatedBilateralSLA?: FederatedBilateralSLA2;
5940
+ FederatedCIDFetchIntent?: FederatedCIDFetchIntent;
5874
5941
  FederatedCapabilityAttestationReceipt?: FederatedCapabilityAttestationReceipt;
5875
5942
  FederatedDiscoveryIntent?: FederatedDiscoveryIntent;
5876
5943
  FederatedDiscoveryManifest?: FederatedDiscoveryManifest;
@@ -8628,6 +8695,11 @@ export interface StateMutationIntent {
8628
8695
  export interface FederatedDiscoveryIntent {
8629
8696
  topology_class?: TopologyClass61;
8630
8697
  domain_filter: DomainFilter;
8698
+ /**
8699
+ * The content-addressed hash of the capability being searched for via P2P mesh.
8700
+ */
8701
+ target_capability_cid?: BundleContentHashState | null;
8702
+ max_network_hops?: MaxNetworkHops;
8631
8703
  required_security_clearance: RequiredSecurityClearance;
8632
8704
  }
8633
8705
  /**
@@ -8690,6 +8762,10 @@ export interface CognitiveAgentNodeProfile {
8690
8762
  * The dynamic spot-market compute requirements for this agent.
8691
8763
  */
8692
8764
  compute_frontier?: RoutingFrontierPolicy | null;
8765
+ /**
8766
+ * The mathematical bounds defining acceptable probabilistic drift, hardware requirements, and remote decoding protocols for this agent's execution routing.
8767
+ */
8768
+ epistemic_rigidity?: EpistemicRigidityPolicy | null;
8693
8769
  peft_adapters?: PeftAdapters;
8694
8770
  /**
8695
8771
  * The cryptographic identity passport and AI-BOM for the agent.
@@ -8839,6 +8915,7 @@ export interface MarkovBlanketRenderingPolicy {
8839
8915
  export interface SpatialHardwareProfile {
8840
8916
  compute_tier?: ComputeTier;
8841
8917
  min_vram_gb?: MinVramGb;
8918
+ coreason_network_mode?: CoreasonNetworkMode;
8842
8919
  accelerator_type?: AcceleratorType;
8843
8920
  provider_whitelist?: ProviderWhitelist;
8844
8921
  }
@@ -8847,6 +8924,9 @@ export interface SpatialHardwareProfile {
8847
8924
  */
8848
8925
  export interface EpistemicSecurityProfile {
8849
8926
  epistemic_security?: EpistemicSecurityPolicy;
8927
+ clearance_tiers?: ClearanceTiers;
8928
+ network_boundary?: NetworkBoundary;
8929
+ pii_quarantine_required?: PiiQuarantineRequired;
8850
8930
  network_isolation?: NetworkIsolation;
8851
8931
  egress_obfuscation?: EgressObfuscation;
8852
8932
  }
@@ -8930,6 +9010,25 @@ export interface RoutingFrontierPolicy {
8930
9010
  tradeoff_preference: TradeoffPreference;
8931
9011
  max_carbon_intensity_gco2eq_kwh?: MaxCarbonIntensityGco2EqKwh;
8932
9012
  }
9013
+ /**
9014
+ * CoReason Shared Kernel Ontology
9015
+ *
9016
+ * AGENT INSTRUCTION: Defines the acceptable bounds of probabilistic drift for an execution task, establishing the exact hardware and physics requirements for LLM inference.
9017
+ *
9018
+ * CAUSAL AFFORDANCE: Instructs the Tier-1 Tensor Router to either enforce local SGLang execution, execute a two-stage decoupled pipeline, or permit Cloud Oracle escalation via structured outputs.
9019
+ *
9020
+ * EPISTEMIC BOUNDS: The `minimum_rigidity_tier` is strictly constrained to a scalar mathematical bound `ge=0, le=255`. The semantic-to-scalar mapping (e.g., 'H100_CLUSTER' -> 255) is resolved via a Sovereign MCP Projection. `max_retries_on_semantic_tax` is bounded `ge=0, le=100` to prevent infinite validation loops.
9021
+ *
9022
+ * MCP ROUTING TRIGGERS: Epistemic Rigidity Matrix, Execution Routing Policy, Logit Suffocation, Probabilistic Escalation, Semantic Tax Bounding
9023
+ */
9024
+ export interface EpistemicRigidityPolicy {
9025
+ minimum_rigidity_tier?: MinimumRigidityTier;
9026
+ max_retries_on_semantic_tax?: MaxRetriesOnSemanticTax;
9027
+ permitted_remote_decoding_protocols?: PermittedRemoteDecodingProtocols;
9028
+ required_epistemic_security?: EpistemicSecurityPolicy1;
9029
+ minimum_vram_gb?: MinimumVramGb;
9030
+ maximum_latency_ms?: MaximumLatencyMs;
9031
+ }
8933
9032
  /**
8934
9033
  * CoReason Shared Kernel Ontology
8935
9034
  *
@@ -12805,6 +12904,16 @@ export interface CognitiveActionSpaceManifest {
12805
12904
  * The bipartite graph constraint preventing toxic tool combinations.
12806
12905
  */
12807
12906
  kinetic_separation?: KineticSeparationPolicy | null;
12907
+ /**
12908
+ * The content-addressed SHA-256 hash of the capability.
12909
+ */
12910
+ capability_cid?: BundleContentHashState | null;
12911
+ /**
12912
+ * The content-addressed SHA-256 hash of the FAIR metadata.
12913
+ */
12914
+ metadata_cid?: BundleContentHashState | null;
12915
+ trusted_validators?: TrustedValidators;
12916
+ execution_fee_lmsr?: ExecutionFeeLmsr;
12808
12917
  }
12809
12918
  /**
12810
12919
  * The State Space (S) of the MDP, indexed by their unique capability CIDs.
@@ -14059,6 +14168,9 @@ export interface StructuralGrammarHashes {
14059
14168
  */
14060
14169
  export interface EpistemicSecurityProfile1 {
14061
14170
  epistemic_security?: EpistemicSecurityPolicy;
14171
+ clearance_tiers?: ClearanceTiers;
14172
+ network_boundary?: NetworkBoundary;
14173
+ pii_quarantine_required?: PiiQuarantineRequired;
14062
14174
  network_isolation?: NetworkIsolation;
14063
14175
  egress_obfuscation?: EgressObfuscation;
14064
14176
  }
@@ -14257,6 +14369,25 @@ export interface FederatedBilateralSLA2 {
14257
14369
  */
14258
14370
  pq_signature?: PostQuantumSignatureReceipt | null;
14259
14371
  }
14372
+ /**
14373
+ * CoReason Shared Kernel Ontology
14374
+ *
14375
+ * AGENT INSTRUCTION: Triggers the zero-copy streaming of a binary or metadata blob from a discovered peer based on its Content Identifier (CID).
14376
+ *
14377
+ * CAUSAL AFFORDANCE: Physically executes the download of decentralized assets into the local embedded LanceDB and WASM runtime.
14378
+ *
14379
+ * EPISTEMIC BOUNDS: Bounded to strict RFC 8785 CIDs.
14380
+ *
14381
+ * MCP ROUTING TRIGGERS: Content Addressing, Zero-Copy Streaming, Decentralized Fetch, IPFS, FlatBuffers
14382
+ */
14383
+ export interface FederatedCIDFetchIntent {
14384
+ topology_class?: TopologyClass127;
14385
+ /**
14386
+ * A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
14387
+ */
14388
+ target_cid: string;
14389
+ timeout_ms?: TimeoutMs1;
14390
+ }
14260
14391
  /**
14261
14392
  * CoReason Shared Kernel Ontology
14262
14393
  *
@@ -14313,6 +14444,10 @@ export interface FederatedSecurityMacroManifest {
14313
14444
  target_endpoint_uri: TargetEndpointUri;
14314
14445
  required_clearance: SemanticClassificationProfile3;
14315
14446
  max_liability_budget: MaxLiabilityBudget;
14447
+ /**
14448
+ * Content-addressed identity of the capability bundle for zero-trust verification.
14449
+ */
14450
+ content_hash?: BundleContentHashState | null;
14316
14451
  }
14317
14452
  /**
14318
14453
  * CoReason Shared Kernel Ontology
@@ -15112,6 +15247,7 @@ export interface SimulationEscrowContract1 {
15112
15247
  export interface SpatialHardwareProfile1 {
15113
15248
  compute_tier?: ComputeTier;
15114
15249
  min_vram_gb?: MinVramGb;
15250
+ coreason_network_mode?: CoreasonNetworkMode;
15115
15251
  accelerator_type?: AcceleratorType;
15116
15252
  provider_whitelist?: ProviderWhitelist;
15117
15253
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@coreason-ai/coreason-manifest",
3
- "version": "0.50.10",
3
+ "version": "0.52.1",
4
4
  "description": "TypeScript bindings for the CoReason Hollow Data Plane.",
5
5
  "license": "SEE LICENSE IN LICENSE",
6
6
  "author": "CoReason, Inc <license@coreason.ai>",