@coreason-ai/coreason-manifest 0.52.1 → 0.54.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/ontology.d.ts +646 -1298
  2. package/package.json +1 -1
@@ -44,11 +44,11 @@ export type TimeDerivativeVector = string | null;
44
44
  */
45
45
  export type SteeringVectorHash = string;
46
46
  /**
47
- * The specific transformer layer indices where this vector must be applied.
47
+ * The specific TransformerLens hook points (e.g., 'blocks.12.hook_resid_post') where this vector must be applied.
48
48
  *
49
49
  * @minItems 1
50
50
  */
51
- export type InjectionLayers = [number, ...number[]];
51
+ export type TargetHookPoints = [string, ...string[]];
52
52
  /**
53
53
  * The mathematical magnitude/strength of the injection (can be negative for ablation).
54
54
  */
@@ -81,33 +81,10 @@ export type ExpectedInformationGain = number;
81
81
  * The maximum economic expenditure authorized to run this specific scientific test.
82
82
  */
83
83
  export type ExecutionCostBudgetMagnitude = number;
84
- export type EpochCid = string;
85
- export type TargetObjectiveCid = string | null;
86
- /**
87
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
88
- */
89
- export type EventCid = string;
90
- /**
91
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
92
- */
93
- export type PriorEventHash = string | null;
94
- /**
95
- * Causal Ancestry markers required to resolve decentralized event ordering.
96
- */
97
- export type Timestamp = number;
98
- export type TopologyClass = "epistemic_rejection";
99
- export type ReceiptCid = string;
100
- export type FailedProjectionCid = string;
101
- export type ViolatedAlgebraicConstraint = string;
102
- export type KlDivergenceToValidity = number;
103
- export type StochasticMutationGradient = string;
104
- export type RejectionHistory = EpistemicRejectionReceipt[];
105
- export type CurrentFreeEnergy = number;
106
- export type EpochStatus = "active_inference_loop";
107
84
  /**
108
85
  * Discriminator for breaking deadlocks within a CouncilTopologyManifest.
109
86
  */
110
- export type TopologyClass1 = "forced_adjudication";
87
+ export type TopologyClass = "forced_adjudication";
111
88
  /**
112
89
  * The conflicting claim IDs or proposals the human must choose between.
113
90
  *
@@ -133,16 +110,16 @@ export type TimeoutAction = "rollback" | "proceed_default" | "terminate";
133
110
  /**
134
111
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
135
112
  */
136
- export type EventCid1 = string;
113
+ export type EventCid = string;
137
114
  /**
138
115
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
139
116
  */
140
- export type PriorEventHash1 = string | null;
117
+ export type PriorEventHash = string | null;
141
118
  /**
142
119
  * Causal Ancestry markers required to resolve decentralized event ordering.
143
120
  */
144
- export type Timestamp1 = number;
145
- export type TopologyClass2 = "adjudication_receipt";
121
+ export type Timestamp = number;
122
+ export type TopologyClass1 = "adjudication_receipt";
146
123
  /**
147
124
  * The cryptographic pointer to the rubric dictating adjudication.
148
125
  */
@@ -246,7 +223,7 @@ export type EmulationFidelityTarget = number;
246
223
  /**
247
224
  * Discriminator for adversarial macro.
248
225
  */
249
- export type TopologyClass3 = "macro_adversarial";
226
+ export type TopologyClass2 = "macro_adversarial";
250
227
  /**
251
228
  * Nodes assigned to the Blue Team.
252
229
  *
@@ -324,7 +301,7 @@ export type CredentialPresentations = VerifiableCredentialPresentationReceipt[];
324
301
  /**
325
302
  * The discriminative topological boundary for agent bid intents.
326
303
  */
327
- export type TopologyClass4 = "agent_bid";
304
+ export type TopologyClass3 = "agent_bid";
328
305
  /**
329
306
  * The NodeCIDState of the bidder.
330
307
  */
@@ -369,7 +346,7 @@ export type ThermodynamicBurnRate = number | null;
369
346
  * The normalized Shannon Entropy of the active execution, mapped to UI color gradients (e.g., high entropy = amber warning).
370
347
  */
371
348
  export type EpistemicEntropyScore = number | null;
372
- export type TopologyClass5 = "analogical_mapping_task";
349
+ export type TopologyClass4 = "analogical_mapping_task";
373
350
  /**
374
351
  * Unique identifier for this lateral thinking task.
375
352
  */
@@ -402,7 +379,7 @@ export type AnyActionSpaceCapability = SpatialToolManifest | MCPServerManifest |
402
379
  /**
403
380
  * Discriminator type for a native tool.
404
381
  */
405
- export type TopologyClass6 = "native_tool";
382
+ export type TopologyClass5 = "native_tool";
406
383
  /**
407
384
  * The deterministically bounded structural identifier mapping this capability within the zero-trust manifold.
408
385
  */
@@ -500,7 +477,7 @@ export type IsPreemptible = boolean;
500
477
  /**
501
478
  * Discriminator type for an MCP server.
502
479
  */
503
- export type TopologyClass7 = "mcp_server";
480
+ export type TopologyClass6 = "mcp_server";
504
481
  /**
505
482
  * A unique cryptographic identifier (CID) for this server instance.
506
483
  */
@@ -513,7 +490,7 @@ export type MCPTransportProfile = StdioTransportProfile | SSETransportProfile |
513
490
  /**
514
491
  * Type of transport.
515
492
  */
516
- export type TopologyClass8 = "stdio";
493
+ export type TopologyClass7 = "stdio";
517
494
  /**
518
495
  * The command executable to run (e.g., 'node', 'python').
519
496
  */
@@ -527,7 +504,7 @@ export type Args = string[];
527
504
  /**
528
505
  * Type of transport.
529
506
  */
530
- export type TopologyClass9 = "sse";
507
+ export type TopologyClass8 = "sse";
531
508
  /**
532
509
  * The HTTP URL endpoint for the SSE connection.
533
510
  */
@@ -535,7 +512,7 @@ export type Uri = string;
535
512
  /**
536
513
  * Type of transport.
537
514
  */
538
- export type TopologyClass10 = "http";
515
+ export type TopologyClass9 = "http";
539
516
  /**
540
517
  * The HTTP URL endpoint for the stateless connection.
541
518
  */
@@ -579,7 +556,7 @@ export type StateSynchronizationOptics = OpticalMappingContract[];
579
556
  /**
580
557
  * Discriminator type for an ephemeral namespace partition.
581
558
  */
582
- export type TopologyClass11 = "ephemeral_partition";
559
+ export type TopologyClass10 = "ephemeral_partition";
583
560
  /**
584
561
  * Unique identifier for this ephemeral partition.
585
562
  */
@@ -613,7 +590,7 @@ export type AllowSubprocessSpawning = boolean;
613
590
  /**
614
591
  * Discriminator for a zero-trust contract.
615
592
  */
616
- export type TopologyClass12 = "zero_trust_contract";
593
+ export type TopologyClass11 = "zero_trust_contract";
617
594
  /**
618
595
  * UUIDv7 mapping to the ledger.
619
596
  */
@@ -646,7 +623,7 @@ export type StructuralPostConditions = EpistemicConstraintPolicy[];
646
623
  * Thermodynamic cap on SymbolicAI DbC retries.
647
624
  */
648
625
  export type MaxPlanningRemediationEpochs = number;
649
- export type AnyExplorationBranch = ThoughtBranchState | StochasticTopologyManifest;
626
+ export type AnyExplorationBranch = ThoughtBranchState | StochasticTopologyManifest | StrategicThoughtNodeIntent;
650
627
  /**
651
628
  * A deterministic capability pointer bounding this specific topological divergence in the Latent Scratchpad Trace.
652
629
  */
@@ -663,9 +640,9 @@ export type LatentContentHash = string;
663
640
  * The logical validity score assigned to this branch by the Process Reward Model.
664
641
  */
665
642
  export type PrmScore = number | null;
666
- export type TopologyClass13 = "thought_branch";
643
+ export type TopologyClass12 = "thought_branch";
667
644
  export type TopologyCid = string;
668
- export type TopologyClass14 = "stochastic_ensemble";
645
+ export type TopologyClass13 = "stochastic_ensemble";
669
646
  /**
670
647
  * AGENT INSTRUCTION: Categorizes the thermodynamic phase of the generative ensemble's exploration.
671
648
  *
@@ -689,7 +666,27 @@ export type SuperpositionCid = string;
689
666
  export type WaveCollapseFunction = "plurality_vote" | "highest_confidence" | "deterministic_compiler";
690
667
  export type ResidualEntropyVectors = string[];
691
668
  export type EpistemicStatus = "stochastically_unbounded";
692
- export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | ChaosExperimentTask | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | FederatedDiscoveryIntent | OntologicalNormalizationIntent;
669
+ /**
670
+ * Discriminator for MCTS thought nodes within the strategic planning topology.
671
+ */
672
+ export type TopologyClass14 = "strategic_thought_node";
673
+ /**
674
+ * The SHA-256 hash of the parent thought node in the MCTS tree, establishing Merkle-DAG lineage. For root nodes, use the SHA-256 hash of the initial escalation intent.
675
+ */
676
+ export type ParentNodeHash = string;
677
+ /**
678
+ * A structured natural-language description of the proposed heuristic leap or code modification strategy.
679
+ */
680
+ export type ProposedAction = string;
681
+ /**
682
+ * The causal reasoning chain explaining why this action is expected to resolve the epistemic deficit, including references to specific code structures or domain constraints.
683
+ */
684
+ export type Rationale = string;
685
+ /**
686
+ * Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
687
+ */
688
+ export type HeuristicConfidence = number;
689
+ export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | ChaosExperimentTask | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent;
693
690
  /**
694
691
  * Discriminator for temporal edge invalidation.
695
692
  */
@@ -766,17 +763,25 @@ export type ContextPrompt = string;
766
763
  */
767
764
  export type TimeoutAction2 = "rollback" | "proceed_default" | "terminate";
768
765
  /**
769
- * Discriminator for security or economic boundary overrides.
766
+ * Discriminator for Forge-to-Claw epistemic deficit escalations.
770
767
  */
771
768
  export type TopologyClass21 = "escalation";
772
769
  /**
773
- * The deterministic capability pointer representing the Payload Loss Prevention (PLP) or Governance rule that blocked execution.
770
+ * The fully qualified URN of the heuristic solver capability to which the deficit is being escalated.
774
771
  */
775
- export type TrippedRuleCid = string;
772
+ export type TargetSolverUrn = string;
773
+ /**
774
+ * A structured natural-language description of the deterministic logic that failed, including the specific AST node, formal solver, or constraint that could not be satisfied.
775
+ */
776
+ export type EpistemicDeficitDescription = string;
776
777
  /**
777
- * The default action is usually terminate or rollback for security escalations.
778
+ * An ordered list of Content Identifiers (CIDs) representing the code artifacts, Merkle-DAG fragments, and contextual state required by the Claw agent to resolve the deficit.
778
779
  */
779
- export type TimeoutAction3 = "rollback" | "proceed_default" | "terminate";
780
+ export type ContextWindowCids = string[];
781
+ /**
782
+ * The maximum number of tokens the Sovereign LLM Proxy is authorized to burn for this escalation before triggering the thermodynamic circuit breaker (HTTP 429).
783
+ */
784
+ export type ThermodynamicBudget = number;
780
785
  /**
781
786
  * Discriminator for geometric boundary of latent tool discovery.
782
787
  */
@@ -1137,10 +1142,42 @@ export type LamportClock = number;
1137
1142
  * The discriminative topological boundary for compute provisioning intents.
1138
1143
  */
1139
1144
  export type TopologyClass31 = "compute_provisioning";
1145
+ /**
1146
+ * The underlying orchestration engine (Mandatory: SkyPilot).
1147
+ */
1148
+ export type ProvisioningEngine = "skypilot";
1140
1149
  /**
1141
1150
  * The maximum atomic cost budget allowable for the provisioned compute.
1142
1151
  */
1143
1152
  export type MaxBudget = number;
1153
+ /**
1154
+ * The discrete architectural boundary of the node.
1155
+ */
1156
+ export type ComputeTier = string;
1157
+ /**
1158
+ * The absolute physical minimum Video RAM required to load this node's latent space.
1159
+ */
1160
+ export type MinVramGb = number;
1161
+ /**
1162
+ * The networking mode defining the P2P boundary for enterprise compliance.
1163
+ */
1164
+ export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
1165
+ /**
1166
+ * The rigid silicon precision format required to execute this node's neural circuits.
1167
+ */
1168
+ export type AcceleratorType = string;
1169
+ /**
1170
+ * The explicit array of cloud infrastructure providers authorized to run this node.
1171
+ */
1172
+ export type ProviderWhitelist = string[];
1173
+ /**
1174
+ * If True, SkyPilot will hunt for the cheapest spot instances and handle managed recovery.
1175
+ */
1176
+ export type UseSpot = boolean;
1177
+ /**
1178
+ * The idle timeout after which SkyPilot will automatically terminate the cluster.
1179
+ */
1180
+ export type AutostopIdleMinutes = number | null;
1144
1181
  /**
1145
1182
  * The minimal functional capabilities required by the requested compute.
1146
1183
  *
@@ -1188,7 +1225,7 @@ export type TimeoutSeconds = number;
1188
1225
  /**
1189
1226
  * The action to take when the timeout expires.
1190
1227
  */
1191
- export type TimeoutAction4 = "fail_safe" | "proceed_with_defaults" | "escalate";
1228
+ export type TimeoutAction3 = "fail_safe" | "proceed_with_defaults" | "escalate";
1192
1229
  /**
1193
1230
  * A summary of the context requiring intervention.
1194
1231
  */
@@ -1527,15 +1564,15 @@ export type Faults = FaultInjectionProfile[];
1527
1564
  /**
1528
1565
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
1529
1566
  */
1530
- export type EventCid2 = string;
1567
+ export type EventCid1 = string;
1531
1568
  /**
1532
1569
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
1533
1570
  */
1534
- export type PriorEventHash2 = string | null;
1571
+ export type PriorEventHash1 = string | null;
1535
1572
  /**
1536
1573
  * Causal Ancestry markers required to resolve decentralized event ordering.
1537
1574
  */
1538
- export type Timestamp2 = number;
1575
+ export type Timestamp1 = number;
1539
1576
  /**
1540
1577
  * Discriminator type for an exogenous event.
1541
1578
  */
@@ -1799,32 +1836,10 @@ export type From = string | null;
1799
1836
  * Cryptographic proof that this mutation was sanitized by the Symbolic Firewall.
1800
1837
  */
1801
1838
  export type ZeroTrustReceiptCid = string | null;
1802
- /**
1803
- * Discriminator for the FederatedDiscoveryIntent topology.
1804
- */
1805
- export type TopologyClass61 = "federated_discovery";
1806
- /**
1807
- * The bounded set of URN namespaces to interrogate during sovereign oracle discovery.
1808
- *
1809
- * @maxItems 1000
1810
- */
1811
- export type DomainFilter = string[];
1812
- /**
1813
- * A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
1814
- */
1815
- export type BundleContentHashState = string;
1816
- /**
1817
- * The maximum number of P2P network hops allowed.
1818
- */
1819
- export type MaxNetworkHops = number;
1820
- /**
1821
- * The minimum security clearance required from the discovered execution substrates.
1822
- */
1823
- export type RequiredSecurityClearance = "PUBLIC" | "CONFIDENTIAL" | "RESTRICTED";
1824
1839
  /**
1825
1840
  * Discriminator for the OntologicalNormalizationIntent topology.
1826
1841
  */
1827
- export type TopologyClass62 = "ontological_normalization";
1842
+ export type TopologyClass61 = "ontological_normalization";
1828
1843
  /**
1829
1844
  * The Content Identifier (CID) of the raw ingested data artifact.
1830
1845
  */
@@ -1886,27 +1901,7 @@ export type Description3 = string;
1886
1901
  /**
1887
1902
  * Discriminator for an Agent node.
1888
1903
  */
1889
- export type TopologyClass63 = "agent";
1890
- /**
1891
- * The discrete architectural boundary of the node.
1892
- */
1893
- export type ComputeTier = string;
1894
- /**
1895
- * The absolute physical minimum Video RAM required to load this node's latent space.
1896
- */
1897
- export type MinVramGb = number;
1898
- /**
1899
- * The networking mode defining the P2P boundary for enterprise compliance.
1900
- */
1901
- export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
1902
- /**
1903
- * The rigid silicon precision format required to execute this node's neural circuits.
1904
- */
1905
- export type AcceleratorType = string;
1906
- /**
1907
- * The explicit array of cloud infrastructure providers authorized to run this node.
1908
- */
1909
- export type ProviderWhitelist = string[];
1904
+ export type TopologyClass62 = "agent";
1910
1905
  /**
1911
1906
  * The level of hardware-enforced cryptographic isolation required.
1912
1907
  */
@@ -2001,7 +1996,7 @@ export type MaxRetriesOnSemanticTax = number;
2001
1996
  */
2002
1997
  export type PermittedRemoteDecodingProtocols = string[];
2003
1998
  /**
2004
- * The minimum Lattice-Based Access Control (LBAC) network perimeter required for the hardware.
1999
+ * The minimum SPIFFE/SPIRE workload identity perimeter required for the hardware.
2005
2000
  */
2006
2001
  export type EpistemicSecurityPolicy1 = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
2007
2002
  /**
@@ -2095,13 +2090,13 @@ export type EnforceFunctionalIsolation = boolean;
2095
2090
  */
2096
2091
  export type PermittedClassificationTiers = [SemanticClassificationProfile, ...SemanticClassificationProfile[]];
2097
2092
  /**
2098
- * AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
2093
+ * AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
2099
2094
  *
2100
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
2095
+ * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
2101
2096
  *
2102
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
2097
+ * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
2103
2098
  *
2104
- * MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
2099
+ * MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
2105
2100
  */
2106
2101
  export type SemanticClassificationProfile = "public" | "internal" | "confidential" | "restricted";
2107
2102
  /**
@@ -2212,11 +2207,11 @@ export type TriggerConditions = [
2212
2207
  ...("on_tool_call" | "on_belief_mutation" | "on_quarantine" | "on_falsification")[]
2213
2208
  ];
2214
2209
  /**
2215
- * The specific transformer block indices the execution engine must extract from.
2210
+ * The specific TransformerLens hook points the execution engine must extract from.
2216
2211
  *
2217
2212
  * @minItems 1
2218
2213
  */
2219
- export type TargetLayers = [number, ...number[]];
2214
+ export type TargetHookPoints1 = [string, ...string[]];
2220
2215
  /**
2221
2216
  * The top-k features to extract, preventing VRAM exhaustion.
2222
2217
  */
@@ -2314,7 +2309,7 @@ export type DomainExtensions1 = {
2314
2309
  /**
2315
2310
  * Discriminator for a Human node.
2316
2311
  */
2317
- export type TopologyClass64 = "human";
2312
+ export type TopologyClass63 = "human";
2318
2313
  /**
2319
2314
  * The mandatory cryptographic attestation URN required to verify the human operator's identity.
2320
2315
  */
@@ -2344,7 +2339,7 @@ export type DomainExtensions2 = {
2344
2339
  /**
2345
2340
  * Discriminator for a System node.
2346
2341
  */
2347
- export type TopologyClass65 = "system";
2342
+ export type TopologyClass64 = "system";
2348
2343
  /**
2349
2344
  * The semantic boundary defining the objective function or computational perimeter of the execution node.
2350
2345
  */
@@ -2370,7 +2365,7 @@ export type DomainExtensions3 = {
2370
2365
  /**
2371
2366
  * Discriminator for a Composite node.
2372
2367
  */
2373
- export type TopologyClass66 = "composite";
2368
+ export type TopologyClass65 = "composite";
2374
2369
  /**
2375
2370
  * Entropy Penalty applied per edge traversal during a defeasible cascade.
2376
2371
  */
@@ -2428,13 +2423,13 @@ export type Active1 = boolean;
2428
2423
  */
2429
2424
  export type RuleCid = string;
2430
2425
  /**
2431
- * AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
2426
+ * AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
2432
2427
  *
2433
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
2428
+ * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
2434
2429
  *
2435
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
2430
+ * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
2436
2431
  *
2437
- * MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
2432
+ * MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
2438
2433
  */
2439
2434
  export type SemanticClassificationProfile1 = "public" | "internal" | "confidential" | "restricted";
2440
2435
  /**
@@ -2474,11 +2469,11 @@ export type ActionOnViolation = "drop" | "quarantine" | "redact";
2474
2469
  */
2475
2470
  export type TargetFeatureIndex = number;
2476
2471
  /**
2477
- * The specific transformer layer indices where this feature activation must be monitored.
2472
+ * The specific TransformerLens hook points where this feature activation must be monitored.
2478
2473
  *
2479
2474
  * @minItems 1
2480
2475
  */
2481
- export type MonitoredLayers = [number, ...number[]];
2476
+ export type MonitoredHookPoints = [string, ...string[]];
2482
2477
  /**
2483
2478
  * The mathematical magnitude limit. If the feature activates beyond this, the firewall trips.
2484
2479
  */
@@ -2590,7 +2585,7 @@ export type FoveatedPrivacyEpsilon = number | null;
2590
2585
  /**
2591
2586
  * Discriminator for a DAG topology.
2592
2587
  */
2593
- export type TopologyClass67 = "dag";
2588
+ export type TopologyClass66 = "dag";
2594
2589
  /**
2595
2590
  * The strict, topologically bounded matrix of directed causal edges.
2596
2591
  */
@@ -2674,7 +2669,7 @@ export type Justification7 = string | null;
2674
2669
  /**
2675
2670
  * Discriminator for a Council topology.
2676
2671
  */
2677
- export type TopologyClass68 = "council";
2672
+ export type TopologyClass67 = "council";
2678
2673
  /**
2679
2674
  * The minimum number of adversarial or 'Devil's Advocate' roles required to prevent groupthink.
2680
2675
  */
@@ -2746,7 +2741,7 @@ export type Justification8 = string | null;
2746
2741
  /**
2747
2742
  * Discriminator for a Swarm topology.
2748
2743
  */
2749
- export type TopologyClass69 = "swarm";
2744
+ export type TopologyClass68 = "swarm";
2750
2745
  /**
2751
2746
  * Threshold limit for dynamic spawning of additional nodes.
2752
2747
  */
@@ -2828,7 +2823,7 @@ export type Justification9 = string | null;
2828
2823
  /**
2829
2824
  * Discriminator for an Evolutionary topology.
2830
2825
  */
2831
- export type TopologyClass70 = "evolutionary";
2826
+ export type TopologyClass69 = "evolutionary";
2832
2827
  /**
2833
2828
  * The absolute limit on evolutionary breeding cycles.
2834
2829
  */
@@ -2888,7 +2883,7 @@ export type Justification10 = string | null;
2888
2883
  /**
2889
2884
  * Discriminator for SMPC Topology.
2890
2885
  */
2891
- export type TopologyClass71 = "smpc";
2886
+ export type TopologyClass70 = "smpc";
2892
2887
  /**
2893
2888
  * The exact cryptographic P2P protocol the nodes must use to evaluate the function.
2894
2889
  */
@@ -2918,7 +2913,7 @@ export type Justification11 = string | null;
2918
2913
  /**
2919
2914
  * Discriminator for an Evaluator-Optimizer loop.
2920
2915
  */
2921
- export type TopologyClass72 = "evaluator_optimizer";
2916
+ export type TopologyClass71 = "evaluator_optimizer";
2922
2917
  /**
2923
2918
  * The absolute limit on Actor-Critic cycles to prevent infinite compute burn.
2924
2919
  */
@@ -2942,7 +2937,7 @@ export type Justification12 = string | null;
2942
2937
  /**
2943
2938
  * Discriminator for a Digital Twin topology.
2944
2939
  */
2945
- export type TopologyClass73 = "digital_twin";
2940
+ export type TopologyClass72 = "digital_twin";
2946
2941
  /**
2947
2942
  * The identifier (expected to be a W3C DID) pointing to the real-world topology it is cloning.
2948
2943
  */
@@ -2962,7 +2957,7 @@ export type EnforceNoSideEffects = boolean;
2962
2957
  /**
2963
2958
  * Discriminator for federation macro.
2964
2959
  */
2965
- export type TopologyClass74 = "macro_federation";
2960
+ export type TopologyClass73 = "macro_federation";
2966
2961
  /**
2967
2962
  * The nodes forming the PBFT ring.
2968
2963
  *
@@ -2984,7 +2979,7 @@ export type Justification13 = string | null;
2984
2979
  /**
2985
2980
  * Discriminator for forge macro.
2986
2981
  */
2987
- export type TopologyClass75 = "macro_forge";
2982
+ export type TopologyClass74 = "macro_forge";
2988
2983
  /**
2989
2984
  * The structural 128-char DID boundary pointing to the foundational semantic deficit vector.
2990
2985
  */
@@ -3012,7 +3007,7 @@ export type Justification14 = string | null;
3012
3007
  /**
3013
3008
  * Discriminator for the elicitation macro.
3014
3009
  */
3015
- export type TopologyClass76 = "macro_elicitation";
3010
+ export type TopologyClass75 = "macro_elicitation";
3016
3011
  /**
3017
3012
  * The anchor to the initial, unstructured MultimodalArtifactReceipt uploaded by the human.
3018
3013
  */
@@ -3036,7 +3031,7 @@ export type Justification15 = string | null;
3036
3031
  /**
3037
3032
  * Discriminator for the ingestion macro.
3038
3033
  */
3039
- export type TopologyClass77 = "macro_ingestion";
3034
+ export type TopologyClass76 = "macro_ingestion";
3040
3035
  /**
3041
3036
  * Target serialization format.
3042
3037
  */
@@ -3056,7 +3051,7 @@ export type Justification16 = string | null;
3056
3051
  /**
3057
3052
  * Discriminator for a macro neurosymbolic loop.
3058
3053
  */
3059
- export type TopologyClass78 = "macro_neurosymbolic";
3054
+ export type TopologyClass77 = "macro_neurosymbolic";
3060
3055
  /**
3061
3056
  * The connectionist agent generating hypotheses.
3062
3057
  */
@@ -3076,7 +3071,7 @@ export type CritiqueSchemaCid = string | null;
3076
3071
  /**
3077
3072
  * Discriminator for a discourse tree topology.
3078
3073
  */
3079
- export type TopologyClass79 = "discourse_tree";
3074
+ export type TopologyClass78 = "discourse_tree";
3080
3075
  /**
3081
3076
  * Cryptographic identifier for this topology.
3082
3077
  */
@@ -3089,7 +3084,7 @@ export type DiscourseType = "preamble" | "methodology" | "argumentation" | "find
3089
3084
  * Explicit pointers linking this discourse block to the specific AtomicPropositionState nodes extracted from its text.
3090
3085
  */
3091
3086
  export type ContainedPropositions = NodeCIDState[];
3092
- export type TopologyClass80 = "document_knowledge_graph";
3087
+ export type TopologyClass79 = "document_knowledge_graph";
3093
3088
  export type GraphCid = string;
3094
3089
  export type SourceArtifactCid2 = string;
3095
3090
  /**
@@ -3153,7 +3148,7 @@ export type CiphertextBlob = string;
3153
3148
  /**
3154
3149
  * Discriminator for manifold mapping.
3155
3150
  */
3156
- export type TopologyClass81 = "manifold_mapping";
3151
+ export type TopologyClass80 = "manifold_mapping";
3157
3152
  /**
3158
3153
  * Calculated geometric alignment between the semantic embedding and spatial tensor.
3159
3154
  */
@@ -3171,7 +3166,7 @@ export type Nodes12 = SemanticNodeState[];
3171
3166
  */
3172
3167
  export type CausalEdges = CausalDirectedEdgeState[];
3173
3168
  export type IsomorphismHash = string;
3174
- export type TopologyClass82 = "hierarchical_dom";
3169
+ export type TopologyClass81 = "hierarchical_dom";
3175
3170
  export type DomCid = string;
3176
3171
  export type RootBlockCid = string;
3177
3172
  /**
@@ -3263,7 +3258,7 @@ export type DomainExtensions4 = {
3263
3258
  /**
3264
3259
  * Discriminator for a Memoized node.
3265
3260
  */
3266
- export type TopologyClass83 = "memoized";
3261
+ export type TopologyClass82 = "memoized";
3267
3262
  /**
3268
3263
  * A discriminated union of presentation UI panels.
3269
3264
  */
@@ -3276,7 +3271,7 @@ export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | Cros
3276
3271
  /**
3277
3272
  * Discriminator for temporal graph crdt.
3278
3273
  */
3279
- export type TopologyClass84 = "temporal_graph_crdt";
3274
+ export type TopologyClass83 = "temporal_graph_crdt";
3280
3275
  /**
3281
3276
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark.
3282
3277
  */
@@ -3297,40 +3292,40 @@ export type AddSet = NodeCIDState[];
3297
3292
  * The set of non-monotonic timeline caps.
3298
3293
  */
3299
3294
  export type TerminateSet = TemporalEdgeInvalidationIntent[];
3300
- export type TopologyClass85 = "mcp_tool_definition";
3295
+ export type TopologyClass84 = "mcp_tool_definition";
3301
3296
  /**
3302
3297
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3303
3298
  */
3304
- export type EventCid3 = string;
3299
+ export type EventCid2 = string;
3305
3300
  /**
3306
3301
  * The RFC 8785 Canonical hash of the immediate causal ancestor event. Null for genesis nodes.
3307
3302
  */
3308
- export type PriorEventHash3 = string | null;
3309
- export type Timestamp3 = number;
3303
+ export type PriorEventHash2 = string | null;
3304
+ export type Timestamp2 = number;
3310
3305
  export type Name = string;
3311
3306
  export type Description9 = string;
3312
- export type EventCid4 = string;
3313
- export type PriorEventHash4 = string | null;
3314
- export type Timestamp4 = number;
3315
- export type TopologyClass86 = "crosswalk_resolution";
3316
- export type ReceiptCid1 = string;
3307
+ export type EventCid3 = string;
3308
+ export type PriorEventHash3 = string | null;
3309
+ export type Timestamp3 = number;
3310
+ export type TopologyClass85 = "crosswalk_resolution";
3311
+ export type ReceiptCid = string;
3317
3312
  export type TargetGraphCid3 = string;
3318
3313
  /**
3319
3314
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3320
3315
  */
3321
- export type EventCid5 = string;
3316
+ export type EventCid4 = string;
3322
3317
  /**
3323
3318
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3324
3319
  */
3325
- export type PriorEventHash5 = string | null;
3320
+ export type PriorEventHash4 = string | null;
3326
3321
  /**
3327
3322
  * Causal Ancestry markers required to resolve decentralized event ordering.
3328
3323
  */
3329
- export type Timestamp5 = number;
3324
+ export type Timestamp4 = number;
3330
3325
  /**
3331
3326
  * Discriminator for a zero-trust receipt.
3332
3327
  */
3333
- export type TopologyClass87 = "zero_trust_receipt";
3328
+ export type TopologyClass86 = "zero_trust_receipt";
3334
3329
  /**
3335
3330
  * Pointer to the originating EpistemicZeroTrustContract.
3336
3331
  */
@@ -3354,19 +3349,19 @@ export type TransmutedPayloadHash = string;
3354
3349
  /**
3355
3350
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3356
3351
  */
3357
- export type EventCid6 = string;
3352
+ export type EventCid5 = string;
3358
3353
  /**
3359
3354
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3360
3355
  */
3361
- export type PriorEventHash6 = string | null;
3356
+ export type PriorEventHash5 = string | null;
3362
3357
  /**
3363
3358
  * Causal Ancestry markers required to resolve decentralized event ordering.
3364
3359
  */
3365
- export type Timestamp6 = number;
3360
+ export type Timestamp5 = number;
3366
3361
  /**
3367
3362
  * Discriminator type for an observation event.
3368
3363
  */
3369
- export type TopologyClass88 = "observation";
3364
+ export type TopologyClass87 = "observation";
3370
3365
  /**
3371
3366
  * The URN representing the physical silicon architecture generating the root-of-trust quote (e.g., 'urn:coreason:enclave:intel_tdx').
3372
3367
  */
@@ -3386,7 +3381,7 @@ export type AnyToolchainState = BrowserDOMState | TerminalBufferState;
3386
3381
  /**
3387
3382
  * Discriminator for Causal Actuators representing structural shifts.
3388
3383
  */
3389
- export type TopologyClass89 = "browser";
3384
+ export type TopologyClass88 = "browser";
3390
3385
  /**
3391
3386
  * Spatial Execution Bounds where the agent interacts.
3392
3387
  */
@@ -3413,7 +3408,7 @@ export type ScreenshotCid = string | null;
3413
3408
  /**
3414
3409
  * Discriminator for Causal Actuators on structural buffers.
3415
3410
  */
3416
- export type TopologyClass90 = "terminal";
3411
+ export type TopologyClass89 = "terminal";
3417
3412
  /**
3418
3413
  * Capability Perimeters defining context bounds.
3419
3414
  */
@@ -3499,19 +3494,19 @@ export type MaxLookbackWindow = number;
3499
3494
  /**
3500
3495
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3501
3496
  */
3502
- export type EventCid7 = string;
3497
+ export type EventCid6 = string;
3503
3498
  /**
3504
3499
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3505
3500
  */
3506
- export type PriorEventHash7 = string | null;
3501
+ export type PriorEventHash6 = string | null;
3507
3502
  /**
3508
3503
  * Causal Ancestry markers required to resolve decentralized event ordering.
3509
3504
  */
3510
- export type Timestamp7 = number;
3505
+ export type Timestamp6 = number;
3511
3506
  /**
3512
3507
  * Discriminator type for a Belief Assertion event.
3513
3508
  */
3514
- export type TopologyClass91 = "belief_mutation";
3509
+ export type TopologyClass90 = "belief_mutation";
3515
3510
  /**
3516
3511
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the source event in the Merkle-DAG.
3517
3512
  */
@@ -3551,32 +3546,32 @@ export type QuorumSignatures = string[];
3551
3546
  /**
3552
3547
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3553
3548
  */
3554
- export type EventCid8 = string;
3549
+ export type EventCid7 = string;
3555
3550
  /**
3556
3551
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3557
3552
  */
3558
- export type PriorEventHash8 = string | null;
3553
+ export type PriorEventHash7 = string | null;
3559
3554
  /**
3560
3555
  * Causal Ancestry markers required to resolve decentralized event ordering.
3561
3556
  */
3562
- export type Timestamp8 = number;
3557
+ export type Timestamp7 = number;
3563
3558
  /**
3564
3559
  * Discriminator type for a system fault event.
3565
3560
  */
3566
- export type TopologyClass92 = "system_fault";
3567
- export type TopologyClass93 = "atomic_proposition";
3561
+ export type TopologyClass91 = "system_fault";
3562
+ export type TopologyClass92 = "atomic_proposition";
3568
3563
  /**
3569
3564
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3570
3565
  */
3571
- export type EventCid9 = string;
3566
+ export type EventCid8 = string;
3572
3567
  /**
3573
3568
  * The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
3574
3569
  */
3575
- export type PriorEventHash9 = string | null;
3570
+ export type PriorEventHash8 = string | null;
3576
3571
  /**
3577
3572
  * The precise temporal coordinate of the event realization.
3578
3573
  */
3579
- export type Timestamp9 = number;
3574
+ export type Timestamp8 = number;
3580
3575
  /**
3581
3576
  * A Content Identifier (CID) bounding this specific extracted proposition.
3582
3577
  */
@@ -3621,19 +3616,19 @@ export type UpperBound = number | null;
3621
3616
  * Explicit mathematical boundaries extracted from the text that empirically limit the certainty or scope of the proposition.
3622
3617
  */
3623
3618
  export type StatisticalQualifiers = EmpiricalStatisticalProfile[];
3624
- export type TopologyClass94 = "post_coordinated_concept";
3619
+ export type TopologyClass93 = "post_coordinated_concept";
3625
3620
  /**
3626
3621
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3627
3622
  */
3628
- export type EventCid10 = string;
3623
+ export type EventCid9 = string;
3629
3624
  /**
3630
3625
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
3631
3626
  */
3632
- export type PriorEventHash10 = string | null;
3627
+ export type PriorEventHash9 = string | null;
3633
3628
  /**
3634
3629
  * The precise temporal coordinate of the event realization.
3635
3630
  */
3636
- export type Timestamp10 = number;
3631
+ export type Timestamp9 = number;
3637
3632
  /**
3638
3633
  * The unique geometric coordinate representing this specific assembled concept.
3639
3634
  */
@@ -3646,10 +3641,10 @@ export type ManifoldAlignmentMetricProfile1 = "gromov_wasserstein" | "earth_move
3646
3641
  * The exact mathematical fidelity achieved during projection.
3647
3642
  */
3648
3643
  export type IsometryScore = number;
3649
- export type EventCid11 = string;
3650
- export type PriorEventHash11 = string | null;
3651
- export type Timestamp11 = number;
3652
- export type TopologyClass95 = "artifact_corruption";
3644
+ export type EventCid10 = string;
3645
+ export type PriorEventHash10 = string | null;
3646
+ export type Timestamp10 = number;
3647
+ export type TopologyClass94 = "artifact_corruption";
3653
3648
  /**
3654
3649
  * The genesis artifact that caused the ingestion engine to crash.
3655
3650
  */
@@ -3659,19 +3654,19 @@ export type DiagnosticHash = string;
3659
3654
  /**
3660
3655
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3661
3656
  */
3662
- export type EventCid12 = string;
3657
+ export type EventCid11 = string;
3663
3658
  /**
3664
3659
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3665
3660
  */
3666
- export type PriorEventHash12 = string | null;
3661
+ export type PriorEventHash11 = string | null;
3667
3662
  /**
3668
3663
  * Causal Ancestry markers required to resolve decentralized event ordering.
3669
3664
  */
3670
- export type Timestamp12 = number;
3665
+ export type Timestamp11 = number;
3671
3666
  /**
3672
3667
  * Discriminator for a hypothesis generation event.
3673
3668
  */
3674
- export type TopologyClass96 = "hypothesis";
3669
+ export type TopologyClass95 = "hypothesis";
3675
3670
  /**
3676
3671
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this abductive leap to the Merkle-DAG.
3677
3672
  */
@@ -3713,19 +3708,19 @@ export type CausalEdges1 = CausalDirectedEdgeState[];
3713
3708
  /**
3714
3709
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3715
3710
  */
3716
- export type EventCid13 = string;
3711
+ export type EventCid12 = string;
3717
3712
  /**
3718
3713
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3719
3714
  */
3720
- export type PriorEventHash13 = string | null;
3715
+ export type PriorEventHash12 = string | null;
3721
3716
  /**
3722
3717
  * Causal Ancestry markers required to resolve decentralized event ordering.
3723
3718
  */
3724
- export type Timestamp13 = number;
3719
+ export type Timestamp12 = number;
3725
3720
  /**
3726
3721
  * Discriminator type for a barge-in interruption event.
3727
3722
  */
3728
- export type TopologyClass97 = "barge_in";
3723
+ export type TopologyClass96 = "barge_in";
3729
3724
  /**
3730
3725
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the active node generation cycle that was killed in the Merkle-DAG.
3731
3726
  */
@@ -3743,19 +3738,19 @@ export type EpistemicDisposition = "discard" | "retain_as_context" | "mark_as_fa
3743
3738
  /**
3744
3739
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3745
3740
  */
3746
- export type EventCid14 = string;
3741
+ export type EventCid13 = string;
3747
3742
  /**
3748
3743
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3749
3744
  */
3750
- export type PriorEventHash14 = string | null;
3745
+ export type PriorEventHash13 = string | null;
3751
3746
  /**
3752
3747
  * Causal Ancestry markers required to resolve decentralized event ordering.
3753
3748
  */
3754
- export type Timestamp14 = number;
3749
+ export type Timestamp13 = number;
3755
3750
  /**
3756
3751
  * Discriminator type for a counterfactual regret event.
3757
3752
  */
3758
- export type TopologyClass98 = "counterfactual_regret";
3753
+ export type TopologyClass97 = "counterfactual_regret";
3759
3754
  /**
3760
3755
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the specific historical state node where the agent mathematically diverged to simulate an alternative path.
3761
3756
  */
@@ -3779,19 +3774,19 @@ export type EpistemicRegret = number;
3779
3774
  /**
3780
3775
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3781
3776
  */
3782
- export type EventCid15 = string;
3777
+ export type EventCid14 = string;
3783
3778
  /**
3784
3779
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3785
3780
  */
3786
- export type PriorEventHash15 = string | null;
3781
+ export type PriorEventHash14 = string | null;
3787
3782
  /**
3788
3783
  * Causal Ancestry markers required to resolve decentralized event ordering.
3789
3784
  */
3790
- export type Timestamp15 = number;
3785
+ export type Timestamp14 = number;
3791
3786
  /**
3792
3787
  * Discriminator type for a tool invocation event.
3793
3788
  */
3794
- export type TopologyClass99 = "tool_invocation";
3789
+ export type TopologyClass98 = "tool_invocation";
3795
3790
  /**
3796
3791
  * The exact tool targeted in the CognitiveActionSpaceManifest.
3797
3792
  */
@@ -3803,19 +3798,19 @@ export type AuthorizedBudgetMagnitude = number;
3803
3798
  /**
3804
3799
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3805
3800
  */
3806
- export type EventCid16 = string;
3801
+ export type EventCid15 = string;
3807
3802
  /**
3808
3803
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3809
3804
  */
3810
- export type PriorEventHash16 = string | null;
3805
+ export type PriorEventHash15 = string | null;
3811
3806
  /**
3812
3807
  * Causal Ancestry markers required to resolve decentralized event ordering.
3813
3808
  */
3814
- export type Timestamp16 = number;
3809
+ export type Timestamp15 = number;
3815
3810
  /**
3816
3811
  * Discriminator type for an epistemic promotion event.
3817
3812
  */
3818
- export type TopologyClass100 = "epistemic_promotion";
3813
+ export type TopologyClass99 = "epistemic_promotion";
3819
3814
  /**
3820
3815
  * The strict array of CIDs (Content Identifiers) representing the raw logs being compressed and archived.
3821
3816
  */
@@ -3831,23 +3826,23 @@ export type CompressionRatio = number;
3831
3826
  /**
3832
3827
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3833
3828
  */
3834
- export type EventCid17 = string;
3829
+ export type EventCid16 = string;
3835
3830
  /**
3836
3831
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3837
3832
  */
3838
- export type PriorEventHash17 = string | null;
3833
+ export type PriorEventHash16 = string | null;
3839
3834
  /**
3840
3835
  * Causal Ancestry markers required to resolve decentralized event ordering.
3841
3836
  */
3842
- export type Timestamp17 = number;
3837
+ export type Timestamp16 = number;
3843
3838
  /**
3844
3839
  * Discriminator type for a normative drift event.
3845
3840
  */
3846
- export type TopologyClass101 = "normative_drift";
3841
+ export type TopologyClass100 = "normative_drift";
3847
3842
  /**
3848
3843
  * The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
3849
3844
  */
3850
- export type TrippedRuleCid1 = string;
3845
+ export type TrippedRuleCid = string;
3851
3846
  /**
3852
3847
  * The calculated probabilistic delta showing how far the swarm's observed reality is diverging from the static rule.
3853
3848
  */
@@ -3859,19 +3854,19 @@ export type ContradictionProofHash = string;
3859
3854
  /**
3860
3855
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3861
3856
  */
3862
- export type EventCid18 = string;
3857
+ export type EventCid17 = string;
3863
3858
  /**
3864
3859
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3865
3860
  */
3866
- export type PriorEventHash18 = string | null;
3861
+ export type PriorEventHash17 = string | null;
3867
3862
  /**
3868
3863
  * Causal Ancestry markers required to resolve decentralized event ordering.
3869
3864
  */
3870
- export type Timestamp18 = number;
3865
+ export type Timestamp17 = number;
3871
3866
  /**
3872
3867
  * Discriminator type for a persistence commit receipt.
3873
3868
  */
3874
- export type TopologyClass102 = "persistence_commit";
3869
+ export type TopologyClass101 = "persistence_commit";
3875
3870
  /**
3876
3871
  * The external cryptographic receipt generated by Iceberg/Delta.
3877
3872
  */
@@ -3887,19 +3882,19 @@ export type TargetTableUri = string;
3887
3882
  /**
3888
3883
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3889
3884
  */
3890
- export type EventCid19 = string;
3885
+ export type EventCid18 = string;
3891
3886
  /**
3892
3887
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3893
3888
  */
3894
- export type PriorEventHash19 = string | null;
3889
+ export type PriorEventHash18 = string | null;
3895
3890
  /**
3896
3891
  * Causal Ancestry markers required to resolve decentralized event ordering.
3897
3892
  */
3898
- export type Timestamp19 = number;
3893
+ export type Timestamp18 = number;
3899
3894
  /**
3900
3895
  * Discriminator type for a token burn receipt.
3901
3896
  */
3902
- export type TopologyClass103 = "token_burn";
3897
+ export type TopologyClass102 = "token_burn";
3903
3898
  /**
3904
3899
  * A string linking this burn back to the specific ToolInvocationEvent CID.
3905
3900
  */
@@ -3919,19 +3914,19 @@ export type BurnMagnitude = number;
3919
3914
  /**
3920
3915
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3921
3916
  */
3922
- export type EventCid20 = string;
3917
+ export type EventCid19 = string;
3923
3918
  /**
3924
3919
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3925
3920
  */
3926
- export type PriorEventHash20 = string | null;
3921
+ export type PriorEventHash19 = string | null;
3927
3922
  /**
3928
3923
  * Causal Ancestry markers required to resolve decentralized event ordering.
3929
3924
  */
3930
- export type Timestamp20 = number;
3925
+ export type Timestamp19 = number;
3931
3926
  /**
3932
3927
  * Discriminator type for a budget exhaustion event.
3933
3928
  */
3934
- export type TopologyClass104 = "budget_exhaustion";
3929
+ export type TopologyClass103 = "budget_exhaustion";
3935
3930
  /**
3936
3931
  * A string representing the original escrow boundary breached.
3937
3932
  */
@@ -3943,19 +3938,19 @@ export type FinalBurnReceiptCid = string;
3943
3938
  /**
3944
3939
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3945
3940
  */
3946
- export type EventCid21 = string;
3941
+ export type EventCid20 = string;
3947
3942
  /**
3948
3943
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3949
3944
  */
3950
- export type PriorEventHash21 = string | null;
3945
+ export type PriorEventHash20 = string | null;
3951
3946
  /**
3952
3947
  * Causal Ancestry markers required to resolve decentralized event ordering.
3953
3948
  */
3954
- export type Timestamp21 = number;
3949
+ export type Timestamp20 = number;
3955
3950
  /**
3956
3951
  * Discriminator type for telemetry events.
3957
3952
  */
3958
- export type TopologyClass105 = "epistemic_telemetry";
3953
+ export type TopologyClass104 = "epistemic_telemetry";
3959
3954
  /**
3960
3955
  * The exact topological action the human operator performed on the projected manifold.
3961
3956
  */
@@ -3971,16 +3966,16 @@ export type DwellDurationMs = number | null;
3971
3966
  /**
3972
3967
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3973
3968
  */
3974
- export type EventCid22 = string;
3969
+ export type EventCid21 = string;
3975
3970
  /**
3976
3971
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3977
3972
  */
3978
- export type PriorEventHash22 = string | null;
3973
+ export type PriorEventHash21 = string | null;
3979
3974
  /**
3980
3975
  * Causal Ancestry markers required to resolve decentralized event ordering.
3981
3976
  */
3982
- export type Timestamp22 = number;
3983
- export type TopologyClass106 = "cognitive_prediction";
3977
+ export type Timestamp21 = number;
3978
+ export type TopologyClass105 = "cognitive_prediction";
3984
3979
  export type SourceChainCid = string;
3985
3980
  export type TargetSourceConcept = string;
3986
3981
  /**
@@ -3990,16 +3985,16 @@ export type PredictedTopKTokens = [string, ...string[]];
3990
3985
  /**
3991
3986
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3992
3987
  */
3993
- export type EventCid23 = string;
3988
+ export type EventCid22 = string;
3994
3989
  /**
3995
3990
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3996
3991
  */
3997
- export type PriorEventHash23 = string | null;
3992
+ export type PriorEventHash22 = string | null;
3998
3993
  /**
3999
3994
  * Causal Ancestry markers required to resolve decentralized event ordering.
4000
3995
  */
4001
- export type Timestamp23 = number;
4002
- export type TopologyClass107 = "epistemic_axiom_verification";
3996
+ export type Timestamp22 = number;
3997
+ export type TopologyClass106 = "epistemic_axiom_verification";
4003
3998
  export type SourcePredictionCid = string;
4004
3999
  export type SequenceSimilarityScore = number;
4005
4000
  export type FactScorePassed = boolean;
@@ -4010,16 +4005,16 @@ export type ZeroTrustReceiptCid1 = string | null;
4010
4005
  /**
4011
4006
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4012
4007
  */
4013
- export type EventCid24 = string;
4008
+ export type EventCid23 = string;
4014
4009
  /**
4015
4010
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4016
4011
  */
4017
- export type PriorEventHash24 = string | null;
4012
+ export type PriorEventHash23 = string | null;
4018
4013
  /**
4019
4014
  * Causal Ancestry markers required to resolve decentralized event ordering.
4020
4015
  */
4021
- export type Timestamp24 = number;
4022
- export type TopologyClass108 = "cognitive_reward_evaluation";
4016
+ export type Timestamp23 = number;
4017
+ export type TopologyClass107 = "cognitive_reward_evaluation";
4023
4018
  /**
4024
4019
  * The globally unique decentralized identifier (DID) anchoring the LLM's raw generated text trajectory.
4025
4020
  */
@@ -4051,16 +4046,16 @@ export type TotalAdvantageScore = number;
4051
4046
  /**
4052
4047
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4053
4048
  */
4054
- export type EventCid25 = string;
4049
+ export type EventCid24 = string;
4055
4050
  /**
4056
4051
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4057
4052
  */
4058
- export type PriorEventHash25 = string | null;
4053
+ export type PriorEventHash24 = string | null;
4059
4054
  /**
4060
4055
  * Causal Ancestry markers required to resolve decentralized event ordering.
4061
4056
  */
4062
- export type Timestamp25 = number;
4063
- export type TopologyClass109 = "epistemic_flow_state";
4057
+ export type Timestamp24 = number;
4058
+ export type TopologyClass108 = "epistemic_flow_state";
4064
4059
  /**
4065
4060
  * The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
4066
4061
  */
@@ -4076,19 +4071,19 @@ export type TerminalRewardFactorized = boolean;
4076
4071
  /**
4077
4072
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4078
4073
  */
4079
- export type EventCid26 = string;
4074
+ export type EventCid25 = string;
4080
4075
  /**
4081
4076
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4082
4077
  */
4083
- export type PriorEventHash26 = string | null;
4078
+ export type PriorEventHash25 = string | null;
4084
4079
  /**
4085
4080
  * Causal Ancestry markers required to resolve decentralized event ordering.
4086
4081
  */
4087
- export type Timestamp26 = number;
4082
+ export type Timestamp25 = number;
4088
4083
  /**
4089
4084
  * Discriminator type for a causal explanation event.
4090
4085
  */
4091
- export type TopologyClass110 = "causal_explanation";
4086
+ export type TopologyClass109 = "causal_explanation";
4092
4087
  /**
4093
4088
  * The globally unique decentralized identifier (DID) anchoring the collective outcome being explained.
4094
4089
  */
@@ -4128,19 +4123,19 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
4128
4123
  /**
4129
4124
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4130
4125
  */
4131
- export type EventCid27 = string;
4126
+ export type EventCid26 = string;
4132
4127
  /**
4133
4128
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4134
4129
  */
4135
- export type PriorEventHash27 = string | null;
4130
+ export type PriorEventHash26 = string | null;
4136
4131
  /**
4137
4132
  * Causal Ancestry markers required to resolve decentralized event ordering.
4138
4133
  */
4139
- export type Timestamp27 = number;
4134
+ export type Timestamp26 = number;
4140
4135
  /**
4141
4136
  * Discriminator type for an intent classification receipt.
4142
4137
  */
4143
- export type TopologyClass111 = "intent_classification";
4138
+ export type TopologyClass110 = "intent_classification";
4144
4139
  /**
4145
4140
  * The raw, unparsed human natural language instruction.
4146
4141
  */
@@ -4157,19 +4152,19 @@ export type ConfidenceScore1 = number;
4157
4152
  * The TaxonomicRoutingPolicy CID that governed this classification.
4158
4153
  */
4159
4154
  export type RoutingPolicyCid = string | null;
4160
- export type TopologyClass112 = "semantic_relational_record";
4155
+ export type TopologyClass111 = "semantic_relational_record";
4161
4156
  /**
4162
4157
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4163
4158
  */
4164
- export type EventCid28 = string;
4159
+ export type EventCid27 = string;
4165
4160
  /**
4166
4161
  * The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
4167
4162
  */
4168
- export type PriorEventHash28 = string | null;
4163
+ export type PriorEventHash27 = string | null;
4169
4164
  /**
4170
4165
  * The precise temporal coordinate of the event realization.
4171
4166
  */
4172
- export type Timestamp28 = number;
4167
+ export type Timestamp27 = number;
4173
4168
  /**
4174
4169
  * The domain-independent structural classification of the record.
4175
4170
  */
@@ -4181,19 +4176,19 @@ export type FormalSchemaUrn1 = string | null;
4181
4176
  /**
4182
4177
  * Discriminator for the reification receipt.
4183
4178
  */
4184
- export type TopologyClass113 = "ontological_reification";
4179
+ export type TopologyClass112 = "ontological_reification";
4185
4180
  /**
4186
4181
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4187
4182
  */
4188
- export type EventCid29 = string;
4183
+ export type EventCid28 = string;
4189
4184
  /**
4190
4185
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
4191
4186
  */
4192
- export type PriorEventHash29 = string | null;
4187
+ export type PriorEventHash28 = string | null;
4193
4188
  /**
4194
4189
  * The precise temporal coordinate of the event realization.
4195
4190
  */
4196
- export type Timestamp29 = number;
4191
+ export type Timestamp28 = number;
4197
4192
  /**
4198
4193
  * The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
4199
4194
  */
@@ -4213,19 +4208,19 @@ export type IsLatentInference = boolean;
4213
4208
  /**
4214
4209
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4215
4210
  */
4216
- export type EventCid30 = string;
4211
+ export type EventCid29 = string;
4217
4212
  /**
4218
4213
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4219
4214
  */
4220
- export type PriorEventHash30 = string | null;
4215
+ export type PriorEventHash29 = string | null;
4221
4216
  /**
4222
4217
  * Causal Ancestry markers required to resolve decentralized event ordering.
4223
4218
  */
4224
- export type Timestamp30 = number;
4219
+ export type Timestamp29 = number;
4225
4220
  /**
4226
4221
  * The type of the resilience payload.
4227
4222
  */
4228
- export type TopologyClass114 = "circuit_breaker_event";
4223
+ export type TopologyClass113 = "circuit_breaker_event";
4229
4224
  /**
4230
4225
  * Signature or summary of the error causing the trip.
4231
4226
  */
@@ -4233,19 +4228,19 @@ export type ErrorSignature = string;
4233
4228
  /**
4234
4229
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4235
4230
  */
4236
- export type EventCid31 = string;
4231
+ export type EventCid30 = string;
4237
4232
  /**
4238
4233
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4239
4234
  */
4240
- export type PriorEventHash31 = string | null;
4235
+ export type PriorEventHash30 = string | null;
4241
4236
  /**
4242
4237
  * Discriminator type for a log event.
4243
4238
  */
4244
- export type TopologyClass115 = "epistemic_log";
4239
+ export type TopologyClass114 = "epistemic_log";
4245
4240
  /**
4246
4241
  * The UNIX timestamp of the log event.
4247
4242
  */
4248
- export type Timestamp31 = number;
4243
+ export type Timestamp30 = number;
4249
4244
  /**
4250
4245
  * The severity level of the log event.
4251
4246
  */
@@ -4258,19 +4253,19 @@ export type TelemetryScalarState = string | number | boolean | null;
4258
4253
  /**
4259
4254
  * The type of the intervention payload.
4260
4255
  */
4261
- export type TopologyClass116 = "verdict";
4256
+ export type TopologyClass115 = "verdict";
4262
4257
  /**
4263
4258
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4264
4259
  */
4265
- export type EventCid32 = string;
4260
+ export type EventCid31 = string;
4266
4261
  /**
4267
4262
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4268
4263
  */
4269
- export type PriorEventHash32 = string | null;
4264
+ export type PriorEventHash31 = string | null;
4270
4265
  /**
4271
4266
  * Causal Ancestry markers required to resolve decentralized event ordering.
4272
4267
  */
4273
- export type Timestamp32 = number;
4268
+ export type Timestamp31 = number;
4274
4269
  /**
4275
4270
  * The cryptographic nonce uniquely identifying the intervention request.
4276
4271
  */
@@ -4306,16 +4301,16 @@ export type LivenessChallengeHash = string;
4306
4301
  /**
4307
4302
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4308
4303
  */
4309
- export type EventCid33 = string;
4304
+ export type EventCid32 = string;
4310
4305
  /**
4311
4306
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4312
4307
  */
4313
- export type PriorEventHash33 = string | null;
4308
+ export type PriorEventHash32 = string | null;
4314
4309
  /**
4315
4310
  * Causal Ancestry markers required to resolve decentralized event ordering.
4316
4311
  */
4317
- export type Timestamp33 = number;
4318
- export type TopologyClass117 = "custody_receipt";
4312
+ export type Timestamp32 = number;
4313
+ export type TopologyClass116 = "custody_receipt";
4319
4314
  /**
4320
4315
  * Unique identifier for this chain-of-custody entry.
4321
4316
  */
@@ -4343,16 +4338,16 @@ export type RedactionTimestampUnixNano = number;
4343
4338
  /**
4344
4339
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4345
4340
  */
4346
- export type EventCid34 = string;
4341
+ export type EventCid33 = string;
4347
4342
  /**
4348
4343
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4349
4344
  */
4350
- export type PriorEventHash34 = string | null;
4345
+ export type PriorEventHash33 = string | null;
4351
4346
  /**
4352
4347
  * Causal Ancestry markers required to resolve decentralized event ordering.
4353
4348
  */
4354
- export type Timestamp34 = number;
4355
- export type TopologyClass118 = "defeasible_attack";
4349
+ export type Timestamp33 = number;
4350
+ export type TopologyClass117 = "defeasible_attack";
4356
4351
  /**
4357
4352
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
4358
4353
  */
@@ -4365,6 +4360,24 @@ export type SourceClaimCid = string;
4365
4360
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark for the claim being attacked.
4366
4361
  */
4367
4362
  export type TargetClaimCid = string;
4363
+ /**
4364
+ * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4365
+ */
4366
+ export type EventCid34 = string;
4367
+ /**
4368
+ * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4369
+ */
4370
+ export type PriorEventHash34 = string | null;
4371
+ /**
4372
+ * Causal Ancestry markers required to resolve decentralized event ordering.
4373
+ */
4374
+ export type Timestamp34 = number;
4375
+ export type TopologyClass118 = "epistemic_rejection";
4376
+ export type ReceiptCid1 = string;
4377
+ export type FailedProjectionCid = string;
4378
+ export type ViolatedAlgebraicConstraint = string;
4379
+ export type KlDivergenceToValidity = number;
4380
+ export type StochasticMutationGradient = string;
4368
4381
  /**
4369
4382
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4370
4383
  */
@@ -4462,25 +4475,21 @@ export type ExecutionTimeMs = number;
4462
4475
  */
4463
4476
  export type TopologyClass124 = "oracle_execution_receipt";
4464
4477
  /**
4465
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4466
- */
4467
- export type EventCid40 = string;
4468
- /**
4469
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4478
+ * The SHA-256 hash of the complete execution payload, providing undeniable cryptographic provenance for the Merkle-DAG audit trail.
4470
4479
  */
4471
- export type PriorEventHash40 = string | null;
4480
+ export type ExecutionHash = string;
4472
4481
  /**
4473
- * Causal Ancestry markers required to resolve decentralized event ordering.
4482
+ * The fully qualified URN of the solver agent that performed the execution.
4474
4483
  */
4475
- export type Timestamp40 = number;
4484
+ export type SolverUrn = string;
4476
4485
  /**
4477
- * The fully qualified URN of the sovereign oracle that was executed.
4486
+ * The total number of tokens consumed during this execution, settled by the Thermodynamic Quota Manager.
4478
4487
  */
4479
- export type ExecutedUrn = string;
4488
+ export type TokensBurned = number;
4480
4489
  /**
4481
- * An immutable local deployment pointer identifying the specific VPC action space.
4490
+ * An optional cryptographic signature from a Human-in-the-Loop (HITL) operator attesting to the correctness of the execution result. Populated only when the Temporal workflow escalates to manual review.
4482
4491
  */
4483
- export type ActionSpaceCid1 = string;
4492
+ export type HumanAttestationSignature = string | null;
4484
4493
  /**
4485
4494
  * A discriminated union of workflow topologies.
4486
4495
  */
@@ -4576,6 +4585,10 @@ export type ClearingTimeout = number;
4576
4585
  * The smallest allowable discrete bid increment.
4577
4586
  */
4578
4587
  export type MinimumTickSize = number;
4588
+ /**
4589
+ * A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
4590
+ */
4591
+ export type BundleContentHashState = string;
4579
4592
  /**
4580
4593
  * The exact genesis globally unique decentralized identifier (DID) anchoring the document, ensuring continuity.
4581
4594
  */
@@ -4595,7 +4608,7 @@ export type CapabilityPointerState = string;
4595
4608
  /**
4596
4609
  * The unique identifier for this curated environment of tools.
4597
4610
  */
4598
- export type ActionSpaceCid2 = string;
4611
+ export type ActionSpaceCid1 = string;
4599
4612
  /**
4600
4613
  * Defines the initial state (S_0) of the MDP.
4601
4614
  */
@@ -4661,24 +4674,6 @@ export type AgentNodeCount = number;
4661
4674
  */
4662
4675
  export type ConsensusMechanism = "majority" | "prediction_market" | "pbft";
4663
4676
  export type CognitiveTierProfile = "working" | "episodic" | "semantic";
4664
- export type ThermodynamicsCid = string;
4665
- export type TargetTopologyCid1 = string;
4666
- export type MaxStochasticDiffusions = number;
4667
- export type ComputationalFreeEnergyBudget = number;
4668
- export type CurrentDiffusions = number;
4669
- export type RemainingFreeEnergy = number;
4670
- export type EntropyDerivativeDelta = number | null;
4671
- export type StagnationToleranceEpsilon = number;
4672
- /**
4673
- * AGENT INSTRUCTION: A rigid string enumeration mapping the kinetic liveness of the computational budget.
4674
- *
4675
- * CAUSAL AFFORDANCE: Instructs the orchestrator on whether the thermodynamic search envelope is active or mathematically depleted.
4676
- *
4677
- * EPISTEMIC BOUNDS: Strictly bounded to the explicit kinetic states ACTIVE_DIFFUSION and ENTROPIC_EXHAUSTION_ORACLE_INTERVENTION.
4678
- *
4679
- * MCP ROUTING TRIGGERS: Thermodynamic State, Budget Envelope, MCTS Liveness, Entropy Tracking
4680
- */
4681
- export type ThermodynamicState = "ACTIVE_DIFFUSION" | "ENTROPIC_EXHAUSTION_ORACLE_INTERVENTION";
4682
4677
  /**
4683
4678
  * The identifier of the underlying model.
4684
4679
  */
@@ -4743,64 +4738,6 @@ export type MaxUncommittedEdges = number;
4743
4738
  * Temporal bound for flushing the stream.
4744
4739
  */
4745
4740
  export type MicroBatchIntervalMs = number;
4746
- /**
4747
- * Unique identifier for this B2B negotiation.
4748
- */
4749
- export type HandshakeCid = string;
4750
- /**
4751
- * The enterprise DID requesting the connection.
4752
- */
4753
- export type InitiatingTenantCid = string;
4754
- /**
4755
- * The enterprise DID receiving the connection.
4756
- */
4757
- export type ReceivingTenantCid = string;
4758
- /**
4759
- * The strict enterprise identifier of the foreign B2B tenant receiving this payload.
4760
- */
4761
- export type ReceivingTenantCid1 = string;
4762
- /**
4763
- * AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
4764
- *
4765
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
4766
- *
4767
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
4768
- *
4769
- * MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
4770
- */
4771
- export type SemanticClassificationProfile2 = "public" | "internal" | "confidential" | "restricted";
4772
- /**
4773
- * The strict magnitude cap on cross-tenant economic liability.
4774
- */
4775
- export type LiabilityLimitMagnitude = number;
4776
- /**
4777
- * Explicit whitelist of geographic regions or cloud enclaves where execution is structurally permitted (Payload Residency Pinning).
4778
- */
4779
- export type PermittedGeographicRegions = string[];
4780
- /**
4781
- * If True, incoming payloads from foreign tenants MUST be accompanied by a ZeroKnowledgeReceipt containing a valid temporal_interval_proof.
4782
- */
4783
- export type RequireTemporalProvenanceProofs = boolean;
4784
- /**
4785
- * Absolute structural ESG mandate. The execution graph will quarantine any federated node operating on a grid exceeding this gCO2eq/kWh threshold.
4786
- */
4787
- export type MaxPermittedGridCarbonIntensity = number | null;
4788
- /**
4789
- * The NIST FIPS post-quantum cryptographic algorithm used.
4790
- */
4791
- export type PqAlgorithm = "ml-dsa" | "slh-dsa" | "falcon";
4792
- /**
4793
- * The identifier of the post-quantum public evaluation key.
4794
- */
4795
- export type PublicKeyCid1 = string;
4796
- /**
4797
- * The base64-encoded post-quantum signature. Bounded to 100KB to safely accommodate massive SPHINCS+ hash trees without OOM crashes.
4798
- */
4799
- export type PqSignatureBlob = string;
4800
- /**
4801
- * The current status of the handshake.
4802
- */
4803
- export type Status1 = "proposed" | "negotiating" | "aligned" | "rejected";
4804
4741
  export type CrossoverMechanismProfile = "uniform_blend" | "single_point" | "heuristic";
4805
4742
  export type ProvenanceTraceCid1 = string | null;
4806
4743
  /**
@@ -4857,6 +4794,10 @@ export type ExpirationTimestamp = number;
4857
4794
  * A base64 string proving the cryptographic delegation.
4858
4795
  */
4859
4796
  export type CryptographicSignature = string;
4797
+ /**
4798
+ * The unconstrained Chain-of-Thought reasoning trace generated by the Frontier model with the Sovereign LLM Proxy's XGrammar AOT FSM bitmask DISABLED. This field captures the full computational runway — scratchpad blocks, intermediate calculations, and heuristic explorations — that the model requires to maximize logical accuracy without suffering the Format Restriction Penalty.
4799
+ */
4800
+ export type DeliberationTrace = string;
4860
4801
  export type ConstraintCid = string;
4861
4802
  /**
4862
4803
  * The formal SMT-LIB or Lean4 language representation of the symbolic rule.
@@ -4866,22 +4807,6 @@ export type FormalSyntaxSmt = string;
4866
4807
  * The continuous penalty applied to the LLM probability mass for constraint violation.
4867
4808
  */
4868
4809
  export type RelaxationEpsilon = number;
4869
- /**
4870
- * The native embedding model of the origin agent.
4871
- */
4872
- export type SourceMatrixName = string;
4873
- /**
4874
- * The native embedding model of the destination agent.
4875
- */
4876
- export type TargetMatrixName = string;
4877
- /**
4878
- * The SHA-256 hash of the exact mathematical matrix used to compress or translate the latent dimensions.
4879
- */
4880
- export type ProjectionMatrixHash = string;
4881
- /**
4882
- * Mathematical proof (e.g., Earth Mover's Distance preservation) of how accurately relative semantic distances were maintained during projection.
4883
- */
4884
- export type IsometryPreservationScore1 = number;
4885
4810
  /**
4886
4811
  * The expected value (mu) of the distribution.
4887
4812
  */
@@ -5142,14 +5067,6 @@ export type TriggerDescription = string;
5142
5067
  * The lightweight progressive disclosure tier for procedural skills.
5143
5068
  */
5144
5069
  export type AvailableProceduralManifolds = ProceduralMetadataManifest[];
5145
- /**
5146
- * Cryptographic Lineage Watermark for the attestation.
5147
- */
5148
- export type AttestationCid = string;
5149
- /**
5150
- * Immutable cryptographic receipts of dynamically discovered external enterprise connectors.
5151
- */
5152
- export type CapabilityAttestations = FederatedCapabilityAttestationReceipt[];
5153
5070
  /**
5154
5071
  * A Content Identifier (CID) for the Standard Operating Procedure.
5155
5072
  */
@@ -5200,123 +5117,7 @@ export type MutableMatrix = {
5200
5117
  * A flag allowing the output to only return the keys in mutable_matrix that changed, rather than forcing the entire array back up the network.
5201
5118
  */
5202
5119
  export type IsDelta = boolean;
5203
- /**
5204
- * The unique ID for this specific execution.
5205
- */
5206
- export type RequestCid1 = string;
5207
- /**
5208
- * The deterministic capability pointer anchoring the parent request manifold.
5209
- */
5210
- export type ParentRequestCid = string | null;
5211
- /**
5212
- * The deterministic capability pointer anchoring the trace root manifold.
5213
- */
5214
- export type RootRequestCid = string | null;
5215
- /**
5216
- * The strict array of cryptographic hashes of parent execution nodes.
5217
- */
5218
- export type ParentHashes = string[];
5219
- /**
5220
- * The cryptographic SHA-256 hash of this node.
5221
- */
5222
- export type NodeHash = string | null;
5223
- /**
5224
- * The global identifier for the entire execution causal tree.
5225
- */
5226
- export type TraceCid3 = string;
5227
- /**
5228
- * The unique identifier for this specific operation.
5229
- */
5230
- export type SpanCid1 = string;
5231
- /**
5232
- * The causal edge to the invoking node.
5233
- */
5234
- export type ParentSpanCid1 = string | null;
5235
- /**
5236
- * The semantic identifier for the operation.
5237
- */
5238
- export type Name1 = string;
5239
- /**
5240
- * Temporal start bound.
5241
- */
5242
- export type StartTimeUnixNano = number;
5243
- /**
5244
- * Temporal end bound, if completed.
5245
- */
5246
- export type EndTimeUnixNano = number | null;
5247
- /**
5248
- * The semantic name of the event.
5249
- */
5250
- export type Name2 = string;
5251
- /**
5252
- * The precise temporal execution point.
5253
- */
5254
- export type TimestampUnixNano = number;
5255
- /**
5256
- * Structured log records emitted during the span.
5257
- *
5258
- * @maxItems 10000
5259
- */
5260
- export type Events = SpanEvent[];
5261
- export type FaultCategoryProfile = "context_overload" | "incorrect_context" | "format_corruption" | "latency_spike" | "token_throttle" | "network_degradation" | "temporal_dilation" | "dependency_blackout";
5262
- /**
5263
- * Discriminator for fetching assets via CID.
5264
- */
5265
- export type TopologyClass127 = "cid_fetch";
5266
- /**
5267
- * Network timeout in milliseconds.
5268
- */
5269
- export type TimeoutMs1 = number;
5270
- /**
5271
- * The explicit array of strictly bounded MCP URI broadcast endpoints.
5272
- *
5273
- * @maxItems 1000
5274
- */
5275
- export type BroadcastEndpoints = string[];
5276
- /**
5277
- * The explicit array of cryptographic hashes defining acceptable domain ontologies.
5278
- *
5279
- * @maxItems 1000
5280
- */
5281
- export type SupportedOntologies = string[];
5282
- /**
5283
- * The tamper-evident SHA-256 hash of the exact safetensors weight matrix.
5284
- */
5285
- export type AdapterMerkleRoot = string;
5286
- /**
5287
- * The exact spatial geometry required in VRAM to mount this adapter.
5288
- */
5289
- export type VramFootprintBytes = number;
5290
- /**
5291
- * The absolute Time-To-Live for the adapter to exist in the kinetic execution plane before forced eviction.
5292
- */
5293
- export type EphemeralTtlMs = number;
5294
- /**
5295
- * The relative importance scalar used by the orchestrator's LRU eviction algorithm when VRAM limits are saturated.
5296
- */
5297
- export type CachePriorityWeight = number;
5298
- /**
5299
- * The endpoint to connect to.
5300
- */
5301
- export type TargetEndpointUri = string;
5302
- /**
5303
- * AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
5304
- *
5305
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
5306
- *
5307
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
5308
- *
5309
- * MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
5310
- */
5311
- export type SemanticClassificationProfile3 = "public" | "internal" | "confidential" | "restricted";
5312
- /**
5313
- * Max token/compute allocation.
5314
- */
5315
- export type MaxLiabilityBudget = number;
5316
- /**
5317
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the federated topology, if applicable.
5318
- */
5319
- export type TopologyCid1 = string | null;
5120
+ export type FaultCategoryProfile = "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
5320
5121
  /**
5321
5122
  * The mathematical dialect and theorem prover used to compile the proof.
5322
5123
  */
@@ -5538,7 +5339,7 @@ export type Shape = number[];
5538
5339
  /**
5539
5340
  * Exact byte size of the uncompressed tensor.
5540
5341
  */
5541
- export type VramFootprintBytes1 = number;
5342
+ export type VramFootprintBytes = number;
5542
5343
  /**
5543
5344
  * SHA-256 Merkle root of the payload chunks.
5544
5345
  */
@@ -5547,27 +5348,20 @@ export type MerkleRoot = string;
5547
5348
  * Strict URI pointer to the physical bytes.
5548
5349
  */
5549
5350
  export type StorageUri = string;
5351
+ export type OptimizationDirectionProfile = "maximize" | "minimize";
5352
+ export type PatchOperationProfile = "add" | "remove" | "replace" | "copy" | "move" | "test";
5550
5353
  /**
5551
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this protocol handshake to the Merkle-DAG.
5552
- */
5553
- export type HandshakeCid1 = string;
5554
- /**
5555
- * The agents establishing semantic alignment.
5556
- *
5557
- * @minItems 2
5558
- * @maxItems 250
5354
+ * The NIST FIPS post-quantum cryptographic algorithm used.
5559
5355
  */
5560
- export type ParticipantNodeCids1 = [string, string, ...string[]];
5356
+ export type PqAlgorithm = "ml-dsa" | "slh-dsa" | "falcon";
5561
5357
  /**
5562
- * The calculated geometric alignment of the agents' core definitions.
5358
+ * The identifier of the post-quantum public evaluation key.
5563
5359
  */
5564
- export type MeasuredCosineSimilarity1 = number;
5360
+ export type PublicKeyCid1 = string;
5565
5361
  /**
5566
- * The final verdict of the handshake protocol.
5362
+ * The base64-encoded post-quantum signature. Bounded to 100KB to safely accommodate massive SPHINCS+ hash trees without OOM crashes.
5567
5363
  */
5568
- export type AlignmentStatus = "aligned" | "projected" | "fallback_triggered" | "incommensurable";
5569
- export type OptimizationDirectionProfile = "maximize" | "minimize";
5570
- export type PatchOperationProfile = "add" | "remove" | "replace" | "copy" | "move" | "test";
5364
+ export type PqSignatureBlob = string;
5571
5365
  /**
5572
5366
  * The absolute Z-axis physical distance to lock the Presentation UI relative to the observer's optical center, resolving vergence-accommodation conflicts.
5573
5367
  */
@@ -5617,8 +5411,6 @@ export type CausalRelationship = "causes" | "confounds" | "correlates_with" | "u
5617
5411
  * An Immutable structural checkpoint.
5618
5412
  */
5619
5413
  export type SemanticVersionState = string;
5620
- export type SpanKindProfile = "client" | "server" | "producer" | "consumer" | "internal";
5621
- export type SpanStatusCodeProfile = "unset" | "ok" | "error";
5622
5414
  /**
5623
5415
  * The unique cryptographic identifier for this local spatial volume.
5624
5416
  */
@@ -5694,18 +5486,6 @@ export type TieBreakerPolicy = "lowest_cost" | "lowest_latency" | "highest_confi
5694
5486
  * A strictly typed SHA-256 hash pointing to a historically executed topological state.
5695
5487
  */
5696
5488
  export type TopologyHashReceipt = string;
5697
- /**
5698
- * Unique identifier for this telemetry snapshot.
5699
- */
5700
- export type BatchCid = string;
5701
- /**
5702
- * A collection of execution spans to be serialized.
5703
- */
5704
- export type Spans = ExecutionSpanReceipt[];
5705
- /**
5706
- * The array of strictly typed trace executions.
5707
- */
5708
- export type ExecutionNodes = ExecutionNodeReceipt[];
5709
5489
  /**
5710
5490
  * AGENT INSTRUCTION: Dictates the exact algorithmic or logical mechanism utilized to forge a semantic connection or transmute a bimodal data state, allowing downstream agents to weigh epistemic reliability.
5711
5491
  */
@@ -5742,10 +5522,6 @@ export type TenantCid = string | null;
5742
5522
  * The ephemeral session boundary for this execution.
5743
5523
  */
5744
5524
  export type SessionCid1 = string | null;
5745
- /**
5746
- * The declarative whitelist of data classifications permitted to flow through this graph.
5747
- */
5748
- export type AllowedSemanticClassifications = SemanticClassificationProfile[] | null;
5749
5525
  /**
5750
5526
  * CoReason Shared Kernel Ontology
5751
5527
  *
@@ -5755,7 +5531,6 @@ export interface CoReasonSharedKernelOntology {
5755
5531
  ASTGradientReceipt?: ASTGradientReceipt;
5756
5532
  ActivationSteeringContract?: ActivationSteeringContract;
5757
5533
  ActiveInferenceContract?: ActiveInferenceContract;
5758
- ActiveInferenceEpochState?: ActiveInferenceEpochState;
5759
5534
  AdjudicationIntent?: AdjudicationIntent;
5760
5535
  AdjudicationReceipt?: AdjudicationReceipt;
5761
5536
  AdjudicationRubricProfile?: AdjudicationRubricProfile;
@@ -5823,7 +5598,6 @@ export interface CoReasonSharedKernelOntology {
5823
5598
  CognitiveUncertaintyProfile?: CognitiveUncertaintyProfile1;
5824
5599
  CollectiveIntelligenceProfile?: CollectiveIntelligenceProfile1;
5825
5600
  CompositeNodeProfile?: CompositeNodeProfile;
5826
- ComputationalThermodynamicsProfile?: ComputationalThermodynamicsProfile;
5827
5601
  ComputeEngineProfile?: ComputeEngineProfile;
5828
5602
  ComputeProvisioningIntent?: ComputeProvisioningIntent;
5829
5603
  ComputeRateContract?: ComputeRateContract1;
@@ -5841,7 +5615,6 @@ export interface CoReasonSharedKernelOntology {
5841
5615
  ContinuousSpatialMutationIntent?: ContinuousSpatialMutationIntent;
5842
5616
  CouncilTopologyManifest?: CouncilTopologyManifest;
5843
5617
  CounterfactualRegretEvent?: CounterfactualRegretEvent;
5844
- CrossSwarmHandshakeState?: CrossSwarmHandshakeState;
5845
5618
  CrossoverMechanismProfile?: CrossoverMechanismProfile;
5846
5619
  CrossoverPolicy?: CrossoverPolicy1;
5847
5620
  CrosswalkResolutionReceipt?: CrosswalkResolutionReceipt;
@@ -5853,11 +5626,11 @@ export interface CoReasonSharedKernelOntology {
5853
5626
  DefeasibleAttackEvent?: DefeasibleAttackEvent;
5854
5627
  DefeasibleCascadeEvent?: DefeasibleCascadeEvent;
5855
5628
  DelegatedCapabilityManifest?: DelegatedCapabilityManifest;
5629
+ DeliberativeEnvelope?: DeliberativeEnvelope;
5856
5630
  DempsterShaferBeliefVector?: DempsterShaferBeliefVector;
5857
5631
  DerivationModeProfile?: DerivationModeProfile;
5858
5632
  DifferentiableLogicPolicy?: DifferentiableLogicPolicy;
5859
5633
  DigitalTwinTopologyManifest?: DigitalTwinTopologyManifest;
5860
- DimensionalProjectionContract?: DimensionalProjectionContract;
5861
5634
  DiscourseNodeState?: DiscourseNodeState;
5862
5635
  DiscourseTreeManifest?: DiscourseTreeManifest;
5863
5636
  DistributionProfile?: DistributionProfile;
@@ -5924,9 +5697,7 @@ export interface CoReasonSharedKernelOntology {
5924
5697
  EvidentiaryWarrantState?: EvidentiaryWarrantState;
5925
5698
  EvolutionaryTopologyManifest?: EvolutionaryTopologyManifest;
5926
5699
  ExecutionEnvelopeState?: ExecutionEnvelopeState;
5927
- ExecutionNodeReceipt?: ExecutionNodeReceipt;
5928
5700
  ExecutionSLA?: ExecutionSLA;
5929
- ExecutionSpanReceipt?: ExecutionSpanReceipt;
5930
5701
  ExecutionSubstrateProfile?: ExecutionSubstrateProfile1;
5931
5702
  ExogenousEpistemicEvent?: ExogenousEpistemicEvent;
5932
5703
  FYIIntent?: FYIIntent;
@@ -5936,14 +5707,6 @@ export interface CoReasonSharedKernelOntology {
5936
5707
  FalsificationContract?: FalsificationContract;
5937
5708
  FaultCategoryProfile?: FaultCategoryProfile;
5938
5709
  FaultInjectionProfile?: FaultInjectionProfile;
5939
- FederatedBilateralSLA?: FederatedBilateralSLA2;
5940
- FederatedCIDFetchIntent?: FederatedCIDFetchIntent;
5941
- FederatedCapabilityAttestationReceipt?: FederatedCapabilityAttestationReceipt;
5942
- FederatedDiscoveryIntent?: FederatedDiscoveryIntent;
5943
- FederatedDiscoveryManifest?: FederatedDiscoveryManifest;
5944
- FederatedPeftContract?: FederatedPeftContract;
5945
- FederatedSecurityMacroManifest?: FederatedSecurityMacroManifest;
5946
- FederatedStateSnapshot?: FederatedStateSnapshot;
5947
5710
  FitnessObjectiveProfile?: FitnessObjectiveProfile;
5948
5711
  FormalLogicPremise?: FormalLogicPremise;
5949
5712
  FormalVerificationContract?: FormalVerificationContract;
@@ -6022,7 +5785,6 @@ export interface CoReasonSharedKernelOntology {
6022
5785
  ObservationEvent?: ObservationEvent;
6023
5786
  OntologicalAlignmentPolicy?: OntologicalAlignmentPolicy;
6024
5787
  OntologicalCrosswalkIntent?: OntologicalCrosswalkIntent;
6025
- OntologicalHandshakeReceipt?: OntologicalHandshakeReceipt;
6026
5788
  OntologicalNormalizationIntent?: OntologicalNormalizationIntent;
6027
5789
  OntologicalReificationReceipt?: OntologicalReificationReceipt;
6028
5790
  OntologicalSurfaceProjectionManifest?: OntologicalSurfaceProjectionManifest;
@@ -6086,11 +5848,8 @@ export interface CoReasonSharedKernelOntology {
6086
5848
  SideEffectProfile?: SideEffectProfile1;
6087
5849
  SimulationConvergenceSLA?: SimulationConvergenceSLA1;
6088
5850
  SimulationEscrowContract?: SimulationEscrowContract1;
6089
- SpanEvent?: SpanEvent;
6090
- SpanKindProfile?: SpanKindProfile;
6091
- SpanStatusCodeProfile?: SpanStatusCodeProfile;
6092
5851
  SpatialBillboardContract?: SpatialBillboardContract;
6093
- SpatialHardwareProfile?: SpatialHardwareProfile1;
5852
+ SpatialHardwareProfile?: SpatialHardwareProfile;
6094
5853
  SpatialKinematicActionIntent?: SpatialKinematicActionIntent;
6095
5854
  SpatialReferenceFrameManifest?: SpatialReferenceFrameManifest;
6096
5855
  SpatialRenderMaterial?: SpatialRenderMaterial;
@@ -6105,6 +5864,7 @@ export interface CoReasonSharedKernelOntology {
6105
5864
  SteadyStateHypothesisState?: SteadyStateHypothesisState1;
6106
5865
  StochasticNodeState?: StochasticNodeState;
6107
5866
  StochasticTopologyManifest?: StochasticTopologyManifest;
5867
+ StrategicThoughtNodeIntent?: StrategicThoughtNodeIntent;
6108
5868
  StreamingDisfluencyContract?: StreamingDisfluencyContract;
6109
5869
  StructuralCausalGraphProfile?: StructuralCausalGraphProfile;
6110
5870
  SubstrateHydrationManifest?: SubstrateHydrationManifest;
@@ -6136,7 +5896,6 @@ export interface CoReasonSharedKernelOntology {
6136
5896
  TerminalCognitiveEvent?: TerminalCognitiveEvent;
6137
5897
  TerminalConditionContract?: TerminalConditionContract1;
6138
5898
  TheoryOfMindSnapshot?: TheoryOfMindSnapshot;
6139
- ThermodynamicState?: ThermodynamicState;
6140
5899
  ThoughtBranchState?: ThoughtBranchState;
6141
5900
  TieBreakerPolicy?: TieBreakerPolicy;
6142
5901
  TokenBurnReceipt?: TokenBurnReceipt;
@@ -6147,7 +5906,6 @@ export interface CoReasonSharedKernelOntology {
6147
5906
  TopologicalRewardContract?: TopologicalRewardContract;
6148
5907
  TopologyHashReceipt?: TopologyHashReceipt;
6149
5908
  TraceContextState?: TraceContextState1;
6150
- TraceExportManifest?: TraceExportManifest;
6151
5909
  TransformationMechanismProfile?: TransformationMechanismProfile1;
6152
5910
  TransitionEdgeProfile?: TransitionEdgeProfile;
6153
5911
  TruthMaintenancePolicy?: TruthMaintenancePolicy;
@@ -6219,17 +5977,17 @@ export interface VectorEmbeddingState {
6219
5977
  /**
6220
5978
  * CoReason Shared Kernel Ontology
6221
5979
  *
6222
- * AGENT INSTRUCTION: Establishes a hardware-level Representation Engineering (RepE) directive to mechanically manipulate latent dimensions via forward-pass tensor injection.
5980
+ * AGENT INSTRUCTION: Establishes a hardware-level Representation Engineering (RepE) directive to mechanically manipulate latent dimensions via forward-pass tensor injection. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
6223
5981
  *
6224
- * CAUSAL AFFORDANCE: Physically forces an additive, ablation, or clamping operation onto the model's residual stream at specific `injection_layers`, steering the generator away from unstable hallucination geometries prior to token projection.
5982
+ * CAUSAL AFFORDANCE: Physically forces an additive, ablation, or clamping operation onto the model's residual stream at specific `target_hook_points`, steering the generator away from unstable hallucination geometries prior to token projection.
6225
5983
  *
6226
- * EPISTEMIC BOUNDS: Cryptographically locked by `steering_vector_hash` (SHA-256 pattern `^[a-f0-9]{64}$`). `scaling_factor` is bounded above (`le=100.0`) but unbounded below, permitting negative magnitudes for ablation. The `@model_validator` deterministically sorts `injection_layers` (each `ge=0`).
5984
+ * EPISTEMIC BOUNDS: Cryptographically locked by `steering_vector_hash` (SHA-256 pattern `^[a-f0-9]{64}$`). `scaling_factor` is bounded above (`le=100.0`) but unbounded below, permitting negative magnitudes for ablation. The `@model_validator` deterministically sorts `target_hook_points`.
6227
5985
  *
6228
- * MCP ROUTING TRIGGERS: Representation Engineering, RepE, Activation Steering, Residual Stream Ablation, Concept Vectors
5986
+ * MCP ROUTING TRIGGERS: Representation Engineering, RepE, Activation Steering, Residual Stream Ablation, Concept Vectors, TransformerLens, SAELens
6229
5987
  */
6230
5988
  export interface ActivationSteeringContract {
6231
5989
  steering_vector_hash: SteeringVectorHash;
6232
- injection_layers: InjectionLayers;
5990
+ target_hook_points: TargetHookPoints;
6233
5991
  scaling_factor: ScalingFactor;
6234
5992
  vector_modality: VectorModality;
6235
5993
  }
@@ -6252,46 +6010,6 @@ export interface ActiveInferenceContract {
6252
6010
  expected_information_gain: ExpectedInformationGain;
6253
6011
  execution_cost_budget_magnitude: ExecutionCostBudgetMagnitude;
6254
6012
  }
6255
- /**
6256
- * CoReason Shared Kernel Ontology
6257
- *
6258
- * AGENT INSTRUCTION: A macroscopic container tracking the directed graph of evolutionary retries across an entire task lifecycle.
6259
- *
6260
- * CAUSAL AFFORDANCE: Aggregates free energy across multiple EpistemicRejectionReceipts to trigger thermodynamic circuit breakers when convergence fails.
6261
- *
6262
- * EPISTEMIC BOUNDS: Aggregated free energy must be non-negative. Rejection history is deterministically sorted by receipt_cid for immutable hashing.
6263
- *
6264
- * MCP ROUTING TRIGGERS: Active Inference Loop, Thermodynamic Circuit Breaker, Epistemic Aggregation, Retry Ledger
6265
- */
6266
- export interface ActiveInferenceEpochState {
6267
- epoch_cid: EpochCid;
6268
- target_objective_cid?: TargetObjectiveCid;
6269
- rejection_history?: RejectionHistory;
6270
- current_free_energy: CurrentFreeEnergy;
6271
- epoch_status?: EpochStatus;
6272
- }
6273
- /**
6274
- * CoReason Shared Kernel Ontology
6275
- *
6276
- * AGENT INSTRUCTION: The mathematical backpropagation signal triggered when the Deterministic Compiler rejects a stochastic manifold. Quantifies the rejection and provides a mutation gradient.
6277
- *
6278
- * CAUSAL AFFORDANCE: Instructs the LLM ensemble on how to perturb the Upper Confidence Bound (UCB) during the next MCTS generation attempt by mathematically quantifying the error.
6279
- *
6280
- * EPISTEMIC BOUNDS: Kullback-Leibler divergence is strictly non-negative. A negative mathematical distance is a paradox and raises a ValueError.
6281
- *
6282
- * MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
6283
- */
6284
- export interface EpistemicRejectionReceipt {
6285
- event_cid: EventCid;
6286
- prior_event_hash?: PriorEventHash;
6287
- timestamp: Timestamp;
6288
- topology_class?: TopologyClass;
6289
- receipt_cid: ReceiptCid;
6290
- failed_projection_cid: FailedProjectionCid;
6291
- violated_algebraic_constraint: ViolatedAlgebraicConstraint;
6292
- kl_divergence_to_validity: KlDivergenceToValidity;
6293
- stochastic_mutation_gradient: StochasticMutationGradient;
6294
- }
6295
6013
  /**
6296
6014
  * CoReason Shared Kernel Ontology
6297
6015
  *
@@ -6304,7 +6022,7 @@ export interface EpistemicRejectionReceipt {
6304
6022
  * MCP ROUTING TRIGGERS: Social Choice Theory, Condorcet Paradox, MCDA Deadlock, Dictatorial Resolution, Tie-Breaking Heuristic
6305
6023
  */
6306
6024
  export interface AdjudicationIntent {
6307
- topology_class?: TopologyClass1;
6025
+ topology_class?: TopologyClass;
6308
6026
  deadlocked_claims: DeadlockedClaims;
6309
6027
  resolution_schema: ResolutionSchema;
6310
6028
  timeout_action: TimeoutAction;
@@ -6343,10 +6061,10 @@ export interface EpistemicProxyStateAny {
6343
6061
  * Epistemic Commitment, Audit Trail
6344
6062
  */
6345
6063
  export interface AdjudicationReceipt {
6346
- event_cid: EventCid1;
6347
- prior_event_hash?: PriorEventHash1;
6348
- timestamp: Timestamp1;
6349
- topology_class?: TopologyClass2;
6064
+ event_cid: EventCid;
6065
+ prior_event_hash?: PriorEventHash;
6066
+ timestamp: Timestamp;
6067
+ topology_class?: TopologyClass1;
6350
6068
  rubric_cid: RubricCid;
6351
6069
  /**
6352
6070
  * The deterministic capability pointer representing the node that was evaluated.
@@ -6517,7 +6235,7 @@ export interface EnvironmentalSpoofingProfile {
6517
6235
  * MCP ROUTING TRIGGERS: Zero-Sum Minimax Game, Red Team vs Blue Team, Macro Abstraction, Generative Adversarial Networks, Topological Compilation
6518
6236
  */
6519
6237
  export interface AdversarialMarketTopologyManifest {
6520
- topology_class?: TopologyClass3;
6238
+ topology_class?: TopologyClass2;
6521
6239
  blue_team_cids: BlueTeamCids;
6522
6240
  red_team_cids: RedTeamCids;
6523
6241
  /**
@@ -6607,7 +6325,7 @@ export interface AuthorizationClaims {
6607
6325
  * MCP ROUTING TRIGGERS: Expected Utility Theory, Multi-Objective Optimization, Epistemic Certainty, Spot Market Bid, Cost Estimation
6608
6326
  */
6609
6327
  export interface AgentBidIntent {
6610
- topology_class?: TopologyClass4;
6328
+ topology_class?: TopologyClass3;
6611
6329
  agent_cid: AgentCid;
6612
6330
  estimated_cost_magnitude: EstimatedCostMagnitude;
6613
6331
  estimated_latency_ms: EstimatedLatencyMs;
@@ -6650,7 +6368,7 @@ export interface AmbientState {
6650
6368
  * CoReason Shared Kernel Ontology
6651
6369
  */
6652
6370
  export interface AnalogicalMappingTask {
6653
- topology_class?: TopologyClass5;
6371
+ topology_class?: TopologyClass4;
6654
6372
  task_cid: TaskCid1;
6655
6373
  source_domain: SourceDomain;
6656
6374
  target_domain: TargetDomain;
@@ -6694,7 +6412,7 @@ export interface AnchoringPolicy {
6694
6412
  * MCP ROUTING TRIGGERS: Gibsonian Affordance, MDP Action Space, Pearlian Do-Operator, Capability-Based Security, Halting Problem
6695
6413
  */
6696
6414
  export interface SpatialToolManifest {
6697
- topology_class?: TopologyClass6;
6415
+ topology_class?: TopologyClass5;
6698
6416
  tool_name: ToolName;
6699
6417
  description: Description1;
6700
6418
  input_schema: InputSchema;
@@ -6800,7 +6518,7 @@ export interface ExecutionSLA {
6800
6518
  * MCP ROUTING TRIGGERS: Actor Model, Object Capability Model, Zero-Trust Architecture, Distributed RPC, Supply-Chain Isolation
6801
6519
  */
6802
6520
  export interface MCPServerManifest {
6803
- topology_class?: TopologyClass7;
6521
+ topology_class?: TopologyClass6;
6804
6522
  server_cid: ServerCid;
6805
6523
  transport: Transport;
6806
6524
  binary_hash?: BinaryHash;
@@ -6820,7 +6538,7 @@ export interface MCPServerManifest {
6820
6538
  * MCP ROUTING TRIGGERS: Inter-Process Communication, POSIX Standard Streams, Local Sandboxing, Binary Execution, Subprocess Spawn
6821
6539
  */
6822
6540
  export interface StdioTransportProfile {
6823
- topology_class?: TopologyClass8;
6541
+ topology_class?: TopologyClass7;
6824
6542
  command: Command;
6825
6543
  args?: Args;
6826
6544
  env_vars?: EnvVars;
@@ -6843,7 +6561,7 @@ export interface EnvVars {
6843
6561
  * MCP ROUTING TRIGGERS: Event-Driven Architecture, Server-Sent Events, Unidirectional Stream, Asynchronous Message Passing, TCP Persistence
6844
6562
  */
6845
6563
  export interface SSETransportProfile {
6846
- topology_class?: TopologyClass9;
6564
+ topology_class?: TopologyClass8;
6847
6565
  uri: Uri;
6848
6566
  headers?: Headers;
6849
6567
  }
@@ -6865,7 +6583,7 @@ export interface Headers {
6865
6583
  * MCP ROUTING TRIGGERS: Stateless Architecture, Zero-Trust Network Access, HTTP Request Smuggling Prevention, JSON-RPC Egress, Out-of-Band Socket
6866
6584
  */
6867
6585
  export interface HTTPTransportProfile {
6868
- topology_class?: TopologyClass10;
6586
+ topology_class?: TopologyClass9;
6869
6587
  uri: Uri1;
6870
6588
  headers?: Headers1;
6871
6589
  }
@@ -6929,7 +6647,7 @@ export interface OpticalMappingContract {
6929
6647
  * MCP ROUTING TRIGGERS: WebAssembly System Interface, Zero-Knowledge Virtual Machine, eBPF, Execution Sandbox, Arbitrary Code Execution Mitigation
6930
6648
  */
6931
6649
  export interface EphemeralNamespacePartitionState {
6932
- topology_class?: TopologyClass11;
6650
+ topology_class?: TopologyClass10;
6933
6651
  partition_cid: PartitionCid;
6934
6652
  execution_runtime: ExecutionRuntime;
6935
6653
  authorized_bytecode_hashes: AuthorizedBytecodeHashes;
@@ -6950,7 +6668,7 @@ export interface EphemeralNamespacePartitionState {
6950
6668
  * MCP ROUTING TRIGGERS: Bipartite Proposer-Verifier, Test-Time Compute, Zero-Trust Execution, Active Inference, Contract Topology
6951
6669
  */
6952
6670
  export interface EpistemicZeroTrustContract {
6953
- topology_class?: TopologyClass12;
6671
+ topology_class?: TopologyClass11;
6954
6672
  intent_cid: IntentCid;
6955
6673
  semantic_planning_task: SemanticPlanningTask;
6956
6674
  schema_blueprint_name: SchemaBlueprintName;
@@ -6998,7 +6716,7 @@ export interface ThoughtBranchState {
6998
6716
  parent_branch_cid?: ParentBranchCid;
6999
6717
  latent_content_hash: LatentContentHash;
7000
6718
  prm_score?: PrmScore;
7001
- topology_class?: TopologyClass13;
6719
+ topology_class?: TopologyClass12;
7002
6720
  }
7003
6721
  /**
7004
6722
  * CoReason Shared Kernel Ontology
@@ -7013,7 +6731,7 @@ export interface ThoughtBranchState {
7013
6731
  */
7014
6732
  export interface StochasticTopologyManifest {
7015
6733
  topology_cid: TopologyCid;
7016
- topology_class?: TopologyClass14;
6734
+ topology_class?: TopologyClass13;
7017
6735
  phase: IdeationPhaseProfile;
7018
6736
  stochastic_graph: StochasticGraph;
7019
6737
  superposition?: HypothesisSuperpositionState | null;
@@ -7057,6 +6775,24 @@ export interface HypothesisSuperpositionState {
7057
6775
  export interface CompetingManifolds {
7058
6776
  [k: string]: number;
7059
6777
  }
6778
+ /**
6779
+ * CoReason Shared Kernel Ontology
6780
+ *
6781
+ * AGENT INSTRUCTION: Instantiates a single discrete node within a Monte Carlo Tree Search (MCTS) topology for long-horizon strategic planning. Emitted by the Claw Code agent during deliberation within the unconstrained `<deliberation>` envelope. The `urn:coreason:oracle:strategic_mcts` MCP evaluates these nodes via the UCT formula and returns expansion or pruning directives.
6782
+ *
6783
+ * CAUSAL AFFORDANCE: Connects discrete logic Premises into a fully verifiable proof tree managed by the Strategic MCTS Oracle. The `parent_node_hash` establishes the Merkle-DAG lineage to the parent thought, enabling deterministic traversal and rollback of rejected reasoning paths. The `heuristic_confidence` feeds directly into the UCT exploration-exploitation calculation.
6784
+ *
6785
+ * EPISTEMIC BOUNDS: The `parent_node_hash` is strictly bounded to exactly 64 hexadecimal characters (SHA-256), establishing a cryptographic chain of custody. The `heuristic_confidence` is bounded to `[0.0, 1.0]` representing a self-evaluated probability of success. The `proposed_action` and `rationale` are bounded to 10,000 characters each to prevent context window exhaustion.
6786
+ *
6787
+ * MCP ROUTING TRIGGERS: Monte Carlo Tree Search, UCT Formula, Strategic Planning, Claw Code Deliberation, Test-Time Compute, Thought Node, Tree of Thoughts
6788
+ */
6789
+ export interface StrategicThoughtNodeIntent {
6790
+ topology_class?: TopologyClass14;
6791
+ parent_node_hash: ParentNodeHash;
6792
+ proposed_action: ProposedAction;
6793
+ rationale: Rationale;
6794
+ heuristic_confidence: HeuristicConfidence;
6795
+ }
7060
6796
  /**
7061
6797
  * CoReason Shared Kernel Ontology
7062
6798
  *
@@ -7172,25 +6908,20 @@ export interface ResolutionSchema1 {
7172
6908
  /**
7173
6909
  * CoReason Shared Kernel Ontology
7174
6910
  *
7175
- * AGENT INSTRUCTION: Anchors in the Biba Integrity Model to orchestrate a Dictatorial Override mechanism within a Zero-Trust Architecture. Emitted when a rigid mathematical safety boundary is breached during inference.
6911
+ * AGENT INSTRUCTION: Emitted when the deterministic Forge encounters an epistemic deficit it cannot resolve via rigid AST manipulation or formal solvers, triggering an escalation to the heuristic Claw Swarm via the Sovereign LLM Proxy. Do not instantiate for security overrides; use `InterventionIntent` instead.
7176
6912
  *
7177
- * CAUSAL AFFORDANCE: Severs the active kinetic thread when a rule is tripped, violently halting generation to force the presentation of a `resolution_schema`. Demands explicit, structurally verified cryptographic sign-off from a higher-clearance entity to bypass the breaker.
6913
+ * CAUSAL AFFORDANCE: Unlocks the Forge-to-Claw handoff by packaging the precise epistemic deficit, the contextual Merkle-DAG fragments required for the Claw agent's context window, and the thermodynamic budget ceiling that the Sovereign LLM Proxy will enforce via its circuit breaker.
7178
6914
  *
7179
- * EPISTEMIC BOUNDS: The `resolution_schema` is mathematically bounded against recursive JSON-bombing by the `enforce_payload_topology` hook. The `tripped_rule_cid` is strictly anchored to a 128-char CID regex (`^[a-zA-Z0-9_.:-]+$`).
6915
+ * EPISTEMIC BOUNDS: The `target_solver_urn` is strictly anchored to the `urn:coreason:solver:` namespace prefix. The `context_window_cids` array is canonically sorted to guarantee RFC 8785 deterministic hashing. The `thermodynamic_budget` is bounded to `[1, 10_000_000]` tokens to prevent unbounded token burn.
7180
6916
  *
7181
- * MCP ROUTING TRIGGERS: Biba Integrity Model, Dictatorial Override, Privilege Escalation, Payload Loss Prevention, Cryptographic Sign-Off
6917
+ * MCP ROUTING TRIGGERS: Epistemic Deficit Escalation, Forge-to-Claw Handoff, Sovereign LLM Proxy, Thermodynamic Circuit Breaker, MCTS Delegation
7182
6918
  */
7183
6919
  export interface EscalationIntent {
7184
6920
  topology_class?: TopologyClass21;
7185
- tripped_rule_cid: TrippedRuleCid;
7186
- resolution_schema: ResolutionSchema2;
7187
- timeout_action: TimeoutAction3;
7188
- }
7189
- /**
7190
- * The strict JSON Schema requiring an explicit cryptographic sign-off or justification string to bypass the breaker. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
7191
- */
7192
- export interface ResolutionSchema2 {
7193
- [k: string]: JsonPrimitiveState;
6921
+ target_solver_urn: TargetSolverUrn;
6922
+ epistemic_deficit_description: EpistemicDeficitDescription;
6923
+ context_window_cids: ContextWindowCids;
6924
+ thermodynamic_budget: ThermodynamicBudget;
7194
6925
  }
7195
6926
  /**
7196
6927
  * CoReason Shared Kernel Ontology
@@ -7650,23 +7381,48 @@ export interface KinematicDerivativeProfile {
7650
7381
  /**
7651
7382
  * CoReason Shared Kernel Ontology
7652
7383
  *
7653
- * AGENT INSTRUCTION: Formulates a constrained Knapsack Problem for dynamically allocating liquid compute resources based on exact Quality of Service (QoS) priorities and semantic load shedding rules.
7384
+ * AGENT INSTRUCTION: A Kinetic execution trigger used to request the physical instantiation of new execution substrates. This intent is delegated to SkyPilot for multi-cloud spot-market orchestration.
7654
7385
  *
7655
- * CAUSAL AFFORDANCE: Emits a structural demand to the swarm orchestrator to negotiate, acquire, and cryptographically lock the requisite token escrow before allocating kinetic execution cycles to a sub-graph.
7386
+ * CAUSAL AFFORDANCE: Triggers the expansion loop in the Governance Plane, authorizing the PulumiActuator (backed by SkyPilot) to provision GPU/CPU nodes across AWS, GCP, Azure, or Vast.ai.
7656
7387
  *
7657
- * EPISTEMIC BOUNDS: Economic velocity is strictly clamped by `max_budget` (`le=18446744073709551615`), physically typed as an integer to prevent floating-point fractures during spot market bidding. The `required_capabilities` array is deterministically sorted by a `@model_validator`.
7388
+ * EPISTEMIC BOUNDS: Requires a strictly defined `HardwareProfile` and `EscrowPolicy` to prevent thermodynamic runaway. Cost estimates are validated against the `ComputeRateContract`.
7658
7389
  *
7659
- * MCP ROUTING TRIGGERS: Knapsack Optimization, Semantic Load Shedding, Spot Compute Bidding, QoS Classification, Resource Provisioning
7390
+ * MCP ROUTING TRIGGERS: SkyPilot Orchestration, Multi-Cloud Provisioning, Spot-Market Acquisition, Thermodynamic Expansion, Substrate Instantiation
7660
7391
  */
7661
7392
  export interface ComputeProvisioningIntent {
7662
7393
  topology_class?: TopologyClass31;
7394
+ provisioning_engine?: ProvisioningEngine;
7663
7395
  max_budget: MaxBudget;
7664
- required_capabilities: RequiredCapabilities;
7396
+ /**
7397
+ * The target physical hardware specification (e.g., A100:8).
7398
+ */
7399
+ hardware_profile?: SpatialHardwareProfile | null;
7400
+ use_spot?: UseSpot;
7401
+ autostop_idle_minutes?: AutostopIdleMinutes;
7402
+ required_capabilities?: RequiredCapabilities;
7665
7403
  /**
7666
7404
  * The Quality of Service priority, used by the compute spot market for semantic load shedding.
7667
7405
  */
7668
7406
  qos_class?: "critical" | "high" | "interactive" | "background_batch";
7669
7407
  }
7408
+ /**
7409
+ * CoReason Shared Kernel Ontology
7410
+ *
7411
+ * AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
7412
+ *
7413
+ * CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
7414
+ *
7415
+ * EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
7416
+ *
7417
+ * MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
7418
+ */
7419
+ export interface SpatialHardwareProfile {
7420
+ compute_tier?: ComputeTier;
7421
+ min_vram_gb?: MinVramGb;
7422
+ coreason_network_mode?: CoreasonNetworkMode;
7423
+ accelerator_type?: AcceleratorType;
7424
+ provider_whitelist?: ProviderWhitelist;
7425
+ }
7670
7426
  /**
7671
7427
  * CoReason Shared Kernel Ontology
7672
7428
  *
@@ -7729,7 +7485,7 @@ export interface InterventionIntent {
7729
7485
  */
7730
7486
  target_node_cid: string;
7731
7487
  context_summary: ContextSummary;
7732
- proposed_action: ProposedAction;
7488
+ proposed_action: ProposedAction1;
7733
7489
  adjudication_deadline: AdjudicationDeadline;
7734
7490
  /**
7735
7491
  * Packages the exact contextual state at the moment of computational failure.
@@ -7786,7 +7542,7 @@ export interface JsonSchemaWhitelist {
7786
7542
  */
7787
7543
  export interface FallbackSLA {
7788
7544
  timeout_seconds: TimeoutSeconds;
7789
- timeout_action: TimeoutAction4;
7545
+ timeout_action: TimeoutAction3;
7790
7546
  /**
7791
7547
  * The specific NodeCIDState to route the execution to if the escalate action is triggered.
7792
7548
  */
@@ -7795,7 +7551,7 @@ export interface FallbackSLA {
7795
7551
  /**
7796
7552
  * The action proposed by the agent that requires approval.
7797
7553
  */
7798
- export interface ProposedAction {
7554
+ export interface ProposedAction1 {
7799
7555
  [k: string]: JsonPrimitiveState;
7800
7556
  }
7801
7557
  /**
@@ -8349,7 +8105,7 @@ export interface FaultInjectionProfile {
8349
8105
  /**
8350
8106
  * The specific type of fault to inject.
8351
8107
  */
8352
- fault_category: "context_overload" | "incorrect_context" | "format_corruption" | "latency_spike" | "token_throttle" | "network_degradation" | "temporal_dilation" | "dependency_blackout";
8108
+ fault_category: "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
8353
8109
  target_node_cid?: TargetNodeCid1;
8354
8110
  intensity: Intensity;
8355
8111
  }
@@ -8374,9 +8130,9 @@ export interface FaultInjectionProfile {
8374
8130
  * Energy, Exogenous Perturbation, Epistemic Stress Test
8375
8131
  */
8376
8132
  export interface ExogenousEpistemicEvent {
8377
- event_cid: EventCid2;
8378
- prior_event_hash?: PriorEventHash2;
8379
- timestamp: Timestamp2;
8133
+ event_cid: EventCid1;
8134
+ prior_event_hash?: PriorEventHash1;
8135
+ timestamp: Timestamp1;
8380
8136
  topology_class?: TopologyClass50;
8381
8137
  shock_cid: ShockCid;
8382
8138
  target_node_hash: TargetNodeHash;
@@ -8681,27 +8437,6 @@ export interface StateMutationIntent {
8681
8437
  from?: From;
8682
8438
  zero_trust_receipt_cid?: ZeroTrustReceiptCid;
8683
8439
  }
8684
- /**
8685
- * CoReason Shared Kernel Ontology
8686
- *
8687
- * AGENT INSTRUCTION: Use this intent to query the Master MCP for available sovereign oracles and verifiable execution substrates.
8688
- *
8689
- * CAUSAL AFFORDANCE: Projects a bounded subgraph of available URNs based on the agent's cryptographic identity and security clearance.
8690
- *
8691
- * EPISTEMIC BOUNDS: The domain_filter strictly limits the discovery surface to the requested URN namespaces to prevent context window dilution. Physically capped at 1000 elements to prevent CPU exhaustion during canonical sorting.
8692
- *
8693
- * MCP ROUTING TRIGGERS: Federated Discovery, Service Mesh, Capability Registry, Substrate Interrogation
8694
- */
8695
- export interface FederatedDiscoveryIntent {
8696
- topology_class?: TopologyClass61;
8697
- domain_filter: DomainFilter;
8698
- /**
8699
- * The content-addressed hash of the capability being searched for via P2P mesh.
8700
- */
8701
- target_capability_cid?: BundleContentHashState | null;
8702
- max_network_hops?: MaxNetworkHops;
8703
- required_security_clearance: RequiredSecurityClearance;
8704
- }
8705
8440
  /**
8706
8441
  * CoReason Shared Kernel Ontology
8707
8442
  *
@@ -8714,7 +8449,7 @@ export interface FederatedDiscoveryIntent {
8714
8449
  * MCP ROUTING TRIGGERS: Semantic Crosswalk, ETL Pipeline, Data Normalization, Knowledge Graph Extraction
8715
8450
  */
8716
8451
  export interface OntologicalNormalizationIntent {
8717
- topology_class?: TopologyClass62;
8452
+ topology_class?: TopologyClass61;
8718
8453
  source_artifact_cid: SourceArtifactCid1;
8719
8454
  target_ontology_urn: TargetOntologyUrn;
8720
8455
  }
@@ -8747,8 +8482,8 @@ export interface CognitiveAgentNodeProfile {
8747
8482
  */
8748
8483
  render_material?: SpatialRenderMaterial | null;
8749
8484
  description: Description3;
8750
- topology_class?: TopologyClass63;
8751
- hardware?: SpatialHardwareProfile;
8485
+ topology_class?: TopologyClass62;
8486
+ hardware?: SpatialHardwareProfile1;
8752
8487
  security?: EpistemicSecurityProfile;
8753
8488
  /**
8754
8489
  * The cryptographic contract forcing this agent to embed an undeniable provenance signature into its generative token stream.
@@ -8910,9 +8645,17 @@ export interface MarkovBlanketRenderingPolicy {
8910
8645
  occlude_internal_mechanistics?: OccludeInternalMechanistics;
8911
8646
  }
8912
8647
  /**
8913
- * The physical constraints binding this agent to a specific thermodynamic deployment topology.
8648
+ * CoReason Shared Kernel Ontology
8649
+ *
8650
+ * AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
8651
+ *
8652
+ * CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
8653
+ *
8654
+ * EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
8655
+ *
8656
+ * MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
8914
8657
  */
8915
- export interface SpatialHardwareProfile {
8658
+ export interface SpatialHardwareProfile1 {
8916
8659
  compute_tier?: ComputeTier;
8917
8660
  min_vram_gb?: MinVramGb;
8918
8661
  coreason_network_mode?: CoreasonNetworkMode;
@@ -9284,17 +9027,17 @@ export interface NeuroSymbolicHandoffContract {
9284
9027
  /**
9285
9028
  * CoReason Shared Kernel Ontology
9286
9029
  *
9287
- * AGENT INSTRUCTION: Establishes a rigorous Mechanistic Interpretability brain-scan protocol, executing real-time latent state extraction across targeted neural circuits.
9030
+ * AGENT INSTRUCTION: Establishes a rigorous Mechanistic Interpretability brain-scan protocol, executing real-time latent state extraction across targeted neural circuits. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
9288
9031
  *
9289
- * CAUSAL AFFORDANCE: Authorizes the orchestrator to halt token generation upon specific `trigger_conditions` to physically slice, quantify, and export the top-k SAE features from the designated `target_layers`.
9032
+ * CAUSAL AFFORDANCE: Authorizes the orchestrator to halt token generation upon specific `trigger_conditions` to physically slice, quantify, and export the top-k SAE features from the designated `target_hook_points`.
9290
9033
  *
9291
- * EPISTEMIC BOUNDS: GPU VRAM exhaustion is mathematically prevented by capping `max_features_per_layer` (`gt=0, le=18446744073709551615`). The `@model_validator` deterministically sorts conditions and layers for RFC 8785 hashing. System integrity enforced via `require_zk_commitments`.
9034
+ * EPISTEMIC BOUNDS: GPU VRAM exhaustion is mathematically prevented by capping `max_features_per_layer` (`gt=0, le=18446744073709551615`). The `@model_validator` deterministically sorts conditions and hook points for RFC 8785 hashing. System integrity enforced via `require_zk_commitments`.
9292
9035
  *
9293
- * MCP ROUTING TRIGGERS: Latent State Extraction, Mechanistic Interpretability, Sparse Autoencoder, Zero-Knowledge Commitments, VRAM Optimization
9036
+ * MCP ROUTING TRIGGERS: Latent State Extraction, Mechanistic Interpretability, Sparse Autoencoder, Zero-Knowledge Commitments, VRAM Optimization, TransformerLens, SAELens
9294
9037
  */
9295
9038
  export interface MechanisticAuditContract {
9296
9039
  trigger_conditions: TriggerConditions;
9297
- target_layers: TargetLayers;
9040
+ target_hook_points: TargetHookPoints1;
9298
9041
  max_features_per_layer: MaxFeaturesPerLayer;
9299
9042
  require_zk_commitments?: RequireZkCommitments;
9300
9043
  }
@@ -9397,7 +9140,7 @@ export interface CognitiveHumanNodeProfile {
9397
9140
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
9398
9141
  */
9399
9142
  render_material?: SpatialRenderMaterial | null;
9400
- topology_class?: TopologyClass64;
9143
+ topology_class?: TopologyClass63;
9401
9144
  required_attestation: RequiredAttestation;
9402
9145
  /**
9403
9146
  * The continuous spatial vector representing the human operator's localized cognitive focus.
@@ -9445,7 +9188,7 @@ export interface CognitiveSystemNodeProfile {
9445
9188
  * The mathematical functor blueprint authorizing the runtime to hydrate a specific open-source engine (e.g., SymbolicAI) for this node.
9446
9189
  */
9447
9190
  execution_substrate?: ExecutionSubstrateProfile1 | null;
9448
- topology_class?: TopologyClass65;
9191
+ topology_class?: TopologyClass64;
9449
9192
  }
9450
9193
  /**
9451
9194
  * CoReason Shared Kernel Ontology
@@ -9493,7 +9236,7 @@ export interface CompositeNodeProfile {
9493
9236
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
9494
9237
  */
9495
9238
  render_material?: SpatialRenderMaterial | null;
9496
- topology_class?: TopologyClass66;
9239
+ topology_class?: TopologyClass65;
9497
9240
  /**
9498
9241
  * The encapsulated subgraph to execute.
9499
9242
  */
@@ -9533,7 +9276,7 @@ export interface DAGTopologyManifest {
9533
9276
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9534
9277
  */
9535
9278
  observability?: ObservabilityLODPolicy | null;
9536
- topology_class?: TopologyClass67;
9279
+ topology_class?: TopologyClass66;
9537
9280
  edges?: Edges;
9538
9281
  allow_cycles?: AllowCycles;
9539
9282
  /**
@@ -9712,17 +9455,17 @@ export interface SemanticFirewallPolicy {
9712
9455
  /**
9713
9456
  * CoReason Shared Kernel Ontology
9714
9457
  *
9715
- * AGENT INSTRUCTION: Implements Sparse Dictionary Learning and Mechanistic Interpretability to actively monitor and steer monosemantic neural circuits during the model's forward pass.
9458
+ * AGENT INSTRUCTION: Implements Sparse Dictionary Learning and Mechanistic Interpretability to actively monitor and steer monosemantic neural circuits during the model's forward pass. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
9716
9459
  *
9717
9460
  * CAUSAL AFFORDANCE: Executes real-time tensor remediation—clamping, halting, quarantining, or smoothly decaying residual stream activations—when specific features diverge toward adversarial or hallucinated geometries.
9718
9461
  *
9719
9462
  * EPISTEMIC BOUNDS: The `max_activation_threshold` (`ge=0.0, le=18446744073709551615.0`) physically bounds the continuous Euclidean magnitude of the `target_feature_index`. Topologically locked to SAE matrix via `sae_dictionary_hash` (SHA-256). The `@model_validator` `validate_smooth_decay` mathematically enforces asymptotic bounds.
9720
9463
  *
9721
- * MCP ROUTING TRIGGERS: Mechanistic Interpretability, Sparse Autoencoders, Residual Stream Steering, Tensor Remediation, Monosemantic Features
9464
+ * MCP ROUTING TRIGGERS: Mechanistic Interpretability, Sparse Autoencoders, Residual Stream Steering, Tensor Remediation, Monosemantic Features, TransformerLens, SAELens
9722
9465
  */
9723
9466
  export interface SaeLatentPolicy {
9724
9467
  target_feature_index: TargetFeatureIndex;
9725
- monitored_layers: MonitoredLayers;
9468
+ monitored_hook_points: MonitoredHookPoints;
9726
9469
  max_activation_threshold: MaxActivationThreshold;
9727
9470
  violation_action: ViolationAction1;
9728
9471
  clamp_value?: ClampValue;
@@ -9943,7 +9686,7 @@ export interface CouncilTopologyManifest {
9943
9686
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9944
9687
  */
9945
9688
  observability?: ObservabilityLODPolicy | null;
9946
- topology_class?: TopologyClass68;
9689
+ topology_class?: TopologyClass67;
9947
9690
  /**
9948
9691
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
9949
9692
  */
@@ -10150,7 +9893,7 @@ export interface SwarmTopologyManifest {
10150
9893
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10151
9894
  */
10152
9895
  observability?: ObservabilityLODPolicy | null;
10153
- topology_class?: TopologyClass69;
9896
+ topology_class?: TopologyClass68;
10154
9897
  spawning_threshold?: SpawningThreshold;
10155
9898
  max_concurrent_agents?: MaxConcurrentAgents;
10156
9899
  /**
@@ -10284,7 +10027,7 @@ export interface EvolutionaryTopologyManifest {
10284
10027
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10285
10028
  */
10286
10029
  observability?: ObservabilityLODPolicy | null;
10287
- topology_class?: TopologyClass70;
10030
+ topology_class?: TopologyClass69;
10288
10031
  generations: Generations;
10289
10032
  population_size: PopulationSize;
10290
10033
  mutation: MutationPolicy;
@@ -10397,7 +10140,7 @@ export interface SMPCTopologyManifest {
10397
10140
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10398
10141
  */
10399
10142
  observability?: ObservabilityLODPolicy | null;
10400
- topology_class?: TopologyClass71;
10143
+ topology_class?: TopologyClass70;
10401
10144
  smpc_protocol: SmpcProtocol;
10402
10145
  joint_function_uri: JointFunctionUri;
10403
10146
  participant_node_cids: ParticipantNodeCids;
@@ -10444,7 +10187,7 @@ export interface EvaluatorOptimizerTopologyManifest {
10444
10187
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10445
10188
  */
10446
10189
  observability?: ObservabilityLODPolicy | null;
10447
- topology_class?: TopologyClass72;
10190
+ topology_class?: TopologyClass71;
10448
10191
  /**
10449
10192
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
10450
10193
  */
@@ -10494,7 +10237,7 @@ export interface DigitalTwinTopologyManifest {
10494
10237
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10495
10238
  */
10496
10239
  observability?: ObservabilityLODPolicy | null;
10497
- topology_class?: TopologyClass73;
10240
+ topology_class?: TopologyClass72;
10498
10241
  target_topology_cid: TargetTopologyCid;
10499
10242
  convergence_sla: SimulationConvergenceSLA;
10500
10243
  enforce_no_side_effects?: EnforceNoSideEffects;
@@ -10524,7 +10267,7 @@ export interface SimulationConvergenceSLA {
10524
10267
  * MCP ROUTING TRIGGERS: Practical Byzantine Fault Tolerance, pBFT, Distributed Consensus, Sybil Resistance, Macro Abstraction
10525
10268
  */
10526
10269
  export interface ConsensusFederationTopologyManifest {
10527
- topology_class?: TopologyClass74;
10270
+ topology_class?: TopologyClass73;
10528
10271
  participant_cids: ParticipantCids;
10529
10272
  /**
10530
10273
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10589,7 +10332,7 @@ export interface CapabilityForgeTopologyManifest {
10589
10332
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10590
10333
  */
10591
10334
  observability?: ObservabilityLODPolicy | null;
10592
- topology_class?: TopologyClass75;
10335
+ topology_class?: TopologyClass74;
10593
10336
  target_epistemic_deficit: SemanticDiscoveryIntent1;
10594
10337
  /**
10595
10338
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10743,7 +10486,7 @@ export interface IntentElicitationTopologyManifest {
10743
10486
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10744
10487
  */
10745
10488
  observability?: ObservabilityLODPolicy | null;
10746
- topology_class?: TopologyClass76;
10489
+ topology_class?: TopologyClass75;
10747
10490
  raw_human_artifact_cid: RawHumanArtifactCid;
10748
10491
  /**
10749
10492
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10797,7 +10540,7 @@ export interface NeurosymbolicIngestionTopologyManifest {
10797
10540
  * The dynamic Level of Detail physics bound to this graph.
10798
10541
  */
10799
10542
  observability?: ObservabilityLODPolicy | null;
10800
- topology_class?: TopologyClass77;
10543
+ topology_class?: TopologyClass76;
10801
10544
  /**
10802
10545
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
10803
10546
  */
@@ -10858,7 +10601,7 @@ export interface NeurosymbolicVerificationTopologyManifest {
10858
10601
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10859
10602
  */
10860
10603
  observability?: ObservabilityLODPolicy | null;
10861
- topology_class?: TopologyClass78;
10604
+ topology_class?: TopologyClass77;
10862
10605
  proposer_node_cid: ProposerNodeCid;
10863
10606
  verifier_node_cid: VerifierNodeCid;
10864
10607
  max_revision_loops: MaxRevisionLoops1;
@@ -10882,7 +10625,7 @@ export interface Nodes11 {
10882
10625
  * MCP ROUTING TRIGGERS: Discourse Geometry, Rhetorical Flattening, Directed Acyclic Graph, Hierarchical Extraction
10883
10626
  */
10884
10627
  export interface DiscourseTreeManifest {
10885
- topology_class?: TopologyClass79;
10628
+ topology_class?: TopologyClass78;
10886
10629
  manifest_cid: ManifestCid2;
10887
10630
  /**
10888
10631
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10923,7 +10666,7 @@ export interface DiscourseNodeState {
10923
10666
  * CoReason Shared Kernel Ontology
10924
10667
  */
10925
10668
  export interface DocumentKnowledgeGraphManifest {
10926
- topology_class?: TopologyClass80;
10669
+ topology_class?: TopologyClass79;
10927
10670
  graph_cid: GraphCid;
10928
10671
  source_artifact_cid: SourceArtifactCid2;
10929
10672
  nodes: Nodes12;
@@ -11071,7 +10814,7 @@ export interface HomomorphicEncryptionProfile {
11071
10814
  * MCP ROUTING TRIGGERS: Cross-Modal Isomorphism, Semantic Fusion, Volumetric Projection, Profunctor Optics
11072
10815
  */
11073
10816
  export interface ContinuousManifoldMappingContract {
11074
- topology_class?: TopologyClass81;
10817
+ topology_class?: TopologyClass80;
11075
10818
  /**
11076
10819
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
11077
10820
  */
@@ -11118,7 +10861,7 @@ export interface SE3TransformProfile4 {
11118
10861
  * MCP ROUTING TRIGGERS: Spatial-Semantic Isomorphism, Document Object Model, Containment DAG, Visual Hierarchy, Rhetorical Bounding
11119
10862
  */
11120
10863
  export interface HierarchicalDOMManifest {
11121
- topology_class?: TopologyClass82;
10864
+ topology_class?: TopologyClass81;
11122
10865
  dom_cid: DomCid;
11123
10866
  root_block_cid: RootBlockCid;
11124
10867
  blocks: Blocks;
@@ -11299,7 +11042,7 @@ export interface MemoizedNodeProfile {
11299
11042
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
11300
11043
  */
11301
11044
  render_material?: SpatialRenderMaterial | null;
11302
- topology_class?: TopologyClass83;
11045
+ topology_class?: TopologyClass82;
11303
11046
  /**
11304
11047
  * The exact SHA-256 fingerprint of the executed topology.
11305
11048
  */
@@ -11321,7 +11064,7 @@ export interface ExpectedOutputSchema {
11321
11064
  * MCP ROUTING TRIGGERS: Conflict-Free Replicated Data Types, State-based Semilattice, Eventual Consistency, G-Set
11322
11065
  */
11323
11066
  export interface TemporalGraphCRDTManifest {
11324
- topology_class?: TopologyClass84;
11067
+ topology_class?: TopologyClass83;
11325
11068
  diff_cid: DiffCid;
11326
11069
  author_node_cid: AuthorNodeCid;
11327
11070
  lamport_timestamp: LamportTimestamp;
@@ -11341,10 +11084,10 @@ export interface VectorClock {
11341
11084
  * AGENT INSTRUCTION: A formal Substrate Projection representing an executable Model Context Protocol (MCP) tool.
11342
11085
  */
11343
11086
  export interface MCPToolDefinition {
11344
- topology_class?: TopologyClass85;
11345
- event_cid?: EventCid3;
11346
- prior_event_hash?: PriorEventHash3;
11347
- timestamp?: Timestamp3;
11087
+ topology_class?: TopologyClass84;
11088
+ event_cid?: EventCid2;
11089
+ prior_event_hash?: PriorEventHash2;
11090
+ timestamp?: Timestamp2;
11348
11091
  name: Name;
11349
11092
  description: Description9;
11350
11093
  inputSchema: Inputschema;
@@ -11367,11 +11110,11 @@ export interface Inputschema {
11367
11110
  * MCP ROUTING TRIGGERS: Epistemic Provenance, Crosswalk Resolution, Grounding Receipt, Ontology Access Kit, CURIE
11368
11111
  */
11369
11112
  export interface CrosswalkResolutionReceipt {
11370
- event_cid: EventCid4;
11371
- prior_event_hash?: PriorEventHash4;
11372
- timestamp: Timestamp4;
11373
- topology_class?: TopologyClass86;
11374
- receipt_cid: ReceiptCid1;
11113
+ event_cid: EventCid3;
11114
+ prior_event_hash?: PriorEventHash3;
11115
+ timestamp: Timestamp3;
11116
+ topology_class?: TopologyClass85;
11117
+ receipt_cid: ReceiptCid;
11375
11118
  target_graph_cid: TargetGraphCid3;
11376
11119
  resolved_curies: ResolvedCuries;
11377
11120
  grounding_confidence: DempsterShaferBeliefVector1;
@@ -11412,10 +11155,10 @@ export interface DempsterShaferBeliefVector1 {
11412
11155
  * MCP ROUTING TRIGGERS: Cryptographic Ledger, Formal Verification Receipt, Immutable Provenance, Hash Canonicalization, Data Masking
11413
11156
  */
11414
11157
  export interface EpistemicZeroTrustReceipt {
11415
- event_cid: EventCid5;
11416
- prior_event_hash?: PriorEventHash5;
11417
- timestamp: Timestamp5;
11418
- topology_class?: TopologyClass87;
11158
+ event_cid: EventCid4;
11159
+ prior_event_hash?: PriorEventHash4;
11160
+ timestamp: Timestamp4;
11161
+ topology_class?: TopologyClass86;
11419
11162
  intent_reference_cid: IntentReferenceCid;
11420
11163
  llm_blind_plan_hash: LlmBlindPlanHash;
11421
11164
  firewall_breach_detected?: FirewallBreachDetected;
@@ -11434,10 +11177,10 @@ export interface EpistemicZeroTrustReceipt {
11434
11177
  * MCP ROUTING TRIGGERS: Bayesian Evidence, Neurosymbolic Binding, Exogenous Truth, Epistemic Grounding, Payload Topological Bounding
11435
11178
  */
11436
11179
  export interface ObservationEvent {
11437
- event_cid: EventCid6;
11438
- prior_event_hash?: PriorEventHash6;
11439
- timestamp: Timestamp6;
11440
- topology_class?: TopologyClass88;
11180
+ event_cid: EventCid5;
11181
+ prior_event_hash?: PriorEventHash5;
11182
+ timestamp: Timestamp5;
11183
+ topology_class?: TopologyClass87;
11441
11184
  payload: Payload;
11442
11185
  /**
11443
11186
  * The specific topological node that appended this observation.
@@ -11507,7 +11250,7 @@ export interface HardwareEnclaveReceipt {
11507
11250
  * MCP ROUTING TRIGGERS: Exogenous Perturbation, DOM Topography, Spatial Execution Bound, Accessibility Tree
11508
11251
  */
11509
11252
  export interface BrowserDOMState {
11510
- topology_class?: TopologyClass89;
11253
+ topology_class?: TopologyClass88;
11511
11254
  current_url: CurrentUrl;
11512
11255
  viewport_size: ViewportSize;
11513
11256
  dom_hash: DomHash;
@@ -11526,7 +11269,7 @@ export interface BrowserDOMState {
11526
11269
  * MCP ROUTING TRIGGERS: POSIX Environment, Exogenous Perturbation, TTY Buffer, Causal Actuator, Stream Crystallization
11527
11270
  */
11528
11271
  export interface TerminalBufferState {
11529
- topology_class?: TopologyClass90;
11272
+ topology_class?: TopologyClass89;
11530
11273
  working_directory: WorkingDirectory;
11531
11274
  stdout_hash: StdoutHash;
11532
11275
  stderr_hash: StderrHash;
@@ -11554,21 +11297,21 @@ export interface EmbodiedSensoryVectorProfile {
11554
11297
  *
11555
11298
  * AGENT INSTRUCTION: An append-only, cryptographically frozen coordinate representing the verifiable output of a MechanisticAuditContract.
11556
11299
  *
11557
- * CAUSAL AFFORDANCE: Commits the extracted `SaeFeatureActivationState` matrix (`layer_activations`) to the Merkle-DAG. The `causal_scrubbing_applied` boolean mathematically proves that the orchestrator actively resampled or ablated the circuit to confirm direct causal responsibility.
11300
+ * CAUSAL AFFORDANCE: Commits the extracted `SaeFeatureActivationState` matrix (`hook_activations`) to the Merkle-DAG. The `causal_scrubbing_applied` boolean mathematically proves that the orchestrator actively resampled or ablated the circuit to confirm direct causal responsibility.
11558
11301
  *
11559
- * EPISTEMIC BOUNDS: Cryptographic integrity structurally anchored by `audit_cid` (128-char CID regex). The `@model_validator` sorts each `SaeFeatureActivationState` list within `layer_activations` by `feature_index`, guaranteeing zero-variance RFC 8785 Merkle-DAG hashing.
11302
+ * EPISTEMIC BOUNDS: Cryptographic integrity structurally anchored by `audit_cid` (128-char CID regex). The `@model_validator` sorts each `SaeFeatureActivationState` list within `hook_activations` by `feature_index`, guaranteeing zero-variance RFC 8785 Merkle-DAG hashing.
11560
11303
  *
11561
- * MCP ROUTING TRIGGERS: Causal Scrubbing, Epistemic Provenance, Mechanistic Audit, RFC 8785 Canonicalization, Cryptographic Brain-Scan
11304
+ * MCP ROUTING TRIGGERS: Causal Scrubbing, Epistemic Provenance, Mechanistic Audit, RFC 8785 Canonicalization, Cryptographic Brain-Scan, TransformerLens, SAELens
11562
11305
  */
11563
11306
  export interface NeuralAuditAttestationReceipt {
11564
11307
  audit_cid: AuditCid;
11565
- layer_activations: LayerActivations;
11308
+ hook_activations: HookActivations;
11566
11309
  causal_scrubbing_applied?: CausalScrubbingApplied;
11567
11310
  }
11568
11311
  /**
11569
- * A mapping of specific transformer layer indices to their top-k activated SAE features.
11312
+ * A mapping of specific TransformerLens hook points to their top-k activated SAE features.
11570
11313
  */
11571
- export interface LayerActivations {
11314
+ export interface HookActivations {
11572
11315
  [k: string]: SaeFeatureActivationState[];
11573
11316
  }
11574
11317
  /**
@@ -11638,10 +11381,10 @@ export interface StreamingDisfluencyContract {
11638
11381
  * MCP ROUTING TRIGGERS: Bayesian Belief Updating, Causal Tracing, Cognitive Synthesis, Merkle-DAG Coordinate, Non-Monotonic Leap
11639
11382
  */
11640
11383
  export interface BeliefMutationEvent {
11641
- event_cid: EventCid7;
11642
- prior_event_hash?: PriorEventHash7;
11643
- timestamp: Timestamp7;
11644
- topology_class?: TopologyClass91;
11384
+ event_cid: EventCid6;
11385
+ prior_event_hash?: PriorEventHash6;
11386
+ timestamp: Timestamp6;
11387
+ topology_class?: TopologyClass90;
11645
11388
  payload: Payload1;
11646
11389
  /**
11647
11390
  * The specific topological node that synthesized this belief assertion.
@@ -11753,10 +11496,10 @@ export interface LatentScratchpadReceipt {
11753
11496
  * MCP ROUTING TRIGGERS: Byzantine Fault Tolerance, Circuit Breaker, Terminal State, Execution Collapse, Fault Isolation
11754
11497
  */
11755
11498
  export interface SystemFaultEvent {
11756
- event_cid: EventCid8;
11757
- prior_event_hash?: PriorEventHash8;
11758
- timestamp: Timestamp8;
11759
- topology_class?: TopologyClass92;
11499
+ event_cid: EventCid7;
11500
+ prior_event_hash?: PriorEventHash7;
11501
+ timestamp: Timestamp7;
11502
+ topology_class?: TopologyClass91;
11760
11503
  }
11761
11504
  /**
11762
11505
  * CoReason Shared Kernel Ontology
@@ -11770,10 +11513,10 @@ export interface SystemFaultEvent {
11770
11513
  * MCP ROUTING TRIGGERS: Atomic Proposition, Discourse Extraction, Labeled Property Graph, Verifiable Statement
11771
11514
  */
11772
11515
  export interface AtomicPropositionState {
11773
- topology_class?: TopologyClass93;
11774
- event_cid: EventCid9;
11775
- prior_event_hash?: PriorEventHash9;
11776
- timestamp: Timestamp9;
11516
+ topology_class?: TopologyClass92;
11517
+ event_cid: EventCid8;
11518
+ prior_event_hash?: PriorEventHash8;
11519
+ timestamp: Timestamp8;
11777
11520
  proposition_cid: PropositionCid;
11778
11521
  rhetorical_role: RhetoricalStructureProfile;
11779
11522
  illocutionary_force: IllocutionaryForceProfile;
@@ -11811,10 +11554,10 @@ export interface EmpiricalStatisticalProfile {
11811
11554
  * MCP ROUTING TRIGGERS: Post-Coordinated Semantics, Latent Manifold Alignment, Semantic Specificity, Entity Assembly
11812
11555
  */
11813
11556
  export interface PostCoordinatedSemanticState {
11814
- topology_class?: TopologyClass94;
11815
- event_cid: EventCid10;
11816
- prior_event_hash?: PriorEventHash10;
11817
- timestamp: Timestamp10;
11557
+ topology_class?: TopologyClass93;
11558
+ event_cid: EventCid9;
11559
+ prior_event_hash?: PriorEventHash9;
11560
+ timestamp: Timestamp9;
11818
11561
  concept_cid: ConceptCid;
11819
11562
  /**
11820
11563
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -11842,10 +11585,10 @@ export interface ContextualModifiers {
11842
11585
  * MCP ROUTING TRIGGERS: Artifact Contagion Prevention, Terminal Fault, VLM Crash, Malformed Bytes, DRM Lock
11843
11586
  */
11844
11587
  export interface ArtifactCorruptionEvent {
11845
- event_cid: EventCid11;
11846
- prior_event_hash?: PriorEventHash11;
11847
- timestamp: Timestamp11;
11848
- topology_class?: TopologyClass95;
11588
+ event_cid: EventCid10;
11589
+ prior_event_hash?: PriorEventHash10;
11590
+ timestamp: Timestamp10;
11591
+ topology_class?: TopologyClass94;
11849
11592
  artifact_cid: ArtifactCid;
11850
11593
  corruption_class: CorruptionClass;
11851
11594
  diagnostic_hash: DiagnosticHash;
@@ -11862,10 +11605,10 @@ export interface ArtifactCorruptionEvent {
11862
11605
  * MCP ROUTING TRIGGERS: Abductive Reasoning, Popperian Falsification, Bayesian Prior, Causal Hypothesis, Epistemic Commitment
11863
11606
  */
11864
11607
  export interface HypothesisGenerationEvent {
11865
- event_cid: EventCid12;
11866
- prior_event_hash?: PriorEventHash12;
11867
- timestamp: Timestamp12;
11868
- topology_class?: TopologyClass96;
11608
+ event_cid: EventCid11;
11609
+ prior_event_hash?: PriorEventHash11;
11610
+ timestamp: Timestamp11;
11611
+ topology_class?: TopologyClass95;
11869
11612
  hypothesis_cid: HypothesisCid;
11870
11613
  premise_text: PremiseText;
11871
11614
  bayesian_prior: BayesianPrior;
@@ -11904,10 +11647,10 @@ export interface StructuralCausalGraphProfile {
11904
11647
  * MCP ROUTING TRIGGERS: Asynchronous Interrupt, Generative Severing, Context Switching, Defeasible Disposition, Wave Collapse
11905
11648
  */
11906
11649
  export interface BargeInInterruptEvent {
11907
- event_cid: EventCid13;
11908
- prior_event_hash?: PriorEventHash13;
11909
- timestamp: Timestamp13;
11910
- topology_class?: TopologyClass97;
11650
+ event_cid: EventCid12;
11651
+ prior_event_hash?: PriorEventHash12;
11652
+ timestamp: Timestamp12;
11653
+ topology_class?: TopologyClass96;
11911
11654
  target_event_cid: TargetEventCid1;
11912
11655
  /**
11913
11656
  * The continuous multimodal trigger (e.g., audio spike, user saying 'stop') that justified the interruption.
@@ -11928,10 +11671,10 @@ export interface BargeInInterruptEvent {
11928
11671
  * MCP ROUTING TRIGGERS: Counterfactual Regret Minimization, Pearlian Do-Calculus, Opportunity Cost, Alternative Timeline, Policy Gradient Update
11929
11672
  */
11930
11673
  export interface CounterfactualRegretEvent {
11931
- event_cid: EventCid14;
11932
- prior_event_hash?: PriorEventHash14;
11933
- timestamp: Timestamp14;
11934
- topology_class?: TopologyClass98;
11674
+ event_cid: EventCid13;
11675
+ prior_event_hash?: PriorEventHash13;
11676
+ timestamp: Timestamp13;
11677
+ topology_class?: TopologyClass97;
11935
11678
  historical_event_cid: HistoricalEventCid;
11936
11679
  counterfactual_intervention: CounterfactualIntervention;
11937
11680
  expected_utility_actual: ExpectedUtilityActual;
@@ -11957,10 +11700,10 @@ export interface PolicyMutationGradients {
11957
11700
  * MCP ROUTING TRIGGERS: Pearlian Do-Operator, Kinetic Commitment, Active Inference, Thermodynamic Escrow, Zero-Trust Actuation
11958
11701
  */
11959
11702
  export interface ToolInvocationEvent {
11960
- event_cid: EventCid15;
11961
- prior_event_hash?: PriorEventHash15;
11962
- timestamp: Timestamp15;
11963
- topology_class?: TopologyClass99;
11703
+ event_cid: EventCid14;
11704
+ prior_event_hash?: PriorEventHash14;
11705
+ timestamp: Timestamp14;
11706
+ topology_class?: TopologyClass98;
11964
11707
  tool_name: ToolName1;
11965
11708
  parameters: Parameters;
11966
11709
  authorized_budget_magnitude: AuthorizedBudgetMagnitude;
@@ -12023,10 +11766,10 @@ export interface ZeroKnowledgeReceipt1 {
12023
11766
  * MCP ROUTING TRIGGERS: Hippocampal Consolidation, Knowledge Distillation, Semantic Memory, Shannon Entropy Compression, Epistemic Promotion
12024
11767
  */
12025
11768
  export interface EpistemicPromotionEvent {
12026
- event_cid: EventCid16;
12027
- prior_event_hash?: PriorEventHash16;
12028
- timestamp: Timestamp16;
12029
- topology_class?: TopologyClass100;
11769
+ event_cid: EventCid15;
11770
+ prior_event_hash?: PriorEventHash15;
11771
+ timestamp: Timestamp15;
11772
+ topology_class?: TopologyClass99;
12030
11773
  source_episodic_event_cids: SourceEpisodicEventCids;
12031
11774
  crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
12032
11775
  compression_ratio: CompressionRatio;
@@ -12043,11 +11786,11 @@ export interface EpistemicPromotionEvent {
12043
11786
  * MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
12044
11787
  */
12045
11788
  export interface NormativeDriftEvent {
12046
- event_cid: EventCid17;
12047
- prior_event_hash?: PriorEventHash17;
12048
- timestamp: Timestamp17;
12049
- topology_class?: TopologyClass101;
12050
- tripped_rule_cid: TrippedRuleCid1;
11789
+ event_cid: EventCid16;
11790
+ prior_event_hash?: PriorEventHash16;
11791
+ timestamp: Timestamp16;
11792
+ topology_class?: TopologyClass100;
11793
+ tripped_rule_cid: TrippedRuleCid;
12051
11794
  measured_semantic_drift: MeasuredSemanticDrift;
12052
11795
  contradiction_proof_hash: ContradictionProofHash;
12053
11796
  }
@@ -12063,10 +11806,10 @@ export interface NormativeDriftEvent {
12063
11806
  * MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
12064
11807
  */
12065
11808
  export interface PersistenceCommitReceipt {
12066
- event_cid: EventCid18;
12067
- prior_event_hash?: PriorEventHash18;
12068
- timestamp: Timestamp18;
12069
- topology_class?: TopologyClass102;
11809
+ event_cid: EventCid17;
11810
+ prior_event_hash?: PriorEventHash17;
11811
+ timestamp: Timestamp17;
11812
+ topology_class?: TopologyClass101;
12070
11813
  lakehouse_snapshot_cid: LakehouseSnapshotCid;
12071
11814
  committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
12072
11815
  target_table_uri: TargetTableUri;
@@ -12083,10 +11826,10 @@ export interface PersistenceCommitReceipt {
12083
11826
  * MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
12084
11827
  */
12085
11828
  export interface TokenBurnReceipt {
12086
- event_cid: EventCid19;
12087
- prior_event_hash?: PriorEventHash19;
12088
- timestamp: Timestamp19;
12089
- topology_class?: TopologyClass103;
11829
+ event_cid: EventCid18;
11830
+ prior_event_hash?: PriorEventHash18;
11831
+ timestamp: Timestamp18;
11832
+ topology_class?: TopologyClass102;
12090
11833
  tool_invocation_cid: ToolInvocationCid;
12091
11834
  input_tokens: InputTokens;
12092
11835
  output_tokens: OutputTokens;
@@ -12104,10 +11847,10 @@ export interface TokenBurnReceipt {
12104
11847
  * MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
12105
11848
  */
12106
11849
  export interface BudgetExhaustionEvent {
12107
- event_cid: EventCid20;
12108
- prior_event_hash?: PriorEventHash20;
12109
- timestamp: Timestamp20;
12110
- topology_class?: TopologyClass104;
11850
+ event_cid: EventCid19;
11851
+ prior_event_hash?: PriorEventHash19;
11852
+ timestamp: Timestamp19;
11853
+ topology_class?: TopologyClass103;
12111
11854
  exhausted_escrow_cid: ExhaustedEscrowCid;
12112
11855
  final_burn_receipt_cid: FinalBurnReceiptCid;
12113
11856
  }
@@ -12123,10 +11866,10 @@ export interface BudgetExhaustionEvent {
12123
11866
  * MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
12124
11867
  */
12125
11868
  export interface EpistemicTelemetryEvent {
12126
- event_cid: EventCid21;
12127
- prior_event_hash?: PriorEventHash21;
12128
- timestamp: Timestamp21;
12129
- topology_class?: TopologyClass105;
11869
+ event_cid: EventCid20;
11870
+ prior_event_hash?: PriorEventHash20;
11871
+ timestamp: Timestamp20;
11872
+ topology_class?: TopologyClass104;
12130
11873
  interaction_modality: InteractionModality;
12131
11874
  target_node_cid: TargetNodeCid2;
12132
11875
  dwell_duration_ms?: DwellDurationMs;
@@ -12147,10 +11890,10 @@ export interface EpistemicTelemetryEvent {
12147
11890
  * MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
12148
11891
  */
12149
11892
  export interface CognitivePredictionReceipt {
12150
- event_cid: EventCid22;
12151
- prior_event_hash?: PriorEventHash22;
12152
- timestamp: Timestamp22;
12153
- topology_class?: TopologyClass106;
11893
+ event_cid: EventCid21;
11894
+ prior_event_hash?: PriorEventHash21;
11895
+ timestamp: Timestamp21;
11896
+ topology_class?: TopologyClass105;
12154
11897
  source_chain_cid: SourceChainCid;
12155
11898
  target_source_concept: TargetSourceConcept;
12156
11899
  predicted_top_k_tokens: PredictedTopKTokens;
@@ -12167,10 +11910,10 @@ export interface CognitivePredictionReceipt {
12167
11910
  * MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
12168
11911
  */
12169
11912
  export interface EpistemicAxiomVerificationReceipt {
12170
- event_cid: EventCid23;
12171
- prior_event_hash?: PriorEventHash23;
12172
- timestamp: Timestamp23;
12173
- topology_class?: TopologyClass107;
11913
+ event_cid: EventCid22;
11914
+ prior_event_hash?: PriorEventHash22;
11915
+ timestamp: Timestamp22;
11916
+ topology_class?: TopologyClass106;
12174
11917
  source_prediction_cid: SourcePredictionCid;
12175
11918
  sequence_similarity_score: SequenceSimilarityScore;
12176
11919
  fact_score_passed: FactScorePassed;
@@ -12201,10 +11944,10 @@ export interface EpistemicAxiomVerificationReceipt {
12201
11944
  * Baseline Normalization, Reinforcement Learning
12202
11945
  */
12203
11946
  export interface CognitiveRewardEvaluationReceipt {
12204
- event_cid: EventCid24;
12205
- prior_event_hash?: PriorEventHash24;
12206
- timestamp: Timestamp24;
12207
- topology_class?: TopologyClass108;
11947
+ event_cid: EventCid23;
11948
+ prior_event_hash?: PriorEventHash23;
11949
+ timestamp: Timestamp23;
11950
+ topology_class?: TopologyClass107;
12208
11951
  source_generation_cid: SourceGenerationCid;
12209
11952
  extracted_axioms?: ExtractedAxioms;
12210
11953
  calculated_r_path: CalculatedRPath;
@@ -12247,10 +11990,10 @@ export interface EpistemicAxiomState {
12247
11990
  * Scalar Backpropagation, Acyclic Path
12248
11991
  */
12249
11992
  export interface EpistemicFlowStateReceipt {
12250
- event_cid: EventCid25;
12251
- prior_event_hash?: PriorEventHash25;
12252
- timestamp: Timestamp25;
12253
- topology_class?: TopologyClass109;
11993
+ event_cid: EventCid24;
11994
+ prior_event_hash?: PriorEventHash24;
11995
+ timestamp: Timestamp24;
11996
+ topology_class?: TopologyClass108;
12254
11997
  source_trajectory_cid: SourceTrajectoryCid;
12255
11998
  estimated_flow_value: EstimatedFlowValue;
12256
11999
  terminal_reward_factorized: TerminalRewardFactorized;
@@ -12276,10 +12019,10 @@ export interface EpistemicFlowStateReceipt {
12276
12019
  * Macroscopic Explanation, Deterministic Sorting
12277
12020
  */
12278
12021
  export interface CausalExplanationEvent {
12279
- event_cid: EventCid26;
12280
- prior_event_hash?: PriorEventHash26;
12281
- timestamp: Timestamp26;
12282
- topology_class?: TopologyClass110;
12022
+ event_cid: EventCid25;
12023
+ prior_event_hash?: PriorEventHash25;
12024
+ timestamp: Timestamp25;
12025
+ topology_class?: TopologyClass109;
12283
12026
  target_outcome_event_cid: TargetOutcomeEventCid;
12284
12027
  collective_intelligence: CollectiveIntelligenceProfile;
12285
12028
  agent_attributions: AgentAttributions;
@@ -12340,10 +12083,10 @@ export interface ShapleyAttributionReceipt {
12340
12083
  * Routing Heuristic, Semantic Wave Collapse
12341
12084
  */
12342
12085
  export interface IntentClassificationReceipt {
12343
- event_cid: EventCid27;
12344
- prior_event_hash?: PriorEventHash27;
12345
- timestamp: Timestamp27;
12346
- topology_class?: TopologyClass111;
12086
+ event_cid: EventCid26;
12087
+ prior_event_hash?: PriorEventHash26;
12088
+ timestamp: Timestamp26;
12089
+ topology_class?: TopologyClass110;
12347
12090
  raw_input_string: RawInputString;
12348
12091
  classified_intent: ClassifiedIntent;
12349
12092
  confidence_score: ConfidenceScore1;
@@ -12361,10 +12104,10 @@ export interface IntentClassificationReceipt {
12361
12104
  * MCP ROUTING TRIGGERS: Semantic Relational Record, Payload Injection, Hardware Guillotine, Structured Telemetry
12362
12105
  */
12363
12106
  export interface SemanticRelationalVectorState {
12364
- topology_class?: TopologyClass112;
12365
- event_cid: EventCid28;
12366
- prior_event_hash?: PriorEventHash28;
12367
- timestamp: Timestamp28;
12107
+ topology_class?: TopologyClass111;
12108
+ event_cid: EventCid27;
12109
+ prior_event_hash?: PriorEventHash27;
12110
+ timestamp: Timestamp27;
12368
12111
  ontology_class: UpperOntologyClassProfile;
12369
12112
  temporal_bounds: TemporalBoundsProfile1;
12370
12113
  formal_schema_urn?: FormalSchemaUrn1;
@@ -12406,10 +12149,10 @@ export interface PayloadInjectionZone {
12406
12149
  * MCP ROUTING TRIGGERS: Ontological Reification, Bimodal Semantic Transformation, Epistemic Ledger, Traceability Collapse
12407
12150
  */
12408
12151
  export interface OntologicalReificationReceipt {
12409
- topology_class?: TopologyClass113;
12410
- event_cid: EventCid29;
12411
- prior_event_hash?: PriorEventHash29;
12412
- timestamp: Timestamp29;
12152
+ topology_class?: TopologyClass112;
12153
+ event_cid: EventCid28;
12154
+ prior_event_hash?: PriorEventHash28;
12155
+ timestamp: Timestamp28;
12413
12156
  source_data_hash: SourceDataHash;
12414
12157
  target_namespace: TargetNamespace;
12415
12158
  algorithmic_mechanism: TransformationMechanismProfile;
@@ -12446,10 +12189,10 @@ export interface DempsterShaferBeliefVector2 {
12446
12189
  * MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
12447
12190
  */
12448
12191
  export interface CircuitBreakerEvent {
12449
- event_cid: EventCid30;
12450
- prior_event_hash?: PriorEventHash30;
12451
- timestamp: Timestamp30;
12452
- topology_class?: TopologyClass114;
12192
+ event_cid: EventCid29;
12193
+ prior_event_hash?: PriorEventHash29;
12194
+ timestamp: Timestamp29;
12195
+ topology_class?: TopologyClass113;
12453
12196
  /**
12454
12197
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
12455
12198
  */
@@ -12468,10 +12211,10 @@ export interface CircuitBreakerEvent {
12468
12211
  * MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
12469
12212
  */
12470
12213
  export interface EpistemicLogEvent {
12471
- event_cid: EventCid31;
12472
- prior_event_hash?: PriorEventHash31;
12473
- topology_class?: TopologyClass115;
12474
- timestamp: Timestamp31;
12214
+ event_cid: EventCid30;
12215
+ prior_event_hash?: PriorEventHash30;
12216
+ topology_class?: TopologyClass114;
12217
+ timestamp: Timestamp30;
12475
12218
  level: Level;
12476
12219
  message: Message1;
12477
12220
  context_profile?: TelemetryContextProfile;
@@ -12501,10 +12244,10 @@ export interface TelemetryContextProfile {
12501
12244
  * MCP ROUTING TRIGGERS: Cryptographic Nonce, State Resumption, Replay Attack Prevention, Wetware Attestation, Liveness Resolution
12502
12245
  */
12503
12246
  export interface InterventionReceipt {
12504
- topology_class?: TopologyClass116;
12505
- event_cid: EventCid32;
12506
- prior_event_hash?: PriorEventHash32;
12507
- timestamp: Timestamp32;
12247
+ topology_class?: TopologyClass115;
12248
+ event_cid: EventCid31;
12249
+ prior_event_hash?: PriorEventHash31;
12250
+ timestamp: Timestamp31;
12508
12251
  intervention_request_cid: InterventionRequestCid;
12509
12252
  /**
12510
12253
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -12559,10 +12302,10 @@ export interface WetwareAttestationContract {
12559
12302
  * MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
12560
12303
  */
12561
12304
  export interface CustodyReceipt {
12562
- event_cid: EventCid33;
12563
- prior_event_hash?: PriorEventHash33;
12564
- timestamp: Timestamp33;
12565
- topology_class?: TopologyClass117;
12305
+ event_cid: EventCid32;
12306
+ prior_event_hash?: PriorEventHash32;
12307
+ timestamp: Timestamp32;
12308
+ topology_class?: TopologyClass116;
12566
12309
  custody_cid: CustodyCid;
12567
12310
  source_node_cid: SourceNodeCid;
12568
12311
  applied_policy_cid: AppliedPolicyCid;
@@ -12582,10 +12325,10 @@ export interface CustodyReceipt {
12582
12325
  * MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
12583
12326
  */
12584
12327
  export interface DefeasibleAttackEvent {
12585
- event_cid: EventCid34;
12586
- prior_event_hash?: PriorEventHash34;
12587
- timestamp: Timestamp34;
12588
- topology_class?: TopologyClass118;
12328
+ event_cid: EventCid33;
12329
+ prior_event_hash?: PriorEventHash33;
12330
+ timestamp: Timestamp33;
12331
+ topology_class?: TopologyClass117;
12589
12332
  attack_cid: AttackCid;
12590
12333
  source_claim_cid: SourceClaimCid;
12591
12334
  target_claim_cid: TargetClaimCid;
@@ -12594,6 +12337,28 @@ export interface DefeasibleAttackEvent {
12594
12337
  */
12595
12338
  attack_vector: "rebuttal" | "undercutter" | "underminer";
12596
12339
  }
12340
+ /**
12341
+ * CoReason Shared Kernel Ontology
12342
+ *
12343
+ * AGENT INSTRUCTION: The mathematical backpropagation signal triggered when the Deterministic Compiler rejects a stochastic manifold. Quantifies the rejection and provides a mutation gradient.
12344
+ *
12345
+ * CAUSAL AFFORDANCE: Instructs the LLM ensemble on how to perturb the Upper Confidence Bound (UCB) during the next MCTS generation attempt by mathematically quantifying the error.
12346
+ *
12347
+ * EPISTEMIC BOUNDS: Kullback-Leibler divergence is strictly non-negative. A negative mathematical distance is a paradox and raises a ValueError.
12348
+ *
12349
+ * MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
12350
+ */
12351
+ export interface EpistemicRejectionReceipt {
12352
+ event_cid: EventCid34;
12353
+ prior_event_hash?: PriorEventHash34;
12354
+ timestamp: Timestamp34;
12355
+ topology_class?: TopologyClass118;
12356
+ receipt_cid: ReceiptCid1;
12357
+ failed_projection_cid: FailedProjectionCid;
12358
+ violated_algebraic_constraint: ViolatedAlgebraicConstraint;
12359
+ kl_divergence_to_validity: KlDivergenceToValidity;
12360
+ stochastic_mutation_gradient: StochasticMutationGradient;
12361
+ }
12597
12362
  /**
12598
12363
  * CoReason Shared Kernel Ontology
12599
12364
  *
@@ -12697,21 +12462,20 @@ export interface ReturnedBindings {
12697
12462
  /**
12698
12463
  * CoReason Shared Kernel Ontology
12699
12464
  *
12700
- * AGENT INSTRUCTION: A cryptographically frozen historical fact confirming the execution of a sovereign oracle via the Master MCP. Do not attempt to mutate this object.
12465
+ * AGENT INSTRUCTION: A cryptographically frozen historical fact attesting that a specific solver agent executed a task within the Claw Swarm. This receipt is immutable and logged in the Merkle-DAG chain of custody. Do not attempt to mutate this object.
12701
12466
  *
12702
- * CAUSAL AFFORDANCE: Unlocks downstream neurosymbolic synthesis by proving that external epistemic grounding was securely retrieved from a validated action space.
12467
+ * CAUSAL AFFORDANCE: Unlocks downstream neurosymbolic synthesis by proving that external epistemic grounding was securely retrieved and executed by a validated solver. The `execution_hash` provides undeniable cryptographic provenance for audit trails. The `tokens_burned` enables the Thermodynamic Quota Manager to settle compute costs.
12703
12468
  *
12704
- * EPISTEMIC BOUNDS: The action_space_cid guarantees an immutable cryptographic pointer to the specific VPC deployment that serviced the URN. Volumetrically clamped to prevent dictionary bombing.
12469
+ * EPISTEMIC BOUNDS: The `execution_hash` is strictly bounded to exactly 64 hexadecimal characters (SHA-256). The `solver_urn` is anchored to the `urn:coreason:solver:` namespace. The `tokens_burned` is bounded to `[0, 10_000_000]` to prevent integer overflow during thermodynamic tallying. The `human_attestation_signature` is optional and only populated when a Human-in-the-Loop (HITL) operator cryptographically signs off on the execution result.
12705
12470
  *
12706
- * MCP ROUTING TRIGGERS: Execution Audit, Oracle Telemetry, Provenance Ledger, Factual Assertion
12471
+ * MCP ROUTING TRIGGERS: Execution Audit, Merkle-DAG Provenance, Thermodynamic Accounting, Oracle Telemetry, Human-in-the-Loop Attestation, Cryptographic Receipt
12707
12472
  */
12708
12473
  export interface OracleExecutionReceipt {
12709
12474
  topology_class?: TopologyClass124;
12710
- event_cid: EventCid40;
12711
- prior_event_hash?: PriorEventHash40;
12712
- timestamp: Timestamp40;
12713
- executed_urn: ExecutedUrn;
12714
- action_space_cid: ActionSpaceCid1;
12475
+ execution_hash: ExecutionHash;
12476
+ solver_urn: SolverUrn;
12477
+ tokens_burned: TokensBurned;
12478
+ human_attestation_signature?: HumanAttestationSignature;
12715
12479
  }
12716
12480
  /**
12717
12481
  * CoReason Shared Kernel Ontology
@@ -12896,7 +12660,7 @@ export interface BypassReceipt {
12896
12660
  * MCP ROUTING TRIGGERS: Markov Decision Process, Action Space, Affordance Theory, State Transition Matrix, Directed Cyclic Graph
12897
12661
  */
12898
12662
  export interface CognitiveActionSpaceManifest {
12899
- action_space_cid: ActionSpaceCid2;
12663
+ action_space_cid: ActionSpaceCid1;
12900
12664
  capabilities: Capabilities;
12901
12665
  transition_matrix: TransitionMatrix;
12902
12666
  entry_point_cid: EntryPointCid;
@@ -13088,28 +12852,6 @@ export interface CollectiveIntelligenceProfile1 {
13088
12852
  coordination_score: CoordinationScore;
13089
12853
  information_integration: InformationIntegration;
13090
12854
  }
13091
- /**
13092
- * CoReason Shared Kernel Ontology
13093
- *
13094
- * AGENT INSTRUCTION: The macroscopic envelope that tracks the thermodynamic cost of stochastic ideation and violently halts execution when energy budgets or spatial limits are depleted.
13095
- *
13096
- * CAUSAL AFFORDANCE: Operates as the absolute mathematical circuit breaker for MCTS DAG expansion, physically revoking generative privileges if thresholds are breached.
13097
- *
13098
- * EPISTEMIC BOUNDS: Bounded by strict topological limits: max_stochastic_diffusions (ge=1) and computational_free_energy_budget (ge=0.0). current_diffusions must be strictly <= max_stochastic_diffusions.
13099
- *
13100
- * MCP ROUTING TRIGGERS: Computational Thermodynamics, Spatial Circuit Breaker, MCTS Halting, Epistemic Bounding, Thermodynamic Cost
13101
- */
13102
- export interface ComputationalThermodynamicsProfile {
13103
- thermodynamics_cid: ThermodynamicsCid;
13104
- target_topology_cid: TargetTopologyCid1;
13105
- max_stochastic_diffusions: MaxStochasticDiffusions;
13106
- computational_free_energy_budget: ComputationalFreeEnergyBudget;
13107
- current_diffusions?: CurrentDiffusions;
13108
- remaining_free_energy: RemainingFreeEnergy;
13109
- entropy_derivative_delta?: EntropyDerivativeDelta;
13110
- stagnation_tolerance_epsilon?: StagnationToleranceEpsilon;
13111
- system_state?: ThermodynamicState;
13112
- }
13113
12855
  /**
13114
12856
  * CoReason Shared Kernel Ontology
13115
12857
  *
@@ -13228,64 +12970,6 @@ export interface ContinuousMutationPolicy {
13228
12970
  max_uncommitted_edges: MaxUncommittedEdges;
13229
12971
  micro_batch_interval_ms: MicroBatchIntervalMs;
13230
12972
  }
13231
- /**
13232
- * CoReason Shared Kernel Ontology
13233
- *
13234
- * AGENT INSTRUCTION: Tracks the non-monotonic state transition of a Byzantine-tolerant B2B
13235
- * negotiation between two distinct enterprise tenant CID identifiers (initiating_tenant_cid
13236
- * and receiving_tenant_cid). As a ...State suffix, this is a declarative, frozen snapshot of
13237
- * N-dimensional geometry at a specific point in time.
13238
- *
13239
- * CAUSAL AFFORDANCE: Transitions the federated network from a proposed capability swap into
13240
- * an active OntologicalHandshakeReceipt, forcing the execution of the strict offered_sla
13241
- * (FederatedBilateralSLA).
13242
- *
13243
- * EPISTEMIC BOUNDS: Cryptographically bounded by handshake_cid (CID regex
13244
- * ^[a-zA-Z0-9_.:-]+$). The negotiation lifecycle is physically constrained to the strict
13245
- * Literal automaton ["proposed", "negotiating", "aligned", "rejected"] via FSM Logit
13246
- * Masking, preventing execution deadlocks.
13247
- *
13248
- * MCP ROUTING TRIGGERS: Byzantine-Tolerant Negotiation, Zero-Trust Handshake, Finite State
13249
- * Machine, Cross-Tenant Federation, Asynchronous B2B
13250
- */
13251
- export interface CrossSwarmHandshakeState {
13252
- handshake_cid: HandshakeCid;
13253
- initiating_tenant_cid: InitiatingTenantCid;
13254
- receiving_tenant_cid: ReceivingTenantCid;
13255
- offered_sla: FederatedBilateralSLA;
13256
- status?: Status1;
13257
- }
13258
- /**
13259
- * The initial structural/data boundary proposed.
13260
- */
13261
- export interface FederatedBilateralSLA {
13262
- receiving_tenant_cid: ReceivingTenantCid1;
13263
- max_permitted_classification: SemanticClassificationProfile2;
13264
- liability_limit_magnitude: LiabilityLimitMagnitude;
13265
- permitted_geographic_regions?: PermittedGeographicRegions;
13266
- require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
13267
- max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
13268
- /**
13269
- * The quantum-resistant signature securing the multi-tenant structural boundary.
13270
- */
13271
- pq_signature?: PostQuantumSignatureReceipt | null;
13272
- }
13273
- /**
13274
- * CoReason Shared Kernel Ontology
13275
- *
13276
- * AGENT INSTRUCTION: Implements NIST FIPS Post-Quantum Cryptography (PQC), utilizing lattice-based or stateless hash-based structures to guarantee long-term topological integrity on the Merkle-DAG.
13277
- *
13278
- * CAUSAL AFFORDANCE: Secures the causal execution graph and Bilateral SLAs against temporal decryption attacks (Harvest Now, Decrypt Later) via Shor's algorithm executed on fault-tolerant quantum computers.
13279
- *
13280
- * EPISTEMIC BOUNDS: To accommodate massive dimensional geometry, `pq_signature_blob` is structurally bound to a `100000`-byte `max_length`. `pq_algorithm` is restricted to the Literal set `["ml-dsa", "slh-dsa", "falcon"]`. `public_key_cid` is a 128-char CID.
13281
- *
13282
- * MCP ROUTING TRIGGERS: Post-Quantum Cryptography, ML-DSA, SLH-DSA, Shor's Algorithm Resistance, Lattice-based Cryptography
13283
- */
13284
- export interface PostQuantumSignatureReceipt {
13285
- pq_algorithm: PqAlgorithm;
13286
- public_key_cid: PublicKeyCid1;
13287
- pq_signature_blob: PqSignatureBlob;
13288
- }
13289
12973
  /**
13290
12974
  * CoReason Shared Kernel Ontology
13291
12975
  *
@@ -13400,45 +13084,39 @@ export interface DelegatedCapabilityManifest {
13400
13084
  /**
13401
13085
  * CoReason Shared Kernel Ontology
13402
13086
  *
13403
- * AGENT INSTRUCTION: Bridges the Neurosymbolic divide by mapping discrete Satisfiability Modulo Theories (SMT) or Lean4 logic proofs into continuous, differentiable loss gradients.
13087
+ * AGENT INSTRUCTION: A Generic two-stage generation wrapper that neutralizes the Format Restriction Penalty (Semantic Tax) during Constrained Decoding. The Sovereign LLM Proxy's XGrammar AOT FSM bitmask MUST be physically toggled between the two fields: DISABLED for `deliberation_trace`, then ENABLED for `payload`. This class models the architectural pattern documented in the Decoupled Reasoning and Formatting specification.
13404
13088
  *
13405
- * CAUSAL AFFORDANCE: Allows the backpropagation engine to apply a continuous, differentiable penalty (relaxation) to the LLM's probability mass when it violates the formal syntactic rules encoded in the `formal_syntax_smt` representation.
13089
+ * CAUSAL AFFORDANCE: Unlocks the two-stage Thinker-Parser pipeline by providing a single serializable envelope that carries both the unconstrained Chain-of-Thought reasoning trace and the deterministic, schema-compliant structured payload. Enables the Claw Swarm to reason freely while the deterministic Forge receives only validated structural output.
13406
13090
  *
13407
- * EPISTEMIC BOUNDS: The geometric penalty is clamped by `relaxation_epsilon` (`ge=0.0, le=1.0`) to prevent gradient explosion. The logical schema is locked to the 128-char `constraint_cid` CID to structurally bound string evaluation scope.
13091
+ * EPISTEMIC BOUNDS: The `deliberation_trace` has a maximum length of 100,000 characters to prevent context window exhaustion. The `payload` of type `T` is strictly validated against the target `CoreasonBaseState` subclass schema at deserialization time. The Generic parameter `T` must be a `CoreasonBaseState` descendant to guarantee RFC 8785 canonicalization.
13408
13092
  *
13409
- * MCP ROUTING TRIGGERS: Satisfiability Modulo Theories, Neurosymbolic Relaxation, Differentiable Theorem Proving, Probabilistic Logic Networks, Continuous Penalty
13093
+ * MCP ROUTING TRIGGERS: Semantic Tax Neutralization, Decoupled Reasoning Pipeline, XGrammar FSM Toggle, Constrained Decoding, Two-Stage Generation, Deliberation Envelope
13410
13094
  */
13411
- export interface DifferentiableLogicPolicy {
13412
- constraint_cid: ConstraintCid;
13413
- formal_syntax_smt: FormalSyntaxSmt;
13414
- relaxation_epsilon: RelaxationEpsilon;
13095
+ export interface DeliberativeEnvelope {
13096
+ deliberation_trace: DeliberationTrace;
13097
+ payload: Payload2;
13098
+ }
13099
+ /**
13100
+ * The deterministic, schema-compliant structured output generated by the Edge model (or the same model in a second pass) with the Sovereign LLM Proxy's XGrammar AOT FSM bitmask STRICTLY ENABLED. This field contains the validated structural result that maps directly to the target CoreasonBaseState subclass.
13101
+ */
13102
+ export interface Payload2 {
13103
+ [k: string]: unknown;
13415
13104
  }
13416
13105
  /**
13417
13106
  * CoReason Shared Kernel Ontology
13418
13107
  *
13419
- * AGENT INSTRUCTION: Formalizes a linear algebraic transformation (e.g.,
13420
- * Singular Value Decomposition) mapping one embedding manifold to another,
13421
- * grounded in the Johnson-Lindenstrauss Lemma. As a ...Contract suffix, this
13422
- * enforces rigid mathematical boundaries globally.
13108
+ * AGENT INSTRUCTION: Bridges the Neurosymbolic divide by mapping discrete Satisfiability Modulo Theories (SMT) or Lean4 logic proofs into continuous, differentiable loss gradients.
13423
13109
  *
13424
- * CAUSAL AFFORDANCE: Authorizes the orchestrator to translate latent vectors
13425
- * across zero-trust network boundaries, bridging incompatible LLM spaces. The
13426
- * source_matrix_name and target_matrix_name (both max_length=2000) identify the
13427
- * origin and destination geometries.
13110
+ * CAUSAL AFFORDANCE: Allows the backpropagation engine to apply a continuous, differentiable penalty (relaxation) to the LLM's probability mass when it violates the formal syntactic rules encoded in the `formal_syntax_smt` representation.
13428
13111
  *
13429
- * EPISTEMIC BOUNDS: Translation fidelity is physically proven by the
13430
- * isometry_preservation_score (ge=0.0, le=1.0), ensuring Earth Mover's Distance
13431
- * preservation. Cryptographic integrity is locked via projection_matrix_hash
13432
- * (SHA-256 regex ^[a-f0-9]{64}$).
13112
+ * EPISTEMIC BOUNDS: The geometric penalty is clamped by `relaxation_epsilon` (`ge=0.0, le=1.0`) to prevent gradient explosion. The logical schema is locked to the 128-char `constraint_cid` CID to structurally bound string evaluation scope.
13433
13113
  *
13434
- * MCP ROUTING TRIGGERS: Singular Value Decomposition, Johnson-Lindenstrauss
13435
- * Lemma, Tensor Projection, Earth Mover's Distance, Latent Translation
13114
+ * MCP ROUTING TRIGGERS: Satisfiability Modulo Theories, Neurosymbolic Relaxation, Differentiable Theorem Proving, Probabilistic Logic Networks, Continuous Penalty
13436
13115
  */
13437
- export interface DimensionalProjectionContract {
13438
- source_matrix_name: SourceMatrixName;
13439
- target_matrix_name: TargetMatrixName;
13440
- projection_matrix_hash: ProjectionMatrixHash;
13441
- isometry_preservation_score: IsometryPreservationScore1;
13116
+ export interface DifferentiableLogicPolicy {
13117
+ constraint_cid: ConstraintCid;
13118
+ formal_syntax_smt: FormalSyntaxSmt;
13119
+ relaxation_epsilon: RelaxationEpsilon;
13442
13120
  }
13443
13121
  /**
13444
13122
  * CoReason Shared Kernel Ontology
@@ -13997,7 +13675,6 @@ export interface EpistemicQuarantineSnapshot {
13997
13675
  * The mathematically bounded subgraph of capabilities currently available to the agent.
13998
13676
  */
13999
13677
  affordance_projection?: OntologicalSurfaceProjectionManifest | null;
14000
- capability_attestations?: CapabilityAttestations;
14001
13678
  }
14002
13679
  /**
14003
13680
  * The ephemeral latent variables and environmental bindings currently active in Epistemic Quarantine.
@@ -14059,58 +13736,6 @@ export interface ProceduralMetadataManifest {
14059
13736
  */
14060
13737
  latent_vector_coordinate?: VectorEmbeddingState | null;
14061
13738
  }
14062
- /**
14063
- * CoReason Shared Kernel Ontology
14064
- *
14065
- * AGENT INSTRUCTION: An immutable cryptographic receipt representing an Object Capability (OCap) grant within a Federated Identity Management (FIM) framework.
14066
- *
14067
- * CAUSAL AFFORDANCE: Unlocks cross-domain graph traversal, cryptographically proving to the target topology that the swarm agent is authorized to establish an active connection governed by the SLA.
14068
- *
14069
- * EPISTEMIC BOUNDS: Locked to a 128-char `attestation_cid`. The `@model_validator` `enforce_restricted_vault_locks` mathematically enforces cross-schema invariants: if `governing_sla.max_permitted_classification` is 'restricted', the `authorized_session` MUST contain explicit `allowed_vault_keys`.
14070
- *
14071
- * MCP ROUTING TRIGGERS: Object Capability Model, Federated Identity Management, Cross-Domain Federation, Capability Attestation, Zero-Trust Execution
14072
- */
14073
- export interface FederatedCapabilityAttestationReceipt {
14074
- attestation_cid: AttestationCid;
14075
- /**
14076
- * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
14077
- */
14078
- target_topology_cid: string;
14079
- authorized_session: SecureSubSessionState1;
14080
- governing_sla: FederatedBilateralSLA1;
14081
- }
14082
- /**
14083
- * CoReason Shared Kernel Ontology
14084
- *
14085
- * AGENT INSTRUCTION: Formalizes the Principle of Least Privilege (PoLP) and Time-Based Access Control (TBAC) for handling high-entropy cryptographic secrets within a declarative N-dimensional coordinate.
14086
- *
14087
- * CAUSAL AFFORDANCE: Authorizes a temporary, mathematically bounded partition where the agent can access unredacted enterprise vault keys without permanently leaking them into the global EpistemicLedgerState.
14088
- *
14089
- * EPISTEMIC BOUNDS: The temporal exposure window is physically clamped by `max_ttl_seconds` (`ge=1, le=18446744073709551615`), enforcing an absolute maximum 1-hour session. Spatial access is geometrically restricted to `allowed_vault_keys` (`max_length=100`), deterministically sorted by `@model_validator` for RFC 8785 hashing.
14090
- *
14091
- * MCP ROUTING TRIGGERS: Principle of Least Privilege, Time-Based Access Control, Secret Vaulting, Ephemeral Partition, Cryptographic Isolation
14092
- */
14093
- export interface SecureSubSessionState1 {
14094
- session_cid: SessionCid;
14095
- allowed_vault_keys: AllowedVaultKeys;
14096
- max_ttl_seconds: MaxTtlSeconds1;
14097
- description: Description4;
14098
- }
14099
- /**
14100
- * The structural and physical boundary constraints for querying this target.
14101
- */
14102
- export interface FederatedBilateralSLA1 {
14103
- receiving_tenant_cid: ReceivingTenantCid1;
14104
- max_permitted_classification: SemanticClassificationProfile2;
14105
- liability_limit_magnitude: LiabilityLimitMagnitude;
14106
- permitted_geographic_regions?: PermittedGeographicRegions;
14107
- require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
14108
- max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
14109
- /**
14110
- * The quantum-resistant signature securing the multi-tenant structural boundary.
14111
- */
14112
- pq_signature?: PostQuantumSignatureReceipt | null;
14113
- }
14114
13739
  /**
14115
13740
  * CoReason Shared Kernel Ontology
14116
13741
  *
@@ -14226,7 +13851,7 @@ export interface EpistemicTopologicalProofManifest1 {
14226
13851
  export interface ExecutionEnvelopeState {
14227
13852
  trace_context: TraceContextState;
14228
13853
  state_vector: StateVectorProfile;
14229
- payload: Payload2;
13854
+ payload: Payload3;
14230
13855
  }
14231
13856
  /**
14232
13857
  * Represents the Reader/Writer monad for causality and recursion.
@@ -14254,223 +13879,9 @@ export interface ImmutableMatrix {
14254
13879
  /**
14255
13880
  * Represents the pure value payload data structure, domain-specific.
14256
13881
  */
14257
- export interface Payload2 {
13882
+ export interface Payload3 {
14258
13883
  [k: string]: unknown;
14259
13884
  }
14260
- /**
14261
- * CoReason Shared Kernel Ontology
14262
- *
14263
- * AGENT INSTRUCTION: Formalizes a discrete computational vertex within a Merkle-DAG execution trace, binding raw data inputs to deterministic outputs. As an append-only coordinate, it guarantees algorithmic reproducibility.
14264
- *
14265
- * CAUSAL AFFORDANCE: Permits the orchestrator to cryptographically re-evaluate, replay, or slash execution branches by guaranteeing all computational inputs, outputs, and parent pointers are deterministically serialized.
14266
- *
14267
- * EPISTEMIC BOUNDS: The `@model_validator` mathematically guarantees the `node_hash` via RFC 8785 canonical JSON serialization, trapping any non-deterministic dictionary properties. Orphaned lineages are structurally blocked.
14268
- *
14269
- * MCP ROUTING TRIGGERS: Merkle-DAG, RFC 8785 Canonicalization, Execution Trace, Cryptographic Determinism, Directed Acyclic Graph
14270
- */
14271
- export interface ExecutionNodeReceipt {
14272
- request_cid: RequestCid1;
14273
- parent_request_cid?: ParentRequestCid;
14274
- root_request_cid?: RootRequestCid;
14275
- /**
14276
- * The inputs provided to the execution node. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
14277
- */
14278
- inputs: string | number | boolean | JsonPrimitiveState[] | {
14279
- [k: string]: JsonPrimitiveState;
14280
- } | EpistemicProxyStateAny | null;
14281
- /**
14282
- * The outputs generated by the execution node. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
14283
- */
14284
- outputs: string | number | boolean | JsonPrimitiveState[] | {
14285
- [k: string]: JsonPrimitiveState;
14286
- } | EpistemicProxyStateAny | null;
14287
- parent_hashes?: ParentHashes;
14288
- node_hash?: NodeHash;
14289
- }
14290
- /**
14291
- * CoReason Shared Kernel Ontology
14292
- *
14293
- * AGENT INSTRUCTION: Implements the Dapper distributed tracing model to deterministically map the causal execution DAG of the swarm. As an append-only coordinate on the Merkle-DAG, it mathematically binds parent-child RPC calls.
14294
- *
14295
- * CAUSAL AFFORDANCE: Unlocks global observability by mapping causal edges across the zero-trust network, enabling exact bottleneck detection and graph reconstruction.
14296
- *
14297
- * EPISTEMIC BOUNDS: Temporal boundaries are rigidly constrained by `start_time_unix_nano` (`ge=0`). The `@model_validator` enforces Allen's Interval Algebra to physically guarantee `end_time` cannot precede `start_time`. `events` array sorted by time.
14298
- *
14299
- * MCP ROUTING TRIGGERS: Dapper Tracing Model, Distributed Causal DAG, Allen's Interval Algebra, OpenTelemetry, Execution Provenance
14300
- */
14301
- export interface ExecutionSpanReceipt {
14302
- trace_cid: TraceCid3;
14303
- span_cid: SpanCid1;
14304
- parent_span_cid?: ParentSpanCid1;
14305
- name: Name1;
14306
- /**
14307
- * The role of the span.
14308
- */
14309
- kind?: "client" | "server" | "producer" | "consumer" | "internal";
14310
- start_time_unix_nano: StartTimeUnixNano;
14311
- end_time_unix_nano?: EndTimeUnixNano;
14312
- /**
14313
- * The execution health flag.
14314
- */
14315
- status?: "unset" | "ok" | "error";
14316
- events?: Events;
14317
- }
14318
- /**
14319
- * CoReason Shared Kernel Ontology
14320
- *
14321
- * AGENT INSTRUCTION: Represents a discrete, point-in-time OpenTelemetry annotation within a broader Dapper-style `ExecutionSpanReceipt`.
14322
- *
14323
- * CAUSAL AFFORDANCE: Provides fine-grained, localized state-machine logging within an active span, anchoring semantic attributes to a precise nanosecond coordinate without spawning a new causal branch.
14324
- *
14325
- * EPISTEMIC BOUNDS: `timestamp_unix_nano` physically bounded `[0, 253402300799000000000]`. The `attributes` payload strictly constrained by a dictionary with string keys (`max_length=255`) to prevent dictionary bombing.
14326
- *
14327
- * MCP ROUTING TRIGGERS: Span Annotation, Point-in-Time Event, Micro-State Logging, OpenTelemetry, Telemetry Serialization
14328
- */
14329
- export interface SpanEvent {
14330
- name: Name2;
14331
- timestamp_unix_nano: TimestampUnixNano;
14332
- attributes?: Attributes;
14333
- }
14334
- /**
14335
- * Typed metadata bound to the event.
14336
- */
14337
- export interface Attributes {
14338
- [k: string]: JsonPrimitiveState;
14339
- }
14340
- /**
14341
- * CoReason Shared Kernel Ontology
14342
- *
14343
- * AGENT INSTRUCTION: Defines the zero-trust structural boundary for multi-tenant federation,
14344
- * securing cross-boundary graph traversal against Shor's algorithm via an optional
14345
- * PostQuantumSignatureReceipt. As an ...SLA suffix, this object enforces rigid mathematical
14346
- * boundaries that the orchestrator must respect globally.
14347
- *
14348
- * CAUSAL AFFORDANCE: Unlocks cross-swarm graph bridging by enforcing strict liability,
14349
- * physical location routing, semantic data classification constraints via
14350
- * max_permitted_classification, and ESG carbon intensity limits.
14351
- *
14352
- * EPISTEMIC BOUNDS: Economically constrained by liability_limit_magnitude (ge=0,
14353
- * le=18446744073709551615). ESG limits physically bind the node grid to the optional
14354
- * max_permitted_grid_carbon_intensity (ge=0.0, le=18446744073709551615.0). The permitted_geographic_regions
14355
- * array is deterministically sorted via @model_validator for RFC 8785 canonical hashing.
14356
- *
14357
- * MCP ROUTING TRIGGERS: Zero-Trust Architecture, Post-Quantum Cryptography, Federated
14358
- * Learning, Bilateral SLA, Data Residency
14359
- */
14360
- export interface FederatedBilateralSLA2 {
14361
- receiving_tenant_cid: ReceivingTenantCid1;
14362
- max_permitted_classification: SemanticClassificationProfile2;
14363
- liability_limit_magnitude: LiabilityLimitMagnitude;
14364
- permitted_geographic_regions?: PermittedGeographicRegions;
14365
- require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
14366
- max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
14367
- /**
14368
- * The quantum-resistant signature securing the multi-tenant structural boundary.
14369
- */
14370
- pq_signature?: PostQuantumSignatureReceipt | null;
14371
- }
14372
- /**
14373
- * CoReason Shared Kernel Ontology
14374
- *
14375
- * AGENT INSTRUCTION: Triggers the zero-copy streaming of a binary or metadata blob from a discovered peer based on its Content Identifier (CID).
14376
- *
14377
- * CAUSAL AFFORDANCE: Physically executes the download of decentralized assets into the local embedded LanceDB and WASM runtime.
14378
- *
14379
- * EPISTEMIC BOUNDS: Bounded to strict RFC 8785 CIDs.
14380
- *
14381
- * MCP ROUTING TRIGGERS: Content Addressing, Zero-Copy Streaming, Decentralized Fetch, IPFS, FlatBuffers
14382
- */
14383
- export interface FederatedCIDFetchIntent {
14384
- topology_class?: TopologyClass127;
14385
- /**
14386
- * A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
14387
- */
14388
- target_cid: string;
14389
- timeout_ms?: TimeoutMs1;
14390
- }
14391
- /**
14392
- * CoReason Shared Kernel Ontology
14393
- *
14394
- * AGENT INSTRUCTION: Governs the B2B Multi-Swarm Gossip Protocol, establishing the initial
14395
- * Model Context Protocol (MCP) broadcast endpoints for external discovery. As a ...Manifest
14396
- * suffix, this is a declarative, frozen snapshot of N-dimensional geometry at a specific
14397
- * point in time.
14398
- *
14399
- * CAUSAL AFFORDANCE: Emits a structured tensor beacon to neighboring swarms, authorizing
14400
- * the initiation of an OntologicalHandshakeReceipt if the supported_ontologies hashes
14401
- * mathematically overlap.
14402
- *
14403
- * EPISTEMIC BOUNDS: Geometrically capped by broadcast_endpoints and supported_ontologies
14404
- * string arrays (each max_length=1000). Both are explicitly sorted by the
14405
- * @model_validator (broadcast_endpoints by str key, supported_ontologies alphabetically)
14406
- * to guarantee invariant canonical RFC 8785 hashing across distinct environments.
14407
- *
14408
- * MCP ROUTING TRIGGERS: Gossip Protocol, Peer-to-Peer Discovery, Decentralized Federation,
14409
- * Semantic Broadcasting, Tensor Beacon
14410
- */
14411
- export interface FederatedDiscoveryManifest {
14412
- broadcast_endpoints: BroadcastEndpoints;
14413
- supported_ontologies: SupportedOntologies;
14414
- }
14415
- /**
14416
- * CoReason Shared Kernel Ontology
14417
- *
14418
- * AGENT INSTRUCTION: Governs the spatial and temporal physics of Parameter-Efficient Fine-Tuning (PEFT) and Low-Rank Adaptation (LoRA), managing the Von Neumann bottleneck in distributed swarm VRAM.
14419
- *
14420
- * CAUSAL AFFORDANCE: Instructs the tensor execution engine to hot-swap external safetensors weight matrices into active GPU memory, modifying the foundational activation circuits.
14421
- *
14422
- * EPISTEMIC BOUNDS: The spatial geometry is physically capped by `vram_footprint_bytes` (`gt=0, le=18446744073709551615`). The temporal presence is mathematically guillotined by `ephemeral_ttl_ms` (`gt=0, le=18446744073709551615`). Supply-chain integrity is anchored by `adapter_merkle_root` (SHA-256).
14423
- *
14424
- * MCP ROUTING TRIGGERS: Low-Rank Adaptation, PEFT, LRU Cache Eviction, Tensor Hot-Swapping, GPU VRAM Management
14425
- */
14426
- export interface FederatedPeftContract {
14427
- adapter_merkle_root: AdapterMerkleRoot;
14428
- vram_footprint_bytes: VramFootprintBytes;
14429
- ephemeral_ttl_ms: EphemeralTtlMs;
14430
- cache_priority_weight: CachePriorityWeight;
14431
- }
14432
- /**
14433
- * CoReason Shared Kernel Ontology
14434
- *
14435
- * AGENT INSTRUCTION: Simplifies the creation of a secure federated network link across a Zero-Trust boundary.
14436
- *
14437
- * CAUSAL AFFORDANCE: Physically authorizes the orchestrator to forge a secure federated network link across a Zero-Trust boundary.
14438
- *
14439
- * EPISTEMIC BOUNDS: Bounded to strict JSON schema validation constraints defined in the manifest.
14440
- *
14441
- * MCP ROUTING TRIGGERS: Federated Security, Zero-Trust Boundary, Network Link, Macro Manifest
14442
- */
14443
- export interface FederatedSecurityMacroManifest {
14444
- target_endpoint_uri: TargetEndpointUri;
14445
- required_clearance: SemanticClassificationProfile3;
14446
- max_liability_budget: MaxLiabilityBudget;
14447
- /**
14448
- * Content-addressed identity of the capability bundle for zero-trust verification.
14449
- */
14450
- content_hash?: BundleContentHashState | null;
14451
- }
14452
- /**
14453
- * CoReason Shared Kernel Ontology
14454
- *
14455
- * AGENT INSTRUCTION: Establishes a Distributed Systems Theory cryptographic
14456
- * partition, mapping an external swarm's execution state into a localized,
14457
- * sandboxed coordinate. As a ...Snapshot suffix, this is a frozen N-dimensional
14458
- * coordinate of ephemeral context.
14459
- *
14460
- * CAUSAL AFFORDANCE: Exposes the topological footprint of an exogenous network
14461
- * to the local orchestrator, authorizing cross-boundary telemetry and capability
14462
- * exchange without merging underlying working contexts.
14463
- *
14464
- * EPISTEMIC BOUNDS: The coordinate is restricted by the optional topology_cid
14465
- * (str | None, default=None, 128-char CID regex ^[a-zA-Z0-9_.:-]+$),
14466
- * mathematically severing unauthorized topological mutations.
14467
- *
14468
- * MCP ROUTING TRIGGERS: Distributed Systems Theory, Federated Namespace,
14469
- * Zero-Trust Architecture, Cross-Swarm Federation, Sandbox Partition
14470
- */
14471
- export interface FederatedStateSnapshot {
14472
- topology_cid?: TopologyCid1;
14473
- }
14474
13885
  /**
14475
13886
  * CoReason Shared Kernel Ontology
14476
13887
  *
@@ -14832,13 +14243,13 @@ export interface KineticBudgetPolicy {
14832
14243
  /**
14833
14244
  * CoReason Shared Kernel Ontology
14834
14245
  *
14835
- * AGENT INSTRUCTION: Formalizes a Lattice-Based Access Control (LBAC) and Zero-Trust Architecture perimeter, restricting JSON-RPC capability mounts from foreign subgraphs.
14246
+ * AGENT INSTRUCTION: Formalizes a SPIFFE/SPIRE Service Mesh and Zero-Trust Architecture perimeter, restricting JSON-RPC capability mounts from foreign subgraphs.
14836
14247
  *
14837
- * CAUSAL AFFORDANCE: Acts as a structural firewall that physically prevents the orchestrator from binding unauthorized external tools, resources, or prompts into the active agent's CognitiveActionSpaceManifest.
14248
+ * CAUSAL AFFORDANCE: Acts as a structural firewall that physically prevents the orchestrator from binding unauthorized external tools, resources, or prompts into the active agent's CognitiveActionSpaceManifest via mTLS delegation.
14838
14249
  *
14839
14250
  * EPISTEMIC BOUNDS: The boundary is geometrically enforced via `StringConstraints` (`max_length=2000` for `authorized_capability_array`, `allowed_resources`, `allowed_prompts`). The `@model_validator` strictly sorts all arrays alphabetically to mathematically guarantee RFC 8785 Canonical Hashing.
14840
14251
  *
14841
- * MCP ROUTING TRIGGERS: Zero-Trust Architecture, Lattice-Based Access Control, Least Privilege, RPC Firewall, Bipartite Partitioning
14252
+ * MCP ROUTING TRIGGERS: Zero-Trust Architecture, SPIFFE/SPIRE, Envoy Service Mesh, Least Privilege, RPC Firewall
14842
14253
  */
14843
14254
  export interface MCPCapabilityWhitelistPolicy1 {
14844
14255
  authorized_capability_array?: AuthorizedCapabilityArray;
@@ -14987,46 +14398,10 @@ export interface MutationPolicy1 {
14987
14398
  export interface NDimensionalTensorManifest {
14988
14399
  structural_format: TensorStructuralFormatProfile;
14989
14400
  shape: Shape;
14990
- vram_footprint_bytes: VramFootprintBytes1;
14401
+ vram_footprint_bytes: VramFootprintBytes;
14991
14402
  merkle_root: MerkleRoot;
14992
14403
  storage_uri: StorageUri;
14993
14404
  }
14994
- /**
14995
- * CoReason Shared Kernel Ontology
14996
- *
14997
- * AGENT INSTRUCTION: A cryptographically frozen historical fact representing the absolute
14998
- * mathematical alignment of two swarms' latent vector spaces prior to establishing a shared
14999
- * epistemic blackboard. As a ...Receipt suffix, this is an append-only coordinate on the
15000
- * Merkle-DAG that the LLM must never hallucinate a mutation to.
15001
- *
15002
- * CAUSAL AFFORDANCE: Authorizes the physical bridging of two independent N-dimensional
15003
- * semantic spaces. If native geometries are incommensurable, it structurally demands the
15004
- * application of a DimensionalProjectionContract (applied_projection). The alignment_status
15005
- * Literal ["aligned", "projected", "fallback_triggered", "incommensurable"] records the
15006
- * final verdict.
15007
- *
15008
- * EPISTEMIC BOUNDS: Semantic isometry is quantified via measured_cosine_similarity, strictly
15009
- * clamped between [ge=-1.0, le=1.0]. The participant_node_cids array (min_length=2) is
15010
- * deterministically sorted via @model_validator to prevent Byzantine replay anomalies
15011
- * during cross-swarm Merkle hashing.
15012
- *
15013
- * MCP ROUTING TRIGGERS: Earth Mover's Distance, Cosine Similarity, Vector Space Isometry,
15014
- * Latent Alignment, Holographic Graph Projection
15015
- */
15016
- export interface OntologicalHandshakeReceipt {
15017
- handshake_cid: HandshakeCid1;
15018
- participant_node_cids: ParticipantNodeCids1;
15019
- measured_cosine_similarity: MeasuredCosineSimilarity1;
15020
- alignment_status: AlignmentStatus;
15021
- /**
15022
- * The projection applied if the agents natively used different embedding dimensionalities.
15023
- */
15024
- applied_projection?: DimensionalProjectionContract | null;
15025
- /**
15026
- * Isolated holographic clone of remote swarm state for safe cross-boundary evaluation.
15027
- */
15028
- remote_state_snapshot?: FederatedStateSnapshot | null;
15029
- }
15030
14405
  /**
15031
14406
  * CoReason Shared Kernel Ontology
15032
14407
  *
@@ -15044,6 +14419,22 @@ export interface PermissionBoundaryPolicy1 {
15044
14419
  file_system_mutation_forbidden: FileSystemMutationForbidden;
15045
14420
  auth_requirements?: AuthRequirements;
15046
14421
  }
14422
+ /**
14423
+ * CoReason Shared Kernel Ontology
14424
+ *
14425
+ * AGENT INSTRUCTION: Implements NIST FIPS Post-Quantum Cryptography (PQC), utilizing lattice-based or stateless hash-based structures to guarantee long-term topological integrity on the Merkle-DAG.
14426
+ *
14427
+ * CAUSAL AFFORDANCE: Secures the causal execution graph and Bilateral SLAs against temporal decryption attacks (Harvest Now, Decrypt Later) via Shor's algorithm executed on fault-tolerant quantum computers.
14428
+ *
14429
+ * EPISTEMIC BOUNDS: To accommodate massive dimensional geometry, `pq_signature_blob` is structurally bound to a `100000`-byte `max_length`. `pq_algorithm` is restricted to the Literal set `["ml-dsa", "slh-dsa", "falcon"]`. `public_key_cid` is a 128-char CID.
14430
+ *
14431
+ * MCP ROUTING TRIGGERS: Post-Quantum Cryptography, ML-DSA, SLH-DSA, Shor's Algorithm Resistance, Lattice-based Cryptography
14432
+ */
14433
+ export interface PostQuantumSignatureReceipt {
14434
+ pq_algorithm: PqAlgorithm;
14435
+ public_key_cid: PublicKeyCid1;
14436
+ pq_signature_blob: PqSignatureBlob;
14437
+ }
15047
14438
  /**
15048
14439
  * CoReason Shared Kernel Ontology
15049
14440
  *
@@ -15233,24 +14624,6 @@ export interface SimulationConvergenceSLA1 {
15233
14624
  export interface SimulationEscrowContract1 {
15234
14625
  locked_magnitude: LockedMagnitude;
15235
14626
  }
15236
- /**
15237
- * CoReason Shared Kernel Ontology
15238
- *
15239
- * AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
15240
- *
15241
- * CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
15242
- *
15243
- * EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
15244
- *
15245
- * MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
15246
- */
15247
- export interface SpatialHardwareProfile1 {
15248
- compute_tier?: ComputeTier;
15249
- min_vram_gb?: MinVramGb;
15250
- coreason_network_mode?: CoreasonNetworkMode;
15251
- accelerator_type?: AcceleratorType;
15252
- provider_whitelist?: ProviderWhitelist;
15253
- }
15254
14627
  /**
15255
14628
  * CoReason Shared Kernel Ontology
15256
14629
  *
@@ -15516,22 +14889,6 @@ export interface TraceContextState1 {
15516
14889
  parent_span_cid?: ParentSpanCid;
15517
14890
  causal_clock?: CausalClock;
15518
14891
  }
15519
- /**
15520
- * CoReason Shared Kernel Ontology
15521
- *
15522
- * AGENT INSTRUCTION: Functions as a deterministic serialization envelope for flushing Dapper-style trace subgraphs to external observability sinks.
15523
- *
15524
- * CAUSAL AFFORDANCE: Authorizes the mass export of `ExecutionSpanReceipt` objects across the network boundary, structurally binding disconnected spans into a coherent `batch_cid` for downstream reconstruction.
15525
- *
15526
- * EPISTEMIC BOUNDS: Bounded by a rigid `batch_cid` (CID regex `^[a-zA-Z0-9_.:-]+$`). The `spans` array is deterministically sorted by `span_cid` via a `@model_validator` to mathematically prevent Byzantine replay anomalies.
15527
- *
15528
- * MCP ROUTING TRIGGERS: Trace Serialization, Telemetry Export, Batch Flushing, DAG Reconstruction, Canonical Egress
15529
- */
15530
- export interface TraceExportManifest {
15531
- batch_cid: BatchCid;
15532
- spans?: Spans;
15533
- execution_nodes?: ExecutionNodes;
15534
- }
15535
14892
  /**
15536
14893
  * CoReason Shared Kernel Ontology
15537
14894
  *
@@ -15605,7 +14962,7 @@ export interface VolumetricBoundingProfile1 {
15605
14962
  *
15606
14963
  * CAUSAL AFFORDANCE: Physically initializes the execution DAG. This structural lock guarantees that any graph execution is mathematically anchored to a CoReason Genesis Block via `genesis_provenance`; stripping this violates Topological Consistency.
15607
14964
  *
15608
- * EPISTEMIC BOUNDS: The `@model_validator` `enforce_lbac_dominance` mathematically interlocks the local LBAC bounds with federated SLA egress bounds, ensuring federated clearance never exceeds local workflow bounds. `allowed_semantic_classifications` sorted for RFC 8785.
14965
+ * EPISTEMIC BOUNDS: The topology dictates execution constraints natively without relying on legacy federated dominance validation.
15609
14966
  *
15610
14967
  * MCP ROUTING TRIGGERS: Topos Theory, Cybernetics, Execution Envelope, Macroscopic Topology, Viable System Model
15611
14968
  */
@@ -15629,15 +14986,6 @@ export interface WorkflowManifest {
15629
14986
  * The absolute maximum enterprise risk threshold permitted for this topology.
15630
14987
  */
15631
14988
  max_risk_tolerance?: RiskLevelPolicy | null;
15632
- allowed_semantic_classifications?: AllowedSemanticClassifications;
15633
- /**
15634
- * The broadcast protocol for B2B multi-swarm discovery.
15635
- */
15636
- federated_discovery?: FederatedDiscoveryManifest | null;
15637
- /**
15638
- * The B2B Service Level Agreement contract that must be mathematically satisfied before multi-tenant graph coupling.
15639
- */
15640
- federated_sla?: FederatedBilateralSLA2 | null;
15641
14989
  /**
15642
14990
  * The quantum-resistant signature securing the root execution graph.
15643
14991
  */