@coreason-ai/coreason-manifest 0.53.0 → 0.54.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/ontology.d.ts +647 -1362
  2. package/package.json +1 -1
@@ -44,11 +44,11 @@ export type TimeDerivativeVector = string | null;
44
44
  */
45
45
  export type SteeringVectorHash = string;
46
46
  /**
47
- * The specific transformer layer indices where this vector must be applied.
47
+ * The specific TransformerLens hook points (e.g., 'blocks.12.hook_resid_post') where this vector must be applied.
48
48
  *
49
49
  * @minItems 1
50
50
  */
51
- export type InjectionLayers = [number, ...number[]];
51
+ export type TargetHookPoints = [string, ...string[]];
52
52
  /**
53
53
  * The mathematical magnitude/strength of the injection (can be negative for ablation).
54
54
  */
@@ -81,33 +81,10 @@ export type ExpectedInformationGain = number;
81
81
  * The maximum economic expenditure authorized to run this specific scientific test.
82
82
  */
83
83
  export type ExecutionCostBudgetMagnitude = number;
84
- export type EpochCid = string;
85
- export type TargetObjectiveCid = string | null;
86
- /**
87
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
88
- */
89
- export type EventCid = string;
90
- /**
91
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
92
- */
93
- export type PriorEventHash = string | null;
94
- /**
95
- * Causal Ancestry markers required to resolve decentralized event ordering.
96
- */
97
- export type Timestamp = number;
98
- export type TopologyClass = "epistemic_rejection";
99
- export type ReceiptCid = string;
100
- export type FailedProjectionCid = string;
101
- export type ViolatedAlgebraicConstraint = string;
102
- export type KlDivergenceToValidity = number;
103
- export type StochasticMutationGradient = string;
104
- export type RejectionHistory = EpistemicRejectionReceipt[];
105
- export type CurrentFreeEnergy = number;
106
- export type EpochStatus = "active_inference_loop";
107
84
  /**
108
85
  * Discriminator for breaking deadlocks within a CouncilTopologyManifest.
109
86
  */
110
- export type TopologyClass1 = "forced_adjudication";
87
+ export type TopologyClass = "forced_adjudication";
111
88
  /**
112
89
  * The conflicting claim IDs or proposals the human must choose between.
113
90
  *
@@ -133,16 +110,16 @@ export type TimeoutAction = "rollback" | "proceed_default" | "terminate";
133
110
  /**
134
111
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
135
112
  */
136
- export type EventCid1 = string;
113
+ export type EventCid = string;
137
114
  /**
138
115
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
139
116
  */
140
- export type PriorEventHash1 = string | null;
117
+ export type PriorEventHash = string | null;
141
118
  /**
142
119
  * Causal Ancestry markers required to resolve decentralized event ordering.
143
120
  */
144
- export type Timestamp1 = number;
145
- export type TopologyClass2 = "adjudication_receipt";
121
+ export type Timestamp = number;
122
+ export type TopologyClass1 = "adjudication_receipt";
146
123
  /**
147
124
  * The cryptographic pointer to the rubric dictating adjudication.
148
125
  */
@@ -246,7 +223,7 @@ export type EmulationFidelityTarget = number;
246
223
  /**
247
224
  * Discriminator for adversarial macro.
248
225
  */
249
- export type TopologyClass3 = "macro_adversarial";
226
+ export type TopologyClass2 = "macro_adversarial";
250
227
  /**
251
228
  * Nodes assigned to the Blue Team.
252
229
  *
@@ -324,7 +301,7 @@ export type CredentialPresentations = VerifiableCredentialPresentationReceipt[];
324
301
  /**
325
302
  * The discriminative topological boundary for agent bid intents.
326
303
  */
327
- export type TopologyClass4 = "agent_bid";
304
+ export type TopologyClass3 = "agent_bid";
328
305
  /**
329
306
  * The NodeCIDState of the bidder.
330
307
  */
@@ -369,7 +346,7 @@ export type ThermodynamicBurnRate = number | null;
369
346
  * The normalized Shannon Entropy of the active execution, mapped to UI color gradients (e.g., high entropy = amber warning).
370
347
  */
371
348
  export type EpistemicEntropyScore = number | null;
372
- export type TopologyClass5 = "analogical_mapping_task";
349
+ export type TopologyClass4 = "analogical_mapping_task";
373
350
  /**
374
351
  * Unique identifier for this lateral thinking task.
375
352
  */
@@ -402,7 +379,7 @@ export type AnyActionSpaceCapability = SpatialToolManifest | MCPServerManifest |
402
379
  /**
403
380
  * Discriminator type for a native tool.
404
381
  */
405
- export type TopologyClass6 = "native_tool";
382
+ export type TopologyClass5 = "native_tool";
406
383
  /**
407
384
  * The deterministically bounded structural identifier mapping this capability within the zero-trust manifold.
408
385
  */
@@ -500,7 +477,7 @@ export type IsPreemptible = boolean;
500
477
  /**
501
478
  * Discriminator type for an MCP server.
502
479
  */
503
- export type TopologyClass7 = "mcp_server";
480
+ export type TopologyClass6 = "mcp_server";
504
481
  /**
505
482
  * A unique cryptographic identifier (CID) for this server instance.
506
483
  */
@@ -513,7 +490,7 @@ export type MCPTransportProfile = StdioTransportProfile | SSETransportProfile |
513
490
  /**
514
491
  * Type of transport.
515
492
  */
516
- export type TopologyClass8 = "stdio";
493
+ export type TopologyClass7 = "stdio";
517
494
  /**
518
495
  * The command executable to run (e.g., 'node', 'python').
519
496
  */
@@ -527,7 +504,7 @@ export type Args = string[];
527
504
  /**
528
505
  * Type of transport.
529
506
  */
530
- export type TopologyClass9 = "sse";
507
+ export type TopologyClass8 = "sse";
531
508
  /**
532
509
  * The HTTP URL endpoint for the SSE connection.
533
510
  */
@@ -535,7 +512,7 @@ export type Uri = string;
535
512
  /**
536
513
  * Type of transport.
537
514
  */
538
- export type TopologyClass10 = "http";
515
+ export type TopologyClass9 = "http";
539
516
  /**
540
517
  * The HTTP URL endpoint for the stateless connection.
541
518
  */
@@ -579,7 +556,7 @@ export type StateSynchronizationOptics = OpticalMappingContract[];
579
556
  /**
580
557
  * Discriminator type for an ephemeral namespace partition.
581
558
  */
582
- export type TopologyClass11 = "ephemeral_partition";
559
+ export type TopologyClass10 = "ephemeral_partition";
583
560
  /**
584
561
  * Unique identifier for this ephemeral partition.
585
562
  */
@@ -613,7 +590,7 @@ export type AllowSubprocessSpawning = boolean;
613
590
  /**
614
591
  * Discriminator for a zero-trust contract.
615
592
  */
616
- export type TopologyClass12 = "zero_trust_contract";
593
+ export type TopologyClass11 = "zero_trust_contract";
617
594
  /**
618
595
  * UUIDv7 mapping to the ledger.
619
596
  */
@@ -663,9 +640,9 @@ export type LatentContentHash = string;
663
640
  * The logical validity score assigned to this branch by the Process Reward Model.
664
641
  */
665
642
  export type PrmScore = number | null;
666
- export type TopologyClass13 = "thought_branch";
643
+ export type TopologyClass12 = "thought_branch";
667
644
  export type TopologyCid = string;
668
- export type TopologyClass14 = "stochastic_ensemble";
645
+ export type TopologyClass13 = "stochastic_ensemble";
669
646
  /**
670
647
  * AGENT INSTRUCTION: Categorizes the thermodynamic phase of the generative ensemble's exploration.
671
648
  *
@@ -692,7 +669,7 @@ export type EpistemicStatus = "stochastically_unbounded";
692
669
  /**
693
670
  * Discriminator for MCTS thought nodes within the strategic planning topology.
694
671
  */
695
- export type TopologyClass15 = "strategic_thought_node";
672
+ export type TopologyClass14 = "strategic_thought_node";
696
673
  /**
697
674
  * The SHA-256 hash of the parent thought node in the MCTS tree, establishing Merkle-DAG lineage. For root nodes, use the SHA-256 hash of the initial escalation intent.
698
675
  */
@@ -709,11 +686,11 @@ export type Rationale = string;
709
686
  * Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
710
687
  */
711
688
  export type HeuristicConfidence = number;
712
- export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | ChaosExperimentTask | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | FederatedDiscoveryIntent | OntologicalNormalizationIntent;
689
+ export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | ChaosExperimentTask | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent;
713
690
  /**
714
691
  * Discriminator for temporal edge invalidation.
715
692
  */
716
- export type TopologyClass16 = "temporal_invalidation";
693
+ export type TopologyClass15 = "temporal_invalidation";
717
694
  /**
718
695
  * The precise chronological coordinate terminating the truth value (Graphiti valid_to).
719
696
  */
@@ -721,7 +698,7 @@ export type InvalidationTimestamp = number;
721
698
  /**
722
699
  * Discriminator type for empirical falsification contract.
723
700
  */
724
- export type TopologyClass17 = "empirical_falsification_contract";
701
+ export type TopologyClass16 = "empirical_falsification_contract";
725
702
  /**
726
703
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this falsification test to the Merkle-DAG.
727
704
  */
@@ -738,12 +715,12 @@ export type RequiredToolName = string | null;
738
715
  * The expected data schema or regex pattern that, if returned by the tool, kills the hypothesis.
739
716
  */
740
717
  export type FalsifyingObservationSignature = string;
741
- export type TopologyClass18 = "falsification_contract";
718
+ export type TopologyClass17 = "falsification_contract";
742
719
  /**
743
720
  * The constraint oracle tasked with finding a counter-model.
744
721
  */
745
722
  export type FalsificationSolver = "clingo" | "z3";
746
- export type TopologyClass19 = "ontological_crosswalk";
723
+ export type TopologyClass18 = "ontological_crosswalk";
747
724
  export type TargetGraphCid = string;
748
725
  /**
749
726
  * The ungrounded natural language concepts extracted by the LLM.
@@ -764,7 +741,7 @@ export type MinimumIsometryThreshold = number;
764
741
  /**
765
742
  * The discriminative topological boundary for read-only informational handoffs.
766
743
  */
767
- export type TopologyClass20 = "informational";
744
+ export type TopologyClass19 = "informational";
768
745
  /**
769
746
  * The context or summary to display to the human operator.
770
747
  */
@@ -776,7 +753,7 @@ export type TimeoutAction1 = "rollback" | "proceed_default" | "terminate";
776
753
  /**
777
754
  * Discriminator for requesting specific missing context from a human.
778
755
  */
779
- export type TopologyClass21 = "drafting";
756
+ export type TopologyClass20 = "drafting";
780
757
  /**
781
758
  * The prompt explaining what information the swarm is missing.
782
759
  */
@@ -788,7 +765,7 @@ export type TimeoutAction2 = "rollback" | "proceed_default" | "terminate";
788
765
  /**
789
766
  * Discriminator for Forge-to-Claw epistemic deficit escalations.
790
767
  */
791
- export type TopologyClass22 = "escalation";
768
+ export type TopologyClass21 = "escalation";
792
769
  /**
793
770
  * The fully qualified URN of the heuristic solver capability to which the deficit is being escalated.
794
771
  */
@@ -808,7 +785,7 @@ export type ThermodynamicBudget = number;
808
785
  /**
809
786
  * Discriminator for geometric boundary of latent tool discovery.
810
787
  */
811
- export type TopologyClass23 = "semantic_discovery";
788
+ export type TopologyClass22 = "semantic_discovery";
812
789
  /**
813
790
  * The minimum cosine similarity required to authorize a capability mount.
814
791
  */
@@ -822,7 +799,7 @@ export type RequiredStructuralTypes = string[];
822
799
  /**
823
800
  * Strict discriminator for dynamic UI regrouping.
824
801
  */
825
- export type TopologyClass24 = "taxonomic_restructure";
802
+ export type TopologyClass23 = "taxonomic_restructure";
826
803
  /**
827
804
  * The SOTA mathematical heuristic used to project the new manifold.
828
805
  */
@@ -925,7 +902,7 @@ export type CompiledShaderCid = string | null;
925
902
  /**
926
903
  * Discriminator for RAG projection intent.
927
904
  */
928
- export type TopologyClass25 = "latent_projection";
905
+ export type TopologyClass24 = "latent_projection";
929
906
  /**
930
907
  * The maximum number of nodes to extract from the index.
931
908
  */
@@ -970,7 +947,7 @@ export type ParentMergeThreshold = number | null;
970
947
  /**
971
948
  * Discriminator for unstructured payload schema deduction.
972
949
  */
973
- export type TopologyClass26 = "latent_schema_inference";
950
+ export type TopologyClass25 = "latent_schema_inference";
974
951
  /**
975
952
  * The CID pointing to the TerminalBufferState or raw intercepted byte stream.
976
953
  */
@@ -990,7 +967,7 @@ export type RequireStrictValidation = boolean;
990
967
  /**
991
968
  * Discriminator type for a human directive.
992
969
  */
993
- export type TopologyClass27 = "human_directive";
970
+ export type TopologyClass26 = "human_directive";
994
971
  /**
995
972
  * The raw, unstructured human objective.
996
973
  */
@@ -1002,7 +979,7 @@ export type AllocatedBudgetMagnitude = number;
1002
979
  /**
1003
980
  * Discriminator for contextual semantic resolution.
1004
981
  */
1005
- export type TopologyClass28 = "contextual_semantic_resolution";
982
+ export type TopologyClass27 = "contextual_semantic_resolution";
1006
983
  /**
1007
984
  * An explicit cryptographic pointer to the raw SemanticRelationalVectorState pending resolution.
1008
985
  */
@@ -1026,7 +1003,7 @@ export type MinimumIsometryThreshold1 = number;
1026
1003
  /**
1027
1004
  * Discriminator for external ontology polling.
1028
1005
  */
1029
- export type TopologyClass29 = "ontology_discovery";
1006
+ export type TopologyClass28 = "ontology_discovery";
1030
1007
  /**
1031
1008
  * JSON-RPC version.
1032
1009
  */
@@ -1062,7 +1039,7 @@ export type ExpectedResponseSchema = {
1062
1039
  /**
1063
1040
  * Discriminator for semantic heuristic proposals.
1064
1041
  */
1065
- export type TopologyClass30 = "semantic_mapping_proposal";
1042
+ export type TopologyClass29 = "semantic_mapping_proposal";
1066
1043
  /**
1067
1044
  * The cryptographic Merkle-DAG anchor for the proposal.
1068
1045
  */
@@ -1088,7 +1065,7 @@ export type JustificationEvidenceCids = [NodeCIDState, ...NodeCIDState[]];
1088
1065
  /**
1089
1066
  * The discriminative topological boundary for spatial mutation intents.
1090
1067
  */
1091
- export type TopologyClass31 = "continuous_spatial_mutation";
1068
+ export type TopologyClass30 = "continuous_spatial_mutation";
1092
1069
  /**
1093
1070
  * The SpatialReferenceFrameManifest CID this coordinate is relative to, anchoring it to a physical or virtual room.
1094
1071
  */
@@ -1164,11 +1141,43 @@ export type LamportClock = number;
1164
1141
  /**
1165
1142
  * The discriminative topological boundary for compute provisioning intents.
1166
1143
  */
1167
- export type TopologyClass32 = "compute_provisioning";
1144
+ export type TopologyClass31 = "compute_provisioning";
1145
+ /**
1146
+ * The underlying orchestration engine (Mandatory: SkyPilot).
1147
+ */
1148
+ export type ProvisioningEngine = "skypilot";
1168
1149
  /**
1169
1150
  * The maximum atomic cost budget allowable for the provisioned compute.
1170
1151
  */
1171
1152
  export type MaxBudget = number;
1153
+ /**
1154
+ * The discrete architectural boundary of the node.
1155
+ */
1156
+ export type ComputeTier = string;
1157
+ /**
1158
+ * The absolute physical minimum Video RAM required to load this node's latent space.
1159
+ */
1160
+ export type MinVramGb = number;
1161
+ /**
1162
+ * The networking mode defining the P2P boundary for enterprise compliance.
1163
+ */
1164
+ export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
1165
+ /**
1166
+ * The rigid silicon precision format required to execute this node's neural circuits.
1167
+ */
1168
+ export type AcceleratorType = string;
1169
+ /**
1170
+ * The explicit array of cloud infrastructure providers authorized to run this node.
1171
+ */
1172
+ export type ProviderWhitelist = string[];
1173
+ /**
1174
+ * If True, SkyPilot will hunt for the cheapest spot instances and handle managed recovery.
1175
+ */
1176
+ export type UseSpot = boolean;
1177
+ /**
1178
+ * The idle timeout after which SkyPilot will automatically terminate the cluster.
1179
+ */
1180
+ export type AutostopIdleMinutes = number | null;
1172
1181
  /**
1173
1182
  * The minimal functional capabilities required by the requested compute.
1174
1183
  *
@@ -1178,7 +1187,7 @@ export type RequiredCapabilities = string[];
1178
1187
  /**
1179
1188
  * The discriminative topological boundary for task announcement intents.
1180
1189
  */
1181
- export type TopologyClass33 = "task_announcement";
1190
+ export type TopologyClass32 = "task_announcement";
1182
1191
  /**
1183
1192
  * Unique identifier for the required task.
1184
1193
  */
@@ -1194,7 +1203,7 @@ export type MaxBudgetMagnitude = number;
1194
1203
  /**
1195
1204
  * The type of the resilience payload.
1196
1205
  */
1197
- export type TopologyClass34 = "quarantine_intent";
1206
+ export type TopologyClass33 = "quarantine_intent";
1198
1207
  /**
1199
1208
  * The deterministic causal justification for the structural quarantine.
1200
1209
  */
@@ -1202,7 +1211,7 @@ export type Reason = string;
1202
1211
  /**
1203
1212
  * The type of the intervention payload.
1204
1213
  */
1205
- export type TopologyClass35 = "request";
1214
+ export type TopologyClass34 = "request";
1206
1215
  /**
1207
1216
  * The explicit whitelist of top-level JSON pointers mathematically open to mutation.
1208
1217
  *
@@ -1258,15 +1267,15 @@ export type LoopsExhausted = number;
1258
1267
  /**
1259
1268
  * Discriminator for an FYI intent.
1260
1269
  */
1261
- export type TopologyClass36 = "fyi";
1270
+ export type TopologyClass35 = "fyi";
1262
1271
  /**
1263
1272
  * The type of the resilience payload.
1264
1273
  */
1265
- export type TopologyClass37 = "fallback_intent";
1274
+ export type TopologyClass36 = "fallback_intent";
1266
1275
  /**
1267
1276
  * The type of the intervention payload.
1268
1277
  */
1269
- export type TopologyClass38 = "override";
1278
+ export type TopologyClass37 = "override";
1270
1279
  /**
1271
1280
  * Cryptographic audit justification for bypassing algorithmic consensus.
1272
1281
  */
@@ -1274,7 +1283,7 @@ export type Justification = string;
1274
1283
  /**
1275
1284
  * The strict discriminator for this intervention payload.
1276
1285
  */
1277
- export type TopologyClass39 = "constitutional_amendment";
1286
+ export type TopologyClass38 = "constitutional_amendment";
1278
1287
  /**
1279
1288
  * The globally unique decentralized identifier (DID) anchoring the NormativeDriftEvent that justified triggering this proposal.
1280
1289
  */
@@ -1286,7 +1295,7 @@ export type Justification1 = string;
1286
1295
  /**
1287
1296
  * Discriminator for a spatial kinematic action.
1288
1297
  */
1289
- export type TopologyClass40 = "spatial_kinematic";
1298
+ export type TopologyClass39 = "spatial_kinematic";
1290
1299
  /**
1291
1300
  * The specific kinematic interaction paradigm.
1292
1301
  */
@@ -1306,7 +1315,7 @@ export type ExpectedVisualConcept = string | null;
1306
1315
  /**
1307
1316
  * Discriminator type for System2RemediationIntent.
1308
1317
  */
1309
- export type TopologyClass41 = "system_2_remediation";
1318
+ export type TopologyClass40 = "system_2_remediation";
1310
1319
  /**
1311
1320
  * A cryptographic Lineage Watermark (CID) tracking this specific dimensional collapse.
1312
1321
  */
@@ -1348,8 +1357,8 @@ export type SupportsLazyHydration = boolean;
1348
1357
  /**
1349
1358
  * Discriminator type for substrate hydration.
1350
1359
  */
1351
- export type TopologyClass42 = "substrate_hydration";
1352
- export type TopologyClass43 = "neurosymbolic_inference";
1360
+ export type TopologyClass41 = "substrate_hydration";
1361
+ export type TopologyClass42 = "neurosymbolic_inference";
1353
1362
  /**
1354
1363
  * The continuous normalized float measuring the mathematical density of the contextual semantic envelope.
1355
1364
  */
@@ -1391,14 +1400,14 @@ export type RequiredGroundingDensity = "sparse" | "dense" | "exhaustive";
1391
1400
  */
1392
1401
  export type MinimumFidelityThreshold = number;
1393
1402
  export type ProvenanceTraceCid = string | null;
1394
- export type TopologyClass44 = "topological_projection";
1403
+ export type TopologyClass43 = "topological_projection";
1395
1404
  export type ProjectionCid = string;
1396
1405
  export type SourceSuperpositionCid = string;
1397
1406
  export type TargetTopologyProfile = "N_DIMENSIONAL_TENSOR" | "MARKOV_BLANKET" | "ACYCLIC_DIRECTED_GRAPH" | "ALGEBRAIC_RING";
1398
1407
  export type IsomorphismConfidence = number;
1399
1408
  export type LossyTranslationDivergence = string[];
1400
1409
  export type EpistemicStatus1 = "pending_deterministic_collapse";
1401
- export type TopologyClass45 = "formal_logic_premise";
1410
+ export type TopologyClass44 = "formal_logic_premise";
1402
1411
  /**
1403
1412
  * The URN identifying the specific formal dialect or solver (e.g., 'urn:coreason:dialect:lean4', 'urn:coreason:dialect:clingo').
1404
1413
  */
@@ -1411,7 +1420,7 @@ export type FormalStatement = string;
1411
1420
  * Optional auxiliary scripts required for verification, such as Lean 4 tactic proofs or Prolog ephemeral facts.
1412
1421
  */
1413
1422
  export type VerificationScript = string | null;
1414
- export type TopologyClass46 = "causal_propagation";
1423
+ export type TopologyClass45 = "causal_propagation";
1415
1424
  export type TargetGraphCid1 = string;
1416
1425
  export type TaskCid3 = string;
1417
1426
  export type MinimumNliEntailmentScore = number;
@@ -1494,7 +1503,7 @@ export type PublicationTimestamp = number | null;
1494
1503
  */
1495
1504
  export type SupportingCitations = EvidentiaryCitationState[];
1496
1505
  export type UnverifiedEdges = CausalDirectedEdgeState[];
1497
- export type TopologyClass47 = "rdf_serialization";
1506
+ export type TopologyClass46 = "rdf_serialization";
1498
1507
  export type ExportCid = string;
1499
1508
  export type TargetGraphCid2 = string;
1500
1509
  export type TargetFormat = "turtle" | "xml" | "json-ld" | "ntriples";
@@ -1503,8 +1512,8 @@ export type ShaclShapeGraphUri = string;
1503
1512
  export type ViolationAction = "DROP_GRAPH" | "STRIP_TRIPLES" | "HALT_EXECUTION";
1504
1513
  export type QueryString = string;
1505
1514
  export type TargetEndpoint = string;
1506
- export type TopologyClass48 = "sparql_query";
1507
- export type TopologyClass49 = "bounded_json_rpc_intent";
1515
+ export type TopologyClass47 = "sparql_query";
1516
+ export type TopologyClass48 = "bounded_json_rpc_intent";
1508
1517
  /**
1509
1518
  * JSON-RPC version.
1510
1519
  */
@@ -1523,7 +1532,7 @@ export type Params1 = {
1523
1532
  * Unique request identifier.
1524
1533
  */
1525
1534
  export type Id1 = string | number | null;
1526
- export type TopologyClass50 = "chaos_experiment_task";
1535
+ export type TopologyClass49 = "chaos_experiment_task";
1527
1536
  /**
1528
1537
  * The unique identifier for the chaos experiment.
1529
1538
  */
@@ -1555,19 +1564,19 @@ export type Faults = FaultInjectionProfile[];
1555
1564
  /**
1556
1565
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
1557
1566
  */
1558
- export type EventCid2 = string;
1567
+ export type EventCid1 = string;
1559
1568
  /**
1560
1569
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
1561
1570
  */
1562
- export type PriorEventHash2 = string | null;
1571
+ export type PriorEventHash1 = string | null;
1563
1572
  /**
1564
1573
  * Causal Ancestry markers required to resolve decentralized event ordering.
1565
1574
  */
1566
- export type Timestamp2 = number;
1575
+ export type Timestamp1 = number;
1567
1576
  /**
1568
1577
  * Discriminator type for an exogenous event.
1569
1578
  */
1570
- export type TopologyClass51 = "exogenous_event";
1579
+ export type TopologyClass50 = "exogenous_event";
1571
1580
  /**
1572
1581
  * Cryptographic identifier for the Black Swan event.
1573
1582
  */
@@ -1588,7 +1597,7 @@ export type LockedMagnitude = number;
1588
1597
  * The declarative array of exogenous Black Swan events injected into the topology.
1589
1598
  */
1590
1599
  export type Shocks = ExogenousEpistemicEvent[];
1591
- export type TopologyClass52 = "epistemic_transmutation_task";
1600
+ export type TopologyClass51 = "epistemic_transmutation_task";
1592
1601
  /**
1593
1602
  * Unique identifier for this specific multimodal extraction intervention.
1594
1603
  */
@@ -1633,7 +1642,7 @@ export type TableStructureRecognition = boolean;
1633
1642
  * Optional maximum economic expenditure authorized to run this VLM transmutation.
1634
1643
  */
1635
1644
  export type ExecutionCostBudgetMagnitude1 = number | null;
1636
- export type TopologyClass53 = "epistemic_upsampling_task";
1645
+ export type TopologyClass52 = "epistemic_upsampling_task";
1637
1646
  /**
1638
1647
  * The explicitly declared target node classification or structural grain.
1639
1648
  */
@@ -1649,7 +1658,7 @@ export type UpsamplingConfidenceThreshold = number;
1649
1658
  * @maxItems 1000
1650
1659
  */
1651
1660
  export type JustificationVectors = [string, ...string[]];
1652
- export type TopologyClass54 = "interventional_causal_task";
1661
+ export type TopologyClass53 = "interventional_causal_task";
1653
1662
  /**
1654
1663
  * Unique identifier for this causal intervention.
1655
1664
  */
@@ -1674,7 +1683,7 @@ export type ExpectedCausalInformationGain = number;
1674
1683
  * The maximum economic expenditure authorized to run this specific causal intervention.
1675
1684
  */
1676
1685
  export type ExecutionCostBudgetMagnitude2 = number;
1677
- export type TopologyClass55 = "mcp_client_intent";
1686
+ export type TopologyClass54 = "mcp_client_intent";
1678
1687
  /**
1679
1688
  * JSON-RPC version.
1680
1689
  */
@@ -1696,7 +1705,7 @@ export type Id2 = string | number | null;
1696
1705
  /**
1697
1706
  * Discriminator for the dynamic manifold projection.
1698
1707
  */
1699
- export type TopologyClass56 = "dynamic_manifold";
1708
+ export type TopologyClass55 = "dynamic_manifold";
1700
1709
  /**
1701
1710
  * Unique identifier for this projection.
1702
1711
  */
@@ -1712,7 +1721,7 @@ export type PanelCid = string;
1712
1721
  /**
1713
1722
  * Discriminator for Grammar of Graphics charts.
1714
1723
  */
1715
- export type TopologyClass57 = "grammar";
1724
+ export type TopologyClass56 = "grammar";
1716
1725
  /**
1717
1726
  * The declarative semantic anchor summarizing the underlying visual grammar.
1718
1727
  */
@@ -1752,7 +1761,7 @@ export type Field = string;
1752
1761
  /**
1753
1762
  * The strictly typed mathematical mapping function distorting metrics into Euclidean pixel space.
1754
1763
  */
1755
- export type TopologyClass58 = "linear" | "log" | "time" | "ordinal" | "nominal";
1764
+ export type TopologyClass57 = "linear" | "log" | "time" | "ordinal" | "nominal";
1756
1765
  /**
1757
1766
  * The optional minimum bound of the scale domain.
1758
1767
  */
@@ -1780,7 +1789,7 @@ export type PanelCid1 = string;
1780
1789
  /**
1781
1790
  * Discriminator for markdown insight cards.
1782
1791
  */
1783
- export type TopologyClass59 = "insight_card";
1792
+ export type TopologyClass58 = "insight_card";
1784
1793
  /**
1785
1794
  * The declarative semantic anchor summarizing the underlying matrix or markdown projection.
1786
1795
  */
@@ -1801,7 +1810,7 @@ export type MesoDistanceThreshold = number;
1801
1810
  * The close-proximity boundary where full N-dimensional tensors and unstructured text blocks are mathematically hydrated into the observer's plane.
1802
1811
  */
1803
1812
  export type MicroDistanceThreshold = number;
1804
- export type TopologyClass60 = "rollback_intent";
1813
+ export type TopologyClass59 = "rollback_intent";
1805
1814
  /**
1806
1815
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark for the causal rollback operation.
1807
1816
  */
@@ -1814,7 +1823,7 @@ export type TargetEventCid = string;
1814
1823
  * The strict array of nodes whose operational histories are causally tainted and must be flushed.
1815
1824
  */
1816
1825
  export type InvalidatedNodeCids = string[];
1817
- export type TopologyClass61 = "state_mutation_intent";
1826
+ export type TopologyClass60 = "state_mutation_intent";
1818
1827
  /**
1819
1828
  * The JSON pointer indicating the exact state vector to mutate deterministically.
1820
1829
  */
@@ -1827,32 +1836,10 @@ export type From = string | null;
1827
1836
  * Cryptographic proof that this mutation was sanitized by the Symbolic Firewall.
1828
1837
  */
1829
1838
  export type ZeroTrustReceiptCid = string | null;
1830
- /**
1831
- * Discriminator for the FederatedDiscoveryIntent topology.
1832
- */
1833
- export type TopologyClass62 = "federated_discovery";
1834
- /**
1835
- * The bounded set of URN namespaces to interrogate during sovereign oracle discovery.
1836
- *
1837
- * @maxItems 1000
1838
- */
1839
- export type DomainFilter = string[];
1840
- /**
1841
- * A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
1842
- */
1843
- export type BundleContentHashState = string;
1844
- /**
1845
- * The maximum number of P2P network hops allowed.
1846
- */
1847
- export type MaxNetworkHops = number;
1848
- /**
1849
- * The minimum security clearance required from the discovered execution substrates.
1850
- */
1851
- export type RequiredSecurityClearance = "PUBLIC" | "CONFIDENTIAL" | "RESTRICTED";
1852
1839
  /**
1853
1840
  * Discriminator for the OntologicalNormalizationIntent topology.
1854
1841
  */
1855
- export type TopologyClass63 = "ontological_normalization";
1842
+ export type TopologyClass61 = "ontological_normalization";
1856
1843
  /**
1857
1844
  * The Content Identifier (CID) of the raw ingested data artifact.
1858
1845
  */
@@ -1914,27 +1901,7 @@ export type Description3 = string;
1914
1901
  /**
1915
1902
  * Discriminator for an Agent node.
1916
1903
  */
1917
- export type TopologyClass64 = "agent";
1918
- /**
1919
- * The discrete architectural boundary of the node.
1920
- */
1921
- export type ComputeTier = string;
1922
- /**
1923
- * The absolute physical minimum Video RAM required to load this node's latent space.
1924
- */
1925
- export type MinVramGb = number;
1926
- /**
1927
- * The networking mode defining the P2P boundary for enterprise compliance.
1928
- */
1929
- export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
1930
- /**
1931
- * The rigid silicon precision format required to execute this node's neural circuits.
1932
- */
1933
- export type AcceleratorType = string;
1934
- /**
1935
- * The explicit array of cloud infrastructure providers authorized to run this node.
1936
- */
1937
- export type ProviderWhitelist = string[];
1904
+ export type TopologyClass62 = "agent";
1938
1905
  /**
1939
1906
  * The level of hardware-enforced cryptographic isolation required.
1940
1907
  */
@@ -2029,7 +1996,7 @@ export type MaxRetriesOnSemanticTax = number;
2029
1996
  */
2030
1997
  export type PermittedRemoteDecodingProtocols = string[];
2031
1998
  /**
2032
- * The minimum Lattice-Based Access Control (LBAC) network perimeter required for the hardware.
1999
+ * The minimum SPIFFE/SPIRE workload identity perimeter required for the hardware.
2033
2000
  */
2034
2001
  export type EpistemicSecurityPolicy1 = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
2035
2002
  /**
@@ -2123,13 +2090,13 @@ export type EnforceFunctionalIsolation = boolean;
2123
2090
  */
2124
2091
  export type PermittedClassificationTiers = [SemanticClassificationProfile, ...SemanticClassificationProfile[]];
2125
2092
  /**
2126
- * AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
2093
+ * AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
2127
2094
  *
2128
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
2095
+ * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
2129
2096
  *
2130
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
2097
+ * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
2131
2098
  *
2132
- * MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
2099
+ * MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
2133
2100
  */
2134
2101
  export type SemanticClassificationProfile = "public" | "internal" | "confidential" | "restricted";
2135
2102
  /**
@@ -2240,11 +2207,11 @@ export type TriggerConditions = [
2240
2207
  ...("on_tool_call" | "on_belief_mutation" | "on_quarantine" | "on_falsification")[]
2241
2208
  ];
2242
2209
  /**
2243
- * The specific transformer block indices the execution engine must extract from.
2210
+ * The specific TransformerLens hook points the execution engine must extract from.
2244
2211
  *
2245
2212
  * @minItems 1
2246
2213
  */
2247
- export type TargetLayers = [number, ...number[]];
2214
+ export type TargetHookPoints1 = [string, ...string[]];
2248
2215
  /**
2249
2216
  * The top-k features to extract, preventing VRAM exhaustion.
2250
2217
  */
@@ -2342,7 +2309,7 @@ export type DomainExtensions1 = {
2342
2309
  /**
2343
2310
  * Discriminator for a Human node.
2344
2311
  */
2345
- export type TopologyClass65 = "human";
2312
+ export type TopologyClass63 = "human";
2346
2313
  /**
2347
2314
  * The mandatory cryptographic attestation URN required to verify the human operator's identity.
2348
2315
  */
@@ -2372,7 +2339,7 @@ export type DomainExtensions2 = {
2372
2339
  /**
2373
2340
  * Discriminator for a System node.
2374
2341
  */
2375
- export type TopologyClass66 = "system";
2342
+ export type TopologyClass64 = "system";
2376
2343
  /**
2377
2344
  * The semantic boundary defining the objective function or computational perimeter of the execution node.
2378
2345
  */
@@ -2398,7 +2365,7 @@ export type DomainExtensions3 = {
2398
2365
  /**
2399
2366
  * Discriminator for a Composite node.
2400
2367
  */
2401
- export type TopologyClass67 = "composite";
2368
+ export type TopologyClass65 = "composite";
2402
2369
  /**
2403
2370
  * Entropy Penalty applied per edge traversal during a defeasible cascade.
2404
2371
  */
@@ -2456,13 +2423,13 @@ export type Active1 = boolean;
2456
2423
  */
2457
2424
  export type RuleCid = string;
2458
2425
  /**
2459
- * AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
2426
+ * AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
2460
2427
  *
2461
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
2428
+ * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
2462
2429
  *
2463
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
2430
+ * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
2464
2431
  *
2465
- * MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
2432
+ * MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
2466
2433
  */
2467
2434
  export type SemanticClassificationProfile1 = "public" | "internal" | "confidential" | "restricted";
2468
2435
  /**
@@ -2502,11 +2469,11 @@ export type ActionOnViolation = "drop" | "quarantine" | "redact";
2502
2469
  */
2503
2470
  export type TargetFeatureIndex = number;
2504
2471
  /**
2505
- * The specific transformer layer indices where this feature activation must be monitored.
2472
+ * The specific TransformerLens hook points where this feature activation must be monitored.
2506
2473
  *
2507
2474
  * @minItems 1
2508
2475
  */
2509
- export type MonitoredLayers = [number, ...number[]];
2476
+ export type MonitoredHookPoints = [string, ...string[]];
2510
2477
  /**
2511
2478
  * The mathematical magnitude limit. If the feature activates beyond this, the firewall trips.
2512
2479
  */
@@ -2618,7 +2585,7 @@ export type FoveatedPrivacyEpsilon = number | null;
2618
2585
  /**
2619
2586
  * Discriminator for a DAG topology.
2620
2587
  */
2621
- export type TopologyClass68 = "dag";
2588
+ export type TopologyClass66 = "dag";
2622
2589
  /**
2623
2590
  * The strict, topologically bounded matrix of directed causal edges.
2624
2591
  */
@@ -2702,7 +2669,7 @@ export type Justification7 = string | null;
2702
2669
  /**
2703
2670
  * Discriminator for a Council topology.
2704
2671
  */
2705
- export type TopologyClass69 = "council";
2672
+ export type TopologyClass67 = "council";
2706
2673
  /**
2707
2674
  * The minimum number of adversarial or 'Devil's Advocate' roles required to prevent groupthink.
2708
2675
  */
@@ -2774,7 +2741,7 @@ export type Justification8 = string | null;
2774
2741
  /**
2775
2742
  * Discriminator for a Swarm topology.
2776
2743
  */
2777
- export type TopologyClass70 = "swarm";
2744
+ export type TopologyClass68 = "swarm";
2778
2745
  /**
2779
2746
  * Threshold limit for dynamic spawning of additional nodes.
2780
2747
  */
@@ -2856,7 +2823,7 @@ export type Justification9 = string | null;
2856
2823
  /**
2857
2824
  * Discriminator for an Evolutionary topology.
2858
2825
  */
2859
- export type TopologyClass71 = "evolutionary";
2826
+ export type TopologyClass69 = "evolutionary";
2860
2827
  /**
2861
2828
  * The absolute limit on evolutionary breeding cycles.
2862
2829
  */
@@ -2916,7 +2883,7 @@ export type Justification10 = string | null;
2916
2883
  /**
2917
2884
  * Discriminator for SMPC Topology.
2918
2885
  */
2919
- export type TopologyClass72 = "smpc";
2886
+ export type TopologyClass70 = "smpc";
2920
2887
  /**
2921
2888
  * The exact cryptographic P2P protocol the nodes must use to evaluate the function.
2922
2889
  */
@@ -2946,7 +2913,7 @@ export type Justification11 = string | null;
2946
2913
  /**
2947
2914
  * Discriminator for an Evaluator-Optimizer loop.
2948
2915
  */
2949
- export type TopologyClass73 = "evaluator_optimizer";
2916
+ export type TopologyClass71 = "evaluator_optimizer";
2950
2917
  /**
2951
2918
  * The absolute limit on Actor-Critic cycles to prevent infinite compute burn.
2952
2919
  */
@@ -2970,7 +2937,7 @@ export type Justification12 = string | null;
2970
2937
  /**
2971
2938
  * Discriminator for a Digital Twin topology.
2972
2939
  */
2973
- export type TopologyClass74 = "digital_twin";
2940
+ export type TopologyClass72 = "digital_twin";
2974
2941
  /**
2975
2942
  * The identifier (expected to be a W3C DID) pointing to the real-world topology it is cloning.
2976
2943
  */
@@ -2990,7 +2957,7 @@ export type EnforceNoSideEffects = boolean;
2990
2957
  /**
2991
2958
  * Discriminator for federation macro.
2992
2959
  */
2993
- export type TopologyClass75 = "macro_federation";
2960
+ export type TopologyClass73 = "macro_federation";
2994
2961
  /**
2995
2962
  * The nodes forming the PBFT ring.
2996
2963
  *
@@ -3012,7 +2979,7 @@ export type Justification13 = string | null;
3012
2979
  /**
3013
2980
  * Discriminator for forge macro.
3014
2981
  */
3015
- export type TopologyClass76 = "macro_forge";
2982
+ export type TopologyClass74 = "macro_forge";
3016
2983
  /**
3017
2984
  * The structural 128-char DID boundary pointing to the foundational semantic deficit vector.
3018
2985
  */
@@ -3040,7 +3007,7 @@ export type Justification14 = string | null;
3040
3007
  /**
3041
3008
  * Discriminator for the elicitation macro.
3042
3009
  */
3043
- export type TopologyClass77 = "macro_elicitation";
3010
+ export type TopologyClass75 = "macro_elicitation";
3044
3011
  /**
3045
3012
  * The anchor to the initial, unstructured MultimodalArtifactReceipt uploaded by the human.
3046
3013
  */
@@ -3064,7 +3031,7 @@ export type Justification15 = string | null;
3064
3031
  /**
3065
3032
  * Discriminator for the ingestion macro.
3066
3033
  */
3067
- export type TopologyClass78 = "macro_ingestion";
3034
+ export type TopologyClass76 = "macro_ingestion";
3068
3035
  /**
3069
3036
  * Target serialization format.
3070
3037
  */
@@ -3084,7 +3051,7 @@ export type Justification16 = string | null;
3084
3051
  /**
3085
3052
  * Discriminator for a macro neurosymbolic loop.
3086
3053
  */
3087
- export type TopologyClass79 = "macro_neurosymbolic";
3054
+ export type TopologyClass77 = "macro_neurosymbolic";
3088
3055
  /**
3089
3056
  * The connectionist agent generating hypotheses.
3090
3057
  */
@@ -3104,7 +3071,7 @@ export type CritiqueSchemaCid = string | null;
3104
3071
  /**
3105
3072
  * Discriminator for a discourse tree topology.
3106
3073
  */
3107
- export type TopologyClass80 = "discourse_tree";
3074
+ export type TopologyClass78 = "discourse_tree";
3108
3075
  /**
3109
3076
  * Cryptographic identifier for this topology.
3110
3077
  */
@@ -3117,7 +3084,7 @@ export type DiscourseType = "preamble" | "methodology" | "argumentation" | "find
3117
3084
  * Explicit pointers linking this discourse block to the specific AtomicPropositionState nodes extracted from its text.
3118
3085
  */
3119
3086
  export type ContainedPropositions = NodeCIDState[];
3120
- export type TopologyClass81 = "document_knowledge_graph";
3087
+ export type TopologyClass79 = "document_knowledge_graph";
3121
3088
  export type GraphCid = string;
3122
3089
  export type SourceArtifactCid2 = string;
3123
3090
  /**
@@ -3181,7 +3148,7 @@ export type CiphertextBlob = string;
3181
3148
  /**
3182
3149
  * Discriminator for manifold mapping.
3183
3150
  */
3184
- export type TopologyClass82 = "manifold_mapping";
3151
+ export type TopologyClass80 = "manifold_mapping";
3185
3152
  /**
3186
3153
  * Calculated geometric alignment between the semantic embedding and spatial tensor.
3187
3154
  */
@@ -3199,7 +3166,7 @@ export type Nodes12 = SemanticNodeState[];
3199
3166
  */
3200
3167
  export type CausalEdges = CausalDirectedEdgeState[];
3201
3168
  export type IsomorphismHash = string;
3202
- export type TopologyClass83 = "hierarchical_dom";
3169
+ export type TopologyClass81 = "hierarchical_dom";
3203
3170
  export type DomCid = string;
3204
3171
  export type RootBlockCid = string;
3205
3172
  /**
@@ -3291,7 +3258,7 @@ export type DomainExtensions4 = {
3291
3258
  /**
3292
3259
  * Discriminator for a Memoized node.
3293
3260
  */
3294
- export type TopologyClass84 = "memoized";
3261
+ export type TopologyClass82 = "memoized";
3295
3262
  /**
3296
3263
  * A discriminated union of presentation UI panels.
3297
3264
  */
@@ -3304,7 +3271,7 @@ export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | Cros
3304
3271
  /**
3305
3272
  * Discriminator for temporal graph crdt.
3306
3273
  */
3307
- export type TopologyClass85 = "temporal_graph_crdt";
3274
+ export type TopologyClass83 = "temporal_graph_crdt";
3308
3275
  /**
3309
3276
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark.
3310
3277
  */
@@ -3325,40 +3292,40 @@ export type AddSet = NodeCIDState[];
3325
3292
  * The set of non-monotonic timeline caps.
3326
3293
  */
3327
3294
  export type TerminateSet = TemporalEdgeInvalidationIntent[];
3328
- export type TopologyClass86 = "mcp_tool_definition";
3295
+ export type TopologyClass84 = "mcp_tool_definition";
3329
3296
  /**
3330
3297
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3331
3298
  */
3332
- export type EventCid3 = string;
3299
+ export type EventCid2 = string;
3333
3300
  /**
3334
3301
  * The RFC 8785 Canonical hash of the immediate causal ancestor event. Null for genesis nodes.
3335
3302
  */
3336
- export type PriorEventHash3 = string | null;
3337
- export type Timestamp3 = number;
3303
+ export type PriorEventHash2 = string | null;
3304
+ export type Timestamp2 = number;
3338
3305
  export type Name = string;
3339
3306
  export type Description9 = string;
3340
- export type EventCid4 = string;
3341
- export type PriorEventHash4 = string | null;
3342
- export type Timestamp4 = number;
3343
- export type TopologyClass87 = "crosswalk_resolution";
3344
- export type ReceiptCid1 = string;
3307
+ export type EventCid3 = string;
3308
+ export type PriorEventHash3 = string | null;
3309
+ export type Timestamp3 = number;
3310
+ export type TopologyClass85 = "crosswalk_resolution";
3311
+ export type ReceiptCid = string;
3345
3312
  export type TargetGraphCid3 = string;
3346
3313
  /**
3347
3314
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3348
3315
  */
3349
- export type EventCid5 = string;
3316
+ export type EventCid4 = string;
3350
3317
  /**
3351
3318
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3352
3319
  */
3353
- export type PriorEventHash5 = string | null;
3320
+ export type PriorEventHash4 = string | null;
3354
3321
  /**
3355
3322
  * Causal Ancestry markers required to resolve decentralized event ordering.
3356
3323
  */
3357
- export type Timestamp5 = number;
3324
+ export type Timestamp4 = number;
3358
3325
  /**
3359
3326
  * Discriminator for a zero-trust receipt.
3360
3327
  */
3361
- export type TopologyClass88 = "zero_trust_receipt";
3328
+ export type TopologyClass86 = "zero_trust_receipt";
3362
3329
  /**
3363
3330
  * Pointer to the originating EpistemicZeroTrustContract.
3364
3331
  */
@@ -3382,19 +3349,19 @@ export type TransmutedPayloadHash = string;
3382
3349
  /**
3383
3350
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3384
3351
  */
3385
- export type EventCid6 = string;
3352
+ export type EventCid5 = string;
3386
3353
  /**
3387
3354
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3388
3355
  */
3389
- export type PriorEventHash6 = string | null;
3356
+ export type PriorEventHash5 = string | null;
3390
3357
  /**
3391
3358
  * Causal Ancestry markers required to resolve decentralized event ordering.
3392
3359
  */
3393
- export type Timestamp6 = number;
3360
+ export type Timestamp5 = number;
3394
3361
  /**
3395
3362
  * Discriminator type for an observation event.
3396
3363
  */
3397
- export type TopologyClass89 = "observation";
3364
+ export type TopologyClass87 = "observation";
3398
3365
  /**
3399
3366
  * The URN representing the physical silicon architecture generating the root-of-trust quote (e.g., 'urn:coreason:enclave:intel_tdx').
3400
3367
  */
@@ -3414,7 +3381,7 @@ export type AnyToolchainState = BrowserDOMState | TerminalBufferState;
3414
3381
  /**
3415
3382
  * Discriminator for Causal Actuators representing structural shifts.
3416
3383
  */
3417
- export type TopologyClass90 = "browser";
3384
+ export type TopologyClass88 = "browser";
3418
3385
  /**
3419
3386
  * Spatial Execution Bounds where the agent interacts.
3420
3387
  */
@@ -3441,7 +3408,7 @@ export type ScreenshotCid = string | null;
3441
3408
  /**
3442
3409
  * Discriminator for Causal Actuators on structural buffers.
3443
3410
  */
3444
- export type TopologyClass91 = "terminal";
3411
+ export type TopologyClass89 = "terminal";
3445
3412
  /**
3446
3413
  * Capability Perimeters defining context bounds.
3447
3414
  */
@@ -3527,19 +3494,19 @@ export type MaxLookbackWindow = number;
3527
3494
  /**
3528
3495
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3529
3496
  */
3530
- export type EventCid7 = string;
3497
+ export type EventCid6 = string;
3531
3498
  /**
3532
3499
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3533
3500
  */
3534
- export type PriorEventHash7 = string | null;
3501
+ export type PriorEventHash6 = string | null;
3535
3502
  /**
3536
3503
  * Causal Ancestry markers required to resolve decentralized event ordering.
3537
3504
  */
3538
- export type Timestamp7 = number;
3505
+ export type Timestamp6 = number;
3539
3506
  /**
3540
3507
  * Discriminator type for a Belief Assertion event.
3541
3508
  */
3542
- export type TopologyClass92 = "belief_mutation";
3509
+ export type TopologyClass90 = "belief_mutation";
3543
3510
  /**
3544
3511
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the source event in the Merkle-DAG.
3545
3512
  */
@@ -3579,32 +3546,32 @@ export type QuorumSignatures = string[];
3579
3546
  /**
3580
3547
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3581
3548
  */
3582
- export type EventCid8 = string;
3549
+ export type EventCid7 = string;
3583
3550
  /**
3584
3551
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3585
3552
  */
3586
- export type PriorEventHash8 = string | null;
3553
+ export type PriorEventHash7 = string | null;
3587
3554
  /**
3588
3555
  * Causal Ancestry markers required to resolve decentralized event ordering.
3589
3556
  */
3590
- export type Timestamp8 = number;
3557
+ export type Timestamp7 = number;
3591
3558
  /**
3592
3559
  * Discriminator type for a system fault event.
3593
3560
  */
3594
- export type TopologyClass93 = "system_fault";
3595
- export type TopologyClass94 = "atomic_proposition";
3561
+ export type TopologyClass91 = "system_fault";
3562
+ export type TopologyClass92 = "atomic_proposition";
3596
3563
  /**
3597
3564
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3598
3565
  */
3599
- export type EventCid9 = string;
3566
+ export type EventCid8 = string;
3600
3567
  /**
3601
3568
  * The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
3602
3569
  */
3603
- export type PriorEventHash9 = string | null;
3570
+ export type PriorEventHash8 = string | null;
3604
3571
  /**
3605
3572
  * The precise temporal coordinate of the event realization.
3606
3573
  */
3607
- export type Timestamp9 = number;
3574
+ export type Timestamp8 = number;
3608
3575
  /**
3609
3576
  * A Content Identifier (CID) bounding this specific extracted proposition.
3610
3577
  */
@@ -3649,19 +3616,19 @@ export type UpperBound = number | null;
3649
3616
  * Explicit mathematical boundaries extracted from the text that empirically limit the certainty or scope of the proposition.
3650
3617
  */
3651
3618
  export type StatisticalQualifiers = EmpiricalStatisticalProfile[];
3652
- export type TopologyClass95 = "post_coordinated_concept";
3619
+ export type TopologyClass93 = "post_coordinated_concept";
3653
3620
  /**
3654
3621
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3655
3622
  */
3656
- export type EventCid10 = string;
3623
+ export type EventCid9 = string;
3657
3624
  /**
3658
3625
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
3659
3626
  */
3660
- export type PriorEventHash10 = string | null;
3627
+ export type PriorEventHash9 = string | null;
3661
3628
  /**
3662
3629
  * The precise temporal coordinate of the event realization.
3663
3630
  */
3664
- export type Timestamp10 = number;
3631
+ export type Timestamp9 = number;
3665
3632
  /**
3666
3633
  * The unique geometric coordinate representing this specific assembled concept.
3667
3634
  */
@@ -3674,10 +3641,10 @@ export type ManifoldAlignmentMetricProfile1 = "gromov_wasserstein" | "earth_move
3674
3641
  * The exact mathematical fidelity achieved during projection.
3675
3642
  */
3676
3643
  export type IsometryScore = number;
3677
- export type EventCid11 = string;
3678
- export type PriorEventHash11 = string | null;
3679
- export type Timestamp11 = number;
3680
- export type TopologyClass96 = "artifact_corruption";
3644
+ export type EventCid10 = string;
3645
+ export type PriorEventHash10 = string | null;
3646
+ export type Timestamp10 = number;
3647
+ export type TopologyClass94 = "artifact_corruption";
3681
3648
  /**
3682
3649
  * The genesis artifact that caused the ingestion engine to crash.
3683
3650
  */
@@ -3687,19 +3654,19 @@ export type DiagnosticHash = string;
3687
3654
  /**
3688
3655
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3689
3656
  */
3690
- export type EventCid12 = string;
3657
+ export type EventCid11 = string;
3691
3658
  /**
3692
3659
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3693
3660
  */
3694
- export type PriorEventHash12 = string | null;
3661
+ export type PriorEventHash11 = string | null;
3695
3662
  /**
3696
3663
  * Causal Ancestry markers required to resolve decentralized event ordering.
3697
3664
  */
3698
- export type Timestamp12 = number;
3665
+ export type Timestamp11 = number;
3699
3666
  /**
3700
3667
  * Discriminator for a hypothesis generation event.
3701
3668
  */
3702
- export type TopologyClass97 = "hypothesis";
3669
+ export type TopologyClass95 = "hypothesis";
3703
3670
  /**
3704
3671
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this abductive leap to the Merkle-DAG.
3705
3672
  */
@@ -3741,19 +3708,19 @@ export type CausalEdges1 = CausalDirectedEdgeState[];
3741
3708
  /**
3742
3709
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3743
3710
  */
3744
- export type EventCid13 = string;
3711
+ export type EventCid12 = string;
3745
3712
  /**
3746
3713
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3747
3714
  */
3748
- export type PriorEventHash13 = string | null;
3715
+ export type PriorEventHash12 = string | null;
3749
3716
  /**
3750
3717
  * Causal Ancestry markers required to resolve decentralized event ordering.
3751
3718
  */
3752
- export type Timestamp13 = number;
3719
+ export type Timestamp12 = number;
3753
3720
  /**
3754
3721
  * Discriminator type for a barge-in interruption event.
3755
3722
  */
3756
- export type TopologyClass98 = "barge_in";
3723
+ export type TopologyClass96 = "barge_in";
3757
3724
  /**
3758
3725
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the active node generation cycle that was killed in the Merkle-DAG.
3759
3726
  */
@@ -3771,19 +3738,19 @@ export type EpistemicDisposition = "discard" | "retain_as_context" | "mark_as_fa
3771
3738
  /**
3772
3739
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3773
3740
  */
3774
- export type EventCid14 = string;
3741
+ export type EventCid13 = string;
3775
3742
  /**
3776
3743
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3777
3744
  */
3778
- export type PriorEventHash14 = string | null;
3745
+ export type PriorEventHash13 = string | null;
3779
3746
  /**
3780
3747
  * Causal Ancestry markers required to resolve decentralized event ordering.
3781
3748
  */
3782
- export type Timestamp14 = number;
3749
+ export type Timestamp13 = number;
3783
3750
  /**
3784
3751
  * Discriminator type for a counterfactual regret event.
3785
3752
  */
3786
- export type TopologyClass99 = "counterfactual_regret";
3753
+ export type TopologyClass97 = "counterfactual_regret";
3787
3754
  /**
3788
3755
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the specific historical state node where the agent mathematically diverged to simulate an alternative path.
3789
3756
  */
@@ -3807,19 +3774,19 @@ export type EpistemicRegret = number;
3807
3774
  /**
3808
3775
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3809
3776
  */
3810
- export type EventCid15 = string;
3777
+ export type EventCid14 = string;
3811
3778
  /**
3812
3779
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3813
3780
  */
3814
- export type PriorEventHash15 = string | null;
3781
+ export type PriorEventHash14 = string | null;
3815
3782
  /**
3816
3783
  * Causal Ancestry markers required to resolve decentralized event ordering.
3817
3784
  */
3818
- export type Timestamp15 = number;
3785
+ export type Timestamp14 = number;
3819
3786
  /**
3820
3787
  * Discriminator type for a tool invocation event.
3821
3788
  */
3822
- export type TopologyClass100 = "tool_invocation";
3789
+ export type TopologyClass98 = "tool_invocation";
3823
3790
  /**
3824
3791
  * The exact tool targeted in the CognitiveActionSpaceManifest.
3825
3792
  */
@@ -3831,19 +3798,19 @@ export type AuthorizedBudgetMagnitude = number;
3831
3798
  /**
3832
3799
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3833
3800
  */
3834
- export type EventCid16 = string;
3801
+ export type EventCid15 = string;
3835
3802
  /**
3836
3803
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3837
3804
  */
3838
- export type PriorEventHash16 = string | null;
3805
+ export type PriorEventHash15 = string | null;
3839
3806
  /**
3840
3807
  * Causal Ancestry markers required to resolve decentralized event ordering.
3841
3808
  */
3842
- export type Timestamp16 = number;
3809
+ export type Timestamp15 = number;
3843
3810
  /**
3844
3811
  * Discriminator type for an epistemic promotion event.
3845
3812
  */
3846
- export type TopologyClass101 = "epistemic_promotion";
3813
+ export type TopologyClass99 = "epistemic_promotion";
3847
3814
  /**
3848
3815
  * The strict array of CIDs (Content Identifiers) representing the raw logs being compressed and archived.
3849
3816
  */
@@ -3859,19 +3826,19 @@ export type CompressionRatio = number;
3859
3826
  /**
3860
3827
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3861
3828
  */
3862
- export type EventCid17 = string;
3829
+ export type EventCid16 = string;
3863
3830
  /**
3864
3831
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3865
3832
  */
3866
- export type PriorEventHash17 = string | null;
3833
+ export type PriorEventHash16 = string | null;
3867
3834
  /**
3868
3835
  * Causal Ancestry markers required to resolve decentralized event ordering.
3869
3836
  */
3870
- export type Timestamp17 = number;
3837
+ export type Timestamp16 = number;
3871
3838
  /**
3872
3839
  * Discriminator type for a normative drift event.
3873
3840
  */
3874
- export type TopologyClass102 = "normative_drift";
3841
+ export type TopologyClass100 = "normative_drift";
3875
3842
  /**
3876
3843
  * The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
3877
3844
  */
@@ -3887,19 +3854,19 @@ export type ContradictionProofHash = string;
3887
3854
  /**
3888
3855
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3889
3856
  */
3890
- export type EventCid18 = string;
3857
+ export type EventCid17 = string;
3891
3858
  /**
3892
3859
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3893
3860
  */
3894
- export type PriorEventHash18 = string | null;
3861
+ export type PriorEventHash17 = string | null;
3895
3862
  /**
3896
3863
  * Causal Ancestry markers required to resolve decentralized event ordering.
3897
3864
  */
3898
- export type Timestamp18 = number;
3865
+ export type Timestamp17 = number;
3899
3866
  /**
3900
3867
  * Discriminator type for a persistence commit receipt.
3901
3868
  */
3902
- export type TopologyClass103 = "persistence_commit";
3869
+ export type TopologyClass101 = "persistence_commit";
3903
3870
  /**
3904
3871
  * The external cryptographic receipt generated by Iceberg/Delta.
3905
3872
  */
@@ -3915,19 +3882,19 @@ export type TargetTableUri = string;
3915
3882
  /**
3916
3883
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3917
3884
  */
3918
- export type EventCid19 = string;
3885
+ export type EventCid18 = string;
3919
3886
  /**
3920
3887
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3921
3888
  */
3922
- export type PriorEventHash19 = string | null;
3889
+ export type PriorEventHash18 = string | null;
3923
3890
  /**
3924
3891
  * Causal Ancestry markers required to resolve decentralized event ordering.
3925
3892
  */
3926
- export type Timestamp19 = number;
3893
+ export type Timestamp18 = number;
3927
3894
  /**
3928
3895
  * Discriminator type for a token burn receipt.
3929
3896
  */
3930
- export type TopologyClass104 = "token_burn";
3897
+ export type TopologyClass102 = "token_burn";
3931
3898
  /**
3932
3899
  * A string linking this burn back to the specific ToolInvocationEvent CID.
3933
3900
  */
@@ -3947,19 +3914,19 @@ export type BurnMagnitude = number;
3947
3914
  /**
3948
3915
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3949
3916
  */
3950
- export type EventCid20 = string;
3917
+ export type EventCid19 = string;
3951
3918
  /**
3952
3919
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3953
3920
  */
3954
- export type PriorEventHash20 = string | null;
3921
+ export type PriorEventHash19 = string | null;
3955
3922
  /**
3956
3923
  * Causal Ancestry markers required to resolve decentralized event ordering.
3957
3924
  */
3958
- export type Timestamp20 = number;
3925
+ export type Timestamp19 = number;
3959
3926
  /**
3960
3927
  * Discriminator type for a budget exhaustion event.
3961
3928
  */
3962
- export type TopologyClass105 = "budget_exhaustion";
3929
+ export type TopologyClass103 = "budget_exhaustion";
3963
3930
  /**
3964
3931
  * A string representing the original escrow boundary breached.
3965
3932
  */
@@ -3971,19 +3938,19 @@ export type FinalBurnReceiptCid = string;
3971
3938
  /**
3972
3939
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3973
3940
  */
3974
- export type EventCid21 = string;
3941
+ export type EventCid20 = string;
3975
3942
  /**
3976
3943
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3977
3944
  */
3978
- export type PriorEventHash21 = string | null;
3945
+ export type PriorEventHash20 = string | null;
3979
3946
  /**
3980
3947
  * Causal Ancestry markers required to resolve decentralized event ordering.
3981
3948
  */
3982
- export type Timestamp21 = number;
3949
+ export type Timestamp20 = number;
3983
3950
  /**
3984
3951
  * Discriminator type for telemetry events.
3985
3952
  */
3986
- export type TopologyClass106 = "epistemic_telemetry";
3953
+ export type TopologyClass104 = "epistemic_telemetry";
3987
3954
  /**
3988
3955
  * The exact topological action the human operator performed on the projected manifold.
3989
3956
  */
@@ -3999,16 +3966,16 @@ export type DwellDurationMs = number | null;
3999
3966
  /**
4000
3967
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4001
3968
  */
4002
- export type EventCid22 = string;
3969
+ export type EventCid21 = string;
4003
3970
  /**
4004
3971
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4005
3972
  */
4006
- export type PriorEventHash22 = string | null;
3973
+ export type PriorEventHash21 = string | null;
4007
3974
  /**
4008
3975
  * Causal Ancestry markers required to resolve decentralized event ordering.
4009
3976
  */
4010
- export type Timestamp22 = number;
4011
- export type TopologyClass107 = "cognitive_prediction";
3977
+ export type Timestamp21 = number;
3978
+ export type TopologyClass105 = "cognitive_prediction";
4012
3979
  export type SourceChainCid = string;
4013
3980
  export type TargetSourceConcept = string;
4014
3981
  /**
@@ -4018,16 +3985,16 @@ export type PredictedTopKTokens = [string, ...string[]];
4018
3985
  /**
4019
3986
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4020
3987
  */
4021
- export type EventCid23 = string;
3988
+ export type EventCid22 = string;
4022
3989
  /**
4023
3990
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4024
3991
  */
4025
- export type PriorEventHash23 = string | null;
3992
+ export type PriorEventHash22 = string | null;
4026
3993
  /**
4027
3994
  * Causal Ancestry markers required to resolve decentralized event ordering.
4028
3995
  */
4029
- export type Timestamp23 = number;
4030
- export type TopologyClass108 = "epistemic_axiom_verification";
3996
+ export type Timestamp22 = number;
3997
+ export type TopologyClass106 = "epistemic_axiom_verification";
4031
3998
  export type SourcePredictionCid = string;
4032
3999
  export type SequenceSimilarityScore = number;
4033
4000
  export type FactScorePassed = boolean;
@@ -4038,16 +4005,16 @@ export type ZeroTrustReceiptCid1 = string | null;
4038
4005
  /**
4039
4006
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4040
4007
  */
4041
- export type EventCid24 = string;
4008
+ export type EventCid23 = string;
4042
4009
  /**
4043
4010
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4044
4011
  */
4045
- export type PriorEventHash24 = string | null;
4012
+ export type PriorEventHash23 = string | null;
4046
4013
  /**
4047
4014
  * Causal Ancestry markers required to resolve decentralized event ordering.
4048
4015
  */
4049
- export type Timestamp24 = number;
4050
- export type TopologyClass109 = "cognitive_reward_evaluation";
4016
+ export type Timestamp23 = number;
4017
+ export type TopologyClass107 = "cognitive_reward_evaluation";
4051
4018
  /**
4052
4019
  * The globally unique decentralized identifier (DID) anchoring the LLM's raw generated text trajectory.
4053
4020
  */
@@ -4079,16 +4046,16 @@ export type TotalAdvantageScore = number;
4079
4046
  /**
4080
4047
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4081
4048
  */
4082
- export type EventCid25 = string;
4049
+ export type EventCid24 = string;
4083
4050
  /**
4084
4051
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4085
4052
  */
4086
- export type PriorEventHash25 = string | null;
4053
+ export type PriorEventHash24 = string | null;
4087
4054
  /**
4088
4055
  * Causal Ancestry markers required to resolve decentralized event ordering.
4089
4056
  */
4090
- export type Timestamp25 = number;
4091
- export type TopologyClass110 = "epistemic_flow_state";
4057
+ export type Timestamp24 = number;
4058
+ export type TopologyClass108 = "epistemic_flow_state";
4092
4059
  /**
4093
4060
  * The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
4094
4061
  */
@@ -4104,19 +4071,19 @@ export type TerminalRewardFactorized = boolean;
4104
4071
  /**
4105
4072
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4106
4073
  */
4107
- export type EventCid26 = string;
4074
+ export type EventCid25 = string;
4108
4075
  /**
4109
4076
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4110
4077
  */
4111
- export type PriorEventHash26 = string | null;
4078
+ export type PriorEventHash25 = string | null;
4112
4079
  /**
4113
4080
  * Causal Ancestry markers required to resolve decentralized event ordering.
4114
4081
  */
4115
- export type Timestamp26 = number;
4082
+ export type Timestamp25 = number;
4116
4083
  /**
4117
4084
  * Discriminator type for a causal explanation event.
4118
4085
  */
4119
- export type TopologyClass111 = "causal_explanation";
4086
+ export type TopologyClass109 = "causal_explanation";
4120
4087
  /**
4121
4088
  * The globally unique decentralized identifier (DID) anchoring the collective outcome being explained.
4122
4089
  */
@@ -4156,19 +4123,19 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
4156
4123
  /**
4157
4124
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4158
4125
  */
4159
- export type EventCid27 = string;
4126
+ export type EventCid26 = string;
4160
4127
  /**
4161
4128
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4162
4129
  */
4163
- export type PriorEventHash27 = string | null;
4130
+ export type PriorEventHash26 = string | null;
4164
4131
  /**
4165
4132
  * Causal Ancestry markers required to resolve decentralized event ordering.
4166
4133
  */
4167
- export type Timestamp27 = number;
4134
+ export type Timestamp26 = number;
4168
4135
  /**
4169
4136
  * Discriminator type for an intent classification receipt.
4170
4137
  */
4171
- export type TopologyClass112 = "intent_classification";
4138
+ export type TopologyClass110 = "intent_classification";
4172
4139
  /**
4173
4140
  * The raw, unparsed human natural language instruction.
4174
4141
  */
@@ -4185,19 +4152,19 @@ export type ConfidenceScore1 = number;
4185
4152
  * The TaxonomicRoutingPolicy CID that governed this classification.
4186
4153
  */
4187
4154
  export type RoutingPolicyCid = string | null;
4188
- export type TopologyClass113 = "semantic_relational_record";
4155
+ export type TopologyClass111 = "semantic_relational_record";
4189
4156
  /**
4190
4157
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4191
4158
  */
4192
- export type EventCid28 = string;
4159
+ export type EventCid27 = string;
4193
4160
  /**
4194
4161
  * The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
4195
4162
  */
4196
- export type PriorEventHash28 = string | null;
4163
+ export type PriorEventHash27 = string | null;
4197
4164
  /**
4198
4165
  * The precise temporal coordinate of the event realization.
4199
4166
  */
4200
- export type Timestamp28 = number;
4167
+ export type Timestamp27 = number;
4201
4168
  /**
4202
4169
  * The domain-independent structural classification of the record.
4203
4170
  */
@@ -4209,19 +4176,19 @@ export type FormalSchemaUrn1 = string | null;
4209
4176
  /**
4210
4177
  * Discriminator for the reification receipt.
4211
4178
  */
4212
- export type TopologyClass114 = "ontological_reification";
4179
+ export type TopologyClass112 = "ontological_reification";
4213
4180
  /**
4214
4181
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4215
4182
  */
4216
- export type EventCid29 = string;
4183
+ export type EventCid28 = string;
4217
4184
  /**
4218
4185
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
4219
4186
  */
4220
- export type PriorEventHash29 = string | null;
4187
+ export type PriorEventHash28 = string | null;
4221
4188
  /**
4222
4189
  * The precise temporal coordinate of the event realization.
4223
4190
  */
4224
- export type Timestamp29 = number;
4191
+ export type Timestamp28 = number;
4225
4192
  /**
4226
4193
  * The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
4227
4194
  */
@@ -4241,19 +4208,19 @@ export type IsLatentInference = boolean;
4241
4208
  /**
4242
4209
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4243
4210
  */
4244
- export type EventCid30 = string;
4211
+ export type EventCid29 = string;
4245
4212
  /**
4246
4213
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4247
4214
  */
4248
- export type PriorEventHash30 = string | null;
4215
+ export type PriorEventHash29 = string | null;
4249
4216
  /**
4250
4217
  * Causal Ancestry markers required to resolve decentralized event ordering.
4251
4218
  */
4252
- export type Timestamp30 = number;
4219
+ export type Timestamp29 = number;
4253
4220
  /**
4254
4221
  * The type of the resilience payload.
4255
4222
  */
4256
- export type TopologyClass115 = "circuit_breaker_event";
4223
+ export type TopologyClass113 = "circuit_breaker_event";
4257
4224
  /**
4258
4225
  * Signature or summary of the error causing the trip.
4259
4226
  */
@@ -4261,19 +4228,19 @@ export type ErrorSignature = string;
4261
4228
  /**
4262
4229
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4263
4230
  */
4264
- export type EventCid31 = string;
4231
+ export type EventCid30 = string;
4265
4232
  /**
4266
4233
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4267
4234
  */
4268
- export type PriorEventHash31 = string | null;
4235
+ export type PriorEventHash30 = string | null;
4269
4236
  /**
4270
4237
  * Discriminator type for a log event.
4271
4238
  */
4272
- export type TopologyClass116 = "epistemic_log";
4239
+ export type TopologyClass114 = "epistemic_log";
4273
4240
  /**
4274
4241
  * The UNIX timestamp of the log event.
4275
4242
  */
4276
- export type Timestamp31 = number;
4243
+ export type Timestamp30 = number;
4277
4244
  /**
4278
4245
  * The severity level of the log event.
4279
4246
  */
@@ -4286,19 +4253,19 @@ export type TelemetryScalarState = string | number | boolean | null;
4286
4253
  /**
4287
4254
  * The type of the intervention payload.
4288
4255
  */
4289
- export type TopologyClass117 = "verdict";
4256
+ export type TopologyClass115 = "verdict";
4290
4257
  /**
4291
4258
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4292
4259
  */
4293
- export type EventCid32 = string;
4260
+ export type EventCid31 = string;
4294
4261
  /**
4295
4262
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4296
4263
  */
4297
- export type PriorEventHash32 = string | null;
4264
+ export type PriorEventHash31 = string | null;
4298
4265
  /**
4299
4266
  * Causal Ancestry markers required to resolve decentralized event ordering.
4300
4267
  */
4301
- export type Timestamp32 = number;
4268
+ export type Timestamp31 = number;
4302
4269
  /**
4303
4270
  * The cryptographic nonce uniquely identifying the intervention request.
4304
4271
  */
@@ -4334,16 +4301,16 @@ export type LivenessChallengeHash = string;
4334
4301
  /**
4335
4302
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4336
4303
  */
4337
- export type EventCid33 = string;
4304
+ export type EventCid32 = string;
4338
4305
  /**
4339
4306
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4340
4307
  */
4341
- export type PriorEventHash33 = string | null;
4308
+ export type PriorEventHash32 = string | null;
4342
4309
  /**
4343
4310
  * Causal Ancestry markers required to resolve decentralized event ordering.
4344
4311
  */
4345
- export type Timestamp33 = number;
4346
- export type TopologyClass118 = "custody_receipt";
4312
+ export type Timestamp32 = number;
4313
+ export type TopologyClass116 = "custody_receipt";
4347
4314
  /**
4348
4315
  * Unique identifier for this chain-of-custody entry.
4349
4316
  */
@@ -4371,16 +4338,16 @@ export type RedactionTimestampUnixNano = number;
4371
4338
  /**
4372
4339
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4373
4340
  */
4374
- export type EventCid34 = string;
4341
+ export type EventCid33 = string;
4375
4342
  /**
4376
4343
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4377
4344
  */
4378
- export type PriorEventHash34 = string | null;
4345
+ export type PriorEventHash33 = string | null;
4379
4346
  /**
4380
4347
  * Causal Ancestry markers required to resolve decentralized event ordering.
4381
4348
  */
4382
- export type Timestamp34 = number;
4383
- export type TopologyClass119 = "defeasible_attack";
4349
+ export type Timestamp33 = number;
4350
+ export type TopologyClass117 = "defeasible_attack";
4384
4351
  /**
4385
4352
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
4386
4353
  */
@@ -4393,6 +4360,24 @@ export type SourceClaimCid = string;
4393
4360
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark for the claim being attacked.
4394
4361
  */
4395
4362
  export type TargetClaimCid = string;
4363
+ /**
4364
+ * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4365
+ */
4366
+ export type EventCid34 = string;
4367
+ /**
4368
+ * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4369
+ */
4370
+ export type PriorEventHash34 = string | null;
4371
+ /**
4372
+ * Causal Ancestry markers required to resolve decentralized event ordering.
4373
+ */
4374
+ export type Timestamp34 = number;
4375
+ export type TopologyClass118 = "epistemic_rejection";
4376
+ export type ReceiptCid1 = string;
4377
+ export type FailedProjectionCid = string;
4378
+ export type ViolatedAlgebraicConstraint = string;
4379
+ export type KlDivergenceToValidity = number;
4380
+ export type StochasticMutationGradient = string;
4396
4381
  /**
4397
4382
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4398
4383
  */
@@ -4405,7 +4390,7 @@ export type PriorEventHash35 = string | null;
4405
4390
  * The precise temporal coordinate of the event realization.
4406
4391
  */
4407
4392
  export type Timestamp35 = number;
4408
- export type TopologyClass120 = "formal_verification_receipt";
4393
+ export type TopologyClass119 = "formal_verification_receipt";
4409
4394
  /**
4410
4395
  * The definitive Boolean evaluating whether the proof succeeded, the program is satisfiable, or the deduction holds true.
4411
4396
  */
@@ -4424,7 +4409,7 @@ export type FailingContext = string | null;
4424
4409
  export type ExtractedBindings = {
4425
4410
  [k: string]: JsonPrimitiveState;
4426
4411
  }[];
4427
- export type TopologyClass121 = "belief_modulation";
4412
+ export type TopologyClass120 = "belief_modulation";
4428
4413
  export type ReceiptCid2 = string;
4429
4414
  /**
4430
4415
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
@@ -4440,7 +4425,7 @@ export type PriorEventHash36 = string | null;
4440
4425
  export type Timestamp36 = number;
4441
4426
  export type TargetGraphCid4 = string;
4442
4427
  export type SeveredEdgeCids = string[];
4443
- export type TopologyClass122 = "rdf_export_receipt";
4428
+ export type TopologyClass121 = "rdf_export_receipt";
4444
4429
  export type ExportCid1 = string;
4445
4430
  /**
4446
4431
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
@@ -4460,7 +4445,7 @@ export type Sha256GraphHash = string;
4460
4445
  export type EventCid38 = string;
4461
4446
  export type PriorEventHash38 = string | null;
4462
4447
  export type Timestamp38 = number;
4463
- export type TopologyClass123 = "epistemic_starvation";
4448
+ export type TopologyClass122 = "epistemic_starvation";
4464
4449
  /**
4465
4450
  * The cryptographic pointer to the specific edge that failed empirical grounding.
4466
4451
  */
@@ -4476,7 +4461,7 @@ export type DiagnosticReason = string;
4476
4461
  export type EventCid39 = string;
4477
4462
  export type PriorEventHash39 = string | null;
4478
4463
  export type Timestamp39 = number;
4479
- export type TopologyClass124 = "sparql_query_result";
4464
+ export type TopologyClass123 = "sparql_query_result";
4480
4465
  /**
4481
4466
  * A pointer back to the SPARQLQueryIntent that authorized this execution.
4482
4467
  */
@@ -4488,7 +4473,7 @@ export type ExecutionTimeMs = number;
4488
4473
  /**
4489
4474
  * Discriminator for the OracleExecutionReceipt topology.
4490
4475
  */
4491
- export type TopologyClass125 = "oracle_execution_receipt";
4476
+ export type TopologyClass124 = "oracle_execution_receipt";
4492
4477
  /**
4493
4478
  * The SHA-256 hash of the complete execution payload, providing undeniable cryptographic provenance for the Merkle-DAG audit trail.
4494
4479
  */
@@ -4513,7 +4498,7 @@ export type AnyTransitionEdge = TransitionEdgeProfile | CyclicEdgeProfile;
4513
4498
  /**
4514
4499
  * Discriminator type for an acyclic edge.
4515
4500
  */
4516
- export type TopologyClass126 = "acyclic";
4501
+ export type TopologyClass125 = "acyclic";
4517
4502
  /**
4518
4503
  * The coinductive pointer to the destination capability.
4519
4504
  */
@@ -4545,7 +4530,7 @@ export type ComputeWeightMagnitude = number;
4545
4530
  /**
4546
4531
  * Discriminator type for a cyclic edge.
4547
4532
  */
4548
- export type TopologyClass127 = "cyclic";
4533
+ export type TopologyClass126 = "cyclic";
4549
4534
  /**
4550
4535
  * The coinductive pointer to the destination capability.
4551
4536
  */
@@ -4600,6 +4585,10 @@ export type ClearingTimeout = number;
4600
4585
  * The smallest allowable discrete bid increment.
4601
4586
  */
4602
4587
  export type MinimumTickSize = number;
4588
+ /**
4589
+ * A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
4590
+ */
4591
+ export type BundleContentHashState = string;
4603
4592
  /**
4604
4593
  * The exact genesis globally unique decentralized identifier (DID) anchoring the document, ensuring continuity.
4605
4594
  */
@@ -4685,24 +4674,6 @@ export type AgentNodeCount = number;
4685
4674
  */
4686
4675
  export type ConsensusMechanism = "majority" | "prediction_market" | "pbft";
4687
4676
  export type CognitiveTierProfile = "working" | "episodic" | "semantic";
4688
- export type ThermodynamicsCid = string;
4689
- export type TargetTopologyCid1 = string;
4690
- export type MaxStochasticDiffusions = number;
4691
- export type ComputationalFreeEnergyBudget = number;
4692
- export type CurrentDiffusions = number;
4693
- export type RemainingFreeEnergy = number;
4694
- export type EntropyDerivativeDelta = number | null;
4695
- export type StagnationToleranceEpsilon = number;
4696
- /**
4697
- * AGENT INSTRUCTION: A rigid string enumeration mapping the kinetic liveness of the computational budget.
4698
- *
4699
- * CAUSAL AFFORDANCE: Instructs the orchestrator on whether the thermodynamic search envelope is active or mathematically depleted.
4700
- *
4701
- * EPISTEMIC BOUNDS: Strictly bounded to the explicit kinetic states ACTIVE_DIFFUSION and ENTROPIC_EXHAUSTION_ORACLE_INTERVENTION.
4702
- *
4703
- * MCP ROUTING TRIGGERS: Thermodynamic State, Budget Envelope, MCTS Liveness, Entropy Tracking
4704
- */
4705
- export type ThermodynamicState = "ACTIVE_DIFFUSION" | "ENTROPIC_EXHAUSTION_ORACLE_INTERVENTION";
4706
4677
  /**
4707
4678
  * The identifier of the underlying model.
4708
4679
  */
@@ -4767,64 +4738,6 @@ export type MaxUncommittedEdges = number;
4767
4738
  * Temporal bound for flushing the stream.
4768
4739
  */
4769
4740
  export type MicroBatchIntervalMs = number;
4770
- /**
4771
- * Unique identifier for this B2B negotiation.
4772
- */
4773
- export type HandshakeCid = string;
4774
- /**
4775
- * The enterprise DID requesting the connection.
4776
- */
4777
- export type InitiatingTenantCid = string;
4778
- /**
4779
- * The enterprise DID receiving the connection.
4780
- */
4781
- export type ReceivingTenantCid = string;
4782
- /**
4783
- * The strict enterprise identifier of the foreign B2B tenant receiving this payload.
4784
- */
4785
- export type ReceivingTenantCid1 = string;
4786
- /**
4787
- * AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
4788
- *
4789
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
4790
- *
4791
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
4792
- *
4793
- * MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
4794
- */
4795
- export type SemanticClassificationProfile2 = "public" | "internal" | "confidential" | "restricted";
4796
- /**
4797
- * The strict magnitude cap on cross-tenant economic liability.
4798
- */
4799
- export type LiabilityLimitMagnitude = number;
4800
- /**
4801
- * Explicit whitelist of geographic regions or cloud enclaves where execution is structurally permitted (Payload Residency Pinning).
4802
- */
4803
- export type PermittedGeographicRegions = string[];
4804
- /**
4805
- * If True, incoming payloads from foreign tenants MUST be accompanied by a ZeroKnowledgeReceipt containing a valid temporal_interval_proof.
4806
- */
4807
- export type RequireTemporalProvenanceProofs = boolean;
4808
- /**
4809
- * Absolute structural ESG mandate. The execution graph will quarantine any federated node operating on a grid exceeding this gCO2eq/kWh threshold.
4810
- */
4811
- export type MaxPermittedGridCarbonIntensity = number | null;
4812
- /**
4813
- * The NIST FIPS post-quantum cryptographic algorithm used.
4814
- */
4815
- export type PqAlgorithm = "ml-dsa" | "slh-dsa" | "falcon";
4816
- /**
4817
- * The identifier of the post-quantum public evaluation key.
4818
- */
4819
- export type PublicKeyCid1 = string;
4820
- /**
4821
- * The base64-encoded post-quantum signature. Bounded to 100KB to safely accommodate massive SPHINCS+ hash trees without OOM crashes.
4822
- */
4823
- export type PqSignatureBlob = string;
4824
- /**
4825
- * The current status of the handshake.
4826
- */
4827
- export type Status1 = "proposed" | "negotiating" | "aligned" | "rejected";
4828
4741
  export type CrossoverMechanismProfile = "uniform_blend" | "single_point" | "heuristic";
4829
4742
  export type ProvenanceTraceCid1 = string | null;
4830
4743
  /**
@@ -4894,22 +4807,6 @@ export type FormalSyntaxSmt = string;
4894
4807
  * The continuous penalty applied to the LLM probability mass for constraint violation.
4895
4808
  */
4896
4809
  export type RelaxationEpsilon = number;
4897
- /**
4898
- * The native embedding model of the origin agent.
4899
- */
4900
- export type SourceMatrixName = string;
4901
- /**
4902
- * The native embedding model of the destination agent.
4903
- */
4904
- export type TargetMatrixName = string;
4905
- /**
4906
- * The SHA-256 hash of the exact mathematical matrix used to compress or translate the latent dimensions.
4907
- */
4908
- export type ProjectionMatrixHash = string;
4909
- /**
4910
- * Mathematical proof (e.g., Earth Mover's Distance preservation) of how accurately relative semantic distances were maintained during projection.
4911
- */
4912
- export type IsometryPreservationScore1 = number;
4913
4810
  /**
4914
4811
  * The expected value (mu) of the distribution.
4915
4812
  */
@@ -5170,14 +5067,6 @@ export type TriggerDescription = string;
5170
5067
  * The lightweight progressive disclosure tier for procedural skills.
5171
5068
  */
5172
5069
  export type AvailableProceduralManifolds = ProceduralMetadataManifest[];
5173
- /**
5174
- * Cryptographic Lineage Watermark for the attestation.
5175
- */
5176
- export type AttestationCid = string;
5177
- /**
5178
- * Immutable cryptographic receipts of dynamically discovered external enterprise connectors.
5179
- */
5180
- export type CapabilityAttestations = FederatedCapabilityAttestationReceipt[];
5181
5070
  /**
5182
5071
  * A Content Identifier (CID) for the Standard Operating Procedure.
5183
5072
  */
@@ -5228,123 +5117,7 @@ export type MutableMatrix = {
5228
5117
  * A flag allowing the output to only return the keys in mutable_matrix that changed, rather than forcing the entire array back up the network.
5229
5118
  */
5230
5119
  export type IsDelta = boolean;
5231
- /**
5232
- * The unique ID for this specific execution.
5233
- */
5234
- export type RequestCid1 = string;
5235
- /**
5236
- * The deterministic capability pointer anchoring the parent request manifold.
5237
- */
5238
- export type ParentRequestCid = string | null;
5239
- /**
5240
- * The deterministic capability pointer anchoring the trace root manifold.
5241
- */
5242
- export type RootRequestCid = string | null;
5243
- /**
5244
- * The strict array of cryptographic hashes of parent execution nodes.
5245
- */
5246
- export type ParentHashes = string[];
5247
- /**
5248
- * The cryptographic SHA-256 hash of this node.
5249
- */
5250
- export type NodeHash = string | null;
5251
- /**
5252
- * The global identifier for the entire execution causal tree.
5253
- */
5254
- export type TraceCid3 = string;
5255
- /**
5256
- * The unique identifier for this specific operation.
5257
- */
5258
- export type SpanCid1 = string;
5259
- /**
5260
- * The causal edge to the invoking node.
5261
- */
5262
- export type ParentSpanCid1 = string | null;
5263
- /**
5264
- * The semantic identifier for the operation.
5265
- */
5266
- export type Name1 = string;
5267
- /**
5268
- * Temporal start bound.
5269
- */
5270
- export type StartTimeUnixNano = number;
5271
- /**
5272
- * Temporal end bound, if completed.
5273
- */
5274
- export type EndTimeUnixNano = number | null;
5275
- /**
5276
- * The semantic name of the event.
5277
- */
5278
- export type Name2 = string;
5279
- /**
5280
- * The precise temporal execution point.
5281
- */
5282
- export type TimestampUnixNano = number;
5283
- /**
5284
- * Structured log records emitted during the span.
5285
- *
5286
- * @maxItems 10000
5287
- */
5288
- export type Events = SpanEvent[];
5289
- export type FaultCategoryProfile = "context_overload" | "incorrect_context" | "format_corruption" | "latency_spike" | "token_throttle" | "network_degradation" | "temporal_dilation" | "dependency_blackout";
5290
- /**
5291
- * Discriminator for fetching assets via CID.
5292
- */
5293
- export type TopologyClass128 = "cid_fetch";
5294
- /**
5295
- * Network timeout in milliseconds.
5296
- */
5297
- export type TimeoutMs1 = number;
5298
- /**
5299
- * The explicit array of strictly bounded MCP URI broadcast endpoints.
5300
- *
5301
- * @maxItems 1000
5302
- */
5303
- export type BroadcastEndpoints = string[];
5304
- /**
5305
- * The explicit array of cryptographic hashes defining acceptable domain ontologies.
5306
- *
5307
- * @maxItems 1000
5308
- */
5309
- export type SupportedOntologies = string[];
5310
- /**
5311
- * The tamper-evident SHA-256 hash of the exact safetensors weight matrix.
5312
- */
5313
- export type AdapterMerkleRoot = string;
5314
- /**
5315
- * The exact spatial geometry required in VRAM to mount this adapter.
5316
- */
5317
- export type VramFootprintBytes = number;
5318
- /**
5319
- * The absolute Time-To-Live for the adapter to exist in the kinetic execution plane before forced eviction.
5320
- */
5321
- export type EphemeralTtlMs = number;
5322
- /**
5323
- * The relative importance scalar used by the orchestrator's LRU eviction algorithm when VRAM limits are saturated.
5324
- */
5325
- export type CachePriorityWeight = number;
5326
- /**
5327
- * The endpoint to connect to.
5328
- */
5329
- export type TargetEndpointUri = string;
5330
- /**
5331
- * AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
5332
- *
5333
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
5334
- *
5335
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
5336
- *
5337
- * MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
5338
- */
5339
- export type SemanticClassificationProfile3 = "public" | "internal" | "confidential" | "restricted";
5340
- /**
5341
- * Max token/compute allocation.
5342
- */
5343
- export type MaxLiabilityBudget = number;
5344
- /**
5345
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the federated topology, if applicable.
5346
- */
5347
- export type TopologyCid1 = string | null;
5120
+ export type FaultCategoryProfile = "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
5348
5121
  /**
5349
5122
  * The mathematical dialect and theorem prover used to compile the proof.
5350
5123
  */
@@ -5566,7 +5339,7 @@ export type Shape = number[];
5566
5339
  /**
5567
5340
  * Exact byte size of the uncompressed tensor.
5568
5341
  */
5569
- export type VramFootprintBytes1 = number;
5342
+ export type VramFootprintBytes = number;
5570
5343
  /**
5571
5344
  * SHA-256 Merkle root of the payload chunks.
5572
5345
  */
@@ -5575,27 +5348,20 @@ export type MerkleRoot = string;
5575
5348
  * Strict URI pointer to the physical bytes.
5576
5349
  */
5577
5350
  export type StorageUri = string;
5351
+ export type OptimizationDirectionProfile = "maximize" | "minimize";
5352
+ export type PatchOperationProfile = "add" | "remove" | "replace" | "copy" | "move" | "test";
5578
5353
  /**
5579
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this protocol handshake to the Merkle-DAG.
5580
- */
5581
- export type HandshakeCid1 = string;
5582
- /**
5583
- * The agents establishing semantic alignment.
5584
- *
5585
- * @minItems 2
5586
- * @maxItems 250
5354
+ * The NIST FIPS post-quantum cryptographic algorithm used.
5587
5355
  */
5588
- export type ParticipantNodeCids1 = [string, string, ...string[]];
5356
+ export type PqAlgorithm = "ml-dsa" | "slh-dsa" | "falcon";
5589
5357
  /**
5590
- * The calculated geometric alignment of the agents' core definitions.
5358
+ * The identifier of the post-quantum public evaluation key.
5591
5359
  */
5592
- export type MeasuredCosineSimilarity1 = number;
5360
+ export type PublicKeyCid1 = string;
5593
5361
  /**
5594
- * The final verdict of the handshake protocol.
5362
+ * The base64-encoded post-quantum signature. Bounded to 100KB to safely accommodate massive SPHINCS+ hash trees without OOM crashes.
5595
5363
  */
5596
- export type AlignmentStatus = "aligned" | "projected" | "fallback_triggered" | "incommensurable";
5597
- export type OptimizationDirectionProfile = "maximize" | "minimize";
5598
- export type PatchOperationProfile = "add" | "remove" | "replace" | "copy" | "move" | "test";
5364
+ export type PqSignatureBlob = string;
5599
5365
  /**
5600
5366
  * The absolute Z-axis physical distance to lock the Presentation UI relative to the observer's optical center, resolving vergence-accommodation conflicts.
5601
5367
  */
@@ -5645,8 +5411,6 @@ export type CausalRelationship = "causes" | "confounds" | "correlates_with" | "u
5645
5411
  * An Immutable structural checkpoint.
5646
5412
  */
5647
5413
  export type SemanticVersionState = string;
5648
- export type SpanKindProfile = "client" | "server" | "producer" | "consumer" | "internal";
5649
- export type SpanStatusCodeProfile = "unset" | "ok" | "error";
5650
5414
  /**
5651
5415
  * The unique cryptographic identifier for this local spatial volume.
5652
5416
  */
@@ -5722,18 +5486,6 @@ export type TieBreakerPolicy = "lowest_cost" | "lowest_latency" | "highest_confi
5722
5486
  * A strictly typed SHA-256 hash pointing to a historically executed topological state.
5723
5487
  */
5724
5488
  export type TopologyHashReceipt = string;
5725
- /**
5726
- * Unique identifier for this telemetry snapshot.
5727
- */
5728
- export type BatchCid = string;
5729
- /**
5730
- * A collection of execution spans to be serialized.
5731
- */
5732
- export type Spans = ExecutionSpanReceipt[];
5733
- /**
5734
- * The array of strictly typed trace executions.
5735
- */
5736
- export type ExecutionNodes = ExecutionNodeReceipt[];
5737
5489
  /**
5738
5490
  * AGENT INSTRUCTION: Dictates the exact algorithmic or logical mechanism utilized to forge a semantic connection or transmute a bimodal data state, allowing downstream agents to weigh epistemic reliability.
5739
5491
  */
@@ -5770,10 +5522,6 @@ export type TenantCid = string | null;
5770
5522
  * The ephemeral session boundary for this execution.
5771
5523
  */
5772
5524
  export type SessionCid1 = string | null;
5773
- /**
5774
- * The declarative whitelist of data classifications permitted to flow through this graph.
5775
- */
5776
- export type AllowedSemanticClassifications = SemanticClassificationProfile[] | null;
5777
5525
  /**
5778
5526
  * CoReason Shared Kernel Ontology
5779
5527
  *
@@ -5783,7 +5531,6 @@ export interface CoReasonSharedKernelOntology {
5783
5531
  ASTGradientReceipt?: ASTGradientReceipt;
5784
5532
  ActivationSteeringContract?: ActivationSteeringContract;
5785
5533
  ActiveInferenceContract?: ActiveInferenceContract;
5786
- ActiveInferenceEpochState?: ActiveInferenceEpochState;
5787
5534
  AdjudicationIntent?: AdjudicationIntent;
5788
5535
  AdjudicationReceipt?: AdjudicationReceipt;
5789
5536
  AdjudicationRubricProfile?: AdjudicationRubricProfile;
@@ -5851,7 +5598,6 @@ export interface CoReasonSharedKernelOntology {
5851
5598
  CognitiveUncertaintyProfile?: CognitiveUncertaintyProfile1;
5852
5599
  CollectiveIntelligenceProfile?: CollectiveIntelligenceProfile1;
5853
5600
  CompositeNodeProfile?: CompositeNodeProfile;
5854
- ComputationalThermodynamicsProfile?: ComputationalThermodynamicsProfile;
5855
5601
  ComputeEngineProfile?: ComputeEngineProfile;
5856
5602
  ComputeProvisioningIntent?: ComputeProvisioningIntent;
5857
5603
  ComputeRateContract?: ComputeRateContract1;
@@ -5869,7 +5615,6 @@ export interface CoReasonSharedKernelOntology {
5869
5615
  ContinuousSpatialMutationIntent?: ContinuousSpatialMutationIntent;
5870
5616
  CouncilTopologyManifest?: CouncilTopologyManifest;
5871
5617
  CounterfactualRegretEvent?: CounterfactualRegretEvent;
5872
- CrossSwarmHandshakeState?: CrossSwarmHandshakeState;
5873
5618
  CrossoverMechanismProfile?: CrossoverMechanismProfile;
5874
5619
  CrossoverPolicy?: CrossoverPolicy1;
5875
5620
  CrosswalkResolutionReceipt?: CrosswalkResolutionReceipt;
@@ -5886,7 +5631,6 @@ export interface CoReasonSharedKernelOntology {
5886
5631
  DerivationModeProfile?: DerivationModeProfile;
5887
5632
  DifferentiableLogicPolicy?: DifferentiableLogicPolicy;
5888
5633
  DigitalTwinTopologyManifest?: DigitalTwinTopologyManifest;
5889
- DimensionalProjectionContract?: DimensionalProjectionContract;
5890
5634
  DiscourseNodeState?: DiscourseNodeState;
5891
5635
  DiscourseTreeManifest?: DiscourseTreeManifest;
5892
5636
  DistributionProfile?: DistributionProfile;
@@ -5953,9 +5697,7 @@ export interface CoReasonSharedKernelOntology {
5953
5697
  EvidentiaryWarrantState?: EvidentiaryWarrantState;
5954
5698
  EvolutionaryTopologyManifest?: EvolutionaryTopologyManifest;
5955
5699
  ExecutionEnvelopeState?: ExecutionEnvelopeState;
5956
- ExecutionNodeReceipt?: ExecutionNodeReceipt;
5957
5700
  ExecutionSLA?: ExecutionSLA;
5958
- ExecutionSpanReceipt?: ExecutionSpanReceipt;
5959
5701
  ExecutionSubstrateProfile?: ExecutionSubstrateProfile1;
5960
5702
  ExogenousEpistemicEvent?: ExogenousEpistemicEvent;
5961
5703
  FYIIntent?: FYIIntent;
@@ -5965,14 +5707,6 @@ export interface CoReasonSharedKernelOntology {
5965
5707
  FalsificationContract?: FalsificationContract;
5966
5708
  FaultCategoryProfile?: FaultCategoryProfile;
5967
5709
  FaultInjectionProfile?: FaultInjectionProfile;
5968
- FederatedBilateralSLA?: FederatedBilateralSLA2;
5969
- FederatedCIDFetchIntent?: FederatedCIDFetchIntent;
5970
- FederatedCapabilityAttestationReceipt?: FederatedCapabilityAttestationReceipt;
5971
- FederatedDiscoveryIntent?: FederatedDiscoveryIntent;
5972
- FederatedDiscoveryManifest?: FederatedDiscoveryManifest;
5973
- FederatedPeftContract?: FederatedPeftContract;
5974
- FederatedSecurityMacroManifest?: FederatedSecurityMacroManifest;
5975
- FederatedStateSnapshot?: FederatedStateSnapshot;
5976
5710
  FitnessObjectiveProfile?: FitnessObjectiveProfile;
5977
5711
  FormalLogicPremise?: FormalLogicPremise;
5978
5712
  FormalVerificationContract?: FormalVerificationContract;
@@ -6051,7 +5785,6 @@ export interface CoReasonSharedKernelOntology {
6051
5785
  ObservationEvent?: ObservationEvent;
6052
5786
  OntologicalAlignmentPolicy?: OntologicalAlignmentPolicy;
6053
5787
  OntologicalCrosswalkIntent?: OntologicalCrosswalkIntent;
6054
- OntologicalHandshakeReceipt?: OntologicalHandshakeReceipt;
6055
5788
  OntologicalNormalizationIntent?: OntologicalNormalizationIntent;
6056
5789
  OntologicalReificationReceipt?: OntologicalReificationReceipt;
6057
5790
  OntologicalSurfaceProjectionManifest?: OntologicalSurfaceProjectionManifest;
@@ -6115,11 +5848,8 @@ export interface CoReasonSharedKernelOntology {
6115
5848
  SideEffectProfile?: SideEffectProfile1;
6116
5849
  SimulationConvergenceSLA?: SimulationConvergenceSLA1;
6117
5850
  SimulationEscrowContract?: SimulationEscrowContract1;
6118
- SpanEvent?: SpanEvent;
6119
- SpanKindProfile?: SpanKindProfile;
6120
- SpanStatusCodeProfile?: SpanStatusCodeProfile;
6121
5851
  SpatialBillboardContract?: SpatialBillboardContract;
6122
- SpatialHardwareProfile?: SpatialHardwareProfile1;
5852
+ SpatialHardwareProfile?: SpatialHardwareProfile;
6123
5853
  SpatialKinematicActionIntent?: SpatialKinematicActionIntent;
6124
5854
  SpatialReferenceFrameManifest?: SpatialReferenceFrameManifest;
6125
5855
  SpatialRenderMaterial?: SpatialRenderMaterial;
@@ -6166,7 +5896,6 @@ export interface CoReasonSharedKernelOntology {
6166
5896
  TerminalCognitiveEvent?: TerminalCognitiveEvent;
6167
5897
  TerminalConditionContract?: TerminalConditionContract1;
6168
5898
  TheoryOfMindSnapshot?: TheoryOfMindSnapshot;
6169
- ThermodynamicState?: ThermodynamicState;
6170
5899
  ThoughtBranchState?: ThoughtBranchState;
6171
5900
  TieBreakerPolicy?: TieBreakerPolicy;
6172
5901
  TokenBurnReceipt?: TokenBurnReceipt;
@@ -6177,7 +5906,6 @@ export interface CoReasonSharedKernelOntology {
6177
5906
  TopologicalRewardContract?: TopologicalRewardContract;
6178
5907
  TopologyHashReceipt?: TopologyHashReceipt;
6179
5908
  TraceContextState?: TraceContextState1;
6180
- TraceExportManifest?: TraceExportManifest;
6181
5909
  TransformationMechanismProfile?: TransformationMechanismProfile1;
6182
5910
  TransitionEdgeProfile?: TransitionEdgeProfile;
6183
5911
  TruthMaintenancePolicy?: TruthMaintenancePolicy;
@@ -6249,17 +5977,17 @@ export interface VectorEmbeddingState {
6249
5977
  /**
6250
5978
  * CoReason Shared Kernel Ontology
6251
5979
  *
6252
- * AGENT INSTRUCTION: Establishes a hardware-level Representation Engineering (RepE) directive to mechanically manipulate latent dimensions via forward-pass tensor injection.
5980
+ * AGENT INSTRUCTION: Establishes a hardware-level Representation Engineering (RepE) directive to mechanically manipulate latent dimensions via forward-pass tensor injection. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
6253
5981
  *
6254
- * CAUSAL AFFORDANCE: Physically forces an additive, ablation, or clamping operation onto the model's residual stream at specific `injection_layers`, steering the generator away from unstable hallucination geometries prior to token projection.
5982
+ * CAUSAL AFFORDANCE: Physically forces an additive, ablation, or clamping operation onto the model's residual stream at specific `target_hook_points`, steering the generator away from unstable hallucination geometries prior to token projection.
6255
5983
  *
6256
- * EPISTEMIC BOUNDS: Cryptographically locked by `steering_vector_hash` (SHA-256 pattern `^[a-f0-9]{64}$`). `scaling_factor` is bounded above (`le=100.0`) but unbounded below, permitting negative magnitudes for ablation. The `@model_validator` deterministically sorts `injection_layers` (each `ge=0`).
5984
+ * EPISTEMIC BOUNDS: Cryptographically locked by `steering_vector_hash` (SHA-256 pattern `^[a-f0-9]{64}$`). `scaling_factor` is bounded above (`le=100.0`) but unbounded below, permitting negative magnitudes for ablation. The `@model_validator` deterministically sorts `target_hook_points`.
6257
5985
  *
6258
- * MCP ROUTING TRIGGERS: Representation Engineering, RepE, Activation Steering, Residual Stream Ablation, Concept Vectors
5986
+ * MCP ROUTING TRIGGERS: Representation Engineering, RepE, Activation Steering, Residual Stream Ablation, Concept Vectors, TransformerLens, SAELens
6259
5987
  */
6260
5988
  export interface ActivationSteeringContract {
6261
5989
  steering_vector_hash: SteeringVectorHash;
6262
- injection_layers: InjectionLayers;
5990
+ target_hook_points: TargetHookPoints;
6263
5991
  scaling_factor: ScalingFactor;
6264
5992
  vector_modality: VectorModality;
6265
5993
  }
@@ -6282,46 +6010,6 @@ export interface ActiveInferenceContract {
6282
6010
  expected_information_gain: ExpectedInformationGain;
6283
6011
  execution_cost_budget_magnitude: ExecutionCostBudgetMagnitude;
6284
6012
  }
6285
- /**
6286
- * CoReason Shared Kernel Ontology
6287
- *
6288
- * AGENT INSTRUCTION: A macroscopic container tracking the directed graph of evolutionary retries across an entire task lifecycle.
6289
- *
6290
- * CAUSAL AFFORDANCE: Aggregates free energy across multiple EpistemicRejectionReceipts to trigger thermodynamic circuit breakers when convergence fails.
6291
- *
6292
- * EPISTEMIC BOUNDS: Aggregated free energy must be non-negative. Rejection history is deterministically sorted by receipt_cid for immutable hashing.
6293
- *
6294
- * MCP ROUTING TRIGGERS: Active Inference Loop, Thermodynamic Circuit Breaker, Epistemic Aggregation, Retry Ledger
6295
- */
6296
- export interface ActiveInferenceEpochState {
6297
- epoch_cid: EpochCid;
6298
- target_objective_cid?: TargetObjectiveCid;
6299
- rejection_history?: RejectionHistory;
6300
- current_free_energy: CurrentFreeEnergy;
6301
- epoch_status?: EpochStatus;
6302
- }
6303
- /**
6304
- * CoReason Shared Kernel Ontology
6305
- *
6306
- * AGENT INSTRUCTION: The mathematical backpropagation signal triggered when the Deterministic Compiler rejects a stochastic manifold. Quantifies the rejection and provides a mutation gradient.
6307
- *
6308
- * CAUSAL AFFORDANCE: Instructs the LLM ensemble on how to perturb the Upper Confidence Bound (UCB) during the next MCTS generation attempt by mathematically quantifying the error.
6309
- *
6310
- * EPISTEMIC BOUNDS: Kullback-Leibler divergence is strictly non-negative. A negative mathematical distance is a paradox and raises a ValueError.
6311
- *
6312
- * MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
6313
- */
6314
- export interface EpistemicRejectionReceipt {
6315
- event_cid: EventCid;
6316
- prior_event_hash?: PriorEventHash;
6317
- timestamp: Timestamp;
6318
- topology_class?: TopologyClass;
6319
- receipt_cid: ReceiptCid;
6320
- failed_projection_cid: FailedProjectionCid;
6321
- violated_algebraic_constraint: ViolatedAlgebraicConstraint;
6322
- kl_divergence_to_validity: KlDivergenceToValidity;
6323
- stochastic_mutation_gradient: StochasticMutationGradient;
6324
- }
6325
6013
  /**
6326
6014
  * CoReason Shared Kernel Ontology
6327
6015
  *
@@ -6334,7 +6022,7 @@ export interface EpistemicRejectionReceipt {
6334
6022
  * MCP ROUTING TRIGGERS: Social Choice Theory, Condorcet Paradox, MCDA Deadlock, Dictatorial Resolution, Tie-Breaking Heuristic
6335
6023
  */
6336
6024
  export interface AdjudicationIntent {
6337
- topology_class?: TopologyClass1;
6025
+ topology_class?: TopologyClass;
6338
6026
  deadlocked_claims: DeadlockedClaims;
6339
6027
  resolution_schema: ResolutionSchema;
6340
6028
  timeout_action: TimeoutAction;
@@ -6373,10 +6061,10 @@ export interface EpistemicProxyStateAny {
6373
6061
  * Epistemic Commitment, Audit Trail
6374
6062
  */
6375
6063
  export interface AdjudicationReceipt {
6376
- event_cid: EventCid1;
6377
- prior_event_hash?: PriorEventHash1;
6378
- timestamp: Timestamp1;
6379
- topology_class?: TopologyClass2;
6064
+ event_cid: EventCid;
6065
+ prior_event_hash?: PriorEventHash;
6066
+ timestamp: Timestamp;
6067
+ topology_class?: TopologyClass1;
6380
6068
  rubric_cid: RubricCid;
6381
6069
  /**
6382
6070
  * The deterministic capability pointer representing the node that was evaluated.
@@ -6547,7 +6235,7 @@ export interface EnvironmentalSpoofingProfile {
6547
6235
  * MCP ROUTING TRIGGERS: Zero-Sum Minimax Game, Red Team vs Blue Team, Macro Abstraction, Generative Adversarial Networks, Topological Compilation
6548
6236
  */
6549
6237
  export interface AdversarialMarketTopologyManifest {
6550
- topology_class?: TopologyClass3;
6238
+ topology_class?: TopologyClass2;
6551
6239
  blue_team_cids: BlueTeamCids;
6552
6240
  red_team_cids: RedTeamCids;
6553
6241
  /**
@@ -6637,7 +6325,7 @@ export interface AuthorizationClaims {
6637
6325
  * MCP ROUTING TRIGGERS: Expected Utility Theory, Multi-Objective Optimization, Epistemic Certainty, Spot Market Bid, Cost Estimation
6638
6326
  */
6639
6327
  export interface AgentBidIntent {
6640
- topology_class?: TopologyClass4;
6328
+ topology_class?: TopologyClass3;
6641
6329
  agent_cid: AgentCid;
6642
6330
  estimated_cost_magnitude: EstimatedCostMagnitude;
6643
6331
  estimated_latency_ms: EstimatedLatencyMs;
@@ -6680,7 +6368,7 @@ export interface AmbientState {
6680
6368
  * CoReason Shared Kernel Ontology
6681
6369
  */
6682
6370
  export interface AnalogicalMappingTask {
6683
- topology_class?: TopologyClass5;
6371
+ topology_class?: TopologyClass4;
6684
6372
  task_cid: TaskCid1;
6685
6373
  source_domain: SourceDomain;
6686
6374
  target_domain: TargetDomain;
@@ -6724,7 +6412,7 @@ export interface AnchoringPolicy {
6724
6412
  * MCP ROUTING TRIGGERS: Gibsonian Affordance, MDP Action Space, Pearlian Do-Operator, Capability-Based Security, Halting Problem
6725
6413
  */
6726
6414
  export interface SpatialToolManifest {
6727
- topology_class?: TopologyClass6;
6415
+ topology_class?: TopologyClass5;
6728
6416
  tool_name: ToolName;
6729
6417
  description: Description1;
6730
6418
  input_schema: InputSchema;
@@ -6830,7 +6518,7 @@ export interface ExecutionSLA {
6830
6518
  * MCP ROUTING TRIGGERS: Actor Model, Object Capability Model, Zero-Trust Architecture, Distributed RPC, Supply-Chain Isolation
6831
6519
  */
6832
6520
  export interface MCPServerManifest {
6833
- topology_class?: TopologyClass7;
6521
+ topology_class?: TopologyClass6;
6834
6522
  server_cid: ServerCid;
6835
6523
  transport: Transport;
6836
6524
  binary_hash?: BinaryHash;
@@ -6850,7 +6538,7 @@ export interface MCPServerManifest {
6850
6538
  * MCP ROUTING TRIGGERS: Inter-Process Communication, POSIX Standard Streams, Local Sandboxing, Binary Execution, Subprocess Spawn
6851
6539
  */
6852
6540
  export interface StdioTransportProfile {
6853
- topology_class?: TopologyClass8;
6541
+ topology_class?: TopologyClass7;
6854
6542
  command: Command;
6855
6543
  args?: Args;
6856
6544
  env_vars?: EnvVars;
@@ -6873,7 +6561,7 @@ export interface EnvVars {
6873
6561
  * MCP ROUTING TRIGGERS: Event-Driven Architecture, Server-Sent Events, Unidirectional Stream, Asynchronous Message Passing, TCP Persistence
6874
6562
  */
6875
6563
  export interface SSETransportProfile {
6876
- topology_class?: TopologyClass9;
6564
+ topology_class?: TopologyClass8;
6877
6565
  uri: Uri;
6878
6566
  headers?: Headers;
6879
6567
  }
@@ -6895,7 +6583,7 @@ export interface Headers {
6895
6583
  * MCP ROUTING TRIGGERS: Stateless Architecture, Zero-Trust Network Access, HTTP Request Smuggling Prevention, JSON-RPC Egress, Out-of-Band Socket
6896
6584
  */
6897
6585
  export interface HTTPTransportProfile {
6898
- topology_class?: TopologyClass10;
6586
+ topology_class?: TopologyClass9;
6899
6587
  uri: Uri1;
6900
6588
  headers?: Headers1;
6901
6589
  }
@@ -6959,7 +6647,7 @@ export interface OpticalMappingContract {
6959
6647
  * MCP ROUTING TRIGGERS: WebAssembly System Interface, Zero-Knowledge Virtual Machine, eBPF, Execution Sandbox, Arbitrary Code Execution Mitigation
6960
6648
  */
6961
6649
  export interface EphemeralNamespacePartitionState {
6962
- topology_class?: TopologyClass11;
6650
+ topology_class?: TopologyClass10;
6963
6651
  partition_cid: PartitionCid;
6964
6652
  execution_runtime: ExecutionRuntime;
6965
6653
  authorized_bytecode_hashes: AuthorizedBytecodeHashes;
@@ -6980,7 +6668,7 @@ export interface EphemeralNamespacePartitionState {
6980
6668
  * MCP ROUTING TRIGGERS: Bipartite Proposer-Verifier, Test-Time Compute, Zero-Trust Execution, Active Inference, Contract Topology
6981
6669
  */
6982
6670
  export interface EpistemicZeroTrustContract {
6983
- topology_class?: TopologyClass12;
6671
+ topology_class?: TopologyClass11;
6984
6672
  intent_cid: IntentCid;
6985
6673
  semantic_planning_task: SemanticPlanningTask;
6986
6674
  schema_blueprint_name: SchemaBlueprintName;
@@ -7028,7 +6716,7 @@ export interface ThoughtBranchState {
7028
6716
  parent_branch_cid?: ParentBranchCid;
7029
6717
  latent_content_hash: LatentContentHash;
7030
6718
  prm_score?: PrmScore;
7031
- topology_class?: TopologyClass13;
6719
+ topology_class?: TopologyClass12;
7032
6720
  }
7033
6721
  /**
7034
6722
  * CoReason Shared Kernel Ontology
@@ -7043,7 +6731,7 @@ export interface ThoughtBranchState {
7043
6731
  */
7044
6732
  export interface StochasticTopologyManifest {
7045
6733
  topology_cid: TopologyCid;
7046
- topology_class?: TopologyClass14;
6734
+ topology_class?: TopologyClass13;
7047
6735
  phase: IdeationPhaseProfile;
7048
6736
  stochastic_graph: StochasticGraph;
7049
6737
  superposition?: HypothesisSuperpositionState | null;
@@ -7099,7 +6787,7 @@ export interface CompetingManifolds {
7099
6787
  * MCP ROUTING TRIGGERS: Monte Carlo Tree Search, UCT Formula, Strategic Planning, Claw Code Deliberation, Test-Time Compute, Thought Node, Tree of Thoughts
7100
6788
  */
7101
6789
  export interface StrategicThoughtNodeIntent {
7102
- topology_class?: TopologyClass15;
6790
+ topology_class?: TopologyClass14;
7103
6791
  parent_node_hash: ParentNodeHash;
7104
6792
  proposed_action: ProposedAction;
7105
6793
  rationale: Rationale;
@@ -7114,7 +6802,7 @@ export interface StrategicThoughtNodeIntent {
7114
6802
  * MCP ROUTING TRIGGERS: Graph CRDTs, Topological Retraction, Non-Monotonic Logic, Edge Invalidation
7115
6803
  */
7116
6804
  export interface TemporalEdgeInvalidationIntent {
7117
- topology_class?: TopologyClass16;
6805
+ topology_class?: TopologyClass15;
7118
6806
  /**
7119
6807
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
7120
6808
  */
@@ -7137,7 +6825,7 @@ export interface TemporalEdgeInvalidationIntent {
7137
6825
  * MCP ROUTING TRIGGERS: Popperian Falsification, Null Hypothesis, Defeasible Logic, Empirical Falsifiability, Structural Boundary
7138
6826
  */
7139
6827
  export interface EmpiricalFalsificationContract {
7140
- topology_class?: TopologyClass17;
6828
+ topology_class?: TopologyClass16;
7141
6829
  condition_cid: ConditionCid;
7142
6830
  description: Description2;
7143
6831
  required_tool_name?: RequiredToolName;
@@ -7149,7 +6837,7 @@ export interface EmpiricalFalsificationContract {
7149
6837
  * AGENT INSTRUCTION: A contract deploying constraint oracles to hunt for counter-models to falsify a hypothesis.
7150
6838
  */
7151
6839
  export interface FalsificationContract {
7152
- topology_class?: TopologyClass18;
6840
+ topology_class?: TopologyClass17;
7153
6841
  falsification_solver?: FalsificationSolver;
7154
6842
  /**
7155
6843
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -7172,7 +6860,7 @@ export interface FalsificationContract {
7172
6860
  * MCP ROUTING TRIGGERS: Bipartite Ontological Mapping, Grounding Oracle, CURIE Resolution, Isometry Thresholding, Semantic Crosswalk
7173
6861
  */
7174
6862
  export interface OntologicalCrosswalkIntent {
7175
- topology_class?: TopologyClass19;
6863
+ topology_class?: TopologyClass18;
7176
6864
  target_graph_cid: TargetGraphCid;
7177
6865
  source_strings: SourceStrings;
7178
6866
  target_ontology_registries: TargetOntologyRegistries;
@@ -7190,7 +6878,7 @@ export interface OntologicalCrosswalkIntent {
7190
6878
  * MCP ROUTING TRIGGERS: Synchronous Epistemic Signaling, Mixed-Initiative Control, Finite State Machine, Oracle Projection, Halting Problem
7191
6879
  */
7192
6880
  export interface SemanticIntent {
7193
- topology_class?: TopologyClass20;
6881
+ topology_class?: TopologyClass19;
7194
6882
  message: Message;
7195
6883
  timeout_action: TimeoutAction1;
7196
6884
  }
@@ -7206,7 +6894,7 @@ export interface SemanticIntent {
7206
6894
  * MCP ROUTING TRIGGERS: Active Inference, Expected Free Energy, Shannon Entropy Reduction, Zero-Shot Elicitation, Epistemic Gap
7207
6895
  */
7208
6896
  export interface DraftingIntent {
7209
- topology_class?: TopologyClass21;
6897
+ topology_class?: TopologyClass20;
7210
6898
  context_prompt: ContextPrompt;
7211
6899
  resolution_schema: ResolutionSchema1;
7212
6900
  timeout_action: TimeoutAction2;
@@ -7229,7 +6917,7 @@ export interface ResolutionSchema1 {
7229
6917
  * MCP ROUTING TRIGGERS: Epistemic Deficit Escalation, Forge-to-Claw Handoff, Sovereign LLM Proxy, Thermodynamic Circuit Breaker, MCTS Delegation
7230
6918
  */
7231
6919
  export interface EscalationIntent {
7232
- topology_class?: TopologyClass22;
6920
+ topology_class?: TopologyClass21;
7233
6921
  target_solver_urn: TargetSolverUrn;
7234
6922
  epistemic_deficit_description: EpistemicDeficitDescription;
7235
6923
  context_window_cids: ContextWindowCids;
@@ -7247,7 +6935,7 @@ export interface EscalationIntent {
7247
6935
  * MCP ROUTING TRIGGERS: Zero-Shot Tool Discovery, Capability Routing, Dense Vector Embedding, Epistemic Deficit Resolution
7248
6936
  */
7249
6937
  export interface SemanticDiscoveryIntent {
7250
- topology_class?: TopologyClass23;
6938
+ topology_class?: TopologyClass22;
7251
6939
  query_vector: VectorEmbeddingState1;
7252
6940
  min_isometry_score: MinIsometryScore;
7253
6941
  required_structural_types: RequiredStructuralTypes;
@@ -7293,7 +6981,7 @@ export interface VectorEmbeddingState1 {
7293
6981
  * MCP ROUTING TRIGGERS: Graph Isomorphism, UI State Mutation, Heuristic Regrouping, Dynamic Manifold, Spatial Reorganization
7294
6982
  */
7295
6983
  export interface TaxonomicRestructureIntent {
7296
- topology_class?: TopologyClass24;
6984
+ topology_class?: TopologyClass23;
7297
6985
  restructure_heuristic: RestructureHeuristic;
7298
6986
  target_taxonomy: GenerativeTaxonomyManifest;
7299
6987
  }
@@ -7450,7 +7138,7 @@ export interface SpatialRenderMaterial {
7450
7138
  * MCP ROUTING TRIGGERS: Maximum Inner Product Search, k-Nearest Neighbors, Latent Manifold Projection, Retrieval-Augmented Generation
7451
7139
  */
7452
7140
  export interface LatentProjectionIntent {
7453
- topology_class?: TopologyClass25;
7141
+ topology_class?: TopologyClass24;
7454
7142
  synthetic_target_vector: VectorEmbeddingState2;
7455
7143
  top_k_candidates: TopKCandidates;
7456
7144
  min_isometry_score: MinIsometryScore1;
@@ -7555,7 +7243,7 @@ export interface ContextExpansionPolicy {
7555
7243
  * MCP ROUTING TRIGGERS: Schema Inference, Memory Heap Parsing, Abductive Reasoning, XHR Interception, Unstructured Transmutation
7556
7244
  */
7557
7245
  export interface LatentSchemaInferenceIntent {
7558
- topology_class?: TopologyClass26;
7246
+ topology_class?: TopologyClass25;
7559
7247
  target_buffer_cid: TargetBufferCid;
7560
7248
  max_schema_depth: MaxSchemaDepth;
7561
7249
  max_properties: MaxProperties;
@@ -7573,7 +7261,7 @@ export interface LatentSchemaInferenceIntent {
7573
7261
  * MCP ROUTING TRIGGERS: Human-in-the-Loop, Intent Translation, Agentic Forge, Objective Setting, Budget Allocation
7574
7262
  */
7575
7263
  export interface HumanDirectiveIntent {
7576
- topology_class?: TopologyClass27;
7264
+ topology_class?: TopologyClass26;
7577
7265
  natural_language_goal: NaturalLanguageGoal;
7578
7266
  allocated_budget_magnitude: AllocatedBudgetMagnitude;
7579
7267
  /**
@@ -7593,7 +7281,7 @@ export interface HumanDirectiveIntent {
7593
7281
  * MCP ROUTING TRIGGERS: Semantic Resolution, Optimal Transport, ETL Bypass, Dynamic Ontology
7594
7282
  */
7595
7283
  export interface ContextualSemanticResolutionIntent {
7596
- topology_class?: TopologyClass28;
7284
+ topology_class?: TopologyClass27;
7597
7285
  source_record_cid: SourceRecordCid;
7598
7286
  target_ontology_graph_cid: TargetOntologyGraphCid;
7599
7287
  encoding_profile: TabularEncodingProfile;
@@ -7606,7 +7294,7 @@ export interface ContextualSemanticResolutionIntent {
7606
7294
  * AGENT INSTRUCTION: Authorizes a Semantic Watchdog Agent to perform strict out-of-band polling against external semantic registries to monitor for ontological deprecation or semantic drift.
7607
7295
  */
7608
7296
  export interface OntologyDiscoveryIntent {
7609
- topology_class?: TopologyClass29;
7297
+ topology_class?: TopologyClass28;
7610
7298
  jsonrpc: Jsonrpc;
7611
7299
  method: Method;
7612
7300
  params?: Params;
@@ -7627,7 +7315,7 @@ export interface OntologyDiscoveryIntent {
7627
7315
  * MCP ROUTING TRIGGERS: Semantic Mapping, Heuristic Injection, Cryptographic Petition, Swarm Logic
7628
7316
  */
7629
7317
  export interface SemanticMappingHeuristicIntent {
7630
- topology_class?: TopologyClass30;
7318
+ topology_class?: TopologyClass29;
7631
7319
  proposal_cid: ProposalCid;
7632
7320
  source_ontology_namespace: SourceOntologyNamespace;
7633
7321
  target_ontology_namespace: TargetOntologyNamespace;
@@ -7646,7 +7334,7 @@ export interface SemanticMappingHeuristicIntent {
7646
7334
  * MCP ROUTING TRIGGERS: Optimistic Locking, Affine CRDT, Spherical Linear Interpolation, Continuous Reconciliation, Kinematic Drag
7647
7335
  */
7648
7336
  export interface ContinuousSpatialMutationIntent {
7649
- topology_class?: TopologyClass31;
7337
+ topology_class?: TopologyClass30;
7650
7338
  /**
7651
7339
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
7652
7340
  */
@@ -7693,23 +7381,48 @@ export interface KinematicDerivativeProfile {
7693
7381
  /**
7694
7382
  * CoReason Shared Kernel Ontology
7695
7383
  *
7696
- * AGENT INSTRUCTION: Formulates a constrained Knapsack Problem for dynamically allocating liquid compute resources based on exact Quality of Service (QoS) priorities and semantic load shedding rules.
7384
+ * AGENT INSTRUCTION: A Kinetic execution trigger used to request the physical instantiation of new execution substrates. This intent is delegated to SkyPilot for multi-cloud spot-market orchestration.
7697
7385
  *
7698
- * CAUSAL AFFORDANCE: Emits a structural demand to the swarm orchestrator to negotiate, acquire, and cryptographically lock the requisite token escrow before allocating kinetic execution cycles to a sub-graph.
7386
+ * CAUSAL AFFORDANCE: Triggers the expansion loop in the Governance Plane, authorizing the PulumiActuator (backed by SkyPilot) to provision GPU/CPU nodes across AWS, GCP, Azure, or Vast.ai.
7699
7387
  *
7700
- * EPISTEMIC BOUNDS: Economic velocity is strictly clamped by `max_budget` (`le=18446744073709551615`), physically typed as an integer to prevent floating-point fractures during spot market bidding. The `required_capabilities` array is deterministically sorted by a `@model_validator`.
7388
+ * EPISTEMIC BOUNDS: Requires a strictly defined `HardwareProfile` and `EscrowPolicy` to prevent thermodynamic runaway. Cost estimates are validated against the `ComputeRateContract`.
7701
7389
  *
7702
- * MCP ROUTING TRIGGERS: Knapsack Optimization, Semantic Load Shedding, Spot Compute Bidding, QoS Classification, Resource Provisioning
7390
+ * MCP ROUTING TRIGGERS: SkyPilot Orchestration, Multi-Cloud Provisioning, Spot-Market Acquisition, Thermodynamic Expansion, Substrate Instantiation
7703
7391
  */
7704
7392
  export interface ComputeProvisioningIntent {
7705
- topology_class?: TopologyClass32;
7393
+ topology_class?: TopologyClass31;
7394
+ provisioning_engine?: ProvisioningEngine;
7706
7395
  max_budget: MaxBudget;
7707
- required_capabilities: RequiredCapabilities;
7396
+ /**
7397
+ * The target physical hardware specification (e.g., A100:8).
7398
+ */
7399
+ hardware_profile?: SpatialHardwareProfile | null;
7400
+ use_spot?: UseSpot;
7401
+ autostop_idle_minutes?: AutostopIdleMinutes;
7402
+ required_capabilities?: RequiredCapabilities;
7708
7403
  /**
7709
7404
  * The Quality of Service priority, used by the compute spot market for semantic load shedding.
7710
7405
  */
7711
7406
  qos_class?: "critical" | "high" | "interactive" | "background_batch";
7712
7407
  }
7408
+ /**
7409
+ * CoReason Shared Kernel Ontology
7410
+ *
7411
+ * AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
7412
+ *
7413
+ * CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
7414
+ *
7415
+ * EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
7416
+ *
7417
+ * MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
7418
+ */
7419
+ export interface SpatialHardwareProfile {
7420
+ compute_tier?: ComputeTier;
7421
+ min_vram_gb?: MinVramGb;
7422
+ coreason_network_mode?: CoreasonNetworkMode;
7423
+ accelerator_type?: AcceleratorType;
7424
+ provider_whitelist?: ProviderWhitelist;
7425
+ }
7713
7426
  /**
7714
7427
  * CoReason Shared Kernel Ontology
7715
7428
  *
@@ -7722,7 +7435,7 @@ export interface ComputeProvisioningIntent {
7722
7435
  * MCP ROUTING TRIGGERS: Decentralized Spot Market, Request for Proposal, Thermodynamic Compute Allocation, Algorithmic Mechanism Design, Kinetic Execution Trigger
7723
7436
  */
7724
7437
  export interface TaskAnnouncementIntent {
7725
- topology_class?: TopologyClass33;
7438
+ topology_class?: TopologyClass32;
7726
7439
  task_cid: TaskCid2;
7727
7440
  required_action_space_cid?: RequiredActionSpaceCid;
7728
7441
  max_budget_magnitude: MaxBudgetMagnitude;
@@ -7739,7 +7452,7 @@ export interface TaskAnnouncementIntent {
7739
7452
  * MCP ROUTING TRIGGERS: Spectral Graph Partitioning, Byzantine Fault Isolation, Epistemic Contagion, Defeasible Logic, Algebraic Connectivity
7740
7453
  */
7741
7454
  export interface QuarantineIntent {
7742
- topology_class?: TopologyClass34;
7455
+ topology_class?: TopologyClass33;
7743
7456
  /**
7744
7457
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
7745
7458
  */
@@ -7758,7 +7471,7 @@ export interface QuarantineIntent {
7758
7471
  * MCP ROUTING TRIGGERS: Supervisory Control Theory, Mixed-Initiative System, Discrete-Event System, Bounded Delay, Pearlian Intervention
7759
7472
  */
7760
7473
  export interface InterventionIntent {
7761
- topology_class?: TopologyClass35;
7474
+ topology_class?: TopologyClass34;
7762
7475
  /**
7763
7476
  * The scope constraints bounding the intervention.
7764
7477
  */
@@ -7896,7 +7609,7 @@ export interface CognitiveCritiqueProfile {
7896
7609
  * Projection, Human-in-the-Loop
7897
7610
  */
7898
7611
  export interface FYIIntent {
7899
- topology_class?: TopologyClass36;
7612
+ topology_class?: TopologyClass35;
7900
7613
  }
7901
7614
  /**
7902
7615
  * CoReason Shared Kernel Ontology
@@ -7910,7 +7623,7 @@ export interface FYIIntent {
7910
7623
  * MCP ROUTING TRIGGERS: Markov Decision Process, Absorbing State, Graceful Degradation, Control-Flow Override, Policy Intervention
7911
7624
  */
7912
7625
  export interface FallbackIntent {
7913
- topology_class?: TopologyClass37;
7626
+ topology_class?: TopologyClass36;
7914
7627
  /**
7915
7628
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
7916
7629
  */
@@ -7932,7 +7645,7 @@ export interface FallbackIntent {
7932
7645
  * MCP ROUTING TRIGGERS: Dictatorial Override, Byzantine Fault Resolution, Pearlian Intervention, Causal Shattering, Zero-Trust Override
7933
7646
  */
7934
7647
  export interface OverrideIntent {
7935
- topology_class?: TopologyClass38;
7648
+ topology_class?: TopologyClass37;
7936
7649
  /**
7937
7650
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
7938
7651
  */
@@ -7962,7 +7675,7 @@ export interface OverrideAction {
7962
7675
  * MCP ROUTING TRIGGERS: Defeasible Logic, Non-Monotonic Revision, Out-of-Distribution Adaptation, Normative Drift Resolution, Pearlian Intervention
7963
7676
  */
7964
7677
  export interface ConstitutionalAmendmentIntent {
7965
- topology_class?: TopologyClass39;
7678
+ topology_class?: TopologyClass38;
7966
7679
  drift_event_cid: DriftEventCid;
7967
7680
  proposed_patch: ProposedPatch;
7968
7681
  justification: Justification1;
@@ -7985,7 +7698,7 @@ export interface ProposedPatch {
7985
7698
  * MCP ROUTING TRIGGERS: Mathematical Kinematics, Bezier Geometry, Fitts's Law, OS-Level Actuation, Non-Linear Trajectory
7986
7699
  */
7987
7700
  export interface SpatialKinematicActionIntent {
7988
- topology_class?: TopologyClass40;
7701
+ topology_class?: TopologyClass39;
7989
7702
  action_class: ActionClass;
7990
7703
  /**
7991
7704
  * The primary spatial terminus for clicks or hovers.
@@ -8034,7 +7747,7 @@ export interface SE3TransformProfile1 {
8034
7747
  * MCP ROUTING TRIGGERS: Dual-Process Theory, Non-Monotonic Revision, System 2 Remediation, Backtracking Search, Abstract Syntax Tree
8035
7748
  */
8036
7749
  export interface System2RemediationIntent {
8037
- topology_class?: TopologyClass41;
7750
+ topology_class?: TopologyClass40;
8038
7751
  fault_cid: FaultCid;
8039
7752
  /**
8040
7753
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -8079,7 +7792,7 @@ export interface SubstrateHydrationManifest {
8079
7792
  */
8080
7793
  target_node_cid: string;
8081
7794
  substrate_profile: ExecutionSubstrateProfile;
8082
- topology_class?: TopologyClass42;
7795
+ topology_class?: TopologyClass41;
8083
7796
  cryptographic_checksums?: CryptographicChecksums;
8084
7797
  }
8085
7798
  /**
@@ -8109,7 +7822,7 @@ export interface CryptographicChecksums {
8109
7822
  * MCP ROUTING TRIGGERS: Pre-Inference Gate, Neurosymbolic Request, Probability Envelope, SLA Enforcement, Inference Termination
8110
7823
  */
8111
7824
  export interface NeurosymbolicInferenceIntent {
8112
- topology_class?: TopologyClass43;
7825
+ topology_class?: TopologyClass42;
8113
7826
  source_entity: ContextualizedSourceState1;
8114
7827
  fidelity_receipt: TopologicalFidelityReceipt;
8115
7828
  uncertainty_profile: CognitiveUncertaintyProfile;
@@ -8161,7 +7874,7 @@ export interface EpistemicCompressionSLA {
8161
7874
  */
8162
7875
  export interface TopologicalProjectionIntent {
8163
7876
  provenance_trace_cid?: ProvenanceTraceCid;
8164
- topology_class?: TopologyClass44;
7877
+ topology_class?: TopologyClass43;
8165
7878
  projection_cid: ProjectionCid;
8166
7879
  source_superposition_cid: SourceSuperpositionCid;
8167
7880
  target_topology: TargetTopologyProfile;
@@ -8181,7 +7894,7 @@ export interface TopologicalProjectionIntent {
8181
7894
  * MCP ROUTING TRIGGERS: Automated Theorem Proving, Constraint Satisfaction, Logic Programming, Substrate Oracle
8182
7895
  */
8183
7896
  export interface FormalLogicPremise {
8184
- topology_class?: TopologyClass45;
7897
+ topology_class?: TopologyClass44;
8185
7898
  dialect_urn: DialectUrn;
8186
7899
  formal_statement: FormalStatement;
8187
7900
  verification_script?: VerificationScript;
@@ -8190,7 +7903,7 @@ export interface FormalLogicPremise {
8190
7903
  * CoReason Shared Kernel Ontology
8191
7904
  */
8192
7905
  export interface CausalPropagationIntent {
8193
- topology_class?: TopologyClass46;
7906
+ topology_class?: TopologyClass45;
8194
7907
  target_graph_cid: TargetGraphCid1;
8195
7908
  task_cid: TaskCid3;
8196
7909
  grounding_sla: EvidentiaryGroundingSLA;
@@ -8300,7 +8013,7 @@ export interface EvidentiaryCitationState {
8300
8013
  * CoReason Shared Kernel Ontology
8301
8014
  */
8302
8015
  export interface RDFSerializationIntent {
8303
- topology_class?: TopologyClass47;
8016
+ topology_class?: TopologyClass46;
8304
8017
  export_cid: ExportCid;
8305
8018
  target_graph_cid: TargetGraphCid2;
8306
8019
  target_format?: TargetFormat;
@@ -8339,13 +8052,13 @@ export interface SHACLValidationSLA {
8339
8052
  export interface SPARQLQueryIntent {
8340
8053
  query_string: QueryString;
8341
8054
  target_endpoint: TargetEndpoint;
8342
- topology_class?: TopologyClass48;
8055
+ topology_class?: TopologyClass47;
8343
8056
  }
8344
8057
  /**
8345
8058
  * CoReason Shared Kernel Ontology
8346
8059
  */
8347
8060
  export interface BoundedJSONRPCIntent {
8348
- topology_class?: TopologyClass49;
8061
+ topology_class?: TopologyClass48;
8349
8062
  jsonrpc: Jsonrpc1;
8350
8063
  method: Method1;
8351
8064
  params?: Params1;
@@ -8355,7 +8068,7 @@ export interface BoundedJSONRPCIntent {
8355
8068
  * CoReason Shared Kernel Ontology
8356
8069
  */
8357
8070
  export interface ChaosExperimentTask {
8358
- topology_class?: TopologyClass50;
8071
+ topology_class?: TopologyClass49;
8359
8072
  experiment_cid: ExperimentCid;
8360
8073
  hypothesis: SteadyStateHypothesisState;
8361
8074
  faults: Faults;
@@ -8392,7 +8105,7 @@ export interface FaultInjectionProfile {
8392
8105
  /**
8393
8106
  * The specific type of fault to inject.
8394
8107
  */
8395
- fault_category: "context_overload" | "incorrect_context" | "format_corruption" | "latency_spike" | "token_throttle" | "network_degradation" | "temporal_dilation" | "dependency_blackout";
8108
+ fault_category: "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
8396
8109
  target_node_cid?: TargetNodeCid1;
8397
8110
  intensity: Intensity;
8398
8111
  }
@@ -8417,10 +8130,10 @@ export interface FaultInjectionProfile {
8417
8130
  * Energy, Exogenous Perturbation, Epistemic Stress Test
8418
8131
  */
8419
8132
  export interface ExogenousEpistemicEvent {
8420
- event_cid: EventCid2;
8421
- prior_event_hash?: PriorEventHash2;
8422
- timestamp: Timestamp2;
8423
- topology_class?: TopologyClass51;
8133
+ event_cid: EventCid1;
8134
+ prior_event_hash?: PriorEventHash1;
8135
+ timestamp: Timestamp1;
8136
+ topology_class?: TopologyClass50;
8424
8137
  shock_cid: ShockCid;
8425
8138
  target_node_hash: TargetNodeHash;
8426
8139
  bayesian_surprise_score: BayesianSurpriseScore;
@@ -8443,7 +8156,7 @@ export interface SimulationEscrowContract {
8443
8156
  * CoReason Shared Kernel Ontology
8444
8157
  */
8445
8158
  export interface EpistemicTransmutationTask {
8446
- topology_class?: TopologyClass52;
8159
+ topology_class?: TopologyClass51;
8447
8160
  task_cid: TaskCid4;
8448
8161
  artifact_event_cid: ArtifactEventCid;
8449
8162
  target_modalities: TargetModalities;
@@ -8501,7 +8214,7 @@ export interface OpticalParsingSLA {
8501
8214
  * CoReason Shared Kernel Ontology
8502
8215
  */
8503
8216
  export interface EpistemicUpsamplingTask {
8504
- topology_class?: TopologyClass53;
8217
+ topology_class?: TopologyClass52;
8505
8218
  source_entity: ContextualizedSourceState2;
8506
8219
  target_ontological_granularity: TargetOntologicalGranularity;
8507
8220
  upsampling_confidence_threshold: UpsamplingConfidenceThreshold;
@@ -8519,7 +8232,7 @@ export interface ContextualizedSourceState2 {
8519
8232
  * CoReason Shared Kernel Ontology
8520
8233
  */
8521
8234
  export interface InterventionalCausalTask {
8522
- topology_class?: TopologyClass54;
8235
+ topology_class?: TopologyClass53;
8523
8236
  task_cid: TaskCid5;
8524
8237
  target_hypothesis_cid: TargetHypothesisCid1;
8525
8238
  intervention_variable: InterventionVariable;
@@ -8531,7 +8244,7 @@ export interface InterventionalCausalTask {
8531
8244
  * CoReason Shared Kernel Ontology
8532
8245
  */
8533
8246
  export interface MCPClientIntent {
8534
- topology_class?: TopologyClass55;
8247
+ topology_class?: TopologyClass54;
8535
8248
  jsonrpc: Jsonrpc2;
8536
8249
  method: Method2;
8537
8250
  params?: Params2;
@@ -8542,7 +8255,7 @@ export interface MCPClientIntent {
8542
8255
  * The mathematically pre-calculated view manifold tailored to the observer's frustum.
8543
8256
  */
8544
8257
  export interface DynamicManifoldProjectionManifest {
8545
- topology_class?: TopologyClass56;
8258
+ topology_class?: TopologyClass55;
8546
8259
  manifest_cid: ManifestCid1;
8547
8260
  active_forge_cid: ActiveForgeCid;
8548
8261
  ast_gradient_visual_mapping: GrammarPanelProfile;
@@ -8557,7 +8270,7 @@ export interface DynamicManifoldProjectionManifest {
8557
8270
  */
8558
8271
  export interface GrammarPanelProfile {
8559
8272
  panel_cid: PanelCid;
8560
- topology_class?: TopologyClass57;
8273
+ topology_class?: TopologyClass56;
8561
8274
  title: Title;
8562
8275
  ledger_source_cid: LedgerSourceCid;
8563
8276
  /**
@@ -8623,7 +8336,7 @@ export interface VisualEncodingProfile {
8623
8336
  * MCP ROUTING TRIGGERS: Grammar of Graphics, Metric Tensor Distortion, Levels of Measurement, Scale Projection, FSM Literal
8624
8337
  */
8625
8338
  export interface ScalePolicy {
8626
- topology_class: TopologyClass58;
8339
+ topology_class: TopologyClass57;
8627
8340
  domain_min?: DomainMin;
8628
8341
  domain_max?: DomainMax;
8629
8342
  }
@@ -8655,7 +8368,7 @@ export interface FacetMatrixProfile {
8655
8368
  */
8656
8369
  export interface GrammarPanelProfile1 {
8657
8370
  panel_cid: PanelCid;
8658
- topology_class?: TopologyClass57;
8371
+ topology_class?: TopologyClass56;
8659
8372
  title: Title;
8660
8373
  ledger_source_cid: LedgerSourceCid;
8661
8374
  /**
@@ -8682,7 +8395,7 @@ export interface GrammarPanelProfile1 {
8682
8395
  */
8683
8396
  export interface InsightCardProfile {
8684
8397
  panel_cid: PanelCid1;
8685
- topology_class?: TopologyClass59;
8398
+ topology_class?: TopologyClass58;
8686
8399
  title: Title1;
8687
8400
  markdown_content: MarkdownContent;
8688
8401
  /**
@@ -8702,7 +8415,7 @@ export interface SemanticZoomProfile {
8702
8415
  * CoReason Shared Kernel Ontology
8703
8416
  */
8704
8417
  export interface RollbackIntent {
8705
- topology_class?: TopologyClass60;
8418
+ topology_class?: TopologyClass59;
8706
8419
  request_cid: RequestCid;
8707
8420
  target_event_cid: TargetEventCid;
8708
8421
  invalidated_node_cids?: InvalidatedNodeCids;
@@ -8711,7 +8424,7 @@ export interface RollbackIntent {
8711
8424
  * CoReason Shared Kernel Ontology
8712
8425
  */
8713
8426
  export interface StateMutationIntent {
8714
- topology_class?: TopologyClass61;
8427
+ topology_class?: TopologyClass60;
8715
8428
  /**
8716
8429
  * The strict RFC 6902 JSON Patch operation, acting as a deterministic state vector mutation.
8717
8430
  */
@@ -8724,27 +8437,6 @@ export interface StateMutationIntent {
8724
8437
  from?: From;
8725
8438
  zero_trust_receipt_cid?: ZeroTrustReceiptCid;
8726
8439
  }
8727
- /**
8728
- * CoReason Shared Kernel Ontology
8729
- *
8730
- * AGENT INSTRUCTION: Use this intent to query the Master MCP for available sovereign oracles and verifiable execution substrates.
8731
- *
8732
- * CAUSAL AFFORDANCE: Projects a bounded subgraph of available URNs based on the agent's cryptographic identity and security clearance.
8733
- *
8734
- * EPISTEMIC BOUNDS: The domain_filter strictly limits the discovery surface to the requested URN namespaces to prevent context window dilution. Physically capped at 1000 elements to prevent CPU exhaustion during canonical sorting.
8735
- *
8736
- * MCP ROUTING TRIGGERS: Federated Discovery, Service Mesh, Capability Registry, Substrate Interrogation
8737
- */
8738
- export interface FederatedDiscoveryIntent {
8739
- topology_class?: TopologyClass62;
8740
- domain_filter: DomainFilter;
8741
- /**
8742
- * The content-addressed hash of the capability being searched for via P2P mesh.
8743
- */
8744
- target_capability_cid?: BundleContentHashState | null;
8745
- max_network_hops?: MaxNetworkHops;
8746
- required_security_clearance: RequiredSecurityClearance;
8747
- }
8748
8440
  /**
8749
8441
  * CoReason Shared Kernel Ontology
8750
8442
  *
@@ -8757,7 +8449,7 @@ export interface FederatedDiscoveryIntent {
8757
8449
  * MCP ROUTING TRIGGERS: Semantic Crosswalk, ETL Pipeline, Data Normalization, Knowledge Graph Extraction
8758
8450
  */
8759
8451
  export interface OntologicalNormalizationIntent {
8760
- topology_class?: TopologyClass63;
8452
+ topology_class?: TopologyClass61;
8761
8453
  source_artifact_cid: SourceArtifactCid1;
8762
8454
  target_ontology_urn: TargetOntologyUrn;
8763
8455
  }
@@ -8790,8 +8482,8 @@ export interface CognitiveAgentNodeProfile {
8790
8482
  */
8791
8483
  render_material?: SpatialRenderMaterial | null;
8792
8484
  description: Description3;
8793
- topology_class?: TopologyClass64;
8794
- hardware?: SpatialHardwareProfile;
8485
+ topology_class?: TopologyClass62;
8486
+ hardware?: SpatialHardwareProfile1;
8795
8487
  security?: EpistemicSecurityProfile;
8796
8488
  /**
8797
8489
  * The cryptographic contract forcing this agent to embed an undeniable provenance signature into its generative token stream.
@@ -8953,9 +8645,17 @@ export interface MarkovBlanketRenderingPolicy {
8953
8645
  occlude_internal_mechanistics?: OccludeInternalMechanistics;
8954
8646
  }
8955
8647
  /**
8956
- * The physical constraints binding this agent to a specific thermodynamic deployment topology.
8648
+ * CoReason Shared Kernel Ontology
8649
+ *
8650
+ * AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
8651
+ *
8652
+ * CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
8653
+ *
8654
+ * EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
8655
+ *
8656
+ * MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
8957
8657
  */
8958
- export interface SpatialHardwareProfile {
8658
+ export interface SpatialHardwareProfile1 {
8959
8659
  compute_tier?: ComputeTier;
8960
8660
  min_vram_gb?: MinVramGb;
8961
8661
  coreason_network_mode?: CoreasonNetworkMode;
@@ -9327,17 +9027,17 @@ export interface NeuroSymbolicHandoffContract {
9327
9027
  /**
9328
9028
  * CoReason Shared Kernel Ontology
9329
9029
  *
9330
- * AGENT INSTRUCTION: Establishes a rigorous Mechanistic Interpretability brain-scan protocol, executing real-time latent state extraction across targeted neural circuits.
9030
+ * AGENT INSTRUCTION: Establishes a rigorous Mechanistic Interpretability brain-scan protocol, executing real-time latent state extraction across targeted neural circuits. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
9331
9031
  *
9332
- * CAUSAL AFFORDANCE: Authorizes the orchestrator to halt token generation upon specific `trigger_conditions` to physically slice, quantify, and export the top-k SAE features from the designated `target_layers`.
9032
+ * CAUSAL AFFORDANCE: Authorizes the orchestrator to halt token generation upon specific `trigger_conditions` to physically slice, quantify, and export the top-k SAE features from the designated `target_hook_points`.
9333
9033
  *
9334
- * EPISTEMIC BOUNDS: GPU VRAM exhaustion is mathematically prevented by capping `max_features_per_layer` (`gt=0, le=18446744073709551615`). The `@model_validator` deterministically sorts conditions and layers for RFC 8785 hashing. System integrity enforced via `require_zk_commitments`.
9034
+ * EPISTEMIC BOUNDS: GPU VRAM exhaustion is mathematically prevented by capping `max_features_per_layer` (`gt=0, le=18446744073709551615`). The `@model_validator` deterministically sorts conditions and hook points for RFC 8785 hashing. System integrity enforced via `require_zk_commitments`.
9335
9035
  *
9336
- * MCP ROUTING TRIGGERS: Latent State Extraction, Mechanistic Interpretability, Sparse Autoencoder, Zero-Knowledge Commitments, VRAM Optimization
9036
+ * MCP ROUTING TRIGGERS: Latent State Extraction, Mechanistic Interpretability, Sparse Autoencoder, Zero-Knowledge Commitments, VRAM Optimization, TransformerLens, SAELens
9337
9037
  */
9338
9038
  export interface MechanisticAuditContract {
9339
9039
  trigger_conditions: TriggerConditions;
9340
- target_layers: TargetLayers;
9040
+ target_hook_points: TargetHookPoints1;
9341
9041
  max_features_per_layer: MaxFeaturesPerLayer;
9342
9042
  require_zk_commitments?: RequireZkCommitments;
9343
9043
  }
@@ -9440,7 +9140,7 @@ export interface CognitiveHumanNodeProfile {
9440
9140
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
9441
9141
  */
9442
9142
  render_material?: SpatialRenderMaterial | null;
9443
- topology_class?: TopologyClass65;
9143
+ topology_class?: TopologyClass63;
9444
9144
  required_attestation: RequiredAttestation;
9445
9145
  /**
9446
9146
  * The continuous spatial vector representing the human operator's localized cognitive focus.
@@ -9488,7 +9188,7 @@ export interface CognitiveSystemNodeProfile {
9488
9188
  * The mathematical functor blueprint authorizing the runtime to hydrate a specific open-source engine (e.g., SymbolicAI) for this node.
9489
9189
  */
9490
9190
  execution_substrate?: ExecutionSubstrateProfile1 | null;
9491
- topology_class?: TopologyClass66;
9191
+ topology_class?: TopologyClass64;
9492
9192
  }
9493
9193
  /**
9494
9194
  * CoReason Shared Kernel Ontology
@@ -9536,7 +9236,7 @@ export interface CompositeNodeProfile {
9536
9236
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
9537
9237
  */
9538
9238
  render_material?: SpatialRenderMaterial | null;
9539
- topology_class?: TopologyClass67;
9239
+ topology_class?: TopologyClass65;
9540
9240
  /**
9541
9241
  * The encapsulated subgraph to execute.
9542
9242
  */
@@ -9576,7 +9276,7 @@ export interface DAGTopologyManifest {
9576
9276
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9577
9277
  */
9578
9278
  observability?: ObservabilityLODPolicy | null;
9579
- topology_class?: TopologyClass68;
9279
+ topology_class?: TopologyClass66;
9580
9280
  edges?: Edges;
9581
9281
  allow_cycles?: AllowCycles;
9582
9282
  /**
@@ -9755,17 +9455,17 @@ export interface SemanticFirewallPolicy {
9755
9455
  /**
9756
9456
  * CoReason Shared Kernel Ontology
9757
9457
  *
9758
- * AGENT INSTRUCTION: Implements Sparse Dictionary Learning and Mechanistic Interpretability to actively monitor and steer monosemantic neural circuits during the model's forward pass.
9458
+ * AGENT INSTRUCTION: Implements Sparse Dictionary Learning and Mechanistic Interpretability to actively monitor and steer monosemantic neural circuits during the model's forward pass. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
9759
9459
  *
9760
9460
  * CAUSAL AFFORDANCE: Executes real-time tensor remediation—clamping, halting, quarantining, or smoothly decaying residual stream activations—when specific features diverge toward adversarial or hallucinated geometries.
9761
9461
  *
9762
9462
  * EPISTEMIC BOUNDS: The `max_activation_threshold` (`ge=0.0, le=18446744073709551615.0`) physically bounds the continuous Euclidean magnitude of the `target_feature_index`. Topologically locked to SAE matrix via `sae_dictionary_hash` (SHA-256). The `@model_validator` `validate_smooth_decay` mathematically enforces asymptotic bounds.
9763
9463
  *
9764
- * MCP ROUTING TRIGGERS: Mechanistic Interpretability, Sparse Autoencoders, Residual Stream Steering, Tensor Remediation, Monosemantic Features
9464
+ * MCP ROUTING TRIGGERS: Mechanistic Interpretability, Sparse Autoencoders, Residual Stream Steering, Tensor Remediation, Monosemantic Features, TransformerLens, SAELens
9765
9465
  */
9766
9466
  export interface SaeLatentPolicy {
9767
9467
  target_feature_index: TargetFeatureIndex;
9768
- monitored_layers: MonitoredLayers;
9468
+ monitored_hook_points: MonitoredHookPoints;
9769
9469
  max_activation_threshold: MaxActivationThreshold;
9770
9470
  violation_action: ViolationAction1;
9771
9471
  clamp_value?: ClampValue;
@@ -9986,7 +9686,7 @@ export interface CouncilTopologyManifest {
9986
9686
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9987
9687
  */
9988
9688
  observability?: ObservabilityLODPolicy | null;
9989
- topology_class?: TopologyClass69;
9689
+ topology_class?: TopologyClass67;
9990
9690
  /**
9991
9691
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
9992
9692
  */
@@ -10193,7 +9893,7 @@ export interface SwarmTopologyManifest {
10193
9893
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10194
9894
  */
10195
9895
  observability?: ObservabilityLODPolicy | null;
10196
- topology_class?: TopologyClass70;
9896
+ topology_class?: TopologyClass68;
10197
9897
  spawning_threshold?: SpawningThreshold;
10198
9898
  max_concurrent_agents?: MaxConcurrentAgents;
10199
9899
  /**
@@ -10327,7 +10027,7 @@ export interface EvolutionaryTopologyManifest {
10327
10027
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10328
10028
  */
10329
10029
  observability?: ObservabilityLODPolicy | null;
10330
- topology_class?: TopologyClass71;
10030
+ topology_class?: TopologyClass69;
10331
10031
  generations: Generations;
10332
10032
  population_size: PopulationSize;
10333
10033
  mutation: MutationPolicy;
@@ -10440,7 +10140,7 @@ export interface SMPCTopologyManifest {
10440
10140
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10441
10141
  */
10442
10142
  observability?: ObservabilityLODPolicy | null;
10443
- topology_class?: TopologyClass72;
10143
+ topology_class?: TopologyClass70;
10444
10144
  smpc_protocol: SmpcProtocol;
10445
10145
  joint_function_uri: JointFunctionUri;
10446
10146
  participant_node_cids: ParticipantNodeCids;
@@ -10487,7 +10187,7 @@ export interface EvaluatorOptimizerTopologyManifest {
10487
10187
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10488
10188
  */
10489
10189
  observability?: ObservabilityLODPolicy | null;
10490
- topology_class?: TopologyClass73;
10190
+ topology_class?: TopologyClass71;
10491
10191
  /**
10492
10192
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
10493
10193
  */
@@ -10537,7 +10237,7 @@ export interface DigitalTwinTopologyManifest {
10537
10237
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10538
10238
  */
10539
10239
  observability?: ObservabilityLODPolicy | null;
10540
- topology_class?: TopologyClass74;
10240
+ topology_class?: TopologyClass72;
10541
10241
  target_topology_cid: TargetTopologyCid;
10542
10242
  convergence_sla: SimulationConvergenceSLA;
10543
10243
  enforce_no_side_effects?: EnforceNoSideEffects;
@@ -10567,7 +10267,7 @@ export interface SimulationConvergenceSLA {
10567
10267
  * MCP ROUTING TRIGGERS: Practical Byzantine Fault Tolerance, pBFT, Distributed Consensus, Sybil Resistance, Macro Abstraction
10568
10268
  */
10569
10269
  export interface ConsensusFederationTopologyManifest {
10570
- topology_class?: TopologyClass75;
10270
+ topology_class?: TopologyClass73;
10571
10271
  participant_cids: ParticipantCids;
10572
10272
  /**
10573
10273
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10632,7 +10332,7 @@ export interface CapabilityForgeTopologyManifest {
10632
10332
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10633
10333
  */
10634
10334
  observability?: ObservabilityLODPolicy | null;
10635
- topology_class?: TopologyClass76;
10335
+ topology_class?: TopologyClass74;
10636
10336
  target_epistemic_deficit: SemanticDiscoveryIntent1;
10637
10337
  /**
10638
10338
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10673,7 +10373,7 @@ export interface Nodes8 {
10673
10373
  * MCP ROUTING TRIGGERS: Zero-Shot Tool Discovery, Capability Routing, Dense Vector Embedding, Epistemic Deficit Resolution
10674
10374
  */
10675
10375
  export interface SemanticDiscoveryIntent1 {
10676
- topology_class?: TopologyClass23;
10376
+ topology_class?: TopologyClass22;
10677
10377
  query_vector: VectorEmbeddingState1;
10678
10378
  min_isometry_score: MinIsometryScore;
10679
10379
  required_structural_types: RequiredStructuralTypes;
@@ -10786,7 +10486,7 @@ export interface IntentElicitationTopologyManifest {
10786
10486
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10787
10487
  */
10788
10488
  observability?: ObservabilityLODPolicy | null;
10789
- topology_class?: TopologyClass77;
10489
+ topology_class?: TopologyClass75;
10790
10490
  raw_human_artifact_cid: RawHumanArtifactCid;
10791
10491
  /**
10792
10492
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10840,7 +10540,7 @@ export interface NeurosymbolicIngestionTopologyManifest {
10840
10540
  * The dynamic Level of Detail physics bound to this graph.
10841
10541
  */
10842
10542
  observability?: ObservabilityLODPolicy | null;
10843
- topology_class?: TopologyClass78;
10543
+ topology_class?: TopologyClass76;
10844
10544
  /**
10845
10545
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
10846
10546
  */
@@ -10901,7 +10601,7 @@ export interface NeurosymbolicVerificationTopologyManifest {
10901
10601
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10902
10602
  */
10903
10603
  observability?: ObservabilityLODPolicy | null;
10904
- topology_class?: TopologyClass79;
10604
+ topology_class?: TopologyClass77;
10905
10605
  proposer_node_cid: ProposerNodeCid;
10906
10606
  verifier_node_cid: VerifierNodeCid;
10907
10607
  max_revision_loops: MaxRevisionLoops1;
@@ -10925,7 +10625,7 @@ export interface Nodes11 {
10925
10625
  * MCP ROUTING TRIGGERS: Discourse Geometry, Rhetorical Flattening, Directed Acyclic Graph, Hierarchical Extraction
10926
10626
  */
10927
10627
  export interface DiscourseTreeManifest {
10928
- topology_class?: TopologyClass80;
10628
+ topology_class?: TopologyClass78;
10929
10629
  manifest_cid: ManifestCid2;
10930
10630
  /**
10931
10631
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10966,7 +10666,7 @@ export interface DiscourseNodeState {
10966
10666
  * CoReason Shared Kernel Ontology
10967
10667
  */
10968
10668
  export interface DocumentKnowledgeGraphManifest {
10969
- topology_class?: TopologyClass81;
10669
+ topology_class?: TopologyClass79;
10970
10670
  graph_cid: GraphCid;
10971
10671
  source_artifact_cid: SourceArtifactCid2;
10972
10672
  nodes: Nodes12;
@@ -11114,7 +10814,7 @@ export interface HomomorphicEncryptionProfile {
11114
10814
  * MCP ROUTING TRIGGERS: Cross-Modal Isomorphism, Semantic Fusion, Volumetric Projection, Profunctor Optics
11115
10815
  */
11116
10816
  export interface ContinuousManifoldMappingContract {
11117
- topology_class?: TopologyClass82;
10817
+ topology_class?: TopologyClass80;
11118
10818
  /**
11119
10819
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
11120
10820
  */
@@ -11161,7 +10861,7 @@ export interface SE3TransformProfile4 {
11161
10861
  * MCP ROUTING TRIGGERS: Spatial-Semantic Isomorphism, Document Object Model, Containment DAG, Visual Hierarchy, Rhetorical Bounding
11162
10862
  */
11163
10863
  export interface HierarchicalDOMManifest {
11164
- topology_class?: TopologyClass83;
10864
+ topology_class?: TopologyClass81;
11165
10865
  dom_cid: DomCid;
11166
10866
  root_block_cid: RootBlockCid;
11167
10867
  blocks: Blocks;
@@ -11342,7 +11042,7 @@ export interface MemoizedNodeProfile {
11342
11042
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
11343
11043
  */
11344
11044
  render_material?: SpatialRenderMaterial | null;
11345
- topology_class?: TopologyClass84;
11045
+ topology_class?: TopologyClass82;
11346
11046
  /**
11347
11047
  * The exact SHA-256 fingerprint of the executed topology.
11348
11048
  */
@@ -11364,7 +11064,7 @@ export interface ExpectedOutputSchema {
11364
11064
  * MCP ROUTING TRIGGERS: Conflict-Free Replicated Data Types, State-based Semilattice, Eventual Consistency, G-Set
11365
11065
  */
11366
11066
  export interface TemporalGraphCRDTManifest {
11367
- topology_class?: TopologyClass85;
11067
+ topology_class?: TopologyClass83;
11368
11068
  diff_cid: DiffCid;
11369
11069
  author_node_cid: AuthorNodeCid;
11370
11070
  lamport_timestamp: LamportTimestamp;
@@ -11384,10 +11084,10 @@ export interface VectorClock {
11384
11084
  * AGENT INSTRUCTION: A formal Substrate Projection representing an executable Model Context Protocol (MCP) tool.
11385
11085
  */
11386
11086
  export interface MCPToolDefinition {
11387
- topology_class?: TopologyClass86;
11388
- event_cid?: EventCid3;
11389
- prior_event_hash?: PriorEventHash3;
11390
- timestamp?: Timestamp3;
11087
+ topology_class?: TopologyClass84;
11088
+ event_cid?: EventCid2;
11089
+ prior_event_hash?: PriorEventHash2;
11090
+ timestamp?: Timestamp2;
11391
11091
  name: Name;
11392
11092
  description: Description9;
11393
11093
  inputSchema: Inputschema;
@@ -11410,11 +11110,11 @@ export interface Inputschema {
11410
11110
  * MCP ROUTING TRIGGERS: Epistemic Provenance, Crosswalk Resolution, Grounding Receipt, Ontology Access Kit, CURIE
11411
11111
  */
11412
11112
  export interface CrosswalkResolutionReceipt {
11413
- event_cid: EventCid4;
11414
- prior_event_hash?: PriorEventHash4;
11415
- timestamp: Timestamp4;
11416
- topology_class?: TopologyClass87;
11417
- receipt_cid: ReceiptCid1;
11113
+ event_cid: EventCid3;
11114
+ prior_event_hash?: PriorEventHash3;
11115
+ timestamp: Timestamp3;
11116
+ topology_class?: TopologyClass85;
11117
+ receipt_cid: ReceiptCid;
11418
11118
  target_graph_cid: TargetGraphCid3;
11419
11119
  resolved_curies: ResolvedCuries;
11420
11120
  grounding_confidence: DempsterShaferBeliefVector1;
@@ -11455,10 +11155,10 @@ export interface DempsterShaferBeliefVector1 {
11455
11155
  * MCP ROUTING TRIGGERS: Cryptographic Ledger, Formal Verification Receipt, Immutable Provenance, Hash Canonicalization, Data Masking
11456
11156
  */
11457
11157
  export interface EpistemicZeroTrustReceipt {
11458
- event_cid: EventCid5;
11459
- prior_event_hash?: PriorEventHash5;
11460
- timestamp: Timestamp5;
11461
- topology_class?: TopologyClass88;
11158
+ event_cid: EventCid4;
11159
+ prior_event_hash?: PriorEventHash4;
11160
+ timestamp: Timestamp4;
11161
+ topology_class?: TopologyClass86;
11462
11162
  intent_reference_cid: IntentReferenceCid;
11463
11163
  llm_blind_plan_hash: LlmBlindPlanHash;
11464
11164
  firewall_breach_detected?: FirewallBreachDetected;
@@ -11477,10 +11177,10 @@ export interface EpistemicZeroTrustReceipt {
11477
11177
  * MCP ROUTING TRIGGERS: Bayesian Evidence, Neurosymbolic Binding, Exogenous Truth, Epistemic Grounding, Payload Topological Bounding
11478
11178
  */
11479
11179
  export interface ObservationEvent {
11480
- event_cid: EventCid6;
11481
- prior_event_hash?: PriorEventHash6;
11482
- timestamp: Timestamp6;
11483
- topology_class?: TopologyClass89;
11180
+ event_cid: EventCid5;
11181
+ prior_event_hash?: PriorEventHash5;
11182
+ timestamp: Timestamp5;
11183
+ topology_class?: TopologyClass87;
11484
11184
  payload: Payload;
11485
11185
  /**
11486
11186
  * The specific topological node that appended this observation.
@@ -11550,7 +11250,7 @@ export interface HardwareEnclaveReceipt {
11550
11250
  * MCP ROUTING TRIGGERS: Exogenous Perturbation, DOM Topography, Spatial Execution Bound, Accessibility Tree
11551
11251
  */
11552
11252
  export interface BrowserDOMState {
11553
- topology_class?: TopologyClass90;
11253
+ topology_class?: TopologyClass88;
11554
11254
  current_url: CurrentUrl;
11555
11255
  viewport_size: ViewportSize;
11556
11256
  dom_hash: DomHash;
@@ -11569,7 +11269,7 @@ export interface BrowserDOMState {
11569
11269
  * MCP ROUTING TRIGGERS: POSIX Environment, Exogenous Perturbation, TTY Buffer, Causal Actuator, Stream Crystallization
11570
11270
  */
11571
11271
  export interface TerminalBufferState {
11572
- topology_class?: TopologyClass91;
11272
+ topology_class?: TopologyClass89;
11573
11273
  working_directory: WorkingDirectory;
11574
11274
  stdout_hash: StdoutHash;
11575
11275
  stderr_hash: StderrHash;
@@ -11597,21 +11297,21 @@ export interface EmbodiedSensoryVectorProfile {
11597
11297
  *
11598
11298
  * AGENT INSTRUCTION: An append-only, cryptographically frozen coordinate representing the verifiable output of a MechanisticAuditContract.
11599
11299
  *
11600
- * CAUSAL AFFORDANCE: Commits the extracted `SaeFeatureActivationState` matrix (`layer_activations`) to the Merkle-DAG. The `causal_scrubbing_applied` boolean mathematically proves that the orchestrator actively resampled or ablated the circuit to confirm direct causal responsibility.
11300
+ * CAUSAL AFFORDANCE: Commits the extracted `SaeFeatureActivationState` matrix (`hook_activations`) to the Merkle-DAG. The `causal_scrubbing_applied` boolean mathematically proves that the orchestrator actively resampled or ablated the circuit to confirm direct causal responsibility.
11601
11301
  *
11602
- * EPISTEMIC BOUNDS: Cryptographic integrity structurally anchored by `audit_cid` (128-char CID regex). The `@model_validator` sorts each `SaeFeatureActivationState` list within `layer_activations` by `feature_index`, guaranteeing zero-variance RFC 8785 Merkle-DAG hashing.
11302
+ * EPISTEMIC BOUNDS: Cryptographic integrity structurally anchored by `audit_cid` (128-char CID regex). The `@model_validator` sorts each `SaeFeatureActivationState` list within `hook_activations` by `feature_index`, guaranteeing zero-variance RFC 8785 Merkle-DAG hashing.
11603
11303
  *
11604
- * MCP ROUTING TRIGGERS: Causal Scrubbing, Epistemic Provenance, Mechanistic Audit, RFC 8785 Canonicalization, Cryptographic Brain-Scan
11304
+ * MCP ROUTING TRIGGERS: Causal Scrubbing, Epistemic Provenance, Mechanistic Audit, RFC 8785 Canonicalization, Cryptographic Brain-Scan, TransformerLens, SAELens
11605
11305
  */
11606
11306
  export interface NeuralAuditAttestationReceipt {
11607
11307
  audit_cid: AuditCid;
11608
- layer_activations: LayerActivations;
11308
+ hook_activations: HookActivations;
11609
11309
  causal_scrubbing_applied?: CausalScrubbingApplied;
11610
11310
  }
11611
11311
  /**
11612
- * A mapping of specific transformer layer indices to their top-k activated SAE features.
11312
+ * A mapping of specific TransformerLens hook points to their top-k activated SAE features.
11613
11313
  */
11614
- export interface LayerActivations {
11314
+ export interface HookActivations {
11615
11315
  [k: string]: SaeFeatureActivationState[];
11616
11316
  }
11617
11317
  /**
@@ -11681,10 +11381,10 @@ export interface StreamingDisfluencyContract {
11681
11381
  * MCP ROUTING TRIGGERS: Bayesian Belief Updating, Causal Tracing, Cognitive Synthesis, Merkle-DAG Coordinate, Non-Monotonic Leap
11682
11382
  */
11683
11383
  export interface BeliefMutationEvent {
11684
- event_cid: EventCid7;
11685
- prior_event_hash?: PriorEventHash7;
11686
- timestamp: Timestamp7;
11687
- topology_class?: TopologyClass92;
11384
+ event_cid: EventCid6;
11385
+ prior_event_hash?: PriorEventHash6;
11386
+ timestamp: Timestamp6;
11387
+ topology_class?: TopologyClass90;
11688
11388
  payload: Payload1;
11689
11389
  /**
11690
11390
  * The specific topological node that synthesized this belief assertion.
@@ -11796,10 +11496,10 @@ export interface LatentScratchpadReceipt {
11796
11496
  * MCP ROUTING TRIGGERS: Byzantine Fault Tolerance, Circuit Breaker, Terminal State, Execution Collapse, Fault Isolation
11797
11497
  */
11798
11498
  export interface SystemFaultEvent {
11799
- event_cid: EventCid8;
11800
- prior_event_hash?: PriorEventHash8;
11801
- timestamp: Timestamp8;
11802
- topology_class?: TopologyClass93;
11499
+ event_cid: EventCid7;
11500
+ prior_event_hash?: PriorEventHash7;
11501
+ timestamp: Timestamp7;
11502
+ topology_class?: TopologyClass91;
11803
11503
  }
11804
11504
  /**
11805
11505
  * CoReason Shared Kernel Ontology
@@ -11813,10 +11513,10 @@ export interface SystemFaultEvent {
11813
11513
  * MCP ROUTING TRIGGERS: Atomic Proposition, Discourse Extraction, Labeled Property Graph, Verifiable Statement
11814
11514
  */
11815
11515
  export interface AtomicPropositionState {
11816
- topology_class?: TopologyClass94;
11817
- event_cid: EventCid9;
11818
- prior_event_hash?: PriorEventHash9;
11819
- timestamp: Timestamp9;
11516
+ topology_class?: TopologyClass92;
11517
+ event_cid: EventCid8;
11518
+ prior_event_hash?: PriorEventHash8;
11519
+ timestamp: Timestamp8;
11820
11520
  proposition_cid: PropositionCid;
11821
11521
  rhetorical_role: RhetoricalStructureProfile;
11822
11522
  illocutionary_force: IllocutionaryForceProfile;
@@ -11854,10 +11554,10 @@ export interface EmpiricalStatisticalProfile {
11854
11554
  * MCP ROUTING TRIGGERS: Post-Coordinated Semantics, Latent Manifold Alignment, Semantic Specificity, Entity Assembly
11855
11555
  */
11856
11556
  export interface PostCoordinatedSemanticState {
11857
- topology_class?: TopologyClass95;
11858
- event_cid: EventCid10;
11859
- prior_event_hash?: PriorEventHash10;
11860
- timestamp: Timestamp10;
11557
+ topology_class?: TopologyClass93;
11558
+ event_cid: EventCid9;
11559
+ prior_event_hash?: PriorEventHash9;
11560
+ timestamp: Timestamp9;
11861
11561
  concept_cid: ConceptCid;
11862
11562
  /**
11863
11563
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -11885,10 +11585,10 @@ export interface ContextualModifiers {
11885
11585
  * MCP ROUTING TRIGGERS: Artifact Contagion Prevention, Terminal Fault, VLM Crash, Malformed Bytes, DRM Lock
11886
11586
  */
11887
11587
  export interface ArtifactCorruptionEvent {
11888
- event_cid: EventCid11;
11889
- prior_event_hash?: PriorEventHash11;
11890
- timestamp: Timestamp11;
11891
- topology_class?: TopologyClass96;
11588
+ event_cid: EventCid10;
11589
+ prior_event_hash?: PriorEventHash10;
11590
+ timestamp: Timestamp10;
11591
+ topology_class?: TopologyClass94;
11892
11592
  artifact_cid: ArtifactCid;
11893
11593
  corruption_class: CorruptionClass;
11894
11594
  diagnostic_hash: DiagnosticHash;
@@ -11905,10 +11605,10 @@ export interface ArtifactCorruptionEvent {
11905
11605
  * MCP ROUTING TRIGGERS: Abductive Reasoning, Popperian Falsification, Bayesian Prior, Causal Hypothesis, Epistemic Commitment
11906
11606
  */
11907
11607
  export interface HypothesisGenerationEvent {
11908
- event_cid: EventCid12;
11909
- prior_event_hash?: PriorEventHash12;
11910
- timestamp: Timestamp12;
11911
- topology_class?: TopologyClass97;
11608
+ event_cid: EventCid11;
11609
+ prior_event_hash?: PriorEventHash11;
11610
+ timestamp: Timestamp11;
11611
+ topology_class?: TopologyClass95;
11912
11612
  hypothesis_cid: HypothesisCid;
11913
11613
  premise_text: PremiseText;
11914
11614
  bayesian_prior: BayesianPrior;
@@ -11947,10 +11647,10 @@ export interface StructuralCausalGraphProfile {
11947
11647
  * MCP ROUTING TRIGGERS: Asynchronous Interrupt, Generative Severing, Context Switching, Defeasible Disposition, Wave Collapse
11948
11648
  */
11949
11649
  export interface BargeInInterruptEvent {
11950
- event_cid: EventCid13;
11951
- prior_event_hash?: PriorEventHash13;
11952
- timestamp: Timestamp13;
11953
- topology_class?: TopologyClass98;
11650
+ event_cid: EventCid12;
11651
+ prior_event_hash?: PriorEventHash12;
11652
+ timestamp: Timestamp12;
11653
+ topology_class?: TopologyClass96;
11954
11654
  target_event_cid: TargetEventCid1;
11955
11655
  /**
11956
11656
  * The continuous multimodal trigger (e.g., audio spike, user saying 'stop') that justified the interruption.
@@ -11971,10 +11671,10 @@ export interface BargeInInterruptEvent {
11971
11671
  * MCP ROUTING TRIGGERS: Counterfactual Regret Minimization, Pearlian Do-Calculus, Opportunity Cost, Alternative Timeline, Policy Gradient Update
11972
11672
  */
11973
11673
  export interface CounterfactualRegretEvent {
11974
- event_cid: EventCid14;
11975
- prior_event_hash?: PriorEventHash14;
11976
- timestamp: Timestamp14;
11977
- topology_class?: TopologyClass99;
11674
+ event_cid: EventCid13;
11675
+ prior_event_hash?: PriorEventHash13;
11676
+ timestamp: Timestamp13;
11677
+ topology_class?: TopologyClass97;
11978
11678
  historical_event_cid: HistoricalEventCid;
11979
11679
  counterfactual_intervention: CounterfactualIntervention;
11980
11680
  expected_utility_actual: ExpectedUtilityActual;
@@ -12000,10 +11700,10 @@ export interface PolicyMutationGradients {
12000
11700
  * MCP ROUTING TRIGGERS: Pearlian Do-Operator, Kinetic Commitment, Active Inference, Thermodynamic Escrow, Zero-Trust Actuation
12001
11701
  */
12002
11702
  export interface ToolInvocationEvent {
12003
- event_cid: EventCid15;
12004
- prior_event_hash?: PriorEventHash15;
12005
- timestamp: Timestamp15;
12006
- topology_class?: TopologyClass100;
11703
+ event_cid: EventCid14;
11704
+ prior_event_hash?: PriorEventHash14;
11705
+ timestamp: Timestamp14;
11706
+ topology_class?: TopologyClass98;
12007
11707
  tool_name: ToolName1;
12008
11708
  parameters: Parameters;
12009
11709
  authorized_budget_magnitude: AuthorizedBudgetMagnitude;
@@ -12066,10 +11766,10 @@ export interface ZeroKnowledgeReceipt1 {
12066
11766
  * MCP ROUTING TRIGGERS: Hippocampal Consolidation, Knowledge Distillation, Semantic Memory, Shannon Entropy Compression, Epistemic Promotion
12067
11767
  */
12068
11768
  export interface EpistemicPromotionEvent {
12069
- event_cid: EventCid16;
12070
- prior_event_hash?: PriorEventHash16;
12071
- timestamp: Timestamp16;
12072
- topology_class?: TopologyClass101;
11769
+ event_cid: EventCid15;
11770
+ prior_event_hash?: PriorEventHash15;
11771
+ timestamp: Timestamp15;
11772
+ topology_class?: TopologyClass99;
12073
11773
  source_episodic_event_cids: SourceEpisodicEventCids;
12074
11774
  crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
12075
11775
  compression_ratio: CompressionRatio;
@@ -12086,10 +11786,10 @@ export interface EpistemicPromotionEvent {
12086
11786
  * MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
12087
11787
  */
12088
11788
  export interface NormativeDriftEvent {
12089
- event_cid: EventCid17;
12090
- prior_event_hash?: PriorEventHash17;
12091
- timestamp: Timestamp17;
12092
- topology_class?: TopologyClass102;
11789
+ event_cid: EventCid16;
11790
+ prior_event_hash?: PriorEventHash16;
11791
+ timestamp: Timestamp16;
11792
+ topology_class?: TopologyClass100;
12093
11793
  tripped_rule_cid: TrippedRuleCid;
12094
11794
  measured_semantic_drift: MeasuredSemanticDrift;
12095
11795
  contradiction_proof_hash: ContradictionProofHash;
@@ -12106,10 +11806,10 @@ export interface NormativeDriftEvent {
12106
11806
  * MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
12107
11807
  */
12108
11808
  export interface PersistenceCommitReceipt {
12109
- event_cid: EventCid18;
12110
- prior_event_hash?: PriorEventHash18;
12111
- timestamp: Timestamp18;
12112
- topology_class?: TopologyClass103;
11809
+ event_cid: EventCid17;
11810
+ prior_event_hash?: PriorEventHash17;
11811
+ timestamp: Timestamp17;
11812
+ topology_class?: TopologyClass101;
12113
11813
  lakehouse_snapshot_cid: LakehouseSnapshotCid;
12114
11814
  committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
12115
11815
  target_table_uri: TargetTableUri;
@@ -12126,10 +11826,10 @@ export interface PersistenceCommitReceipt {
12126
11826
  * MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
12127
11827
  */
12128
11828
  export interface TokenBurnReceipt {
12129
- event_cid: EventCid19;
12130
- prior_event_hash?: PriorEventHash19;
12131
- timestamp: Timestamp19;
12132
- topology_class?: TopologyClass104;
11829
+ event_cid: EventCid18;
11830
+ prior_event_hash?: PriorEventHash18;
11831
+ timestamp: Timestamp18;
11832
+ topology_class?: TopologyClass102;
12133
11833
  tool_invocation_cid: ToolInvocationCid;
12134
11834
  input_tokens: InputTokens;
12135
11835
  output_tokens: OutputTokens;
@@ -12147,10 +11847,10 @@ export interface TokenBurnReceipt {
12147
11847
  * MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
12148
11848
  */
12149
11849
  export interface BudgetExhaustionEvent {
12150
- event_cid: EventCid20;
12151
- prior_event_hash?: PriorEventHash20;
12152
- timestamp: Timestamp20;
12153
- topology_class?: TopologyClass105;
11850
+ event_cid: EventCid19;
11851
+ prior_event_hash?: PriorEventHash19;
11852
+ timestamp: Timestamp19;
11853
+ topology_class?: TopologyClass103;
12154
11854
  exhausted_escrow_cid: ExhaustedEscrowCid;
12155
11855
  final_burn_receipt_cid: FinalBurnReceiptCid;
12156
11856
  }
@@ -12166,10 +11866,10 @@ export interface BudgetExhaustionEvent {
12166
11866
  * MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
12167
11867
  */
12168
11868
  export interface EpistemicTelemetryEvent {
12169
- event_cid: EventCid21;
12170
- prior_event_hash?: PriorEventHash21;
12171
- timestamp: Timestamp21;
12172
- topology_class?: TopologyClass106;
11869
+ event_cid: EventCid20;
11870
+ prior_event_hash?: PriorEventHash20;
11871
+ timestamp: Timestamp20;
11872
+ topology_class?: TopologyClass104;
12173
11873
  interaction_modality: InteractionModality;
12174
11874
  target_node_cid: TargetNodeCid2;
12175
11875
  dwell_duration_ms?: DwellDurationMs;
@@ -12190,10 +11890,10 @@ export interface EpistemicTelemetryEvent {
12190
11890
  * MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
12191
11891
  */
12192
11892
  export interface CognitivePredictionReceipt {
12193
- event_cid: EventCid22;
12194
- prior_event_hash?: PriorEventHash22;
12195
- timestamp: Timestamp22;
12196
- topology_class?: TopologyClass107;
11893
+ event_cid: EventCid21;
11894
+ prior_event_hash?: PriorEventHash21;
11895
+ timestamp: Timestamp21;
11896
+ topology_class?: TopologyClass105;
12197
11897
  source_chain_cid: SourceChainCid;
12198
11898
  target_source_concept: TargetSourceConcept;
12199
11899
  predicted_top_k_tokens: PredictedTopKTokens;
@@ -12210,10 +11910,10 @@ export interface CognitivePredictionReceipt {
12210
11910
  * MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
12211
11911
  */
12212
11912
  export interface EpistemicAxiomVerificationReceipt {
12213
- event_cid: EventCid23;
12214
- prior_event_hash?: PriorEventHash23;
12215
- timestamp: Timestamp23;
12216
- topology_class?: TopologyClass108;
11913
+ event_cid: EventCid22;
11914
+ prior_event_hash?: PriorEventHash22;
11915
+ timestamp: Timestamp22;
11916
+ topology_class?: TopologyClass106;
12217
11917
  source_prediction_cid: SourcePredictionCid;
12218
11918
  sequence_similarity_score: SequenceSimilarityScore;
12219
11919
  fact_score_passed: FactScorePassed;
@@ -12244,10 +11944,10 @@ export interface EpistemicAxiomVerificationReceipt {
12244
11944
  * Baseline Normalization, Reinforcement Learning
12245
11945
  */
12246
11946
  export interface CognitiveRewardEvaluationReceipt {
12247
- event_cid: EventCid24;
12248
- prior_event_hash?: PriorEventHash24;
12249
- timestamp: Timestamp24;
12250
- topology_class?: TopologyClass109;
11947
+ event_cid: EventCid23;
11948
+ prior_event_hash?: PriorEventHash23;
11949
+ timestamp: Timestamp23;
11950
+ topology_class?: TopologyClass107;
12251
11951
  source_generation_cid: SourceGenerationCid;
12252
11952
  extracted_axioms?: ExtractedAxioms;
12253
11953
  calculated_r_path: CalculatedRPath;
@@ -12290,10 +11990,10 @@ export interface EpistemicAxiomState {
12290
11990
  * Scalar Backpropagation, Acyclic Path
12291
11991
  */
12292
11992
  export interface EpistemicFlowStateReceipt {
12293
- event_cid: EventCid25;
12294
- prior_event_hash?: PriorEventHash25;
12295
- timestamp: Timestamp25;
12296
- topology_class?: TopologyClass110;
11993
+ event_cid: EventCid24;
11994
+ prior_event_hash?: PriorEventHash24;
11995
+ timestamp: Timestamp24;
11996
+ topology_class?: TopologyClass108;
12297
11997
  source_trajectory_cid: SourceTrajectoryCid;
12298
11998
  estimated_flow_value: EstimatedFlowValue;
12299
11999
  terminal_reward_factorized: TerminalRewardFactorized;
@@ -12319,10 +12019,10 @@ export interface EpistemicFlowStateReceipt {
12319
12019
  * Macroscopic Explanation, Deterministic Sorting
12320
12020
  */
12321
12021
  export interface CausalExplanationEvent {
12322
- event_cid: EventCid26;
12323
- prior_event_hash?: PriorEventHash26;
12324
- timestamp: Timestamp26;
12325
- topology_class?: TopologyClass111;
12022
+ event_cid: EventCid25;
12023
+ prior_event_hash?: PriorEventHash25;
12024
+ timestamp: Timestamp25;
12025
+ topology_class?: TopologyClass109;
12326
12026
  target_outcome_event_cid: TargetOutcomeEventCid;
12327
12027
  collective_intelligence: CollectiveIntelligenceProfile;
12328
12028
  agent_attributions: AgentAttributions;
@@ -12383,10 +12083,10 @@ export interface ShapleyAttributionReceipt {
12383
12083
  * Routing Heuristic, Semantic Wave Collapse
12384
12084
  */
12385
12085
  export interface IntentClassificationReceipt {
12386
- event_cid: EventCid27;
12387
- prior_event_hash?: PriorEventHash27;
12388
- timestamp: Timestamp27;
12389
- topology_class?: TopologyClass112;
12086
+ event_cid: EventCid26;
12087
+ prior_event_hash?: PriorEventHash26;
12088
+ timestamp: Timestamp26;
12089
+ topology_class?: TopologyClass110;
12390
12090
  raw_input_string: RawInputString;
12391
12091
  classified_intent: ClassifiedIntent;
12392
12092
  confidence_score: ConfidenceScore1;
@@ -12404,10 +12104,10 @@ export interface IntentClassificationReceipt {
12404
12104
  * MCP ROUTING TRIGGERS: Semantic Relational Record, Payload Injection, Hardware Guillotine, Structured Telemetry
12405
12105
  */
12406
12106
  export interface SemanticRelationalVectorState {
12407
- topology_class?: TopologyClass113;
12408
- event_cid: EventCid28;
12409
- prior_event_hash?: PriorEventHash28;
12410
- timestamp: Timestamp28;
12107
+ topology_class?: TopologyClass111;
12108
+ event_cid: EventCid27;
12109
+ prior_event_hash?: PriorEventHash27;
12110
+ timestamp: Timestamp27;
12411
12111
  ontology_class: UpperOntologyClassProfile;
12412
12112
  temporal_bounds: TemporalBoundsProfile1;
12413
12113
  formal_schema_urn?: FormalSchemaUrn1;
@@ -12449,10 +12149,10 @@ export interface PayloadInjectionZone {
12449
12149
  * MCP ROUTING TRIGGERS: Ontological Reification, Bimodal Semantic Transformation, Epistemic Ledger, Traceability Collapse
12450
12150
  */
12451
12151
  export interface OntologicalReificationReceipt {
12452
- topology_class?: TopologyClass114;
12453
- event_cid: EventCid29;
12454
- prior_event_hash?: PriorEventHash29;
12455
- timestamp: Timestamp29;
12152
+ topology_class?: TopologyClass112;
12153
+ event_cid: EventCid28;
12154
+ prior_event_hash?: PriorEventHash28;
12155
+ timestamp: Timestamp28;
12456
12156
  source_data_hash: SourceDataHash;
12457
12157
  target_namespace: TargetNamespace;
12458
12158
  algorithmic_mechanism: TransformationMechanismProfile;
@@ -12489,10 +12189,10 @@ export interface DempsterShaferBeliefVector2 {
12489
12189
  * MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
12490
12190
  */
12491
12191
  export interface CircuitBreakerEvent {
12492
- event_cid: EventCid30;
12493
- prior_event_hash?: PriorEventHash30;
12494
- timestamp: Timestamp30;
12495
- topology_class?: TopologyClass115;
12192
+ event_cid: EventCid29;
12193
+ prior_event_hash?: PriorEventHash29;
12194
+ timestamp: Timestamp29;
12195
+ topology_class?: TopologyClass113;
12496
12196
  /**
12497
12197
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
12498
12198
  */
@@ -12511,10 +12211,10 @@ export interface CircuitBreakerEvent {
12511
12211
  * MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
12512
12212
  */
12513
12213
  export interface EpistemicLogEvent {
12514
- event_cid: EventCid31;
12515
- prior_event_hash?: PriorEventHash31;
12516
- topology_class?: TopologyClass116;
12517
- timestamp: Timestamp31;
12214
+ event_cid: EventCid30;
12215
+ prior_event_hash?: PriorEventHash30;
12216
+ topology_class?: TopologyClass114;
12217
+ timestamp: Timestamp30;
12518
12218
  level: Level;
12519
12219
  message: Message1;
12520
12220
  context_profile?: TelemetryContextProfile;
@@ -12544,10 +12244,10 @@ export interface TelemetryContextProfile {
12544
12244
  * MCP ROUTING TRIGGERS: Cryptographic Nonce, State Resumption, Replay Attack Prevention, Wetware Attestation, Liveness Resolution
12545
12245
  */
12546
12246
  export interface InterventionReceipt {
12547
- topology_class?: TopologyClass117;
12548
- event_cid: EventCid32;
12549
- prior_event_hash?: PriorEventHash32;
12550
- timestamp: Timestamp32;
12247
+ topology_class?: TopologyClass115;
12248
+ event_cid: EventCid31;
12249
+ prior_event_hash?: PriorEventHash31;
12250
+ timestamp: Timestamp31;
12551
12251
  intervention_request_cid: InterventionRequestCid;
12552
12252
  /**
12553
12253
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -12602,10 +12302,10 @@ export interface WetwareAttestationContract {
12602
12302
  * MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
12603
12303
  */
12604
12304
  export interface CustodyReceipt {
12605
- event_cid: EventCid33;
12606
- prior_event_hash?: PriorEventHash33;
12607
- timestamp: Timestamp33;
12608
- topology_class?: TopologyClass118;
12305
+ event_cid: EventCid32;
12306
+ prior_event_hash?: PriorEventHash32;
12307
+ timestamp: Timestamp32;
12308
+ topology_class?: TopologyClass116;
12609
12309
  custody_cid: CustodyCid;
12610
12310
  source_node_cid: SourceNodeCid;
12611
12311
  applied_policy_cid: AppliedPolicyCid;
@@ -12625,10 +12325,10 @@ export interface CustodyReceipt {
12625
12325
  * MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
12626
12326
  */
12627
12327
  export interface DefeasibleAttackEvent {
12628
- event_cid: EventCid34;
12629
- prior_event_hash?: PriorEventHash34;
12630
- timestamp: Timestamp34;
12631
- topology_class?: TopologyClass119;
12328
+ event_cid: EventCid33;
12329
+ prior_event_hash?: PriorEventHash33;
12330
+ timestamp: Timestamp33;
12331
+ topology_class?: TopologyClass117;
12632
12332
  attack_cid: AttackCid;
12633
12333
  source_claim_cid: SourceClaimCid;
12634
12334
  target_claim_cid: TargetClaimCid;
@@ -12637,6 +12337,28 @@ export interface DefeasibleAttackEvent {
12637
12337
  */
12638
12338
  attack_vector: "rebuttal" | "undercutter" | "underminer";
12639
12339
  }
12340
+ /**
12341
+ * CoReason Shared Kernel Ontology
12342
+ *
12343
+ * AGENT INSTRUCTION: The mathematical backpropagation signal triggered when the Deterministic Compiler rejects a stochastic manifold. Quantifies the rejection and provides a mutation gradient.
12344
+ *
12345
+ * CAUSAL AFFORDANCE: Instructs the LLM ensemble on how to perturb the Upper Confidence Bound (UCB) during the next MCTS generation attempt by mathematically quantifying the error.
12346
+ *
12347
+ * EPISTEMIC BOUNDS: Kullback-Leibler divergence is strictly non-negative. A negative mathematical distance is a paradox and raises a ValueError.
12348
+ *
12349
+ * MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
12350
+ */
12351
+ export interface EpistemicRejectionReceipt {
12352
+ event_cid: EventCid34;
12353
+ prior_event_hash?: PriorEventHash34;
12354
+ timestamp: Timestamp34;
12355
+ topology_class?: TopologyClass118;
12356
+ receipt_cid: ReceiptCid1;
12357
+ failed_projection_cid: FailedProjectionCid;
12358
+ violated_algebraic_constraint: ViolatedAlgebraicConstraint;
12359
+ kl_divergence_to_validity: KlDivergenceToValidity;
12360
+ stochastic_mutation_gradient: StochasticMutationGradient;
12361
+ }
12640
12362
  /**
12641
12363
  * CoReason Shared Kernel Ontology
12642
12364
  *
@@ -12652,7 +12374,7 @@ export interface FormalVerificationReceipt {
12652
12374
  event_cid: EventCid35;
12653
12375
  prior_event_hash?: PriorEventHash35;
12654
12376
  timestamp: Timestamp35;
12655
- topology_class?: TopologyClass120;
12377
+ topology_class?: TopologyClass119;
12656
12378
  /**
12657
12379
  * Pointer to the specific node or intent that requested this formal verification.
12658
12380
  */
@@ -12666,7 +12388,7 @@ export interface FormalVerificationReceipt {
12666
12388
  * CoReason Shared Kernel Ontology
12667
12389
  */
12668
12390
  export interface BeliefModulationReceipt {
12669
- topology_class?: TopologyClass121;
12391
+ topology_class?: TopologyClass120;
12670
12392
  receipt_cid: ReceiptCid2;
12671
12393
  event_cid: EventCid36;
12672
12394
  prior_event_hash?: PriorEventHash36;
@@ -12682,7 +12404,7 @@ export interface GroundedEdges {
12682
12404
  * CoReason Shared Kernel Ontology
12683
12405
  */
12684
12406
  export interface RDFExportReceipt {
12685
- topology_class?: TopologyClass122;
12407
+ topology_class?: TopologyClass121;
12686
12408
  export_cid: ExportCid1;
12687
12409
  event_cid: EventCid37;
12688
12410
  prior_event_hash?: PriorEventHash37;
@@ -12706,7 +12428,7 @@ export interface EpistemicStarvationEvent {
12706
12428
  event_cid: EventCid38;
12707
12429
  prior_event_hash?: PriorEventHash38;
12708
12430
  timestamp: Timestamp38;
12709
- topology_class?: TopologyClass123;
12431
+ topology_class?: TopologyClass122;
12710
12432
  starved_edge_cid: StarvedEdgeCid;
12711
12433
  failed_citations: FailedCitations;
12712
12434
  diagnostic_reason: DiagnosticReason;
@@ -12726,7 +12448,7 @@ export interface SPARQLQueryResultReceipt {
12726
12448
  event_cid: EventCid39;
12727
12449
  prior_event_hash?: PriorEventHash39;
12728
12450
  timestamp: Timestamp39;
12729
- topology_class?: TopologyClass124;
12451
+ topology_class?: TopologyClass123;
12730
12452
  query_intent_cid: QueryIntentCid;
12731
12453
  returned_bindings: ReturnedBindings;
12732
12454
  execution_time_ms: ExecutionTimeMs;
@@ -12749,7 +12471,7 @@ export interface ReturnedBindings {
12749
12471
  * MCP ROUTING TRIGGERS: Execution Audit, Merkle-DAG Provenance, Thermodynamic Accounting, Oracle Telemetry, Human-in-the-Loop Attestation, Cryptographic Receipt
12750
12472
  */
12751
12473
  export interface OracleExecutionReceipt {
12752
- topology_class?: TopologyClass125;
12474
+ topology_class?: TopologyClass124;
12753
12475
  execution_hash: ExecutionHash;
12754
12476
  solver_urn: SolverUrn;
12755
12477
  tokens_burned: TokensBurned;
@@ -12767,7 +12489,7 @@ export interface OracleExecutionReceipt {
12767
12489
  * MCP ROUTING TRIGGERS: Markov Decision Process, Acyclic Edge, Stochastic Routing, Transition Probability, Directed Graph
12768
12490
  */
12769
12491
  export interface TransitionEdgeProfile {
12770
- topology_class?: TopologyClass126;
12492
+ topology_class?: TopologyClass125;
12771
12493
  target_node_cid?: TargetNodeCid3;
12772
12494
  /**
12773
12495
  * Dynamic discovery intent for bridging nodes.
@@ -12811,7 +12533,7 @@ export interface EdgeMappingContract {
12811
12533
  * MCP ROUTING TRIGGERS: Markov Decision Process, Cyclic Edge, Bellman Equation, Thermodynamic Discounting, Recursive Traversal
12812
12534
  */
12813
12535
  export interface CyclicEdgeProfile {
12814
- topology_class?: TopologyClass127;
12536
+ topology_class?: TopologyClass126;
12815
12537
  target_node_cid?: TargetNodeCid4;
12816
12538
  /**
12817
12539
  * Dynamic discovery intent for bridging nodes.
@@ -12864,7 +12586,7 @@ export interface AuctionState {
12864
12586
  * MCP ROUTING TRIGGERS: Decentralized Spot Market, Request for Proposal, Thermodynamic Compute Allocation, Algorithmic Mechanism Design, Kinetic Execution Trigger
12865
12587
  */
12866
12588
  export interface TaskAnnouncementIntent1 {
12867
- topology_class?: TopologyClass33;
12589
+ topology_class?: TopologyClass32;
12868
12590
  task_cid: TaskCid2;
12869
12591
  required_action_space_cid?: RequiredActionSpaceCid;
12870
12592
  max_budget_magnitude: MaxBudgetMagnitude;
@@ -13130,28 +12852,6 @@ export interface CollectiveIntelligenceProfile1 {
13130
12852
  coordination_score: CoordinationScore;
13131
12853
  information_integration: InformationIntegration;
13132
12854
  }
13133
- /**
13134
- * CoReason Shared Kernel Ontology
13135
- *
13136
- * AGENT INSTRUCTION: The macroscopic envelope that tracks the thermodynamic cost of stochastic ideation and violently halts execution when energy budgets or spatial limits are depleted.
13137
- *
13138
- * CAUSAL AFFORDANCE: Operates as the absolute mathematical circuit breaker for MCTS DAG expansion, physically revoking generative privileges if thresholds are breached.
13139
- *
13140
- * EPISTEMIC BOUNDS: Bounded by strict topological limits: max_stochastic_diffusions (ge=1) and computational_free_energy_budget (ge=0.0). current_diffusions must be strictly <= max_stochastic_diffusions.
13141
- *
13142
- * MCP ROUTING TRIGGERS: Computational Thermodynamics, Spatial Circuit Breaker, MCTS Halting, Epistemic Bounding, Thermodynamic Cost
13143
- */
13144
- export interface ComputationalThermodynamicsProfile {
13145
- thermodynamics_cid: ThermodynamicsCid;
13146
- target_topology_cid: TargetTopologyCid1;
13147
- max_stochastic_diffusions: MaxStochasticDiffusions;
13148
- computational_free_energy_budget: ComputationalFreeEnergyBudget;
13149
- current_diffusions?: CurrentDiffusions;
13150
- remaining_free_energy: RemainingFreeEnergy;
13151
- entropy_derivative_delta?: EntropyDerivativeDelta;
13152
- stagnation_tolerance_epsilon?: StagnationToleranceEpsilon;
13153
- system_state?: ThermodynamicState;
13154
- }
13155
12855
  /**
13156
12856
  * CoReason Shared Kernel Ontology
13157
12857
  *
@@ -13270,64 +12970,6 @@ export interface ContinuousMutationPolicy {
13270
12970
  max_uncommitted_edges: MaxUncommittedEdges;
13271
12971
  micro_batch_interval_ms: MicroBatchIntervalMs;
13272
12972
  }
13273
- /**
13274
- * CoReason Shared Kernel Ontology
13275
- *
13276
- * AGENT INSTRUCTION: Tracks the non-monotonic state transition of a Byzantine-tolerant B2B
13277
- * negotiation between two distinct enterprise tenant CID identifiers (initiating_tenant_cid
13278
- * and receiving_tenant_cid). As a ...State suffix, this is a declarative, frozen snapshot of
13279
- * N-dimensional geometry at a specific point in time.
13280
- *
13281
- * CAUSAL AFFORDANCE: Transitions the federated network from a proposed capability swap into
13282
- * an active OntologicalHandshakeReceipt, forcing the execution of the strict offered_sla
13283
- * (FederatedBilateralSLA).
13284
- *
13285
- * EPISTEMIC BOUNDS: Cryptographically bounded by handshake_cid (CID regex
13286
- * ^[a-zA-Z0-9_.:-]+$). The negotiation lifecycle is physically constrained to the strict
13287
- * Literal automaton ["proposed", "negotiating", "aligned", "rejected"] via FSM Logit
13288
- * Masking, preventing execution deadlocks.
13289
- *
13290
- * MCP ROUTING TRIGGERS: Byzantine-Tolerant Negotiation, Zero-Trust Handshake, Finite State
13291
- * Machine, Cross-Tenant Federation, Asynchronous B2B
13292
- */
13293
- export interface CrossSwarmHandshakeState {
13294
- handshake_cid: HandshakeCid;
13295
- initiating_tenant_cid: InitiatingTenantCid;
13296
- receiving_tenant_cid: ReceivingTenantCid;
13297
- offered_sla: FederatedBilateralSLA;
13298
- status?: Status1;
13299
- }
13300
- /**
13301
- * The initial structural/data boundary proposed.
13302
- */
13303
- export interface FederatedBilateralSLA {
13304
- receiving_tenant_cid: ReceivingTenantCid1;
13305
- max_permitted_classification: SemanticClassificationProfile2;
13306
- liability_limit_magnitude: LiabilityLimitMagnitude;
13307
- permitted_geographic_regions?: PermittedGeographicRegions;
13308
- require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
13309
- max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
13310
- /**
13311
- * The quantum-resistant signature securing the multi-tenant structural boundary.
13312
- */
13313
- pq_signature?: PostQuantumSignatureReceipt | null;
13314
- }
13315
- /**
13316
- * CoReason Shared Kernel Ontology
13317
- *
13318
- * AGENT INSTRUCTION: Implements NIST FIPS Post-Quantum Cryptography (PQC), utilizing lattice-based or stateless hash-based structures to guarantee long-term topological integrity on the Merkle-DAG.
13319
- *
13320
- * CAUSAL AFFORDANCE: Secures the causal execution graph and Bilateral SLAs against temporal decryption attacks (Harvest Now, Decrypt Later) via Shor's algorithm executed on fault-tolerant quantum computers.
13321
- *
13322
- * EPISTEMIC BOUNDS: To accommodate massive dimensional geometry, `pq_signature_blob` is structurally bound to a `100000`-byte `max_length`. `pq_algorithm` is restricted to the Literal set `["ml-dsa", "slh-dsa", "falcon"]`. `public_key_cid` is a 128-char CID.
13323
- *
13324
- * MCP ROUTING TRIGGERS: Post-Quantum Cryptography, ML-DSA, SLH-DSA, Shor's Algorithm Resistance, Lattice-based Cryptography
13325
- */
13326
- export interface PostQuantumSignatureReceipt {
13327
- pq_algorithm: PqAlgorithm;
13328
- public_key_cid: PublicKeyCid1;
13329
- pq_signature_blob: PqSignatureBlob;
13330
- }
13331
12973
  /**
13332
12974
  * CoReason Shared Kernel Ontology
13333
12975
  *
@@ -13476,33 +13118,6 @@ export interface DifferentiableLogicPolicy {
13476
13118
  formal_syntax_smt: FormalSyntaxSmt;
13477
13119
  relaxation_epsilon: RelaxationEpsilon;
13478
13120
  }
13479
- /**
13480
- * CoReason Shared Kernel Ontology
13481
- *
13482
- * AGENT INSTRUCTION: Formalizes a linear algebraic transformation (e.g.,
13483
- * Singular Value Decomposition) mapping one embedding manifold to another,
13484
- * grounded in the Johnson-Lindenstrauss Lemma. As a ...Contract suffix, this
13485
- * enforces rigid mathematical boundaries globally.
13486
- *
13487
- * CAUSAL AFFORDANCE: Authorizes the orchestrator to translate latent vectors
13488
- * across zero-trust network boundaries, bridging incompatible LLM spaces. The
13489
- * source_matrix_name and target_matrix_name (both max_length=2000) identify the
13490
- * origin and destination geometries.
13491
- *
13492
- * EPISTEMIC BOUNDS: Translation fidelity is physically proven by the
13493
- * isometry_preservation_score (ge=0.0, le=1.0), ensuring Earth Mover's Distance
13494
- * preservation. Cryptographic integrity is locked via projection_matrix_hash
13495
- * (SHA-256 regex ^[a-f0-9]{64}$).
13496
- *
13497
- * MCP ROUTING TRIGGERS: Singular Value Decomposition, Johnson-Lindenstrauss
13498
- * Lemma, Tensor Projection, Earth Mover's Distance, Latent Translation
13499
- */
13500
- export interface DimensionalProjectionContract {
13501
- source_matrix_name: SourceMatrixName;
13502
- target_matrix_name: TargetMatrixName;
13503
- projection_matrix_hash: ProjectionMatrixHash;
13504
- isometry_preservation_score: IsometryPreservationScore1;
13505
- }
13506
13121
  /**
13507
13122
  * CoReason Shared Kernel Ontology
13508
13123
  *
@@ -13586,7 +13201,7 @@ export interface DynamicLayoutManifest {
13586
13201
  * MCP ROUTING TRIGGERS: Grammar of Graphics, Retinal Variables, UI Rendering, Semantic Zooming, Dynamic Manifold
13587
13202
  */
13588
13203
  export interface DynamicManifoldProjectionManifest1 {
13589
- topology_class?: TopologyClass56;
13204
+ topology_class?: TopologyClass55;
13590
13205
  manifest_cid: ManifestCid1;
13591
13206
  active_forge_cid: ActiveForgeCid;
13592
13207
  ast_gradient_visual_mapping: GrammarPanelProfile;
@@ -14060,7 +13675,6 @@ export interface EpistemicQuarantineSnapshot {
14060
13675
  * The mathematically bounded subgraph of capabilities currently available to the agent.
14061
13676
  */
14062
13677
  affordance_projection?: OntologicalSurfaceProjectionManifest | null;
14063
- capability_attestations?: CapabilityAttestations;
14064
13678
  }
14065
13679
  /**
14066
13680
  * The ephemeral latent variables and environmental bindings currently active in Epistemic Quarantine.
@@ -14122,58 +13736,6 @@ export interface ProceduralMetadataManifest {
14122
13736
  */
14123
13737
  latent_vector_coordinate?: VectorEmbeddingState | null;
14124
13738
  }
14125
- /**
14126
- * CoReason Shared Kernel Ontology
14127
- *
14128
- * AGENT INSTRUCTION: An immutable cryptographic receipt representing an Object Capability (OCap) grant within a Federated Identity Management (FIM) framework.
14129
- *
14130
- * CAUSAL AFFORDANCE: Unlocks cross-domain graph traversal, cryptographically proving to the target topology that the swarm agent is authorized to establish an active connection governed by the SLA.
14131
- *
14132
- * EPISTEMIC BOUNDS: Locked to a 128-char `attestation_cid`. The `@model_validator` `enforce_restricted_vault_locks` mathematically enforces cross-schema invariants: if `governing_sla.max_permitted_classification` is 'restricted', the `authorized_session` MUST contain explicit `allowed_vault_keys`.
14133
- *
14134
- * MCP ROUTING TRIGGERS: Object Capability Model, Federated Identity Management, Cross-Domain Federation, Capability Attestation, Zero-Trust Execution
14135
- */
14136
- export interface FederatedCapabilityAttestationReceipt {
14137
- attestation_cid: AttestationCid;
14138
- /**
14139
- * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
14140
- */
14141
- target_topology_cid: string;
14142
- authorized_session: SecureSubSessionState1;
14143
- governing_sla: FederatedBilateralSLA1;
14144
- }
14145
- /**
14146
- * CoReason Shared Kernel Ontology
14147
- *
14148
- * AGENT INSTRUCTION: Formalizes the Principle of Least Privilege (PoLP) and Time-Based Access Control (TBAC) for handling high-entropy cryptographic secrets within a declarative N-dimensional coordinate.
14149
- *
14150
- * CAUSAL AFFORDANCE: Authorizes a temporary, mathematically bounded partition where the agent can access unredacted enterprise vault keys without permanently leaking them into the global EpistemicLedgerState.
14151
- *
14152
- * EPISTEMIC BOUNDS: The temporal exposure window is physically clamped by `max_ttl_seconds` (`ge=1, le=18446744073709551615`), enforcing an absolute maximum 1-hour session. Spatial access is geometrically restricted to `allowed_vault_keys` (`max_length=100`), deterministically sorted by `@model_validator` for RFC 8785 hashing.
14153
- *
14154
- * MCP ROUTING TRIGGERS: Principle of Least Privilege, Time-Based Access Control, Secret Vaulting, Ephemeral Partition, Cryptographic Isolation
14155
- */
14156
- export interface SecureSubSessionState1 {
14157
- session_cid: SessionCid;
14158
- allowed_vault_keys: AllowedVaultKeys;
14159
- max_ttl_seconds: MaxTtlSeconds1;
14160
- description: Description4;
14161
- }
14162
- /**
14163
- * The structural and physical boundary constraints for querying this target.
14164
- */
14165
- export interface FederatedBilateralSLA1 {
14166
- receiving_tenant_cid: ReceivingTenantCid1;
14167
- max_permitted_classification: SemanticClassificationProfile2;
14168
- liability_limit_magnitude: LiabilityLimitMagnitude;
14169
- permitted_geographic_regions?: PermittedGeographicRegions;
14170
- require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
14171
- max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
14172
- /**
14173
- * The quantum-resistant signature securing the multi-tenant structural boundary.
14174
- */
14175
- pq_signature?: PostQuantumSignatureReceipt | null;
14176
- }
14177
13739
  /**
14178
13740
  * CoReason Shared Kernel Ontology
14179
13741
  *
@@ -14320,220 +13882,6 @@ export interface ImmutableMatrix {
14320
13882
  export interface Payload3 {
14321
13883
  [k: string]: unknown;
14322
13884
  }
14323
- /**
14324
- * CoReason Shared Kernel Ontology
14325
- *
14326
- * AGENT INSTRUCTION: Formalizes a discrete computational vertex within a Merkle-DAG execution trace, binding raw data inputs to deterministic outputs. As an append-only coordinate, it guarantees algorithmic reproducibility.
14327
- *
14328
- * CAUSAL AFFORDANCE: Permits the orchestrator to cryptographically re-evaluate, replay, or slash execution branches by guaranteeing all computational inputs, outputs, and parent pointers are deterministically serialized.
14329
- *
14330
- * EPISTEMIC BOUNDS: The `@model_validator` mathematically guarantees the `node_hash` via RFC 8785 canonical JSON serialization, trapping any non-deterministic dictionary properties. Orphaned lineages are structurally blocked.
14331
- *
14332
- * MCP ROUTING TRIGGERS: Merkle-DAG, RFC 8785 Canonicalization, Execution Trace, Cryptographic Determinism, Directed Acyclic Graph
14333
- */
14334
- export interface ExecutionNodeReceipt {
14335
- request_cid: RequestCid1;
14336
- parent_request_cid?: ParentRequestCid;
14337
- root_request_cid?: RootRequestCid;
14338
- /**
14339
- * The inputs provided to the execution node. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
14340
- */
14341
- inputs: string | number | boolean | JsonPrimitiveState[] | {
14342
- [k: string]: JsonPrimitiveState;
14343
- } | EpistemicProxyStateAny | null;
14344
- /**
14345
- * The outputs generated by the execution node. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
14346
- */
14347
- outputs: string | number | boolean | JsonPrimitiveState[] | {
14348
- [k: string]: JsonPrimitiveState;
14349
- } | EpistemicProxyStateAny | null;
14350
- parent_hashes?: ParentHashes;
14351
- node_hash?: NodeHash;
14352
- }
14353
- /**
14354
- * CoReason Shared Kernel Ontology
14355
- *
14356
- * AGENT INSTRUCTION: Implements the Dapper distributed tracing model to deterministically map the causal execution DAG of the swarm. As an append-only coordinate on the Merkle-DAG, it mathematically binds parent-child RPC calls.
14357
- *
14358
- * CAUSAL AFFORDANCE: Unlocks global observability by mapping causal edges across the zero-trust network, enabling exact bottleneck detection and graph reconstruction.
14359
- *
14360
- * EPISTEMIC BOUNDS: Temporal boundaries are rigidly constrained by `start_time_unix_nano` (`ge=0`). The `@model_validator` enforces Allen's Interval Algebra to physically guarantee `end_time` cannot precede `start_time`. `events` array sorted by time.
14361
- *
14362
- * MCP ROUTING TRIGGERS: Dapper Tracing Model, Distributed Causal DAG, Allen's Interval Algebra, OpenTelemetry, Execution Provenance
14363
- */
14364
- export interface ExecutionSpanReceipt {
14365
- trace_cid: TraceCid3;
14366
- span_cid: SpanCid1;
14367
- parent_span_cid?: ParentSpanCid1;
14368
- name: Name1;
14369
- /**
14370
- * The role of the span.
14371
- */
14372
- kind?: "client" | "server" | "producer" | "consumer" | "internal";
14373
- start_time_unix_nano: StartTimeUnixNano;
14374
- end_time_unix_nano?: EndTimeUnixNano;
14375
- /**
14376
- * The execution health flag.
14377
- */
14378
- status?: "unset" | "ok" | "error";
14379
- events?: Events;
14380
- }
14381
- /**
14382
- * CoReason Shared Kernel Ontology
14383
- *
14384
- * AGENT INSTRUCTION: Represents a discrete, point-in-time OpenTelemetry annotation within a broader Dapper-style `ExecutionSpanReceipt`.
14385
- *
14386
- * CAUSAL AFFORDANCE: Provides fine-grained, localized state-machine logging within an active span, anchoring semantic attributes to a precise nanosecond coordinate without spawning a new causal branch.
14387
- *
14388
- * EPISTEMIC BOUNDS: `timestamp_unix_nano` physically bounded `[0, 253402300799000000000]`. The `attributes` payload strictly constrained by a dictionary with string keys (`max_length=255`) to prevent dictionary bombing.
14389
- *
14390
- * MCP ROUTING TRIGGERS: Span Annotation, Point-in-Time Event, Micro-State Logging, OpenTelemetry, Telemetry Serialization
14391
- */
14392
- export interface SpanEvent {
14393
- name: Name2;
14394
- timestamp_unix_nano: TimestampUnixNano;
14395
- attributes?: Attributes;
14396
- }
14397
- /**
14398
- * Typed metadata bound to the event.
14399
- */
14400
- export interface Attributes {
14401
- [k: string]: JsonPrimitiveState;
14402
- }
14403
- /**
14404
- * CoReason Shared Kernel Ontology
14405
- *
14406
- * AGENT INSTRUCTION: Defines the zero-trust structural boundary for multi-tenant federation,
14407
- * securing cross-boundary graph traversal against Shor's algorithm via an optional
14408
- * PostQuantumSignatureReceipt. As an ...SLA suffix, this object enforces rigid mathematical
14409
- * boundaries that the orchestrator must respect globally.
14410
- *
14411
- * CAUSAL AFFORDANCE: Unlocks cross-swarm graph bridging by enforcing strict liability,
14412
- * physical location routing, semantic data classification constraints via
14413
- * max_permitted_classification, and ESG carbon intensity limits.
14414
- *
14415
- * EPISTEMIC BOUNDS: Economically constrained by liability_limit_magnitude (ge=0,
14416
- * le=18446744073709551615). ESG limits physically bind the node grid to the optional
14417
- * max_permitted_grid_carbon_intensity (ge=0.0, le=18446744073709551615.0). The permitted_geographic_regions
14418
- * array is deterministically sorted via @model_validator for RFC 8785 canonical hashing.
14419
- *
14420
- * MCP ROUTING TRIGGERS: Zero-Trust Architecture, Post-Quantum Cryptography, Federated
14421
- * Learning, Bilateral SLA, Data Residency
14422
- */
14423
- export interface FederatedBilateralSLA2 {
14424
- receiving_tenant_cid: ReceivingTenantCid1;
14425
- max_permitted_classification: SemanticClassificationProfile2;
14426
- liability_limit_magnitude: LiabilityLimitMagnitude;
14427
- permitted_geographic_regions?: PermittedGeographicRegions;
14428
- require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
14429
- max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
14430
- /**
14431
- * The quantum-resistant signature securing the multi-tenant structural boundary.
14432
- */
14433
- pq_signature?: PostQuantumSignatureReceipt | null;
14434
- }
14435
- /**
14436
- * CoReason Shared Kernel Ontology
14437
- *
14438
- * AGENT INSTRUCTION: Triggers the zero-copy streaming of a binary or metadata blob from a discovered peer based on its Content Identifier (CID).
14439
- *
14440
- * CAUSAL AFFORDANCE: Physically executes the download of decentralized assets into the local embedded LanceDB and WASM runtime.
14441
- *
14442
- * EPISTEMIC BOUNDS: Bounded to strict RFC 8785 CIDs.
14443
- *
14444
- * MCP ROUTING TRIGGERS: Content Addressing, Zero-Copy Streaming, Decentralized Fetch, IPFS, FlatBuffers
14445
- */
14446
- export interface FederatedCIDFetchIntent {
14447
- topology_class?: TopologyClass128;
14448
- /**
14449
- * A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
14450
- */
14451
- target_cid: string;
14452
- timeout_ms?: TimeoutMs1;
14453
- }
14454
- /**
14455
- * CoReason Shared Kernel Ontology
14456
- *
14457
- * AGENT INSTRUCTION: Governs the B2B Multi-Swarm Gossip Protocol, establishing the initial
14458
- * Model Context Protocol (MCP) broadcast endpoints for external discovery. As a ...Manifest
14459
- * suffix, this is a declarative, frozen snapshot of N-dimensional geometry at a specific
14460
- * point in time.
14461
- *
14462
- * CAUSAL AFFORDANCE: Emits a structured tensor beacon to neighboring swarms, authorizing
14463
- * the initiation of an OntologicalHandshakeReceipt if the supported_ontologies hashes
14464
- * mathematically overlap.
14465
- *
14466
- * EPISTEMIC BOUNDS: Geometrically capped by broadcast_endpoints and supported_ontologies
14467
- * string arrays (each max_length=1000). Both are explicitly sorted by the
14468
- * @model_validator (broadcast_endpoints by str key, supported_ontologies alphabetically)
14469
- * to guarantee invariant canonical RFC 8785 hashing across distinct environments.
14470
- *
14471
- * MCP ROUTING TRIGGERS: Gossip Protocol, Peer-to-Peer Discovery, Decentralized Federation,
14472
- * Semantic Broadcasting, Tensor Beacon
14473
- */
14474
- export interface FederatedDiscoveryManifest {
14475
- broadcast_endpoints: BroadcastEndpoints;
14476
- supported_ontologies: SupportedOntologies;
14477
- }
14478
- /**
14479
- * CoReason Shared Kernel Ontology
14480
- *
14481
- * AGENT INSTRUCTION: Governs the spatial and temporal physics of Parameter-Efficient Fine-Tuning (PEFT) and Low-Rank Adaptation (LoRA), managing the Von Neumann bottleneck in distributed swarm VRAM.
14482
- *
14483
- * CAUSAL AFFORDANCE: Instructs the tensor execution engine to hot-swap external safetensors weight matrices into active GPU memory, modifying the foundational activation circuits.
14484
- *
14485
- * EPISTEMIC BOUNDS: The spatial geometry is physically capped by `vram_footprint_bytes` (`gt=0, le=18446744073709551615`). The temporal presence is mathematically guillotined by `ephemeral_ttl_ms` (`gt=0, le=18446744073709551615`). Supply-chain integrity is anchored by `adapter_merkle_root` (SHA-256).
14486
- *
14487
- * MCP ROUTING TRIGGERS: Low-Rank Adaptation, PEFT, LRU Cache Eviction, Tensor Hot-Swapping, GPU VRAM Management
14488
- */
14489
- export interface FederatedPeftContract {
14490
- adapter_merkle_root: AdapterMerkleRoot;
14491
- vram_footprint_bytes: VramFootprintBytes;
14492
- ephemeral_ttl_ms: EphemeralTtlMs;
14493
- cache_priority_weight: CachePriorityWeight;
14494
- }
14495
- /**
14496
- * CoReason Shared Kernel Ontology
14497
- *
14498
- * AGENT INSTRUCTION: Simplifies the creation of a secure federated network link across a Zero-Trust boundary.
14499
- *
14500
- * CAUSAL AFFORDANCE: Physically authorizes the orchestrator to forge a secure federated network link across a Zero-Trust boundary.
14501
- *
14502
- * EPISTEMIC BOUNDS: Bounded to strict JSON schema validation constraints defined in the manifest.
14503
- *
14504
- * MCP ROUTING TRIGGERS: Federated Security, Zero-Trust Boundary, Network Link, Macro Manifest
14505
- */
14506
- export interface FederatedSecurityMacroManifest {
14507
- target_endpoint_uri: TargetEndpointUri;
14508
- required_clearance: SemanticClassificationProfile3;
14509
- max_liability_budget: MaxLiabilityBudget;
14510
- /**
14511
- * Content-addressed identity of the capability bundle for zero-trust verification.
14512
- */
14513
- content_hash?: BundleContentHashState | null;
14514
- }
14515
- /**
14516
- * CoReason Shared Kernel Ontology
14517
- *
14518
- * AGENT INSTRUCTION: Establishes a Distributed Systems Theory cryptographic
14519
- * partition, mapping an external swarm's execution state into a localized,
14520
- * sandboxed coordinate. As a ...Snapshot suffix, this is a frozen N-dimensional
14521
- * coordinate of ephemeral context.
14522
- *
14523
- * CAUSAL AFFORDANCE: Exposes the topological footprint of an exogenous network
14524
- * to the local orchestrator, authorizing cross-boundary telemetry and capability
14525
- * exchange without merging underlying working contexts.
14526
- *
14527
- * EPISTEMIC BOUNDS: The coordinate is restricted by the optional topology_cid
14528
- * (str | None, default=None, 128-char CID regex ^[a-zA-Z0-9_.:-]+$),
14529
- * mathematically severing unauthorized topological mutations.
14530
- *
14531
- * MCP ROUTING TRIGGERS: Distributed Systems Theory, Federated Namespace,
14532
- * Zero-Trust Architecture, Cross-Swarm Federation, Sandbox Partition
14533
- */
14534
- export interface FederatedStateSnapshot {
14535
- topology_cid?: TopologyCid1;
14536
- }
14537
13885
  /**
14538
13886
  * CoReason Shared Kernel Ontology
14539
13887
  *
@@ -14895,13 +14243,13 @@ export interface KineticBudgetPolicy {
14895
14243
  /**
14896
14244
  * CoReason Shared Kernel Ontology
14897
14245
  *
14898
- * AGENT INSTRUCTION: Formalizes a Lattice-Based Access Control (LBAC) and Zero-Trust Architecture perimeter, restricting JSON-RPC capability mounts from foreign subgraphs.
14246
+ * AGENT INSTRUCTION: Formalizes a SPIFFE/SPIRE Service Mesh and Zero-Trust Architecture perimeter, restricting JSON-RPC capability mounts from foreign subgraphs.
14899
14247
  *
14900
- * CAUSAL AFFORDANCE: Acts as a structural firewall that physically prevents the orchestrator from binding unauthorized external tools, resources, or prompts into the active agent's CognitiveActionSpaceManifest.
14248
+ * CAUSAL AFFORDANCE: Acts as a structural firewall that physically prevents the orchestrator from binding unauthorized external tools, resources, or prompts into the active agent's CognitiveActionSpaceManifest via mTLS delegation.
14901
14249
  *
14902
14250
  * EPISTEMIC BOUNDS: The boundary is geometrically enforced via `StringConstraints` (`max_length=2000` for `authorized_capability_array`, `allowed_resources`, `allowed_prompts`). The `@model_validator` strictly sorts all arrays alphabetically to mathematically guarantee RFC 8785 Canonical Hashing.
14903
14251
  *
14904
- * MCP ROUTING TRIGGERS: Zero-Trust Architecture, Lattice-Based Access Control, Least Privilege, RPC Firewall, Bipartite Partitioning
14252
+ * MCP ROUTING TRIGGERS: Zero-Trust Architecture, SPIFFE/SPIRE, Envoy Service Mesh, Least Privilege, RPC Firewall
14905
14253
  */
14906
14254
  export interface MCPCapabilityWhitelistPolicy1 {
14907
14255
  authorized_capability_array?: AuthorizedCapabilityArray;
@@ -15050,46 +14398,10 @@ export interface MutationPolicy1 {
15050
14398
  export interface NDimensionalTensorManifest {
15051
14399
  structural_format: TensorStructuralFormatProfile;
15052
14400
  shape: Shape;
15053
- vram_footprint_bytes: VramFootprintBytes1;
14401
+ vram_footprint_bytes: VramFootprintBytes;
15054
14402
  merkle_root: MerkleRoot;
15055
14403
  storage_uri: StorageUri;
15056
14404
  }
15057
- /**
15058
- * CoReason Shared Kernel Ontology
15059
- *
15060
- * AGENT INSTRUCTION: A cryptographically frozen historical fact representing the absolute
15061
- * mathematical alignment of two swarms' latent vector spaces prior to establishing a shared
15062
- * epistemic blackboard. As a ...Receipt suffix, this is an append-only coordinate on the
15063
- * Merkle-DAG that the LLM must never hallucinate a mutation to.
15064
- *
15065
- * CAUSAL AFFORDANCE: Authorizes the physical bridging of two independent N-dimensional
15066
- * semantic spaces. If native geometries are incommensurable, it structurally demands the
15067
- * application of a DimensionalProjectionContract (applied_projection). The alignment_status
15068
- * Literal ["aligned", "projected", "fallback_triggered", "incommensurable"] records the
15069
- * final verdict.
15070
- *
15071
- * EPISTEMIC BOUNDS: Semantic isometry is quantified via measured_cosine_similarity, strictly
15072
- * clamped between [ge=-1.0, le=1.0]. The participant_node_cids array (min_length=2) is
15073
- * deterministically sorted via @model_validator to prevent Byzantine replay anomalies
15074
- * during cross-swarm Merkle hashing.
15075
- *
15076
- * MCP ROUTING TRIGGERS: Earth Mover's Distance, Cosine Similarity, Vector Space Isometry,
15077
- * Latent Alignment, Holographic Graph Projection
15078
- */
15079
- export interface OntologicalHandshakeReceipt {
15080
- handshake_cid: HandshakeCid1;
15081
- participant_node_cids: ParticipantNodeCids1;
15082
- measured_cosine_similarity: MeasuredCosineSimilarity1;
15083
- alignment_status: AlignmentStatus;
15084
- /**
15085
- * The projection applied if the agents natively used different embedding dimensionalities.
15086
- */
15087
- applied_projection?: DimensionalProjectionContract | null;
15088
- /**
15089
- * Isolated holographic clone of remote swarm state for safe cross-boundary evaluation.
15090
- */
15091
- remote_state_snapshot?: FederatedStateSnapshot | null;
15092
- }
15093
14405
  /**
15094
14406
  * CoReason Shared Kernel Ontology
15095
14407
  *
@@ -15107,6 +14419,22 @@ export interface PermissionBoundaryPolicy1 {
15107
14419
  file_system_mutation_forbidden: FileSystemMutationForbidden;
15108
14420
  auth_requirements?: AuthRequirements;
15109
14421
  }
14422
+ /**
14423
+ * CoReason Shared Kernel Ontology
14424
+ *
14425
+ * AGENT INSTRUCTION: Implements NIST FIPS Post-Quantum Cryptography (PQC), utilizing lattice-based or stateless hash-based structures to guarantee long-term topological integrity on the Merkle-DAG.
14426
+ *
14427
+ * CAUSAL AFFORDANCE: Secures the causal execution graph and Bilateral SLAs against temporal decryption attacks (Harvest Now, Decrypt Later) via Shor's algorithm executed on fault-tolerant quantum computers.
14428
+ *
14429
+ * EPISTEMIC BOUNDS: To accommodate massive dimensional geometry, `pq_signature_blob` is structurally bound to a `100000`-byte `max_length`. `pq_algorithm` is restricted to the Literal set `["ml-dsa", "slh-dsa", "falcon"]`. `public_key_cid` is a 128-char CID.
14430
+ *
14431
+ * MCP ROUTING TRIGGERS: Post-Quantum Cryptography, ML-DSA, SLH-DSA, Shor's Algorithm Resistance, Lattice-based Cryptography
14432
+ */
14433
+ export interface PostQuantumSignatureReceipt {
14434
+ pq_algorithm: PqAlgorithm;
14435
+ public_key_cid: PublicKeyCid1;
14436
+ pq_signature_blob: PqSignatureBlob;
14437
+ }
15110
14438
  /**
15111
14439
  * CoReason Shared Kernel Ontology
15112
14440
  *
@@ -15296,24 +14624,6 @@ export interface SimulationConvergenceSLA1 {
15296
14624
  export interface SimulationEscrowContract1 {
15297
14625
  locked_magnitude: LockedMagnitude;
15298
14626
  }
15299
- /**
15300
- * CoReason Shared Kernel Ontology
15301
- *
15302
- * AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
15303
- *
15304
- * CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
15305
- *
15306
- * EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
15307
- *
15308
- * MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
15309
- */
15310
- export interface SpatialHardwareProfile1 {
15311
- compute_tier?: ComputeTier;
15312
- min_vram_gb?: MinVramGb;
15313
- coreason_network_mode?: CoreasonNetworkMode;
15314
- accelerator_type?: AcceleratorType;
15315
- provider_whitelist?: ProviderWhitelist;
15316
- }
15317
14627
  /**
15318
14628
  * CoReason Shared Kernel Ontology
15319
14629
  *
@@ -15579,22 +14889,6 @@ export interface TraceContextState1 {
15579
14889
  parent_span_cid?: ParentSpanCid;
15580
14890
  causal_clock?: CausalClock;
15581
14891
  }
15582
- /**
15583
- * CoReason Shared Kernel Ontology
15584
- *
15585
- * AGENT INSTRUCTION: Functions as a deterministic serialization envelope for flushing Dapper-style trace subgraphs to external observability sinks.
15586
- *
15587
- * CAUSAL AFFORDANCE: Authorizes the mass export of `ExecutionSpanReceipt` objects across the network boundary, structurally binding disconnected spans into a coherent `batch_cid` for downstream reconstruction.
15588
- *
15589
- * EPISTEMIC BOUNDS: Bounded by a rigid `batch_cid` (CID regex `^[a-zA-Z0-9_.:-]+$`). The `spans` array is deterministically sorted by `span_cid` via a `@model_validator` to mathematically prevent Byzantine replay anomalies.
15590
- *
15591
- * MCP ROUTING TRIGGERS: Trace Serialization, Telemetry Export, Batch Flushing, DAG Reconstruction, Canonical Egress
15592
- */
15593
- export interface TraceExportManifest {
15594
- batch_cid: BatchCid;
15595
- spans?: Spans;
15596
- execution_nodes?: ExecutionNodes;
15597
- }
15598
14892
  /**
15599
14893
  * CoReason Shared Kernel Ontology
15600
14894
  *
@@ -15668,7 +14962,7 @@ export interface VolumetricBoundingProfile1 {
15668
14962
  *
15669
14963
  * CAUSAL AFFORDANCE: Physically initializes the execution DAG. This structural lock guarantees that any graph execution is mathematically anchored to a CoReason Genesis Block via `genesis_provenance`; stripping this violates Topological Consistency.
15670
14964
  *
15671
- * EPISTEMIC BOUNDS: The `@model_validator` `enforce_lbac_dominance` mathematically interlocks the local LBAC bounds with federated SLA egress bounds, ensuring federated clearance never exceeds local workflow bounds. `allowed_semantic_classifications` sorted for RFC 8785.
14965
+ * EPISTEMIC BOUNDS: The topology dictates execution constraints natively without relying on legacy federated dominance validation.
15672
14966
  *
15673
14967
  * MCP ROUTING TRIGGERS: Topos Theory, Cybernetics, Execution Envelope, Macroscopic Topology, Viable System Model
15674
14968
  */
@@ -15692,15 +14986,6 @@ export interface WorkflowManifest {
15692
14986
  * The absolute maximum enterprise risk threshold permitted for this topology.
15693
14987
  */
15694
14988
  max_risk_tolerance?: RiskLevelPolicy | null;
15695
- allowed_semantic_classifications?: AllowedSemanticClassifications;
15696
- /**
15697
- * The broadcast protocol for B2B multi-swarm discovery.
15698
- */
15699
- federated_discovery?: FederatedDiscoveryManifest | null;
15700
- /**
15701
- * The B2B Service Level Agreement contract that must be mathematically satisfied before multi-tenant graph coupling.
15702
- */
15703
- federated_sla?: FederatedBilateralSLA2 | null;
15704
14989
  /**
15705
14990
  * The quantum-resistant signature securing the root execution graph.
15706
14991
  */