@coreason-ai/coreason-manifest 0.53.0 → 0.54.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/ontology.d.ts +647 -1362
- package/package.json +1 -1
package/dist/ontology.d.ts
CHANGED
|
@@ -44,11 +44,11 @@ export type TimeDerivativeVector = string | null;
|
|
|
44
44
|
*/
|
|
45
45
|
export type SteeringVectorHash = string;
|
|
46
46
|
/**
|
|
47
|
-
* The specific
|
|
47
|
+
* The specific TransformerLens hook points (e.g., 'blocks.12.hook_resid_post') where this vector must be applied.
|
|
48
48
|
*
|
|
49
49
|
* @minItems 1
|
|
50
50
|
*/
|
|
51
|
-
export type
|
|
51
|
+
export type TargetHookPoints = [string, ...string[]];
|
|
52
52
|
/**
|
|
53
53
|
* The mathematical magnitude/strength of the injection (can be negative for ablation).
|
|
54
54
|
*/
|
|
@@ -81,33 +81,10 @@ export type ExpectedInformationGain = number;
|
|
|
81
81
|
* The maximum economic expenditure authorized to run this specific scientific test.
|
|
82
82
|
*/
|
|
83
83
|
export type ExecutionCostBudgetMagnitude = number;
|
|
84
|
-
export type EpochCid = string;
|
|
85
|
-
export type TargetObjectiveCid = string | null;
|
|
86
|
-
/**
|
|
87
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
88
|
-
*/
|
|
89
|
-
export type EventCid = string;
|
|
90
|
-
/**
|
|
91
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
92
|
-
*/
|
|
93
|
-
export type PriorEventHash = string | null;
|
|
94
|
-
/**
|
|
95
|
-
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
96
|
-
*/
|
|
97
|
-
export type Timestamp = number;
|
|
98
|
-
export type TopologyClass = "epistemic_rejection";
|
|
99
|
-
export type ReceiptCid = string;
|
|
100
|
-
export type FailedProjectionCid = string;
|
|
101
|
-
export type ViolatedAlgebraicConstraint = string;
|
|
102
|
-
export type KlDivergenceToValidity = number;
|
|
103
|
-
export type StochasticMutationGradient = string;
|
|
104
|
-
export type RejectionHistory = EpistemicRejectionReceipt[];
|
|
105
|
-
export type CurrentFreeEnergy = number;
|
|
106
|
-
export type EpochStatus = "active_inference_loop";
|
|
107
84
|
/**
|
|
108
85
|
* Discriminator for breaking deadlocks within a CouncilTopologyManifest.
|
|
109
86
|
*/
|
|
110
|
-
export type
|
|
87
|
+
export type TopologyClass = "forced_adjudication";
|
|
111
88
|
/**
|
|
112
89
|
* The conflicting claim IDs or proposals the human must choose between.
|
|
113
90
|
*
|
|
@@ -133,16 +110,16 @@ export type TimeoutAction = "rollback" | "proceed_default" | "terminate";
|
|
|
133
110
|
/**
|
|
134
111
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
135
112
|
*/
|
|
136
|
-
export type
|
|
113
|
+
export type EventCid = string;
|
|
137
114
|
/**
|
|
138
115
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
139
116
|
*/
|
|
140
|
-
export type
|
|
117
|
+
export type PriorEventHash = string | null;
|
|
141
118
|
/**
|
|
142
119
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
143
120
|
*/
|
|
144
|
-
export type
|
|
145
|
-
export type
|
|
121
|
+
export type Timestamp = number;
|
|
122
|
+
export type TopologyClass1 = "adjudication_receipt";
|
|
146
123
|
/**
|
|
147
124
|
* The cryptographic pointer to the rubric dictating adjudication.
|
|
148
125
|
*/
|
|
@@ -246,7 +223,7 @@ export type EmulationFidelityTarget = number;
|
|
|
246
223
|
/**
|
|
247
224
|
* Discriminator for adversarial macro.
|
|
248
225
|
*/
|
|
249
|
-
export type
|
|
226
|
+
export type TopologyClass2 = "macro_adversarial";
|
|
250
227
|
/**
|
|
251
228
|
* Nodes assigned to the Blue Team.
|
|
252
229
|
*
|
|
@@ -324,7 +301,7 @@ export type CredentialPresentations = VerifiableCredentialPresentationReceipt[];
|
|
|
324
301
|
/**
|
|
325
302
|
* The discriminative topological boundary for agent bid intents.
|
|
326
303
|
*/
|
|
327
|
-
export type
|
|
304
|
+
export type TopologyClass3 = "agent_bid";
|
|
328
305
|
/**
|
|
329
306
|
* The NodeCIDState of the bidder.
|
|
330
307
|
*/
|
|
@@ -369,7 +346,7 @@ export type ThermodynamicBurnRate = number | null;
|
|
|
369
346
|
* The normalized Shannon Entropy of the active execution, mapped to UI color gradients (e.g., high entropy = amber warning).
|
|
370
347
|
*/
|
|
371
348
|
export type EpistemicEntropyScore = number | null;
|
|
372
|
-
export type
|
|
349
|
+
export type TopologyClass4 = "analogical_mapping_task";
|
|
373
350
|
/**
|
|
374
351
|
* Unique identifier for this lateral thinking task.
|
|
375
352
|
*/
|
|
@@ -402,7 +379,7 @@ export type AnyActionSpaceCapability = SpatialToolManifest | MCPServerManifest |
|
|
|
402
379
|
/**
|
|
403
380
|
* Discriminator type for a native tool.
|
|
404
381
|
*/
|
|
405
|
-
export type
|
|
382
|
+
export type TopologyClass5 = "native_tool";
|
|
406
383
|
/**
|
|
407
384
|
* The deterministically bounded structural identifier mapping this capability within the zero-trust manifold.
|
|
408
385
|
*/
|
|
@@ -500,7 +477,7 @@ export type IsPreemptible = boolean;
|
|
|
500
477
|
/**
|
|
501
478
|
* Discriminator type for an MCP server.
|
|
502
479
|
*/
|
|
503
|
-
export type
|
|
480
|
+
export type TopologyClass6 = "mcp_server";
|
|
504
481
|
/**
|
|
505
482
|
* A unique cryptographic identifier (CID) for this server instance.
|
|
506
483
|
*/
|
|
@@ -513,7 +490,7 @@ export type MCPTransportProfile = StdioTransportProfile | SSETransportProfile |
|
|
|
513
490
|
/**
|
|
514
491
|
* Type of transport.
|
|
515
492
|
*/
|
|
516
|
-
export type
|
|
493
|
+
export type TopologyClass7 = "stdio";
|
|
517
494
|
/**
|
|
518
495
|
* The command executable to run (e.g., 'node', 'python').
|
|
519
496
|
*/
|
|
@@ -527,7 +504,7 @@ export type Args = string[];
|
|
|
527
504
|
/**
|
|
528
505
|
* Type of transport.
|
|
529
506
|
*/
|
|
530
|
-
export type
|
|
507
|
+
export type TopologyClass8 = "sse";
|
|
531
508
|
/**
|
|
532
509
|
* The HTTP URL endpoint for the SSE connection.
|
|
533
510
|
*/
|
|
@@ -535,7 +512,7 @@ export type Uri = string;
|
|
|
535
512
|
/**
|
|
536
513
|
* Type of transport.
|
|
537
514
|
*/
|
|
538
|
-
export type
|
|
515
|
+
export type TopologyClass9 = "http";
|
|
539
516
|
/**
|
|
540
517
|
* The HTTP URL endpoint for the stateless connection.
|
|
541
518
|
*/
|
|
@@ -579,7 +556,7 @@ export type StateSynchronizationOptics = OpticalMappingContract[];
|
|
|
579
556
|
/**
|
|
580
557
|
* Discriminator type for an ephemeral namespace partition.
|
|
581
558
|
*/
|
|
582
|
-
export type
|
|
559
|
+
export type TopologyClass10 = "ephemeral_partition";
|
|
583
560
|
/**
|
|
584
561
|
* Unique identifier for this ephemeral partition.
|
|
585
562
|
*/
|
|
@@ -613,7 +590,7 @@ export type AllowSubprocessSpawning = boolean;
|
|
|
613
590
|
/**
|
|
614
591
|
* Discriminator for a zero-trust contract.
|
|
615
592
|
*/
|
|
616
|
-
export type
|
|
593
|
+
export type TopologyClass11 = "zero_trust_contract";
|
|
617
594
|
/**
|
|
618
595
|
* UUIDv7 mapping to the ledger.
|
|
619
596
|
*/
|
|
@@ -663,9 +640,9 @@ export type LatentContentHash = string;
|
|
|
663
640
|
* The logical validity score assigned to this branch by the Process Reward Model.
|
|
664
641
|
*/
|
|
665
642
|
export type PrmScore = number | null;
|
|
666
|
-
export type
|
|
643
|
+
export type TopologyClass12 = "thought_branch";
|
|
667
644
|
export type TopologyCid = string;
|
|
668
|
-
export type
|
|
645
|
+
export type TopologyClass13 = "stochastic_ensemble";
|
|
669
646
|
/**
|
|
670
647
|
* AGENT INSTRUCTION: Categorizes the thermodynamic phase of the generative ensemble's exploration.
|
|
671
648
|
*
|
|
@@ -692,7 +669,7 @@ export type EpistemicStatus = "stochastically_unbounded";
|
|
|
692
669
|
/**
|
|
693
670
|
* Discriminator for MCTS thought nodes within the strategic planning topology.
|
|
694
671
|
*/
|
|
695
|
-
export type
|
|
672
|
+
export type TopologyClass14 = "strategic_thought_node";
|
|
696
673
|
/**
|
|
697
674
|
* The SHA-256 hash of the parent thought node in the MCTS tree, establishing Merkle-DAG lineage. For root nodes, use the SHA-256 hash of the initial escalation intent.
|
|
698
675
|
*/
|
|
@@ -709,11 +686,11 @@ export type Rationale = string;
|
|
|
709
686
|
* Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
|
|
710
687
|
*/
|
|
711
688
|
export type HeuristicConfidence = number;
|
|
712
|
-
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | ChaosExperimentTask | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent |
|
|
689
|
+
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | ChaosExperimentTask | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent;
|
|
713
690
|
/**
|
|
714
691
|
* Discriminator for temporal edge invalidation.
|
|
715
692
|
*/
|
|
716
|
-
export type
|
|
693
|
+
export type TopologyClass15 = "temporal_invalidation";
|
|
717
694
|
/**
|
|
718
695
|
* The precise chronological coordinate terminating the truth value (Graphiti valid_to).
|
|
719
696
|
*/
|
|
@@ -721,7 +698,7 @@ export type InvalidationTimestamp = number;
|
|
|
721
698
|
/**
|
|
722
699
|
* Discriminator type for empirical falsification contract.
|
|
723
700
|
*/
|
|
724
|
-
export type
|
|
701
|
+
export type TopologyClass16 = "empirical_falsification_contract";
|
|
725
702
|
/**
|
|
726
703
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this falsification test to the Merkle-DAG.
|
|
727
704
|
*/
|
|
@@ -738,12 +715,12 @@ export type RequiredToolName = string | null;
|
|
|
738
715
|
* The expected data schema or regex pattern that, if returned by the tool, kills the hypothesis.
|
|
739
716
|
*/
|
|
740
717
|
export type FalsifyingObservationSignature = string;
|
|
741
|
-
export type
|
|
718
|
+
export type TopologyClass17 = "falsification_contract";
|
|
742
719
|
/**
|
|
743
720
|
* The constraint oracle tasked with finding a counter-model.
|
|
744
721
|
*/
|
|
745
722
|
export type FalsificationSolver = "clingo" | "z3";
|
|
746
|
-
export type
|
|
723
|
+
export type TopologyClass18 = "ontological_crosswalk";
|
|
747
724
|
export type TargetGraphCid = string;
|
|
748
725
|
/**
|
|
749
726
|
* The ungrounded natural language concepts extracted by the LLM.
|
|
@@ -764,7 +741,7 @@ export type MinimumIsometryThreshold = number;
|
|
|
764
741
|
/**
|
|
765
742
|
* The discriminative topological boundary for read-only informational handoffs.
|
|
766
743
|
*/
|
|
767
|
-
export type
|
|
744
|
+
export type TopologyClass19 = "informational";
|
|
768
745
|
/**
|
|
769
746
|
* The context or summary to display to the human operator.
|
|
770
747
|
*/
|
|
@@ -776,7 +753,7 @@ export type TimeoutAction1 = "rollback" | "proceed_default" | "terminate";
|
|
|
776
753
|
/**
|
|
777
754
|
* Discriminator for requesting specific missing context from a human.
|
|
778
755
|
*/
|
|
779
|
-
export type
|
|
756
|
+
export type TopologyClass20 = "drafting";
|
|
780
757
|
/**
|
|
781
758
|
* The prompt explaining what information the swarm is missing.
|
|
782
759
|
*/
|
|
@@ -788,7 +765,7 @@ export type TimeoutAction2 = "rollback" | "proceed_default" | "terminate";
|
|
|
788
765
|
/**
|
|
789
766
|
* Discriminator for Forge-to-Claw epistemic deficit escalations.
|
|
790
767
|
*/
|
|
791
|
-
export type
|
|
768
|
+
export type TopologyClass21 = "escalation";
|
|
792
769
|
/**
|
|
793
770
|
* The fully qualified URN of the heuristic solver capability to which the deficit is being escalated.
|
|
794
771
|
*/
|
|
@@ -808,7 +785,7 @@ export type ThermodynamicBudget = number;
|
|
|
808
785
|
/**
|
|
809
786
|
* Discriminator for geometric boundary of latent tool discovery.
|
|
810
787
|
*/
|
|
811
|
-
export type
|
|
788
|
+
export type TopologyClass22 = "semantic_discovery";
|
|
812
789
|
/**
|
|
813
790
|
* The minimum cosine similarity required to authorize a capability mount.
|
|
814
791
|
*/
|
|
@@ -822,7 +799,7 @@ export type RequiredStructuralTypes = string[];
|
|
|
822
799
|
/**
|
|
823
800
|
* Strict discriminator for dynamic UI regrouping.
|
|
824
801
|
*/
|
|
825
|
-
export type
|
|
802
|
+
export type TopologyClass23 = "taxonomic_restructure";
|
|
826
803
|
/**
|
|
827
804
|
* The SOTA mathematical heuristic used to project the new manifold.
|
|
828
805
|
*/
|
|
@@ -925,7 +902,7 @@ export type CompiledShaderCid = string | null;
|
|
|
925
902
|
/**
|
|
926
903
|
* Discriminator for RAG projection intent.
|
|
927
904
|
*/
|
|
928
|
-
export type
|
|
905
|
+
export type TopologyClass24 = "latent_projection";
|
|
929
906
|
/**
|
|
930
907
|
* The maximum number of nodes to extract from the index.
|
|
931
908
|
*/
|
|
@@ -970,7 +947,7 @@ export type ParentMergeThreshold = number | null;
|
|
|
970
947
|
/**
|
|
971
948
|
* Discriminator for unstructured payload schema deduction.
|
|
972
949
|
*/
|
|
973
|
-
export type
|
|
950
|
+
export type TopologyClass25 = "latent_schema_inference";
|
|
974
951
|
/**
|
|
975
952
|
* The CID pointing to the TerminalBufferState or raw intercepted byte stream.
|
|
976
953
|
*/
|
|
@@ -990,7 +967,7 @@ export type RequireStrictValidation = boolean;
|
|
|
990
967
|
/**
|
|
991
968
|
* Discriminator type for a human directive.
|
|
992
969
|
*/
|
|
993
|
-
export type
|
|
970
|
+
export type TopologyClass26 = "human_directive";
|
|
994
971
|
/**
|
|
995
972
|
* The raw, unstructured human objective.
|
|
996
973
|
*/
|
|
@@ -1002,7 +979,7 @@ export type AllocatedBudgetMagnitude = number;
|
|
|
1002
979
|
/**
|
|
1003
980
|
* Discriminator for contextual semantic resolution.
|
|
1004
981
|
*/
|
|
1005
|
-
export type
|
|
982
|
+
export type TopologyClass27 = "contextual_semantic_resolution";
|
|
1006
983
|
/**
|
|
1007
984
|
* An explicit cryptographic pointer to the raw SemanticRelationalVectorState pending resolution.
|
|
1008
985
|
*/
|
|
@@ -1026,7 +1003,7 @@ export type MinimumIsometryThreshold1 = number;
|
|
|
1026
1003
|
/**
|
|
1027
1004
|
* Discriminator for external ontology polling.
|
|
1028
1005
|
*/
|
|
1029
|
-
export type
|
|
1006
|
+
export type TopologyClass28 = "ontology_discovery";
|
|
1030
1007
|
/**
|
|
1031
1008
|
* JSON-RPC version.
|
|
1032
1009
|
*/
|
|
@@ -1062,7 +1039,7 @@ export type ExpectedResponseSchema = {
|
|
|
1062
1039
|
/**
|
|
1063
1040
|
* Discriminator for semantic heuristic proposals.
|
|
1064
1041
|
*/
|
|
1065
|
-
export type
|
|
1042
|
+
export type TopologyClass29 = "semantic_mapping_proposal";
|
|
1066
1043
|
/**
|
|
1067
1044
|
* The cryptographic Merkle-DAG anchor for the proposal.
|
|
1068
1045
|
*/
|
|
@@ -1088,7 +1065,7 @@ export type JustificationEvidenceCids = [NodeCIDState, ...NodeCIDState[]];
|
|
|
1088
1065
|
/**
|
|
1089
1066
|
* The discriminative topological boundary for spatial mutation intents.
|
|
1090
1067
|
*/
|
|
1091
|
-
export type
|
|
1068
|
+
export type TopologyClass30 = "continuous_spatial_mutation";
|
|
1092
1069
|
/**
|
|
1093
1070
|
* The SpatialReferenceFrameManifest CID this coordinate is relative to, anchoring it to a physical or virtual room.
|
|
1094
1071
|
*/
|
|
@@ -1164,11 +1141,43 @@ export type LamportClock = number;
|
|
|
1164
1141
|
/**
|
|
1165
1142
|
* The discriminative topological boundary for compute provisioning intents.
|
|
1166
1143
|
*/
|
|
1167
|
-
export type
|
|
1144
|
+
export type TopologyClass31 = "compute_provisioning";
|
|
1145
|
+
/**
|
|
1146
|
+
* The underlying orchestration engine (Mandatory: SkyPilot).
|
|
1147
|
+
*/
|
|
1148
|
+
export type ProvisioningEngine = "skypilot";
|
|
1168
1149
|
/**
|
|
1169
1150
|
* The maximum atomic cost budget allowable for the provisioned compute.
|
|
1170
1151
|
*/
|
|
1171
1152
|
export type MaxBudget = number;
|
|
1153
|
+
/**
|
|
1154
|
+
* The discrete architectural boundary of the node.
|
|
1155
|
+
*/
|
|
1156
|
+
export type ComputeTier = string;
|
|
1157
|
+
/**
|
|
1158
|
+
* The absolute physical minimum Video RAM required to load this node's latent space.
|
|
1159
|
+
*/
|
|
1160
|
+
export type MinVramGb = number;
|
|
1161
|
+
/**
|
|
1162
|
+
* The networking mode defining the P2P boundary for enterprise compliance.
|
|
1163
|
+
*/
|
|
1164
|
+
export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
|
|
1165
|
+
/**
|
|
1166
|
+
* The rigid silicon precision format required to execute this node's neural circuits.
|
|
1167
|
+
*/
|
|
1168
|
+
export type AcceleratorType = string;
|
|
1169
|
+
/**
|
|
1170
|
+
* The explicit array of cloud infrastructure providers authorized to run this node.
|
|
1171
|
+
*/
|
|
1172
|
+
export type ProviderWhitelist = string[];
|
|
1173
|
+
/**
|
|
1174
|
+
* If True, SkyPilot will hunt for the cheapest spot instances and handle managed recovery.
|
|
1175
|
+
*/
|
|
1176
|
+
export type UseSpot = boolean;
|
|
1177
|
+
/**
|
|
1178
|
+
* The idle timeout after which SkyPilot will automatically terminate the cluster.
|
|
1179
|
+
*/
|
|
1180
|
+
export type AutostopIdleMinutes = number | null;
|
|
1172
1181
|
/**
|
|
1173
1182
|
* The minimal functional capabilities required by the requested compute.
|
|
1174
1183
|
*
|
|
@@ -1178,7 +1187,7 @@ export type RequiredCapabilities = string[];
|
|
|
1178
1187
|
/**
|
|
1179
1188
|
* The discriminative topological boundary for task announcement intents.
|
|
1180
1189
|
*/
|
|
1181
|
-
export type
|
|
1190
|
+
export type TopologyClass32 = "task_announcement";
|
|
1182
1191
|
/**
|
|
1183
1192
|
* Unique identifier for the required task.
|
|
1184
1193
|
*/
|
|
@@ -1194,7 +1203,7 @@ export type MaxBudgetMagnitude = number;
|
|
|
1194
1203
|
/**
|
|
1195
1204
|
* The type of the resilience payload.
|
|
1196
1205
|
*/
|
|
1197
|
-
export type
|
|
1206
|
+
export type TopologyClass33 = "quarantine_intent";
|
|
1198
1207
|
/**
|
|
1199
1208
|
* The deterministic causal justification for the structural quarantine.
|
|
1200
1209
|
*/
|
|
@@ -1202,7 +1211,7 @@ export type Reason = string;
|
|
|
1202
1211
|
/**
|
|
1203
1212
|
* The type of the intervention payload.
|
|
1204
1213
|
*/
|
|
1205
|
-
export type
|
|
1214
|
+
export type TopologyClass34 = "request";
|
|
1206
1215
|
/**
|
|
1207
1216
|
* The explicit whitelist of top-level JSON pointers mathematically open to mutation.
|
|
1208
1217
|
*
|
|
@@ -1258,15 +1267,15 @@ export type LoopsExhausted = number;
|
|
|
1258
1267
|
/**
|
|
1259
1268
|
* Discriminator for an FYI intent.
|
|
1260
1269
|
*/
|
|
1261
|
-
export type
|
|
1270
|
+
export type TopologyClass35 = "fyi";
|
|
1262
1271
|
/**
|
|
1263
1272
|
* The type of the resilience payload.
|
|
1264
1273
|
*/
|
|
1265
|
-
export type
|
|
1274
|
+
export type TopologyClass36 = "fallback_intent";
|
|
1266
1275
|
/**
|
|
1267
1276
|
* The type of the intervention payload.
|
|
1268
1277
|
*/
|
|
1269
|
-
export type
|
|
1278
|
+
export type TopologyClass37 = "override";
|
|
1270
1279
|
/**
|
|
1271
1280
|
* Cryptographic audit justification for bypassing algorithmic consensus.
|
|
1272
1281
|
*/
|
|
@@ -1274,7 +1283,7 @@ export type Justification = string;
|
|
|
1274
1283
|
/**
|
|
1275
1284
|
* The strict discriminator for this intervention payload.
|
|
1276
1285
|
*/
|
|
1277
|
-
export type
|
|
1286
|
+
export type TopologyClass38 = "constitutional_amendment";
|
|
1278
1287
|
/**
|
|
1279
1288
|
* The globally unique decentralized identifier (DID) anchoring the NormativeDriftEvent that justified triggering this proposal.
|
|
1280
1289
|
*/
|
|
@@ -1286,7 +1295,7 @@ export type Justification1 = string;
|
|
|
1286
1295
|
/**
|
|
1287
1296
|
* Discriminator for a spatial kinematic action.
|
|
1288
1297
|
*/
|
|
1289
|
-
export type
|
|
1298
|
+
export type TopologyClass39 = "spatial_kinematic";
|
|
1290
1299
|
/**
|
|
1291
1300
|
* The specific kinematic interaction paradigm.
|
|
1292
1301
|
*/
|
|
@@ -1306,7 +1315,7 @@ export type ExpectedVisualConcept = string | null;
|
|
|
1306
1315
|
/**
|
|
1307
1316
|
* Discriminator type for System2RemediationIntent.
|
|
1308
1317
|
*/
|
|
1309
|
-
export type
|
|
1318
|
+
export type TopologyClass40 = "system_2_remediation";
|
|
1310
1319
|
/**
|
|
1311
1320
|
* A cryptographic Lineage Watermark (CID) tracking this specific dimensional collapse.
|
|
1312
1321
|
*/
|
|
@@ -1348,8 +1357,8 @@ export type SupportsLazyHydration = boolean;
|
|
|
1348
1357
|
/**
|
|
1349
1358
|
* Discriminator type for substrate hydration.
|
|
1350
1359
|
*/
|
|
1351
|
-
export type
|
|
1352
|
-
export type
|
|
1360
|
+
export type TopologyClass41 = "substrate_hydration";
|
|
1361
|
+
export type TopologyClass42 = "neurosymbolic_inference";
|
|
1353
1362
|
/**
|
|
1354
1363
|
* The continuous normalized float measuring the mathematical density of the contextual semantic envelope.
|
|
1355
1364
|
*/
|
|
@@ -1391,14 +1400,14 @@ export type RequiredGroundingDensity = "sparse" | "dense" | "exhaustive";
|
|
|
1391
1400
|
*/
|
|
1392
1401
|
export type MinimumFidelityThreshold = number;
|
|
1393
1402
|
export type ProvenanceTraceCid = string | null;
|
|
1394
|
-
export type
|
|
1403
|
+
export type TopologyClass43 = "topological_projection";
|
|
1395
1404
|
export type ProjectionCid = string;
|
|
1396
1405
|
export type SourceSuperpositionCid = string;
|
|
1397
1406
|
export type TargetTopologyProfile = "N_DIMENSIONAL_TENSOR" | "MARKOV_BLANKET" | "ACYCLIC_DIRECTED_GRAPH" | "ALGEBRAIC_RING";
|
|
1398
1407
|
export type IsomorphismConfidence = number;
|
|
1399
1408
|
export type LossyTranslationDivergence = string[];
|
|
1400
1409
|
export type EpistemicStatus1 = "pending_deterministic_collapse";
|
|
1401
|
-
export type
|
|
1410
|
+
export type TopologyClass44 = "formal_logic_premise";
|
|
1402
1411
|
/**
|
|
1403
1412
|
* The URN identifying the specific formal dialect or solver (e.g., 'urn:coreason:dialect:lean4', 'urn:coreason:dialect:clingo').
|
|
1404
1413
|
*/
|
|
@@ -1411,7 +1420,7 @@ export type FormalStatement = string;
|
|
|
1411
1420
|
* Optional auxiliary scripts required for verification, such as Lean 4 tactic proofs or Prolog ephemeral facts.
|
|
1412
1421
|
*/
|
|
1413
1422
|
export type VerificationScript = string | null;
|
|
1414
|
-
export type
|
|
1423
|
+
export type TopologyClass45 = "causal_propagation";
|
|
1415
1424
|
export type TargetGraphCid1 = string;
|
|
1416
1425
|
export type TaskCid3 = string;
|
|
1417
1426
|
export type MinimumNliEntailmentScore = number;
|
|
@@ -1494,7 +1503,7 @@ export type PublicationTimestamp = number | null;
|
|
|
1494
1503
|
*/
|
|
1495
1504
|
export type SupportingCitations = EvidentiaryCitationState[];
|
|
1496
1505
|
export type UnverifiedEdges = CausalDirectedEdgeState[];
|
|
1497
|
-
export type
|
|
1506
|
+
export type TopologyClass46 = "rdf_serialization";
|
|
1498
1507
|
export type ExportCid = string;
|
|
1499
1508
|
export type TargetGraphCid2 = string;
|
|
1500
1509
|
export type TargetFormat = "turtle" | "xml" | "json-ld" | "ntriples";
|
|
@@ -1503,8 +1512,8 @@ export type ShaclShapeGraphUri = string;
|
|
|
1503
1512
|
export type ViolationAction = "DROP_GRAPH" | "STRIP_TRIPLES" | "HALT_EXECUTION";
|
|
1504
1513
|
export type QueryString = string;
|
|
1505
1514
|
export type TargetEndpoint = string;
|
|
1506
|
-
export type
|
|
1507
|
-
export type
|
|
1515
|
+
export type TopologyClass47 = "sparql_query";
|
|
1516
|
+
export type TopologyClass48 = "bounded_json_rpc_intent";
|
|
1508
1517
|
/**
|
|
1509
1518
|
* JSON-RPC version.
|
|
1510
1519
|
*/
|
|
@@ -1523,7 +1532,7 @@ export type Params1 = {
|
|
|
1523
1532
|
* Unique request identifier.
|
|
1524
1533
|
*/
|
|
1525
1534
|
export type Id1 = string | number | null;
|
|
1526
|
-
export type
|
|
1535
|
+
export type TopologyClass49 = "chaos_experiment_task";
|
|
1527
1536
|
/**
|
|
1528
1537
|
* The unique identifier for the chaos experiment.
|
|
1529
1538
|
*/
|
|
@@ -1555,19 +1564,19 @@ export type Faults = FaultInjectionProfile[];
|
|
|
1555
1564
|
/**
|
|
1556
1565
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
1557
1566
|
*/
|
|
1558
|
-
export type
|
|
1567
|
+
export type EventCid1 = string;
|
|
1559
1568
|
/**
|
|
1560
1569
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
1561
1570
|
*/
|
|
1562
|
-
export type
|
|
1571
|
+
export type PriorEventHash1 = string | null;
|
|
1563
1572
|
/**
|
|
1564
1573
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
1565
1574
|
*/
|
|
1566
|
-
export type
|
|
1575
|
+
export type Timestamp1 = number;
|
|
1567
1576
|
/**
|
|
1568
1577
|
* Discriminator type for an exogenous event.
|
|
1569
1578
|
*/
|
|
1570
|
-
export type
|
|
1579
|
+
export type TopologyClass50 = "exogenous_event";
|
|
1571
1580
|
/**
|
|
1572
1581
|
* Cryptographic identifier for the Black Swan event.
|
|
1573
1582
|
*/
|
|
@@ -1588,7 +1597,7 @@ export type LockedMagnitude = number;
|
|
|
1588
1597
|
* The declarative array of exogenous Black Swan events injected into the topology.
|
|
1589
1598
|
*/
|
|
1590
1599
|
export type Shocks = ExogenousEpistemicEvent[];
|
|
1591
|
-
export type
|
|
1600
|
+
export type TopologyClass51 = "epistemic_transmutation_task";
|
|
1592
1601
|
/**
|
|
1593
1602
|
* Unique identifier for this specific multimodal extraction intervention.
|
|
1594
1603
|
*/
|
|
@@ -1633,7 +1642,7 @@ export type TableStructureRecognition = boolean;
|
|
|
1633
1642
|
* Optional maximum economic expenditure authorized to run this VLM transmutation.
|
|
1634
1643
|
*/
|
|
1635
1644
|
export type ExecutionCostBudgetMagnitude1 = number | null;
|
|
1636
|
-
export type
|
|
1645
|
+
export type TopologyClass52 = "epistemic_upsampling_task";
|
|
1637
1646
|
/**
|
|
1638
1647
|
* The explicitly declared target node classification or structural grain.
|
|
1639
1648
|
*/
|
|
@@ -1649,7 +1658,7 @@ export type UpsamplingConfidenceThreshold = number;
|
|
|
1649
1658
|
* @maxItems 1000
|
|
1650
1659
|
*/
|
|
1651
1660
|
export type JustificationVectors = [string, ...string[]];
|
|
1652
|
-
export type
|
|
1661
|
+
export type TopologyClass53 = "interventional_causal_task";
|
|
1653
1662
|
/**
|
|
1654
1663
|
* Unique identifier for this causal intervention.
|
|
1655
1664
|
*/
|
|
@@ -1674,7 +1683,7 @@ export type ExpectedCausalInformationGain = number;
|
|
|
1674
1683
|
* The maximum economic expenditure authorized to run this specific causal intervention.
|
|
1675
1684
|
*/
|
|
1676
1685
|
export type ExecutionCostBudgetMagnitude2 = number;
|
|
1677
|
-
export type
|
|
1686
|
+
export type TopologyClass54 = "mcp_client_intent";
|
|
1678
1687
|
/**
|
|
1679
1688
|
* JSON-RPC version.
|
|
1680
1689
|
*/
|
|
@@ -1696,7 +1705,7 @@ export type Id2 = string | number | null;
|
|
|
1696
1705
|
/**
|
|
1697
1706
|
* Discriminator for the dynamic manifold projection.
|
|
1698
1707
|
*/
|
|
1699
|
-
export type
|
|
1708
|
+
export type TopologyClass55 = "dynamic_manifold";
|
|
1700
1709
|
/**
|
|
1701
1710
|
* Unique identifier for this projection.
|
|
1702
1711
|
*/
|
|
@@ -1712,7 +1721,7 @@ export type PanelCid = string;
|
|
|
1712
1721
|
/**
|
|
1713
1722
|
* Discriminator for Grammar of Graphics charts.
|
|
1714
1723
|
*/
|
|
1715
|
-
export type
|
|
1724
|
+
export type TopologyClass56 = "grammar";
|
|
1716
1725
|
/**
|
|
1717
1726
|
* The declarative semantic anchor summarizing the underlying visual grammar.
|
|
1718
1727
|
*/
|
|
@@ -1752,7 +1761,7 @@ export type Field = string;
|
|
|
1752
1761
|
/**
|
|
1753
1762
|
* The strictly typed mathematical mapping function distorting metrics into Euclidean pixel space.
|
|
1754
1763
|
*/
|
|
1755
|
-
export type
|
|
1764
|
+
export type TopologyClass57 = "linear" | "log" | "time" | "ordinal" | "nominal";
|
|
1756
1765
|
/**
|
|
1757
1766
|
* The optional minimum bound of the scale domain.
|
|
1758
1767
|
*/
|
|
@@ -1780,7 +1789,7 @@ export type PanelCid1 = string;
|
|
|
1780
1789
|
/**
|
|
1781
1790
|
* Discriminator for markdown insight cards.
|
|
1782
1791
|
*/
|
|
1783
|
-
export type
|
|
1792
|
+
export type TopologyClass58 = "insight_card";
|
|
1784
1793
|
/**
|
|
1785
1794
|
* The declarative semantic anchor summarizing the underlying matrix or markdown projection.
|
|
1786
1795
|
*/
|
|
@@ -1801,7 +1810,7 @@ export type MesoDistanceThreshold = number;
|
|
|
1801
1810
|
* The close-proximity boundary where full N-dimensional tensors and unstructured text blocks are mathematically hydrated into the observer's plane.
|
|
1802
1811
|
*/
|
|
1803
1812
|
export type MicroDistanceThreshold = number;
|
|
1804
|
-
export type
|
|
1813
|
+
export type TopologyClass59 = "rollback_intent";
|
|
1805
1814
|
/**
|
|
1806
1815
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for the causal rollback operation.
|
|
1807
1816
|
*/
|
|
@@ -1814,7 +1823,7 @@ export type TargetEventCid = string;
|
|
|
1814
1823
|
* The strict array of nodes whose operational histories are causally tainted and must be flushed.
|
|
1815
1824
|
*/
|
|
1816
1825
|
export type InvalidatedNodeCids = string[];
|
|
1817
|
-
export type
|
|
1826
|
+
export type TopologyClass60 = "state_mutation_intent";
|
|
1818
1827
|
/**
|
|
1819
1828
|
* The JSON pointer indicating the exact state vector to mutate deterministically.
|
|
1820
1829
|
*/
|
|
@@ -1827,32 +1836,10 @@ export type From = string | null;
|
|
|
1827
1836
|
* Cryptographic proof that this mutation was sanitized by the Symbolic Firewall.
|
|
1828
1837
|
*/
|
|
1829
1838
|
export type ZeroTrustReceiptCid = string | null;
|
|
1830
|
-
/**
|
|
1831
|
-
* Discriminator for the FederatedDiscoveryIntent topology.
|
|
1832
|
-
*/
|
|
1833
|
-
export type TopologyClass62 = "federated_discovery";
|
|
1834
|
-
/**
|
|
1835
|
-
* The bounded set of URN namespaces to interrogate during sovereign oracle discovery.
|
|
1836
|
-
*
|
|
1837
|
-
* @maxItems 1000
|
|
1838
|
-
*/
|
|
1839
|
-
export type DomainFilter = string[];
|
|
1840
|
-
/**
|
|
1841
|
-
* A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
|
|
1842
|
-
*/
|
|
1843
|
-
export type BundleContentHashState = string;
|
|
1844
|
-
/**
|
|
1845
|
-
* The maximum number of P2P network hops allowed.
|
|
1846
|
-
*/
|
|
1847
|
-
export type MaxNetworkHops = number;
|
|
1848
|
-
/**
|
|
1849
|
-
* The minimum security clearance required from the discovered execution substrates.
|
|
1850
|
-
*/
|
|
1851
|
-
export type RequiredSecurityClearance = "PUBLIC" | "CONFIDENTIAL" | "RESTRICTED";
|
|
1852
1839
|
/**
|
|
1853
1840
|
* Discriminator for the OntologicalNormalizationIntent topology.
|
|
1854
1841
|
*/
|
|
1855
|
-
export type
|
|
1842
|
+
export type TopologyClass61 = "ontological_normalization";
|
|
1856
1843
|
/**
|
|
1857
1844
|
* The Content Identifier (CID) of the raw ingested data artifact.
|
|
1858
1845
|
*/
|
|
@@ -1914,27 +1901,7 @@ export type Description3 = string;
|
|
|
1914
1901
|
/**
|
|
1915
1902
|
* Discriminator for an Agent node.
|
|
1916
1903
|
*/
|
|
1917
|
-
export type
|
|
1918
|
-
/**
|
|
1919
|
-
* The discrete architectural boundary of the node.
|
|
1920
|
-
*/
|
|
1921
|
-
export type ComputeTier = string;
|
|
1922
|
-
/**
|
|
1923
|
-
* The absolute physical minimum Video RAM required to load this node's latent space.
|
|
1924
|
-
*/
|
|
1925
|
-
export type MinVramGb = number;
|
|
1926
|
-
/**
|
|
1927
|
-
* The networking mode defining the P2P boundary for enterprise compliance.
|
|
1928
|
-
*/
|
|
1929
|
-
export type CoreasonNetworkMode = "P2P" | "STRICT_GENESIS";
|
|
1930
|
-
/**
|
|
1931
|
-
* The rigid silicon precision format required to execute this node's neural circuits.
|
|
1932
|
-
*/
|
|
1933
|
-
export type AcceleratorType = string;
|
|
1934
|
-
/**
|
|
1935
|
-
* The explicit array of cloud infrastructure providers authorized to run this node.
|
|
1936
|
-
*/
|
|
1937
|
-
export type ProviderWhitelist = string[];
|
|
1904
|
+
export type TopologyClass62 = "agent";
|
|
1938
1905
|
/**
|
|
1939
1906
|
* The level of hardware-enforced cryptographic isolation required.
|
|
1940
1907
|
*/
|
|
@@ -2029,7 +1996,7 @@ export type MaxRetriesOnSemanticTax = number;
|
|
|
2029
1996
|
*/
|
|
2030
1997
|
export type PermittedRemoteDecodingProtocols = string[];
|
|
2031
1998
|
/**
|
|
2032
|
-
* The minimum
|
|
1999
|
+
* The minimum SPIFFE/SPIRE workload identity perimeter required for the hardware.
|
|
2033
2000
|
*/
|
|
2034
2001
|
export type EpistemicSecurityPolicy1 = "PUBLIC" | "STANDARD" | "CONFIDENTIAL" | "RESTRICTED";
|
|
2035
2002
|
/**
|
|
@@ -2123,13 +2090,13 @@ export type EnforceFunctionalIsolation = boolean;
|
|
|
2123
2090
|
*/
|
|
2124
2091
|
export type PermittedClassificationTiers = [SemanticClassificationProfile, ...SemanticClassificationProfile[]];
|
|
2125
2092
|
/**
|
|
2126
|
-
* AGENT INSTRUCTION: Implements
|
|
2093
|
+
* AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
|
|
2127
2094
|
*
|
|
2128
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads.
|
|
2095
|
+
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
|
|
2129
2096
|
*
|
|
2130
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized
|
|
2097
|
+
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
|
|
2131
2098
|
*
|
|
2132
|
-
* MCP ROUTING TRIGGERS:
|
|
2099
|
+
* MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
|
|
2133
2100
|
*/
|
|
2134
2101
|
export type SemanticClassificationProfile = "public" | "internal" | "confidential" | "restricted";
|
|
2135
2102
|
/**
|
|
@@ -2240,11 +2207,11 @@ export type TriggerConditions = [
|
|
|
2240
2207
|
...("on_tool_call" | "on_belief_mutation" | "on_quarantine" | "on_falsification")[]
|
|
2241
2208
|
];
|
|
2242
2209
|
/**
|
|
2243
|
-
* The specific
|
|
2210
|
+
* The specific TransformerLens hook points the execution engine must extract from.
|
|
2244
2211
|
*
|
|
2245
2212
|
* @minItems 1
|
|
2246
2213
|
*/
|
|
2247
|
-
export type
|
|
2214
|
+
export type TargetHookPoints1 = [string, ...string[]];
|
|
2248
2215
|
/**
|
|
2249
2216
|
* The top-k features to extract, preventing VRAM exhaustion.
|
|
2250
2217
|
*/
|
|
@@ -2342,7 +2309,7 @@ export type DomainExtensions1 = {
|
|
|
2342
2309
|
/**
|
|
2343
2310
|
* Discriminator for a Human node.
|
|
2344
2311
|
*/
|
|
2345
|
-
export type
|
|
2312
|
+
export type TopologyClass63 = "human";
|
|
2346
2313
|
/**
|
|
2347
2314
|
* The mandatory cryptographic attestation URN required to verify the human operator's identity.
|
|
2348
2315
|
*/
|
|
@@ -2372,7 +2339,7 @@ export type DomainExtensions2 = {
|
|
|
2372
2339
|
/**
|
|
2373
2340
|
* Discriminator for a System node.
|
|
2374
2341
|
*/
|
|
2375
|
-
export type
|
|
2342
|
+
export type TopologyClass64 = "system";
|
|
2376
2343
|
/**
|
|
2377
2344
|
* The semantic boundary defining the objective function or computational perimeter of the execution node.
|
|
2378
2345
|
*/
|
|
@@ -2398,7 +2365,7 @@ export type DomainExtensions3 = {
|
|
|
2398
2365
|
/**
|
|
2399
2366
|
* Discriminator for a Composite node.
|
|
2400
2367
|
*/
|
|
2401
|
-
export type
|
|
2368
|
+
export type TopologyClass65 = "composite";
|
|
2402
2369
|
/**
|
|
2403
2370
|
* Entropy Penalty applied per edge traversal during a defeasible cascade.
|
|
2404
2371
|
*/
|
|
@@ -2456,13 +2423,13 @@ export type Active1 = boolean;
|
|
|
2456
2423
|
*/
|
|
2457
2424
|
export type RuleCid = string;
|
|
2458
2425
|
/**
|
|
2459
|
-
* AGENT INSTRUCTION: Implements
|
|
2426
|
+
* AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
|
|
2460
2427
|
*
|
|
2461
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads.
|
|
2428
|
+
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
|
|
2462
2429
|
*
|
|
2463
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized
|
|
2430
|
+
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
|
|
2464
2431
|
*
|
|
2465
|
-
* MCP ROUTING TRIGGERS:
|
|
2432
|
+
* MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
|
|
2466
2433
|
*/
|
|
2467
2434
|
export type SemanticClassificationProfile1 = "public" | "internal" | "confidential" | "restricted";
|
|
2468
2435
|
/**
|
|
@@ -2502,11 +2469,11 @@ export type ActionOnViolation = "drop" | "quarantine" | "redact";
|
|
|
2502
2469
|
*/
|
|
2503
2470
|
export type TargetFeatureIndex = number;
|
|
2504
2471
|
/**
|
|
2505
|
-
* The specific
|
|
2472
|
+
* The specific TransformerLens hook points where this feature activation must be monitored.
|
|
2506
2473
|
*
|
|
2507
2474
|
* @minItems 1
|
|
2508
2475
|
*/
|
|
2509
|
-
export type
|
|
2476
|
+
export type MonitoredHookPoints = [string, ...string[]];
|
|
2510
2477
|
/**
|
|
2511
2478
|
* The mathematical magnitude limit. If the feature activates beyond this, the firewall trips.
|
|
2512
2479
|
*/
|
|
@@ -2618,7 +2585,7 @@ export type FoveatedPrivacyEpsilon = number | null;
|
|
|
2618
2585
|
/**
|
|
2619
2586
|
* Discriminator for a DAG topology.
|
|
2620
2587
|
*/
|
|
2621
|
-
export type
|
|
2588
|
+
export type TopologyClass66 = "dag";
|
|
2622
2589
|
/**
|
|
2623
2590
|
* The strict, topologically bounded matrix of directed causal edges.
|
|
2624
2591
|
*/
|
|
@@ -2702,7 +2669,7 @@ export type Justification7 = string | null;
|
|
|
2702
2669
|
/**
|
|
2703
2670
|
* Discriminator for a Council topology.
|
|
2704
2671
|
*/
|
|
2705
|
-
export type
|
|
2672
|
+
export type TopologyClass67 = "council";
|
|
2706
2673
|
/**
|
|
2707
2674
|
* The minimum number of adversarial or 'Devil's Advocate' roles required to prevent groupthink.
|
|
2708
2675
|
*/
|
|
@@ -2774,7 +2741,7 @@ export type Justification8 = string | null;
|
|
|
2774
2741
|
/**
|
|
2775
2742
|
* Discriminator for a Swarm topology.
|
|
2776
2743
|
*/
|
|
2777
|
-
export type
|
|
2744
|
+
export type TopologyClass68 = "swarm";
|
|
2778
2745
|
/**
|
|
2779
2746
|
* Threshold limit for dynamic spawning of additional nodes.
|
|
2780
2747
|
*/
|
|
@@ -2856,7 +2823,7 @@ export type Justification9 = string | null;
|
|
|
2856
2823
|
/**
|
|
2857
2824
|
* Discriminator for an Evolutionary topology.
|
|
2858
2825
|
*/
|
|
2859
|
-
export type
|
|
2826
|
+
export type TopologyClass69 = "evolutionary";
|
|
2860
2827
|
/**
|
|
2861
2828
|
* The absolute limit on evolutionary breeding cycles.
|
|
2862
2829
|
*/
|
|
@@ -2916,7 +2883,7 @@ export type Justification10 = string | null;
|
|
|
2916
2883
|
/**
|
|
2917
2884
|
* Discriminator for SMPC Topology.
|
|
2918
2885
|
*/
|
|
2919
|
-
export type
|
|
2886
|
+
export type TopologyClass70 = "smpc";
|
|
2920
2887
|
/**
|
|
2921
2888
|
* The exact cryptographic P2P protocol the nodes must use to evaluate the function.
|
|
2922
2889
|
*/
|
|
@@ -2946,7 +2913,7 @@ export type Justification11 = string | null;
|
|
|
2946
2913
|
/**
|
|
2947
2914
|
* Discriminator for an Evaluator-Optimizer loop.
|
|
2948
2915
|
*/
|
|
2949
|
-
export type
|
|
2916
|
+
export type TopologyClass71 = "evaluator_optimizer";
|
|
2950
2917
|
/**
|
|
2951
2918
|
* The absolute limit on Actor-Critic cycles to prevent infinite compute burn.
|
|
2952
2919
|
*/
|
|
@@ -2970,7 +2937,7 @@ export type Justification12 = string | null;
|
|
|
2970
2937
|
/**
|
|
2971
2938
|
* Discriminator for a Digital Twin topology.
|
|
2972
2939
|
*/
|
|
2973
|
-
export type
|
|
2940
|
+
export type TopologyClass72 = "digital_twin";
|
|
2974
2941
|
/**
|
|
2975
2942
|
* The identifier (expected to be a W3C DID) pointing to the real-world topology it is cloning.
|
|
2976
2943
|
*/
|
|
@@ -2990,7 +2957,7 @@ export type EnforceNoSideEffects = boolean;
|
|
|
2990
2957
|
/**
|
|
2991
2958
|
* Discriminator for federation macro.
|
|
2992
2959
|
*/
|
|
2993
|
-
export type
|
|
2960
|
+
export type TopologyClass73 = "macro_federation";
|
|
2994
2961
|
/**
|
|
2995
2962
|
* The nodes forming the PBFT ring.
|
|
2996
2963
|
*
|
|
@@ -3012,7 +2979,7 @@ export type Justification13 = string | null;
|
|
|
3012
2979
|
/**
|
|
3013
2980
|
* Discriminator for forge macro.
|
|
3014
2981
|
*/
|
|
3015
|
-
export type
|
|
2982
|
+
export type TopologyClass74 = "macro_forge";
|
|
3016
2983
|
/**
|
|
3017
2984
|
* The structural 128-char DID boundary pointing to the foundational semantic deficit vector.
|
|
3018
2985
|
*/
|
|
@@ -3040,7 +3007,7 @@ export type Justification14 = string | null;
|
|
|
3040
3007
|
/**
|
|
3041
3008
|
* Discriminator for the elicitation macro.
|
|
3042
3009
|
*/
|
|
3043
|
-
export type
|
|
3010
|
+
export type TopologyClass75 = "macro_elicitation";
|
|
3044
3011
|
/**
|
|
3045
3012
|
* The anchor to the initial, unstructured MultimodalArtifactReceipt uploaded by the human.
|
|
3046
3013
|
*/
|
|
@@ -3064,7 +3031,7 @@ export type Justification15 = string | null;
|
|
|
3064
3031
|
/**
|
|
3065
3032
|
* Discriminator for the ingestion macro.
|
|
3066
3033
|
*/
|
|
3067
|
-
export type
|
|
3034
|
+
export type TopologyClass76 = "macro_ingestion";
|
|
3068
3035
|
/**
|
|
3069
3036
|
* Target serialization format.
|
|
3070
3037
|
*/
|
|
@@ -3084,7 +3051,7 @@ export type Justification16 = string | null;
|
|
|
3084
3051
|
/**
|
|
3085
3052
|
* Discriminator for a macro neurosymbolic loop.
|
|
3086
3053
|
*/
|
|
3087
|
-
export type
|
|
3054
|
+
export type TopologyClass77 = "macro_neurosymbolic";
|
|
3088
3055
|
/**
|
|
3089
3056
|
* The connectionist agent generating hypotheses.
|
|
3090
3057
|
*/
|
|
@@ -3104,7 +3071,7 @@ export type CritiqueSchemaCid = string | null;
|
|
|
3104
3071
|
/**
|
|
3105
3072
|
* Discriminator for a discourse tree topology.
|
|
3106
3073
|
*/
|
|
3107
|
-
export type
|
|
3074
|
+
export type TopologyClass78 = "discourse_tree";
|
|
3108
3075
|
/**
|
|
3109
3076
|
* Cryptographic identifier for this topology.
|
|
3110
3077
|
*/
|
|
@@ -3117,7 +3084,7 @@ export type DiscourseType = "preamble" | "methodology" | "argumentation" | "find
|
|
|
3117
3084
|
* Explicit pointers linking this discourse block to the specific AtomicPropositionState nodes extracted from its text.
|
|
3118
3085
|
*/
|
|
3119
3086
|
export type ContainedPropositions = NodeCIDState[];
|
|
3120
|
-
export type
|
|
3087
|
+
export type TopologyClass79 = "document_knowledge_graph";
|
|
3121
3088
|
export type GraphCid = string;
|
|
3122
3089
|
export type SourceArtifactCid2 = string;
|
|
3123
3090
|
/**
|
|
@@ -3181,7 +3148,7 @@ export type CiphertextBlob = string;
|
|
|
3181
3148
|
/**
|
|
3182
3149
|
* Discriminator for manifold mapping.
|
|
3183
3150
|
*/
|
|
3184
|
-
export type
|
|
3151
|
+
export type TopologyClass80 = "manifold_mapping";
|
|
3185
3152
|
/**
|
|
3186
3153
|
* Calculated geometric alignment between the semantic embedding and spatial tensor.
|
|
3187
3154
|
*/
|
|
@@ -3199,7 +3166,7 @@ export type Nodes12 = SemanticNodeState[];
|
|
|
3199
3166
|
*/
|
|
3200
3167
|
export type CausalEdges = CausalDirectedEdgeState[];
|
|
3201
3168
|
export type IsomorphismHash = string;
|
|
3202
|
-
export type
|
|
3169
|
+
export type TopologyClass81 = "hierarchical_dom";
|
|
3203
3170
|
export type DomCid = string;
|
|
3204
3171
|
export type RootBlockCid = string;
|
|
3205
3172
|
/**
|
|
@@ -3291,7 +3258,7 @@ export type DomainExtensions4 = {
|
|
|
3291
3258
|
/**
|
|
3292
3259
|
* Discriminator for a Memoized node.
|
|
3293
3260
|
*/
|
|
3294
|
-
export type
|
|
3261
|
+
export type TopologyClass82 = "memoized";
|
|
3295
3262
|
/**
|
|
3296
3263
|
* A discriminated union of presentation UI panels.
|
|
3297
3264
|
*/
|
|
@@ -3304,7 +3271,7 @@ export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | Cros
|
|
|
3304
3271
|
/**
|
|
3305
3272
|
* Discriminator for temporal graph crdt.
|
|
3306
3273
|
*/
|
|
3307
|
-
export type
|
|
3274
|
+
export type TopologyClass83 = "temporal_graph_crdt";
|
|
3308
3275
|
/**
|
|
3309
3276
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark.
|
|
3310
3277
|
*/
|
|
@@ -3325,40 +3292,40 @@ export type AddSet = NodeCIDState[];
|
|
|
3325
3292
|
* The set of non-monotonic timeline caps.
|
|
3326
3293
|
*/
|
|
3327
3294
|
export type TerminateSet = TemporalEdgeInvalidationIntent[];
|
|
3328
|
-
export type
|
|
3295
|
+
export type TopologyClass84 = "mcp_tool_definition";
|
|
3329
3296
|
/**
|
|
3330
3297
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3331
3298
|
*/
|
|
3332
|
-
export type
|
|
3299
|
+
export type EventCid2 = string;
|
|
3333
3300
|
/**
|
|
3334
3301
|
* The RFC 8785 Canonical hash of the immediate causal ancestor event. Null for genesis nodes.
|
|
3335
3302
|
*/
|
|
3336
|
-
export type
|
|
3337
|
-
export type
|
|
3303
|
+
export type PriorEventHash2 = string | null;
|
|
3304
|
+
export type Timestamp2 = number;
|
|
3338
3305
|
export type Name = string;
|
|
3339
3306
|
export type Description9 = string;
|
|
3340
|
-
export type
|
|
3341
|
-
export type
|
|
3342
|
-
export type
|
|
3343
|
-
export type
|
|
3344
|
-
export type
|
|
3307
|
+
export type EventCid3 = string;
|
|
3308
|
+
export type PriorEventHash3 = string | null;
|
|
3309
|
+
export type Timestamp3 = number;
|
|
3310
|
+
export type TopologyClass85 = "crosswalk_resolution";
|
|
3311
|
+
export type ReceiptCid = string;
|
|
3345
3312
|
export type TargetGraphCid3 = string;
|
|
3346
3313
|
/**
|
|
3347
3314
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3348
3315
|
*/
|
|
3349
|
-
export type
|
|
3316
|
+
export type EventCid4 = string;
|
|
3350
3317
|
/**
|
|
3351
3318
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3352
3319
|
*/
|
|
3353
|
-
export type
|
|
3320
|
+
export type PriorEventHash4 = string | null;
|
|
3354
3321
|
/**
|
|
3355
3322
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3356
3323
|
*/
|
|
3357
|
-
export type
|
|
3324
|
+
export type Timestamp4 = number;
|
|
3358
3325
|
/**
|
|
3359
3326
|
* Discriminator for a zero-trust receipt.
|
|
3360
3327
|
*/
|
|
3361
|
-
export type
|
|
3328
|
+
export type TopologyClass86 = "zero_trust_receipt";
|
|
3362
3329
|
/**
|
|
3363
3330
|
* Pointer to the originating EpistemicZeroTrustContract.
|
|
3364
3331
|
*/
|
|
@@ -3382,19 +3349,19 @@ export type TransmutedPayloadHash = string;
|
|
|
3382
3349
|
/**
|
|
3383
3350
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3384
3351
|
*/
|
|
3385
|
-
export type
|
|
3352
|
+
export type EventCid5 = string;
|
|
3386
3353
|
/**
|
|
3387
3354
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3388
3355
|
*/
|
|
3389
|
-
export type
|
|
3356
|
+
export type PriorEventHash5 = string | null;
|
|
3390
3357
|
/**
|
|
3391
3358
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3392
3359
|
*/
|
|
3393
|
-
export type
|
|
3360
|
+
export type Timestamp5 = number;
|
|
3394
3361
|
/**
|
|
3395
3362
|
* Discriminator type for an observation event.
|
|
3396
3363
|
*/
|
|
3397
|
-
export type
|
|
3364
|
+
export type TopologyClass87 = "observation";
|
|
3398
3365
|
/**
|
|
3399
3366
|
* The URN representing the physical silicon architecture generating the root-of-trust quote (e.g., 'urn:coreason:enclave:intel_tdx').
|
|
3400
3367
|
*/
|
|
@@ -3414,7 +3381,7 @@ export type AnyToolchainState = BrowserDOMState | TerminalBufferState;
|
|
|
3414
3381
|
/**
|
|
3415
3382
|
* Discriminator for Causal Actuators representing structural shifts.
|
|
3416
3383
|
*/
|
|
3417
|
-
export type
|
|
3384
|
+
export type TopologyClass88 = "browser";
|
|
3418
3385
|
/**
|
|
3419
3386
|
* Spatial Execution Bounds where the agent interacts.
|
|
3420
3387
|
*/
|
|
@@ -3441,7 +3408,7 @@ export type ScreenshotCid = string | null;
|
|
|
3441
3408
|
/**
|
|
3442
3409
|
* Discriminator for Causal Actuators on structural buffers.
|
|
3443
3410
|
*/
|
|
3444
|
-
export type
|
|
3411
|
+
export type TopologyClass89 = "terminal";
|
|
3445
3412
|
/**
|
|
3446
3413
|
* Capability Perimeters defining context bounds.
|
|
3447
3414
|
*/
|
|
@@ -3527,19 +3494,19 @@ export type MaxLookbackWindow = number;
|
|
|
3527
3494
|
/**
|
|
3528
3495
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3529
3496
|
*/
|
|
3530
|
-
export type
|
|
3497
|
+
export type EventCid6 = string;
|
|
3531
3498
|
/**
|
|
3532
3499
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3533
3500
|
*/
|
|
3534
|
-
export type
|
|
3501
|
+
export type PriorEventHash6 = string | null;
|
|
3535
3502
|
/**
|
|
3536
3503
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3537
3504
|
*/
|
|
3538
|
-
export type
|
|
3505
|
+
export type Timestamp6 = number;
|
|
3539
3506
|
/**
|
|
3540
3507
|
* Discriminator type for a Belief Assertion event.
|
|
3541
3508
|
*/
|
|
3542
|
-
export type
|
|
3509
|
+
export type TopologyClass90 = "belief_mutation";
|
|
3543
3510
|
/**
|
|
3544
3511
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the source event in the Merkle-DAG.
|
|
3545
3512
|
*/
|
|
@@ -3579,32 +3546,32 @@ export type QuorumSignatures = string[];
|
|
|
3579
3546
|
/**
|
|
3580
3547
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3581
3548
|
*/
|
|
3582
|
-
export type
|
|
3549
|
+
export type EventCid7 = string;
|
|
3583
3550
|
/**
|
|
3584
3551
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3585
3552
|
*/
|
|
3586
|
-
export type
|
|
3553
|
+
export type PriorEventHash7 = string | null;
|
|
3587
3554
|
/**
|
|
3588
3555
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3589
3556
|
*/
|
|
3590
|
-
export type
|
|
3557
|
+
export type Timestamp7 = number;
|
|
3591
3558
|
/**
|
|
3592
3559
|
* Discriminator type for a system fault event.
|
|
3593
3560
|
*/
|
|
3594
|
-
export type
|
|
3595
|
-
export type
|
|
3561
|
+
export type TopologyClass91 = "system_fault";
|
|
3562
|
+
export type TopologyClass92 = "atomic_proposition";
|
|
3596
3563
|
/**
|
|
3597
3564
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3598
3565
|
*/
|
|
3599
|
-
export type
|
|
3566
|
+
export type EventCid8 = string;
|
|
3600
3567
|
/**
|
|
3601
3568
|
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
3602
3569
|
*/
|
|
3603
|
-
export type
|
|
3570
|
+
export type PriorEventHash8 = string | null;
|
|
3604
3571
|
/**
|
|
3605
3572
|
* The precise temporal coordinate of the event realization.
|
|
3606
3573
|
*/
|
|
3607
|
-
export type
|
|
3574
|
+
export type Timestamp8 = number;
|
|
3608
3575
|
/**
|
|
3609
3576
|
* A Content Identifier (CID) bounding this specific extracted proposition.
|
|
3610
3577
|
*/
|
|
@@ -3649,19 +3616,19 @@ export type UpperBound = number | null;
|
|
|
3649
3616
|
* Explicit mathematical boundaries extracted from the text that empirically limit the certainty or scope of the proposition.
|
|
3650
3617
|
*/
|
|
3651
3618
|
export type StatisticalQualifiers = EmpiricalStatisticalProfile[];
|
|
3652
|
-
export type
|
|
3619
|
+
export type TopologyClass93 = "post_coordinated_concept";
|
|
3653
3620
|
/**
|
|
3654
3621
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3655
3622
|
*/
|
|
3656
|
-
export type
|
|
3623
|
+
export type EventCid9 = string;
|
|
3657
3624
|
/**
|
|
3658
3625
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
3659
3626
|
*/
|
|
3660
|
-
export type
|
|
3627
|
+
export type PriorEventHash9 = string | null;
|
|
3661
3628
|
/**
|
|
3662
3629
|
* The precise temporal coordinate of the event realization.
|
|
3663
3630
|
*/
|
|
3664
|
-
export type
|
|
3631
|
+
export type Timestamp9 = number;
|
|
3665
3632
|
/**
|
|
3666
3633
|
* The unique geometric coordinate representing this specific assembled concept.
|
|
3667
3634
|
*/
|
|
@@ -3674,10 +3641,10 @@ export type ManifoldAlignmentMetricProfile1 = "gromov_wasserstein" | "earth_move
|
|
|
3674
3641
|
* The exact mathematical fidelity achieved during projection.
|
|
3675
3642
|
*/
|
|
3676
3643
|
export type IsometryScore = number;
|
|
3677
|
-
export type
|
|
3678
|
-
export type
|
|
3679
|
-
export type
|
|
3680
|
-
export type
|
|
3644
|
+
export type EventCid10 = string;
|
|
3645
|
+
export type PriorEventHash10 = string | null;
|
|
3646
|
+
export type Timestamp10 = number;
|
|
3647
|
+
export type TopologyClass94 = "artifact_corruption";
|
|
3681
3648
|
/**
|
|
3682
3649
|
* The genesis artifact that caused the ingestion engine to crash.
|
|
3683
3650
|
*/
|
|
@@ -3687,19 +3654,19 @@ export type DiagnosticHash = string;
|
|
|
3687
3654
|
/**
|
|
3688
3655
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3689
3656
|
*/
|
|
3690
|
-
export type
|
|
3657
|
+
export type EventCid11 = string;
|
|
3691
3658
|
/**
|
|
3692
3659
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3693
3660
|
*/
|
|
3694
|
-
export type
|
|
3661
|
+
export type PriorEventHash11 = string | null;
|
|
3695
3662
|
/**
|
|
3696
3663
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3697
3664
|
*/
|
|
3698
|
-
export type
|
|
3665
|
+
export type Timestamp11 = number;
|
|
3699
3666
|
/**
|
|
3700
3667
|
* Discriminator for a hypothesis generation event.
|
|
3701
3668
|
*/
|
|
3702
|
-
export type
|
|
3669
|
+
export type TopologyClass95 = "hypothesis";
|
|
3703
3670
|
/**
|
|
3704
3671
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this abductive leap to the Merkle-DAG.
|
|
3705
3672
|
*/
|
|
@@ -3741,19 +3708,19 @@ export type CausalEdges1 = CausalDirectedEdgeState[];
|
|
|
3741
3708
|
/**
|
|
3742
3709
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3743
3710
|
*/
|
|
3744
|
-
export type
|
|
3711
|
+
export type EventCid12 = string;
|
|
3745
3712
|
/**
|
|
3746
3713
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3747
3714
|
*/
|
|
3748
|
-
export type
|
|
3715
|
+
export type PriorEventHash12 = string | null;
|
|
3749
3716
|
/**
|
|
3750
3717
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3751
3718
|
*/
|
|
3752
|
-
export type
|
|
3719
|
+
export type Timestamp12 = number;
|
|
3753
3720
|
/**
|
|
3754
3721
|
* Discriminator type for a barge-in interruption event.
|
|
3755
3722
|
*/
|
|
3756
|
-
export type
|
|
3723
|
+
export type TopologyClass96 = "barge_in";
|
|
3757
3724
|
/**
|
|
3758
3725
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the active node generation cycle that was killed in the Merkle-DAG.
|
|
3759
3726
|
*/
|
|
@@ -3771,19 +3738,19 @@ export type EpistemicDisposition = "discard" | "retain_as_context" | "mark_as_fa
|
|
|
3771
3738
|
/**
|
|
3772
3739
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3773
3740
|
*/
|
|
3774
|
-
export type
|
|
3741
|
+
export type EventCid13 = string;
|
|
3775
3742
|
/**
|
|
3776
3743
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3777
3744
|
*/
|
|
3778
|
-
export type
|
|
3745
|
+
export type PriorEventHash13 = string | null;
|
|
3779
3746
|
/**
|
|
3780
3747
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3781
3748
|
*/
|
|
3782
|
-
export type
|
|
3749
|
+
export type Timestamp13 = number;
|
|
3783
3750
|
/**
|
|
3784
3751
|
* Discriminator type for a counterfactual regret event.
|
|
3785
3752
|
*/
|
|
3786
|
-
export type
|
|
3753
|
+
export type TopologyClass97 = "counterfactual_regret";
|
|
3787
3754
|
/**
|
|
3788
3755
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the specific historical state node where the agent mathematically diverged to simulate an alternative path.
|
|
3789
3756
|
*/
|
|
@@ -3807,19 +3774,19 @@ export type EpistemicRegret = number;
|
|
|
3807
3774
|
/**
|
|
3808
3775
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3809
3776
|
*/
|
|
3810
|
-
export type
|
|
3777
|
+
export type EventCid14 = string;
|
|
3811
3778
|
/**
|
|
3812
3779
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3813
3780
|
*/
|
|
3814
|
-
export type
|
|
3781
|
+
export type PriorEventHash14 = string | null;
|
|
3815
3782
|
/**
|
|
3816
3783
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3817
3784
|
*/
|
|
3818
|
-
export type
|
|
3785
|
+
export type Timestamp14 = number;
|
|
3819
3786
|
/**
|
|
3820
3787
|
* Discriminator type for a tool invocation event.
|
|
3821
3788
|
*/
|
|
3822
|
-
export type
|
|
3789
|
+
export type TopologyClass98 = "tool_invocation";
|
|
3823
3790
|
/**
|
|
3824
3791
|
* The exact tool targeted in the CognitiveActionSpaceManifest.
|
|
3825
3792
|
*/
|
|
@@ -3831,19 +3798,19 @@ export type AuthorizedBudgetMagnitude = number;
|
|
|
3831
3798
|
/**
|
|
3832
3799
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3833
3800
|
*/
|
|
3834
|
-
export type
|
|
3801
|
+
export type EventCid15 = string;
|
|
3835
3802
|
/**
|
|
3836
3803
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3837
3804
|
*/
|
|
3838
|
-
export type
|
|
3805
|
+
export type PriorEventHash15 = string | null;
|
|
3839
3806
|
/**
|
|
3840
3807
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3841
3808
|
*/
|
|
3842
|
-
export type
|
|
3809
|
+
export type Timestamp15 = number;
|
|
3843
3810
|
/**
|
|
3844
3811
|
* Discriminator type for an epistemic promotion event.
|
|
3845
3812
|
*/
|
|
3846
|
-
export type
|
|
3813
|
+
export type TopologyClass99 = "epistemic_promotion";
|
|
3847
3814
|
/**
|
|
3848
3815
|
* The strict array of CIDs (Content Identifiers) representing the raw logs being compressed and archived.
|
|
3849
3816
|
*/
|
|
@@ -3859,19 +3826,19 @@ export type CompressionRatio = number;
|
|
|
3859
3826
|
/**
|
|
3860
3827
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3861
3828
|
*/
|
|
3862
|
-
export type
|
|
3829
|
+
export type EventCid16 = string;
|
|
3863
3830
|
/**
|
|
3864
3831
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3865
3832
|
*/
|
|
3866
|
-
export type
|
|
3833
|
+
export type PriorEventHash16 = string | null;
|
|
3867
3834
|
/**
|
|
3868
3835
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3869
3836
|
*/
|
|
3870
|
-
export type
|
|
3837
|
+
export type Timestamp16 = number;
|
|
3871
3838
|
/**
|
|
3872
3839
|
* Discriminator type for a normative drift event.
|
|
3873
3840
|
*/
|
|
3874
|
-
export type
|
|
3841
|
+
export type TopologyClass100 = "normative_drift";
|
|
3875
3842
|
/**
|
|
3876
3843
|
* The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
|
|
3877
3844
|
*/
|
|
@@ -3887,19 +3854,19 @@ export type ContradictionProofHash = string;
|
|
|
3887
3854
|
/**
|
|
3888
3855
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3889
3856
|
*/
|
|
3890
|
-
export type
|
|
3857
|
+
export type EventCid17 = string;
|
|
3891
3858
|
/**
|
|
3892
3859
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3893
3860
|
*/
|
|
3894
|
-
export type
|
|
3861
|
+
export type PriorEventHash17 = string | null;
|
|
3895
3862
|
/**
|
|
3896
3863
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3897
3864
|
*/
|
|
3898
|
-
export type
|
|
3865
|
+
export type Timestamp17 = number;
|
|
3899
3866
|
/**
|
|
3900
3867
|
* Discriminator type for a persistence commit receipt.
|
|
3901
3868
|
*/
|
|
3902
|
-
export type
|
|
3869
|
+
export type TopologyClass101 = "persistence_commit";
|
|
3903
3870
|
/**
|
|
3904
3871
|
* The external cryptographic receipt generated by Iceberg/Delta.
|
|
3905
3872
|
*/
|
|
@@ -3915,19 +3882,19 @@ export type TargetTableUri = string;
|
|
|
3915
3882
|
/**
|
|
3916
3883
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3917
3884
|
*/
|
|
3918
|
-
export type
|
|
3885
|
+
export type EventCid18 = string;
|
|
3919
3886
|
/**
|
|
3920
3887
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3921
3888
|
*/
|
|
3922
|
-
export type
|
|
3889
|
+
export type PriorEventHash18 = string | null;
|
|
3923
3890
|
/**
|
|
3924
3891
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3925
3892
|
*/
|
|
3926
|
-
export type
|
|
3893
|
+
export type Timestamp18 = number;
|
|
3927
3894
|
/**
|
|
3928
3895
|
* Discriminator type for a token burn receipt.
|
|
3929
3896
|
*/
|
|
3930
|
-
export type
|
|
3897
|
+
export type TopologyClass102 = "token_burn";
|
|
3931
3898
|
/**
|
|
3932
3899
|
* A string linking this burn back to the specific ToolInvocationEvent CID.
|
|
3933
3900
|
*/
|
|
@@ -3947,19 +3914,19 @@ export type BurnMagnitude = number;
|
|
|
3947
3914
|
/**
|
|
3948
3915
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3949
3916
|
*/
|
|
3950
|
-
export type
|
|
3917
|
+
export type EventCid19 = string;
|
|
3951
3918
|
/**
|
|
3952
3919
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3953
3920
|
*/
|
|
3954
|
-
export type
|
|
3921
|
+
export type PriorEventHash19 = string | null;
|
|
3955
3922
|
/**
|
|
3956
3923
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3957
3924
|
*/
|
|
3958
|
-
export type
|
|
3925
|
+
export type Timestamp19 = number;
|
|
3959
3926
|
/**
|
|
3960
3927
|
* Discriminator type for a budget exhaustion event.
|
|
3961
3928
|
*/
|
|
3962
|
-
export type
|
|
3929
|
+
export type TopologyClass103 = "budget_exhaustion";
|
|
3963
3930
|
/**
|
|
3964
3931
|
* A string representing the original escrow boundary breached.
|
|
3965
3932
|
*/
|
|
@@ -3971,19 +3938,19 @@ export type FinalBurnReceiptCid = string;
|
|
|
3971
3938
|
/**
|
|
3972
3939
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3973
3940
|
*/
|
|
3974
|
-
export type
|
|
3941
|
+
export type EventCid20 = string;
|
|
3975
3942
|
/**
|
|
3976
3943
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3977
3944
|
*/
|
|
3978
|
-
export type
|
|
3945
|
+
export type PriorEventHash20 = string | null;
|
|
3979
3946
|
/**
|
|
3980
3947
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3981
3948
|
*/
|
|
3982
|
-
export type
|
|
3949
|
+
export type Timestamp20 = number;
|
|
3983
3950
|
/**
|
|
3984
3951
|
* Discriminator type for telemetry events.
|
|
3985
3952
|
*/
|
|
3986
|
-
export type
|
|
3953
|
+
export type TopologyClass104 = "epistemic_telemetry";
|
|
3987
3954
|
/**
|
|
3988
3955
|
* The exact topological action the human operator performed on the projected manifold.
|
|
3989
3956
|
*/
|
|
@@ -3999,16 +3966,16 @@ export type DwellDurationMs = number | null;
|
|
|
3999
3966
|
/**
|
|
4000
3967
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4001
3968
|
*/
|
|
4002
|
-
export type
|
|
3969
|
+
export type EventCid21 = string;
|
|
4003
3970
|
/**
|
|
4004
3971
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4005
3972
|
*/
|
|
4006
|
-
export type
|
|
3973
|
+
export type PriorEventHash21 = string | null;
|
|
4007
3974
|
/**
|
|
4008
3975
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4009
3976
|
*/
|
|
4010
|
-
export type
|
|
4011
|
-
export type
|
|
3977
|
+
export type Timestamp21 = number;
|
|
3978
|
+
export type TopologyClass105 = "cognitive_prediction";
|
|
4012
3979
|
export type SourceChainCid = string;
|
|
4013
3980
|
export type TargetSourceConcept = string;
|
|
4014
3981
|
/**
|
|
@@ -4018,16 +3985,16 @@ export type PredictedTopKTokens = [string, ...string[]];
|
|
|
4018
3985
|
/**
|
|
4019
3986
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4020
3987
|
*/
|
|
4021
|
-
export type
|
|
3988
|
+
export type EventCid22 = string;
|
|
4022
3989
|
/**
|
|
4023
3990
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4024
3991
|
*/
|
|
4025
|
-
export type
|
|
3992
|
+
export type PriorEventHash22 = string | null;
|
|
4026
3993
|
/**
|
|
4027
3994
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4028
3995
|
*/
|
|
4029
|
-
export type
|
|
4030
|
-
export type
|
|
3996
|
+
export type Timestamp22 = number;
|
|
3997
|
+
export type TopologyClass106 = "epistemic_axiom_verification";
|
|
4031
3998
|
export type SourcePredictionCid = string;
|
|
4032
3999
|
export type SequenceSimilarityScore = number;
|
|
4033
4000
|
export type FactScorePassed = boolean;
|
|
@@ -4038,16 +4005,16 @@ export type ZeroTrustReceiptCid1 = string | null;
|
|
|
4038
4005
|
/**
|
|
4039
4006
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4040
4007
|
*/
|
|
4041
|
-
export type
|
|
4008
|
+
export type EventCid23 = string;
|
|
4042
4009
|
/**
|
|
4043
4010
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4044
4011
|
*/
|
|
4045
|
-
export type
|
|
4012
|
+
export type PriorEventHash23 = string | null;
|
|
4046
4013
|
/**
|
|
4047
4014
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4048
4015
|
*/
|
|
4049
|
-
export type
|
|
4050
|
-
export type
|
|
4016
|
+
export type Timestamp23 = number;
|
|
4017
|
+
export type TopologyClass107 = "cognitive_reward_evaluation";
|
|
4051
4018
|
/**
|
|
4052
4019
|
* The globally unique decentralized identifier (DID) anchoring the LLM's raw generated text trajectory.
|
|
4053
4020
|
*/
|
|
@@ -4079,16 +4046,16 @@ export type TotalAdvantageScore = number;
|
|
|
4079
4046
|
/**
|
|
4080
4047
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4081
4048
|
*/
|
|
4082
|
-
export type
|
|
4049
|
+
export type EventCid24 = string;
|
|
4083
4050
|
/**
|
|
4084
4051
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4085
4052
|
*/
|
|
4086
|
-
export type
|
|
4053
|
+
export type PriorEventHash24 = string | null;
|
|
4087
4054
|
/**
|
|
4088
4055
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4089
4056
|
*/
|
|
4090
|
-
export type
|
|
4091
|
-
export type
|
|
4057
|
+
export type Timestamp24 = number;
|
|
4058
|
+
export type TopologyClass108 = "epistemic_flow_state";
|
|
4092
4059
|
/**
|
|
4093
4060
|
* The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
|
|
4094
4061
|
*/
|
|
@@ -4104,19 +4071,19 @@ export type TerminalRewardFactorized = boolean;
|
|
|
4104
4071
|
/**
|
|
4105
4072
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4106
4073
|
*/
|
|
4107
|
-
export type
|
|
4074
|
+
export type EventCid25 = string;
|
|
4108
4075
|
/**
|
|
4109
4076
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4110
4077
|
*/
|
|
4111
|
-
export type
|
|
4078
|
+
export type PriorEventHash25 = string | null;
|
|
4112
4079
|
/**
|
|
4113
4080
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4114
4081
|
*/
|
|
4115
|
-
export type
|
|
4082
|
+
export type Timestamp25 = number;
|
|
4116
4083
|
/**
|
|
4117
4084
|
* Discriminator type for a causal explanation event.
|
|
4118
4085
|
*/
|
|
4119
|
-
export type
|
|
4086
|
+
export type TopologyClass109 = "causal_explanation";
|
|
4120
4087
|
/**
|
|
4121
4088
|
* The globally unique decentralized identifier (DID) anchoring the collective outcome being explained.
|
|
4122
4089
|
*/
|
|
@@ -4156,19 +4123,19 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
|
|
|
4156
4123
|
/**
|
|
4157
4124
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4158
4125
|
*/
|
|
4159
|
-
export type
|
|
4126
|
+
export type EventCid26 = string;
|
|
4160
4127
|
/**
|
|
4161
4128
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4162
4129
|
*/
|
|
4163
|
-
export type
|
|
4130
|
+
export type PriorEventHash26 = string | null;
|
|
4164
4131
|
/**
|
|
4165
4132
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4166
4133
|
*/
|
|
4167
|
-
export type
|
|
4134
|
+
export type Timestamp26 = number;
|
|
4168
4135
|
/**
|
|
4169
4136
|
* Discriminator type for an intent classification receipt.
|
|
4170
4137
|
*/
|
|
4171
|
-
export type
|
|
4138
|
+
export type TopologyClass110 = "intent_classification";
|
|
4172
4139
|
/**
|
|
4173
4140
|
* The raw, unparsed human natural language instruction.
|
|
4174
4141
|
*/
|
|
@@ -4185,19 +4152,19 @@ export type ConfidenceScore1 = number;
|
|
|
4185
4152
|
* The TaxonomicRoutingPolicy CID that governed this classification.
|
|
4186
4153
|
*/
|
|
4187
4154
|
export type RoutingPolicyCid = string | null;
|
|
4188
|
-
export type
|
|
4155
|
+
export type TopologyClass111 = "semantic_relational_record";
|
|
4189
4156
|
/**
|
|
4190
4157
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4191
4158
|
*/
|
|
4192
|
-
export type
|
|
4159
|
+
export type EventCid27 = string;
|
|
4193
4160
|
/**
|
|
4194
4161
|
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
4195
4162
|
*/
|
|
4196
|
-
export type
|
|
4163
|
+
export type PriorEventHash27 = string | null;
|
|
4197
4164
|
/**
|
|
4198
4165
|
* The precise temporal coordinate of the event realization.
|
|
4199
4166
|
*/
|
|
4200
|
-
export type
|
|
4167
|
+
export type Timestamp27 = number;
|
|
4201
4168
|
/**
|
|
4202
4169
|
* The domain-independent structural classification of the record.
|
|
4203
4170
|
*/
|
|
@@ -4209,19 +4176,19 @@ export type FormalSchemaUrn1 = string | null;
|
|
|
4209
4176
|
/**
|
|
4210
4177
|
* Discriminator for the reification receipt.
|
|
4211
4178
|
*/
|
|
4212
|
-
export type
|
|
4179
|
+
export type TopologyClass112 = "ontological_reification";
|
|
4213
4180
|
/**
|
|
4214
4181
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4215
4182
|
*/
|
|
4216
|
-
export type
|
|
4183
|
+
export type EventCid28 = string;
|
|
4217
4184
|
/**
|
|
4218
4185
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
4219
4186
|
*/
|
|
4220
|
-
export type
|
|
4187
|
+
export type PriorEventHash28 = string | null;
|
|
4221
4188
|
/**
|
|
4222
4189
|
* The precise temporal coordinate of the event realization.
|
|
4223
4190
|
*/
|
|
4224
|
-
export type
|
|
4191
|
+
export type Timestamp28 = number;
|
|
4225
4192
|
/**
|
|
4226
4193
|
* The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
|
|
4227
4194
|
*/
|
|
@@ -4241,19 +4208,19 @@ export type IsLatentInference = boolean;
|
|
|
4241
4208
|
/**
|
|
4242
4209
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4243
4210
|
*/
|
|
4244
|
-
export type
|
|
4211
|
+
export type EventCid29 = string;
|
|
4245
4212
|
/**
|
|
4246
4213
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4247
4214
|
*/
|
|
4248
|
-
export type
|
|
4215
|
+
export type PriorEventHash29 = string | null;
|
|
4249
4216
|
/**
|
|
4250
4217
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4251
4218
|
*/
|
|
4252
|
-
export type
|
|
4219
|
+
export type Timestamp29 = number;
|
|
4253
4220
|
/**
|
|
4254
4221
|
* The type of the resilience payload.
|
|
4255
4222
|
*/
|
|
4256
|
-
export type
|
|
4223
|
+
export type TopologyClass113 = "circuit_breaker_event";
|
|
4257
4224
|
/**
|
|
4258
4225
|
* Signature or summary of the error causing the trip.
|
|
4259
4226
|
*/
|
|
@@ -4261,19 +4228,19 @@ export type ErrorSignature = string;
|
|
|
4261
4228
|
/**
|
|
4262
4229
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4263
4230
|
*/
|
|
4264
|
-
export type
|
|
4231
|
+
export type EventCid30 = string;
|
|
4265
4232
|
/**
|
|
4266
4233
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4267
4234
|
*/
|
|
4268
|
-
export type
|
|
4235
|
+
export type PriorEventHash30 = string | null;
|
|
4269
4236
|
/**
|
|
4270
4237
|
* Discriminator type for a log event.
|
|
4271
4238
|
*/
|
|
4272
|
-
export type
|
|
4239
|
+
export type TopologyClass114 = "epistemic_log";
|
|
4273
4240
|
/**
|
|
4274
4241
|
* The UNIX timestamp of the log event.
|
|
4275
4242
|
*/
|
|
4276
|
-
export type
|
|
4243
|
+
export type Timestamp30 = number;
|
|
4277
4244
|
/**
|
|
4278
4245
|
* The severity level of the log event.
|
|
4279
4246
|
*/
|
|
@@ -4286,19 +4253,19 @@ export type TelemetryScalarState = string | number | boolean | null;
|
|
|
4286
4253
|
/**
|
|
4287
4254
|
* The type of the intervention payload.
|
|
4288
4255
|
*/
|
|
4289
|
-
export type
|
|
4256
|
+
export type TopologyClass115 = "verdict";
|
|
4290
4257
|
/**
|
|
4291
4258
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4292
4259
|
*/
|
|
4293
|
-
export type
|
|
4260
|
+
export type EventCid31 = string;
|
|
4294
4261
|
/**
|
|
4295
4262
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4296
4263
|
*/
|
|
4297
|
-
export type
|
|
4264
|
+
export type PriorEventHash31 = string | null;
|
|
4298
4265
|
/**
|
|
4299
4266
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4300
4267
|
*/
|
|
4301
|
-
export type
|
|
4268
|
+
export type Timestamp31 = number;
|
|
4302
4269
|
/**
|
|
4303
4270
|
* The cryptographic nonce uniquely identifying the intervention request.
|
|
4304
4271
|
*/
|
|
@@ -4334,16 +4301,16 @@ export type LivenessChallengeHash = string;
|
|
|
4334
4301
|
/**
|
|
4335
4302
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4336
4303
|
*/
|
|
4337
|
-
export type
|
|
4304
|
+
export type EventCid32 = string;
|
|
4338
4305
|
/**
|
|
4339
4306
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4340
4307
|
*/
|
|
4341
|
-
export type
|
|
4308
|
+
export type PriorEventHash32 = string | null;
|
|
4342
4309
|
/**
|
|
4343
4310
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4344
4311
|
*/
|
|
4345
|
-
export type
|
|
4346
|
-
export type
|
|
4312
|
+
export type Timestamp32 = number;
|
|
4313
|
+
export type TopologyClass116 = "custody_receipt";
|
|
4347
4314
|
/**
|
|
4348
4315
|
* Unique identifier for this chain-of-custody entry.
|
|
4349
4316
|
*/
|
|
@@ -4371,16 +4338,16 @@ export type RedactionTimestampUnixNano = number;
|
|
|
4371
4338
|
/**
|
|
4372
4339
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4373
4340
|
*/
|
|
4374
|
-
export type
|
|
4341
|
+
export type EventCid33 = string;
|
|
4375
4342
|
/**
|
|
4376
4343
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4377
4344
|
*/
|
|
4378
|
-
export type
|
|
4345
|
+
export type PriorEventHash33 = string | null;
|
|
4379
4346
|
/**
|
|
4380
4347
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4381
4348
|
*/
|
|
4382
|
-
export type
|
|
4383
|
-
export type
|
|
4349
|
+
export type Timestamp33 = number;
|
|
4350
|
+
export type TopologyClass117 = "defeasible_attack";
|
|
4384
4351
|
/**
|
|
4385
4352
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
|
|
4386
4353
|
*/
|
|
@@ -4393,6 +4360,24 @@ export type SourceClaimCid = string;
|
|
|
4393
4360
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for the claim being attacked.
|
|
4394
4361
|
*/
|
|
4395
4362
|
export type TargetClaimCid = string;
|
|
4363
|
+
/**
|
|
4364
|
+
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4365
|
+
*/
|
|
4366
|
+
export type EventCid34 = string;
|
|
4367
|
+
/**
|
|
4368
|
+
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4369
|
+
*/
|
|
4370
|
+
export type PriorEventHash34 = string | null;
|
|
4371
|
+
/**
|
|
4372
|
+
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4373
|
+
*/
|
|
4374
|
+
export type Timestamp34 = number;
|
|
4375
|
+
export type TopologyClass118 = "epistemic_rejection";
|
|
4376
|
+
export type ReceiptCid1 = string;
|
|
4377
|
+
export type FailedProjectionCid = string;
|
|
4378
|
+
export type ViolatedAlgebraicConstraint = string;
|
|
4379
|
+
export type KlDivergenceToValidity = number;
|
|
4380
|
+
export type StochasticMutationGradient = string;
|
|
4396
4381
|
/**
|
|
4397
4382
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4398
4383
|
*/
|
|
@@ -4405,7 +4390,7 @@ export type PriorEventHash35 = string | null;
|
|
|
4405
4390
|
* The precise temporal coordinate of the event realization.
|
|
4406
4391
|
*/
|
|
4407
4392
|
export type Timestamp35 = number;
|
|
4408
|
-
export type
|
|
4393
|
+
export type TopologyClass119 = "formal_verification_receipt";
|
|
4409
4394
|
/**
|
|
4410
4395
|
* The definitive Boolean evaluating whether the proof succeeded, the program is satisfiable, or the deduction holds true.
|
|
4411
4396
|
*/
|
|
@@ -4424,7 +4409,7 @@ export type FailingContext = string | null;
|
|
|
4424
4409
|
export type ExtractedBindings = {
|
|
4425
4410
|
[k: string]: JsonPrimitiveState;
|
|
4426
4411
|
}[];
|
|
4427
|
-
export type
|
|
4412
|
+
export type TopologyClass120 = "belief_modulation";
|
|
4428
4413
|
export type ReceiptCid2 = string;
|
|
4429
4414
|
/**
|
|
4430
4415
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
@@ -4440,7 +4425,7 @@ export type PriorEventHash36 = string | null;
|
|
|
4440
4425
|
export type Timestamp36 = number;
|
|
4441
4426
|
export type TargetGraphCid4 = string;
|
|
4442
4427
|
export type SeveredEdgeCids = string[];
|
|
4443
|
-
export type
|
|
4428
|
+
export type TopologyClass121 = "rdf_export_receipt";
|
|
4444
4429
|
export type ExportCid1 = string;
|
|
4445
4430
|
/**
|
|
4446
4431
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
@@ -4460,7 +4445,7 @@ export type Sha256GraphHash = string;
|
|
|
4460
4445
|
export type EventCid38 = string;
|
|
4461
4446
|
export type PriorEventHash38 = string | null;
|
|
4462
4447
|
export type Timestamp38 = number;
|
|
4463
|
-
export type
|
|
4448
|
+
export type TopologyClass122 = "epistemic_starvation";
|
|
4464
4449
|
/**
|
|
4465
4450
|
* The cryptographic pointer to the specific edge that failed empirical grounding.
|
|
4466
4451
|
*/
|
|
@@ -4476,7 +4461,7 @@ export type DiagnosticReason = string;
|
|
|
4476
4461
|
export type EventCid39 = string;
|
|
4477
4462
|
export type PriorEventHash39 = string | null;
|
|
4478
4463
|
export type Timestamp39 = number;
|
|
4479
|
-
export type
|
|
4464
|
+
export type TopologyClass123 = "sparql_query_result";
|
|
4480
4465
|
/**
|
|
4481
4466
|
* A pointer back to the SPARQLQueryIntent that authorized this execution.
|
|
4482
4467
|
*/
|
|
@@ -4488,7 +4473,7 @@ export type ExecutionTimeMs = number;
|
|
|
4488
4473
|
/**
|
|
4489
4474
|
* Discriminator for the OracleExecutionReceipt topology.
|
|
4490
4475
|
*/
|
|
4491
|
-
export type
|
|
4476
|
+
export type TopologyClass124 = "oracle_execution_receipt";
|
|
4492
4477
|
/**
|
|
4493
4478
|
* The SHA-256 hash of the complete execution payload, providing undeniable cryptographic provenance for the Merkle-DAG audit trail.
|
|
4494
4479
|
*/
|
|
@@ -4513,7 +4498,7 @@ export type AnyTransitionEdge = TransitionEdgeProfile | CyclicEdgeProfile;
|
|
|
4513
4498
|
/**
|
|
4514
4499
|
* Discriminator type for an acyclic edge.
|
|
4515
4500
|
*/
|
|
4516
|
-
export type
|
|
4501
|
+
export type TopologyClass125 = "acyclic";
|
|
4517
4502
|
/**
|
|
4518
4503
|
* The coinductive pointer to the destination capability.
|
|
4519
4504
|
*/
|
|
@@ -4545,7 +4530,7 @@ export type ComputeWeightMagnitude = number;
|
|
|
4545
4530
|
/**
|
|
4546
4531
|
* Discriminator type for a cyclic edge.
|
|
4547
4532
|
*/
|
|
4548
|
-
export type
|
|
4533
|
+
export type TopologyClass126 = "cyclic";
|
|
4549
4534
|
/**
|
|
4550
4535
|
* The coinductive pointer to the destination capability.
|
|
4551
4536
|
*/
|
|
@@ -4600,6 +4585,10 @@ export type ClearingTimeout = number;
|
|
|
4600
4585
|
* The smallest allowable discrete bid increment.
|
|
4601
4586
|
*/
|
|
4602
4587
|
export type MinimumTickSize = number;
|
|
4588
|
+
/**
|
|
4589
|
+
* A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
|
|
4590
|
+
*/
|
|
4591
|
+
export type BundleContentHashState = string;
|
|
4603
4592
|
/**
|
|
4604
4593
|
* The exact genesis globally unique decentralized identifier (DID) anchoring the document, ensuring continuity.
|
|
4605
4594
|
*/
|
|
@@ -4685,24 +4674,6 @@ export type AgentNodeCount = number;
|
|
|
4685
4674
|
*/
|
|
4686
4675
|
export type ConsensusMechanism = "majority" | "prediction_market" | "pbft";
|
|
4687
4676
|
export type CognitiveTierProfile = "working" | "episodic" | "semantic";
|
|
4688
|
-
export type ThermodynamicsCid = string;
|
|
4689
|
-
export type TargetTopologyCid1 = string;
|
|
4690
|
-
export type MaxStochasticDiffusions = number;
|
|
4691
|
-
export type ComputationalFreeEnergyBudget = number;
|
|
4692
|
-
export type CurrentDiffusions = number;
|
|
4693
|
-
export type RemainingFreeEnergy = number;
|
|
4694
|
-
export type EntropyDerivativeDelta = number | null;
|
|
4695
|
-
export type StagnationToleranceEpsilon = number;
|
|
4696
|
-
/**
|
|
4697
|
-
* AGENT INSTRUCTION: A rigid string enumeration mapping the kinetic liveness of the computational budget.
|
|
4698
|
-
*
|
|
4699
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator on whether the thermodynamic search envelope is active or mathematically depleted.
|
|
4700
|
-
*
|
|
4701
|
-
* EPISTEMIC BOUNDS: Strictly bounded to the explicit kinetic states ACTIVE_DIFFUSION and ENTROPIC_EXHAUSTION_ORACLE_INTERVENTION.
|
|
4702
|
-
*
|
|
4703
|
-
* MCP ROUTING TRIGGERS: Thermodynamic State, Budget Envelope, MCTS Liveness, Entropy Tracking
|
|
4704
|
-
*/
|
|
4705
|
-
export type ThermodynamicState = "ACTIVE_DIFFUSION" | "ENTROPIC_EXHAUSTION_ORACLE_INTERVENTION";
|
|
4706
4677
|
/**
|
|
4707
4678
|
* The identifier of the underlying model.
|
|
4708
4679
|
*/
|
|
@@ -4767,64 +4738,6 @@ export type MaxUncommittedEdges = number;
|
|
|
4767
4738
|
* Temporal bound for flushing the stream.
|
|
4768
4739
|
*/
|
|
4769
4740
|
export type MicroBatchIntervalMs = number;
|
|
4770
|
-
/**
|
|
4771
|
-
* Unique identifier for this B2B negotiation.
|
|
4772
|
-
*/
|
|
4773
|
-
export type HandshakeCid = string;
|
|
4774
|
-
/**
|
|
4775
|
-
* The enterprise DID requesting the connection.
|
|
4776
|
-
*/
|
|
4777
|
-
export type InitiatingTenantCid = string;
|
|
4778
|
-
/**
|
|
4779
|
-
* The enterprise DID receiving the connection.
|
|
4780
|
-
*/
|
|
4781
|
-
export type ReceivingTenantCid = string;
|
|
4782
|
-
/**
|
|
4783
|
-
* The strict enterprise identifier of the foreign B2B tenant receiving this payload.
|
|
4784
|
-
*/
|
|
4785
|
-
export type ReceivingTenantCid1 = string;
|
|
4786
|
-
/**
|
|
4787
|
-
* AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
|
|
4788
|
-
*
|
|
4789
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
|
|
4790
|
-
*
|
|
4791
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
|
|
4792
|
-
*
|
|
4793
|
-
* MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
|
|
4794
|
-
*/
|
|
4795
|
-
export type SemanticClassificationProfile2 = "public" | "internal" | "confidential" | "restricted";
|
|
4796
|
-
/**
|
|
4797
|
-
* The strict magnitude cap on cross-tenant economic liability.
|
|
4798
|
-
*/
|
|
4799
|
-
export type LiabilityLimitMagnitude = number;
|
|
4800
|
-
/**
|
|
4801
|
-
* Explicit whitelist of geographic regions or cloud enclaves where execution is structurally permitted (Payload Residency Pinning).
|
|
4802
|
-
*/
|
|
4803
|
-
export type PermittedGeographicRegions = string[];
|
|
4804
|
-
/**
|
|
4805
|
-
* If True, incoming payloads from foreign tenants MUST be accompanied by a ZeroKnowledgeReceipt containing a valid temporal_interval_proof.
|
|
4806
|
-
*/
|
|
4807
|
-
export type RequireTemporalProvenanceProofs = boolean;
|
|
4808
|
-
/**
|
|
4809
|
-
* Absolute structural ESG mandate. The execution graph will quarantine any federated node operating on a grid exceeding this gCO2eq/kWh threshold.
|
|
4810
|
-
*/
|
|
4811
|
-
export type MaxPermittedGridCarbonIntensity = number | null;
|
|
4812
|
-
/**
|
|
4813
|
-
* The NIST FIPS post-quantum cryptographic algorithm used.
|
|
4814
|
-
*/
|
|
4815
|
-
export type PqAlgorithm = "ml-dsa" | "slh-dsa" | "falcon";
|
|
4816
|
-
/**
|
|
4817
|
-
* The identifier of the post-quantum public evaluation key.
|
|
4818
|
-
*/
|
|
4819
|
-
export type PublicKeyCid1 = string;
|
|
4820
|
-
/**
|
|
4821
|
-
* The base64-encoded post-quantum signature. Bounded to 100KB to safely accommodate massive SPHINCS+ hash trees without OOM crashes.
|
|
4822
|
-
*/
|
|
4823
|
-
export type PqSignatureBlob = string;
|
|
4824
|
-
/**
|
|
4825
|
-
* The current status of the handshake.
|
|
4826
|
-
*/
|
|
4827
|
-
export type Status1 = "proposed" | "negotiating" | "aligned" | "rejected";
|
|
4828
4741
|
export type CrossoverMechanismProfile = "uniform_blend" | "single_point" | "heuristic";
|
|
4829
4742
|
export type ProvenanceTraceCid1 = string | null;
|
|
4830
4743
|
/**
|
|
@@ -4894,22 +4807,6 @@ export type FormalSyntaxSmt = string;
|
|
|
4894
4807
|
* The continuous penalty applied to the LLM probability mass for constraint violation.
|
|
4895
4808
|
*/
|
|
4896
4809
|
export type RelaxationEpsilon = number;
|
|
4897
|
-
/**
|
|
4898
|
-
* The native embedding model of the origin agent.
|
|
4899
|
-
*/
|
|
4900
|
-
export type SourceMatrixName = string;
|
|
4901
|
-
/**
|
|
4902
|
-
* The native embedding model of the destination agent.
|
|
4903
|
-
*/
|
|
4904
|
-
export type TargetMatrixName = string;
|
|
4905
|
-
/**
|
|
4906
|
-
* The SHA-256 hash of the exact mathematical matrix used to compress or translate the latent dimensions.
|
|
4907
|
-
*/
|
|
4908
|
-
export type ProjectionMatrixHash = string;
|
|
4909
|
-
/**
|
|
4910
|
-
* Mathematical proof (e.g., Earth Mover's Distance preservation) of how accurately relative semantic distances were maintained during projection.
|
|
4911
|
-
*/
|
|
4912
|
-
export type IsometryPreservationScore1 = number;
|
|
4913
4810
|
/**
|
|
4914
4811
|
* The expected value (mu) of the distribution.
|
|
4915
4812
|
*/
|
|
@@ -5170,14 +5067,6 @@ export type TriggerDescription = string;
|
|
|
5170
5067
|
* The lightweight progressive disclosure tier for procedural skills.
|
|
5171
5068
|
*/
|
|
5172
5069
|
export type AvailableProceduralManifolds = ProceduralMetadataManifest[];
|
|
5173
|
-
/**
|
|
5174
|
-
* Cryptographic Lineage Watermark for the attestation.
|
|
5175
|
-
*/
|
|
5176
|
-
export type AttestationCid = string;
|
|
5177
|
-
/**
|
|
5178
|
-
* Immutable cryptographic receipts of dynamically discovered external enterprise connectors.
|
|
5179
|
-
*/
|
|
5180
|
-
export type CapabilityAttestations = FederatedCapabilityAttestationReceipt[];
|
|
5181
5070
|
/**
|
|
5182
5071
|
* A Content Identifier (CID) for the Standard Operating Procedure.
|
|
5183
5072
|
*/
|
|
@@ -5228,123 +5117,7 @@ export type MutableMatrix = {
|
|
|
5228
5117
|
* A flag allowing the output to only return the keys in mutable_matrix that changed, rather than forcing the entire array back up the network.
|
|
5229
5118
|
*/
|
|
5230
5119
|
export type IsDelta = boolean;
|
|
5231
|
-
|
|
5232
|
-
* The unique ID for this specific execution.
|
|
5233
|
-
*/
|
|
5234
|
-
export type RequestCid1 = string;
|
|
5235
|
-
/**
|
|
5236
|
-
* The deterministic capability pointer anchoring the parent request manifold.
|
|
5237
|
-
*/
|
|
5238
|
-
export type ParentRequestCid = string | null;
|
|
5239
|
-
/**
|
|
5240
|
-
* The deterministic capability pointer anchoring the trace root manifold.
|
|
5241
|
-
*/
|
|
5242
|
-
export type RootRequestCid = string | null;
|
|
5243
|
-
/**
|
|
5244
|
-
* The strict array of cryptographic hashes of parent execution nodes.
|
|
5245
|
-
*/
|
|
5246
|
-
export type ParentHashes = string[];
|
|
5247
|
-
/**
|
|
5248
|
-
* The cryptographic SHA-256 hash of this node.
|
|
5249
|
-
*/
|
|
5250
|
-
export type NodeHash = string | null;
|
|
5251
|
-
/**
|
|
5252
|
-
* The global identifier for the entire execution causal tree.
|
|
5253
|
-
*/
|
|
5254
|
-
export type TraceCid3 = string;
|
|
5255
|
-
/**
|
|
5256
|
-
* The unique identifier for this specific operation.
|
|
5257
|
-
*/
|
|
5258
|
-
export type SpanCid1 = string;
|
|
5259
|
-
/**
|
|
5260
|
-
* The causal edge to the invoking node.
|
|
5261
|
-
*/
|
|
5262
|
-
export type ParentSpanCid1 = string | null;
|
|
5263
|
-
/**
|
|
5264
|
-
* The semantic identifier for the operation.
|
|
5265
|
-
*/
|
|
5266
|
-
export type Name1 = string;
|
|
5267
|
-
/**
|
|
5268
|
-
* Temporal start bound.
|
|
5269
|
-
*/
|
|
5270
|
-
export type StartTimeUnixNano = number;
|
|
5271
|
-
/**
|
|
5272
|
-
* Temporal end bound, if completed.
|
|
5273
|
-
*/
|
|
5274
|
-
export type EndTimeUnixNano = number | null;
|
|
5275
|
-
/**
|
|
5276
|
-
* The semantic name of the event.
|
|
5277
|
-
*/
|
|
5278
|
-
export type Name2 = string;
|
|
5279
|
-
/**
|
|
5280
|
-
* The precise temporal execution point.
|
|
5281
|
-
*/
|
|
5282
|
-
export type TimestampUnixNano = number;
|
|
5283
|
-
/**
|
|
5284
|
-
* Structured log records emitted during the span.
|
|
5285
|
-
*
|
|
5286
|
-
* @maxItems 10000
|
|
5287
|
-
*/
|
|
5288
|
-
export type Events = SpanEvent[];
|
|
5289
|
-
export type FaultCategoryProfile = "context_overload" | "incorrect_context" | "format_corruption" | "latency_spike" | "token_throttle" | "network_degradation" | "temporal_dilation" | "dependency_blackout";
|
|
5290
|
-
/**
|
|
5291
|
-
* Discriminator for fetching assets via CID.
|
|
5292
|
-
*/
|
|
5293
|
-
export type TopologyClass128 = "cid_fetch";
|
|
5294
|
-
/**
|
|
5295
|
-
* Network timeout in milliseconds.
|
|
5296
|
-
*/
|
|
5297
|
-
export type TimeoutMs1 = number;
|
|
5298
|
-
/**
|
|
5299
|
-
* The explicit array of strictly bounded MCP URI broadcast endpoints.
|
|
5300
|
-
*
|
|
5301
|
-
* @maxItems 1000
|
|
5302
|
-
*/
|
|
5303
|
-
export type BroadcastEndpoints = string[];
|
|
5304
|
-
/**
|
|
5305
|
-
* The explicit array of cryptographic hashes defining acceptable domain ontologies.
|
|
5306
|
-
*
|
|
5307
|
-
* @maxItems 1000
|
|
5308
|
-
*/
|
|
5309
|
-
export type SupportedOntologies = string[];
|
|
5310
|
-
/**
|
|
5311
|
-
* The tamper-evident SHA-256 hash of the exact safetensors weight matrix.
|
|
5312
|
-
*/
|
|
5313
|
-
export type AdapterMerkleRoot = string;
|
|
5314
|
-
/**
|
|
5315
|
-
* The exact spatial geometry required in VRAM to mount this adapter.
|
|
5316
|
-
*/
|
|
5317
|
-
export type VramFootprintBytes = number;
|
|
5318
|
-
/**
|
|
5319
|
-
* The absolute Time-To-Live for the adapter to exist in the kinetic execution plane before forced eviction.
|
|
5320
|
-
*/
|
|
5321
|
-
export type EphemeralTtlMs = number;
|
|
5322
|
-
/**
|
|
5323
|
-
* The relative importance scalar used by the orchestrator's LRU eviction algorithm when VRAM limits are saturated.
|
|
5324
|
-
*/
|
|
5325
|
-
export type CachePriorityWeight = number;
|
|
5326
|
-
/**
|
|
5327
|
-
* The endpoint to connect to.
|
|
5328
|
-
*/
|
|
5329
|
-
export type TargetEndpointUri = string;
|
|
5330
|
-
/**
|
|
5331
|
-
* AGENT INSTRUCTION: Implements the Bell-LaPadula Model and Lattice-Based Access Control (LBAC), establishing the foundational mathematical axis for Information Flow Control across the distributed swarm.
|
|
5332
|
-
*
|
|
5333
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. By exposing rich comparison operators (e.g., `<=`), it enables the orchestrator's verification engine to natively execute mathematical dominance checks between a payload's classification and an agent's clearance partition.
|
|
5334
|
-
*
|
|
5335
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized clearance levels. The internal `clearance_level` property maps these strings to an immutable integer hierarchy [0, 1, 2, 3], guaranteeing deterministic threshold evaluation.
|
|
5336
|
-
*
|
|
5337
|
-
* MCP ROUTING TRIGGERS: Bell-LaPadula Model, Lattice-Based Access Control, Mandatory Access Control, Information Flow Control, Epistemic Quarantine
|
|
5338
|
-
*/
|
|
5339
|
-
export type SemanticClassificationProfile3 = "public" | "internal" | "confidential" | "restricted";
|
|
5340
|
-
/**
|
|
5341
|
-
* Max token/compute allocation.
|
|
5342
|
-
*/
|
|
5343
|
-
export type MaxLiabilityBudget = number;
|
|
5344
|
-
/**
|
|
5345
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the federated topology, if applicable.
|
|
5346
|
-
*/
|
|
5347
|
-
export type TopologyCid1 = string | null;
|
|
5120
|
+
export type FaultCategoryProfile = "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
|
|
5348
5121
|
/**
|
|
5349
5122
|
* The mathematical dialect and theorem prover used to compile the proof.
|
|
5350
5123
|
*/
|
|
@@ -5566,7 +5339,7 @@ export type Shape = number[];
|
|
|
5566
5339
|
/**
|
|
5567
5340
|
* Exact byte size of the uncompressed tensor.
|
|
5568
5341
|
*/
|
|
5569
|
-
export type
|
|
5342
|
+
export type VramFootprintBytes = number;
|
|
5570
5343
|
/**
|
|
5571
5344
|
* SHA-256 Merkle root of the payload chunks.
|
|
5572
5345
|
*/
|
|
@@ -5575,27 +5348,20 @@ export type MerkleRoot = string;
|
|
|
5575
5348
|
* Strict URI pointer to the physical bytes.
|
|
5576
5349
|
*/
|
|
5577
5350
|
export type StorageUri = string;
|
|
5351
|
+
export type OptimizationDirectionProfile = "maximize" | "minimize";
|
|
5352
|
+
export type PatchOperationProfile = "add" | "remove" | "replace" | "copy" | "move" | "test";
|
|
5578
5353
|
/**
|
|
5579
|
-
*
|
|
5580
|
-
*/
|
|
5581
|
-
export type HandshakeCid1 = string;
|
|
5582
|
-
/**
|
|
5583
|
-
* The agents establishing semantic alignment.
|
|
5584
|
-
*
|
|
5585
|
-
* @minItems 2
|
|
5586
|
-
* @maxItems 250
|
|
5354
|
+
* The NIST FIPS post-quantum cryptographic algorithm used.
|
|
5587
5355
|
*/
|
|
5588
|
-
export type
|
|
5356
|
+
export type PqAlgorithm = "ml-dsa" | "slh-dsa" | "falcon";
|
|
5589
5357
|
/**
|
|
5590
|
-
* The
|
|
5358
|
+
* The identifier of the post-quantum public evaluation key.
|
|
5591
5359
|
*/
|
|
5592
|
-
export type
|
|
5360
|
+
export type PublicKeyCid1 = string;
|
|
5593
5361
|
/**
|
|
5594
|
-
* The
|
|
5362
|
+
* The base64-encoded post-quantum signature. Bounded to 100KB to safely accommodate massive SPHINCS+ hash trees without OOM crashes.
|
|
5595
5363
|
*/
|
|
5596
|
-
export type
|
|
5597
|
-
export type OptimizationDirectionProfile = "maximize" | "minimize";
|
|
5598
|
-
export type PatchOperationProfile = "add" | "remove" | "replace" | "copy" | "move" | "test";
|
|
5364
|
+
export type PqSignatureBlob = string;
|
|
5599
5365
|
/**
|
|
5600
5366
|
* The absolute Z-axis physical distance to lock the Presentation UI relative to the observer's optical center, resolving vergence-accommodation conflicts.
|
|
5601
5367
|
*/
|
|
@@ -5645,8 +5411,6 @@ export type CausalRelationship = "causes" | "confounds" | "correlates_with" | "u
|
|
|
5645
5411
|
* An Immutable structural checkpoint.
|
|
5646
5412
|
*/
|
|
5647
5413
|
export type SemanticVersionState = string;
|
|
5648
|
-
export type SpanKindProfile = "client" | "server" | "producer" | "consumer" | "internal";
|
|
5649
|
-
export type SpanStatusCodeProfile = "unset" | "ok" | "error";
|
|
5650
5414
|
/**
|
|
5651
5415
|
* The unique cryptographic identifier for this local spatial volume.
|
|
5652
5416
|
*/
|
|
@@ -5722,18 +5486,6 @@ export type TieBreakerPolicy = "lowest_cost" | "lowest_latency" | "highest_confi
|
|
|
5722
5486
|
* A strictly typed SHA-256 hash pointing to a historically executed topological state.
|
|
5723
5487
|
*/
|
|
5724
5488
|
export type TopologyHashReceipt = string;
|
|
5725
|
-
/**
|
|
5726
|
-
* Unique identifier for this telemetry snapshot.
|
|
5727
|
-
*/
|
|
5728
|
-
export type BatchCid = string;
|
|
5729
|
-
/**
|
|
5730
|
-
* A collection of execution spans to be serialized.
|
|
5731
|
-
*/
|
|
5732
|
-
export type Spans = ExecutionSpanReceipt[];
|
|
5733
|
-
/**
|
|
5734
|
-
* The array of strictly typed trace executions.
|
|
5735
|
-
*/
|
|
5736
|
-
export type ExecutionNodes = ExecutionNodeReceipt[];
|
|
5737
5489
|
/**
|
|
5738
5490
|
* AGENT INSTRUCTION: Dictates the exact algorithmic or logical mechanism utilized to forge a semantic connection or transmute a bimodal data state, allowing downstream agents to weigh epistemic reliability.
|
|
5739
5491
|
*/
|
|
@@ -5770,10 +5522,6 @@ export type TenantCid = string | null;
|
|
|
5770
5522
|
* The ephemeral session boundary for this execution.
|
|
5771
5523
|
*/
|
|
5772
5524
|
export type SessionCid1 = string | null;
|
|
5773
|
-
/**
|
|
5774
|
-
* The declarative whitelist of data classifications permitted to flow through this graph.
|
|
5775
|
-
*/
|
|
5776
|
-
export type AllowedSemanticClassifications = SemanticClassificationProfile[] | null;
|
|
5777
5525
|
/**
|
|
5778
5526
|
* CoReason Shared Kernel Ontology
|
|
5779
5527
|
*
|
|
@@ -5783,7 +5531,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5783
5531
|
ASTGradientReceipt?: ASTGradientReceipt;
|
|
5784
5532
|
ActivationSteeringContract?: ActivationSteeringContract;
|
|
5785
5533
|
ActiveInferenceContract?: ActiveInferenceContract;
|
|
5786
|
-
ActiveInferenceEpochState?: ActiveInferenceEpochState;
|
|
5787
5534
|
AdjudicationIntent?: AdjudicationIntent;
|
|
5788
5535
|
AdjudicationReceipt?: AdjudicationReceipt;
|
|
5789
5536
|
AdjudicationRubricProfile?: AdjudicationRubricProfile;
|
|
@@ -5851,7 +5598,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5851
5598
|
CognitiveUncertaintyProfile?: CognitiveUncertaintyProfile1;
|
|
5852
5599
|
CollectiveIntelligenceProfile?: CollectiveIntelligenceProfile1;
|
|
5853
5600
|
CompositeNodeProfile?: CompositeNodeProfile;
|
|
5854
|
-
ComputationalThermodynamicsProfile?: ComputationalThermodynamicsProfile;
|
|
5855
5601
|
ComputeEngineProfile?: ComputeEngineProfile;
|
|
5856
5602
|
ComputeProvisioningIntent?: ComputeProvisioningIntent;
|
|
5857
5603
|
ComputeRateContract?: ComputeRateContract1;
|
|
@@ -5869,7 +5615,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5869
5615
|
ContinuousSpatialMutationIntent?: ContinuousSpatialMutationIntent;
|
|
5870
5616
|
CouncilTopologyManifest?: CouncilTopologyManifest;
|
|
5871
5617
|
CounterfactualRegretEvent?: CounterfactualRegretEvent;
|
|
5872
|
-
CrossSwarmHandshakeState?: CrossSwarmHandshakeState;
|
|
5873
5618
|
CrossoverMechanismProfile?: CrossoverMechanismProfile;
|
|
5874
5619
|
CrossoverPolicy?: CrossoverPolicy1;
|
|
5875
5620
|
CrosswalkResolutionReceipt?: CrosswalkResolutionReceipt;
|
|
@@ -5886,7 +5631,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5886
5631
|
DerivationModeProfile?: DerivationModeProfile;
|
|
5887
5632
|
DifferentiableLogicPolicy?: DifferentiableLogicPolicy;
|
|
5888
5633
|
DigitalTwinTopologyManifest?: DigitalTwinTopologyManifest;
|
|
5889
|
-
DimensionalProjectionContract?: DimensionalProjectionContract;
|
|
5890
5634
|
DiscourseNodeState?: DiscourseNodeState;
|
|
5891
5635
|
DiscourseTreeManifest?: DiscourseTreeManifest;
|
|
5892
5636
|
DistributionProfile?: DistributionProfile;
|
|
@@ -5953,9 +5697,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5953
5697
|
EvidentiaryWarrantState?: EvidentiaryWarrantState;
|
|
5954
5698
|
EvolutionaryTopologyManifest?: EvolutionaryTopologyManifest;
|
|
5955
5699
|
ExecutionEnvelopeState?: ExecutionEnvelopeState;
|
|
5956
|
-
ExecutionNodeReceipt?: ExecutionNodeReceipt;
|
|
5957
5700
|
ExecutionSLA?: ExecutionSLA;
|
|
5958
|
-
ExecutionSpanReceipt?: ExecutionSpanReceipt;
|
|
5959
5701
|
ExecutionSubstrateProfile?: ExecutionSubstrateProfile1;
|
|
5960
5702
|
ExogenousEpistemicEvent?: ExogenousEpistemicEvent;
|
|
5961
5703
|
FYIIntent?: FYIIntent;
|
|
@@ -5965,14 +5707,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5965
5707
|
FalsificationContract?: FalsificationContract;
|
|
5966
5708
|
FaultCategoryProfile?: FaultCategoryProfile;
|
|
5967
5709
|
FaultInjectionProfile?: FaultInjectionProfile;
|
|
5968
|
-
FederatedBilateralSLA?: FederatedBilateralSLA2;
|
|
5969
|
-
FederatedCIDFetchIntent?: FederatedCIDFetchIntent;
|
|
5970
|
-
FederatedCapabilityAttestationReceipt?: FederatedCapabilityAttestationReceipt;
|
|
5971
|
-
FederatedDiscoveryIntent?: FederatedDiscoveryIntent;
|
|
5972
|
-
FederatedDiscoveryManifest?: FederatedDiscoveryManifest;
|
|
5973
|
-
FederatedPeftContract?: FederatedPeftContract;
|
|
5974
|
-
FederatedSecurityMacroManifest?: FederatedSecurityMacroManifest;
|
|
5975
|
-
FederatedStateSnapshot?: FederatedStateSnapshot;
|
|
5976
5710
|
FitnessObjectiveProfile?: FitnessObjectiveProfile;
|
|
5977
5711
|
FormalLogicPremise?: FormalLogicPremise;
|
|
5978
5712
|
FormalVerificationContract?: FormalVerificationContract;
|
|
@@ -6051,7 +5785,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
6051
5785
|
ObservationEvent?: ObservationEvent;
|
|
6052
5786
|
OntologicalAlignmentPolicy?: OntologicalAlignmentPolicy;
|
|
6053
5787
|
OntologicalCrosswalkIntent?: OntologicalCrosswalkIntent;
|
|
6054
|
-
OntologicalHandshakeReceipt?: OntologicalHandshakeReceipt;
|
|
6055
5788
|
OntologicalNormalizationIntent?: OntologicalNormalizationIntent;
|
|
6056
5789
|
OntologicalReificationReceipt?: OntologicalReificationReceipt;
|
|
6057
5790
|
OntologicalSurfaceProjectionManifest?: OntologicalSurfaceProjectionManifest;
|
|
@@ -6115,11 +5848,8 @@ export interface CoReasonSharedKernelOntology {
|
|
|
6115
5848
|
SideEffectProfile?: SideEffectProfile1;
|
|
6116
5849
|
SimulationConvergenceSLA?: SimulationConvergenceSLA1;
|
|
6117
5850
|
SimulationEscrowContract?: SimulationEscrowContract1;
|
|
6118
|
-
SpanEvent?: SpanEvent;
|
|
6119
|
-
SpanKindProfile?: SpanKindProfile;
|
|
6120
|
-
SpanStatusCodeProfile?: SpanStatusCodeProfile;
|
|
6121
5851
|
SpatialBillboardContract?: SpatialBillboardContract;
|
|
6122
|
-
SpatialHardwareProfile?:
|
|
5852
|
+
SpatialHardwareProfile?: SpatialHardwareProfile;
|
|
6123
5853
|
SpatialKinematicActionIntent?: SpatialKinematicActionIntent;
|
|
6124
5854
|
SpatialReferenceFrameManifest?: SpatialReferenceFrameManifest;
|
|
6125
5855
|
SpatialRenderMaterial?: SpatialRenderMaterial;
|
|
@@ -6166,7 +5896,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
6166
5896
|
TerminalCognitiveEvent?: TerminalCognitiveEvent;
|
|
6167
5897
|
TerminalConditionContract?: TerminalConditionContract1;
|
|
6168
5898
|
TheoryOfMindSnapshot?: TheoryOfMindSnapshot;
|
|
6169
|
-
ThermodynamicState?: ThermodynamicState;
|
|
6170
5899
|
ThoughtBranchState?: ThoughtBranchState;
|
|
6171
5900
|
TieBreakerPolicy?: TieBreakerPolicy;
|
|
6172
5901
|
TokenBurnReceipt?: TokenBurnReceipt;
|
|
@@ -6177,7 +5906,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
6177
5906
|
TopologicalRewardContract?: TopologicalRewardContract;
|
|
6178
5907
|
TopologyHashReceipt?: TopologyHashReceipt;
|
|
6179
5908
|
TraceContextState?: TraceContextState1;
|
|
6180
|
-
TraceExportManifest?: TraceExportManifest;
|
|
6181
5909
|
TransformationMechanismProfile?: TransformationMechanismProfile1;
|
|
6182
5910
|
TransitionEdgeProfile?: TransitionEdgeProfile;
|
|
6183
5911
|
TruthMaintenancePolicy?: TruthMaintenancePolicy;
|
|
@@ -6249,17 +5977,17 @@ export interface VectorEmbeddingState {
|
|
|
6249
5977
|
/**
|
|
6250
5978
|
* CoReason Shared Kernel Ontology
|
|
6251
5979
|
*
|
|
6252
|
-
* AGENT INSTRUCTION: Establishes a hardware-level Representation Engineering (RepE) directive to mechanically manipulate latent dimensions via forward-pass tensor injection.
|
|
5980
|
+
* AGENT INSTRUCTION: Establishes a hardware-level Representation Engineering (RepE) directive to mechanically manipulate latent dimensions via forward-pass tensor injection. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
|
|
6253
5981
|
*
|
|
6254
|
-
* CAUSAL AFFORDANCE: Physically forces an additive, ablation, or clamping operation onto the model's residual stream at specific `
|
|
5982
|
+
* CAUSAL AFFORDANCE: Physically forces an additive, ablation, or clamping operation onto the model's residual stream at specific `target_hook_points`, steering the generator away from unstable hallucination geometries prior to token projection.
|
|
6255
5983
|
*
|
|
6256
|
-
* EPISTEMIC BOUNDS: Cryptographically locked by `steering_vector_hash` (SHA-256 pattern `^[a-f0-9]{64}$`). `scaling_factor` is bounded above (`le=100.0`) but unbounded below, permitting negative magnitudes for ablation. The `@model_validator` deterministically sorts `
|
|
5984
|
+
* EPISTEMIC BOUNDS: Cryptographically locked by `steering_vector_hash` (SHA-256 pattern `^[a-f0-9]{64}$`). `scaling_factor` is bounded above (`le=100.0`) but unbounded below, permitting negative magnitudes for ablation. The `@model_validator` deterministically sorts `target_hook_points`.
|
|
6257
5985
|
*
|
|
6258
|
-
* MCP ROUTING TRIGGERS: Representation Engineering, RepE, Activation Steering, Residual Stream Ablation, Concept Vectors
|
|
5986
|
+
* MCP ROUTING TRIGGERS: Representation Engineering, RepE, Activation Steering, Residual Stream Ablation, Concept Vectors, TransformerLens, SAELens
|
|
6259
5987
|
*/
|
|
6260
5988
|
export interface ActivationSteeringContract {
|
|
6261
5989
|
steering_vector_hash: SteeringVectorHash;
|
|
6262
|
-
|
|
5990
|
+
target_hook_points: TargetHookPoints;
|
|
6263
5991
|
scaling_factor: ScalingFactor;
|
|
6264
5992
|
vector_modality: VectorModality;
|
|
6265
5993
|
}
|
|
@@ -6282,46 +6010,6 @@ export interface ActiveInferenceContract {
|
|
|
6282
6010
|
expected_information_gain: ExpectedInformationGain;
|
|
6283
6011
|
execution_cost_budget_magnitude: ExecutionCostBudgetMagnitude;
|
|
6284
6012
|
}
|
|
6285
|
-
/**
|
|
6286
|
-
* CoReason Shared Kernel Ontology
|
|
6287
|
-
*
|
|
6288
|
-
* AGENT INSTRUCTION: A macroscopic container tracking the directed graph of evolutionary retries across an entire task lifecycle.
|
|
6289
|
-
*
|
|
6290
|
-
* CAUSAL AFFORDANCE: Aggregates free energy across multiple EpistemicRejectionReceipts to trigger thermodynamic circuit breakers when convergence fails.
|
|
6291
|
-
*
|
|
6292
|
-
* EPISTEMIC BOUNDS: Aggregated free energy must be non-negative. Rejection history is deterministically sorted by receipt_cid for immutable hashing.
|
|
6293
|
-
*
|
|
6294
|
-
* MCP ROUTING TRIGGERS: Active Inference Loop, Thermodynamic Circuit Breaker, Epistemic Aggregation, Retry Ledger
|
|
6295
|
-
*/
|
|
6296
|
-
export interface ActiveInferenceEpochState {
|
|
6297
|
-
epoch_cid: EpochCid;
|
|
6298
|
-
target_objective_cid?: TargetObjectiveCid;
|
|
6299
|
-
rejection_history?: RejectionHistory;
|
|
6300
|
-
current_free_energy: CurrentFreeEnergy;
|
|
6301
|
-
epoch_status?: EpochStatus;
|
|
6302
|
-
}
|
|
6303
|
-
/**
|
|
6304
|
-
* CoReason Shared Kernel Ontology
|
|
6305
|
-
*
|
|
6306
|
-
* AGENT INSTRUCTION: The mathematical backpropagation signal triggered when the Deterministic Compiler rejects a stochastic manifold. Quantifies the rejection and provides a mutation gradient.
|
|
6307
|
-
*
|
|
6308
|
-
* CAUSAL AFFORDANCE: Instructs the LLM ensemble on how to perturb the Upper Confidence Bound (UCB) during the next MCTS generation attempt by mathematically quantifying the error.
|
|
6309
|
-
*
|
|
6310
|
-
* EPISTEMIC BOUNDS: Kullback-Leibler divergence is strictly non-negative. A negative mathematical distance is a paradox and raises a ValueError.
|
|
6311
|
-
*
|
|
6312
|
-
* MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
|
|
6313
|
-
*/
|
|
6314
|
-
export interface EpistemicRejectionReceipt {
|
|
6315
|
-
event_cid: EventCid;
|
|
6316
|
-
prior_event_hash?: PriorEventHash;
|
|
6317
|
-
timestamp: Timestamp;
|
|
6318
|
-
topology_class?: TopologyClass;
|
|
6319
|
-
receipt_cid: ReceiptCid;
|
|
6320
|
-
failed_projection_cid: FailedProjectionCid;
|
|
6321
|
-
violated_algebraic_constraint: ViolatedAlgebraicConstraint;
|
|
6322
|
-
kl_divergence_to_validity: KlDivergenceToValidity;
|
|
6323
|
-
stochastic_mutation_gradient: StochasticMutationGradient;
|
|
6324
|
-
}
|
|
6325
6013
|
/**
|
|
6326
6014
|
* CoReason Shared Kernel Ontology
|
|
6327
6015
|
*
|
|
@@ -6334,7 +6022,7 @@ export interface EpistemicRejectionReceipt {
|
|
|
6334
6022
|
* MCP ROUTING TRIGGERS: Social Choice Theory, Condorcet Paradox, MCDA Deadlock, Dictatorial Resolution, Tie-Breaking Heuristic
|
|
6335
6023
|
*/
|
|
6336
6024
|
export interface AdjudicationIntent {
|
|
6337
|
-
topology_class?:
|
|
6025
|
+
topology_class?: TopologyClass;
|
|
6338
6026
|
deadlocked_claims: DeadlockedClaims;
|
|
6339
6027
|
resolution_schema: ResolutionSchema;
|
|
6340
6028
|
timeout_action: TimeoutAction;
|
|
@@ -6373,10 +6061,10 @@ export interface EpistemicProxyStateAny {
|
|
|
6373
6061
|
* Epistemic Commitment, Audit Trail
|
|
6374
6062
|
*/
|
|
6375
6063
|
export interface AdjudicationReceipt {
|
|
6376
|
-
event_cid:
|
|
6377
|
-
prior_event_hash?:
|
|
6378
|
-
timestamp:
|
|
6379
|
-
topology_class?:
|
|
6064
|
+
event_cid: EventCid;
|
|
6065
|
+
prior_event_hash?: PriorEventHash;
|
|
6066
|
+
timestamp: Timestamp;
|
|
6067
|
+
topology_class?: TopologyClass1;
|
|
6380
6068
|
rubric_cid: RubricCid;
|
|
6381
6069
|
/**
|
|
6382
6070
|
* The deterministic capability pointer representing the node that was evaluated.
|
|
@@ -6547,7 +6235,7 @@ export interface EnvironmentalSpoofingProfile {
|
|
|
6547
6235
|
* MCP ROUTING TRIGGERS: Zero-Sum Minimax Game, Red Team vs Blue Team, Macro Abstraction, Generative Adversarial Networks, Topological Compilation
|
|
6548
6236
|
*/
|
|
6549
6237
|
export interface AdversarialMarketTopologyManifest {
|
|
6550
|
-
topology_class?:
|
|
6238
|
+
topology_class?: TopologyClass2;
|
|
6551
6239
|
blue_team_cids: BlueTeamCids;
|
|
6552
6240
|
red_team_cids: RedTeamCids;
|
|
6553
6241
|
/**
|
|
@@ -6637,7 +6325,7 @@ export interface AuthorizationClaims {
|
|
|
6637
6325
|
* MCP ROUTING TRIGGERS: Expected Utility Theory, Multi-Objective Optimization, Epistemic Certainty, Spot Market Bid, Cost Estimation
|
|
6638
6326
|
*/
|
|
6639
6327
|
export interface AgentBidIntent {
|
|
6640
|
-
topology_class?:
|
|
6328
|
+
topology_class?: TopologyClass3;
|
|
6641
6329
|
agent_cid: AgentCid;
|
|
6642
6330
|
estimated_cost_magnitude: EstimatedCostMagnitude;
|
|
6643
6331
|
estimated_latency_ms: EstimatedLatencyMs;
|
|
@@ -6680,7 +6368,7 @@ export interface AmbientState {
|
|
|
6680
6368
|
* CoReason Shared Kernel Ontology
|
|
6681
6369
|
*/
|
|
6682
6370
|
export interface AnalogicalMappingTask {
|
|
6683
|
-
topology_class?:
|
|
6371
|
+
topology_class?: TopologyClass4;
|
|
6684
6372
|
task_cid: TaskCid1;
|
|
6685
6373
|
source_domain: SourceDomain;
|
|
6686
6374
|
target_domain: TargetDomain;
|
|
@@ -6724,7 +6412,7 @@ export interface AnchoringPolicy {
|
|
|
6724
6412
|
* MCP ROUTING TRIGGERS: Gibsonian Affordance, MDP Action Space, Pearlian Do-Operator, Capability-Based Security, Halting Problem
|
|
6725
6413
|
*/
|
|
6726
6414
|
export interface SpatialToolManifest {
|
|
6727
|
-
topology_class?:
|
|
6415
|
+
topology_class?: TopologyClass5;
|
|
6728
6416
|
tool_name: ToolName;
|
|
6729
6417
|
description: Description1;
|
|
6730
6418
|
input_schema: InputSchema;
|
|
@@ -6830,7 +6518,7 @@ export interface ExecutionSLA {
|
|
|
6830
6518
|
* MCP ROUTING TRIGGERS: Actor Model, Object Capability Model, Zero-Trust Architecture, Distributed RPC, Supply-Chain Isolation
|
|
6831
6519
|
*/
|
|
6832
6520
|
export interface MCPServerManifest {
|
|
6833
|
-
topology_class?:
|
|
6521
|
+
topology_class?: TopologyClass6;
|
|
6834
6522
|
server_cid: ServerCid;
|
|
6835
6523
|
transport: Transport;
|
|
6836
6524
|
binary_hash?: BinaryHash;
|
|
@@ -6850,7 +6538,7 @@ export interface MCPServerManifest {
|
|
|
6850
6538
|
* MCP ROUTING TRIGGERS: Inter-Process Communication, POSIX Standard Streams, Local Sandboxing, Binary Execution, Subprocess Spawn
|
|
6851
6539
|
*/
|
|
6852
6540
|
export interface StdioTransportProfile {
|
|
6853
|
-
topology_class?:
|
|
6541
|
+
topology_class?: TopologyClass7;
|
|
6854
6542
|
command: Command;
|
|
6855
6543
|
args?: Args;
|
|
6856
6544
|
env_vars?: EnvVars;
|
|
@@ -6873,7 +6561,7 @@ export interface EnvVars {
|
|
|
6873
6561
|
* MCP ROUTING TRIGGERS: Event-Driven Architecture, Server-Sent Events, Unidirectional Stream, Asynchronous Message Passing, TCP Persistence
|
|
6874
6562
|
*/
|
|
6875
6563
|
export interface SSETransportProfile {
|
|
6876
|
-
topology_class?:
|
|
6564
|
+
topology_class?: TopologyClass8;
|
|
6877
6565
|
uri: Uri;
|
|
6878
6566
|
headers?: Headers;
|
|
6879
6567
|
}
|
|
@@ -6895,7 +6583,7 @@ export interface Headers {
|
|
|
6895
6583
|
* MCP ROUTING TRIGGERS: Stateless Architecture, Zero-Trust Network Access, HTTP Request Smuggling Prevention, JSON-RPC Egress, Out-of-Band Socket
|
|
6896
6584
|
*/
|
|
6897
6585
|
export interface HTTPTransportProfile {
|
|
6898
|
-
topology_class?:
|
|
6586
|
+
topology_class?: TopologyClass9;
|
|
6899
6587
|
uri: Uri1;
|
|
6900
6588
|
headers?: Headers1;
|
|
6901
6589
|
}
|
|
@@ -6959,7 +6647,7 @@ export interface OpticalMappingContract {
|
|
|
6959
6647
|
* MCP ROUTING TRIGGERS: WebAssembly System Interface, Zero-Knowledge Virtual Machine, eBPF, Execution Sandbox, Arbitrary Code Execution Mitigation
|
|
6960
6648
|
*/
|
|
6961
6649
|
export interface EphemeralNamespacePartitionState {
|
|
6962
|
-
topology_class?:
|
|
6650
|
+
topology_class?: TopologyClass10;
|
|
6963
6651
|
partition_cid: PartitionCid;
|
|
6964
6652
|
execution_runtime: ExecutionRuntime;
|
|
6965
6653
|
authorized_bytecode_hashes: AuthorizedBytecodeHashes;
|
|
@@ -6980,7 +6668,7 @@ export interface EphemeralNamespacePartitionState {
|
|
|
6980
6668
|
* MCP ROUTING TRIGGERS: Bipartite Proposer-Verifier, Test-Time Compute, Zero-Trust Execution, Active Inference, Contract Topology
|
|
6981
6669
|
*/
|
|
6982
6670
|
export interface EpistemicZeroTrustContract {
|
|
6983
|
-
topology_class?:
|
|
6671
|
+
topology_class?: TopologyClass11;
|
|
6984
6672
|
intent_cid: IntentCid;
|
|
6985
6673
|
semantic_planning_task: SemanticPlanningTask;
|
|
6986
6674
|
schema_blueprint_name: SchemaBlueprintName;
|
|
@@ -7028,7 +6716,7 @@ export interface ThoughtBranchState {
|
|
|
7028
6716
|
parent_branch_cid?: ParentBranchCid;
|
|
7029
6717
|
latent_content_hash: LatentContentHash;
|
|
7030
6718
|
prm_score?: PrmScore;
|
|
7031
|
-
topology_class?:
|
|
6719
|
+
topology_class?: TopologyClass12;
|
|
7032
6720
|
}
|
|
7033
6721
|
/**
|
|
7034
6722
|
* CoReason Shared Kernel Ontology
|
|
@@ -7043,7 +6731,7 @@ export interface ThoughtBranchState {
|
|
|
7043
6731
|
*/
|
|
7044
6732
|
export interface StochasticTopologyManifest {
|
|
7045
6733
|
topology_cid: TopologyCid;
|
|
7046
|
-
topology_class?:
|
|
6734
|
+
topology_class?: TopologyClass13;
|
|
7047
6735
|
phase: IdeationPhaseProfile;
|
|
7048
6736
|
stochastic_graph: StochasticGraph;
|
|
7049
6737
|
superposition?: HypothesisSuperpositionState | null;
|
|
@@ -7099,7 +6787,7 @@ export interface CompetingManifolds {
|
|
|
7099
6787
|
* MCP ROUTING TRIGGERS: Monte Carlo Tree Search, UCT Formula, Strategic Planning, Claw Code Deliberation, Test-Time Compute, Thought Node, Tree of Thoughts
|
|
7100
6788
|
*/
|
|
7101
6789
|
export interface StrategicThoughtNodeIntent {
|
|
7102
|
-
topology_class?:
|
|
6790
|
+
topology_class?: TopologyClass14;
|
|
7103
6791
|
parent_node_hash: ParentNodeHash;
|
|
7104
6792
|
proposed_action: ProposedAction;
|
|
7105
6793
|
rationale: Rationale;
|
|
@@ -7114,7 +6802,7 @@ export interface StrategicThoughtNodeIntent {
|
|
|
7114
6802
|
* MCP ROUTING TRIGGERS: Graph CRDTs, Topological Retraction, Non-Monotonic Logic, Edge Invalidation
|
|
7115
6803
|
*/
|
|
7116
6804
|
export interface TemporalEdgeInvalidationIntent {
|
|
7117
|
-
topology_class?:
|
|
6805
|
+
topology_class?: TopologyClass15;
|
|
7118
6806
|
/**
|
|
7119
6807
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
7120
6808
|
*/
|
|
@@ -7137,7 +6825,7 @@ export interface TemporalEdgeInvalidationIntent {
|
|
|
7137
6825
|
* MCP ROUTING TRIGGERS: Popperian Falsification, Null Hypothesis, Defeasible Logic, Empirical Falsifiability, Structural Boundary
|
|
7138
6826
|
*/
|
|
7139
6827
|
export interface EmpiricalFalsificationContract {
|
|
7140
|
-
topology_class?:
|
|
6828
|
+
topology_class?: TopologyClass16;
|
|
7141
6829
|
condition_cid: ConditionCid;
|
|
7142
6830
|
description: Description2;
|
|
7143
6831
|
required_tool_name?: RequiredToolName;
|
|
@@ -7149,7 +6837,7 @@ export interface EmpiricalFalsificationContract {
|
|
|
7149
6837
|
* AGENT INSTRUCTION: A contract deploying constraint oracles to hunt for counter-models to falsify a hypothesis.
|
|
7150
6838
|
*/
|
|
7151
6839
|
export interface FalsificationContract {
|
|
7152
|
-
topology_class?:
|
|
6840
|
+
topology_class?: TopologyClass17;
|
|
7153
6841
|
falsification_solver?: FalsificationSolver;
|
|
7154
6842
|
/**
|
|
7155
6843
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -7172,7 +6860,7 @@ export interface FalsificationContract {
|
|
|
7172
6860
|
* MCP ROUTING TRIGGERS: Bipartite Ontological Mapping, Grounding Oracle, CURIE Resolution, Isometry Thresholding, Semantic Crosswalk
|
|
7173
6861
|
*/
|
|
7174
6862
|
export interface OntologicalCrosswalkIntent {
|
|
7175
|
-
topology_class?:
|
|
6863
|
+
topology_class?: TopologyClass18;
|
|
7176
6864
|
target_graph_cid: TargetGraphCid;
|
|
7177
6865
|
source_strings: SourceStrings;
|
|
7178
6866
|
target_ontology_registries: TargetOntologyRegistries;
|
|
@@ -7190,7 +6878,7 @@ export interface OntologicalCrosswalkIntent {
|
|
|
7190
6878
|
* MCP ROUTING TRIGGERS: Synchronous Epistemic Signaling, Mixed-Initiative Control, Finite State Machine, Oracle Projection, Halting Problem
|
|
7191
6879
|
*/
|
|
7192
6880
|
export interface SemanticIntent {
|
|
7193
|
-
topology_class?:
|
|
6881
|
+
topology_class?: TopologyClass19;
|
|
7194
6882
|
message: Message;
|
|
7195
6883
|
timeout_action: TimeoutAction1;
|
|
7196
6884
|
}
|
|
@@ -7206,7 +6894,7 @@ export interface SemanticIntent {
|
|
|
7206
6894
|
* MCP ROUTING TRIGGERS: Active Inference, Expected Free Energy, Shannon Entropy Reduction, Zero-Shot Elicitation, Epistemic Gap
|
|
7207
6895
|
*/
|
|
7208
6896
|
export interface DraftingIntent {
|
|
7209
|
-
topology_class?:
|
|
6897
|
+
topology_class?: TopologyClass20;
|
|
7210
6898
|
context_prompt: ContextPrompt;
|
|
7211
6899
|
resolution_schema: ResolutionSchema1;
|
|
7212
6900
|
timeout_action: TimeoutAction2;
|
|
@@ -7229,7 +6917,7 @@ export interface ResolutionSchema1 {
|
|
|
7229
6917
|
* MCP ROUTING TRIGGERS: Epistemic Deficit Escalation, Forge-to-Claw Handoff, Sovereign LLM Proxy, Thermodynamic Circuit Breaker, MCTS Delegation
|
|
7230
6918
|
*/
|
|
7231
6919
|
export interface EscalationIntent {
|
|
7232
|
-
topology_class?:
|
|
6920
|
+
topology_class?: TopologyClass21;
|
|
7233
6921
|
target_solver_urn: TargetSolverUrn;
|
|
7234
6922
|
epistemic_deficit_description: EpistemicDeficitDescription;
|
|
7235
6923
|
context_window_cids: ContextWindowCids;
|
|
@@ -7247,7 +6935,7 @@ export interface EscalationIntent {
|
|
|
7247
6935
|
* MCP ROUTING TRIGGERS: Zero-Shot Tool Discovery, Capability Routing, Dense Vector Embedding, Epistemic Deficit Resolution
|
|
7248
6936
|
*/
|
|
7249
6937
|
export interface SemanticDiscoveryIntent {
|
|
7250
|
-
topology_class?:
|
|
6938
|
+
topology_class?: TopologyClass22;
|
|
7251
6939
|
query_vector: VectorEmbeddingState1;
|
|
7252
6940
|
min_isometry_score: MinIsometryScore;
|
|
7253
6941
|
required_structural_types: RequiredStructuralTypes;
|
|
@@ -7293,7 +6981,7 @@ export interface VectorEmbeddingState1 {
|
|
|
7293
6981
|
* MCP ROUTING TRIGGERS: Graph Isomorphism, UI State Mutation, Heuristic Regrouping, Dynamic Manifold, Spatial Reorganization
|
|
7294
6982
|
*/
|
|
7295
6983
|
export interface TaxonomicRestructureIntent {
|
|
7296
|
-
topology_class?:
|
|
6984
|
+
topology_class?: TopologyClass23;
|
|
7297
6985
|
restructure_heuristic: RestructureHeuristic;
|
|
7298
6986
|
target_taxonomy: GenerativeTaxonomyManifest;
|
|
7299
6987
|
}
|
|
@@ -7450,7 +7138,7 @@ export interface SpatialRenderMaterial {
|
|
|
7450
7138
|
* MCP ROUTING TRIGGERS: Maximum Inner Product Search, k-Nearest Neighbors, Latent Manifold Projection, Retrieval-Augmented Generation
|
|
7451
7139
|
*/
|
|
7452
7140
|
export interface LatentProjectionIntent {
|
|
7453
|
-
topology_class?:
|
|
7141
|
+
topology_class?: TopologyClass24;
|
|
7454
7142
|
synthetic_target_vector: VectorEmbeddingState2;
|
|
7455
7143
|
top_k_candidates: TopKCandidates;
|
|
7456
7144
|
min_isometry_score: MinIsometryScore1;
|
|
@@ -7555,7 +7243,7 @@ export interface ContextExpansionPolicy {
|
|
|
7555
7243
|
* MCP ROUTING TRIGGERS: Schema Inference, Memory Heap Parsing, Abductive Reasoning, XHR Interception, Unstructured Transmutation
|
|
7556
7244
|
*/
|
|
7557
7245
|
export interface LatentSchemaInferenceIntent {
|
|
7558
|
-
topology_class?:
|
|
7246
|
+
topology_class?: TopologyClass25;
|
|
7559
7247
|
target_buffer_cid: TargetBufferCid;
|
|
7560
7248
|
max_schema_depth: MaxSchemaDepth;
|
|
7561
7249
|
max_properties: MaxProperties;
|
|
@@ -7573,7 +7261,7 @@ export interface LatentSchemaInferenceIntent {
|
|
|
7573
7261
|
* MCP ROUTING TRIGGERS: Human-in-the-Loop, Intent Translation, Agentic Forge, Objective Setting, Budget Allocation
|
|
7574
7262
|
*/
|
|
7575
7263
|
export interface HumanDirectiveIntent {
|
|
7576
|
-
topology_class?:
|
|
7264
|
+
topology_class?: TopologyClass26;
|
|
7577
7265
|
natural_language_goal: NaturalLanguageGoal;
|
|
7578
7266
|
allocated_budget_magnitude: AllocatedBudgetMagnitude;
|
|
7579
7267
|
/**
|
|
@@ -7593,7 +7281,7 @@ export interface HumanDirectiveIntent {
|
|
|
7593
7281
|
* MCP ROUTING TRIGGERS: Semantic Resolution, Optimal Transport, ETL Bypass, Dynamic Ontology
|
|
7594
7282
|
*/
|
|
7595
7283
|
export interface ContextualSemanticResolutionIntent {
|
|
7596
|
-
topology_class?:
|
|
7284
|
+
topology_class?: TopologyClass27;
|
|
7597
7285
|
source_record_cid: SourceRecordCid;
|
|
7598
7286
|
target_ontology_graph_cid: TargetOntologyGraphCid;
|
|
7599
7287
|
encoding_profile: TabularEncodingProfile;
|
|
@@ -7606,7 +7294,7 @@ export interface ContextualSemanticResolutionIntent {
|
|
|
7606
7294
|
* AGENT INSTRUCTION: Authorizes a Semantic Watchdog Agent to perform strict out-of-band polling against external semantic registries to monitor for ontological deprecation or semantic drift.
|
|
7607
7295
|
*/
|
|
7608
7296
|
export interface OntologyDiscoveryIntent {
|
|
7609
|
-
topology_class?:
|
|
7297
|
+
topology_class?: TopologyClass28;
|
|
7610
7298
|
jsonrpc: Jsonrpc;
|
|
7611
7299
|
method: Method;
|
|
7612
7300
|
params?: Params;
|
|
@@ -7627,7 +7315,7 @@ export interface OntologyDiscoveryIntent {
|
|
|
7627
7315
|
* MCP ROUTING TRIGGERS: Semantic Mapping, Heuristic Injection, Cryptographic Petition, Swarm Logic
|
|
7628
7316
|
*/
|
|
7629
7317
|
export interface SemanticMappingHeuristicIntent {
|
|
7630
|
-
topology_class?:
|
|
7318
|
+
topology_class?: TopologyClass29;
|
|
7631
7319
|
proposal_cid: ProposalCid;
|
|
7632
7320
|
source_ontology_namespace: SourceOntologyNamespace;
|
|
7633
7321
|
target_ontology_namespace: TargetOntologyNamespace;
|
|
@@ -7646,7 +7334,7 @@ export interface SemanticMappingHeuristicIntent {
|
|
|
7646
7334
|
* MCP ROUTING TRIGGERS: Optimistic Locking, Affine CRDT, Spherical Linear Interpolation, Continuous Reconciliation, Kinematic Drag
|
|
7647
7335
|
*/
|
|
7648
7336
|
export interface ContinuousSpatialMutationIntent {
|
|
7649
|
-
topology_class?:
|
|
7337
|
+
topology_class?: TopologyClass30;
|
|
7650
7338
|
/**
|
|
7651
7339
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
7652
7340
|
*/
|
|
@@ -7693,23 +7381,48 @@ export interface KinematicDerivativeProfile {
|
|
|
7693
7381
|
/**
|
|
7694
7382
|
* CoReason Shared Kernel Ontology
|
|
7695
7383
|
*
|
|
7696
|
-
* AGENT INSTRUCTION:
|
|
7384
|
+
* AGENT INSTRUCTION: A Kinetic execution trigger used to request the physical instantiation of new execution substrates. This intent is delegated to SkyPilot for multi-cloud spot-market orchestration.
|
|
7697
7385
|
*
|
|
7698
|
-
* CAUSAL AFFORDANCE:
|
|
7386
|
+
* CAUSAL AFFORDANCE: Triggers the expansion loop in the Governance Plane, authorizing the PulumiActuator (backed by SkyPilot) to provision GPU/CPU nodes across AWS, GCP, Azure, or Vast.ai.
|
|
7699
7387
|
*
|
|
7700
|
-
* EPISTEMIC BOUNDS:
|
|
7388
|
+
* EPISTEMIC BOUNDS: Requires a strictly defined `HardwareProfile` and `EscrowPolicy` to prevent thermodynamic runaway. Cost estimates are validated against the `ComputeRateContract`.
|
|
7701
7389
|
*
|
|
7702
|
-
* MCP ROUTING TRIGGERS:
|
|
7390
|
+
* MCP ROUTING TRIGGERS: SkyPilot Orchestration, Multi-Cloud Provisioning, Spot-Market Acquisition, Thermodynamic Expansion, Substrate Instantiation
|
|
7703
7391
|
*/
|
|
7704
7392
|
export interface ComputeProvisioningIntent {
|
|
7705
|
-
topology_class?:
|
|
7393
|
+
topology_class?: TopologyClass31;
|
|
7394
|
+
provisioning_engine?: ProvisioningEngine;
|
|
7706
7395
|
max_budget: MaxBudget;
|
|
7707
|
-
|
|
7396
|
+
/**
|
|
7397
|
+
* The target physical hardware specification (e.g., A100:8).
|
|
7398
|
+
*/
|
|
7399
|
+
hardware_profile?: SpatialHardwareProfile | null;
|
|
7400
|
+
use_spot?: UseSpot;
|
|
7401
|
+
autostop_idle_minutes?: AutostopIdleMinutes;
|
|
7402
|
+
required_capabilities?: RequiredCapabilities;
|
|
7708
7403
|
/**
|
|
7709
7404
|
* The Quality of Service priority, used by the compute spot market for semantic load shedding.
|
|
7710
7405
|
*/
|
|
7711
7406
|
qos_class?: "critical" | "high" | "interactive" | "background_batch";
|
|
7712
7407
|
}
|
|
7408
|
+
/**
|
|
7409
|
+
* CoReason Shared Kernel Ontology
|
|
7410
|
+
*
|
|
7411
|
+
* AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
|
|
7412
|
+
*
|
|
7413
|
+
* CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
|
|
7414
|
+
*
|
|
7415
|
+
* EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
|
|
7416
|
+
*
|
|
7417
|
+
* MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
|
|
7418
|
+
*/
|
|
7419
|
+
export interface SpatialHardwareProfile {
|
|
7420
|
+
compute_tier?: ComputeTier;
|
|
7421
|
+
min_vram_gb?: MinVramGb;
|
|
7422
|
+
coreason_network_mode?: CoreasonNetworkMode;
|
|
7423
|
+
accelerator_type?: AcceleratorType;
|
|
7424
|
+
provider_whitelist?: ProviderWhitelist;
|
|
7425
|
+
}
|
|
7713
7426
|
/**
|
|
7714
7427
|
* CoReason Shared Kernel Ontology
|
|
7715
7428
|
*
|
|
@@ -7722,7 +7435,7 @@ export interface ComputeProvisioningIntent {
|
|
|
7722
7435
|
* MCP ROUTING TRIGGERS: Decentralized Spot Market, Request for Proposal, Thermodynamic Compute Allocation, Algorithmic Mechanism Design, Kinetic Execution Trigger
|
|
7723
7436
|
*/
|
|
7724
7437
|
export interface TaskAnnouncementIntent {
|
|
7725
|
-
topology_class?:
|
|
7438
|
+
topology_class?: TopologyClass32;
|
|
7726
7439
|
task_cid: TaskCid2;
|
|
7727
7440
|
required_action_space_cid?: RequiredActionSpaceCid;
|
|
7728
7441
|
max_budget_magnitude: MaxBudgetMagnitude;
|
|
@@ -7739,7 +7452,7 @@ export interface TaskAnnouncementIntent {
|
|
|
7739
7452
|
* MCP ROUTING TRIGGERS: Spectral Graph Partitioning, Byzantine Fault Isolation, Epistemic Contagion, Defeasible Logic, Algebraic Connectivity
|
|
7740
7453
|
*/
|
|
7741
7454
|
export interface QuarantineIntent {
|
|
7742
|
-
topology_class?:
|
|
7455
|
+
topology_class?: TopologyClass33;
|
|
7743
7456
|
/**
|
|
7744
7457
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
7745
7458
|
*/
|
|
@@ -7758,7 +7471,7 @@ export interface QuarantineIntent {
|
|
|
7758
7471
|
* MCP ROUTING TRIGGERS: Supervisory Control Theory, Mixed-Initiative System, Discrete-Event System, Bounded Delay, Pearlian Intervention
|
|
7759
7472
|
*/
|
|
7760
7473
|
export interface InterventionIntent {
|
|
7761
|
-
topology_class?:
|
|
7474
|
+
topology_class?: TopologyClass34;
|
|
7762
7475
|
/**
|
|
7763
7476
|
* The scope constraints bounding the intervention.
|
|
7764
7477
|
*/
|
|
@@ -7896,7 +7609,7 @@ export interface CognitiveCritiqueProfile {
|
|
|
7896
7609
|
* Projection, Human-in-the-Loop
|
|
7897
7610
|
*/
|
|
7898
7611
|
export interface FYIIntent {
|
|
7899
|
-
topology_class?:
|
|
7612
|
+
topology_class?: TopologyClass35;
|
|
7900
7613
|
}
|
|
7901
7614
|
/**
|
|
7902
7615
|
* CoReason Shared Kernel Ontology
|
|
@@ -7910,7 +7623,7 @@ export interface FYIIntent {
|
|
|
7910
7623
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Absorbing State, Graceful Degradation, Control-Flow Override, Policy Intervention
|
|
7911
7624
|
*/
|
|
7912
7625
|
export interface FallbackIntent {
|
|
7913
|
-
topology_class?:
|
|
7626
|
+
topology_class?: TopologyClass36;
|
|
7914
7627
|
/**
|
|
7915
7628
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
7916
7629
|
*/
|
|
@@ -7932,7 +7645,7 @@ export interface FallbackIntent {
|
|
|
7932
7645
|
* MCP ROUTING TRIGGERS: Dictatorial Override, Byzantine Fault Resolution, Pearlian Intervention, Causal Shattering, Zero-Trust Override
|
|
7933
7646
|
*/
|
|
7934
7647
|
export interface OverrideIntent {
|
|
7935
|
-
topology_class?:
|
|
7648
|
+
topology_class?: TopologyClass37;
|
|
7936
7649
|
/**
|
|
7937
7650
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
7938
7651
|
*/
|
|
@@ -7962,7 +7675,7 @@ export interface OverrideAction {
|
|
|
7962
7675
|
* MCP ROUTING TRIGGERS: Defeasible Logic, Non-Monotonic Revision, Out-of-Distribution Adaptation, Normative Drift Resolution, Pearlian Intervention
|
|
7963
7676
|
*/
|
|
7964
7677
|
export interface ConstitutionalAmendmentIntent {
|
|
7965
|
-
topology_class?:
|
|
7678
|
+
topology_class?: TopologyClass38;
|
|
7966
7679
|
drift_event_cid: DriftEventCid;
|
|
7967
7680
|
proposed_patch: ProposedPatch;
|
|
7968
7681
|
justification: Justification1;
|
|
@@ -7985,7 +7698,7 @@ export interface ProposedPatch {
|
|
|
7985
7698
|
* MCP ROUTING TRIGGERS: Mathematical Kinematics, Bezier Geometry, Fitts's Law, OS-Level Actuation, Non-Linear Trajectory
|
|
7986
7699
|
*/
|
|
7987
7700
|
export interface SpatialKinematicActionIntent {
|
|
7988
|
-
topology_class?:
|
|
7701
|
+
topology_class?: TopologyClass39;
|
|
7989
7702
|
action_class: ActionClass;
|
|
7990
7703
|
/**
|
|
7991
7704
|
* The primary spatial terminus for clicks or hovers.
|
|
@@ -8034,7 +7747,7 @@ export interface SE3TransformProfile1 {
|
|
|
8034
7747
|
* MCP ROUTING TRIGGERS: Dual-Process Theory, Non-Monotonic Revision, System 2 Remediation, Backtracking Search, Abstract Syntax Tree
|
|
8035
7748
|
*/
|
|
8036
7749
|
export interface System2RemediationIntent {
|
|
8037
|
-
topology_class?:
|
|
7750
|
+
topology_class?: TopologyClass40;
|
|
8038
7751
|
fault_cid: FaultCid;
|
|
8039
7752
|
/**
|
|
8040
7753
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -8079,7 +7792,7 @@ export interface SubstrateHydrationManifest {
|
|
|
8079
7792
|
*/
|
|
8080
7793
|
target_node_cid: string;
|
|
8081
7794
|
substrate_profile: ExecutionSubstrateProfile;
|
|
8082
|
-
topology_class?:
|
|
7795
|
+
topology_class?: TopologyClass41;
|
|
8083
7796
|
cryptographic_checksums?: CryptographicChecksums;
|
|
8084
7797
|
}
|
|
8085
7798
|
/**
|
|
@@ -8109,7 +7822,7 @@ export interface CryptographicChecksums {
|
|
|
8109
7822
|
* MCP ROUTING TRIGGERS: Pre-Inference Gate, Neurosymbolic Request, Probability Envelope, SLA Enforcement, Inference Termination
|
|
8110
7823
|
*/
|
|
8111
7824
|
export interface NeurosymbolicInferenceIntent {
|
|
8112
|
-
topology_class?:
|
|
7825
|
+
topology_class?: TopologyClass42;
|
|
8113
7826
|
source_entity: ContextualizedSourceState1;
|
|
8114
7827
|
fidelity_receipt: TopologicalFidelityReceipt;
|
|
8115
7828
|
uncertainty_profile: CognitiveUncertaintyProfile;
|
|
@@ -8161,7 +7874,7 @@ export interface EpistemicCompressionSLA {
|
|
|
8161
7874
|
*/
|
|
8162
7875
|
export interface TopologicalProjectionIntent {
|
|
8163
7876
|
provenance_trace_cid?: ProvenanceTraceCid;
|
|
8164
|
-
topology_class?:
|
|
7877
|
+
topology_class?: TopologyClass43;
|
|
8165
7878
|
projection_cid: ProjectionCid;
|
|
8166
7879
|
source_superposition_cid: SourceSuperpositionCid;
|
|
8167
7880
|
target_topology: TargetTopologyProfile;
|
|
@@ -8181,7 +7894,7 @@ export interface TopologicalProjectionIntent {
|
|
|
8181
7894
|
* MCP ROUTING TRIGGERS: Automated Theorem Proving, Constraint Satisfaction, Logic Programming, Substrate Oracle
|
|
8182
7895
|
*/
|
|
8183
7896
|
export interface FormalLogicPremise {
|
|
8184
|
-
topology_class?:
|
|
7897
|
+
topology_class?: TopologyClass44;
|
|
8185
7898
|
dialect_urn: DialectUrn;
|
|
8186
7899
|
formal_statement: FormalStatement;
|
|
8187
7900
|
verification_script?: VerificationScript;
|
|
@@ -8190,7 +7903,7 @@ export interface FormalLogicPremise {
|
|
|
8190
7903
|
* CoReason Shared Kernel Ontology
|
|
8191
7904
|
*/
|
|
8192
7905
|
export interface CausalPropagationIntent {
|
|
8193
|
-
topology_class?:
|
|
7906
|
+
topology_class?: TopologyClass45;
|
|
8194
7907
|
target_graph_cid: TargetGraphCid1;
|
|
8195
7908
|
task_cid: TaskCid3;
|
|
8196
7909
|
grounding_sla: EvidentiaryGroundingSLA;
|
|
@@ -8300,7 +8013,7 @@ export interface EvidentiaryCitationState {
|
|
|
8300
8013
|
* CoReason Shared Kernel Ontology
|
|
8301
8014
|
*/
|
|
8302
8015
|
export interface RDFSerializationIntent {
|
|
8303
|
-
topology_class?:
|
|
8016
|
+
topology_class?: TopologyClass46;
|
|
8304
8017
|
export_cid: ExportCid;
|
|
8305
8018
|
target_graph_cid: TargetGraphCid2;
|
|
8306
8019
|
target_format?: TargetFormat;
|
|
@@ -8339,13 +8052,13 @@ export interface SHACLValidationSLA {
|
|
|
8339
8052
|
export interface SPARQLQueryIntent {
|
|
8340
8053
|
query_string: QueryString;
|
|
8341
8054
|
target_endpoint: TargetEndpoint;
|
|
8342
|
-
topology_class?:
|
|
8055
|
+
topology_class?: TopologyClass47;
|
|
8343
8056
|
}
|
|
8344
8057
|
/**
|
|
8345
8058
|
* CoReason Shared Kernel Ontology
|
|
8346
8059
|
*/
|
|
8347
8060
|
export interface BoundedJSONRPCIntent {
|
|
8348
|
-
topology_class?:
|
|
8061
|
+
topology_class?: TopologyClass48;
|
|
8349
8062
|
jsonrpc: Jsonrpc1;
|
|
8350
8063
|
method: Method1;
|
|
8351
8064
|
params?: Params1;
|
|
@@ -8355,7 +8068,7 @@ export interface BoundedJSONRPCIntent {
|
|
|
8355
8068
|
* CoReason Shared Kernel Ontology
|
|
8356
8069
|
*/
|
|
8357
8070
|
export interface ChaosExperimentTask {
|
|
8358
|
-
topology_class?:
|
|
8071
|
+
topology_class?: TopologyClass49;
|
|
8359
8072
|
experiment_cid: ExperimentCid;
|
|
8360
8073
|
hypothesis: SteadyStateHypothesisState;
|
|
8361
8074
|
faults: Faults;
|
|
@@ -8392,7 +8105,7 @@ export interface FaultInjectionProfile {
|
|
|
8392
8105
|
/**
|
|
8393
8106
|
* The specific type of fault to inject.
|
|
8394
8107
|
*/
|
|
8395
|
-
fault_category: "
|
|
8108
|
+
fault_category: "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
|
|
8396
8109
|
target_node_cid?: TargetNodeCid1;
|
|
8397
8110
|
intensity: Intensity;
|
|
8398
8111
|
}
|
|
@@ -8417,10 +8130,10 @@ export interface FaultInjectionProfile {
|
|
|
8417
8130
|
* Energy, Exogenous Perturbation, Epistemic Stress Test
|
|
8418
8131
|
*/
|
|
8419
8132
|
export interface ExogenousEpistemicEvent {
|
|
8420
|
-
event_cid:
|
|
8421
|
-
prior_event_hash?:
|
|
8422
|
-
timestamp:
|
|
8423
|
-
topology_class?:
|
|
8133
|
+
event_cid: EventCid1;
|
|
8134
|
+
prior_event_hash?: PriorEventHash1;
|
|
8135
|
+
timestamp: Timestamp1;
|
|
8136
|
+
topology_class?: TopologyClass50;
|
|
8424
8137
|
shock_cid: ShockCid;
|
|
8425
8138
|
target_node_hash: TargetNodeHash;
|
|
8426
8139
|
bayesian_surprise_score: BayesianSurpriseScore;
|
|
@@ -8443,7 +8156,7 @@ export interface SimulationEscrowContract {
|
|
|
8443
8156
|
* CoReason Shared Kernel Ontology
|
|
8444
8157
|
*/
|
|
8445
8158
|
export interface EpistemicTransmutationTask {
|
|
8446
|
-
topology_class?:
|
|
8159
|
+
topology_class?: TopologyClass51;
|
|
8447
8160
|
task_cid: TaskCid4;
|
|
8448
8161
|
artifact_event_cid: ArtifactEventCid;
|
|
8449
8162
|
target_modalities: TargetModalities;
|
|
@@ -8501,7 +8214,7 @@ export interface OpticalParsingSLA {
|
|
|
8501
8214
|
* CoReason Shared Kernel Ontology
|
|
8502
8215
|
*/
|
|
8503
8216
|
export interface EpistemicUpsamplingTask {
|
|
8504
|
-
topology_class?:
|
|
8217
|
+
topology_class?: TopologyClass52;
|
|
8505
8218
|
source_entity: ContextualizedSourceState2;
|
|
8506
8219
|
target_ontological_granularity: TargetOntologicalGranularity;
|
|
8507
8220
|
upsampling_confidence_threshold: UpsamplingConfidenceThreshold;
|
|
@@ -8519,7 +8232,7 @@ export interface ContextualizedSourceState2 {
|
|
|
8519
8232
|
* CoReason Shared Kernel Ontology
|
|
8520
8233
|
*/
|
|
8521
8234
|
export interface InterventionalCausalTask {
|
|
8522
|
-
topology_class?:
|
|
8235
|
+
topology_class?: TopologyClass53;
|
|
8523
8236
|
task_cid: TaskCid5;
|
|
8524
8237
|
target_hypothesis_cid: TargetHypothesisCid1;
|
|
8525
8238
|
intervention_variable: InterventionVariable;
|
|
@@ -8531,7 +8244,7 @@ export interface InterventionalCausalTask {
|
|
|
8531
8244
|
* CoReason Shared Kernel Ontology
|
|
8532
8245
|
*/
|
|
8533
8246
|
export interface MCPClientIntent {
|
|
8534
|
-
topology_class?:
|
|
8247
|
+
topology_class?: TopologyClass54;
|
|
8535
8248
|
jsonrpc: Jsonrpc2;
|
|
8536
8249
|
method: Method2;
|
|
8537
8250
|
params?: Params2;
|
|
@@ -8542,7 +8255,7 @@ export interface MCPClientIntent {
|
|
|
8542
8255
|
* The mathematically pre-calculated view manifold tailored to the observer's frustum.
|
|
8543
8256
|
*/
|
|
8544
8257
|
export interface DynamicManifoldProjectionManifest {
|
|
8545
|
-
topology_class?:
|
|
8258
|
+
topology_class?: TopologyClass55;
|
|
8546
8259
|
manifest_cid: ManifestCid1;
|
|
8547
8260
|
active_forge_cid: ActiveForgeCid;
|
|
8548
8261
|
ast_gradient_visual_mapping: GrammarPanelProfile;
|
|
@@ -8557,7 +8270,7 @@ export interface DynamicManifoldProjectionManifest {
|
|
|
8557
8270
|
*/
|
|
8558
8271
|
export interface GrammarPanelProfile {
|
|
8559
8272
|
panel_cid: PanelCid;
|
|
8560
|
-
topology_class?:
|
|
8273
|
+
topology_class?: TopologyClass56;
|
|
8561
8274
|
title: Title;
|
|
8562
8275
|
ledger_source_cid: LedgerSourceCid;
|
|
8563
8276
|
/**
|
|
@@ -8623,7 +8336,7 @@ export interface VisualEncodingProfile {
|
|
|
8623
8336
|
* MCP ROUTING TRIGGERS: Grammar of Graphics, Metric Tensor Distortion, Levels of Measurement, Scale Projection, FSM Literal
|
|
8624
8337
|
*/
|
|
8625
8338
|
export interface ScalePolicy {
|
|
8626
|
-
topology_class:
|
|
8339
|
+
topology_class: TopologyClass57;
|
|
8627
8340
|
domain_min?: DomainMin;
|
|
8628
8341
|
domain_max?: DomainMax;
|
|
8629
8342
|
}
|
|
@@ -8655,7 +8368,7 @@ export interface FacetMatrixProfile {
|
|
|
8655
8368
|
*/
|
|
8656
8369
|
export interface GrammarPanelProfile1 {
|
|
8657
8370
|
panel_cid: PanelCid;
|
|
8658
|
-
topology_class?:
|
|
8371
|
+
topology_class?: TopologyClass56;
|
|
8659
8372
|
title: Title;
|
|
8660
8373
|
ledger_source_cid: LedgerSourceCid;
|
|
8661
8374
|
/**
|
|
@@ -8682,7 +8395,7 @@ export interface GrammarPanelProfile1 {
|
|
|
8682
8395
|
*/
|
|
8683
8396
|
export interface InsightCardProfile {
|
|
8684
8397
|
panel_cid: PanelCid1;
|
|
8685
|
-
topology_class?:
|
|
8398
|
+
topology_class?: TopologyClass58;
|
|
8686
8399
|
title: Title1;
|
|
8687
8400
|
markdown_content: MarkdownContent;
|
|
8688
8401
|
/**
|
|
@@ -8702,7 +8415,7 @@ export interface SemanticZoomProfile {
|
|
|
8702
8415
|
* CoReason Shared Kernel Ontology
|
|
8703
8416
|
*/
|
|
8704
8417
|
export interface RollbackIntent {
|
|
8705
|
-
topology_class?:
|
|
8418
|
+
topology_class?: TopologyClass59;
|
|
8706
8419
|
request_cid: RequestCid;
|
|
8707
8420
|
target_event_cid: TargetEventCid;
|
|
8708
8421
|
invalidated_node_cids?: InvalidatedNodeCids;
|
|
@@ -8711,7 +8424,7 @@ export interface RollbackIntent {
|
|
|
8711
8424
|
* CoReason Shared Kernel Ontology
|
|
8712
8425
|
*/
|
|
8713
8426
|
export interface StateMutationIntent {
|
|
8714
|
-
topology_class?:
|
|
8427
|
+
topology_class?: TopologyClass60;
|
|
8715
8428
|
/**
|
|
8716
8429
|
* The strict RFC 6902 JSON Patch operation, acting as a deterministic state vector mutation.
|
|
8717
8430
|
*/
|
|
@@ -8724,27 +8437,6 @@ export interface StateMutationIntent {
|
|
|
8724
8437
|
from?: From;
|
|
8725
8438
|
zero_trust_receipt_cid?: ZeroTrustReceiptCid;
|
|
8726
8439
|
}
|
|
8727
|
-
/**
|
|
8728
|
-
* CoReason Shared Kernel Ontology
|
|
8729
|
-
*
|
|
8730
|
-
* AGENT INSTRUCTION: Use this intent to query the Master MCP for available sovereign oracles and verifiable execution substrates.
|
|
8731
|
-
*
|
|
8732
|
-
* CAUSAL AFFORDANCE: Projects a bounded subgraph of available URNs based on the agent's cryptographic identity and security clearance.
|
|
8733
|
-
*
|
|
8734
|
-
* EPISTEMIC BOUNDS: The domain_filter strictly limits the discovery surface to the requested URN namespaces to prevent context window dilution. Physically capped at 1000 elements to prevent CPU exhaustion during canonical sorting.
|
|
8735
|
-
*
|
|
8736
|
-
* MCP ROUTING TRIGGERS: Federated Discovery, Service Mesh, Capability Registry, Substrate Interrogation
|
|
8737
|
-
*/
|
|
8738
|
-
export interface FederatedDiscoveryIntent {
|
|
8739
|
-
topology_class?: TopologyClass62;
|
|
8740
|
-
domain_filter: DomainFilter;
|
|
8741
|
-
/**
|
|
8742
|
-
* The content-addressed hash of the capability being searched for via P2P mesh.
|
|
8743
|
-
*/
|
|
8744
|
-
target_capability_cid?: BundleContentHashState | null;
|
|
8745
|
-
max_network_hops?: MaxNetworkHops;
|
|
8746
|
-
required_security_clearance: RequiredSecurityClearance;
|
|
8747
|
-
}
|
|
8748
8440
|
/**
|
|
8749
8441
|
* CoReason Shared Kernel Ontology
|
|
8750
8442
|
*
|
|
@@ -8757,7 +8449,7 @@ export interface FederatedDiscoveryIntent {
|
|
|
8757
8449
|
* MCP ROUTING TRIGGERS: Semantic Crosswalk, ETL Pipeline, Data Normalization, Knowledge Graph Extraction
|
|
8758
8450
|
*/
|
|
8759
8451
|
export interface OntologicalNormalizationIntent {
|
|
8760
|
-
topology_class?:
|
|
8452
|
+
topology_class?: TopologyClass61;
|
|
8761
8453
|
source_artifact_cid: SourceArtifactCid1;
|
|
8762
8454
|
target_ontology_urn: TargetOntologyUrn;
|
|
8763
8455
|
}
|
|
@@ -8790,8 +8482,8 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8790
8482
|
*/
|
|
8791
8483
|
render_material?: SpatialRenderMaterial | null;
|
|
8792
8484
|
description: Description3;
|
|
8793
|
-
topology_class?:
|
|
8794
|
-
hardware?:
|
|
8485
|
+
topology_class?: TopologyClass62;
|
|
8486
|
+
hardware?: SpatialHardwareProfile1;
|
|
8795
8487
|
security?: EpistemicSecurityProfile;
|
|
8796
8488
|
/**
|
|
8797
8489
|
* The cryptographic contract forcing this agent to embed an undeniable provenance signature into its generative token stream.
|
|
@@ -8953,9 +8645,17 @@ export interface MarkovBlanketRenderingPolicy {
|
|
|
8953
8645
|
occlude_internal_mechanistics?: OccludeInternalMechanistics;
|
|
8954
8646
|
}
|
|
8955
8647
|
/**
|
|
8956
|
-
*
|
|
8648
|
+
* CoReason Shared Kernel Ontology
|
|
8649
|
+
*
|
|
8650
|
+
* AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
|
|
8651
|
+
*
|
|
8652
|
+
* CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
|
|
8653
|
+
*
|
|
8654
|
+
* EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
|
|
8655
|
+
*
|
|
8656
|
+
* MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
|
|
8957
8657
|
*/
|
|
8958
|
-
export interface
|
|
8658
|
+
export interface SpatialHardwareProfile1 {
|
|
8959
8659
|
compute_tier?: ComputeTier;
|
|
8960
8660
|
min_vram_gb?: MinVramGb;
|
|
8961
8661
|
coreason_network_mode?: CoreasonNetworkMode;
|
|
@@ -9327,17 +9027,17 @@ export interface NeuroSymbolicHandoffContract {
|
|
|
9327
9027
|
/**
|
|
9328
9028
|
* CoReason Shared Kernel Ontology
|
|
9329
9029
|
*
|
|
9330
|
-
* AGENT INSTRUCTION: Establishes a rigorous Mechanistic Interpretability brain-scan protocol, executing real-time latent state extraction across targeted neural circuits.
|
|
9030
|
+
* AGENT INSTRUCTION: Establishes a rigorous Mechanistic Interpretability brain-scan protocol, executing real-time latent state extraction across targeted neural circuits. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
|
|
9331
9031
|
*
|
|
9332
|
-
* CAUSAL AFFORDANCE: Authorizes the orchestrator to halt token generation upon specific `trigger_conditions` to physically slice, quantify, and export the top-k SAE features from the designated `
|
|
9032
|
+
* CAUSAL AFFORDANCE: Authorizes the orchestrator to halt token generation upon specific `trigger_conditions` to physically slice, quantify, and export the top-k SAE features from the designated `target_hook_points`.
|
|
9333
9033
|
*
|
|
9334
|
-
* EPISTEMIC BOUNDS: GPU VRAM exhaustion is mathematically prevented by capping `max_features_per_layer` (`gt=0, le=18446744073709551615`). The `@model_validator` deterministically sorts conditions and
|
|
9034
|
+
* EPISTEMIC BOUNDS: GPU VRAM exhaustion is mathematically prevented by capping `max_features_per_layer` (`gt=0, le=18446744073709551615`). The `@model_validator` deterministically sorts conditions and hook points for RFC 8785 hashing. System integrity enforced via `require_zk_commitments`.
|
|
9335
9035
|
*
|
|
9336
|
-
* MCP ROUTING TRIGGERS: Latent State Extraction, Mechanistic Interpretability, Sparse Autoencoder, Zero-Knowledge Commitments, VRAM Optimization
|
|
9036
|
+
* MCP ROUTING TRIGGERS: Latent State Extraction, Mechanistic Interpretability, Sparse Autoencoder, Zero-Knowledge Commitments, VRAM Optimization, TransformerLens, SAELens
|
|
9337
9037
|
*/
|
|
9338
9038
|
export interface MechanisticAuditContract {
|
|
9339
9039
|
trigger_conditions: TriggerConditions;
|
|
9340
|
-
|
|
9040
|
+
target_hook_points: TargetHookPoints1;
|
|
9341
9041
|
max_features_per_layer: MaxFeaturesPerLayer;
|
|
9342
9042
|
require_zk_commitments?: RequireZkCommitments;
|
|
9343
9043
|
}
|
|
@@ -9440,7 +9140,7 @@ export interface CognitiveHumanNodeProfile {
|
|
|
9440
9140
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
9441
9141
|
*/
|
|
9442
9142
|
render_material?: SpatialRenderMaterial | null;
|
|
9443
|
-
topology_class?:
|
|
9143
|
+
topology_class?: TopologyClass63;
|
|
9444
9144
|
required_attestation: RequiredAttestation;
|
|
9445
9145
|
/**
|
|
9446
9146
|
* The continuous spatial vector representing the human operator's localized cognitive focus.
|
|
@@ -9488,7 +9188,7 @@ export interface CognitiveSystemNodeProfile {
|
|
|
9488
9188
|
* The mathematical functor blueprint authorizing the runtime to hydrate a specific open-source engine (e.g., SymbolicAI) for this node.
|
|
9489
9189
|
*/
|
|
9490
9190
|
execution_substrate?: ExecutionSubstrateProfile1 | null;
|
|
9491
|
-
topology_class?:
|
|
9191
|
+
topology_class?: TopologyClass64;
|
|
9492
9192
|
}
|
|
9493
9193
|
/**
|
|
9494
9194
|
* CoReason Shared Kernel Ontology
|
|
@@ -9536,7 +9236,7 @@ export interface CompositeNodeProfile {
|
|
|
9536
9236
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
9537
9237
|
*/
|
|
9538
9238
|
render_material?: SpatialRenderMaterial | null;
|
|
9539
|
-
topology_class?:
|
|
9239
|
+
topology_class?: TopologyClass65;
|
|
9540
9240
|
/**
|
|
9541
9241
|
* The encapsulated subgraph to execute.
|
|
9542
9242
|
*/
|
|
@@ -9576,7 +9276,7 @@ export interface DAGTopologyManifest {
|
|
|
9576
9276
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9577
9277
|
*/
|
|
9578
9278
|
observability?: ObservabilityLODPolicy | null;
|
|
9579
|
-
topology_class?:
|
|
9279
|
+
topology_class?: TopologyClass66;
|
|
9580
9280
|
edges?: Edges;
|
|
9581
9281
|
allow_cycles?: AllowCycles;
|
|
9582
9282
|
/**
|
|
@@ -9755,17 +9455,17 @@ export interface SemanticFirewallPolicy {
|
|
|
9755
9455
|
/**
|
|
9756
9456
|
* CoReason Shared Kernel Ontology
|
|
9757
9457
|
*
|
|
9758
|
-
* AGENT INSTRUCTION: Implements Sparse Dictionary Learning and Mechanistic Interpretability to actively monitor and steer monosemantic neural circuits during the model's forward pass.
|
|
9458
|
+
* AGENT INSTRUCTION: Implements Sparse Dictionary Learning and Mechanistic Interpretability to actively monitor and steer monosemantic neural circuits during the model's forward pass. Execution of this policy is strictly delegated to the external `TransformerLens` substrate to preserve the Hollow Data Plane constraints.
|
|
9759
9459
|
*
|
|
9760
9460
|
* CAUSAL AFFORDANCE: Executes real-time tensor remediation—clamping, halting, quarantining, or smoothly decaying residual stream activations—when specific features diverge toward adversarial or hallucinated geometries.
|
|
9761
9461
|
*
|
|
9762
9462
|
* EPISTEMIC BOUNDS: The `max_activation_threshold` (`ge=0.0, le=18446744073709551615.0`) physically bounds the continuous Euclidean magnitude of the `target_feature_index`. Topologically locked to SAE matrix via `sae_dictionary_hash` (SHA-256). The `@model_validator` `validate_smooth_decay` mathematically enforces asymptotic bounds.
|
|
9763
9463
|
*
|
|
9764
|
-
* MCP ROUTING TRIGGERS: Mechanistic Interpretability, Sparse Autoencoders, Residual Stream Steering, Tensor Remediation, Monosemantic Features
|
|
9464
|
+
* MCP ROUTING TRIGGERS: Mechanistic Interpretability, Sparse Autoencoders, Residual Stream Steering, Tensor Remediation, Monosemantic Features, TransformerLens, SAELens
|
|
9765
9465
|
*/
|
|
9766
9466
|
export interface SaeLatentPolicy {
|
|
9767
9467
|
target_feature_index: TargetFeatureIndex;
|
|
9768
|
-
|
|
9468
|
+
monitored_hook_points: MonitoredHookPoints;
|
|
9769
9469
|
max_activation_threshold: MaxActivationThreshold;
|
|
9770
9470
|
violation_action: ViolationAction1;
|
|
9771
9471
|
clamp_value?: ClampValue;
|
|
@@ -9986,7 +9686,7 @@ export interface CouncilTopologyManifest {
|
|
|
9986
9686
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9987
9687
|
*/
|
|
9988
9688
|
observability?: ObservabilityLODPolicy | null;
|
|
9989
|
-
topology_class?:
|
|
9689
|
+
topology_class?: TopologyClass67;
|
|
9990
9690
|
/**
|
|
9991
9691
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
9992
9692
|
*/
|
|
@@ -10193,7 +9893,7 @@ export interface SwarmTopologyManifest {
|
|
|
10193
9893
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10194
9894
|
*/
|
|
10195
9895
|
observability?: ObservabilityLODPolicy | null;
|
|
10196
|
-
topology_class?:
|
|
9896
|
+
topology_class?: TopologyClass68;
|
|
10197
9897
|
spawning_threshold?: SpawningThreshold;
|
|
10198
9898
|
max_concurrent_agents?: MaxConcurrentAgents;
|
|
10199
9899
|
/**
|
|
@@ -10327,7 +10027,7 @@ export interface EvolutionaryTopologyManifest {
|
|
|
10327
10027
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10328
10028
|
*/
|
|
10329
10029
|
observability?: ObservabilityLODPolicy | null;
|
|
10330
|
-
topology_class?:
|
|
10030
|
+
topology_class?: TopologyClass69;
|
|
10331
10031
|
generations: Generations;
|
|
10332
10032
|
population_size: PopulationSize;
|
|
10333
10033
|
mutation: MutationPolicy;
|
|
@@ -10440,7 +10140,7 @@ export interface SMPCTopologyManifest {
|
|
|
10440
10140
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10441
10141
|
*/
|
|
10442
10142
|
observability?: ObservabilityLODPolicy | null;
|
|
10443
|
-
topology_class?:
|
|
10143
|
+
topology_class?: TopologyClass70;
|
|
10444
10144
|
smpc_protocol: SmpcProtocol;
|
|
10445
10145
|
joint_function_uri: JointFunctionUri;
|
|
10446
10146
|
participant_node_cids: ParticipantNodeCids;
|
|
@@ -10487,7 +10187,7 @@ export interface EvaluatorOptimizerTopologyManifest {
|
|
|
10487
10187
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10488
10188
|
*/
|
|
10489
10189
|
observability?: ObservabilityLODPolicy | null;
|
|
10490
|
-
topology_class?:
|
|
10190
|
+
topology_class?: TopologyClass71;
|
|
10491
10191
|
/**
|
|
10492
10192
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10493
10193
|
*/
|
|
@@ -10537,7 +10237,7 @@ export interface DigitalTwinTopologyManifest {
|
|
|
10537
10237
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10538
10238
|
*/
|
|
10539
10239
|
observability?: ObservabilityLODPolicy | null;
|
|
10540
|
-
topology_class?:
|
|
10240
|
+
topology_class?: TopologyClass72;
|
|
10541
10241
|
target_topology_cid: TargetTopologyCid;
|
|
10542
10242
|
convergence_sla: SimulationConvergenceSLA;
|
|
10543
10243
|
enforce_no_side_effects?: EnforceNoSideEffects;
|
|
@@ -10567,7 +10267,7 @@ export interface SimulationConvergenceSLA {
|
|
|
10567
10267
|
* MCP ROUTING TRIGGERS: Practical Byzantine Fault Tolerance, pBFT, Distributed Consensus, Sybil Resistance, Macro Abstraction
|
|
10568
10268
|
*/
|
|
10569
10269
|
export interface ConsensusFederationTopologyManifest {
|
|
10570
|
-
topology_class?:
|
|
10270
|
+
topology_class?: TopologyClass73;
|
|
10571
10271
|
participant_cids: ParticipantCids;
|
|
10572
10272
|
/**
|
|
10573
10273
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10632,7 +10332,7 @@ export interface CapabilityForgeTopologyManifest {
|
|
|
10632
10332
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10633
10333
|
*/
|
|
10634
10334
|
observability?: ObservabilityLODPolicy | null;
|
|
10635
|
-
topology_class?:
|
|
10335
|
+
topology_class?: TopologyClass74;
|
|
10636
10336
|
target_epistemic_deficit: SemanticDiscoveryIntent1;
|
|
10637
10337
|
/**
|
|
10638
10338
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10673,7 +10373,7 @@ export interface Nodes8 {
|
|
|
10673
10373
|
* MCP ROUTING TRIGGERS: Zero-Shot Tool Discovery, Capability Routing, Dense Vector Embedding, Epistemic Deficit Resolution
|
|
10674
10374
|
*/
|
|
10675
10375
|
export interface SemanticDiscoveryIntent1 {
|
|
10676
|
-
topology_class?:
|
|
10376
|
+
topology_class?: TopologyClass22;
|
|
10677
10377
|
query_vector: VectorEmbeddingState1;
|
|
10678
10378
|
min_isometry_score: MinIsometryScore;
|
|
10679
10379
|
required_structural_types: RequiredStructuralTypes;
|
|
@@ -10786,7 +10486,7 @@ export interface IntentElicitationTopologyManifest {
|
|
|
10786
10486
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10787
10487
|
*/
|
|
10788
10488
|
observability?: ObservabilityLODPolicy | null;
|
|
10789
|
-
topology_class?:
|
|
10489
|
+
topology_class?: TopologyClass75;
|
|
10790
10490
|
raw_human_artifact_cid: RawHumanArtifactCid;
|
|
10791
10491
|
/**
|
|
10792
10492
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10840,7 +10540,7 @@ export interface NeurosymbolicIngestionTopologyManifest {
|
|
|
10840
10540
|
* The dynamic Level of Detail physics bound to this graph.
|
|
10841
10541
|
*/
|
|
10842
10542
|
observability?: ObservabilityLODPolicy | null;
|
|
10843
|
-
topology_class?:
|
|
10543
|
+
topology_class?: TopologyClass76;
|
|
10844
10544
|
/**
|
|
10845
10545
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10846
10546
|
*/
|
|
@@ -10901,7 +10601,7 @@ export interface NeurosymbolicVerificationTopologyManifest {
|
|
|
10901
10601
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10902
10602
|
*/
|
|
10903
10603
|
observability?: ObservabilityLODPolicy | null;
|
|
10904
|
-
topology_class?:
|
|
10604
|
+
topology_class?: TopologyClass77;
|
|
10905
10605
|
proposer_node_cid: ProposerNodeCid;
|
|
10906
10606
|
verifier_node_cid: VerifierNodeCid;
|
|
10907
10607
|
max_revision_loops: MaxRevisionLoops1;
|
|
@@ -10925,7 +10625,7 @@ export interface Nodes11 {
|
|
|
10925
10625
|
* MCP ROUTING TRIGGERS: Discourse Geometry, Rhetorical Flattening, Directed Acyclic Graph, Hierarchical Extraction
|
|
10926
10626
|
*/
|
|
10927
10627
|
export interface DiscourseTreeManifest {
|
|
10928
|
-
topology_class?:
|
|
10628
|
+
topology_class?: TopologyClass78;
|
|
10929
10629
|
manifest_cid: ManifestCid2;
|
|
10930
10630
|
/**
|
|
10931
10631
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10966,7 +10666,7 @@ export interface DiscourseNodeState {
|
|
|
10966
10666
|
* CoReason Shared Kernel Ontology
|
|
10967
10667
|
*/
|
|
10968
10668
|
export interface DocumentKnowledgeGraphManifest {
|
|
10969
|
-
topology_class?:
|
|
10669
|
+
topology_class?: TopologyClass79;
|
|
10970
10670
|
graph_cid: GraphCid;
|
|
10971
10671
|
source_artifact_cid: SourceArtifactCid2;
|
|
10972
10672
|
nodes: Nodes12;
|
|
@@ -11114,7 +10814,7 @@ export interface HomomorphicEncryptionProfile {
|
|
|
11114
10814
|
* MCP ROUTING TRIGGERS: Cross-Modal Isomorphism, Semantic Fusion, Volumetric Projection, Profunctor Optics
|
|
11115
10815
|
*/
|
|
11116
10816
|
export interface ContinuousManifoldMappingContract {
|
|
11117
|
-
topology_class?:
|
|
10817
|
+
topology_class?: TopologyClass80;
|
|
11118
10818
|
/**
|
|
11119
10819
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
11120
10820
|
*/
|
|
@@ -11161,7 +10861,7 @@ export interface SE3TransformProfile4 {
|
|
|
11161
10861
|
* MCP ROUTING TRIGGERS: Spatial-Semantic Isomorphism, Document Object Model, Containment DAG, Visual Hierarchy, Rhetorical Bounding
|
|
11162
10862
|
*/
|
|
11163
10863
|
export interface HierarchicalDOMManifest {
|
|
11164
|
-
topology_class?:
|
|
10864
|
+
topology_class?: TopologyClass81;
|
|
11165
10865
|
dom_cid: DomCid;
|
|
11166
10866
|
root_block_cid: RootBlockCid;
|
|
11167
10867
|
blocks: Blocks;
|
|
@@ -11342,7 +11042,7 @@ export interface MemoizedNodeProfile {
|
|
|
11342
11042
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
11343
11043
|
*/
|
|
11344
11044
|
render_material?: SpatialRenderMaterial | null;
|
|
11345
|
-
topology_class?:
|
|
11045
|
+
topology_class?: TopologyClass82;
|
|
11346
11046
|
/**
|
|
11347
11047
|
* The exact SHA-256 fingerprint of the executed topology.
|
|
11348
11048
|
*/
|
|
@@ -11364,7 +11064,7 @@ export interface ExpectedOutputSchema {
|
|
|
11364
11064
|
* MCP ROUTING TRIGGERS: Conflict-Free Replicated Data Types, State-based Semilattice, Eventual Consistency, G-Set
|
|
11365
11065
|
*/
|
|
11366
11066
|
export interface TemporalGraphCRDTManifest {
|
|
11367
|
-
topology_class?:
|
|
11067
|
+
topology_class?: TopologyClass83;
|
|
11368
11068
|
diff_cid: DiffCid;
|
|
11369
11069
|
author_node_cid: AuthorNodeCid;
|
|
11370
11070
|
lamport_timestamp: LamportTimestamp;
|
|
@@ -11384,10 +11084,10 @@ export interface VectorClock {
|
|
|
11384
11084
|
* AGENT INSTRUCTION: A formal Substrate Projection representing an executable Model Context Protocol (MCP) tool.
|
|
11385
11085
|
*/
|
|
11386
11086
|
export interface MCPToolDefinition {
|
|
11387
|
-
topology_class?:
|
|
11388
|
-
event_cid?:
|
|
11389
|
-
prior_event_hash?:
|
|
11390
|
-
timestamp?:
|
|
11087
|
+
topology_class?: TopologyClass84;
|
|
11088
|
+
event_cid?: EventCid2;
|
|
11089
|
+
prior_event_hash?: PriorEventHash2;
|
|
11090
|
+
timestamp?: Timestamp2;
|
|
11391
11091
|
name: Name;
|
|
11392
11092
|
description: Description9;
|
|
11393
11093
|
inputSchema: Inputschema;
|
|
@@ -11410,11 +11110,11 @@ export interface Inputschema {
|
|
|
11410
11110
|
* MCP ROUTING TRIGGERS: Epistemic Provenance, Crosswalk Resolution, Grounding Receipt, Ontology Access Kit, CURIE
|
|
11411
11111
|
*/
|
|
11412
11112
|
export interface CrosswalkResolutionReceipt {
|
|
11413
|
-
event_cid:
|
|
11414
|
-
prior_event_hash?:
|
|
11415
|
-
timestamp:
|
|
11416
|
-
topology_class?:
|
|
11417
|
-
receipt_cid:
|
|
11113
|
+
event_cid: EventCid3;
|
|
11114
|
+
prior_event_hash?: PriorEventHash3;
|
|
11115
|
+
timestamp: Timestamp3;
|
|
11116
|
+
topology_class?: TopologyClass85;
|
|
11117
|
+
receipt_cid: ReceiptCid;
|
|
11418
11118
|
target_graph_cid: TargetGraphCid3;
|
|
11419
11119
|
resolved_curies: ResolvedCuries;
|
|
11420
11120
|
grounding_confidence: DempsterShaferBeliefVector1;
|
|
@@ -11455,10 +11155,10 @@ export interface DempsterShaferBeliefVector1 {
|
|
|
11455
11155
|
* MCP ROUTING TRIGGERS: Cryptographic Ledger, Formal Verification Receipt, Immutable Provenance, Hash Canonicalization, Data Masking
|
|
11456
11156
|
*/
|
|
11457
11157
|
export interface EpistemicZeroTrustReceipt {
|
|
11458
|
-
event_cid:
|
|
11459
|
-
prior_event_hash?:
|
|
11460
|
-
timestamp:
|
|
11461
|
-
topology_class?:
|
|
11158
|
+
event_cid: EventCid4;
|
|
11159
|
+
prior_event_hash?: PriorEventHash4;
|
|
11160
|
+
timestamp: Timestamp4;
|
|
11161
|
+
topology_class?: TopologyClass86;
|
|
11462
11162
|
intent_reference_cid: IntentReferenceCid;
|
|
11463
11163
|
llm_blind_plan_hash: LlmBlindPlanHash;
|
|
11464
11164
|
firewall_breach_detected?: FirewallBreachDetected;
|
|
@@ -11477,10 +11177,10 @@ export interface EpistemicZeroTrustReceipt {
|
|
|
11477
11177
|
* MCP ROUTING TRIGGERS: Bayesian Evidence, Neurosymbolic Binding, Exogenous Truth, Epistemic Grounding, Payload Topological Bounding
|
|
11478
11178
|
*/
|
|
11479
11179
|
export interface ObservationEvent {
|
|
11480
|
-
event_cid:
|
|
11481
|
-
prior_event_hash?:
|
|
11482
|
-
timestamp:
|
|
11483
|
-
topology_class?:
|
|
11180
|
+
event_cid: EventCid5;
|
|
11181
|
+
prior_event_hash?: PriorEventHash5;
|
|
11182
|
+
timestamp: Timestamp5;
|
|
11183
|
+
topology_class?: TopologyClass87;
|
|
11484
11184
|
payload: Payload;
|
|
11485
11185
|
/**
|
|
11486
11186
|
* The specific topological node that appended this observation.
|
|
@@ -11550,7 +11250,7 @@ export interface HardwareEnclaveReceipt {
|
|
|
11550
11250
|
* MCP ROUTING TRIGGERS: Exogenous Perturbation, DOM Topography, Spatial Execution Bound, Accessibility Tree
|
|
11551
11251
|
*/
|
|
11552
11252
|
export interface BrowserDOMState {
|
|
11553
|
-
topology_class?:
|
|
11253
|
+
topology_class?: TopologyClass88;
|
|
11554
11254
|
current_url: CurrentUrl;
|
|
11555
11255
|
viewport_size: ViewportSize;
|
|
11556
11256
|
dom_hash: DomHash;
|
|
@@ -11569,7 +11269,7 @@ export interface BrowserDOMState {
|
|
|
11569
11269
|
* MCP ROUTING TRIGGERS: POSIX Environment, Exogenous Perturbation, TTY Buffer, Causal Actuator, Stream Crystallization
|
|
11570
11270
|
*/
|
|
11571
11271
|
export interface TerminalBufferState {
|
|
11572
|
-
topology_class?:
|
|
11272
|
+
topology_class?: TopologyClass89;
|
|
11573
11273
|
working_directory: WorkingDirectory;
|
|
11574
11274
|
stdout_hash: StdoutHash;
|
|
11575
11275
|
stderr_hash: StderrHash;
|
|
@@ -11597,21 +11297,21 @@ export interface EmbodiedSensoryVectorProfile {
|
|
|
11597
11297
|
*
|
|
11598
11298
|
* AGENT INSTRUCTION: An append-only, cryptographically frozen coordinate representing the verifiable output of a MechanisticAuditContract.
|
|
11599
11299
|
*
|
|
11600
|
-
* CAUSAL AFFORDANCE: Commits the extracted `SaeFeatureActivationState` matrix (`
|
|
11300
|
+
* CAUSAL AFFORDANCE: Commits the extracted `SaeFeatureActivationState` matrix (`hook_activations`) to the Merkle-DAG. The `causal_scrubbing_applied` boolean mathematically proves that the orchestrator actively resampled or ablated the circuit to confirm direct causal responsibility.
|
|
11601
11301
|
*
|
|
11602
|
-
* EPISTEMIC BOUNDS: Cryptographic integrity structurally anchored by `audit_cid` (128-char CID regex). The `@model_validator` sorts each `SaeFeatureActivationState` list within `
|
|
11302
|
+
* EPISTEMIC BOUNDS: Cryptographic integrity structurally anchored by `audit_cid` (128-char CID regex). The `@model_validator` sorts each `SaeFeatureActivationState` list within `hook_activations` by `feature_index`, guaranteeing zero-variance RFC 8785 Merkle-DAG hashing.
|
|
11603
11303
|
*
|
|
11604
|
-
* MCP ROUTING TRIGGERS: Causal Scrubbing, Epistemic Provenance, Mechanistic Audit, RFC 8785 Canonicalization, Cryptographic Brain-Scan
|
|
11304
|
+
* MCP ROUTING TRIGGERS: Causal Scrubbing, Epistemic Provenance, Mechanistic Audit, RFC 8785 Canonicalization, Cryptographic Brain-Scan, TransformerLens, SAELens
|
|
11605
11305
|
*/
|
|
11606
11306
|
export interface NeuralAuditAttestationReceipt {
|
|
11607
11307
|
audit_cid: AuditCid;
|
|
11608
|
-
|
|
11308
|
+
hook_activations: HookActivations;
|
|
11609
11309
|
causal_scrubbing_applied?: CausalScrubbingApplied;
|
|
11610
11310
|
}
|
|
11611
11311
|
/**
|
|
11612
|
-
* A mapping of specific
|
|
11312
|
+
* A mapping of specific TransformerLens hook points to their top-k activated SAE features.
|
|
11613
11313
|
*/
|
|
11614
|
-
export interface
|
|
11314
|
+
export interface HookActivations {
|
|
11615
11315
|
[k: string]: SaeFeatureActivationState[];
|
|
11616
11316
|
}
|
|
11617
11317
|
/**
|
|
@@ -11681,10 +11381,10 @@ export interface StreamingDisfluencyContract {
|
|
|
11681
11381
|
* MCP ROUTING TRIGGERS: Bayesian Belief Updating, Causal Tracing, Cognitive Synthesis, Merkle-DAG Coordinate, Non-Monotonic Leap
|
|
11682
11382
|
*/
|
|
11683
11383
|
export interface BeliefMutationEvent {
|
|
11684
|
-
event_cid:
|
|
11685
|
-
prior_event_hash?:
|
|
11686
|
-
timestamp:
|
|
11687
|
-
topology_class?:
|
|
11384
|
+
event_cid: EventCid6;
|
|
11385
|
+
prior_event_hash?: PriorEventHash6;
|
|
11386
|
+
timestamp: Timestamp6;
|
|
11387
|
+
topology_class?: TopologyClass90;
|
|
11688
11388
|
payload: Payload1;
|
|
11689
11389
|
/**
|
|
11690
11390
|
* The specific topological node that synthesized this belief assertion.
|
|
@@ -11796,10 +11496,10 @@ export interface LatentScratchpadReceipt {
|
|
|
11796
11496
|
* MCP ROUTING TRIGGERS: Byzantine Fault Tolerance, Circuit Breaker, Terminal State, Execution Collapse, Fault Isolation
|
|
11797
11497
|
*/
|
|
11798
11498
|
export interface SystemFaultEvent {
|
|
11799
|
-
event_cid:
|
|
11800
|
-
prior_event_hash?:
|
|
11801
|
-
timestamp:
|
|
11802
|
-
topology_class?:
|
|
11499
|
+
event_cid: EventCid7;
|
|
11500
|
+
prior_event_hash?: PriorEventHash7;
|
|
11501
|
+
timestamp: Timestamp7;
|
|
11502
|
+
topology_class?: TopologyClass91;
|
|
11803
11503
|
}
|
|
11804
11504
|
/**
|
|
11805
11505
|
* CoReason Shared Kernel Ontology
|
|
@@ -11813,10 +11513,10 @@ export interface SystemFaultEvent {
|
|
|
11813
11513
|
* MCP ROUTING TRIGGERS: Atomic Proposition, Discourse Extraction, Labeled Property Graph, Verifiable Statement
|
|
11814
11514
|
*/
|
|
11815
11515
|
export interface AtomicPropositionState {
|
|
11816
|
-
topology_class?:
|
|
11817
|
-
event_cid:
|
|
11818
|
-
prior_event_hash?:
|
|
11819
|
-
timestamp:
|
|
11516
|
+
topology_class?: TopologyClass92;
|
|
11517
|
+
event_cid: EventCid8;
|
|
11518
|
+
prior_event_hash?: PriorEventHash8;
|
|
11519
|
+
timestamp: Timestamp8;
|
|
11820
11520
|
proposition_cid: PropositionCid;
|
|
11821
11521
|
rhetorical_role: RhetoricalStructureProfile;
|
|
11822
11522
|
illocutionary_force: IllocutionaryForceProfile;
|
|
@@ -11854,10 +11554,10 @@ export interface EmpiricalStatisticalProfile {
|
|
|
11854
11554
|
* MCP ROUTING TRIGGERS: Post-Coordinated Semantics, Latent Manifold Alignment, Semantic Specificity, Entity Assembly
|
|
11855
11555
|
*/
|
|
11856
11556
|
export interface PostCoordinatedSemanticState {
|
|
11857
|
-
topology_class?:
|
|
11858
|
-
event_cid:
|
|
11859
|
-
prior_event_hash?:
|
|
11860
|
-
timestamp:
|
|
11557
|
+
topology_class?: TopologyClass93;
|
|
11558
|
+
event_cid: EventCid9;
|
|
11559
|
+
prior_event_hash?: PriorEventHash9;
|
|
11560
|
+
timestamp: Timestamp9;
|
|
11861
11561
|
concept_cid: ConceptCid;
|
|
11862
11562
|
/**
|
|
11863
11563
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -11885,10 +11585,10 @@ export interface ContextualModifiers {
|
|
|
11885
11585
|
* MCP ROUTING TRIGGERS: Artifact Contagion Prevention, Terminal Fault, VLM Crash, Malformed Bytes, DRM Lock
|
|
11886
11586
|
*/
|
|
11887
11587
|
export interface ArtifactCorruptionEvent {
|
|
11888
|
-
event_cid:
|
|
11889
|
-
prior_event_hash?:
|
|
11890
|
-
timestamp:
|
|
11891
|
-
topology_class?:
|
|
11588
|
+
event_cid: EventCid10;
|
|
11589
|
+
prior_event_hash?: PriorEventHash10;
|
|
11590
|
+
timestamp: Timestamp10;
|
|
11591
|
+
topology_class?: TopologyClass94;
|
|
11892
11592
|
artifact_cid: ArtifactCid;
|
|
11893
11593
|
corruption_class: CorruptionClass;
|
|
11894
11594
|
diagnostic_hash: DiagnosticHash;
|
|
@@ -11905,10 +11605,10 @@ export interface ArtifactCorruptionEvent {
|
|
|
11905
11605
|
* MCP ROUTING TRIGGERS: Abductive Reasoning, Popperian Falsification, Bayesian Prior, Causal Hypothesis, Epistemic Commitment
|
|
11906
11606
|
*/
|
|
11907
11607
|
export interface HypothesisGenerationEvent {
|
|
11908
|
-
event_cid:
|
|
11909
|
-
prior_event_hash?:
|
|
11910
|
-
timestamp:
|
|
11911
|
-
topology_class?:
|
|
11608
|
+
event_cid: EventCid11;
|
|
11609
|
+
prior_event_hash?: PriorEventHash11;
|
|
11610
|
+
timestamp: Timestamp11;
|
|
11611
|
+
topology_class?: TopologyClass95;
|
|
11912
11612
|
hypothesis_cid: HypothesisCid;
|
|
11913
11613
|
premise_text: PremiseText;
|
|
11914
11614
|
bayesian_prior: BayesianPrior;
|
|
@@ -11947,10 +11647,10 @@ export interface StructuralCausalGraphProfile {
|
|
|
11947
11647
|
* MCP ROUTING TRIGGERS: Asynchronous Interrupt, Generative Severing, Context Switching, Defeasible Disposition, Wave Collapse
|
|
11948
11648
|
*/
|
|
11949
11649
|
export interface BargeInInterruptEvent {
|
|
11950
|
-
event_cid:
|
|
11951
|
-
prior_event_hash?:
|
|
11952
|
-
timestamp:
|
|
11953
|
-
topology_class?:
|
|
11650
|
+
event_cid: EventCid12;
|
|
11651
|
+
prior_event_hash?: PriorEventHash12;
|
|
11652
|
+
timestamp: Timestamp12;
|
|
11653
|
+
topology_class?: TopologyClass96;
|
|
11954
11654
|
target_event_cid: TargetEventCid1;
|
|
11955
11655
|
/**
|
|
11956
11656
|
* The continuous multimodal trigger (e.g., audio spike, user saying 'stop') that justified the interruption.
|
|
@@ -11971,10 +11671,10 @@ export interface BargeInInterruptEvent {
|
|
|
11971
11671
|
* MCP ROUTING TRIGGERS: Counterfactual Regret Minimization, Pearlian Do-Calculus, Opportunity Cost, Alternative Timeline, Policy Gradient Update
|
|
11972
11672
|
*/
|
|
11973
11673
|
export interface CounterfactualRegretEvent {
|
|
11974
|
-
event_cid:
|
|
11975
|
-
prior_event_hash?:
|
|
11976
|
-
timestamp:
|
|
11977
|
-
topology_class?:
|
|
11674
|
+
event_cid: EventCid13;
|
|
11675
|
+
prior_event_hash?: PriorEventHash13;
|
|
11676
|
+
timestamp: Timestamp13;
|
|
11677
|
+
topology_class?: TopologyClass97;
|
|
11978
11678
|
historical_event_cid: HistoricalEventCid;
|
|
11979
11679
|
counterfactual_intervention: CounterfactualIntervention;
|
|
11980
11680
|
expected_utility_actual: ExpectedUtilityActual;
|
|
@@ -12000,10 +11700,10 @@ export interface PolicyMutationGradients {
|
|
|
12000
11700
|
* MCP ROUTING TRIGGERS: Pearlian Do-Operator, Kinetic Commitment, Active Inference, Thermodynamic Escrow, Zero-Trust Actuation
|
|
12001
11701
|
*/
|
|
12002
11702
|
export interface ToolInvocationEvent {
|
|
12003
|
-
event_cid:
|
|
12004
|
-
prior_event_hash?:
|
|
12005
|
-
timestamp:
|
|
12006
|
-
topology_class?:
|
|
11703
|
+
event_cid: EventCid14;
|
|
11704
|
+
prior_event_hash?: PriorEventHash14;
|
|
11705
|
+
timestamp: Timestamp14;
|
|
11706
|
+
topology_class?: TopologyClass98;
|
|
12007
11707
|
tool_name: ToolName1;
|
|
12008
11708
|
parameters: Parameters;
|
|
12009
11709
|
authorized_budget_magnitude: AuthorizedBudgetMagnitude;
|
|
@@ -12066,10 +11766,10 @@ export interface ZeroKnowledgeReceipt1 {
|
|
|
12066
11766
|
* MCP ROUTING TRIGGERS: Hippocampal Consolidation, Knowledge Distillation, Semantic Memory, Shannon Entropy Compression, Epistemic Promotion
|
|
12067
11767
|
*/
|
|
12068
11768
|
export interface EpistemicPromotionEvent {
|
|
12069
|
-
event_cid:
|
|
12070
|
-
prior_event_hash?:
|
|
12071
|
-
timestamp:
|
|
12072
|
-
topology_class?:
|
|
11769
|
+
event_cid: EventCid15;
|
|
11770
|
+
prior_event_hash?: PriorEventHash15;
|
|
11771
|
+
timestamp: Timestamp15;
|
|
11772
|
+
topology_class?: TopologyClass99;
|
|
12073
11773
|
source_episodic_event_cids: SourceEpisodicEventCids;
|
|
12074
11774
|
crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
|
|
12075
11775
|
compression_ratio: CompressionRatio;
|
|
@@ -12086,10 +11786,10 @@ export interface EpistemicPromotionEvent {
|
|
|
12086
11786
|
* MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
|
|
12087
11787
|
*/
|
|
12088
11788
|
export interface NormativeDriftEvent {
|
|
12089
|
-
event_cid:
|
|
12090
|
-
prior_event_hash?:
|
|
12091
|
-
timestamp:
|
|
12092
|
-
topology_class?:
|
|
11789
|
+
event_cid: EventCid16;
|
|
11790
|
+
prior_event_hash?: PriorEventHash16;
|
|
11791
|
+
timestamp: Timestamp16;
|
|
11792
|
+
topology_class?: TopologyClass100;
|
|
12093
11793
|
tripped_rule_cid: TrippedRuleCid;
|
|
12094
11794
|
measured_semantic_drift: MeasuredSemanticDrift;
|
|
12095
11795
|
contradiction_proof_hash: ContradictionProofHash;
|
|
@@ -12106,10 +11806,10 @@ export interface NormativeDriftEvent {
|
|
|
12106
11806
|
* MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
|
|
12107
11807
|
*/
|
|
12108
11808
|
export interface PersistenceCommitReceipt {
|
|
12109
|
-
event_cid:
|
|
12110
|
-
prior_event_hash?:
|
|
12111
|
-
timestamp:
|
|
12112
|
-
topology_class?:
|
|
11809
|
+
event_cid: EventCid17;
|
|
11810
|
+
prior_event_hash?: PriorEventHash17;
|
|
11811
|
+
timestamp: Timestamp17;
|
|
11812
|
+
topology_class?: TopologyClass101;
|
|
12113
11813
|
lakehouse_snapshot_cid: LakehouseSnapshotCid;
|
|
12114
11814
|
committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
|
|
12115
11815
|
target_table_uri: TargetTableUri;
|
|
@@ -12126,10 +11826,10 @@ export interface PersistenceCommitReceipt {
|
|
|
12126
11826
|
* MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
|
|
12127
11827
|
*/
|
|
12128
11828
|
export interface TokenBurnReceipt {
|
|
12129
|
-
event_cid:
|
|
12130
|
-
prior_event_hash?:
|
|
12131
|
-
timestamp:
|
|
12132
|
-
topology_class?:
|
|
11829
|
+
event_cid: EventCid18;
|
|
11830
|
+
prior_event_hash?: PriorEventHash18;
|
|
11831
|
+
timestamp: Timestamp18;
|
|
11832
|
+
topology_class?: TopologyClass102;
|
|
12133
11833
|
tool_invocation_cid: ToolInvocationCid;
|
|
12134
11834
|
input_tokens: InputTokens;
|
|
12135
11835
|
output_tokens: OutputTokens;
|
|
@@ -12147,10 +11847,10 @@ export interface TokenBurnReceipt {
|
|
|
12147
11847
|
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
|
|
12148
11848
|
*/
|
|
12149
11849
|
export interface BudgetExhaustionEvent {
|
|
12150
|
-
event_cid:
|
|
12151
|
-
prior_event_hash?:
|
|
12152
|
-
timestamp:
|
|
12153
|
-
topology_class?:
|
|
11850
|
+
event_cid: EventCid19;
|
|
11851
|
+
prior_event_hash?: PriorEventHash19;
|
|
11852
|
+
timestamp: Timestamp19;
|
|
11853
|
+
topology_class?: TopologyClass103;
|
|
12154
11854
|
exhausted_escrow_cid: ExhaustedEscrowCid;
|
|
12155
11855
|
final_burn_receipt_cid: FinalBurnReceiptCid;
|
|
12156
11856
|
}
|
|
@@ -12166,10 +11866,10 @@ export interface BudgetExhaustionEvent {
|
|
|
12166
11866
|
* MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
|
|
12167
11867
|
*/
|
|
12168
11868
|
export interface EpistemicTelemetryEvent {
|
|
12169
|
-
event_cid:
|
|
12170
|
-
prior_event_hash?:
|
|
12171
|
-
timestamp:
|
|
12172
|
-
topology_class?:
|
|
11869
|
+
event_cid: EventCid20;
|
|
11870
|
+
prior_event_hash?: PriorEventHash20;
|
|
11871
|
+
timestamp: Timestamp20;
|
|
11872
|
+
topology_class?: TopologyClass104;
|
|
12173
11873
|
interaction_modality: InteractionModality;
|
|
12174
11874
|
target_node_cid: TargetNodeCid2;
|
|
12175
11875
|
dwell_duration_ms?: DwellDurationMs;
|
|
@@ -12190,10 +11890,10 @@ export interface EpistemicTelemetryEvent {
|
|
|
12190
11890
|
* MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
|
|
12191
11891
|
*/
|
|
12192
11892
|
export interface CognitivePredictionReceipt {
|
|
12193
|
-
event_cid:
|
|
12194
|
-
prior_event_hash?:
|
|
12195
|
-
timestamp:
|
|
12196
|
-
topology_class?:
|
|
11893
|
+
event_cid: EventCid21;
|
|
11894
|
+
prior_event_hash?: PriorEventHash21;
|
|
11895
|
+
timestamp: Timestamp21;
|
|
11896
|
+
topology_class?: TopologyClass105;
|
|
12197
11897
|
source_chain_cid: SourceChainCid;
|
|
12198
11898
|
target_source_concept: TargetSourceConcept;
|
|
12199
11899
|
predicted_top_k_tokens: PredictedTopKTokens;
|
|
@@ -12210,10 +11910,10 @@ export interface CognitivePredictionReceipt {
|
|
|
12210
11910
|
* MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
|
|
12211
11911
|
*/
|
|
12212
11912
|
export interface EpistemicAxiomVerificationReceipt {
|
|
12213
|
-
event_cid:
|
|
12214
|
-
prior_event_hash?:
|
|
12215
|
-
timestamp:
|
|
12216
|
-
topology_class?:
|
|
11913
|
+
event_cid: EventCid22;
|
|
11914
|
+
prior_event_hash?: PriorEventHash22;
|
|
11915
|
+
timestamp: Timestamp22;
|
|
11916
|
+
topology_class?: TopologyClass106;
|
|
12217
11917
|
source_prediction_cid: SourcePredictionCid;
|
|
12218
11918
|
sequence_similarity_score: SequenceSimilarityScore;
|
|
12219
11919
|
fact_score_passed: FactScorePassed;
|
|
@@ -12244,10 +11944,10 @@ export interface EpistemicAxiomVerificationReceipt {
|
|
|
12244
11944
|
* Baseline Normalization, Reinforcement Learning
|
|
12245
11945
|
*/
|
|
12246
11946
|
export interface CognitiveRewardEvaluationReceipt {
|
|
12247
|
-
event_cid:
|
|
12248
|
-
prior_event_hash?:
|
|
12249
|
-
timestamp:
|
|
12250
|
-
topology_class?:
|
|
11947
|
+
event_cid: EventCid23;
|
|
11948
|
+
prior_event_hash?: PriorEventHash23;
|
|
11949
|
+
timestamp: Timestamp23;
|
|
11950
|
+
topology_class?: TopologyClass107;
|
|
12251
11951
|
source_generation_cid: SourceGenerationCid;
|
|
12252
11952
|
extracted_axioms?: ExtractedAxioms;
|
|
12253
11953
|
calculated_r_path: CalculatedRPath;
|
|
@@ -12290,10 +11990,10 @@ export interface EpistemicAxiomState {
|
|
|
12290
11990
|
* Scalar Backpropagation, Acyclic Path
|
|
12291
11991
|
*/
|
|
12292
11992
|
export interface EpistemicFlowStateReceipt {
|
|
12293
|
-
event_cid:
|
|
12294
|
-
prior_event_hash?:
|
|
12295
|
-
timestamp:
|
|
12296
|
-
topology_class?:
|
|
11993
|
+
event_cid: EventCid24;
|
|
11994
|
+
prior_event_hash?: PriorEventHash24;
|
|
11995
|
+
timestamp: Timestamp24;
|
|
11996
|
+
topology_class?: TopologyClass108;
|
|
12297
11997
|
source_trajectory_cid: SourceTrajectoryCid;
|
|
12298
11998
|
estimated_flow_value: EstimatedFlowValue;
|
|
12299
11999
|
terminal_reward_factorized: TerminalRewardFactorized;
|
|
@@ -12319,10 +12019,10 @@ export interface EpistemicFlowStateReceipt {
|
|
|
12319
12019
|
* Macroscopic Explanation, Deterministic Sorting
|
|
12320
12020
|
*/
|
|
12321
12021
|
export interface CausalExplanationEvent {
|
|
12322
|
-
event_cid:
|
|
12323
|
-
prior_event_hash?:
|
|
12324
|
-
timestamp:
|
|
12325
|
-
topology_class?:
|
|
12022
|
+
event_cid: EventCid25;
|
|
12023
|
+
prior_event_hash?: PriorEventHash25;
|
|
12024
|
+
timestamp: Timestamp25;
|
|
12025
|
+
topology_class?: TopologyClass109;
|
|
12326
12026
|
target_outcome_event_cid: TargetOutcomeEventCid;
|
|
12327
12027
|
collective_intelligence: CollectiveIntelligenceProfile;
|
|
12328
12028
|
agent_attributions: AgentAttributions;
|
|
@@ -12383,10 +12083,10 @@ export interface ShapleyAttributionReceipt {
|
|
|
12383
12083
|
* Routing Heuristic, Semantic Wave Collapse
|
|
12384
12084
|
*/
|
|
12385
12085
|
export interface IntentClassificationReceipt {
|
|
12386
|
-
event_cid:
|
|
12387
|
-
prior_event_hash?:
|
|
12388
|
-
timestamp:
|
|
12389
|
-
topology_class?:
|
|
12086
|
+
event_cid: EventCid26;
|
|
12087
|
+
prior_event_hash?: PriorEventHash26;
|
|
12088
|
+
timestamp: Timestamp26;
|
|
12089
|
+
topology_class?: TopologyClass110;
|
|
12390
12090
|
raw_input_string: RawInputString;
|
|
12391
12091
|
classified_intent: ClassifiedIntent;
|
|
12392
12092
|
confidence_score: ConfidenceScore1;
|
|
@@ -12404,10 +12104,10 @@ export interface IntentClassificationReceipt {
|
|
|
12404
12104
|
* MCP ROUTING TRIGGERS: Semantic Relational Record, Payload Injection, Hardware Guillotine, Structured Telemetry
|
|
12405
12105
|
*/
|
|
12406
12106
|
export interface SemanticRelationalVectorState {
|
|
12407
|
-
topology_class?:
|
|
12408
|
-
event_cid:
|
|
12409
|
-
prior_event_hash?:
|
|
12410
|
-
timestamp:
|
|
12107
|
+
topology_class?: TopologyClass111;
|
|
12108
|
+
event_cid: EventCid27;
|
|
12109
|
+
prior_event_hash?: PriorEventHash27;
|
|
12110
|
+
timestamp: Timestamp27;
|
|
12411
12111
|
ontology_class: UpperOntologyClassProfile;
|
|
12412
12112
|
temporal_bounds: TemporalBoundsProfile1;
|
|
12413
12113
|
formal_schema_urn?: FormalSchemaUrn1;
|
|
@@ -12449,10 +12149,10 @@ export interface PayloadInjectionZone {
|
|
|
12449
12149
|
* MCP ROUTING TRIGGERS: Ontological Reification, Bimodal Semantic Transformation, Epistemic Ledger, Traceability Collapse
|
|
12450
12150
|
*/
|
|
12451
12151
|
export interface OntologicalReificationReceipt {
|
|
12452
|
-
topology_class?:
|
|
12453
|
-
event_cid:
|
|
12454
|
-
prior_event_hash?:
|
|
12455
|
-
timestamp:
|
|
12152
|
+
topology_class?: TopologyClass112;
|
|
12153
|
+
event_cid: EventCid28;
|
|
12154
|
+
prior_event_hash?: PriorEventHash28;
|
|
12155
|
+
timestamp: Timestamp28;
|
|
12456
12156
|
source_data_hash: SourceDataHash;
|
|
12457
12157
|
target_namespace: TargetNamespace;
|
|
12458
12158
|
algorithmic_mechanism: TransformationMechanismProfile;
|
|
@@ -12489,10 +12189,10 @@ export interface DempsterShaferBeliefVector2 {
|
|
|
12489
12189
|
* MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
|
|
12490
12190
|
*/
|
|
12491
12191
|
export interface CircuitBreakerEvent {
|
|
12492
|
-
event_cid:
|
|
12493
|
-
prior_event_hash?:
|
|
12494
|
-
timestamp:
|
|
12495
|
-
topology_class?:
|
|
12192
|
+
event_cid: EventCid29;
|
|
12193
|
+
prior_event_hash?: PriorEventHash29;
|
|
12194
|
+
timestamp: Timestamp29;
|
|
12195
|
+
topology_class?: TopologyClass113;
|
|
12496
12196
|
/**
|
|
12497
12197
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
12498
12198
|
*/
|
|
@@ -12511,10 +12211,10 @@ export interface CircuitBreakerEvent {
|
|
|
12511
12211
|
* MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
|
|
12512
12212
|
*/
|
|
12513
12213
|
export interface EpistemicLogEvent {
|
|
12514
|
-
event_cid:
|
|
12515
|
-
prior_event_hash?:
|
|
12516
|
-
topology_class?:
|
|
12517
|
-
timestamp:
|
|
12214
|
+
event_cid: EventCid30;
|
|
12215
|
+
prior_event_hash?: PriorEventHash30;
|
|
12216
|
+
topology_class?: TopologyClass114;
|
|
12217
|
+
timestamp: Timestamp30;
|
|
12518
12218
|
level: Level;
|
|
12519
12219
|
message: Message1;
|
|
12520
12220
|
context_profile?: TelemetryContextProfile;
|
|
@@ -12544,10 +12244,10 @@ export interface TelemetryContextProfile {
|
|
|
12544
12244
|
* MCP ROUTING TRIGGERS: Cryptographic Nonce, State Resumption, Replay Attack Prevention, Wetware Attestation, Liveness Resolution
|
|
12545
12245
|
*/
|
|
12546
12246
|
export interface InterventionReceipt {
|
|
12547
|
-
topology_class?:
|
|
12548
|
-
event_cid:
|
|
12549
|
-
prior_event_hash?:
|
|
12550
|
-
timestamp:
|
|
12247
|
+
topology_class?: TopologyClass115;
|
|
12248
|
+
event_cid: EventCid31;
|
|
12249
|
+
prior_event_hash?: PriorEventHash31;
|
|
12250
|
+
timestamp: Timestamp31;
|
|
12551
12251
|
intervention_request_cid: InterventionRequestCid;
|
|
12552
12252
|
/**
|
|
12553
12253
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -12602,10 +12302,10 @@ export interface WetwareAttestationContract {
|
|
|
12602
12302
|
* MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
|
|
12603
12303
|
*/
|
|
12604
12304
|
export interface CustodyReceipt {
|
|
12605
|
-
event_cid:
|
|
12606
|
-
prior_event_hash?:
|
|
12607
|
-
timestamp:
|
|
12608
|
-
topology_class?:
|
|
12305
|
+
event_cid: EventCid32;
|
|
12306
|
+
prior_event_hash?: PriorEventHash32;
|
|
12307
|
+
timestamp: Timestamp32;
|
|
12308
|
+
topology_class?: TopologyClass116;
|
|
12609
12309
|
custody_cid: CustodyCid;
|
|
12610
12310
|
source_node_cid: SourceNodeCid;
|
|
12611
12311
|
applied_policy_cid: AppliedPolicyCid;
|
|
@@ -12625,10 +12325,10 @@ export interface CustodyReceipt {
|
|
|
12625
12325
|
* MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
|
|
12626
12326
|
*/
|
|
12627
12327
|
export interface DefeasibleAttackEvent {
|
|
12628
|
-
event_cid:
|
|
12629
|
-
prior_event_hash?:
|
|
12630
|
-
timestamp:
|
|
12631
|
-
topology_class?:
|
|
12328
|
+
event_cid: EventCid33;
|
|
12329
|
+
prior_event_hash?: PriorEventHash33;
|
|
12330
|
+
timestamp: Timestamp33;
|
|
12331
|
+
topology_class?: TopologyClass117;
|
|
12632
12332
|
attack_cid: AttackCid;
|
|
12633
12333
|
source_claim_cid: SourceClaimCid;
|
|
12634
12334
|
target_claim_cid: TargetClaimCid;
|
|
@@ -12637,6 +12337,28 @@ export interface DefeasibleAttackEvent {
|
|
|
12637
12337
|
*/
|
|
12638
12338
|
attack_vector: "rebuttal" | "undercutter" | "underminer";
|
|
12639
12339
|
}
|
|
12340
|
+
/**
|
|
12341
|
+
* CoReason Shared Kernel Ontology
|
|
12342
|
+
*
|
|
12343
|
+
* AGENT INSTRUCTION: The mathematical backpropagation signal triggered when the Deterministic Compiler rejects a stochastic manifold. Quantifies the rejection and provides a mutation gradient.
|
|
12344
|
+
*
|
|
12345
|
+
* CAUSAL AFFORDANCE: Instructs the LLM ensemble on how to perturb the Upper Confidence Bound (UCB) during the next MCTS generation attempt by mathematically quantifying the error.
|
|
12346
|
+
*
|
|
12347
|
+
* EPISTEMIC BOUNDS: Kullback-Leibler divergence is strictly non-negative. A negative mathematical distance is a paradox and raises a ValueError.
|
|
12348
|
+
*
|
|
12349
|
+
* MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
|
|
12350
|
+
*/
|
|
12351
|
+
export interface EpistemicRejectionReceipt {
|
|
12352
|
+
event_cid: EventCid34;
|
|
12353
|
+
prior_event_hash?: PriorEventHash34;
|
|
12354
|
+
timestamp: Timestamp34;
|
|
12355
|
+
topology_class?: TopologyClass118;
|
|
12356
|
+
receipt_cid: ReceiptCid1;
|
|
12357
|
+
failed_projection_cid: FailedProjectionCid;
|
|
12358
|
+
violated_algebraic_constraint: ViolatedAlgebraicConstraint;
|
|
12359
|
+
kl_divergence_to_validity: KlDivergenceToValidity;
|
|
12360
|
+
stochastic_mutation_gradient: StochasticMutationGradient;
|
|
12361
|
+
}
|
|
12640
12362
|
/**
|
|
12641
12363
|
* CoReason Shared Kernel Ontology
|
|
12642
12364
|
*
|
|
@@ -12652,7 +12374,7 @@ export interface FormalVerificationReceipt {
|
|
|
12652
12374
|
event_cid: EventCid35;
|
|
12653
12375
|
prior_event_hash?: PriorEventHash35;
|
|
12654
12376
|
timestamp: Timestamp35;
|
|
12655
|
-
topology_class?:
|
|
12377
|
+
topology_class?: TopologyClass119;
|
|
12656
12378
|
/**
|
|
12657
12379
|
* Pointer to the specific node or intent that requested this formal verification.
|
|
12658
12380
|
*/
|
|
@@ -12666,7 +12388,7 @@ export interface FormalVerificationReceipt {
|
|
|
12666
12388
|
* CoReason Shared Kernel Ontology
|
|
12667
12389
|
*/
|
|
12668
12390
|
export interface BeliefModulationReceipt {
|
|
12669
|
-
topology_class?:
|
|
12391
|
+
topology_class?: TopologyClass120;
|
|
12670
12392
|
receipt_cid: ReceiptCid2;
|
|
12671
12393
|
event_cid: EventCid36;
|
|
12672
12394
|
prior_event_hash?: PriorEventHash36;
|
|
@@ -12682,7 +12404,7 @@ export interface GroundedEdges {
|
|
|
12682
12404
|
* CoReason Shared Kernel Ontology
|
|
12683
12405
|
*/
|
|
12684
12406
|
export interface RDFExportReceipt {
|
|
12685
|
-
topology_class?:
|
|
12407
|
+
topology_class?: TopologyClass121;
|
|
12686
12408
|
export_cid: ExportCid1;
|
|
12687
12409
|
event_cid: EventCid37;
|
|
12688
12410
|
prior_event_hash?: PriorEventHash37;
|
|
@@ -12706,7 +12428,7 @@ export interface EpistemicStarvationEvent {
|
|
|
12706
12428
|
event_cid: EventCid38;
|
|
12707
12429
|
prior_event_hash?: PriorEventHash38;
|
|
12708
12430
|
timestamp: Timestamp38;
|
|
12709
|
-
topology_class?:
|
|
12431
|
+
topology_class?: TopologyClass122;
|
|
12710
12432
|
starved_edge_cid: StarvedEdgeCid;
|
|
12711
12433
|
failed_citations: FailedCitations;
|
|
12712
12434
|
diagnostic_reason: DiagnosticReason;
|
|
@@ -12726,7 +12448,7 @@ export interface SPARQLQueryResultReceipt {
|
|
|
12726
12448
|
event_cid: EventCid39;
|
|
12727
12449
|
prior_event_hash?: PriorEventHash39;
|
|
12728
12450
|
timestamp: Timestamp39;
|
|
12729
|
-
topology_class?:
|
|
12451
|
+
topology_class?: TopologyClass123;
|
|
12730
12452
|
query_intent_cid: QueryIntentCid;
|
|
12731
12453
|
returned_bindings: ReturnedBindings;
|
|
12732
12454
|
execution_time_ms: ExecutionTimeMs;
|
|
@@ -12749,7 +12471,7 @@ export interface ReturnedBindings {
|
|
|
12749
12471
|
* MCP ROUTING TRIGGERS: Execution Audit, Merkle-DAG Provenance, Thermodynamic Accounting, Oracle Telemetry, Human-in-the-Loop Attestation, Cryptographic Receipt
|
|
12750
12472
|
*/
|
|
12751
12473
|
export interface OracleExecutionReceipt {
|
|
12752
|
-
topology_class?:
|
|
12474
|
+
topology_class?: TopologyClass124;
|
|
12753
12475
|
execution_hash: ExecutionHash;
|
|
12754
12476
|
solver_urn: SolverUrn;
|
|
12755
12477
|
tokens_burned: TokensBurned;
|
|
@@ -12767,7 +12489,7 @@ export interface OracleExecutionReceipt {
|
|
|
12767
12489
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Acyclic Edge, Stochastic Routing, Transition Probability, Directed Graph
|
|
12768
12490
|
*/
|
|
12769
12491
|
export interface TransitionEdgeProfile {
|
|
12770
|
-
topology_class?:
|
|
12492
|
+
topology_class?: TopologyClass125;
|
|
12771
12493
|
target_node_cid?: TargetNodeCid3;
|
|
12772
12494
|
/**
|
|
12773
12495
|
* Dynamic discovery intent for bridging nodes.
|
|
@@ -12811,7 +12533,7 @@ export interface EdgeMappingContract {
|
|
|
12811
12533
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Cyclic Edge, Bellman Equation, Thermodynamic Discounting, Recursive Traversal
|
|
12812
12534
|
*/
|
|
12813
12535
|
export interface CyclicEdgeProfile {
|
|
12814
|
-
topology_class?:
|
|
12536
|
+
topology_class?: TopologyClass126;
|
|
12815
12537
|
target_node_cid?: TargetNodeCid4;
|
|
12816
12538
|
/**
|
|
12817
12539
|
* Dynamic discovery intent for bridging nodes.
|
|
@@ -12864,7 +12586,7 @@ export interface AuctionState {
|
|
|
12864
12586
|
* MCP ROUTING TRIGGERS: Decentralized Spot Market, Request for Proposal, Thermodynamic Compute Allocation, Algorithmic Mechanism Design, Kinetic Execution Trigger
|
|
12865
12587
|
*/
|
|
12866
12588
|
export interface TaskAnnouncementIntent1 {
|
|
12867
|
-
topology_class?:
|
|
12589
|
+
topology_class?: TopologyClass32;
|
|
12868
12590
|
task_cid: TaskCid2;
|
|
12869
12591
|
required_action_space_cid?: RequiredActionSpaceCid;
|
|
12870
12592
|
max_budget_magnitude: MaxBudgetMagnitude;
|
|
@@ -13130,28 +12852,6 @@ export interface CollectiveIntelligenceProfile1 {
|
|
|
13130
12852
|
coordination_score: CoordinationScore;
|
|
13131
12853
|
information_integration: InformationIntegration;
|
|
13132
12854
|
}
|
|
13133
|
-
/**
|
|
13134
|
-
* CoReason Shared Kernel Ontology
|
|
13135
|
-
*
|
|
13136
|
-
* AGENT INSTRUCTION: The macroscopic envelope that tracks the thermodynamic cost of stochastic ideation and violently halts execution when energy budgets or spatial limits are depleted.
|
|
13137
|
-
*
|
|
13138
|
-
* CAUSAL AFFORDANCE: Operates as the absolute mathematical circuit breaker for MCTS DAG expansion, physically revoking generative privileges if thresholds are breached.
|
|
13139
|
-
*
|
|
13140
|
-
* EPISTEMIC BOUNDS: Bounded by strict topological limits: max_stochastic_diffusions (ge=1) and computational_free_energy_budget (ge=0.0). current_diffusions must be strictly <= max_stochastic_diffusions.
|
|
13141
|
-
*
|
|
13142
|
-
* MCP ROUTING TRIGGERS: Computational Thermodynamics, Spatial Circuit Breaker, MCTS Halting, Epistemic Bounding, Thermodynamic Cost
|
|
13143
|
-
*/
|
|
13144
|
-
export interface ComputationalThermodynamicsProfile {
|
|
13145
|
-
thermodynamics_cid: ThermodynamicsCid;
|
|
13146
|
-
target_topology_cid: TargetTopologyCid1;
|
|
13147
|
-
max_stochastic_diffusions: MaxStochasticDiffusions;
|
|
13148
|
-
computational_free_energy_budget: ComputationalFreeEnergyBudget;
|
|
13149
|
-
current_diffusions?: CurrentDiffusions;
|
|
13150
|
-
remaining_free_energy: RemainingFreeEnergy;
|
|
13151
|
-
entropy_derivative_delta?: EntropyDerivativeDelta;
|
|
13152
|
-
stagnation_tolerance_epsilon?: StagnationToleranceEpsilon;
|
|
13153
|
-
system_state?: ThermodynamicState;
|
|
13154
|
-
}
|
|
13155
12855
|
/**
|
|
13156
12856
|
* CoReason Shared Kernel Ontology
|
|
13157
12857
|
*
|
|
@@ -13270,64 +12970,6 @@ export interface ContinuousMutationPolicy {
|
|
|
13270
12970
|
max_uncommitted_edges: MaxUncommittedEdges;
|
|
13271
12971
|
micro_batch_interval_ms: MicroBatchIntervalMs;
|
|
13272
12972
|
}
|
|
13273
|
-
/**
|
|
13274
|
-
* CoReason Shared Kernel Ontology
|
|
13275
|
-
*
|
|
13276
|
-
* AGENT INSTRUCTION: Tracks the non-monotonic state transition of a Byzantine-tolerant B2B
|
|
13277
|
-
* negotiation between two distinct enterprise tenant CID identifiers (initiating_tenant_cid
|
|
13278
|
-
* and receiving_tenant_cid). As a ...State suffix, this is a declarative, frozen snapshot of
|
|
13279
|
-
* N-dimensional geometry at a specific point in time.
|
|
13280
|
-
*
|
|
13281
|
-
* CAUSAL AFFORDANCE: Transitions the federated network from a proposed capability swap into
|
|
13282
|
-
* an active OntologicalHandshakeReceipt, forcing the execution of the strict offered_sla
|
|
13283
|
-
* (FederatedBilateralSLA).
|
|
13284
|
-
*
|
|
13285
|
-
* EPISTEMIC BOUNDS: Cryptographically bounded by handshake_cid (CID regex
|
|
13286
|
-
* ^[a-zA-Z0-9_.:-]+$). The negotiation lifecycle is physically constrained to the strict
|
|
13287
|
-
* Literal automaton ["proposed", "negotiating", "aligned", "rejected"] via FSM Logit
|
|
13288
|
-
* Masking, preventing execution deadlocks.
|
|
13289
|
-
*
|
|
13290
|
-
* MCP ROUTING TRIGGERS: Byzantine-Tolerant Negotiation, Zero-Trust Handshake, Finite State
|
|
13291
|
-
* Machine, Cross-Tenant Federation, Asynchronous B2B
|
|
13292
|
-
*/
|
|
13293
|
-
export interface CrossSwarmHandshakeState {
|
|
13294
|
-
handshake_cid: HandshakeCid;
|
|
13295
|
-
initiating_tenant_cid: InitiatingTenantCid;
|
|
13296
|
-
receiving_tenant_cid: ReceivingTenantCid;
|
|
13297
|
-
offered_sla: FederatedBilateralSLA;
|
|
13298
|
-
status?: Status1;
|
|
13299
|
-
}
|
|
13300
|
-
/**
|
|
13301
|
-
* The initial structural/data boundary proposed.
|
|
13302
|
-
*/
|
|
13303
|
-
export interface FederatedBilateralSLA {
|
|
13304
|
-
receiving_tenant_cid: ReceivingTenantCid1;
|
|
13305
|
-
max_permitted_classification: SemanticClassificationProfile2;
|
|
13306
|
-
liability_limit_magnitude: LiabilityLimitMagnitude;
|
|
13307
|
-
permitted_geographic_regions?: PermittedGeographicRegions;
|
|
13308
|
-
require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
|
|
13309
|
-
max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
|
|
13310
|
-
/**
|
|
13311
|
-
* The quantum-resistant signature securing the multi-tenant structural boundary.
|
|
13312
|
-
*/
|
|
13313
|
-
pq_signature?: PostQuantumSignatureReceipt | null;
|
|
13314
|
-
}
|
|
13315
|
-
/**
|
|
13316
|
-
* CoReason Shared Kernel Ontology
|
|
13317
|
-
*
|
|
13318
|
-
* AGENT INSTRUCTION: Implements NIST FIPS Post-Quantum Cryptography (PQC), utilizing lattice-based or stateless hash-based structures to guarantee long-term topological integrity on the Merkle-DAG.
|
|
13319
|
-
*
|
|
13320
|
-
* CAUSAL AFFORDANCE: Secures the causal execution graph and Bilateral SLAs against temporal decryption attacks (Harvest Now, Decrypt Later) via Shor's algorithm executed on fault-tolerant quantum computers.
|
|
13321
|
-
*
|
|
13322
|
-
* EPISTEMIC BOUNDS: To accommodate massive dimensional geometry, `pq_signature_blob` is structurally bound to a `100000`-byte `max_length`. `pq_algorithm` is restricted to the Literal set `["ml-dsa", "slh-dsa", "falcon"]`. `public_key_cid` is a 128-char CID.
|
|
13323
|
-
*
|
|
13324
|
-
* MCP ROUTING TRIGGERS: Post-Quantum Cryptography, ML-DSA, SLH-DSA, Shor's Algorithm Resistance, Lattice-based Cryptography
|
|
13325
|
-
*/
|
|
13326
|
-
export interface PostQuantumSignatureReceipt {
|
|
13327
|
-
pq_algorithm: PqAlgorithm;
|
|
13328
|
-
public_key_cid: PublicKeyCid1;
|
|
13329
|
-
pq_signature_blob: PqSignatureBlob;
|
|
13330
|
-
}
|
|
13331
12973
|
/**
|
|
13332
12974
|
* CoReason Shared Kernel Ontology
|
|
13333
12975
|
*
|
|
@@ -13476,33 +13118,6 @@ export interface DifferentiableLogicPolicy {
|
|
|
13476
13118
|
formal_syntax_smt: FormalSyntaxSmt;
|
|
13477
13119
|
relaxation_epsilon: RelaxationEpsilon;
|
|
13478
13120
|
}
|
|
13479
|
-
/**
|
|
13480
|
-
* CoReason Shared Kernel Ontology
|
|
13481
|
-
*
|
|
13482
|
-
* AGENT INSTRUCTION: Formalizes a linear algebraic transformation (e.g.,
|
|
13483
|
-
* Singular Value Decomposition) mapping one embedding manifold to another,
|
|
13484
|
-
* grounded in the Johnson-Lindenstrauss Lemma. As a ...Contract suffix, this
|
|
13485
|
-
* enforces rigid mathematical boundaries globally.
|
|
13486
|
-
*
|
|
13487
|
-
* CAUSAL AFFORDANCE: Authorizes the orchestrator to translate latent vectors
|
|
13488
|
-
* across zero-trust network boundaries, bridging incompatible LLM spaces. The
|
|
13489
|
-
* source_matrix_name and target_matrix_name (both max_length=2000) identify the
|
|
13490
|
-
* origin and destination geometries.
|
|
13491
|
-
*
|
|
13492
|
-
* EPISTEMIC BOUNDS: Translation fidelity is physically proven by the
|
|
13493
|
-
* isometry_preservation_score (ge=0.0, le=1.0), ensuring Earth Mover's Distance
|
|
13494
|
-
* preservation. Cryptographic integrity is locked via projection_matrix_hash
|
|
13495
|
-
* (SHA-256 regex ^[a-f0-9]{64}$).
|
|
13496
|
-
*
|
|
13497
|
-
* MCP ROUTING TRIGGERS: Singular Value Decomposition, Johnson-Lindenstrauss
|
|
13498
|
-
* Lemma, Tensor Projection, Earth Mover's Distance, Latent Translation
|
|
13499
|
-
*/
|
|
13500
|
-
export interface DimensionalProjectionContract {
|
|
13501
|
-
source_matrix_name: SourceMatrixName;
|
|
13502
|
-
target_matrix_name: TargetMatrixName;
|
|
13503
|
-
projection_matrix_hash: ProjectionMatrixHash;
|
|
13504
|
-
isometry_preservation_score: IsometryPreservationScore1;
|
|
13505
|
-
}
|
|
13506
13121
|
/**
|
|
13507
13122
|
* CoReason Shared Kernel Ontology
|
|
13508
13123
|
*
|
|
@@ -13586,7 +13201,7 @@ export interface DynamicLayoutManifest {
|
|
|
13586
13201
|
* MCP ROUTING TRIGGERS: Grammar of Graphics, Retinal Variables, UI Rendering, Semantic Zooming, Dynamic Manifold
|
|
13587
13202
|
*/
|
|
13588
13203
|
export interface DynamicManifoldProjectionManifest1 {
|
|
13589
|
-
topology_class?:
|
|
13204
|
+
topology_class?: TopologyClass55;
|
|
13590
13205
|
manifest_cid: ManifestCid1;
|
|
13591
13206
|
active_forge_cid: ActiveForgeCid;
|
|
13592
13207
|
ast_gradient_visual_mapping: GrammarPanelProfile;
|
|
@@ -14060,7 +13675,6 @@ export interface EpistemicQuarantineSnapshot {
|
|
|
14060
13675
|
* The mathematically bounded subgraph of capabilities currently available to the agent.
|
|
14061
13676
|
*/
|
|
14062
13677
|
affordance_projection?: OntologicalSurfaceProjectionManifest | null;
|
|
14063
|
-
capability_attestations?: CapabilityAttestations;
|
|
14064
13678
|
}
|
|
14065
13679
|
/**
|
|
14066
13680
|
* The ephemeral latent variables and environmental bindings currently active in Epistemic Quarantine.
|
|
@@ -14122,58 +13736,6 @@ export interface ProceduralMetadataManifest {
|
|
|
14122
13736
|
*/
|
|
14123
13737
|
latent_vector_coordinate?: VectorEmbeddingState | null;
|
|
14124
13738
|
}
|
|
14125
|
-
/**
|
|
14126
|
-
* CoReason Shared Kernel Ontology
|
|
14127
|
-
*
|
|
14128
|
-
* AGENT INSTRUCTION: An immutable cryptographic receipt representing an Object Capability (OCap) grant within a Federated Identity Management (FIM) framework.
|
|
14129
|
-
*
|
|
14130
|
-
* CAUSAL AFFORDANCE: Unlocks cross-domain graph traversal, cryptographically proving to the target topology that the swarm agent is authorized to establish an active connection governed by the SLA.
|
|
14131
|
-
*
|
|
14132
|
-
* EPISTEMIC BOUNDS: Locked to a 128-char `attestation_cid`. The `@model_validator` `enforce_restricted_vault_locks` mathematically enforces cross-schema invariants: if `governing_sla.max_permitted_classification` is 'restricted', the `authorized_session` MUST contain explicit `allowed_vault_keys`.
|
|
14133
|
-
*
|
|
14134
|
-
* MCP ROUTING TRIGGERS: Object Capability Model, Federated Identity Management, Cross-Domain Federation, Capability Attestation, Zero-Trust Execution
|
|
14135
|
-
*/
|
|
14136
|
-
export interface FederatedCapabilityAttestationReceipt {
|
|
14137
|
-
attestation_cid: AttestationCid;
|
|
14138
|
-
/**
|
|
14139
|
-
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
14140
|
-
*/
|
|
14141
|
-
target_topology_cid: string;
|
|
14142
|
-
authorized_session: SecureSubSessionState1;
|
|
14143
|
-
governing_sla: FederatedBilateralSLA1;
|
|
14144
|
-
}
|
|
14145
|
-
/**
|
|
14146
|
-
* CoReason Shared Kernel Ontology
|
|
14147
|
-
*
|
|
14148
|
-
* AGENT INSTRUCTION: Formalizes the Principle of Least Privilege (PoLP) and Time-Based Access Control (TBAC) for handling high-entropy cryptographic secrets within a declarative N-dimensional coordinate.
|
|
14149
|
-
*
|
|
14150
|
-
* CAUSAL AFFORDANCE: Authorizes a temporary, mathematically bounded partition where the agent can access unredacted enterprise vault keys without permanently leaking them into the global EpistemicLedgerState.
|
|
14151
|
-
*
|
|
14152
|
-
* EPISTEMIC BOUNDS: The temporal exposure window is physically clamped by `max_ttl_seconds` (`ge=1, le=18446744073709551615`), enforcing an absolute maximum 1-hour session. Spatial access is geometrically restricted to `allowed_vault_keys` (`max_length=100`), deterministically sorted by `@model_validator` for RFC 8785 hashing.
|
|
14153
|
-
*
|
|
14154
|
-
* MCP ROUTING TRIGGERS: Principle of Least Privilege, Time-Based Access Control, Secret Vaulting, Ephemeral Partition, Cryptographic Isolation
|
|
14155
|
-
*/
|
|
14156
|
-
export interface SecureSubSessionState1 {
|
|
14157
|
-
session_cid: SessionCid;
|
|
14158
|
-
allowed_vault_keys: AllowedVaultKeys;
|
|
14159
|
-
max_ttl_seconds: MaxTtlSeconds1;
|
|
14160
|
-
description: Description4;
|
|
14161
|
-
}
|
|
14162
|
-
/**
|
|
14163
|
-
* The structural and physical boundary constraints for querying this target.
|
|
14164
|
-
*/
|
|
14165
|
-
export interface FederatedBilateralSLA1 {
|
|
14166
|
-
receiving_tenant_cid: ReceivingTenantCid1;
|
|
14167
|
-
max_permitted_classification: SemanticClassificationProfile2;
|
|
14168
|
-
liability_limit_magnitude: LiabilityLimitMagnitude;
|
|
14169
|
-
permitted_geographic_regions?: PermittedGeographicRegions;
|
|
14170
|
-
require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
|
|
14171
|
-
max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
|
|
14172
|
-
/**
|
|
14173
|
-
* The quantum-resistant signature securing the multi-tenant structural boundary.
|
|
14174
|
-
*/
|
|
14175
|
-
pq_signature?: PostQuantumSignatureReceipt | null;
|
|
14176
|
-
}
|
|
14177
13739
|
/**
|
|
14178
13740
|
* CoReason Shared Kernel Ontology
|
|
14179
13741
|
*
|
|
@@ -14320,220 +13882,6 @@ export interface ImmutableMatrix {
|
|
|
14320
13882
|
export interface Payload3 {
|
|
14321
13883
|
[k: string]: unknown;
|
|
14322
13884
|
}
|
|
14323
|
-
/**
|
|
14324
|
-
* CoReason Shared Kernel Ontology
|
|
14325
|
-
*
|
|
14326
|
-
* AGENT INSTRUCTION: Formalizes a discrete computational vertex within a Merkle-DAG execution trace, binding raw data inputs to deterministic outputs. As an append-only coordinate, it guarantees algorithmic reproducibility.
|
|
14327
|
-
*
|
|
14328
|
-
* CAUSAL AFFORDANCE: Permits the orchestrator to cryptographically re-evaluate, replay, or slash execution branches by guaranteeing all computational inputs, outputs, and parent pointers are deterministically serialized.
|
|
14329
|
-
*
|
|
14330
|
-
* EPISTEMIC BOUNDS: The `@model_validator` mathematically guarantees the `node_hash` via RFC 8785 canonical JSON serialization, trapping any non-deterministic dictionary properties. Orphaned lineages are structurally blocked.
|
|
14331
|
-
*
|
|
14332
|
-
* MCP ROUTING TRIGGERS: Merkle-DAG, RFC 8785 Canonicalization, Execution Trace, Cryptographic Determinism, Directed Acyclic Graph
|
|
14333
|
-
*/
|
|
14334
|
-
export interface ExecutionNodeReceipt {
|
|
14335
|
-
request_cid: RequestCid1;
|
|
14336
|
-
parent_request_cid?: ParentRequestCid;
|
|
14337
|
-
root_request_cid?: RootRequestCid;
|
|
14338
|
-
/**
|
|
14339
|
-
* The inputs provided to the execution node. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
|
|
14340
|
-
*/
|
|
14341
|
-
inputs: string | number | boolean | JsonPrimitiveState[] | {
|
|
14342
|
-
[k: string]: JsonPrimitiveState;
|
|
14343
|
-
} | EpistemicProxyStateAny | null;
|
|
14344
|
-
/**
|
|
14345
|
-
* The outputs generated by the execution node. AGENT INSTRUCTION: Payload volume is strictly limited to an absolute $O(N)$ limit of 10,000 nodes and a maximum recursion depth of 10 to prevent VRAM exhaustion.
|
|
14346
|
-
*/
|
|
14347
|
-
outputs: string | number | boolean | JsonPrimitiveState[] | {
|
|
14348
|
-
[k: string]: JsonPrimitiveState;
|
|
14349
|
-
} | EpistemicProxyStateAny | null;
|
|
14350
|
-
parent_hashes?: ParentHashes;
|
|
14351
|
-
node_hash?: NodeHash;
|
|
14352
|
-
}
|
|
14353
|
-
/**
|
|
14354
|
-
* CoReason Shared Kernel Ontology
|
|
14355
|
-
*
|
|
14356
|
-
* AGENT INSTRUCTION: Implements the Dapper distributed tracing model to deterministically map the causal execution DAG of the swarm. As an append-only coordinate on the Merkle-DAG, it mathematically binds parent-child RPC calls.
|
|
14357
|
-
*
|
|
14358
|
-
* CAUSAL AFFORDANCE: Unlocks global observability by mapping causal edges across the zero-trust network, enabling exact bottleneck detection and graph reconstruction.
|
|
14359
|
-
*
|
|
14360
|
-
* EPISTEMIC BOUNDS: Temporal boundaries are rigidly constrained by `start_time_unix_nano` (`ge=0`). The `@model_validator` enforces Allen's Interval Algebra to physically guarantee `end_time` cannot precede `start_time`. `events` array sorted by time.
|
|
14361
|
-
*
|
|
14362
|
-
* MCP ROUTING TRIGGERS: Dapper Tracing Model, Distributed Causal DAG, Allen's Interval Algebra, OpenTelemetry, Execution Provenance
|
|
14363
|
-
*/
|
|
14364
|
-
export interface ExecutionSpanReceipt {
|
|
14365
|
-
trace_cid: TraceCid3;
|
|
14366
|
-
span_cid: SpanCid1;
|
|
14367
|
-
parent_span_cid?: ParentSpanCid1;
|
|
14368
|
-
name: Name1;
|
|
14369
|
-
/**
|
|
14370
|
-
* The role of the span.
|
|
14371
|
-
*/
|
|
14372
|
-
kind?: "client" | "server" | "producer" | "consumer" | "internal";
|
|
14373
|
-
start_time_unix_nano: StartTimeUnixNano;
|
|
14374
|
-
end_time_unix_nano?: EndTimeUnixNano;
|
|
14375
|
-
/**
|
|
14376
|
-
* The execution health flag.
|
|
14377
|
-
*/
|
|
14378
|
-
status?: "unset" | "ok" | "error";
|
|
14379
|
-
events?: Events;
|
|
14380
|
-
}
|
|
14381
|
-
/**
|
|
14382
|
-
* CoReason Shared Kernel Ontology
|
|
14383
|
-
*
|
|
14384
|
-
* AGENT INSTRUCTION: Represents a discrete, point-in-time OpenTelemetry annotation within a broader Dapper-style `ExecutionSpanReceipt`.
|
|
14385
|
-
*
|
|
14386
|
-
* CAUSAL AFFORDANCE: Provides fine-grained, localized state-machine logging within an active span, anchoring semantic attributes to a precise nanosecond coordinate without spawning a new causal branch.
|
|
14387
|
-
*
|
|
14388
|
-
* EPISTEMIC BOUNDS: `timestamp_unix_nano` physically bounded `[0, 253402300799000000000]`. The `attributes` payload strictly constrained by a dictionary with string keys (`max_length=255`) to prevent dictionary bombing.
|
|
14389
|
-
*
|
|
14390
|
-
* MCP ROUTING TRIGGERS: Span Annotation, Point-in-Time Event, Micro-State Logging, OpenTelemetry, Telemetry Serialization
|
|
14391
|
-
*/
|
|
14392
|
-
export interface SpanEvent {
|
|
14393
|
-
name: Name2;
|
|
14394
|
-
timestamp_unix_nano: TimestampUnixNano;
|
|
14395
|
-
attributes?: Attributes;
|
|
14396
|
-
}
|
|
14397
|
-
/**
|
|
14398
|
-
* Typed metadata bound to the event.
|
|
14399
|
-
*/
|
|
14400
|
-
export interface Attributes {
|
|
14401
|
-
[k: string]: JsonPrimitiveState;
|
|
14402
|
-
}
|
|
14403
|
-
/**
|
|
14404
|
-
* CoReason Shared Kernel Ontology
|
|
14405
|
-
*
|
|
14406
|
-
* AGENT INSTRUCTION: Defines the zero-trust structural boundary for multi-tenant federation,
|
|
14407
|
-
* securing cross-boundary graph traversal against Shor's algorithm via an optional
|
|
14408
|
-
* PostQuantumSignatureReceipt. As an ...SLA suffix, this object enforces rigid mathematical
|
|
14409
|
-
* boundaries that the orchestrator must respect globally.
|
|
14410
|
-
*
|
|
14411
|
-
* CAUSAL AFFORDANCE: Unlocks cross-swarm graph bridging by enforcing strict liability,
|
|
14412
|
-
* physical location routing, semantic data classification constraints via
|
|
14413
|
-
* max_permitted_classification, and ESG carbon intensity limits.
|
|
14414
|
-
*
|
|
14415
|
-
* EPISTEMIC BOUNDS: Economically constrained by liability_limit_magnitude (ge=0,
|
|
14416
|
-
* le=18446744073709551615). ESG limits physically bind the node grid to the optional
|
|
14417
|
-
* max_permitted_grid_carbon_intensity (ge=0.0, le=18446744073709551615.0). The permitted_geographic_regions
|
|
14418
|
-
* array is deterministically sorted via @model_validator for RFC 8785 canonical hashing.
|
|
14419
|
-
*
|
|
14420
|
-
* MCP ROUTING TRIGGERS: Zero-Trust Architecture, Post-Quantum Cryptography, Federated
|
|
14421
|
-
* Learning, Bilateral SLA, Data Residency
|
|
14422
|
-
*/
|
|
14423
|
-
export interface FederatedBilateralSLA2 {
|
|
14424
|
-
receiving_tenant_cid: ReceivingTenantCid1;
|
|
14425
|
-
max_permitted_classification: SemanticClassificationProfile2;
|
|
14426
|
-
liability_limit_magnitude: LiabilityLimitMagnitude;
|
|
14427
|
-
permitted_geographic_regions?: PermittedGeographicRegions;
|
|
14428
|
-
require_temporal_provenance_proofs?: RequireTemporalProvenanceProofs;
|
|
14429
|
-
max_permitted_grid_carbon_intensity?: MaxPermittedGridCarbonIntensity;
|
|
14430
|
-
/**
|
|
14431
|
-
* The quantum-resistant signature securing the multi-tenant structural boundary.
|
|
14432
|
-
*/
|
|
14433
|
-
pq_signature?: PostQuantumSignatureReceipt | null;
|
|
14434
|
-
}
|
|
14435
|
-
/**
|
|
14436
|
-
* CoReason Shared Kernel Ontology
|
|
14437
|
-
*
|
|
14438
|
-
* AGENT INSTRUCTION: Triggers the zero-copy streaming of a binary or metadata blob from a discovered peer based on its Content Identifier (CID).
|
|
14439
|
-
*
|
|
14440
|
-
* CAUSAL AFFORDANCE: Physically executes the download of decentralized assets into the local embedded LanceDB and WASM runtime.
|
|
14441
|
-
*
|
|
14442
|
-
* EPISTEMIC BOUNDS: Bounded to strict RFC 8785 CIDs.
|
|
14443
|
-
*
|
|
14444
|
-
* MCP ROUTING TRIGGERS: Content Addressing, Zero-Copy Streaming, Decentralized Fetch, IPFS, FlatBuffers
|
|
14445
|
-
*/
|
|
14446
|
-
export interface FederatedCIDFetchIntent {
|
|
14447
|
-
topology_class?: TopologyClass128;
|
|
14448
|
-
/**
|
|
14449
|
-
* A content-addressed SHA-256 hash of a deterministic artifact bundle (e.g., an Action Space MCP server, an OHDSI Circe cohort definition JSON, or any RFC 8785 canonicalizable resource), enabling zero-trust verification and distributed exchangeability across federated boundaries.
|
|
14450
|
-
*/
|
|
14451
|
-
target_cid: string;
|
|
14452
|
-
timeout_ms?: TimeoutMs1;
|
|
14453
|
-
}
|
|
14454
|
-
/**
|
|
14455
|
-
* CoReason Shared Kernel Ontology
|
|
14456
|
-
*
|
|
14457
|
-
* AGENT INSTRUCTION: Governs the B2B Multi-Swarm Gossip Protocol, establishing the initial
|
|
14458
|
-
* Model Context Protocol (MCP) broadcast endpoints for external discovery. As a ...Manifest
|
|
14459
|
-
* suffix, this is a declarative, frozen snapshot of N-dimensional geometry at a specific
|
|
14460
|
-
* point in time.
|
|
14461
|
-
*
|
|
14462
|
-
* CAUSAL AFFORDANCE: Emits a structured tensor beacon to neighboring swarms, authorizing
|
|
14463
|
-
* the initiation of an OntologicalHandshakeReceipt if the supported_ontologies hashes
|
|
14464
|
-
* mathematically overlap.
|
|
14465
|
-
*
|
|
14466
|
-
* EPISTEMIC BOUNDS: Geometrically capped by broadcast_endpoints and supported_ontologies
|
|
14467
|
-
* string arrays (each max_length=1000). Both are explicitly sorted by the
|
|
14468
|
-
* @model_validator (broadcast_endpoints by str key, supported_ontologies alphabetically)
|
|
14469
|
-
* to guarantee invariant canonical RFC 8785 hashing across distinct environments.
|
|
14470
|
-
*
|
|
14471
|
-
* MCP ROUTING TRIGGERS: Gossip Protocol, Peer-to-Peer Discovery, Decentralized Federation,
|
|
14472
|
-
* Semantic Broadcasting, Tensor Beacon
|
|
14473
|
-
*/
|
|
14474
|
-
export interface FederatedDiscoveryManifest {
|
|
14475
|
-
broadcast_endpoints: BroadcastEndpoints;
|
|
14476
|
-
supported_ontologies: SupportedOntologies;
|
|
14477
|
-
}
|
|
14478
|
-
/**
|
|
14479
|
-
* CoReason Shared Kernel Ontology
|
|
14480
|
-
*
|
|
14481
|
-
* AGENT INSTRUCTION: Governs the spatial and temporal physics of Parameter-Efficient Fine-Tuning (PEFT) and Low-Rank Adaptation (LoRA), managing the Von Neumann bottleneck in distributed swarm VRAM.
|
|
14482
|
-
*
|
|
14483
|
-
* CAUSAL AFFORDANCE: Instructs the tensor execution engine to hot-swap external safetensors weight matrices into active GPU memory, modifying the foundational activation circuits.
|
|
14484
|
-
*
|
|
14485
|
-
* EPISTEMIC BOUNDS: The spatial geometry is physically capped by `vram_footprint_bytes` (`gt=0, le=18446744073709551615`). The temporal presence is mathematically guillotined by `ephemeral_ttl_ms` (`gt=0, le=18446744073709551615`). Supply-chain integrity is anchored by `adapter_merkle_root` (SHA-256).
|
|
14486
|
-
*
|
|
14487
|
-
* MCP ROUTING TRIGGERS: Low-Rank Adaptation, PEFT, LRU Cache Eviction, Tensor Hot-Swapping, GPU VRAM Management
|
|
14488
|
-
*/
|
|
14489
|
-
export interface FederatedPeftContract {
|
|
14490
|
-
adapter_merkle_root: AdapterMerkleRoot;
|
|
14491
|
-
vram_footprint_bytes: VramFootprintBytes;
|
|
14492
|
-
ephemeral_ttl_ms: EphemeralTtlMs;
|
|
14493
|
-
cache_priority_weight: CachePriorityWeight;
|
|
14494
|
-
}
|
|
14495
|
-
/**
|
|
14496
|
-
* CoReason Shared Kernel Ontology
|
|
14497
|
-
*
|
|
14498
|
-
* AGENT INSTRUCTION: Simplifies the creation of a secure federated network link across a Zero-Trust boundary.
|
|
14499
|
-
*
|
|
14500
|
-
* CAUSAL AFFORDANCE: Physically authorizes the orchestrator to forge a secure federated network link across a Zero-Trust boundary.
|
|
14501
|
-
*
|
|
14502
|
-
* EPISTEMIC BOUNDS: Bounded to strict JSON schema validation constraints defined in the manifest.
|
|
14503
|
-
*
|
|
14504
|
-
* MCP ROUTING TRIGGERS: Federated Security, Zero-Trust Boundary, Network Link, Macro Manifest
|
|
14505
|
-
*/
|
|
14506
|
-
export interface FederatedSecurityMacroManifest {
|
|
14507
|
-
target_endpoint_uri: TargetEndpointUri;
|
|
14508
|
-
required_clearance: SemanticClassificationProfile3;
|
|
14509
|
-
max_liability_budget: MaxLiabilityBudget;
|
|
14510
|
-
/**
|
|
14511
|
-
* Content-addressed identity of the capability bundle for zero-trust verification.
|
|
14512
|
-
*/
|
|
14513
|
-
content_hash?: BundleContentHashState | null;
|
|
14514
|
-
}
|
|
14515
|
-
/**
|
|
14516
|
-
* CoReason Shared Kernel Ontology
|
|
14517
|
-
*
|
|
14518
|
-
* AGENT INSTRUCTION: Establishes a Distributed Systems Theory cryptographic
|
|
14519
|
-
* partition, mapping an external swarm's execution state into a localized,
|
|
14520
|
-
* sandboxed coordinate. As a ...Snapshot suffix, this is a frozen N-dimensional
|
|
14521
|
-
* coordinate of ephemeral context.
|
|
14522
|
-
*
|
|
14523
|
-
* CAUSAL AFFORDANCE: Exposes the topological footprint of an exogenous network
|
|
14524
|
-
* to the local orchestrator, authorizing cross-boundary telemetry and capability
|
|
14525
|
-
* exchange without merging underlying working contexts.
|
|
14526
|
-
*
|
|
14527
|
-
* EPISTEMIC BOUNDS: The coordinate is restricted by the optional topology_cid
|
|
14528
|
-
* (str | None, default=None, 128-char CID regex ^[a-zA-Z0-9_.:-]+$),
|
|
14529
|
-
* mathematically severing unauthorized topological mutations.
|
|
14530
|
-
*
|
|
14531
|
-
* MCP ROUTING TRIGGERS: Distributed Systems Theory, Federated Namespace,
|
|
14532
|
-
* Zero-Trust Architecture, Cross-Swarm Federation, Sandbox Partition
|
|
14533
|
-
*/
|
|
14534
|
-
export interface FederatedStateSnapshot {
|
|
14535
|
-
topology_cid?: TopologyCid1;
|
|
14536
|
-
}
|
|
14537
13885
|
/**
|
|
14538
13886
|
* CoReason Shared Kernel Ontology
|
|
14539
13887
|
*
|
|
@@ -14895,13 +14243,13 @@ export interface KineticBudgetPolicy {
|
|
|
14895
14243
|
/**
|
|
14896
14244
|
* CoReason Shared Kernel Ontology
|
|
14897
14245
|
*
|
|
14898
|
-
* AGENT INSTRUCTION: Formalizes a
|
|
14246
|
+
* AGENT INSTRUCTION: Formalizes a SPIFFE/SPIRE Service Mesh and Zero-Trust Architecture perimeter, restricting JSON-RPC capability mounts from foreign subgraphs.
|
|
14899
14247
|
*
|
|
14900
|
-
* CAUSAL AFFORDANCE: Acts as a structural firewall that physically prevents the orchestrator from binding unauthorized external tools, resources, or prompts into the active agent's CognitiveActionSpaceManifest.
|
|
14248
|
+
* CAUSAL AFFORDANCE: Acts as a structural firewall that physically prevents the orchestrator from binding unauthorized external tools, resources, or prompts into the active agent's CognitiveActionSpaceManifest via mTLS delegation.
|
|
14901
14249
|
*
|
|
14902
14250
|
* EPISTEMIC BOUNDS: The boundary is geometrically enforced via `StringConstraints` (`max_length=2000` for `authorized_capability_array`, `allowed_resources`, `allowed_prompts`). The `@model_validator` strictly sorts all arrays alphabetically to mathematically guarantee RFC 8785 Canonical Hashing.
|
|
14903
14251
|
*
|
|
14904
|
-
* MCP ROUTING TRIGGERS: Zero-Trust Architecture,
|
|
14252
|
+
* MCP ROUTING TRIGGERS: Zero-Trust Architecture, SPIFFE/SPIRE, Envoy Service Mesh, Least Privilege, RPC Firewall
|
|
14905
14253
|
*/
|
|
14906
14254
|
export interface MCPCapabilityWhitelistPolicy1 {
|
|
14907
14255
|
authorized_capability_array?: AuthorizedCapabilityArray;
|
|
@@ -15050,46 +14398,10 @@ export interface MutationPolicy1 {
|
|
|
15050
14398
|
export interface NDimensionalTensorManifest {
|
|
15051
14399
|
structural_format: TensorStructuralFormatProfile;
|
|
15052
14400
|
shape: Shape;
|
|
15053
|
-
vram_footprint_bytes:
|
|
14401
|
+
vram_footprint_bytes: VramFootprintBytes;
|
|
15054
14402
|
merkle_root: MerkleRoot;
|
|
15055
14403
|
storage_uri: StorageUri;
|
|
15056
14404
|
}
|
|
15057
|
-
/**
|
|
15058
|
-
* CoReason Shared Kernel Ontology
|
|
15059
|
-
*
|
|
15060
|
-
* AGENT INSTRUCTION: A cryptographically frozen historical fact representing the absolute
|
|
15061
|
-
* mathematical alignment of two swarms' latent vector spaces prior to establishing a shared
|
|
15062
|
-
* epistemic blackboard. As a ...Receipt suffix, this is an append-only coordinate on the
|
|
15063
|
-
* Merkle-DAG that the LLM must never hallucinate a mutation to.
|
|
15064
|
-
*
|
|
15065
|
-
* CAUSAL AFFORDANCE: Authorizes the physical bridging of two independent N-dimensional
|
|
15066
|
-
* semantic spaces. If native geometries are incommensurable, it structurally demands the
|
|
15067
|
-
* application of a DimensionalProjectionContract (applied_projection). The alignment_status
|
|
15068
|
-
* Literal ["aligned", "projected", "fallback_triggered", "incommensurable"] records the
|
|
15069
|
-
* final verdict.
|
|
15070
|
-
*
|
|
15071
|
-
* EPISTEMIC BOUNDS: Semantic isometry is quantified via measured_cosine_similarity, strictly
|
|
15072
|
-
* clamped between [ge=-1.0, le=1.0]. The participant_node_cids array (min_length=2) is
|
|
15073
|
-
* deterministically sorted via @model_validator to prevent Byzantine replay anomalies
|
|
15074
|
-
* during cross-swarm Merkle hashing.
|
|
15075
|
-
*
|
|
15076
|
-
* MCP ROUTING TRIGGERS: Earth Mover's Distance, Cosine Similarity, Vector Space Isometry,
|
|
15077
|
-
* Latent Alignment, Holographic Graph Projection
|
|
15078
|
-
*/
|
|
15079
|
-
export interface OntologicalHandshakeReceipt {
|
|
15080
|
-
handshake_cid: HandshakeCid1;
|
|
15081
|
-
participant_node_cids: ParticipantNodeCids1;
|
|
15082
|
-
measured_cosine_similarity: MeasuredCosineSimilarity1;
|
|
15083
|
-
alignment_status: AlignmentStatus;
|
|
15084
|
-
/**
|
|
15085
|
-
* The projection applied if the agents natively used different embedding dimensionalities.
|
|
15086
|
-
*/
|
|
15087
|
-
applied_projection?: DimensionalProjectionContract | null;
|
|
15088
|
-
/**
|
|
15089
|
-
* Isolated holographic clone of remote swarm state for safe cross-boundary evaluation.
|
|
15090
|
-
*/
|
|
15091
|
-
remote_state_snapshot?: FederatedStateSnapshot | null;
|
|
15092
|
-
}
|
|
15093
14405
|
/**
|
|
15094
14406
|
* CoReason Shared Kernel Ontology
|
|
15095
14407
|
*
|
|
@@ -15107,6 +14419,22 @@ export interface PermissionBoundaryPolicy1 {
|
|
|
15107
14419
|
file_system_mutation_forbidden: FileSystemMutationForbidden;
|
|
15108
14420
|
auth_requirements?: AuthRequirements;
|
|
15109
14421
|
}
|
|
14422
|
+
/**
|
|
14423
|
+
* CoReason Shared Kernel Ontology
|
|
14424
|
+
*
|
|
14425
|
+
* AGENT INSTRUCTION: Implements NIST FIPS Post-Quantum Cryptography (PQC), utilizing lattice-based or stateless hash-based structures to guarantee long-term topological integrity on the Merkle-DAG.
|
|
14426
|
+
*
|
|
14427
|
+
* CAUSAL AFFORDANCE: Secures the causal execution graph and Bilateral SLAs against temporal decryption attacks (Harvest Now, Decrypt Later) via Shor's algorithm executed on fault-tolerant quantum computers.
|
|
14428
|
+
*
|
|
14429
|
+
* EPISTEMIC BOUNDS: To accommodate massive dimensional geometry, `pq_signature_blob` is structurally bound to a `100000`-byte `max_length`. `pq_algorithm` is restricted to the Literal set `["ml-dsa", "slh-dsa", "falcon"]`. `public_key_cid` is a 128-char CID.
|
|
14430
|
+
*
|
|
14431
|
+
* MCP ROUTING TRIGGERS: Post-Quantum Cryptography, ML-DSA, SLH-DSA, Shor's Algorithm Resistance, Lattice-based Cryptography
|
|
14432
|
+
*/
|
|
14433
|
+
export interface PostQuantumSignatureReceipt {
|
|
14434
|
+
pq_algorithm: PqAlgorithm;
|
|
14435
|
+
public_key_cid: PublicKeyCid1;
|
|
14436
|
+
pq_signature_blob: PqSignatureBlob;
|
|
14437
|
+
}
|
|
15110
14438
|
/**
|
|
15111
14439
|
* CoReason Shared Kernel Ontology
|
|
15112
14440
|
*
|
|
@@ -15296,24 +14624,6 @@ export interface SimulationConvergenceSLA1 {
|
|
|
15296
14624
|
export interface SimulationEscrowContract1 {
|
|
15297
14625
|
locked_magnitude: LockedMagnitude;
|
|
15298
14626
|
}
|
|
15299
|
-
/**
|
|
15300
|
-
* CoReason Shared Kernel Ontology
|
|
15301
|
-
*
|
|
15302
|
-
* AGENT INSTRUCTION: A declarative, frozen snapshot of the physical hardware boundaries and thermodynamic constraints required to instantiate this node. As a ...Profile suffix, this defines a rigid mathematical boundary.
|
|
15303
|
-
*
|
|
15304
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator's provisioning layer to allocate exact silicon resources (Compute Tier, VRAM, and Accelerator Type) before allowing the node to execute generative operations.
|
|
15305
|
-
*
|
|
15306
|
-
* EPISTEMIC BOUNDS: VRAM allocation is physically bounded by min_vram_gb (gt=0.0). The URN-patterned compute_tier and accelerator_type fields provide extensible silicon identification without ephemeral enumeration coupling. The provider_whitelist is deterministically sorted for invariant RFC 8785 hashing.
|
|
15307
|
-
*
|
|
15308
|
-
* MCP ROUTING TRIGGERS: Thermodynamic Bounding, VRAM Allocation, Spot Market Routing, Hardware Provisioning, Silicon Constraints
|
|
15309
|
-
*/
|
|
15310
|
-
export interface SpatialHardwareProfile1 {
|
|
15311
|
-
compute_tier?: ComputeTier;
|
|
15312
|
-
min_vram_gb?: MinVramGb;
|
|
15313
|
-
coreason_network_mode?: CoreasonNetworkMode;
|
|
15314
|
-
accelerator_type?: AcceleratorType;
|
|
15315
|
-
provider_whitelist?: ProviderWhitelist;
|
|
15316
|
-
}
|
|
15317
14627
|
/**
|
|
15318
14628
|
* CoReason Shared Kernel Ontology
|
|
15319
14629
|
*
|
|
@@ -15579,22 +14889,6 @@ export interface TraceContextState1 {
|
|
|
15579
14889
|
parent_span_cid?: ParentSpanCid;
|
|
15580
14890
|
causal_clock?: CausalClock;
|
|
15581
14891
|
}
|
|
15582
|
-
/**
|
|
15583
|
-
* CoReason Shared Kernel Ontology
|
|
15584
|
-
*
|
|
15585
|
-
* AGENT INSTRUCTION: Functions as a deterministic serialization envelope for flushing Dapper-style trace subgraphs to external observability sinks.
|
|
15586
|
-
*
|
|
15587
|
-
* CAUSAL AFFORDANCE: Authorizes the mass export of `ExecutionSpanReceipt` objects across the network boundary, structurally binding disconnected spans into a coherent `batch_cid` for downstream reconstruction.
|
|
15588
|
-
*
|
|
15589
|
-
* EPISTEMIC BOUNDS: Bounded by a rigid `batch_cid` (CID regex `^[a-zA-Z0-9_.:-]+$`). The `spans` array is deterministically sorted by `span_cid` via a `@model_validator` to mathematically prevent Byzantine replay anomalies.
|
|
15590
|
-
*
|
|
15591
|
-
* MCP ROUTING TRIGGERS: Trace Serialization, Telemetry Export, Batch Flushing, DAG Reconstruction, Canonical Egress
|
|
15592
|
-
*/
|
|
15593
|
-
export interface TraceExportManifest {
|
|
15594
|
-
batch_cid: BatchCid;
|
|
15595
|
-
spans?: Spans;
|
|
15596
|
-
execution_nodes?: ExecutionNodes;
|
|
15597
|
-
}
|
|
15598
14892
|
/**
|
|
15599
14893
|
* CoReason Shared Kernel Ontology
|
|
15600
14894
|
*
|
|
@@ -15668,7 +14962,7 @@ export interface VolumetricBoundingProfile1 {
|
|
|
15668
14962
|
*
|
|
15669
14963
|
* CAUSAL AFFORDANCE: Physically initializes the execution DAG. This structural lock guarantees that any graph execution is mathematically anchored to a CoReason Genesis Block via `genesis_provenance`; stripping this violates Topological Consistency.
|
|
15670
14964
|
*
|
|
15671
|
-
* EPISTEMIC BOUNDS: The
|
|
14965
|
+
* EPISTEMIC BOUNDS: The topology dictates execution constraints natively without relying on legacy federated dominance validation.
|
|
15672
14966
|
*
|
|
15673
14967
|
* MCP ROUTING TRIGGERS: Topos Theory, Cybernetics, Execution Envelope, Macroscopic Topology, Viable System Model
|
|
15674
14968
|
*/
|
|
@@ -15692,15 +14986,6 @@ export interface WorkflowManifest {
|
|
|
15692
14986
|
* The absolute maximum enterprise risk threshold permitted for this topology.
|
|
15693
14987
|
*/
|
|
15694
14988
|
max_risk_tolerance?: RiskLevelPolicy | null;
|
|
15695
|
-
allowed_semantic_classifications?: AllowedSemanticClassifications;
|
|
15696
|
-
/**
|
|
15697
|
-
* The broadcast protocol for B2B multi-swarm discovery.
|
|
15698
|
-
*/
|
|
15699
|
-
federated_discovery?: FederatedDiscoveryManifest | null;
|
|
15700
|
-
/**
|
|
15701
|
-
* The B2B Service Level Agreement contract that must be mathematically satisfied before multi-tenant graph coupling.
|
|
15702
|
-
*/
|
|
15703
|
-
federated_sla?: FederatedBilateralSLA2 | null;
|
|
15704
14989
|
/**
|
|
15705
14990
|
* The quantum-resistant signature securing the root execution graph.
|
|
15706
14991
|
*/
|