@coreason-ai/coreason-manifest 0.52.1 → 0.54.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/ontology.d.ts +646 -1298
- package/package.json +1 -1
package/dist/ontology.d.ts
CHANGED
|
@@ -44,11 +44,11 @@ export type TimeDerivativeVector = string | null;
|
|
|
44
44
|
*/
|
|
45
45
|
export type SteeringVectorHash = string;
|
|
46
46
|
/**
|
|
47
|
-
* The specific
|
|
47
|
+
* The specific TransformerLens hook points (e.g., 'blocks.12.hook_resid_post') where this vector must be applied.
|
|
48
48
|
*
|
|
49
49
|
* @minItems 1
|
|
50
50
|
*/
|
|
51
|
-
export type
|
|
51
|
+
export type TargetHookPoints = [string, ...string[]];
|
|
52
52
|
/**
|
|
53
53
|
* The mathematical magnitude/strength of the injection (can be negative for ablation).
|
|
54
54
|
*/
|
|
@@ -81,33 +81,10 @@ export type ExpectedInformationGain = number;
|
|
|
81
81
|
* The maximum economic expenditure authorized to run this specific scientific test.
|
|
82
82
|
*/
|
|
83
83
|
export type ExecutionCostBudgetMagnitude = number;
|
|
84
|
-
export type EpochCid = string;
|
|
85
|
-
export type TargetObjectiveCid = string | null;
|
|
86
|
-
/**
|
|
87
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
88
|
-
*/
|
|
89
|
-
export type EventCid = string;
|
|
90
|
-
/**
|
|
91
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
92
|
-
*/
|
|
93
|
-
export type PriorEventHash = string | null;
|
|
94
|
-
/**
|
|
95
|
-
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
96
|
-
*/
|
|
97
|
-
export type Timestamp = number;
|
|
98
|
-
export type TopologyClass = "epistemic_rejection";
|
|
99
|
-
export type ReceiptCid = string;
|
|
100
|
-
export type FailedProjectionCid = string;
|
|
101
|
-
export type ViolatedAlgebraicConstraint = string;
|
|
102
|
-
export type KlDivergenceToValidity = number;
|
|
103
|
-
export type StochasticMutationGradient = string;
|
|
104
|
-
export type RejectionHistory = EpistemicRejectionReceipt[];
|
|
105
|
-
export type CurrentFreeEnergy = number;
|
|
106
|
-
export type EpochStatus = "active_inference_loop";
|
|
107
84
|
/**
|
|
108
85
|
* Discriminator for breaking deadlocks within a CouncilTopologyManifest.
|
|
109
86
|
*/
|
|
110
|
-
export type
|
|
87
|
+
export type TopologyClass = "forced_adjudication";
|
|
111
88
|
/**
|
|
112
89
|
* The conflicting claim IDs or proposals the human must choose between.
|
|
113
90
|
*
|
|
@@ -133,16 +110,16 @@ export type TimeoutAction = "rollback" | "proceed_default" | "terminate";
|
|
|
133
110
|
/**
|
|
134
111
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
135
112
|
*/
|
|
136
|
-
export type
|
|
113
|
+
export type EventCid = string;
|
|
137
114
|
/**
|
|
138
115
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
139
116
|
*/
|
|
140
|
-
export type
|
|
117
|
+
export type PriorEventHash = string | null;
|
|
141
118
|
/**
|
|
142
119
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
143
120
|
*/
|
|
144
|
-
export type
|
|
145
|
-
export type
|
|
121
|
+
export type Timestamp = number;
|
|
122
|
+
export type TopologyClass1 = "adjudication_receipt";
|
|
146
123
|
/**
|
|
147
124
|
* The cryptographic pointer to the rubric dictating adjudication.
|
|
148
125
|
*/
|
|
@@ -246,7 +223,7 @@ export type EmulationFidelityTarget = number;
|
|
|
246
223
|
/**
|
|
247
224
|
* Discriminator for adversarial macro.
|
|
248
225
|
*/
|
|
249
|
-
export type
|
|
226
|
+
export type TopologyClass2 = "macro_adversarial";
|
|
250
227
|
/**
|
|
251
228
|
* Nodes assigned to the Blue Team.
|
|
252
229
|
*
|
|
@@ -324,7 +301,7 @@ export type CredentialPresentations = VerifiableCredentialPresentationReceipt[];
|
|
|
324
301
|
/**
|
|
325
302
|
* The discriminative topological boundary for agent bid intents.
|
|
326
303
|
*/
|
|
327
|
-
export type
|
|
304
|
+
export type TopologyClass3 = "agent_bid";
|
|
328
305
|
/**
|
|
329
306
|
* The NodeCIDState of the bidder.
|
|
330
307
|
*/
|
|
@@ -369,7 +346,7 @@ export type ThermodynamicBurnRate = number | null;
|
|
|
369
346
|
* The normalized Shannon Entropy of the active execution, mapped to UI color gradients (e.g., high entropy = amber warning).
|
|
370
347
|
*/
|
|
371
348
|
export type EpistemicEntropyScore = number | null;
|
|
372
|
-
export type
|
|
349
|
+
export type TopologyClass4 = "analogical_mapping_task";
|
|
373
350
|
/**
|
|
374
351
|
* Unique identifier for this lateral thinking task.
|
|
375
352
|
*/
|
|
@@ -402,7 +379,7 @@ export type AnyActionSpaceCapability = SpatialToolManifest | MCPServerManifest |
|
|
|
402
379
|
/**
|
|
403
380
|
* Discriminator type for a native tool.
|
|
404
381
|
*/
|
|
405
|
-
export type
|
|
382
|
+
export type TopologyClass5 = "native_tool";
|
|
406
383
|
/**
|
|
407
384
|
* The deterministically bounded structural identifier mapping this capability within the zero-trust manifold.
|
|
408
385
|
*/
|
|
@@ -500,7 +477,7 @@ export type IsPreemptible = boolean;
|
|
|
500
477
|
/**
|
|
501
478
|
* Discriminator type for an MCP server.
|
|
502
479
|
*/
|
|
503
|
-
export type
|
|
480
|
+
export type TopologyClass6 = "mcp_server";
|
|
504
481
|
/**
|
|
505
482
|
* A unique cryptographic identifier (CID) for this server instance.
|
|
506
483
|
*/
|
|
@@ -513,7 +490,7 @@ export type MCPTransportProfile = StdioTransportProfile | SSETransportProfile |
|
|
|
513
490
|
/**
|
|
514
491
|
* Type of transport.
|
|
515
492
|
*/
|
|
516
|
-
export type
|
|
493
|
+
export type TopologyClass7 = "stdio";
|
|
517
494
|
/**
|
|
518
495
|
* The command executable to run (e.g., 'node', 'python').
|
|
519
496
|
*/
|
|
@@ -527,7 +504,7 @@ export type Args = string[];
|
|
|
527
504
|
/**
|
|
528
505
|
* Type of transport.
|
|
529
506
|
*/
|
|
530
|
-
export type
|
|
507
|
+
export type TopologyClass8 = "sse";
|
|
531
508
|
/**
|
|
532
509
|
* The HTTP URL endpoint for the SSE connection.
|
|
533
510
|
*/
|
|
@@ -535,7 +512,7 @@ export type Uri = string;
|
|
|
535
512
|
/**
|
|
536
513
|
* Type of transport.
|
|
537
514
|
*/
|
|
538
|
-
export type
|
|
515
|
+
export type TopologyClass9 = "http";
|
|
539
516
|
/**
|
|
540
517
|
* The HTTP URL endpoint for the stateless connection.
|
|
541
518
|
*/
|
|
@@ -579,7 +556,7 @@ export type StateSynchronizationOptics = OpticalMappingContract[];
|
|
|
579
556
|
/**
|
|
580
557
|
* Discriminator type for an ephemeral namespace partition.
|
|
581
558
|
*/
|
|
582
|
-
export type
|
|
559
|
+
export type TopologyClass10 = "ephemeral_partition";
|
|
583
560
|
/**
|
|
584
561
|
* Unique identifier for this ephemeral partition.
|
|
585
562
|
*/
|
|
@@ -613,7 +590,7 @@ export type AllowSubprocessSpawning = boolean;
|
|
|
613
590
|
/**
|
|
614
591
|
* Discriminator for a zero-trust contract.
|
|
615
592
|
*/
|
|
616
|
-
export type
|
|
593
|
+
export type TopologyClass11 = "zero_trust_contract";
|
|
617
594
|
/**
|
|
618
595
|
* UUIDv7 mapping to the ledger.
|
|
619
596
|
*/
|
|
@@ -646,7 +623,7 @@ export type StructuralPostConditions = EpistemicConstraintPolicy[];
|
|
|
646
623
|
* Thermodynamic cap on SymbolicAI DbC retries.
|
|
647
624
|
*/
|
|
648
625
|
export type MaxPlanningRemediationEpochs = number;
|
|
649
|
-
export type AnyExplorationBranch = ThoughtBranchState | StochasticTopologyManifest;
|
|
626
|
+
export type AnyExplorationBranch = ThoughtBranchState | StochasticTopologyManifest | StrategicThoughtNodeIntent;
|
|
650
627
|
/**
|
|
651
628
|
* A deterministic capability pointer bounding this specific topological divergence in the Latent Scratchpad Trace.
|
|
652
629
|
*/
|
|
@@ -663,9 +640,9 @@ export type LatentContentHash = string;
|
|
|
663
640
|
* The logical validity score assigned to this branch by the Process Reward Model.
|
|
664
641
|
*/
|
|
665
642
|
export type PrmScore = number | null;
|
|
666
|
-
export type
|
|
643
|
+
export type TopologyClass12 = "thought_branch";
|
|
667
644
|
export type TopologyCid = string;
|
|
668
|
-
export type
|
|
645
|
+
export type TopologyClass13 = "stochastic_ensemble";
|
|
669
646
|
/**
|
|
670
647
|
* AGENT INSTRUCTION: Categorizes the thermodynamic phase of the generative ensemble's exploration.
|
|
671
648
|
*
|
|
@@ -689,7 +666,27 @@ export type SuperpositionCid = string;
|
|
|
689
666
|
export type WaveCollapseFunction = "plurality_vote" | "highest_confidence" | "deterministic_compiler";
|
|
690
667
|
export type ResidualEntropyVectors = string[];
|
|
691
668
|
export type EpistemicStatus = "stochastically_unbounded";
|
|
692
|
-
|
|
669
|
+
/**
|
|
670
|
+
* Discriminator for MCTS thought nodes within the strategic planning topology.
|
|
671
|
+
*/
|
|
672
|
+
export type TopologyClass14 = "strategic_thought_node";
|
|
673
|
+
/**
|
|
674
|
+
* The SHA-256 hash of the parent thought node in the MCTS tree, establishing Merkle-DAG lineage. For root nodes, use the SHA-256 hash of the initial escalation intent.
|
|
675
|
+
*/
|
|
676
|
+
export type ParentNodeHash = string;
|
|
677
|
+
/**
|
|
678
|
+
* A structured natural-language description of the proposed heuristic leap or code modification strategy.
|
|
679
|
+
*/
|
|
680
|
+
export type ProposedAction = string;
|
|
681
|
+
/**
|
|
682
|
+
* The causal reasoning chain explaining why this action is expected to resolve the epistemic deficit, including references to specific code structures or domain constraints.
|
|
683
|
+
*/
|
|
684
|
+
export type Rationale = string;
|
|
685
|
+
/**
|
|
686
|
+
* Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
|
|
687
|
+
*/
|
|
688
|
+
export type HeuristicConfidence = number;
|
|
689
|
+
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | ChaosExperimentTask | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent;
|
|
693
690
|
/**
|
|
694
691
|
* Discriminator for temporal edge invalidation.
|
|
695
692
|
*/
|
|
@@ -766,17 +763,25 @@ export type ContextPrompt = string;
|
|
|
766
763
|
*/
|
|
767
764
|
export type TimeoutAction2 = "rollback" | "proceed_default" | "terminate";
|
|
768
765
|
/**
|
|
769
|
-
* Discriminator for
|
|
766
|
+
* Discriminator for Forge-to-Claw epistemic deficit escalations.
|
|
770
767
|
*/
|
|
771
768
|
export type TopologyClass21 = "escalation";
|
|
772
769
|
/**
|
|
773
|
-
* The
|
|
770
|
+
* The fully qualified URN of the heuristic solver capability to which the deficit is being escalated.
|
|
774
771
|
*/
|
|
775
|
-
export type
|
|
772
|
+
export type TargetSolverUrn = string;
|
|
773
|
+
/**
|
|
774
|
+
* A structured natural-language description of the deterministic logic that failed, including the specific AST node, formal solver, or constraint that could not be satisfied.
|
|
775
|
+
*/
|
|
776
|
+
export type EpistemicDeficitDescription = string;
|
|
776
777
|
/**
|
|
777
|
-
*
|
|
778
|
+
* An ordered list of Content Identifiers (CIDs) representing the code artifacts, Merkle-DAG fragments, and contextual state required by the Claw agent to resolve the deficit.
|
|
778
779
|
*/
|
|
779
|
-
export type
|
|
780
|
+
export type ContextWindowCids = string[];
|
|
781
|
+
/**
|
|
782
|
+
* The maximum number of tokens the Sovereign LLM Proxy is authorized to burn for this escalation before triggering the thermodynamic circuit breaker (HTTP 429).
|
|
783
|
+
*/
|
|
784
|
+
export type ThermodynamicBudget = number;
|
|
780
785
|
/**
|
|
781
786
|
* Discriminator for geometric boundary of latent tool discovery.
|
|
782
787
|
*/
|
|
@@ -1137,10 +1142,42 @@ export type LamportClock = number;
|
|
|
1137
1142
|
* The discriminative topological boundary for compute provisioning intents.
|
|
1138
1143
|
*/
|
|
1139
1144
|
export type TopologyClass31 = "compute_provisioning";
|
|
1145
|
+
/**
|
|
1146
|
+
* The underlying orchestration engine (Mandatory: SkyPilot).
|
|
1147
|
+
*/
|
|
1148
|
+
export type ProvisioningEngine = "skypilot";
|
|
1140
1149
|
/**
|
|
1141
1150
|
* The maximum atomic cost budget allowable for the provisioned compute.
|
|
1142
1151
|
*/
|
|
1143
1152
|
export type MaxBudget = number;
|
|
1153
|
+
/**
|
|
1154
|
+
* The discrete architectural boundary of the node.
|
|
1155
|
+
*/
|
|
1156
|
+
export type ComputeTier = string;
|
|
1157
|
+
/**
|
|
1158
|
+
* The absolute physical minimum Video RAM required to load this node's latent space.
|
|
1159
|
+
*/
|
|
1160
|
+
export type MinVramGb = number;
|
|
1161
|
+
/**
|
|
1162
|
+
* The networking mode defining the P2P boundary for enterprise compliance.
|
|
1163
|
+
*/
|
|
1164
|
+
export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
|
|
1165
|
+
/**
|
|
1166
|
+
* The rigid silicon precision format required to execute this node's neural circuits.
|
|
1167
|
+
*/
|
|
1168
|
+
export type AcceleratorType = string;
|
|
1169
|
+
/**
|
|
1170
|
+
* The explicit array of cloud infrastructure providers authorized to run this node.
|
|
1171
|
+
*/
|
|
1172
|
+
export type ProviderWhitelist = string[];
|
|
1173
|
+
/**
|
|
1174
|
+
* If True, SkyPilot will hunt for the cheapest spot instances and handle managed recovery.
|
|
1175
|
+
*/
|
|
1176
|
+
export type UseSpot = boolean;
|
|
1177
|
+
/**
|
|
1178
|
+
* The idle timeout after which SkyPilot will automatically terminate the cluster.
|
|
1179
|
+
*/
|
|
1180
|
+
export type AutostopIdleMinutes = number | null;
|
|
1144
1181
|
/**
|
|
1145
1182
|
* The minimal functional capabilities required by the requested compute.
|
|
1146
1183
|
*
|
|
@@ -1188,7 +1225,7 @@ export type TimeoutSeconds = number;
|
|
|
1188
1225
|
/**
|
|
1189
1226
|
* The action to take when the timeout expires.
|
|
1190
1227
|
*/
|
|
1191
|
-
export type
|
|
1228
|
+
export type TimeoutAction3 = "fail_safe" | "proceed_with_defaults" | "escalate";
|
|
1192
1229
|
/**
|
|
1193
1230
|
* A summary of the context requiring intervention.
|
|
1194
1231
|
*/
|
|
@@ -1527,15 +1564,15 @@ export type Faults = FaultInjectionProfile[];
|
|
|
1527
1564
|
/**
|
|
1528
1565
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
1529
1566
|
*/
|
|
1530
|
-
export type
|
|
1567
|
+
export type EventCid1 = string;
|
|
1531
1568
|
/**
|
|
1532
1569
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
1533
1570
|
*/
|
|
1534
|
-
export type
|
|
1571
|
+
export type PriorEventHash1 = string | null;
|
|
1535
1572
|
/**
|
|
1536
1573
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
1537
1574
|
*/
|
|
1538
|
-
export type
|
|
1575
|
+
export type Timestamp1 = number;
|
|
1539
1576
|
/**
|
|
1540
1577
|
* Discriminator type for an exogenous event.
|
|
1541
1578
|
*/
|
|
@@ -1799,32 +1836,10 @@ export type From = string | null;
|
|
|
1799
1836
|
* Cryptographic proof that this mutation was sanitized by the Symbolic Firewall.
|
|
1800
1837
|
*/
|
|
1801
1838
|
export type ZeroTrustReceiptCid = string | null;
|
|
1802
|
-
/**
|
|
1803
|
-
* Discriminator for the FederatedDiscoveryIntent topology.
|
|
1804
|
-
*/
|
|
1805
|
-
export type TopologyClass61 = "federated_discovery";
|
|
1806
|
-
/**
|
|
1807
|
-
* The bounded set of URN namespaces to interrogate during sovereign oracle discovery.
|
|
1808
|
-
*
|
|
1809
|
-
* @maxItems 1000
|
|
1810
|
-
*/
|
|
1811
|
-
export type DomainFilter = string[];
|
|
1812
|
-
/**
|
|
1813
|
-
* A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
|
|
1814
|
-
*/
|
|
1815
|
-
export type BundleContentHashState = string;
|
|
1816
|
-
/**
|
|
1817
|
-
* The maximum number of P2P network hops allowed.
|
|
1818
|
-
*/
|
|
1819
|
-
export type MaxNetworkHops = number;
|
|
1820
|
-
/**
|
|
1821
|
-
* The minimum security clearance required from the discovered execution substrates.
|
|
1822
|
-
*/
|
|
1823
|
-
export type RequiredSecurityClearance = "PUBLIC" | "CONFIDENTIAL" | "RESTRICTED";
|
|
1824
1839
|
/**
|
|
1825
1840
|
* Discriminator for the OntologicalNormalizationIntent topology.
|
|
1826
1841
|
*/
|
|
1827
|
-
export type
|
|
1842
|
+
export type TopologyClass61 = "ontological_normalization";
|
|
1828
1843
|
/**
|
|
1829
1844
|
* The Content Identifier (CID) of the raw ingested data artifact.
|
|
1830
1845
|
*/
|
|
@@ -1886,27 +1901,7 @@ export type Description3 = string;
|
|
|
1886
1901
|
/**
|
|
1887
1902
|
* Discriminator for an Agent node.
|
|
1888
1903
|
*/
|
|
1889
|
-
export type
|
|
1890
|
-
/**
|
|
1891
|
-
* The discrete architectural boundary of the node.
|
|
1892
|
-
*/
|
|
1893
|
-
export type ComputeTier = string;
|
|
1894
|
-
/**
|
|
1895
|
-
* The absolute physical minimum Video RAM required to load this node's latent space.
|
|
1896
|
-
*/
|
|
1897
|
-
export type MinVramGb = number;
|
|
1898
|
-
/**
|
|
1899
|
-
* The networking mode defining the P2P boundary for enterprise compliance.
|
|
1900
|
-
*/
|
|
1901
|
-
export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
|
|
1902
|
-
/**
|
|
1903
|
-
* The rigid silicon precision format required to execute this node's neural circuits.
|
|
1904
|
-
*/
|
|
1905
|
-
export type AcceleratorType = string;
|
|
1906
|
-
/**
|
|
1907
|
-
* The explicit array of cloud infrastructure providers authorized to run this node.
|
|
1908
|
-
*/
|
|
1909
|
-
export type ProviderWhitelist = string[];
|
|
1904
|
+
export type TopologyClass62 = "agent";
|
|
1910
1905
|
/**
|
|
1911
1906
|
* The level of hardware-enforced cryptographic isolation required.
|
|
1912
1907
|
*/
|
|
@@ -2001,7 +1996,7 @@ export type MaxRetriesOnSemanticTax = number;
|
|
|
2001
1996
|
*/
|
|
2002
1997
|
export type PermittedRemoteDecodingProtocols = string[];
|
|
2003
1998
|
/**
|
|
2004
|
-
* The minimum
|
|
1999
|
+
* The minimum SPIFFE/SPIRE workload identity perimeter required for the hardware.
|
|
2005
2000
|
*/
|
|
2006
2001
|
export type EpistemicSecurityPolicy1 = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
|
|
2007
2002
|
/**
|
|
@@ -2095,13 +2090,13 @@ export type EnforceFunctionalIsolation = boolean;
|
|
|
2095
2090
|
*/
|
|
2096
2091
|
export type PermittedClassificationTiers = [SemanticClassificationProfile, ...SemanticClassificationProfile[]];
|
|
2097
2092
|
/**
|
|
2098
|
-
* AGENT INSTRUCTION: Implements
|
|
2093
|
+
* AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
|
|
2099
2094
|
*
|
|
2100
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads.
|
|
2095
|
+
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
|
|
2101
2096
|
*
|
|
2102
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized
|
|
2097
|
+
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
|
|
2103
2098
|
*
|
|
2104
|
-
* MCP ROUTING TRIGGERS:
|
|
2099
|
+
* MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
|
|
2105
2100
|
*/
|
|
2106
2101
|
export type SemanticClassificationProfile = "public" | "internal" | "confidential" | "restricted";
|
|
2107
2102
|
/**
|
|
@@ -2212,11 +2207,11 @@ export type TriggerConditions = [
|
|
|
2212
2207
|
...("on_tool_call" | "on_belief_mutation" | "on_quarantine" | "on_falsification")[]
|
|
2213
2208
|
];
|
|
2214
2209
|
/**
|
|
2215
|
-
* The specific
|
|
2210
|
+
* The specific TransformerLens hook points the execution engine must extract from.
|
|
2216
2211
|
*
|
|
2217
2212
|
* @minItems 1
|
|
2218
2213
|
*/
|
|
2219
|
-
export type
|
|
2214
|
+
export type TargetHookPoints1 = [string, ...string[]];
|
|
2220
2215
|
/**
|
|
2221
2216
|
* The top-k features to extract, preventing VRAM exhaustion.
|
|
2222
2217
|
*/
|
|
@@ -2314,7 +2309,7 @@ export type DomainExtensions1 = {
|
|
|
2314
2309
|
/**
|
|
2315
2310
|
* Discriminator for a Human node.
|
|
2316
2311
|
*/
|
|
2317
|
-
export type
|
|
2312
|
+
export type TopologyClass63 = "human";
|
|
2318
2313
|
/**
|
|
2319
2314
|
* The mandatory cryptographic attestation URN required to verify the human operator's identity.
|
|
2320
2315
|
*/
|
|
@@ -2344,7 +2339,7 @@ export type DomainExtensions2 = {
|
|
|
2344
2339
|
/**
|
|
2345
2340
|
* Discriminator for a System node.
|
|
2346
2341
|
*/
|
|
2347
|
-
export type
|
|
2342
|
+
export type TopologyClass64 = "system";
|
|
2348
2343
|
/**
|
|
2349
2344
|
* The semantic boundary defining the objective function or computational perimeter of the execution node.
|
|
2350
2345
|
*/
|
|
@@ -2370,7 +2365,7 @@ export type DomainExtensions3 = {
|
|
|
2370
2365
|
/**
|
|
2371
2366
|
* Discriminator for a Composite node.
|
|
2372
2367
|
*/
|
|
2373
|
-
export type
|
|
2368
|
+
export type TopologyClass65 = "composite";
|
|
2374
2369
|
/**
|
|
2375
2370
|
* Entropy Penalty applied per edge traversal during a defeasible cascade.
|
|
2376
2371
|
*/
|
|
@@ -2428,13 +2423,13 @@ export type Active1 = boolean;
|
|
|
2428
2423
|
*/
|
|
2429
2424
|
export type RuleCid = string;
|
|
2430
2425
|
/**
|
|
2431
|
-
* AGENT INSTRUCTION: Implements
|
|
2426
|
+
* AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
|
|
2432
2427
|
*
|
|
2433
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads.
|
|
2428
|
+
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
|
|
2434
2429
|
*
|
|
2435
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized
|
|
2430
|
+
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
|
|
2436
2431
|
*
|
|
2437
|
-
* MCP ROUTING TRIGGERS:
|
|
2432
|
+
* MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
|
|
2438
2433
|
*/
|
|
2439
2434
|
export type SemanticClassificationProfile1 = "public" | "internal" | "confidential" | "restricted";
|
|
2440
2435
|
/**
|
|
@@ -2474,11 +2469,11 @@ export type ActionOnViolation = "drop" | "quarantine" | "redact";
|
|
|
2474
2469
|
*/
|
|
2475
2470
|
export type TargetFeatureIndex = number;
|
|
2476
2471
|
/**
|
|
2477
|
-
* The specific
|
|
2472
|
+
* The specific TransformerLens hook points where this feature activation must be monitored.
|
|
2478
2473
|
*
|
|
2479
2474
|
* @minItems 1
|
|
2480
2475
|
*/
|
|
2481
|
-
export type
|
|
2476
|
+
export type MonitoredHookPoints = [string, ...string[]];
|
|
2482
2477
|
/**
|
|
2483
2478
|
* The mathematical magnitude limit. If the feature activates beyond this, the firewall trips.
|
|
2484
2479
|
*/
|
|
@@ -2590,7 +2585,7 @@ export type FoveatedPrivacyEpsilon = number | null;
|
|
|
2590
2585
|
/**
|
|
2591
2586
|
* Discriminator for a DAG topology.
|
|
2592
2587
|
*/
|
|
2593
|
-
export type
|
|
2588
|
+
export type TopologyClass66 = "dag";
|
|
2594
2589
|
/**
|
|
2595
2590
|
* The strict, topologically bounded matrix of directed causal edges.
|
|
2596
2591
|
*/
|
|
@@ -2674,7 +2669,7 @@ export type Justification7 = string | null;
|
|
|
2674
2669
|
/**
|
|
2675
2670
|
* Discriminator for a Council topology.
|
|
2676
2671
|
*/
|
|
2677
|
-
export type
|
|
2672
|
+
export type TopologyClass67 = "council";
|
|
2678
2673
|
/**
|
|
2679
2674
|
* The minimum number of adversarial or 'Devil's Advocate' roles required to prevent groupthink.
|
|
2680
2675
|
*/
|
|
@@ -2746,7 +2741,7 @@ export type Justification8 = string | null;
|
|
|
2746
2741
|
/**
|
|
2747
2742
|
* Discriminator for a Swarm topology.
|
|
2748
2743
|
*/
|
|
2749
|
-
export type
|
|
2744
|
+
export type TopologyClass68 = "swarm";
|
|
2750
2745
|
/**
|
|
2751
2746
|
* Threshold limit for dynamic spawning of additional nodes.
|
|
2752
2747
|
*/
|
|
@@ -2828,7 +2823,7 @@ export type Justification9 = string | null;
|
|
|
2828
2823
|
/**
|
|
2829
2824
|
* Discriminator for an Evolutionary topology.
|
|
2830
2825
|
*/
|
|
2831
|
-
export type
|
|
2826
|
+
export type TopologyClass69 = "evolutionary";
|
|
2832
2827
|
/**
|
|
2833
2828
|
* The absolute limit on evolutionary breeding cycles.
|
|
2834
2829
|
*/
|
|
@@ -2888,7 +2883,7 @@ export type Justification10 = string | null;
|
|
|
2888
2883
|
/**
|
|
2889
2884
|
* Discriminator for SMPC Topology.
|
|
2890
2885
|
*/
|
|
2891
|
-
export type
|
|
2886
|
+
export type TopologyClass70 = "smpc";
|
|
2892
2887
|
/**
|
|
2893
2888
|
* The exact cryptographic P2P protocol the nodes must use to evaluate the function.
|
|
2894
2889
|
*/
|
|
@@ -2918,7 +2913,7 @@ export type Justification11 = string | null;
|
|
|
2918
2913
|
/**
|
|
2919
2914
|
* Discriminator for an Evaluator-Optimizer loop.
|
|
2920
2915
|
*/
|
|
2921
|
-
export type
|
|
2916
|
+
export type TopologyClass71 = "evaluator_optimizer";
|
|
2922
2917
|
/**
|
|
2923
2918
|
* The absolute limit on Actor-Critic cycles to prevent infinite compute burn.
|
|
2924
2919
|
*/
|
|
@@ -2942,7 +2937,7 @@ export type Justification12 = string | null;
|
|
|
2942
2937
|
/**
|
|
2943
2938
|
* Discriminator for a Digital Twin topology.
|
|
2944
2939
|
*/
|
|
2945
|
-
export type
|
|
2940
|
+
export type TopologyClass72 = "digital_twin";
|
|
2946
2941
|
/**
|
|
2947
2942
|
* The identifier (expected to be a W3C DID) pointing to the real-world topology it is cloning.
|
|
2948
2943
|
*/
|
|
@@ -2962,7 +2957,7 @@ export type EnforceNoSideEffects = boolean;
|
|
|
2962
2957
|
/**
|
|
2963
2958
|
* Discriminator for federation macro.
|
|
2964
2959
|
*/
|
|
2965
|
-
export type
|
|
2960
|
+
export type TopologyClass73 = "macro_federation";
|
|
2966
2961
|
/**
|
|
2967
2962
|
* The nodes forming the PBFT ring.
|
|
2968
2963
|
*
|
|
@@ -2984,7 +2979,7 @@ export type Justification13 = string | null;
|
|
|
2984
2979
|
/**
|
|
2985
2980
|
* Discriminator for forge macro.
|
|
2986
2981
|
*/
|
|
2987
|
-
export type
|
|
2982
|
+
export type TopologyClass74 = "macro_forge";
|
|
2988
2983
|
/**
|
|
2989
2984
|
* The structural 128-char DID boundary pointing to the foundational semantic deficit vector.
|
|
2990
2985
|
*/
|
|
@@ -3012,7 +3007,7 @@ export type Justification14 = string | null;
|
|
|
3012
3007
|
/**
|
|
3013
3008
|
* Discriminator for the elicitation macro.
|
|
3014
3009
|
*/
|
|
3015
|
-
export type
|
|
3010
|
+
export type TopologyClass75 = "macro_elicitation";
|
|
3016
3011
|
/**
|
|
3017
3012
|
* The anchor to the initial, unstructured MultimodalArtifactReceipt uploaded by the human.
|
|
3018
3013
|
*/
|
|
@@ -3036,7 +3031,7 @@ export type Justification15 = string | null;
|
|
|
3036
3031
|
/**
|
|
3037
3032
|
* Discriminator for the ingestion macro.
|
|
3038
3033
|
*/
|
|
3039
|
-
export type
|
|
3034
|
+
export type TopologyClass76 = "macro_ingestion";
|
|
3040
3035
|
/**
|
|
3041
3036
|
* Target serialization format.
|
|
3042
3037
|
*/
|
|
@@ -3056,7 +3051,7 @@ export type Justification16 = string | null;
|
|
|
3056
3051
|
/**
|
|
3057
3052
|
* Discriminator for a macro neurosymbolic loop.
|
|
3058
3053
|
*/
|
|
3059
|
-
export type
|
|
3054
|
+
export type TopologyClass77 = "macro_neurosymbolic";
|
|
3060
3055
|
/**
|
|
3061
3056
|
* The connectionist agent generating hypotheses.
|
|
3062
3057
|
*/
|
|
@@ -3076,7 +3071,7 @@ export type CritiqueSchemaCid = string | null;
|
|
|
3076
3071
|
/**
|
|
3077
3072
|
* Discriminator for a discourse tree topology.
|
|
3078
3073
|
*/
|
|
3079
|
-
export type
|
|
3074
|
+
export type TopologyClass78 = "discourse_tree";
|
|
3080
3075
|
/**
|
|
3081
3076
|
* Cryptographic identifier for this topology.
|
|
3082
3077
|
*/
|
|
@@ -3089,7 +3084,7 @@ export type DiscourseType = "preamble" | "methodology" | "argumentation" | "find
|
|
|
3089
3084
|
* Explicit pointers linking this discourse block to the specific AtomicPropositionState nodes extracted from its text.
|
|
3090
3085
|
*/
|
|
3091
3086
|
export type ContainedPropositions = NodeCIDState[];
|
|
3092
|
-
export type
|
|
3087
|
+
export type TopologyClass79 = "document_knowledge_graph";
|
|
3093
3088
|
export type GraphCid = string;
|
|
3094
3089
|
export type SourceArtifactCid2 = string;
|
|
3095
3090
|
/**
|
|
@@ -3153,7 +3148,7 @@ export type CiphertextBlob = string;
|
|
|
3153
3148
|
/**
|
|
3154
3149
|
* Discriminator for manifold mapping.
|
|
3155
3150
|
*/
|
|
3156
|
-
export type
|
|
3151
|
+
export type TopologyClass80 = "manifold_mapping";
|
|
3157
3152
|
/**
|
|
3158
3153
|
* Calculated geometric alignment between the semantic embedding and spatial tensor.
|
|
3159
3154
|
*/
|
|
@@ -3171,7 +3166,7 @@ export type Nodes12 = SemanticNodeState[];
|
|
|
3171
3166
|
*/
|
|
3172
3167
|
export type CausalEdges = CausalDirectedEdgeState[];
|
|
3173
3168
|
export type IsomorphismHash = string;
|
|
3174
|
-
export type
|
|
3169
|
+
export type TopologyClass81 = "hierarchical_dom";
|
|
3175
3170
|
export type DomCid = string;
|
|
3176
3171
|
export type RootBlockCid = string;
|
|
3177
3172
|
/**
|
|
@@ -3263,7 +3258,7 @@ export type DomainExtensions4 = {
|
|
|
3263
3258
|
/**
|
|
3264
3259
|
* Discriminator for a Memoized node.
|
|
3265
3260
|
*/
|
|
3266
|
-
export type
|
|
3261
|
+
export type TopologyClass82 = "memoized";
|
|
3267
3262
|
/**
|
|
3268
3263
|
* A discriminated union of presentation UI panels.
|
|
3269
3264
|
*/
|
|
@@ -3276,7 +3271,7 @@ export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | Cros
|
|
|
3276
3271
|
/**
|
|
3277
3272
|
* Discriminator for temporal graph crdt.
|
|
3278
3273
|
*/
|
|
3279
|
-
export type
|
|
3274
|
+
export type TopologyClass83 = "temporal_graph_crdt";
|
|
3280
3275
|
/**
|
|
3281
3276
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark.
|
|
3282
3277
|
*/
|
|
@@ -3297,40 +3292,40 @@ export type AddSet = NodeCIDState[];
|
|
|
3297
3292
|
* The set of non-monotonic timeline caps.
|
|
3298
3293
|
*/
|
|
3299
3294
|
export type TerminateSet = TemporalEdgeInvalidationIntent[];
|
|
3300
|
-
export type
|
|
3295
|
+
export type TopologyClass84 = "mcp_tool_definition";
|
|
3301
3296
|
/**
|
|
3302
3297
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3303
3298
|
*/
|
|
3304
|
-
export type
|
|
3299
|
+
export type EventCid2 = string;
|
|
3305
3300
|
/**
|
|
3306
3301
|
* The RFC 8785 Canonical hash of the immediate causal ancestor event. Null for genesis nodes.
|
|
3307
3302
|
*/
|
|
3308
|
-
export type
|
|
3309
|
-
export type
|
|
3303
|
+
export type PriorEventHash2 = string | null;
|
|
3304
|
+
export type Timestamp2 = number;
|
|
3310
3305
|
export type Name = string;
|
|
3311
3306
|
export type Description9 = string;
|
|
3312
|
-
export type
|
|
3313
|
-
export type
|
|
3314
|
-
export type
|
|
3315
|
-
export type
|
|
3316
|
-
export type
|
|
3307
|
+
export type EventCid3 = string;
|
|
3308
|
+
export type PriorEventHash3 = string | null;
|
|
3309
|
+
export type Timestamp3 = number;
|
|
3310
|
+
export type TopologyClass85 = "crosswalk_resolution";
|
|
3311
|
+
export type ReceiptCid = string;
|
|
3317
3312
|
export type TargetGraphCid3 = string;
|
|
3318
3313
|
/**
|
|
3319
3314
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3320
3315
|
*/
|
|
3321
|
-
export type
|
|
3316
|
+
export type EventCid4 = string;
|
|
3322
3317
|
/**
|
|
3323
3318
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3324
3319
|
*/
|
|
3325
|
-
export type
|
|
3320
|
+
export type PriorEventHash4 = string | null;
|
|
3326
3321
|
/**
|
|
3327
3322
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3328
3323
|
*/
|
|
3329
|
-
export type
|
|
3324
|
+
export type Timestamp4 = number;
|
|
3330
3325
|
/**
|
|
3331
3326
|
* Discriminator for a zero-trust receipt.
|
|
3332
3327
|
*/
|
|
3333
|
-
export type
|
|
3328
|
+
export type TopologyClass86 = "zero_trust_receipt";
|
|
3334
3329
|
/**
|
|
3335
3330
|
* Pointer to the originating EpistemicZeroTrustContract.
|
|
3336
3331
|
*/
|
|
@@ -3354,19 +3349,19 @@ export type TransmutedPayloadHash = string;
|
|
|
3354
3349
|
/**
|
|
3355
3350
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3356
3351
|
*/
|
|
3357
|
-
export type
|
|
3352
|
+
export type EventCid5 = string;
|
|
3358
3353
|
/**
|
|
3359
3354
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3360
3355
|
*/
|
|
3361
|
-
export type
|
|
3356
|
+
export type PriorEventHash5 = string | null;
|
|
3362
3357
|
/**
|
|
3363
3358
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3364
3359
|
*/
|
|
3365
|
-
export type
|
|
3360
|
+
export type Timestamp5 = number;
|
|
3366
3361
|
/**
|
|
3367
3362
|
* Discriminator type for an observation event.
|
|
3368
3363
|
*/
|
|
3369
|
-
export type
|
|
3364
|
+
export type TopologyClass87 = "observation";
|
|
3370
3365
|
/**
|
|
3371
3366
|
* The URN representing the physical silicon architecture generating the root-of-trust quote (e.g., 'urn:coreason:enclave:intel_tdx').
|
|
3372
3367
|
*/
|
|
@@ -3386,7 +3381,7 @@ export type AnyToolchainState = BrowserDOMState | TerminalBufferState;
|
|
|
3386
3381
|
/**
|
|
3387
3382
|
* Discriminator for Causal Actuators representing structural shifts.
|
|
3388
3383
|
*/
|
|
3389
|
-
export type
|
|
3384
|
+
export type TopologyClass88 = "browser";
|
|
3390
3385
|
/**
|
|
3391
3386
|
* Spatial Execution Bounds where the agent interacts.
|
|
3392
3387
|
*/
|
|
@@ -3413,7 +3408,7 @@ export type ScreenshotCid = string | null;
|
|
|
3413
3408
|
/**
|
|
3414
3409
|
* Discriminator for Causal Actuators on structural buffers.
|
|
3415
3410
|
*/
|
|
3416
|
-
export type
|
|
3411
|
+
export type TopologyClass89 = "terminal";
|
|
3417
3412
|
/**
|
|
3418
3413
|
* Capability Perimeters defining context bounds.
|
|
3419
3414
|
*/
|
|
@@ -3499,19 +3494,19 @@ export type MaxLookbackWindow = number;
|
|
|
3499
3494
|
/**
|
|
3500
3495
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3501
3496
|
*/
|
|
3502
|
-
export type
|
|
3497
|
+
export type EventCid6 = string;
|
|
3503
3498
|
/**
|
|
3504
3499
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3505
3500
|
*/
|
|
3506
|
-
export type
|
|
3501
|
+
export type PriorEventHash6 = string | null;
|
|
3507
3502
|
/**
|
|
3508
3503
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3509
3504
|
*/
|
|
3510
|
-
export type
|
|
3505
|
+
export type Timestamp6 = number;
|
|
3511
3506
|
/**
|
|
3512
3507
|
* Discriminator type for a Belief Assertion event.
|
|
3513
3508
|
*/
|
|
3514
|
-
export type
|
|
3509
|
+
export type TopologyClass90 = "belief_mutation";
|
|
3515
3510
|
/**
|
|
3516
3511
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the source event in the Merkle-DAG.
|
|
3517
3512
|
*/
|
|
@@ -3551,32 +3546,32 @@ export type QuorumSignatures = string[];
|
|
|
3551
3546
|
/**
|
|
3552
3547
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3553
3548
|
*/
|
|
3554
|
-
export type
|
|
3549
|
+
export type EventCid7 = string;
|
|
3555
3550
|
/**
|
|
3556
3551
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3557
3552
|
*/
|
|
3558
|
-
export type
|
|
3553
|
+
export type PriorEventHash7 = string | null;
|
|
3559
3554
|
/**
|
|
3560
3555
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3561
3556
|
*/
|
|
3562
|
-
export type
|
|
3557
|
+
export type Timestamp7 = number;
|
|
3563
3558
|
/**
|
|
3564
3559
|
* Discriminator type for a system fault event.
|
|
3565
3560
|
*/
|
|
3566
|
-
export type
|
|
3567
|
-
export type
|
|
3561
|
+
export type TopologyClass91 = "system_fault";
|
|
3562
|
+
export type TopologyClass92 = "atomic_proposition";
|
|
3568
3563
|
/**
|
|
3569
3564
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3570
3565
|
*/
|
|
3571
|
-
export type
|
|
3566
|
+
export type EventCid8 = string;
|
|
3572
3567
|
/**
|
|
3573
3568
|
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
3574
3569
|
*/
|
|
3575
|
-
export type
|
|
3570
|
+
export type PriorEventHash8 = string | null;
|
|
3576
3571
|
/**
|
|
3577
3572
|
* The precise temporal coordinate of the event realization.
|
|
3578
3573
|
*/
|
|
3579
|
-
export type
|
|
3574
|
+
export type Timestamp8 = number;
|
|
3580
3575
|
/**
|
|
3581
3576
|
* A Content Identifier (CID) bounding this specific extracted proposition.
|
|
3582
3577
|
*/
|
|
@@ -3621,19 +3616,19 @@ export type UpperBound = number | null;
|
|
|
3621
3616
|
* Explicit mathematical boundaries extracted from the text that empirically limit the certainty or scope of the proposition.
|
|
3622
3617
|
*/
|
|
3623
3618
|
export type StatisticalQualifiers = EmpiricalStatisticalProfile[];
|
|
3624
|
-
export type
|
|
3619
|
+
export type TopologyClass93 = "post_coordinated_concept";
|
|
3625
3620
|
/**
|
|
3626
3621
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3627
3622
|
*/
|
|
3628
|
-
export type
|
|
3623
|
+
export type EventCid9 = string;
|
|
3629
3624
|
/**
|
|
3630
3625
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
3631
3626
|
*/
|
|
3632
|
-
export type
|
|
3627
|
+
export type PriorEventHash9 = string | null;
|
|
3633
3628
|
/**
|
|
3634
3629
|
* The precise temporal coordinate of the event realization.
|
|
3635
3630
|
*/
|
|
3636
|
-
export type
|
|
3631
|
+
export type Timestamp9 = number;
|
|
3637
3632
|
/**
|
|
3638
3633
|
* The unique geometric coordinate representing this specific assembled concept.
|
|
3639
3634
|
*/
|
|
@@ -3646,10 +3641,10 @@ export type ManifoldAlignmentMetricProfile1 = "gromov_wasserstein" | "earth_move
|
|
|
3646
3641
|
* The exact mathematical fidelity achieved during projection.
|
|
3647
3642
|
*/
|
|
3648
3643
|
export type IsometryScore = number;
|
|
3649
|
-
export type
|
|
3650
|
-
export type
|
|
3651
|
-
export type
|
|
3652
|
-
export type
|
|
3644
|
+
export type EventCid10 = string;
|
|
3645
|
+
export type PriorEventHash10 = string | null;
|
|
3646
|
+
export type Timestamp10 = number;
|
|
3647
|
+
export type TopologyClass94 = "artifact_corruption";
|
|
3653
3648
|
/**
|
|
3654
3649
|
* The genesis artifact that caused the ingestion engine to crash.
|
|
3655
3650
|
*/
|
|
@@ -3659,19 +3654,19 @@ export type DiagnosticHash = string;
|
|
|
3659
3654
|
/**
|
|
3660
3655
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3661
3656
|
*/
|
|
3662
|
-
export type
|
|
3657
|
+
export type EventCid11 = string;
|
|
3663
3658
|
/**
|
|
3664
3659
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3665
3660
|
*/
|
|
3666
|
-
export type
|
|
3661
|
+
export type PriorEventHash11 = string | null;
|
|
3667
3662
|
/**
|
|
3668
3663
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3669
3664
|
*/
|
|
3670
|
-
export type
|
|
3665
|
+
export type Timestamp11 = number;
|
|
3671
3666
|
/**
|
|
3672
3667
|
* Discriminator for a hypothesis generation event.
|
|
3673
3668
|
*/
|
|
3674
|
-
export type
|
|
3669
|
+
export type TopologyClass95 = "hypothesis";
|
|
3675
3670
|
/**
|
|
3676
3671
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this abductive leap to the Merkle-DAG.
|
|
3677
3672
|
*/
|
|
@@ -3713,19 +3708,19 @@ export type CausalEdges1 = CausalDirectedEdgeState[];
|
|
|
3713
3708
|
/**
|
|
3714
3709
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3715
3710
|
*/
|
|
3716
|
-
export type
|
|
3711
|
+
export type EventCid12 = string;
|
|
3717
3712
|
/**
|
|
3718
3713
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3719
3714
|
*/
|
|
3720
|
-
export type
|
|
3715
|
+
export type PriorEventHash12 = string | null;
|
|
3721
3716
|
/**
|
|
3722
3717
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3723
3718
|
*/
|
|
3724
|
-
export type
|
|
3719
|
+
export type Timestamp12 = number;
|
|
3725
3720
|
/**
|
|
3726
3721
|
* Discriminator type for a barge-in interruption event.
|
|
3727
3722
|
*/
|
|
3728
|
-
export type
|
|
3723
|
+
export type TopologyClass96 = "barge_in";
|
|
3729
3724
|
/**
|
|
3730
3725
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the active node generation cycle that was killed in the Merkle-DAG.
|
|
3731
3726
|
*/
|
|
@@ -3743,19 +3738,19 @@ export type EpistemicDisposition = "discard" | "retain_as_context" | "mark_as_fa
|
|
|
3743
3738
|
/**
|
|
3744
3739
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3745
3740
|
*/
|
|
3746
|
-
export type
|
|
3741
|
+
export type EventCid13 = string;
|
|
3747
3742
|
/**
|
|
3748
3743
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3749
3744
|
*/
|
|
3750
|
-
export type
|
|
3745
|
+
export type PriorEventHash13 = string | null;
|
|
3751
3746
|
/**
|
|
3752
3747
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3753
3748
|
*/
|
|
3754
|
-
export type
|
|
3749
|
+
export type Timestamp13 = number;
|
|
3755
3750
|
/**
|
|
3756
3751
|
* Discriminator type for a counterfactual regret event.
|
|
3757
3752
|
*/
|
|
3758
|
-
export type
|
|
3753
|
+
export type TopologyClass97 = "counterfactual_regret";
|
|
3759
3754
|
/**
|
|
3760
3755
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the specific historical state node where the agent mathematically diverged to simulate an alternative path.
|
|
3761
3756
|
*/
|
|
@@ -3779,19 +3774,19 @@ export type EpistemicRegret = number;
|
|
|
3779
3774
|
/**
|
|
3780
3775
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3781
3776
|
*/
|
|
3782
|
-
export type
|
|
3777
|
+
export type EventCid14 = string;
|
|
3783
3778
|
/**
|
|
3784
3779
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3785
3780
|
*/
|
|
3786
|
-
export type
|
|
3781
|
+
export type PriorEventHash14 = string | null;
|
|
3787
3782
|
/**
|
|
3788
3783
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3789
3784
|
*/
|
|
3790
|
-
export type
|
|
3785
|
+
export type Timestamp14 = number;
|
|
3791
3786
|
/**
|
|
3792
3787
|
* Discriminator type for a tool invocation event.
|
|
3793
3788
|
*/
|
|
3794
|
-
export type
|
|
3789
|
+
export type TopologyClass98 = "tool_invocation";
|
|
3795
3790
|
/**
|
|
3796
3791
|
* The exact tool targeted in the CognitiveActionSpaceManifest.
|
|
3797
3792
|
*/
|
|
@@ -3803,19 +3798,19 @@ export type AuthorizedBudgetMagnitude = number;
|
|
|
3803
3798
|
/**
|
|
3804
3799
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3805
3800
|
*/
|
|
3806
|
-
export type
|
|
3801
|
+
export type EventCid15 = string;
|
|
3807
3802
|
/**
|
|
3808
3803
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3809
3804
|
*/
|
|
3810
|
-
export type
|
|
3805
|
+
export type PriorEventHash15 = string | null;
|
|
3811
3806
|
/**
|
|
3812
3807
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3813
3808
|
*/
|
|
3814
|
-
export type
|
|
3809
|
+
export type Timestamp15 = number;
|
|
3815
3810
|
/**
|
|
3816
3811
|
* Discriminator type for an epistemic promotion event.
|
|
3817
3812
|
*/
|
|
3818
|
-
export type
|
|
3813
|
+
export type TopologyClass99 = "epistemic_promotion";
|
|
3819
3814
|
/**
|
|
3820
3815
|
* The strict array of CIDs (Content Identifiers) representing the raw logs being compressed and archived.
|
|
3821
3816
|
*/
|
|
@@ -3831,23 +3826,23 @@ export type CompressionRatio = number;
|
|
|
3831
3826
|
/**
|
|
3832
3827
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3833
3828
|
*/
|
|
3834
|
-
export type
|
|
3829
|
+
export type EventCid16 = string;
|
|
3835
3830
|
/**
|
|
3836
3831
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3837
3832
|
*/
|
|
3838
|
-
export type
|
|
3833
|
+
export type PriorEventHash16 = string | null;
|
|
3839
3834
|
/**
|
|
3840
3835
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3841
3836
|
*/
|
|
3842
|
-
export type
|
|
3837
|
+
export type Timestamp16 = number;
|
|
3843
3838
|
/**
|
|
3844
3839
|
* Discriminator type for a normative drift event.
|
|
3845
3840
|
*/
|
|
3846
|
-
export type
|
|
3841
|
+
export type TopologyClass100 = "normative_drift";
|
|
3847
3842
|
/**
|
|
3848
3843
|
* The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
|
|
3849
3844
|
*/
|
|
3850
|
-
export type
|
|
3845
|
+
export type TrippedRuleCid = string;
|
|
3851
3846
|
/**
|
|
3852
3847
|
* The calculated probabilistic delta showing how far the swarm's observed reality is diverging from the static rule.
|
|
3853
3848
|
*/
|
|
@@ -3859,19 +3854,19 @@ export type ContradictionProofHash = string;
|
|
|
3859
3854
|
/**
|
|
3860
3855
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3861
3856
|
*/
|
|
3862
|
-
export type
|
|
3857
|
+
export type EventCid17 = string;
|
|
3863
3858
|
/**
|
|
3864
3859
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3865
3860
|
*/
|
|
3866
|
-
export type
|
|
3861
|
+
export type PriorEventHash17 = string | null;
|
|
3867
3862
|
/**
|
|
3868
3863
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3869
3864
|
*/
|
|
3870
|
-
export type
|
|
3865
|
+
export type Timestamp17 = number;
|
|
3871
3866
|
/**
|
|
3872
3867
|
* Discriminator type for a persistence commit receipt.
|
|
3873
3868
|
*/
|
|
3874
|
-
export type
|
|
3869
|
+
export type TopologyClass101 = "persistence_commit";
|
|
3875
3870
|
/**
|
|
3876
3871
|
* The external cryptographic receipt generated by Iceberg/Delta.
|
|
3877
3872
|
*/
|
|
@@ -3887,19 +3882,19 @@ export type TargetTableUri = string;
|
|
|
3887
3882
|
/**
|
|
3888
3883
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3889
3884
|
*/
|
|
3890
|
-
export type
|
|
3885
|
+
export type EventCid18 = string;
|
|
3891
3886
|
/**
|
|
3892
3887
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3893
3888
|
*/
|
|
3894
|
-
export type
|
|
3889
|
+
export type PriorEventHash18 = string | null;
|
|
3895
3890
|
/**
|
|
3896
3891
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3897
3892
|
*/
|
|
3898
|
-
export type
|
|
3893
|
+
export type Timestamp18 = number;
|
|
3899
3894
|
/**
|
|
3900
3895
|
* Discriminator type for a token burn receipt.
|
|
3901
3896
|
*/
|
|
3902
|
-
export type
|
|
3897
|
+
export type TopologyClass102 = "token_burn";
|
|
3903
3898
|
/**
|
|
3904
3899
|
* A string linking this burn back to the specific ToolInvocationEvent CID.
|
|
3905
3900
|
*/
|
|
@@ -3919,19 +3914,19 @@ export type BurnMagnitude = number;
|
|
|
3919
3914
|
/**
|
|
3920
3915
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3921
3916
|
*/
|
|
3922
|
-
export type
|
|
3917
|
+
export type EventCid19 = string;
|
|
3923
3918
|
/**
|
|
3924
3919
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3925
3920
|
*/
|
|
3926
|
-
export type
|
|
3921
|
+
export type PriorEventHash19 = string | null;
|
|
3927
3922
|
/**
|
|
3928
3923
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3929
3924
|
*/
|
|
3930
|
-
export type
|
|
3925
|
+
export type Timestamp19 = number;
|
|
3931
3926
|
/**
|
|
3932
3927
|
* Discriminator type for a budget exhaustion event.
|
|
3933
3928
|
*/
|
|
3934
|
-
export type
|
|
3929
|
+
export type TopologyClass103 = "budget_exhaustion";
|
|
3935
3930
|
/**
|
|
3936
3931
|
* A string representing the original escrow boundary breached.
|
|
3937
3932
|
*/
|
|
@@ -3943,19 +3938,19 @@ export type FinalBurnReceiptCid = string;
|
|
|
3943
3938
|
/**
|
|
3944
3939
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3945
3940
|
*/
|
|
3946
|
-
export type
|
|
3941
|
+
export type EventCid20 = string;
|
|
3947
3942
|
/**
|
|
3948
3943
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3949
3944
|
*/
|
|
3950
|
-
export type
|
|
3945
|
+
export type PriorEventHash20 = string | null;
|
|
3951
3946
|
/**
|
|
3952
3947
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3953
3948
|
*/
|
|
3954
|
-
export type
|
|
3949
|
+
export type Timestamp20 = number;
|
|
3955
3950
|
/**
|
|
3956
3951
|
* Discriminator type for telemetry events.
|
|
3957
3952
|
*/
|
|
3958
|
-
export type
|
|
3953
|
+
export type TopologyClass104 = "epistemic_telemetry";
|
|
3959
3954
|
/**
|
|
3960
3955
|
* The exact topological action the human operator performed on the projected manifold.
|
|
3961
3956
|
*/
|
|
@@ -3971,16 +3966,16 @@ export type DwellDurationMs = number | null;
|
|
|
3971
3966
|
/**
|
|
3972
3967
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3973
3968
|
*/
|
|
3974
|
-
export type
|
|
3969
|
+
export type EventCid21 = string;
|
|
3975
3970
|
/**
|
|
3976
3971
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3977
3972
|
*/
|
|
3978
|
-
export type
|
|
3973
|
+
export type PriorEventHash21 = string | null;
|
|
3979
3974
|
/**
|
|
3980
3975
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3981
3976
|
*/
|
|
3982
|
-
export type
|
|
3983
|
-
export type
|
|
3977
|
+
export type Timestamp21 = number;
|
|
3978
|
+
export type TopologyClass105 = "cognitive_prediction";
|
|
3984
3979
|
export type SourceChainCid = string;
|
|
3985
3980
|
export type TargetSourceConcept = string;
|
|
3986
3981
|
/**
|
|
@@ -3990,16 +3985,16 @@ export type PredictedTopKTokens = [string, ...string[]];
|
|
|
3990
3985
|
/**
|
|
3991
3986
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3992
3987
|
*/
|
|
3993
|
-
export type
|
|
3988
|
+
export type EventCid22 = string;
|
|
3994
3989
|
/**
|
|
3995
3990
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3996
3991
|
*/
|
|
3997
|
-
export type
|
|
3992
|
+
export type PriorEventHash22 = string | null;
|
|
3998
3993
|
/**
|
|
3999
3994
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4000
3995
|
*/
|
|
4001
|
-
export type
|
|
4002
|
-
export type
|
|
3996
|
+
export type Timestamp22 = number;
|
|
3997
|
+
export type TopologyClass106 = "epistemic_axiom_verification";
|
|
4003
3998
|
export type SourcePredictionCid = string;
|
|
4004
3999
|
export type SequenceSimilarityScore = number;
|
|
4005
4000
|
export type FactScorePassed = boolean;
|
|
@@ -4010,16 +4005,16 @@ export type ZeroTrustReceiptCid1 = string | null;
|
|
|
4010
4005
|
/**
|
|
4011
4006
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4012
4007
|
*/
|
|
4013
|
-
export type
|
|
4008
|
+
export type EventCid23 = string;
|
|
4014
4009
|
/**
|
|
4015
4010
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4016
4011
|
*/
|
|
4017
|
-
export type
|
|
4012
|
+
export type PriorEventHash23 = string | null;
|
|
4018
4013
|
/**
|
|
4019
4014
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4020
4015
|
*/
|
|
4021
|
-
export type
|
|
4022
|
-
export type
|
|
4016
|
+
export type Timestamp23 = number;
|
|
4017
|
+
export type TopologyClass107 = "cognitive_reward_evaluation";
|
|
4023
4018
|
/**
|
|
4024
4019
|
* The globally unique decentralized identifier (DID) anchoring the LLM's raw generated text trajectory.
|
|
4025
4020
|
*/
|
|
@@ -4051,16 +4046,16 @@ export type TotalAdvantageScore = number;
|
|
|
4051
4046
|
/**
|
|
4052
4047
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4053
4048
|
*/
|
|
4054
|
-
export type
|
|
4049
|
+
export type EventCid24 = string;
|
|
4055
4050
|
/**
|
|
4056
4051
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4057
4052
|
*/
|
|
4058
|
-
export type
|
|
4053
|
+
export type PriorEventHash24 = string | null;
|
|
4059
4054
|
/**
|
|
4060
4055
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4061
4056
|
*/
|
|
4062
|
-
export type
|
|
4063
|
-
export type
|
|
4057
|
+
export type Timestamp24 = number;
|
|
4058
|
+
export type TopologyClass108 = "epistemic_flow_state";
|
|
4064
4059
|
/**
|
|
4065
4060
|
* The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
|
|
4066
4061
|
*/
|
|
@@ -4076,19 +4071,19 @@ export type TerminalRewardFactorized = boolean;
|
|
|
4076
4071
|
/**
|
|
4077
4072
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4078
4073
|
*/
|
|
4079
|
-
export type
|
|
4074
|
+
export type EventCid25 = string;
|
|
4080
4075
|
/**
|
|
4081
4076
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4082
4077
|
*/
|
|
4083
|
-
export type
|
|
4078
|
+
export type PriorEventHash25 = string | null;
|
|
4084
4079
|
/**
|
|
4085
4080
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4086
4081
|
*/
|
|
4087
|
-
export type
|
|
4082
|
+
export type Timestamp25 = number;
|
|
4088
4083
|
/**
|
|
4089
4084
|
* Discriminator type for a causal explanation event.
|
|
4090
4085
|
*/
|
|
4091
|
-
export type
|
|
4086
|
+
export type TopologyClass109 = "causal_explanation";
|
|
4092
4087
|
/**
|
|
4093
4088
|
* The globally unique decentralized identifier (DID) anchoring the collective outcome being explained.
|
|
4094
4089
|
*/
|
|
@@ -4128,19 +4123,19 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
|
|
|
4128
4123
|
/**
|
|
4129
4124
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4130
4125
|
*/
|
|
4131
|
-
export type
|
|
4126
|
+
export type EventCid26 = string;
|
|
4132
4127
|
/**
|
|
4133
4128
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4134
4129
|
*/
|
|
4135
|
-
export type
|
|
4130
|
+
export type PriorEventHash26 = string | null;
|
|
4136
4131
|
/**
|
|
4137
4132
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4138
4133
|
*/
|
|
4139
|
-
export type
|
|
4134
|
+
export type Timestamp26 = number;
|
|
4140
4135
|
/**
|
|
4141
4136
|
* Discriminator type for an intent classification receipt.
|
|
4142
4137
|
*/
|
|
4143
|
-
export type
|
|
4138
|
+
export type TopologyClass110 = "intent_classification";
|
|
4144
4139
|
/**
|
|
4145
4140
|
* The raw, unparsed human natural language instruction.
|
|
4146
4141
|
*/
|
|
@@ -4157,19 +4152,19 @@ export type ConfidenceScore1 = number;
|
|
|
4157
4152
|
* The TaxonomicRoutingPolicy CID that governed this classification.
|
|
4158
4153
|
*/
|
|
4159
4154
|
export type RoutingPolicyCid = string | null;
|
|
4160
|
-
export type
|
|
4155
|
+
export type TopologyClass111 = "semantic_relational_record";
|
|
4161
4156
|
/**
|
|
4162
4157
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4163
4158
|
*/
|
|
4164
|
-
export type
|
|
4159
|
+
export type EventCid27 = string;
|
|
4165
4160
|
/**
|
|
4166
4161
|
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
4167
4162
|
*/
|
|
4168
|
-
export type
|
|
4163
|
+
export type PriorEventHash27 = string | null;
|
|
4169
4164
|
/**
|
|
4170
4165
|
* The precise temporal coordinate of the event realization.
|
|
4171
4166
|
*/
|
|
4172
|
-
export type
|
|
4167
|
+
export type Timestamp27 = number;
|
|
4173
4168
|
/**
|
|
4174
4169
|
* The domain-independent structural classification of the record.
|
|
4175
4170
|
*/
|
|
@@ -4181,19 +4176,19 @@ export type FormalSchemaUrn1 = string | null;
|
|
|
4181
4176
|
/**
|
|
4182
4177
|
* Discriminator for the reification receipt.
|
|
4183
4178
|
*/
|
|
4184
|
-
export type
|
|
4179
|
+
export type TopologyClass112 = "ontological_reification";
|
|
4185
4180
|
/**
|
|
4186
4181
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4187
4182
|
*/
|
|
4188
|
-
export type
|
|
4183
|
+
export type EventCid28 = string;
|
|
4189
4184
|
/**
|
|
4190
4185
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
4191
4186
|
*/
|
|
4192
|
-
export type
|
|
4187
|
+
export type PriorEventHash28 = string | null;
|
|
4193
4188
|
/**
|
|
4194
4189
|
* The precise temporal coordinate of the event realization.
|
|
4195
4190
|
*/
|
|
4196
|
-
export type
|
|
4191
|
+
export type Timestamp28 = number;
|
|
4197
4192
|
/**
|
|
4198
4193
|
* The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
|
|
4199
4194
|
*/
|
|
@@ -4213,19 +4208,19 @@ export type IsLatentInference = boolean;
|
|
|
4213
4208
|
/**
|
|
4214
4209
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4215
4210
|
*/
|
|
4216
|
-
export type
|
|
4211
|
+
export type EventCid29 = string;
|
|
4217
4212
|
/**
|
|
4218
4213
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4219
4214
|
*/
|
|
4220
|
-
export type
|
|
4215
|
+
export type PriorEventHash29 = string | null;
|
|
4221
4216
|
/**
|
|
4222
4217
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4223
4218
|
*/
|
|
4224
|
-
export type
|
|
4219
|
+
export type Timestamp29 = number;
|
|
4225
4220
|
/**
|
|
4226
4221
|
* The type of the resilience payload.
|
|
4227
4222
|
*/
|
|
4228
|
-
export type
|
|
4223
|
+
export type TopologyClass113 = "circuit_breaker_event";
|
|
4229
4224
|
/**
|
|
4230
4225
|
* Signature or summary of the error causing the trip.
|
|
4231
4226
|
*/
|
|
@@ -4233,19 +4228,19 @@ export type ErrorSignature = string;
|
|
|
4233
4228
|
/**
|
|
4234
4229
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4235
4230
|
*/
|
|
4236
|
-
export type
|
|
4231
|
+
export type EventCid30 = string;
|
|
4237
4232
|
/**
|
|
4238
4233
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4239
4234
|
*/
|
|
4240
|
-
export type
|
|
4235
|
+
export type PriorEventHash30 = string | null;
|
|
4241
4236
|
/**
|
|
4242
4237
|
* Discriminator type for a log event.
|
|
4243
4238
|
*/
|
|
4244
|
-
export type
|
|
4239
|
+
export type TopologyClass114 = "epistemic_log";
|
|
4245
4240
|
/**
|
|
4246
4241
|
* The UNIX timestamp of the log event.
|
|
4247
4242
|
*/
|
|
4248
|
-
export type
|
|
4243
|
+
export type Timestamp30 = number;
|
|
4249
4244
|
/**
|
|
4250
4245
|
* The severity level of the log event.
|
|
4251
4246
|
*/
|
|
@@ -4258,19 +4253,19 @@ export type TelemetryScalarState = string | number | boolean | null;
|
|
|
4258
4253
|
/**
|
|
4259
4254
|
* The type of the intervention payload.
|
|
4260
4255
|
*/
|
|
4261
|
-
export type
|
|
4256
|
+
export type TopologyClass115 = "verdict";
|
|
4262
4257
|
/**
|
|
4263
4258
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4264
4259
|
*/
|
|
4265
|
-
export type
|
|
4260
|
+
export type EventCid31 = string;
|
|
4266
4261
|
/**
|
|
4267
4262
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4268
4263
|
*/
|
|
4269
|
-
export type
|
|
4264
|
+
export type PriorEventHash31 = string | null;
|
|
4270
4265
|
/**
|
|
4271
4266
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4272
4267
|
*/
|
|
4273
|
-
export type
|
|
4268
|
+
export type Timestamp31 = number;
|
|
4274
4269
|
/**
|
|
4275
4270
|
* The cryptographic nonce uniquely identifying the intervention request.
|
|
4276
4271
|
*/
|
|
@@ -4306,16 +4301,16 @@ export type LivenessChallengeHash = string;
|
|
|
4306
4301
|
/**
|
|
4307
4302
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4308
4303
|
*/
|
|
4309
|
-
export type
|
|
4304
|
+
export type EventCid32 = string;
|
|
4310
4305
|
/**
|
|
4311
4306
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4312
4307
|
*/
|
|
4313
|
-
export type
|
|
4308
|
+
export type PriorEventHash32 = string | null;
|
|
4314
4309
|
/**
|
|
4315
4310
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4316
4311
|
*/
|
|
4317
|
-
export type
|
|
4318
|
-
export type
|
|
4312
|
+
export type Timestamp32 = number;
|
|
4313
|
+
export type TopologyClass116 = "custody_receipt";
|
|
4319
4314
|
/**
|
|
4320
4315
|
* Unique identifier for this chain-of-custody entry.
|
|
4321
4316
|
*/
|
|
@@ -4343,16 +4338,16 @@ export type RedactionTimestampUnixNano = number;
|
|
|
4343
4338
|
/**
|
|
4344
4339
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4345
4340
|
*/
|
|
4346
|
-
export type
|
|
4341
|
+
export type EventCid33 = string;
|
|
4347
4342
|
/**
|
|
4348
4343
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4349
4344
|
*/
|
|
4350
|
-
export type
|
|
4345
|
+
export type PriorEventHash33 = string | null;
|
|
4351
4346
|
/**
|
|
4352
4347
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4353
4348
|
*/
|
|
4354
|
-
export type
|
|
4355
|
-
export type
|
|
4349
|
+
export type Timestamp33 = number;
|
|
4350
|
+
export type TopologyClass117 = "defeasible_attack";
|
|
4356
4351
|
/**
|
|
4357
4352
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
|
|
4358
4353
|
*/
|
|
@@ -4365,6 +4360,24 @@ export type SourceClaimCid = string;
|
|
|
4365
4360
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for the claim being attacked.
|
|
4366
4361
|
*/
|
|
4367
4362
|
export type TargetClaimCid = string;
|
|
4363
|
+
/**
|
|
4364
|
+
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4365
|
+
*/
|
|
4366
|
+
export type EventCid34 = string;
|
|
4367
|
+
/**
|
|
4368
|
+
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4369
|
+
*/
|
|
4370
|
+
export type PriorEventHash34 = string | null;
|
|
4371
|
+
/**
|
|
4372
|
+
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4373
|
+
*/
|
|
4374
|
+
export type Timestamp34 = number;
|
|
4375
|
+
export type TopologyClass118 = "epistemic_rejection";
|
|
4376
|
+
export type ReceiptCid1 = string;
|
|
4377
|
+
export type FailedProjectionCid = string;
|
|
4378
|
+
export type ViolatedAlgebraicConstraint = string;
|
|
4379
|
+
export type KlDivergenceToValidity = number;
|
|
4380
|
+
export type StochasticMutationGradient = string;
|
|
4368
4381
|
/**
|
|
4369
4382
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4370
4383
|
*/
|
|
@@ -4462,25 +4475,21 @@ export type ExecutionTimeMs = number;
|
|
|
4462
4475
|
*/
|
|
4463
4476
|
export type TopologyClass124 = "oracle_execution_receipt";
|
|
4464
4477
|
/**
|
|
4465
|
-
*
|
|
4466
|
-
*/
|
|
4467
|
-
export type EventCid40 = string;
|
|
4468
|
-
/**
|
|
4469
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4478
|
+
* The SHA-256 hash of the complete execution payload, providing undeniable cryptographic provenance for the Merkle-DAG audit trail.
|
|
4470
4479
|
*/
|
|
4471
|
-
export type
|
|
4480
|
+
export type ExecutionHash = string;
|
|
4472
4481
|
/**
|
|
4473
|
-
*
|
|
4482
|
+
* The fully qualified URN of the solver agent that performed the execution.
|
|
4474
4483
|
*/
|
|
4475
|
-
export type
|
|
4484
|
+
export type SolverUrn = string;
|
|
4476
4485
|
/**
|
|
4477
|
-
* The
|
|
4486
|
+
* The total number of tokens consumed during this execution, settled by the Thermodynamic Quota Manager.
|
|
4478
4487
|
*/
|
|
4479
|
-
export type
|
|
4488
|
+
export type TokensBurned = number;
|
|
4480
4489
|
/**
|
|
4481
|
-
* An
|
|
4490
|
+
* An optional cryptographic signature from a Human-in-the-Loop (HITL) operator attesting to the correctness of the execution result. Populated only when the Temporal workflow escalates to manual review.
|
|
4482
4491
|
*/
|
|
4483
|
-
export type
|
|
4492
|
+
export type HumanAttestationSignature = string | null;
|
|
4484
4493
|
/**
|
|
4485
4494
|
* A discriminated union of workflow topologies.
|
|
4486
4495
|
*/
|
|
@@ -4576,6 +4585,10 @@ export type ClearingTimeout = number;
|
|
|
4576
4585
|
* The smallest allowable discrete bid increment.
|
|
4577
4586
|
*/
|
|
4578
4587
|
export type MinimumTickSize = number;
|
|
4588
|
+
/**
|
|
4589
|
+
* A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
|
|
4590
|
+
*/
|
|
4591
|
+
export type BundleContentHashState = string;
|
|
4579
4592
|
/**
|
|
4580
4593
|
* The exact genesis globally unique decentralized identifier (DID) anchoring the document, ensuring continuity.
|
|
4581
4594
|
*/
|
|
@@ -4595,7 +4608,7 @@ export type CapabilityPointerState = string;
|
|
|
4595
4608
|
/**
|
|
4596
4609
|
* The unique identifier for this curated environment of tools.
|
|
4597
4610
|
*/
|
|
4598
|
-
export type
|
|
4611
|
+
export type ActionSpaceCid1 = string;
|
|
4599
4612
|
/**
|
|
4600
4613
|
* Defines the initial state (S_0) of the MDP.
|
|
4601
4614
|
*/
|
|
@@ -4661,24 +4674,6 @@ export type AgentNodeCount = number;
|
|
|
4661
4674
|
*/
|
|
4662
4675
|
export type ConsensusMechanism = "majority" | "prediction_market" | "pbft";
|
|
4663
4676
|
export type CognitiveTierProfile = "working" | "episodic" | "semantic";
|
|
4664
|
-
export type ThermodynamicsCid = string;
|
|
4665
|
-
export type TargetTopologyCid1 = string;
|
|
4666
|
-
export type MaxStochasticDiffusions = number;
|
|
4667
|
-
export type ComputationalFreeEnergyBudget = number;
|
|
4668
|
-
export type CurrentDiffusions = number;
|
|
4669
|
-
export type RemainingFreeEnergy = number;
|
|
4670
|
-
export type EntropyDerivativeDelta = number | null;
|
|
4671
|
-
export type StagnationToleranceEpsilon = number;
|
|
4672
|
-
/**
|
|
4673
|
-
* AGENT INSTRUCTION: A rigid string enumeration mapping the kinetic liveness of the computational budget.
|
|
4674
|
-
*
|
|
4675
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator on whether the thermodynamic search envelope is active or mathematically depleted.
|
|
4676
|
-
*
|
|
4677
|
-
* EPISTEMIC BOUNDS: Strictly bounded to the explicit kinetic states ACTIVE_DIFFUSION and ENTROPIC_EXHAUSTION_ORACLE_INTERVENTION.
|
|
4678
|
-
*
|
|
4679
|
-
* MCP ROUTING TRIGGERS: Thermodynamic State, Budget Envelope, MCTS Liveness, Entropy Tracking
|
|
4680
|
-
*/
|
|
4681
|
-
export type ThermodynamicState = "ACTIVE_DIFFUSION" | "ENTROPIC_EXHAUSTION_ORACLE_INTERVENTION";
|
|
4682
4677
|
/**
|
|
4683
4678
|
* The identifier of the underlying model.
|
|
4684
4679
|
*/
|
|
@@ -4743,64 +4738,6 @@ export type MaxUncommittedEdges = number;
|
|
|
4743
4738
|
* Temporal bound for flushing the stream.
|
|
4744
4739
|
*/
|
|
4745
4740
|
export type MicroBatchIntervalMs = number;
|
|
4746
|
-
/**
|
|
4747
|
-
* Unique identifier for this B2B negotiation.
|
|
4748
|
-
*/
|
|
4749
|
-
export type HandshakeCid = string;
|
|
4750
|
-
/**
|
|
4751
|
-
* The enterprise DID requesting the connection.
|
|
4752
|
-
*/
|
|
4753
|
-
export type InitiatingTenantCid = string;
|
|
4754
|
-
/**
|
|
4755
|
-
* The enterprise DID receiving the connection.
|
|
4756
|
-
*/
|
|
4757
|
-
export type ReceivingTenantCid = string;
|
|
4758
|
-
/**
|
|
4759
|
-
* The strict enterprise identifier of the foreign B2B tenant receiving this payload.
|
|
4760
|
-
*/
|
|
4761
|
-
export type ReceivingTenantCid1 = string;
|
|
4762
|
-
/**
|
|
4763
|
-
* AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
|
|
4764
|
-
*
|
|
4765
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
|
|
4766
|
-
*
|
|
4767
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
|
|
4768
|
-
*
|
|
4769
|
-
* MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
|
|
4770
|
-
*/
|
|
4771
|
-
export type SemanticClassificationProfile2 = "public" | "internal" | "confidential" | "restricted";
|
|
4772
|
-
/**
|
|
4773
|
-
* The strict magnitude cap on cross-tenant economic liability.
|
|
4774
|
-
*/
|
|
4775
|
-
export type LiabilityLimitMagnitude = number;
|
|
4776
|
-
/**
|
|
4777
|
-
* Explicit whitelist of geographic regions or cloud enclaves where execution is structurally permitted (Payload Residency Pinning).
|
|
4778
|
-
*/
|
|
4779
|
-
export type PermittedGeographicRegions = string[];
|
|
4780
|
-
/**
|
|
4781
|
-
* If True, incoming payloads from foreign tenants MUST be accompanied by a ZeroKnowledgeReceipt containing a valid temporal_interval_proof.
|
|
4782
|
-
*/
|
|
4783
|
-
export type RequireTemporalProvenanceProofs = boolean;
|
|
4784
|
-
/**
|
|
4785
|
-
* Absolute structural ESG mandate. The execution graph will quarantine any federated node operating on a grid exceeding this gCO2eq/kWh threshold.
|
|
4786
|
-
*/
|
|
4787
|
-
export type MaxPermittedGridCarbonIntensity = number | null;
|
|
4788
|
-
/**
|
|
4789
|
-
* The NIST FIPS post-quantum cryptographic algorithm used.
|
|
4790
|
-
*/
|
|
4791
|
-
export type PqAlgorithm = "ml-dsa" | "slh-dsa" | "falcon";
|
|
4792
|
-
/**
|
|
4793
|
-
* The identifier of the post-quantum public evaluation key.
|
|
4794
|
-
*/
|
|
4795
|
-
export type PublicKeyCid1 = string;
|
|
4796
|
-
/**
|
|
4797
|
-
* The base64-encoded post-quantum signature. Bounded to 100KB to safely accommodate massive SPHINCS+ hash trees without OOM crashes.
|
|
4798
|
-
*/
|
|
4799
|
-
export type PqSignatureBlob = string;
|
|
4800
|
-
/**
|
|
4801
|
-
* The current status of the handshake.
|
|
4802
|
-
*/
|
|
4803
|
-
export type Status1 = "proposed" | "negotiating" | "aligned" | "rejected";
|
|
4804
4741
|
export type CrossoverMechanismProfile = "uniform_blend" | "single_point" | "heuristic";
|
|
4805
4742
|
export type ProvenanceTraceCid1 = string | null;
|
|
4806
4743
|
/**
|
|
@@ -4857,6 +4794,10 @@ export type ExpirationTimestamp = number;
|
|
|
4857
4794
|
* A base64 string proving the cryptographic delegation.
|
|
4858
4795
|
*/
|
|
4859
4796
|
export type CryptographicSignature = string;
|
|
4797
|
+
/**
|
|
4798
|
+
* The unconstrained Chain-of-Thought reasoning trace generated by the Frontier model with the Sovereign LLM Proxy's XGrammar AOT FSM bitmask DISABLED. This field captures the full computational runway — scratchpad blocks, intermediate calculations, and heuristic explorations — that the model requires to maximize logical accuracy without suffering the Format Restriction Penalty.
|
|
4799
|
+
*/
|
|
4800
|
+
export type DeliberationTrace = string;
|
|
4860
4801
|
export type ConstraintCid = string;
|
|
4861
4802
|
/**
|
|
4862
4803
|
* The formal SMT-LIB or Lean4 language representation of the symbolic rule.
|
|
@@ -4866,22 +4807,6 @@ export type FormalSyntaxSmt = string;
|
|
|
4866
4807
|
* The continuous penalty applied to the LLM probability mass for constraint violation.
|
|
4867
4808
|
*/
|
|
4868
4809
|
export type RelaxationEpsilon = number;
|
|
4869
|
-
/**
|
|
4870
|
-
* The native embedding model of the origin agent.
|
|
4871
|
-
*/
|
|
4872
|
-
export type SourceMatrixName = string;
|
|
4873
|
-
/**
|
|
4874
|
-
* The native embedding model of the destination agent.
|
|
4875
|
-
*/
|
|
4876
|
-
export type TargetMatrixName = string;
|
|
4877
|
-
/**
|
|
4878
|
-
* The SHA-256 hash of the exact mathematical matrix used to compress or translate the latent dimensions.
|
|
4879
|
-
*/
|
|
4880
|
-
export type ProjectionMatrixHash = string;
|
|
4881
|
-
/**
|
|
4882
|
-
* Mathematical proof (e.g., Earth Mover's Distance preservation) of how accurately relative semantic distances were maintained during projection.
|
|
4883
|
-
*/
|
|
4884
|
-
export type IsometryPreservationScore1 = number;
|
|
4885
4810
|
/**
|
|
4886
4811
|
* The expected value (mu) of the distribution.
|
|
4887
4812
|
*/
|
|
@@ -5142,14 +5067,6 @@ export type TriggerDescription = string;
|
|
|
5142
5067
|
* The lightweight progressive disclosure tier for procedural skills.
|
|
5143
5068
|
*/
|
|
5144
5069
|
export type AvailableProceduralManifolds = ProceduralMetadataManifest[];
|
|
5145
|
-
/**
|
|
5146
|
-
* Cryptographic Lineage Watermark for the attestation.
|
|
5147
|
-
*/
|
|
5148
|
-
export type AttestationCid = string;
|
|
5149
|
-
/**
|
|
5150
|
-
* Immutable cryptographic receipts of dynamically discovered external enterprise connectors.
|
|
5151
|
-
*/
|
|
5152
|
-
export type CapabilityAttestations = FederatedCapabilityAttestationReceipt[];
|
|
5153
5070
|
/**
|
|
5154
5071
|
* A Content Identifier (CID) for the Standard Operating Procedure.
|
|
5155
5072
|
*/
|
|
@@ -5200,123 +5117,7 @@ export type MutableMatrix = {
|
|
|
5200
5117
|
* A flag allowing the output to only return the keys in mutable_matrix that changed, rather than forcing the entire array back up the network.
|
|
5201
5118
|
*/
|
|
5202
5119
|
export type IsDelta = boolean;
|
|
5203
|
-
|
|
5204
|
-
* The unique ID for this specific execution.
|
|
5205
|
-
*/
|
|
5206
|
-
export type RequestCid1 = string;
|
|
5207
|
-
/**
|
|
5208
|
-
* The deterministic capability pointer anchoring the parent request manifold.
|
|
5209
|
-
*/
|
|
5210
|
-
export type ParentRequestCid = string | null;
|
|
5211
|
-
/**
|
|
5212
|
-
* The deterministic capability pointer anchoring the trace root manifold.
|
|
5213
|
-
*/
|
|
5214
|
-
export type RootRequestCid = string | null;
|
|
5215
|
-
/**
|
|
5216
|
-
* The strict array of cryptographic hashes of parent execution nodes.
|
|
5217
|
-
*/
|
|
5218
|
-
export type ParentHashes = string[];
|
|
5219
|
-
/**
|
|
5220
|
-
* The cryptographic SHA-256 hash of this node.
|
|
5221
|
-
*/
|
|
5222
|
-
export type NodeHash = string | null;
|
|
5223
|
-
/**
|
|
5224
|
-
* The global identifier for the entire execution causal tree.
|
|
5225
|
-
*/
|
|
5226
|
-
export type TraceCid3 = string;
|
|
5227
|
-
/**
|
|
5228
|
-
* The unique identifier for this specific operation.
|
|
5229
|
-
*/
|
|
5230
|
-
export type SpanCid1 = string;
|
|
5231
|
-
/**
|
|
5232
|
-
* The causal edge to the invoking node.
|
|
5233
|
-
*/
|
|
5234
|
-
export type ParentSpanCid1 = string | null;
|
|
5235
|
-
/**
|
|
5236
|
-
* The semantic identifier for the operation.
|
|
5237
|
-
*/
|
|
5238
|
-
export type Name1 = string;
|
|
5239
|
-
/**
|
|
5240
|
-
* Temporal start bound.
|
|
5241
|
-
*/
|
|
5242
|
-
export type StartTimeUnixNano = number;
|
|
5243
|
-
/**
|
|
5244
|
-
* Temporal end bound, if completed.
|
|
5245
|
-
*/
|
|
5246
|
-
export type EndTimeUnixNano = number | null;
|
|
5247
|
-
/**
|
|
5248
|
-
* The semantic name of the event.
|
|
5249
|
-
*/
|
|
5250
|
-
export type Name2 = string;
|
|
5251
|
-
/**
|
|
5252
|
-
* The precise temporal execution point.
|
|
5253
|
-
*/
|
|
5254
|
-
export type TimestampUnixNano = number;
|
|
5255
|
-
/**
|
|
5256
|
-
* Structured log records emitted during the span.
|
|
5257
|
-
*
|
|
5258
|
-
* @maxItems 10000
|
|
5259
|
-
*/
|
|
5260
|
-
export type Events = SpanEvent[];
|
|
5261
|
-
export type FaultCategoryProfile = "context_overload" | "incorrect_context" | "format_corruption" | "latency_spike" | "token_throttle" | "network_degradation" | "temporal_dilation" | "dependency_blackout";
|
|
5262
|
-
/**
|
|
5263
|
-
* Discriminator for fetching assets via CID.
|
|
5264
|
-
*/
|
|
5265
|
-
export type TopologyClass127 = "cid_fetch";
|
|
5266
|
-
/**
|
|
5267
|
-
* Network timeout in milliseconds.
|
|
5268
|
-
*/
|
|
5269
|
-
export type TimeoutMs1 = number;
|
|
5270
|
-
/**
|
|
5271
|
-
* The explicit array of strictly bounded MCP URI broadcast endpoints.
|
|
5272
|
-
*
|
|
5273
|
-
* @maxItems 1000
|
|
5274
|
-
*/
|
|
5275
|
-
export type BroadcastEndpoints = string[];
|
|
5276
|
-
/**
|
|
5277
|
-
* The explicit array of cryptographic hashes defining acceptable domain ontologies.
|
|
5278
|
-
*
|
|
5279
|
-
* @maxItems 1000
|
|
5280
|
-
*/
|
|
5281
|
-
export type SupportedOntologies = string[];
|
|
5282
|
-
/**
|
|
5283
|
-
* The tamper-evident SHA-256 hash of the exact safetensors weight matrix.
|
|
5284
|
-
*/
|
|
5285
|
-
export type AdapterMerkleRoot = string;
|
|
5286
|
-
/**
|
|
5287
|
-
* The exact spatial geometry required in VRAM to mount this adapter.
|
|
5288
|
-
*/
|
|
5289
|
-
export type VramFootprintBytes = number;
|
|
5290
|
-
/**
|
|
5291
|
-
* The absolute Time-To-Live for the adapter to exist in the kinetic execution plane before forced eviction.
|
|
5292
|
-
*/
|
|
5293
|
-
export type EphemeralTtlMs = number;
|
|
5294
|
-
/**
|
|
5295
|
-
* The relative importance scalar used by the orchestrator's LRU eviction algorithm when VRAM limits are saturated.
|
|
5296
|
-
*/
|
|
5297
|
-
export type CachePriorityWeight = number;
|
|
5298
|
-
/**
|
|
5299
|
-
* The endpoint to connect to.
|
|
5300
|
-
*/
|
|
5301
|
-
export type TargetEndpointUri = string;
|
|
5302
|
-
/**
|
|
5303
|
-
* AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
|
|
5304
|
-
*
|
|
5305
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
|
|
5306
|
-
*
|
|
5307
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
|
|
5308
|
-
*
|
|
5309
|
-
* MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
|
|
5310
|
-
*/
|
|
5311
|
-
export type SemanticClassificationProfile3 = "public" | "internal" | "confidential" | "restricted";
|
|
5312
|
-
/**
|
|
5313
|
-
* Max token/compute allocation.
|
|
5314
|
-
*/
|
|
5315
|
-
export type MaxLiabilityBudget = number;
|
|
5316
|
-
/**
|
|
5317
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the federated topology, if applicable.
|
|
5318
|
-
*/
|
|
5319
|
-
export type TopologyCid1 = string | null;
|
|
5120
|
+
export type FaultCategoryProfile = "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
|
|
5320
5121
|
/**
|
|
5321
5122
|
* The mathematical dialect and theorem prover used to compile the proof.
|
|
5322
5123
|
*/
|
|
@@ -5538,7 +5339,7 @@ export type Shape = number[];
|
|
|
5538
5339
|
/**
|
|
5539
5340
|
* Exact byte size of the uncompressed tensor.
|
|
5540
5341
|
*/
|
|
5541
|
-
export type
|
|
5342
|
+
export type VramFootprintBytes = number;
|
|
5542
5343
|
/**
|
|
5543
5344
|
* SHA-256 Merkle root of the payload chunks.
|
|
5544
5345
|
*/
|
|
@@ -5547,27 +5348,20 @@ export type MerkleRoot = string;
|
|
|
5547
5348
|
* Strict URI pointer to the physical bytes.
|
|
5548
5349
|
*/
|
|
5549
5350
|
export type StorageUri = string;
|
|
5351
|
+
export type OptimizationDirectionProfile = "maximize" | "minimize";
|
|
5352
|
+
export type PatchOperationProfile = "add" | "remove" | "replace" | "copy" | "move" | "test";
|
|
5550
5353
|
/**
|
|
5551
|
-
*
|
|
5552
|
-
*/
|
|
5553
|
-
export type HandshakeCid1 = string;
|
|
5554
|
-
/**
|
|
5555
|
-
* The agents establishing semantic alignment.
|
|
5556
|
-
*
|
|
5557
|
-
* @minItems 2
|
|
5558
|
-
* @maxItems 250
|
|
5354
|
+
* The NIST FIPS post-quantum cryptographic algorithm used.
|
|
5559
5355
|
*/
|
|
5560
|
-
export type
|
|
5356
|
+
export type PqAlgorithm = "ml-dsa" | "slh-dsa" | "falcon";
|
|
5561
5357
|
/**
|
|
5562
|
-
* The
|
|
5358
|
+
* The identifier of the post-quantum public evaluation key.
|
|
5563
5359
|
*/
|
|
5564
|
-
export type
|
|
5360
|
+
export type PublicKeyCid1 = string;
|
|
5565
5361
|
/**
|
|
5566
|
-
* The
|
|
5362
|
+
* The base64-encoded post-quantum signature. Bounded to 100KB to safely accommodate massive SPHINCS+ hash trees without OOM crashes.
|
|
5567
5363
|
*/
|
|
5568
|
-
export type
|
|
5569
|
-
export type OptimizationDirectionProfile = "maximize" | "minimize";
|
|
5570
|
-
export type PatchOperationProfile = "add" | "remove" | "replace" | "copy" | "move" | "test";
|
|
5364
|
+
export type PqSignatureBlob = string;
|
|
5571
5365
|
/**
|
|
5572
5366
|
* The absolute Z-axis physical distance to lock the Presentation UI relative to the observer's optical center, resolving vergence-accommodation conflicts.
|
|
5573
5367
|
*/
|
|
@@ -5617,8 +5411,6 @@ export type CausalRelationship = "causes" | "confounds" | "correlates_with" | "u
|
|
|
5617
5411
|
* An Immutable structural checkpoint.
|
|
5618
5412
|
*/
|
|
5619
5413
|
export type SemanticVersionState = string;
|
|
5620
|
-
export type SpanKindProfile = "client" | "server" | "producer" | "consumer" | "internal";
|
|
5621
|
-
export type SpanStatusCodeProfile = "unset" | "ok" | "error";
|
|
5622
5414
|
/**
|
|
5623
5415
|
* The unique cryptographic identifier for this local spatial volume.
|
|
5624
5416
|
*/
|
|
@@ -5694,18 +5486,6 @@ export type TieBreakerPolicy = "lowest_cost" | "lowest_latency" | "highest_confi
|
|
|
5694
5486
|
* A strictly typed SHA-256 hash pointing to a historically executed topological state.
|
|
5695
5487
|
*/
|
|
5696
5488
|
export type TopologyHashReceipt = string;
|
|
5697
|
-
/**
|
|
5698
|
-
* Unique identifier for this telemetry snapshot.
|
|
5699
|
-
*/
|
|
5700
|
-
export type BatchCid = string;
|
|
5701
|
-
/**
|
|
5702
|
-
* A collection of execution spans to be serialized.
|
|
5703
|
-
*/
|
|
5704
|
-
export type Spans = ExecutionSpanReceipt[];
|
|
5705
|
-
/**
|
|
5706
|
-
* The array of strictly typed trace executions.
|
|
5707
|
-
*/
|
|
5708
|
-
export type ExecutionNodes = ExecutionNodeReceipt[];
|
|
5709
5489
|
/**
|
|
5710
5490
|
* AGENT INSTRUCTION: Dictates the exact algorithmic or logical mechanism utilized to forge a semantic connection or transmute a bimodal data state, allowing downstream agents to weigh epistemic reliability.
|
|
5711
5491
|
*/
|
|
@@ -5742,10 +5522,6 @@ export type TenantCid = string | null;
|
|
|
5742
5522
|
* The ephemeral session boundary for this execution.
|
|
5743
5523
|
*/
|
|
5744
5524
|
export type SessionCid1 = string | null;
|
|
5745
|
-
/**
|
|
5746
|
-
* The declarative whitelist of data classifications permitted to flow through this graph.
|
|
5747
|
-
*/
|
|
5748
|
-
export type AllowedSemanticClassifications = SemanticClassificationProfile[] | null;
|
|
5749
5525
|
/**
|
|
5750
5526
|
* CoReason Shared Kernel Ontology
|
|
5751
5527
|
*
|
|
@@ -5755,7 +5531,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5755
5531
|
ASTGradientReceipt?: ASTGradientReceipt;
|
|
5756
5532
|
ActivationSteeringContract?: ActivationSteeringContract;
|
|
5757
5533
|
ActiveInferenceContract?: ActiveInferenceContract;
|
|
5758
|
-
ActiveInferenceEpochState?: ActiveInferenceEpochState;
|
|
5759
5534
|
AdjudicationIntent?: AdjudicationIntent;
|
|
5760
5535
|
AdjudicationReceipt?: AdjudicationReceipt;
|
|
5761
5536
|
AdjudicationRubricProfile?: AdjudicationRubricProfile;
|
|
@@ -5823,7 +5598,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5823
5598
|
CognitiveUncertaintyProfile?: CognitiveUncertaintyProfile1;
|
|
5824
5599
|
CollectiveIntelligenceProfile?: CollectiveIntelligenceProfile1;
|
|
5825
5600
|
CompositeNodeProfile?: CompositeNodeProfile;
|
|
5826
|
-
ComputationalThermodynamicsProfile?: ComputationalThermodynamicsProfile;
|
|
5827
5601
|
ComputeEngineProfile?: ComputeEngineProfile;
|
|
5828
5602
|
ComputeProvisioningIntent?: ComputeProvisioningIntent;
|
|
5829
5603
|
ComputeRateContract?: ComputeRateContract1;
|
|
@@ -5841,7 +5615,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5841
5615
|
ContinuousSpatialMutationIntent?: ContinuousSpatialMutationIntent;
|
|
5842
5616
|
CouncilTopologyManifest?: CouncilTopologyManifest;
|
|
5843
5617
|
CounterfactualRegretEvent?: CounterfactualRegretEvent;
|
|
5844
|
-
CrossSwarmHandshakeState?: CrossSwarmHandshakeState;
|
|
5845
5618
|
CrossoverMechanismProfile?: CrossoverMechanismProfile;
|
|
5846
5619
|
CrossoverPolicy?: CrossoverPolicy1;
|
|
5847
5620
|
CrosswalkResolutionReceipt?: CrosswalkResolutionReceipt;
|
|
@@ -5853,11 +5626,11 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5853
5626
|
DefeasibleAttackEvent?: DefeasibleAttackEvent;
|
|
5854
5627
|
DefeasibleCascadeEvent?: DefeasibleCascadeEvent;
|
|
5855
5628
|
DelegatedCapabilityManifest?: DelegatedCapabilityManifest;
|
|
5629
|
+
DeliberativeEnvelope?: DeliberativeEnvelope;
|
|
5856
5630
|
DempsterShaferBeliefVector?: DempsterShaferBeliefVector;
|
|
5857
5631
|
DerivationModeProfile?: DerivationModeProfile;
|
|
5858
5632
|
DifferentiableLogicPolicy?: DifferentiableLogicPolicy;
|
|
5859
5633
|
DigitalTwinTopologyManifest?: DigitalTwinTopologyManifest;
|
|
5860
|
-
DimensionalProjectionContract?: DimensionalProjectionContract;
|
|
5861
5634
|
DiscourseNodeState?: DiscourseNodeState;
|
|
5862
5635
|
DiscourseTreeManifest?: DiscourseTreeManifest;
|
|
5863
5636
|
DistributionProfile?: DistributionProfile;
|
|
@@ -5924,9 +5697,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5924
5697
|
EvidentiaryWarrantState?: EvidentiaryWarrantState;
|
|
5925
5698
|
EvolutionaryTopologyManifest?: EvolutionaryTopologyManifest;
|
|
5926
5699
|
ExecutionEnvelopeState?: ExecutionEnvelopeState;
|
|
5927
|
-
ExecutionNodeReceipt?: ExecutionNodeReceipt;
|
|
5928
5700
|
ExecutionSLA?: ExecutionSLA;
|
|
5929
|
-
ExecutionSpanReceipt?: ExecutionSpanReceipt;
|
|
5930
5701
|
ExecutionSubstrateProfile?: ExecutionSubstrateProfile1;
|
|
5931
5702
|
ExogenousEpistemicEvent?: ExogenousEpistemicEvent;
|
|
5932
5703
|
FYIIntent?: FYIIntent;
|
|
@@ -5936,14 +5707,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5936
5707
|
FalsificationContract?: FalsificationContract;
|
|
5937
5708
|
FaultCategoryProfile?: FaultCategoryProfile;
|
|
5938
5709
|
FaultInjectionProfile?: FaultInjectionProfile;
|
|
5939
|
-
FederatedBilateralSLA?: FederatedBilateralSLA2;
|
|
5940
|
-
FederatedCIDFetchIntent?: FederatedCIDFetchIntent;
|
|
5941
|
-
FederatedCapabilityAttestationReceipt?: FederatedCapabilityAttestationReceipt;
|
|
5942
|
-
FederatedDiscoveryIntent?: FederatedDiscoveryIntent;
|
|
5943
|
-
FederatedDiscoveryManifest?: FederatedDiscoveryManifest;
|
|
5944
|
-
FederatedPeftContract?: FederatedPeftContract;
|
|
5945
|
-
FederatedSecurityMacroManifest?: FederatedSecurityMacroManifest;
|
|
5946
|
-
FederatedStateSnapshot?: FederatedStateSnapshot;
|
|
5947
5710
|
FitnessObjectiveProfile?: FitnessObjectiveProfile;
|
|
5948
5711
|
FormalLogicPremise?: FormalLogicPremise;
|
|
5949
5712
|
FormalVerificationContract?: FormalVerificationContract;
|
|
@@ -6022,7 +5785,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
6022
5785
|
ObservationEvent?: ObservationEvent;
|
|
6023
5786
|
OntologicalAlignmentPolicy?: OntologicalAlignmentPolicy;
|
|
6024
5787
|
OntologicalCrosswalkIntent?: OntologicalCrosswalkIntent;
|
|
6025
|
-
OntologicalHandshakeReceipt?: OntologicalHandshakeReceipt;
|
|
6026
5788
|
OntologicalNormalizationIntent?: OntologicalNormalizationIntent;
|
|
6027
5789
|
OntologicalReificationReceipt?: OntologicalReificationReceipt;
|
|
6028
5790
|
OntologicalSurfaceProjectionManifest?: OntologicalSurfaceProjectionManifest;
|
|
@@ -6086,11 +5848,8 @@ export interface CoReasonSharedKernelOntology {
|
|
|
6086
5848
|
SideEffectProfile?: SideEffectProfile1;
|
|
6087
5849
|
SimulationConvergenceSLA?: SimulationConvergenceSLA1;
|
|
6088
5850
|
SimulationEscrowContract?: SimulationEscrowContract1;
|
|
6089
|
-
SpanEvent?: SpanEvent;
|
|
6090
|
-
SpanKindProfile?: SpanKindProfile;
|
|
6091
|
-
SpanStatusCodeProfile?: SpanStatusCodeProfile;
|
|
6092
5851
|
SpatialBillboardContract?: SpatialBillboardContract;
|
|
6093
|
-
SpatialHardwareProfile?:
|
|
5852
|
+
SpatialHardwareProfile?: SpatialHardwareProfile;
|
|
6094
5853
|
SpatialKinematicActionIntent?: SpatialKinematicActionIntent;
|
|
6095
5854
|
SpatialReferenceFrameManifest?: SpatialReferenceFrameManifest;
|
|
6096
5855
|
SpatialRenderMaterial?: SpatialRenderMaterial;
|
|
@@ -6105,6 +5864,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
6105
5864
|
SteadyStateHypothesisState?: SteadyStateHypothesisState1;
|
|
6106
5865
|
StochasticNodeState?: StochasticNodeState;
|
|
6107
5866
|
StochasticTopologyManifest?: StochasticTopologyManifest;
|
|
5867
|
+
StrategicThoughtNodeIntent?: StrategicThoughtNodeIntent;
|
|
6108
5868
|
StreamingDisfluencyContract?: StreamingDisfluencyContract;
|
|
6109
5869
|
StructuralCausalGraphProfile?: StructuralCausalGraphProfile;
|
|
6110
5870
|
SubstrateHydrationManifest?: SubstrateHydrationManifest;
|
|
@@ -6136,7 +5896,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
6136
5896
|
TerminalCognitiveEvent?: TerminalCognitiveEvent;
|
|
6137
5897
|
TerminalConditionContract?: TerminalConditionContract1;
|
|
6138
5898
|
TheoryOfMindSnapshot?: TheoryOfMindSnapshot;
|
|
6139
|
-
ThermodynamicState?: ThermodynamicState;
|
|
6140
5899
|
ThoughtBranchState?: ThoughtBranchState;
|
|
6141
5900
|
TieBreakerPolicy?: TieBreakerPolicy;
|
|
6142
5901
|
TokenBurnReceipt?: TokenBurnReceipt;
|
|
@@ -6147,7 +5906,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
6147
5906
|
TopologicalRewardContract?: TopologicalRewardContract;
|
|
6148
5907
|
TopologyHashReceipt?: TopologyHashReceipt;
|
|
6149
5908
|
TraceContextState?: TraceContextState1;
|
|
6150
|
-
TraceExportManifest?: TraceExportManifest;
|
|
6151
5909
|
TransformationMechanismProfile?: TransformationMechanismProfile1;
|
|
6152
5910
|
TransitionEdgeProfile?: TransitionEdgeProfile;
|
|
6153
5911
|
TruthMaintenancePolicy?: TruthMaintenancePolicy;
|
|
@@ -6219,17 +5977,17 @@ export interface VectorEmbeddingState {
|
|
|
6219
5977
|
/**
|
|
6220
5978
|
* CoReason Shared Kernel Ontology
|
|
6221
5979
|
*
|
|
6222
|
-
* AGENT INSTRUCTION: Establishes a hardware-level Representation Engineering (RepE) directive to mechanically manipulate latent dimensions via forward-pass tensor injection.
|
|
5980
|
+
* AGENT INSTRUCTION: Establishes a hardware-level Representation Engineering (RepE) directive to mechanically manipulate latent dimensions via forward-pass tensor injection. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
|
|
6223
5981
|
*
|
|
6224
|
-
* CAUSAL AFFORDANCE: Physically forces an additive, ablation, or clamping operation onto the model's residual stream at specific `
|
|
5982
|
+
* CAUSAL AFFORDANCE: Physically forces an additive, ablation, or clamping operation onto the model's residual stream at specific `target_hook_points`, steering the generator away from unstable hallucination geometries prior to token projection.
|
|
6225
5983
|
*
|
|
6226
|
-
* EPISTEMIC BOUNDS: Cryptographically locked by `steering_vector_hash` (SHA-256 pattern `^[a-f0-9]{64}$`). `scaling_factor` is bounded above (`le=100.0`) but unbounded below, permitting negative magnitudes for ablation. The `@model_validator` deterministically sorts `
|
|
5984
|
+
* EPISTEMIC BOUNDS: Cryptographically locked by `steering_vector_hash` (SHA-256 pattern `^[a-f0-9]{64}$`). `scaling_factor` is bounded above (`le=100.0`) but unbounded below, permitting negative magnitudes for ablation. The `@model_validator` deterministically sorts `target_hook_points`.
|
|
6227
5985
|
*
|
|
6228
|
-
* MCP ROUTING TRIGGERS: Representation Engineering, RepE, Activation Steering, Residual Stream Ablation, Concept Vectors
|
|
5986
|
+
* MCP ROUTING TRIGGERS: Representation Engineering, RepE, Activation Steering, Residual Stream Ablation, Concept Vectors, TransformerLens, SAELens
|
|
6229
5987
|
*/
|
|
6230
5988
|
export interface ActivationSteeringContract {
|
|
6231
5989
|
steering_vector_hash: SteeringVectorHash;
|
|
6232
|
-
|
|
5990
|
+
target_hook_points: TargetHookPoints;
|
|
6233
5991
|
scaling_factor: ScalingFactor;
|
|
6234
5992
|
vector_modality: VectorModality;
|
|
6235
5993
|
}
|
|
@@ -6252,46 +6010,6 @@ export interface ActiveInferenceContract {
|
|
|
6252
6010
|
expected_information_gain: ExpectedInformationGain;
|
|
6253
6011
|
execution_cost_budget_magnitude: ExecutionCostBudgetMagnitude;
|
|
6254
6012
|
}
|
|
6255
|
-
/**
|
|
6256
|
-
* CoReason Shared Kernel Ontology
|
|
6257
|
-
*
|
|
6258
|
-
* AGENT INSTRUCTION: A macroscopic container tracking the directed graph of evolutionary retries across an entire task lifecycle.
|
|
6259
|
-
*
|
|
6260
|
-
* CAUSAL AFFORDANCE: Aggregates free energy across multiple EpistemicRejectionReceipts to trigger thermodynamic circuit breakers when convergence fails.
|
|
6261
|
-
*
|
|
6262
|
-
* EPISTEMIC BOUNDS: Aggregated free energy must be non-negative. Rejection history is deterministically sorted by receipt_cid for immutable hashing.
|
|
6263
|
-
*
|
|
6264
|
-
* MCP ROUTING TRIGGERS: Active Inference Loop, Thermodynamic Circuit Breaker, Epistemic Aggregation, Retry Ledger
|
|
6265
|
-
*/
|
|
6266
|
-
export interface ActiveInferenceEpochState {
|
|
6267
|
-
epoch_cid: EpochCid;
|
|
6268
|
-
target_objective_cid?: TargetObjectiveCid;
|
|
6269
|
-
rejection_history?: RejectionHistory;
|
|
6270
|
-
current_free_energy: CurrentFreeEnergy;
|
|
6271
|
-
epoch_status?: EpochStatus;
|
|
6272
|
-
}
|
|
6273
|
-
/**
|
|
6274
|
-
* CoReason Shared Kernel Ontology
|
|
6275
|
-
*
|
|
6276
|
-
* AGENT INSTRUCTION: The mathematical backpropagation signal triggered when the Deterministic Compiler rejects a stochastic manifold. Quantifies the rejection and provides a mutation gradient.
|
|
6277
|
-
*
|
|
6278
|
-
* CAUSAL AFFORDANCE: Instructs the LLM ensemble on how to perturb the Upper Confidence Bound (UCB) during the next MCTS generation attempt by mathematically quantifying the error.
|
|
6279
|
-
*
|
|
6280
|
-
* EPISTEMIC BOUNDS: Kullback-Leibler divergence is strictly non-negative. A negative mathematical distance is a paradox and raises a ValueError.
|
|
6281
|
-
*
|
|
6282
|
-
* MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
|
|
6283
|
-
*/
|
|
6284
|
-
export interface EpistemicRejectionReceipt {
|
|
6285
|
-
event_cid: EventCid;
|
|
6286
|
-
prior_event_hash?: PriorEventHash;
|
|
6287
|
-
timestamp: Timestamp;
|
|
6288
|
-
topology_class?: TopologyClass;
|
|
6289
|
-
receipt_cid: ReceiptCid;
|
|
6290
|
-
failed_projection_cid: FailedProjectionCid;
|
|
6291
|
-
violated_algebraic_constraint: ViolatedAlgebraicConstraint;
|
|
6292
|
-
kl_divergence_to_validity: KlDivergenceToValidity;
|
|
6293
|
-
stochastic_mutation_gradient: StochasticMutationGradient;
|
|
6294
|
-
}
|
|
6295
6013
|
/**
|
|
6296
6014
|
* CoReason Shared Kernel Ontology
|
|
6297
6015
|
*
|
|
@@ -6304,7 +6022,7 @@ export interface EpistemicRejectionReceipt {
|
|
|
6304
6022
|
* MCP ROUTING TRIGGERS: Social Choice Theory, Condorcet Paradox, MCDA Deadlock, Dictatorial Resolution, Tie-Breaking Heuristic
|
|
6305
6023
|
*/
|
|
6306
6024
|
export interface AdjudicationIntent {
|
|
6307
|
-
topology_class?:
|
|
6025
|
+
topology_class?: TopologyClass;
|
|
6308
6026
|
deadlocked_claims: DeadlockedClaims;
|
|
6309
6027
|
resolution_schema: ResolutionSchema;
|
|
6310
6028
|
timeout_action: TimeoutAction;
|
|
@@ -6343,10 +6061,10 @@ export interface EpistemicProxyStateAny {
|
|
|
6343
6061
|
* Epistemic Commitment, Audit Trail
|
|
6344
6062
|
*/
|
|
6345
6063
|
export interface AdjudicationReceipt {
|
|
6346
|
-
event_cid:
|
|
6347
|
-
prior_event_hash?:
|
|
6348
|
-
timestamp:
|
|
6349
|
-
topology_class?:
|
|
6064
|
+
event_cid: EventCid;
|
|
6065
|
+
prior_event_hash?: PriorEventHash;
|
|
6066
|
+
timestamp: Timestamp;
|
|
6067
|
+
topology_class?: TopologyClass1;
|
|
6350
6068
|
rubric_cid: RubricCid;
|
|
6351
6069
|
/**
|
|
6352
6070
|
* The deterministic capability pointer representing the node that was evaluated.
|
|
@@ -6517,7 +6235,7 @@ export interface EnvironmentalSpoofingProfile {
|
|
|
6517
6235
|
* MCP ROUTING TRIGGERS: Zero-Sum Minimax Game, Red Team vs Blue Team, Macro Abstraction, Generative Adversarial Networks, Topological Compilation
|
|
6518
6236
|
*/
|
|
6519
6237
|
export interface AdversarialMarketTopologyManifest {
|
|
6520
|
-
topology_class?:
|
|
6238
|
+
topology_class?: TopologyClass2;
|
|
6521
6239
|
blue_team_cids: BlueTeamCids;
|
|
6522
6240
|
red_team_cids: RedTeamCids;
|
|
6523
6241
|
/**
|
|
@@ -6607,7 +6325,7 @@ export interface AuthorizationClaims {
|
|
|
6607
6325
|
* MCP ROUTING TRIGGERS: Expected Utility Theory, Multi-Objective Optimization, Epistemic Certainty, Spot Market Bid, Cost Estimation
|
|
6608
6326
|
*/
|
|
6609
6327
|
export interface AgentBidIntent {
|
|
6610
|
-
topology_class?:
|
|
6328
|
+
topology_class?: TopologyClass3;
|
|
6611
6329
|
agent_cid: AgentCid;
|
|
6612
6330
|
estimated_cost_magnitude: EstimatedCostMagnitude;
|
|
6613
6331
|
estimated_latency_ms: EstimatedLatencyMs;
|
|
@@ -6650,7 +6368,7 @@ export interface AmbientState {
|
|
|
6650
6368
|
* CoReason Shared Kernel Ontology
|
|
6651
6369
|
*/
|
|
6652
6370
|
export interface AnalogicalMappingTask {
|
|
6653
|
-
topology_class?:
|
|
6371
|
+
topology_class?: TopologyClass4;
|
|
6654
6372
|
task_cid: TaskCid1;
|
|
6655
6373
|
source_domain: SourceDomain;
|
|
6656
6374
|
target_domain: TargetDomain;
|
|
@@ -6694,7 +6412,7 @@ export interface AnchoringPolicy {
|
|
|
6694
6412
|
* MCP ROUTING TRIGGERS: Gibsonian Affordance, MDP Action Space, Pearlian Do-Operator, Capability-Based Security, Halting Problem
|
|
6695
6413
|
*/
|
|
6696
6414
|
export interface SpatialToolManifest {
|
|
6697
|
-
topology_class?:
|
|
6415
|
+
topology_class?: TopologyClass5;
|
|
6698
6416
|
tool_name: ToolName;
|
|
6699
6417
|
description: Description1;
|
|
6700
6418
|
input_schema: InputSchema;
|
|
@@ -6800,7 +6518,7 @@ export interface ExecutionSLA {
|
|
|
6800
6518
|
* MCP ROUTING TRIGGERS: Actor Model, Object Capability Model, Zero-Trust Architecture, Distributed RPC, Supply-Chain Isolation
|
|
6801
6519
|
*/
|
|
6802
6520
|
export interface MCPServerManifest {
|
|
6803
|
-
topology_class?:
|
|
6521
|
+
topology_class?: TopologyClass6;
|
|
6804
6522
|
server_cid: ServerCid;
|
|
6805
6523
|
transport: Transport;
|
|
6806
6524
|
binary_hash?: BinaryHash;
|
|
@@ -6820,7 +6538,7 @@ export interface MCPServerManifest {
|
|
|
6820
6538
|
* MCP ROUTING TRIGGERS: Inter-Process Communication, POSIX Standard Streams, Local Sandboxing, Binary Execution, Subprocess Spawn
|
|
6821
6539
|
*/
|
|
6822
6540
|
export interface StdioTransportProfile {
|
|
6823
|
-
topology_class?:
|
|
6541
|
+
topology_class?: TopologyClass7;
|
|
6824
6542
|
command: Command;
|
|
6825
6543
|
args?: Args;
|
|
6826
6544
|
env_vars?: EnvVars;
|
|
@@ -6843,7 +6561,7 @@ export interface EnvVars {
|
|
|
6843
6561
|
* MCP ROUTING TRIGGERS: Event-Driven Architecture, Server-Sent Events, Unidirectional Stream, Asynchronous Message Passing, TCP Persistence
|
|
6844
6562
|
*/
|
|
6845
6563
|
export interface SSETransportProfile {
|
|
6846
|
-
topology_class?:
|
|
6564
|
+
topology_class?: TopologyClass8;
|
|
6847
6565
|
uri: Uri;
|
|
6848
6566
|
headers?: Headers;
|
|
6849
6567
|
}
|
|
@@ -6865,7 +6583,7 @@ export interface Headers {
|
|
|
6865
6583
|
* MCP ROUTING TRIGGERS: Stateless Architecture, Zero-Trust Network Access, HTTP Request Smuggling Prevention, JSON-RPC Egress, Out-of-Band Socket
|
|
6866
6584
|
*/
|
|
6867
6585
|
export interface HTTPTransportProfile {
|
|
6868
|
-
topology_class?:
|
|
6586
|
+
topology_class?: TopologyClass9;
|
|
6869
6587
|
uri: Uri1;
|
|
6870
6588
|
headers?: Headers1;
|
|
6871
6589
|
}
|
|
@@ -6929,7 +6647,7 @@ export interface OpticalMappingContract {
|
|
|
6929
6647
|
* MCP ROUTING TRIGGERS: WebAssembly System Interface, Zero-Knowledge Virtual Machine, eBPF, Execution Sandbox, Arbitrary Code Execution Mitigation
|
|
6930
6648
|
*/
|
|
6931
6649
|
export interface EphemeralNamespacePartitionState {
|
|
6932
|
-
topology_class?:
|
|
6650
|
+
topology_class?: TopologyClass10;
|
|
6933
6651
|
partition_cid: PartitionCid;
|
|
6934
6652
|
execution_runtime: ExecutionRuntime;
|
|
6935
6653
|
authorized_bytecode_hashes: AuthorizedBytecodeHashes;
|
|
@@ -6950,7 +6668,7 @@ export interface EphemeralNamespacePartitionState {
|
|
|
6950
6668
|
* MCP ROUTING TRIGGERS: Bipartite Proposer-Verifier, Test-Time Compute, Zero-Trust Execution, Active Inference, Contract Topology
|
|
6951
6669
|
*/
|
|
6952
6670
|
export interface EpistemicZeroTrustContract {
|
|
6953
|
-
topology_class?:
|
|
6671
|
+
topology_class?: TopologyClass11;
|
|
6954
6672
|
intent_cid: IntentCid;
|
|
6955
6673
|
semantic_planning_task: SemanticPlanningTask;
|
|
6956
6674
|
schema_blueprint_name: SchemaBlueprintName;
|
|
@@ -6998,7 +6716,7 @@ export interface ThoughtBranchState {
|
|
|
6998
6716
|
parent_branch_cid?: ParentBranchCid;
|
|
6999
6717
|
latent_content_hash: LatentContentHash;
|
|
7000
6718
|
prm_score?: PrmScore;
|
|
7001
|
-
topology_class?:
|
|
6719
|
+
topology_class?: TopologyClass12;
|
|
7002
6720
|
}
|
|
7003
6721
|
/**
|
|
7004
6722
|
* CoReason Shared Kernel Ontology
|
|
@@ -7013,7 +6731,7 @@ export interface ThoughtBranchState {
|
|
|
7013
6731
|
*/
|
|
7014
6732
|
export interface StochasticTopologyManifest {
|
|
7015
6733
|
topology_cid: TopologyCid;
|
|
7016
|
-
topology_class?:
|
|
6734
|
+
topology_class?: TopologyClass13;
|
|
7017
6735
|
phase: IdeationPhaseProfile;
|
|
7018
6736
|
stochastic_graph: StochasticGraph;
|
|
7019
6737
|
superposition?: HypothesisSuperpositionState | null;
|
|
@@ -7057,6 +6775,24 @@ export interface HypothesisSuperpositionState {
|
|
|
7057
6775
|
export interface CompetingManifolds {
|
|
7058
6776
|
[k: string]: number;
|
|
7059
6777
|
}
|
|
6778
|
+
/**
|
|
6779
|
+
* CoReason Shared Kernel Ontology
|
|
6780
|
+
*
|
|
6781
|
+
* AGENT INSTRUCTION: Instantiates a single discrete node within a Monte Carlo Tree Search (MCTS) topology for long-horizon strategic planning. Emitted by the Claw Code agent during deliberation within the unconstrained `<deliberation>` envelope. The `urn:coreason:oracle:strategic_mcts` MCP evaluates these nodes via the UCT formula and returns expansion or pruning directives.
|
|
6782
|
+
*
|
|
6783
|
+
* CAUSAL AFFORDANCE: Connects discrete logic Premises into a fully verifiable proof tree managed by the Strategic MCTS Oracle. The `parent_node_hash` establishes the Merkle-DAG lineage to the parent thought, enabling deterministic traversal and rollback of rejected reasoning paths. The `heuristic_confidence` feeds directly into the UCT exploration-exploitation calculation.
|
|
6784
|
+
*
|
|
6785
|
+
* EPISTEMIC BOUNDS: The `parent_node_hash` is strictly bounded to exactly 64 hexadecimal characters (SHA-256), establishing a cryptographic chain of custody. The `heuristic_confidence` is bounded to `[0.0, 1.0]` representing a self-evaluated probability of success. The `proposed_action` and `rationale` are bounded to 10,000 characters each to prevent context window exhaustion.
|
|
6786
|
+
*
|
|
6787
|
+
* MCP ROUTING TRIGGERS: Monte Carlo Tree Search, UCT Formula, Strategic Planning, Claw Code Deliberation, Test-Time Compute, Thought Node, Tree of Thoughts
|
|
6788
|
+
*/
|
|
6789
|
+
export interface StrategicThoughtNodeIntent {
|
|
6790
|
+
topology_class?: TopologyClass14;
|
|
6791
|
+
parent_node_hash: ParentNodeHash;
|
|
6792
|
+
proposed_action: ProposedAction;
|
|
6793
|
+
rationale: Rationale;
|
|
6794
|
+
heuristic_confidence: HeuristicConfidence;
|
|
6795
|
+
}
|
|
7060
6796
|
/**
|
|
7061
6797
|
* CoReason Shared Kernel Ontology
|
|
7062
6798
|
*
|
|
@@ -7172,25 +6908,20 @@ export interface ResolutionSchema1 {
|
|
|
7172
6908
|
/**
|
|
7173
6909
|
* CoReason Shared Kernel Ontology
|
|
7174
6910
|
*
|
|
7175
|
-
* AGENT INSTRUCTION:
|
|
6911
|
+
* AGENT INSTRUCTION: Emitted when the deterministic Forge encounters an epistemic deficit it cannot resolve via rigid AST manipulation or formal solvers, triggering an escalation to the heuristic Claw Swarm via the Sovereign LLM Proxy. Do not instantiate for security overrides; use `InterventionIntent` instead.
|
|
7176
6912
|
*
|
|
7177
|
-
* CAUSAL AFFORDANCE:
|
|
6913
|
+
* CAUSAL AFFORDANCE: Unlocks the Forge-to-Claw handoff by packaging the precise epistemic deficit, the contextual Merkle-DAG fragments required for the Claw agent's context window, and the thermodynamic budget ceiling that the Sovereign LLM Proxy will enforce via its circuit breaker.
|
|
7178
6914
|
*
|
|
7179
|
-
* EPISTEMIC BOUNDS: The `
|
|
6915
|
+
* EPISTEMIC BOUNDS: The `target_solver_urn` is strictly anchored to the `urn:coreason:solver:` namespace prefix. The `context_window_cids` array is canonically sorted to guarantee RFC 8785 deterministic hashing. The `thermodynamic_budget` is bounded to `[1, 10_000_000]` tokens to prevent unbounded token burn.
|
|
7180
6916
|
*
|
|
7181
|
-
* MCP ROUTING TRIGGERS:
|
|
6917
|
+
* MCP ROUTING TRIGGERS: Epistemic Deficit Escalation, Forge-to-Claw Handoff, Sovereign LLM Proxy, Thermodynamic Circuit Breaker, MCTS Delegation
|
|
7182
6918
|
*/
|
|
7183
6919
|
export interface EscalationIntent {
|
|
7184
6920
|
topology_class?: TopologyClass21;
|
|
7185
|
-
|
|
7186
|
-
|
|
7187
|
-
|
|
7188
|
-
|
|
7189
|
-
/**
|
|
7190
|
-
* The strict JSON Schema requiring an explicit cryptographic sign-off or justification string to bypass the breaker. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
|
|
7191
|
-
*/
|
|
7192
|
-
export interface ResolutionSchema2 {
|
|
7193
|
-
[k: string]: JsonPrimitiveState;
|
|
6921
|
+
target_solver_urn: TargetSolverUrn;
|
|
6922
|
+
epistemic_deficit_description: EpistemicDeficitDescription;
|
|
6923
|
+
context_window_cids: ContextWindowCids;
|
|
6924
|
+
thermodynamic_budget: ThermodynamicBudget;
|
|
7194
6925
|
}
|
|
7195
6926
|
/**
|
|
7196
6927
|
* CoReason Shared Kernel Ontology
|
|
@@ -7650,23 +7381,48 @@ export interface KinematicDerivativeProfile {
|
|
|
7650
7381
|
/**
|
|
7651
7382
|
* CoReason Shared Kernel Ontology
|
|
7652
7383
|
*
|
|
7653
|
-
* AGENT INSTRUCTION:
|
|
7384
|
+
* AGENT INSTRUCTION: A Kinetic execution trigger used to request the physical instantiation of new execution substrates. This intent is delegated to SkyPilot for multi-cloud spot-market orchestration.
|
|
7654
7385
|
*
|
|
7655
|
-
* CAUSAL AFFORDANCE:
|
|
7386
|
+
* CAUSAL AFFORDANCE: Triggers the expansion loop in the Governance Plane, authorizing the PulumiActuator (backed by SkyPilot) to provision GPU/CPU nodes across AWS, GCP, Azure, or Vast.ai.
|
|
7656
7387
|
*
|
|
7657
|
-
* EPISTEMIC BOUNDS:
|
|
7388
|
+
* EPISTEMIC BOUNDS: Requires a strictly defined `HardwareProfile` and `EscrowPolicy` to prevent thermodynamic runaway. Cost estimates are validated against the `ComputeRateContract`.
|
|
7658
7389
|
*
|
|
7659
|
-
* MCP ROUTING TRIGGERS:
|
|
7390
|
+
* MCP ROUTING TRIGGERS: SkyPilot Orchestration, Multi-Cloud Provisioning, Spot-Market Acquisition, Thermodynamic Expansion, Substrate Instantiation
|
|
7660
7391
|
*/
|
|
7661
7392
|
export interface ComputeProvisioningIntent {
|
|
7662
7393
|
topology_class?: TopologyClass31;
|
|
7394
|
+
provisioning_engine?: ProvisioningEngine;
|
|
7663
7395
|
max_budget: MaxBudget;
|
|
7664
|
-
|
|
7396
|
+
/**
|
|
7397
|
+
* The target physical hardware specification (e.g., A100:8).
|
|
7398
|
+
*/
|
|
7399
|
+
hardware_profile?: SpatialHardwareProfile | null;
|
|
7400
|
+
use_spot?: UseSpot;
|
|
7401
|
+
autostop_idle_minutes?: AutostopIdleMinutes;
|
|
7402
|
+
required_capabilities?: RequiredCapabilities;
|
|
7665
7403
|
/**
|
|
7666
7404
|
* The Quality of Service priority, used by the compute spot market for semantic load shedding.
|
|
7667
7405
|
*/
|
|
7668
7406
|
qos_class?: "critical" | "high" | "interactive" | "background_batch";
|
|
7669
7407
|
}
|
|
7408
|
+
/**
|
|
7409
|
+
* CoReason Shared Kernel Ontology
|
|
7410
|
+
*
|
|
7411
|
+
* AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
|
|
7412
|
+
*
|
|
7413
|
+
* CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
|
|
7414
|
+
*
|
|
7415
|
+
* EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
|
|
7416
|
+
*
|
|
7417
|
+
* MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
|
|
7418
|
+
*/
|
|
7419
|
+
export interface SpatialHardwareProfile {
|
|
7420
|
+
compute_tier?: ComputeTier;
|
|
7421
|
+
min_vram_gb?: MinVramGb;
|
|
7422
|
+
coreason_network_mode?: CoreasonNetworkMode;
|
|
7423
|
+
accelerator_type?: AcceleratorType;
|
|
7424
|
+
provider_whitelist?: ProviderWhitelist;
|
|
7425
|
+
}
|
|
7670
7426
|
/**
|
|
7671
7427
|
* CoReason Shared Kernel Ontology
|
|
7672
7428
|
*
|
|
@@ -7729,7 +7485,7 @@ export interface InterventionIntent {
|
|
|
7729
7485
|
*/
|
|
7730
7486
|
target_node_cid: string;
|
|
7731
7487
|
context_summary: ContextSummary;
|
|
7732
|
-
proposed_action:
|
|
7488
|
+
proposed_action: ProposedAction1;
|
|
7733
7489
|
adjudication_deadline: AdjudicationDeadline;
|
|
7734
7490
|
/**
|
|
7735
7491
|
* Packages the exact contextual state at the moment of computational failure.
|
|
@@ -7786,7 +7542,7 @@ export interface JsonSchemaWhitelist {
|
|
|
7786
7542
|
*/
|
|
7787
7543
|
export interface FallbackSLA {
|
|
7788
7544
|
timeout_seconds: TimeoutSeconds;
|
|
7789
|
-
timeout_action:
|
|
7545
|
+
timeout_action: TimeoutAction3;
|
|
7790
7546
|
/**
|
|
7791
7547
|
* The specific NodeCIDState to route the execution to if the escalate action is triggered.
|
|
7792
7548
|
*/
|
|
@@ -7795,7 +7551,7 @@ export interface FallbackSLA {
|
|
|
7795
7551
|
/**
|
|
7796
7552
|
* The action proposed by the agent that requires approval.
|
|
7797
7553
|
*/
|
|
7798
|
-
export interface
|
|
7554
|
+
export interface ProposedAction1 {
|
|
7799
7555
|
[k: string]: JsonPrimitiveState;
|
|
7800
7556
|
}
|
|
7801
7557
|
/**
|
|
@@ -8349,7 +8105,7 @@ export interface FaultInjectionProfile {
|
|
|
8349
8105
|
/**
|
|
8350
8106
|
* The specific type of fault to inject.
|
|
8351
8107
|
*/
|
|
8352
|
-
fault_category: "
|
|
8108
|
+
fault_category: "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
|
|
8353
8109
|
target_node_cid?: TargetNodeCid1;
|
|
8354
8110
|
intensity: Intensity;
|
|
8355
8111
|
}
|
|
@@ -8374,9 +8130,9 @@ export interface FaultInjectionProfile {
|
|
|
8374
8130
|
* Energy, Exogenous Perturbation, Epistemic Stress Test
|
|
8375
8131
|
*/
|
|
8376
8132
|
export interface ExogenousEpistemicEvent {
|
|
8377
|
-
event_cid:
|
|
8378
|
-
prior_event_hash?:
|
|
8379
|
-
timestamp:
|
|
8133
|
+
event_cid: EventCid1;
|
|
8134
|
+
prior_event_hash?: PriorEventHash1;
|
|
8135
|
+
timestamp: Timestamp1;
|
|
8380
8136
|
topology_class?: TopologyClass50;
|
|
8381
8137
|
shock_cid: ShockCid;
|
|
8382
8138
|
target_node_hash: TargetNodeHash;
|
|
@@ -8681,27 +8437,6 @@ export interface StateMutationIntent {
|
|
|
8681
8437
|
from?: From;
|
|
8682
8438
|
zero_trust_receipt_cid?: ZeroTrustReceiptCid;
|
|
8683
8439
|
}
|
|
8684
|
-
/**
|
|
8685
|
-
* CoReason Shared Kernel Ontology
|
|
8686
|
-
*
|
|
8687
|
-
* AGENT INSTRUCTION: Use this intent to query the Master MCP for available sovereign oracles and verifiable execution substrates.
|
|
8688
|
-
*
|
|
8689
|
-
* CAUSAL AFFORDANCE: Projects a bounded subgraph of available URNs based on the agent's cryptographic identity and security clearance.
|
|
8690
|
-
*
|
|
8691
|
-
* EPISTEMIC BOUNDS: The domain_filter strictly limits the discovery surface to the requested URN namespaces to prevent context window dilution. Physically capped at 1000 elements to prevent CPU exhaustion during canonical sorting.
|
|
8692
|
-
*
|
|
8693
|
-
* MCP ROUTING TRIGGERS: Federated Discovery, Service Mesh, Capability Registry, Substrate Interrogation
|
|
8694
|
-
*/
|
|
8695
|
-
export interface FederatedDiscoveryIntent {
|
|
8696
|
-
topology_class?: TopologyClass61;
|
|
8697
|
-
domain_filter: DomainFilter;
|
|
8698
|
-
/**
|
|
8699
|
-
* The content-addressed hash of the capability being searched for via P2P mesh.
|
|
8700
|
-
*/
|
|
8701
|
-
target_capability_cid?: BundleContentHashState | null;
|
|
8702
|
-
max_network_hops?: MaxNetworkHops;
|
|
8703
|
-
required_security_clearance: RequiredSecurityClearance;
|
|
8704
|
-
}
|
|
8705
8440
|
/**
|
|
8706
8441
|
* CoReason Shared Kernel Ontology
|
|
8707
8442
|
*
|
|
@@ -8714,7 +8449,7 @@ export interface FederatedDiscoveryIntent {
|
|
|
8714
8449
|
* MCP ROUTING TRIGGERS: Semantic Crosswalk, ETL Pipeline, Data Normalization, Knowledge Graph Extraction
|
|
8715
8450
|
*/
|
|
8716
8451
|
export interface OntologicalNormalizationIntent {
|
|
8717
|
-
topology_class?:
|
|
8452
|
+
topology_class?: TopologyClass61;
|
|
8718
8453
|
source_artifact_cid: SourceArtifactCid1;
|
|
8719
8454
|
target_ontology_urn: TargetOntologyUrn;
|
|
8720
8455
|
}
|
|
@@ -8747,8 +8482,8 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8747
8482
|
*/
|
|
8748
8483
|
render_material?: SpatialRenderMaterial | null;
|
|
8749
8484
|
description: Description3;
|
|
8750
|
-
topology_class?:
|
|
8751
|
-
hardware?:
|
|
8485
|
+
topology_class?: TopologyClass62;
|
|
8486
|
+
hardware?: SpatialHardwareProfile1;
|
|
8752
8487
|
security?: EpistemicSecurityProfile;
|
|
8753
8488
|
/**
|
|
8754
8489
|
* The cryptographic contract forcing this agent to embed an undeniable provenance signature into its generative token stream.
|
|
@@ -8910,9 +8645,17 @@ export interface MarkovBlanketRenderingPolicy {
|
|
|
8910
8645
|
occlude_internal_mechanistics?: OccludeInternalMechanistics;
|
|
8911
8646
|
}
|
|
8912
8647
|
/**
|
|
8913
|
-
*
|
|
8648
|
+
* CoReason Shared Kernel Ontology
|
|
8649
|
+
*
|
|
8650
|
+
* AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
|
|
8651
|
+
*
|
|
8652
|
+
* CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
|
|
8653
|
+
*
|
|
8654
|
+
* EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
|
|
8655
|
+
*
|
|
8656
|
+
* MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
|
|
8914
8657
|
*/
|
|
8915
|
-
export interface
|
|
8658
|
+
export interface SpatialHardwareProfile1 {
|
|
8916
8659
|
compute_tier?: ComputeTier;
|
|
8917
8660
|
min_vram_gb?: MinVramGb;
|
|
8918
8661
|
coreason_network_mode?: CoreasonNetworkMode;
|
|
@@ -9284,17 +9027,17 @@ export interface NeuroSymbolicHandoffContract {
|
|
|
9284
9027
|
/**
|
|
9285
9028
|
* CoReason Shared Kernel Ontology
|
|
9286
9029
|
*
|
|
9287
|
-
* AGENT INSTRUCTION: Establishes a rigorous Mechanistic Interpretability brain-scan protocol, executing real-time latent state extraction across targeted neural circuits.
|
|
9030
|
+
* AGENT INSTRUCTION: Establishes a rigorous Mechanistic Interpretability brain-scan protocol, executing real-time latent state extraction across targeted neural circuits. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
|
|
9288
9031
|
*
|
|
9289
|
-
* CAUSAL AFFORDANCE: Authorizes the orchestrator to halt token generation upon specific `trigger_conditions` to physically slice, quantify, and export the top-k SAE features from the designated `
|
|
9032
|
+
* CAUSAL AFFORDANCE: Authorizes the orchestrator to halt token generation upon specific `trigger_conditions` to physically slice, quantify, and export the top-k SAE features from the designated `target_hook_points`.
|
|
9290
9033
|
*
|
|
9291
|
-
* EPISTEMIC BOUNDS: GPU VRAM exhaustion is mathematically prevented by capping `max_features_per_layer` (`gt=0, le=18446744073709551615`). The `@model_validator` deterministically sorts conditions and
|
|
9034
|
+
* EPISTEMIC BOUNDS: GPU VRAM exhaustion is mathematically prevented by capping `max_features_per_layer` (`gt=0, le=18446744073709551615`). The `@model_validator` deterministically sorts conditions and hook points for RFC 8785 hashing. System integrity enforced via `require_zk_commitments`.
|
|
9292
9035
|
*
|
|
9293
|
-
* MCP ROUTING TRIGGERS: Latent State Extraction, Mechanistic Interpretability, Sparse Autoencoder, Zero-Knowledge Commitments, VRAM Optimization
|
|
9036
|
+
* MCP ROUTING TRIGGERS: Latent State Extraction, Mechanistic Interpretability, Sparse Autoencoder, Zero-Knowledge Commitments, VRAM Optimization, TransformerLens, SAELens
|
|
9294
9037
|
*/
|
|
9295
9038
|
export interface MechanisticAuditContract {
|
|
9296
9039
|
trigger_conditions: TriggerConditions;
|
|
9297
|
-
|
|
9040
|
+
target_hook_points: TargetHookPoints1;
|
|
9298
9041
|
max_features_per_layer: MaxFeaturesPerLayer;
|
|
9299
9042
|
require_zk_commitments?: RequireZkCommitments;
|
|
9300
9043
|
}
|
|
@@ -9397,7 +9140,7 @@ export interface CognitiveHumanNodeProfile {
|
|
|
9397
9140
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
9398
9141
|
*/
|
|
9399
9142
|
render_material?: SpatialRenderMaterial | null;
|
|
9400
|
-
topology_class?:
|
|
9143
|
+
topology_class?: TopologyClass63;
|
|
9401
9144
|
required_attestation: RequiredAttestation;
|
|
9402
9145
|
/**
|
|
9403
9146
|
* The continuous spatial vector representing the human operator's localized cognitive focus.
|
|
@@ -9445,7 +9188,7 @@ export interface CognitiveSystemNodeProfile {
|
|
|
9445
9188
|
* The mathematical functor blueprint authorizing the runtime to hydrate a specific open-source engine (e.g., SymbolicAI) for this node.
|
|
9446
9189
|
*/
|
|
9447
9190
|
execution_substrate?: ExecutionSubstrateProfile1 | null;
|
|
9448
|
-
topology_class?:
|
|
9191
|
+
topology_class?: TopologyClass64;
|
|
9449
9192
|
}
|
|
9450
9193
|
/**
|
|
9451
9194
|
* CoReason Shared Kernel Ontology
|
|
@@ -9493,7 +9236,7 @@ export interface CompositeNodeProfile {
|
|
|
9493
9236
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
9494
9237
|
*/
|
|
9495
9238
|
render_material?: SpatialRenderMaterial | null;
|
|
9496
|
-
topology_class?:
|
|
9239
|
+
topology_class?: TopologyClass65;
|
|
9497
9240
|
/**
|
|
9498
9241
|
* The encapsulated subgraph to execute.
|
|
9499
9242
|
*/
|
|
@@ -9533,7 +9276,7 @@ export interface DAGTopologyManifest {
|
|
|
9533
9276
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9534
9277
|
*/
|
|
9535
9278
|
observability?: ObservabilityLODPolicy | null;
|
|
9536
|
-
topology_class?:
|
|
9279
|
+
topology_class?: TopologyClass66;
|
|
9537
9280
|
edges?: Edges;
|
|
9538
9281
|
allow_cycles?: AllowCycles;
|
|
9539
9282
|
/**
|
|
@@ -9712,17 +9455,17 @@ export interface SemanticFirewallPolicy {
|
|
|
9712
9455
|
/**
|
|
9713
9456
|
* CoReason Shared Kernel Ontology
|
|
9714
9457
|
*
|
|
9715
|
-
* AGENT INSTRUCTION: Implements Sparse Dictionary Learning and Mechanistic Interpretability to actively monitor and steer monosemantic neural circuits during the model's forward pass.
|
|
9458
|
+
* AGENT INSTRUCTION: Implements Sparse Dictionary Learning and Mechanistic Interpretability to actively monitor and steer monosemantic neural circuits during the model's forward pass. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
|
|
9716
9459
|
*
|
|
9717
9460
|
* CAUSAL AFFORDANCE: Executes real-time tensor remediation—clamping, halting, quarantining, or smoothly decaying residual stream activations—when specific features diverge toward adversarial or hallucinated geometries.
|
|
9718
9461
|
*
|
|
9719
9462
|
* EPISTEMIC BOUNDS: The `max_activation_threshold` (`ge=0.0, le=18446744073709551615.0`) physically bounds the continuous Euclidean magnitude of the `target_feature_index`. Topologically locked to SAE matrix via `sae_dictionary_hash` (SHA-256). The `@model_validator` `validate_smooth_decay` mathematically enforces asymptotic bounds.
|
|
9720
9463
|
*
|
|
9721
|
-
* MCP ROUTING TRIGGERS: Mechanistic Interpretability, Sparse Autoencoders, Residual Stream Steering, Tensor Remediation, Monosemantic Features
|
|
9464
|
+
* MCP ROUTING TRIGGERS: Mechanistic Interpretability, Sparse Autoencoders, Residual Stream Steering, Tensor Remediation, Monosemantic Features, TransformerLens, SAELens
|
|
9722
9465
|
*/
|
|
9723
9466
|
export interface SaeLatentPolicy {
|
|
9724
9467
|
target_feature_index: TargetFeatureIndex;
|
|
9725
|
-
|
|
9468
|
+
monitored_hook_points: MonitoredHookPoints;
|
|
9726
9469
|
max_activation_threshold: MaxActivationThreshold;
|
|
9727
9470
|
violation_action: ViolationAction1;
|
|
9728
9471
|
clamp_value?: ClampValue;
|
|
@@ -9943,7 +9686,7 @@ export interface CouncilTopologyManifest {
|
|
|
9943
9686
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9944
9687
|
*/
|
|
9945
9688
|
observability?: ObservabilityLODPolicy | null;
|
|
9946
|
-
topology_class?:
|
|
9689
|
+
topology_class?: TopologyClass67;
|
|
9947
9690
|
/**
|
|
9948
9691
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
9949
9692
|
*/
|
|
@@ -10150,7 +9893,7 @@ export interface SwarmTopologyManifest {
|
|
|
10150
9893
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10151
9894
|
*/
|
|
10152
9895
|
observability?: ObservabilityLODPolicy | null;
|
|
10153
|
-
topology_class?:
|
|
9896
|
+
topology_class?: TopologyClass68;
|
|
10154
9897
|
spawning_threshold?: SpawningThreshold;
|
|
10155
9898
|
max_concurrent_agents?: MaxConcurrentAgents;
|
|
10156
9899
|
/**
|
|
@@ -10284,7 +10027,7 @@ export interface EvolutionaryTopologyManifest {
|
|
|
10284
10027
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10285
10028
|
*/
|
|
10286
10029
|
observability?: ObservabilityLODPolicy | null;
|
|
10287
|
-
topology_class?:
|
|
10030
|
+
topology_class?: TopologyClass69;
|
|
10288
10031
|
generations: Generations;
|
|
10289
10032
|
population_size: PopulationSize;
|
|
10290
10033
|
mutation: MutationPolicy;
|
|
@@ -10397,7 +10140,7 @@ export interface SMPCTopologyManifest {
|
|
|
10397
10140
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10398
10141
|
*/
|
|
10399
10142
|
observability?: ObservabilityLODPolicy | null;
|
|
10400
|
-
topology_class?:
|
|
10143
|
+
topology_class?: TopologyClass70;
|
|
10401
10144
|
smpc_protocol: SmpcProtocol;
|
|
10402
10145
|
joint_function_uri: JointFunctionUri;
|
|
10403
10146
|
participant_node_cids: ParticipantNodeCids;
|
|
@@ -10444,7 +10187,7 @@ export interface EvaluatorOptimizerTopologyManifest {
|
|
|
10444
10187
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10445
10188
|
*/
|
|
10446
10189
|
observability?: ObservabilityLODPolicy | null;
|
|
10447
|
-
topology_class?:
|
|
10190
|
+
topology_class?: TopologyClass71;
|
|
10448
10191
|
/**
|
|
10449
10192
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10450
10193
|
*/
|
|
@@ -10494,7 +10237,7 @@ export interface DigitalTwinTopologyManifest {
|
|
|
10494
10237
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10495
10238
|
*/
|
|
10496
10239
|
observability?: ObservabilityLODPolicy | null;
|
|
10497
|
-
topology_class?:
|
|
10240
|
+
topology_class?: TopologyClass72;
|
|
10498
10241
|
target_topology_cid: TargetTopologyCid;
|
|
10499
10242
|
convergence_sla: SimulationConvergenceSLA;
|
|
10500
10243
|
enforce_no_side_effects?: EnforceNoSideEffects;
|
|
@@ -10524,7 +10267,7 @@ export interface SimulationConvergenceSLA {
|
|
|
10524
10267
|
* MCP ROUTING TRIGGERS: Practical Byzantine Fault Tolerance, pBFT, Distributed Consensus, Sybil Resistance, Macro Abstraction
|
|
10525
10268
|
*/
|
|
10526
10269
|
export interface ConsensusFederationTopologyManifest {
|
|
10527
|
-
topology_class?:
|
|
10270
|
+
topology_class?: TopologyClass73;
|
|
10528
10271
|
participant_cids: ParticipantCids;
|
|
10529
10272
|
/**
|
|
10530
10273
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10589,7 +10332,7 @@ export interface CapabilityForgeTopologyManifest {
|
|
|
10589
10332
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10590
10333
|
*/
|
|
10591
10334
|
observability?: ObservabilityLODPolicy | null;
|
|
10592
|
-
topology_class?:
|
|
10335
|
+
topology_class?: TopologyClass74;
|
|
10593
10336
|
target_epistemic_deficit: SemanticDiscoveryIntent1;
|
|
10594
10337
|
/**
|
|
10595
10338
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10743,7 +10486,7 @@ export interface IntentElicitationTopologyManifest {
|
|
|
10743
10486
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10744
10487
|
*/
|
|
10745
10488
|
observability?: ObservabilityLODPolicy | null;
|
|
10746
|
-
topology_class?:
|
|
10489
|
+
topology_class?: TopologyClass75;
|
|
10747
10490
|
raw_human_artifact_cid: RawHumanArtifactCid;
|
|
10748
10491
|
/**
|
|
10749
10492
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10797,7 +10540,7 @@ export interface NeurosymbolicIngestionTopologyManifest {
|
|
|
10797
10540
|
* The dynamic Level of Detail physics bound to this graph.
|
|
10798
10541
|
*/
|
|
10799
10542
|
observability?: ObservabilityLODPolicy | null;
|
|
10800
|
-
topology_class?:
|
|
10543
|
+
topology_class?: TopologyClass76;
|
|
10801
10544
|
/**
|
|
10802
10545
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10803
10546
|
*/
|
|
@@ -10858,7 +10601,7 @@ export interface NeurosymbolicVerificationTopologyManifest {
|
|
|
10858
10601
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10859
10602
|
*/
|
|
10860
10603
|
observability?: ObservabilityLODPolicy | null;
|
|
10861
|
-
topology_class?:
|
|
10604
|
+
topology_class?: TopologyClass77;
|
|
10862
10605
|
proposer_node_cid: ProposerNodeCid;
|
|
10863
10606
|
verifier_node_cid: VerifierNodeCid;
|
|
10864
10607
|
max_revision_loops: MaxRevisionLoops1;
|
|
@@ -10882,7 +10625,7 @@ export interface Nodes11 {
|
|
|
10882
10625
|
* MCP ROUTING TRIGGERS: Discourse Geometry, Rhetorical Flattening, Directed Acyclic Graph, Hierarchical Extraction
|
|
10883
10626
|
*/
|
|
10884
10627
|
export interface DiscourseTreeManifest {
|
|
10885
|
-
topology_class?:
|
|
10628
|
+
topology_class?: TopologyClass78;
|
|
10886
10629
|
manifest_cid: ManifestCid2;
|
|
10887
10630
|
/**
|
|
10888
10631
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10923,7 +10666,7 @@ export interface DiscourseNodeState {
|
|
|
10923
10666
|
* CoReason Shared Kernel Ontology
|
|
10924
10667
|
*/
|
|
10925
10668
|
export interface DocumentKnowledgeGraphManifest {
|
|
10926
|
-
topology_class?:
|
|
10669
|
+
topology_class?: TopologyClass79;
|
|
10927
10670
|
graph_cid: GraphCid;
|
|
10928
10671
|
source_artifact_cid: SourceArtifactCid2;
|
|
10929
10672
|
nodes: Nodes12;
|
|
@@ -11071,7 +10814,7 @@ export interface HomomorphicEncryptionProfile {
|
|
|
11071
10814
|
* MCP ROUTING TRIGGERS: Cross-Modal Isomorphism, Semantic Fusion, Volumetric Projection, Profunctor Optics
|
|
11072
10815
|
*/
|
|
11073
10816
|
export interface ContinuousManifoldMappingContract {
|
|
11074
|
-
topology_class?:
|
|
10817
|
+
topology_class?: TopologyClass80;
|
|
11075
10818
|
/**
|
|
11076
10819
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
11077
10820
|
*/
|
|
@@ -11118,7 +10861,7 @@ export interface SE3TransformProfile4 {
|
|
|
11118
10861
|
* MCP ROUTING TRIGGERS: Spatial-Semantic Isomorphism, Document Object Model, Containment DAG, Visual Hierarchy, Rhetorical Bounding
|
|
11119
10862
|
*/
|
|
11120
10863
|
export interface HierarchicalDOMManifest {
|
|
11121
|
-
topology_class?:
|
|
10864
|
+
topology_class?: TopologyClass81;
|
|
11122
10865
|
dom_cid: DomCid;
|
|
11123
10866
|
root_block_cid: RootBlockCid;
|
|
11124
10867
|
blocks: Blocks;
|
|
@@ -11299,7 +11042,7 @@ export interface MemoizedNodeProfile {
|
|
|
11299
11042
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
11300
11043
|
*/
|
|
11301
11044
|
render_material?: SpatialRenderMaterial | null;
|
|
11302
|
-
topology_class?:
|
|
11045
|
+
topology_class?: TopologyClass82;
|
|
11303
11046
|
/**
|
|
11304
11047
|
* The exact SHA-256 fingerprint of the executed topology.
|
|
11305
11048
|
*/
|
|
@@ -11321,7 +11064,7 @@ export interface ExpectedOutputSchema {
|
|
|
11321
11064
|
* MCP ROUTING TRIGGERS: Conflict-Free Replicated Data Types, State-based Semilattice, Eventual Consistency, G-Set
|
|
11322
11065
|
*/
|
|
11323
11066
|
export interface TemporalGraphCRDTManifest {
|
|
11324
|
-
topology_class?:
|
|
11067
|
+
topology_class?: TopologyClass83;
|
|
11325
11068
|
diff_cid: DiffCid;
|
|
11326
11069
|
author_node_cid: AuthorNodeCid;
|
|
11327
11070
|
lamport_timestamp: LamportTimestamp;
|
|
@@ -11341,10 +11084,10 @@ export interface VectorClock {
|
|
|
11341
11084
|
* AGENT INSTRUCTION: A formal Substrate Projection representing an executable Model Context Protocol (MCP) tool.
|
|
11342
11085
|
*/
|
|
11343
11086
|
export interface MCPToolDefinition {
|
|
11344
|
-
topology_class?:
|
|
11345
|
-
event_cid?:
|
|
11346
|
-
prior_event_hash?:
|
|
11347
|
-
timestamp?:
|
|
11087
|
+
topology_class?: TopologyClass84;
|
|
11088
|
+
event_cid?: EventCid2;
|
|
11089
|
+
prior_event_hash?: PriorEventHash2;
|
|
11090
|
+
timestamp?: Timestamp2;
|
|
11348
11091
|
name: Name;
|
|
11349
11092
|
description: Description9;
|
|
11350
11093
|
inputSchema: Inputschema;
|
|
@@ -11367,11 +11110,11 @@ export interface Inputschema {
|
|
|
11367
11110
|
* MCP ROUTING TRIGGERS: Epistemic Provenance, Crosswalk Resolution, Grounding Receipt, Ontology Access Kit, CURIE
|
|
11368
11111
|
*/
|
|
11369
11112
|
export interface CrosswalkResolutionReceipt {
|
|
11370
|
-
event_cid:
|
|
11371
|
-
prior_event_hash?:
|
|
11372
|
-
timestamp:
|
|
11373
|
-
topology_class?:
|
|
11374
|
-
receipt_cid:
|
|
11113
|
+
event_cid: EventCid3;
|
|
11114
|
+
prior_event_hash?: PriorEventHash3;
|
|
11115
|
+
timestamp: Timestamp3;
|
|
11116
|
+
topology_class?: TopologyClass85;
|
|
11117
|
+
receipt_cid: ReceiptCid;
|
|
11375
11118
|
target_graph_cid: TargetGraphCid3;
|
|
11376
11119
|
resolved_curies: ResolvedCuries;
|
|
11377
11120
|
grounding_confidence: DempsterShaferBeliefVector1;
|
|
@@ -11412,10 +11155,10 @@ export interface DempsterShaferBeliefVector1 {
|
|
|
11412
11155
|
* MCP ROUTING TRIGGERS: Cryptographic Ledger, Formal Verification Receipt, Immutable Provenance, Hash Canonicalization, Data Masking
|
|
11413
11156
|
*/
|
|
11414
11157
|
export interface EpistemicZeroTrustReceipt {
|
|
11415
|
-
event_cid:
|
|
11416
|
-
prior_event_hash?:
|
|
11417
|
-
timestamp:
|
|
11418
|
-
topology_class?:
|
|
11158
|
+
event_cid: EventCid4;
|
|
11159
|
+
prior_event_hash?: PriorEventHash4;
|
|
11160
|
+
timestamp: Timestamp4;
|
|
11161
|
+
topology_class?: TopologyClass86;
|
|
11419
11162
|
intent_reference_cid: IntentReferenceCid;
|
|
11420
11163
|
llm_blind_plan_hash: LlmBlindPlanHash;
|
|
11421
11164
|
firewall_breach_detected?: FirewallBreachDetected;
|
|
@@ -11434,10 +11177,10 @@ export interface EpistemicZeroTrustReceipt {
|
|
|
11434
11177
|
* MCP ROUTING TRIGGERS: Bayesian Evidence, Neurosymbolic Binding, Exogenous Truth, Epistemic Grounding, Payload Topological Bounding
|
|
11435
11178
|
*/
|
|
11436
11179
|
export interface ObservationEvent {
|
|
11437
|
-
event_cid:
|
|
11438
|
-
prior_event_hash?:
|
|
11439
|
-
timestamp:
|
|
11440
|
-
topology_class?:
|
|
11180
|
+
event_cid: EventCid5;
|
|
11181
|
+
prior_event_hash?: PriorEventHash5;
|
|
11182
|
+
timestamp: Timestamp5;
|
|
11183
|
+
topology_class?: TopologyClass87;
|
|
11441
11184
|
payload: Payload;
|
|
11442
11185
|
/**
|
|
11443
11186
|
* The specific topological node that appended this observation.
|
|
@@ -11507,7 +11250,7 @@ export interface HardwareEnclaveReceipt {
|
|
|
11507
11250
|
* MCP ROUTING TRIGGERS: Exogenous Perturbation, DOM Topography, Spatial Execution Bound, Accessibility Tree
|
|
11508
11251
|
*/
|
|
11509
11252
|
export interface BrowserDOMState {
|
|
11510
|
-
topology_class?:
|
|
11253
|
+
topology_class?: TopologyClass88;
|
|
11511
11254
|
current_url: CurrentUrl;
|
|
11512
11255
|
viewport_size: ViewportSize;
|
|
11513
11256
|
dom_hash: DomHash;
|
|
@@ -11526,7 +11269,7 @@ export interface BrowserDOMState {
|
|
|
11526
11269
|
* MCP ROUTING TRIGGERS: POSIX Environment, Exogenous Perturbation, TTY Buffer, Causal Actuator, Stream Crystallization
|
|
11527
11270
|
*/
|
|
11528
11271
|
export interface TerminalBufferState {
|
|
11529
|
-
topology_class?:
|
|
11272
|
+
topology_class?: TopologyClass89;
|
|
11530
11273
|
working_directory: WorkingDirectory;
|
|
11531
11274
|
stdout_hash: StdoutHash;
|
|
11532
11275
|
stderr_hash: StderrHash;
|
|
@@ -11554,21 +11297,21 @@ export interface EmbodiedSensoryVectorProfile {
|
|
|
11554
11297
|
*
|
|
11555
11298
|
* AGENT INSTRUCTION: An append-only, cryptographically frozen coordinate representing the verifiable output of a MechanisticAuditContract.
|
|
11556
11299
|
*
|
|
11557
|
-
* CAUSAL AFFORDANCE: Commits the extracted `SaeFeatureActivationState` matrix (`
|
|
11300
|
+
* CAUSAL AFFORDANCE: Commits the extracted `SaeFeatureActivationState` matrix (`hook_activations`) to the Merkle-DAG. The `causal_scrubbing_applied` boolean mathematically proves that the orchestrator actively resampled or ablated the circuit to confirm direct causal responsibility.
|
|
11558
11301
|
*
|
|
11559
|
-
* EPISTEMIC BOUNDS: Cryptographic integrity structurally anchored by `audit_cid` (128-char CID regex). The `@model_validator` sorts each `SaeFeatureActivationState` list within `
|
|
11302
|
+
* EPISTEMIC BOUNDS: Cryptographic integrity structurally anchored by `audit_cid` (128-char CID regex). The `@model_validator` sorts each `SaeFeatureActivationState` list within `hook_activations` by `feature_index`, guaranteeing zero-variance RFC 8785 Merkle-DAG hashing.
|
|
11560
11303
|
*
|
|
11561
|
-
* MCP ROUTING TRIGGERS: Causal Scrubbing, Epistemic Provenance, Mechanistic Audit, RFC 8785 Canonicalization, Cryptographic Brain-Scan
|
|
11304
|
+
* MCP ROUTING TRIGGERS: Causal Scrubbing, Epistemic Provenance, Mechanistic Audit, RFC 8785 Canonicalization, Cryptographic Brain-Scan, TransformerLens, SAELens
|
|
11562
11305
|
*/
|
|
11563
11306
|
export interface NeuralAuditAttestationReceipt {
|
|
11564
11307
|
audit_cid: AuditCid;
|
|
11565
|
-
|
|
11308
|
+
hook_activations: HookActivations;
|
|
11566
11309
|
causal_scrubbing_applied?: CausalScrubbingApplied;
|
|
11567
11310
|
}
|
|
11568
11311
|
/**
|
|
11569
|
-
* A mapping of specific
|
|
11312
|
+
* A mapping of specific TransformerLens hook points to their top-k activated SAE features.
|
|
11570
11313
|
*/
|
|
11571
|
-
export interface
|
|
11314
|
+
export interface HookActivations {
|
|
11572
11315
|
[k: string]: SaeFeatureActivationState[];
|
|
11573
11316
|
}
|
|
11574
11317
|
/**
|
|
@@ -11638,10 +11381,10 @@ export interface StreamingDisfluencyContract {
|
|
|
11638
11381
|
* MCP ROUTING TRIGGERS: Bayesian Belief Updating, Causal Tracing, Cognitive Synthesis, Merkle-DAG Coordinate, Non-Monotonic Leap
|
|
11639
11382
|
*/
|
|
11640
11383
|
export interface BeliefMutationEvent {
|
|
11641
|
-
event_cid:
|
|
11642
|
-
prior_event_hash?:
|
|
11643
|
-
timestamp:
|
|
11644
|
-
topology_class?:
|
|
11384
|
+
event_cid: EventCid6;
|
|
11385
|
+
prior_event_hash?: PriorEventHash6;
|
|
11386
|
+
timestamp: Timestamp6;
|
|
11387
|
+
topology_class?: TopologyClass90;
|
|
11645
11388
|
payload: Payload1;
|
|
11646
11389
|
/**
|
|
11647
11390
|
* The specific topological node that synthesized this belief assertion.
|
|
@@ -11753,10 +11496,10 @@ export interface LatentScratchpadReceipt {
|
|
|
11753
11496
|
* MCP ROUTING TRIGGERS: Byzantine Fault Tolerance, Circuit Breaker, Terminal State, Execution Collapse, Fault Isolation
|
|
11754
11497
|
*/
|
|
11755
11498
|
export interface SystemFaultEvent {
|
|
11756
|
-
event_cid:
|
|
11757
|
-
prior_event_hash?:
|
|
11758
|
-
timestamp:
|
|
11759
|
-
topology_class?:
|
|
11499
|
+
event_cid: EventCid7;
|
|
11500
|
+
prior_event_hash?: PriorEventHash7;
|
|
11501
|
+
timestamp: Timestamp7;
|
|
11502
|
+
topology_class?: TopologyClass91;
|
|
11760
11503
|
}
|
|
11761
11504
|
/**
|
|
11762
11505
|
* CoReason Shared Kernel Ontology
|
|
@@ -11770,10 +11513,10 @@ export interface SystemFaultEvent {
|
|
|
11770
11513
|
* MCP ROUTING TRIGGERS: Atomic Proposition, Discourse Extraction, Labeled Property Graph, Verifiable Statement
|
|
11771
11514
|
*/
|
|
11772
11515
|
export interface AtomicPropositionState {
|
|
11773
|
-
topology_class?:
|
|
11774
|
-
event_cid:
|
|
11775
|
-
prior_event_hash?:
|
|
11776
|
-
timestamp:
|
|
11516
|
+
topology_class?: TopologyClass92;
|
|
11517
|
+
event_cid: EventCid8;
|
|
11518
|
+
prior_event_hash?: PriorEventHash8;
|
|
11519
|
+
timestamp: Timestamp8;
|
|
11777
11520
|
proposition_cid: PropositionCid;
|
|
11778
11521
|
rhetorical_role: RhetoricalStructureProfile;
|
|
11779
11522
|
illocutionary_force: IllocutionaryForceProfile;
|
|
@@ -11811,10 +11554,10 @@ export interface EmpiricalStatisticalProfile {
|
|
|
11811
11554
|
* MCP ROUTING TRIGGERS: Post-Coordinated Semantics, Latent Manifold Alignment, Semantic Specificity, Entity Assembly
|
|
11812
11555
|
*/
|
|
11813
11556
|
export interface PostCoordinatedSemanticState {
|
|
11814
|
-
topology_class?:
|
|
11815
|
-
event_cid:
|
|
11816
|
-
prior_event_hash?:
|
|
11817
|
-
timestamp:
|
|
11557
|
+
topology_class?: TopologyClass93;
|
|
11558
|
+
event_cid: EventCid9;
|
|
11559
|
+
prior_event_hash?: PriorEventHash9;
|
|
11560
|
+
timestamp: Timestamp9;
|
|
11818
11561
|
concept_cid: ConceptCid;
|
|
11819
11562
|
/**
|
|
11820
11563
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -11842,10 +11585,10 @@ export interface ContextualModifiers {
|
|
|
11842
11585
|
* MCP ROUTING TRIGGERS: Artifact Contagion Prevention, Terminal Fault, VLM Crash, Malformed Bytes, DRM Lock
|
|
11843
11586
|
*/
|
|
11844
11587
|
export interface ArtifactCorruptionEvent {
|
|
11845
|
-
event_cid:
|
|
11846
|
-
prior_event_hash?:
|
|
11847
|
-
timestamp:
|
|
11848
|
-
topology_class?:
|
|
11588
|
+
event_cid: EventCid10;
|
|
11589
|
+
prior_event_hash?: PriorEventHash10;
|
|
11590
|
+
timestamp: Timestamp10;
|
|
11591
|
+
topology_class?: TopologyClass94;
|
|
11849
11592
|
artifact_cid: ArtifactCid;
|
|
11850
11593
|
corruption_class: CorruptionClass;
|
|
11851
11594
|
diagnostic_hash: DiagnosticHash;
|
|
@@ -11862,10 +11605,10 @@ export interface ArtifactCorruptionEvent {
|
|
|
11862
11605
|
* MCP ROUTING TRIGGERS: Abductive Reasoning, Popperian Falsification, Bayesian Prior, Causal Hypothesis, Epistemic Commitment
|
|
11863
11606
|
*/
|
|
11864
11607
|
export interface HypothesisGenerationEvent {
|
|
11865
|
-
event_cid:
|
|
11866
|
-
prior_event_hash?:
|
|
11867
|
-
timestamp:
|
|
11868
|
-
topology_class?:
|
|
11608
|
+
event_cid: EventCid11;
|
|
11609
|
+
prior_event_hash?: PriorEventHash11;
|
|
11610
|
+
timestamp: Timestamp11;
|
|
11611
|
+
topology_class?: TopologyClass95;
|
|
11869
11612
|
hypothesis_cid: HypothesisCid;
|
|
11870
11613
|
premise_text: PremiseText;
|
|
11871
11614
|
bayesian_prior: BayesianPrior;
|
|
@@ -11904,10 +11647,10 @@ export interface StructuralCausalGraphProfile {
|
|
|
11904
11647
|
* MCP ROUTING TRIGGERS: Asynchronous Interrupt, Generative Severing, Context Switching, Defeasible Disposition, Wave Collapse
|
|
11905
11648
|
*/
|
|
11906
11649
|
export interface BargeInInterruptEvent {
|
|
11907
|
-
event_cid:
|
|
11908
|
-
prior_event_hash?:
|
|
11909
|
-
timestamp:
|
|
11910
|
-
topology_class?:
|
|
11650
|
+
event_cid: EventCid12;
|
|
11651
|
+
prior_event_hash?: PriorEventHash12;
|
|
11652
|
+
timestamp: Timestamp12;
|
|
11653
|
+
topology_class?: TopologyClass96;
|
|
11911
11654
|
target_event_cid: TargetEventCid1;
|
|
11912
11655
|
/**
|
|
11913
11656
|
* The continuous multimodal trigger (e.g., audio spike, user saying 'stop') that justified the interruption.
|
|
@@ -11928,10 +11671,10 @@ export interface BargeInInterruptEvent {
|
|
|
11928
11671
|
* MCP ROUTING TRIGGERS: Counterfactual Regret Minimization, Pearlian Do-Calculus, Opportunity Cost, Alternative Timeline, Policy Gradient Update
|
|
11929
11672
|
*/
|
|
11930
11673
|
export interface CounterfactualRegretEvent {
|
|
11931
|
-
event_cid:
|
|
11932
|
-
prior_event_hash?:
|
|
11933
|
-
timestamp:
|
|
11934
|
-
topology_class?:
|
|
11674
|
+
event_cid: EventCid13;
|
|
11675
|
+
prior_event_hash?: PriorEventHash13;
|
|
11676
|
+
timestamp: Timestamp13;
|
|
11677
|
+
topology_class?: TopologyClass97;
|
|
11935
11678
|
historical_event_cid: HistoricalEventCid;
|
|
11936
11679
|
counterfactual_intervention: CounterfactualIntervention;
|
|
11937
11680
|
expected_utility_actual: ExpectedUtilityActual;
|
|
@@ -11957,10 +11700,10 @@ export interface PolicyMutationGradients {
|
|
|
11957
11700
|
* MCP ROUTING TRIGGERS: Pearlian Do-Operator, Kinetic Commitment, Active Inference, Thermodynamic Escrow, Zero-Trust Actuation
|
|
11958
11701
|
*/
|
|
11959
11702
|
export interface ToolInvocationEvent {
|
|
11960
|
-
event_cid:
|
|
11961
|
-
prior_event_hash?:
|
|
11962
|
-
timestamp:
|
|
11963
|
-
topology_class?:
|
|
11703
|
+
event_cid: EventCid14;
|
|
11704
|
+
prior_event_hash?: PriorEventHash14;
|
|
11705
|
+
timestamp: Timestamp14;
|
|
11706
|
+
topology_class?: TopologyClass98;
|
|
11964
11707
|
tool_name: ToolName1;
|
|
11965
11708
|
parameters: Parameters;
|
|
11966
11709
|
authorized_budget_magnitude: AuthorizedBudgetMagnitude;
|
|
@@ -12023,10 +11766,10 @@ export interface ZeroKnowledgeReceipt1 {
|
|
|
12023
11766
|
* MCP ROUTING TRIGGERS: Hippocampal Consolidation, Knowledge Distillation, Semantic Memory, Shannon Entropy Compression, Epistemic Promotion
|
|
12024
11767
|
*/
|
|
12025
11768
|
export interface EpistemicPromotionEvent {
|
|
12026
|
-
event_cid:
|
|
12027
|
-
prior_event_hash?:
|
|
12028
|
-
timestamp:
|
|
12029
|
-
topology_class?:
|
|
11769
|
+
event_cid: EventCid15;
|
|
11770
|
+
prior_event_hash?: PriorEventHash15;
|
|
11771
|
+
timestamp: Timestamp15;
|
|
11772
|
+
topology_class?: TopologyClass99;
|
|
12030
11773
|
source_episodic_event_cids: SourceEpisodicEventCids;
|
|
12031
11774
|
crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
|
|
12032
11775
|
compression_ratio: CompressionRatio;
|
|
@@ -12043,11 +11786,11 @@ export interface EpistemicPromotionEvent {
|
|
|
12043
11786
|
* MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
|
|
12044
11787
|
*/
|
|
12045
11788
|
export interface NormativeDriftEvent {
|
|
12046
|
-
event_cid:
|
|
12047
|
-
prior_event_hash?:
|
|
12048
|
-
timestamp:
|
|
12049
|
-
topology_class?:
|
|
12050
|
-
tripped_rule_cid:
|
|
11789
|
+
event_cid: EventCid16;
|
|
11790
|
+
prior_event_hash?: PriorEventHash16;
|
|
11791
|
+
timestamp: Timestamp16;
|
|
11792
|
+
topology_class?: TopologyClass100;
|
|
11793
|
+
tripped_rule_cid: TrippedRuleCid;
|
|
12051
11794
|
measured_semantic_drift: MeasuredSemanticDrift;
|
|
12052
11795
|
contradiction_proof_hash: ContradictionProofHash;
|
|
12053
11796
|
}
|
|
@@ -12063,10 +11806,10 @@ export interface NormativeDriftEvent {
|
|
|
12063
11806
|
* MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
|
|
12064
11807
|
*/
|
|
12065
11808
|
export interface PersistenceCommitReceipt {
|
|
12066
|
-
event_cid:
|
|
12067
|
-
prior_event_hash?:
|
|
12068
|
-
timestamp:
|
|
12069
|
-
topology_class?:
|
|
11809
|
+
event_cid: EventCid17;
|
|
11810
|
+
prior_event_hash?: PriorEventHash17;
|
|
11811
|
+
timestamp: Timestamp17;
|
|
11812
|
+
topology_class?: TopologyClass101;
|
|
12070
11813
|
lakehouse_snapshot_cid: LakehouseSnapshotCid;
|
|
12071
11814
|
committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
|
|
12072
11815
|
target_table_uri: TargetTableUri;
|
|
@@ -12083,10 +11826,10 @@ export interface PersistenceCommitReceipt {
|
|
|
12083
11826
|
* MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
|
|
12084
11827
|
*/
|
|
12085
11828
|
export interface TokenBurnReceipt {
|
|
12086
|
-
event_cid:
|
|
12087
|
-
prior_event_hash?:
|
|
12088
|
-
timestamp:
|
|
12089
|
-
topology_class?:
|
|
11829
|
+
event_cid: EventCid18;
|
|
11830
|
+
prior_event_hash?: PriorEventHash18;
|
|
11831
|
+
timestamp: Timestamp18;
|
|
11832
|
+
topology_class?: TopologyClass102;
|
|
12090
11833
|
tool_invocation_cid: ToolInvocationCid;
|
|
12091
11834
|
input_tokens: InputTokens;
|
|
12092
11835
|
output_tokens: OutputTokens;
|
|
@@ -12104,10 +11847,10 @@ export interface TokenBurnReceipt {
|
|
|
12104
11847
|
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
|
|
12105
11848
|
*/
|
|
12106
11849
|
export interface BudgetExhaustionEvent {
|
|
12107
|
-
event_cid:
|
|
12108
|
-
prior_event_hash?:
|
|
12109
|
-
timestamp:
|
|
12110
|
-
topology_class?:
|
|
11850
|
+
event_cid: EventCid19;
|
|
11851
|
+
prior_event_hash?: PriorEventHash19;
|
|
11852
|
+
timestamp: Timestamp19;
|
|
11853
|
+
topology_class?: TopologyClass103;
|
|
12111
11854
|
exhausted_escrow_cid: ExhaustedEscrowCid;
|
|
12112
11855
|
final_burn_receipt_cid: FinalBurnReceiptCid;
|
|
12113
11856
|
}
|
|
@@ -12123,10 +11866,10 @@ export interface BudgetExhaustionEvent {
|
|
|
12123
11866
|
* MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
|
|
12124
11867
|
*/
|
|
12125
11868
|
export interface EpistemicTelemetryEvent {
|
|
12126
|
-
event_cid:
|
|
12127
|
-
prior_event_hash?:
|
|
12128
|
-
timestamp:
|
|
12129
|
-
topology_class?:
|
|
11869
|
+
event_cid: EventCid20;
|
|
11870
|
+
prior_event_hash?: PriorEventHash20;
|
|
11871
|
+
timestamp: Timestamp20;
|
|
11872
|
+
topology_class?: TopologyClass104;
|
|
12130
11873
|
interaction_modality: InteractionModality;
|
|
12131
11874
|
target_node_cid: TargetNodeCid2;
|
|
12132
11875
|
dwell_duration_ms?: DwellDurationMs;
|
|
@@ -12147,10 +11890,10 @@ export interface EpistemicTelemetryEvent {
|
|
|
12147
11890
|
* MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
|
|
12148
11891
|
*/
|
|
12149
11892
|
export interface CognitivePredictionReceipt {
|
|
12150
|
-
event_cid:
|
|
12151
|
-
prior_event_hash?:
|
|
12152
|
-
timestamp:
|
|
12153
|
-
topology_class?:
|
|
11893
|
+
event_cid: EventCid21;
|
|
11894
|
+
prior_event_hash?: PriorEventHash21;
|
|
11895
|
+
timestamp: Timestamp21;
|
|
11896
|
+
topology_class?: TopologyClass105;
|
|
12154
11897
|
source_chain_cid: SourceChainCid;
|
|
12155
11898
|
target_source_concept: TargetSourceConcept;
|
|
12156
11899
|
predicted_top_k_tokens: PredictedTopKTokens;
|
|
@@ -12167,10 +11910,10 @@ export interface CognitivePredictionReceipt {
|
|
|
12167
11910
|
* MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
|
|
12168
11911
|
*/
|
|
12169
11912
|
export interface EpistemicAxiomVerificationReceipt {
|
|
12170
|
-
event_cid:
|
|
12171
|
-
prior_event_hash?:
|
|
12172
|
-
timestamp:
|
|
12173
|
-
topology_class?:
|
|
11913
|
+
event_cid: EventCid22;
|
|
11914
|
+
prior_event_hash?: PriorEventHash22;
|
|
11915
|
+
timestamp: Timestamp22;
|
|
11916
|
+
topology_class?: TopologyClass106;
|
|
12174
11917
|
source_prediction_cid: SourcePredictionCid;
|
|
12175
11918
|
sequence_similarity_score: SequenceSimilarityScore;
|
|
12176
11919
|
fact_score_passed: FactScorePassed;
|
|
@@ -12201,10 +11944,10 @@ export interface EpistemicAxiomVerificationReceipt {
|
|
|
12201
11944
|
* Baseline Normalization, Reinforcement Learning
|
|
12202
11945
|
*/
|
|
12203
11946
|
export interface CognitiveRewardEvaluationReceipt {
|
|
12204
|
-
event_cid:
|
|
12205
|
-
prior_event_hash?:
|
|
12206
|
-
timestamp:
|
|
12207
|
-
topology_class?:
|
|
11947
|
+
event_cid: EventCid23;
|
|
11948
|
+
prior_event_hash?: PriorEventHash23;
|
|
11949
|
+
timestamp: Timestamp23;
|
|
11950
|
+
topology_class?: TopologyClass107;
|
|
12208
11951
|
source_generation_cid: SourceGenerationCid;
|
|
12209
11952
|
extracted_axioms?: ExtractedAxioms;
|
|
12210
11953
|
calculated_r_path: CalculatedRPath;
|
|
@@ -12247,10 +11990,10 @@ export interface EpistemicAxiomState {
|
|
|
12247
11990
|
* Scalar Backpropagation, Acyclic Path
|
|
12248
11991
|
*/
|
|
12249
11992
|
export interface EpistemicFlowStateReceipt {
|
|
12250
|
-
event_cid:
|
|
12251
|
-
prior_event_hash?:
|
|
12252
|
-
timestamp:
|
|
12253
|
-
topology_class?:
|
|
11993
|
+
event_cid: EventCid24;
|
|
11994
|
+
prior_event_hash?: PriorEventHash24;
|
|
11995
|
+
timestamp: Timestamp24;
|
|
11996
|
+
topology_class?: TopologyClass108;
|
|
12254
11997
|
source_trajectory_cid: SourceTrajectoryCid;
|
|
12255
11998
|
estimated_flow_value: EstimatedFlowValue;
|
|
12256
11999
|
terminal_reward_factorized: TerminalRewardFactorized;
|
|
@@ -12276,10 +12019,10 @@ export interface EpistemicFlowStateReceipt {
|
|
|
12276
12019
|
* Macroscopic Explanation, Deterministic Sorting
|
|
12277
12020
|
*/
|
|
12278
12021
|
export interface CausalExplanationEvent {
|
|
12279
|
-
event_cid:
|
|
12280
|
-
prior_event_hash?:
|
|
12281
|
-
timestamp:
|
|
12282
|
-
topology_class?:
|
|
12022
|
+
event_cid: EventCid25;
|
|
12023
|
+
prior_event_hash?: PriorEventHash25;
|
|
12024
|
+
timestamp: Timestamp25;
|
|
12025
|
+
topology_class?: TopologyClass109;
|
|
12283
12026
|
target_outcome_event_cid: TargetOutcomeEventCid;
|
|
12284
12027
|
collective_intelligence: CollectiveIntelligenceProfile;
|
|
12285
12028
|
agent_attributions: AgentAttributions;
|
|
@@ -12340,10 +12083,10 @@ export interface ShapleyAttributionReceipt {
|
|
|
12340
12083
|
* Routing Heuristic, Semantic Wave Collapse
|
|
12341
12084
|
*/
|
|
12342
12085
|
export interface IntentClassificationReceipt {
|
|
12343
|
-
event_cid:
|
|
12344
|
-
prior_event_hash?:
|
|
12345
|
-
timestamp:
|
|
12346
|
-
topology_class?:
|
|
12086
|
+
event_cid: EventCid26;
|
|
12087
|
+
prior_event_hash?: PriorEventHash26;
|
|
12088
|
+
timestamp: Timestamp26;
|
|
12089
|
+
topology_class?: TopologyClass110;
|
|
12347
12090
|
raw_input_string: RawInputString;
|
|
12348
12091
|
classified_intent: ClassifiedIntent;
|
|
12349
12092
|
confidence_score: ConfidenceScore1;
|
|
@@ -12361,10 +12104,10 @@ export interface IntentClassificationReceipt {
|
|
|
12361
12104
|
* MCP ROUTING TRIGGERS: Semantic Relational Record, Payload Injection, Hardware Guillotine, Structured Telemetry
|
|
12362
12105
|
*/
|
|
12363
12106
|
export interface SemanticRelationalVectorState {
|
|
12364
|
-
topology_class?:
|
|
12365
|
-
event_cid:
|
|
12366
|
-
prior_event_hash?:
|
|
12367
|
-
timestamp:
|
|
12107
|
+
topology_class?: TopologyClass111;
|
|
12108
|
+
event_cid: EventCid27;
|
|
12109
|
+
prior_event_hash?: PriorEventHash27;
|
|
12110
|
+
timestamp: Timestamp27;
|
|
12368
12111
|
ontology_class: UpperOntologyClassProfile;
|
|
12369
12112
|
temporal_bounds: TemporalBoundsProfile1;
|
|
12370
12113
|
formal_schema_urn?: FormalSchemaUrn1;
|
|
@@ -12406,10 +12149,10 @@ export interface PayloadInjectionZone {
|
|
|
12406
12149
|
* MCP ROUTING TRIGGERS: Ontological Reification, Bimodal Semantic Transformation, Epistemic Ledger, Traceability Collapse
|
|
12407
12150
|
*/
|
|
12408
12151
|
export interface OntologicalReificationReceipt {
|
|
12409
|
-
topology_class?:
|
|
12410
|
-
event_cid:
|
|
12411
|
-
prior_event_hash?:
|
|
12412
|
-
timestamp:
|
|
12152
|
+
topology_class?: TopologyClass112;
|
|
12153
|
+
event_cid: EventCid28;
|
|
12154
|
+
prior_event_hash?: PriorEventHash28;
|
|
12155
|
+
timestamp: Timestamp28;
|
|
12413
12156
|
source_data_hash: SourceDataHash;
|
|
12414
12157
|
target_namespace: TargetNamespace;
|
|
12415
12158
|
algorithmic_mechanism: TransformationMechanismProfile;
|
|
@@ -12446,10 +12189,10 @@ export interface DempsterShaferBeliefVector2 {
|
|
|
12446
12189
|
* MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
|
|
12447
12190
|
*/
|
|
12448
12191
|
export interface CircuitBreakerEvent {
|
|
12449
|
-
event_cid:
|
|
12450
|
-
prior_event_hash?:
|
|
12451
|
-
timestamp:
|
|
12452
|
-
topology_class?:
|
|
12192
|
+
event_cid: EventCid29;
|
|
12193
|
+
prior_event_hash?: PriorEventHash29;
|
|
12194
|
+
timestamp: Timestamp29;
|
|
12195
|
+
topology_class?: TopologyClass113;
|
|
12453
12196
|
/**
|
|
12454
12197
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
12455
12198
|
*/
|
|
@@ -12468,10 +12211,10 @@ export interface CircuitBreakerEvent {
|
|
|
12468
12211
|
* MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
|
|
12469
12212
|
*/
|
|
12470
12213
|
export interface EpistemicLogEvent {
|
|
12471
|
-
event_cid:
|
|
12472
|
-
prior_event_hash?:
|
|
12473
|
-
topology_class?:
|
|
12474
|
-
timestamp:
|
|
12214
|
+
event_cid: EventCid30;
|
|
12215
|
+
prior_event_hash?: PriorEventHash30;
|
|
12216
|
+
topology_class?: TopologyClass114;
|
|
12217
|
+
timestamp: Timestamp30;
|
|
12475
12218
|
level: Level;
|
|
12476
12219
|
message: Message1;
|
|
12477
12220
|
context_profile?: TelemetryContextProfile;
|
|
@@ -12501,10 +12244,10 @@ export interface TelemetryContextProfile {
|
|
|
12501
12244
|
* MCP ROUTING TRIGGERS: Cryptographic Nonce, State Resumption, Replay Attack Prevention, Wetware Attestation, Liveness Resolution
|
|
12502
12245
|
*/
|
|
12503
12246
|
export interface InterventionReceipt {
|
|
12504
|
-
topology_class?:
|
|
12505
|
-
event_cid:
|
|
12506
|
-
prior_event_hash?:
|
|
12507
|
-
timestamp:
|
|
12247
|
+
topology_class?: TopologyClass115;
|
|
12248
|
+
event_cid: EventCid31;
|
|
12249
|
+
prior_event_hash?: PriorEventHash31;
|
|
12250
|
+
timestamp: Timestamp31;
|
|
12508
12251
|
intervention_request_cid: InterventionRequestCid;
|
|
12509
12252
|
/**
|
|
12510
12253
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -12559,10 +12302,10 @@ export interface WetwareAttestationContract {
|
|
|
12559
12302
|
* MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
|
|
12560
12303
|
*/
|
|
12561
12304
|
export interface CustodyReceipt {
|
|
12562
|
-
event_cid:
|
|
12563
|
-
prior_event_hash?:
|
|
12564
|
-
timestamp:
|
|
12565
|
-
topology_class?:
|
|
12305
|
+
event_cid: EventCid32;
|
|
12306
|
+
prior_event_hash?: PriorEventHash32;
|
|
12307
|
+
timestamp: Timestamp32;
|
|
12308
|
+
topology_class?: TopologyClass116;
|
|
12566
12309
|
custody_cid: CustodyCid;
|
|
12567
12310
|
source_node_cid: SourceNodeCid;
|
|
12568
12311
|
applied_policy_cid: AppliedPolicyCid;
|
|
@@ -12582,10 +12325,10 @@ export interface CustodyReceipt {
|
|
|
12582
12325
|
* MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
|
|
12583
12326
|
*/
|
|
12584
12327
|
export interface DefeasibleAttackEvent {
|
|
12585
|
-
event_cid:
|
|
12586
|
-
prior_event_hash?:
|
|
12587
|
-
timestamp:
|
|
12588
|
-
topology_class?:
|
|
12328
|
+
event_cid: EventCid33;
|
|
12329
|
+
prior_event_hash?: PriorEventHash33;
|
|
12330
|
+
timestamp: Timestamp33;
|
|
12331
|
+
topology_class?: TopologyClass117;
|
|
12589
12332
|
attack_cid: AttackCid;
|
|
12590
12333
|
source_claim_cid: SourceClaimCid;
|
|
12591
12334
|
target_claim_cid: TargetClaimCid;
|
|
@@ -12594,6 +12337,28 @@ export interface DefeasibleAttackEvent {
|
|
|
12594
12337
|
*/
|
|
12595
12338
|
attack_vector: "rebuttal" | "undercutter" | "underminer";
|
|
12596
12339
|
}
|
|
12340
|
+
/**
|
|
12341
|
+
* CoReason Shared Kernel Ontology
|
|
12342
|
+
*
|
|
12343
|
+
* AGENT INSTRUCTION: The mathematical backpropagation signal triggered when the Deterministic Compiler rejects a stochastic manifold. Quantifies the rejection and provides a mutation gradient.
|
|
12344
|
+
*
|
|
12345
|
+
* CAUSAL AFFORDANCE: Instructs the LLM ensemble on how to perturb the Upper Confidence Bound (UCB) during the next MCTS generation attempt by mathematically quantifying the error.
|
|
12346
|
+
*
|
|
12347
|
+
* EPISTEMIC BOUNDS: Kullback-Leibler divergence is strictly non-negative. A negative mathematical distance is a paradox and raises a ValueError.
|
|
12348
|
+
*
|
|
12349
|
+
* MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
|
|
12350
|
+
*/
|
|
12351
|
+
export interface EpistemicRejectionReceipt {
|
|
12352
|
+
event_cid: EventCid34;
|
|
12353
|
+
prior_event_hash?: PriorEventHash34;
|
|
12354
|
+
timestamp: Timestamp34;
|
|
12355
|
+
topology_class?: TopologyClass118;
|
|
12356
|
+
receipt_cid: ReceiptCid1;
|
|
12357
|
+
failed_projection_cid: FailedProjectionCid;
|
|
12358
|
+
violated_algebraic_constraint: ViolatedAlgebraicConstraint;
|
|
12359
|
+
kl_divergence_to_validity: KlDivergenceToValidity;
|
|
12360
|
+
stochastic_mutation_gradient: StochasticMutationGradient;
|
|
12361
|
+
}
|
|
12597
12362
|
/**
|
|
12598
12363
|
* CoReason Shared Kernel Ontology
|
|
12599
12364
|
*
|
|
@@ -12697,21 +12462,20 @@ export interface ReturnedBindings {
|
|
|
12697
12462
|
/**
|
|
12698
12463
|
* CoReason Shared Kernel Ontology
|
|
12699
12464
|
*
|
|
12700
|
-
* AGENT INSTRUCTION: A cryptographically frozen historical fact
|
|
12465
|
+
* AGENT INSTRUCTION: A cryptographically frozen historical fact attesting that a specific solver agent executed a task within the Claw Swarm. This receipt is immutable and logged in the Merkle-DAG chain of custody. Do not attempt to mutate this object.
|
|
12701
12466
|
*
|
|
12702
|
-
* CAUSAL AFFORDANCE: Unlocks downstream neurosymbolic synthesis by proving that external epistemic grounding was securely retrieved
|
|
12467
|
+
* CAUSAL AFFORDANCE: Unlocks downstream neurosymbolic synthesis by proving that external epistemic grounding was securely retrieved and executed by a validated solver. The `execution_hash` provides undeniable cryptographic provenance for audit trails. The `tokens_burned` enables the Thermodynamic Quota Manager to settle compute costs.
|
|
12703
12468
|
*
|
|
12704
|
-
* EPISTEMIC BOUNDS: The
|
|
12469
|
+
* EPISTEMIC BOUNDS: The `execution_hash` is strictly bounded to exactly 64 hexadecimal characters (SHA-256). The `solver_urn` is anchored to the `urn:coreason:solver:` namespace. The `tokens_burned` is bounded to `[0, 10_000_000]` to prevent integer overflow during thermodynamic tallying. The `human_attestation_signature` is optional and only populated when a Human-in-the-Loop (HITL) operator cryptographically signs off on the execution result.
|
|
12705
12470
|
*
|
|
12706
|
-
* MCP ROUTING TRIGGERS: Execution Audit, Oracle Telemetry,
|
|
12471
|
+
* MCP ROUTING TRIGGERS: Execution Audit, Merkle-DAG Provenance, Thermodynamic Accounting, Oracle Telemetry, Human-in-the-Loop Attestation, Cryptographic Receipt
|
|
12707
12472
|
*/
|
|
12708
12473
|
export interface OracleExecutionReceipt {
|
|
12709
12474
|
topology_class?: TopologyClass124;
|
|
12710
|
-
|
|
12711
|
-
|
|
12712
|
-
|
|
12713
|
-
|
|
12714
|
-
action_space_cid: ActionSpaceCid1;
|
|
12475
|
+
execution_hash: ExecutionHash;
|
|
12476
|
+
solver_urn: SolverUrn;
|
|
12477
|
+
tokens_burned: TokensBurned;
|
|
12478
|
+
human_attestation_signature?: HumanAttestationSignature;
|
|
12715
12479
|
}
|
|
12716
12480
|
/**
|
|
12717
12481
|
* CoReason Shared Kernel Ontology
|
|
@@ -12896,7 +12660,7 @@ export interface BypassReceipt {
|
|
|
12896
12660
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Action Space, Affordance Theory, State Transition Matrix, Directed Cyclic Graph
|
|
12897
12661
|
*/
|
|
12898
12662
|
export interface CognitiveActionSpaceManifest {
|
|
12899
|
-
action_space_cid:
|
|
12663
|
+
action_space_cid: ActionSpaceCid1;
|
|
12900
12664
|
capabilities: Capabilities;
|
|
12901
12665
|
transition_matrix: TransitionMatrix;
|
|
12902
12666
|
entry_point_cid: EntryPointCid;
|
|
@@ -13088,28 +12852,6 @@ export interface CollectiveIntelligenceProfile1 {
|
|
|
13088
12852
|
coordination_score: CoordinationScore;
|
|
13089
12853
|
information_integration: InformationIntegration;
|
|
13090
12854
|
}
|
|
13091
|
-
/**
|
|
13092
|
-
* CoReason Shared Kernel Ontology
|
|
13093
|
-
*
|
|
13094
|
-
* AGENT INSTRUCTION: The macroscopic envelope that tracks the thermodynamic cost of stochastic ideation and violently halts execution when energy budgets or spatial limits are depleted.
|
|
13095
|
-
*
|
|
13096
|
-
* CAUSAL AFFORDANCE: Operates as the absolute mathematical circuit breaker for MCTS DAG expansion, physically revoking generative privileges if thresholds are breached.
|
|
13097
|
-
*
|
|
13098
|
-
* EPISTEMIC BOUNDS: Bounded by strict topological limits: max_stochastic_diffusions (ge=1) and computational_free_energy_budget (ge=0.0). current_diffusions must be strictly <= max_stochastic_diffusions.
|
|
13099
|
-
*
|
|
13100
|
-
* MCP ROUTING TRIGGERS: Computational Thermodynamics, Spatial Circuit Breaker, MCTS Halting, Epistemic Bounding, Thermodynamic Cost
|
|
13101
|
-
*/
|
|
13102
|
-
export interface ComputationalThermodynamicsProfile {
|
|
13103
|
-
thermodynamics_cid: ThermodynamicsCid;
|
|
13104
|
-
target_topology_cid: TargetTopologyCid1;
|
|
13105
|
-
max_stochastic_diffusions: MaxStochasticDiffusions;
|
|
13106
|
-
computational_free_energy_budget: ComputationalFreeEnergyBudget;
|
|
13107
|
-
current_diffusions?: CurrentDiffusions;
|
|
13108
|
-
remaining_free_energy: RemainingFreeEnergy;
|
|
13109
|
-
entropy_derivative_delta?: EntropyDerivativeDelta;
|
|
13110
|
-
stagnation_tolerance_epsilon?: StagnationToleranceEpsilon;
|
|
13111
|
-
system_state?: ThermodynamicState;
|
|
13112
|
-
}
|
|
13113
12855
|
/**
|
|
13114
12856
|
* CoReason Shared Kernel Ontology
|
|
13115
12857
|
*
|
|
@@ -13228,64 +12970,6 @@ export interface ContinuousMutationPolicy {
|
|
|
13228
12970
|
max_uncommitted_edges: MaxUncommittedEdges;
|
|
13229
12971
|
micro_batch_interval_ms: MicroBatchIntervalMs;
|
|
13230
12972
|
}
|
|
13231
|
-
/**
|
|
13232
|
-
* CoReason Shared Kernel Ontology
|
|
13233
|
-
*
|
|
13234
|
-
* AGENT INSTRUCTION: Tracks the non-monotonic state transition of a Byzantine-tolerant B2B
|
|
13235
|
-
* negotiation between two distinct enterprise tenant CID identifiers (initiating_tenant_cid
|
|
13236
|
-
* and receiving_tenant_cid). As a ...State suffix, this is a declarative, frozen snapshot of
|
|
13237
|
-
* N-dimensional geometry at a specific point in time.
|
|
13238
|
-
*
|
|
13239
|
-
* CAUSAL AFFORDANCE: Transitions the federated network from a proposed capability swap into
|
|
13240
|
-
* an active OntologicalHandshakeReceipt, forcing the execution of the strict offered_sla
|
|
13241
|
-
* (FederatedBilateralSLA).
|
|
13242
|
-
*
|
|
13243
|
-
* EPISTEMIC BOUNDS: Cryptographically bounded by handshake_cid (CID regex
|
|
13244
|
-
* ^[a-zA-Z0-9_.:-]+$). The negotiation lifecycle is physically constrained to the strict
|
|
13245
|
-
* Literal automaton ["proposed", "negotiating", "aligned", "rejected"] via FSM Logit
|
|
13246
|
-
* Masking, preventing execution deadlocks.
|
|
13247
|
-
*
|
|
13248
|
-
* MCP ROUTING TRIGGERS: Byzantine-Tolerant Negotiation, Zero-Trust Handshake, Finite State
|
|
13249
|
-
* Machine, Cross-Tenant Federation, Asynchronous B2B
|
|
13250
|
-
*/
|
|
13251
|
-
export interface CrossSwarmHandshakeState {
|
|
13252
|
-
handshake_cid: HandshakeCid;
|
|
13253
|
-
initiating_tenant_cid: InitiatingTenantCid;
|
|
13254
|
-
receiving_tenant_cid: ReceivingTenantCid;
|
|
13255
|
-
offered_sla: FederatedBilateralSLA;
|
|
13256
|
-
status?: Status1;
|
|
13257
|
-
}
|
|
13258
|
-
/**
|
|
13259
|
-
* The initial structural/data boundary proposed.
|
|
13260
|
-
*/
|
|
13261
|
-
export interface FederatedBilateralSLA {
|
|
13262
|
-
receiving_tenant_cid: ReceivingTenantCid1;
|
|
13263
|
-
max_permitted_classification: SemanticClassificationProfile2;
|
|
13264
|
-
liability_limit_magnitude: LiabilityLimitMagnitude;
|
|
13265
|
-
permitted_geographic_regions?: PermittedGeographicRegions;
|
|
13266
|
-
require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
|
|
13267
|
-
max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
|
|
13268
|
-
/**
|
|
13269
|
-
* The quantum-resistant signature securing the multi-tenant structural boundary.
|
|
13270
|
-
*/
|
|
13271
|
-
pq_signature?: PostQuantumSignatureReceipt | null;
|
|
13272
|
-
}
|
|
13273
|
-
/**
|
|
13274
|
-
* CoReason Shared Kernel Ontology
|
|
13275
|
-
*
|
|
13276
|
-
* AGENT INSTRUCTION: Implements NIST FIPS Post-Quantum Cryptography (PQC), utilizing lattice-based or stateless hash-based structures to guarantee long-term topological integrity on the Merkle-DAG.
|
|
13277
|
-
*
|
|
13278
|
-
* CAUSAL AFFORDANCE: Secures the causal execution graph and Bilateral SLAs against temporal decryption attacks (Harvest Now, Decrypt Later) via Shor's algorithm executed on fault-tolerant quantum computers.
|
|
13279
|
-
*
|
|
13280
|
-
* EPISTEMIC BOUNDS: To accommodate massive dimensional geometry, `pq_signature_blob` is structurally bound to a `100000`-byte `max_length`. `pq_algorithm` is restricted to the Literal set `["ml-dsa", "slh-dsa", "falcon"]`. `public_key_cid` is a 128-char CID.
|
|
13281
|
-
*
|
|
13282
|
-
* MCP ROUTING TRIGGERS: Post-Quantum Cryptography, ML-DSA, SLH-DSA, Shor's Algorithm Resistance, Lattice-based Cryptography
|
|
13283
|
-
*/
|
|
13284
|
-
export interface PostQuantumSignatureReceipt {
|
|
13285
|
-
pq_algorithm: PqAlgorithm;
|
|
13286
|
-
public_key_cid: PublicKeyCid1;
|
|
13287
|
-
pq_signature_blob: PqSignatureBlob;
|
|
13288
|
-
}
|
|
13289
12973
|
/**
|
|
13290
12974
|
* CoReason Shared Kernel Ontology
|
|
13291
12975
|
*
|
|
@@ -13400,45 +13084,39 @@ export interface DelegatedCapabilityManifest {
|
|
|
13400
13084
|
/**
|
|
13401
13085
|
* CoReason Shared Kernel Ontology
|
|
13402
13086
|
*
|
|
13403
|
-
* AGENT INSTRUCTION:
|
|
13087
|
+
* AGENT INSTRUCTION: A Generic two-stage generation wrapper that neutralizes the Format Restriction Penalty (Semantic Tax) during Constrained Decoding. The Sovereign LLM Proxy's XGrammar AOT FSM bitmask MUST be physically toggled between the two fields: DISABLED for `deliberation_trace`, then ENABLED for `payload`. This class models the architectural pattern documented in the Decoupled Reasoning and Formatting specification.
|
|
13404
13088
|
*
|
|
13405
|
-
* CAUSAL AFFORDANCE:
|
|
13089
|
+
* CAUSAL AFFORDANCE: Unlocks the two-stage Thinker-Parser pipeline by providing a single serializable envelope that carries both the unconstrained Chain-of-Thought reasoning trace and the deterministic, schema-compliant structured payload. Enables the Claw Swarm to reason freely while the deterministic Forge receives only validated structural output.
|
|
13406
13090
|
*
|
|
13407
|
-
* EPISTEMIC BOUNDS: The
|
|
13091
|
+
* EPISTEMIC BOUNDS: The `deliberation_trace` has a maximum length of 100,000 characters to prevent context window exhaustion. The `payload` of type `T` is strictly validated against the target `CoreasonBaseState` subclass schema at deserialization time. The Generic parameter `T` must be a `CoreasonBaseState` descendant to guarantee RFC 8785 canonicalization.
|
|
13408
13092
|
*
|
|
13409
|
-
* MCP ROUTING TRIGGERS:
|
|
13093
|
+
* MCP ROUTING TRIGGERS: Semantic Tax Neutralization, Decoupled Reasoning Pipeline, XGrammar FSM Toggle, Constrained Decoding, Two-Stage Generation, Deliberation Envelope
|
|
13410
13094
|
*/
|
|
13411
|
-
export interface
|
|
13412
|
-
|
|
13413
|
-
|
|
13414
|
-
|
|
13095
|
+
export interface DeliberativeEnvelope {
|
|
13096
|
+
deliberation_trace: DeliberationTrace;
|
|
13097
|
+
payload: Payload2;
|
|
13098
|
+
}
|
|
13099
|
+
/**
|
|
13100
|
+
* The deterministic, schema-compliant structured output generated by the Edge model (or the same model in a second pass) with the Sovereign LLM Proxy's XGrammar AOT FSM bitmask STRICTLY ENABLED. This field contains the validated structural result that maps directly to the target CoreasonBaseState subclass.
|
|
13101
|
+
*/
|
|
13102
|
+
export interface Payload2 {
|
|
13103
|
+
[k: string]: unknown;
|
|
13415
13104
|
}
|
|
13416
13105
|
/**
|
|
13417
13106
|
* CoReason Shared Kernel Ontology
|
|
13418
13107
|
*
|
|
13419
|
-
* AGENT INSTRUCTION:
|
|
13420
|
-
* Singular Value Decomposition) mapping one embedding manifold to another,
|
|
13421
|
-
* grounded in the Johnson-Lindenstrauss Lemma. As a ...Contract suffix, this
|
|
13422
|
-
* enforces rigid mathematical boundaries globally.
|
|
13108
|
+
* AGENT INSTRUCTION: Bridges the Neurosymbolic divide by mapping discrete Satisfiability Modulo Theories (SMT) or Lean4 logic proofs into continuous, differentiable loss gradients.
|
|
13423
13109
|
*
|
|
13424
|
-
* CAUSAL AFFORDANCE:
|
|
13425
|
-
* across zero-trust network boundaries, bridging incompatible LLM spaces. The
|
|
13426
|
-
* source_matrix_name and target_matrix_name (both max_length=2000) identify the
|
|
13427
|
-
* origin and destination geometries.
|
|
13110
|
+
* CAUSAL AFFORDANCE: Allows the backpropagation engine to apply a continuous, differentiable penalty (relaxation) to the LLM's probability mass when it violates the formal syntactic rules encoded in the `formal_syntax_smt` representation.
|
|
13428
13111
|
*
|
|
13429
|
-
* EPISTEMIC BOUNDS:
|
|
13430
|
-
* isometry_preservation_score (ge=0.0, le=1.0), ensuring Earth Mover's Distance
|
|
13431
|
-
* preservation. Cryptographic integrity is locked via projection_matrix_hash
|
|
13432
|
-
* (SHA-256 regex ^[a-f0-9]{64}$).
|
|
13112
|
+
* EPISTEMIC BOUNDS: The geometric penalty is clamped by `relaxation_epsilon` (`ge=0.0, le=1.0`) to prevent gradient explosion. The logical schema is locked to the 128-char `constraint_cid` CID to structurally bound string evaluation scope.
|
|
13433
13113
|
*
|
|
13434
|
-
* MCP ROUTING TRIGGERS:
|
|
13435
|
-
* Lemma, Tensor Projection, Earth Mover's Distance, Latent Translation
|
|
13114
|
+
* MCP ROUTING TRIGGERS: Satisfiability Modulo Theories, Neurosymbolic Relaxation, Differentiable Theorem Proving, Probabilistic Logic Networks, Continuous Penalty
|
|
13436
13115
|
*/
|
|
13437
|
-
export interface
|
|
13438
|
-
|
|
13439
|
-
|
|
13440
|
-
|
|
13441
|
-
isometry_preservation_score: IsometryPreservationScore1;
|
|
13116
|
+
export interface DifferentiableLogicPolicy {
|
|
13117
|
+
constraint_cid: ConstraintCid;
|
|
13118
|
+
formal_syntax_smt: FormalSyntaxSmt;
|
|
13119
|
+
relaxation_epsilon: RelaxationEpsilon;
|
|
13442
13120
|
}
|
|
13443
13121
|
/**
|
|
13444
13122
|
* CoReason Shared Kernel Ontology
|
|
@@ -13997,7 +13675,6 @@ export interface EpistemicQuarantineSnapshot {
|
|
|
13997
13675
|
* The mathematically bounded subgraph of capabilities currently available to the agent.
|
|
13998
13676
|
*/
|
|
13999
13677
|
affordance_projection?: OntologicalSurfaceProjectionManifest | null;
|
|
14000
|
-
capability_attestations?: CapabilityAttestations;
|
|
14001
13678
|
}
|
|
14002
13679
|
/**
|
|
14003
13680
|
* The ephemeral latent variables and environmental bindings currently active in Epistemic Quarantine.
|
|
@@ -14059,58 +13736,6 @@ export interface ProceduralMetadataManifest {
|
|
|
14059
13736
|
*/
|
|
14060
13737
|
latent_vector_coordinate?: VectorEmbeddingState | null;
|
|
14061
13738
|
}
|
|
14062
|
-
/**
|
|
14063
|
-
* CoReason Shared Kernel Ontology
|
|
14064
|
-
*
|
|
14065
|
-
* AGENT INSTRUCTION: An immutable cryptographic receipt representing an Object Capability (OCap) grant within a Federated Identity Management (FIM) framework.
|
|
14066
|
-
*
|
|
14067
|
-
* CAUSAL AFFORDANCE: Unlocks cross-domain graph traversal, cryptographically proving to the target topology that the swarm agent is authorized to establish an active connection governed by the SLA.
|
|
14068
|
-
*
|
|
14069
|
-
* EPISTEMIC BOUNDS: Locked to a 128-char `attestation_cid`. The `@model_validator` `enforce_restricted_vault_locks` mathematically enforces cross-schema invariants: if `governing_sla.max_permitted_classification` is 'restricted', the `authorized_session` MUST contain explicit `allowed_vault_keys`.
|
|
14070
|
-
*
|
|
14071
|
-
* MCP ROUTING TRIGGERS: Object Capability Model, Federated Identity Management, Cross-Domain Federation, Capability Attestation, Zero-Trust Execution
|
|
14072
|
-
*/
|
|
14073
|
-
export interface FederatedCapabilityAttestationReceipt {
|
|
14074
|
-
attestation_cid: AttestationCid;
|
|
14075
|
-
/**
|
|
14076
|
-
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
14077
|
-
*/
|
|
14078
|
-
target_topology_cid: string;
|
|
14079
|
-
authorized_session: SecureSubSessionState1;
|
|
14080
|
-
governing_sla: FederatedBilateralSLA1;
|
|
14081
|
-
}
|
|
14082
|
-
/**
|
|
14083
|
-
* CoReason Shared Kernel Ontology
|
|
14084
|
-
*
|
|
14085
|
-
* AGENT INSTRUCTION: Formalizes the Principle of Least Privilege (PoLP) and Time-Based Access Control (TBAC) for handling high-entropy cryptographic secrets within a declarative N-dimensional coordinate.
|
|
14086
|
-
*
|
|
14087
|
-
* CAUSAL AFFORDANCE: Authorizes a temporary, mathematically bounded partition where the agent can access unredacted enterprise vault keys without permanently leaking them into the global EpistemicLedgerState.
|
|
14088
|
-
*
|
|
14089
|
-
* EPISTEMIC BOUNDS: The temporal exposure window is physically clamped by `max_ttl_seconds` (`ge=1, le=18446744073709551615`), enforcing an absolute maximum 1-hour session. Spatial access is geometrically restricted to `allowed_vault_keys` (`max_length=100`), deterministically sorted by `@model_validator` for RFC 8785 hashing.
|
|
14090
|
-
*
|
|
14091
|
-
* MCP ROUTING TRIGGERS: Principle of Least Privilege, Time-Based Access Control, Secret Vaulting, Ephemeral Partition, Cryptographic Isolation
|
|
14092
|
-
*/
|
|
14093
|
-
export interface SecureSubSessionState1 {
|
|
14094
|
-
session_cid: SessionCid;
|
|
14095
|
-
allowed_vault_keys: AllowedVaultKeys;
|
|
14096
|
-
max_ttl_seconds: MaxTtlSeconds1;
|
|
14097
|
-
description: Description4;
|
|
14098
|
-
}
|
|
14099
|
-
/**
|
|
14100
|
-
* The structural and physical boundary constraints for querying this target.
|
|
14101
|
-
*/
|
|
14102
|
-
export interface FederatedBilateralSLA1 {
|
|
14103
|
-
receiving_tenant_cid: ReceivingTenantCid1;
|
|
14104
|
-
max_permitted_classification: SemanticClassificationProfile2;
|
|
14105
|
-
liability_limit_magnitude: LiabilityLimitMagnitude;
|
|
14106
|
-
permitted_geographic_regions?: PermittedGeographicRegions;
|
|
14107
|
-
require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
|
|
14108
|
-
max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
|
|
14109
|
-
/**
|
|
14110
|
-
* The quantum-resistant signature securing the multi-tenant structural boundary.
|
|
14111
|
-
*/
|
|
14112
|
-
pq_signature?: PostQuantumSignatureReceipt | null;
|
|
14113
|
-
}
|
|
14114
13739
|
/**
|
|
14115
13740
|
* CoReason Shared Kernel Ontology
|
|
14116
13741
|
*
|
|
@@ -14226,7 +13851,7 @@ export interface EpistemicTopologicalProofManifest1 {
|
|
|
14226
13851
|
export interface ExecutionEnvelopeState {
|
|
14227
13852
|
trace_context: TraceContextState;
|
|
14228
13853
|
state_vector: StateVectorProfile;
|
|
14229
|
-
payload:
|
|
13854
|
+
payload: Payload3;
|
|
14230
13855
|
}
|
|
14231
13856
|
/**
|
|
14232
13857
|
* Represents the Reader/Writer monad for causality and recursion.
|
|
@@ -14254,223 +13879,9 @@ export interface ImmutableMatrix {
|
|
|
14254
13879
|
/**
|
|
14255
13880
|
* Represents the pure value payload data structure, domain-specific.
|
|
14256
13881
|
*/
|
|
14257
|
-
export interface
|
|
13882
|
+
export interface Payload3 {
|
|
14258
13883
|
[k: string]: unknown;
|
|
14259
13884
|
}
|
|
14260
|
-
/**
|
|
14261
|
-
* CoReason Shared Kernel Ontology
|
|
14262
|
-
*
|
|
14263
|
-
* AGENT INSTRUCTION: Formalizes a discrete computational vertex within a Merkle-DAG execution trace, binding raw data inputs to deterministic outputs. As an append-only coordinate, it guarantees algorithmic reproducibility.
|
|
14264
|
-
*
|
|
14265
|
-
* CAUSAL AFFORDANCE: Permits the orchestrator to cryptographically re-evaluate, replay, or slash execution branches by guaranteeing all computational inputs, outputs, and parent pointers are deterministically serialized.
|
|
14266
|
-
*
|
|
14267
|
-
* EPISTEMIC BOUNDS: The `@model_validator` mathematically guarantees the `node_hash` via RFC 8785 canonical JSON serialization, trapping any non-deterministic dictionary properties. Orphaned lineages are structurally blocked.
|
|
14268
|
-
*
|
|
14269
|
-
* MCP ROUTING TRIGGERS: Merkle-DAG, RFC 8785 Canonicalization, Execution Trace, Cryptographic Determinism, Directed Acyclic Graph
|
|
14270
|
-
*/
|
|
14271
|
-
export interface ExecutionNodeReceipt {
|
|
14272
|
-
request_cid: RequestCid1;
|
|
14273
|
-
parent_request_cid?: ParentRequestCid;
|
|
14274
|
-
root_request_cid?: RootRequestCid;
|
|
14275
|
-
/**
|
|
14276
|
-
* The inputs provided to the execution node. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
|
|
14277
|
-
*/
|
|
14278
|
-
inputs: string | number | boolean | JsonPrimitiveState[] | {
|
|
14279
|
-
[k: string]: JsonPrimitiveState;
|
|
14280
|
-
} | EpistemicProxyStateAny | null;
|
|
14281
|
-
/**
|
|
14282
|
-
* The outputs generated by the execution node. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
|
|
14283
|
-
*/
|
|
14284
|
-
outputs: string | number | boolean | JsonPrimitiveState[] | {
|
|
14285
|
-
[k: string]: JsonPrimitiveState;
|
|
14286
|
-
} | EpistemicProxyStateAny | null;
|
|
14287
|
-
parent_hashes?: ParentHashes;
|
|
14288
|
-
node_hash?: NodeHash;
|
|
14289
|
-
}
|
|
14290
|
-
/**
|
|
14291
|
-
* CoReason Shared Kernel Ontology
|
|
14292
|
-
*
|
|
14293
|
-
* AGENT INSTRUCTION: Implements the Dapper distributed tracing model to deterministically map the causal execution DAG of the swarm. As an append-only coordinate on the Merkle-DAG, it mathematically binds parent-child RPC calls.
|
|
14294
|
-
*
|
|
14295
|
-
* CAUSAL AFFORDANCE: Unlocks global observability by mapping causal edges across the zero-trust network, enabling exact bottleneck detection and graph reconstruction.
|
|
14296
|
-
*
|
|
14297
|
-
* EPISTEMIC BOUNDS: Temporal boundaries are rigidly constrained by `start_time_unix_nano` (`ge=0`). The `@model_validator` enforces Allen's Interval Algebra to physically guarantee `end_time` cannot precede `start_time`. `events` array sorted by time.
|
|
14298
|
-
*
|
|
14299
|
-
* MCP ROUTING TRIGGERS: Dapper Tracing Model, Distributed Causal DAG, Allen's Interval Algebra, OpenTelemetry, Execution Provenance
|
|
14300
|
-
*/
|
|
14301
|
-
export interface ExecutionSpanReceipt {
|
|
14302
|
-
trace_cid: TraceCid3;
|
|
14303
|
-
span_cid: SpanCid1;
|
|
14304
|
-
parent_span_cid?: ParentSpanCid1;
|
|
14305
|
-
name: Name1;
|
|
14306
|
-
/**
|
|
14307
|
-
* The role of the span.
|
|
14308
|
-
*/
|
|
14309
|
-
kind?: "client" | "server" | "producer" | "consumer" | "internal";
|
|
14310
|
-
start_time_unix_nano: StartTimeUnixNano;
|
|
14311
|
-
end_time_unix_nano?: EndTimeUnixNano;
|
|
14312
|
-
/**
|
|
14313
|
-
* The execution health flag.
|
|
14314
|
-
*/
|
|
14315
|
-
status?: "unset" | "ok" | "error";
|
|
14316
|
-
events?: Events;
|
|
14317
|
-
}
|
|
14318
|
-
/**
|
|
14319
|
-
* CoReason Shared Kernel Ontology
|
|
14320
|
-
*
|
|
14321
|
-
* AGENT INSTRUCTION: Represents a discrete, point-in-time OpenTelemetry annotation within a broader Dapper-style `ExecutionSpanReceipt`.
|
|
14322
|
-
*
|
|
14323
|
-
* CAUSAL AFFORDANCE: Provides fine-grained, localized state-machine logging within an active span, anchoring semantic attributes to a precise nanosecond coordinate without spawning a new causal branch.
|
|
14324
|
-
*
|
|
14325
|
-
* EPISTEMIC BOUNDS: `timestamp_unix_nano` physically bounded `[0, 253402300799000000000]`. The `attributes` payload strictly constrained by a dictionary with string keys (`max_length=255`) to prevent dictionary bombing.
|
|
14326
|
-
*
|
|
14327
|
-
* MCP ROUTING TRIGGERS: Span Annotation, Point-in-Time Event, Micro-State Logging, OpenTelemetry, Telemetry Serialization
|
|
14328
|
-
*/
|
|
14329
|
-
export interface SpanEvent {
|
|
14330
|
-
name: Name2;
|
|
14331
|
-
timestamp_unix_nano: TimestampUnixNano;
|
|
14332
|
-
attributes?: Attributes;
|
|
14333
|
-
}
|
|
14334
|
-
/**
|
|
14335
|
-
* Typed metadata bound to the event.
|
|
14336
|
-
*/
|
|
14337
|
-
export interface Attributes {
|
|
14338
|
-
[k: string]: JsonPrimitiveState;
|
|
14339
|
-
}
|
|
14340
|
-
/**
|
|
14341
|
-
* CoReason Shared Kernel Ontology
|
|
14342
|
-
*
|
|
14343
|
-
* AGENT INSTRUCTION: Defines the zero-trust structural boundary for multi-tenant federation,
|
|
14344
|
-
* securing cross-boundary graph traversal against Shor's algorithm via an optional
|
|
14345
|
-
* PostQuantumSignatureReceipt. As an ...SLA suffix, this object enforces rigid mathematical
|
|
14346
|
-
* boundaries that the orchestrator must respect globally.
|
|
14347
|
-
*
|
|
14348
|
-
* CAUSAL AFFORDANCE: Unlocks cross-swarm graph bridging by enforcing strict liability,
|
|
14349
|
-
* physical location routing, semantic data classification constraints via
|
|
14350
|
-
* max_permitted_classification, and ESG carbon intensity limits.
|
|
14351
|
-
*
|
|
14352
|
-
* EPISTEMIC BOUNDS: Economically constrained by liability_limit_magnitude (ge=0,
|
|
14353
|
-
* le=18446744073709551615). ESG limits physically bind the node grid to the optional
|
|
14354
|
-
* max_permitted_grid_carbon_intensity (ge=0.0, le=18446744073709551615.0). The permitted_geographic_regions
|
|
14355
|
-
* array is deterministically sorted via @model_validator for RFC 8785 canonical hashing.
|
|
14356
|
-
*
|
|
14357
|
-
* MCP ROUTING TRIGGERS: Zero-Trust Architecture, Post-Quantum Cryptography, Federated
|
|
14358
|
-
* Learning, Bilateral SLA, Data Residency
|
|
14359
|
-
*/
|
|
14360
|
-
export interface FederatedBilateralSLA2 {
|
|
14361
|
-
receiving_tenant_cid: ReceivingTenantCid1;
|
|
14362
|
-
max_permitted_classification: SemanticClassificationProfile2;
|
|
14363
|
-
liability_limit_magnitude: LiabilityLimitMagnitude;
|
|
14364
|
-
permitted_geographic_regions?: PermittedGeographicRegions;
|
|
14365
|
-
require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
|
|
14366
|
-
max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
|
|
14367
|
-
/**
|
|
14368
|
-
* The quantum-resistant signature securing the multi-tenant structural boundary.
|
|
14369
|
-
*/
|
|
14370
|
-
pq_signature?: PostQuantumSignatureReceipt | null;
|
|
14371
|
-
}
|
|
14372
|
-
/**
|
|
14373
|
-
* CoReason Shared Kernel Ontology
|
|
14374
|
-
*
|
|
14375
|
-
* AGENT INSTRUCTION: Triggers the zero-copy streaming of a binary or metadata blob from a discovered peer based on its Content Identifier (CID).
|
|
14376
|
-
*
|
|
14377
|
-
* CAUSAL AFFORDANCE: Physically executes the download of decentralized assets into the local embedded LanceDB and WASM runtime.
|
|
14378
|
-
*
|
|
14379
|
-
* EPISTEMIC BOUNDS: Bounded to strict RFC 8785 CIDs.
|
|
14380
|
-
*
|
|
14381
|
-
* MCP ROUTING TRIGGERS: Content Addressing, Zero-Copy Streaming, Decentralized Fetch, IPFS, FlatBuffers
|
|
14382
|
-
*/
|
|
14383
|
-
export interface FederatedCIDFetchIntent {
|
|
14384
|
-
topology_class?: TopologyClass127;
|
|
14385
|
-
/**
|
|
14386
|
-
* A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
|
|
14387
|
-
*/
|
|
14388
|
-
target_cid: string;
|
|
14389
|
-
timeout_ms?: TimeoutMs1;
|
|
14390
|
-
}
|
|
14391
|
-
/**
|
|
14392
|
-
* CoReason Shared Kernel Ontology
|
|
14393
|
-
*
|
|
14394
|
-
* AGENT INSTRUCTION: Governs the B2B Multi-Swarm Gossip Protocol, establishing the initial
|
|
14395
|
-
* Model Context Protocol (MCP) broadcast endpoints for external discovery. As a ...Manifest
|
|
14396
|
-
* suffix, this is a declarative, frozen snapshot of N-dimensional geometry at a specific
|
|
14397
|
-
* point in time.
|
|
14398
|
-
*
|
|
14399
|
-
* CAUSAL AFFORDANCE: Emits a structured tensor beacon to neighboring swarms, authorizing
|
|
14400
|
-
* the initiation of an OntologicalHandshakeReceipt if the supported_ontologies hashes
|
|
14401
|
-
* mathematically overlap.
|
|
14402
|
-
*
|
|
14403
|
-
* EPISTEMIC BOUNDS: Geometrically capped by broadcast_endpoints and supported_ontologies
|
|
14404
|
-
* string arrays (each max_length=1000). Both are explicitly sorted by the
|
|
14405
|
-
* @model_validator (broadcast_endpoints by str key, supported_ontologies alphabetically)
|
|
14406
|
-
* to guarantee invariant canonical RFC 8785 hashing across distinct environments.
|
|
14407
|
-
*
|
|
14408
|
-
* MCP ROUTING TRIGGERS: Gossip Protocol, Peer-to-Peer Discovery, Decentralized Federation,
|
|
14409
|
-
* Semantic Broadcasting, Tensor Beacon
|
|
14410
|
-
*/
|
|
14411
|
-
export interface FederatedDiscoveryManifest {
|
|
14412
|
-
broadcast_endpoints: BroadcastEndpoints;
|
|
14413
|
-
supported_ontologies: SupportedOntologies;
|
|
14414
|
-
}
|
|
14415
|
-
/**
|
|
14416
|
-
* CoReason Shared Kernel Ontology
|
|
14417
|
-
*
|
|
14418
|
-
* AGENT INSTRUCTION: Governs the spatial and temporal physics of Parameter-Efficient Fine-Tuning (PEFT) and Low-Rank Adaptation (LoRA), managing the Von Neumann bottleneck in distributed swarm VRAM.
|
|
14419
|
-
*
|
|
14420
|
-
* CAUSAL AFFORDANCE: Instructs the tensor execution engine to hot-swap external safetensors weight matrices into active GPU memory, modifying the foundational activation circuits.
|
|
14421
|
-
*
|
|
14422
|
-
* EPISTEMIC BOUNDS: The spatial geometry is physically capped by `vram_footprint_bytes` (`gt=0, le=18446744073709551615`). The temporal presence is mathematically guillotined by `ephemeral_ttl_ms` (`gt=0, le=18446744073709551615`). Supply-chain integrity is anchored by `adapter_merkle_root` (SHA-256).
|
|
14423
|
-
*
|
|
14424
|
-
* MCP ROUTING TRIGGERS: Low-Rank Adaptation, PEFT, LRU Cache Eviction, Tensor Hot-Swapping, GPU VRAM Management
|
|
14425
|
-
*/
|
|
14426
|
-
export interface FederatedPeftContract {
|
|
14427
|
-
adapter_merkle_root: AdapterMerkleRoot;
|
|
14428
|
-
vram_footprint_bytes: VramFootprintBytes;
|
|
14429
|
-
ephemeral_ttl_ms: EphemeralTtlMs;
|
|
14430
|
-
cache_priority_weight: CachePriorityWeight;
|
|
14431
|
-
}
|
|
14432
|
-
/**
|
|
14433
|
-
* CoReason Shared Kernel Ontology
|
|
14434
|
-
*
|
|
14435
|
-
* AGENT INSTRUCTION: Simplifies the creation of a secure federated network link across a Zero-Trust boundary.
|
|
14436
|
-
*
|
|
14437
|
-
* CAUSAL AFFORDANCE: Physically authorizes the orchestrator to forge a secure federated network link across a Zero-Trust boundary.
|
|
14438
|
-
*
|
|
14439
|
-
* EPISTEMIC BOUNDS: Bounded to strict JSON schema validation constraints defined in the manifest.
|
|
14440
|
-
*
|
|
14441
|
-
* MCP ROUTING TRIGGERS: Federated Security, Zero-Trust Boundary, Network Link, Macro Manifest
|
|
14442
|
-
*/
|
|
14443
|
-
export interface FederatedSecurityMacroManifest {
|
|
14444
|
-
target_endpoint_uri: TargetEndpointUri;
|
|
14445
|
-
required_clearance: SemanticClassificationProfile3;
|
|
14446
|
-
max_liability_budget: MaxLiabilityBudget;
|
|
14447
|
-
/**
|
|
14448
|
-
* Content-addressed identity of the capability bundle for zero-trust verification.
|
|
14449
|
-
*/
|
|
14450
|
-
content_hash?: BundleContentHashState | null;
|
|
14451
|
-
}
|
|
14452
|
-
/**
|
|
14453
|
-
* CoReason Shared Kernel Ontology
|
|
14454
|
-
*
|
|
14455
|
-
* AGENT INSTRUCTION: Establishes a Distributed Systems Theory cryptographic
|
|
14456
|
-
* partition, mapping an external swarm's execution state into a localized,
|
|
14457
|
-
* sandboxed coordinate. As a ...Snapshot suffix, this is a frozen N-dimensional
|
|
14458
|
-
* coordinate of ephemeral context.
|
|
14459
|
-
*
|
|
14460
|
-
* CAUSAL AFFORDANCE: Exposes the topological footprint of an exogenous network
|
|
14461
|
-
* to the local orchestrator, authorizing cross-boundary telemetry and capability
|
|
14462
|
-
* exchange without merging underlying working contexts.
|
|
14463
|
-
*
|
|
14464
|
-
* EPISTEMIC BOUNDS: The coordinate is restricted by the optional topology_cid
|
|
14465
|
-
* (str | None, default=None, 128-char CID regex ^[a-zA-Z0-9_.:-]+$),
|
|
14466
|
-
* mathematically severing unauthorized topological mutations.
|
|
14467
|
-
*
|
|
14468
|
-
* MCP ROUTING TRIGGERS: Distributed Systems Theory, Federated Namespace,
|
|
14469
|
-
* Zero-Trust Architecture, Cross-Swarm Federation, Sandbox Partition
|
|
14470
|
-
*/
|
|
14471
|
-
export interface FederatedStateSnapshot {
|
|
14472
|
-
topology_cid?: TopologyCid1;
|
|
14473
|
-
}
|
|
14474
13885
|
/**
|
|
14475
13886
|
* CoReason Shared Kernel Ontology
|
|
14476
13887
|
*
|
|
@@ -14832,13 +14243,13 @@ export interface KineticBudgetPolicy {
|
|
|
14832
14243
|
/**
|
|
14833
14244
|
* CoReason Shared Kernel Ontology
|
|
14834
14245
|
*
|
|
14835
|
-
* AGENT INSTRUCTION: Formalizes a
|
|
14246
|
+
* AGENT INSTRUCTION: Formalizes a SPIFFE/SPIRE Service Mesh and Zero-Trust Architecture perimeter, restricting JSON-RPC capability mounts from foreign subgraphs.
|
|
14836
14247
|
*
|
|
14837
|
-
* CAUSAL AFFORDANCE: Acts as a structural firewall that physically prevents the orchestrator from binding unauthorized external tools, resources, or prompts into the active agent's CognitiveActionSpaceManifest.
|
|
14248
|
+
* CAUSAL AFFORDANCE: Acts as a structural firewall that physically prevents the orchestrator from binding unauthorized external tools, resources, or prompts into the active agent's CognitiveActionSpaceManifest via mTLS delegation.
|
|
14838
14249
|
*
|
|
14839
14250
|
* EPISTEMIC BOUNDS: The boundary is geometrically enforced via `StringConstraints` (`max_length=2000` for `authorized_capability_array`, `allowed_resources`, `allowed_prompts`). The `@model_validator` strictly sorts all arrays alphabetically to mathematically guarantee RFC 8785 Canonical Hashing.
|
|
14840
14251
|
*
|
|
14841
|
-
* MCP ROUTING TRIGGERS: Zero-Trust Architecture,
|
|
14252
|
+
* MCP ROUTING TRIGGERS: Zero-Trust Architecture, SPIFFE/SPIRE, Envoy Service Mesh, Least Privilege, RPC Firewall
|
|
14842
14253
|
*/
|
|
14843
14254
|
export interface MCPCapabilityWhitelistPolicy1 {
|
|
14844
14255
|
authorized_capability_array?: AuthorizedCapabilityArray;
|
|
@@ -14987,46 +14398,10 @@ export interface MutationPolicy1 {
|
|
|
14987
14398
|
export interface NDimensionalTensorManifest {
|
|
14988
14399
|
structural_format: TensorStructuralFormatProfile;
|
|
14989
14400
|
shape: Shape;
|
|
14990
|
-
vram_footprint_bytes:
|
|
14401
|
+
vram_footprint_bytes: VramFootprintBytes;
|
|
14991
14402
|
merkle_root: MerkleRoot;
|
|
14992
14403
|
storage_uri: StorageUri;
|
|
14993
14404
|
}
|
|
14994
|
-
/**
|
|
14995
|
-
* CoReason Shared Kernel Ontology
|
|
14996
|
-
*
|
|
14997
|
-
* AGENT INSTRUCTION: A cryptographically frozen historical fact representing the absolute
|
|
14998
|
-
* mathematical alignment of two swarms' latent vector spaces prior to establishing a shared
|
|
14999
|
-
* epistemic blackboard. As a ...Receipt suffix, this is an append-only coordinate on the
|
|
15000
|
-
* Merkle-DAG that the LLM must never hallucinate a mutation to.
|
|
15001
|
-
*
|
|
15002
|
-
* CAUSAL AFFORDANCE: Authorizes the physical bridging of two independent N-dimensional
|
|
15003
|
-
* semantic spaces. If native geometries are incommensurable, it structurally demands the
|
|
15004
|
-
* application of a DimensionalProjectionContract (applied_projection). The alignment_status
|
|
15005
|
-
* Literal ["aligned", "projected", "fallback_triggered", "incommensurable"] records the
|
|
15006
|
-
* final verdict.
|
|
15007
|
-
*
|
|
15008
|
-
* EPISTEMIC BOUNDS: Semantic isometry is quantified via measured_cosine_similarity, strictly
|
|
15009
|
-
* clamped between [ge=-1.0, le=1.0]. The participant_node_cids array (min_length=2) is
|
|
15010
|
-
* deterministically sorted via @model_validator to prevent Byzantine replay anomalies
|
|
15011
|
-
* during cross-swarm Merkle hashing.
|
|
15012
|
-
*
|
|
15013
|
-
* MCP ROUTING TRIGGERS: Earth Mover's Distance, Cosine Similarity, Vector Space Isometry,
|
|
15014
|
-
* Latent Alignment, Holographic Graph Projection
|
|
15015
|
-
*/
|
|
15016
|
-
export interface OntologicalHandshakeReceipt {
|
|
15017
|
-
handshake_cid: HandshakeCid1;
|
|
15018
|
-
participant_node_cids: ParticipantNodeCids1;
|
|
15019
|
-
measured_cosine_similarity: MeasuredCosineSimilarity1;
|
|
15020
|
-
alignment_status: AlignmentStatus;
|
|
15021
|
-
/**
|
|
15022
|
-
* The projection applied if the agents natively used different embedding dimensionalities.
|
|
15023
|
-
*/
|
|
15024
|
-
applied_projection?: DimensionalProjectionContract | null;
|
|
15025
|
-
/**
|
|
15026
|
-
* Isolated holographic clone of remote swarm state for safe cross-boundary evaluation.
|
|
15027
|
-
*/
|
|
15028
|
-
remote_state_snapshot?: FederatedStateSnapshot | null;
|
|
15029
|
-
}
|
|
15030
14405
|
/**
|
|
15031
14406
|
* CoReason Shared Kernel Ontology
|
|
15032
14407
|
*
|
|
@@ -15044,6 +14419,22 @@ export interface PermissionBoundaryPolicy1 {
|
|
|
15044
14419
|
file_system_mutation_forbidden: FileSystemMutationForbidden;
|
|
15045
14420
|
auth_requirements?: AuthRequirements;
|
|
15046
14421
|
}
|
|
14422
|
+
/**
|
|
14423
|
+
* CoReason Shared Kernel Ontology
|
|
14424
|
+
*
|
|
14425
|
+
* AGENT INSTRUCTION: Implements NIST FIPS Post-Quantum Cryptography (PQC), utilizing lattice-based or stateless hash-based structures to guarantee long-term topological integrity on the Merkle-DAG.
|
|
14426
|
+
*
|
|
14427
|
+
* CAUSAL AFFORDANCE: Secures the causal execution graph and Bilateral SLAs against temporal decryption attacks (Harvest Now, Decrypt Later) via Shor's algorithm executed on fault-tolerant quantum computers.
|
|
14428
|
+
*
|
|
14429
|
+
* EPISTEMIC BOUNDS: To accommodate massive dimensional geometry, `pq_signature_blob` is structurally bound to a `100000`-byte `max_length`. `pq_algorithm` is restricted to the Literal set `["ml-dsa", "slh-dsa", "falcon"]`. `public_key_cid` is a 128-char CID.
|
|
14430
|
+
*
|
|
14431
|
+
* MCP ROUTING TRIGGERS: Post-Quantum Cryptography, ML-DSA, SLH-DSA, Shor's Algorithm Resistance, Lattice-based Cryptography
|
|
14432
|
+
*/
|
|
14433
|
+
export interface PostQuantumSignatureReceipt {
|
|
14434
|
+
pq_algorithm: PqAlgorithm;
|
|
14435
|
+
public_key_cid: PublicKeyCid1;
|
|
14436
|
+
pq_signature_blob: PqSignatureBlob;
|
|
14437
|
+
}
|
|
15047
14438
|
/**
|
|
15048
14439
|
* CoReason Shared Kernel Ontology
|
|
15049
14440
|
*
|
|
@@ -15233,24 +14624,6 @@ export interface SimulationConvergenceSLA1 {
|
|
|
15233
14624
|
export interface SimulationEscrowContract1 {
|
|
15234
14625
|
locked_magnitude: LockedMagnitude;
|
|
15235
14626
|
}
|
|
15236
|
-
/**
|
|
15237
|
-
* CoReason Shared Kernel Ontology
|
|
15238
|
-
*
|
|
15239
|
-
* AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
|
|
15240
|
-
*
|
|
15241
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
|
|
15242
|
-
*
|
|
15243
|
-
* EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
|
|
15244
|
-
*
|
|
15245
|
-
* MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
|
|
15246
|
-
*/
|
|
15247
|
-
export interface SpatialHardwareProfile1 {
|
|
15248
|
-
compute_tier?: ComputeTier;
|
|
15249
|
-
min_vram_gb?: MinVramGb;
|
|
15250
|
-
coreason_network_mode?: CoreasonNetworkMode;
|
|
15251
|
-
accelerator_type?: AcceleratorType;
|
|
15252
|
-
provider_whitelist?: ProviderWhitelist;
|
|
15253
|
-
}
|
|
15254
14627
|
/**
|
|
15255
14628
|
* CoReason Shared Kernel Ontology
|
|
15256
14629
|
*
|
|
@@ -15516,22 +14889,6 @@ export interface TraceContextState1 {
|
|
|
15516
14889
|
parent_span_cid?: ParentSpanCid;
|
|
15517
14890
|
causal_clock?: CausalClock;
|
|
15518
14891
|
}
|
|
15519
|
-
/**
|
|
15520
|
-
* CoReason Shared Kernel Ontology
|
|
15521
|
-
*
|
|
15522
|
-
* AGENT INSTRUCTION: Functions as a deterministic serialization envelope for flushing Dapper-style trace subgraphs to external observability sinks.
|
|
15523
|
-
*
|
|
15524
|
-
* CAUSAL AFFORDANCE: Authorizes the mass export of `ExecutionSpanReceipt` objects across the network boundary, structurally binding disconnected spans into a coherent `batch_cid` for downstream reconstruction.
|
|
15525
|
-
*
|
|
15526
|
-
* EPISTEMIC BOUNDS: Bounded by a rigid `batch_cid` (CID regex `^[a-zA-Z0-9_.:-]+$`). The `spans` array is deterministically sorted by `span_cid` via a `@model_validator` to mathematically prevent Byzantine replay anomalies.
|
|
15527
|
-
*
|
|
15528
|
-
* MCP ROUTING TRIGGERS: Trace Serialization, Telemetry Export, Batch Flushing, DAG Reconstruction, Canonical Egress
|
|
15529
|
-
*/
|
|
15530
|
-
export interface TraceExportManifest {
|
|
15531
|
-
batch_cid: BatchCid;
|
|
15532
|
-
spans?: Spans;
|
|
15533
|
-
execution_nodes?: ExecutionNodes;
|
|
15534
|
-
}
|
|
15535
14892
|
/**
|
|
15536
14893
|
* CoReason Shared Kernel Ontology
|
|
15537
14894
|
*
|
|
@@ -15605,7 +14962,7 @@ export interface VolumetricBoundingProfile1 {
|
|
|
15605
14962
|
*
|
|
15606
14963
|
* CAUSAL AFFORDANCE: Physically initializes the execution DAG. This structural lock guarantees that any graph execution is mathematically anchored to a CoReason Genesis Block via `genesis_provenance`; stripping this violates Topological Consistency.
|
|
15607
14964
|
*
|
|
15608
|
-
* EPISTEMIC BOUNDS: The
|
|
14965
|
+
* EPISTEMIC BOUNDS: The topology dictates execution constraints natively without relying on legacy federated dominance validation.
|
|
15609
14966
|
*
|
|
15610
14967
|
* MCP ROUTING TRIGGERS: Topos Theory, Cybernetics, Execution Envelope, Macroscopic Topology, Viable System Model
|
|
15611
14968
|
*/
|
|
@@ -15629,15 +14986,6 @@ export interface WorkflowManifest {
|
|
|
15629
14986
|
* The absolute maximum enterprise risk threshold permitted for this topology.
|
|
15630
14987
|
*/
|
|
15631
14988
|
max_risk_tolerance?: RiskLevelPolicy | null;
|
|
15632
|
-
allowed_semantic_classifications?: AllowedSemanticClassifications;
|
|
15633
|
-
/**
|
|
15634
|
-
* The broadcast protocol for B2B multi-swarm discovery.
|
|
15635
|
-
*/
|
|
15636
|
-
federated_discovery?: FederatedDiscoveryManifest | null;
|
|
15637
|
-
/**
|
|
15638
|
-
* The B2B Service Level Agreement contract that must be mathematically satisfied before multi-tenant graph coupling.
|
|
15639
|
-
*/
|
|
15640
|
-
federated_sla?: FederatedBilateralSLA2 | null;
|
|
15641
14989
|
/**
|
|
15642
14990
|
* The quantum-resistant signature securing the root execution graph.
|
|
15643
14991
|
*/
|