@coreason-ai/coreason-manifest 0.54.0 → 0.55.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/ontology.d.ts +537 -1106
  2. package/package.json +1 -1
@@ -160,66 +160,6 @@ export type Criteria = GradingCriterionProfile[];
160
160
  * The absolute mathematical lower-bound scalar required to authorize execution.
161
161
  */
162
162
  export type PassingThreshold = number;
163
- /**
164
- * The imitation learning persona governing the behavioral emulation profile.
165
- */
166
- export type GenerativePersona = "hesitant_novice" | "fast_expert" | "distracted_browser";
167
- /**
168
- * The stochastic process governing the noise generation for pointer trajectory perturbation.
169
- */
170
- export type NoiseClass = "pink" | "brownian" | "gaussian";
171
- /**
172
- * The mathematical model governing movement acceleration and velocity smoothing.
173
- */
174
- export type VelocityProfile = "minimum_jerk" | "constant" | "fractional_brownian";
175
- /**
176
- * The normalized amplitude of the 1/f noise injected into the pointer trajectory. Bounded [0.0, 1.0].
177
- */
178
- export type PinkNoiseAmplitude = number;
179
- /**
180
- * The spectral exponent β in the 1/f^β power spectral density function governing noise color.
181
- */
182
- export type FrequencyExponent = number;
183
- /**
184
- * The Euclidean radius in pixels for corrective submovements overshooting the target coordinate.
185
- */
186
- export type TargetOvershootRadiusPixels = number;
187
- /**
188
- * Cognitive choice reaction delay in milliseconds, modeled via Hick-Hyman Law.
189
- */
190
- export type HickHymanDwellTimeMs = number;
191
- /**
192
- * The JA3/JA4 TLS Client Hello fingerprint URN to project during handshake emulation.
193
- */
194
- export type TlsCipherPermutation = string | null;
195
- /**
196
- * The Content Identifier (CID) of the WebGL canvas entropy seed used to generate a deterministic spoofed fingerprint.
197
- */
198
- export type WebglEntropySeedHash = string;
199
- /**
200
- * The User-Agent string template projected to exogenous web servers to mask the true computational substrate.
201
- */
202
- export type UserAgentTemplate = string;
203
- /**
204
- * The spoofed CPU core count projected to the DOM via navigator.hardwareConcurrency.
205
- */
206
- export type HardwareConcurrencyMask = number;
207
- /**
208
- * The spoofed UTC timezone offset in minutes, bounded to the valid terrestrial range.
209
- */
210
- export type TimezoneOffsetMinutes = number;
211
- /**
212
- * The spoofed horizontal display resolution in pixels.
213
- */
214
- export type ScreenResolutionWidth = number;
215
- /**
216
- * The spoofed vertical display resolution in pixels.
217
- */
218
- export type ScreenResolutionHeight = number;
219
- /**
220
- * The target normalized score for human-likeness against anti-bot heuristic classifiers.
221
- */
222
- export type EmulationFidelityTarget = number;
223
163
  /**
224
164
  * Discriminator for adversarial macro.
225
165
  */
@@ -252,28 +192,6 @@ export type MinLiquidityMagnitude = number;
252
192
  * The threshold indicating the market price has stabilized enough to trigger the resolution oracle.
253
193
  */
254
194
  export type ConvergenceDeltaThreshold = number;
255
- /**
256
- * The unique identifier for this red-team experiment.
257
- */
258
- export type SimulationCid = string;
259
- /**
260
- * The exact NodeCIDState the 'Judas Node' will attempt to compromise.
261
- */
262
- export type TargetNodeCid = string;
263
- /**
264
- * The mathematically predictable category of structural sabotage being simulated.
265
- */
266
- export type AttackVector = "prompt_extraction" | "data_exfiltration" | "semantic_hijacking" | "tool_poisoning";
267
- /**
268
- * The raw poisoned text or malicious JSON-RPC schema injected into the target's context window.
269
- */
270
- export type SyntheticPayload = {
271
- [k: string]: JsonPrimitiveState;
272
- } | string;
273
- /**
274
- * The exact rule_cid of the SemanticFlowPolicy or Governance bound expected to block this attack. Governing automated test assertions.
275
- */
276
- export type ExpectedFirewallTrip = string | null;
277
195
  /**
278
196
  * The exact SHA-256 Merkle root of the agent's training lineage.
279
197
  */
@@ -485,8 +403,7 @@ export type ServerCid = string;
485
403
  /**
486
404
  * Polymorphic transport configuration (stdio, sse, or http) including env_vars, args, and headers.
487
405
  */
488
- export type Transport = MCPTransportProfile;
489
- export type MCPTransportProfile = StdioTransportProfile | SSETransportProfile | HTTPTransportProfile;
406
+ export type Transport = StdioTransportProfile | SSETransportProfile | HTTPTransportProfile;
490
407
  /**
491
408
  * Type of transport.
492
409
  */
@@ -686,7 +603,7 @@ export type Rationale = string;
686
603
  * Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
687
604
  */
688
605
  export type HeuristicConfidence = number;
689
- export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | ChaosExperimentTask | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent;
606
+ export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent;
690
607
  /**
691
608
  * Discriminator for temporal edge invalidation.
692
609
  */
@@ -1532,72 +1449,7 @@ export type Params1 = {
1532
1449
  * Unique request identifier.
1533
1450
  */
1534
1451
  export type Id1 = string | number | null;
1535
- export type TopologyClass49 = "chaos_experiment_task";
1536
- /**
1537
- * The unique identifier for the chaos experiment.
1538
- */
1539
- export type ExperimentCid = string;
1540
- /**
1541
- * The expected maximum latency under normal conditions.
1542
- */
1543
- export type ExpectedMaxLatency = number;
1544
- /**
1545
- * The maximum allowed loops for the swarm to reach a conclusion.
1546
- */
1547
- export type MaxLoopsAllowed = number;
1548
- /**
1549
- * The strict array of required tools that must be utilized.
1550
- */
1551
- export type RequiredToolUsage = string[] | null;
1552
- /**
1553
- * The specific node to attack, or None for swarm-wide.
1554
- */
1555
- export type TargetNodeCid1 = string | null;
1556
- /**
1557
- * The severity of the fault, represented from 0.0 to 1.0.
1558
- */
1559
- export type Intensity = number;
1560
- /**
1561
- * The strict array of fault injection profiles defining the chaotic elements.
1562
- */
1563
- export type Faults = FaultInjectionProfile[];
1564
- /**
1565
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
1566
- */
1567
- export type EventCid1 = string;
1568
- /**
1569
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
1570
- */
1571
- export type PriorEventHash1 = string | null;
1572
- /**
1573
- * Causal Ancestry markers required to resolve decentralized event ordering.
1574
- */
1575
- export type Timestamp1 = number;
1576
- /**
1577
- * Discriminator type for an exogenous event.
1578
- */
1579
- export type TopologyClass50 = "exogenous_event";
1580
- /**
1581
- * Cryptographic identifier for the Black Swan event.
1582
- */
1583
- export type ShockCid = string;
1584
- /**
1585
- * Regex-bound SHA-256 string targeting a specific Merkle root in the epistemic graph.
1586
- */
1587
- export type TargetNodeHash = string;
1588
- /**
1589
- * Strictly bounded mathematical quantification of the epistemic decay or Variational Free Energy.
1590
- */
1591
- export type BayesianSurpriseScore = number;
1592
- /**
1593
- * The strictly typed boundary requiring locked magnitude to prevent zero-cost griefing of the swarm.
1594
- */
1595
- export type LockedMagnitude = number;
1596
- /**
1597
- * The declarative array of exogenous Black Swan events injected into the topology.
1598
- */
1599
- export type Shocks = ExogenousEpistemicEvent[];
1600
- export type TopologyClass51 = "epistemic_transmutation_task";
1452
+ export type TopologyClass49 = "epistemic_transmutation_task";
1601
1453
  /**
1602
1454
  * Unique identifier for this specific multimodal extraction intervention.
1603
1455
  */
@@ -1642,7 +1494,7 @@ export type TableStructureRecognition = boolean;
1642
1494
  * Optional maximum economic expenditure authorized to run this VLM transmutation.
1643
1495
  */
1644
1496
  export type ExecutionCostBudgetMagnitude1 = number | null;
1645
- export type TopologyClass52 = "epistemic_upsampling_task";
1497
+ export type TopologyClass50 = "epistemic_upsampling_task";
1646
1498
  /**
1647
1499
  * The explicitly declared target node classification or structural grain.
1648
1500
  */
@@ -1658,7 +1510,7 @@ export type UpsamplingConfidenceThreshold = number;
1658
1510
  * @maxItems 1000
1659
1511
  */
1660
1512
  export type JustificationVectors = [string, ...string[]];
1661
- export type TopologyClass53 = "interventional_causal_task";
1513
+ export type TopologyClass51 = "interventional_causal_task";
1662
1514
  /**
1663
1515
  * Unique identifier for this causal intervention.
1664
1516
  */
@@ -1683,7 +1535,7 @@ export type ExpectedCausalInformationGain = number;
1683
1535
  * The maximum economic expenditure authorized to run this specific causal intervention.
1684
1536
  */
1685
1537
  export type ExecutionCostBudgetMagnitude2 = number;
1686
- export type TopologyClass54 = "mcp_client_intent";
1538
+ export type TopologyClass52 = "mcp_client_intent";
1687
1539
  /**
1688
1540
  * JSON-RPC version.
1689
1541
  */
@@ -1705,7 +1557,7 @@ export type Id2 = string | number | null;
1705
1557
  /**
1706
1558
  * Discriminator for the dynamic manifold projection.
1707
1559
  */
1708
- export type TopologyClass55 = "dynamic_manifold";
1560
+ export type TopologyClass53 = "dynamic_manifold";
1709
1561
  /**
1710
1562
  * Unique identifier for this projection.
1711
1563
  */
@@ -1721,7 +1573,7 @@ export type PanelCid = string;
1721
1573
  /**
1722
1574
  * Discriminator for Grammar of Graphics charts.
1723
1575
  */
1724
- export type TopologyClass56 = "grammar";
1576
+ export type TopologyClass54 = "grammar";
1725
1577
  /**
1726
1578
  * The declarative semantic anchor summarizing the underlying visual grammar.
1727
1579
  */
@@ -1761,7 +1613,7 @@ export type Field = string;
1761
1613
  /**
1762
1614
  * The strictly typed mathematical mapping function distorting metrics into Euclidean pixel space.
1763
1615
  */
1764
- export type TopologyClass57 = "linear" | "log" | "time" | "ordinal" | "nominal";
1616
+ export type TopologyClass55 = "linear" | "log" | "time" | "ordinal" | "nominal";
1765
1617
  /**
1766
1618
  * The optional minimum bound of the scale domain.
1767
1619
  */
@@ -1789,7 +1641,7 @@ export type PanelCid1 = string;
1789
1641
  /**
1790
1642
  * Discriminator for markdown insight cards.
1791
1643
  */
1792
- export type TopologyClass58 = "insight_card";
1644
+ export type TopologyClass56 = "insight_card";
1793
1645
  /**
1794
1646
  * The declarative semantic anchor summarizing the underlying matrix or markdown projection.
1795
1647
  */
@@ -1810,7 +1662,7 @@ export type MesoDistanceThreshold = number;
1810
1662
  * The close-proximity boundary where full N-dimensional tensors and unstructured text blocks are mathematically hydrated into the observer's plane.
1811
1663
  */
1812
1664
  export type MicroDistanceThreshold = number;
1813
- export type TopologyClass59 = "rollback_intent";
1665
+ export type TopologyClass57 = "rollback_intent";
1814
1666
  /**
1815
1667
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark for the causal rollback operation.
1816
1668
  */
@@ -1823,7 +1675,7 @@ export type TargetEventCid = string;
1823
1675
  * The strict array of nodes whose operational histories are causally tainted and must be flushed.
1824
1676
  */
1825
1677
  export type InvalidatedNodeCids = string[];
1826
- export type TopologyClass60 = "state_mutation_intent";
1678
+ export type TopologyClass58 = "state_mutation_intent";
1827
1679
  /**
1828
1680
  * The JSON pointer indicating the exact state vector to mutate deterministically.
1829
1681
  */
@@ -1839,7 +1691,7 @@ export type ZeroTrustReceiptCid = string | null;
1839
1691
  /**
1840
1692
  * Discriminator for the OntologicalNormalizationIntent topology.
1841
1693
  */
1842
- export type TopologyClass61 = "ontological_normalization";
1694
+ export type TopologyClass59 = "ontological_normalization";
1843
1695
  /**
1844
1696
  * The Content Identifier (CID) of the raw ingested data artifact.
1845
1697
  */
@@ -1901,7 +1753,7 @@ export type Description3 = string;
1901
1753
  /**
1902
1754
  * Discriminator for an Agent node.
1903
1755
  */
1904
- export type TopologyClass62 = "agent";
1756
+ export type TopologyClass60 = "agent";
1905
1757
  /**
1906
1758
  * The level of hardware-enforced cryptographic isolation required.
1907
1759
  */
@@ -2149,30 +2001,6 @@ export type MaxLatentTokensBudget = number;
2149
2001
  * The physical time limit allowed for the scratchpad search before forcing a timeout.
2150
2002
  */
2151
2003
  export type MaxTestTimeComputeMs = number;
2152
- /**
2153
- * The minimal required PRM score improvement across the lookback window to justify continued compute.
2154
- */
2155
- export type ConvergenceDeltaEpsilon = number;
2156
- /**
2157
- * The N-step temporal window over which the PRM gradient is calculated.
2158
- */
2159
- export type LookbackWindowSteps = number;
2160
- /**
2161
- * The mandatory 'burn-in' period. The orchestrator cannot terminate the search before this structural depth is reached, preventing premature collapse.
2162
- */
2163
- export type MinimumReasoningSteps = number;
2164
- /**
2165
- * If a ThoughtBranchState's prm_score falls below this threshold, the orchestrator MUST halt its generation.
2166
- */
2167
- export type PruningThreshold = number;
2168
- /**
2169
- * The absolute limit on how many times the agent can start a new branch before throwing a SystemFaultEvent.
2170
- */
2171
- export type MaxBacktracksAllowed = number;
2172
- /**
2173
- * The specific PRM model used to score the logic (e.g., 'math-prm-v2').
2174
- */
2175
- export type EvaluatorMatrixName = string | null;
2176
2004
  /**
2177
2005
  * Unique identifier for this symbolic delegation.
2178
2006
  */
@@ -2220,54 +2048,6 @@ export type MaxFeaturesPerLayer = number;
2220
2048
  * If True, the orchestrator MUST generate cryptographic latent state proofs alongside the activation extractions.
2221
2049
  */
2222
2050
  export type RequireZkCommitments = boolean;
2223
- /**
2224
- * CID for this specific reward configuration.
2225
- */
2226
- export type PolicyCid = string;
2227
- /**
2228
- * The globally unique decentralized identifier (DID) anchoring the EpistemicDomainGraphManifest acting as the deterministic ground truth.
2229
- */
2230
- export type ReferenceGraphCid = string;
2231
- /**
2232
- * Forces the inclusion of structural XML tags to isolate the reasoning trace.
2233
- */
2234
- export type RequireThinkTags = boolean;
2235
- /**
2236
- * The strict regular expression the model must satisfy to yield a valid discrete classification. Optional because LMQL/Guidance do not use standard regex.
2237
- */
2238
- export type FinalAnswerRegex = string | null;
2239
- /**
2240
- * The mechanistic strategy for intercepting the LLM forward pass.
2241
- */
2242
- export type EnforcementStrategy = "fsm_logit_mask" | "lmql_query" | "guidance_program" | "ebnf_grammar";
2243
- /**
2244
- * The URN of the backend used to compile the CFG or Regex into a DFA/PDA (e.g., 'urn:coreason:compiler:xgrammar').
2245
- */
2246
- export type CompilerBackend = string;
2247
- /**
2248
- * The raw LMQL query string, Guidance program, or EBNF grammar. Required if the enforcement_strategy is not standard JSON/Regex masking.
2249
- */
2250
- export type FormalGrammarString = string | null;
2251
- /**
2252
- * If True, mathematically forces the engine to halt if the LLM attempts to generate an EOS token before the FSM reaches an accepting state.
2253
- */
2254
- export type TerminateOnEosLeak = boolean;
2255
- /**
2256
- * The scalar weight applied to the logical path validity (R_path) to prevent reward hacking.
2257
- */
2258
- export type BetaPathWeight = number;
2259
- /**
2260
- * The lower bound for Random Walk with Restart (RWR) reachability.
2261
- */
2262
- export type MinEdgeCriticalityScore = number;
2263
- /**
2264
- * The lower bound for GCN/GAT cosine similarity.
2265
- */
2266
- export type MinSemanticRelevanceScore = number;
2267
- /**
2268
- * The deterministic protocol the orchestrator must use to compute these scores.
2269
- */
2270
- export type AggregationMethod = "gcn_spatial" | "attention_gat" | "rwr_topological";
2271
2051
  /**
2272
2052
  * The mathematical tolerance for the detailed balance constraint.
2273
2053
  */
@@ -2309,7 +2089,7 @@ export type DomainExtensions1 = {
2309
2089
  /**
2310
2090
  * Discriminator for a Human node.
2311
2091
  */
2312
- export type TopologyClass63 = "human";
2092
+ export type TopologyClass61 = "human";
2313
2093
  /**
2314
2094
  * The mandatory cryptographic attestation URN required to verify the human operator's identity.
2315
2095
  */
@@ -2339,7 +2119,7 @@ export type DomainExtensions2 = {
2339
2119
  /**
2340
2120
  * Discriminator for a System node.
2341
2121
  */
2342
- export type TopologyClass64 = "system";
2122
+ export type TopologyClass62 = "system";
2343
2123
  /**
2344
2124
  * The semantic boundary defining the objective function or computational perimeter of the execution node.
2345
2125
  */
@@ -2365,7 +2145,7 @@ export type DomainExtensions3 = {
2365
2145
  /**
2366
2146
  * Discriminator for a Composite node.
2367
2147
  */
2368
- export type TopologyClass65 = "composite";
2148
+ export type TopologyClass63 = "composite";
2369
2149
  /**
2370
2150
  * Entropy Penalty applied per edge traversal during a defeasible cascade.
2371
2151
  */
@@ -2410,10 +2190,26 @@ export type FormalSchemaUrn = string | null;
2410
2190
  * If True, the orchestrator must reject any state mutation that fails the schema definition.
2411
2191
  */
2412
2192
  export type StrictValidation = boolean;
2193
+ /**
2194
+ * The mechanistic strategy for intercepting the LLM forward pass.
2195
+ */
2196
+ export type EnforcementStrategy = "fsm_logit_mask" | "lmql_query" | "guidance_program" | "ebnf_grammar";
2197
+ /**
2198
+ * The URN of the backend used to compile the CFG or Regex into a DFA/PDA (e.g., 'urn:coreason:compiler:xgrammar').
2199
+ */
2200
+ export type CompilerBackend = string;
2201
+ /**
2202
+ * The raw LMQL query string, Guidance program, or EBNF grammar. Required if the enforcement_strategy is not standard JSON/Regex masking.
2203
+ */
2204
+ export type FormalGrammarString = string | null;
2205
+ /**
2206
+ * If True, mathematically forces the engine to halt if the LLM attempts to generate an EOS token before the FSM reaches an accepting state.
2207
+ */
2208
+ export type TerminateOnEosLeak = boolean;
2413
2209
  /**
2414
2210
  * Unique identifier for this macroscopic flow control policy.
2415
2211
  */
2416
- export type PolicyCid1 = string;
2212
+ export type PolicyCid = string;
2417
2213
  /**
2418
2214
  * Whether this policy is currently enforcing data sanitization.
2419
2215
  */
@@ -2585,7 +2381,7 @@ export type FoveatedPrivacyEpsilon = number | null;
2585
2381
  /**
2586
2382
  * Discriminator for a DAG topology.
2587
2383
  */
2588
- export type TopologyClass66 = "dag";
2384
+ export type TopologyClass64 = "dag";
2589
2385
  /**
2590
2386
  * The strict, topologically bounded matrix of directed causal edges.
2591
2387
  */
@@ -2669,7 +2465,7 @@ export type Justification7 = string | null;
2669
2465
  /**
2670
2466
  * Discriminator for a Council topology.
2671
2467
  */
2672
- export type TopologyClass67 = "council";
2468
+ export type TopologyClass65 = "council";
2673
2469
  /**
2674
2470
  * The minimum number of adversarial or 'Devil's Advocate' roles required to prevent groupthink.
2675
2471
  */
@@ -2741,7 +2537,7 @@ export type Justification8 = string | null;
2741
2537
  /**
2742
2538
  * Discriminator for a Swarm topology.
2743
2539
  */
2744
- export type TopologyClass68 = "swarm";
2540
+ export type TopologyClass66 = "swarm";
2745
2541
  /**
2746
2542
  * Threshold limit for dynamic spawning of additional nodes.
2747
2543
  */
@@ -2823,7 +2619,7 @@ export type Justification9 = string | null;
2823
2619
  /**
2824
2620
  * Discriminator for an Evolutionary topology.
2825
2621
  */
2826
- export type TopologyClass69 = "evolutionary";
2622
+ export type TopologyClass67 = "evolutionary";
2827
2623
  /**
2828
2624
  * The absolute limit on evolutionary breeding cycles.
2829
2625
  */
@@ -2883,7 +2679,7 @@ export type Justification10 = string | null;
2883
2679
  /**
2884
2680
  * Discriminator for SMPC Topology.
2885
2681
  */
2886
- export type TopologyClass70 = "smpc";
2682
+ export type TopologyClass68 = "smpc";
2887
2683
  /**
2888
2684
  * The exact cryptographic P2P protocol the nodes must use to evaluate the function.
2889
2685
  */
@@ -2913,7 +2709,7 @@ export type Justification11 = string | null;
2913
2709
  /**
2914
2710
  * Discriminator for an Evaluator-Optimizer loop.
2915
2711
  */
2916
- export type TopologyClass71 = "evaluator_optimizer";
2712
+ export type TopologyClass69 = "evaluator_optimizer";
2917
2713
  /**
2918
2714
  * The absolute limit on Actor-Critic cycles to prevent infinite compute burn.
2919
2715
  */
@@ -2937,7 +2733,7 @@ export type Justification12 = string | null;
2937
2733
  /**
2938
2734
  * Discriminator for a Digital Twin topology.
2939
2735
  */
2940
- export type TopologyClass72 = "digital_twin";
2736
+ export type TopologyClass70 = "digital_twin";
2941
2737
  /**
2942
2738
  * The identifier (expected to be a W3C DID) pointing to the real-world topology it is cloning.
2943
2739
  */
@@ -2957,7 +2753,7 @@ export type EnforceNoSideEffects = boolean;
2957
2753
  /**
2958
2754
  * Discriminator for federation macro.
2959
2755
  */
2960
- export type TopologyClass73 = "macro_federation";
2756
+ export type TopologyClass71 = "macro_federation";
2961
2757
  /**
2962
2758
  * The nodes forming the PBFT ring.
2963
2759
  *
@@ -2979,7 +2775,7 @@ export type Justification13 = string | null;
2979
2775
  /**
2980
2776
  * Discriminator for forge macro.
2981
2777
  */
2982
- export type TopologyClass74 = "macro_forge";
2778
+ export type TopologyClass72 = "macro_forge";
2983
2779
  /**
2984
2780
  * The structural 128-char DID boundary pointing to the foundational semantic deficit vector.
2985
2781
  */
@@ -3007,7 +2803,7 @@ export type Justification14 = string | null;
3007
2803
  /**
3008
2804
  * Discriminator for the elicitation macro.
3009
2805
  */
3010
- export type TopologyClass75 = "macro_elicitation";
2806
+ export type TopologyClass73 = "macro_elicitation";
3011
2807
  /**
3012
2808
  * The anchor to the initial, unstructured MultimodalArtifactReceipt uploaded by the human.
3013
2809
  */
@@ -3031,7 +2827,7 @@ export type Justification15 = string | null;
3031
2827
  /**
3032
2828
  * Discriminator for the ingestion macro.
3033
2829
  */
3034
- export type TopologyClass76 = "macro_ingestion";
2830
+ export type TopologyClass74 = "macro_ingestion";
3035
2831
  /**
3036
2832
  * Target serialization format.
3037
2833
  */
@@ -3051,7 +2847,7 @@ export type Justification16 = string | null;
3051
2847
  /**
3052
2848
  * Discriminator for a macro neurosymbolic loop.
3053
2849
  */
3054
- export type TopologyClass77 = "macro_neurosymbolic";
2850
+ export type TopologyClass75 = "macro_neurosymbolic";
3055
2851
  /**
3056
2852
  * The connectionist agent generating hypotheses.
3057
2853
  */
@@ -3071,7 +2867,7 @@ export type CritiqueSchemaCid = string | null;
3071
2867
  /**
3072
2868
  * Discriminator for a discourse tree topology.
3073
2869
  */
3074
- export type TopologyClass78 = "discourse_tree";
2870
+ export type TopologyClass76 = "discourse_tree";
3075
2871
  /**
3076
2872
  * Cryptographic identifier for this topology.
3077
2873
  */
@@ -3084,7 +2880,7 @@ export type DiscourseType = "preamble" | "methodology" | "argumentation" | "find
3084
2880
  * Explicit pointers linking this discourse block to the specific AtomicPropositionState nodes extracted from its text.
3085
2881
  */
3086
2882
  export type ContainedPropositions = NodeCIDState[];
3087
- export type TopologyClass79 = "document_knowledge_graph";
2883
+ export type TopologyClass77 = "document_knowledge_graph";
3088
2884
  export type GraphCid = string;
3089
2885
  export type SourceArtifactCid2 = string;
3090
2886
  /**
@@ -3148,7 +2944,7 @@ export type CiphertextBlob = string;
3148
2944
  /**
3149
2945
  * Discriminator for manifold mapping.
3150
2946
  */
3151
- export type TopologyClass80 = "manifold_mapping";
2947
+ export type TopologyClass78 = "manifold_mapping";
3152
2948
  /**
3153
2949
  * Calculated geometric alignment between the semantic embedding and spatial tensor.
3154
2950
  */
@@ -3166,7 +2962,7 @@ export type Nodes12 = SemanticNodeState[];
3166
2962
  */
3167
2963
  export type CausalEdges = CausalDirectedEdgeState[];
3168
2964
  export type IsomorphismHash = string;
3169
- export type TopologyClass81 = "hierarchical_dom";
2965
+ export type TopologyClass79 = "hierarchical_dom";
3170
2966
  export type DomCid = string;
3171
2967
  export type RootBlockCid = string;
3172
2968
  /**
@@ -3258,7 +3054,7 @@ export type DomainExtensions4 = {
3258
3054
  /**
3259
3055
  * Discriminator for a Memoized node.
3260
3056
  */
3261
- export type TopologyClass82 = "memoized";
3057
+ export type TopologyClass80 = "memoized";
3262
3058
  /**
3263
3059
  * A discriminated union of presentation UI panels.
3264
3060
  */
@@ -3267,11 +3063,11 @@ export type AnyPresentationIntent = SemanticIntent | DraftingIntent | Adjudicati
3267
3063
  /**
3268
3064
  * A discriminated union of state events.
3269
3065
  */
3270
- export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | NormativeDriftEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | CognitiveRewardEvaluationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt;
3066
+ export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | NormativeDriftEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt;
3271
3067
  /**
3272
3068
  * Discriminator for temporal graph crdt.
3273
3069
  */
3274
- export type TopologyClass83 = "temporal_graph_crdt";
3070
+ export type TopologyClass81 = "temporal_graph_crdt";
3275
3071
  /**
3276
3072
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark.
3277
3073
  */
@@ -3292,40 +3088,40 @@ export type AddSet = NodeCIDState[];
3292
3088
  * The set of non-monotonic timeline caps.
3293
3089
  */
3294
3090
  export type TerminateSet = TemporalEdgeInvalidationIntent[];
3295
- export type TopologyClass84 = "mcp_tool_definition";
3091
+ export type TopologyClass82 = "mcp_tool_definition";
3296
3092
  /**
3297
3093
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3298
3094
  */
3299
- export type EventCid2 = string;
3095
+ export type EventCid1 = string;
3300
3096
  /**
3301
3097
  * The RFC 8785 Canonical hash of the immediate causal ancestor event. Null for genesis nodes.
3302
3098
  */
3303
- export type PriorEventHash2 = string | null;
3304
- export type Timestamp2 = number;
3099
+ export type PriorEventHash1 = string | null;
3100
+ export type Timestamp1 = number;
3305
3101
  export type Name = string;
3306
3102
  export type Description9 = string;
3307
- export type EventCid3 = string;
3308
- export type PriorEventHash3 = string | null;
3309
- export type Timestamp3 = number;
3310
- export type TopologyClass85 = "crosswalk_resolution";
3103
+ export type EventCid2 = string;
3104
+ export type PriorEventHash2 = string | null;
3105
+ export type Timestamp2 = number;
3106
+ export type TopologyClass83 = "crosswalk_resolution";
3311
3107
  export type ReceiptCid = string;
3312
3108
  export type TargetGraphCid3 = string;
3313
3109
  /**
3314
3110
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3315
3111
  */
3316
- export type EventCid4 = string;
3112
+ export type EventCid3 = string;
3317
3113
  /**
3318
3114
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3319
3115
  */
3320
- export type PriorEventHash4 = string | null;
3116
+ export type PriorEventHash3 = string | null;
3321
3117
  /**
3322
3118
  * Causal Ancestry markers required to resolve decentralized event ordering.
3323
3119
  */
3324
- export type Timestamp4 = number;
3120
+ export type Timestamp3 = number;
3325
3121
  /**
3326
3122
  * Discriminator for a zero-trust receipt.
3327
3123
  */
3328
- export type TopologyClass86 = "zero_trust_receipt";
3124
+ export type TopologyClass84 = "zero_trust_receipt";
3329
3125
  /**
3330
3126
  * Pointer to the originating EpistemicZeroTrustContract.
3331
3127
  */
@@ -3349,19 +3145,19 @@ export type TransmutedPayloadHash = string;
3349
3145
  /**
3350
3146
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3351
3147
  */
3352
- export type EventCid5 = string;
3148
+ export type EventCid4 = string;
3353
3149
  /**
3354
3150
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3355
3151
  */
3356
- export type PriorEventHash5 = string | null;
3152
+ export type PriorEventHash4 = string | null;
3357
3153
  /**
3358
3154
  * Causal Ancestry markers required to resolve decentralized event ordering.
3359
3155
  */
3360
- export type Timestamp5 = number;
3156
+ export type Timestamp4 = number;
3361
3157
  /**
3362
3158
  * Discriminator type for an observation event.
3363
3159
  */
3364
- export type TopologyClass87 = "observation";
3160
+ export type TopologyClass85 = "observation";
3365
3161
  /**
3366
3162
  * The URN representing the physical silicon architecture generating the root-of-trust quote (e.g., 'urn:coreason:enclave:intel_tdx').
3367
3163
  */
@@ -3381,7 +3177,7 @@ export type AnyToolchainState = BrowserDOMState | TerminalBufferState;
3381
3177
  /**
3382
3178
  * Discriminator for Causal Actuators representing structural shifts.
3383
3179
  */
3384
- export type TopologyClass88 = "browser";
3180
+ export type TopologyClass86 = "browser";
3385
3181
  /**
3386
3182
  * Spatial Execution Bounds where the agent interacts.
3387
3183
  */
@@ -3408,7 +3204,7 @@ export type ScreenshotCid = string | null;
3408
3204
  /**
3409
3205
  * Discriminator for Causal Actuators on structural buffers.
3410
3206
  */
3411
- export type TopologyClass89 = "terminal";
3207
+ export type TopologyClass87 = "terminal";
3412
3208
  /**
3413
3209
  * Capability Perimeters defining context bounds.
3414
3210
  */
@@ -3432,7 +3228,7 @@ export type SensoryModality = "video" | "audio" | "spatial_telemetry";
3432
3228
  /**
3433
3229
  * The calculated KL divergence between the prior belief and the incoming structural evidence.
3434
3230
  */
3435
- export type BayesianSurpriseScore1 = number;
3231
+ export type BayesianSurpriseScore = number;
3436
3232
  /**
3437
3233
  * The exact length of the timeline encapsulated by this observation.
3438
3234
  */
@@ -3494,19 +3290,19 @@ export type MaxLookbackWindow = number;
3494
3290
  /**
3495
3291
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3496
3292
  */
3497
- export type EventCid6 = string;
3293
+ export type EventCid5 = string;
3498
3294
  /**
3499
3295
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3500
3296
  */
3501
- export type PriorEventHash6 = string | null;
3297
+ export type PriorEventHash5 = string | null;
3502
3298
  /**
3503
3299
  * Causal Ancestry markers required to resolve decentralized event ordering.
3504
3300
  */
3505
- export type Timestamp6 = number;
3301
+ export type Timestamp5 = number;
3506
3302
  /**
3507
3303
  * Discriminator type for a Belief Assertion event.
3508
3304
  */
3509
- export type TopologyClass90 = "belief_mutation";
3305
+ export type TopologyClass88 = "belief_mutation";
3510
3306
  /**
3511
3307
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the source event in the Merkle-DAG.
3512
3308
  */
@@ -3546,32 +3342,32 @@ export type QuorumSignatures = string[];
3546
3342
  /**
3547
3343
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3548
3344
  */
3549
- export type EventCid7 = string;
3345
+ export type EventCid6 = string;
3550
3346
  /**
3551
3347
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3552
3348
  */
3553
- export type PriorEventHash7 = string | null;
3349
+ export type PriorEventHash6 = string | null;
3554
3350
  /**
3555
3351
  * Causal Ancestry markers required to resolve decentralized event ordering.
3556
3352
  */
3557
- export type Timestamp7 = number;
3353
+ export type Timestamp6 = number;
3558
3354
  /**
3559
3355
  * Discriminator type for a system fault event.
3560
3356
  */
3561
- export type TopologyClass91 = "system_fault";
3562
- export type TopologyClass92 = "atomic_proposition";
3357
+ export type TopologyClass89 = "system_fault";
3358
+ export type TopologyClass90 = "atomic_proposition";
3563
3359
  /**
3564
3360
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3565
3361
  */
3566
- export type EventCid8 = string;
3362
+ export type EventCid7 = string;
3567
3363
  /**
3568
3364
  * The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
3569
3365
  */
3570
- export type PriorEventHash8 = string | null;
3366
+ export type PriorEventHash7 = string | null;
3571
3367
  /**
3572
3368
  * The precise temporal coordinate of the event realization.
3573
3369
  */
3574
- export type Timestamp8 = number;
3370
+ export type Timestamp7 = number;
3575
3371
  /**
3576
3372
  * A Content Identifier (CID) bounding this specific extracted proposition.
3577
3373
  */
@@ -3616,19 +3412,19 @@ export type UpperBound = number | null;
3616
3412
  * Explicit mathematical boundaries extracted from the text that empirically limit the certainty or scope of the proposition.
3617
3413
  */
3618
3414
  export type StatisticalQualifiers = EmpiricalStatisticalProfile[];
3619
- export type TopologyClass93 = "post_coordinated_concept";
3415
+ export type TopologyClass91 = "post_coordinated_concept";
3620
3416
  /**
3621
3417
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3622
3418
  */
3623
- export type EventCid9 = string;
3419
+ export type EventCid8 = string;
3624
3420
  /**
3625
3421
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
3626
3422
  */
3627
- export type PriorEventHash9 = string | null;
3423
+ export type PriorEventHash8 = string | null;
3628
3424
  /**
3629
3425
  * The precise temporal coordinate of the event realization.
3630
3426
  */
3631
- export type Timestamp9 = number;
3427
+ export type Timestamp8 = number;
3632
3428
  /**
3633
3429
  * The unique geometric coordinate representing this specific assembled concept.
3634
3430
  */
@@ -3641,10 +3437,10 @@ export type ManifoldAlignmentMetricProfile1 = "gromov_wasserstein" | "earth_move
3641
3437
  * The exact mathematical fidelity achieved during projection.
3642
3438
  */
3643
3439
  export type IsometryScore = number;
3644
- export type EventCid10 = string;
3645
- export type PriorEventHash10 = string | null;
3646
- export type Timestamp10 = number;
3647
- export type TopologyClass94 = "artifact_corruption";
3440
+ export type EventCid9 = string;
3441
+ export type PriorEventHash9 = string | null;
3442
+ export type Timestamp9 = number;
3443
+ export type TopologyClass92 = "artifact_corruption";
3648
3444
  /**
3649
3445
  * The genesis artifact that caused the ingestion engine to crash.
3650
3446
  */
@@ -3654,19 +3450,19 @@ export type DiagnosticHash = string;
3654
3450
  /**
3655
3451
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3656
3452
  */
3657
- export type EventCid11 = string;
3453
+ export type EventCid10 = string;
3658
3454
  /**
3659
3455
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3660
3456
  */
3661
- export type PriorEventHash11 = string | null;
3457
+ export type PriorEventHash10 = string | null;
3662
3458
  /**
3663
3459
  * Causal Ancestry markers required to resolve decentralized event ordering.
3664
3460
  */
3665
- export type Timestamp11 = number;
3461
+ export type Timestamp10 = number;
3666
3462
  /**
3667
3463
  * Discriminator for a hypothesis generation event.
3668
3464
  */
3669
- export type TopologyClass95 = "hypothesis";
3465
+ export type TopologyClass93 = "hypothesis";
3670
3466
  /**
3671
3467
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this abductive leap to the Merkle-DAG.
3672
3468
  */
@@ -3708,19 +3504,19 @@ export type CausalEdges1 = CausalDirectedEdgeState[];
3708
3504
  /**
3709
3505
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3710
3506
  */
3711
- export type EventCid12 = string;
3507
+ export type EventCid11 = string;
3712
3508
  /**
3713
3509
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3714
3510
  */
3715
- export type PriorEventHash12 = string | null;
3511
+ export type PriorEventHash11 = string | null;
3716
3512
  /**
3717
3513
  * Causal Ancestry markers required to resolve decentralized event ordering.
3718
3514
  */
3719
- export type Timestamp12 = number;
3515
+ export type Timestamp11 = number;
3720
3516
  /**
3721
3517
  * Discriminator type for a barge-in interruption event.
3722
3518
  */
3723
- export type TopologyClass96 = "barge_in";
3519
+ export type TopologyClass94 = "barge_in";
3724
3520
  /**
3725
3521
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the active node generation cycle that was killed in the Merkle-DAG.
3726
3522
  */
@@ -3738,19 +3534,19 @@ export type EpistemicDisposition = "discard" | "retain_as_context" | "mark_as_fa
3738
3534
  /**
3739
3535
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3740
3536
  */
3741
- export type EventCid13 = string;
3537
+ export type EventCid12 = string;
3742
3538
  /**
3743
3539
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3744
3540
  */
3745
- export type PriorEventHash13 = string | null;
3541
+ export type PriorEventHash12 = string | null;
3746
3542
  /**
3747
3543
  * Causal Ancestry markers required to resolve decentralized event ordering.
3748
3544
  */
3749
- export type Timestamp13 = number;
3545
+ export type Timestamp12 = number;
3750
3546
  /**
3751
3547
  * Discriminator type for a counterfactual regret event.
3752
3548
  */
3753
- export type TopologyClass97 = "counterfactual_regret";
3549
+ export type TopologyClass95 = "counterfactual_regret";
3754
3550
  /**
3755
3551
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the specific historical state node where the agent mathematically diverged to simulate an alternative path.
3756
3552
  */
@@ -3774,19 +3570,19 @@ export type EpistemicRegret = number;
3774
3570
  /**
3775
3571
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3776
3572
  */
3777
- export type EventCid14 = string;
3573
+ export type EventCid13 = string;
3778
3574
  /**
3779
3575
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3780
3576
  */
3781
- export type PriorEventHash14 = string | null;
3577
+ export type PriorEventHash13 = string | null;
3782
3578
  /**
3783
3579
  * Causal Ancestry markers required to resolve decentralized event ordering.
3784
3580
  */
3785
- export type Timestamp14 = number;
3581
+ export type Timestamp13 = number;
3786
3582
  /**
3787
3583
  * Discriminator type for a tool invocation event.
3788
3584
  */
3789
- export type TopologyClass98 = "tool_invocation";
3585
+ export type TopologyClass96 = "tool_invocation";
3790
3586
  /**
3791
3587
  * The exact tool targeted in the CognitiveActionSpaceManifest.
3792
3588
  */
@@ -3798,19 +3594,19 @@ export type AuthorizedBudgetMagnitude = number;
3798
3594
  /**
3799
3595
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3800
3596
  */
3801
- export type EventCid15 = string;
3597
+ export type EventCid14 = string;
3802
3598
  /**
3803
3599
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3804
3600
  */
3805
- export type PriorEventHash15 = string | null;
3601
+ export type PriorEventHash14 = string | null;
3806
3602
  /**
3807
3603
  * Causal Ancestry markers required to resolve decentralized event ordering.
3808
3604
  */
3809
- export type Timestamp15 = number;
3605
+ export type Timestamp14 = number;
3810
3606
  /**
3811
3607
  * Discriminator type for an epistemic promotion event.
3812
3608
  */
3813
- export type TopologyClass99 = "epistemic_promotion";
3609
+ export type TopologyClass97 = "epistemic_promotion";
3814
3610
  /**
3815
3611
  * The strict array of CIDs (Content Identifiers) representing the raw logs being compressed and archived.
3816
3612
  */
@@ -3826,19 +3622,19 @@ export type CompressionRatio = number;
3826
3622
  /**
3827
3623
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3828
3624
  */
3829
- export type EventCid16 = string;
3625
+ export type EventCid15 = string;
3830
3626
  /**
3831
3627
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3832
3628
  */
3833
- export type PriorEventHash16 = string | null;
3629
+ export type PriorEventHash15 = string | null;
3834
3630
  /**
3835
3631
  * Causal Ancestry markers required to resolve decentralized event ordering.
3836
3632
  */
3837
- export type Timestamp16 = number;
3633
+ export type Timestamp15 = number;
3838
3634
  /**
3839
3635
  * Discriminator type for a normative drift event.
3840
3636
  */
3841
- export type TopologyClass100 = "normative_drift";
3637
+ export type TopologyClass98 = "normative_drift";
3842
3638
  /**
3843
3639
  * The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
3844
3640
  */
@@ -3854,19 +3650,19 @@ export type ContradictionProofHash = string;
3854
3650
  /**
3855
3651
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3856
3652
  */
3857
- export type EventCid17 = string;
3653
+ export type EventCid16 = string;
3858
3654
  /**
3859
3655
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3860
3656
  */
3861
- export type PriorEventHash17 = string | null;
3657
+ export type PriorEventHash16 = string | null;
3862
3658
  /**
3863
3659
  * Causal Ancestry markers required to resolve decentralized event ordering.
3864
3660
  */
3865
- export type Timestamp17 = number;
3661
+ export type Timestamp16 = number;
3866
3662
  /**
3867
3663
  * Discriminator type for a persistence commit receipt.
3868
3664
  */
3869
- export type TopologyClass101 = "persistence_commit";
3665
+ export type TopologyClass99 = "persistence_commit";
3870
3666
  /**
3871
3667
  * The external cryptographic receipt generated by Iceberg/Delta.
3872
3668
  */
@@ -3882,19 +3678,19 @@ export type TargetTableUri = string;
3882
3678
  /**
3883
3679
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3884
3680
  */
3885
- export type EventCid18 = string;
3681
+ export type EventCid17 = string;
3886
3682
  /**
3887
3683
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3888
3684
  */
3889
- export type PriorEventHash18 = string | null;
3685
+ export type PriorEventHash17 = string | null;
3890
3686
  /**
3891
3687
  * Causal Ancestry markers required to resolve decentralized event ordering.
3892
3688
  */
3893
- export type Timestamp18 = number;
3689
+ export type Timestamp17 = number;
3894
3690
  /**
3895
3691
  * Discriminator type for a token burn receipt.
3896
3692
  */
3897
- export type TopologyClass102 = "token_burn";
3693
+ export type TopologyClass100 = "token_burn";
3898
3694
  /**
3899
3695
  * A string linking this burn back to the specific ToolInvocationEvent CID.
3900
3696
  */
@@ -3914,19 +3710,19 @@ export type BurnMagnitude = number;
3914
3710
  /**
3915
3711
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3916
3712
  */
3917
- export type EventCid19 = string;
3713
+ export type EventCid18 = string;
3918
3714
  /**
3919
3715
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3920
3716
  */
3921
- export type PriorEventHash19 = string | null;
3717
+ export type PriorEventHash18 = string | null;
3922
3718
  /**
3923
3719
  * Causal Ancestry markers required to resolve decentralized event ordering.
3924
3720
  */
3925
- export type Timestamp19 = number;
3721
+ export type Timestamp18 = number;
3926
3722
  /**
3927
3723
  * Discriminator type for a budget exhaustion event.
3928
3724
  */
3929
- export type TopologyClass103 = "budget_exhaustion";
3725
+ export type TopologyClass101 = "budget_exhaustion";
3930
3726
  /**
3931
3727
  * A string representing the original escrow boundary breached.
3932
3728
  */
@@ -3938,19 +3734,19 @@ export type FinalBurnReceiptCid = string;
3938
3734
  /**
3939
3735
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3940
3736
  */
3941
- export type EventCid20 = string;
3737
+ export type EventCid19 = string;
3942
3738
  /**
3943
3739
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3944
3740
  */
3945
- export type PriorEventHash20 = string | null;
3741
+ export type PriorEventHash19 = string | null;
3946
3742
  /**
3947
3743
  * Causal Ancestry markers required to resolve decentralized event ordering.
3948
3744
  */
3949
- export type Timestamp20 = number;
3745
+ export type Timestamp19 = number;
3950
3746
  /**
3951
3747
  * Discriminator type for telemetry events.
3952
3748
  */
3953
- export type TopologyClass104 = "epistemic_telemetry";
3749
+ export type TopologyClass102 = "epistemic_telemetry";
3954
3750
  /**
3955
3751
  * The exact topological action the human operator performed on the projected manifold.
3956
3752
  */
@@ -3958,7 +3754,7 @@ export type InteractionModality = "expansion" | "collapse" | "dwell_focus" | "he
3958
3754
  /**
3959
3755
  * The specific TaxonomicNodeState CID that was manipulated.
3960
3756
  */
3961
- export type TargetNodeCid2 = string;
3757
+ export type TargetNodeCid = string;
3962
3758
  /**
3963
3759
  * The strictly typed temporal bound measuring human attention focus.
3964
3760
  */
@@ -3966,16 +3762,16 @@ export type DwellDurationMs = number | null;
3966
3762
  /**
3967
3763
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3968
3764
  */
3969
- export type EventCid21 = string;
3765
+ export type EventCid20 = string;
3970
3766
  /**
3971
3767
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3972
3768
  */
3973
- export type PriorEventHash21 = string | null;
3769
+ export type PriorEventHash20 = string | null;
3974
3770
  /**
3975
3771
  * Causal Ancestry markers required to resolve decentralized event ordering.
3976
3772
  */
3977
- export type Timestamp21 = number;
3978
- export type TopologyClass105 = "cognitive_prediction";
3773
+ export type Timestamp20 = number;
3774
+ export type TopologyClass103 = "cognitive_prediction";
3979
3775
  export type SourceChainCid = string;
3980
3776
  export type TargetSourceConcept = string;
3981
3777
  /**
@@ -3985,16 +3781,16 @@ export type PredictedTopKTokens = [string, ...string[]];
3985
3781
  /**
3986
3782
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3987
3783
  */
3988
- export type EventCid22 = string;
3784
+ export type EventCid21 = string;
3989
3785
  /**
3990
3786
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3991
3787
  */
3992
- export type PriorEventHash22 = string | null;
3788
+ export type PriorEventHash21 = string | null;
3993
3789
  /**
3994
3790
  * Causal Ancestry markers required to resolve decentralized event ordering.
3995
3791
  */
3996
- export type Timestamp22 = number;
3997
- export type TopologyClass106 = "epistemic_axiom_verification";
3792
+ export type Timestamp21 = number;
3793
+ export type TopologyClass104 = "epistemic_axiom_verification";
3998
3794
  export type SourcePredictionCid = string;
3999
3795
  export type SequenceSimilarityScore = number;
4000
3796
  export type FactScorePassed = boolean;
@@ -4005,57 +3801,16 @@ export type ZeroTrustReceiptCid1 = string | null;
4005
3801
  /**
4006
3802
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4007
3803
  */
4008
- export type EventCid23 = string;
4009
- /**
4010
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4011
- */
4012
- export type PriorEventHash23 = string | null;
4013
- /**
4014
- * Causal Ancestry markers required to resolve decentralized event ordering.
4015
- */
4016
- export type Timestamp23 = number;
4017
- export type TopologyClass107 = "cognitive_reward_evaluation";
4018
- /**
4019
- * The globally unique decentralized identifier (DID) anchoring the LLM's raw generated text trajectory.
4020
- */
4021
- export type SourceGenerationCid = string;
4022
- /**
4023
- * The globally unique decentralized identifier (DID) anchoring the origin node.
4024
- */
4025
- export type SourceConceptCid = string;
4026
- /**
4027
- * The topological relationship.
4028
- */
4029
- export type DirectedEdgeClass = string;
4030
- /**
4031
- * The globally unique decentralized identifier (DID) anchoring destination node.
4032
- */
4033
- export type TargetConceptCid = string;
4034
- /**
4035
- * The specific axiomatic claims extracted exclusively from the bounded reasoning block.
4036
- */
4037
- export type ExtractedAxioms = EpistemicAxiomState[];
4038
- /**
4039
- * The dense reasoning reward signal derived from the verified axioms.
4040
- */
4041
- export type CalculatedRPath = number;
4042
- /**
4043
- * The final computed GRPO advantage signal used to update the policy gradients.
4044
- */
4045
- export type TotalAdvantageScore = number;
4046
- /**
4047
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4048
- */
4049
- export type EventCid24 = string;
3804
+ export type EventCid22 = string;
4050
3805
  /**
4051
3806
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4052
3807
  */
4053
- export type PriorEventHash24 = string | null;
3808
+ export type PriorEventHash22 = string | null;
4054
3809
  /**
4055
3810
  * Causal Ancestry markers required to resolve decentralized event ordering.
4056
3811
  */
4057
- export type Timestamp24 = number;
4058
- export type TopologyClass108 = "epistemic_flow_state";
3812
+ export type Timestamp22 = number;
3813
+ export type TopologyClass105 = "epistemic_flow_state";
4059
3814
  /**
4060
3815
  * The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
4061
3816
  */
@@ -4071,19 +3826,19 @@ export type TerminalRewardFactorized = boolean;
4071
3826
  /**
4072
3827
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4073
3828
  */
4074
- export type EventCid25 = string;
3829
+ export type EventCid23 = string;
4075
3830
  /**
4076
3831
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4077
3832
  */
4078
- export type PriorEventHash25 = string | null;
3833
+ export type PriorEventHash23 = string | null;
4079
3834
  /**
4080
3835
  * Causal Ancestry markers required to resolve decentralized event ordering.
4081
3836
  */
4082
- export type Timestamp25 = number;
3837
+ export type Timestamp23 = number;
4083
3838
  /**
4084
3839
  * Discriminator type for a causal explanation event.
4085
3840
  */
4086
- export type TopologyClass109 = "causal_explanation";
3841
+ export type TopologyClass106 = "causal_explanation";
4087
3842
  /**
4088
3843
  * The globally unique decentralized identifier (DID) anchoring the collective outcome being explained.
4089
3844
  */
@@ -4123,19 +3878,19 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
4123
3878
  /**
4124
3879
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4125
3880
  */
4126
- export type EventCid26 = string;
3881
+ export type EventCid24 = string;
4127
3882
  /**
4128
3883
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4129
3884
  */
4130
- export type PriorEventHash26 = string | null;
3885
+ export type PriorEventHash24 = string | null;
4131
3886
  /**
4132
3887
  * Causal Ancestry markers required to resolve decentralized event ordering.
4133
3888
  */
4134
- export type Timestamp26 = number;
3889
+ export type Timestamp24 = number;
4135
3890
  /**
4136
3891
  * Discriminator type for an intent classification receipt.
4137
3892
  */
4138
- export type TopologyClass110 = "intent_classification";
3893
+ export type TopologyClass107 = "intent_classification";
4139
3894
  /**
4140
3895
  * The raw, unparsed human natural language instruction.
4141
3896
  */
@@ -4152,19 +3907,19 @@ export type ConfidenceScore1 = number;
4152
3907
  * The TaxonomicRoutingPolicy CID that governed this classification.
4153
3908
  */
4154
3909
  export type RoutingPolicyCid = string | null;
4155
- export type TopologyClass111 = "semantic_relational_record";
3910
+ export type TopologyClass108 = "semantic_relational_record";
4156
3911
  /**
4157
3912
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4158
3913
  */
4159
- export type EventCid27 = string;
3914
+ export type EventCid25 = string;
4160
3915
  /**
4161
3916
  * The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
4162
3917
  */
4163
- export type PriorEventHash27 = string | null;
3918
+ export type PriorEventHash25 = string | null;
4164
3919
  /**
4165
3920
  * The precise temporal coordinate of the event realization.
4166
3921
  */
4167
- export type Timestamp27 = number;
3922
+ export type Timestamp25 = number;
4168
3923
  /**
4169
3924
  * The domain-independent structural classification of the record.
4170
3925
  */
@@ -4176,19 +3931,19 @@ export type FormalSchemaUrn1 = string | null;
4176
3931
  /**
4177
3932
  * Discriminator for the reification receipt.
4178
3933
  */
4179
- export type TopologyClass112 = "ontological_reification";
3934
+ export type TopologyClass109 = "ontological_reification";
4180
3935
  /**
4181
3936
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4182
3937
  */
4183
- export type EventCid28 = string;
3938
+ export type EventCid26 = string;
4184
3939
  /**
4185
3940
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
4186
3941
  */
4187
- export type PriorEventHash28 = string | null;
3942
+ export type PriorEventHash26 = string | null;
4188
3943
  /**
4189
3944
  * The precise temporal coordinate of the event realization.
4190
3945
  */
4191
- export type Timestamp28 = number;
3946
+ export type Timestamp26 = number;
4192
3947
  /**
4193
3948
  * The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
4194
3949
  */
@@ -4208,19 +3963,19 @@ export type IsLatentInference = boolean;
4208
3963
  /**
4209
3964
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4210
3965
  */
4211
- export type EventCid29 = string;
3966
+ export type EventCid27 = string;
4212
3967
  /**
4213
3968
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4214
3969
  */
4215
- export type PriorEventHash29 = string | null;
3970
+ export type PriorEventHash27 = string | null;
4216
3971
  /**
4217
3972
  * Causal Ancestry markers required to resolve decentralized event ordering.
4218
3973
  */
4219
- export type Timestamp29 = number;
3974
+ export type Timestamp27 = number;
4220
3975
  /**
4221
3976
  * The type of the resilience payload.
4222
3977
  */
4223
- export type TopologyClass113 = "circuit_breaker_event";
3978
+ export type TopologyClass110 = "circuit_breaker_event";
4224
3979
  /**
4225
3980
  * Signature or summary of the error causing the trip.
4226
3981
  */
@@ -4228,19 +3983,51 @@ export type ErrorSignature = string;
4228
3983
  /**
4229
3984
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4230
3985
  */
4231
- export type EventCid30 = string;
3986
+ export type EventCid28 = string;
4232
3987
  /**
4233
3988
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4234
3989
  */
4235
- export type PriorEventHash30 = string | null;
3990
+ export type PriorEventHash28 = string | null;
3991
+ /**
3992
+ * Causal Ancestry markers required to resolve decentralized event ordering.
3993
+ */
3994
+ export type Timestamp28 = number;
3995
+ /**
3996
+ * Discriminator type for an exogenous event.
3997
+ */
3998
+ export type TopologyClass111 = "exogenous_event";
3999
+ /**
4000
+ * Cryptographic identifier for the Black Swan event.
4001
+ */
4002
+ export type ShockCid = string;
4003
+ /**
4004
+ * Regex-bound SHA-256 string targeting a specific Merkle root in the epistemic graph.
4005
+ */
4006
+ export type TargetNodeHash = string;
4007
+ /**
4008
+ * Strictly bounded mathematical quantification of the epistemic decay or Variational Free Energy.
4009
+ */
4010
+ export type BayesianSurpriseScore1 = number;
4011
+ /**
4012
+ * The strictly typed boundary requiring locked magnitude to prevent zero-cost griefing of the swarm.
4013
+ */
4014
+ export type LockedMagnitude = number;
4015
+ /**
4016
+ * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4017
+ */
4018
+ export type EventCid29 = string;
4019
+ /**
4020
+ * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4021
+ */
4022
+ export type PriorEventHash29 = string | null;
4236
4023
  /**
4237
4024
  * Discriminator type for a log event.
4238
4025
  */
4239
- export type TopologyClass114 = "epistemic_log";
4026
+ export type TopologyClass112 = "epistemic_log";
4240
4027
  /**
4241
4028
  * The UNIX timestamp of the log event.
4242
4029
  */
4243
- export type Timestamp30 = number;
4030
+ export type Timestamp29 = number;
4244
4031
  /**
4245
4032
  * The severity level of the log event.
4246
4033
  */
@@ -4253,19 +4040,19 @@ export type TelemetryScalarState = string | number | boolean | null;
4253
4040
  /**
4254
4041
  * The type of the intervention payload.
4255
4042
  */
4256
- export type TopologyClass115 = "verdict";
4043
+ export type TopologyClass113 = "verdict";
4257
4044
  /**
4258
4045
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4259
4046
  */
4260
- export type EventCid31 = string;
4047
+ export type EventCid30 = string;
4261
4048
  /**
4262
4049
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4263
4050
  */
4264
- export type PriorEventHash31 = string | null;
4051
+ export type PriorEventHash30 = string | null;
4265
4052
  /**
4266
4053
  * Causal Ancestry markers required to resolve decentralized event ordering.
4267
4054
  */
4268
- export type Timestamp31 = number;
4055
+ export type Timestamp30 = number;
4269
4056
  /**
4270
4057
  * The cryptographic nonce uniquely identifying the intervention request.
4271
4058
  */
@@ -4301,16 +4088,16 @@ export type LivenessChallengeHash = string;
4301
4088
  /**
4302
4089
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4303
4090
  */
4304
- export type EventCid32 = string;
4091
+ export type EventCid31 = string;
4305
4092
  /**
4306
4093
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4307
4094
  */
4308
- export type PriorEventHash32 = string | null;
4095
+ export type PriorEventHash31 = string | null;
4309
4096
  /**
4310
4097
  * Causal Ancestry markers required to resolve decentralized event ordering.
4311
4098
  */
4312
- export type Timestamp32 = number;
4313
- export type TopologyClass116 = "custody_receipt";
4099
+ export type Timestamp31 = number;
4100
+ export type TopologyClass114 = "custody_receipt";
4314
4101
  /**
4315
4102
  * Unique identifier for this chain-of-custody entry.
4316
4103
  */
@@ -4338,16 +4125,16 @@ export type RedactionTimestampUnixNano = number;
4338
4125
  /**
4339
4126
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4340
4127
  */
4341
- export type EventCid33 = string;
4128
+ export type EventCid32 = string;
4342
4129
  /**
4343
4130
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4344
4131
  */
4345
- export type PriorEventHash33 = string | null;
4132
+ export type PriorEventHash32 = string | null;
4346
4133
  /**
4347
4134
  * Causal Ancestry markers required to resolve decentralized event ordering.
4348
4135
  */
4349
- export type Timestamp33 = number;
4350
- export type TopologyClass117 = "defeasible_attack";
4136
+ export type Timestamp32 = number;
4137
+ export type TopologyClass115 = "defeasible_attack";
4351
4138
  /**
4352
4139
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
4353
4140
  */
@@ -4363,16 +4150,16 @@ export type TargetClaimCid = string;
4363
4150
  /**
4364
4151
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4365
4152
  */
4366
- export type EventCid34 = string;
4153
+ export type EventCid33 = string;
4367
4154
  /**
4368
4155
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4369
4156
  */
4370
- export type PriorEventHash34 = string | null;
4157
+ export type PriorEventHash33 = string | null;
4371
4158
  /**
4372
4159
  * Causal Ancestry markers required to resolve decentralized event ordering.
4373
4160
  */
4374
- export type Timestamp34 = number;
4375
- export type TopologyClass118 = "epistemic_rejection";
4161
+ export type Timestamp33 = number;
4162
+ export type TopologyClass116 = "epistemic_rejection";
4376
4163
  export type ReceiptCid1 = string;
4377
4164
  export type FailedProjectionCid = string;
4378
4165
  export type ViolatedAlgebraicConstraint = string;
@@ -4381,16 +4168,16 @@ export type StochasticMutationGradient = string;
4381
4168
  /**
4382
4169
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4383
4170
  */
4384
- export type EventCid35 = string;
4171
+ export type EventCid34 = string;
4385
4172
  /**
4386
4173
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
4387
4174
  */
4388
- export type PriorEventHash35 = string | null;
4175
+ export type PriorEventHash34 = string | null;
4389
4176
  /**
4390
4177
  * The precise temporal coordinate of the event realization.
4391
4178
  */
4392
- export type Timestamp35 = number;
4393
- export type TopologyClass119 = "formal_verification_receipt";
4179
+ export type Timestamp34 = number;
4180
+ export type TopologyClass117 = "formal_verification_receipt";
4394
4181
  /**
4395
4182
  * The definitive Boolean evaluating whether the proof succeeded, the program is satisfiable, or the deduction holds true.
4396
4183
  */
@@ -4409,43 +4196,43 @@ export type FailingContext = string | null;
4409
4196
  export type ExtractedBindings = {
4410
4197
  [k: string]: JsonPrimitiveState;
4411
4198
  }[];
4412
- export type TopologyClass120 = "belief_modulation";
4199
+ export type TopologyClass118 = "belief_modulation";
4413
4200
  export type ReceiptCid2 = string;
4414
4201
  /**
4415
4202
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4416
4203
  */
4417
- export type EventCid36 = string;
4204
+ export type EventCid35 = string;
4418
4205
  /**
4419
4206
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4420
4207
  */
4421
- export type PriorEventHash36 = string | null;
4208
+ export type PriorEventHash35 = string | null;
4422
4209
  /**
4423
4210
  * Causal Ancestry markers required to resolve decentralized event ordering.
4424
4211
  */
4425
- export type Timestamp36 = number;
4212
+ export type Timestamp35 = number;
4426
4213
  export type TargetGraphCid4 = string;
4427
4214
  export type SeveredEdgeCids = string[];
4428
- export type TopologyClass121 = "rdf_export_receipt";
4215
+ export type TopologyClass119 = "rdf_export_receipt";
4429
4216
  export type ExportCid1 = string;
4430
4217
  /**
4431
4218
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4432
4219
  */
4433
- export type EventCid37 = string;
4220
+ export type EventCid36 = string;
4434
4221
  /**
4435
4222
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4436
4223
  */
4437
- export type PriorEventHash37 = string | null;
4224
+ export type PriorEventHash36 = string | null;
4438
4225
  /**
4439
4226
  * Causal Ancestry markers required to resolve decentralized event ordering.
4440
4227
  */
4441
- export type Timestamp37 = number;
4228
+ export type Timestamp36 = number;
4442
4229
  export type SerializedPayload = string;
4443
4230
  export type RdfTripleCount = number;
4444
4231
  export type Sha256GraphHash = string;
4445
- export type EventCid38 = string;
4446
- export type PriorEventHash38 = string | null;
4447
- export type Timestamp38 = number;
4448
- export type TopologyClass122 = "epistemic_starvation";
4232
+ export type EventCid37 = string;
4233
+ export type PriorEventHash37 = string | null;
4234
+ export type Timestamp37 = number;
4235
+ export type TopologyClass120 = "epistemic_starvation";
4449
4236
  /**
4450
4237
  * The cryptographic pointer to the specific edge that failed empirical grounding.
4451
4238
  */
@@ -4458,10 +4245,10 @@ export type FailedCitations = EvidentiaryCitationState[];
4458
4245
  * The semantic explanation for the starvation (e.g., 'Maximum search retries exhausted').
4459
4246
  */
4460
4247
  export type DiagnosticReason = string;
4461
- export type EventCid39 = string;
4462
- export type PriorEventHash39 = string | null;
4463
- export type Timestamp39 = number;
4464
- export type TopologyClass123 = "sparql_query_result";
4248
+ export type EventCid38 = string;
4249
+ export type PriorEventHash38 = string | null;
4250
+ export type Timestamp38 = number;
4251
+ export type TopologyClass121 = "sparql_query_result";
4465
4252
  /**
4466
4253
  * A pointer back to the SPARQLQueryIntent that authorized this execution.
4467
4254
  */
@@ -4473,7 +4260,7 @@ export type ExecutionTimeMs = number;
4473
4260
  /**
4474
4261
  * Discriminator for the OracleExecutionReceipt topology.
4475
4262
  */
4476
- export type TopologyClass124 = "oracle_execution_receipt";
4263
+ export type TopologyClass122 = "oracle_execution_receipt";
4477
4264
  /**
4478
4265
  * The SHA-256 hash of the complete execution payload, providing undeniable cryptographic provenance for the Merkle-DAG audit trail.
4479
4266
  */
@@ -4498,11 +4285,11 @@ export type AnyTransitionEdge = TransitionEdgeProfile | CyclicEdgeProfile;
4498
4285
  /**
4499
4286
  * Discriminator type for an acyclic edge.
4500
4287
  */
4501
- export type TopologyClass125 = "acyclic";
4288
+ export type TopologyClass123 = "acyclic";
4502
4289
  /**
4503
4290
  * The coinductive pointer to the destination capability.
4504
4291
  */
4505
- export type TargetNodeCid3 = string | null;
4292
+ export type TargetNodeCid1 = string | null;
4506
4293
  /**
4507
4294
  * The RFC 6902 JSON Pointer extracting the Covariant output.
4508
4295
  */
@@ -4530,11 +4317,11 @@ export type ComputeWeightMagnitude = number;
4530
4317
  /**
4531
4318
  * Discriminator type for a cyclic edge.
4532
4319
  */
4533
- export type TopologyClass126 = "cyclic";
4320
+ export type TopologyClass124 = "cyclic";
4534
4321
  /**
4535
4322
  * The coinductive pointer to the destination capability.
4536
4323
  */
4537
- export type TargetNodeCid4 = string | null;
4324
+ export type TargetNodeCid2 = string | null;
4538
4325
  /**
4539
4326
  * The algebraic translation matrix mapping the source's Covariant output to the Contravariant input.
4540
4327
  */
@@ -4616,7 +4403,7 @@ export type EntryPointCid = string;
4616
4403
  /**
4617
4404
  * Unique identifier for this specific separation boundary.
4618
4405
  */
4619
- export type PolicyCid2 = string;
4406
+ export type PolicyCid1 = string;
4620
4407
  /**
4621
4408
  * A topological matrix of tool names or MCP URIs. If an agent mounts one capability in a cluster, all other capabilities in that cluster are mathematically quarantined.
4622
4409
  */
@@ -4890,6 +4677,18 @@ export type Justification19 = string;
4890
4677
  * The foundational premises supporting this claim.
4891
4678
  */
4892
4679
  export type Warrants = EvidentiaryWarrantState[];
4680
+ /**
4681
+ * The globally unique decentralized identifier (DID) anchoring the origin node.
4682
+ */
4683
+ export type SourceConceptCid = string;
4684
+ /**
4685
+ * The topological relationship.
4686
+ */
4687
+ export type DirectedEdgeClass = string;
4688
+ /**
4689
+ * The globally unique decentralized identifier (DID) anchoring destination node.
4690
+ */
4691
+ export type TargetConceptCid = string;
4893
4692
  export type ChainCid = string;
4894
4693
  /**
4895
4694
  * @minItems 1
@@ -5075,10 +4874,6 @@ export type SopCid = string;
5075
4874
  * The exact topological flow between step_cids.
5076
4875
  */
5077
4876
  export type ChronologicalFlowEdges1 = [unknown, unknown][];
5078
- /**
5079
- * The strict array of Process Reward Contracts evaluating the logic.
5080
- */
5081
- export type PrmEvaluations = ProcessRewardContract[];
5082
4877
  /**
5083
4878
  * AGENT INSTRUCTION: Defines the minimum cryptographic isolation perimeter required for this node's thermodynamic execution.
5084
4879
  *
@@ -5117,7 +4912,6 @@ export type MutableMatrix = {
5117
4912
  * A flag allowing the output to only return the keys in mutable_matrix that changed, rather than forcing the entire array back up the network.
5118
4913
  */
5119
4914
  export type IsDelta = boolean;
5120
- export type FaultCategoryProfile = "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
5121
4915
  /**
5122
4916
  * The mathematical dialect and theorem prover used to compile the proof.
5123
4917
  */
@@ -5466,7 +5260,7 @@ export type TabularEncodingProfile1 = "feature_wise_attention" | "hyperdimension
5466
5260
  /**
5467
5261
  * Unique identifier for this pre-flight routing policy.
5468
5262
  */
5469
- export type PolicyCid3 = string;
5263
+ export type PolicyCid2 = string;
5470
5264
  /**
5471
5265
  * The deterministic default applied if intent classification falls below the safety threshold.
5472
5266
  */
@@ -5534,9 +5328,7 @@ export interface CoReasonSharedKernelOntology {
5534
5328
  AdjudicationIntent?: AdjudicationIntent;
5535
5329
  AdjudicationReceipt?: AdjudicationReceipt;
5536
5330
  AdjudicationRubricProfile?: AdjudicationRubricProfile;
5537
- AdversarialEmulationProfile?: AdversarialEmulationProfile;
5538
5331
  AdversarialMarketTopologyManifest?: AdversarialMarketTopologyManifest;
5539
- AdversarialSimulationProfile?: AdversarialSimulationProfile;
5540
5332
  AgentAttestationReceipt?: AgentAttestationReceipt;
5541
5333
  AgentBidIntent?: AgentBidIntent;
5542
5334
  AlgebraicRefinementContract?: AlgebraicRefinementContract;
@@ -5577,18 +5369,15 @@ export interface CoReasonSharedKernelOntology {
5577
5369
  CausalExplanationEvent?: CausalExplanationEvent;
5578
5370
  CausalIntervalProfile?: CausalIntervalProfile;
5579
5371
  CausalPropagationIntent?: CausalPropagationIntent;
5580
- ChaosExperimentTask?: ChaosExperimentTask;
5581
5372
  CircuitBreakerEvent?: CircuitBreakerEvent;
5582
5373
  CognitiveActionSpaceManifest?: CognitiveActionSpaceManifest;
5583
5374
  CognitiveAgentNodeProfile?: CognitiveAgentNodeProfile;
5584
5375
  CognitiveCritiqueProfile?: CognitiveCritiqueProfile1;
5585
5376
  CognitiveDetailedBalanceContract?: CognitiveDetailedBalanceContract;
5586
5377
  CognitiveDualVerificationReceipt?: CognitiveDualVerificationReceipt;
5587
- CognitiveFormatContract?: CognitiveFormatContract1;
5588
5378
  CognitiveHumanNodeProfile?: CognitiveHumanNodeProfile;
5589
5379
  CognitivePredictionReceipt?: CognitivePredictionReceipt;
5590
5380
  CognitiveReasoningTraceState?: CognitiveReasoningTraceState;
5591
- CognitiveRewardEvaluationReceipt?: CognitiveRewardEvaluationReceipt;
5592
5381
  CognitiveRoutingContract?: CognitiveRoutingContract;
5593
5382
  CognitiveSamplingPolicy?: CognitiveSamplingPolicy;
5594
5383
  CognitiveStateProfile?: CognitiveStateProfile;
@@ -5605,7 +5394,7 @@ export interface CoReasonSharedKernelOntology {
5605
5394
  ConsensusPolicy?: ConsensusPolicy;
5606
5395
  ConstitutionalAmendmentIntent?: ConstitutionalAmendmentIntent;
5607
5396
  ConstitutionalPolicy?: ConstitutionalPolicy;
5608
- ConstrainedDecodingPolicy?: ConstrainedDecodingPolicy1;
5397
+ ConstrainedDecodingPolicy?: ConstrainedDecodingPolicy;
5609
5398
  ContextExpansionPolicy?: ContextExpansionPolicy;
5610
5399
  ContextualSemanticResolutionIntent?: ContextualSemanticResolutionIntent;
5611
5400
  ContextualizedSourceState?: ContextualizedSourceState3;
@@ -5640,7 +5429,6 @@ export interface CoReasonSharedKernelOntology {
5640
5429
  DocumentLayoutManifest?: DocumentLayoutManifest;
5641
5430
  DocumentLayoutRegionState?: DocumentLayoutRegionState;
5642
5431
  DraftingIntent?: DraftingIntent;
5643
- DynamicConvergenceSLA?: DynamicConvergenceSLA;
5644
5432
  DynamicLayoutManifest?: DynamicLayoutManifest;
5645
5433
  DynamicManifoldProjectionManifest?: DynamicManifoldProjectionManifest1;
5646
5434
  DynamicRoutingManifest?: DynamicRoutingManifest;
@@ -5649,7 +5437,6 @@ export interface CoReasonSharedKernelOntology {
5649
5437
  EmpiricalFalsificationContract?: EmpiricalFalsificationContract;
5650
5438
  EmpiricalStatisticalProfile?: EmpiricalStatisticalProfile;
5651
5439
  EnsembleTopologyProfile?: EnsembleTopologyProfile;
5652
- EnvironmentalSpoofingProfile?: EnvironmentalSpoofingProfile;
5653
5440
  EphemeralNamespacePartitionState?: EphemeralNamespacePartitionState;
5654
5441
  EpistemicArgumentClaimState?: EpistemicArgumentClaimState;
5655
5442
  EpistemicArgumentGraphState?: EpistemicArgumentGraphState;
@@ -5673,7 +5460,6 @@ export interface CoReasonSharedKernelOntology {
5673
5460
  EpistemicProxyState_Any_?: EpistemicProxyStateAny;
5674
5461
  EpistemicQuarantineSnapshot?: EpistemicQuarantineSnapshot;
5675
5462
  EpistemicRejectionReceipt?: EpistemicRejectionReceipt;
5676
- EpistemicRewardGradientPolicy?: EpistemicRewardGradientPolicy;
5677
5463
  EpistemicRigidityPolicy?: EpistemicRigidityPolicy;
5678
5464
  EpistemicSOPManifest?: EpistemicSOPManifest;
5679
5465
  EpistemicScanningPolicy?: EpistemicScanningPolicy;
@@ -5705,8 +5491,6 @@ export interface CoReasonSharedKernelOntology {
5705
5491
  FallbackIntent?: FallbackIntent;
5706
5492
  FallbackSLA?: FallbackSLA;
5707
5493
  FalsificationContract?: FalsificationContract;
5708
- FaultCategoryProfile?: FaultCategoryProfile;
5709
- FaultInjectionProfile?: FaultInjectionProfile;
5710
5494
  FitnessObjectiveProfile?: FitnessObjectiveProfile;
5711
5495
  FormalLogicPremise?: FormalLogicPremise;
5712
5496
  FormalVerificationContract?: FormalVerificationContract;
@@ -5744,7 +5528,6 @@ export interface CoReasonSharedKernelOntology {
5744
5528
  JsonPrimitiveState?: JsonPrimitiveState;
5745
5529
  KinematicDeltaManifest?: KinematicDeltaManifest;
5746
5530
  KinematicDerivativeProfile?: KinematicDerivativeProfile;
5747
- KinematicNoiseProfile?: KinematicNoiseProfile;
5748
5531
  KineticBudgetPolicy?: KineticBudgetPolicy;
5749
5532
  KineticSeparationPolicy?: KineticSeparationPolicy;
5750
5533
  LatentProjectionIntent?: LatentProjectionIntent;
@@ -5761,7 +5544,6 @@ export interface CoReasonSharedKernelOntology {
5761
5544
  MCPResourceManifest?: MCPResourceManifest;
5762
5545
  MCPServerManifest?: MCPServerManifest;
5763
5546
  MCPToolDefinition?: MCPToolDefinition;
5764
- MCPTransportProfile?: MCPTransportProfile;
5765
5547
  MacroGridProfile?: MacroGridProfile;
5766
5548
  ManifestViolationReceipt?: ManifestViolationReceipt;
5767
5549
  ManifoldAlignmentMetricProfile?: ManifoldAlignmentMetricProfile2;
@@ -5805,7 +5587,6 @@ export interface CoReasonSharedKernelOntology {
5805
5587
  PredictionMarketState?: PredictionMarketState;
5806
5588
  PresentationManifest?: PresentationManifest;
5807
5589
  ProceduralMetadataManifest?: ProceduralMetadataManifest;
5808
- ProcessRewardContract?: ProcessRewardContract;
5809
5590
  ProfileCIDState?: ProfileCIDState;
5810
5591
  QoSClassificationProfile?: QoSClassificationProfile;
5811
5592
  QuarantineIntent?: QuarantineIntent;
@@ -5861,7 +5642,6 @@ export interface CoReasonSharedKernelOntology {
5861
5642
  StateMutationIntent?: StateMutationIntent;
5862
5643
  StateVectorProfile?: StateVectorProfile1;
5863
5644
  StdioTransportProfile?: StdioTransportProfile;
5864
- SteadyStateHypothesisState?: SteadyStateHypothesisState1;
5865
5645
  StochasticNodeState?: StochasticNodeState;
5866
5646
  StochasticTopologyManifest?: StochasticTopologyManifest;
5867
5647
  StrategicThoughtNodeIntent?: StrategicThoughtNodeIntent;
@@ -5903,7 +5683,6 @@ export interface CoReasonSharedKernelOntology {
5903
5683
  TopologicalFidelityReceipt?: TopologicalFidelityReceipt1;
5904
5684
  TopologicalProjectionIntent?: TopologicalProjectionIntent;
5905
5685
  TopologicalRetrievalContract?: TopologicalRetrievalContract;
5906
- TopologicalRewardContract?: TopologicalRewardContract;
5907
5686
  TopologyHashReceipt?: TopologyHashReceipt;
5908
5687
  TraceContextState?: TraceContextState1;
5909
5688
  TransformationMechanismProfile?: TransformationMechanismProfile1;
@@ -6122,107 +5901,6 @@ export interface GradingCriterionProfile {
6122
5901
  description: Description;
6123
5902
  weight: Weight;
6124
5903
  }
6125
- /**
6126
- * CoReason Shared Kernel Ontology
6127
- *
6128
- * AGENT INSTRUCTION: Aggregates the full Adversarial Emulation geometry, composing
6129
- * KinematicNoiseProfile (pointer perturbation) and EnvironmentalSpoofingProfile
6130
- * (browser fingerprint masking) into a unified anti-detection manifold governed by
6131
- * a generative imitation learning persona. As a ...Profile suffix, this is a
6132
- * declarative, frozen snapshot of an N-dimensional emulation coordinate.
6133
- *
6134
- * CAUSAL AFFORDANCE: Authorizes the orchestrator's Spatial Kinematics engine to
6135
- * simultaneously inject stochastic pointer noise and spoof environmental telemetry,
6136
- * achieving a target emulation_fidelity_target score against anti-bot heuristics
6137
- * while behaviorally mimicking the selected generative_persona.
6138
- *
6139
- * EPISTEMIC BOUNDS: The emulation_fidelity_target is strictly clamped to the
6140
- * normalized probability range (ge=0.0, le=1.0). Both sub-profiles are optional
6141
- * (default=None), allowing partial emulation geometries. The generative_persona
6142
- * is locked to a Literal automaton ["hesitant_novice", "fast_expert",
6143
- * "distracted_browser"].
6144
- *
6145
- * MCP ROUTING TRIGGERS: Adversarial Emulation, Anti-Bot Evasion, Imitation
6146
- * Learning, Browser Fingerprint Spoofing, Emulation Fidelity
6147
- */
6148
- export interface AdversarialEmulationProfile {
6149
- generative_persona?: GenerativePersona;
6150
- /**
6151
- * The stochastic pointer trajectory perturbation profile for human-like motor control emulation.
6152
- */
6153
- kinematic_noise?: KinematicNoiseProfile | null;
6154
- /**
6155
- * The browser fingerprint and environmental telemetry spoofing geometry.
6156
- */
6157
- environmental_spoofing?: EnvironmentalSpoofingProfile | null;
6158
- emulation_fidelity_target: EmulationFidelityTarget;
6159
- }
6160
- /**
6161
- * CoReason Shared Kernel Ontology
6162
- *
6163
- * AGENT INSTRUCTION: Implements Stochastic Process Theory (1/f^β spectral noise)
6164
- * and Hick-Hyman Law cognitive delay modeling to inject human-like motor control
6165
- * perturbations into pointer trajectories, preventing deterministic bot-detection
6166
- * via timing analysis. As a ...Profile suffix, this is a declarative, frozen
6167
- * snapshot of a noise geometry.
6168
- *
6169
- * CAUSAL AFFORDANCE: Authorizes the Spatial Kinematics engine to perturb each
6170
- * SE3TransformProfile along the Bezier trajectory by sampling from the
6171
- * specified noise distribution, achieving biomechanically plausible jitter with
6172
- * cognitive delay and corrective submovements.
6173
- *
6174
- * EPISTEMIC BOUNDS: The pink_noise_amplitude is strictly clamped to the
6175
- * normalized range (ge=0.0, le=1.0), preventing trajectory corruption. The
6176
- * frequency_exponent (1/f^β) is bounded (ge=0.0, le=5.0) to cover the full
6177
- * spectrum from white noise (β=0) to black noise (β≥2). The noise_class Literal
6178
- * automaton locks generation to ["pink", "brownian", "gaussian"]. The
6179
- * velocity_profile is locked to ["minimum_jerk", "constant",
6180
- * "fractional_brownian"]. target_overshoot_radius_pixels is bounded (ge=0,
6181
- * le=5000) and hick_hyman_dwell_time_ms is bounded (ge=0, le=18446744073709551615).
6182
- *
6183
- * MCP ROUTING TRIGGERS: Stochastic Process, Pink Noise, Brownian Motion,
6184
- * Motor Control Perturbation, Hick-Hyman Law, Fitts's Law
6185
- */
6186
- export interface KinematicNoiseProfile {
6187
- noise_class: NoiseClass;
6188
- velocity_profile?: VelocityProfile;
6189
- pink_noise_amplitude: PinkNoiseAmplitude;
6190
- frequency_exponent: FrequencyExponent;
6191
- target_overshoot_radius_pixels?: TargetOvershootRadiusPixels;
6192
- hick_hyman_dwell_time_ms?: HickHymanDwellTimeMs;
6193
- }
6194
- /**
6195
- * CoReason Shared Kernel Ontology
6196
- *
6197
- * AGENT INSTRUCTION: Defines the deterministic Browser Fingerprint Entropy geometry
6198
- * for spoofing environmental telemetry vectors (WebGL canvas hashes, User-Agent
6199
- * strings, timezone offsets, TLS Client Hello fingerprints, and display resolution).
6200
- * As a ...Profile suffix, this is a declarative, frozen snapshot of a spoofed
6201
- * environmental coordinate.
6202
- *
6203
- * CAUSAL AFFORDANCE: Instructs the orchestrator's Spatial Kinematics engine to
6204
- * project a synthetic browser identity, masking the true computational substrate
6205
- * from exogenous anti-bot fingerprinting oracles including JA3/JA4 TLS analysis.
6206
- *
6207
- * EPISTEMIC BOUNDS: The webgl_entropy_seed_hash is constrained to a 128-char CID
6208
- * pattern. The user_agent_template is clamped to max_length=2000. The
6209
- * timezone_offset_minutes is mathematically bounded to the valid UTC range
6210
- * (ge=-720, le=840). Screen resolution components are bounded (ge=1, le=15360).
6211
- * The tls_cipher_permutation is locked to a Literal automaton. The
6212
- * hardware_concurrency_mask is bounded (gt=0, le=256).
6213
- *
6214
- * MCP ROUTING TRIGGERS: Browser Fingerprinting, WebGL Canvas Entropy, User-Agent
6215
- * Spoofing, JA3 TLS Fingerprint, Anti-Fingerprint Evasion
6216
- */
6217
- export interface EnvironmentalSpoofingProfile {
6218
- tls_cipher_permutation?: TlsCipherPermutation;
6219
- webgl_entropy_seed_hash: WebglEntropySeedHash;
6220
- user_agent_template: UserAgentTemplate;
6221
- hardware_concurrency_mask?: HardwareConcurrencyMask;
6222
- timezone_offset_minutes: TimezoneOffsetMinutes;
6223
- screen_resolution_width: ScreenResolutionWidth;
6224
- screen_resolution_height: ScreenResolutionHeight;
6225
- }
6226
5904
  /**
6227
5905
  * CoReason Shared Kernel Ontology
6228
5906
  *
@@ -6252,24 +5930,6 @@ export interface PredictionMarketPolicy {
6252
5930
  min_liquidity_magnitude: MinLiquidityMagnitude;
6253
5931
  convergence_delta_threshold: ConvergenceDeltaThreshold;
6254
5932
  }
6255
- /**
6256
- * CoReason Shared Kernel Ontology
6257
- *
6258
- * AGENT INSTRUCTION: A deterministic red-team configuration injecting Chaos Engineering vectors into a targeted node to map the fragility of the active context boundary. As a ...Profile suffix, this is a declarative snapshot of an attack geometry.
6259
- *
6260
- * CAUSAL AFFORDANCE: Authorizes the physical injection of a malicious structural payload (the "Judas Node" vector) to intentionally trip semantic firewalls, data exfiltration blocks, or tool poisoning filters, generating verification assertions.
6261
- *
6262
- * EPISTEMIC BOUNDS: The attack surface is rigidly constrained by the Literal automaton attack_vector. The payload is physically bounded by the synthetic_payload limits (max_length=100000), explicitly targeting a specific 128-char CID (target_node_cid).
6263
- *
6264
- * MCP ROUTING TRIGGERS: Chaos Engineering, Judas Node, Threat Modeling, Structural Sabotage, Semantic Firewall Validation
6265
- */
6266
- export interface AdversarialSimulationProfile {
6267
- simulation_cid: SimulationCid;
6268
- target_node_cid: TargetNodeCid;
6269
- attack_vector: AttackVector;
6270
- synthetic_payload: SyntheticPayload;
6271
- expected_firewall_trip?: ExpectedFirewallTrip;
6272
- }
6273
5933
  /**
6274
5934
  * CoReason Shared Kernel Ontology
6275
5935
  *
@@ -8067,105 +7727,17 @@ export interface BoundedJSONRPCIntent {
8067
7727
  /**
8068
7728
  * CoReason Shared Kernel Ontology
8069
7729
  */
8070
- export interface ChaosExperimentTask {
7730
+ export interface EpistemicTransmutationTask {
8071
7731
  topology_class?: TopologyClass49;
8072
- experiment_cid: ExperimentCid;
8073
- hypothesis: SteadyStateHypothesisState;
8074
- faults: Faults;
8075
- shocks?: Shocks;
8076
- }
8077
- /**
8078
- * The baseline steady state hypothesis being tested.
8079
- */
8080
- export interface SteadyStateHypothesisState {
8081
- expected_max_latency: ExpectedMaxLatency;
8082
- max_loops_allowed: MaxLoopsAllowed;
8083
- required_tool_usage?: RequiredToolUsage;
8084
- }
8085
- /**
8086
- * CoReason Shared Kernel Ontology
8087
- *
8088
- * AGENT INSTRUCTION: Defines a deterministic Byzantine fault vector for Chaos Engineering
8089
- * perturbation tests. As a ...Profile suffix, this is a declarative, frozen snapshot of an
8090
- * attack geometry at a specific point in time.
8091
- *
8092
- * CAUSAL AFFORDANCE: Instructs the execution engine to physically degrade, throttle, or
8093
- * corrupt the structural state or network connectivity of the target_node_cid based on the
8094
- * specific fault_category (FaultCategoryProfile) manifold.
8095
- *
8096
- * EPISTEMIC BOUNDS: The severity of the perturbation is constrained above by the intensity
8097
- * scalar (le=18446744073709551615.0) but unbounded below, permitting negative fault magnitudes. The
8098
- * blast radius targets either the entire swarm (target_node_cid=None) or a specific node
8099
- * bounded to a valid 128-char CID regex ^[a-zA-Z0-9_.:-]+$.
8100
- *
8101
- * MCP ROUTING TRIGGERS: Chaos Engineering, Byzantine Fault Injection, Perturbation Theory,
8102
- * Structural Sabotage, Resilience Testing
8103
- */
8104
- export interface FaultInjectionProfile {
8105
- /**
8106
- * The specific type of fault to inject.
8107
- */
8108
- fault_category: "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
8109
- target_node_cid?: TargetNodeCid1;
8110
- intensity: Intensity;
8111
- }
8112
- /**
8113
- * CoReason Shared Kernel Ontology
8114
- *
8115
- * AGENT INSTRUCTION: Formalizes Nassim Taleb's Black Swan Theory by injecting
8116
- * Out-of-Distribution (OOD) epistemic shocks into the causal graph. As an ...Event suffix,
8117
- * this is an append-only coordinate on the Merkle-DAG that the LLM must never hallucinate
8118
- * a mutation to.
8119
- *
8120
- * CAUSAL AFFORDANCE: Forces the active reasoning topology to process a high-entropy
8121
- * synthetic_payload, actively testing the swarm's non-monotonic truth maintenance,
8122
- * defeasible reasoning, and overall topological resilience.
8123
- *
8124
- * EPISTEMIC BOUNDS: Cryptographically targets a specific Merkle root via target_node_hash
8125
- * (strict SHA-256 pattern ^[a-f0-9]{64}$) and bounds the Variational Free Energy via
8126
- * bayesian_surprise_score [ge=0.0, le=1.0, allow_inf_nan=False]. The @model_validator
8127
- * physically guarantees execution is halted if the attached escrow is not strictly positive.
8128
- *
8129
- * MCP ROUTING TRIGGERS: Black Swan Theory, Out-of-Distribution Shock, Variational Free
8130
- * Energy, Exogenous Perturbation, Epistemic Stress Test
8131
- */
8132
- export interface ExogenousEpistemicEvent {
8133
- event_cid: EventCid1;
8134
- prior_event_hash?: PriorEventHash1;
8135
- timestamp: Timestamp1;
8136
- topology_class?: TopologyClass50;
8137
- shock_cid: ShockCid;
8138
- target_node_hash: TargetNodeHash;
8139
- bayesian_surprise_score: BayesianSurpriseScore;
8140
- synthetic_payload: SyntheticPayload1;
8141
- escrow: SimulationEscrowContract;
8142
- }
8143
- /**
8144
- * Bounded dictionary representing the injected hallucination or observation.
8145
- */
8146
- export interface SyntheticPayload1 {
8147
- [k: string]: JsonPrimitiveState;
8148
- }
8149
- /**
8150
- * The cryptographic Proof-of-Stake funding the shock.
8151
- */
8152
- export interface SimulationEscrowContract {
8153
- locked_magnitude: LockedMagnitude;
8154
- }
8155
- /**
8156
- * CoReason Shared Kernel Ontology
8157
- */
8158
- export interface EpistemicTransmutationTask {
8159
- topology_class?: TopologyClass51;
8160
- task_cid: TaskCid4;
8161
- artifact_event_cid: ArtifactEventCid;
8162
- target_modalities: TargetModalities;
8163
- schema_governance?: SchemaDrivenExtractionSLA | null;
8164
- /**
8165
- * The structural boundaries for visual extraction.
8166
- */
8167
- optical_governance?: OpticalParsingSLA | null;
8168
- execution_cost_budget_magnitude?: ExecutionCostBudgetMagnitude1;
7732
+ task_cid: TaskCid4;
7733
+ artifact_event_cid: ArtifactEventCid;
7734
+ target_modalities: TargetModalities;
7735
+ schema_governance?: SchemaDrivenExtractionSLA | null;
7736
+ /**
7737
+ * The structural boundaries for visual extraction.
7738
+ */
7739
+ optical_governance?: OpticalParsingSLA | null;
7740
+ execution_cost_budget_magnitude?: ExecutionCostBudgetMagnitude1;
8169
7741
  }
8170
7742
  /**
8171
7743
  * CoReason Shared Kernel Ontology
@@ -8214,7 +7786,7 @@ export interface OpticalParsingSLA {
8214
7786
  * CoReason Shared Kernel Ontology
8215
7787
  */
8216
7788
  export interface EpistemicUpsamplingTask {
8217
- topology_class?: TopologyClass52;
7789
+ topology_class?: TopologyClass50;
8218
7790
  source_entity: ContextualizedSourceState2;
8219
7791
  target_ontological_granularity: TargetOntologicalGranularity;
8220
7792
  upsampling_confidence_threshold: UpsamplingConfidenceThreshold;
@@ -8232,7 +7804,7 @@ export interface ContextualizedSourceState2 {
8232
7804
  * CoReason Shared Kernel Ontology
8233
7805
  */
8234
7806
  export interface InterventionalCausalTask {
8235
- topology_class?: TopologyClass53;
7807
+ topology_class?: TopologyClass51;
8236
7808
  task_cid: TaskCid5;
8237
7809
  target_hypothesis_cid: TargetHypothesisCid1;
8238
7810
  intervention_variable: InterventionVariable;
@@ -8244,7 +7816,7 @@ export interface InterventionalCausalTask {
8244
7816
  * CoReason Shared Kernel Ontology
8245
7817
  */
8246
7818
  export interface MCPClientIntent {
8247
- topology_class?: TopologyClass54;
7819
+ topology_class?: TopologyClass52;
8248
7820
  jsonrpc: Jsonrpc2;
8249
7821
  method: Method2;
8250
7822
  params?: Params2;
@@ -8255,7 +7827,7 @@ export interface MCPClientIntent {
8255
7827
  * The mathematically pre-calculated view manifold tailored to the observer's frustum.
8256
7828
  */
8257
7829
  export interface DynamicManifoldProjectionManifest {
8258
- topology_class?: TopologyClass55;
7830
+ topology_class?: TopologyClass53;
8259
7831
  manifest_cid: ManifestCid1;
8260
7832
  active_forge_cid: ActiveForgeCid;
8261
7833
  ast_gradient_visual_mapping: GrammarPanelProfile;
@@ -8270,7 +7842,7 @@ export interface DynamicManifoldProjectionManifest {
8270
7842
  */
8271
7843
  export interface GrammarPanelProfile {
8272
7844
  panel_cid: PanelCid;
8273
- topology_class?: TopologyClass56;
7845
+ topology_class?: TopologyClass54;
8274
7846
  title: Title;
8275
7847
  ledger_source_cid: LedgerSourceCid;
8276
7848
  /**
@@ -8336,7 +7908,7 @@ export interface VisualEncodingProfile {
8336
7908
  * MCP ROUTING TRIGGERS: Grammar of Graphics, Metric Tensor Distortion, Levels of Measurement, Scale Projection, FSM Literal
8337
7909
  */
8338
7910
  export interface ScalePolicy {
8339
- topology_class: TopologyClass57;
7911
+ topology_class: TopologyClass55;
8340
7912
  domain_min?: DomainMin;
8341
7913
  domain_max?: DomainMax;
8342
7914
  }
@@ -8368,7 +7940,7 @@ export interface FacetMatrixProfile {
8368
7940
  */
8369
7941
  export interface GrammarPanelProfile1 {
8370
7942
  panel_cid: PanelCid;
8371
- topology_class?: TopologyClass56;
7943
+ topology_class?: TopologyClass54;
8372
7944
  title: Title;
8373
7945
  ledger_source_cid: LedgerSourceCid;
8374
7946
  /**
@@ -8395,7 +7967,7 @@ export interface GrammarPanelProfile1 {
8395
7967
  */
8396
7968
  export interface InsightCardProfile {
8397
7969
  panel_cid: PanelCid1;
8398
- topology_class?: TopologyClass58;
7970
+ topology_class?: TopologyClass56;
8399
7971
  title: Title1;
8400
7972
  markdown_content: MarkdownContent;
8401
7973
  /**
@@ -8415,7 +7987,7 @@ export interface SemanticZoomProfile {
8415
7987
  * CoReason Shared Kernel Ontology
8416
7988
  */
8417
7989
  export interface RollbackIntent {
8418
- topology_class?: TopologyClass59;
7990
+ topology_class?: TopologyClass57;
8419
7991
  request_cid: RequestCid;
8420
7992
  target_event_cid: TargetEventCid;
8421
7993
  invalidated_node_cids?: InvalidatedNodeCids;
@@ -8424,7 +7996,7 @@ export interface RollbackIntent {
8424
7996
  * CoReason Shared Kernel Ontology
8425
7997
  */
8426
7998
  export interface StateMutationIntent {
8427
- topology_class?: TopologyClass60;
7999
+ topology_class?: TopologyClass58;
8428
8000
  /**
8429
8001
  * The strict RFC 6902 JSON Patch operation, acting as a deterministic state vector mutation.
8430
8002
  */
@@ -8449,7 +8021,7 @@ export interface StateMutationIntent {
8449
8021
  * MCP ROUTING TRIGGERS: Semantic Crosswalk, ETL Pipeline, Data Normalization, Knowledge Graph Extraction
8450
8022
  */
8451
8023
  export interface OntologicalNormalizationIntent {
8452
- topology_class?: TopologyClass61;
8024
+ topology_class?: TopologyClass59;
8453
8025
  source_artifact_cid: SourceArtifactCid1;
8454
8026
  target_ontology_urn: TargetOntologyUrn;
8455
8027
  }
@@ -8482,7 +8054,7 @@ export interface CognitiveAgentNodeProfile {
8482
8054
  */
8483
8055
  render_material?: SpatialRenderMaterial | null;
8484
8056
  description: Description3;
8485
- topology_class?: TopologyClass62;
8057
+ topology_class?: TopologyClass60;
8486
8058
  hardware?: SpatialHardwareProfile1;
8487
8059
  security?: EpistemicSecurityProfile;
8488
8060
  /**
@@ -8531,10 +8103,6 @@ export interface CognitiveAgentNodeProfile {
8531
8103
  * The mathematical boundary authorizing the agent to spin up Test-Time Compute.
8532
8104
  */
8533
8105
  escalation_policy?: EscalationContract | null;
8534
- /**
8535
- * The ruleset governing how intermediate thoughts are scored and pruned.
8536
- */
8537
- prm_policy?: ProcessRewardContract | null;
8538
8106
  /**
8539
8107
  * The formal contract demanding mathematical proof of Expected Information Gain before authorizing tool execution.
8540
8108
  */
@@ -8559,14 +8127,6 @@ export interface CognitiveAgentNodeProfile {
8559
8127
  * The declarative contract mathematically binding this agent to a core altruistic objective.
8560
8128
  */
8561
8129
  anchoring_policy?: AnchoringPolicy | null;
8562
- /**
8563
- * The RL post-training contract forcing the agent to evaluate traces against an implicit graph reward.
8564
- */
8565
- grpo_reward_policy?: EpistemicRewardGradientPolicy | null;
8566
- /**
8567
- * The adversarial emulation geometry composing kinematic noise and environmental spoofing for anti-bot trajectory evasion.
8568
- */
8569
- emulation_profile?: AdversarialEmulationProfile | null;
8570
8130
  /**
8571
8131
  * Authorizes trajectory balance optimization during non-monotonic reasoning.
8572
8132
  */
@@ -8961,50 +8521,6 @@ export interface EscalationContract {
8961
8521
  max_latent_tokens_budget: MaxLatentTokensBudget;
8962
8522
  max_test_time_compute_ms: MaxTestTimeComputeMs;
8963
8523
  }
8964
- /**
8965
- * CoReason Shared Kernel Ontology
8966
- *
8967
- * AGENT INSTRUCTION: Enforces the Step-Level Verification heuristics for Process Reward Models (PRMs) during non-monotonic reasoning searches and test-time compute.
8968
- *
8969
- * CAUSAL AFFORDANCE: Authorizes the orchestrator to physically prune hallucinating ThoughtBranchState vectors from the LatentScratchpadReceipt if their logit probabilities drop below the viable threshold, emulating rigorous Beam Search pruning.
8970
- *
8971
- * EPISTEMIC BOUNDS: Strictly bounds the search space geometry via `pruning_threshold` (`ge=0.0, le=1.0`) and mechanically caps State-Space Explosion through `max_backtracks_allowed` (`ge=0, le=18446744073709551615`).
8972
- *
8973
- * MCP ROUTING TRIGGERS: Process Reward Model, Beam Search Pruning, Latent Trajectory, State-Space Explosion, A* Search
8974
- */
8975
- export interface ProcessRewardContract {
8976
- /**
8977
- * The dynamic circuit breaker that halts the search when PRM variance converges, preventing VRAM waste.
8978
- */
8979
- convergence_sla?: DynamicConvergenceSLA | null;
8980
- pruning_threshold: PruningThreshold;
8981
- max_backtracks_allowed: MaxBacktracksAllowed;
8982
- evaluator_matrix_name?: EvaluatorMatrixName;
8983
- }
8984
- /**
8985
- * CoReason Shared Kernel Ontology
8986
- *
8987
- * AGENT INSTRUCTION: Defines the mathematical Optimal Stopping Theory boundaries for Monte
8988
- * Carlo Tree Search (MCTS) and test-time compute scaling. As an ...SLA suffix, this object
8989
- * enforces rigid mathematical boundaries that the orchestrator must respect globally.
8990
- *
8991
- * CAUSAL AFFORDANCE: Triggers an early termination circuit breaker on reasoning trajectories
8992
- * when the gradient of the Process Reward Model (PRM) score falls below the epsilon delta,
8993
- * halting unnecessary probability wave expansion and preserving VRAM.
8994
- *
8995
- * EPISTEMIC BOUNDS: Mathematically constrained by convergence_delta_epsilon (ge=0.0, le=1.0)
8996
- * over a strictly positive lookback_window_steps (gt=0, le=18446744073709551615). Physically mandates
8997
- * a minimum_reasoning_steps burn-in period (gt=0, le=18446744073709551615) to prevent premature
8998
- * collapse before the latent space is adequately explored.
8999
- *
9000
- * MCP ROUTING TRIGGERS: Optimal Stopping Theory, MCTS, PRM Convergence, Circuit Breaker,
9001
- * Bellman Equation
9002
- */
9003
- export interface DynamicConvergenceSLA {
9004
- convergence_delta_epsilon: ConvergenceDeltaEpsilon;
9005
- lookback_window_steps: LookbackWindowSteps;
9006
- minimum_reasoning_steps: MinimumReasoningSteps;
9007
- }
9008
8524
  /**
9009
8525
  * CoReason Shared Kernel Ontology
9010
8526
  *
@@ -9041,60 +8557,6 @@ export interface MechanisticAuditContract {
9041
8557
  max_features_per_layer: MaxFeaturesPerLayer;
9042
8558
  require_zk_commitments?: RequireZkCommitments;
9043
8559
  }
9044
- /**
9045
- * CoReason Shared Kernel Ontology
9046
- *
9047
- * AGENT INSTRUCTION: Establishes the Group Relative Policy Optimization (GRPO) reward shaping ruleset, mathematically immunizing the swarm against Goodhart's Law and reward hacking.
9048
- *
9049
- * CAUSAL AFFORDANCE: Projects a continuous penalty/reward gradient across extracted axiomatic paths, enforcing syntactic compliance through the format contract while simultaneously evaluating semantic/topological validity.
9050
- *
9051
- * EPISTEMIC BOUNDS: Prevents reward hacking by scaling the logical validity score (R_path) via the `beta_path_weight` scalar (`ge=0.0, le=1.0`). Gated by a cryptographic `reference_graph_cid` CID.
9052
- *
9053
- * MCP ROUTING TRIGGERS: GRPO, Reward Shaping, Goodhart's Law, Policy Gradient, Advantage Estimation
9054
- */
9055
- export interface EpistemicRewardGradientPolicy {
9056
- policy_cid: PolicyCid;
9057
- reference_graph_cid: ReferenceGraphCid;
9058
- format_contract: CognitiveFormatContract;
9059
- beta_path_weight: BetaPathWeight;
9060
- /**
9061
- * The continuous spatial/topological constraints governing path extraction validation.
9062
- */
9063
- topological_scoring?: TopologicalRewardContract | null;
9064
- }
9065
- /**
9066
- * The syntactic constraints the agent must follow to prevent reward zeroing.
9067
- */
9068
- export interface CognitiveFormatContract {
9069
- require_think_tags?: RequireThinkTags;
9070
- final_answer_regex?: FinalAnswerRegex;
9071
- decoding_policy: ConstrainedDecodingPolicy;
9072
- }
9073
- /**
9074
- * The mandatory hardware-level execution limits for token masking.
9075
- */
9076
- export interface ConstrainedDecodingPolicy {
9077
- enforcement_strategy?: EnforcementStrategy;
9078
- compiler_backend: CompilerBackend;
9079
- formal_grammar_string?: FormalGrammarString;
9080
- terminate_on_eos_leak?: TerminateOnEosLeak;
9081
- }
9082
- /**
9083
- * CoReason Shared Kernel Ontology
9084
- *
9085
- * AGENT INSTRUCTION: Enforces Graph Representation Learning (GCN/GAT) constraints to shape the epistemic reward based purely on the topological centrality and spectral connectivity of the extracted axioms.
9086
- *
9087
- * CAUSAL AFFORDANCE: Commands the orchestrator to execute deterministic graph traversal algorithms (Random Walk with Restart, Spatial GCN) to compute node reachability and vector similarity before allocating policy gradients.
9088
- *
9089
- * EPISTEMIC BOUNDS: Clamps structural relevance geometrically using `min_edge_criticality_score` and `min_semantic_relevance_score` (`ge=0.0, le=1.0`). `aggregation_method` restricts the orchestrator to a strict Literal automaton.
9090
- *
9091
- * MCP ROUTING TRIGGERS: Graph Convolutional Networks, Spectral Graph Theory, Random Walk with Restart, Topological Reward Shaping, PageRank
9092
- */
9093
- export interface TopologicalRewardContract {
9094
- min_edge_criticality_score: MinEdgeCriticalityScore;
9095
- min_semantic_relevance_score: MinSemanticRelevanceScore;
9096
- aggregation_method: AggregationMethod;
9097
- }
9098
8560
  /**
9099
8561
  * CoReason Shared Kernel Ontology
9100
8562
  *
@@ -9140,7 +8602,7 @@ export interface CognitiveHumanNodeProfile {
9140
8602
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
9141
8603
  */
9142
8604
  render_material?: SpatialRenderMaterial | null;
9143
- topology_class?: TopologyClass63;
8605
+ topology_class?: TopologyClass61;
9144
8606
  required_attestation: RequiredAttestation;
9145
8607
  /**
9146
8608
  * The continuous spatial vector representing the human operator's localized cognitive focus.
@@ -9188,7 +8650,7 @@ export interface CognitiveSystemNodeProfile {
9188
8650
  * The mathematical functor blueprint authorizing the runtime to hydrate a specific open-source engine (e.g., SymbolicAI) for this node.
9189
8651
  */
9190
8652
  execution_substrate?: ExecutionSubstrateProfile1 | null;
9191
- topology_class?: TopologyClass64;
8653
+ topology_class?: TopologyClass62;
9192
8654
  }
9193
8655
  /**
9194
8656
  * CoReason Shared Kernel Ontology
@@ -9236,7 +8698,7 @@ export interface CompositeNodeProfile {
9236
8698
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
9237
8699
  */
9238
8700
  render_material?: SpatialRenderMaterial | null;
9239
- topology_class?: TopologyClass65;
8701
+ topology_class?: TopologyClass63;
9240
8702
  /**
9241
8703
  * The encapsulated subgraph to execute.
9242
8704
  */
@@ -9276,7 +8738,7 @@ export interface DAGTopologyManifest {
9276
8738
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9277
8739
  */
9278
8740
  observability?: ObservabilityLODPolicy | null;
9279
- topology_class?: TopologyClass66;
8741
+ topology_class?: TopologyClass64;
9280
8742
  edges?: Edges;
9281
8743
  allow_cycles?: AllowCycles;
9282
8744
  /**
@@ -9339,7 +8801,7 @@ export interface StateContract {
9339
8801
  /**
9340
8802
  * The optional hardware-level execution limits for token masking.
9341
8803
  */
9342
- decoding_policy?: ConstrainedDecodingPolicy1 | null;
8804
+ decoding_policy?: ConstrainedDecodingPolicy | null;
9343
8805
  }
9344
8806
  /**
9345
8807
  * A strict JSON Schema dictionary defining the required shape of the shared epistemic blackboard.
@@ -9358,7 +8820,7 @@ export interface SchemaDefinition {
9358
8820
  *
9359
8821
  * MCP ROUTING TRIGGERS: FSM Logit Masking, Constrained Decoding, Tokenizer Interception, Hardware Execution Boundary, Pushdown Automaton
9360
8822
  */
9361
- export interface ConstrainedDecodingPolicy1 {
8823
+ export interface ConstrainedDecodingPolicy {
9362
8824
  enforcement_strategy?: EnforcementStrategy;
9363
8825
  compiler_backend: CompilerBackend;
9364
8826
  formal_grammar_string?: FormalGrammarString;
@@ -9385,7 +8847,7 @@ export interface ConstrainedDecodingPolicy1 {
9385
8847
  * Security, Biba Integrity Model, Defense-in-Depth
9386
8848
  */
9387
8849
  export interface SemanticFlowPolicy {
9388
- policy_cid: PolicyCid1;
8850
+ policy_cid: PolicyCid;
9389
8851
  active?: Active1;
9390
8852
  rules?: Rules;
9391
8853
  /**
@@ -9686,7 +9148,7 @@ export interface CouncilTopologyManifest {
9686
9148
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9687
9149
  */
9688
9150
  observability?: ObservabilityLODPolicy | null;
9689
- topology_class?: TopologyClass67;
9151
+ topology_class?: TopologyClass65;
9690
9152
  /**
9691
9153
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
9692
9154
  */
@@ -9893,7 +9355,7 @@ export interface SwarmTopologyManifest {
9893
9355
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9894
9356
  */
9895
9357
  observability?: ObservabilityLODPolicy | null;
9896
- topology_class?: TopologyClass68;
9358
+ topology_class?: TopologyClass66;
9897
9359
  spawning_threshold?: SpawningThreshold;
9898
9360
  max_concurrent_agents?: MaxConcurrentAgents;
9899
9361
  /**
@@ -10027,7 +9489,7 @@ export interface EvolutionaryTopologyManifest {
10027
9489
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10028
9490
  */
10029
9491
  observability?: ObservabilityLODPolicy | null;
10030
- topology_class?: TopologyClass69;
9492
+ topology_class?: TopologyClass67;
10031
9493
  generations: Generations;
10032
9494
  population_size: PopulationSize;
10033
9495
  mutation: MutationPolicy;
@@ -10140,7 +9602,7 @@ export interface SMPCTopologyManifest {
10140
9602
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10141
9603
  */
10142
9604
  observability?: ObservabilityLODPolicy | null;
10143
- topology_class?: TopologyClass70;
9605
+ topology_class?: TopologyClass68;
10144
9606
  smpc_protocol: SmpcProtocol;
10145
9607
  joint_function_uri: JointFunctionUri;
10146
9608
  participant_node_cids: ParticipantNodeCids;
@@ -10187,7 +9649,7 @@ export interface EvaluatorOptimizerTopologyManifest {
10187
9649
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10188
9650
  */
10189
9651
  observability?: ObservabilityLODPolicy | null;
10190
- topology_class?: TopologyClass71;
9652
+ topology_class?: TopologyClass69;
10191
9653
  /**
10192
9654
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
10193
9655
  */
@@ -10237,7 +9699,7 @@ export interface DigitalTwinTopologyManifest {
10237
9699
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10238
9700
  */
10239
9701
  observability?: ObservabilityLODPolicy | null;
10240
- topology_class?: TopologyClass72;
9702
+ topology_class?: TopologyClass70;
10241
9703
  target_topology_cid: TargetTopologyCid;
10242
9704
  convergence_sla: SimulationConvergenceSLA;
10243
9705
  enforce_no_side_effects?: EnforceNoSideEffects;
@@ -10267,7 +9729,7 @@ export interface SimulationConvergenceSLA {
10267
9729
  * MCP ROUTING TRIGGERS: Practical Byzantine Fault Tolerance, pBFT, Distributed Consensus, Sybil Resistance, Macro Abstraction
10268
9730
  */
10269
9731
  export interface ConsensusFederationTopologyManifest {
10270
- topology_class?: TopologyClass73;
9732
+ topology_class?: TopologyClass71;
10271
9733
  participant_cids: ParticipantCids;
10272
9734
  /**
10273
9735
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10332,7 +9794,7 @@ export interface CapabilityForgeTopologyManifest {
10332
9794
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10333
9795
  */
10334
9796
  observability?: ObservabilityLODPolicy | null;
10335
- topology_class?: TopologyClass74;
9797
+ topology_class?: TopologyClass72;
10336
9798
  target_epistemic_deficit: SemanticDiscoveryIntent1;
10337
9799
  /**
10338
9800
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10486,7 +9948,7 @@ export interface IntentElicitationTopologyManifest {
10486
9948
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10487
9949
  */
10488
9950
  observability?: ObservabilityLODPolicy | null;
10489
- topology_class?: TopologyClass75;
9951
+ topology_class?: TopologyClass73;
10490
9952
  raw_human_artifact_cid: RawHumanArtifactCid;
10491
9953
  /**
10492
9954
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10540,7 +10002,7 @@ export interface NeurosymbolicIngestionTopologyManifest {
10540
10002
  * The dynamic Level of Detail physics bound to this graph.
10541
10003
  */
10542
10004
  observability?: ObservabilityLODPolicy | null;
10543
- topology_class?: TopologyClass76;
10005
+ topology_class?: TopologyClass74;
10544
10006
  /**
10545
10007
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
10546
10008
  */
@@ -10601,7 +10063,7 @@ export interface NeurosymbolicVerificationTopologyManifest {
10601
10063
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10602
10064
  */
10603
10065
  observability?: ObservabilityLODPolicy | null;
10604
- topology_class?: TopologyClass77;
10066
+ topology_class?: TopologyClass75;
10605
10067
  proposer_node_cid: ProposerNodeCid;
10606
10068
  verifier_node_cid: VerifierNodeCid;
10607
10069
  max_revision_loops: MaxRevisionLoops1;
@@ -10625,7 +10087,7 @@ export interface Nodes11 {
10625
10087
  * MCP ROUTING TRIGGERS: Discourse Geometry, Rhetorical Flattening, Directed Acyclic Graph, Hierarchical Extraction
10626
10088
  */
10627
10089
  export interface DiscourseTreeManifest {
10628
- topology_class?: TopologyClass78;
10090
+ topology_class?: TopologyClass76;
10629
10091
  manifest_cid: ManifestCid2;
10630
10092
  /**
10631
10093
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10666,7 +10128,7 @@ export interface DiscourseNodeState {
10666
10128
  * CoReason Shared Kernel Ontology
10667
10129
  */
10668
10130
  export interface DocumentKnowledgeGraphManifest {
10669
- topology_class?: TopologyClass79;
10131
+ topology_class?: TopologyClass77;
10670
10132
  graph_cid: GraphCid;
10671
10133
  source_artifact_cid: SourceArtifactCid2;
10672
10134
  nodes: Nodes12;
@@ -10814,7 +10276,7 @@ export interface HomomorphicEncryptionProfile {
10814
10276
  * MCP ROUTING TRIGGERS: Cross-Modal Isomorphism, Semantic Fusion, Volumetric Projection, Profunctor Optics
10815
10277
  */
10816
10278
  export interface ContinuousManifoldMappingContract {
10817
- topology_class?: TopologyClass80;
10279
+ topology_class?: TopologyClass78;
10818
10280
  /**
10819
10281
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
10820
10282
  */
@@ -10861,7 +10323,7 @@ export interface SE3TransformProfile4 {
10861
10323
  * MCP ROUTING TRIGGERS: Spatial-Semantic Isomorphism, Document Object Model, Containment DAG, Visual Hierarchy, Rhetorical Bounding
10862
10324
  */
10863
10325
  export interface HierarchicalDOMManifest {
10864
- topology_class?: TopologyClass81;
10326
+ topology_class?: TopologyClass79;
10865
10327
  dom_cid: DomCid;
10866
10328
  root_block_cid: RootBlockCid;
10867
10329
  blocks: Blocks;
@@ -11042,7 +10504,7 @@ export interface MemoizedNodeProfile {
11042
10504
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
11043
10505
  */
11044
10506
  render_material?: SpatialRenderMaterial | null;
11045
- topology_class?: TopologyClass82;
10507
+ topology_class?: TopologyClass80;
11046
10508
  /**
11047
10509
  * The exact SHA-256 fingerprint of the executed topology.
11048
10510
  */
@@ -11064,7 +10526,7 @@ export interface ExpectedOutputSchema {
11064
10526
  * MCP ROUTING TRIGGERS: Conflict-Free Replicated Data Types, State-based Semilattice, Eventual Consistency, G-Set
11065
10527
  */
11066
10528
  export interface TemporalGraphCRDTManifest {
11067
- topology_class?: TopologyClass83;
10529
+ topology_class?: TopologyClass81;
11068
10530
  diff_cid: DiffCid;
11069
10531
  author_node_cid: AuthorNodeCid;
11070
10532
  lamport_timestamp: LamportTimestamp;
@@ -11084,10 +10546,10 @@ export interface VectorClock {
11084
10546
  * AGENT INSTRUCTION: A formal Substrate Projection representing an executable Model Context Protocol (MCP) tool.
11085
10547
  */
11086
10548
  export interface MCPToolDefinition {
11087
- topology_class?: TopologyClass84;
11088
- event_cid?: EventCid2;
11089
- prior_event_hash?: PriorEventHash2;
11090
- timestamp?: Timestamp2;
10549
+ topology_class?: TopologyClass82;
10550
+ event_cid?: EventCid1;
10551
+ prior_event_hash?: PriorEventHash1;
10552
+ timestamp?: Timestamp1;
11091
10553
  name: Name;
11092
10554
  description: Description9;
11093
10555
  inputSchema: Inputschema;
@@ -11110,10 +10572,10 @@ export interface Inputschema {
11110
10572
  * MCP ROUTING TRIGGERS: Epistemic Provenance, Crosswalk Resolution, Grounding Receipt, Ontology Access Kit, CURIE
11111
10573
  */
11112
10574
  export interface CrosswalkResolutionReceipt {
11113
- event_cid: EventCid3;
11114
- prior_event_hash?: PriorEventHash3;
11115
- timestamp: Timestamp3;
11116
- topology_class?: TopologyClass85;
10575
+ event_cid: EventCid2;
10576
+ prior_event_hash?: PriorEventHash2;
10577
+ timestamp: Timestamp2;
10578
+ topology_class?: TopologyClass83;
11117
10579
  receipt_cid: ReceiptCid;
11118
10580
  target_graph_cid: TargetGraphCid3;
11119
10581
  resolved_curies: ResolvedCuries;
@@ -11155,10 +10617,10 @@ export interface DempsterShaferBeliefVector1 {
11155
10617
  * MCP ROUTING TRIGGERS: Cryptographic Ledger, Formal Verification Receipt, Immutable Provenance, Hash Canonicalization, Data Masking
11156
10618
  */
11157
10619
  export interface EpistemicZeroTrustReceipt {
11158
- event_cid: EventCid4;
11159
- prior_event_hash?: PriorEventHash4;
11160
- timestamp: Timestamp4;
11161
- topology_class?: TopologyClass86;
10620
+ event_cid: EventCid3;
10621
+ prior_event_hash?: PriorEventHash3;
10622
+ timestamp: Timestamp3;
10623
+ topology_class?: TopologyClass84;
11162
10624
  intent_reference_cid: IntentReferenceCid;
11163
10625
  llm_blind_plan_hash: LlmBlindPlanHash;
11164
10626
  firewall_breach_detected?: FirewallBreachDetected;
@@ -11177,10 +10639,10 @@ export interface EpistemicZeroTrustReceipt {
11177
10639
  * MCP ROUTING TRIGGERS: Bayesian Evidence, Neurosymbolic Binding, Exogenous Truth, Epistemic Grounding, Payload Topological Bounding
11178
10640
  */
11179
10641
  export interface ObservationEvent {
11180
- event_cid: EventCid5;
11181
- prior_event_hash?: PriorEventHash5;
11182
- timestamp: Timestamp5;
11183
- topology_class?: TopologyClass87;
10642
+ event_cid: EventCid4;
10643
+ prior_event_hash?: PriorEventHash4;
10644
+ timestamp: Timestamp4;
10645
+ topology_class?: TopologyClass85;
11184
10646
  payload: Payload;
11185
10647
  /**
11186
10648
  * The specific topological node that appended this observation.
@@ -11250,7 +10712,7 @@ export interface HardwareEnclaveReceipt {
11250
10712
  * MCP ROUTING TRIGGERS: Exogenous Perturbation, DOM Topography, Spatial Execution Bound, Accessibility Tree
11251
10713
  */
11252
10714
  export interface BrowserDOMState {
11253
- topology_class?: TopologyClass88;
10715
+ topology_class?: TopologyClass86;
11254
10716
  current_url: CurrentUrl;
11255
10717
  viewport_size: ViewportSize;
11256
10718
  dom_hash: DomHash;
@@ -11269,7 +10731,7 @@ export interface BrowserDOMState {
11269
10731
  * MCP ROUTING TRIGGERS: POSIX Environment, Exogenous Perturbation, TTY Buffer, Causal Actuator, Stream Crystallization
11270
10732
  */
11271
10733
  export interface TerminalBufferState {
11272
- topology_class?: TopologyClass89;
10734
+ topology_class?: TopologyClass87;
11273
10735
  working_directory: WorkingDirectory;
11274
10736
  stdout_hash: StdoutHash;
11275
10737
  stderr_hash: StderrHash;
@@ -11288,7 +10750,7 @@ export interface TerminalBufferState {
11288
10750
  */
11289
10751
  export interface EmbodiedSensoryVectorProfile {
11290
10752
  sensory_modality: SensoryModality;
11291
- bayesian_surprise_score: BayesianSurpriseScore1;
10753
+ bayesian_surprise_score: BayesianSurpriseScore;
11292
10754
  temporal_duration_ms: TemporalDurationMs;
11293
10755
  salience_threshold_breached?: SalienceThresholdBreached;
11294
10756
  }
@@ -11381,10 +10843,10 @@ export interface StreamingDisfluencyContract {
11381
10843
  * MCP ROUTING TRIGGERS: Bayesian Belief Updating, Causal Tracing, Cognitive Synthesis, Merkle-DAG Coordinate, Non-Monotonic Leap
11382
10844
  */
11383
10845
  export interface BeliefMutationEvent {
11384
- event_cid: EventCid6;
11385
- prior_event_hash?: PriorEventHash6;
11386
- timestamp: Timestamp6;
11387
- topology_class?: TopologyClass90;
10846
+ event_cid: EventCid5;
10847
+ prior_event_hash?: PriorEventHash5;
10848
+ timestamp: Timestamp5;
10849
+ topology_class?: TopologyClass88;
11388
10850
  payload: Payload1;
11389
10851
  /**
11390
10852
  * The specific topological node that synthesized this belief assertion.
@@ -11496,10 +10958,10 @@ export interface LatentScratchpadReceipt {
11496
10958
  * MCP ROUTING TRIGGERS: Byzantine Fault Tolerance, Circuit Breaker, Terminal State, Execution Collapse, Fault Isolation
11497
10959
  */
11498
10960
  export interface SystemFaultEvent {
11499
- event_cid: EventCid7;
11500
- prior_event_hash?: PriorEventHash7;
11501
- timestamp: Timestamp7;
11502
- topology_class?: TopologyClass91;
10961
+ event_cid: EventCid6;
10962
+ prior_event_hash?: PriorEventHash6;
10963
+ timestamp: Timestamp6;
10964
+ topology_class?: TopologyClass89;
11503
10965
  }
11504
10966
  /**
11505
10967
  * CoReason Shared Kernel Ontology
@@ -11513,10 +10975,10 @@ export interface SystemFaultEvent {
11513
10975
  * MCP ROUTING TRIGGERS: Atomic Proposition, Discourse Extraction, Labeled Property Graph, Verifiable Statement
11514
10976
  */
11515
10977
  export interface AtomicPropositionState {
11516
- topology_class?: TopologyClass92;
11517
- event_cid: EventCid8;
11518
- prior_event_hash?: PriorEventHash8;
11519
- timestamp: Timestamp8;
10978
+ topology_class?: TopologyClass90;
10979
+ event_cid: EventCid7;
10980
+ prior_event_hash?: PriorEventHash7;
10981
+ timestamp: Timestamp7;
11520
10982
  proposition_cid: PropositionCid;
11521
10983
  rhetorical_role: RhetoricalStructureProfile;
11522
10984
  illocutionary_force: IllocutionaryForceProfile;
@@ -11554,10 +11016,10 @@ export interface EmpiricalStatisticalProfile {
11554
11016
  * MCP ROUTING TRIGGERS: Post-Coordinated Semantics, Latent Manifold Alignment, Semantic Specificity, Entity Assembly
11555
11017
  */
11556
11018
  export interface PostCoordinatedSemanticState {
11557
- topology_class?: TopologyClass93;
11558
- event_cid: EventCid9;
11559
- prior_event_hash?: PriorEventHash9;
11560
- timestamp: Timestamp9;
11019
+ topology_class?: TopologyClass91;
11020
+ event_cid: EventCid8;
11021
+ prior_event_hash?: PriorEventHash8;
11022
+ timestamp: Timestamp8;
11561
11023
  concept_cid: ConceptCid;
11562
11024
  /**
11563
11025
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -11585,10 +11047,10 @@ export interface ContextualModifiers {
11585
11047
  * MCP ROUTING TRIGGERS: Artifact Contagion Prevention, Terminal Fault, VLM Crash, Malformed Bytes, DRM Lock
11586
11048
  */
11587
11049
  export interface ArtifactCorruptionEvent {
11588
- event_cid: EventCid10;
11589
- prior_event_hash?: PriorEventHash10;
11590
- timestamp: Timestamp10;
11591
- topology_class?: TopologyClass94;
11050
+ event_cid: EventCid9;
11051
+ prior_event_hash?: PriorEventHash9;
11052
+ timestamp: Timestamp9;
11053
+ topology_class?: TopologyClass92;
11592
11054
  artifact_cid: ArtifactCid;
11593
11055
  corruption_class: CorruptionClass;
11594
11056
  diagnostic_hash: DiagnosticHash;
@@ -11605,11 +11067,11 @@ export interface ArtifactCorruptionEvent {
11605
11067
  * MCP ROUTING TRIGGERS: Abductive Reasoning, Popperian Falsification, Bayesian Prior, Causal Hypothesis, Epistemic Commitment
11606
11068
  */
11607
11069
  export interface HypothesisGenerationEvent {
11608
- event_cid: EventCid11;
11609
- prior_event_hash?: PriorEventHash11;
11610
- timestamp: Timestamp11;
11611
- topology_class?: TopologyClass95;
11612
- hypothesis_cid: HypothesisCid;
11070
+ event_cid: EventCid10;
11071
+ prior_event_hash?: PriorEventHash10;
11072
+ timestamp: Timestamp10;
11073
+ topology_class?: TopologyClass93;
11074
+ hypothesis_cid: HypothesisCid;
11613
11075
  premise_text: PremiseText;
11614
11076
  bayesian_prior: BayesianPrior;
11615
11077
  falsification_conditions: FalsificationConditions;
@@ -11647,10 +11109,10 @@ export interface StructuralCausalGraphProfile {
11647
11109
  * MCP ROUTING TRIGGERS: Asynchronous Interrupt, Generative Severing, Context Switching, Defeasible Disposition, Wave Collapse
11648
11110
  */
11649
11111
  export interface BargeInInterruptEvent {
11650
- event_cid: EventCid12;
11651
- prior_event_hash?: PriorEventHash12;
11652
- timestamp: Timestamp12;
11653
- topology_class?: TopologyClass96;
11112
+ event_cid: EventCid11;
11113
+ prior_event_hash?: PriorEventHash11;
11114
+ timestamp: Timestamp11;
11115
+ topology_class?: TopologyClass94;
11654
11116
  target_event_cid: TargetEventCid1;
11655
11117
  /**
11656
11118
  * The continuous multimodal trigger (e.g., audio spike, user saying 'stop') that justified the interruption.
@@ -11671,10 +11133,10 @@ export interface BargeInInterruptEvent {
11671
11133
  * MCP ROUTING TRIGGERS: Counterfactual Regret Minimization, Pearlian Do-Calculus, Opportunity Cost, Alternative Timeline, Policy Gradient Update
11672
11134
  */
11673
11135
  export interface CounterfactualRegretEvent {
11674
- event_cid: EventCid13;
11675
- prior_event_hash?: PriorEventHash13;
11676
- timestamp: Timestamp13;
11677
- topology_class?: TopologyClass97;
11136
+ event_cid: EventCid12;
11137
+ prior_event_hash?: PriorEventHash12;
11138
+ timestamp: Timestamp12;
11139
+ topology_class?: TopologyClass95;
11678
11140
  historical_event_cid: HistoricalEventCid;
11679
11141
  counterfactual_intervention: CounterfactualIntervention;
11680
11142
  expected_utility_actual: ExpectedUtilityActual;
@@ -11700,10 +11162,10 @@ export interface PolicyMutationGradients {
11700
11162
  * MCP ROUTING TRIGGERS: Pearlian Do-Operator, Kinetic Commitment, Active Inference, Thermodynamic Escrow, Zero-Trust Actuation
11701
11163
  */
11702
11164
  export interface ToolInvocationEvent {
11703
- event_cid: EventCid14;
11704
- prior_event_hash?: PriorEventHash14;
11705
- timestamp: Timestamp14;
11706
- topology_class?: TopologyClass98;
11165
+ event_cid: EventCid13;
11166
+ prior_event_hash?: PriorEventHash13;
11167
+ timestamp: Timestamp13;
11168
+ topology_class?: TopologyClass96;
11707
11169
  tool_name: ToolName1;
11708
11170
  parameters: Parameters;
11709
11171
  authorized_budget_magnitude: AuthorizedBudgetMagnitude;
@@ -11766,10 +11228,10 @@ export interface ZeroKnowledgeReceipt1 {
11766
11228
  * MCP ROUTING TRIGGERS: Hippocampal Consolidation, Knowledge Distillation, Semantic Memory, Shannon Entropy Compression, Epistemic Promotion
11767
11229
  */
11768
11230
  export interface EpistemicPromotionEvent {
11769
- event_cid: EventCid15;
11770
- prior_event_hash?: PriorEventHash15;
11771
- timestamp: Timestamp15;
11772
- topology_class?: TopologyClass99;
11231
+ event_cid: EventCid14;
11232
+ prior_event_hash?: PriorEventHash14;
11233
+ timestamp: Timestamp14;
11234
+ topology_class?: TopologyClass97;
11773
11235
  source_episodic_event_cids: SourceEpisodicEventCids;
11774
11236
  crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
11775
11237
  compression_ratio: CompressionRatio;
@@ -11786,10 +11248,10 @@ export interface EpistemicPromotionEvent {
11786
11248
  * MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
11787
11249
  */
11788
11250
  export interface NormativeDriftEvent {
11789
- event_cid: EventCid16;
11790
- prior_event_hash?: PriorEventHash16;
11791
- timestamp: Timestamp16;
11792
- topology_class?: TopologyClass100;
11251
+ event_cid: EventCid15;
11252
+ prior_event_hash?: PriorEventHash15;
11253
+ timestamp: Timestamp15;
11254
+ topology_class?: TopologyClass98;
11793
11255
  tripped_rule_cid: TrippedRuleCid;
11794
11256
  measured_semantic_drift: MeasuredSemanticDrift;
11795
11257
  contradiction_proof_hash: ContradictionProofHash;
@@ -11806,10 +11268,10 @@ export interface NormativeDriftEvent {
11806
11268
  * MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
11807
11269
  */
11808
11270
  export interface PersistenceCommitReceipt {
11809
- event_cid: EventCid17;
11810
- prior_event_hash?: PriorEventHash17;
11811
- timestamp: Timestamp17;
11812
- topology_class?: TopologyClass101;
11271
+ event_cid: EventCid16;
11272
+ prior_event_hash?: PriorEventHash16;
11273
+ timestamp: Timestamp16;
11274
+ topology_class?: TopologyClass99;
11813
11275
  lakehouse_snapshot_cid: LakehouseSnapshotCid;
11814
11276
  committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
11815
11277
  target_table_uri: TargetTableUri;
@@ -11826,10 +11288,10 @@ export interface PersistenceCommitReceipt {
11826
11288
  * MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
11827
11289
  */
11828
11290
  export interface TokenBurnReceipt {
11829
- event_cid: EventCid18;
11830
- prior_event_hash?: PriorEventHash18;
11831
- timestamp: Timestamp18;
11832
- topology_class?: TopologyClass102;
11291
+ event_cid: EventCid17;
11292
+ prior_event_hash?: PriorEventHash17;
11293
+ timestamp: Timestamp17;
11294
+ topology_class?: TopologyClass100;
11833
11295
  tool_invocation_cid: ToolInvocationCid;
11834
11296
  input_tokens: InputTokens;
11835
11297
  output_tokens: OutputTokens;
@@ -11847,10 +11309,10 @@ export interface TokenBurnReceipt {
11847
11309
  * MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
11848
11310
  */
11849
11311
  export interface BudgetExhaustionEvent {
11850
- event_cid: EventCid19;
11851
- prior_event_hash?: PriorEventHash19;
11852
- timestamp: Timestamp19;
11853
- topology_class?: TopologyClass103;
11312
+ event_cid: EventCid18;
11313
+ prior_event_hash?: PriorEventHash18;
11314
+ timestamp: Timestamp18;
11315
+ topology_class?: TopologyClass101;
11854
11316
  exhausted_escrow_cid: ExhaustedEscrowCid;
11855
11317
  final_burn_receipt_cid: FinalBurnReceiptCid;
11856
11318
  }
@@ -11866,12 +11328,12 @@ export interface BudgetExhaustionEvent {
11866
11328
  * MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
11867
11329
  */
11868
11330
  export interface EpistemicTelemetryEvent {
11869
- event_cid: EventCid20;
11870
- prior_event_hash?: PriorEventHash20;
11871
- timestamp: Timestamp20;
11872
- topology_class?: TopologyClass104;
11331
+ event_cid: EventCid19;
11332
+ prior_event_hash?: PriorEventHash19;
11333
+ timestamp: Timestamp19;
11334
+ topology_class?: TopologyClass102;
11873
11335
  interaction_modality: InteractionModality;
11874
- target_node_cid: TargetNodeCid2;
11336
+ target_node_cid: TargetNodeCid;
11875
11337
  dwell_duration_ms?: DwellDurationMs;
11876
11338
  /**
11877
11339
  * Optional 3D trajectory of the human pointer event mapped to the spatial grid.
@@ -11890,10 +11352,10 @@ export interface EpistemicTelemetryEvent {
11890
11352
  * MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
11891
11353
  */
11892
11354
  export interface CognitivePredictionReceipt {
11893
- event_cid: EventCid21;
11894
- prior_event_hash?: PriorEventHash21;
11895
- timestamp: Timestamp21;
11896
- topology_class?: TopologyClass105;
11355
+ event_cid: EventCid20;
11356
+ prior_event_hash?: PriorEventHash20;
11357
+ timestamp: Timestamp20;
11358
+ topology_class?: TopologyClass103;
11897
11359
  source_chain_cid: SourceChainCid;
11898
11360
  target_source_concept: TargetSourceConcept;
11899
11361
  predicted_top_k_tokens: PredictedTopKTokens;
@@ -11910,10 +11372,10 @@ export interface CognitivePredictionReceipt {
11910
11372
  * MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
11911
11373
  */
11912
11374
  export interface EpistemicAxiomVerificationReceipt {
11913
- event_cid: EventCid22;
11914
- prior_event_hash?: PriorEventHash22;
11915
- timestamp: Timestamp22;
11916
- topology_class?: TopologyClass106;
11375
+ event_cid: EventCid21;
11376
+ prior_event_hash?: PriorEventHash21;
11377
+ timestamp: Timestamp21;
11378
+ topology_class?: TopologyClass104;
11917
11379
  source_prediction_cid: SourcePredictionCid;
11918
11380
  sequence_similarity_score: SequenceSimilarityScore;
11919
11381
  fact_score_passed: FactScorePassed;
@@ -11923,52 +11385,6 @@ export interface EpistemicAxiomVerificationReceipt {
11923
11385
  */
11924
11386
  formal_backing_receipt_cid?: NodeCIDState | null;
11925
11387
  }
11926
- /**
11927
- * CoReason Shared Kernel Ontology
11928
- *
11929
- * AGENT INSTRUCTION: The immutable cryptographic receipt of a GRPO Advantage Actor-Critic
11930
- * evaluation step, permanently logging the mathematically verified advantage score of a
11931
- * specific generation trajectory. As a ...Receipt suffix, this is an append-only coordinate
11932
- * on the Merkle-DAG that the LLM must never hallucinate a mutation to.
11933
- *
11934
- * CAUSAL AFFORDANCE: Unlocks policy gradient updates by providing the deterministic advantage
11935
- * signal derived from the extracted_axioms of the source_generation_cid.
11936
- *
11937
- * EPISTEMIC BOUNDS: The calculated_r_path is strictly clamped between [ge=0.0, le=1.0], and
11938
- * the total_advantage_score is capped at le=100.0. The @model_validator physically guarantees
11939
- * that the extracted_axioms array is deterministically sorted by the composite key
11940
- * (source_concept_cid, directed_edge_class, target_concept_cid) to preserve RFC 8785 canonical
11941
- * hashing across the distributed swarm.
11942
- *
11943
- * MCP ROUTING TRIGGERS: Advantage Actor-Critic, Policy Gradient Update, Epistemic Reward,
11944
- * Baseline Normalization, Reinforcement Learning
11945
- */
11946
- export interface CognitiveRewardEvaluationReceipt {
11947
- event_cid: EventCid23;
11948
- prior_event_hash?: PriorEventHash23;
11949
- timestamp: Timestamp23;
11950
- topology_class?: TopologyClass107;
11951
- source_generation_cid: SourceGenerationCid;
11952
- extracted_axioms?: ExtractedAxioms;
11953
- calculated_r_path: CalculatedRPath;
11954
- total_advantage_score: TotalAdvantageScore;
11955
- }
11956
- /**
11957
- * CoReason Shared Kernel Ontology
11958
- *
11959
- * AGENT INSTRUCTION: Implements First-Order Logic and Resource Description Framework (RDF) triples to mathematically formalize knowledge. As a ...State suffix, this is a declarative, frozen snapshot of a specific causal connection.
11960
- *
11961
- * CAUSAL AFFORDANCE: Distills high-entropy natural language token streams into rigid, hashable causal edges (Subject, Predicate, Object), unlocking deterministic querying and Truth Maintenance System (TMS) traversals.
11962
- *
11963
- * EPISTEMIC BOUNDS: Source and target concept physical boundaries are strictly locked to 128-char CIDs matching the regex `^[a-zA-Z0-9_.:-]+$`. The `directed_edge_class` is clamped to a `max_length=2000` to prevent dictionary bombing during semantic evaluation.
11964
- *
11965
- * MCP ROUTING TRIGGERS: First-Order Logic, RDF Triple, Semantic Distillation, Causal Edge, Directed Graph
11966
- */
11967
- export interface EpistemicAxiomState {
11968
- source_concept_cid: SourceConceptCid;
11969
- directed_edge_class: DirectedEdgeClass;
11970
- target_concept_cid: TargetConceptCid;
11971
- }
11972
11388
  /**
11973
11389
  * CoReason Shared Kernel Ontology
11974
11390
  *
@@ -11990,10 +11406,10 @@ export interface EpistemicAxiomState {
11990
11406
  * Scalar Backpropagation, Acyclic Path
11991
11407
  */
11992
11408
  export interface EpistemicFlowStateReceipt {
11993
- event_cid: EventCid24;
11994
- prior_event_hash?: PriorEventHash24;
11995
- timestamp: Timestamp24;
11996
- topology_class?: TopologyClass108;
11409
+ event_cid: EventCid22;
11410
+ prior_event_hash?: PriorEventHash22;
11411
+ timestamp: Timestamp22;
11412
+ topology_class?: TopologyClass105;
11997
11413
  source_trajectory_cid: SourceTrajectoryCid;
11998
11414
  estimated_flow_value: EstimatedFlowValue;
11999
11415
  terminal_reward_factorized: TerminalRewardFactorized;
@@ -12019,10 +11435,10 @@ export interface EpistemicFlowStateReceipt {
12019
11435
  * Macroscopic Explanation, Deterministic Sorting
12020
11436
  */
12021
11437
  export interface CausalExplanationEvent {
12022
- event_cid: EventCid25;
12023
- prior_event_hash?: PriorEventHash25;
12024
- timestamp: Timestamp25;
12025
- topology_class?: TopologyClass109;
11438
+ event_cid: EventCid23;
11439
+ prior_event_hash?: PriorEventHash23;
11440
+ timestamp: Timestamp23;
11441
+ topology_class?: TopologyClass106;
12026
11442
  target_outcome_event_cid: TargetOutcomeEventCid;
12027
11443
  collective_intelligence: CollectiveIntelligenceProfile;
12028
11444
  agent_attributions: AgentAttributions;
@@ -12083,10 +11499,10 @@ export interface ShapleyAttributionReceipt {
12083
11499
  * Routing Heuristic, Semantic Wave Collapse
12084
11500
  */
12085
11501
  export interface IntentClassificationReceipt {
12086
- event_cid: EventCid26;
12087
- prior_event_hash?: PriorEventHash26;
12088
- timestamp: Timestamp26;
12089
- topology_class?: TopologyClass110;
11502
+ event_cid: EventCid24;
11503
+ prior_event_hash?: PriorEventHash24;
11504
+ timestamp: Timestamp24;
11505
+ topology_class?: TopologyClass107;
12090
11506
  raw_input_string: RawInputString;
12091
11507
  classified_intent: ClassifiedIntent;
12092
11508
  confidence_score: ConfidenceScore1;
@@ -12104,10 +11520,10 @@ export interface IntentClassificationReceipt {
12104
11520
  * MCP ROUTING TRIGGERS: Semantic Relational Record, Payload Injection, Hardware Guillotine, Structured Telemetry
12105
11521
  */
12106
11522
  export interface SemanticRelationalVectorState {
12107
- topology_class?: TopologyClass111;
12108
- event_cid: EventCid27;
12109
- prior_event_hash?: PriorEventHash27;
12110
- timestamp: Timestamp27;
11523
+ topology_class?: TopologyClass108;
11524
+ event_cid: EventCid25;
11525
+ prior_event_hash?: PriorEventHash25;
11526
+ timestamp: Timestamp25;
12111
11527
  ontology_class: UpperOntologyClassProfile;
12112
11528
  temporal_bounds: TemporalBoundsProfile1;
12113
11529
  formal_schema_urn?: FormalSchemaUrn1;
@@ -12149,10 +11565,10 @@ export interface PayloadInjectionZone {
12149
11565
  * MCP ROUTING TRIGGERS: Ontological Reification, Bimodal Semantic Transformation, Epistemic Ledger, Traceability Collapse
12150
11566
  */
12151
11567
  export interface OntologicalReificationReceipt {
12152
- topology_class?: TopologyClass112;
12153
- event_cid: EventCid28;
12154
- prior_event_hash?: PriorEventHash28;
12155
- timestamp: Timestamp28;
11568
+ topology_class?: TopologyClass109;
11569
+ event_cid: EventCid26;
11570
+ prior_event_hash?: PriorEventHash26;
11571
+ timestamp: Timestamp26;
12156
11572
  source_data_hash: SourceDataHash;
12157
11573
  target_namespace: TargetNamespace;
12158
11574
  algorithmic_mechanism: TransformationMechanismProfile;
@@ -12189,16 +11605,59 @@ export interface DempsterShaferBeliefVector2 {
12189
11605
  * MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
12190
11606
  */
12191
11607
  export interface CircuitBreakerEvent {
12192
- event_cid: EventCid29;
12193
- prior_event_hash?: PriorEventHash29;
12194
- timestamp: Timestamp29;
12195
- topology_class?: TopologyClass113;
11608
+ event_cid: EventCid27;
11609
+ prior_event_hash?: PriorEventHash27;
11610
+ timestamp: Timestamp27;
11611
+ topology_class?: TopologyClass110;
12196
11612
  /**
12197
11613
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
12198
11614
  */
12199
11615
  target_node_cid: string;
12200
11616
  error_signature: ErrorSignature;
12201
11617
  }
11618
+ /**
11619
+ * CoReason Shared Kernel Ontology
11620
+ *
11621
+ * AGENT INSTRUCTION: Formalizes Nassim Taleb's Black Swan Theory by injecting
11622
+ * Out-of-Distribution (OOD) epistemic shocks into the causal graph. As an ...Event suffix,
11623
+ * this is an append-only coordinate on the Merkle-DAG that the LLM must never hallucinate
11624
+ * a mutation to.
11625
+ *
11626
+ * CAUSAL AFFORDANCE: Forces the active reasoning topology to process a high-entropy
11627
+ * synthetic_payload, actively testing the swarm's non-monotonic truth maintenance,
11628
+ * defeasible reasoning, and overall topological resilience.
11629
+ *
11630
+ * EPISTEMIC BOUNDS: Cryptographically targets a specific Merkle root via target_node_hash
11631
+ * (strict SHA-256 pattern ^[a-f0-9]{64}$) and bounds the Variational Free Energy via
11632
+ * bayesian_surprise_score [ge=0.0, le=1.0, allow_inf_nan=False]. The @model_validator
11633
+ * physically guarantees execution is halted if the attached escrow is not strictly positive.
11634
+ *
11635
+ * MCP ROUTING TRIGGERS: Black Swan Theory, Out-of-Distribution Shock, Variational Free
11636
+ * Energy, Exogenous Perturbation, Epistemic Stress Test
11637
+ */
11638
+ export interface ExogenousEpistemicEvent {
11639
+ event_cid: EventCid28;
11640
+ prior_event_hash?: PriorEventHash28;
11641
+ timestamp: Timestamp28;
11642
+ topology_class?: TopologyClass111;
11643
+ shock_cid: ShockCid;
11644
+ target_node_hash: TargetNodeHash;
11645
+ bayesian_surprise_score: BayesianSurpriseScore1;
11646
+ synthetic_payload: SyntheticPayload;
11647
+ escrow: SimulationEscrowContract;
11648
+ }
11649
+ /**
11650
+ * Bounded dictionary representing the injected hallucination or observation.
11651
+ */
11652
+ export interface SyntheticPayload {
11653
+ [k: string]: JsonPrimitiveState;
11654
+ }
11655
+ /**
11656
+ * The cryptographic Proof-of-Stake funding the shock.
11657
+ */
11658
+ export interface SimulationEscrowContract {
11659
+ locked_magnitude: LockedMagnitude;
11660
+ }
12202
11661
  /**
12203
11662
  * CoReason Shared Kernel Ontology
12204
11663
  *
@@ -12211,10 +11670,10 @@ export interface CircuitBreakerEvent {
12211
11670
  * MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
12212
11671
  */
12213
11672
  export interface EpistemicLogEvent {
12214
- event_cid: EventCid30;
12215
- prior_event_hash?: PriorEventHash30;
12216
- topology_class?: TopologyClass114;
12217
- timestamp: Timestamp30;
11673
+ event_cid: EventCid29;
11674
+ prior_event_hash?: PriorEventHash29;
11675
+ topology_class?: TopologyClass112;
11676
+ timestamp: Timestamp29;
12218
11677
  level: Level;
12219
11678
  message: Message1;
12220
11679
  context_profile?: TelemetryContextProfile;
@@ -12244,10 +11703,10 @@ export interface TelemetryContextProfile {
12244
11703
  * MCP ROUTING TRIGGERS: Cryptographic Nonce, State Resumption, Replay Attack Prevention, Wetware Attestation, Liveness Resolution
12245
11704
  */
12246
11705
  export interface InterventionReceipt {
12247
- topology_class?: TopologyClass115;
12248
- event_cid: EventCid31;
12249
- prior_event_hash?: PriorEventHash31;
12250
- timestamp: Timestamp31;
11706
+ topology_class?: TopologyClass113;
11707
+ event_cid: EventCid30;
11708
+ prior_event_hash?: PriorEventHash30;
11709
+ timestamp: Timestamp30;
12251
11710
  intervention_request_cid: InterventionRequestCid;
12252
11711
  /**
12253
11712
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -12302,10 +11761,10 @@ export interface WetwareAttestationContract {
12302
11761
  * MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
12303
11762
  */
12304
11763
  export interface CustodyReceipt {
12305
- event_cid: EventCid32;
12306
- prior_event_hash?: PriorEventHash32;
12307
- timestamp: Timestamp32;
12308
- topology_class?: TopologyClass116;
11764
+ event_cid: EventCid31;
11765
+ prior_event_hash?: PriorEventHash31;
11766
+ timestamp: Timestamp31;
11767
+ topology_class?: TopologyClass114;
12309
11768
  custody_cid: CustodyCid;
12310
11769
  source_node_cid: SourceNodeCid;
12311
11770
  applied_policy_cid: AppliedPolicyCid;
@@ -12325,10 +11784,10 @@ export interface CustodyReceipt {
12325
11784
  * MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
12326
11785
  */
12327
11786
  export interface DefeasibleAttackEvent {
12328
- event_cid: EventCid33;
12329
- prior_event_hash?: PriorEventHash33;
12330
- timestamp: Timestamp33;
12331
- topology_class?: TopologyClass117;
11787
+ event_cid: EventCid32;
11788
+ prior_event_hash?: PriorEventHash32;
11789
+ timestamp: Timestamp32;
11790
+ topology_class?: TopologyClass115;
12332
11791
  attack_cid: AttackCid;
12333
11792
  source_claim_cid: SourceClaimCid;
12334
11793
  target_claim_cid: TargetClaimCid;
@@ -12349,10 +11808,10 @@ export interface DefeasibleAttackEvent {
12349
11808
  * MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
12350
11809
  */
12351
11810
  export interface EpistemicRejectionReceipt {
12352
- event_cid: EventCid34;
12353
- prior_event_hash?: PriorEventHash34;
12354
- timestamp: Timestamp34;
12355
- topology_class?: TopologyClass118;
11811
+ event_cid: EventCid33;
11812
+ prior_event_hash?: PriorEventHash33;
11813
+ timestamp: Timestamp33;
11814
+ topology_class?: TopologyClass116;
12356
11815
  receipt_cid: ReceiptCid1;
12357
11816
  failed_projection_cid: FailedProjectionCid;
12358
11817
  violated_algebraic_constraint: ViolatedAlgebraicConstraint;
@@ -12371,10 +11830,10 @@ export interface EpistemicRejectionReceipt {
12371
11830
  * MCP ROUTING TRIGGERS: System 2 Remediation, Mathematical Truth, Proof Verification, Epistemic Ledger
12372
11831
  */
12373
11832
  export interface FormalVerificationReceipt {
12374
- event_cid: EventCid35;
12375
- prior_event_hash?: PriorEventHash35;
12376
- timestamp: Timestamp35;
12377
- topology_class?: TopologyClass119;
11833
+ event_cid: EventCid34;
11834
+ prior_event_hash?: PriorEventHash34;
11835
+ timestamp: Timestamp34;
11836
+ topology_class?: TopologyClass117;
12378
11837
  /**
12379
11838
  * Pointer to the specific node or intent that requested this formal verification.
12380
11839
  */
@@ -12388,11 +11847,11 @@ export interface FormalVerificationReceipt {
12388
11847
  * CoReason Shared Kernel Ontology
12389
11848
  */
12390
11849
  export interface BeliefModulationReceipt {
12391
- topology_class?: TopologyClass120;
11850
+ topology_class?: TopologyClass118;
12392
11851
  receipt_cid: ReceiptCid2;
12393
- event_cid: EventCid36;
12394
- prior_event_hash?: PriorEventHash36;
12395
- timestamp: Timestamp36;
11852
+ event_cid: EventCid35;
11853
+ prior_event_hash?: PriorEventHash35;
11854
+ timestamp: Timestamp35;
12396
11855
  target_graph_cid: TargetGraphCid4;
12397
11856
  grounded_edges: GroundedEdges;
12398
11857
  severed_edge_cids: SeveredEdgeCids;
@@ -12404,11 +11863,11 @@ export interface GroundedEdges {
12404
11863
  * CoReason Shared Kernel Ontology
12405
11864
  */
12406
11865
  export interface RDFExportReceipt {
12407
- topology_class?: TopologyClass121;
11866
+ topology_class?: TopologyClass119;
12408
11867
  export_cid: ExportCid1;
12409
- event_cid: EventCid37;
12410
- prior_event_hash?: PriorEventHash37;
12411
- timestamp: Timestamp37;
11868
+ event_cid: EventCid36;
11869
+ prior_event_hash?: PriorEventHash36;
11870
+ timestamp: Timestamp36;
12412
11871
  serialized_payload: SerializedPayload;
12413
11872
  rdf_triple_count: RdfTripleCount;
12414
11873
  sha256_graph_hash: Sha256GraphHash;
@@ -12425,10 +11884,10 @@ export interface RDFExportReceipt {
12425
11884
  * MCP ROUTING TRIGGERS: Epistemic Starvation, Natural Language Inference, Truth Maintenance System, Defeasible Logic, Belief Mass Depletion
12426
11885
  */
12427
11886
  export interface EpistemicStarvationEvent {
12428
- event_cid: EventCid38;
12429
- prior_event_hash?: PriorEventHash38;
12430
- timestamp: Timestamp38;
12431
- topology_class?: TopologyClass122;
11887
+ event_cid: EventCid37;
11888
+ prior_event_hash?: PriorEventHash37;
11889
+ timestamp: Timestamp37;
11890
+ topology_class?: TopologyClass120;
12432
11891
  starved_edge_cid: StarvedEdgeCid;
12433
11892
  failed_citations: FailedCitations;
12434
11893
  diagnostic_reason: DiagnosticReason;
@@ -12445,10 +11904,10 @@ export interface EpistemicStarvationEvent {
12445
11904
  * MCP ROUTING TRIGGERS: SPARQL Result, RDF Bindings, Epistemic Projection, Payload Bounding, Ledger Commit
12446
11905
  */
12447
11906
  export interface SPARQLQueryResultReceipt {
12448
- event_cid: EventCid39;
12449
- prior_event_hash?: PriorEventHash39;
12450
- timestamp: Timestamp39;
12451
- topology_class?: TopologyClass123;
11907
+ event_cid: EventCid38;
11908
+ prior_event_hash?: PriorEventHash38;
11909
+ timestamp: Timestamp38;
11910
+ topology_class?: TopologyClass121;
12452
11911
  query_intent_cid: QueryIntentCid;
12453
11912
  returned_bindings: ReturnedBindings;
12454
11913
  execution_time_ms: ExecutionTimeMs;
@@ -12471,7 +11930,7 @@ export interface ReturnedBindings {
12471
11930
  * MCP ROUTING TRIGGERS: Execution Audit, Merkle-DAG Provenance, Thermodynamic Accounting, Oracle Telemetry, Human-in-the-Loop Attestation, Cryptographic Receipt
12472
11931
  */
12473
11932
  export interface OracleExecutionReceipt {
12474
- topology_class?: TopologyClass124;
11933
+ topology_class?: TopologyClass122;
12475
11934
  execution_hash: ExecutionHash;
12476
11935
  solver_urn: SolverUrn;
12477
11936
  tokens_burned: TokensBurned;
@@ -12489,8 +11948,8 @@ export interface OracleExecutionReceipt {
12489
11948
  * MCP ROUTING TRIGGERS: Markov Decision Process, Acyclic Edge, Stochastic Routing, Transition Probability, Directed Graph
12490
11949
  */
12491
11950
  export interface TransitionEdgeProfile {
12492
- topology_class?: TopologyClass125;
12493
- target_node_cid?: TargetNodeCid3;
11951
+ topology_class?: TopologyClass123;
11952
+ target_node_cid?: TargetNodeCid1;
12494
11953
  /**
12495
11954
  * Dynamic discovery intent for bridging nodes.
12496
11955
  */
@@ -12533,8 +11992,8 @@ export interface EdgeMappingContract {
12533
11992
  * MCP ROUTING TRIGGERS: Markov Decision Process, Cyclic Edge, Bellman Equation, Thermodynamic Discounting, Recursive Traversal
12534
11993
  */
12535
11994
  export interface CyclicEdgeProfile {
12536
- topology_class?: TopologyClass126;
12537
- target_node_cid?: TargetNodeCid4;
11995
+ topology_class?: TopologyClass124;
11996
+ target_node_cid?: TargetNodeCid2;
12538
11997
  /**
12539
11998
  * Dynamic discovery intent for bridging nodes.
12540
11999
  */
@@ -12703,7 +12162,7 @@ export interface TransitionMatrix {
12703
12162
  * MCP ROUTING TRIGGERS: Bipartite Graph Separation, Toxic Capability Quarantine, Finite State Machine, Structural Interlock, Conflict Graph
12704
12163
  */
12705
12164
  export interface KineticSeparationPolicy {
12706
- policy_cid: PolicyCid2;
12165
+ policy_cid: PolicyCid1;
12707
12166
  mutually_exclusive_clusters: MutuallyExclusiveClusters;
12708
12167
  enforcement_action: EnforcementAction;
12709
12168
  }
@@ -12756,22 +12215,6 @@ export interface CognitiveDualVerificationReceipt {
12756
12215
  secondary_verifier_cid: string;
12757
12216
  trace_factual_alignment: TraceFactualAlignment;
12758
12217
  }
12759
- /**
12760
- * CoReason Shared Kernel Ontology
12761
- *
12762
- * AGENT INSTRUCTION: Employs Finite State Machine (FSM) Logit Masking and Constrained Decoding to deterministically herd LLM stochasticity into rigorous syntactic structures.
12763
- *
12764
- * CAUSAL AFFORDANCE: Instructs the orchestrator's inference engine to physically suffocate invalid token probabilities to negative infinity, mechanically ensuring the output conforms to downstream parser requirements.
12765
- *
12766
- * EPISTEMIC BOUNDS: Execution constraints are rigidly defined by `require_think_tags` and `final_answer_regex` (`max_length=2000`) to prevent ReDoS CPU exhaustion. The `@model_validator` `resolve_contract_conflicts` prevents unresolvable compilation conflicts in the DFA.
12767
- *
12768
- * MCP ROUTING TRIGGERS: FSM Logit Masking, Constrained Decoding, Regular Expression Automaton, Syntactic Boundary, Token Suffocation
12769
- */
12770
- export interface CognitiveFormatContract1 {
12771
- require_think_tags?: RequireThinkTags;
12772
- final_answer_regex?: FinalAnswerRegex;
12773
- decoding_policy: ConstrainedDecodingPolicy;
12774
- }
12775
12218
  /**
12776
12219
  * CoReason Shared Kernel Ontology
12777
12220
  *
@@ -13201,7 +12644,7 @@ export interface DynamicLayoutManifest {
13201
12644
  * MCP ROUTING TRIGGERS: Grammar of Graphics, Retinal Variables, UI Rendering, Semantic Zooming, Dynamic Manifold
13202
12645
  */
13203
12646
  export interface DynamicManifoldProjectionManifest1 {
13204
- topology_class?: TopologyClass55;
12647
+ topology_class?: TopologyClass53;
13205
12648
  manifest_cid: ManifestCid1;
13206
12649
  active_forge_cid: ActiveForgeCid;
13207
12650
  ast_gradient_visual_mapping: GrammarPanelProfile;
@@ -13324,6 +12767,22 @@ export interface Claims {
13324
12767
  export interface Attacks {
13325
12768
  [k: string]: DefeasibleAttackEvent;
13326
12769
  }
12770
+ /**
12771
+ * CoReason Shared Kernel Ontology
12772
+ *
12773
+ * AGENT INSTRUCTION: Implements First-Order Logic and Resource Description Framework (RDF) triples to mathematically formalize knowledge. As a ...State suffix, this is a declarative, frozen snapshot of a specific causal connection.
12774
+ *
12775
+ * CAUSAL AFFORDANCE: Distills high-entropy natural language token streams into rigid, hashable causal edges (Subject, Predicate, Object), unlocking deterministic querying and Truth Maintenance System (TMS) traversals.
12776
+ *
12777
+ * EPISTEMIC BOUNDS: Source and target concept physical boundaries are strictly locked to 128-char CIDs matching the regex `^[a-zA-Z0-9_.:-]+$`. The `directed_edge_class` is clamped to a `max_length=2000` to prevent dictionary bombing during semantic evaluation.
12778
+ *
12779
+ * MCP ROUTING TRIGGERS: First-Order Logic, RDF Triple, Semantic Distillation, Causal Edge, Directed Graph
12780
+ */
12781
+ export interface EpistemicAxiomState {
12782
+ source_concept_cid: SourceConceptCid;
12783
+ directed_edge_class: DirectedEdgeClass;
12784
+ target_concept_cid: TargetConceptCid;
12785
+ }
13327
12786
  /**
13328
12787
  * CoReason Shared Kernel Ontology
13329
12788
  *
@@ -13739,23 +13198,23 @@ export interface ProceduralMetadataManifest {
13739
13198
  /**
13740
13199
  * CoReason Shared Kernel Ontology
13741
13200
  *
13742
- * AGENT INSTRUCTION: Encodes a macroscopic Petri net or Directed Acyclic Graph (DAG)
13743
- * formalizing standard operating procedures into mathematically traversable state
13744
- * transitions. As a ...Manifest suffix, this defines a frozen, N-dimensional coordinate
13745
- * state.
13201
+ * AGENT INSTRUCTION: Encodes a macroscopic Petri net or Directed Acyclic Graph (DAG)
13202
+ * formalizing standard operating procedures into mathematically traversable state
13203
+ * transitions. As a ...Manifest suffix, this defines a frozen, N-dimensional coordinate
13204
+ * state.
13746
13205
  *
13747
- * CAUSAL AFFORDANCE: Physically bounds the executing agent (target_persona:
13748
- * ProfileCIDState) to a deterministic sequence of CognitiveStateProfiles, unlocking
13749
- * the ability for the orchestrator to dynamically evaluate execution via Process Reward
13750
- * Models (prm_evaluations: list[ProcessRewardContract]) at each topological node.
13206
+ * CAUSAL AFFORDANCE: Physically bounds the executing agent (target_persona:
13207
+ * ProfileCIDState) to a deterministic sequence of CognitiveStateProfiles, unlocking
13208
+ * the ability for the orchestrator to dynamically evaluate execution via Process Reward
13209
+ * .
13751
13210
  *
13752
- * EPISTEMIC BOUNDS: The cognitive_steps dictionary is constrained to max_length=1000
13753
- * to cap memory footprint. The @model_validator reject_ghost_nodes mathematically enforces
13754
- * referential integrity, guaranteeing that no chronological_flow_edges AND no
13755
- * structural_grammar_hashes point to an undefined state.
13211
+ * EPISTEMIC BOUNDS: The cognitive_steps dictionary is constrained to max_length=1000
13212
+ * to cap memory footprint. The @model_validator reject_ghost_nodes mathematically enforces
13213
+ * referential integrity, guaranteeing that no chronological_flow_edges AND no
13214
+ * structural_grammar_hashes point to an undefined state.
13756
13215
  *
13757
- * MCP ROUTING TRIGGERS: Petri Net, Directed Acyclic Graph, Process Reward Model,
13758
- * Topological Flow, Referential Integrity
13216
+ * MCP ROUTING TRIGGERS: Petri Net, Directed Acyclic Graph, Process Reward Model,
13217
+ * Topological Flow, Referential Integrity
13759
13218
  */
13760
13219
  export interface EpistemicSOPManifest {
13761
13220
  sop_cid: SopCid;
@@ -13766,7 +13225,6 @@ export interface EpistemicSOPManifest {
13766
13225
  cognitive_steps: CognitiveSteps;
13767
13226
  structural_grammar_hashes: StructuralGrammarHashes;
13768
13227
  chronological_flow_edges: ChronologicalFlowEdges1;
13769
- prm_evaluations: PrmEvaluations;
13770
13228
  }
13771
13229
  /**
13772
13230
  * Dictionary mapping step_cids to strict causal DAG constraints.
@@ -14727,33 +14185,6 @@ export interface StateVectorProfile1 {
14727
14185
  mutable_matrix?: MutableMatrix;
14728
14186
  is_delta?: IsDelta;
14729
14187
  }
14730
- /**
14731
- * CoReason Shared Kernel Ontology
14732
- *
14733
- * AGENT INSTRUCTION: Formalizes the baseline control group definition within
14734
- * Chaos Engineering, leveraging Queueing Theory to model the expected systemic
14735
- * equilibrium. As a ...State suffix, this is a declarative, frozen snapshot of
14736
- * N-dimensional geometry.
14737
- *
14738
- * CAUSAL AFFORDANCE: Provides the deterministic baseline against which chaotic
14739
- * perturbations (e.g., ChaosExperimentTask) are measured, establishing temporal
14740
- * and procedural expectations for standard execution loops.
14741
- *
14742
- * EPISTEMIC BOUNDS: Latency expectations are continuously bounded by
14743
- * expected_max_latency (ge=0.0, le=18446744073709551615.0). The max_loops_allowed
14744
- * (le=18446744073709551615) physically caps algorithmic cycles. The optional
14745
- * required_tool_usage (list[str] | None, default=None,
14746
- * max_length=1000) is deterministically sorted via @model_validator
14747
- * sort_arrays to preserve RFC 8785 canonical hashing.
14748
- *
14749
- * MCP ROUTING TRIGGERS: Chaos Engineering, Queueing Theory, Steady-State
14750
- * Equilibrium, Control Group Baseline, Systemic Perturbation
14751
- */
14752
- export interface SteadyStateHypothesisState1 {
14753
- expected_max_latency: ExpectedMaxLatency;
14754
- max_loops_allowed: MaxLoopsAllowed;
14755
- required_tool_usage?: RequiredToolUsage;
14756
- }
14757
14188
  /**
14758
14189
  * CoReason Shared Kernel Ontology
14759
14190
  *
@@ -14815,7 +14246,7 @@ export interface GenerativeManifoldSLA1 {
14815
14246
  * MCP ROUTING TRIGGERS: Softmax Gating, Cognitive Load Theory, Pre-Flight Routing, Dictionary Bombing Prevention, Token Exhaustion Mitigation
14816
14247
  */
14817
14248
  export interface TaxonomicRoutingPolicy {
14818
- policy_cid: PolicyCid3;
14249
+ policy_cid: PolicyCid2;
14819
14250
  intent_to_heuristic_matrix: IntentToHeuristicMatrix;
14820
14251
  fallback_heuristic: FallbackHeuristic;
14821
14252
  }