@coreason-ai/coreason-manifest 0.50.11 → 0.53.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/ontology.d.ts +482 -283
- package/package.json +1 -1
package/dist/ontology.d.ts
CHANGED
|
@@ -646,7 +646,7 @@ export type StructuralPostConditions = EpistemicConstraintPolicy[];
|
|
|
646
646
|
* Thermodynamic cap on SymbolicAI DbC retries.
|
|
647
647
|
*/
|
|
648
648
|
export type MaxPlanningRemediationEpochs = number;
|
|
649
|
-
export type AnyExplorationBranch = ThoughtBranchState | StochasticTopologyManifest;
|
|
649
|
+
export type AnyExplorationBranch = ThoughtBranchState | StochasticTopologyManifest | StrategicThoughtNodeIntent;
|
|
650
650
|
/**
|
|
651
651
|
* A deterministic capability pointer bounding this specific topological divergence in the Latent Scratchpad Trace.
|
|
652
652
|
*/
|
|
@@ -689,11 +689,31 @@ export type SuperpositionCid = string;
|
|
|
689
689
|
export type WaveCollapseFunction = "plurality_vote" | "highest_confidence" | "deterministic_compiler";
|
|
690
690
|
export type ResidualEntropyVectors = string[];
|
|
691
691
|
export type EpistemicStatus = "stochastically_unbounded";
|
|
692
|
+
/**
|
|
693
|
+
* Discriminator for MCTS thought nodes within the strategic planning topology.
|
|
694
|
+
*/
|
|
695
|
+
export type TopologyClass15 = "strategic_thought_node";
|
|
696
|
+
/**
|
|
697
|
+
* The SHA-256 hash of the parent thought node in the MCTS tree, establishing Merkle-DAG lineage. For root nodes, use the SHA-256 hash of the initial escalation intent.
|
|
698
|
+
*/
|
|
699
|
+
export type ParentNodeHash = string;
|
|
700
|
+
/**
|
|
701
|
+
* A structured natural-language description of the proposed heuristic leap or code modification strategy.
|
|
702
|
+
*/
|
|
703
|
+
export type ProposedAction = string;
|
|
704
|
+
/**
|
|
705
|
+
* The causal reasoning chain explaining why this action is expected to resolve the epistemic deficit, including references to specific code structures or domain constraints.
|
|
706
|
+
*/
|
|
707
|
+
export type Rationale = string;
|
|
708
|
+
/**
|
|
709
|
+
* Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
|
|
710
|
+
*/
|
|
711
|
+
export type HeuristicConfidence = number;
|
|
692
712
|
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | ChaosExperimentTask | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | FederatedDiscoveryIntent | OntologicalNormalizationIntent;
|
|
693
713
|
/**
|
|
694
714
|
* Discriminator for temporal edge invalidation.
|
|
695
715
|
*/
|
|
696
|
-
export type
|
|
716
|
+
export type TopologyClass16 = "temporal_invalidation";
|
|
697
717
|
/**
|
|
698
718
|
* The precise chronological coordinate terminating the truth value (Graphiti valid_to).
|
|
699
719
|
*/
|
|
@@ -701,7 +721,7 @@ export type InvalidationTimestamp = number;
|
|
|
701
721
|
/**
|
|
702
722
|
* Discriminator type for empirical falsification contract.
|
|
703
723
|
*/
|
|
704
|
-
export type
|
|
724
|
+
export type TopologyClass17 = "empirical_falsification_contract";
|
|
705
725
|
/**
|
|
706
726
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this falsification test to the Merkle-DAG.
|
|
707
727
|
*/
|
|
@@ -718,12 +738,12 @@ export type RequiredToolName = string | null;
|
|
|
718
738
|
* The expected data schema or regex pattern that, if returned by the tool, kills the hypothesis.
|
|
719
739
|
*/
|
|
720
740
|
export type FalsifyingObservationSignature = string;
|
|
721
|
-
export type
|
|
741
|
+
export type TopologyClass18 = "falsification_contract";
|
|
722
742
|
/**
|
|
723
743
|
* The constraint oracle tasked with finding a counter-model.
|
|
724
744
|
*/
|
|
725
745
|
export type FalsificationSolver = "clingo" | "z3";
|
|
726
|
-
export type
|
|
746
|
+
export type TopologyClass19 = "ontological_crosswalk";
|
|
727
747
|
export type TargetGraphCid = string;
|
|
728
748
|
/**
|
|
729
749
|
* The ungrounded natural language concepts extracted by the LLM.
|
|
@@ -744,7 +764,7 @@ export type MinimumIsometryThreshold = number;
|
|
|
744
764
|
/**
|
|
745
765
|
* The discriminative topological boundary for read-only informational handoffs.
|
|
746
766
|
*/
|
|
747
|
-
export type
|
|
767
|
+
export type TopologyClass20 = "informational";
|
|
748
768
|
/**
|
|
749
769
|
* The context or summary to display to the human operator.
|
|
750
770
|
*/
|
|
@@ -756,7 +776,7 @@ export type TimeoutAction1 = "rollback" | "proceed_default" | "terminate";
|
|
|
756
776
|
/**
|
|
757
777
|
* Discriminator for requesting specific missing context from a human.
|
|
758
778
|
*/
|
|
759
|
-
export type
|
|
779
|
+
export type TopologyClass21 = "drafting";
|
|
760
780
|
/**
|
|
761
781
|
* The prompt explaining what information the swarm is missing.
|
|
762
782
|
*/
|
|
@@ -766,21 +786,29 @@ export type ContextPrompt = string;
|
|
|
766
786
|
*/
|
|
767
787
|
export type TimeoutAction2 = "rollback" | "proceed_default" | "terminate";
|
|
768
788
|
/**
|
|
769
|
-
* Discriminator for
|
|
789
|
+
* Discriminator for Forge-to-Claw epistemic deficit escalations.
|
|
770
790
|
*/
|
|
771
|
-
export type
|
|
791
|
+
export type TopologyClass22 = "escalation";
|
|
772
792
|
/**
|
|
773
|
-
* The
|
|
793
|
+
* The fully qualified URN of the heuristic solver capability to which the deficit is being escalated.
|
|
774
794
|
*/
|
|
775
|
-
export type
|
|
795
|
+
export type TargetSolverUrn = string;
|
|
776
796
|
/**
|
|
777
|
-
*
|
|
797
|
+
* A structured natural-language description of the deterministic logic that failed, including the specific AST node, formal solver, or constraint that could not be satisfied.
|
|
778
798
|
*/
|
|
779
|
-
export type
|
|
799
|
+
export type EpistemicDeficitDescription = string;
|
|
800
|
+
/**
|
|
801
|
+
* An ordered list of Content Identifiers (CIDs) representing the code artifacts, Merkle-DAG fragments, and contextual state required by the Claw agent to resolve the deficit.
|
|
802
|
+
*/
|
|
803
|
+
export type ContextWindowCids = string[];
|
|
804
|
+
/**
|
|
805
|
+
* The maximum number of tokens the Sovereign LLM Proxy is authorized to burn for this escalation before triggering the thermodynamic circuit breaker (HTTP 429).
|
|
806
|
+
*/
|
|
807
|
+
export type ThermodynamicBudget = number;
|
|
780
808
|
/**
|
|
781
809
|
* Discriminator for geometric boundary of latent tool discovery.
|
|
782
810
|
*/
|
|
783
|
-
export type
|
|
811
|
+
export type TopologyClass23 = "semantic_discovery";
|
|
784
812
|
/**
|
|
785
813
|
* The minimum cosine similarity required to authorize a capability mount.
|
|
786
814
|
*/
|
|
@@ -794,7 +822,7 @@ export type RequiredStructuralTypes = string[];
|
|
|
794
822
|
/**
|
|
795
823
|
* Strict discriminator for dynamic UI regrouping.
|
|
796
824
|
*/
|
|
797
|
-
export type
|
|
825
|
+
export type TopologyClass24 = "taxonomic_restructure";
|
|
798
826
|
/**
|
|
799
827
|
* The SOTA mathematical heuristic used to project the new manifold.
|
|
800
828
|
*/
|
|
@@ -897,7 +925,7 @@ export type CompiledShaderCid = string | null;
|
|
|
897
925
|
/**
|
|
898
926
|
* Discriminator for RAG projection intent.
|
|
899
927
|
*/
|
|
900
|
-
export type
|
|
928
|
+
export type TopologyClass25 = "latent_projection";
|
|
901
929
|
/**
|
|
902
930
|
* The maximum number of nodes to extract from the index.
|
|
903
931
|
*/
|
|
@@ -942,7 +970,7 @@ export type ParentMergeThreshold = number | null;
|
|
|
942
970
|
/**
|
|
943
971
|
* Discriminator for unstructured payload schema deduction.
|
|
944
972
|
*/
|
|
945
|
-
export type
|
|
973
|
+
export type TopologyClass26 = "latent_schema_inference";
|
|
946
974
|
/**
|
|
947
975
|
* The CID pointing to the TerminalBufferState or raw intercepted byte stream.
|
|
948
976
|
*/
|
|
@@ -962,7 +990,7 @@ export type RequireStrictValidation = boolean;
|
|
|
962
990
|
/**
|
|
963
991
|
* Discriminator type for a human directive.
|
|
964
992
|
*/
|
|
965
|
-
export type
|
|
993
|
+
export type TopologyClass27 = "human_directive";
|
|
966
994
|
/**
|
|
967
995
|
* The raw, unstructured human objective.
|
|
968
996
|
*/
|
|
@@ -974,7 +1002,7 @@ export type AllocatedBudgetMagnitude = number;
|
|
|
974
1002
|
/**
|
|
975
1003
|
* Discriminator for contextual semantic resolution.
|
|
976
1004
|
*/
|
|
977
|
-
export type
|
|
1005
|
+
export type TopologyClass28 = "contextual_semantic_resolution";
|
|
978
1006
|
/**
|
|
979
1007
|
* An explicit cryptographic pointer to the raw SemanticRelationalVectorState pending resolution.
|
|
980
1008
|
*/
|
|
@@ -998,7 +1026,7 @@ export type MinimumIsometryThreshold1 = number;
|
|
|
998
1026
|
/**
|
|
999
1027
|
* Discriminator for external ontology polling.
|
|
1000
1028
|
*/
|
|
1001
|
-
export type
|
|
1029
|
+
export type TopologyClass29 = "ontology_discovery";
|
|
1002
1030
|
/**
|
|
1003
1031
|
* JSON-RPC version.
|
|
1004
1032
|
*/
|
|
@@ -1034,7 +1062,7 @@ export type ExpectedResponseSchema = {
|
|
|
1034
1062
|
/**
|
|
1035
1063
|
* Discriminator for semantic heuristic proposals.
|
|
1036
1064
|
*/
|
|
1037
|
-
export type
|
|
1065
|
+
export type TopologyClass30 = "semantic_mapping_proposal";
|
|
1038
1066
|
/**
|
|
1039
1067
|
* The cryptographic Merkle-DAG anchor for the proposal.
|
|
1040
1068
|
*/
|
|
@@ -1060,7 +1088,7 @@ export type JustificationEvidenceCids = [NodeCIDState, ...NodeCIDState[]];
|
|
|
1060
1088
|
/**
|
|
1061
1089
|
* The discriminative topological boundary for spatial mutation intents.
|
|
1062
1090
|
*/
|
|
1063
|
-
export type
|
|
1091
|
+
export type TopologyClass31 = "continuous_spatial_mutation";
|
|
1064
1092
|
/**
|
|
1065
1093
|
* The SpatialReferenceFrameManifest CID this coordinate is relative to, anchoring it to a physical or virtual room.
|
|
1066
1094
|
*/
|
|
@@ -1136,7 +1164,7 @@ export type LamportClock = number;
|
|
|
1136
1164
|
/**
|
|
1137
1165
|
* The discriminative topological boundary for compute provisioning intents.
|
|
1138
1166
|
*/
|
|
1139
|
-
export type
|
|
1167
|
+
export type TopologyClass32 = "compute_provisioning";
|
|
1140
1168
|
/**
|
|
1141
1169
|
* The maximum atomic cost budget allowable for the provisioned compute.
|
|
1142
1170
|
*/
|
|
@@ -1150,7 +1178,7 @@ export type RequiredCapabilities = string[];
|
|
|
1150
1178
|
/**
|
|
1151
1179
|
* The discriminative topological boundary for task announcement intents.
|
|
1152
1180
|
*/
|
|
1153
|
-
export type
|
|
1181
|
+
export type TopologyClass33 = "task_announcement";
|
|
1154
1182
|
/**
|
|
1155
1183
|
* Unique identifier for the required task.
|
|
1156
1184
|
*/
|
|
@@ -1166,7 +1194,7 @@ export type MaxBudgetMagnitude = number;
|
|
|
1166
1194
|
/**
|
|
1167
1195
|
* The type of the resilience payload.
|
|
1168
1196
|
*/
|
|
1169
|
-
export type
|
|
1197
|
+
export type TopologyClass34 = "quarantine_intent";
|
|
1170
1198
|
/**
|
|
1171
1199
|
* The deterministic causal justification for the structural quarantine.
|
|
1172
1200
|
*/
|
|
@@ -1174,7 +1202,7 @@ export type Reason = string;
|
|
|
1174
1202
|
/**
|
|
1175
1203
|
* The type of the intervention payload.
|
|
1176
1204
|
*/
|
|
1177
|
-
export type
|
|
1205
|
+
export type TopologyClass35 = "request";
|
|
1178
1206
|
/**
|
|
1179
1207
|
* The explicit whitelist of top-level JSON pointers mathematically open to mutation.
|
|
1180
1208
|
*
|
|
@@ -1188,7 +1216,7 @@ export type TimeoutSeconds = number;
|
|
|
1188
1216
|
/**
|
|
1189
1217
|
* The action to take when the timeout expires.
|
|
1190
1218
|
*/
|
|
1191
|
-
export type
|
|
1219
|
+
export type TimeoutAction3 = "fail_safe" | "proceed_with_defaults" | "escalate";
|
|
1192
1220
|
/**
|
|
1193
1221
|
* A summary of the context requiring intervention.
|
|
1194
1222
|
*/
|
|
@@ -1230,15 +1258,15 @@ export type LoopsExhausted = number;
|
|
|
1230
1258
|
/**
|
|
1231
1259
|
* Discriminator for an FYI intent.
|
|
1232
1260
|
*/
|
|
1233
|
-
export type
|
|
1261
|
+
export type TopologyClass36 = "fyi";
|
|
1234
1262
|
/**
|
|
1235
1263
|
* The type of the resilience payload.
|
|
1236
1264
|
*/
|
|
1237
|
-
export type
|
|
1265
|
+
export type TopologyClass37 = "fallback_intent";
|
|
1238
1266
|
/**
|
|
1239
1267
|
* The type of the intervention payload.
|
|
1240
1268
|
*/
|
|
1241
|
-
export type
|
|
1269
|
+
export type TopologyClass38 = "override";
|
|
1242
1270
|
/**
|
|
1243
1271
|
* Cryptographic audit justification for bypassing algorithmic consensus.
|
|
1244
1272
|
*/
|
|
@@ -1246,7 +1274,7 @@ export type Justification = string;
|
|
|
1246
1274
|
/**
|
|
1247
1275
|
* The strict discriminator for this intervention payload.
|
|
1248
1276
|
*/
|
|
1249
|
-
export type
|
|
1277
|
+
export type TopologyClass39 = "constitutional_amendment";
|
|
1250
1278
|
/**
|
|
1251
1279
|
* The globally unique decentralized identifier (DID) anchoring the NormativeDriftEvent that justified triggering this proposal.
|
|
1252
1280
|
*/
|
|
@@ -1258,7 +1286,7 @@ export type Justification1 = string;
|
|
|
1258
1286
|
/**
|
|
1259
1287
|
* Discriminator for a spatial kinematic action.
|
|
1260
1288
|
*/
|
|
1261
|
-
export type
|
|
1289
|
+
export type TopologyClass40 = "spatial_kinematic";
|
|
1262
1290
|
/**
|
|
1263
1291
|
* The specific kinematic interaction paradigm.
|
|
1264
1292
|
*/
|
|
@@ -1278,7 +1306,7 @@ export type ExpectedVisualConcept = string | null;
|
|
|
1278
1306
|
/**
|
|
1279
1307
|
* Discriminator type for System2RemediationIntent.
|
|
1280
1308
|
*/
|
|
1281
|
-
export type
|
|
1309
|
+
export type TopologyClass41 = "system_2_remediation";
|
|
1282
1310
|
/**
|
|
1283
1311
|
* A cryptographic Lineage Watermark (CID) tracking this specific dimensional collapse.
|
|
1284
1312
|
*/
|
|
@@ -1320,8 +1348,8 @@ export type SupportsLazyHydration = boolean;
|
|
|
1320
1348
|
/**
|
|
1321
1349
|
* Discriminator type for substrate hydration.
|
|
1322
1350
|
*/
|
|
1323
|
-
export type
|
|
1324
|
-
export type
|
|
1351
|
+
export type TopologyClass42 = "substrate_hydration";
|
|
1352
|
+
export type TopologyClass43 = "neurosymbolic_inference";
|
|
1325
1353
|
/**
|
|
1326
1354
|
* The continuous normalized float measuring the mathematical density of the contextual semantic envelope.
|
|
1327
1355
|
*/
|
|
@@ -1363,14 +1391,14 @@ export type RequiredGroundingDensity = "sparse" | "dense" | "exhaustive";
|
|
|
1363
1391
|
*/
|
|
1364
1392
|
export type MinimumFidelityThreshold = number;
|
|
1365
1393
|
export type ProvenanceTraceCid = string | null;
|
|
1366
|
-
export type
|
|
1394
|
+
export type TopologyClass44 = "topological_projection";
|
|
1367
1395
|
export type ProjectionCid = string;
|
|
1368
1396
|
export type SourceSuperpositionCid = string;
|
|
1369
1397
|
export type TargetTopologyProfile = "N_DIMENSIONAL_TENSOR" | "MARKOV_BLANKET" | "ACYCLIC_DIRECTED_GRAPH" | "ALGEBRAIC_RING";
|
|
1370
1398
|
export type IsomorphismConfidence = number;
|
|
1371
1399
|
export type LossyTranslationDivergence = string[];
|
|
1372
1400
|
export type EpistemicStatus1 = "pending_deterministic_collapse";
|
|
1373
|
-
export type
|
|
1401
|
+
export type TopologyClass45 = "formal_logic_premise";
|
|
1374
1402
|
/**
|
|
1375
1403
|
* The URN identifying the specific formal dialect or solver (e.g., 'urn:coreason:dialect:lean4', 'urn:coreason:dialect:clingo').
|
|
1376
1404
|
*/
|
|
@@ -1383,7 +1411,7 @@ export type FormalStatement = string;
|
|
|
1383
1411
|
* Optional auxiliary scripts required for verification, such as Lean 4 tactic proofs or Prolog ephemeral facts.
|
|
1384
1412
|
*/
|
|
1385
1413
|
export type VerificationScript = string | null;
|
|
1386
|
-
export type
|
|
1414
|
+
export type TopologyClass46 = "causal_propagation";
|
|
1387
1415
|
export type TargetGraphCid1 = string;
|
|
1388
1416
|
export type TaskCid3 = string;
|
|
1389
1417
|
export type MinimumNliEntailmentScore = number;
|
|
@@ -1466,7 +1494,7 @@ export type PublicationTimestamp = number | null;
|
|
|
1466
1494
|
*/
|
|
1467
1495
|
export type SupportingCitations = EvidentiaryCitationState[];
|
|
1468
1496
|
export type UnverifiedEdges = CausalDirectedEdgeState[];
|
|
1469
|
-
export type
|
|
1497
|
+
export type TopologyClass47 = "rdf_serialization";
|
|
1470
1498
|
export type ExportCid = string;
|
|
1471
1499
|
export type TargetGraphCid2 = string;
|
|
1472
1500
|
export type TargetFormat = "turtle" | "xml" | "json-ld" | "ntriples";
|
|
@@ -1475,8 +1503,8 @@ export type ShaclShapeGraphUri = string;
|
|
|
1475
1503
|
export type ViolationAction = "DROP_GRAPH" | "STRIP_TRIPLES" | "HALT_EXECUTION";
|
|
1476
1504
|
export type QueryString = string;
|
|
1477
1505
|
export type TargetEndpoint = string;
|
|
1478
|
-
export type
|
|
1479
|
-
export type
|
|
1506
|
+
export type TopologyClass48 = "sparql_query";
|
|
1507
|
+
export type TopologyClass49 = "bounded_json_rpc_intent";
|
|
1480
1508
|
/**
|
|
1481
1509
|
* JSON-RPC version.
|
|
1482
1510
|
*/
|
|
@@ -1495,7 +1523,7 @@ export type Params1 = {
|
|
|
1495
1523
|
* Unique request identifier.
|
|
1496
1524
|
*/
|
|
1497
1525
|
export type Id1 = string | number | null;
|
|
1498
|
-
export type
|
|
1526
|
+
export type TopologyClass50 = "chaos_experiment_task";
|
|
1499
1527
|
/**
|
|
1500
1528
|
* The unique identifier for the chaos experiment.
|
|
1501
1529
|
*/
|
|
@@ -1539,7 +1567,7 @@ export type Timestamp2 = number;
|
|
|
1539
1567
|
/**
|
|
1540
1568
|
* Discriminator type for an exogenous event.
|
|
1541
1569
|
*/
|
|
1542
|
-
export type
|
|
1570
|
+
export type TopologyClass51 = "exogenous_event";
|
|
1543
1571
|
/**
|
|
1544
1572
|
* Cryptographic identifier for the Black Swan event.
|
|
1545
1573
|
*/
|
|
@@ -1560,7 +1588,7 @@ export type LockedMagnitude = number;
|
|
|
1560
1588
|
* The declarative array of exogenous Black Swan events injected into the topology.
|
|
1561
1589
|
*/
|
|
1562
1590
|
export type Shocks = ExogenousEpistemicEvent[];
|
|
1563
|
-
export type
|
|
1591
|
+
export type TopologyClass52 = "epistemic_transmutation_task";
|
|
1564
1592
|
/**
|
|
1565
1593
|
* Unique identifier for this specific multimodal extraction intervention.
|
|
1566
1594
|
*/
|
|
@@ -1605,7 +1633,7 @@ export type TableStructureRecognition = boolean;
|
|
|
1605
1633
|
* Optional maximum economic expenditure authorized to run this VLM transmutation.
|
|
1606
1634
|
*/
|
|
1607
1635
|
export type ExecutionCostBudgetMagnitude1 = number | null;
|
|
1608
|
-
export type
|
|
1636
|
+
export type TopologyClass53 = "epistemic_upsampling_task";
|
|
1609
1637
|
/**
|
|
1610
1638
|
* The explicitly declared target node classification or structural grain.
|
|
1611
1639
|
*/
|
|
@@ -1621,7 +1649,7 @@ export type UpsamplingConfidenceThreshold = number;
|
|
|
1621
1649
|
* @maxItems 1000
|
|
1622
1650
|
*/
|
|
1623
1651
|
export type JustificationVectors = [string, ...string[]];
|
|
1624
|
-
export type
|
|
1652
|
+
export type TopologyClass54 = "interventional_causal_task";
|
|
1625
1653
|
/**
|
|
1626
1654
|
* Unique identifier for this causal intervention.
|
|
1627
1655
|
*/
|
|
@@ -1646,7 +1674,7 @@ export type ExpectedCausalInformationGain = number;
|
|
|
1646
1674
|
* The maximum economic expenditure authorized to run this specific causal intervention.
|
|
1647
1675
|
*/
|
|
1648
1676
|
export type ExecutionCostBudgetMagnitude2 = number;
|
|
1649
|
-
export type
|
|
1677
|
+
export type TopologyClass55 = "mcp_client_intent";
|
|
1650
1678
|
/**
|
|
1651
1679
|
* JSON-RPC version.
|
|
1652
1680
|
*/
|
|
@@ -1668,7 +1696,7 @@ export type Id2 = string | number | null;
|
|
|
1668
1696
|
/**
|
|
1669
1697
|
* Discriminator for the dynamic manifold projection.
|
|
1670
1698
|
*/
|
|
1671
|
-
export type
|
|
1699
|
+
export type TopologyClass56 = "dynamic_manifold";
|
|
1672
1700
|
/**
|
|
1673
1701
|
* Unique identifier for this projection.
|
|
1674
1702
|
*/
|
|
@@ -1684,7 +1712,7 @@ export type PanelCid = string;
|
|
|
1684
1712
|
/**
|
|
1685
1713
|
* Discriminator for Grammar of Graphics charts.
|
|
1686
1714
|
*/
|
|
1687
|
-
export type
|
|
1715
|
+
export type TopologyClass57 = "grammar";
|
|
1688
1716
|
/**
|
|
1689
1717
|
* The declarative semantic anchor summarizing the underlying visual grammar.
|
|
1690
1718
|
*/
|
|
@@ -1724,7 +1752,7 @@ export type Field = string;
|
|
|
1724
1752
|
/**
|
|
1725
1753
|
* The strictly typed mathematical mapping function distorting metrics into Euclidean pixel space.
|
|
1726
1754
|
*/
|
|
1727
|
-
export type
|
|
1755
|
+
export type TopologyClass58 = "linear" | "log" | "time" | "ordinal" | "nominal";
|
|
1728
1756
|
/**
|
|
1729
1757
|
* The optional minimum bound of the scale domain.
|
|
1730
1758
|
*/
|
|
@@ -1752,7 +1780,7 @@ export type PanelCid1 = string;
|
|
|
1752
1780
|
/**
|
|
1753
1781
|
* Discriminator for markdown insight cards.
|
|
1754
1782
|
*/
|
|
1755
|
-
export type
|
|
1783
|
+
export type TopologyClass59 = "insight_card";
|
|
1756
1784
|
/**
|
|
1757
1785
|
* The declarative semantic anchor summarizing the underlying matrix or markdown projection.
|
|
1758
1786
|
*/
|
|
@@ -1773,7 +1801,7 @@ export type MesoDistanceThreshold = number;
|
|
|
1773
1801
|
* The close-proximity boundary where full N-dimensional tensors and unstructured text blocks are mathematically hydrated into the observer's plane.
|
|
1774
1802
|
*/
|
|
1775
1803
|
export type MicroDistanceThreshold = number;
|
|
1776
|
-
export type
|
|
1804
|
+
export type TopologyClass60 = "rollback_intent";
|
|
1777
1805
|
/**
|
|
1778
1806
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for the causal rollback operation.
|
|
1779
1807
|
*/
|
|
@@ -1786,7 +1814,7 @@ export type TargetEventCid = string;
|
|
|
1786
1814
|
* The strict array of nodes whose operational histories are causally tainted and must be flushed.
|
|
1787
1815
|
*/
|
|
1788
1816
|
export type InvalidatedNodeCids = string[];
|
|
1789
|
-
export type
|
|
1817
|
+
export type TopologyClass61 = "state_mutation_intent";
|
|
1790
1818
|
/**
|
|
1791
1819
|
* The JSON pointer indicating the exact state vector to mutate deterministically.
|
|
1792
1820
|
*/
|
|
@@ -1802,13 +1830,21 @@ export type ZeroTrustReceiptCid = string | null;
|
|
|
1802
1830
|
/**
|
|
1803
1831
|
* Discriminator for the FederatedDiscoveryIntent topology.
|
|
1804
1832
|
*/
|
|
1805
|
-
export type
|
|
1833
|
+
export type TopologyClass62 = "federated_discovery";
|
|
1806
1834
|
/**
|
|
1807
1835
|
* The bounded set of URN namespaces to interrogate during sovereign oracle discovery.
|
|
1808
1836
|
*
|
|
1809
1837
|
* @maxItems 1000
|
|
1810
1838
|
*/
|
|
1811
1839
|
export type DomainFilter = string[];
|
|
1840
|
+
/**
|
|
1841
|
+
* A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
|
|
1842
|
+
*/
|
|
1843
|
+
export type BundleContentHashState = string;
|
|
1844
|
+
/**
|
|
1845
|
+
* The maximum number of P2P network hops allowed.
|
|
1846
|
+
*/
|
|
1847
|
+
export type MaxNetworkHops = number;
|
|
1812
1848
|
/**
|
|
1813
1849
|
* The minimum security clearance required from the discovered execution substrates.
|
|
1814
1850
|
*/
|
|
@@ -1816,7 +1852,7 @@ export type RequiredSecurityClearance = "PUBLIC" | "CONFIDENTIAL" | "RESTRICTED"
|
|
|
1816
1852
|
/**
|
|
1817
1853
|
* Discriminator for the OntologicalNormalizationIntent topology.
|
|
1818
1854
|
*/
|
|
1819
|
-
export type
|
|
1855
|
+
export type TopologyClass63 = "ontological_normalization";
|
|
1820
1856
|
/**
|
|
1821
1857
|
* The Content Identifier (CID) of the raw ingested data artifact.
|
|
1822
1858
|
*/
|
|
@@ -1878,7 +1914,7 @@ export type Description3 = string;
|
|
|
1878
1914
|
/**
|
|
1879
1915
|
* Discriminator for an Agent node.
|
|
1880
1916
|
*/
|
|
1881
|
-
export type
|
|
1917
|
+
export type TopologyClass64 = "agent";
|
|
1882
1918
|
/**
|
|
1883
1919
|
* The discrete architectural boundary of the node.
|
|
1884
1920
|
*/
|
|
@@ -1887,6 +1923,10 @@ export type ComputeTier = string;
|
|
|
1887
1923
|
* The absolute physical minimum Video RAM required to load this node's latent space.
|
|
1888
1924
|
*/
|
|
1889
1925
|
export type MinVramGb = number;
|
|
1926
|
+
/**
|
|
1927
|
+
* The networking mode defining the P2P boundary for enterprise compliance.
|
|
1928
|
+
*/
|
|
1929
|
+
export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
|
|
1890
1930
|
/**
|
|
1891
1931
|
* The rigid silicon precision format required to execute this node's neural circuits.
|
|
1892
1932
|
*/
|
|
@@ -1896,9 +1936,21 @@ export type AcceleratorType = string;
|
|
|
1896
1936
|
*/
|
|
1897
1937
|
export type ProviderWhitelist = string[];
|
|
1898
1938
|
/**
|
|
1899
|
-
* The level of hardware-enforced cryptographic isolation required
|
|
1939
|
+
* The level of hardware-enforced cryptographic isolation required.
|
|
1940
|
+
*/
|
|
1941
|
+
export type EpistemicSecurityPolicy = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
|
|
1942
|
+
/**
|
|
1943
|
+
* A list of mathematical scalars representing the exact data sensitivity levels this node is authorized to process. Allows discrete horizontal compartmentalization (e.g., [50, 100] but not 0).
|
|
1944
|
+
*/
|
|
1945
|
+
export type ClearanceTiers = number[];
|
|
1946
|
+
/**
|
|
1947
|
+
* The maximum allowed physical network egress boundary for the data.
|
|
1900
1948
|
*/
|
|
1901
|
-
export type
|
|
1949
|
+
export type NetworkBoundary = "INTERNET" | "VPC_INTERNAL" | "LOCAL_ENCLAVE";
|
|
1950
|
+
/**
|
|
1951
|
+
* If True, mathematically forces the Tier 1 orchestrator to execute an EpistemicFirewall mask over the payload before it can be passed to any LLM or external API.
|
|
1952
|
+
*/
|
|
1953
|
+
export type PiiQuarantineRequired = boolean;
|
|
1902
1954
|
/**
|
|
1903
1955
|
* The strict Boolean constraint mandating a fully isolated subnet or eBPF mesh.
|
|
1904
1956
|
*/
|
|
@@ -1964,6 +2016,30 @@ export type TradeoffPreference = "latency_optimized" | "cost_optimized" | "capab
|
|
|
1964
2016
|
* The maximum operational carbon intensity of the physical data center grid allowed for this agent's routing.
|
|
1965
2017
|
*/
|
|
1966
2018
|
export type MaxCarbonIntensityGco2EqKwh = number | null;
|
|
2019
|
+
/**
|
|
2020
|
+
* The mathematical scalar representing minimum hardware execution rigor (0=CPU, 255=Max GPU). Allows enterprises to inject custom gradient mappings.
|
|
2021
|
+
*/
|
|
2022
|
+
export type MinimumRigidityTier = number;
|
|
2023
|
+
/**
|
|
2024
|
+
* The maximum number of times the CPU orchestrator is authorized to bounce structurally invalid generation back to the Cloud Oracle.
|
|
2025
|
+
*/
|
|
2026
|
+
export type MaxRetriesOnSemanticTax = number;
|
|
2027
|
+
/**
|
|
2028
|
+
* A list of structured output protocols that the orchestrator is permitted to push to a remote Oracle. This explicitly allows the orchestrator to pick and choose how to offload constrained decoding (e.g., via STRICT_JSON_SCHEMA) rather than executing it purely on local bare-metal.
|
|
2029
|
+
*/
|
|
2030
|
+
export type PermittedRemoteDecodingProtocols = string[];
|
|
2031
|
+
/**
|
|
2032
|
+
* The minimum Lattice-Based Access Control (LBAC) network perimeter required for the hardware.
|
|
2033
|
+
*/
|
|
2034
|
+
export type EpistemicSecurityPolicy1 = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
|
|
2035
|
+
/**
|
|
2036
|
+
* Minimum VRAM required on the target substrate to load the tensor topology.
|
|
2037
|
+
*/
|
|
2038
|
+
export type MinimumVramGb = number | null;
|
|
2039
|
+
/**
|
|
2040
|
+
* Maximum acceptable round-trip network latency to the Substrate to guarantee SLA.
|
|
2041
|
+
*/
|
|
2042
|
+
export type MaximumLatencyMs = number | null;
|
|
1967
2043
|
/**
|
|
1968
2044
|
* Unique identifier for the requested LoRA adapter.
|
|
1969
2045
|
*/
|
|
@@ -2266,7 +2342,7 @@ export type DomainExtensions1 = {
|
|
|
2266
2342
|
/**
|
|
2267
2343
|
* Discriminator for a Human node.
|
|
2268
2344
|
*/
|
|
2269
|
-
export type
|
|
2345
|
+
export type TopologyClass65 = "human";
|
|
2270
2346
|
/**
|
|
2271
2347
|
* The mandatory cryptographic attestation URN required to verify the human operator's identity.
|
|
2272
2348
|
*/
|
|
@@ -2296,7 +2372,7 @@ export type DomainExtensions2 = {
|
|
|
2296
2372
|
/**
|
|
2297
2373
|
* Discriminator for a System node.
|
|
2298
2374
|
*/
|
|
2299
|
-
export type
|
|
2375
|
+
export type TopologyClass66 = "system";
|
|
2300
2376
|
/**
|
|
2301
2377
|
* The semantic boundary defining the objective function or computational perimeter of the execution node.
|
|
2302
2378
|
*/
|
|
@@ -2322,7 +2398,7 @@ export type DomainExtensions3 = {
|
|
|
2322
2398
|
/**
|
|
2323
2399
|
* Discriminator for a Composite node.
|
|
2324
2400
|
*/
|
|
2325
|
-
export type
|
|
2401
|
+
export type TopologyClass67 = "composite";
|
|
2326
2402
|
/**
|
|
2327
2403
|
* Entropy Penalty applied per edge traversal during a defeasible cascade.
|
|
2328
2404
|
*/
|
|
@@ -2542,7 +2618,7 @@ export type FoveatedPrivacyEpsilon = number | null;
|
|
|
2542
2618
|
/**
|
|
2543
2619
|
* Discriminator for a DAG topology.
|
|
2544
2620
|
*/
|
|
2545
|
-
export type
|
|
2621
|
+
export type TopologyClass68 = "dag";
|
|
2546
2622
|
/**
|
|
2547
2623
|
* The strict, topologically bounded matrix of directed causal edges.
|
|
2548
2624
|
*/
|
|
@@ -2626,7 +2702,7 @@ export type Justification7 = string | null;
|
|
|
2626
2702
|
/**
|
|
2627
2703
|
* Discriminator for a Council topology.
|
|
2628
2704
|
*/
|
|
2629
|
-
export type
|
|
2705
|
+
export type TopologyClass69 = "council";
|
|
2630
2706
|
/**
|
|
2631
2707
|
* The minimum number of adversarial or 'Devil's Advocate' roles required to prevent groupthink.
|
|
2632
2708
|
*/
|
|
@@ -2698,7 +2774,7 @@ export type Justification8 = string | null;
|
|
|
2698
2774
|
/**
|
|
2699
2775
|
* Discriminator for a Swarm topology.
|
|
2700
2776
|
*/
|
|
2701
|
-
export type
|
|
2777
|
+
export type TopologyClass70 = "swarm";
|
|
2702
2778
|
/**
|
|
2703
2779
|
* Threshold limit for dynamic spawning of additional nodes.
|
|
2704
2780
|
*/
|
|
@@ -2780,7 +2856,7 @@ export type Justification9 = string | null;
|
|
|
2780
2856
|
/**
|
|
2781
2857
|
* Discriminator for an Evolutionary topology.
|
|
2782
2858
|
*/
|
|
2783
|
-
export type
|
|
2859
|
+
export type TopologyClass71 = "evolutionary";
|
|
2784
2860
|
/**
|
|
2785
2861
|
* The absolute limit on evolutionary breeding cycles.
|
|
2786
2862
|
*/
|
|
@@ -2840,7 +2916,7 @@ export type Justification10 = string | null;
|
|
|
2840
2916
|
/**
|
|
2841
2917
|
* Discriminator for SMPC Topology.
|
|
2842
2918
|
*/
|
|
2843
|
-
export type
|
|
2919
|
+
export type TopologyClass72 = "smpc";
|
|
2844
2920
|
/**
|
|
2845
2921
|
* The exact cryptographic P2P protocol the nodes must use to evaluate the function.
|
|
2846
2922
|
*/
|
|
@@ -2870,7 +2946,7 @@ export type Justification11 = string | null;
|
|
|
2870
2946
|
/**
|
|
2871
2947
|
* Discriminator for an Evaluator-Optimizer loop.
|
|
2872
2948
|
*/
|
|
2873
|
-
export type
|
|
2949
|
+
export type TopologyClass73 = "evaluator_optimizer";
|
|
2874
2950
|
/**
|
|
2875
2951
|
* The absolute limit on Actor-Critic cycles to prevent infinite compute burn.
|
|
2876
2952
|
*/
|
|
@@ -2894,7 +2970,7 @@ export type Justification12 = string | null;
|
|
|
2894
2970
|
/**
|
|
2895
2971
|
* Discriminator for a Digital Twin topology.
|
|
2896
2972
|
*/
|
|
2897
|
-
export type
|
|
2973
|
+
export type TopologyClass74 = "digital_twin";
|
|
2898
2974
|
/**
|
|
2899
2975
|
* The identifier (expected to be a W3C DID) pointing to the real-world topology it is cloning.
|
|
2900
2976
|
*/
|
|
@@ -2914,7 +2990,7 @@ export type EnforceNoSideEffects = boolean;
|
|
|
2914
2990
|
/**
|
|
2915
2991
|
* Discriminator for federation macro.
|
|
2916
2992
|
*/
|
|
2917
|
-
export type
|
|
2993
|
+
export type TopologyClass75 = "macro_federation";
|
|
2918
2994
|
/**
|
|
2919
2995
|
* The nodes forming the PBFT ring.
|
|
2920
2996
|
*
|
|
@@ -2936,7 +3012,7 @@ export type Justification13 = string | null;
|
|
|
2936
3012
|
/**
|
|
2937
3013
|
* Discriminator for forge macro.
|
|
2938
3014
|
*/
|
|
2939
|
-
export type
|
|
3015
|
+
export type TopologyClass76 = "macro_forge";
|
|
2940
3016
|
/**
|
|
2941
3017
|
* The structural 128-char DID boundary pointing to the foundational semantic deficit vector.
|
|
2942
3018
|
*/
|
|
@@ -2964,7 +3040,7 @@ export type Justification14 = string | null;
|
|
|
2964
3040
|
/**
|
|
2965
3041
|
* Discriminator for the elicitation macro.
|
|
2966
3042
|
*/
|
|
2967
|
-
export type
|
|
3043
|
+
export type TopologyClass77 = "macro_elicitation";
|
|
2968
3044
|
/**
|
|
2969
3045
|
* The anchor to the initial, unstructured MultimodalArtifactReceipt uploaded by the human.
|
|
2970
3046
|
*/
|
|
@@ -2988,7 +3064,7 @@ export type Justification15 = string | null;
|
|
|
2988
3064
|
/**
|
|
2989
3065
|
* Discriminator for the ingestion macro.
|
|
2990
3066
|
*/
|
|
2991
|
-
export type
|
|
3067
|
+
export type TopologyClass78 = "macro_ingestion";
|
|
2992
3068
|
/**
|
|
2993
3069
|
* Target serialization format.
|
|
2994
3070
|
*/
|
|
@@ -3008,7 +3084,7 @@ export type Justification16 = string | null;
|
|
|
3008
3084
|
/**
|
|
3009
3085
|
* Discriminator for a macro neurosymbolic loop.
|
|
3010
3086
|
*/
|
|
3011
|
-
export type
|
|
3087
|
+
export type TopologyClass79 = "macro_neurosymbolic";
|
|
3012
3088
|
/**
|
|
3013
3089
|
* The connectionist agent generating hypotheses.
|
|
3014
3090
|
*/
|
|
@@ -3028,7 +3104,7 @@ export type CritiqueSchemaCid = string | null;
|
|
|
3028
3104
|
/**
|
|
3029
3105
|
* Discriminator for a discourse tree topology.
|
|
3030
3106
|
*/
|
|
3031
|
-
export type
|
|
3107
|
+
export type TopologyClass80 = "discourse_tree";
|
|
3032
3108
|
/**
|
|
3033
3109
|
* Cryptographic identifier for this topology.
|
|
3034
3110
|
*/
|
|
@@ -3041,7 +3117,7 @@ export type DiscourseType = "preamble" | "methodology" | "argumentation" | "find
|
|
|
3041
3117
|
* Explicit pointers linking this discourse block to the specific AtomicPropositionState nodes extracted from its text.
|
|
3042
3118
|
*/
|
|
3043
3119
|
export type ContainedPropositions = NodeCIDState[];
|
|
3044
|
-
export type
|
|
3120
|
+
export type TopologyClass81 = "document_knowledge_graph";
|
|
3045
3121
|
export type GraphCid = string;
|
|
3046
3122
|
export type SourceArtifactCid2 = string;
|
|
3047
3123
|
/**
|
|
@@ -3105,7 +3181,7 @@ export type CiphertextBlob = string;
|
|
|
3105
3181
|
/**
|
|
3106
3182
|
* Discriminator for manifold mapping.
|
|
3107
3183
|
*/
|
|
3108
|
-
export type
|
|
3184
|
+
export type TopologyClass82 = "manifold_mapping";
|
|
3109
3185
|
/**
|
|
3110
3186
|
* Calculated geometric alignment between the semantic embedding and spatial tensor.
|
|
3111
3187
|
*/
|
|
@@ -3123,7 +3199,7 @@ export type Nodes12 = SemanticNodeState[];
|
|
|
3123
3199
|
*/
|
|
3124
3200
|
export type CausalEdges = CausalDirectedEdgeState[];
|
|
3125
3201
|
export type IsomorphismHash = string;
|
|
3126
|
-
export type
|
|
3202
|
+
export type TopologyClass83 = "hierarchical_dom";
|
|
3127
3203
|
export type DomCid = string;
|
|
3128
3204
|
export type RootBlockCid = string;
|
|
3129
3205
|
/**
|
|
@@ -3215,7 +3291,7 @@ export type DomainExtensions4 = {
|
|
|
3215
3291
|
/**
|
|
3216
3292
|
* Discriminator for a Memoized node.
|
|
3217
3293
|
*/
|
|
3218
|
-
export type
|
|
3294
|
+
export type TopologyClass84 = "memoized";
|
|
3219
3295
|
/**
|
|
3220
3296
|
* A discriminated union of presentation UI panels.
|
|
3221
3297
|
*/
|
|
@@ -3228,7 +3304,7 @@ export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | Cros
|
|
|
3228
3304
|
/**
|
|
3229
3305
|
* Discriminator for temporal graph crdt.
|
|
3230
3306
|
*/
|
|
3231
|
-
export type
|
|
3307
|
+
export type TopologyClass85 = "temporal_graph_crdt";
|
|
3232
3308
|
/**
|
|
3233
3309
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark.
|
|
3234
3310
|
*/
|
|
@@ -3249,7 +3325,7 @@ export type AddSet = NodeCIDState[];
|
|
|
3249
3325
|
* The set of non-monotonic timeline caps.
|
|
3250
3326
|
*/
|
|
3251
3327
|
export type TerminateSet = TemporalEdgeInvalidationIntent[];
|
|
3252
|
-
export type
|
|
3328
|
+
export type TopologyClass86 = "mcp_tool_definition";
|
|
3253
3329
|
/**
|
|
3254
3330
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3255
3331
|
*/
|
|
@@ -3264,7 +3340,7 @@ export type Description9 = string;
|
|
|
3264
3340
|
export type EventCid4 = string;
|
|
3265
3341
|
export type PriorEventHash4 = string | null;
|
|
3266
3342
|
export type Timestamp4 = number;
|
|
3267
|
-
export type
|
|
3343
|
+
export type TopologyClass87 = "crosswalk_resolution";
|
|
3268
3344
|
export type ReceiptCid1 = string;
|
|
3269
3345
|
export type TargetGraphCid3 = string;
|
|
3270
3346
|
/**
|
|
@@ -3282,7 +3358,7 @@ export type Timestamp5 = number;
|
|
|
3282
3358
|
/**
|
|
3283
3359
|
* Discriminator for a zero-trust receipt.
|
|
3284
3360
|
*/
|
|
3285
|
-
export type
|
|
3361
|
+
export type TopologyClass88 = "zero_trust_receipt";
|
|
3286
3362
|
/**
|
|
3287
3363
|
* Pointer to the originating EpistemicZeroTrustContract.
|
|
3288
3364
|
*/
|
|
@@ -3318,7 +3394,7 @@ export type Timestamp6 = number;
|
|
|
3318
3394
|
/**
|
|
3319
3395
|
* Discriminator type for an observation event.
|
|
3320
3396
|
*/
|
|
3321
|
-
export type
|
|
3397
|
+
export type TopologyClass89 = "observation";
|
|
3322
3398
|
/**
|
|
3323
3399
|
* The URN representing the physical silicon architecture generating the root-of-trust quote (e.g., 'urn:coreason:enclave:intel_tdx').
|
|
3324
3400
|
*/
|
|
@@ -3338,7 +3414,7 @@ export type AnyToolchainState = BrowserDOMState | TerminalBufferState;
|
|
|
3338
3414
|
/**
|
|
3339
3415
|
* Discriminator for Causal Actuators representing structural shifts.
|
|
3340
3416
|
*/
|
|
3341
|
-
export type
|
|
3417
|
+
export type TopologyClass90 = "browser";
|
|
3342
3418
|
/**
|
|
3343
3419
|
* Spatial Execution Bounds where the agent interacts.
|
|
3344
3420
|
*/
|
|
@@ -3365,7 +3441,7 @@ export type ScreenshotCid = string | null;
|
|
|
3365
3441
|
/**
|
|
3366
3442
|
* Discriminator for Causal Actuators on structural buffers.
|
|
3367
3443
|
*/
|
|
3368
|
-
export type
|
|
3444
|
+
export type TopologyClass91 = "terminal";
|
|
3369
3445
|
/**
|
|
3370
3446
|
* Capability Perimeters defining context bounds.
|
|
3371
3447
|
*/
|
|
@@ -3463,7 +3539,7 @@ export type Timestamp7 = number;
|
|
|
3463
3539
|
/**
|
|
3464
3540
|
* Discriminator type for a Belief Assertion event.
|
|
3465
3541
|
*/
|
|
3466
|
-
export type
|
|
3542
|
+
export type TopologyClass92 = "belief_mutation";
|
|
3467
3543
|
/**
|
|
3468
3544
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the source event in the Merkle-DAG.
|
|
3469
3545
|
*/
|
|
@@ -3515,8 +3591,8 @@ export type Timestamp8 = number;
|
|
|
3515
3591
|
/**
|
|
3516
3592
|
* Discriminator type for a system fault event.
|
|
3517
3593
|
*/
|
|
3518
|
-
export type
|
|
3519
|
-
export type
|
|
3594
|
+
export type TopologyClass93 = "system_fault";
|
|
3595
|
+
export type TopologyClass94 = "atomic_proposition";
|
|
3520
3596
|
/**
|
|
3521
3597
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3522
3598
|
*/
|
|
@@ -3573,7 +3649,7 @@ export type UpperBound = number | null;
|
|
|
3573
3649
|
* Explicit mathematical boundaries extracted from the text that empirically limit the certainty or scope of the proposition.
|
|
3574
3650
|
*/
|
|
3575
3651
|
export type StatisticalQualifiers = EmpiricalStatisticalProfile[];
|
|
3576
|
-
export type
|
|
3652
|
+
export type TopologyClass95 = "post_coordinated_concept";
|
|
3577
3653
|
/**
|
|
3578
3654
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3579
3655
|
*/
|
|
@@ -3601,7 +3677,7 @@ export type IsometryScore = number;
|
|
|
3601
3677
|
export type EventCid11 = string;
|
|
3602
3678
|
export type PriorEventHash11 = string | null;
|
|
3603
3679
|
export type Timestamp11 = number;
|
|
3604
|
-
export type
|
|
3680
|
+
export type TopologyClass96 = "artifact_corruption";
|
|
3605
3681
|
/**
|
|
3606
3682
|
* The genesis artifact that caused the ingestion engine to crash.
|
|
3607
3683
|
*/
|
|
@@ -3623,7 +3699,7 @@ export type Timestamp12 = number;
|
|
|
3623
3699
|
/**
|
|
3624
3700
|
* Discriminator for a hypothesis generation event.
|
|
3625
3701
|
*/
|
|
3626
|
-
export type
|
|
3702
|
+
export type TopologyClass97 = "hypothesis";
|
|
3627
3703
|
/**
|
|
3628
3704
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this abductive leap to the Merkle-DAG.
|
|
3629
3705
|
*/
|
|
@@ -3677,7 +3753,7 @@ export type Timestamp13 = number;
|
|
|
3677
3753
|
/**
|
|
3678
3754
|
* Discriminator type for a barge-in interruption event.
|
|
3679
3755
|
*/
|
|
3680
|
-
export type
|
|
3756
|
+
export type TopologyClass98 = "barge_in";
|
|
3681
3757
|
/**
|
|
3682
3758
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the active node generation cycle that was killed in the Merkle-DAG.
|
|
3683
3759
|
*/
|
|
@@ -3707,7 +3783,7 @@ export type Timestamp14 = number;
|
|
|
3707
3783
|
/**
|
|
3708
3784
|
* Discriminator type for a counterfactual regret event.
|
|
3709
3785
|
*/
|
|
3710
|
-
export type
|
|
3786
|
+
export type TopologyClass99 = "counterfactual_regret";
|
|
3711
3787
|
/**
|
|
3712
3788
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the specific historical state node where the agent mathematically diverged to simulate an alternative path.
|
|
3713
3789
|
*/
|
|
@@ -3743,7 +3819,7 @@ export type Timestamp15 = number;
|
|
|
3743
3819
|
/**
|
|
3744
3820
|
* Discriminator type for a tool invocation event.
|
|
3745
3821
|
*/
|
|
3746
|
-
export type
|
|
3822
|
+
export type TopologyClass100 = "tool_invocation";
|
|
3747
3823
|
/**
|
|
3748
3824
|
* The exact tool targeted in the CognitiveActionSpaceManifest.
|
|
3749
3825
|
*/
|
|
@@ -3767,7 +3843,7 @@ export type Timestamp16 = number;
|
|
|
3767
3843
|
/**
|
|
3768
3844
|
* Discriminator type for an epistemic promotion event.
|
|
3769
3845
|
*/
|
|
3770
|
-
export type
|
|
3846
|
+
export type TopologyClass101 = "epistemic_promotion";
|
|
3771
3847
|
/**
|
|
3772
3848
|
* The strict array of CIDs (Content Identifiers) representing the raw logs being compressed and archived.
|
|
3773
3849
|
*/
|
|
@@ -3795,11 +3871,11 @@ export type Timestamp17 = number;
|
|
|
3795
3871
|
/**
|
|
3796
3872
|
* Discriminator type for a normative drift event.
|
|
3797
3873
|
*/
|
|
3798
|
-
export type
|
|
3874
|
+
export type TopologyClass102 = "normative_drift";
|
|
3799
3875
|
/**
|
|
3800
3876
|
* The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
|
|
3801
3877
|
*/
|
|
3802
|
-
export type
|
|
3878
|
+
export type TrippedRuleCid = string;
|
|
3803
3879
|
/**
|
|
3804
3880
|
* The calculated probabilistic delta showing how far the swarm's observed reality is diverging from the static rule.
|
|
3805
3881
|
*/
|
|
@@ -3823,7 +3899,7 @@ export type Timestamp18 = number;
|
|
|
3823
3899
|
/**
|
|
3824
3900
|
* Discriminator type for a persistence commit receipt.
|
|
3825
3901
|
*/
|
|
3826
|
-
export type
|
|
3902
|
+
export type TopologyClass103 = "persistence_commit";
|
|
3827
3903
|
/**
|
|
3828
3904
|
* The external cryptographic receipt generated by Iceberg/Delta.
|
|
3829
3905
|
*/
|
|
@@ -3851,7 +3927,7 @@ export type Timestamp19 = number;
|
|
|
3851
3927
|
/**
|
|
3852
3928
|
* Discriminator type for a token burn receipt.
|
|
3853
3929
|
*/
|
|
3854
|
-
export type
|
|
3930
|
+
export type TopologyClass104 = "token_burn";
|
|
3855
3931
|
/**
|
|
3856
3932
|
* A string linking this burn back to the specific ToolInvocationEvent CID.
|
|
3857
3933
|
*/
|
|
@@ -3883,7 +3959,7 @@ export type Timestamp20 = number;
|
|
|
3883
3959
|
/**
|
|
3884
3960
|
* Discriminator type for a budget exhaustion event.
|
|
3885
3961
|
*/
|
|
3886
|
-
export type
|
|
3962
|
+
export type TopologyClass105 = "budget_exhaustion";
|
|
3887
3963
|
/**
|
|
3888
3964
|
* A string representing the original escrow boundary breached.
|
|
3889
3965
|
*/
|
|
@@ -3907,7 +3983,7 @@ export type Timestamp21 = number;
|
|
|
3907
3983
|
/**
|
|
3908
3984
|
* Discriminator type for telemetry events.
|
|
3909
3985
|
*/
|
|
3910
|
-
export type
|
|
3986
|
+
export type TopologyClass106 = "epistemic_telemetry";
|
|
3911
3987
|
/**
|
|
3912
3988
|
* The exact topological action the human operator performed on the projected manifold.
|
|
3913
3989
|
*/
|
|
@@ -3932,7 +4008,7 @@ export type PriorEventHash22 = string | null;
|
|
|
3932
4008
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3933
4009
|
*/
|
|
3934
4010
|
export type Timestamp22 = number;
|
|
3935
|
-
export type
|
|
4011
|
+
export type TopologyClass107 = "cognitive_prediction";
|
|
3936
4012
|
export type SourceChainCid = string;
|
|
3937
4013
|
export type TargetSourceConcept = string;
|
|
3938
4014
|
/**
|
|
@@ -3951,7 +4027,7 @@ export type PriorEventHash23 = string | null;
|
|
|
3951
4027
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3952
4028
|
*/
|
|
3953
4029
|
export type Timestamp23 = number;
|
|
3954
|
-
export type
|
|
4030
|
+
export type TopologyClass108 = "epistemic_axiom_verification";
|
|
3955
4031
|
export type SourcePredictionCid = string;
|
|
3956
4032
|
export type SequenceSimilarityScore = number;
|
|
3957
4033
|
export type FactScorePassed = boolean;
|
|
@@ -3971,7 +4047,7 @@ export type PriorEventHash24 = string | null;
|
|
|
3971
4047
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3972
4048
|
*/
|
|
3973
4049
|
export type Timestamp24 = number;
|
|
3974
|
-
export type
|
|
4050
|
+
export type TopologyClass109 = "cognitive_reward_evaluation";
|
|
3975
4051
|
/**
|
|
3976
4052
|
* The globally unique decentralized identifier (DID) anchoring the LLM's raw generated text trajectory.
|
|
3977
4053
|
*/
|
|
@@ -4012,7 +4088,7 @@ export type PriorEventHash25 = string | null;
|
|
|
4012
4088
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4013
4089
|
*/
|
|
4014
4090
|
export type Timestamp25 = number;
|
|
4015
|
-
export type
|
|
4091
|
+
export type TopologyClass110 = "epistemic_flow_state";
|
|
4016
4092
|
/**
|
|
4017
4093
|
* The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
|
|
4018
4094
|
*/
|
|
@@ -4040,7 +4116,7 @@ export type Timestamp26 = number;
|
|
|
4040
4116
|
/**
|
|
4041
4117
|
* Discriminator type for a causal explanation event.
|
|
4042
4118
|
*/
|
|
4043
|
-
export type
|
|
4119
|
+
export type TopologyClass111 = "causal_explanation";
|
|
4044
4120
|
/**
|
|
4045
4121
|
* The globally unique decentralized identifier (DID) anchoring the collective outcome being explained.
|
|
4046
4122
|
*/
|
|
@@ -4092,7 +4168,7 @@ export type Timestamp27 = number;
|
|
|
4092
4168
|
/**
|
|
4093
4169
|
* Discriminator type for an intent classification receipt.
|
|
4094
4170
|
*/
|
|
4095
|
-
export type
|
|
4171
|
+
export type TopologyClass112 = "intent_classification";
|
|
4096
4172
|
/**
|
|
4097
4173
|
* The raw, unparsed human natural language instruction.
|
|
4098
4174
|
*/
|
|
@@ -4109,7 +4185,7 @@ export type ConfidenceScore1 = number;
|
|
|
4109
4185
|
* The TaxonomicRoutingPolicy CID that governed this classification.
|
|
4110
4186
|
*/
|
|
4111
4187
|
export type RoutingPolicyCid = string | null;
|
|
4112
|
-
export type
|
|
4188
|
+
export type TopologyClass113 = "semantic_relational_record";
|
|
4113
4189
|
/**
|
|
4114
4190
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4115
4191
|
*/
|
|
@@ -4133,7 +4209,7 @@ export type FormalSchemaUrn1 = string | null;
|
|
|
4133
4209
|
/**
|
|
4134
4210
|
* Discriminator for the reification receipt.
|
|
4135
4211
|
*/
|
|
4136
|
-
export type
|
|
4212
|
+
export type TopologyClass114 = "ontological_reification";
|
|
4137
4213
|
/**
|
|
4138
4214
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4139
4215
|
*/
|
|
@@ -4177,7 +4253,7 @@ export type Timestamp30 = number;
|
|
|
4177
4253
|
/**
|
|
4178
4254
|
* The type of the resilience payload.
|
|
4179
4255
|
*/
|
|
4180
|
-
export type
|
|
4256
|
+
export type TopologyClass115 = "circuit_breaker_event";
|
|
4181
4257
|
/**
|
|
4182
4258
|
* Signature or summary of the error causing the trip.
|
|
4183
4259
|
*/
|
|
@@ -4193,7 +4269,7 @@ export type PriorEventHash31 = string | null;
|
|
|
4193
4269
|
/**
|
|
4194
4270
|
* Discriminator type for a log event.
|
|
4195
4271
|
*/
|
|
4196
|
-
export type
|
|
4272
|
+
export type TopologyClass116 = "epistemic_log";
|
|
4197
4273
|
/**
|
|
4198
4274
|
* The UNIX timestamp of the log event.
|
|
4199
4275
|
*/
|
|
@@ -4210,7 +4286,7 @@ export type TelemetryScalarState = string | number | boolean | null;
|
|
|
4210
4286
|
/**
|
|
4211
4287
|
* The type of the intervention payload.
|
|
4212
4288
|
*/
|
|
4213
|
-
export type
|
|
4289
|
+
export type TopologyClass117 = "verdict";
|
|
4214
4290
|
/**
|
|
4215
4291
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4216
4292
|
*/
|
|
@@ -4267,7 +4343,7 @@ export type PriorEventHash33 = string | null;
|
|
|
4267
4343
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4268
4344
|
*/
|
|
4269
4345
|
export type Timestamp33 = number;
|
|
4270
|
-
export type
|
|
4346
|
+
export type TopologyClass118 = "custody_receipt";
|
|
4271
4347
|
/**
|
|
4272
4348
|
* Unique identifier for this chain-of-custody entry.
|
|
4273
4349
|
*/
|
|
@@ -4304,7 +4380,7 @@ export type PriorEventHash34 = string | null;
|
|
|
4304
4380
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4305
4381
|
*/
|
|
4306
4382
|
export type Timestamp34 = number;
|
|
4307
|
-
export type
|
|
4383
|
+
export type TopologyClass119 = "defeasible_attack";
|
|
4308
4384
|
/**
|
|
4309
4385
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
|
|
4310
4386
|
*/
|
|
@@ -4329,7 +4405,7 @@ export type PriorEventHash35 = string | null;
|
|
|
4329
4405
|
* The precise temporal coordinate of the event realization.
|
|
4330
4406
|
*/
|
|
4331
4407
|
export type Timestamp35 = number;
|
|
4332
|
-
export type
|
|
4408
|
+
export type TopologyClass120 = "formal_verification_receipt";
|
|
4333
4409
|
/**
|
|
4334
4410
|
* The definitive Boolean evaluating whether the proof succeeded, the program is satisfiable, or the deduction holds true.
|
|
4335
4411
|
*/
|
|
@@ -4348,7 +4424,7 @@ export type FailingContext = string | null;
|
|
|
4348
4424
|
export type ExtractedBindings = {
|
|
4349
4425
|
[k: string]: JsonPrimitiveState;
|
|
4350
4426
|
}[];
|
|
4351
|
-
export type
|
|
4427
|
+
export type TopologyClass121 = "belief_modulation";
|
|
4352
4428
|
export type ReceiptCid2 = string;
|
|
4353
4429
|
/**
|
|
4354
4430
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
@@ -4364,7 +4440,7 @@ export type PriorEventHash36 = string | null;
|
|
|
4364
4440
|
export type Timestamp36 = number;
|
|
4365
4441
|
export type TargetGraphCid4 = string;
|
|
4366
4442
|
export type SeveredEdgeCids = string[];
|
|
4367
|
-
export type
|
|
4443
|
+
export type TopologyClass122 = "rdf_export_receipt";
|
|
4368
4444
|
export type ExportCid1 = string;
|
|
4369
4445
|
/**
|
|
4370
4446
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
@@ -4384,7 +4460,7 @@ export type Sha256GraphHash = string;
|
|
|
4384
4460
|
export type EventCid38 = string;
|
|
4385
4461
|
export type PriorEventHash38 = string | null;
|
|
4386
4462
|
export type Timestamp38 = number;
|
|
4387
|
-
export type
|
|
4463
|
+
export type TopologyClass123 = "epistemic_starvation";
|
|
4388
4464
|
/**
|
|
4389
4465
|
* The cryptographic pointer to the specific edge that failed empirical grounding.
|
|
4390
4466
|
*/
|
|
@@ -4400,7 +4476,7 @@ export type DiagnosticReason = string;
|
|
|
4400
4476
|
export type EventCid39 = string;
|
|
4401
4477
|
export type PriorEventHash39 = string | null;
|
|
4402
4478
|
export type Timestamp39 = number;
|
|
4403
|
-
export type
|
|
4479
|
+
export type TopologyClass124 = "sparql_query_result";
|
|
4404
4480
|
/**
|
|
4405
4481
|
* A pointer back to the SPARQLQueryIntent that authorized this execution.
|
|
4406
4482
|
*/
|
|
@@ -4412,27 +4488,23 @@ export type ExecutionTimeMs = number;
|
|
|
4412
4488
|
/**
|
|
4413
4489
|
* Discriminator for the OracleExecutionReceipt topology.
|
|
4414
4490
|
*/
|
|
4415
|
-
export type
|
|
4491
|
+
export type TopologyClass125 = "oracle_execution_receipt";
|
|
4416
4492
|
/**
|
|
4417
|
-
*
|
|
4493
|
+
* The SHA-256 hash of the complete execution payload, providing undeniable cryptographic provenance for the Merkle-DAG audit trail.
|
|
4418
4494
|
*/
|
|
4419
|
-
export type
|
|
4495
|
+
export type ExecutionHash = string;
|
|
4420
4496
|
/**
|
|
4421
|
-
* The
|
|
4497
|
+
* The fully qualified URN of the solver agent that performed the execution.
|
|
4422
4498
|
*/
|
|
4423
|
-
export type
|
|
4499
|
+
export type SolverUrn = string;
|
|
4424
4500
|
/**
|
|
4425
|
-
*
|
|
4501
|
+
* The total number of tokens consumed during this execution, settled by the Thermodynamic Quota Manager.
|
|
4426
4502
|
*/
|
|
4427
|
-
export type
|
|
4503
|
+
export type TokensBurned = number;
|
|
4428
4504
|
/**
|
|
4429
|
-
*
|
|
4505
|
+
* An optional cryptographic signature from a Human-in-the-Loop (HITL) operator attesting to the correctness of the execution result. Populated only when the Temporal workflow escalates to manual review.
|
|
4430
4506
|
*/
|
|
4431
|
-
export type
|
|
4432
|
-
/**
|
|
4433
|
-
* An immutable local deployment pointer identifying the specific VPC action space.
|
|
4434
|
-
*/
|
|
4435
|
-
export type ActionSpaceCid1 = string;
|
|
4507
|
+
export type HumanAttestationSignature = string | null;
|
|
4436
4508
|
/**
|
|
4437
4509
|
* A discriminated union of workflow topologies.
|
|
4438
4510
|
*/
|
|
@@ -4441,7 +4513,7 @@ export type AnyTransitionEdge = TransitionEdgeProfile | CyclicEdgeProfile;
|
|
|
4441
4513
|
/**
|
|
4442
4514
|
* Discriminator type for an acyclic edge.
|
|
4443
4515
|
*/
|
|
4444
|
-
export type
|
|
4516
|
+
export type TopologyClass126 = "acyclic";
|
|
4445
4517
|
/**
|
|
4446
4518
|
* The coinductive pointer to the destination capability.
|
|
4447
4519
|
*/
|
|
@@ -4473,7 +4545,7 @@ export type ComputeWeightMagnitude = number;
|
|
|
4473
4545
|
/**
|
|
4474
4546
|
* Discriminator type for a cyclic edge.
|
|
4475
4547
|
*/
|
|
4476
|
-
export type
|
|
4548
|
+
export type TopologyClass127 = "cyclic";
|
|
4477
4549
|
/**
|
|
4478
4550
|
* The coinductive pointer to the destination capability.
|
|
4479
4551
|
*/
|
|
@@ -4547,7 +4619,7 @@ export type CapabilityPointerState = string;
|
|
|
4547
4619
|
/**
|
|
4548
4620
|
* The unique identifier for this curated environment of tools.
|
|
4549
4621
|
*/
|
|
4550
|
-
export type
|
|
4622
|
+
export type ActionSpaceCid1 = string;
|
|
4551
4623
|
/**
|
|
4552
4624
|
* Defines the initial state (S_0) of the MDP.
|
|
4553
4625
|
*/
|
|
@@ -4564,6 +4636,14 @@ export type MutuallyExclusiveClusters = string[][];
|
|
|
4564
4636
|
* The deterministic action the orchestrator must take if a bipartite cycle is detected.
|
|
4565
4637
|
*/
|
|
4566
4638
|
export type EnforcementAction = "halt_and_quarantine" | "sever_causal_chain";
|
|
4639
|
+
/**
|
|
4640
|
+
* A deterministic array of DIDs authorized to validate this manifest.
|
|
4641
|
+
*/
|
|
4642
|
+
export type TrustedValidators = NodeCIDState[];
|
|
4643
|
+
/**
|
|
4644
|
+
* The logarithmic market scoring rule threshold for thermodynamic execution.
|
|
4645
|
+
*/
|
|
4646
|
+
export type ExecutionFeeLmsr = number;
|
|
4567
4647
|
/**
|
|
4568
4648
|
* Strict Boolean indicating if BOTH agents mathematically agree on factual alignment.
|
|
4569
4649
|
*/
|
|
@@ -4801,6 +4881,10 @@ export type ExpirationTimestamp = number;
|
|
|
4801
4881
|
* A base64 string proving the cryptographic delegation.
|
|
4802
4882
|
*/
|
|
4803
4883
|
export type CryptographicSignature = string;
|
|
4884
|
+
/**
|
|
4885
|
+
* The unconstrained Chain-of-Thought reasoning trace generated by the Frontier model with the Sovereign LLM Proxy's XGrammar AOT FSM bitmask DISABLED. This field captures the full computational runway — scratchpad blocks, intermediate calculations, and heuristic explorations — that the model requires to maximize logical accuracy without suffering the Format Restriction Penalty.
|
|
4886
|
+
*/
|
|
4887
|
+
export type DeliberationTrace = string;
|
|
4804
4888
|
export type ConstraintCid = string;
|
|
4805
4889
|
/**
|
|
4806
4890
|
* The formal SMT-LIB or Lean4 language representation of the symbolic rule.
|
|
@@ -5115,7 +5199,7 @@ export type PrmEvaluations = ProcessRewardContract[];
|
|
|
5115
5199
|
*
|
|
5116
5200
|
* MCP ROUTING TRIGGERS: TEE Enforcement, Hardware Isolation, Secure Enclave, Zero-Trust Execution
|
|
5117
5201
|
*/
|
|
5118
|
-
export type
|
|
5202
|
+
export type EpistemicSecurityPolicy2 = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
|
|
5119
5203
|
export type SimilarityThresholdAlpha = number;
|
|
5120
5204
|
export type RelationDiversityBucketSize = number;
|
|
5121
5205
|
/**
|
|
@@ -5123,7 +5207,7 @@ export type RelationDiversityBucketSize = number;
|
|
|
5123
5207
|
*/
|
|
5124
5208
|
export type TraceCid2 = string;
|
|
5125
5209
|
/**
|
|
5126
|
-
* Unique identifier for the specific execution of this
|
|
5210
|
+
* Unique identifier for the specific execution of this actionSpaceCId. Must be a ULID or UUIDv7.
|
|
5127
5211
|
*/
|
|
5128
5212
|
export type SpanCid = string;
|
|
5129
5213
|
/**
|
|
@@ -5203,6 +5287,14 @@ export type TimestampUnixNano = number;
|
|
|
5203
5287
|
*/
|
|
5204
5288
|
export type Events = SpanEvent[];
|
|
5205
5289
|
export type FaultCategoryProfile = "context_overload" | "incorrect_context" | "format_corruption" | "latency_spike" | "token_throttle" | "network_degradation" | "temporal_dilation" | "dependency_blackout";
|
|
5290
|
+
/**
|
|
5291
|
+
* Discriminator for fetching assets via CID.
|
|
5292
|
+
*/
|
|
5293
|
+
export type TopologyClass128 = "cid_fetch";
|
|
5294
|
+
/**
|
|
5295
|
+
* Network timeout in milliseconds.
|
|
5296
|
+
*/
|
|
5297
|
+
export type TimeoutMs1 = number;
|
|
5206
5298
|
/**
|
|
5207
5299
|
* The explicit array of strictly bounded MCP URI broadcast endpoints.
|
|
5208
5300
|
*
|
|
@@ -5729,6 +5821,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5729
5821
|
BoundedJSONRPCIntent?: BoundedJSONRPCIntent;
|
|
5730
5822
|
BrowserDOMState?: BrowserDOMState;
|
|
5731
5823
|
BudgetExhaustionEvent?: BudgetExhaustionEvent;
|
|
5824
|
+
BundleContentHashState?: BundleContentHashState;
|
|
5732
5825
|
BypassReceipt?: BypassReceipt;
|
|
5733
5826
|
CapabilityForgeTopologyManifest?: CapabilityForgeTopologyManifest;
|
|
5734
5827
|
CapabilityPointerState?: CapabilityPointerState;
|
|
@@ -5788,6 +5881,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5788
5881
|
DefeasibleAttackEvent?: DefeasibleAttackEvent;
|
|
5789
5882
|
DefeasibleCascadeEvent?: DefeasibleCascadeEvent;
|
|
5790
5883
|
DelegatedCapabilityManifest?: DelegatedCapabilityManifest;
|
|
5884
|
+
DeliberativeEnvelope?: DeliberativeEnvelope;
|
|
5791
5885
|
DempsterShaferBeliefVector?: DempsterShaferBeliefVector;
|
|
5792
5886
|
DerivationModeProfile?: DerivationModeProfile;
|
|
5793
5887
|
DifferentiableLogicPolicy?: DifferentiableLogicPolicy;
|
|
@@ -5836,9 +5930,10 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5836
5930
|
EpistemicQuarantineSnapshot?: EpistemicQuarantineSnapshot;
|
|
5837
5931
|
EpistemicRejectionReceipt?: EpistemicRejectionReceipt;
|
|
5838
5932
|
EpistemicRewardGradientPolicy?: EpistemicRewardGradientPolicy;
|
|
5933
|
+
EpistemicRigidityPolicy?: EpistemicRigidityPolicy;
|
|
5839
5934
|
EpistemicSOPManifest?: EpistemicSOPManifest;
|
|
5840
5935
|
EpistemicScanningPolicy?: EpistemicScanningPolicy;
|
|
5841
|
-
EpistemicSecurityPolicy?:
|
|
5936
|
+
EpistemicSecurityPolicy?: EpistemicSecurityPolicy2;
|
|
5842
5937
|
EpistemicSecurityProfile?: EpistemicSecurityProfile1;
|
|
5843
5938
|
EpistemicSeedInjectionPolicy?: EpistemicSeedInjectionPolicy;
|
|
5844
5939
|
EpistemicStarvationEvent?: EpistemicStarvationEvent;
|
|
@@ -5871,6 +5966,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5871
5966
|
FaultCategoryProfile?: FaultCategoryProfile;
|
|
5872
5967
|
FaultInjectionProfile?: FaultInjectionProfile;
|
|
5873
5968
|
FederatedBilateralSLA?: FederatedBilateralSLA2;
|
|
5969
|
+
FederatedCIDFetchIntent?: FederatedCIDFetchIntent;
|
|
5874
5970
|
FederatedCapabilityAttestationReceipt?: FederatedCapabilityAttestationReceipt;
|
|
5875
5971
|
FederatedDiscoveryIntent?: FederatedDiscoveryIntent;
|
|
5876
5972
|
FederatedDiscoveryManifest?: FederatedDiscoveryManifest;
|
|
@@ -6038,6 +6134,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
6038
6134
|
SteadyStateHypothesisState?: SteadyStateHypothesisState1;
|
|
6039
6135
|
StochasticNodeState?: StochasticNodeState;
|
|
6040
6136
|
StochasticTopologyManifest?: StochasticTopologyManifest;
|
|
6137
|
+
StrategicThoughtNodeIntent?: StrategicThoughtNodeIntent;
|
|
6041
6138
|
StreamingDisfluencyContract?: StreamingDisfluencyContract;
|
|
6042
6139
|
StructuralCausalGraphProfile?: StructuralCausalGraphProfile;
|
|
6043
6140
|
SubstrateHydrationManifest?: SubstrateHydrationManifest;
|
|
@@ -6990,6 +7087,24 @@ export interface HypothesisSuperpositionState {
|
|
|
6990
7087
|
export interface CompetingManifolds {
|
|
6991
7088
|
[k: string]: number;
|
|
6992
7089
|
}
|
|
7090
|
+
/**
|
|
7091
|
+
* CoReason Shared Kernel Ontology
|
|
7092
|
+
*
|
|
7093
|
+
* AGENT INSTRUCTION: Instantiates a single discrete node within a Monte Carlo Tree Search (MCTS) topology for long-horizon strategic planning. Emitted by the Claw Code agent during deliberation within the unconstrained `<deliberation>` envelope. The `urn:coreason:oracle:strategic_mcts` MCP evaluates these nodes via the UCT formula and returns expansion or pruning directives.
|
|
7094
|
+
*
|
|
7095
|
+
* CAUSAL AFFORDANCE: Connects discrete logic Premises into a fully verifiable proof tree managed by the Strategic MCTS Oracle. The `parent_node_hash` establishes the Merkle-DAG lineage to the parent thought, enabling deterministic traversal and rollback of rejected reasoning paths. The `heuristic_confidence` feeds directly into the UCT exploration-exploitation calculation.
|
|
7096
|
+
*
|
|
7097
|
+
* EPISTEMIC BOUNDS: The `parent_node_hash` is strictly bounded to exactly 64 hexadecimal characters (SHA-256), establishing a cryptographic chain of custody. The `heuristic_confidence` is bounded to `[0.0, 1.0]` representing a self-evaluated probability of success. The `proposed_action` and `rationale` are bounded to 10,000 characters each to prevent context window exhaustion.
|
|
7098
|
+
*
|
|
7099
|
+
* MCP ROUTING TRIGGERS: Monte Carlo Tree Search, UCT Formula, Strategic Planning, Claw Code Deliberation, Test-Time Compute, Thought Node, Tree of Thoughts
|
|
7100
|
+
*/
|
|
7101
|
+
export interface StrategicThoughtNodeIntent {
|
|
7102
|
+
topology_class?: TopologyClass15;
|
|
7103
|
+
parent_node_hash: ParentNodeHash;
|
|
7104
|
+
proposed_action: ProposedAction;
|
|
7105
|
+
rationale: Rationale;
|
|
7106
|
+
heuristic_confidence: HeuristicConfidence;
|
|
7107
|
+
}
|
|
6993
7108
|
/**
|
|
6994
7109
|
* CoReason Shared Kernel Ontology
|
|
6995
7110
|
*
|
|
@@ -6999,7 +7114,7 @@ export interface CompetingManifolds {
|
|
|
6999
7114
|
* MCP ROUTING TRIGGERS: Graph CRDTs, Topological Retraction, Non-Monotonic Logic, Edge Invalidation
|
|
7000
7115
|
*/
|
|
7001
7116
|
export interface TemporalEdgeInvalidationIntent {
|
|
7002
|
-
topology_class?:
|
|
7117
|
+
topology_class?: TopologyClass16;
|
|
7003
7118
|
/**
|
|
7004
7119
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
7005
7120
|
*/
|
|
@@ -7022,7 +7137,7 @@ export interface TemporalEdgeInvalidationIntent {
|
|
|
7022
7137
|
* MCP ROUTING TRIGGERS: Popperian Falsification, Null Hypothesis, Defeasible Logic, Empirical Falsifiability, Structural Boundary
|
|
7023
7138
|
*/
|
|
7024
7139
|
export interface EmpiricalFalsificationContract {
|
|
7025
|
-
topology_class?:
|
|
7140
|
+
topology_class?: TopologyClass17;
|
|
7026
7141
|
condition_cid: ConditionCid;
|
|
7027
7142
|
description: Description2;
|
|
7028
7143
|
required_tool_name?: RequiredToolName;
|
|
@@ -7034,7 +7149,7 @@ export interface EmpiricalFalsificationContract {
|
|
|
7034
7149
|
* AGENT INSTRUCTION: A contract deploying constraint oracles to hunt for counter-models to falsify a hypothesis.
|
|
7035
7150
|
*/
|
|
7036
7151
|
export interface FalsificationContract {
|
|
7037
|
-
topology_class?:
|
|
7152
|
+
topology_class?: TopologyClass18;
|
|
7038
7153
|
falsification_solver?: FalsificationSolver;
|
|
7039
7154
|
/**
|
|
7040
7155
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -7057,7 +7172,7 @@ export interface FalsificationContract {
|
|
|
7057
7172
|
* MCP ROUTING TRIGGERS: Bipartite Ontological Mapping, Grounding Oracle, CURIE Resolution, Isometry Thresholding, Semantic Crosswalk
|
|
7058
7173
|
*/
|
|
7059
7174
|
export interface OntologicalCrosswalkIntent {
|
|
7060
|
-
topology_class?:
|
|
7175
|
+
topology_class?: TopologyClass19;
|
|
7061
7176
|
target_graph_cid: TargetGraphCid;
|
|
7062
7177
|
source_strings: SourceStrings;
|
|
7063
7178
|
target_ontology_registries: TargetOntologyRegistries;
|
|
@@ -7075,7 +7190,7 @@ export interface OntologicalCrosswalkIntent {
|
|
|
7075
7190
|
* MCP ROUTING TRIGGERS: Synchronous Epistemic Signaling, Mixed-Initiative Control, Finite State Machine, Oracle Projection, Halting Problem
|
|
7076
7191
|
*/
|
|
7077
7192
|
export interface SemanticIntent {
|
|
7078
|
-
topology_class?:
|
|
7193
|
+
topology_class?: TopologyClass20;
|
|
7079
7194
|
message: Message;
|
|
7080
7195
|
timeout_action: TimeoutAction1;
|
|
7081
7196
|
}
|
|
@@ -7091,7 +7206,7 @@ export interface SemanticIntent {
|
|
|
7091
7206
|
* MCP ROUTING TRIGGERS: Active Inference, Expected Free Energy, Shannon Entropy Reduction, Zero-Shot Elicitation, Epistemic Gap
|
|
7092
7207
|
*/
|
|
7093
7208
|
export interface DraftingIntent {
|
|
7094
|
-
topology_class?:
|
|
7209
|
+
topology_class?: TopologyClass21;
|
|
7095
7210
|
context_prompt: ContextPrompt;
|
|
7096
7211
|
resolution_schema: ResolutionSchema1;
|
|
7097
7212
|
timeout_action: TimeoutAction2;
|
|
@@ -7105,25 +7220,20 @@ export interface ResolutionSchema1 {
|
|
|
7105
7220
|
/**
|
|
7106
7221
|
* CoReason Shared Kernel Ontology
|
|
7107
7222
|
*
|
|
7108
|
-
* AGENT INSTRUCTION:
|
|
7223
|
+
* AGENT INSTRUCTION: Emitted when the deterministic Forge encounters an epistemic deficit it cannot resolve via rigid AST manipulation or formal solvers, triggering an escalation to the heuristic Claw Swarm via the Sovereign LLM Proxy. Do not instantiate for security overrides; use `InterventionIntent` instead.
|
|
7109
7224
|
*
|
|
7110
|
-
* CAUSAL AFFORDANCE:
|
|
7225
|
+
* CAUSAL AFFORDANCE: Unlocks the Forge-to-Claw handoff by packaging the precise epistemic deficit, the contextual Merkle-DAG fragments required for the Claw agent's context window, and the thermodynamic budget ceiling that the Sovereign LLM Proxy will enforce via its circuit breaker.
|
|
7111
7226
|
*
|
|
7112
|
-
* EPISTEMIC BOUNDS: The `
|
|
7227
|
+
* EPISTEMIC BOUNDS: The `target_solver_urn` is strictly anchored to the `urn:coreason:solver:` namespace prefix. The `context_window_cids` array is canonically sorted to guarantee RFC 8785 deterministic hashing. The `thermodynamic_budget` is bounded to `[1, 10_000_000]` tokens to prevent unbounded token burn.
|
|
7113
7228
|
*
|
|
7114
|
-
* MCP ROUTING TRIGGERS:
|
|
7229
|
+
* MCP ROUTING TRIGGERS: Epistemic Deficit Escalation, Forge-to-Claw Handoff, Sovereign LLM Proxy, Thermodynamic Circuit Breaker, MCTS Delegation
|
|
7115
7230
|
*/
|
|
7116
7231
|
export interface EscalationIntent {
|
|
7117
|
-
topology_class?:
|
|
7118
|
-
|
|
7119
|
-
|
|
7120
|
-
|
|
7121
|
-
|
|
7122
|
-
/**
|
|
7123
|
-
* The strict JSON Schema requiring an explicit cryptographic sign-off or justification string to bypass the breaker. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
|
|
7124
|
-
*/
|
|
7125
|
-
export interface ResolutionSchema2 {
|
|
7126
|
-
[k: string]: JsonPrimitiveState;
|
|
7232
|
+
topology_class?: TopologyClass22;
|
|
7233
|
+
target_solver_urn: TargetSolverUrn;
|
|
7234
|
+
epistemic_deficit_description: EpistemicDeficitDescription;
|
|
7235
|
+
context_window_cids: ContextWindowCids;
|
|
7236
|
+
thermodynamic_budget: ThermodynamicBudget;
|
|
7127
7237
|
}
|
|
7128
7238
|
/**
|
|
7129
7239
|
* CoReason Shared Kernel Ontology
|
|
@@ -7137,7 +7247,7 @@ export interface ResolutionSchema2 {
|
|
|
7137
7247
|
* MCP ROUTING TRIGGERS: Zero-Shot Tool Discovery, Capability Routing, Dense Vector Embedding, Epistemic Deficit Resolution
|
|
7138
7248
|
*/
|
|
7139
7249
|
export interface SemanticDiscoveryIntent {
|
|
7140
|
-
topology_class?:
|
|
7250
|
+
topology_class?: TopologyClass23;
|
|
7141
7251
|
query_vector: VectorEmbeddingState1;
|
|
7142
7252
|
min_isometry_score: MinIsometryScore;
|
|
7143
7253
|
required_structural_types: RequiredStructuralTypes;
|
|
@@ -7183,7 +7293,7 @@ export interface VectorEmbeddingState1 {
|
|
|
7183
7293
|
* MCP ROUTING TRIGGERS: Graph Isomorphism, UI State Mutation, Heuristic Regrouping, Dynamic Manifold, Spatial Reorganization
|
|
7184
7294
|
*/
|
|
7185
7295
|
export interface TaxonomicRestructureIntent {
|
|
7186
|
-
topology_class?:
|
|
7296
|
+
topology_class?: TopologyClass24;
|
|
7187
7297
|
restructure_heuristic: RestructureHeuristic;
|
|
7188
7298
|
target_taxonomy: GenerativeTaxonomyManifest;
|
|
7189
7299
|
}
|
|
@@ -7340,7 +7450,7 @@ export interface SpatialRenderMaterial {
|
|
|
7340
7450
|
* MCP ROUTING TRIGGERS: Maximum Inner Product Search, k-Nearest Neighbors, Latent Manifold Projection, Retrieval-Augmented Generation
|
|
7341
7451
|
*/
|
|
7342
7452
|
export interface LatentProjectionIntent {
|
|
7343
|
-
topology_class?:
|
|
7453
|
+
topology_class?: TopologyClass25;
|
|
7344
7454
|
synthetic_target_vector: VectorEmbeddingState2;
|
|
7345
7455
|
top_k_candidates: TopKCandidates;
|
|
7346
7456
|
min_isometry_score: MinIsometryScore1;
|
|
@@ -7445,7 +7555,7 @@ export interface ContextExpansionPolicy {
|
|
|
7445
7555
|
* MCP ROUTING TRIGGERS: Schema Inference, Memory Heap Parsing, Abductive Reasoning, XHR Interception, Unstructured Transmutation
|
|
7446
7556
|
*/
|
|
7447
7557
|
export interface LatentSchemaInferenceIntent {
|
|
7448
|
-
topology_class?:
|
|
7558
|
+
topology_class?: TopologyClass26;
|
|
7449
7559
|
target_buffer_cid: TargetBufferCid;
|
|
7450
7560
|
max_schema_depth: MaxSchemaDepth;
|
|
7451
7561
|
max_properties: MaxProperties;
|
|
@@ -7463,7 +7573,7 @@ export interface LatentSchemaInferenceIntent {
|
|
|
7463
7573
|
* MCP ROUTING TRIGGERS: Human-in-the-Loop, Intent Translation, Agentic Forge, Objective Setting, Budget Allocation
|
|
7464
7574
|
*/
|
|
7465
7575
|
export interface HumanDirectiveIntent {
|
|
7466
|
-
topology_class?:
|
|
7576
|
+
topology_class?: TopologyClass27;
|
|
7467
7577
|
natural_language_goal: NaturalLanguageGoal;
|
|
7468
7578
|
allocated_budget_magnitude: AllocatedBudgetMagnitude;
|
|
7469
7579
|
/**
|
|
@@ -7483,7 +7593,7 @@ export interface HumanDirectiveIntent {
|
|
|
7483
7593
|
* MCP ROUTING TRIGGERS: Semantic Resolution, Optimal Transport, ETL Bypass, Dynamic Ontology
|
|
7484
7594
|
*/
|
|
7485
7595
|
export interface ContextualSemanticResolutionIntent {
|
|
7486
|
-
topology_class?:
|
|
7596
|
+
topology_class?: TopologyClass28;
|
|
7487
7597
|
source_record_cid: SourceRecordCid;
|
|
7488
7598
|
target_ontology_graph_cid: TargetOntologyGraphCid;
|
|
7489
7599
|
encoding_profile: TabularEncodingProfile;
|
|
@@ -7496,7 +7606,7 @@ export interface ContextualSemanticResolutionIntent {
|
|
|
7496
7606
|
* AGENT INSTRUCTION: Authorizes a Semantic Watchdog Agent to perform strict out-of-band polling against external semantic registries to monitor for ontological deprecation or semantic drift.
|
|
7497
7607
|
*/
|
|
7498
7608
|
export interface OntologyDiscoveryIntent {
|
|
7499
|
-
topology_class?:
|
|
7609
|
+
topology_class?: TopologyClass29;
|
|
7500
7610
|
jsonrpc: Jsonrpc;
|
|
7501
7611
|
method: Method;
|
|
7502
7612
|
params?: Params;
|
|
@@ -7517,7 +7627,7 @@ export interface OntologyDiscoveryIntent {
|
|
|
7517
7627
|
* MCP ROUTING TRIGGERS: Semantic Mapping, Heuristic Injection, Cryptographic Petition, Swarm Logic
|
|
7518
7628
|
*/
|
|
7519
7629
|
export interface SemanticMappingHeuristicIntent {
|
|
7520
|
-
topology_class?:
|
|
7630
|
+
topology_class?: TopologyClass30;
|
|
7521
7631
|
proposal_cid: ProposalCid;
|
|
7522
7632
|
source_ontology_namespace: SourceOntologyNamespace;
|
|
7523
7633
|
target_ontology_namespace: TargetOntologyNamespace;
|
|
@@ -7536,7 +7646,7 @@ export interface SemanticMappingHeuristicIntent {
|
|
|
7536
7646
|
* MCP ROUTING TRIGGERS: Optimistic Locking, Affine CRDT, Spherical Linear Interpolation, Continuous Reconciliation, Kinematic Drag
|
|
7537
7647
|
*/
|
|
7538
7648
|
export interface ContinuousSpatialMutationIntent {
|
|
7539
|
-
topology_class?:
|
|
7649
|
+
topology_class?: TopologyClass31;
|
|
7540
7650
|
/**
|
|
7541
7651
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
7542
7652
|
*/
|
|
@@ -7592,7 +7702,7 @@ export interface KinematicDerivativeProfile {
|
|
|
7592
7702
|
* MCP ROUTING TRIGGERS: Knapsack Optimization, Semantic Load Shedding, Spot Compute Bidding, QoS Classification, Resource Provisioning
|
|
7593
7703
|
*/
|
|
7594
7704
|
export interface ComputeProvisioningIntent {
|
|
7595
|
-
topology_class?:
|
|
7705
|
+
topology_class?: TopologyClass32;
|
|
7596
7706
|
max_budget: MaxBudget;
|
|
7597
7707
|
required_capabilities: RequiredCapabilities;
|
|
7598
7708
|
/**
|
|
@@ -7612,7 +7722,7 @@ export interface ComputeProvisioningIntent {
|
|
|
7612
7722
|
* MCP ROUTING TRIGGERS: Decentralized Spot Market, Request for Proposal, Thermodynamic Compute Allocation, Algorithmic Mechanism Design, Kinetic Execution Trigger
|
|
7613
7723
|
*/
|
|
7614
7724
|
export interface TaskAnnouncementIntent {
|
|
7615
|
-
topology_class?:
|
|
7725
|
+
topology_class?: TopologyClass33;
|
|
7616
7726
|
task_cid: TaskCid2;
|
|
7617
7727
|
required_action_space_cid?: RequiredActionSpaceCid;
|
|
7618
7728
|
max_budget_magnitude: MaxBudgetMagnitude;
|
|
@@ -7629,7 +7739,7 @@ export interface TaskAnnouncementIntent {
|
|
|
7629
7739
|
* MCP ROUTING TRIGGERS: Spectral Graph Partitioning, Byzantine Fault Isolation, Epistemic Contagion, Defeasible Logic, Algebraic Connectivity
|
|
7630
7740
|
*/
|
|
7631
7741
|
export interface QuarantineIntent {
|
|
7632
|
-
topology_class?:
|
|
7742
|
+
topology_class?: TopologyClass34;
|
|
7633
7743
|
/**
|
|
7634
7744
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
7635
7745
|
*/
|
|
@@ -7648,7 +7758,7 @@ export interface QuarantineIntent {
|
|
|
7648
7758
|
* MCP ROUTING TRIGGERS: Supervisory Control Theory, Mixed-Initiative System, Discrete-Event System, Bounded Delay, Pearlian Intervention
|
|
7649
7759
|
*/
|
|
7650
7760
|
export interface InterventionIntent {
|
|
7651
|
-
topology_class?:
|
|
7761
|
+
topology_class?: TopologyClass35;
|
|
7652
7762
|
/**
|
|
7653
7763
|
* The scope constraints bounding the intervention.
|
|
7654
7764
|
*/
|
|
@@ -7662,7 +7772,7 @@ export interface InterventionIntent {
|
|
|
7662
7772
|
*/
|
|
7663
7773
|
target_node_cid: string;
|
|
7664
7774
|
context_summary: ContextSummary;
|
|
7665
|
-
proposed_action:
|
|
7775
|
+
proposed_action: ProposedAction1;
|
|
7666
7776
|
adjudication_deadline: AdjudicationDeadline;
|
|
7667
7777
|
/**
|
|
7668
7778
|
* Packages the exact contextual state at the moment of computational failure.
|
|
@@ -7719,7 +7829,7 @@ export interface JsonSchemaWhitelist {
|
|
|
7719
7829
|
*/
|
|
7720
7830
|
export interface FallbackSLA {
|
|
7721
7831
|
timeout_seconds: TimeoutSeconds;
|
|
7722
|
-
timeout_action:
|
|
7832
|
+
timeout_action: TimeoutAction3;
|
|
7723
7833
|
/**
|
|
7724
7834
|
* The specific NodeCIDState to route the execution to if the escalate action is triggered.
|
|
7725
7835
|
*/
|
|
@@ -7728,7 +7838,7 @@ export interface FallbackSLA {
|
|
|
7728
7838
|
/**
|
|
7729
7839
|
* The action proposed by the agent that requires approval.
|
|
7730
7840
|
*/
|
|
7731
|
-
export interface
|
|
7841
|
+
export interface ProposedAction1 {
|
|
7732
7842
|
[k: string]: JsonPrimitiveState;
|
|
7733
7843
|
}
|
|
7734
7844
|
/**
|
|
@@ -7786,7 +7896,7 @@ export interface CognitiveCritiqueProfile {
|
|
|
7786
7896
|
* Projection, Human-in-the-Loop
|
|
7787
7897
|
*/
|
|
7788
7898
|
export interface FYIIntent {
|
|
7789
|
-
topology_class?:
|
|
7899
|
+
topology_class?: TopologyClass36;
|
|
7790
7900
|
}
|
|
7791
7901
|
/**
|
|
7792
7902
|
* CoReason Shared Kernel Ontology
|
|
@@ -7800,7 +7910,7 @@ export interface FYIIntent {
|
|
|
7800
7910
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Absorbing State, Graceful Degradation, Control-Flow Override, Policy Intervention
|
|
7801
7911
|
*/
|
|
7802
7912
|
export interface FallbackIntent {
|
|
7803
|
-
topology_class?:
|
|
7913
|
+
topology_class?: TopologyClass37;
|
|
7804
7914
|
/**
|
|
7805
7915
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
7806
7916
|
*/
|
|
@@ -7822,7 +7932,7 @@ export interface FallbackIntent {
|
|
|
7822
7932
|
* MCP ROUTING TRIGGERS: Dictatorial Override, Byzantine Fault Resolution, Pearlian Intervention, Causal Shattering, Zero-Trust Override
|
|
7823
7933
|
*/
|
|
7824
7934
|
export interface OverrideIntent {
|
|
7825
|
-
topology_class?:
|
|
7935
|
+
topology_class?: TopologyClass38;
|
|
7826
7936
|
/**
|
|
7827
7937
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
7828
7938
|
*/
|
|
@@ -7852,7 +7962,7 @@ export interface OverrideAction {
|
|
|
7852
7962
|
* MCP ROUTING TRIGGERS: Defeasible Logic, Non-Monotonic Revision, Out-of-Distribution Adaptation, Normative Drift Resolution, Pearlian Intervention
|
|
7853
7963
|
*/
|
|
7854
7964
|
export interface ConstitutionalAmendmentIntent {
|
|
7855
|
-
topology_class?:
|
|
7965
|
+
topology_class?: TopologyClass39;
|
|
7856
7966
|
drift_event_cid: DriftEventCid;
|
|
7857
7967
|
proposed_patch: ProposedPatch;
|
|
7858
7968
|
justification: Justification1;
|
|
@@ -7875,7 +7985,7 @@ export interface ProposedPatch {
|
|
|
7875
7985
|
* MCP ROUTING TRIGGERS: Mathematical Kinematics, Bezier Geometry, Fitts's Law, OS-Level Actuation, Non-Linear Trajectory
|
|
7876
7986
|
*/
|
|
7877
7987
|
export interface SpatialKinematicActionIntent {
|
|
7878
|
-
topology_class?:
|
|
7988
|
+
topology_class?: TopologyClass40;
|
|
7879
7989
|
action_class: ActionClass;
|
|
7880
7990
|
/**
|
|
7881
7991
|
* The primary spatial terminus for clicks or hovers.
|
|
@@ -7924,7 +8034,7 @@ export interface SE3TransformProfile1 {
|
|
|
7924
8034
|
* MCP ROUTING TRIGGERS: Dual-Process Theory, Non-Monotonic Revision, System 2 Remediation, Backtracking Search, Abstract Syntax Tree
|
|
7925
8035
|
*/
|
|
7926
8036
|
export interface System2RemediationIntent {
|
|
7927
|
-
topology_class?:
|
|
8037
|
+
topology_class?: TopologyClass41;
|
|
7928
8038
|
fault_cid: FaultCid;
|
|
7929
8039
|
/**
|
|
7930
8040
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -7969,7 +8079,7 @@ export interface SubstrateHydrationManifest {
|
|
|
7969
8079
|
*/
|
|
7970
8080
|
target_node_cid: string;
|
|
7971
8081
|
substrate_profile: ExecutionSubstrateProfile;
|
|
7972
|
-
topology_class?:
|
|
8082
|
+
topology_class?: TopologyClass42;
|
|
7973
8083
|
cryptographic_checksums?: CryptographicChecksums;
|
|
7974
8084
|
}
|
|
7975
8085
|
/**
|
|
@@ -7999,7 +8109,7 @@ export interface CryptographicChecksums {
|
|
|
7999
8109
|
* MCP ROUTING TRIGGERS: Pre-Inference Gate, Neurosymbolic Request, Probability Envelope, SLA Enforcement, Inference Termination
|
|
8000
8110
|
*/
|
|
8001
8111
|
export interface NeurosymbolicInferenceIntent {
|
|
8002
|
-
topology_class?:
|
|
8112
|
+
topology_class?: TopologyClass43;
|
|
8003
8113
|
source_entity: ContextualizedSourceState1;
|
|
8004
8114
|
fidelity_receipt: TopologicalFidelityReceipt;
|
|
8005
8115
|
uncertainty_profile: CognitiveUncertaintyProfile;
|
|
@@ -8051,7 +8161,7 @@ export interface EpistemicCompressionSLA {
|
|
|
8051
8161
|
*/
|
|
8052
8162
|
export interface TopologicalProjectionIntent {
|
|
8053
8163
|
provenance_trace_cid?: ProvenanceTraceCid;
|
|
8054
|
-
topology_class?:
|
|
8164
|
+
topology_class?: TopologyClass44;
|
|
8055
8165
|
projection_cid: ProjectionCid;
|
|
8056
8166
|
source_superposition_cid: SourceSuperpositionCid;
|
|
8057
8167
|
target_topology: TargetTopologyProfile;
|
|
@@ -8071,7 +8181,7 @@ export interface TopologicalProjectionIntent {
|
|
|
8071
8181
|
* MCP ROUTING TRIGGERS: Automated Theorem Proving, Constraint Satisfaction, Logic Programming, Substrate Oracle
|
|
8072
8182
|
*/
|
|
8073
8183
|
export interface FormalLogicPremise {
|
|
8074
|
-
topology_class?:
|
|
8184
|
+
topology_class?: TopologyClass45;
|
|
8075
8185
|
dialect_urn: DialectUrn;
|
|
8076
8186
|
formal_statement: FormalStatement;
|
|
8077
8187
|
verification_script?: VerificationScript;
|
|
@@ -8080,7 +8190,7 @@ export interface FormalLogicPremise {
|
|
|
8080
8190
|
* CoReason Shared Kernel Ontology
|
|
8081
8191
|
*/
|
|
8082
8192
|
export interface CausalPropagationIntent {
|
|
8083
|
-
topology_class?:
|
|
8193
|
+
topology_class?: TopologyClass46;
|
|
8084
8194
|
target_graph_cid: TargetGraphCid1;
|
|
8085
8195
|
task_cid: TaskCid3;
|
|
8086
8196
|
grounding_sla: EvidentiaryGroundingSLA;
|
|
@@ -8190,7 +8300,7 @@ export interface EvidentiaryCitationState {
|
|
|
8190
8300
|
* CoReason Shared Kernel Ontology
|
|
8191
8301
|
*/
|
|
8192
8302
|
export interface RDFSerializationIntent {
|
|
8193
|
-
topology_class?:
|
|
8303
|
+
topology_class?: TopologyClass47;
|
|
8194
8304
|
export_cid: ExportCid;
|
|
8195
8305
|
target_graph_cid: TargetGraphCid2;
|
|
8196
8306
|
target_format?: TargetFormat;
|
|
@@ -8229,13 +8339,13 @@ export interface SHACLValidationSLA {
|
|
|
8229
8339
|
export interface SPARQLQueryIntent {
|
|
8230
8340
|
query_string: QueryString;
|
|
8231
8341
|
target_endpoint: TargetEndpoint;
|
|
8232
|
-
topology_class?:
|
|
8342
|
+
topology_class?: TopologyClass48;
|
|
8233
8343
|
}
|
|
8234
8344
|
/**
|
|
8235
8345
|
* CoReason Shared Kernel Ontology
|
|
8236
8346
|
*/
|
|
8237
8347
|
export interface BoundedJSONRPCIntent {
|
|
8238
|
-
topology_class?:
|
|
8348
|
+
topology_class?: TopologyClass49;
|
|
8239
8349
|
jsonrpc: Jsonrpc1;
|
|
8240
8350
|
method: Method1;
|
|
8241
8351
|
params?: Params1;
|
|
@@ -8245,7 +8355,7 @@ export interface BoundedJSONRPCIntent {
|
|
|
8245
8355
|
* CoReason Shared Kernel Ontology
|
|
8246
8356
|
*/
|
|
8247
8357
|
export interface ChaosExperimentTask {
|
|
8248
|
-
topology_class?:
|
|
8358
|
+
topology_class?: TopologyClass50;
|
|
8249
8359
|
experiment_cid: ExperimentCid;
|
|
8250
8360
|
hypothesis: SteadyStateHypothesisState;
|
|
8251
8361
|
faults: Faults;
|
|
@@ -8310,7 +8420,7 @@ export interface ExogenousEpistemicEvent {
|
|
|
8310
8420
|
event_cid: EventCid2;
|
|
8311
8421
|
prior_event_hash?: PriorEventHash2;
|
|
8312
8422
|
timestamp: Timestamp2;
|
|
8313
|
-
topology_class?:
|
|
8423
|
+
topology_class?: TopologyClass51;
|
|
8314
8424
|
shock_cid: ShockCid;
|
|
8315
8425
|
target_node_hash: TargetNodeHash;
|
|
8316
8426
|
bayesian_surprise_score: BayesianSurpriseScore;
|
|
@@ -8333,7 +8443,7 @@ export interface SimulationEscrowContract {
|
|
|
8333
8443
|
* CoReason Shared Kernel Ontology
|
|
8334
8444
|
*/
|
|
8335
8445
|
export interface EpistemicTransmutationTask {
|
|
8336
|
-
topology_class?:
|
|
8446
|
+
topology_class?: TopologyClass52;
|
|
8337
8447
|
task_cid: TaskCid4;
|
|
8338
8448
|
artifact_event_cid: ArtifactEventCid;
|
|
8339
8449
|
target_modalities: TargetModalities;
|
|
@@ -8391,7 +8501,7 @@ export interface OpticalParsingSLA {
|
|
|
8391
8501
|
* CoReason Shared Kernel Ontology
|
|
8392
8502
|
*/
|
|
8393
8503
|
export interface EpistemicUpsamplingTask {
|
|
8394
|
-
topology_class?:
|
|
8504
|
+
topology_class?: TopologyClass53;
|
|
8395
8505
|
source_entity: ContextualizedSourceState2;
|
|
8396
8506
|
target_ontological_granularity: TargetOntologicalGranularity;
|
|
8397
8507
|
upsampling_confidence_threshold: UpsamplingConfidenceThreshold;
|
|
@@ -8409,7 +8519,7 @@ export interface ContextualizedSourceState2 {
|
|
|
8409
8519
|
* CoReason Shared Kernel Ontology
|
|
8410
8520
|
*/
|
|
8411
8521
|
export interface InterventionalCausalTask {
|
|
8412
|
-
topology_class?:
|
|
8522
|
+
topology_class?: TopologyClass54;
|
|
8413
8523
|
task_cid: TaskCid5;
|
|
8414
8524
|
target_hypothesis_cid: TargetHypothesisCid1;
|
|
8415
8525
|
intervention_variable: InterventionVariable;
|
|
@@ -8421,7 +8531,7 @@ export interface InterventionalCausalTask {
|
|
|
8421
8531
|
* CoReason Shared Kernel Ontology
|
|
8422
8532
|
*/
|
|
8423
8533
|
export interface MCPClientIntent {
|
|
8424
|
-
topology_class?:
|
|
8534
|
+
topology_class?: TopologyClass55;
|
|
8425
8535
|
jsonrpc: Jsonrpc2;
|
|
8426
8536
|
method: Method2;
|
|
8427
8537
|
params?: Params2;
|
|
@@ -8432,7 +8542,7 @@ export interface MCPClientIntent {
|
|
|
8432
8542
|
* The mathematically pre-calculated view manifold tailored to the observer's frustum.
|
|
8433
8543
|
*/
|
|
8434
8544
|
export interface DynamicManifoldProjectionManifest {
|
|
8435
|
-
topology_class?:
|
|
8545
|
+
topology_class?: TopologyClass56;
|
|
8436
8546
|
manifest_cid: ManifestCid1;
|
|
8437
8547
|
active_forge_cid: ActiveForgeCid;
|
|
8438
8548
|
ast_gradient_visual_mapping: GrammarPanelProfile;
|
|
@@ -8447,7 +8557,7 @@ export interface DynamicManifoldProjectionManifest {
|
|
|
8447
8557
|
*/
|
|
8448
8558
|
export interface GrammarPanelProfile {
|
|
8449
8559
|
panel_cid: PanelCid;
|
|
8450
|
-
topology_class?:
|
|
8560
|
+
topology_class?: TopologyClass57;
|
|
8451
8561
|
title: Title;
|
|
8452
8562
|
ledger_source_cid: LedgerSourceCid;
|
|
8453
8563
|
/**
|
|
@@ -8513,7 +8623,7 @@ export interface VisualEncodingProfile {
|
|
|
8513
8623
|
* MCP ROUTING TRIGGERS: Grammar of Graphics, Metric Tensor Distortion, Levels of Measurement, Scale Projection, FSM Literal
|
|
8514
8624
|
*/
|
|
8515
8625
|
export interface ScalePolicy {
|
|
8516
|
-
topology_class:
|
|
8626
|
+
topology_class: TopologyClass58;
|
|
8517
8627
|
domain_min?: DomainMin;
|
|
8518
8628
|
domain_max?: DomainMax;
|
|
8519
8629
|
}
|
|
@@ -8545,7 +8655,7 @@ export interface FacetMatrixProfile {
|
|
|
8545
8655
|
*/
|
|
8546
8656
|
export interface GrammarPanelProfile1 {
|
|
8547
8657
|
panel_cid: PanelCid;
|
|
8548
|
-
topology_class?:
|
|
8658
|
+
topology_class?: TopologyClass57;
|
|
8549
8659
|
title: Title;
|
|
8550
8660
|
ledger_source_cid: LedgerSourceCid;
|
|
8551
8661
|
/**
|
|
@@ -8572,7 +8682,7 @@ export interface GrammarPanelProfile1 {
|
|
|
8572
8682
|
*/
|
|
8573
8683
|
export interface InsightCardProfile {
|
|
8574
8684
|
panel_cid: PanelCid1;
|
|
8575
|
-
topology_class?:
|
|
8685
|
+
topology_class?: TopologyClass59;
|
|
8576
8686
|
title: Title1;
|
|
8577
8687
|
markdown_content: MarkdownContent;
|
|
8578
8688
|
/**
|
|
@@ -8592,7 +8702,7 @@ export interface SemanticZoomProfile {
|
|
|
8592
8702
|
* CoReason Shared Kernel Ontology
|
|
8593
8703
|
*/
|
|
8594
8704
|
export interface RollbackIntent {
|
|
8595
|
-
topology_class?:
|
|
8705
|
+
topology_class?: TopologyClass60;
|
|
8596
8706
|
request_cid: RequestCid;
|
|
8597
8707
|
target_event_cid: TargetEventCid;
|
|
8598
8708
|
invalidated_node_cids?: InvalidatedNodeCids;
|
|
@@ -8601,7 +8711,7 @@ export interface RollbackIntent {
|
|
|
8601
8711
|
* CoReason Shared Kernel Ontology
|
|
8602
8712
|
*/
|
|
8603
8713
|
export interface StateMutationIntent {
|
|
8604
|
-
topology_class?:
|
|
8714
|
+
topology_class?: TopologyClass61;
|
|
8605
8715
|
/**
|
|
8606
8716
|
* The strict RFC 6902 JSON Patch operation, acting as a deterministic state vector mutation.
|
|
8607
8717
|
*/
|
|
@@ -8626,8 +8736,13 @@ export interface StateMutationIntent {
|
|
|
8626
8736
|
* MCP ROUTING TRIGGERS: Federated Discovery, Service Mesh, Capability Registry, Substrate Interrogation
|
|
8627
8737
|
*/
|
|
8628
8738
|
export interface FederatedDiscoveryIntent {
|
|
8629
|
-
topology_class?:
|
|
8739
|
+
topology_class?: TopologyClass62;
|
|
8630
8740
|
domain_filter: DomainFilter;
|
|
8741
|
+
/**
|
|
8742
|
+
* The content-addressed hash of the capability being searched for via P2P mesh.
|
|
8743
|
+
*/
|
|
8744
|
+
target_capability_cid?: BundleContentHashState | null;
|
|
8745
|
+
max_network_hops?: MaxNetworkHops;
|
|
8631
8746
|
required_security_clearance: RequiredSecurityClearance;
|
|
8632
8747
|
}
|
|
8633
8748
|
/**
|
|
@@ -8642,7 +8757,7 @@ export interface FederatedDiscoveryIntent {
|
|
|
8642
8757
|
* MCP ROUTING TRIGGERS: Semantic Crosswalk, ETL Pipeline, Data Normalization, Knowledge Graph Extraction
|
|
8643
8758
|
*/
|
|
8644
8759
|
export interface OntologicalNormalizationIntent {
|
|
8645
|
-
topology_class?:
|
|
8760
|
+
topology_class?: TopologyClass63;
|
|
8646
8761
|
source_artifact_cid: SourceArtifactCid1;
|
|
8647
8762
|
target_ontology_urn: TargetOntologyUrn;
|
|
8648
8763
|
}
|
|
@@ -8675,7 +8790,7 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8675
8790
|
*/
|
|
8676
8791
|
render_material?: SpatialRenderMaterial | null;
|
|
8677
8792
|
description: Description3;
|
|
8678
|
-
topology_class?:
|
|
8793
|
+
topology_class?: TopologyClass64;
|
|
8679
8794
|
hardware?: SpatialHardwareProfile;
|
|
8680
8795
|
security?: EpistemicSecurityProfile;
|
|
8681
8796
|
/**
|
|
@@ -8690,6 +8805,10 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8690
8805
|
* The dynamic spot-market compute requirements for this agent.
|
|
8691
8806
|
*/
|
|
8692
8807
|
compute_frontier?: RoutingFrontierPolicy | null;
|
|
8808
|
+
/**
|
|
8809
|
+
* The mathematical bounds defining acceptable probabilistic drift, hardware requirements, and remote decoding protocols for this agent's execution routing.
|
|
8810
|
+
*/
|
|
8811
|
+
epistemic_rigidity?: EpistemicRigidityPolicy | null;
|
|
8693
8812
|
peft_adapters?: PeftAdapters;
|
|
8694
8813
|
/**
|
|
8695
8814
|
* The cryptographic identity passport and AI-BOM for the agent.
|
|
@@ -8839,6 +8958,7 @@ export interface MarkovBlanketRenderingPolicy {
|
|
|
8839
8958
|
export interface SpatialHardwareProfile {
|
|
8840
8959
|
compute_tier?: ComputeTier;
|
|
8841
8960
|
min_vram_gb?: MinVramGb;
|
|
8961
|
+
coreason_network_mode?: CoreasonNetworkMode;
|
|
8842
8962
|
accelerator_type?: AcceleratorType;
|
|
8843
8963
|
provider_whitelist?: ProviderWhitelist;
|
|
8844
8964
|
}
|
|
@@ -8847,6 +8967,9 @@ export interface SpatialHardwareProfile {
|
|
|
8847
8967
|
*/
|
|
8848
8968
|
export interface EpistemicSecurityProfile {
|
|
8849
8969
|
epistemic_security?: EpistemicSecurityPolicy;
|
|
8970
|
+
clearance_tiers?: ClearanceTiers;
|
|
8971
|
+
network_boundary?: NetworkBoundary;
|
|
8972
|
+
pii_quarantine_required?: PiiQuarantineRequired;
|
|
8850
8973
|
network_isolation?: NetworkIsolation;
|
|
8851
8974
|
egress_obfuscation?: EgressObfuscation;
|
|
8852
8975
|
}
|
|
@@ -8930,6 +9053,25 @@ export interface RoutingFrontierPolicy {
|
|
|
8930
9053
|
tradeoff_preference: TradeoffPreference;
|
|
8931
9054
|
max_carbon_intensity_gco2eq_kwh?: MaxCarbonIntensityGco2EqKwh;
|
|
8932
9055
|
}
|
|
9056
|
+
/**
|
|
9057
|
+
* CoReason Shared Kernel Ontology
|
|
9058
|
+
*
|
|
9059
|
+
* AGENT INSTRUCTION: Defines the acceptable bounds of probabilistic drift for an execution task, establishing the exact hardware and physics requirements for LLM inference.
|
|
9060
|
+
*
|
|
9061
|
+
* CAUSAL AFFORDANCE: Instructs the Tier-1 Tensor Router to either enforce local SGLang execution, execute a two-stage decoupled pipeline, or permit Cloud Oracle escalation via structured outputs.
|
|
9062
|
+
*
|
|
9063
|
+
* EPISTEMIC BOUNDS: The `minimum_rigidity_tier` is strictly constrained to a scalar mathematical bound `ge=0, le=255`. The semantic-to-scalar mapping (e.g., 'H100_CLUSTER' -> 255) is resolved via a Sovereign MCP Projection. `max_retries_on_semantic_tax` is bounded `ge=0, le=100` to prevent infinite validation loops.
|
|
9064
|
+
*
|
|
9065
|
+
* MCP ROUTING TRIGGERS: Epistemic Rigidity Matrix, Execution Routing Policy, Logit Suffocation, Probabilistic Escalation, Semantic Tax Bounding
|
|
9066
|
+
*/
|
|
9067
|
+
export interface EpistemicRigidityPolicy {
|
|
9068
|
+
minimum_rigidity_tier?: MinimumRigidityTier;
|
|
9069
|
+
max_retries_on_semantic_tax?: MaxRetriesOnSemanticTax;
|
|
9070
|
+
permitted_remote_decoding_protocols?: PermittedRemoteDecodingProtocols;
|
|
9071
|
+
required_epistemic_security?: EpistemicSecurityPolicy1;
|
|
9072
|
+
minimum_vram_gb?: MinimumVramGb;
|
|
9073
|
+
maximum_latency_ms?: MaximumLatencyMs;
|
|
9074
|
+
}
|
|
8933
9075
|
/**
|
|
8934
9076
|
* CoReason Shared Kernel Ontology
|
|
8935
9077
|
*
|
|
@@ -9298,7 +9440,7 @@ export interface CognitiveHumanNodeProfile {
|
|
|
9298
9440
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
9299
9441
|
*/
|
|
9300
9442
|
render_material?: SpatialRenderMaterial | null;
|
|
9301
|
-
topology_class?:
|
|
9443
|
+
topology_class?: TopologyClass65;
|
|
9302
9444
|
required_attestation: RequiredAttestation;
|
|
9303
9445
|
/**
|
|
9304
9446
|
* The continuous spatial vector representing the human operator's localized cognitive focus.
|
|
@@ -9346,7 +9488,7 @@ export interface CognitiveSystemNodeProfile {
|
|
|
9346
9488
|
* The mathematical functor blueprint authorizing the runtime to hydrate a specific open-source engine (e.g., SymbolicAI) for this node.
|
|
9347
9489
|
*/
|
|
9348
9490
|
execution_substrate?: ExecutionSubstrateProfile1 | null;
|
|
9349
|
-
topology_class?:
|
|
9491
|
+
topology_class?: TopologyClass66;
|
|
9350
9492
|
}
|
|
9351
9493
|
/**
|
|
9352
9494
|
* CoReason Shared Kernel Ontology
|
|
@@ -9394,7 +9536,7 @@ export interface CompositeNodeProfile {
|
|
|
9394
9536
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
9395
9537
|
*/
|
|
9396
9538
|
render_material?: SpatialRenderMaterial | null;
|
|
9397
|
-
topology_class?:
|
|
9539
|
+
topology_class?: TopologyClass67;
|
|
9398
9540
|
/**
|
|
9399
9541
|
* The encapsulated subgraph to execute.
|
|
9400
9542
|
*/
|
|
@@ -9434,7 +9576,7 @@ export interface DAGTopologyManifest {
|
|
|
9434
9576
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9435
9577
|
*/
|
|
9436
9578
|
observability?: ObservabilityLODPolicy | null;
|
|
9437
|
-
topology_class?:
|
|
9579
|
+
topology_class?: TopologyClass68;
|
|
9438
9580
|
edges?: Edges;
|
|
9439
9581
|
allow_cycles?: AllowCycles;
|
|
9440
9582
|
/**
|
|
@@ -9844,7 +9986,7 @@ export interface CouncilTopologyManifest {
|
|
|
9844
9986
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9845
9987
|
*/
|
|
9846
9988
|
observability?: ObservabilityLODPolicy | null;
|
|
9847
|
-
topology_class?:
|
|
9989
|
+
topology_class?: TopologyClass69;
|
|
9848
9990
|
/**
|
|
9849
9991
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
9850
9992
|
*/
|
|
@@ -10051,7 +10193,7 @@ export interface SwarmTopologyManifest {
|
|
|
10051
10193
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10052
10194
|
*/
|
|
10053
10195
|
observability?: ObservabilityLODPolicy | null;
|
|
10054
|
-
topology_class?:
|
|
10196
|
+
topology_class?: TopologyClass70;
|
|
10055
10197
|
spawning_threshold?: SpawningThreshold;
|
|
10056
10198
|
max_concurrent_agents?: MaxConcurrentAgents;
|
|
10057
10199
|
/**
|
|
@@ -10185,7 +10327,7 @@ export interface EvolutionaryTopologyManifest {
|
|
|
10185
10327
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10186
10328
|
*/
|
|
10187
10329
|
observability?: ObservabilityLODPolicy | null;
|
|
10188
|
-
topology_class?:
|
|
10330
|
+
topology_class?: TopologyClass71;
|
|
10189
10331
|
generations: Generations;
|
|
10190
10332
|
population_size: PopulationSize;
|
|
10191
10333
|
mutation: MutationPolicy;
|
|
@@ -10298,7 +10440,7 @@ export interface SMPCTopologyManifest {
|
|
|
10298
10440
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10299
10441
|
*/
|
|
10300
10442
|
observability?: ObservabilityLODPolicy | null;
|
|
10301
|
-
topology_class?:
|
|
10443
|
+
topology_class?: TopologyClass72;
|
|
10302
10444
|
smpc_protocol: SmpcProtocol;
|
|
10303
10445
|
joint_function_uri: JointFunctionUri;
|
|
10304
10446
|
participant_node_cids: ParticipantNodeCids;
|
|
@@ -10345,7 +10487,7 @@ export interface EvaluatorOptimizerTopologyManifest {
|
|
|
10345
10487
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10346
10488
|
*/
|
|
10347
10489
|
observability?: ObservabilityLODPolicy | null;
|
|
10348
|
-
topology_class?:
|
|
10490
|
+
topology_class?: TopologyClass73;
|
|
10349
10491
|
/**
|
|
10350
10492
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10351
10493
|
*/
|
|
@@ -10395,7 +10537,7 @@ export interface DigitalTwinTopologyManifest {
|
|
|
10395
10537
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10396
10538
|
*/
|
|
10397
10539
|
observability?: ObservabilityLODPolicy | null;
|
|
10398
|
-
topology_class?:
|
|
10540
|
+
topology_class?: TopologyClass74;
|
|
10399
10541
|
target_topology_cid: TargetTopologyCid;
|
|
10400
10542
|
convergence_sla: SimulationConvergenceSLA;
|
|
10401
10543
|
enforce_no_side_effects?: EnforceNoSideEffects;
|
|
@@ -10425,7 +10567,7 @@ export interface SimulationConvergenceSLA {
|
|
|
10425
10567
|
* MCP ROUTING TRIGGERS: Practical Byzantine Fault Tolerance, pBFT, Distributed Consensus, Sybil Resistance, Macro Abstraction
|
|
10426
10568
|
*/
|
|
10427
10569
|
export interface ConsensusFederationTopologyManifest {
|
|
10428
|
-
topology_class?:
|
|
10570
|
+
topology_class?: TopologyClass75;
|
|
10429
10571
|
participant_cids: ParticipantCids;
|
|
10430
10572
|
/**
|
|
10431
10573
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10490,7 +10632,7 @@ export interface CapabilityForgeTopologyManifest {
|
|
|
10490
10632
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10491
10633
|
*/
|
|
10492
10634
|
observability?: ObservabilityLODPolicy | null;
|
|
10493
|
-
topology_class?:
|
|
10635
|
+
topology_class?: TopologyClass76;
|
|
10494
10636
|
target_epistemic_deficit: SemanticDiscoveryIntent1;
|
|
10495
10637
|
/**
|
|
10496
10638
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10531,7 +10673,7 @@ export interface Nodes8 {
|
|
|
10531
10673
|
* MCP ROUTING TRIGGERS: Zero-Shot Tool Discovery, Capability Routing, Dense Vector Embedding, Epistemic Deficit Resolution
|
|
10532
10674
|
*/
|
|
10533
10675
|
export interface SemanticDiscoveryIntent1 {
|
|
10534
|
-
topology_class?:
|
|
10676
|
+
topology_class?: TopologyClass23;
|
|
10535
10677
|
query_vector: VectorEmbeddingState1;
|
|
10536
10678
|
min_isometry_score: MinIsometryScore;
|
|
10537
10679
|
required_structural_types: RequiredStructuralTypes;
|
|
@@ -10644,7 +10786,7 @@ export interface IntentElicitationTopologyManifest {
|
|
|
10644
10786
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10645
10787
|
*/
|
|
10646
10788
|
observability?: ObservabilityLODPolicy | null;
|
|
10647
|
-
topology_class?:
|
|
10789
|
+
topology_class?: TopologyClass77;
|
|
10648
10790
|
raw_human_artifact_cid: RawHumanArtifactCid;
|
|
10649
10791
|
/**
|
|
10650
10792
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10698,7 +10840,7 @@ export interface NeurosymbolicIngestionTopologyManifest {
|
|
|
10698
10840
|
* The dynamic Level of Detail physics bound to this graph.
|
|
10699
10841
|
*/
|
|
10700
10842
|
observability?: ObservabilityLODPolicy | null;
|
|
10701
|
-
topology_class?:
|
|
10843
|
+
topology_class?: TopologyClass78;
|
|
10702
10844
|
/**
|
|
10703
10845
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10704
10846
|
*/
|
|
@@ -10759,7 +10901,7 @@ export interface NeurosymbolicVerificationTopologyManifest {
|
|
|
10759
10901
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10760
10902
|
*/
|
|
10761
10903
|
observability?: ObservabilityLODPolicy | null;
|
|
10762
|
-
topology_class?:
|
|
10904
|
+
topology_class?: TopologyClass79;
|
|
10763
10905
|
proposer_node_cid: ProposerNodeCid;
|
|
10764
10906
|
verifier_node_cid: VerifierNodeCid;
|
|
10765
10907
|
max_revision_loops: MaxRevisionLoops1;
|
|
@@ -10783,7 +10925,7 @@ export interface Nodes11 {
|
|
|
10783
10925
|
* MCP ROUTING TRIGGERS: Discourse Geometry, Rhetorical Flattening, Directed Acyclic Graph, Hierarchical Extraction
|
|
10784
10926
|
*/
|
|
10785
10927
|
export interface DiscourseTreeManifest {
|
|
10786
|
-
topology_class?:
|
|
10928
|
+
topology_class?: TopologyClass80;
|
|
10787
10929
|
manifest_cid: ManifestCid2;
|
|
10788
10930
|
/**
|
|
10789
10931
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10824,7 +10966,7 @@ export interface DiscourseNodeState {
|
|
|
10824
10966
|
* CoReason Shared Kernel Ontology
|
|
10825
10967
|
*/
|
|
10826
10968
|
export interface DocumentKnowledgeGraphManifest {
|
|
10827
|
-
topology_class?:
|
|
10969
|
+
topology_class?: TopologyClass81;
|
|
10828
10970
|
graph_cid: GraphCid;
|
|
10829
10971
|
source_artifact_cid: SourceArtifactCid2;
|
|
10830
10972
|
nodes: Nodes12;
|
|
@@ -10972,7 +11114,7 @@ export interface HomomorphicEncryptionProfile {
|
|
|
10972
11114
|
* MCP ROUTING TRIGGERS: Cross-Modal Isomorphism, Semantic Fusion, Volumetric Projection, Profunctor Optics
|
|
10973
11115
|
*/
|
|
10974
11116
|
export interface ContinuousManifoldMappingContract {
|
|
10975
|
-
topology_class?:
|
|
11117
|
+
topology_class?: TopologyClass82;
|
|
10976
11118
|
/**
|
|
10977
11119
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10978
11120
|
*/
|
|
@@ -11019,7 +11161,7 @@ export interface SE3TransformProfile4 {
|
|
|
11019
11161
|
* MCP ROUTING TRIGGERS: Spatial-Semantic Isomorphism, Document Object Model, Containment DAG, Visual Hierarchy, Rhetorical Bounding
|
|
11020
11162
|
*/
|
|
11021
11163
|
export interface HierarchicalDOMManifest {
|
|
11022
|
-
topology_class?:
|
|
11164
|
+
topology_class?: TopologyClass83;
|
|
11023
11165
|
dom_cid: DomCid;
|
|
11024
11166
|
root_block_cid: RootBlockCid;
|
|
11025
11167
|
blocks: Blocks;
|
|
@@ -11200,7 +11342,7 @@ export interface MemoizedNodeProfile {
|
|
|
11200
11342
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
11201
11343
|
*/
|
|
11202
11344
|
render_material?: SpatialRenderMaterial | null;
|
|
11203
|
-
topology_class?:
|
|
11345
|
+
topology_class?: TopologyClass84;
|
|
11204
11346
|
/**
|
|
11205
11347
|
* The exact SHA-256 fingerprint of the executed topology.
|
|
11206
11348
|
*/
|
|
@@ -11222,7 +11364,7 @@ export interface ExpectedOutputSchema {
|
|
|
11222
11364
|
* MCP ROUTING TRIGGERS: Conflict-Free Replicated Data Types, State-based Semilattice, Eventual Consistency, G-Set
|
|
11223
11365
|
*/
|
|
11224
11366
|
export interface TemporalGraphCRDTManifest {
|
|
11225
|
-
topology_class?:
|
|
11367
|
+
topology_class?: TopologyClass85;
|
|
11226
11368
|
diff_cid: DiffCid;
|
|
11227
11369
|
author_node_cid: AuthorNodeCid;
|
|
11228
11370
|
lamport_timestamp: LamportTimestamp;
|
|
@@ -11242,7 +11384,7 @@ export interface VectorClock {
|
|
|
11242
11384
|
* AGENT INSTRUCTION: A formal Substrate Projection representing an executable Model Context Protocol (MCP) tool.
|
|
11243
11385
|
*/
|
|
11244
11386
|
export interface MCPToolDefinition {
|
|
11245
|
-
topology_class?:
|
|
11387
|
+
topology_class?: TopologyClass86;
|
|
11246
11388
|
event_cid?: EventCid3;
|
|
11247
11389
|
prior_event_hash?: PriorEventHash3;
|
|
11248
11390
|
timestamp?: Timestamp3;
|
|
@@ -11271,7 +11413,7 @@ export interface CrosswalkResolutionReceipt {
|
|
|
11271
11413
|
event_cid: EventCid4;
|
|
11272
11414
|
prior_event_hash?: PriorEventHash4;
|
|
11273
11415
|
timestamp: Timestamp4;
|
|
11274
|
-
topology_class?:
|
|
11416
|
+
topology_class?: TopologyClass87;
|
|
11275
11417
|
receipt_cid: ReceiptCid1;
|
|
11276
11418
|
target_graph_cid: TargetGraphCid3;
|
|
11277
11419
|
resolved_curies: ResolvedCuries;
|
|
@@ -11316,7 +11458,7 @@ export interface EpistemicZeroTrustReceipt {
|
|
|
11316
11458
|
event_cid: EventCid5;
|
|
11317
11459
|
prior_event_hash?: PriorEventHash5;
|
|
11318
11460
|
timestamp: Timestamp5;
|
|
11319
|
-
topology_class?:
|
|
11461
|
+
topology_class?: TopologyClass88;
|
|
11320
11462
|
intent_reference_cid: IntentReferenceCid;
|
|
11321
11463
|
llm_blind_plan_hash: LlmBlindPlanHash;
|
|
11322
11464
|
firewall_breach_detected?: FirewallBreachDetected;
|
|
@@ -11338,7 +11480,7 @@ export interface ObservationEvent {
|
|
|
11338
11480
|
event_cid: EventCid6;
|
|
11339
11481
|
prior_event_hash?: PriorEventHash6;
|
|
11340
11482
|
timestamp: Timestamp6;
|
|
11341
|
-
topology_class?:
|
|
11483
|
+
topology_class?: TopologyClass89;
|
|
11342
11484
|
payload: Payload;
|
|
11343
11485
|
/**
|
|
11344
11486
|
* The specific topological node that appended this observation.
|
|
@@ -11408,7 +11550,7 @@ export interface HardwareEnclaveReceipt {
|
|
|
11408
11550
|
* MCP ROUTING TRIGGERS: Exogenous Perturbation, DOM Topography, Spatial Execution Bound, Accessibility Tree
|
|
11409
11551
|
*/
|
|
11410
11552
|
export interface BrowserDOMState {
|
|
11411
|
-
topology_class?:
|
|
11553
|
+
topology_class?: TopologyClass90;
|
|
11412
11554
|
current_url: CurrentUrl;
|
|
11413
11555
|
viewport_size: ViewportSize;
|
|
11414
11556
|
dom_hash: DomHash;
|
|
@@ -11427,7 +11569,7 @@ export interface BrowserDOMState {
|
|
|
11427
11569
|
* MCP ROUTING TRIGGERS: POSIX Environment, Exogenous Perturbation, TTY Buffer, Causal Actuator, Stream Crystallization
|
|
11428
11570
|
*/
|
|
11429
11571
|
export interface TerminalBufferState {
|
|
11430
|
-
topology_class?:
|
|
11572
|
+
topology_class?: TopologyClass91;
|
|
11431
11573
|
working_directory: WorkingDirectory;
|
|
11432
11574
|
stdout_hash: StdoutHash;
|
|
11433
11575
|
stderr_hash: StderrHash;
|
|
@@ -11542,7 +11684,7 @@ export interface BeliefMutationEvent {
|
|
|
11542
11684
|
event_cid: EventCid7;
|
|
11543
11685
|
prior_event_hash?: PriorEventHash7;
|
|
11544
11686
|
timestamp: Timestamp7;
|
|
11545
|
-
topology_class?:
|
|
11687
|
+
topology_class?: TopologyClass92;
|
|
11546
11688
|
payload: Payload1;
|
|
11547
11689
|
/**
|
|
11548
11690
|
* The specific topological node that synthesized this belief assertion.
|
|
@@ -11657,7 +11799,7 @@ export interface SystemFaultEvent {
|
|
|
11657
11799
|
event_cid: EventCid8;
|
|
11658
11800
|
prior_event_hash?: PriorEventHash8;
|
|
11659
11801
|
timestamp: Timestamp8;
|
|
11660
|
-
topology_class?:
|
|
11802
|
+
topology_class?: TopologyClass93;
|
|
11661
11803
|
}
|
|
11662
11804
|
/**
|
|
11663
11805
|
* CoReason Shared Kernel Ontology
|
|
@@ -11671,7 +11813,7 @@ export interface SystemFaultEvent {
|
|
|
11671
11813
|
* MCP ROUTING TRIGGERS: Atomic Proposition, Discourse Extraction, Labeled Property Graph, Verifiable Statement
|
|
11672
11814
|
*/
|
|
11673
11815
|
export interface AtomicPropositionState {
|
|
11674
|
-
topology_class?:
|
|
11816
|
+
topology_class?: TopologyClass94;
|
|
11675
11817
|
event_cid: EventCid9;
|
|
11676
11818
|
prior_event_hash?: PriorEventHash9;
|
|
11677
11819
|
timestamp: Timestamp9;
|
|
@@ -11712,7 +11854,7 @@ export interface EmpiricalStatisticalProfile {
|
|
|
11712
11854
|
* MCP ROUTING TRIGGERS: Post-Coordinated Semantics, Latent Manifold Alignment, Semantic Specificity, Entity Assembly
|
|
11713
11855
|
*/
|
|
11714
11856
|
export interface PostCoordinatedSemanticState {
|
|
11715
|
-
topology_class?:
|
|
11857
|
+
topology_class?: TopologyClass95;
|
|
11716
11858
|
event_cid: EventCid10;
|
|
11717
11859
|
prior_event_hash?: PriorEventHash10;
|
|
11718
11860
|
timestamp: Timestamp10;
|
|
@@ -11746,7 +11888,7 @@ export interface ArtifactCorruptionEvent {
|
|
|
11746
11888
|
event_cid: EventCid11;
|
|
11747
11889
|
prior_event_hash?: PriorEventHash11;
|
|
11748
11890
|
timestamp: Timestamp11;
|
|
11749
|
-
topology_class?:
|
|
11891
|
+
topology_class?: TopologyClass96;
|
|
11750
11892
|
artifact_cid: ArtifactCid;
|
|
11751
11893
|
corruption_class: CorruptionClass;
|
|
11752
11894
|
diagnostic_hash: DiagnosticHash;
|
|
@@ -11766,7 +11908,7 @@ export interface HypothesisGenerationEvent {
|
|
|
11766
11908
|
event_cid: EventCid12;
|
|
11767
11909
|
prior_event_hash?: PriorEventHash12;
|
|
11768
11910
|
timestamp: Timestamp12;
|
|
11769
|
-
topology_class?:
|
|
11911
|
+
topology_class?: TopologyClass97;
|
|
11770
11912
|
hypothesis_cid: HypothesisCid;
|
|
11771
11913
|
premise_text: PremiseText;
|
|
11772
11914
|
bayesian_prior: BayesianPrior;
|
|
@@ -11808,7 +11950,7 @@ export interface BargeInInterruptEvent {
|
|
|
11808
11950
|
event_cid: EventCid13;
|
|
11809
11951
|
prior_event_hash?: PriorEventHash13;
|
|
11810
11952
|
timestamp: Timestamp13;
|
|
11811
|
-
topology_class?:
|
|
11953
|
+
topology_class?: TopologyClass98;
|
|
11812
11954
|
target_event_cid: TargetEventCid1;
|
|
11813
11955
|
/**
|
|
11814
11956
|
* The continuous multimodal trigger (e.g., audio spike, user saying 'stop') that justified the interruption.
|
|
@@ -11832,7 +11974,7 @@ export interface CounterfactualRegretEvent {
|
|
|
11832
11974
|
event_cid: EventCid14;
|
|
11833
11975
|
prior_event_hash?: PriorEventHash14;
|
|
11834
11976
|
timestamp: Timestamp14;
|
|
11835
|
-
topology_class?:
|
|
11977
|
+
topology_class?: TopologyClass99;
|
|
11836
11978
|
historical_event_cid: HistoricalEventCid;
|
|
11837
11979
|
counterfactual_intervention: CounterfactualIntervention;
|
|
11838
11980
|
expected_utility_actual: ExpectedUtilityActual;
|
|
@@ -11861,7 +12003,7 @@ export interface ToolInvocationEvent {
|
|
|
11861
12003
|
event_cid: EventCid15;
|
|
11862
12004
|
prior_event_hash?: PriorEventHash15;
|
|
11863
12005
|
timestamp: Timestamp15;
|
|
11864
|
-
topology_class?:
|
|
12006
|
+
topology_class?: TopologyClass100;
|
|
11865
12007
|
tool_name: ToolName1;
|
|
11866
12008
|
parameters: Parameters;
|
|
11867
12009
|
authorized_budget_magnitude: AuthorizedBudgetMagnitude;
|
|
@@ -11927,7 +12069,7 @@ export interface EpistemicPromotionEvent {
|
|
|
11927
12069
|
event_cid: EventCid16;
|
|
11928
12070
|
prior_event_hash?: PriorEventHash16;
|
|
11929
12071
|
timestamp: Timestamp16;
|
|
11930
|
-
topology_class?:
|
|
12072
|
+
topology_class?: TopologyClass101;
|
|
11931
12073
|
source_episodic_event_cids: SourceEpisodicEventCids;
|
|
11932
12074
|
crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
|
|
11933
12075
|
compression_ratio: CompressionRatio;
|
|
@@ -11947,8 +12089,8 @@ export interface NormativeDriftEvent {
|
|
|
11947
12089
|
event_cid: EventCid17;
|
|
11948
12090
|
prior_event_hash?: PriorEventHash17;
|
|
11949
12091
|
timestamp: Timestamp17;
|
|
11950
|
-
topology_class?:
|
|
11951
|
-
tripped_rule_cid:
|
|
12092
|
+
topology_class?: TopologyClass102;
|
|
12093
|
+
tripped_rule_cid: TrippedRuleCid;
|
|
11952
12094
|
measured_semantic_drift: MeasuredSemanticDrift;
|
|
11953
12095
|
contradiction_proof_hash: ContradictionProofHash;
|
|
11954
12096
|
}
|
|
@@ -11967,7 +12109,7 @@ export interface PersistenceCommitReceipt {
|
|
|
11967
12109
|
event_cid: EventCid18;
|
|
11968
12110
|
prior_event_hash?: PriorEventHash18;
|
|
11969
12111
|
timestamp: Timestamp18;
|
|
11970
|
-
topology_class?:
|
|
12112
|
+
topology_class?: TopologyClass103;
|
|
11971
12113
|
lakehouse_snapshot_cid: LakehouseSnapshotCid;
|
|
11972
12114
|
committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
|
|
11973
12115
|
target_table_uri: TargetTableUri;
|
|
@@ -11987,7 +12129,7 @@ export interface TokenBurnReceipt {
|
|
|
11987
12129
|
event_cid: EventCid19;
|
|
11988
12130
|
prior_event_hash?: PriorEventHash19;
|
|
11989
12131
|
timestamp: Timestamp19;
|
|
11990
|
-
topology_class?:
|
|
12132
|
+
topology_class?: TopologyClass104;
|
|
11991
12133
|
tool_invocation_cid: ToolInvocationCid;
|
|
11992
12134
|
input_tokens: InputTokens;
|
|
11993
12135
|
output_tokens: OutputTokens;
|
|
@@ -12008,7 +12150,7 @@ export interface BudgetExhaustionEvent {
|
|
|
12008
12150
|
event_cid: EventCid20;
|
|
12009
12151
|
prior_event_hash?: PriorEventHash20;
|
|
12010
12152
|
timestamp: Timestamp20;
|
|
12011
|
-
topology_class?:
|
|
12153
|
+
topology_class?: TopologyClass105;
|
|
12012
12154
|
exhausted_escrow_cid: ExhaustedEscrowCid;
|
|
12013
12155
|
final_burn_receipt_cid: FinalBurnReceiptCid;
|
|
12014
12156
|
}
|
|
@@ -12027,7 +12169,7 @@ export interface EpistemicTelemetryEvent {
|
|
|
12027
12169
|
event_cid: EventCid21;
|
|
12028
12170
|
prior_event_hash?: PriorEventHash21;
|
|
12029
12171
|
timestamp: Timestamp21;
|
|
12030
|
-
topology_class?:
|
|
12172
|
+
topology_class?: TopologyClass106;
|
|
12031
12173
|
interaction_modality: InteractionModality;
|
|
12032
12174
|
target_node_cid: TargetNodeCid2;
|
|
12033
12175
|
dwell_duration_ms?: DwellDurationMs;
|
|
@@ -12051,7 +12193,7 @@ export interface CognitivePredictionReceipt {
|
|
|
12051
12193
|
event_cid: EventCid22;
|
|
12052
12194
|
prior_event_hash?: PriorEventHash22;
|
|
12053
12195
|
timestamp: Timestamp22;
|
|
12054
|
-
topology_class?:
|
|
12196
|
+
topology_class?: TopologyClass107;
|
|
12055
12197
|
source_chain_cid: SourceChainCid;
|
|
12056
12198
|
target_source_concept: TargetSourceConcept;
|
|
12057
12199
|
predicted_top_k_tokens: PredictedTopKTokens;
|
|
@@ -12071,7 +12213,7 @@ export interface EpistemicAxiomVerificationReceipt {
|
|
|
12071
12213
|
event_cid: EventCid23;
|
|
12072
12214
|
prior_event_hash?: PriorEventHash23;
|
|
12073
12215
|
timestamp: Timestamp23;
|
|
12074
|
-
topology_class?:
|
|
12216
|
+
topology_class?: TopologyClass108;
|
|
12075
12217
|
source_prediction_cid: SourcePredictionCid;
|
|
12076
12218
|
sequence_similarity_score: SequenceSimilarityScore;
|
|
12077
12219
|
fact_score_passed: FactScorePassed;
|
|
@@ -12105,7 +12247,7 @@ export interface CognitiveRewardEvaluationReceipt {
|
|
|
12105
12247
|
event_cid: EventCid24;
|
|
12106
12248
|
prior_event_hash?: PriorEventHash24;
|
|
12107
12249
|
timestamp: Timestamp24;
|
|
12108
|
-
topology_class?:
|
|
12250
|
+
topology_class?: TopologyClass109;
|
|
12109
12251
|
source_generation_cid: SourceGenerationCid;
|
|
12110
12252
|
extracted_axioms?: ExtractedAxioms;
|
|
12111
12253
|
calculated_r_path: CalculatedRPath;
|
|
@@ -12151,7 +12293,7 @@ export interface EpistemicFlowStateReceipt {
|
|
|
12151
12293
|
event_cid: EventCid25;
|
|
12152
12294
|
prior_event_hash?: PriorEventHash25;
|
|
12153
12295
|
timestamp: Timestamp25;
|
|
12154
|
-
topology_class?:
|
|
12296
|
+
topology_class?: TopologyClass110;
|
|
12155
12297
|
source_trajectory_cid: SourceTrajectoryCid;
|
|
12156
12298
|
estimated_flow_value: EstimatedFlowValue;
|
|
12157
12299
|
terminal_reward_factorized: TerminalRewardFactorized;
|
|
@@ -12180,7 +12322,7 @@ export interface CausalExplanationEvent {
|
|
|
12180
12322
|
event_cid: EventCid26;
|
|
12181
12323
|
prior_event_hash?: PriorEventHash26;
|
|
12182
12324
|
timestamp: Timestamp26;
|
|
12183
|
-
topology_class?:
|
|
12325
|
+
topology_class?: TopologyClass111;
|
|
12184
12326
|
target_outcome_event_cid: TargetOutcomeEventCid;
|
|
12185
12327
|
collective_intelligence: CollectiveIntelligenceProfile;
|
|
12186
12328
|
agent_attributions: AgentAttributions;
|
|
@@ -12244,7 +12386,7 @@ export interface IntentClassificationReceipt {
|
|
|
12244
12386
|
event_cid: EventCid27;
|
|
12245
12387
|
prior_event_hash?: PriorEventHash27;
|
|
12246
12388
|
timestamp: Timestamp27;
|
|
12247
|
-
topology_class?:
|
|
12389
|
+
topology_class?: TopologyClass112;
|
|
12248
12390
|
raw_input_string: RawInputString;
|
|
12249
12391
|
classified_intent: ClassifiedIntent;
|
|
12250
12392
|
confidence_score: ConfidenceScore1;
|
|
@@ -12262,7 +12404,7 @@ export interface IntentClassificationReceipt {
|
|
|
12262
12404
|
* MCP ROUTING TRIGGERS: Semantic Relational Record, Payload Injection, Hardware Guillotine, Structured Telemetry
|
|
12263
12405
|
*/
|
|
12264
12406
|
export interface SemanticRelationalVectorState {
|
|
12265
|
-
topology_class?:
|
|
12407
|
+
topology_class?: TopologyClass113;
|
|
12266
12408
|
event_cid: EventCid28;
|
|
12267
12409
|
prior_event_hash?: PriorEventHash28;
|
|
12268
12410
|
timestamp: Timestamp28;
|
|
@@ -12307,7 +12449,7 @@ export interface PayloadInjectionZone {
|
|
|
12307
12449
|
* MCP ROUTING TRIGGERS: Ontological Reification, Bimodal Semantic Transformation, Epistemic Ledger, Traceability Collapse
|
|
12308
12450
|
*/
|
|
12309
12451
|
export interface OntologicalReificationReceipt {
|
|
12310
|
-
topology_class?:
|
|
12452
|
+
topology_class?: TopologyClass114;
|
|
12311
12453
|
event_cid: EventCid29;
|
|
12312
12454
|
prior_event_hash?: PriorEventHash29;
|
|
12313
12455
|
timestamp: Timestamp29;
|
|
@@ -12350,7 +12492,7 @@ export interface CircuitBreakerEvent {
|
|
|
12350
12492
|
event_cid: EventCid30;
|
|
12351
12493
|
prior_event_hash?: PriorEventHash30;
|
|
12352
12494
|
timestamp: Timestamp30;
|
|
12353
|
-
topology_class?:
|
|
12495
|
+
topology_class?: TopologyClass115;
|
|
12354
12496
|
/**
|
|
12355
12497
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
12356
12498
|
*/
|
|
@@ -12371,7 +12513,7 @@ export interface CircuitBreakerEvent {
|
|
|
12371
12513
|
export interface EpistemicLogEvent {
|
|
12372
12514
|
event_cid: EventCid31;
|
|
12373
12515
|
prior_event_hash?: PriorEventHash31;
|
|
12374
|
-
topology_class?:
|
|
12516
|
+
topology_class?: TopologyClass116;
|
|
12375
12517
|
timestamp: Timestamp31;
|
|
12376
12518
|
level: Level;
|
|
12377
12519
|
message: Message1;
|
|
@@ -12402,7 +12544,7 @@ export interface TelemetryContextProfile {
|
|
|
12402
12544
|
* MCP ROUTING TRIGGERS: Cryptographic Nonce, State Resumption, Replay Attack Prevention, Wetware Attestation, Liveness Resolution
|
|
12403
12545
|
*/
|
|
12404
12546
|
export interface InterventionReceipt {
|
|
12405
|
-
topology_class?:
|
|
12547
|
+
topology_class?: TopologyClass117;
|
|
12406
12548
|
event_cid: EventCid32;
|
|
12407
12549
|
prior_event_hash?: PriorEventHash32;
|
|
12408
12550
|
timestamp: Timestamp32;
|
|
@@ -12463,7 +12605,7 @@ export interface CustodyReceipt {
|
|
|
12463
12605
|
event_cid: EventCid33;
|
|
12464
12606
|
prior_event_hash?: PriorEventHash33;
|
|
12465
12607
|
timestamp: Timestamp33;
|
|
12466
|
-
topology_class?:
|
|
12608
|
+
topology_class?: TopologyClass118;
|
|
12467
12609
|
custody_cid: CustodyCid;
|
|
12468
12610
|
source_node_cid: SourceNodeCid;
|
|
12469
12611
|
applied_policy_cid: AppliedPolicyCid;
|
|
@@ -12486,7 +12628,7 @@ export interface DefeasibleAttackEvent {
|
|
|
12486
12628
|
event_cid: EventCid34;
|
|
12487
12629
|
prior_event_hash?: PriorEventHash34;
|
|
12488
12630
|
timestamp: Timestamp34;
|
|
12489
|
-
topology_class?:
|
|
12631
|
+
topology_class?: TopologyClass119;
|
|
12490
12632
|
attack_cid: AttackCid;
|
|
12491
12633
|
source_claim_cid: SourceClaimCid;
|
|
12492
12634
|
target_claim_cid: TargetClaimCid;
|
|
@@ -12510,7 +12652,7 @@ export interface FormalVerificationReceipt {
|
|
|
12510
12652
|
event_cid: EventCid35;
|
|
12511
12653
|
prior_event_hash?: PriorEventHash35;
|
|
12512
12654
|
timestamp: Timestamp35;
|
|
12513
|
-
topology_class?:
|
|
12655
|
+
topology_class?: TopologyClass120;
|
|
12514
12656
|
/**
|
|
12515
12657
|
* Pointer to the specific node or intent that requested this formal verification.
|
|
12516
12658
|
*/
|
|
@@ -12524,7 +12666,7 @@ export interface FormalVerificationReceipt {
|
|
|
12524
12666
|
* CoReason Shared Kernel Ontology
|
|
12525
12667
|
*/
|
|
12526
12668
|
export interface BeliefModulationReceipt {
|
|
12527
|
-
topology_class?:
|
|
12669
|
+
topology_class?: TopologyClass121;
|
|
12528
12670
|
receipt_cid: ReceiptCid2;
|
|
12529
12671
|
event_cid: EventCid36;
|
|
12530
12672
|
prior_event_hash?: PriorEventHash36;
|
|
@@ -12540,7 +12682,7 @@ export interface GroundedEdges {
|
|
|
12540
12682
|
* CoReason Shared Kernel Ontology
|
|
12541
12683
|
*/
|
|
12542
12684
|
export interface RDFExportReceipt {
|
|
12543
|
-
topology_class?:
|
|
12685
|
+
topology_class?: TopologyClass122;
|
|
12544
12686
|
export_cid: ExportCid1;
|
|
12545
12687
|
event_cid: EventCid37;
|
|
12546
12688
|
prior_event_hash?: PriorEventHash37;
|
|
@@ -12564,7 +12706,7 @@ export interface EpistemicStarvationEvent {
|
|
|
12564
12706
|
event_cid: EventCid38;
|
|
12565
12707
|
prior_event_hash?: PriorEventHash38;
|
|
12566
12708
|
timestamp: Timestamp38;
|
|
12567
|
-
topology_class?:
|
|
12709
|
+
topology_class?: TopologyClass123;
|
|
12568
12710
|
starved_edge_cid: StarvedEdgeCid;
|
|
12569
12711
|
failed_citations: FailedCitations;
|
|
12570
12712
|
diagnostic_reason: DiagnosticReason;
|
|
@@ -12584,7 +12726,7 @@ export interface SPARQLQueryResultReceipt {
|
|
|
12584
12726
|
event_cid: EventCid39;
|
|
12585
12727
|
prior_event_hash?: PriorEventHash39;
|
|
12586
12728
|
timestamp: Timestamp39;
|
|
12587
|
-
topology_class?:
|
|
12729
|
+
topology_class?: TopologyClass124;
|
|
12588
12730
|
query_intent_cid: QueryIntentCid;
|
|
12589
12731
|
returned_bindings: ReturnedBindings;
|
|
12590
12732
|
execution_time_ms: ExecutionTimeMs;
|
|
@@ -12598,21 +12740,20 @@ export interface ReturnedBindings {
|
|
|
12598
12740
|
/**
|
|
12599
12741
|
* CoReason Shared Kernel Ontology
|
|
12600
12742
|
*
|
|
12601
|
-
* AGENT INSTRUCTION: A cryptographically frozen historical fact
|
|
12743
|
+
* AGENT INSTRUCTION: A cryptographically frozen historical fact attesting that a specific solver agent executed a task within the Claw Swarm. This receipt is immutable and logged in the Merkle-DAG chain of custody. Do not attempt to mutate this object.
|
|
12602
12744
|
*
|
|
12603
|
-
* CAUSAL AFFORDANCE: Unlocks downstream neurosymbolic synthesis by proving that external epistemic grounding was securely retrieved
|
|
12745
|
+
* CAUSAL AFFORDANCE: Unlocks downstream neurosymbolic synthesis by proving that external epistemic grounding was securely retrieved and executed by a validated solver. The `execution_hash` provides undeniable cryptographic provenance for audit trails. The `tokens_burned` enables the Thermodynamic Quota Manager to settle compute costs.
|
|
12604
12746
|
*
|
|
12605
|
-
* EPISTEMIC BOUNDS: The
|
|
12747
|
+
* EPISTEMIC BOUNDS: The `execution_hash` is strictly bounded to exactly 64 hexadecimal characters (SHA-256). The `solver_urn` is anchored to the `urn:coreason:solver:` namespace. The `tokens_burned` is bounded to `[0, 10_000_000]` to prevent integer overflow during thermodynamic tallying. The `human_attestation_signature` is optional and only populated when a Human-in-the-Loop (HITL) operator cryptographically signs off on the execution result.
|
|
12606
12748
|
*
|
|
12607
|
-
* MCP ROUTING TRIGGERS: Execution Audit, Oracle Telemetry,
|
|
12749
|
+
* MCP ROUTING TRIGGERS: Execution Audit, Merkle-DAG Provenance, Thermodynamic Accounting, Oracle Telemetry, Human-in-the-Loop Attestation, Cryptographic Receipt
|
|
12608
12750
|
*/
|
|
12609
12751
|
export interface OracleExecutionReceipt {
|
|
12610
|
-
topology_class?:
|
|
12611
|
-
|
|
12612
|
-
|
|
12613
|
-
|
|
12614
|
-
|
|
12615
|
-
action_space_cid: ActionSpaceCid1;
|
|
12752
|
+
topology_class?: TopologyClass125;
|
|
12753
|
+
execution_hash: ExecutionHash;
|
|
12754
|
+
solver_urn: SolverUrn;
|
|
12755
|
+
tokens_burned: TokensBurned;
|
|
12756
|
+
human_attestation_signature?: HumanAttestationSignature;
|
|
12616
12757
|
}
|
|
12617
12758
|
/**
|
|
12618
12759
|
* CoReason Shared Kernel Ontology
|
|
@@ -12626,7 +12767,7 @@ export interface OracleExecutionReceipt {
|
|
|
12626
12767
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Acyclic Edge, Stochastic Routing, Transition Probability, Directed Graph
|
|
12627
12768
|
*/
|
|
12628
12769
|
export interface TransitionEdgeProfile {
|
|
12629
|
-
topology_class?:
|
|
12770
|
+
topology_class?: TopologyClass126;
|
|
12630
12771
|
target_node_cid?: TargetNodeCid3;
|
|
12631
12772
|
/**
|
|
12632
12773
|
* Dynamic discovery intent for bridging nodes.
|
|
@@ -12670,7 +12811,7 @@ export interface EdgeMappingContract {
|
|
|
12670
12811
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Cyclic Edge, Bellman Equation, Thermodynamic Discounting, Recursive Traversal
|
|
12671
12812
|
*/
|
|
12672
12813
|
export interface CyclicEdgeProfile {
|
|
12673
|
-
topology_class?:
|
|
12814
|
+
topology_class?: TopologyClass127;
|
|
12674
12815
|
target_node_cid?: TargetNodeCid4;
|
|
12675
12816
|
/**
|
|
12676
12817
|
* Dynamic discovery intent for bridging nodes.
|
|
@@ -12723,7 +12864,7 @@ export interface AuctionState {
|
|
|
12723
12864
|
* MCP ROUTING TRIGGERS: Decentralized Spot Market, Request for Proposal, Thermodynamic Compute Allocation, Algorithmic Mechanism Design, Kinetic Execution Trigger
|
|
12724
12865
|
*/
|
|
12725
12866
|
export interface TaskAnnouncementIntent1 {
|
|
12726
|
-
topology_class?:
|
|
12867
|
+
topology_class?: TopologyClass33;
|
|
12727
12868
|
task_cid: TaskCid2;
|
|
12728
12869
|
required_action_space_cid?: RequiredActionSpaceCid;
|
|
12729
12870
|
max_budget_magnitude: MaxBudgetMagnitude;
|
|
@@ -12797,7 +12938,7 @@ export interface BypassReceipt {
|
|
|
12797
12938
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Action Space, Affordance Theory, State Transition Matrix, Directed Cyclic Graph
|
|
12798
12939
|
*/
|
|
12799
12940
|
export interface CognitiveActionSpaceManifest {
|
|
12800
|
-
action_space_cid:
|
|
12941
|
+
action_space_cid: ActionSpaceCid1;
|
|
12801
12942
|
capabilities: Capabilities;
|
|
12802
12943
|
transition_matrix: TransitionMatrix;
|
|
12803
12944
|
entry_point_cid: EntryPointCid;
|
|
@@ -12805,6 +12946,16 @@ export interface CognitiveActionSpaceManifest {
|
|
|
12805
12946
|
* The bipartite graph constraint preventing toxic tool combinations.
|
|
12806
12947
|
*/
|
|
12807
12948
|
kinetic_separation?: KineticSeparationPolicy | null;
|
|
12949
|
+
/**
|
|
12950
|
+
* The content-addressed SHA-256 hash of the capability.
|
|
12951
|
+
*/
|
|
12952
|
+
capability_cid?: BundleContentHashState | null;
|
|
12953
|
+
/**
|
|
12954
|
+
* The content-addressed SHA-256 hash of the FAIR metadata.
|
|
12955
|
+
*/
|
|
12956
|
+
metadata_cid?: BundleContentHashState | null;
|
|
12957
|
+
trusted_validators?: TrustedValidators;
|
|
12958
|
+
execution_fee_lmsr?: ExecutionFeeLmsr;
|
|
12808
12959
|
}
|
|
12809
12960
|
/**
|
|
12810
12961
|
* The State Space (S) of the MDP, indexed by their unique capability CIDs.
|
|
@@ -13288,6 +13439,27 @@ export interface DelegatedCapabilityManifest {
|
|
|
13288
13439
|
expiration_timestamp: ExpirationTimestamp;
|
|
13289
13440
|
cryptographic_signature: CryptographicSignature;
|
|
13290
13441
|
}
|
|
13442
|
+
/**
|
|
13443
|
+
* CoReason Shared Kernel Ontology
|
|
13444
|
+
*
|
|
13445
|
+
* AGENT INSTRUCTION: A Generic two-stage generation wrapper that neutralizes the Format Restriction Penalty (Semantic Tax) during Constrained Decoding. The Sovereign LLM Proxy's XGrammar AOT FSM bitmask MUST be physically toggled between the two fields: DISABLED for `deliberation_trace`, then ENABLED for `payload`. This class models the architectural pattern documented in the Decoupled Reasoning and Formatting specification.
|
|
13446
|
+
*
|
|
13447
|
+
* CAUSAL AFFORDANCE: Unlocks the two-stage Thinker-Parser pipeline by providing a single serializable envelope that carries both the unconstrained Chain-of-Thought reasoning trace and the deterministic, schema-compliant structured payload. Enables the Claw Swarm to reason freely while the deterministic Forge receives only validated structural output.
|
|
13448
|
+
*
|
|
13449
|
+
* EPISTEMIC BOUNDS: The `deliberation_trace` has a maximum length of 100,000 characters to prevent context window exhaustion. The `payload` of type `T` is strictly validated against the target `CoreasonBaseState` subclass schema at deserialization time. The Generic parameter `T` must be a `CoreasonBaseState` descendant to guarantee RFC 8785 canonicalization.
|
|
13450
|
+
*
|
|
13451
|
+
* MCP ROUTING TRIGGERS: Semantic Tax Neutralization, Decoupled Reasoning Pipeline, XGrammar FSM Toggle, Constrained Decoding, Two-Stage Generation, Deliberation Envelope
|
|
13452
|
+
*/
|
|
13453
|
+
export interface DeliberativeEnvelope {
|
|
13454
|
+
deliberation_trace: DeliberationTrace;
|
|
13455
|
+
payload: Payload2;
|
|
13456
|
+
}
|
|
13457
|
+
/**
|
|
13458
|
+
* The deterministic, schema-compliant structured output generated by the Edge model (or the same model in a second pass) with the Sovereign LLM Proxy's XGrammar AOT FSM bitmask STRICTLY ENABLED. This field contains the validated structural result that maps directly to the target CoreasonBaseState subclass.
|
|
13459
|
+
*/
|
|
13460
|
+
export interface Payload2 {
|
|
13461
|
+
[k: string]: unknown;
|
|
13462
|
+
}
|
|
13291
13463
|
/**
|
|
13292
13464
|
* CoReason Shared Kernel Ontology
|
|
13293
13465
|
*
|
|
@@ -13414,7 +13586,7 @@ export interface DynamicLayoutManifest {
|
|
|
13414
13586
|
* MCP ROUTING TRIGGERS: Grammar of Graphics, Retinal Variables, UI Rendering, Semantic Zooming, Dynamic Manifold
|
|
13415
13587
|
*/
|
|
13416
13588
|
export interface DynamicManifoldProjectionManifest1 {
|
|
13417
|
-
topology_class?:
|
|
13589
|
+
topology_class?: TopologyClass56;
|
|
13418
13590
|
manifest_cid: ManifestCid1;
|
|
13419
13591
|
active_forge_cid: ActiveForgeCid;
|
|
13420
13592
|
ast_gradient_visual_mapping: GrammarPanelProfile;
|
|
@@ -14059,6 +14231,9 @@ export interface StructuralGrammarHashes {
|
|
|
14059
14231
|
*/
|
|
14060
14232
|
export interface EpistemicSecurityProfile1 {
|
|
14061
14233
|
epistemic_security?: EpistemicSecurityPolicy;
|
|
14234
|
+
clearance_tiers?: ClearanceTiers;
|
|
14235
|
+
network_boundary?: NetworkBoundary;
|
|
14236
|
+
pii_quarantine_required?: PiiQuarantineRequired;
|
|
14062
14237
|
network_isolation?: NetworkIsolation;
|
|
14063
14238
|
egress_obfuscation?: EgressObfuscation;
|
|
14064
14239
|
}
|
|
@@ -14114,7 +14289,7 @@ export interface EpistemicTopologicalProofManifest1 {
|
|
|
14114
14289
|
export interface ExecutionEnvelopeState {
|
|
14115
14290
|
trace_context: TraceContextState;
|
|
14116
14291
|
state_vector: StateVectorProfile;
|
|
14117
|
-
payload:
|
|
14292
|
+
payload: Payload3;
|
|
14118
14293
|
}
|
|
14119
14294
|
/**
|
|
14120
14295
|
* Represents the Reader/Writer monad for causality and recursion.
|
|
@@ -14142,7 +14317,7 @@ export interface ImmutableMatrix {
|
|
|
14142
14317
|
/**
|
|
14143
14318
|
* Represents the pure value payload data structure, domain-specific.
|
|
14144
14319
|
*/
|
|
14145
|
-
export interface
|
|
14320
|
+
export interface Payload3 {
|
|
14146
14321
|
[k: string]: unknown;
|
|
14147
14322
|
}
|
|
14148
14323
|
/**
|
|
@@ -14257,6 +14432,25 @@ export interface FederatedBilateralSLA2 {
|
|
|
14257
14432
|
*/
|
|
14258
14433
|
pq_signature?: PostQuantumSignatureReceipt | null;
|
|
14259
14434
|
}
|
|
14435
|
+
/**
|
|
14436
|
+
* CoReason Shared Kernel Ontology
|
|
14437
|
+
*
|
|
14438
|
+
* AGENT INSTRUCTION: Triggers the zero-copy streaming of a binary or metadata blob from a discovered peer based on its Content Identifier (CID).
|
|
14439
|
+
*
|
|
14440
|
+
* CAUSAL AFFORDANCE: Physically executes the download of decentralized assets into the local embedded LanceDB and WASM runtime.
|
|
14441
|
+
*
|
|
14442
|
+
* EPISTEMIC BOUNDS: Bounded to strict RFC 8785 CIDs.
|
|
14443
|
+
*
|
|
14444
|
+
* MCP ROUTING TRIGGERS: Content Addressing, Zero-Copy Streaming, Decentralized Fetch, IPFS, FlatBuffers
|
|
14445
|
+
*/
|
|
14446
|
+
export interface FederatedCIDFetchIntent {
|
|
14447
|
+
topology_class?: TopologyClass128;
|
|
14448
|
+
/**
|
|
14449
|
+
* A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
|
|
14450
|
+
*/
|
|
14451
|
+
target_cid: string;
|
|
14452
|
+
timeout_ms?: TimeoutMs1;
|
|
14453
|
+
}
|
|
14260
14454
|
/**
|
|
14261
14455
|
* CoReason Shared Kernel Ontology
|
|
14262
14456
|
*
|
|
@@ -14313,6 +14507,10 @@ export interface FederatedSecurityMacroManifest {
|
|
|
14313
14507
|
target_endpoint_uri: TargetEndpointUri;
|
|
14314
14508
|
required_clearance: SemanticClassificationProfile3;
|
|
14315
14509
|
max_liability_budget: MaxLiabilityBudget;
|
|
14510
|
+
/**
|
|
14511
|
+
* Content-addressed identity of the capability bundle for zero-trust verification.
|
|
14512
|
+
*/
|
|
14513
|
+
content_hash?: BundleContentHashState | null;
|
|
14316
14514
|
}
|
|
14317
14515
|
/**
|
|
14318
14516
|
* CoReason Shared Kernel Ontology
|
|
@@ -15112,6 +15310,7 @@ export interface SimulationEscrowContract1 {
|
|
|
15112
15310
|
export interface SpatialHardwareProfile1 {
|
|
15113
15311
|
compute_tier?: ComputeTier;
|
|
15114
15312
|
min_vram_gb?: MinVramGb;
|
|
15313
|
+
coreason_network_mode?: CoreasonNetworkMode;
|
|
15115
15314
|
accelerator_type?: AcceleratorType;
|
|
15116
15315
|
provider_whitelist?: ProviderWhitelist;
|
|
15117
15316
|
}
|