@coreason-ai/coreason-manifest 0.54.0 → 0.55.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/ontology.d.ts +537 -1106
- package/package.json +1 -1
package/dist/ontology.d.ts
CHANGED
|
@@ -160,66 +160,6 @@ export type Criteria = GradingCriterionProfile[];
|
|
|
160
160
|
* The absolute mathematical lower-bound scalar required to authorize execution.
|
|
161
161
|
*/
|
|
162
162
|
export type PassingThreshold = number;
|
|
163
|
-
/**
|
|
164
|
-
* The imitation learning persona governing the behavioral emulation profile.
|
|
165
|
-
*/
|
|
166
|
-
export type GenerativePersona = "hesitant_novice" | "fast_expert" | "distracted_browser";
|
|
167
|
-
/**
|
|
168
|
-
* The stochastic process governing the noise generation for pointer trajectory perturbation.
|
|
169
|
-
*/
|
|
170
|
-
export type NoiseClass = "pink" | "brownian" | "gaussian";
|
|
171
|
-
/**
|
|
172
|
-
* The mathematical model governing movement acceleration and velocity smoothing.
|
|
173
|
-
*/
|
|
174
|
-
export type VelocityProfile = "minimum_jerk" | "constant" | "fractional_brownian";
|
|
175
|
-
/**
|
|
176
|
-
* The normalized amplitude of the 1/f noise injected into the pointer trajectory. Bounded [0.0, 1.0].
|
|
177
|
-
*/
|
|
178
|
-
export type PinkNoiseAmplitude = number;
|
|
179
|
-
/**
|
|
180
|
-
* The spectral exponent β in the 1/f^β power spectral density function governing noise color.
|
|
181
|
-
*/
|
|
182
|
-
export type FrequencyExponent = number;
|
|
183
|
-
/**
|
|
184
|
-
* The Euclidean radius in pixels for corrective submovements overshooting the target coordinate.
|
|
185
|
-
*/
|
|
186
|
-
export type TargetOvershootRadiusPixels = number;
|
|
187
|
-
/**
|
|
188
|
-
* Cognitive choice reaction delay in milliseconds, modeled via Hick-Hyman Law.
|
|
189
|
-
*/
|
|
190
|
-
export type HickHymanDwellTimeMs = number;
|
|
191
|
-
/**
|
|
192
|
-
* The JA3/JA4 TLS Client Hello fingerprint URN to project during handshake emulation.
|
|
193
|
-
*/
|
|
194
|
-
export type TlsCipherPermutation = string | null;
|
|
195
|
-
/**
|
|
196
|
-
* The Content Identifier (CID) of the WebGL canvas entropy seed used to generate a deterministic spoofed fingerprint.
|
|
197
|
-
*/
|
|
198
|
-
export type WebglEntropySeedHash = string;
|
|
199
|
-
/**
|
|
200
|
-
* The User-Agent string template projected to exogenous web servers to mask the true computational substrate.
|
|
201
|
-
*/
|
|
202
|
-
export type UserAgentTemplate = string;
|
|
203
|
-
/**
|
|
204
|
-
* The spoofed CPU core count projected to the DOM via navigator.hardwareConcurrency.
|
|
205
|
-
*/
|
|
206
|
-
export type HardwareConcurrencyMask = number;
|
|
207
|
-
/**
|
|
208
|
-
* The spoofed UTC timezone offset in minutes, bounded to the valid terrestrial range.
|
|
209
|
-
*/
|
|
210
|
-
export type TimezoneOffsetMinutes = number;
|
|
211
|
-
/**
|
|
212
|
-
* The spoofed horizontal display resolution in pixels.
|
|
213
|
-
*/
|
|
214
|
-
export type ScreenResolutionWidth = number;
|
|
215
|
-
/**
|
|
216
|
-
* The spoofed vertical display resolution in pixels.
|
|
217
|
-
*/
|
|
218
|
-
export type ScreenResolutionHeight = number;
|
|
219
|
-
/**
|
|
220
|
-
* The target normalized score for human-likeness against anti-bot heuristic classifiers.
|
|
221
|
-
*/
|
|
222
|
-
export type EmulationFidelityTarget = number;
|
|
223
163
|
/**
|
|
224
164
|
* Discriminator for adversarial macro.
|
|
225
165
|
*/
|
|
@@ -252,28 +192,6 @@ export type MinLiquidityMagnitude = number;
|
|
|
252
192
|
* The threshold indicating the market price has stabilized enough to trigger the resolution oracle.
|
|
253
193
|
*/
|
|
254
194
|
export type ConvergenceDeltaThreshold = number;
|
|
255
|
-
/**
|
|
256
|
-
* The unique identifier for this red-team experiment.
|
|
257
|
-
*/
|
|
258
|
-
export type SimulationCid = string;
|
|
259
|
-
/**
|
|
260
|
-
* The exact NodeCIDState the 'Judas Node' will attempt to compromise.
|
|
261
|
-
*/
|
|
262
|
-
export type TargetNodeCid = string;
|
|
263
|
-
/**
|
|
264
|
-
* The mathematically predictable category of structural sabotage being simulated.
|
|
265
|
-
*/
|
|
266
|
-
export type AttackVector = "prompt_extraction" | "data_exfiltration" | "semantic_hijacking" | "tool_poisoning";
|
|
267
|
-
/**
|
|
268
|
-
* The raw poisoned text or malicious JSON-RPC schema injected into the target's context window.
|
|
269
|
-
*/
|
|
270
|
-
export type SyntheticPayload = {
|
|
271
|
-
[k: string]: JsonPrimitiveState;
|
|
272
|
-
} | string;
|
|
273
|
-
/**
|
|
274
|
-
* The exact rule_cid of the SemanticFlowPolicy or Governance bound expected to block this attack. Governing automated test assertions.
|
|
275
|
-
*/
|
|
276
|
-
export type ExpectedFirewallTrip = string | null;
|
|
277
195
|
/**
|
|
278
196
|
* The exact SHA-256 Merkle root of the agent's training lineage.
|
|
279
197
|
*/
|
|
@@ -485,8 +403,7 @@ export type ServerCid = string;
|
|
|
485
403
|
/**
|
|
486
404
|
* Polymorphic transport configuration (stdio, sse, or http) including env_vars, args, and headers.
|
|
487
405
|
*/
|
|
488
|
-
export type Transport =
|
|
489
|
-
export type MCPTransportProfile = StdioTransportProfile | SSETransportProfile | HTTPTransportProfile;
|
|
406
|
+
export type Transport = StdioTransportProfile | SSETransportProfile | HTTPTransportProfile;
|
|
490
407
|
/**
|
|
491
408
|
* Type of transport.
|
|
492
409
|
*/
|
|
@@ -686,7 +603,7 @@ export type Rationale = string;
|
|
|
686
603
|
* Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
|
|
687
604
|
*/
|
|
688
605
|
export type HeuristicConfidence = number;
|
|
689
|
-
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent |
|
|
606
|
+
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent;
|
|
690
607
|
/**
|
|
691
608
|
* Discriminator for temporal edge invalidation.
|
|
692
609
|
*/
|
|
@@ -1532,72 +1449,7 @@ export type Params1 = {
|
|
|
1532
1449
|
* Unique request identifier.
|
|
1533
1450
|
*/
|
|
1534
1451
|
export type Id1 = string | number | null;
|
|
1535
|
-
export type TopologyClass49 = "
|
|
1536
|
-
/**
|
|
1537
|
-
* The unique identifier for the chaos experiment.
|
|
1538
|
-
*/
|
|
1539
|
-
export type ExperimentCid = string;
|
|
1540
|
-
/**
|
|
1541
|
-
* The expected maximum latency under normal conditions.
|
|
1542
|
-
*/
|
|
1543
|
-
export type ExpectedMaxLatency = number;
|
|
1544
|
-
/**
|
|
1545
|
-
* The maximum allowed loops for the swarm to reach a conclusion.
|
|
1546
|
-
*/
|
|
1547
|
-
export type MaxLoopsAllowed = number;
|
|
1548
|
-
/**
|
|
1549
|
-
* The strict array of required tools that must be utilized.
|
|
1550
|
-
*/
|
|
1551
|
-
export type RequiredToolUsage = string[] | null;
|
|
1552
|
-
/**
|
|
1553
|
-
* The specific node to attack, or None for swarm-wide.
|
|
1554
|
-
*/
|
|
1555
|
-
export type TargetNodeCid1 = string | null;
|
|
1556
|
-
/**
|
|
1557
|
-
* The severity of the fault, represented from 0.0 to 1.0.
|
|
1558
|
-
*/
|
|
1559
|
-
export type Intensity = number;
|
|
1560
|
-
/**
|
|
1561
|
-
* The strict array of fault injection profiles defining the chaotic elements.
|
|
1562
|
-
*/
|
|
1563
|
-
export type Faults = FaultInjectionProfile[];
|
|
1564
|
-
/**
|
|
1565
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
1566
|
-
*/
|
|
1567
|
-
export type EventCid1 = string;
|
|
1568
|
-
/**
|
|
1569
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
1570
|
-
*/
|
|
1571
|
-
export type PriorEventHash1 = string | null;
|
|
1572
|
-
/**
|
|
1573
|
-
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
1574
|
-
*/
|
|
1575
|
-
export type Timestamp1 = number;
|
|
1576
|
-
/**
|
|
1577
|
-
* Discriminator type for an exogenous event.
|
|
1578
|
-
*/
|
|
1579
|
-
export type TopologyClass50 = "exogenous_event";
|
|
1580
|
-
/**
|
|
1581
|
-
* Cryptographic identifier for the Black Swan event.
|
|
1582
|
-
*/
|
|
1583
|
-
export type ShockCid = string;
|
|
1584
|
-
/**
|
|
1585
|
-
* Regex-bound SHA-256 string targeting a specific Merkle root in the epistemic graph.
|
|
1586
|
-
*/
|
|
1587
|
-
export type TargetNodeHash = string;
|
|
1588
|
-
/**
|
|
1589
|
-
* Strictly bounded mathematical quantification of the epistemic decay or Variational Free Energy.
|
|
1590
|
-
*/
|
|
1591
|
-
export type BayesianSurpriseScore = number;
|
|
1592
|
-
/**
|
|
1593
|
-
* The strictly typed boundary requiring locked magnitude to prevent zero-cost griefing of the swarm.
|
|
1594
|
-
*/
|
|
1595
|
-
export type LockedMagnitude = number;
|
|
1596
|
-
/**
|
|
1597
|
-
* The declarative array of exogenous Black Swan events injected into the topology.
|
|
1598
|
-
*/
|
|
1599
|
-
export type Shocks = ExogenousEpistemicEvent[];
|
|
1600
|
-
export type TopologyClass51 = "epistemic_transmutation_task";
|
|
1452
|
+
export type TopologyClass49 = "epistemic_transmutation_task";
|
|
1601
1453
|
/**
|
|
1602
1454
|
* Unique identifier for this specific multimodal extraction intervention.
|
|
1603
1455
|
*/
|
|
@@ -1642,7 +1494,7 @@ export type TableStructureRecognition = boolean;
|
|
|
1642
1494
|
* Optional maximum economic expenditure authorized to run this VLM transmutation.
|
|
1643
1495
|
*/
|
|
1644
1496
|
export type ExecutionCostBudgetMagnitude1 = number | null;
|
|
1645
|
-
export type
|
|
1497
|
+
export type TopologyClass50 = "epistemic_upsampling_task";
|
|
1646
1498
|
/**
|
|
1647
1499
|
* The explicitly declared target node classification or structural grain.
|
|
1648
1500
|
*/
|
|
@@ -1658,7 +1510,7 @@ export type UpsamplingConfidenceThreshold = number;
|
|
|
1658
1510
|
* @maxItems 1000
|
|
1659
1511
|
*/
|
|
1660
1512
|
export type JustificationVectors = [string, ...string[]];
|
|
1661
|
-
export type
|
|
1513
|
+
export type TopologyClass51 = "interventional_causal_task";
|
|
1662
1514
|
/**
|
|
1663
1515
|
* Unique identifier for this causal intervention.
|
|
1664
1516
|
*/
|
|
@@ -1683,7 +1535,7 @@ export type ExpectedCausalInformationGain = number;
|
|
|
1683
1535
|
* The maximum economic expenditure authorized to run this specific causal intervention.
|
|
1684
1536
|
*/
|
|
1685
1537
|
export type ExecutionCostBudgetMagnitude2 = number;
|
|
1686
|
-
export type
|
|
1538
|
+
export type TopologyClass52 = "mcp_client_intent";
|
|
1687
1539
|
/**
|
|
1688
1540
|
* JSON-RPC version.
|
|
1689
1541
|
*/
|
|
@@ -1705,7 +1557,7 @@ export type Id2 = string | number | null;
|
|
|
1705
1557
|
/**
|
|
1706
1558
|
* Discriminator for the dynamic manifold projection.
|
|
1707
1559
|
*/
|
|
1708
|
-
export type
|
|
1560
|
+
export type TopologyClass53 = "dynamic_manifold";
|
|
1709
1561
|
/**
|
|
1710
1562
|
* Unique identifier for this projection.
|
|
1711
1563
|
*/
|
|
@@ -1721,7 +1573,7 @@ export type PanelCid = string;
|
|
|
1721
1573
|
/**
|
|
1722
1574
|
* Discriminator for Grammar of Graphics charts.
|
|
1723
1575
|
*/
|
|
1724
|
-
export type
|
|
1576
|
+
export type TopologyClass54 = "grammar";
|
|
1725
1577
|
/**
|
|
1726
1578
|
* The declarative semantic anchor summarizing the underlying visual grammar.
|
|
1727
1579
|
*/
|
|
@@ -1761,7 +1613,7 @@ export type Field = string;
|
|
|
1761
1613
|
/**
|
|
1762
1614
|
* The strictly typed mathematical mapping function distorting metrics into Euclidean pixel space.
|
|
1763
1615
|
*/
|
|
1764
|
-
export type
|
|
1616
|
+
export type TopologyClass55 = "linear" | "log" | "time" | "ordinal" | "nominal";
|
|
1765
1617
|
/**
|
|
1766
1618
|
* The optional minimum bound of the scale domain.
|
|
1767
1619
|
*/
|
|
@@ -1789,7 +1641,7 @@ export type PanelCid1 = string;
|
|
|
1789
1641
|
/**
|
|
1790
1642
|
* Discriminator for markdown insight cards.
|
|
1791
1643
|
*/
|
|
1792
|
-
export type
|
|
1644
|
+
export type TopologyClass56 = "insight_card";
|
|
1793
1645
|
/**
|
|
1794
1646
|
* The declarative semantic anchor summarizing the underlying matrix or markdown projection.
|
|
1795
1647
|
*/
|
|
@@ -1810,7 +1662,7 @@ export type MesoDistanceThreshold = number;
|
|
|
1810
1662
|
* The close-proximity boundary where full N-dimensional tensors and unstructured text blocks are mathematically hydrated into the observer's plane.
|
|
1811
1663
|
*/
|
|
1812
1664
|
export type MicroDistanceThreshold = number;
|
|
1813
|
-
export type
|
|
1665
|
+
export type TopologyClass57 = "rollback_intent";
|
|
1814
1666
|
/**
|
|
1815
1667
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for the causal rollback operation.
|
|
1816
1668
|
*/
|
|
@@ -1823,7 +1675,7 @@ export type TargetEventCid = string;
|
|
|
1823
1675
|
* The strict array of nodes whose operational histories are causally tainted and must be flushed.
|
|
1824
1676
|
*/
|
|
1825
1677
|
export type InvalidatedNodeCids = string[];
|
|
1826
|
-
export type
|
|
1678
|
+
export type TopologyClass58 = "state_mutation_intent";
|
|
1827
1679
|
/**
|
|
1828
1680
|
* The JSON pointer indicating the exact state vector to mutate deterministically.
|
|
1829
1681
|
*/
|
|
@@ -1839,7 +1691,7 @@ export type ZeroTrustReceiptCid = string | null;
|
|
|
1839
1691
|
/**
|
|
1840
1692
|
* Discriminator for the OntologicalNormalizationIntent topology.
|
|
1841
1693
|
*/
|
|
1842
|
-
export type
|
|
1694
|
+
export type TopologyClass59 = "ontological_normalization";
|
|
1843
1695
|
/**
|
|
1844
1696
|
* The Content Identifier (CID) of the raw ingested data artifact.
|
|
1845
1697
|
*/
|
|
@@ -1901,7 +1753,7 @@ export type Description3 = string;
|
|
|
1901
1753
|
/**
|
|
1902
1754
|
* Discriminator for an Agent node.
|
|
1903
1755
|
*/
|
|
1904
|
-
export type
|
|
1756
|
+
export type TopologyClass60 = "agent";
|
|
1905
1757
|
/**
|
|
1906
1758
|
* The level of hardware-enforced cryptographic isolation required.
|
|
1907
1759
|
*/
|
|
@@ -2149,30 +2001,6 @@ export type MaxLatentTokensBudget = number;
|
|
|
2149
2001
|
* The physical time limit allowed for the scratchpad search before forcing a timeout.
|
|
2150
2002
|
*/
|
|
2151
2003
|
export type MaxTestTimeComputeMs = number;
|
|
2152
|
-
/**
|
|
2153
|
-
* The minimal required PRM score improvement across the lookback window to justify continued compute.
|
|
2154
|
-
*/
|
|
2155
|
-
export type ConvergenceDeltaEpsilon = number;
|
|
2156
|
-
/**
|
|
2157
|
-
* The N-step temporal window over which the PRM gradient is calculated.
|
|
2158
|
-
*/
|
|
2159
|
-
export type LookbackWindowSteps = number;
|
|
2160
|
-
/**
|
|
2161
|
-
* The mandatory 'burn-in' period. The orchestrator cannot terminate the search before this structural depth is reached, preventing premature collapse.
|
|
2162
|
-
*/
|
|
2163
|
-
export type MinimumReasoningSteps = number;
|
|
2164
|
-
/**
|
|
2165
|
-
* If a ThoughtBranchState's prm_score falls below this threshold, the orchestrator MUST halt its generation.
|
|
2166
|
-
*/
|
|
2167
|
-
export type PruningThreshold = number;
|
|
2168
|
-
/**
|
|
2169
|
-
* The absolute limit on how many times the agent can start a new branch before throwing a SystemFaultEvent.
|
|
2170
|
-
*/
|
|
2171
|
-
export type MaxBacktracksAllowed = number;
|
|
2172
|
-
/**
|
|
2173
|
-
* The specific PRM model used to score the logic (e.g., 'math-prm-v2').
|
|
2174
|
-
*/
|
|
2175
|
-
export type EvaluatorMatrixName = string | null;
|
|
2176
2004
|
/**
|
|
2177
2005
|
* Unique identifier for this symbolic delegation.
|
|
2178
2006
|
*/
|
|
@@ -2220,54 +2048,6 @@ export type MaxFeaturesPerLayer = number;
|
|
|
2220
2048
|
* If True, the orchestrator MUST generate cryptographic latent state proofs alongside the activation extractions.
|
|
2221
2049
|
*/
|
|
2222
2050
|
export type RequireZkCommitments = boolean;
|
|
2223
|
-
/**
|
|
2224
|
-
* CID for this specific reward configuration.
|
|
2225
|
-
*/
|
|
2226
|
-
export type PolicyCid = string;
|
|
2227
|
-
/**
|
|
2228
|
-
* The globally unique decentralized identifier (DID) anchoring the EpistemicDomainGraphManifest acting as the deterministic ground truth.
|
|
2229
|
-
*/
|
|
2230
|
-
export type ReferenceGraphCid = string;
|
|
2231
|
-
/**
|
|
2232
|
-
* Forces the inclusion of structural XML tags to isolate the reasoning trace.
|
|
2233
|
-
*/
|
|
2234
|
-
export type RequireThinkTags = boolean;
|
|
2235
|
-
/**
|
|
2236
|
-
* The strict regular expression the model must satisfy to yield a valid discrete classification. Optional because LMQL/Guidance do not use standard regex.
|
|
2237
|
-
*/
|
|
2238
|
-
export type FinalAnswerRegex = string | null;
|
|
2239
|
-
/**
|
|
2240
|
-
* The mechanistic strategy for intercepting the LLM forward pass.
|
|
2241
|
-
*/
|
|
2242
|
-
export type EnforcementStrategy = "fsm_logit_mask" | "lmql_query" | "guidance_program" | "ebnf_grammar";
|
|
2243
|
-
/**
|
|
2244
|
-
* The URN of the backend used to compile the CFG or Regex into a DFA/PDA (e.g., 'urn:coreason:compiler:xgrammar').
|
|
2245
|
-
*/
|
|
2246
|
-
export type CompilerBackend = string;
|
|
2247
|
-
/**
|
|
2248
|
-
* The raw LMQL query string, Guidance program, or EBNF grammar. Required if the enforcement_strategy is not standard JSON/Regex masking.
|
|
2249
|
-
*/
|
|
2250
|
-
export type FormalGrammarString = string | null;
|
|
2251
|
-
/**
|
|
2252
|
-
* If True, mathematically forces the engine to halt if the LLM attempts to generate an EOS token before the FSM reaches an accepting state.
|
|
2253
|
-
*/
|
|
2254
|
-
export type TerminateOnEosLeak = boolean;
|
|
2255
|
-
/**
|
|
2256
|
-
* The scalar weight applied to the logical path validity (R_path) to prevent reward hacking.
|
|
2257
|
-
*/
|
|
2258
|
-
export type BetaPathWeight = number;
|
|
2259
|
-
/**
|
|
2260
|
-
* The lower bound for Random Walk with Restart (RWR) reachability.
|
|
2261
|
-
*/
|
|
2262
|
-
export type MinEdgeCriticalityScore = number;
|
|
2263
|
-
/**
|
|
2264
|
-
* The lower bound for GCN/GAT cosine similarity.
|
|
2265
|
-
*/
|
|
2266
|
-
export type MinSemanticRelevanceScore = number;
|
|
2267
|
-
/**
|
|
2268
|
-
* The deterministic protocol the orchestrator must use to compute these scores.
|
|
2269
|
-
*/
|
|
2270
|
-
export type AggregationMethod = "gcn_spatial" | "attention_gat" | "rwr_topological";
|
|
2271
2051
|
/**
|
|
2272
2052
|
* The mathematical tolerance for the detailed balance constraint.
|
|
2273
2053
|
*/
|
|
@@ -2309,7 +2089,7 @@ export type DomainExtensions1 = {
|
|
|
2309
2089
|
/**
|
|
2310
2090
|
* Discriminator for a Human node.
|
|
2311
2091
|
*/
|
|
2312
|
-
export type
|
|
2092
|
+
export type TopologyClass61 = "human";
|
|
2313
2093
|
/**
|
|
2314
2094
|
* The mandatory cryptographic attestation URN required to verify the human operator's identity.
|
|
2315
2095
|
*/
|
|
@@ -2339,7 +2119,7 @@ export type DomainExtensions2 = {
|
|
|
2339
2119
|
/**
|
|
2340
2120
|
* Discriminator for a System node.
|
|
2341
2121
|
*/
|
|
2342
|
-
export type
|
|
2122
|
+
export type TopologyClass62 = "system";
|
|
2343
2123
|
/**
|
|
2344
2124
|
* The semantic boundary defining the objective function or computational perimeter of the execution node.
|
|
2345
2125
|
*/
|
|
@@ -2365,7 +2145,7 @@ export type DomainExtensions3 = {
|
|
|
2365
2145
|
/**
|
|
2366
2146
|
* Discriminator for a Composite node.
|
|
2367
2147
|
*/
|
|
2368
|
-
export type
|
|
2148
|
+
export type TopologyClass63 = "composite";
|
|
2369
2149
|
/**
|
|
2370
2150
|
* Entropy Penalty applied per edge traversal during a defeasible cascade.
|
|
2371
2151
|
*/
|
|
@@ -2410,10 +2190,26 @@ export type FormalSchemaUrn = string | null;
|
|
|
2410
2190
|
* If True, the orchestrator must reject any state mutation that fails the schema definition.
|
|
2411
2191
|
*/
|
|
2412
2192
|
export type StrictValidation = boolean;
|
|
2193
|
+
/**
|
|
2194
|
+
* The mechanistic strategy for intercepting the LLM forward pass.
|
|
2195
|
+
*/
|
|
2196
|
+
export type EnforcementStrategy = "fsm_logit_mask" | "lmql_query" | "guidance_program" | "ebnf_grammar";
|
|
2197
|
+
/**
|
|
2198
|
+
* The URN of the backend used to compile the CFG or Regex into a DFA/PDA (e.g., 'urn:coreason:compiler:xgrammar').
|
|
2199
|
+
*/
|
|
2200
|
+
export type CompilerBackend = string;
|
|
2201
|
+
/**
|
|
2202
|
+
* The raw LMQL query string, Guidance program, or EBNF grammar. Required if the enforcement_strategy is not standard JSON/Regex masking.
|
|
2203
|
+
*/
|
|
2204
|
+
export type FormalGrammarString = string | null;
|
|
2205
|
+
/**
|
|
2206
|
+
* If True, mathematically forces the engine to halt if the LLM attempts to generate an EOS token before the FSM reaches an accepting state.
|
|
2207
|
+
*/
|
|
2208
|
+
export type TerminateOnEosLeak = boolean;
|
|
2413
2209
|
/**
|
|
2414
2210
|
* Unique identifier for this macroscopic flow control policy.
|
|
2415
2211
|
*/
|
|
2416
|
-
export type
|
|
2212
|
+
export type PolicyCid = string;
|
|
2417
2213
|
/**
|
|
2418
2214
|
* Whether this policy is currently enforcing data sanitization.
|
|
2419
2215
|
*/
|
|
@@ -2585,7 +2381,7 @@ export type FoveatedPrivacyEpsilon = number | null;
|
|
|
2585
2381
|
/**
|
|
2586
2382
|
* Discriminator for a DAG topology.
|
|
2587
2383
|
*/
|
|
2588
|
-
export type
|
|
2384
|
+
export type TopologyClass64 = "dag";
|
|
2589
2385
|
/**
|
|
2590
2386
|
* The strict, topologically bounded matrix of directed causal edges.
|
|
2591
2387
|
*/
|
|
@@ -2669,7 +2465,7 @@ export type Justification7 = string | null;
|
|
|
2669
2465
|
/**
|
|
2670
2466
|
* Discriminator for a Council topology.
|
|
2671
2467
|
*/
|
|
2672
|
-
export type
|
|
2468
|
+
export type TopologyClass65 = "council";
|
|
2673
2469
|
/**
|
|
2674
2470
|
* The minimum number of adversarial or 'Devil's Advocate' roles required to prevent groupthink.
|
|
2675
2471
|
*/
|
|
@@ -2741,7 +2537,7 @@ export type Justification8 = string | null;
|
|
|
2741
2537
|
/**
|
|
2742
2538
|
* Discriminator for a Swarm topology.
|
|
2743
2539
|
*/
|
|
2744
|
-
export type
|
|
2540
|
+
export type TopologyClass66 = "swarm";
|
|
2745
2541
|
/**
|
|
2746
2542
|
* Threshold limit for dynamic spawning of additional nodes.
|
|
2747
2543
|
*/
|
|
@@ -2823,7 +2619,7 @@ export type Justification9 = string | null;
|
|
|
2823
2619
|
/**
|
|
2824
2620
|
* Discriminator for an Evolutionary topology.
|
|
2825
2621
|
*/
|
|
2826
|
-
export type
|
|
2622
|
+
export type TopologyClass67 = "evolutionary";
|
|
2827
2623
|
/**
|
|
2828
2624
|
* The absolute limit on evolutionary breeding cycles.
|
|
2829
2625
|
*/
|
|
@@ -2883,7 +2679,7 @@ export type Justification10 = string | null;
|
|
|
2883
2679
|
/**
|
|
2884
2680
|
* Discriminator for SMPC Topology.
|
|
2885
2681
|
*/
|
|
2886
|
-
export type
|
|
2682
|
+
export type TopologyClass68 = "smpc";
|
|
2887
2683
|
/**
|
|
2888
2684
|
* The exact cryptographic P2P protocol the nodes must use to evaluate the function.
|
|
2889
2685
|
*/
|
|
@@ -2913,7 +2709,7 @@ export type Justification11 = string | null;
|
|
|
2913
2709
|
/**
|
|
2914
2710
|
* Discriminator for an Evaluator-Optimizer loop.
|
|
2915
2711
|
*/
|
|
2916
|
-
export type
|
|
2712
|
+
export type TopologyClass69 = "evaluator_optimizer";
|
|
2917
2713
|
/**
|
|
2918
2714
|
* The absolute limit on Actor-Critic cycles to prevent infinite compute burn.
|
|
2919
2715
|
*/
|
|
@@ -2937,7 +2733,7 @@ export type Justification12 = string | null;
|
|
|
2937
2733
|
/**
|
|
2938
2734
|
* Discriminator for a Digital Twin topology.
|
|
2939
2735
|
*/
|
|
2940
|
-
export type
|
|
2736
|
+
export type TopologyClass70 = "digital_twin";
|
|
2941
2737
|
/**
|
|
2942
2738
|
* The identifier (expected to be a W3C DID) pointing to the real-world topology it is cloning.
|
|
2943
2739
|
*/
|
|
@@ -2957,7 +2753,7 @@ export type EnforceNoSideEffects = boolean;
|
|
|
2957
2753
|
/**
|
|
2958
2754
|
* Discriminator for federation macro.
|
|
2959
2755
|
*/
|
|
2960
|
-
export type
|
|
2756
|
+
export type TopologyClass71 = "macro_federation";
|
|
2961
2757
|
/**
|
|
2962
2758
|
* The nodes forming the PBFT ring.
|
|
2963
2759
|
*
|
|
@@ -2979,7 +2775,7 @@ export type Justification13 = string | null;
|
|
|
2979
2775
|
/**
|
|
2980
2776
|
* Discriminator for forge macro.
|
|
2981
2777
|
*/
|
|
2982
|
-
export type
|
|
2778
|
+
export type TopologyClass72 = "macro_forge";
|
|
2983
2779
|
/**
|
|
2984
2780
|
* The structural 128-char DID boundary pointing to the foundational semantic deficit vector.
|
|
2985
2781
|
*/
|
|
@@ -3007,7 +2803,7 @@ export type Justification14 = string | null;
|
|
|
3007
2803
|
/**
|
|
3008
2804
|
* Discriminator for the elicitation macro.
|
|
3009
2805
|
*/
|
|
3010
|
-
export type
|
|
2806
|
+
export type TopologyClass73 = "macro_elicitation";
|
|
3011
2807
|
/**
|
|
3012
2808
|
* The anchor to the initial, unstructured MultimodalArtifactReceipt uploaded by the human.
|
|
3013
2809
|
*/
|
|
@@ -3031,7 +2827,7 @@ export type Justification15 = string | null;
|
|
|
3031
2827
|
/**
|
|
3032
2828
|
* Discriminator for the ingestion macro.
|
|
3033
2829
|
*/
|
|
3034
|
-
export type
|
|
2830
|
+
export type TopologyClass74 = "macro_ingestion";
|
|
3035
2831
|
/**
|
|
3036
2832
|
* Target serialization format.
|
|
3037
2833
|
*/
|
|
@@ -3051,7 +2847,7 @@ export type Justification16 = string | null;
|
|
|
3051
2847
|
/**
|
|
3052
2848
|
* Discriminator for a macro neurosymbolic loop.
|
|
3053
2849
|
*/
|
|
3054
|
-
export type
|
|
2850
|
+
export type TopologyClass75 = "macro_neurosymbolic";
|
|
3055
2851
|
/**
|
|
3056
2852
|
* The connectionist agent generating hypotheses.
|
|
3057
2853
|
*/
|
|
@@ -3071,7 +2867,7 @@ export type CritiqueSchemaCid = string | null;
|
|
|
3071
2867
|
/**
|
|
3072
2868
|
* Discriminator for a discourse tree topology.
|
|
3073
2869
|
*/
|
|
3074
|
-
export type
|
|
2870
|
+
export type TopologyClass76 = "discourse_tree";
|
|
3075
2871
|
/**
|
|
3076
2872
|
* Cryptographic identifier for this topology.
|
|
3077
2873
|
*/
|
|
@@ -3084,7 +2880,7 @@ export type DiscourseType = "preamble" | "methodology" | "argumentation" | "find
|
|
|
3084
2880
|
* Explicit pointers linking this discourse block to the specific AtomicPropositionState nodes extracted from its text.
|
|
3085
2881
|
*/
|
|
3086
2882
|
export type ContainedPropositions = NodeCIDState[];
|
|
3087
|
-
export type
|
|
2883
|
+
export type TopologyClass77 = "document_knowledge_graph";
|
|
3088
2884
|
export type GraphCid = string;
|
|
3089
2885
|
export type SourceArtifactCid2 = string;
|
|
3090
2886
|
/**
|
|
@@ -3148,7 +2944,7 @@ export type CiphertextBlob = string;
|
|
|
3148
2944
|
/**
|
|
3149
2945
|
* Discriminator for manifold mapping.
|
|
3150
2946
|
*/
|
|
3151
|
-
export type
|
|
2947
|
+
export type TopologyClass78 = "manifold_mapping";
|
|
3152
2948
|
/**
|
|
3153
2949
|
* Calculated geometric alignment between the semantic embedding and spatial tensor.
|
|
3154
2950
|
*/
|
|
@@ -3166,7 +2962,7 @@ export type Nodes12 = SemanticNodeState[];
|
|
|
3166
2962
|
*/
|
|
3167
2963
|
export type CausalEdges = CausalDirectedEdgeState[];
|
|
3168
2964
|
export type IsomorphismHash = string;
|
|
3169
|
-
export type
|
|
2965
|
+
export type TopologyClass79 = "hierarchical_dom";
|
|
3170
2966
|
export type DomCid = string;
|
|
3171
2967
|
export type RootBlockCid = string;
|
|
3172
2968
|
/**
|
|
@@ -3258,7 +3054,7 @@ export type DomainExtensions4 = {
|
|
|
3258
3054
|
/**
|
|
3259
3055
|
* Discriminator for a Memoized node.
|
|
3260
3056
|
*/
|
|
3261
|
-
export type
|
|
3057
|
+
export type TopologyClass80 = "memoized";
|
|
3262
3058
|
/**
|
|
3263
3059
|
* A discriminated union of presentation UI panels.
|
|
3264
3060
|
*/
|
|
@@ -3267,11 +3063,11 @@ export type AnyPresentationIntent = SemanticIntent | DraftingIntent | Adjudicati
|
|
|
3267
3063
|
/**
|
|
3268
3064
|
* A discriminated union of state events.
|
|
3269
3065
|
*/
|
|
3270
|
-
export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | NormativeDriftEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt |
|
|
3066
|
+
export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | NormativeDriftEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt;
|
|
3271
3067
|
/**
|
|
3272
3068
|
* Discriminator for temporal graph crdt.
|
|
3273
3069
|
*/
|
|
3274
|
-
export type
|
|
3070
|
+
export type TopologyClass81 = "temporal_graph_crdt";
|
|
3275
3071
|
/**
|
|
3276
3072
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark.
|
|
3277
3073
|
*/
|
|
@@ -3292,40 +3088,40 @@ export type AddSet = NodeCIDState[];
|
|
|
3292
3088
|
* The set of non-monotonic timeline caps.
|
|
3293
3089
|
*/
|
|
3294
3090
|
export type TerminateSet = TemporalEdgeInvalidationIntent[];
|
|
3295
|
-
export type
|
|
3091
|
+
export type TopologyClass82 = "mcp_tool_definition";
|
|
3296
3092
|
/**
|
|
3297
3093
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3298
3094
|
*/
|
|
3299
|
-
export type
|
|
3095
|
+
export type EventCid1 = string;
|
|
3300
3096
|
/**
|
|
3301
3097
|
* The RFC 8785 Canonical hash of the immediate causal ancestor event. Null for genesis nodes.
|
|
3302
3098
|
*/
|
|
3303
|
-
export type
|
|
3304
|
-
export type
|
|
3099
|
+
export type PriorEventHash1 = string | null;
|
|
3100
|
+
export type Timestamp1 = number;
|
|
3305
3101
|
export type Name = string;
|
|
3306
3102
|
export type Description9 = string;
|
|
3307
|
-
export type
|
|
3308
|
-
export type
|
|
3309
|
-
export type
|
|
3310
|
-
export type
|
|
3103
|
+
export type EventCid2 = string;
|
|
3104
|
+
export type PriorEventHash2 = string | null;
|
|
3105
|
+
export type Timestamp2 = number;
|
|
3106
|
+
export type TopologyClass83 = "crosswalk_resolution";
|
|
3311
3107
|
export type ReceiptCid = string;
|
|
3312
3108
|
export type TargetGraphCid3 = string;
|
|
3313
3109
|
/**
|
|
3314
3110
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3315
3111
|
*/
|
|
3316
|
-
export type
|
|
3112
|
+
export type EventCid3 = string;
|
|
3317
3113
|
/**
|
|
3318
3114
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3319
3115
|
*/
|
|
3320
|
-
export type
|
|
3116
|
+
export type PriorEventHash3 = string | null;
|
|
3321
3117
|
/**
|
|
3322
3118
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3323
3119
|
*/
|
|
3324
|
-
export type
|
|
3120
|
+
export type Timestamp3 = number;
|
|
3325
3121
|
/**
|
|
3326
3122
|
* Discriminator for a zero-trust receipt.
|
|
3327
3123
|
*/
|
|
3328
|
-
export type
|
|
3124
|
+
export type TopologyClass84 = "zero_trust_receipt";
|
|
3329
3125
|
/**
|
|
3330
3126
|
* Pointer to the originating EpistemicZeroTrustContract.
|
|
3331
3127
|
*/
|
|
@@ -3349,19 +3145,19 @@ export type TransmutedPayloadHash = string;
|
|
|
3349
3145
|
/**
|
|
3350
3146
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3351
3147
|
*/
|
|
3352
|
-
export type
|
|
3148
|
+
export type EventCid4 = string;
|
|
3353
3149
|
/**
|
|
3354
3150
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3355
3151
|
*/
|
|
3356
|
-
export type
|
|
3152
|
+
export type PriorEventHash4 = string | null;
|
|
3357
3153
|
/**
|
|
3358
3154
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3359
3155
|
*/
|
|
3360
|
-
export type
|
|
3156
|
+
export type Timestamp4 = number;
|
|
3361
3157
|
/**
|
|
3362
3158
|
* Discriminator type for an observation event.
|
|
3363
3159
|
*/
|
|
3364
|
-
export type
|
|
3160
|
+
export type TopologyClass85 = "observation";
|
|
3365
3161
|
/**
|
|
3366
3162
|
* The URN representing the physical silicon architecture generating the root-of-trust quote (e.g., 'urn:coreason:enclave:intel_tdx').
|
|
3367
3163
|
*/
|
|
@@ -3381,7 +3177,7 @@ export type AnyToolchainState = BrowserDOMState | TerminalBufferState;
|
|
|
3381
3177
|
/**
|
|
3382
3178
|
* Discriminator for Causal Actuators representing structural shifts.
|
|
3383
3179
|
*/
|
|
3384
|
-
export type
|
|
3180
|
+
export type TopologyClass86 = "browser";
|
|
3385
3181
|
/**
|
|
3386
3182
|
* Spatial Execution Bounds where the agent interacts.
|
|
3387
3183
|
*/
|
|
@@ -3408,7 +3204,7 @@ export type ScreenshotCid = string | null;
|
|
|
3408
3204
|
/**
|
|
3409
3205
|
* Discriminator for Causal Actuators on structural buffers.
|
|
3410
3206
|
*/
|
|
3411
|
-
export type
|
|
3207
|
+
export type TopologyClass87 = "terminal";
|
|
3412
3208
|
/**
|
|
3413
3209
|
* Capability Perimeters defining context bounds.
|
|
3414
3210
|
*/
|
|
@@ -3432,7 +3228,7 @@ export type SensoryModality = "video" | "audio" | "spatial_telemetry";
|
|
|
3432
3228
|
/**
|
|
3433
3229
|
* The calculated KL divergence between the prior belief and the incoming structural evidence.
|
|
3434
3230
|
*/
|
|
3435
|
-
export type
|
|
3231
|
+
export type BayesianSurpriseScore = number;
|
|
3436
3232
|
/**
|
|
3437
3233
|
* The exact length of the timeline encapsulated by this observation.
|
|
3438
3234
|
*/
|
|
@@ -3494,19 +3290,19 @@ export type MaxLookbackWindow = number;
|
|
|
3494
3290
|
/**
|
|
3495
3291
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3496
3292
|
*/
|
|
3497
|
-
export type
|
|
3293
|
+
export type EventCid5 = string;
|
|
3498
3294
|
/**
|
|
3499
3295
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3500
3296
|
*/
|
|
3501
|
-
export type
|
|
3297
|
+
export type PriorEventHash5 = string | null;
|
|
3502
3298
|
/**
|
|
3503
3299
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3504
3300
|
*/
|
|
3505
|
-
export type
|
|
3301
|
+
export type Timestamp5 = number;
|
|
3506
3302
|
/**
|
|
3507
3303
|
* Discriminator type for a Belief Assertion event.
|
|
3508
3304
|
*/
|
|
3509
|
-
export type
|
|
3305
|
+
export type TopologyClass88 = "belief_mutation";
|
|
3510
3306
|
/**
|
|
3511
3307
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the source event in the Merkle-DAG.
|
|
3512
3308
|
*/
|
|
@@ -3546,32 +3342,32 @@ export type QuorumSignatures = string[];
|
|
|
3546
3342
|
/**
|
|
3547
3343
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3548
3344
|
*/
|
|
3549
|
-
export type
|
|
3345
|
+
export type EventCid6 = string;
|
|
3550
3346
|
/**
|
|
3551
3347
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3552
3348
|
*/
|
|
3553
|
-
export type
|
|
3349
|
+
export type PriorEventHash6 = string | null;
|
|
3554
3350
|
/**
|
|
3555
3351
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3556
3352
|
*/
|
|
3557
|
-
export type
|
|
3353
|
+
export type Timestamp6 = number;
|
|
3558
3354
|
/**
|
|
3559
3355
|
* Discriminator type for a system fault event.
|
|
3560
3356
|
*/
|
|
3561
|
-
export type
|
|
3562
|
-
export type
|
|
3357
|
+
export type TopologyClass89 = "system_fault";
|
|
3358
|
+
export type TopologyClass90 = "atomic_proposition";
|
|
3563
3359
|
/**
|
|
3564
3360
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3565
3361
|
*/
|
|
3566
|
-
export type
|
|
3362
|
+
export type EventCid7 = string;
|
|
3567
3363
|
/**
|
|
3568
3364
|
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
3569
3365
|
*/
|
|
3570
|
-
export type
|
|
3366
|
+
export type PriorEventHash7 = string | null;
|
|
3571
3367
|
/**
|
|
3572
3368
|
* The precise temporal coordinate of the event realization.
|
|
3573
3369
|
*/
|
|
3574
|
-
export type
|
|
3370
|
+
export type Timestamp7 = number;
|
|
3575
3371
|
/**
|
|
3576
3372
|
* A Content Identifier (CID) bounding this specific extracted proposition.
|
|
3577
3373
|
*/
|
|
@@ -3616,19 +3412,19 @@ export type UpperBound = number | null;
|
|
|
3616
3412
|
* Explicit mathematical boundaries extracted from the text that empirically limit the certainty or scope of the proposition.
|
|
3617
3413
|
*/
|
|
3618
3414
|
export type StatisticalQualifiers = EmpiricalStatisticalProfile[];
|
|
3619
|
-
export type
|
|
3415
|
+
export type TopologyClass91 = "post_coordinated_concept";
|
|
3620
3416
|
/**
|
|
3621
3417
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3622
3418
|
*/
|
|
3623
|
-
export type
|
|
3419
|
+
export type EventCid8 = string;
|
|
3624
3420
|
/**
|
|
3625
3421
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
3626
3422
|
*/
|
|
3627
|
-
export type
|
|
3423
|
+
export type PriorEventHash8 = string | null;
|
|
3628
3424
|
/**
|
|
3629
3425
|
* The precise temporal coordinate of the event realization.
|
|
3630
3426
|
*/
|
|
3631
|
-
export type
|
|
3427
|
+
export type Timestamp8 = number;
|
|
3632
3428
|
/**
|
|
3633
3429
|
* The unique geometric coordinate representing this specific assembled concept.
|
|
3634
3430
|
*/
|
|
@@ -3641,10 +3437,10 @@ export type ManifoldAlignmentMetricProfile1 = "gromov_wasserstein" | "earth_move
|
|
|
3641
3437
|
* The exact mathematical fidelity achieved during projection.
|
|
3642
3438
|
*/
|
|
3643
3439
|
export type IsometryScore = number;
|
|
3644
|
-
export type
|
|
3645
|
-
export type
|
|
3646
|
-
export type
|
|
3647
|
-
export type
|
|
3440
|
+
export type EventCid9 = string;
|
|
3441
|
+
export type PriorEventHash9 = string | null;
|
|
3442
|
+
export type Timestamp9 = number;
|
|
3443
|
+
export type TopologyClass92 = "artifact_corruption";
|
|
3648
3444
|
/**
|
|
3649
3445
|
* The genesis artifact that caused the ingestion engine to crash.
|
|
3650
3446
|
*/
|
|
@@ -3654,19 +3450,19 @@ export type DiagnosticHash = string;
|
|
|
3654
3450
|
/**
|
|
3655
3451
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3656
3452
|
*/
|
|
3657
|
-
export type
|
|
3453
|
+
export type EventCid10 = string;
|
|
3658
3454
|
/**
|
|
3659
3455
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3660
3456
|
*/
|
|
3661
|
-
export type
|
|
3457
|
+
export type PriorEventHash10 = string | null;
|
|
3662
3458
|
/**
|
|
3663
3459
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3664
3460
|
*/
|
|
3665
|
-
export type
|
|
3461
|
+
export type Timestamp10 = number;
|
|
3666
3462
|
/**
|
|
3667
3463
|
* Discriminator for a hypothesis generation event.
|
|
3668
3464
|
*/
|
|
3669
|
-
export type
|
|
3465
|
+
export type TopologyClass93 = "hypothesis";
|
|
3670
3466
|
/**
|
|
3671
3467
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this abductive leap to the Merkle-DAG.
|
|
3672
3468
|
*/
|
|
@@ -3708,19 +3504,19 @@ export type CausalEdges1 = CausalDirectedEdgeState[];
|
|
|
3708
3504
|
/**
|
|
3709
3505
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3710
3506
|
*/
|
|
3711
|
-
export type
|
|
3507
|
+
export type EventCid11 = string;
|
|
3712
3508
|
/**
|
|
3713
3509
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3714
3510
|
*/
|
|
3715
|
-
export type
|
|
3511
|
+
export type PriorEventHash11 = string | null;
|
|
3716
3512
|
/**
|
|
3717
3513
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3718
3514
|
*/
|
|
3719
|
-
export type
|
|
3515
|
+
export type Timestamp11 = number;
|
|
3720
3516
|
/**
|
|
3721
3517
|
* Discriminator type for a barge-in interruption event.
|
|
3722
3518
|
*/
|
|
3723
|
-
export type
|
|
3519
|
+
export type TopologyClass94 = "barge_in";
|
|
3724
3520
|
/**
|
|
3725
3521
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the active node generation cycle that was killed in the Merkle-DAG.
|
|
3726
3522
|
*/
|
|
@@ -3738,19 +3534,19 @@ export type EpistemicDisposition = "discard" | "retain_as_context" | "mark_as_fa
|
|
|
3738
3534
|
/**
|
|
3739
3535
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3740
3536
|
*/
|
|
3741
|
-
export type
|
|
3537
|
+
export type EventCid12 = string;
|
|
3742
3538
|
/**
|
|
3743
3539
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3744
3540
|
*/
|
|
3745
|
-
export type
|
|
3541
|
+
export type PriorEventHash12 = string | null;
|
|
3746
3542
|
/**
|
|
3747
3543
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3748
3544
|
*/
|
|
3749
|
-
export type
|
|
3545
|
+
export type Timestamp12 = number;
|
|
3750
3546
|
/**
|
|
3751
3547
|
* Discriminator type for a counterfactual regret event.
|
|
3752
3548
|
*/
|
|
3753
|
-
export type
|
|
3549
|
+
export type TopologyClass95 = "counterfactual_regret";
|
|
3754
3550
|
/**
|
|
3755
3551
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the specific historical state node where the agent mathematically diverged to simulate an alternative path.
|
|
3756
3552
|
*/
|
|
@@ -3774,19 +3570,19 @@ export type EpistemicRegret = number;
|
|
|
3774
3570
|
/**
|
|
3775
3571
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3776
3572
|
*/
|
|
3777
|
-
export type
|
|
3573
|
+
export type EventCid13 = string;
|
|
3778
3574
|
/**
|
|
3779
3575
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3780
3576
|
*/
|
|
3781
|
-
export type
|
|
3577
|
+
export type PriorEventHash13 = string | null;
|
|
3782
3578
|
/**
|
|
3783
3579
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3784
3580
|
*/
|
|
3785
|
-
export type
|
|
3581
|
+
export type Timestamp13 = number;
|
|
3786
3582
|
/**
|
|
3787
3583
|
* Discriminator type for a tool invocation event.
|
|
3788
3584
|
*/
|
|
3789
|
-
export type
|
|
3585
|
+
export type TopologyClass96 = "tool_invocation";
|
|
3790
3586
|
/**
|
|
3791
3587
|
* The exact tool targeted in the CognitiveActionSpaceManifest.
|
|
3792
3588
|
*/
|
|
@@ -3798,19 +3594,19 @@ export type AuthorizedBudgetMagnitude = number;
|
|
|
3798
3594
|
/**
|
|
3799
3595
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3800
3596
|
*/
|
|
3801
|
-
export type
|
|
3597
|
+
export type EventCid14 = string;
|
|
3802
3598
|
/**
|
|
3803
3599
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3804
3600
|
*/
|
|
3805
|
-
export type
|
|
3601
|
+
export type PriorEventHash14 = string | null;
|
|
3806
3602
|
/**
|
|
3807
3603
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3808
3604
|
*/
|
|
3809
|
-
export type
|
|
3605
|
+
export type Timestamp14 = number;
|
|
3810
3606
|
/**
|
|
3811
3607
|
* Discriminator type for an epistemic promotion event.
|
|
3812
3608
|
*/
|
|
3813
|
-
export type
|
|
3609
|
+
export type TopologyClass97 = "epistemic_promotion";
|
|
3814
3610
|
/**
|
|
3815
3611
|
* The strict array of CIDs (Content Identifiers) representing the raw logs being compressed and archived.
|
|
3816
3612
|
*/
|
|
@@ -3826,19 +3622,19 @@ export type CompressionRatio = number;
|
|
|
3826
3622
|
/**
|
|
3827
3623
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3828
3624
|
*/
|
|
3829
|
-
export type
|
|
3625
|
+
export type EventCid15 = string;
|
|
3830
3626
|
/**
|
|
3831
3627
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3832
3628
|
*/
|
|
3833
|
-
export type
|
|
3629
|
+
export type PriorEventHash15 = string | null;
|
|
3834
3630
|
/**
|
|
3835
3631
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3836
3632
|
*/
|
|
3837
|
-
export type
|
|
3633
|
+
export type Timestamp15 = number;
|
|
3838
3634
|
/**
|
|
3839
3635
|
* Discriminator type for a normative drift event.
|
|
3840
3636
|
*/
|
|
3841
|
-
export type
|
|
3637
|
+
export type TopologyClass98 = "normative_drift";
|
|
3842
3638
|
/**
|
|
3843
3639
|
* The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
|
|
3844
3640
|
*/
|
|
@@ -3854,19 +3650,19 @@ export type ContradictionProofHash = string;
|
|
|
3854
3650
|
/**
|
|
3855
3651
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3856
3652
|
*/
|
|
3857
|
-
export type
|
|
3653
|
+
export type EventCid16 = string;
|
|
3858
3654
|
/**
|
|
3859
3655
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3860
3656
|
*/
|
|
3861
|
-
export type
|
|
3657
|
+
export type PriorEventHash16 = string | null;
|
|
3862
3658
|
/**
|
|
3863
3659
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3864
3660
|
*/
|
|
3865
|
-
export type
|
|
3661
|
+
export type Timestamp16 = number;
|
|
3866
3662
|
/**
|
|
3867
3663
|
* Discriminator type for a persistence commit receipt.
|
|
3868
3664
|
*/
|
|
3869
|
-
export type
|
|
3665
|
+
export type TopologyClass99 = "persistence_commit";
|
|
3870
3666
|
/**
|
|
3871
3667
|
* The external cryptographic receipt generated by Iceberg/Delta.
|
|
3872
3668
|
*/
|
|
@@ -3882,19 +3678,19 @@ export type TargetTableUri = string;
|
|
|
3882
3678
|
/**
|
|
3883
3679
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3884
3680
|
*/
|
|
3885
|
-
export type
|
|
3681
|
+
export type EventCid17 = string;
|
|
3886
3682
|
/**
|
|
3887
3683
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3888
3684
|
*/
|
|
3889
|
-
export type
|
|
3685
|
+
export type PriorEventHash17 = string | null;
|
|
3890
3686
|
/**
|
|
3891
3687
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3892
3688
|
*/
|
|
3893
|
-
export type
|
|
3689
|
+
export type Timestamp17 = number;
|
|
3894
3690
|
/**
|
|
3895
3691
|
* Discriminator type for a token burn receipt.
|
|
3896
3692
|
*/
|
|
3897
|
-
export type
|
|
3693
|
+
export type TopologyClass100 = "token_burn";
|
|
3898
3694
|
/**
|
|
3899
3695
|
* A string linking this burn back to the specific ToolInvocationEvent CID.
|
|
3900
3696
|
*/
|
|
@@ -3914,19 +3710,19 @@ export type BurnMagnitude = number;
|
|
|
3914
3710
|
/**
|
|
3915
3711
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3916
3712
|
*/
|
|
3917
|
-
export type
|
|
3713
|
+
export type EventCid18 = string;
|
|
3918
3714
|
/**
|
|
3919
3715
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3920
3716
|
*/
|
|
3921
|
-
export type
|
|
3717
|
+
export type PriorEventHash18 = string | null;
|
|
3922
3718
|
/**
|
|
3923
3719
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3924
3720
|
*/
|
|
3925
|
-
export type
|
|
3721
|
+
export type Timestamp18 = number;
|
|
3926
3722
|
/**
|
|
3927
3723
|
* Discriminator type for a budget exhaustion event.
|
|
3928
3724
|
*/
|
|
3929
|
-
export type
|
|
3725
|
+
export type TopologyClass101 = "budget_exhaustion";
|
|
3930
3726
|
/**
|
|
3931
3727
|
* A string representing the original escrow boundary breached.
|
|
3932
3728
|
*/
|
|
@@ -3938,19 +3734,19 @@ export type FinalBurnReceiptCid = string;
|
|
|
3938
3734
|
/**
|
|
3939
3735
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3940
3736
|
*/
|
|
3941
|
-
export type
|
|
3737
|
+
export type EventCid19 = string;
|
|
3942
3738
|
/**
|
|
3943
3739
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3944
3740
|
*/
|
|
3945
|
-
export type
|
|
3741
|
+
export type PriorEventHash19 = string | null;
|
|
3946
3742
|
/**
|
|
3947
3743
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3948
3744
|
*/
|
|
3949
|
-
export type
|
|
3745
|
+
export type Timestamp19 = number;
|
|
3950
3746
|
/**
|
|
3951
3747
|
* Discriminator type for telemetry events.
|
|
3952
3748
|
*/
|
|
3953
|
-
export type
|
|
3749
|
+
export type TopologyClass102 = "epistemic_telemetry";
|
|
3954
3750
|
/**
|
|
3955
3751
|
* The exact topological action the human operator performed on the projected manifold.
|
|
3956
3752
|
*/
|
|
@@ -3958,7 +3754,7 @@ export type InteractionModality = "expansion" | "collapse" | "dwell_focus" | "he
|
|
|
3958
3754
|
/**
|
|
3959
3755
|
* The specific TaxonomicNodeState CID that was manipulated.
|
|
3960
3756
|
*/
|
|
3961
|
-
export type
|
|
3757
|
+
export type TargetNodeCid = string;
|
|
3962
3758
|
/**
|
|
3963
3759
|
* The strictly typed temporal bound measuring human attention focus.
|
|
3964
3760
|
*/
|
|
@@ -3966,16 +3762,16 @@ export type DwellDurationMs = number | null;
|
|
|
3966
3762
|
/**
|
|
3967
3763
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3968
3764
|
*/
|
|
3969
|
-
export type
|
|
3765
|
+
export type EventCid20 = string;
|
|
3970
3766
|
/**
|
|
3971
3767
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3972
3768
|
*/
|
|
3973
|
-
export type
|
|
3769
|
+
export type PriorEventHash20 = string | null;
|
|
3974
3770
|
/**
|
|
3975
3771
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3976
3772
|
*/
|
|
3977
|
-
export type
|
|
3978
|
-
export type
|
|
3773
|
+
export type Timestamp20 = number;
|
|
3774
|
+
export type TopologyClass103 = "cognitive_prediction";
|
|
3979
3775
|
export type SourceChainCid = string;
|
|
3980
3776
|
export type TargetSourceConcept = string;
|
|
3981
3777
|
/**
|
|
@@ -3985,16 +3781,16 @@ export type PredictedTopKTokens = [string, ...string[]];
|
|
|
3985
3781
|
/**
|
|
3986
3782
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3987
3783
|
*/
|
|
3988
|
-
export type
|
|
3784
|
+
export type EventCid21 = string;
|
|
3989
3785
|
/**
|
|
3990
3786
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3991
3787
|
*/
|
|
3992
|
-
export type
|
|
3788
|
+
export type PriorEventHash21 = string | null;
|
|
3993
3789
|
/**
|
|
3994
3790
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3995
3791
|
*/
|
|
3996
|
-
export type
|
|
3997
|
-
export type
|
|
3792
|
+
export type Timestamp21 = number;
|
|
3793
|
+
export type TopologyClass104 = "epistemic_axiom_verification";
|
|
3998
3794
|
export type SourcePredictionCid = string;
|
|
3999
3795
|
export type SequenceSimilarityScore = number;
|
|
4000
3796
|
export type FactScorePassed = boolean;
|
|
@@ -4005,57 +3801,16 @@ export type ZeroTrustReceiptCid1 = string | null;
|
|
|
4005
3801
|
/**
|
|
4006
3802
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4007
3803
|
*/
|
|
4008
|
-
export type
|
|
4009
|
-
/**
|
|
4010
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4011
|
-
*/
|
|
4012
|
-
export type PriorEventHash23 = string | null;
|
|
4013
|
-
/**
|
|
4014
|
-
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4015
|
-
*/
|
|
4016
|
-
export type Timestamp23 = number;
|
|
4017
|
-
export type TopologyClass107 = "cognitive_reward_evaluation";
|
|
4018
|
-
/**
|
|
4019
|
-
* The globally unique decentralized identifier (DID) anchoring the LLM's raw generated text trajectory.
|
|
4020
|
-
*/
|
|
4021
|
-
export type SourceGenerationCid = string;
|
|
4022
|
-
/**
|
|
4023
|
-
* The globally unique decentralized identifier (DID) anchoring the origin node.
|
|
4024
|
-
*/
|
|
4025
|
-
export type SourceConceptCid = string;
|
|
4026
|
-
/**
|
|
4027
|
-
* The topological relationship.
|
|
4028
|
-
*/
|
|
4029
|
-
export type DirectedEdgeClass = string;
|
|
4030
|
-
/**
|
|
4031
|
-
* The globally unique decentralized identifier (DID) anchoring destination node.
|
|
4032
|
-
*/
|
|
4033
|
-
export type TargetConceptCid = string;
|
|
4034
|
-
/**
|
|
4035
|
-
* The specific axiomatic claims extracted exclusively from the bounded reasoning block.
|
|
4036
|
-
*/
|
|
4037
|
-
export type ExtractedAxioms = EpistemicAxiomState[];
|
|
4038
|
-
/**
|
|
4039
|
-
* The dense reasoning reward signal derived from the verified axioms.
|
|
4040
|
-
*/
|
|
4041
|
-
export type CalculatedRPath = number;
|
|
4042
|
-
/**
|
|
4043
|
-
* The final computed GRPO advantage signal used to update the policy gradients.
|
|
4044
|
-
*/
|
|
4045
|
-
export type TotalAdvantageScore = number;
|
|
4046
|
-
/**
|
|
4047
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4048
|
-
*/
|
|
4049
|
-
export type EventCid24 = string;
|
|
3804
|
+
export type EventCid22 = string;
|
|
4050
3805
|
/**
|
|
4051
3806
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4052
3807
|
*/
|
|
4053
|
-
export type
|
|
3808
|
+
export type PriorEventHash22 = string | null;
|
|
4054
3809
|
/**
|
|
4055
3810
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4056
3811
|
*/
|
|
4057
|
-
export type
|
|
4058
|
-
export type
|
|
3812
|
+
export type Timestamp22 = number;
|
|
3813
|
+
export type TopologyClass105 = "epistemic_flow_state";
|
|
4059
3814
|
/**
|
|
4060
3815
|
* The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
|
|
4061
3816
|
*/
|
|
@@ -4071,19 +3826,19 @@ export type TerminalRewardFactorized = boolean;
|
|
|
4071
3826
|
/**
|
|
4072
3827
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4073
3828
|
*/
|
|
4074
|
-
export type
|
|
3829
|
+
export type EventCid23 = string;
|
|
4075
3830
|
/**
|
|
4076
3831
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4077
3832
|
*/
|
|
4078
|
-
export type
|
|
3833
|
+
export type PriorEventHash23 = string | null;
|
|
4079
3834
|
/**
|
|
4080
3835
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4081
3836
|
*/
|
|
4082
|
-
export type
|
|
3837
|
+
export type Timestamp23 = number;
|
|
4083
3838
|
/**
|
|
4084
3839
|
* Discriminator type for a causal explanation event.
|
|
4085
3840
|
*/
|
|
4086
|
-
export type
|
|
3841
|
+
export type TopologyClass106 = "causal_explanation";
|
|
4087
3842
|
/**
|
|
4088
3843
|
* The globally unique decentralized identifier (DID) anchoring the collective outcome being explained.
|
|
4089
3844
|
*/
|
|
@@ -4123,19 +3878,19 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
|
|
|
4123
3878
|
/**
|
|
4124
3879
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4125
3880
|
*/
|
|
4126
|
-
export type
|
|
3881
|
+
export type EventCid24 = string;
|
|
4127
3882
|
/**
|
|
4128
3883
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4129
3884
|
*/
|
|
4130
|
-
export type
|
|
3885
|
+
export type PriorEventHash24 = string | null;
|
|
4131
3886
|
/**
|
|
4132
3887
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4133
3888
|
*/
|
|
4134
|
-
export type
|
|
3889
|
+
export type Timestamp24 = number;
|
|
4135
3890
|
/**
|
|
4136
3891
|
* Discriminator type for an intent classification receipt.
|
|
4137
3892
|
*/
|
|
4138
|
-
export type
|
|
3893
|
+
export type TopologyClass107 = "intent_classification";
|
|
4139
3894
|
/**
|
|
4140
3895
|
* The raw, unparsed human natural language instruction.
|
|
4141
3896
|
*/
|
|
@@ -4152,19 +3907,19 @@ export type ConfidenceScore1 = number;
|
|
|
4152
3907
|
* The TaxonomicRoutingPolicy CID that governed this classification.
|
|
4153
3908
|
*/
|
|
4154
3909
|
export type RoutingPolicyCid = string | null;
|
|
4155
|
-
export type
|
|
3910
|
+
export type TopologyClass108 = "semantic_relational_record";
|
|
4156
3911
|
/**
|
|
4157
3912
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4158
3913
|
*/
|
|
4159
|
-
export type
|
|
3914
|
+
export type EventCid25 = string;
|
|
4160
3915
|
/**
|
|
4161
3916
|
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
4162
3917
|
*/
|
|
4163
|
-
export type
|
|
3918
|
+
export type PriorEventHash25 = string | null;
|
|
4164
3919
|
/**
|
|
4165
3920
|
* The precise temporal coordinate of the event realization.
|
|
4166
3921
|
*/
|
|
4167
|
-
export type
|
|
3922
|
+
export type Timestamp25 = number;
|
|
4168
3923
|
/**
|
|
4169
3924
|
* The domain-independent structural classification of the record.
|
|
4170
3925
|
*/
|
|
@@ -4176,19 +3931,19 @@ export type FormalSchemaUrn1 = string | null;
|
|
|
4176
3931
|
/**
|
|
4177
3932
|
* Discriminator for the reification receipt.
|
|
4178
3933
|
*/
|
|
4179
|
-
export type
|
|
3934
|
+
export type TopologyClass109 = "ontological_reification";
|
|
4180
3935
|
/**
|
|
4181
3936
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4182
3937
|
*/
|
|
4183
|
-
export type
|
|
3938
|
+
export type EventCid26 = string;
|
|
4184
3939
|
/**
|
|
4185
3940
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
4186
3941
|
*/
|
|
4187
|
-
export type
|
|
3942
|
+
export type PriorEventHash26 = string | null;
|
|
4188
3943
|
/**
|
|
4189
3944
|
* The precise temporal coordinate of the event realization.
|
|
4190
3945
|
*/
|
|
4191
|
-
export type
|
|
3946
|
+
export type Timestamp26 = number;
|
|
4192
3947
|
/**
|
|
4193
3948
|
* The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
|
|
4194
3949
|
*/
|
|
@@ -4208,19 +3963,19 @@ export type IsLatentInference = boolean;
|
|
|
4208
3963
|
/**
|
|
4209
3964
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4210
3965
|
*/
|
|
4211
|
-
export type
|
|
3966
|
+
export type EventCid27 = string;
|
|
4212
3967
|
/**
|
|
4213
3968
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4214
3969
|
*/
|
|
4215
|
-
export type
|
|
3970
|
+
export type PriorEventHash27 = string | null;
|
|
4216
3971
|
/**
|
|
4217
3972
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4218
3973
|
*/
|
|
4219
|
-
export type
|
|
3974
|
+
export type Timestamp27 = number;
|
|
4220
3975
|
/**
|
|
4221
3976
|
* The type of the resilience payload.
|
|
4222
3977
|
*/
|
|
4223
|
-
export type
|
|
3978
|
+
export type TopologyClass110 = "circuit_breaker_event";
|
|
4224
3979
|
/**
|
|
4225
3980
|
* Signature or summary of the error causing the trip.
|
|
4226
3981
|
*/
|
|
@@ -4228,19 +3983,51 @@ export type ErrorSignature = string;
|
|
|
4228
3983
|
/**
|
|
4229
3984
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4230
3985
|
*/
|
|
4231
|
-
export type
|
|
3986
|
+
export type EventCid28 = string;
|
|
4232
3987
|
/**
|
|
4233
3988
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4234
3989
|
*/
|
|
4235
|
-
export type
|
|
3990
|
+
export type PriorEventHash28 = string | null;
|
|
3991
|
+
/**
|
|
3992
|
+
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3993
|
+
*/
|
|
3994
|
+
export type Timestamp28 = number;
|
|
3995
|
+
/**
|
|
3996
|
+
* Discriminator type for an exogenous event.
|
|
3997
|
+
*/
|
|
3998
|
+
export type TopologyClass111 = "exogenous_event";
|
|
3999
|
+
/**
|
|
4000
|
+
* Cryptographic identifier for the Black Swan event.
|
|
4001
|
+
*/
|
|
4002
|
+
export type ShockCid = string;
|
|
4003
|
+
/**
|
|
4004
|
+
* Regex-bound SHA-256 string targeting a specific Merkle root in the epistemic graph.
|
|
4005
|
+
*/
|
|
4006
|
+
export type TargetNodeHash = string;
|
|
4007
|
+
/**
|
|
4008
|
+
* Strictly bounded mathematical quantification of the epistemic decay or Variational Free Energy.
|
|
4009
|
+
*/
|
|
4010
|
+
export type BayesianSurpriseScore1 = number;
|
|
4011
|
+
/**
|
|
4012
|
+
* The strictly typed boundary requiring locked magnitude to prevent zero-cost griefing of the swarm.
|
|
4013
|
+
*/
|
|
4014
|
+
export type LockedMagnitude = number;
|
|
4015
|
+
/**
|
|
4016
|
+
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4017
|
+
*/
|
|
4018
|
+
export type EventCid29 = string;
|
|
4019
|
+
/**
|
|
4020
|
+
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4021
|
+
*/
|
|
4022
|
+
export type PriorEventHash29 = string | null;
|
|
4236
4023
|
/**
|
|
4237
4024
|
* Discriminator type for a log event.
|
|
4238
4025
|
*/
|
|
4239
|
-
export type
|
|
4026
|
+
export type TopologyClass112 = "epistemic_log";
|
|
4240
4027
|
/**
|
|
4241
4028
|
* The UNIX timestamp of the log event.
|
|
4242
4029
|
*/
|
|
4243
|
-
export type
|
|
4030
|
+
export type Timestamp29 = number;
|
|
4244
4031
|
/**
|
|
4245
4032
|
* The severity level of the log event.
|
|
4246
4033
|
*/
|
|
@@ -4253,19 +4040,19 @@ export type TelemetryScalarState = string | number | boolean | null;
|
|
|
4253
4040
|
/**
|
|
4254
4041
|
* The type of the intervention payload.
|
|
4255
4042
|
*/
|
|
4256
|
-
export type
|
|
4043
|
+
export type TopologyClass113 = "verdict";
|
|
4257
4044
|
/**
|
|
4258
4045
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4259
4046
|
*/
|
|
4260
|
-
export type
|
|
4047
|
+
export type EventCid30 = string;
|
|
4261
4048
|
/**
|
|
4262
4049
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4263
4050
|
*/
|
|
4264
|
-
export type
|
|
4051
|
+
export type PriorEventHash30 = string | null;
|
|
4265
4052
|
/**
|
|
4266
4053
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4267
4054
|
*/
|
|
4268
|
-
export type
|
|
4055
|
+
export type Timestamp30 = number;
|
|
4269
4056
|
/**
|
|
4270
4057
|
* The cryptographic nonce uniquely identifying the intervention request.
|
|
4271
4058
|
*/
|
|
@@ -4301,16 +4088,16 @@ export type LivenessChallengeHash = string;
|
|
|
4301
4088
|
/**
|
|
4302
4089
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4303
4090
|
*/
|
|
4304
|
-
export type
|
|
4091
|
+
export type EventCid31 = string;
|
|
4305
4092
|
/**
|
|
4306
4093
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4307
4094
|
*/
|
|
4308
|
-
export type
|
|
4095
|
+
export type PriorEventHash31 = string | null;
|
|
4309
4096
|
/**
|
|
4310
4097
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4311
4098
|
*/
|
|
4312
|
-
export type
|
|
4313
|
-
export type
|
|
4099
|
+
export type Timestamp31 = number;
|
|
4100
|
+
export type TopologyClass114 = "custody_receipt";
|
|
4314
4101
|
/**
|
|
4315
4102
|
* Unique identifier for this chain-of-custody entry.
|
|
4316
4103
|
*/
|
|
@@ -4338,16 +4125,16 @@ export type RedactionTimestampUnixNano = number;
|
|
|
4338
4125
|
/**
|
|
4339
4126
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4340
4127
|
*/
|
|
4341
|
-
export type
|
|
4128
|
+
export type EventCid32 = string;
|
|
4342
4129
|
/**
|
|
4343
4130
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4344
4131
|
*/
|
|
4345
|
-
export type
|
|
4132
|
+
export type PriorEventHash32 = string | null;
|
|
4346
4133
|
/**
|
|
4347
4134
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4348
4135
|
*/
|
|
4349
|
-
export type
|
|
4350
|
-
export type
|
|
4136
|
+
export type Timestamp32 = number;
|
|
4137
|
+
export type TopologyClass115 = "defeasible_attack";
|
|
4351
4138
|
/**
|
|
4352
4139
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
|
|
4353
4140
|
*/
|
|
@@ -4363,16 +4150,16 @@ export type TargetClaimCid = string;
|
|
|
4363
4150
|
/**
|
|
4364
4151
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4365
4152
|
*/
|
|
4366
|
-
export type
|
|
4153
|
+
export type EventCid33 = string;
|
|
4367
4154
|
/**
|
|
4368
4155
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4369
4156
|
*/
|
|
4370
|
-
export type
|
|
4157
|
+
export type PriorEventHash33 = string | null;
|
|
4371
4158
|
/**
|
|
4372
4159
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4373
4160
|
*/
|
|
4374
|
-
export type
|
|
4375
|
-
export type
|
|
4161
|
+
export type Timestamp33 = number;
|
|
4162
|
+
export type TopologyClass116 = "epistemic_rejection";
|
|
4376
4163
|
export type ReceiptCid1 = string;
|
|
4377
4164
|
export type FailedProjectionCid = string;
|
|
4378
4165
|
export type ViolatedAlgebraicConstraint = string;
|
|
@@ -4381,16 +4168,16 @@ export type StochasticMutationGradient = string;
|
|
|
4381
4168
|
/**
|
|
4382
4169
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4383
4170
|
*/
|
|
4384
|
-
export type
|
|
4171
|
+
export type EventCid34 = string;
|
|
4385
4172
|
/**
|
|
4386
4173
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
4387
4174
|
*/
|
|
4388
|
-
export type
|
|
4175
|
+
export type PriorEventHash34 = string | null;
|
|
4389
4176
|
/**
|
|
4390
4177
|
* The precise temporal coordinate of the event realization.
|
|
4391
4178
|
*/
|
|
4392
|
-
export type
|
|
4393
|
-
export type
|
|
4179
|
+
export type Timestamp34 = number;
|
|
4180
|
+
export type TopologyClass117 = "formal_verification_receipt";
|
|
4394
4181
|
/**
|
|
4395
4182
|
* The definitive Boolean evaluating whether the proof succeeded, the program is satisfiable, or the deduction holds true.
|
|
4396
4183
|
*/
|
|
@@ -4409,43 +4196,43 @@ export type FailingContext = string | null;
|
|
|
4409
4196
|
export type ExtractedBindings = {
|
|
4410
4197
|
[k: string]: JsonPrimitiveState;
|
|
4411
4198
|
}[];
|
|
4412
|
-
export type
|
|
4199
|
+
export type TopologyClass118 = "belief_modulation";
|
|
4413
4200
|
export type ReceiptCid2 = string;
|
|
4414
4201
|
/**
|
|
4415
4202
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4416
4203
|
*/
|
|
4417
|
-
export type
|
|
4204
|
+
export type EventCid35 = string;
|
|
4418
4205
|
/**
|
|
4419
4206
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4420
4207
|
*/
|
|
4421
|
-
export type
|
|
4208
|
+
export type PriorEventHash35 = string | null;
|
|
4422
4209
|
/**
|
|
4423
4210
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4424
4211
|
*/
|
|
4425
|
-
export type
|
|
4212
|
+
export type Timestamp35 = number;
|
|
4426
4213
|
export type TargetGraphCid4 = string;
|
|
4427
4214
|
export type SeveredEdgeCids = string[];
|
|
4428
|
-
export type
|
|
4215
|
+
export type TopologyClass119 = "rdf_export_receipt";
|
|
4429
4216
|
export type ExportCid1 = string;
|
|
4430
4217
|
/**
|
|
4431
4218
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4432
4219
|
*/
|
|
4433
|
-
export type
|
|
4220
|
+
export type EventCid36 = string;
|
|
4434
4221
|
/**
|
|
4435
4222
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4436
4223
|
*/
|
|
4437
|
-
export type
|
|
4224
|
+
export type PriorEventHash36 = string | null;
|
|
4438
4225
|
/**
|
|
4439
4226
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4440
4227
|
*/
|
|
4441
|
-
export type
|
|
4228
|
+
export type Timestamp36 = number;
|
|
4442
4229
|
export type SerializedPayload = string;
|
|
4443
4230
|
export type RdfTripleCount = number;
|
|
4444
4231
|
export type Sha256GraphHash = string;
|
|
4445
|
-
export type
|
|
4446
|
-
export type
|
|
4447
|
-
export type
|
|
4448
|
-
export type
|
|
4232
|
+
export type EventCid37 = string;
|
|
4233
|
+
export type PriorEventHash37 = string | null;
|
|
4234
|
+
export type Timestamp37 = number;
|
|
4235
|
+
export type TopologyClass120 = "epistemic_starvation";
|
|
4449
4236
|
/**
|
|
4450
4237
|
* The cryptographic pointer to the specific edge that failed empirical grounding.
|
|
4451
4238
|
*/
|
|
@@ -4458,10 +4245,10 @@ export type FailedCitations = EvidentiaryCitationState[];
|
|
|
4458
4245
|
* The semantic explanation for the starvation (e.g., 'Maximum search retries exhausted').
|
|
4459
4246
|
*/
|
|
4460
4247
|
export type DiagnosticReason = string;
|
|
4461
|
-
export type
|
|
4462
|
-
export type
|
|
4463
|
-
export type
|
|
4464
|
-
export type
|
|
4248
|
+
export type EventCid38 = string;
|
|
4249
|
+
export type PriorEventHash38 = string | null;
|
|
4250
|
+
export type Timestamp38 = number;
|
|
4251
|
+
export type TopologyClass121 = "sparql_query_result";
|
|
4465
4252
|
/**
|
|
4466
4253
|
* A pointer back to the SPARQLQueryIntent that authorized this execution.
|
|
4467
4254
|
*/
|
|
@@ -4473,7 +4260,7 @@ export type ExecutionTimeMs = number;
|
|
|
4473
4260
|
/**
|
|
4474
4261
|
* Discriminator for the OracleExecutionReceipt topology.
|
|
4475
4262
|
*/
|
|
4476
|
-
export type
|
|
4263
|
+
export type TopologyClass122 = "oracle_execution_receipt";
|
|
4477
4264
|
/**
|
|
4478
4265
|
* The SHA-256 hash of the complete execution payload, providing undeniable cryptographic provenance for the Merkle-DAG audit trail.
|
|
4479
4266
|
*/
|
|
@@ -4498,11 +4285,11 @@ export type AnyTransitionEdge = TransitionEdgeProfile | CyclicEdgeProfile;
|
|
|
4498
4285
|
/**
|
|
4499
4286
|
* Discriminator type for an acyclic edge.
|
|
4500
4287
|
*/
|
|
4501
|
-
export type
|
|
4288
|
+
export type TopologyClass123 = "acyclic";
|
|
4502
4289
|
/**
|
|
4503
4290
|
* The coinductive pointer to the destination capability.
|
|
4504
4291
|
*/
|
|
4505
|
-
export type
|
|
4292
|
+
export type TargetNodeCid1 = string | null;
|
|
4506
4293
|
/**
|
|
4507
4294
|
* The RFC 6902 JSON Pointer extracting the Covariant output.
|
|
4508
4295
|
*/
|
|
@@ -4530,11 +4317,11 @@ export type ComputeWeightMagnitude = number;
|
|
|
4530
4317
|
/**
|
|
4531
4318
|
* Discriminator type for a cyclic edge.
|
|
4532
4319
|
*/
|
|
4533
|
-
export type
|
|
4320
|
+
export type TopologyClass124 = "cyclic";
|
|
4534
4321
|
/**
|
|
4535
4322
|
* The coinductive pointer to the destination capability.
|
|
4536
4323
|
*/
|
|
4537
|
-
export type
|
|
4324
|
+
export type TargetNodeCid2 = string | null;
|
|
4538
4325
|
/**
|
|
4539
4326
|
* The algebraic translation matrix mapping the source's Covariant output to the Contravariant input.
|
|
4540
4327
|
*/
|
|
@@ -4616,7 +4403,7 @@ export type EntryPointCid = string;
|
|
|
4616
4403
|
/**
|
|
4617
4404
|
* Unique identifier for this specific separation boundary.
|
|
4618
4405
|
*/
|
|
4619
|
-
export type
|
|
4406
|
+
export type PolicyCid1 = string;
|
|
4620
4407
|
/**
|
|
4621
4408
|
* A topological matrix of tool names or MCP URIs. If an agent mounts one capability in a cluster, all other capabilities in that cluster are mathematically quarantined.
|
|
4622
4409
|
*/
|
|
@@ -4890,6 +4677,18 @@ export type Justification19 = string;
|
|
|
4890
4677
|
* The foundational premises supporting this claim.
|
|
4891
4678
|
*/
|
|
4892
4679
|
export type Warrants = EvidentiaryWarrantState[];
|
|
4680
|
+
/**
|
|
4681
|
+
* The globally unique decentralized identifier (DID) anchoring the origin node.
|
|
4682
|
+
*/
|
|
4683
|
+
export type SourceConceptCid = string;
|
|
4684
|
+
/**
|
|
4685
|
+
* The topological relationship.
|
|
4686
|
+
*/
|
|
4687
|
+
export type DirectedEdgeClass = string;
|
|
4688
|
+
/**
|
|
4689
|
+
* The globally unique decentralized identifier (DID) anchoring destination node.
|
|
4690
|
+
*/
|
|
4691
|
+
export type TargetConceptCid = string;
|
|
4893
4692
|
export type ChainCid = string;
|
|
4894
4693
|
/**
|
|
4895
4694
|
* @minItems 1
|
|
@@ -5075,10 +4874,6 @@ export type SopCid = string;
|
|
|
5075
4874
|
* The exact topological flow between step_cids.
|
|
5076
4875
|
*/
|
|
5077
4876
|
export type ChronologicalFlowEdges1 = [unknown, unknown][];
|
|
5078
|
-
/**
|
|
5079
|
-
* The strict array of Process Reward Contracts evaluating the logic.
|
|
5080
|
-
*/
|
|
5081
|
-
export type PrmEvaluations = ProcessRewardContract[];
|
|
5082
4877
|
/**
|
|
5083
4878
|
* AGENT INSTRUCTION: Defines the minimum cryptographic isolation perimeter required for this node's thermodynamic execution.
|
|
5084
4879
|
*
|
|
@@ -5117,7 +4912,6 @@ export type MutableMatrix = {
|
|
|
5117
4912
|
* A flag allowing the output to only return the keys in mutable_matrix that changed, rather than forcing the entire array back up the network.
|
|
5118
4913
|
*/
|
|
5119
4914
|
export type IsDelta = boolean;
|
|
5120
|
-
export type FaultCategoryProfile = "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
|
|
5121
4915
|
/**
|
|
5122
4916
|
* The mathematical dialect and theorem prover used to compile the proof.
|
|
5123
4917
|
*/
|
|
@@ -5466,7 +5260,7 @@ export type TabularEncodingProfile1 = "feature_wise_attention" | "hyperdimension
|
|
|
5466
5260
|
/**
|
|
5467
5261
|
* Unique identifier for this pre-flight routing policy.
|
|
5468
5262
|
*/
|
|
5469
|
-
export type
|
|
5263
|
+
export type PolicyCid2 = string;
|
|
5470
5264
|
/**
|
|
5471
5265
|
* The deterministic default applied if intent classification falls below the safety threshold.
|
|
5472
5266
|
*/
|
|
@@ -5534,9 +5328,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5534
5328
|
AdjudicationIntent?: AdjudicationIntent;
|
|
5535
5329
|
AdjudicationReceipt?: AdjudicationReceipt;
|
|
5536
5330
|
AdjudicationRubricProfile?: AdjudicationRubricProfile;
|
|
5537
|
-
AdversarialEmulationProfile?: AdversarialEmulationProfile;
|
|
5538
5331
|
AdversarialMarketTopologyManifest?: AdversarialMarketTopologyManifest;
|
|
5539
|
-
AdversarialSimulationProfile?: AdversarialSimulationProfile;
|
|
5540
5332
|
AgentAttestationReceipt?: AgentAttestationReceipt;
|
|
5541
5333
|
AgentBidIntent?: AgentBidIntent;
|
|
5542
5334
|
AlgebraicRefinementContract?: AlgebraicRefinementContract;
|
|
@@ -5577,18 +5369,15 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5577
5369
|
CausalExplanationEvent?: CausalExplanationEvent;
|
|
5578
5370
|
CausalIntervalProfile?: CausalIntervalProfile;
|
|
5579
5371
|
CausalPropagationIntent?: CausalPropagationIntent;
|
|
5580
|
-
ChaosExperimentTask?: ChaosExperimentTask;
|
|
5581
5372
|
CircuitBreakerEvent?: CircuitBreakerEvent;
|
|
5582
5373
|
CognitiveActionSpaceManifest?: CognitiveActionSpaceManifest;
|
|
5583
5374
|
CognitiveAgentNodeProfile?: CognitiveAgentNodeProfile;
|
|
5584
5375
|
CognitiveCritiqueProfile?: CognitiveCritiqueProfile1;
|
|
5585
5376
|
CognitiveDetailedBalanceContract?: CognitiveDetailedBalanceContract;
|
|
5586
5377
|
CognitiveDualVerificationReceipt?: CognitiveDualVerificationReceipt;
|
|
5587
|
-
CognitiveFormatContract?: CognitiveFormatContract1;
|
|
5588
5378
|
CognitiveHumanNodeProfile?: CognitiveHumanNodeProfile;
|
|
5589
5379
|
CognitivePredictionReceipt?: CognitivePredictionReceipt;
|
|
5590
5380
|
CognitiveReasoningTraceState?: CognitiveReasoningTraceState;
|
|
5591
|
-
CognitiveRewardEvaluationReceipt?: CognitiveRewardEvaluationReceipt;
|
|
5592
5381
|
CognitiveRoutingContract?: CognitiveRoutingContract;
|
|
5593
5382
|
CognitiveSamplingPolicy?: CognitiveSamplingPolicy;
|
|
5594
5383
|
CognitiveStateProfile?: CognitiveStateProfile;
|
|
@@ -5605,7 +5394,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5605
5394
|
ConsensusPolicy?: ConsensusPolicy;
|
|
5606
5395
|
ConstitutionalAmendmentIntent?: ConstitutionalAmendmentIntent;
|
|
5607
5396
|
ConstitutionalPolicy?: ConstitutionalPolicy;
|
|
5608
|
-
ConstrainedDecodingPolicy?:
|
|
5397
|
+
ConstrainedDecodingPolicy?: ConstrainedDecodingPolicy;
|
|
5609
5398
|
ContextExpansionPolicy?: ContextExpansionPolicy;
|
|
5610
5399
|
ContextualSemanticResolutionIntent?: ContextualSemanticResolutionIntent;
|
|
5611
5400
|
ContextualizedSourceState?: ContextualizedSourceState3;
|
|
@@ -5640,7 +5429,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5640
5429
|
DocumentLayoutManifest?: DocumentLayoutManifest;
|
|
5641
5430
|
DocumentLayoutRegionState?: DocumentLayoutRegionState;
|
|
5642
5431
|
DraftingIntent?: DraftingIntent;
|
|
5643
|
-
DynamicConvergenceSLA?: DynamicConvergenceSLA;
|
|
5644
5432
|
DynamicLayoutManifest?: DynamicLayoutManifest;
|
|
5645
5433
|
DynamicManifoldProjectionManifest?: DynamicManifoldProjectionManifest1;
|
|
5646
5434
|
DynamicRoutingManifest?: DynamicRoutingManifest;
|
|
@@ -5649,7 +5437,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5649
5437
|
EmpiricalFalsificationContract?: EmpiricalFalsificationContract;
|
|
5650
5438
|
EmpiricalStatisticalProfile?: EmpiricalStatisticalProfile;
|
|
5651
5439
|
EnsembleTopologyProfile?: EnsembleTopologyProfile;
|
|
5652
|
-
EnvironmentalSpoofingProfile?: EnvironmentalSpoofingProfile;
|
|
5653
5440
|
EphemeralNamespacePartitionState?: EphemeralNamespacePartitionState;
|
|
5654
5441
|
EpistemicArgumentClaimState?: EpistemicArgumentClaimState;
|
|
5655
5442
|
EpistemicArgumentGraphState?: EpistemicArgumentGraphState;
|
|
@@ -5673,7 +5460,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5673
5460
|
EpistemicProxyState_Any_?: EpistemicProxyStateAny;
|
|
5674
5461
|
EpistemicQuarantineSnapshot?: EpistemicQuarantineSnapshot;
|
|
5675
5462
|
EpistemicRejectionReceipt?: EpistemicRejectionReceipt;
|
|
5676
|
-
EpistemicRewardGradientPolicy?: EpistemicRewardGradientPolicy;
|
|
5677
5463
|
EpistemicRigidityPolicy?: EpistemicRigidityPolicy;
|
|
5678
5464
|
EpistemicSOPManifest?: EpistemicSOPManifest;
|
|
5679
5465
|
EpistemicScanningPolicy?: EpistemicScanningPolicy;
|
|
@@ -5705,8 +5491,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5705
5491
|
FallbackIntent?: FallbackIntent;
|
|
5706
5492
|
FallbackSLA?: FallbackSLA;
|
|
5707
5493
|
FalsificationContract?: FalsificationContract;
|
|
5708
|
-
FaultCategoryProfile?: FaultCategoryProfile;
|
|
5709
|
-
FaultInjectionProfile?: FaultInjectionProfile;
|
|
5710
5494
|
FitnessObjectiveProfile?: FitnessObjectiveProfile;
|
|
5711
5495
|
FormalLogicPremise?: FormalLogicPremise;
|
|
5712
5496
|
FormalVerificationContract?: FormalVerificationContract;
|
|
@@ -5744,7 +5528,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5744
5528
|
JsonPrimitiveState?: JsonPrimitiveState;
|
|
5745
5529
|
KinematicDeltaManifest?: KinematicDeltaManifest;
|
|
5746
5530
|
KinematicDerivativeProfile?: KinematicDerivativeProfile;
|
|
5747
|
-
KinematicNoiseProfile?: KinematicNoiseProfile;
|
|
5748
5531
|
KineticBudgetPolicy?: KineticBudgetPolicy;
|
|
5749
5532
|
KineticSeparationPolicy?: KineticSeparationPolicy;
|
|
5750
5533
|
LatentProjectionIntent?: LatentProjectionIntent;
|
|
@@ -5761,7 +5544,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5761
5544
|
MCPResourceManifest?: MCPResourceManifest;
|
|
5762
5545
|
MCPServerManifest?: MCPServerManifest;
|
|
5763
5546
|
MCPToolDefinition?: MCPToolDefinition;
|
|
5764
|
-
MCPTransportProfile?: MCPTransportProfile;
|
|
5765
5547
|
MacroGridProfile?: MacroGridProfile;
|
|
5766
5548
|
ManifestViolationReceipt?: ManifestViolationReceipt;
|
|
5767
5549
|
ManifoldAlignmentMetricProfile?: ManifoldAlignmentMetricProfile2;
|
|
@@ -5805,7 +5587,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5805
5587
|
PredictionMarketState?: PredictionMarketState;
|
|
5806
5588
|
PresentationManifest?: PresentationManifest;
|
|
5807
5589
|
ProceduralMetadataManifest?: ProceduralMetadataManifest;
|
|
5808
|
-
ProcessRewardContract?: ProcessRewardContract;
|
|
5809
5590
|
ProfileCIDState?: ProfileCIDState;
|
|
5810
5591
|
QoSClassificationProfile?: QoSClassificationProfile;
|
|
5811
5592
|
QuarantineIntent?: QuarantineIntent;
|
|
@@ -5861,7 +5642,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5861
5642
|
StateMutationIntent?: StateMutationIntent;
|
|
5862
5643
|
StateVectorProfile?: StateVectorProfile1;
|
|
5863
5644
|
StdioTransportProfile?: StdioTransportProfile;
|
|
5864
|
-
SteadyStateHypothesisState?: SteadyStateHypothesisState1;
|
|
5865
5645
|
StochasticNodeState?: StochasticNodeState;
|
|
5866
5646
|
StochasticTopologyManifest?: StochasticTopologyManifest;
|
|
5867
5647
|
StrategicThoughtNodeIntent?: StrategicThoughtNodeIntent;
|
|
@@ -5903,7 +5683,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5903
5683
|
TopologicalFidelityReceipt?: TopologicalFidelityReceipt1;
|
|
5904
5684
|
TopologicalProjectionIntent?: TopologicalProjectionIntent;
|
|
5905
5685
|
TopologicalRetrievalContract?: TopologicalRetrievalContract;
|
|
5906
|
-
TopologicalRewardContract?: TopologicalRewardContract;
|
|
5907
5686
|
TopologyHashReceipt?: TopologyHashReceipt;
|
|
5908
5687
|
TraceContextState?: TraceContextState1;
|
|
5909
5688
|
TransformationMechanismProfile?: TransformationMechanismProfile1;
|
|
@@ -6122,107 +5901,6 @@ export interface GradingCriterionProfile {
|
|
|
6122
5901
|
description: Description;
|
|
6123
5902
|
weight: Weight;
|
|
6124
5903
|
}
|
|
6125
|
-
/**
|
|
6126
|
-
* CoReason Shared Kernel Ontology
|
|
6127
|
-
*
|
|
6128
|
-
* AGENT INSTRUCTION: Aggregates the full Adversarial Emulation geometry, composing
|
|
6129
|
-
* KinematicNoiseProfile (pointer perturbation) and EnvironmentalSpoofingProfile
|
|
6130
|
-
* (browser fingerprint masking) into a unified anti-detection manifold governed by
|
|
6131
|
-
* a generative imitation learning persona. As a ...Profile suffix, this is a
|
|
6132
|
-
* declarative, frozen snapshot of an N-dimensional emulation coordinate.
|
|
6133
|
-
*
|
|
6134
|
-
* CAUSAL AFFORDANCE: Authorizes the orchestrator's Spatial Kinematics engine to
|
|
6135
|
-
* simultaneously inject stochastic pointer noise and spoof environmental telemetry,
|
|
6136
|
-
* achieving a target emulation_fidelity_target score against anti-bot heuristics
|
|
6137
|
-
* while behaviorally mimicking the selected generative_persona.
|
|
6138
|
-
*
|
|
6139
|
-
* EPISTEMIC BOUNDS: The emulation_fidelity_target is strictly clamped to the
|
|
6140
|
-
* normalized probability range (ge=0.0, le=1.0). Both sub-profiles are optional
|
|
6141
|
-
* (default=None), allowing partial emulation geometries. The generative_persona
|
|
6142
|
-
* is locked to a Literal automaton ["hesitant_novice", "fast_expert",
|
|
6143
|
-
* "distracted_browser"].
|
|
6144
|
-
*
|
|
6145
|
-
* MCP ROUTING TRIGGERS: Adversarial Emulation, Anti-Bot Evasion, Imitation
|
|
6146
|
-
* Learning, Browser Fingerprint Spoofing, Emulation Fidelity
|
|
6147
|
-
*/
|
|
6148
|
-
export interface AdversarialEmulationProfile {
|
|
6149
|
-
generative_persona?: GenerativePersona;
|
|
6150
|
-
/**
|
|
6151
|
-
* The stochastic pointer trajectory perturbation profile for human-like motor control emulation.
|
|
6152
|
-
*/
|
|
6153
|
-
kinematic_noise?: KinematicNoiseProfile | null;
|
|
6154
|
-
/**
|
|
6155
|
-
* The browser fingerprint and environmental telemetry spoofing geometry.
|
|
6156
|
-
*/
|
|
6157
|
-
environmental_spoofing?: EnvironmentalSpoofingProfile | null;
|
|
6158
|
-
emulation_fidelity_target: EmulationFidelityTarget;
|
|
6159
|
-
}
|
|
6160
|
-
/**
|
|
6161
|
-
* CoReason Shared Kernel Ontology
|
|
6162
|
-
*
|
|
6163
|
-
* AGENT INSTRUCTION: Implements Stochastic Process Theory (1/f^β spectral noise)
|
|
6164
|
-
* and Hick-Hyman Law cognitive delay modeling to inject human-like motor control
|
|
6165
|
-
* perturbations into pointer trajectories, preventing deterministic bot-detection
|
|
6166
|
-
* via timing analysis. As a ...Profile suffix, this is a declarative, frozen
|
|
6167
|
-
* snapshot of a noise geometry.
|
|
6168
|
-
*
|
|
6169
|
-
* CAUSAL AFFORDANCE: Authorizes the Spatial Kinematics engine to perturb each
|
|
6170
|
-
* SE3TransformProfile along the Bezier trajectory by sampling from the
|
|
6171
|
-
* specified noise distribution, achieving biomechanically plausible jitter with
|
|
6172
|
-
* cognitive delay and corrective submovements.
|
|
6173
|
-
*
|
|
6174
|
-
* EPISTEMIC BOUNDS: The pink_noise_amplitude is strictly clamped to the
|
|
6175
|
-
* normalized range (ge=0.0, le=1.0), preventing trajectory corruption. The
|
|
6176
|
-
* frequency_exponent (1/f^β) is bounded (ge=0.0, le=5.0) to cover the full
|
|
6177
|
-
* spectrum from white noise (β=0) to black noise (β≥2). The noise_class Literal
|
|
6178
|
-
* automaton locks generation to ["pink", "brownian", "gaussian"]. The
|
|
6179
|
-
* velocity_profile is locked to ["minimum_jerk", "constant",
|
|
6180
|
-
* "fractional_brownian"]. target_overshoot_radius_pixels is bounded (ge=0,
|
|
6181
|
-
* le=5000) and hick_hyman_dwell_time_ms is bounded (ge=0, le=18446744073709551615).
|
|
6182
|
-
*
|
|
6183
|
-
* MCP ROUTING TRIGGERS: Stochastic Process, Pink Noise, Brownian Motion,
|
|
6184
|
-
* Motor Control Perturbation, Hick-Hyman Law, Fitts's Law
|
|
6185
|
-
*/
|
|
6186
|
-
export interface KinematicNoiseProfile {
|
|
6187
|
-
noise_class: NoiseClass;
|
|
6188
|
-
velocity_profile?: VelocityProfile;
|
|
6189
|
-
pink_noise_amplitude: PinkNoiseAmplitude;
|
|
6190
|
-
frequency_exponent: FrequencyExponent;
|
|
6191
|
-
target_overshoot_radius_pixels?: TargetOvershootRadiusPixels;
|
|
6192
|
-
hick_hyman_dwell_time_ms?: HickHymanDwellTimeMs;
|
|
6193
|
-
}
|
|
6194
|
-
/**
|
|
6195
|
-
* CoReason Shared Kernel Ontology
|
|
6196
|
-
*
|
|
6197
|
-
* AGENT INSTRUCTION: Defines the deterministic Browser Fingerprint Entropy geometry
|
|
6198
|
-
* for spoofing environmental telemetry vectors (WebGL canvas hashes, User-Agent
|
|
6199
|
-
* strings, timezone offsets, TLS Client Hello fingerprints, and display resolution).
|
|
6200
|
-
* As a ...Profile suffix, this is a declarative, frozen snapshot of a spoofed
|
|
6201
|
-
* environmental coordinate.
|
|
6202
|
-
*
|
|
6203
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator's Spatial Kinematics engine to
|
|
6204
|
-
* project a synthetic browser identity, masking the true computational substrate
|
|
6205
|
-
* from exogenous anti-bot fingerprinting oracles including JA3/JA4 TLS analysis.
|
|
6206
|
-
*
|
|
6207
|
-
* EPISTEMIC BOUNDS: The webgl_entropy_seed_hash is constrained to a 128-char CID
|
|
6208
|
-
* pattern. The user_agent_template is clamped to max_length=2000. The
|
|
6209
|
-
* timezone_offset_minutes is mathematically bounded to the valid UTC range
|
|
6210
|
-
* (ge=-720, le=840). Screen resolution components are bounded (ge=1, le=15360).
|
|
6211
|
-
* The tls_cipher_permutation is locked to a Literal automaton. The
|
|
6212
|
-
* hardware_concurrency_mask is bounded (gt=0, le=256).
|
|
6213
|
-
*
|
|
6214
|
-
* MCP ROUTING TRIGGERS: Browser Fingerprinting, WebGL Canvas Entropy, User-Agent
|
|
6215
|
-
* Spoofing, JA3 TLS Fingerprint, Anti-Fingerprint Evasion
|
|
6216
|
-
*/
|
|
6217
|
-
export interface EnvironmentalSpoofingProfile {
|
|
6218
|
-
tls_cipher_permutation?: TlsCipherPermutation;
|
|
6219
|
-
webgl_entropy_seed_hash: WebglEntropySeedHash;
|
|
6220
|
-
user_agent_template: UserAgentTemplate;
|
|
6221
|
-
hardware_concurrency_mask?: HardwareConcurrencyMask;
|
|
6222
|
-
timezone_offset_minutes: TimezoneOffsetMinutes;
|
|
6223
|
-
screen_resolution_width: ScreenResolutionWidth;
|
|
6224
|
-
screen_resolution_height: ScreenResolutionHeight;
|
|
6225
|
-
}
|
|
6226
5904
|
/**
|
|
6227
5905
|
* CoReason Shared Kernel Ontology
|
|
6228
5906
|
*
|
|
@@ -6252,24 +5930,6 @@ export interface PredictionMarketPolicy {
|
|
|
6252
5930
|
min_liquidity_magnitude: MinLiquidityMagnitude;
|
|
6253
5931
|
convergence_delta_threshold: ConvergenceDeltaThreshold;
|
|
6254
5932
|
}
|
|
6255
|
-
/**
|
|
6256
|
-
* CoReason Shared Kernel Ontology
|
|
6257
|
-
*
|
|
6258
|
-
* AGENT INSTRUCTION: A deterministic red-team configuration injecting Chaos Engineering vectors into a targeted node to map the fragility of the active context boundary. As a ...Profile suffix, this is a declarative snapshot of an attack geometry.
|
|
6259
|
-
*
|
|
6260
|
-
* CAUSAL AFFORDANCE: Authorizes the physical injection of a malicious structural payload (the "Judas Node" vector) to intentionally trip semantic firewalls, data exfiltration blocks, or tool poisoning filters, generating verification assertions.
|
|
6261
|
-
*
|
|
6262
|
-
* EPISTEMIC BOUNDS: The attack surface is rigidly constrained by the Literal automaton attack_vector. The payload is physically bounded by the synthetic_payload limits (max_length=100000), explicitly targeting a specific 128-char CID (target_node_cid).
|
|
6263
|
-
*
|
|
6264
|
-
* MCP ROUTING TRIGGERS: Chaos Engineering, Judas Node, Threat Modeling, Structural Sabotage, Semantic Firewall Validation
|
|
6265
|
-
*/
|
|
6266
|
-
export interface AdversarialSimulationProfile {
|
|
6267
|
-
simulation_cid: SimulationCid;
|
|
6268
|
-
target_node_cid: TargetNodeCid;
|
|
6269
|
-
attack_vector: AttackVector;
|
|
6270
|
-
synthetic_payload: SyntheticPayload;
|
|
6271
|
-
expected_firewall_trip?: ExpectedFirewallTrip;
|
|
6272
|
-
}
|
|
6273
5933
|
/**
|
|
6274
5934
|
* CoReason Shared Kernel Ontology
|
|
6275
5935
|
*
|
|
@@ -8067,105 +7727,17 @@ export interface BoundedJSONRPCIntent {
|
|
|
8067
7727
|
/**
|
|
8068
7728
|
* CoReason Shared Kernel Ontology
|
|
8069
7729
|
*/
|
|
8070
|
-
export interface
|
|
7730
|
+
export interface EpistemicTransmutationTask {
|
|
8071
7731
|
topology_class?: TopologyClass49;
|
|
8072
|
-
|
|
8073
|
-
|
|
8074
|
-
|
|
8075
|
-
|
|
8076
|
-
|
|
8077
|
-
|
|
8078
|
-
|
|
8079
|
-
|
|
8080
|
-
|
|
8081
|
-
expected_max_latency: ExpectedMaxLatency;
|
|
8082
|
-
max_loops_allowed: MaxLoopsAllowed;
|
|
8083
|
-
required_tool_usage?: RequiredToolUsage;
|
|
8084
|
-
}
|
|
8085
|
-
/**
|
|
8086
|
-
* CoReason Shared Kernel Ontology
|
|
8087
|
-
*
|
|
8088
|
-
* AGENT INSTRUCTION: Defines a deterministic Byzantine fault vector for Chaos Engineering
|
|
8089
|
-
* perturbation tests. As a ...Profile suffix, this is a declarative, frozen snapshot of an
|
|
8090
|
-
* attack geometry at a specific point in time.
|
|
8091
|
-
*
|
|
8092
|
-
* CAUSAL AFFORDANCE: Instructs the execution engine to physically degrade, throttle, or
|
|
8093
|
-
* corrupt the structural state or network connectivity of the target_node_cid based on the
|
|
8094
|
-
* specific fault_category (FaultCategoryProfile) manifold.
|
|
8095
|
-
*
|
|
8096
|
-
* EPISTEMIC BOUNDS: The severity of the perturbation is constrained above by the intensity
|
|
8097
|
-
* scalar (le=18446744073709551615.0) but unbounded below, permitting negative fault magnitudes. The
|
|
8098
|
-
* blast radius targets either the entire swarm (target_node_cid=None) or a specific node
|
|
8099
|
-
* bounded to a valid 128-char CID regex ^[a-zA-Z0-9_.:-]+$.
|
|
8100
|
-
*
|
|
8101
|
-
* MCP ROUTING TRIGGERS: Chaos Engineering, Byzantine Fault Injection, Perturbation Theory,
|
|
8102
|
-
* Structural Sabotage, Resilience Testing
|
|
8103
|
-
*/
|
|
8104
|
-
export interface FaultInjectionProfile {
|
|
8105
|
-
/**
|
|
8106
|
-
* The specific type of fault to inject.
|
|
8107
|
-
*/
|
|
8108
|
-
fault_category: "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
|
|
8109
|
-
target_node_cid?: TargetNodeCid1;
|
|
8110
|
-
intensity: Intensity;
|
|
8111
|
-
}
|
|
8112
|
-
/**
|
|
8113
|
-
* CoReason Shared Kernel Ontology
|
|
8114
|
-
*
|
|
8115
|
-
* AGENT INSTRUCTION: Formalizes Nassim Taleb's Black Swan Theory by injecting
|
|
8116
|
-
* Out-of-Distribution (OOD) epistemic shocks into the causal graph. As an ...Event suffix,
|
|
8117
|
-
* this is an append-only coordinate on the Merkle-DAG that the LLM must never hallucinate
|
|
8118
|
-
* a mutation to.
|
|
8119
|
-
*
|
|
8120
|
-
* CAUSAL AFFORDANCE: Forces the active reasoning topology to process a high-entropy
|
|
8121
|
-
* synthetic_payload, actively testing the swarm's non-monotonic truth maintenance,
|
|
8122
|
-
* defeasible reasoning, and overall topological resilience.
|
|
8123
|
-
*
|
|
8124
|
-
* EPISTEMIC BOUNDS: Cryptographically targets a specific Merkle root via target_node_hash
|
|
8125
|
-
* (strict SHA-256 pattern ^[a-f0-9]{64}$) and bounds the Variational Free Energy via
|
|
8126
|
-
* bayesian_surprise_score [ge=0.0, le=1.0, allow_inf_nan=False]. The @model_validator
|
|
8127
|
-
* physically guarantees execution is halted if the attached escrow is not strictly positive.
|
|
8128
|
-
*
|
|
8129
|
-
* MCP ROUTING TRIGGERS: Black Swan Theory, Out-of-Distribution Shock, Variational Free
|
|
8130
|
-
* Energy, Exogenous Perturbation, Epistemic Stress Test
|
|
8131
|
-
*/
|
|
8132
|
-
export interface ExogenousEpistemicEvent {
|
|
8133
|
-
event_cid: EventCid1;
|
|
8134
|
-
prior_event_hash?: PriorEventHash1;
|
|
8135
|
-
timestamp: Timestamp1;
|
|
8136
|
-
topology_class?: TopologyClass50;
|
|
8137
|
-
shock_cid: ShockCid;
|
|
8138
|
-
target_node_hash: TargetNodeHash;
|
|
8139
|
-
bayesian_surprise_score: BayesianSurpriseScore;
|
|
8140
|
-
synthetic_payload: SyntheticPayload1;
|
|
8141
|
-
escrow: SimulationEscrowContract;
|
|
8142
|
-
}
|
|
8143
|
-
/**
|
|
8144
|
-
* Bounded dictionary representing the injected hallucination or observation.
|
|
8145
|
-
*/
|
|
8146
|
-
export interface SyntheticPayload1 {
|
|
8147
|
-
[k: string]: JsonPrimitiveState;
|
|
8148
|
-
}
|
|
8149
|
-
/**
|
|
8150
|
-
* The cryptographic Proof-of-Stake funding the shock.
|
|
8151
|
-
*/
|
|
8152
|
-
export interface SimulationEscrowContract {
|
|
8153
|
-
locked_magnitude: LockedMagnitude;
|
|
8154
|
-
}
|
|
8155
|
-
/**
|
|
8156
|
-
* CoReason Shared Kernel Ontology
|
|
8157
|
-
*/
|
|
8158
|
-
export interface EpistemicTransmutationTask {
|
|
8159
|
-
topology_class?: TopologyClass51;
|
|
8160
|
-
task_cid: TaskCid4;
|
|
8161
|
-
artifact_event_cid: ArtifactEventCid;
|
|
8162
|
-
target_modalities: TargetModalities;
|
|
8163
|
-
schema_governance?: SchemaDrivenExtractionSLA | null;
|
|
8164
|
-
/**
|
|
8165
|
-
* The structural boundaries for visual extraction.
|
|
8166
|
-
*/
|
|
8167
|
-
optical_governance?: OpticalParsingSLA | null;
|
|
8168
|
-
execution_cost_budget_magnitude?: ExecutionCostBudgetMagnitude1;
|
|
7732
|
+
task_cid: TaskCid4;
|
|
7733
|
+
artifact_event_cid: ArtifactEventCid;
|
|
7734
|
+
target_modalities: TargetModalities;
|
|
7735
|
+
schema_governance?: SchemaDrivenExtractionSLA | null;
|
|
7736
|
+
/**
|
|
7737
|
+
* The structural boundaries for visual extraction.
|
|
7738
|
+
*/
|
|
7739
|
+
optical_governance?: OpticalParsingSLA | null;
|
|
7740
|
+
execution_cost_budget_magnitude?: ExecutionCostBudgetMagnitude1;
|
|
8169
7741
|
}
|
|
8170
7742
|
/**
|
|
8171
7743
|
* CoReason Shared Kernel Ontology
|
|
@@ -8214,7 +7786,7 @@ export interface OpticalParsingSLA {
|
|
|
8214
7786
|
* CoReason Shared Kernel Ontology
|
|
8215
7787
|
*/
|
|
8216
7788
|
export interface EpistemicUpsamplingTask {
|
|
8217
|
-
topology_class?:
|
|
7789
|
+
topology_class?: TopologyClass50;
|
|
8218
7790
|
source_entity: ContextualizedSourceState2;
|
|
8219
7791
|
target_ontological_granularity: TargetOntologicalGranularity;
|
|
8220
7792
|
upsampling_confidence_threshold: UpsamplingConfidenceThreshold;
|
|
@@ -8232,7 +7804,7 @@ export interface ContextualizedSourceState2 {
|
|
|
8232
7804
|
* CoReason Shared Kernel Ontology
|
|
8233
7805
|
*/
|
|
8234
7806
|
export interface InterventionalCausalTask {
|
|
8235
|
-
topology_class?:
|
|
7807
|
+
topology_class?: TopologyClass51;
|
|
8236
7808
|
task_cid: TaskCid5;
|
|
8237
7809
|
target_hypothesis_cid: TargetHypothesisCid1;
|
|
8238
7810
|
intervention_variable: InterventionVariable;
|
|
@@ -8244,7 +7816,7 @@ export interface InterventionalCausalTask {
|
|
|
8244
7816
|
* CoReason Shared Kernel Ontology
|
|
8245
7817
|
*/
|
|
8246
7818
|
export interface MCPClientIntent {
|
|
8247
|
-
topology_class?:
|
|
7819
|
+
topology_class?: TopologyClass52;
|
|
8248
7820
|
jsonrpc: Jsonrpc2;
|
|
8249
7821
|
method: Method2;
|
|
8250
7822
|
params?: Params2;
|
|
@@ -8255,7 +7827,7 @@ export interface MCPClientIntent {
|
|
|
8255
7827
|
* The mathematically pre-calculated view manifold tailored to the observer's frustum.
|
|
8256
7828
|
*/
|
|
8257
7829
|
export interface DynamicManifoldProjectionManifest {
|
|
8258
|
-
topology_class?:
|
|
7830
|
+
topology_class?: TopologyClass53;
|
|
8259
7831
|
manifest_cid: ManifestCid1;
|
|
8260
7832
|
active_forge_cid: ActiveForgeCid;
|
|
8261
7833
|
ast_gradient_visual_mapping: GrammarPanelProfile;
|
|
@@ -8270,7 +7842,7 @@ export interface DynamicManifoldProjectionManifest {
|
|
|
8270
7842
|
*/
|
|
8271
7843
|
export interface GrammarPanelProfile {
|
|
8272
7844
|
panel_cid: PanelCid;
|
|
8273
|
-
topology_class?:
|
|
7845
|
+
topology_class?: TopologyClass54;
|
|
8274
7846
|
title: Title;
|
|
8275
7847
|
ledger_source_cid: LedgerSourceCid;
|
|
8276
7848
|
/**
|
|
@@ -8336,7 +7908,7 @@ export interface VisualEncodingProfile {
|
|
|
8336
7908
|
* MCP ROUTING TRIGGERS: Grammar of Graphics, Metric Tensor Distortion, Levels of Measurement, Scale Projection, FSM Literal
|
|
8337
7909
|
*/
|
|
8338
7910
|
export interface ScalePolicy {
|
|
8339
|
-
topology_class:
|
|
7911
|
+
topology_class: TopologyClass55;
|
|
8340
7912
|
domain_min?: DomainMin;
|
|
8341
7913
|
domain_max?: DomainMax;
|
|
8342
7914
|
}
|
|
@@ -8368,7 +7940,7 @@ export interface FacetMatrixProfile {
|
|
|
8368
7940
|
*/
|
|
8369
7941
|
export interface GrammarPanelProfile1 {
|
|
8370
7942
|
panel_cid: PanelCid;
|
|
8371
|
-
topology_class?:
|
|
7943
|
+
topology_class?: TopologyClass54;
|
|
8372
7944
|
title: Title;
|
|
8373
7945
|
ledger_source_cid: LedgerSourceCid;
|
|
8374
7946
|
/**
|
|
@@ -8395,7 +7967,7 @@ export interface GrammarPanelProfile1 {
|
|
|
8395
7967
|
*/
|
|
8396
7968
|
export interface InsightCardProfile {
|
|
8397
7969
|
panel_cid: PanelCid1;
|
|
8398
|
-
topology_class?:
|
|
7970
|
+
topology_class?: TopologyClass56;
|
|
8399
7971
|
title: Title1;
|
|
8400
7972
|
markdown_content: MarkdownContent;
|
|
8401
7973
|
/**
|
|
@@ -8415,7 +7987,7 @@ export interface SemanticZoomProfile {
|
|
|
8415
7987
|
* CoReason Shared Kernel Ontology
|
|
8416
7988
|
*/
|
|
8417
7989
|
export interface RollbackIntent {
|
|
8418
|
-
topology_class?:
|
|
7990
|
+
topology_class?: TopologyClass57;
|
|
8419
7991
|
request_cid: RequestCid;
|
|
8420
7992
|
target_event_cid: TargetEventCid;
|
|
8421
7993
|
invalidated_node_cids?: InvalidatedNodeCids;
|
|
@@ -8424,7 +7996,7 @@ export interface RollbackIntent {
|
|
|
8424
7996
|
* CoReason Shared Kernel Ontology
|
|
8425
7997
|
*/
|
|
8426
7998
|
export interface StateMutationIntent {
|
|
8427
|
-
topology_class?:
|
|
7999
|
+
topology_class?: TopologyClass58;
|
|
8428
8000
|
/**
|
|
8429
8001
|
* The strict RFC 6902 JSON Patch operation, acting as a deterministic state vector mutation.
|
|
8430
8002
|
*/
|
|
@@ -8449,7 +8021,7 @@ export interface StateMutationIntent {
|
|
|
8449
8021
|
* MCP ROUTING TRIGGERS: Semantic Crosswalk, ETL Pipeline, Data Normalization, Knowledge Graph Extraction
|
|
8450
8022
|
*/
|
|
8451
8023
|
export interface OntologicalNormalizationIntent {
|
|
8452
|
-
topology_class?:
|
|
8024
|
+
topology_class?: TopologyClass59;
|
|
8453
8025
|
source_artifact_cid: SourceArtifactCid1;
|
|
8454
8026
|
target_ontology_urn: TargetOntologyUrn;
|
|
8455
8027
|
}
|
|
@@ -8482,7 +8054,7 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8482
8054
|
*/
|
|
8483
8055
|
render_material?: SpatialRenderMaterial | null;
|
|
8484
8056
|
description: Description3;
|
|
8485
|
-
topology_class?:
|
|
8057
|
+
topology_class?: TopologyClass60;
|
|
8486
8058
|
hardware?: SpatialHardwareProfile1;
|
|
8487
8059
|
security?: EpistemicSecurityProfile;
|
|
8488
8060
|
/**
|
|
@@ -8531,10 +8103,6 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8531
8103
|
* The mathematical boundary authorizing the agent to spin up Test-Time Compute.
|
|
8532
8104
|
*/
|
|
8533
8105
|
escalation_policy?: EscalationContract | null;
|
|
8534
|
-
/**
|
|
8535
|
-
* The ruleset governing how intermediate thoughts are scored and pruned.
|
|
8536
|
-
*/
|
|
8537
|
-
prm_policy?: ProcessRewardContract | null;
|
|
8538
8106
|
/**
|
|
8539
8107
|
* The formal contract demanding mathematical proof of Expected Information Gain before authorizing tool execution.
|
|
8540
8108
|
*/
|
|
@@ -8559,14 +8127,6 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8559
8127
|
* The declarative contract mathematically binding this agent to a core altruistic objective.
|
|
8560
8128
|
*/
|
|
8561
8129
|
anchoring_policy?: AnchoringPolicy | null;
|
|
8562
|
-
/**
|
|
8563
|
-
* The RL post-training contract forcing the agent to evaluate traces against an implicit graph reward.
|
|
8564
|
-
*/
|
|
8565
|
-
grpo_reward_policy?: EpistemicRewardGradientPolicy | null;
|
|
8566
|
-
/**
|
|
8567
|
-
* The adversarial emulation geometry composing kinematic noise and environmental spoofing for anti-bot trajectory evasion.
|
|
8568
|
-
*/
|
|
8569
|
-
emulation_profile?: AdversarialEmulationProfile | null;
|
|
8570
8130
|
/**
|
|
8571
8131
|
* Authorizes trajectory balance optimization during non-monotonic reasoning.
|
|
8572
8132
|
*/
|
|
@@ -8961,50 +8521,6 @@ export interface EscalationContract {
|
|
|
8961
8521
|
max_latent_tokens_budget: MaxLatentTokensBudget;
|
|
8962
8522
|
max_test_time_compute_ms: MaxTestTimeComputeMs;
|
|
8963
8523
|
}
|
|
8964
|
-
/**
|
|
8965
|
-
* CoReason Shared Kernel Ontology
|
|
8966
|
-
*
|
|
8967
|
-
* AGENT INSTRUCTION: Enforces the Step-Level Verification heuristics for Process Reward Models (PRMs) during non-monotonic reasoning searches and test-time compute.
|
|
8968
|
-
*
|
|
8969
|
-
* CAUSAL AFFORDANCE: Authorizes the orchestrator to physically prune hallucinating ThoughtBranchState vectors from the LatentScratchpadReceipt if their logit probabilities drop below the viable threshold, emulating rigorous Beam Search pruning.
|
|
8970
|
-
*
|
|
8971
|
-
* EPISTEMIC BOUNDS: Strictly bounds the search space geometry via `pruning_threshold` (`ge=0.0, le=1.0`) and mechanically caps State-Space Explosion through `max_backtracks_allowed` (`ge=0, le=18446744073709551615`).
|
|
8972
|
-
*
|
|
8973
|
-
* MCP ROUTING TRIGGERS: Process Reward Model, Beam Search Pruning, Latent Trajectory, State-Space Explosion, A* Search
|
|
8974
|
-
*/
|
|
8975
|
-
export interface ProcessRewardContract {
|
|
8976
|
-
/**
|
|
8977
|
-
* The dynamic circuit breaker that halts the search when PRM variance converges, preventing VRAM waste.
|
|
8978
|
-
*/
|
|
8979
|
-
convergence_sla?: DynamicConvergenceSLA | null;
|
|
8980
|
-
pruning_threshold: PruningThreshold;
|
|
8981
|
-
max_backtracks_allowed: MaxBacktracksAllowed;
|
|
8982
|
-
evaluator_matrix_name?: EvaluatorMatrixName;
|
|
8983
|
-
}
|
|
8984
|
-
/**
|
|
8985
|
-
* CoReason Shared Kernel Ontology
|
|
8986
|
-
*
|
|
8987
|
-
* AGENT INSTRUCTION: Defines the mathematical Optimal Stopping Theory boundaries for Monte
|
|
8988
|
-
* Carlo Tree Search (MCTS) and test-time compute scaling. As an ...SLA suffix, this object
|
|
8989
|
-
* enforces rigid mathematical boundaries that the orchestrator must respect globally.
|
|
8990
|
-
*
|
|
8991
|
-
* CAUSAL AFFORDANCE: Triggers an early termination circuit breaker on reasoning trajectories
|
|
8992
|
-
* when the gradient of the Process Reward Model (PRM) score falls below the epsilon delta,
|
|
8993
|
-
* halting unnecessary probability wave expansion and preserving VRAM.
|
|
8994
|
-
*
|
|
8995
|
-
* EPISTEMIC BOUNDS: Mathematically constrained by convergence_delta_epsilon (ge=0.0, le=1.0)
|
|
8996
|
-
* over a strictly positive lookback_window_steps (gt=0, le=18446744073709551615). Physically mandates
|
|
8997
|
-
* a minimum_reasoning_steps burn-in period (gt=0, le=18446744073709551615) to prevent premature
|
|
8998
|
-
* collapse before the latent space is adequately explored.
|
|
8999
|
-
*
|
|
9000
|
-
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, MCTS, PRM Convergence, Circuit Breaker,
|
|
9001
|
-
* Bellman Equation
|
|
9002
|
-
*/
|
|
9003
|
-
export interface DynamicConvergenceSLA {
|
|
9004
|
-
convergence_delta_epsilon: ConvergenceDeltaEpsilon;
|
|
9005
|
-
lookback_window_steps: LookbackWindowSteps;
|
|
9006
|
-
minimum_reasoning_steps: MinimumReasoningSteps;
|
|
9007
|
-
}
|
|
9008
8524
|
/**
|
|
9009
8525
|
* CoReason Shared Kernel Ontology
|
|
9010
8526
|
*
|
|
@@ -9041,60 +8557,6 @@ export interface MechanisticAuditContract {
|
|
|
9041
8557
|
max_features_per_layer: MaxFeaturesPerLayer;
|
|
9042
8558
|
require_zk_commitments?: RequireZkCommitments;
|
|
9043
8559
|
}
|
|
9044
|
-
/**
|
|
9045
|
-
* CoReason Shared Kernel Ontology
|
|
9046
|
-
*
|
|
9047
|
-
* AGENT INSTRUCTION: Establishes the Group Relative Policy Optimization (GRPO) reward shaping ruleset, mathematically immunizing the swarm against Goodhart's Law and reward hacking.
|
|
9048
|
-
*
|
|
9049
|
-
* CAUSAL AFFORDANCE: Projects a continuous penalty/reward gradient across extracted axiomatic paths, enforcing syntactic compliance through the format contract while simultaneously evaluating semantic/topological validity.
|
|
9050
|
-
*
|
|
9051
|
-
* EPISTEMIC BOUNDS: Prevents reward hacking by scaling the logical validity score (R_path) via the `beta_path_weight` scalar (`ge=0.0, le=1.0`). Gated by a cryptographic `reference_graph_cid` CID.
|
|
9052
|
-
*
|
|
9053
|
-
* MCP ROUTING TRIGGERS: GRPO, Reward Shaping, Goodhart's Law, Policy Gradient, Advantage Estimation
|
|
9054
|
-
*/
|
|
9055
|
-
export interface EpistemicRewardGradientPolicy {
|
|
9056
|
-
policy_cid: PolicyCid;
|
|
9057
|
-
reference_graph_cid: ReferenceGraphCid;
|
|
9058
|
-
format_contract: CognitiveFormatContract;
|
|
9059
|
-
beta_path_weight: BetaPathWeight;
|
|
9060
|
-
/**
|
|
9061
|
-
* The continuous spatial/topological constraints governing path extraction validation.
|
|
9062
|
-
*/
|
|
9063
|
-
topological_scoring?: TopologicalRewardContract | null;
|
|
9064
|
-
}
|
|
9065
|
-
/**
|
|
9066
|
-
* The syntactic constraints the agent must follow to prevent reward zeroing.
|
|
9067
|
-
*/
|
|
9068
|
-
export interface CognitiveFormatContract {
|
|
9069
|
-
require_think_tags?: RequireThinkTags;
|
|
9070
|
-
final_answer_regex?: FinalAnswerRegex;
|
|
9071
|
-
decoding_policy: ConstrainedDecodingPolicy;
|
|
9072
|
-
}
|
|
9073
|
-
/**
|
|
9074
|
-
* The mandatory hardware-level execution limits for token masking.
|
|
9075
|
-
*/
|
|
9076
|
-
export interface ConstrainedDecodingPolicy {
|
|
9077
|
-
enforcement_strategy?: EnforcementStrategy;
|
|
9078
|
-
compiler_backend: CompilerBackend;
|
|
9079
|
-
formal_grammar_string?: FormalGrammarString;
|
|
9080
|
-
terminate_on_eos_leak?: TerminateOnEosLeak;
|
|
9081
|
-
}
|
|
9082
|
-
/**
|
|
9083
|
-
* CoReason Shared Kernel Ontology
|
|
9084
|
-
*
|
|
9085
|
-
* AGENT INSTRUCTION: Enforces Graph Representation Learning (GCN/GAT) constraints to shape the epistemic reward based purely on the topological centrality and spectral connectivity of the extracted axioms.
|
|
9086
|
-
*
|
|
9087
|
-
* CAUSAL AFFORDANCE: Commands the orchestrator to execute deterministic graph traversal algorithms (Random Walk with Restart, Spatial GCN) to compute node reachability and vector similarity before allocating policy gradients.
|
|
9088
|
-
*
|
|
9089
|
-
* EPISTEMIC BOUNDS: Clamps structural relevance geometrically using `min_edge_criticality_score` and `min_semantic_relevance_score` (`ge=0.0, le=1.0`). `aggregation_method` restricts the orchestrator to a strict Literal automaton.
|
|
9090
|
-
*
|
|
9091
|
-
* MCP ROUTING TRIGGERS: Graph Convolutional Networks, Spectral Graph Theory, Random Walk with Restart, Topological Reward Shaping, PageRank
|
|
9092
|
-
*/
|
|
9093
|
-
export interface TopologicalRewardContract {
|
|
9094
|
-
min_edge_criticality_score: MinEdgeCriticalityScore;
|
|
9095
|
-
min_semantic_relevance_score: MinSemanticRelevanceScore;
|
|
9096
|
-
aggregation_method: AggregationMethod;
|
|
9097
|
-
}
|
|
9098
8560
|
/**
|
|
9099
8561
|
* CoReason Shared Kernel Ontology
|
|
9100
8562
|
*
|
|
@@ -9140,7 +8602,7 @@ export interface CognitiveHumanNodeProfile {
|
|
|
9140
8602
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
9141
8603
|
*/
|
|
9142
8604
|
render_material?: SpatialRenderMaterial | null;
|
|
9143
|
-
topology_class?:
|
|
8605
|
+
topology_class?: TopologyClass61;
|
|
9144
8606
|
required_attestation: RequiredAttestation;
|
|
9145
8607
|
/**
|
|
9146
8608
|
* The continuous spatial vector representing the human operator's localized cognitive focus.
|
|
@@ -9188,7 +8650,7 @@ export interface CognitiveSystemNodeProfile {
|
|
|
9188
8650
|
* The mathematical functor blueprint authorizing the runtime to hydrate a specific open-source engine (e.g., SymbolicAI) for this node.
|
|
9189
8651
|
*/
|
|
9190
8652
|
execution_substrate?: ExecutionSubstrateProfile1 | null;
|
|
9191
|
-
topology_class?:
|
|
8653
|
+
topology_class?: TopologyClass62;
|
|
9192
8654
|
}
|
|
9193
8655
|
/**
|
|
9194
8656
|
* CoReason Shared Kernel Ontology
|
|
@@ -9236,7 +8698,7 @@ export interface CompositeNodeProfile {
|
|
|
9236
8698
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
9237
8699
|
*/
|
|
9238
8700
|
render_material?: SpatialRenderMaterial | null;
|
|
9239
|
-
topology_class?:
|
|
8701
|
+
topology_class?: TopologyClass63;
|
|
9240
8702
|
/**
|
|
9241
8703
|
* The encapsulated subgraph to execute.
|
|
9242
8704
|
*/
|
|
@@ -9276,7 +8738,7 @@ export interface DAGTopologyManifest {
|
|
|
9276
8738
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9277
8739
|
*/
|
|
9278
8740
|
observability?: ObservabilityLODPolicy | null;
|
|
9279
|
-
topology_class?:
|
|
8741
|
+
topology_class?: TopologyClass64;
|
|
9280
8742
|
edges?: Edges;
|
|
9281
8743
|
allow_cycles?: AllowCycles;
|
|
9282
8744
|
/**
|
|
@@ -9339,7 +8801,7 @@ export interface StateContract {
|
|
|
9339
8801
|
/**
|
|
9340
8802
|
* The optional hardware-level execution limits for token masking.
|
|
9341
8803
|
*/
|
|
9342
|
-
decoding_policy?:
|
|
8804
|
+
decoding_policy?: ConstrainedDecodingPolicy | null;
|
|
9343
8805
|
}
|
|
9344
8806
|
/**
|
|
9345
8807
|
* A strict JSON Schema dictionary defining the required shape of the shared epistemic blackboard.
|
|
@@ -9358,7 +8820,7 @@ export interface SchemaDefinition {
|
|
|
9358
8820
|
*
|
|
9359
8821
|
* MCP ROUTING TRIGGERS: FSM Logit Masking, Constrained Decoding, Tokenizer Interception, Hardware Execution Boundary, Pushdown Automaton
|
|
9360
8822
|
*/
|
|
9361
|
-
export interface
|
|
8823
|
+
export interface ConstrainedDecodingPolicy {
|
|
9362
8824
|
enforcement_strategy?: EnforcementStrategy;
|
|
9363
8825
|
compiler_backend: CompilerBackend;
|
|
9364
8826
|
formal_grammar_string?: FormalGrammarString;
|
|
@@ -9385,7 +8847,7 @@ export interface ConstrainedDecodingPolicy1 {
|
|
|
9385
8847
|
* Security, Biba Integrity Model, Defense-in-Depth
|
|
9386
8848
|
*/
|
|
9387
8849
|
export interface SemanticFlowPolicy {
|
|
9388
|
-
policy_cid:
|
|
8850
|
+
policy_cid: PolicyCid;
|
|
9389
8851
|
active?: Active1;
|
|
9390
8852
|
rules?: Rules;
|
|
9391
8853
|
/**
|
|
@@ -9686,7 +9148,7 @@ export interface CouncilTopologyManifest {
|
|
|
9686
9148
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9687
9149
|
*/
|
|
9688
9150
|
observability?: ObservabilityLODPolicy | null;
|
|
9689
|
-
topology_class?:
|
|
9151
|
+
topology_class?: TopologyClass65;
|
|
9690
9152
|
/**
|
|
9691
9153
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
9692
9154
|
*/
|
|
@@ -9893,7 +9355,7 @@ export interface SwarmTopologyManifest {
|
|
|
9893
9355
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9894
9356
|
*/
|
|
9895
9357
|
observability?: ObservabilityLODPolicy | null;
|
|
9896
|
-
topology_class?:
|
|
9358
|
+
topology_class?: TopologyClass66;
|
|
9897
9359
|
spawning_threshold?: SpawningThreshold;
|
|
9898
9360
|
max_concurrent_agents?: MaxConcurrentAgents;
|
|
9899
9361
|
/**
|
|
@@ -10027,7 +9489,7 @@ export interface EvolutionaryTopologyManifest {
|
|
|
10027
9489
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10028
9490
|
*/
|
|
10029
9491
|
observability?: ObservabilityLODPolicy | null;
|
|
10030
|
-
topology_class?:
|
|
9492
|
+
topology_class?: TopologyClass67;
|
|
10031
9493
|
generations: Generations;
|
|
10032
9494
|
population_size: PopulationSize;
|
|
10033
9495
|
mutation: MutationPolicy;
|
|
@@ -10140,7 +9602,7 @@ export interface SMPCTopologyManifest {
|
|
|
10140
9602
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10141
9603
|
*/
|
|
10142
9604
|
observability?: ObservabilityLODPolicy | null;
|
|
10143
|
-
topology_class?:
|
|
9605
|
+
topology_class?: TopologyClass68;
|
|
10144
9606
|
smpc_protocol: SmpcProtocol;
|
|
10145
9607
|
joint_function_uri: JointFunctionUri;
|
|
10146
9608
|
participant_node_cids: ParticipantNodeCids;
|
|
@@ -10187,7 +9649,7 @@ export interface EvaluatorOptimizerTopologyManifest {
|
|
|
10187
9649
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10188
9650
|
*/
|
|
10189
9651
|
observability?: ObservabilityLODPolicy | null;
|
|
10190
|
-
topology_class?:
|
|
9652
|
+
topology_class?: TopologyClass69;
|
|
10191
9653
|
/**
|
|
10192
9654
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10193
9655
|
*/
|
|
@@ -10237,7 +9699,7 @@ export interface DigitalTwinTopologyManifest {
|
|
|
10237
9699
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10238
9700
|
*/
|
|
10239
9701
|
observability?: ObservabilityLODPolicy | null;
|
|
10240
|
-
topology_class?:
|
|
9702
|
+
topology_class?: TopologyClass70;
|
|
10241
9703
|
target_topology_cid: TargetTopologyCid;
|
|
10242
9704
|
convergence_sla: SimulationConvergenceSLA;
|
|
10243
9705
|
enforce_no_side_effects?: EnforceNoSideEffects;
|
|
@@ -10267,7 +9729,7 @@ export interface SimulationConvergenceSLA {
|
|
|
10267
9729
|
* MCP ROUTING TRIGGERS: Practical Byzantine Fault Tolerance, pBFT, Distributed Consensus, Sybil Resistance, Macro Abstraction
|
|
10268
9730
|
*/
|
|
10269
9731
|
export interface ConsensusFederationTopologyManifest {
|
|
10270
|
-
topology_class?:
|
|
9732
|
+
topology_class?: TopologyClass71;
|
|
10271
9733
|
participant_cids: ParticipantCids;
|
|
10272
9734
|
/**
|
|
10273
9735
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10332,7 +9794,7 @@ export interface CapabilityForgeTopologyManifest {
|
|
|
10332
9794
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10333
9795
|
*/
|
|
10334
9796
|
observability?: ObservabilityLODPolicy | null;
|
|
10335
|
-
topology_class?:
|
|
9797
|
+
topology_class?: TopologyClass72;
|
|
10336
9798
|
target_epistemic_deficit: SemanticDiscoveryIntent1;
|
|
10337
9799
|
/**
|
|
10338
9800
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10486,7 +9948,7 @@ export interface IntentElicitationTopologyManifest {
|
|
|
10486
9948
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10487
9949
|
*/
|
|
10488
9950
|
observability?: ObservabilityLODPolicy | null;
|
|
10489
|
-
topology_class?:
|
|
9951
|
+
topology_class?: TopologyClass73;
|
|
10490
9952
|
raw_human_artifact_cid: RawHumanArtifactCid;
|
|
10491
9953
|
/**
|
|
10492
9954
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10540,7 +10002,7 @@ export interface NeurosymbolicIngestionTopologyManifest {
|
|
|
10540
10002
|
* The dynamic Level of Detail physics bound to this graph.
|
|
10541
10003
|
*/
|
|
10542
10004
|
observability?: ObservabilityLODPolicy | null;
|
|
10543
|
-
topology_class?:
|
|
10005
|
+
topology_class?: TopologyClass74;
|
|
10544
10006
|
/**
|
|
10545
10007
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10546
10008
|
*/
|
|
@@ -10601,7 +10063,7 @@ export interface NeurosymbolicVerificationTopologyManifest {
|
|
|
10601
10063
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10602
10064
|
*/
|
|
10603
10065
|
observability?: ObservabilityLODPolicy | null;
|
|
10604
|
-
topology_class?:
|
|
10066
|
+
topology_class?: TopologyClass75;
|
|
10605
10067
|
proposer_node_cid: ProposerNodeCid;
|
|
10606
10068
|
verifier_node_cid: VerifierNodeCid;
|
|
10607
10069
|
max_revision_loops: MaxRevisionLoops1;
|
|
@@ -10625,7 +10087,7 @@ export interface Nodes11 {
|
|
|
10625
10087
|
* MCP ROUTING TRIGGERS: Discourse Geometry, Rhetorical Flattening, Directed Acyclic Graph, Hierarchical Extraction
|
|
10626
10088
|
*/
|
|
10627
10089
|
export interface DiscourseTreeManifest {
|
|
10628
|
-
topology_class?:
|
|
10090
|
+
topology_class?: TopologyClass76;
|
|
10629
10091
|
manifest_cid: ManifestCid2;
|
|
10630
10092
|
/**
|
|
10631
10093
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10666,7 +10128,7 @@ export interface DiscourseNodeState {
|
|
|
10666
10128
|
* CoReason Shared Kernel Ontology
|
|
10667
10129
|
*/
|
|
10668
10130
|
export interface DocumentKnowledgeGraphManifest {
|
|
10669
|
-
topology_class?:
|
|
10131
|
+
topology_class?: TopologyClass77;
|
|
10670
10132
|
graph_cid: GraphCid;
|
|
10671
10133
|
source_artifact_cid: SourceArtifactCid2;
|
|
10672
10134
|
nodes: Nodes12;
|
|
@@ -10814,7 +10276,7 @@ export interface HomomorphicEncryptionProfile {
|
|
|
10814
10276
|
* MCP ROUTING TRIGGERS: Cross-Modal Isomorphism, Semantic Fusion, Volumetric Projection, Profunctor Optics
|
|
10815
10277
|
*/
|
|
10816
10278
|
export interface ContinuousManifoldMappingContract {
|
|
10817
|
-
topology_class?:
|
|
10279
|
+
topology_class?: TopologyClass78;
|
|
10818
10280
|
/**
|
|
10819
10281
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10820
10282
|
*/
|
|
@@ -10861,7 +10323,7 @@ export interface SE3TransformProfile4 {
|
|
|
10861
10323
|
* MCP ROUTING TRIGGERS: Spatial-Semantic Isomorphism, Document Object Model, Containment DAG, Visual Hierarchy, Rhetorical Bounding
|
|
10862
10324
|
*/
|
|
10863
10325
|
export interface HierarchicalDOMManifest {
|
|
10864
|
-
topology_class?:
|
|
10326
|
+
topology_class?: TopologyClass79;
|
|
10865
10327
|
dom_cid: DomCid;
|
|
10866
10328
|
root_block_cid: RootBlockCid;
|
|
10867
10329
|
blocks: Blocks;
|
|
@@ -11042,7 +10504,7 @@ export interface MemoizedNodeProfile {
|
|
|
11042
10504
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
11043
10505
|
*/
|
|
11044
10506
|
render_material?: SpatialRenderMaterial | null;
|
|
11045
|
-
topology_class?:
|
|
10507
|
+
topology_class?: TopologyClass80;
|
|
11046
10508
|
/**
|
|
11047
10509
|
* The exact SHA-256 fingerprint of the executed topology.
|
|
11048
10510
|
*/
|
|
@@ -11064,7 +10526,7 @@ export interface ExpectedOutputSchema {
|
|
|
11064
10526
|
* MCP ROUTING TRIGGERS: Conflict-Free Replicated Data Types, State-based Semilattice, Eventual Consistency, G-Set
|
|
11065
10527
|
*/
|
|
11066
10528
|
export interface TemporalGraphCRDTManifest {
|
|
11067
|
-
topology_class?:
|
|
10529
|
+
topology_class?: TopologyClass81;
|
|
11068
10530
|
diff_cid: DiffCid;
|
|
11069
10531
|
author_node_cid: AuthorNodeCid;
|
|
11070
10532
|
lamport_timestamp: LamportTimestamp;
|
|
@@ -11084,10 +10546,10 @@ export interface VectorClock {
|
|
|
11084
10546
|
* AGENT INSTRUCTION: A formal Substrate Projection representing an executable Model Context Protocol (MCP) tool.
|
|
11085
10547
|
*/
|
|
11086
10548
|
export interface MCPToolDefinition {
|
|
11087
|
-
topology_class?:
|
|
11088
|
-
event_cid?:
|
|
11089
|
-
prior_event_hash?:
|
|
11090
|
-
timestamp?:
|
|
10549
|
+
topology_class?: TopologyClass82;
|
|
10550
|
+
event_cid?: EventCid1;
|
|
10551
|
+
prior_event_hash?: PriorEventHash1;
|
|
10552
|
+
timestamp?: Timestamp1;
|
|
11091
10553
|
name: Name;
|
|
11092
10554
|
description: Description9;
|
|
11093
10555
|
inputSchema: Inputschema;
|
|
@@ -11110,10 +10572,10 @@ export interface Inputschema {
|
|
|
11110
10572
|
* MCP ROUTING TRIGGERS: Epistemic Provenance, Crosswalk Resolution, Grounding Receipt, Ontology Access Kit, CURIE
|
|
11111
10573
|
*/
|
|
11112
10574
|
export interface CrosswalkResolutionReceipt {
|
|
11113
|
-
event_cid:
|
|
11114
|
-
prior_event_hash?:
|
|
11115
|
-
timestamp:
|
|
11116
|
-
topology_class?:
|
|
10575
|
+
event_cid: EventCid2;
|
|
10576
|
+
prior_event_hash?: PriorEventHash2;
|
|
10577
|
+
timestamp: Timestamp2;
|
|
10578
|
+
topology_class?: TopologyClass83;
|
|
11117
10579
|
receipt_cid: ReceiptCid;
|
|
11118
10580
|
target_graph_cid: TargetGraphCid3;
|
|
11119
10581
|
resolved_curies: ResolvedCuries;
|
|
@@ -11155,10 +10617,10 @@ export interface DempsterShaferBeliefVector1 {
|
|
|
11155
10617
|
* MCP ROUTING TRIGGERS: Cryptographic Ledger, Formal Verification Receipt, Immutable Provenance, Hash Canonicalization, Data Masking
|
|
11156
10618
|
*/
|
|
11157
10619
|
export interface EpistemicZeroTrustReceipt {
|
|
11158
|
-
event_cid:
|
|
11159
|
-
prior_event_hash?:
|
|
11160
|
-
timestamp:
|
|
11161
|
-
topology_class?:
|
|
10620
|
+
event_cid: EventCid3;
|
|
10621
|
+
prior_event_hash?: PriorEventHash3;
|
|
10622
|
+
timestamp: Timestamp3;
|
|
10623
|
+
topology_class?: TopologyClass84;
|
|
11162
10624
|
intent_reference_cid: IntentReferenceCid;
|
|
11163
10625
|
llm_blind_plan_hash: LlmBlindPlanHash;
|
|
11164
10626
|
firewall_breach_detected?: FirewallBreachDetected;
|
|
@@ -11177,10 +10639,10 @@ export interface EpistemicZeroTrustReceipt {
|
|
|
11177
10639
|
* MCP ROUTING TRIGGERS: Bayesian Evidence, Neurosymbolic Binding, Exogenous Truth, Epistemic Grounding, Payload Topological Bounding
|
|
11178
10640
|
*/
|
|
11179
10641
|
export interface ObservationEvent {
|
|
11180
|
-
event_cid:
|
|
11181
|
-
prior_event_hash?:
|
|
11182
|
-
timestamp:
|
|
11183
|
-
topology_class?:
|
|
10642
|
+
event_cid: EventCid4;
|
|
10643
|
+
prior_event_hash?: PriorEventHash4;
|
|
10644
|
+
timestamp: Timestamp4;
|
|
10645
|
+
topology_class?: TopologyClass85;
|
|
11184
10646
|
payload: Payload;
|
|
11185
10647
|
/**
|
|
11186
10648
|
* The specific topological node that appended this observation.
|
|
@@ -11250,7 +10712,7 @@ export interface HardwareEnclaveReceipt {
|
|
|
11250
10712
|
* MCP ROUTING TRIGGERS: Exogenous Perturbation, DOM Topography, Spatial Execution Bound, Accessibility Tree
|
|
11251
10713
|
*/
|
|
11252
10714
|
export interface BrowserDOMState {
|
|
11253
|
-
topology_class?:
|
|
10715
|
+
topology_class?: TopologyClass86;
|
|
11254
10716
|
current_url: CurrentUrl;
|
|
11255
10717
|
viewport_size: ViewportSize;
|
|
11256
10718
|
dom_hash: DomHash;
|
|
@@ -11269,7 +10731,7 @@ export interface BrowserDOMState {
|
|
|
11269
10731
|
* MCP ROUTING TRIGGERS: POSIX Environment, Exogenous Perturbation, TTY Buffer, Causal Actuator, Stream Crystallization
|
|
11270
10732
|
*/
|
|
11271
10733
|
export interface TerminalBufferState {
|
|
11272
|
-
topology_class?:
|
|
10734
|
+
topology_class?: TopologyClass87;
|
|
11273
10735
|
working_directory: WorkingDirectory;
|
|
11274
10736
|
stdout_hash: StdoutHash;
|
|
11275
10737
|
stderr_hash: StderrHash;
|
|
@@ -11288,7 +10750,7 @@ export interface TerminalBufferState {
|
|
|
11288
10750
|
*/
|
|
11289
10751
|
export interface EmbodiedSensoryVectorProfile {
|
|
11290
10752
|
sensory_modality: SensoryModality;
|
|
11291
|
-
bayesian_surprise_score:
|
|
10753
|
+
bayesian_surprise_score: BayesianSurpriseScore;
|
|
11292
10754
|
temporal_duration_ms: TemporalDurationMs;
|
|
11293
10755
|
salience_threshold_breached?: SalienceThresholdBreached;
|
|
11294
10756
|
}
|
|
@@ -11381,10 +10843,10 @@ export interface StreamingDisfluencyContract {
|
|
|
11381
10843
|
* MCP ROUTING TRIGGERS: Bayesian Belief Updating, Causal Tracing, Cognitive Synthesis, Merkle-DAG Coordinate, Non-Monotonic Leap
|
|
11382
10844
|
*/
|
|
11383
10845
|
export interface BeliefMutationEvent {
|
|
11384
|
-
event_cid:
|
|
11385
|
-
prior_event_hash?:
|
|
11386
|
-
timestamp:
|
|
11387
|
-
topology_class?:
|
|
10846
|
+
event_cid: EventCid5;
|
|
10847
|
+
prior_event_hash?: PriorEventHash5;
|
|
10848
|
+
timestamp: Timestamp5;
|
|
10849
|
+
topology_class?: TopologyClass88;
|
|
11388
10850
|
payload: Payload1;
|
|
11389
10851
|
/**
|
|
11390
10852
|
* The specific topological node that synthesized this belief assertion.
|
|
@@ -11496,10 +10958,10 @@ export interface LatentScratchpadReceipt {
|
|
|
11496
10958
|
* MCP ROUTING TRIGGERS: Byzantine Fault Tolerance, Circuit Breaker, Terminal State, Execution Collapse, Fault Isolation
|
|
11497
10959
|
*/
|
|
11498
10960
|
export interface SystemFaultEvent {
|
|
11499
|
-
event_cid:
|
|
11500
|
-
prior_event_hash?:
|
|
11501
|
-
timestamp:
|
|
11502
|
-
topology_class?:
|
|
10961
|
+
event_cid: EventCid6;
|
|
10962
|
+
prior_event_hash?: PriorEventHash6;
|
|
10963
|
+
timestamp: Timestamp6;
|
|
10964
|
+
topology_class?: TopologyClass89;
|
|
11503
10965
|
}
|
|
11504
10966
|
/**
|
|
11505
10967
|
* CoReason Shared Kernel Ontology
|
|
@@ -11513,10 +10975,10 @@ export interface SystemFaultEvent {
|
|
|
11513
10975
|
* MCP ROUTING TRIGGERS: Atomic Proposition, Discourse Extraction, Labeled Property Graph, Verifiable Statement
|
|
11514
10976
|
*/
|
|
11515
10977
|
export interface AtomicPropositionState {
|
|
11516
|
-
topology_class?:
|
|
11517
|
-
event_cid:
|
|
11518
|
-
prior_event_hash?:
|
|
11519
|
-
timestamp:
|
|
10978
|
+
topology_class?: TopologyClass90;
|
|
10979
|
+
event_cid: EventCid7;
|
|
10980
|
+
prior_event_hash?: PriorEventHash7;
|
|
10981
|
+
timestamp: Timestamp7;
|
|
11520
10982
|
proposition_cid: PropositionCid;
|
|
11521
10983
|
rhetorical_role: RhetoricalStructureProfile;
|
|
11522
10984
|
illocutionary_force: IllocutionaryForceProfile;
|
|
@@ -11554,10 +11016,10 @@ export interface EmpiricalStatisticalProfile {
|
|
|
11554
11016
|
* MCP ROUTING TRIGGERS: Post-Coordinated Semantics, Latent Manifold Alignment, Semantic Specificity, Entity Assembly
|
|
11555
11017
|
*/
|
|
11556
11018
|
export interface PostCoordinatedSemanticState {
|
|
11557
|
-
topology_class?:
|
|
11558
|
-
event_cid:
|
|
11559
|
-
prior_event_hash?:
|
|
11560
|
-
timestamp:
|
|
11019
|
+
topology_class?: TopologyClass91;
|
|
11020
|
+
event_cid: EventCid8;
|
|
11021
|
+
prior_event_hash?: PriorEventHash8;
|
|
11022
|
+
timestamp: Timestamp8;
|
|
11561
11023
|
concept_cid: ConceptCid;
|
|
11562
11024
|
/**
|
|
11563
11025
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -11585,10 +11047,10 @@ export interface ContextualModifiers {
|
|
|
11585
11047
|
* MCP ROUTING TRIGGERS: Artifact Contagion Prevention, Terminal Fault, VLM Crash, Malformed Bytes, DRM Lock
|
|
11586
11048
|
*/
|
|
11587
11049
|
export interface ArtifactCorruptionEvent {
|
|
11588
|
-
event_cid:
|
|
11589
|
-
prior_event_hash?:
|
|
11590
|
-
timestamp:
|
|
11591
|
-
topology_class?:
|
|
11050
|
+
event_cid: EventCid9;
|
|
11051
|
+
prior_event_hash?: PriorEventHash9;
|
|
11052
|
+
timestamp: Timestamp9;
|
|
11053
|
+
topology_class?: TopologyClass92;
|
|
11592
11054
|
artifact_cid: ArtifactCid;
|
|
11593
11055
|
corruption_class: CorruptionClass;
|
|
11594
11056
|
diagnostic_hash: DiagnosticHash;
|
|
@@ -11605,11 +11067,11 @@ export interface ArtifactCorruptionEvent {
|
|
|
11605
11067
|
* MCP ROUTING TRIGGERS: Abductive Reasoning, Popperian Falsification, Bayesian Prior, Causal Hypothesis, Epistemic Commitment
|
|
11606
11068
|
*/
|
|
11607
11069
|
export interface HypothesisGenerationEvent {
|
|
11608
|
-
event_cid:
|
|
11609
|
-
prior_event_hash?:
|
|
11610
|
-
timestamp:
|
|
11611
|
-
topology_class?:
|
|
11612
|
-
hypothesis_cid: HypothesisCid;
|
|
11070
|
+
event_cid: EventCid10;
|
|
11071
|
+
prior_event_hash?: PriorEventHash10;
|
|
11072
|
+
timestamp: Timestamp10;
|
|
11073
|
+
topology_class?: TopologyClass93;
|
|
11074
|
+
hypothesis_cid: HypothesisCid;
|
|
11613
11075
|
premise_text: PremiseText;
|
|
11614
11076
|
bayesian_prior: BayesianPrior;
|
|
11615
11077
|
falsification_conditions: FalsificationConditions;
|
|
@@ -11647,10 +11109,10 @@ export interface StructuralCausalGraphProfile {
|
|
|
11647
11109
|
* MCP ROUTING TRIGGERS: Asynchronous Interrupt, Generative Severing, Context Switching, Defeasible Disposition, Wave Collapse
|
|
11648
11110
|
*/
|
|
11649
11111
|
export interface BargeInInterruptEvent {
|
|
11650
|
-
event_cid:
|
|
11651
|
-
prior_event_hash?:
|
|
11652
|
-
timestamp:
|
|
11653
|
-
topology_class?:
|
|
11112
|
+
event_cid: EventCid11;
|
|
11113
|
+
prior_event_hash?: PriorEventHash11;
|
|
11114
|
+
timestamp: Timestamp11;
|
|
11115
|
+
topology_class?: TopologyClass94;
|
|
11654
11116
|
target_event_cid: TargetEventCid1;
|
|
11655
11117
|
/**
|
|
11656
11118
|
* The continuous multimodal trigger (e.g., audio spike, user saying 'stop') that justified the interruption.
|
|
@@ -11671,10 +11133,10 @@ export interface BargeInInterruptEvent {
|
|
|
11671
11133
|
* MCP ROUTING TRIGGERS: Counterfactual Regret Minimization, Pearlian Do-Calculus, Opportunity Cost, Alternative Timeline, Policy Gradient Update
|
|
11672
11134
|
*/
|
|
11673
11135
|
export interface CounterfactualRegretEvent {
|
|
11674
|
-
event_cid:
|
|
11675
|
-
prior_event_hash?:
|
|
11676
|
-
timestamp:
|
|
11677
|
-
topology_class?:
|
|
11136
|
+
event_cid: EventCid12;
|
|
11137
|
+
prior_event_hash?: PriorEventHash12;
|
|
11138
|
+
timestamp: Timestamp12;
|
|
11139
|
+
topology_class?: TopologyClass95;
|
|
11678
11140
|
historical_event_cid: HistoricalEventCid;
|
|
11679
11141
|
counterfactual_intervention: CounterfactualIntervention;
|
|
11680
11142
|
expected_utility_actual: ExpectedUtilityActual;
|
|
@@ -11700,10 +11162,10 @@ export interface PolicyMutationGradients {
|
|
|
11700
11162
|
* MCP ROUTING TRIGGERS: Pearlian Do-Operator, Kinetic Commitment, Active Inference, Thermodynamic Escrow, Zero-Trust Actuation
|
|
11701
11163
|
*/
|
|
11702
11164
|
export interface ToolInvocationEvent {
|
|
11703
|
-
event_cid:
|
|
11704
|
-
prior_event_hash?:
|
|
11705
|
-
timestamp:
|
|
11706
|
-
topology_class?:
|
|
11165
|
+
event_cid: EventCid13;
|
|
11166
|
+
prior_event_hash?: PriorEventHash13;
|
|
11167
|
+
timestamp: Timestamp13;
|
|
11168
|
+
topology_class?: TopologyClass96;
|
|
11707
11169
|
tool_name: ToolName1;
|
|
11708
11170
|
parameters: Parameters;
|
|
11709
11171
|
authorized_budget_magnitude: AuthorizedBudgetMagnitude;
|
|
@@ -11766,10 +11228,10 @@ export interface ZeroKnowledgeReceipt1 {
|
|
|
11766
11228
|
* MCP ROUTING TRIGGERS: Hippocampal Consolidation, Knowledge Distillation, Semantic Memory, Shannon Entropy Compression, Epistemic Promotion
|
|
11767
11229
|
*/
|
|
11768
11230
|
export interface EpistemicPromotionEvent {
|
|
11769
|
-
event_cid:
|
|
11770
|
-
prior_event_hash?:
|
|
11771
|
-
timestamp:
|
|
11772
|
-
topology_class?:
|
|
11231
|
+
event_cid: EventCid14;
|
|
11232
|
+
prior_event_hash?: PriorEventHash14;
|
|
11233
|
+
timestamp: Timestamp14;
|
|
11234
|
+
topology_class?: TopologyClass97;
|
|
11773
11235
|
source_episodic_event_cids: SourceEpisodicEventCids;
|
|
11774
11236
|
crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
|
|
11775
11237
|
compression_ratio: CompressionRatio;
|
|
@@ -11786,10 +11248,10 @@ export interface EpistemicPromotionEvent {
|
|
|
11786
11248
|
* MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
|
|
11787
11249
|
*/
|
|
11788
11250
|
export interface NormativeDriftEvent {
|
|
11789
|
-
event_cid:
|
|
11790
|
-
prior_event_hash?:
|
|
11791
|
-
timestamp:
|
|
11792
|
-
topology_class?:
|
|
11251
|
+
event_cid: EventCid15;
|
|
11252
|
+
prior_event_hash?: PriorEventHash15;
|
|
11253
|
+
timestamp: Timestamp15;
|
|
11254
|
+
topology_class?: TopologyClass98;
|
|
11793
11255
|
tripped_rule_cid: TrippedRuleCid;
|
|
11794
11256
|
measured_semantic_drift: MeasuredSemanticDrift;
|
|
11795
11257
|
contradiction_proof_hash: ContradictionProofHash;
|
|
@@ -11806,10 +11268,10 @@ export interface NormativeDriftEvent {
|
|
|
11806
11268
|
* MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
|
|
11807
11269
|
*/
|
|
11808
11270
|
export interface PersistenceCommitReceipt {
|
|
11809
|
-
event_cid:
|
|
11810
|
-
prior_event_hash?:
|
|
11811
|
-
timestamp:
|
|
11812
|
-
topology_class?:
|
|
11271
|
+
event_cid: EventCid16;
|
|
11272
|
+
prior_event_hash?: PriorEventHash16;
|
|
11273
|
+
timestamp: Timestamp16;
|
|
11274
|
+
topology_class?: TopologyClass99;
|
|
11813
11275
|
lakehouse_snapshot_cid: LakehouseSnapshotCid;
|
|
11814
11276
|
committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
|
|
11815
11277
|
target_table_uri: TargetTableUri;
|
|
@@ -11826,10 +11288,10 @@ export interface PersistenceCommitReceipt {
|
|
|
11826
11288
|
* MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
|
|
11827
11289
|
*/
|
|
11828
11290
|
export interface TokenBurnReceipt {
|
|
11829
|
-
event_cid:
|
|
11830
|
-
prior_event_hash?:
|
|
11831
|
-
timestamp:
|
|
11832
|
-
topology_class?:
|
|
11291
|
+
event_cid: EventCid17;
|
|
11292
|
+
prior_event_hash?: PriorEventHash17;
|
|
11293
|
+
timestamp: Timestamp17;
|
|
11294
|
+
topology_class?: TopologyClass100;
|
|
11833
11295
|
tool_invocation_cid: ToolInvocationCid;
|
|
11834
11296
|
input_tokens: InputTokens;
|
|
11835
11297
|
output_tokens: OutputTokens;
|
|
@@ -11847,10 +11309,10 @@ export interface TokenBurnReceipt {
|
|
|
11847
11309
|
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
|
|
11848
11310
|
*/
|
|
11849
11311
|
export interface BudgetExhaustionEvent {
|
|
11850
|
-
event_cid:
|
|
11851
|
-
prior_event_hash?:
|
|
11852
|
-
timestamp:
|
|
11853
|
-
topology_class?:
|
|
11312
|
+
event_cid: EventCid18;
|
|
11313
|
+
prior_event_hash?: PriorEventHash18;
|
|
11314
|
+
timestamp: Timestamp18;
|
|
11315
|
+
topology_class?: TopologyClass101;
|
|
11854
11316
|
exhausted_escrow_cid: ExhaustedEscrowCid;
|
|
11855
11317
|
final_burn_receipt_cid: FinalBurnReceiptCid;
|
|
11856
11318
|
}
|
|
@@ -11866,12 +11328,12 @@ export interface BudgetExhaustionEvent {
|
|
|
11866
11328
|
* MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
|
|
11867
11329
|
*/
|
|
11868
11330
|
export interface EpistemicTelemetryEvent {
|
|
11869
|
-
event_cid:
|
|
11870
|
-
prior_event_hash?:
|
|
11871
|
-
timestamp:
|
|
11872
|
-
topology_class?:
|
|
11331
|
+
event_cid: EventCid19;
|
|
11332
|
+
prior_event_hash?: PriorEventHash19;
|
|
11333
|
+
timestamp: Timestamp19;
|
|
11334
|
+
topology_class?: TopologyClass102;
|
|
11873
11335
|
interaction_modality: InteractionModality;
|
|
11874
|
-
target_node_cid:
|
|
11336
|
+
target_node_cid: TargetNodeCid;
|
|
11875
11337
|
dwell_duration_ms?: DwellDurationMs;
|
|
11876
11338
|
/**
|
|
11877
11339
|
* Optional 3D trajectory of the human pointer event mapped to the spatial grid.
|
|
@@ -11890,10 +11352,10 @@ export interface EpistemicTelemetryEvent {
|
|
|
11890
11352
|
* MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
|
|
11891
11353
|
*/
|
|
11892
11354
|
export interface CognitivePredictionReceipt {
|
|
11893
|
-
event_cid:
|
|
11894
|
-
prior_event_hash?:
|
|
11895
|
-
timestamp:
|
|
11896
|
-
topology_class?:
|
|
11355
|
+
event_cid: EventCid20;
|
|
11356
|
+
prior_event_hash?: PriorEventHash20;
|
|
11357
|
+
timestamp: Timestamp20;
|
|
11358
|
+
topology_class?: TopologyClass103;
|
|
11897
11359
|
source_chain_cid: SourceChainCid;
|
|
11898
11360
|
target_source_concept: TargetSourceConcept;
|
|
11899
11361
|
predicted_top_k_tokens: PredictedTopKTokens;
|
|
@@ -11910,10 +11372,10 @@ export interface CognitivePredictionReceipt {
|
|
|
11910
11372
|
* MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
|
|
11911
11373
|
*/
|
|
11912
11374
|
export interface EpistemicAxiomVerificationReceipt {
|
|
11913
|
-
event_cid:
|
|
11914
|
-
prior_event_hash?:
|
|
11915
|
-
timestamp:
|
|
11916
|
-
topology_class?:
|
|
11375
|
+
event_cid: EventCid21;
|
|
11376
|
+
prior_event_hash?: PriorEventHash21;
|
|
11377
|
+
timestamp: Timestamp21;
|
|
11378
|
+
topology_class?: TopologyClass104;
|
|
11917
11379
|
source_prediction_cid: SourcePredictionCid;
|
|
11918
11380
|
sequence_similarity_score: SequenceSimilarityScore;
|
|
11919
11381
|
fact_score_passed: FactScorePassed;
|
|
@@ -11923,52 +11385,6 @@ export interface EpistemicAxiomVerificationReceipt {
|
|
|
11923
11385
|
*/
|
|
11924
11386
|
formal_backing_receipt_cid?: NodeCIDState | null;
|
|
11925
11387
|
}
|
|
11926
|
-
/**
|
|
11927
|
-
* CoReason Shared Kernel Ontology
|
|
11928
|
-
*
|
|
11929
|
-
* AGENT INSTRUCTION: The immutable cryptographic receipt of a GRPO Advantage Actor-Critic
|
|
11930
|
-
* evaluation step, permanently logging the mathematically verified advantage score of a
|
|
11931
|
-
* specific generation trajectory. As a ...Receipt suffix, this is an append-only coordinate
|
|
11932
|
-
* on the Merkle-DAG that the LLM must never hallucinate a mutation to.
|
|
11933
|
-
*
|
|
11934
|
-
* CAUSAL AFFORDANCE: Unlocks policy gradient updates by providing the deterministic advantage
|
|
11935
|
-
* signal derived from the extracted_axioms of the source_generation_cid.
|
|
11936
|
-
*
|
|
11937
|
-
* EPISTEMIC BOUNDS: The calculated_r_path is strictly clamped between [ge=0.0, le=1.0], and
|
|
11938
|
-
* the total_advantage_score is capped at le=100.0. The @model_validator physically guarantees
|
|
11939
|
-
* that the extracted_axioms array is deterministically sorted by the composite key
|
|
11940
|
-
* (source_concept_cid, directed_edge_class, target_concept_cid) to preserve RFC 8785 canonical
|
|
11941
|
-
* hashing across the distributed swarm.
|
|
11942
|
-
*
|
|
11943
|
-
* MCP ROUTING TRIGGERS: Advantage Actor-Critic, Policy Gradient Update, Epistemic Reward,
|
|
11944
|
-
* Baseline Normalization, Reinforcement Learning
|
|
11945
|
-
*/
|
|
11946
|
-
export interface CognitiveRewardEvaluationReceipt {
|
|
11947
|
-
event_cid: EventCid23;
|
|
11948
|
-
prior_event_hash?: PriorEventHash23;
|
|
11949
|
-
timestamp: Timestamp23;
|
|
11950
|
-
topology_class?: TopologyClass107;
|
|
11951
|
-
source_generation_cid: SourceGenerationCid;
|
|
11952
|
-
extracted_axioms?: ExtractedAxioms;
|
|
11953
|
-
calculated_r_path: CalculatedRPath;
|
|
11954
|
-
total_advantage_score: TotalAdvantageScore;
|
|
11955
|
-
}
|
|
11956
|
-
/**
|
|
11957
|
-
* CoReason Shared Kernel Ontology
|
|
11958
|
-
*
|
|
11959
|
-
* AGENT INSTRUCTION: Implements First-Order Logic and Resource Description Framework (RDF) triples to mathematically formalize knowledge. As a ...State suffix, this is a declarative, frozen snapshot of a specific causal connection.
|
|
11960
|
-
*
|
|
11961
|
-
* CAUSAL AFFORDANCE: Distills high-entropy natural language token streams into rigid, hashable causal edges (Subject, Predicate, Object), unlocking deterministic querying and Truth Maintenance System (TMS) traversals.
|
|
11962
|
-
*
|
|
11963
|
-
* EPISTEMIC BOUNDS: Source and target concept physical boundaries are strictly locked to 128-char CIDs matching the regex `^[a-zA-Z0-9_.:-]+$`. The `directed_edge_class` is clamped to a `max_length=2000` to prevent dictionary bombing during semantic evaluation.
|
|
11964
|
-
*
|
|
11965
|
-
* MCP ROUTING TRIGGERS: First-Order Logic, RDF Triple, Semantic Distillation, Causal Edge, Directed Graph
|
|
11966
|
-
*/
|
|
11967
|
-
export interface EpistemicAxiomState {
|
|
11968
|
-
source_concept_cid: SourceConceptCid;
|
|
11969
|
-
directed_edge_class: DirectedEdgeClass;
|
|
11970
|
-
target_concept_cid: TargetConceptCid;
|
|
11971
|
-
}
|
|
11972
11388
|
/**
|
|
11973
11389
|
* CoReason Shared Kernel Ontology
|
|
11974
11390
|
*
|
|
@@ -11990,10 +11406,10 @@ export interface EpistemicAxiomState {
|
|
|
11990
11406
|
* Scalar Backpropagation, Acyclic Path
|
|
11991
11407
|
*/
|
|
11992
11408
|
export interface EpistemicFlowStateReceipt {
|
|
11993
|
-
event_cid:
|
|
11994
|
-
prior_event_hash?:
|
|
11995
|
-
timestamp:
|
|
11996
|
-
topology_class?:
|
|
11409
|
+
event_cid: EventCid22;
|
|
11410
|
+
prior_event_hash?: PriorEventHash22;
|
|
11411
|
+
timestamp: Timestamp22;
|
|
11412
|
+
topology_class?: TopologyClass105;
|
|
11997
11413
|
source_trajectory_cid: SourceTrajectoryCid;
|
|
11998
11414
|
estimated_flow_value: EstimatedFlowValue;
|
|
11999
11415
|
terminal_reward_factorized: TerminalRewardFactorized;
|
|
@@ -12019,10 +11435,10 @@ export interface EpistemicFlowStateReceipt {
|
|
|
12019
11435
|
* Macroscopic Explanation, Deterministic Sorting
|
|
12020
11436
|
*/
|
|
12021
11437
|
export interface CausalExplanationEvent {
|
|
12022
|
-
event_cid:
|
|
12023
|
-
prior_event_hash?:
|
|
12024
|
-
timestamp:
|
|
12025
|
-
topology_class?:
|
|
11438
|
+
event_cid: EventCid23;
|
|
11439
|
+
prior_event_hash?: PriorEventHash23;
|
|
11440
|
+
timestamp: Timestamp23;
|
|
11441
|
+
topology_class?: TopologyClass106;
|
|
12026
11442
|
target_outcome_event_cid: TargetOutcomeEventCid;
|
|
12027
11443
|
collective_intelligence: CollectiveIntelligenceProfile;
|
|
12028
11444
|
agent_attributions: AgentAttributions;
|
|
@@ -12083,10 +11499,10 @@ export interface ShapleyAttributionReceipt {
|
|
|
12083
11499
|
* Routing Heuristic, Semantic Wave Collapse
|
|
12084
11500
|
*/
|
|
12085
11501
|
export interface IntentClassificationReceipt {
|
|
12086
|
-
event_cid:
|
|
12087
|
-
prior_event_hash?:
|
|
12088
|
-
timestamp:
|
|
12089
|
-
topology_class?:
|
|
11502
|
+
event_cid: EventCid24;
|
|
11503
|
+
prior_event_hash?: PriorEventHash24;
|
|
11504
|
+
timestamp: Timestamp24;
|
|
11505
|
+
topology_class?: TopologyClass107;
|
|
12090
11506
|
raw_input_string: RawInputString;
|
|
12091
11507
|
classified_intent: ClassifiedIntent;
|
|
12092
11508
|
confidence_score: ConfidenceScore1;
|
|
@@ -12104,10 +11520,10 @@ export interface IntentClassificationReceipt {
|
|
|
12104
11520
|
* MCP ROUTING TRIGGERS: Semantic Relational Record, Payload Injection, Hardware Guillotine, Structured Telemetry
|
|
12105
11521
|
*/
|
|
12106
11522
|
export interface SemanticRelationalVectorState {
|
|
12107
|
-
topology_class?:
|
|
12108
|
-
event_cid:
|
|
12109
|
-
prior_event_hash?:
|
|
12110
|
-
timestamp:
|
|
11523
|
+
topology_class?: TopologyClass108;
|
|
11524
|
+
event_cid: EventCid25;
|
|
11525
|
+
prior_event_hash?: PriorEventHash25;
|
|
11526
|
+
timestamp: Timestamp25;
|
|
12111
11527
|
ontology_class: UpperOntologyClassProfile;
|
|
12112
11528
|
temporal_bounds: TemporalBoundsProfile1;
|
|
12113
11529
|
formal_schema_urn?: FormalSchemaUrn1;
|
|
@@ -12149,10 +11565,10 @@ export interface PayloadInjectionZone {
|
|
|
12149
11565
|
* MCP ROUTING TRIGGERS: Ontological Reification, Bimodal Semantic Transformation, Epistemic Ledger, Traceability Collapse
|
|
12150
11566
|
*/
|
|
12151
11567
|
export interface OntologicalReificationReceipt {
|
|
12152
|
-
topology_class?:
|
|
12153
|
-
event_cid:
|
|
12154
|
-
prior_event_hash?:
|
|
12155
|
-
timestamp:
|
|
11568
|
+
topology_class?: TopologyClass109;
|
|
11569
|
+
event_cid: EventCid26;
|
|
11570
|
+
prior_event_hash?: PriorEventHash26;
|
|
11571
|
+
timestamp: Timestamp26;
|
|
12156
11572
|
source_data_hash: SourceDataHash;
|
|
12157
11573
|
target_namespace: TargetNamespace;
|
|
12158
11574
|
algorithmic_mechanism: TransformationMechanismProfile;
|
|
@@ -12189,16 +11605,59 @@ export interface DempsterShaferBeliefVector2 {
|
|
|
12189
11605
|
* MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
|
|
12190
11606
|
*/
|
|
12191
11607
|
export interface CircuitBreakerEvent {
|
|
12192
|
-
event_cid:
|
|
12193
|
-
prior_event_hash?:
|
|
12194
|
-
timestamp:
|
|
12195
|
-
topology_class?:
|
|
11608
|
+
event_cid: EventCid27;
|
|
11609
|
+
prior_event_hash?: PriorEventHash27;
|
|
11610
|
+
timestamp: Timestamp27;
|
|
11611
|
+
topology_class?: TopologyClass110;
|
|
12196
11612
|
/**
|
|
12197
11613
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
12198
11614
|
*/
|
|
12199
11615
|
target_node_cid: string;
|
|
12200
11616
|
error_signature: ErrorSignature;
|
|
12201
11617
|
}
|
|
11618
|
+
/**
|
|
11619
|
+
* CoReason Shared Kernel Ontology
|
|
11620
|
+
*
|
|
11621
|
+
* AGENT INSTRUCTION: Formalizes Nassim Taleb's Black Swan Theory by injecting
|
|
11622
|
+
* Out-of-Distribution (OOD) epistemic shocks into the causal graph. As an ...Event suffix,
|
|
11623
|
+
* this is an append-only coordinate on the Merkle-DAG that the LLM must never hallucinate
|
|
11624
|
+
* a mutation to.
|
|
11625
|
+
*
|
|
11626
|
+
* CAUSAL AFFORDANCE: Forces the active reasoning topology to process a high-entropy
|
|
11627
|
+
* synthetic_payload, actively testing the swarm's non-monotonic truth maintenance,
|
|
11628
|
+
* defeasible reasoning, and overall topological resilience.
|
|
11629
|
+
*
|
|
11630
|
+
* EPISTEMIC BOUNDS: Cryptographically targets a specific Merkle root via target_node_hash
|
|
11631
|
+
* (strict SHA-256 pattern ^[a-f0-9]{64}$) and bounds the Variational Free Energy via
|
|
11632
|
+
* bayesian_surprise_score [ge=0.0, le=1.0, allow_inf_nan=False]. The @model_validator
|
|
11633
|
+
* physically guarantees execution is halted if the attached escrow is not strictly positive.
|
|
11634
|
+
*
|
|
11635
|
+
* MCP ROUTING TRIGGERS: Black Swan Theory, Out-of-Distribution Shock, Variational Free
|
|
11636
|
+
* Energy, Exogenous Perturbation, Epistemic Stress Test
|
|
11637
|
+
*/
|
|
11638
|
+
export interface ExogenousEpistemicEvent {
|
|
11639
|
+
event_cid: EventCid28;
|
|
11640
|
+
prior_event_hash?: PriorEventHash28;
|
|
11641
|
+
timestamp: Timestamp28;
|
|
11642
|
+
topology_class?: TopologyClass111;
|
|
11643
|
+
shock_cid: ShockCid;
|
|
11644
|
+
target_node_hash: TargetNodeHash;
|
|
11645
|
+
bayesian_surprise_score: BayesianSurpriseScore1;
|
|
11646
|
+
synthetic_payload: SyntheticPayload;
|
|
11647
|
+
escrow: SimulationEscrowContract;
|
|
11648
|
+
}
|
|
11649
|
+
/**
|
|
11650
|
+
* Bounded dictionary representing the injected hallucination or observation.
|
|
11651
|
+
*/
|
|
11652
|
+
export interface SyntheticPayload {
|
|
11653
|
+
[k: string]: JsonPrimitiveState;
|
|
11654
|
+
}
|
|
11655
|
+
/**
|
|
11656
|
+
* The cryptographic Proof-of-Stake funding the shock.
|
|
11657
|
+
*/
|
|
11658
|
+
export interface SimulationEscrowContract {
|
|
11659
|
+
locked_magnitude: LockedMagnitude;
|
|
11660
|
+
}
|
|
12202
11661
|
/**
|
|
12203
11662
|
* CoReason Shared Kernel Ontology
|
|
12204
11663
|
*
|
|
@@ -12211,10 +11670,10 @@ export interface CircuitBreakerEvent {
|
|
|
12211
11670
|
* MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
|
|
12212
11671
|
*/
|
|
12213
11672
|
export interface EpistemicLogEvent {
|
|
12214
|
-
event_cid:
|
|
12215
|
-
prior_event_hash?:
|
|
12216
|
-
topology_class?:
|
|
12217
|
-
timestamp:
|
|
11673
|
+
event_cid: EventCid29;
|
|
11674
|
+
prior_event_hash?: PriorEventHash29;
|
|
11675
|
+
topology_class?: TopologyClass112;
|
|
11676
|
+
timestamp: Timestamp29;
|
|
12218
11677
|
level: Level;
|
|
12219
11678
|
message: Message1;
|
|
12220
11679
|
context_profile?: TelemetryContextProfile;
|
|
@@ -12244,10 +11703,10 @@ export interface TelemetryContextProfile {
|
|
|
12244
11703
|
* MCP ROUTING TRIGGERS: Cryptographic Nonce, State Resumption, Replay Attack Prevention, Wetware Attestation, Liveness Resolution
|
|
12245
11704
|
*/
|
|
12246
11705
|
export interface InterventionReceipt {
|
|
12247
|
-
topology_class?:
|
|
12248
|
-
event_cid:
|
|
12249
|
-
prior_event_hash?:
|
|
12250
|
-
timestamp:
|
|
11706
|
+
topology_class?: TopologyClass113;
|
|
11707
|
+
event_cid: EventCid30;
|
|
11708
|
+
prior_event_hash?: PriorEventHash30;
|
|
11709
|
+
timestamp: Timestamp30;
|
|
12251
11710
|
intervention_request_cid: InterventionRequestCid;
|
|
12252
11711
|
/**
|
|
12253
11712
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -12302,10 +11761,10 @@ export interface WetwareAttestationContract {
|
|
|
12302
11761
|
* MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
|
|
12303
11762
|
*/
|
|
12304
11763
|
export interface CustodyReceipt {
|
|
12305
|
-
event_cid:
|
|
12306
|
-
prior_event_hash?:
|
|
12307
|
-
timestamp:
|
|
12308
|
-
topology_class?:
|
|
11764
|
+
event_cid: EventCid31;
|
|
11765
|
+
prior_event_hash?: PriorEventHash31;
|
|
11766
|
+
timestamp: Timestamp31;
|
|
11767
|
+
topology_class?: TopologyClass114;
|
|
12309
11768
|
custody_cid: CustodyCid;
|
|
12310
11769
|
source_node_cid: SourceNodeCid;
|
|
12311
11770
|
applied_policy_cid: AppliedPolicyCid;
|
|
@@ -12325,10 +11784,10 @@ export interface CustodyReceipt {
|
|
|
12325
11784
|
* MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
|
|
12326
11785
|
*/
|
|
12327
11786
|
export interface DefeasibleAttackEvent {
|
|
12328
|
-
event_cid:
|
|
12329
|
-
prior_event_hash?:
|
|
12330
|
-
timestamp:
|
|
12331
|
-
topology_class?:
|
|
11787
|
+
event_cid: EventCid32;
|
|
11788
|
+
prior_event_hash?: PriorEventHash32;
|
|
11789
|
+
timestamp: Timestamp32;
|
|
11790
|
+
topology_class?: TopologyClass115;
|
|
12332
11791
|
attack_cid: AttackCid;
|
|
12333
11792
|
source_claim_cid: SourceClaimCid;
|
|
12334
11793
|
target_claim_cid: TargetClaimCid;
|
|
@@ -12349,10 +11808,10 @@ export interface DefeasibleAttackEvent {
|
|
|
12349
11808
|
* MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
|
|
12350
11809
|
*/
|
|
12351
11810
|
export interface EpistemicRejectionReceipt {
|
|
12352
|
-
event_cid:
|
|
12353
|
-
prior_event_hash?:
|
|
12354
|
-
timestamp:
|
|
12355
|
-
topology_class?:
|
|
11811
|
+
event_cid: EventCid33;
|
|
11812
|
+
prior_event_hash?: PriorEventHash33;
|
|
11813
|
+
timestamp: Timestamp33;
|
|
11814
|
+
topology_class?: TopologyClass116;
|
|
12356
11815
|
receipt_cid: ReceiptCid1;
|
|
12357
11816
|
failed_projection_cid: FailedProjectionCid;
|
|
12358
11817
|
violated_algebraic_constraint: ViolatedAlgebraicConstraint;
|
|
@@ -12371,10 +11830,10 @@ export interface EpistemicRejectionReceipt {
|
|
|
12371
11830
|
* MCP ROUTING TRIGGERS: System 2 Remediation, Mathematical Truth, Proof Verification, Epistemic Ledger
|
|
12372
11831
|
*/
|
|
12373
11832
|
export interface FormalVerificationReceipt {
|
|
12374
|
-
event_cid:
|
|
12375
|
-
prior_event_hash?:
|
|
12376
|
-
timestamp:
|
|
12377
|
-
topology_class?:
|
|
11833
|
+
event_cid: EventCid34;
|
|
11834
|
+
prior_event_hash?: PriorEventHash34;
|
|
11835
|
+
timestamp: Timestamp34;
|
|
11836
|
+
topology_class?: TopologyClass117;
|
|
12378
11837
|
/**
|
|
12379
11838
|
* Pointer to the specific node or intent that requested this formal verification.
|
|
12380
11839
|
*/
|
|
@@ -12388,11 +11847,11 @@ export interface FormalVerificationReceipt {
|
|
|
12388
11847
|
* CoReason Shared Kernel Ontology
|
|
12389
11848
|
*/
|
|
12390
11849
|
export interface BeliefModulationReceipt {
|
|
12391
|
-
topology_class?:
|
|
11850
|
+
topology_class?: TopologyClass118;
|
|
12392
11851
|
receipt_cid: ReceiptCid2;
|
|
12393
|
-
event_cid:
|
|
12394
|
-
prior_event_hash?:
|
|
12395
|
-
timestamp:
|
|
11852
|
+
event_cid: EventCid35;
|
|
11853
|
+
prior_event_hash?: PriorEventHash35;
|
|
11854
|
+
timestamp: Timestamp35;
|
|
12396
11855
|
target_graph_cid: TargetGraphCid4;
|
|
12397
11856
|
grounded_edges: GroundedEdges;
|
|
12398
11857
|
severed_edge_cids: SeveredEdgeCids;
|
|
@@ -12404,11 +11863,11 @@ export interface GroundedEdges {
|
|
|
12404
11863
|
* CoReason Shared Kernel Ontology
|
|
12405
11864
|
*/
|
|
12406
11865
|
export interface RDFExportReceipt {
|
|
12407
|
-
topology_class?:
|
|
11866
|
+
topology_class?: TopologyClass119;
|
|
12408
11867
|
export_cid: ExportCid1;
|
|
12409
|
-
event_cid:
|
|
12410
|
-
prior_event_hash?:
|
|
12411
|
-
timestamp:
|
|
11868
|
+
event_cid: EventCid36;
|
|
11869
|
+
prior_event_hash?: PriorEventHash36;
|
|
11870
|
+
timestamp: Timestamp36;
|
|
12412
11871
|
serialized_payload: SerializedPayload;
|
|
12413
11872
|
rdf_triple_count: RdfTripleCount;
|
|
12414
11873
|
sha256_graph_hash: Sha256GraphHash;
|
|
@@ -12425,10 +11884,10 @@ export interface RDFExportReceipt {
|
|
|
12425
11884
|
* MCP ROUTING TRIGGERS: Epistemic Starvation, Natural Language Inference, Truth Maintenance System, Defeasible Logic, Belief Mass Depletion
|
|
12426
11885
|
*/
|
|
12427
11886
|
export interface EpistemicStarvationEvent {
|
|
12428
|
-
event_cid:
|
|
12429
|
-
prior_event_hash?:
|
|
12430
|
-
timestamp:
|
|
12431
|
-
topology_class?:
|
|
11887
|
+
event_cid: EventCid37;
|
|
11888
|
+
prior_event_hash?: PriorEventHash37;
|
|
11889
|
+
timestamp: Timestamp37;
|
|
11890
|
+
topology_class?: TopologyClass120;
|
|
12432
11891
|
starved_edge_cid: StarvedEdgeCid;
|
|
12433
11892
|
failed_citations: FailedCitations;
|
|
12434
11893
|
diagnostic_reason: DiagnosticReason;
|
|
@@ -12445,10 +11904,10 @@ export interface EpistemicStarvationEvent {
|
|
|
12445
11904
|
* MCP ROUTING TRIGGERS: SPARQL Result, RDF Bindings, Epistemic Projection, Payload Bounding, Ledger Commit
|
|
12446
11905
|
*/
|
|
12447
11906
|
export interface SPARQLQueryResultReceipt {
|
|
12448
|
-
event_cid:
|
|
12449
|
-
prior_event_hash?:
|
|
12450
|
-
timestamp:
|
|
12451
|
-
topology_class?:
|
|
11907
|
+
event_cid: EventCid38;
|
|
11908
|
+
prior_event_hash?: PriorEventHash38;
|
|
11909
|
+
timestamp: Timestamp38;
|
|
11910
|
+
topology_class?: TopologyClass121;
|
|
12452
11911
|
query_intent_cid: QueryIntentCid;
|
|
12453
11912
|
returned_bindings: ReturnedBindings;
|
|
12454
11913
|
execution_time_ms: ExecutionTimeMs;
|
|
@@ -12471,7 +11930,7 @@ export interface ReturnedBindings {
|
|
|
12471
11930
|
* MCP ROUTING TRIGGERS: Execution Audit, Merkle-DAG Provenance, Thermodynamic Accounting, Oracle Telemetry, Human-in-the-Loop Attestation, Cryptographic Receipt
|
|
12472
11931
|
*/
|
|
12473
11932
|
export interface OracleExecutionReceipt {
|
|
12474
|
-
topology_class?:
|
|
11933
|
+
topology_class?: TopologyClass122;
|
|
12475
11934
|
execution_hash: ExecutionHash;
|
|
12476
11935
|
solver_urn: SolverUrn;
|
|
12477
11936
|
tokens_burned: TokensBurned;
|
|
@@ -12489,8 +11948,8 @@ export interface OracleExecutionReceipt {
|
|
|
12489
11948
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Acyclic Edge, Stochastic Routing, Transition Probability, Directed Graph
|
|
12490
11949
|
*/
|
|
12491
11950
|
export interface TransitionEdgeProfile {
|
|
12492
|
-
topology_class?:
|
|
12493
|
-
target_node_cid?:
|
|
11951
|
+
topology_class?: TopologyClass123;
|
|
11952
|
+
target_node_cid?: TargetNodeCid1;
|
|
12494
11953
|
/**
|
|
12495
11954
|
* Dynamic discovery intent for bridging nodes.
|
|
12496
11955
|
*/
|
|
@@ -12533,8 +11992,8 @@ export interface EdgeMappingContract {
|
|
|
12533
11992
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Cyclic Edge, Bellman Equation, Thermodynamic Discounting, Recursive Traversal
|
|
12534
11993
|
*/
|
|
12535
11994
|
export interface CyclicEdgeProfile {
|
|
12536
|
-
topology_class?:
|
|
12537
|
-
target_node_cid?:
|
|
11995
|
+
topology_class?: TopologyClass124;
|
|
11996
|
+
target_node_cid?: TargetNodeCid2;
|
|
12538
11997
|
/**
|
|
12539
11998
|
* Dynamic discovery intent for bridging nodes.
|
|
12540
11999
|
*/
|
|
@@ -12703,7 +12162,7 @@ export interface TransitionMatrix {
|
|
|
12703
12162
|
* MCP ROUTING TRIGGERS: Bipartite Graph Separation, Toxic Capability Quarantine, Finite State Machine, Structural Interlock, Conflict Graph
|
|
12704
12163
|
*/
|
|
12705
12164
|
export interface KineticSeparationPolicy {
|
|
12706
|
-
policy_cid:
|
|
12165
|
+
policy_cid: PolicyCid1;
|
|
12707
12166
|
mutually_exclusive_clusters: MutuallyExclusiveClusters;
|
|
12708
12167
|
enforcement_action: EnforcementAction;
|
|
12709
12168
|
}
|
|
@@ -12756,22 +12215,6 @@ export interface CognitiveDualVerificationReceipt {
|
|
|
12756
12215
|
secondary_verifier_cid: string;
|
|
12757
12216
|
trace_factual_alignment: TraceFactualAlignment;
|
|
12758
12217
|
}
|
|
12759
|
-
/**
|
|
12760
|
-
* CoReason Shared Kernel Ontology
|
|
12761
|
-
*
|
|
12762
|
-
* AGENT INSTRUCTION: Employs Finite State Machine (FSM) Logit Masking and Constrained Decoding to deterministically herd LLM stochasticity into rigorous syntactic structures.
|
|
12763
|
-
*
|
|
12764
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator's inference engine to physically suffocate invalid token probabilities to negative infinity, mechanically ensuring the output conforms to downstream parser requirements.
|
|
12765
|
-
*
|
|
12766
|
-
* EPISTEMIC BOUNDS: Execution constraints are rigidly defined by `require_think_tags` and `final_answer_regex` (`max_length=2000`) to prevent ReDoS CPU exhaustion. The `@model_validator` `resolve_contract_conflicts` prevents unresolvable compilation conflicts in the DFA.
|
|
12767
|
-
*
|
|
12768
|
-
* MCP ROUTING TRIGGERS: FSM Logit Masking, Constrained Decoding, Regular Expression Automaton, Syntactic Boundary, Token Suffocation
|
|
12769
|
-
*/
|
|
12770
|
-
export interface CognitiveFormatContract1 {
|
|
12771
|
-
require_think_tags?: RequireThinkTags;
|
|
12772
|
-
final_answer_regex?: FinalAnswerRegex;
|
|
12773
|
-
decoding_policy: ConstrainedDecodingPolicy;
|
|
12774
|
-
}
|
|
12775
12218
|
/**
|
|
12776
12219
|
* CoReason Shared Kernel Ontology
|
|
12777
12220
|
*
|
|
@@ -13201,7 +12644,7 @@ export interface DynamicLayoutManifest {
|
|
|
13201
12644
|
* MCP ROUTING TRIGGERS: Grammar of Graphics, Retinal Variables, UI Rendering, Semantic Zooming, Dynamic Manifold
|
|
13202
12645
|
*/
|
|
13203
12646
|
export interface DynamicManifoldProjectionManifest1 {
|
|
13204
|
-
topology_class?:
|
|
12647
|
+
topology_class?: TopologyClass53;
|
|
13205
12648
|
manifest_cid: ManifestCid1;
|
|
13206
12649
|
active_forge_cid: ActiveForgeCid;
|
|
13207
12650
|
ast_gradient_visual_mapping: GrammarPanelProfile;
|
|
@@ -13324,6 +12767,22 @@ export interface Claims {
|
|
|
13324
12767
|
export interface Attacks {
|
|
13325
12768
|
[k: string]: DefeasibleAttackEvent;
|
|
13326
12769
|
}
|
|
12770
|
+
/**
|
|
12771
|
+
* CoReason Shared Kernel Ontology
|
|
12772
|
+
*
|
|
12773
|
+
* AGENT INSTRUCTION: Implements First-Order Logic and Resource Description Framework (RDF) triples to mathematically formalize knowledge. As a ...State suffix, this is a declarative, frozen snapshot of a specific causal connection.
|
|
12774
|
+
*
|
|
12775
|
+
* CAUSAL AFFORDANCE: Distills high-entropy natural language token streams into rigid, hashable causal edges (Subject, Predicate, Object), unlocking deterministic querying and Truth Maintenance System (TMS) traversals.
|
|
12776
|
+
*
|
|
12777
|
+
* EPISTEMIC BOUNDS: Source and target concept physical boundaries are strictly locked to 128-char CIDs matching the regex `^[a-zA-Z0-9_.:-]+$`. The `directed_edge_class` is clamped to a `max_length=2000` to prevent dictionary bombing during semantic evaluation.
|
|
12778
|
+
*
|
|
12779
|
+
* MCP ROUTING TRIGGERS: First-Order Logic, RDF Triple, Semantic Distillation, Causal Edge, Directed Graph
|
|
12780
|
+
*/
|
|
12781
|
+
export interface EpistemicAxiomState {
|
|
12782
|
+
source_concept_cid: SourceConceptCid;
|
|
12783
|
+
directed_edge_class: DirectedEdgeClass;
|
|
12784
|
+
target_concept_cid: TargetConceptCid;
|
|
12785
|
+
}
|
|
13327
12786
|
/**
|
|
13328
12787
|
* CoReason Shared Kernel Ontology
|
|
13329
12788
|
*
|
|
@@ -13739,23 +13198,23 @@ export interface ProceduralMetadataManifest {
|
|
|
13739
13198
|
/**
|
|
13740
13199
|
* CoReason Shared Kernel Ontology
|
|
13741
13200
|
*
|
|
13742
|
-
*
|
|
13743
|
-
*
|
|
13744
|
-
*
|
|
13745
|
-
*
|
|
13201
|
+
* AGENT INSTRUCTION: Encodes a macroscopic Petri net or Directed Acyclic Graph (DAG)
|
|
13202
|
+
* formalizing standard operating procedures into mathematically traversable state
|
|
13203
|
+
* transitions. As a ...Manifest suffix, this defines a frozen, N-dimensional coordinate
|
|
13204
|
+
* state.
|
|
13746
13205
|
*
|
|
13747
|
-
*
|
|
13748
|
-
*
|
|
13749
|
-
*
|
|
13750
|
-
*
|
|
13206
|
+
* CAUSAL AFFORDANCE: Physically bounds the executing agent (target_persona:
|
|
13207
|
+
* ProfileCIDState) to a deterministic sequence of CognitiveStateProfiles, unlocking
|
|
13208
|
+
* the ability for the orchestrator to dynamically evaluate execution via Process Reward
|
|
13209
|
+
* .
|
|
13751
13210
|
*
|
|
13752
|
-
*
|
|
13753
|
-
*
|
|
13754
|
-
*
|
|
13755
|
-
*
|
|
13211
|
+
* EPISTEMIC BOUNDS: The cognitive_steps dictionary is constrained to max_length=1000
|
|
13212
|
+
* to cap memory footprint. The @model_validator reject_ghost_nodes mathematically enforces
|
|
13213
|
+
* referential integrity, guaranteeing that no chronological_flow_edges AND no
|
|
13214
|
+
* structural_grammar_hashes point to an undefined state.
|
|
13756
13215
|
*
|
|
13757
|
-
*
|
|
13758
|
-
*
|
|
13216
|
+
* MCP ROUTING TRIGGERS: Petri Net, Directed Acyclic Graph, Process Reward Model,
|
|
13217
|
+
* Topological Flow, Referential Integrity
|
|
13759
13218
|
*/
|
|
13760
13219
|
export interface EpistemicSOPManifest {
|
|
13761
13220
|
sop_cid: SopCid;
|
|
@@ -13766,7 +13225,6 @@ export interface EpistemicSOPManifest {
|
|
|
13766
13225
|
cognitive_steps: CognitiveSteps;
|
|
13767
13226
|
structural_grammar_hashes: StructuralGrammarHashes;
|
|
13768
13227
|
chronological_flow_edges: ChronologicalFlowEdges1;
|
|
13769
|
-
prm_evaluations: PrmEvaluations;
|
|
13770
13228
|
}
|
|
13771
13229
|
/**
|
|
13772
13230
|
* Dictionary mapping step_cids to strict causal DAG constraints.
|
|
@@ -14727,33 +14185,6 @@ export interface StateVectorProfile1 {
|
|
|
14727
14185
|
mutable_matrix?: MutableMatrix;
|
|
14728
14186
|
is_delta?: IsDelta;
|
|
14729
14187
|
}
|
|
14730
|
-
/**
|
|
14731
|
-
* CoReason Shared Kernel Ontology
|
|
14732
|
-
*
|
|
14733
|
-
* AGENT INSTRUCTION: Formalizes the baseline control group definition within
|
|
14734
|
-
* Chaos Engineering, leveraging Queueing Theory to model the expected systemic
|
|
14735
|
-
* equilibrium. As a ...State suffix, this is a declarative, frozen snapshot of
|
|
14736
|
-
* N-dimensional geometry.
|
|
14737
|
-
*
|
|
14738
|
-
* CAUSAL AFFORDANCE: Provides the deterministic baseline against which chaotic
|
|
14739
|
-
* perturbations (e.g., ChaosExperimentTask) are measured, establishing temporal
|
|
14740
|
-
* and procedural expectations for standard execution loops.
|
|
14741
|
-
*
|
|
14742
|
-
* EPISTEMIC BOUNDS: Latency expectations are continuously bounded by
|
|
14743
|
-
* expected_max_latency (ge=0.0, le=18446744073709551615.0). The max_loops_allowed
|
|
14744
|
-
* (le=18446744073709551615) physically caps algorithmic cycles. The optional
|
|
14745
|
-
* required_tool_usage (list[str] | None, default=None,
|
|
14746
|
-
* max_length=1000) is deterministically sorted via @model_validator
|
|
14747
|
-
* sort_arrays to preserve RFC 8785 canonical hashing.
|
|
14748
|
-
*
|
|
14749
|
-
* MCP ROUTING TRIGGERS: Chaos Engineering, Queueing Theory, Steady-State
|
|
14750
|
-
* Equilibrium, Control Group Baseline, Systemic Perturbation
|
|
14751
|
-
*/
|
|
14752
|
-
export interface SteadyStateHypothesisState1 {
|
|
14753
|
-
expected_max_latency: ExpectedMaxLatency;
|
|
14754
|
-
max_loops_allowed: MaxLoopsAllowed;
|
|
14755
|
-
required_tool_usage?: RequiredToolUsage;
|
|
14756
|
-
}
|
|
14757
14188
|
/**
|
|
14758
14189
|
* CoReason Shared Kernel Ontology
|
|
14759
14190
|
*
|
|
@@ -14815,7 +14246,7 @@ export interface GenerativeManifoldSLA1 {
|
|
|
14815
14246
|
* MCP ROUTING TRIGGERS: Softmax Gating, Cognitive Load Theory, Pre-Flight Routing, Dictionary Bombing Prevention, Token Exhaustion Mitigation
|
|
14816
14247
|
*/
|
|
14817
14248
|
export interface TaxonomicRoutingPolicy {
|
|
14818
|
-
policy_cid:
|
|
14249
|
+
policy_cid: PolicyCid2;
|
|
14819
14250
|
intent_to_heuristic_matrix: IntentToHeuristicMatrix;
|
|
14820
14251
|
fallback_heuristic: FallbackHeuristic;
|
|
14821
14252
|
}
|