@coreason-ai/coreason-manifest 0.54.0 → 0.55.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/ontology.d.ts +680 -1297
- package/package.json +1 -1
package/dist/ontology.d.ts
CHANGED
|
@@ -160,66 +160,6 @@ export type Criteria = GradingCriterionProfile[];
|
|
|
160
160
|
* The absolute mathematical lower-bound scalar required to authorize execution.
|
|
161
161
|
*/
|
|
162
162
|
export type PassingThreshold = number;
|
|
163
|
-
/**
|
|
164
|
-
* The imitation learning persona governing the behavioral emulation profile.
|
|
165
|
-
*/
|
|
166
|
-
export type GenerativePersona = "hesitant_novice" | "fast_expert" | "distracted_browser";
|
|
167
|
-
/**
|
|
168
|
-
* The stochastic process governing the noise generation for pointer trajectory perturbation.
|
|
169
|
-
*/
|
|
170
|
-
export type NoiseClass = "pink" | "brownian" | "gaussian";
|
|
171
|
-
/**
|
|
172
|
-
* The mathematical model governing movement acceleration and velocity smoothing.
|
|
173
|
-
*/
|
|
174
|
-
export type VelocityProfile = "minimum_jerk" | "constant" | "fractional_brownian";
|
|
175
|
-
/**
|
|
176
|
-
* The normalized amplitude of the 1/f noise injected into the pointer trajectory. Bounded [0.0, 1.0].
|
|
177
|
-
*/
|
|
178
|
-
export type PinkNoiseAmplitude = number;
|
|
179
|
-
/**
|
|
180
|
-
* The spectral exponent β in the 1/f^β power spectral density function governing noise color.
|
|
181
|
-
*/
|
|
182
|
-
export type FrequencyExponent = number;
|
|
183
|
-
/**
|
|
184
|
-
* The Euclidean radius in pixels for corrective submovements overshooting the target coordinate.
|
|
185
|
-
*/
|
|
186
|
-
export type TargetOvershootRadiusPixels = number;
|
|
187
|
-
/**
|
|
188
|
-
* Cognitive choice reaction delay in milliseconds, modeled via Hick-Hyman Law.
|
|
189
|
-
*/
|
|
190
|
-
export type HickHymanDwellTimeMs = number;
|
|
191
|
-
/**
|
|
192
|
-
* The JA3/JA4 TLS Client Hello fingerprint URN to project during handshake emulation.
|
|
193
|
-
*/
|
|
194
|
-
export type TlsCipherPermutation = string | null;
|
|
195
|
-
/**
|
|
196
|
-
* The Content Identifier (CID) of the WebGL canvas entropy seed used to generate a deterministic spoofed fingerprint.
|
|
197
|
-
*/
|
|
198
|
-
export type WebglEntropySeedHash = string;
|
|
199
|
-
/**
|
|
200
|
-
* The User-Agent string template projected to exogenous web servers to mask the true computational substrate.
|
|
201
|
-
*/
|
|
202
|
-
export type UserAgentTemplate = string;
|
|
203
|
-
/**
|
|
204
|
-
* The spoofed CPU core count projected to the DOM via navigator.hardwareConcurrency.
|
|
205
|
-
*/
|
|
206
|
-
export type HardwareConcurrencyMask = number;
|
|
207
|
-
/**
|
|
208
|
-
* The spoofed UTC timezone offset in minutes, bounded to the valid terrestrial range.
|
|
209
|
-
*/
|
|
210
|
-
export type TimezoneOffsetMinutes = number;
|
|
211
|
-
/**
|
|
212
|
-
* The spoofed horizontal display resolution in pixels.
|
|
213
|
-
*/
|
|
214
|
-
export type ScreenResolutionWidth = number;
|
|
215
|
-
/**
|
|
216
|
-
* The spoofed vertical display resolution in pixels.
|
|
217
|
-
*/
|
|
218
|
-
export type ScreenResolutionHeight = number;
|
|
219
|
-
/**
|
|
220
|
-
* The target normalized score for human-likeness against anti-bot heuristic classifiers.
|
|
221
|
-
*/
|
|
222
|
-
export type EmulationFidelityTarget = number;
|
|
223
163
|
/**
|
|
224
164
|
* Discriminator for adversarial macro.
|
|
225
165
|
*/
|
|
@@ -252,28 +192,6 @@ export type MinLiquidityMagnitude = number;
|
|
|
252
192
|
* The threshold indicating the market price has stabilized enough to trigger the resolution oracle.
|
|
253
193
|
*/
|
|
254
194
|
export type ConvergenceDeltaThreshold = number;
|
|
255
|
-
/**
|
|
256
|
-
* The unique identifier for this red-team experiment.
|
|
257
|
-
*/
|
|
258
|
-
export type SimulationCid = string;
|
|
259
|
-
/**
|
|
260
|
-
* The exact NodeCIDState the 'Judas Node' will attempt to compromise.
|
|
261
|
-
*/
|
|
262
|
-
export type TargetNodeCid = string;
|
|
263
|
-
/**
|
|
264
|
-
* The mathematically predictable category of structural sabotage being simulated.
|
|
265
|
-
*/
|
|
266
|
-
export type AttackVector = "prompt_extraction" | "data_exfiltration" | "semantic_hijacking" | "tool_poisoning";
|
|
267
|
-
/**
|
|
268
|
-
* The raw poisoned text or malicious JSON-RPC schema injected into the target's context window.
|
|
269
|
-
*/
|
|
270
|
-
export type SyntheticPayload = {
|
|
271
|
-
[k: string]: JsonPrimitiveState;
|
|
272
|
-
} | string;
|
|
273
|
-
/**
|
|
274
|
-
* The exact rule_cid of the SemanticFlowPolicy or Governance bound expected to block this attack. Governing automated test assertions.
|
|
275
|
-
*/
|
|
276
|
-
export type ExpectedFirewallTrip = string | null;
|
|
277
195
|
/**
|
|
278
196
|
* The exact SHA-256 Merkle root of the agent's training lineage.
|
|
279
197
|
*/
|
|
@@ -485,8 +403,7 @@ export type ServerCid = string;
|
|
|
485
403
|
/**
|
|
486
404
|
* Polymorphic transport configuration (stdio, sse, or http) including env_vars, args, and headers.
|
|
487
405
|
*/
|
|
488
|
-
export type Transport =
|
|
489
|
-
export type MCPTransportProfile = StdioTransportProfile | SSETransportProfile | HTTPTransportProfile;
|
|
406
|
+
export type Transport = StdioTransportProfile | SSETransportProfile | HTTPTransportProfile;
|
|
490
407
|
/**
|
|
491
408
|
* Type of transport.
|
|
492
409
|
*/
|
|
@@ -686,7 +603,7 @@ export type Rationale = string;
|
|
|
686
603
|
* Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
|
|
687
604
|
*/
|
|
688
605
|
export type HeuristicConfidence = number;
|
|
689
|
-
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent |
|
|
606
|
+
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent;
|
|
690
607
|
/**
|
|
691
608
|
* Discriminator for temporal edge invalidation.
|
|
692
609
|
*/
|
|
@@ -1285,7 +1202,7 @@ export type Justification = string;
|
|
|
1285
1202
|
*/
|
|
1286
1203
|
export type TopologyClass38 = "constitutional_amendment";
|
|
1287
1204
|
/**
|
|
1288
|
-
* The globally unique decentralized identifier (DID) anchoring the
|
|
1205
|
+
* The globally unique decentralized identifier (DID) anchoring the GuardrailViolationEvent that justified triggering this proposal.
|
|
1289
1206
|
*/
|
|
1290
1207
|
export type DriftEventCid = string;
|
|
1291
1208
|
/**
|
|
@@ -1532,72 +1449,7 @@ export type Params1 = {
|
|
|
1532
1449
|
* Unique request identifier.
|
|
1533
1450
|
*/
|
|
1534
1451
|
export type Id1 = string | number | null;
|
|
1535
|
-
export type TopologyClass49 = "
|
|
1536
|
-
/**
|
|
1537
|
-
* The unique identifier for the chaos experiment.
|
|
1538
|
-
*/
|
|
1539
|
-
export type ExperimentCid = string;
|
|
1540
|
-
/**
|
|
1541
|
-
* The expected maximum latency under normal conditions.
|
|
1542
|
-
*/
|
|
1543
|
-
export type ExpectedMaxLatency = number;
|
|
1544
|
-
/**
|
|
1545
|
-
* The maximum allowed loops for the swarm to reach a conclusion.
|
|
1546
|
-
*/
|
|
1547
|
-
export type MaxLoopsAllowed = number;
|
|
1548
|
-
/**
|
|
1549
|
-
* The strict array of required tools that must be utilized.
|
|
1550
|
-
*/
|
|
1551
|
-
export type RequiredToolUsage = string[] | null;
|
|
1552
|
-
/**
|
|
1553
|
-
* The specific node to attack, or None for swarm-wide.
|
|
1554
|
-
*/
|
|
1555
|
-
export type TargetNodeCid1 = string | null;
|
|
1556
|
-
/**
|
|
1557
|
-
* The severity of the fault, represented from 0.0 to 1.0.
|
|
1558
|
-
*/
|
|
1559
|
-
export type Intensity = number;
|
|
1560
|
-
/**
|
|
1561
|
-
* The strict array of fault injection profiles defining the chaotic elements.
|
|
1562
|
-
*/
|
|
1563
|
-
export type Faults = FaultInjectionProfile[];
|
|
1564
|
-
/**
|
|
1565
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
1566
|
-
*/
|
|
1567
|
-
export type EventCid1 = string;
|
|
1568
|
-
/**
|
|
1569
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
1570
|
-
*/
|
|
1571
|
-
export type PriorEventHash1 = string | null;
|
|
1572
|
-
/**
|
|
1573
|
-
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
1574
|
-
*/
|
|
1575
|
-
export type Timestamp1 = number;
|
|
1576
|
-
/**
|
|
1577
|
-
* Discriminator type for an exogenous event.
|
|
1578
|
-
*/
|
|
1579
|
-
export type TopologyClass50 = "exogenous_event";
|
|
1580
|
-
/**
|
|
1581
|
-
* Cryptographic identifier for the Black Swan event.
|
|
1582
|
-
*/
|
|
1583
|
-
export type ShockCid = string;
|
|
1584
|
-
/**
|
|
1585
|
-
* Regex-bound SHA-256 string targeting a specific Merkle root in the epistemic graph.
|
|
1586
|
-
*/
|
|
1587
|
-
export type TargetNodeHash = string;
|
|
1588
|
-
/**
|
|
1589
|
-
* Strictly bounded mathematical quantification of the epistemic decay or Variational Free Energy.
|
|
1590
|
-
*/
|
|
1591
|
-
export type BayesianSurpriseScore = number;
|
|
1592
|
-
/**
|
|
1593
|
-
* The strictly typed boundary requiring locked magnitude to prevent zero-cost griefing of the swarm.
|
|
1594
|
-
*/
|
|
1595
|
-
export type LockedMagnitude = number;
|
|
1596
|
-
/**
|
|
1597
|
-
* The declarative array of exogenous Black Swan events injected into the topology.
|
|
1598
|
-
*/
|
|
1599
|
-
export type Shocks = ExogenousEpistemicEvent[];
|
|
1600
|
-
export type TopologyClass51 = "epistemic_transmutation_task";
|
|
1452
|
+
export type TopologyClass49 = "epistemic_transmutation_task";
|
|
1601
1453
|
/**
|
|
1602
1454
|
* Unique identifier for this specific multimodal extraction intervention.
|
|
1603
1455
|
*/
|
|
@@ -1642,7 +1494,7 @@ export type TableStructureRecognition = boolean;
|
|
|
1642
1494
|
* Optional maximum economic expenditure authorized to run this VLM transmutation.
|
|
1643
1495
|
*/
|
|
1644
1496
|
export type ExecutionCostBudgetMagnitude1 = number | null;
|
|
1645
|
-
export type
|
|
1497
|
+
export type TopologyClass50 = "epistemic_upsampling_task";
|
|
1646
1498
|
/**
|
|
1647
1499
|
* The explicitly declared target node classification or structural grain.
|
|
1648
1500
|
*/
|
|
@@ -1658,7 +1510,7 @@ export type UpsamplingConfidenceThreshold = number;
|
|
|
1658
1510
|
* @maxItems 1000
|
|
1659
1511
|
*/
|
|
1660
1512
|
export type JustificationVectors = [string, ...string[]];
|
|
1661
|
-
export type
|
|
1513
|
+
export type TopologyClass51 = "interventional_causal_task";
|
|
1662
1514
|
/**
|
|
1663
1515
|
* Unique identifier for this causal intervention.
|
|
1664
1516
|
*/
|
|
@@ -1683,7 +1535,7 @@ export type ExpectedCausalInformationGain = number;
|
|
|
1683
1535
|
* The maximum economic expenditure authorized to run this specific causal intervention.
|
|
1684
1536
|
*/
|
|
1685
1537
|
export type ExecutionCostBudgetMagnitude2 = number;
|
|
1686
|
-
export type
|
|
1538
|
+
export type TopologyClass52 = "mcp_client_intent";
|
|
1687
1539
|
/**
|
|
1688
1540
|
* JSON-RPC version.
|
|
1689
1541
|
*/
|
|
@@ -1705,7 +1557,7 @@ export type Id2 = string | number | null;
|
|
|
1705
1557
|
/**
|
|
1706
1558
|
* Discriminator for the dynamic manifold projection.
|
|
1707
1559
|
*/
|
|
1708
|
-
export type
|
|
1560
|
+
export type TopologyClass53 = "dynamic_manifold";
|
|
1709
1561
|
/**
|
|
1710
1562
|
* Unique identifier for this projection.
|
|
1711
1563
|
*/
|
|
@@ -1721,7 +1573,7 @@ export type PanelCid = string;
|
|
|
1721
1573
|
/**
|
|
1722
1574
|
* Discriminator for Grammar of Graphics charts.
|
|
1723
1575
|
*/
|
|
1724
|
-
export type
|
|
1576
|
+
export type TopologyClass54 = "grammar";
|
|
1725
1577
|
/**
|
|
1726
1578
|
* The declarative semantic anchor summarizing the underlying visual grammar.
|
|
1727
1579
|
*/
|
|
@@ -1761,7 +1613,7 @@ export type Field = string;
|
|
|
1761
1613
|
/**
|
|
1762
1614
|
* The strictly typed mathematical mapping function distorting metrics into Euclidean pixel space.
|
|
1763
1615
|
*/
|
|
1764
|
-
export type
|
|
1616
|
+
export type TopologyClass55 = "linear" | "log" | "time" | "ordinal" | "nominal";
|
|
1765
1617
|
/**
|
|
1766
1618
|
* The optional minimum bound of the scale domain.
|
|
1767
1619
|
*/
|
|
@@ -1789,7 +1641,7 @@ export type PanelCid1 = string;
|
|
|
1789
1641
|
/**
|
|
1790
1642
|
* Discriminator for markdown insight cards.
|
|
1791
1643
|
*/
|
|
1792
|
-
export type
|
|
1644
|
+
export type TopologyClass56 = "insight_card";
|
|
1793
1645
|
/**
|
|
1794
1646
|
* The declarative semantic anchor summarizing the underlying matrix or markdown projection.
|
|
1795
1647
|
*/
|
|
@@ -1810,7 +1662,7 @@ export type MesoDistanceThreshold = number;
|
|
|
1810
1662
|
* The close-proximity boundary where full N-dimensional tensors and unstructured text blocks are mathematically hydrated into the observer's plane.
|
|
1811
1663
|
*/
|
|
1812
1664
|
export type MicroDistanceThreshold = number;
|
|
1813
|
-
export type
|
|
1665
|
+
export type TopologyClass57 = "rollback_intent";
|
|
1814
1666
|
/**
|
|
1815
1667
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for the causal rollback operation.
|
|
1816
1668
|
*/
|
|
@@ -1823,7 +1675,7 @@ export type TargetEventCid = string;
|
|
|
1823
1675
|
* The strict array of nodes whose operational histories are causally tainted and must be flushed.
|
|
1824
1676
|
*/
|
|
1825
1677
|
export type InvalidatedNodeCids = string[];
|
|
1826
|
-
export type
|
|
1678
|
+
export type TopologyClass58 = "state_mutation_intent";
|
|
1827
1679
|
/**
|
|
1828
1680
|
* The JSON pointer indicating the exact state vector to mutate deterministically.
|
|
1829
1681
|
*/
|
|
@@ -1839,7 +1691,7 @@ export type ZeroTrustReceiptCid = string | null;
|
|
|
1839
1691
|
/**
|
|
1840
1692
|
* Discriminator for the OntologicalNormalizationIntent topology.
|
|
1841
1693
|
*/
|
|
1842
|
-
export type
|
|
1694
|
+
export type TopologyClass59 = "ontological_normalization";
|
|
1843
1695
|
/**
|
|
1844
1696
|
* The Content Identifier (CID) of the raw ingested data artifact.
|
|
1845
1697
|
*/
|
|
@@ -1901,7 +1753,7 @@ export type Description3 = string;
|
|
|
1901
1753
|
/**
|
|
1902
1754
|
* Discriminator for an Agent node.
|
|
1903
1755
|
*/
|
|
1904
|
-
export type
|
|
1756
|
+
export type TopologyClass60 = "agent";
|
|
1905
1757
|
/**
|
|
1906
1758
|
* The level of hardware-enforced cryptographic isolation required.
|
|
1907
1759
|
*/
|
|
@@ -2088,17 +1940,10 @@ export type EnforceFunctionalIsolation = boolean;
|
|
|
2088
1940
|
*
|
|
2089
1941
|
* @minItems 1
|
|
2090
1942
|
*/
|
|
2091
|
-
export type PermittedClassificationTiers = [
|
|
2092
|
-
|
|
2093
|
-
|
|
2094
|
-
|
|
2095
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
|
|
2096
|
-
*
|
|
2097
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
|
|
2098
|
-
*
|
|
2099
|
-
* MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
|
|
2100
|
-
*/
|
|
2101
|
-
export type SemanticClassificationProfile = "public" | "internal" | "confidential" | "restricted";
|
|
1943
|
+
export type PermittedClassificationTiers = [
|
|
1944
|
+
"public" | "internal" | "confidential" | "restricted",
|
|
1945
|
+
...("public" | "internal" | "confidential" | "restricted")[]
|
|
1946
|
+
];
|
|
2102
1947
|
/**
|
|
2103
1948
|
* The declarative whitelist of strictly typed ontological node labels authorized for context projection.
|
|
2104
1949
|
*/
|
|
@@ -2149,30 +1994,6 @@ export type MaxLatentTokensBudget = number;
|
|
|
2149
1994
|
* The physical time limit allowed for the scratchpad search before forcing a timeout.
|
|
2150
1995
|
*/
|
|
2151
1996
|
export type MaxTestTimeComputeMs = number;
|
|
2152
|
-
/**
|
|
2153
|
-
* The minimal required PRM score improvement across the lookback window to justify continued compute.
|
|
2154
|
-
*/
|
|
2155
|
-
export type ConvergenceDeltaEpsilon = number;
|
|
2156
|
-
/**
|
|
2157
|
-
* The N-step temporal window over which the PRM gradient is calculated.
|
|
2158
|
-
*/
|
|
2159
|
-
export type LookbackWindowSteps = number;
|
|
2160
|
-
/**
|
|
2161
|
-
* The mandatory 'burn-in' period. The orchestrator cannot terminate the search before this structural depth is reached, preventing premature collapse.
|
|
2162
|
-
*/
|
|
2163
|
-
export type MinimumReasoningSteps = number;
|
|
2164
|
-
/**
|
|
2165
|
-
* If a ThoughtBranchState's prm_score falls below this threshold, the orchestrator MUST halt its generation.
|
|
2166
|
-
*/
|
|
2167
|
-
export type PruningThreshold = number;
|
|
2168
|
-
/**
|
|
2169
|
-
* The absolute limit on how many times the agent can start a new branch before throwing a SystemFaultEvent.
|
|
2170
|
-
*/
|
|
2171
|
-
export type MaxBacktracksAllowed = number;
|
|
2172
|
-
/**
|
|
2173
|
-
* The specific PRM model used to score the logic (e.g., 'math-prm-v2').
|
|
2174
|
-
*/
|
|
2175
|
-
export type EvaluatorMatrixName = string | null;
|
|
2176
1997
|
/**
|
|
2177
1998
|
* Unique identifier for this symbolic delegation.
|
|
2178
1999
|
*/
|
|
@@ -2220,54 +2041,6 @@ export type MaxFeaturesPerLayer = number;
|
|
|
2220
2041
|
* If True, the orchestrator MUST generate cryptographic latent state proofs alongside the activation extractions.
|
|
2221
2042
|
*/
|
|
2222
2043
|
export type RequireZkCommitments = boolean;
|
|
2223
|
-
/**
|
|
2224
|
-
* CID for this specific reward configuration.
|
|
2225
|
-
*/
|
|
2226
|
-
export type PolicyCid = string;
|
|
2227
|
-
/**
|
|
2228
|
-
* The globally unique decentralized identifier (DID) anchoring the EpistemicDomainGraphManifest acting as the deterministic ground truth.
|
|
2229
|
-
*/
|
|
2230
|
-
export type ReferenceGraphCid = string;
|
|
2231
|
-
/**
|
|
2232
|
-
* Forces the inclusion of structural XML tags to isolate the reasoning trace.
|
|
2233
|
-
*/
|
|
2234
|
-
export type RequireThinkTags = boolean;
|
|
2235
|
-
/**
|
|
2236
|
-
* The strict regular expression the model must satisfy to yield a valid discrete classification. Optional because LMQL/Guidance do not use standard regex.
|
|
2237
|
-
*/
|
|
2238
|
-
export type FinalAnswerRegex = string | null;
|
|
2239
|
-
/**
|
|
2240
|
-
* The mechanistic strategy for intercepting the LLM forward pass.
|
|
2241
|
-
*/
|
|
2242
|
-
export type EnforcementStrategy = "fsm_logit_mask" | "lmql_query" | "guidance_program" | "ebnf_grammar";
|
|
2243
|
-
/**
|
|
2244
|
-
* The URN of the backend used to compile the CFG or Regex into a DFA/PDA (e.g., 'urn:coreason:compiler:xgrammar').
|
|
2245
|
-
*/
|
|
2246
|
-
export type CompilerBackend = string;
|
|
2247
|
-
/**
|
|
2248
|
-
* The raw LMQL query string, Guidance program, or EBNF grammar. Required if the enforcement_strategy is not standard JSON/Regex masking.
|
|
2249
|
-
*/
|
|
2250
|
-
export type FormalGrammarString = string | null;
|
|
2251
|
-
/**
|
|
2252
|
-
* If True, mathematically forces the engine to halt if the LLM attempts to generate an EOS token before the FSM reaches an accepting state.
|
|
2253
|
-
*/
|
|
2254
|
-
export type TerminateOnEosLeak = boolean;
|
|
2255
|
-
/**
|
|
2256
|
-
* The scalar weight applied to the logical path validity (R_path) to prevent reward hacking.
|
|
2257
|
-
*/
|
|
2258
|
-
export type BetaPathWeight = number;
|
|
2259
|
-
/**
|
|
2260
|
-
* The lower bound for Random Walk with Restart (RWR) reachability.
|
|
2261
|
-
*/
|
|
2262
|
-
export type MinEdgeCriticalityScore = number;
|
|
2263
|
-
/**
|
|
2264
|
-
* The lower bound for GCN/GAT cosine similarity.
|
|
2265
|
-
*/
|
|
2266
|
-
export type MinSemanticRelevanceScore = number;
|
|
2267
|
-
/**
|
|
2268
|
-
* The deterministic protocol the orchestrator must use to compute these scores.
|
|
2269
|
-
*/
|
|
2270
|
-
export type AggregationMethod = "gcn_spatial" | "attention_gat" | "rwr_topological";
|
|
2271
2044
|
/**
|
|
2272
2045
|
* The mathematical tolerance for the detailed balance constraint.
|
|
2273
2046
|
*/
|
|
@@ -2309,7 +2082,7 @@ export type DomainExtensions1 = {
|
|
|
2309
2082
|
/**
|
|
2310
2083
|
* Discriminator for a Human node.
|
|
2311
2084
|
*/
|
|
2312
|
-
export type
|
|
2085
|
+
export type TopologyClass61 = "human";
|
|
2313
2086
|
/**
|
|
2314
2087
|
* The mandatory cryptographic attestation URN required to verify the human operator's identity.
|
|
2315
2088
|
*/
|
|
@@ -2339,7 +2112,7 @@ export type DomainExtensions2 = {
|
|
|
2339
2112
|
/**
|
|
2340
2113
|
* Discriminator for a System node.
|
|
2341
2114
|
*/
|
|
2342
|
-
export type
|
|
2115
|
+
export type TopologyClass62 = "system";
|
|
2343
2116
|
/**
|
|
2344
2117
|
* The semantic boundary defining the objective function or computational perimeter of the execution node.
|
|
2345
2118
|
*/
|
|
@@ -2365,7 +2138,7 @@ export type DomainExtensions3 = {
|
|
|
2365
2138
|
/**
|
|
2366
2139
|
* Discriminator for a Composite node.
|
|
2367
2140
|
*/
|
|
2368
|
-
export type
|
|
2141
|
+
export type TopologyClass63 = "composite";
|
|
2369
2142
|
/**
|
|
2370
2143
|
* Entropy Penalty applied per edge traversal during a defeasible cascade.
|
|
2371
2144
|
*/
|
|
@@ -2411,47 +2184,29 @@ export type FormalSchemaUrn = string | null;
|
|
|
2411
2184
|
*/
|
|
2412
2185
|
export type StrictValidation = boolean;
|
|
2413
2186
|
/**
|
|
2414
|
-
*
|
|
2415
|
-
*/
|
|
2416
|
-
export type PolicyCid1 = string;
|
|
2417
|
-
/**
|
|
2418
|
-
* Whether this policy is currently enforcing data sanitization.
|
|
2419
|
-
*/
|
|
2420
|
-
export type Active1 = boolean;
|
|
2421
|
-
/**
|
|
2422
|
-
* Unique identifier for the sanitization rule.
|
|
2423
|
-
*/
|
|
2424
|
-
export type RuleCid = string;
|
|
2425
|
-
/**
|
|
2426
|
-
* AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
|
|
2427
|
-
*
|
|
2428
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
|
|
2429
|
-
*
|
|
2430
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
|
|
2431
|
-
*
|
|
2432
|
-
* MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
|
|
2187
|
+
* The mechanistic strategy for intercepting the LLM forward pass.
|
|
2433
2188
|
*/
|
|
2434
|
-
export type
|
|
2189
|
+
export type EnforcementStrategy = "fsm_logit_mask" | "lmql_query" | "guidance_program" | "ebnf_grammar";
|
|
2435
2190
|
/**
|
|
2436
|
-
* The
|
|
2191
|
+
* The URN of the backend used to compile the CFG or Regex into a DFA/PDA (e.g., 'urn:coreason:compiler:xgrammar').
|
|
2437
2192
|
*/
|
|
2438
|
-
export type
|
|
2193
|
+
export type CompilerBackend = string;
|
|
2439
2194
|
/**
|
|
2440
|
-
* The
|
|
2195
|
+
* The raw LMQL query string, Guidance program, or EBNF grammar. Required if the enforcement_strategy is not standard JSON/Regex masking.
|
|
2441
2196
|
*/
|
|
2442
|
-
export type
|
|
2197
|
+
export type FormalGrammarString = string | null;
|
|
2443
2198
|
/**
|
|
2444
|
-
*
|
|
2199
|
+
* If True, mathematically forces the engine to halt if the LLM attempts to generate an EOS token before the FSM reaches an accepting state.
|
|
2445
2200
|
*/
|
|
2446
|
-
export type
|
|
2201
|
+
export type TerminateOnEosLeak = boolean;
|
|
2447
2202
|
/**
|
|
2448
|
-
*
|
|
2203
|
+
* Unique identifier for this macroscopic flow control policy.
|
|
2449
2204
|
*/
|
|
2450
|
-
export type
|
|
2205
|
+
export type PolicyCid = string;
|
|
2451
2206
|
/**
|
|
2452
|
-
*
|
|
2207
|
+
* Whether this policy is currently enforcing data sanitization.
|
|
2453
2208
|
*/
|
|
2454
|
-
export type
|
|
2209
|
+
export type Active1 = boolean;
|
|
2455
2210
|
/**
|
|
2456
2211
|
* The absolute physical ceiling of tokens allowed in a single ingress payload.
|
|
2457
2212
|
*/
|
|
@@ -2585,7 +2340,7 @@ export type FoveatedPrivacyEpsilon = number | null;
|
|
|
2585
2340
|
/**
|
|
2586
2341
|
* Discriminator for a DAG topology.
|
|
2587
2342
|
*/
|
|
2588
|
-
export type
|
|
2343
|
+
export type TopologyClass64 = "dag";
|
|
2589
2344
|
/**
|
|
2590
2345
|
* The strict, topologically bounded matrix of directed causal edges.
|
|
2591
2346
|
*/
|
|
@@ -2669,7 +2424,7 @@ export type Justification7 = string | null;
|
|
|
2669
2424
|
/**
|
|
2670
2425
|
* Discriminator for a Council topology.
|
|
2671
2426
|
*/
|
|
2672
|
-
export type
|
|
2427
|
+
export type TopologyClass65 = "council";
|
|
2673
2428
|
/**
|
|
2674
2429
|
* The minimum number of adversarial or 'Devil's Advocate' roles required to prevent groupthink.
|
|
2675
2430
|
*/
|
|
@@ -2741,7 +2496,7 @@ export type Justification8 = string | null;
|
|
|
2741
2496
|
/**
|
|
2742
2497
|
* Discriminator for a Swarm topology.
|
|
2743
2498
|
*/
|
|
2744
|
-
export type
|
|
2499
|
+
export type TopologyClass66 = "swarm";
|
|
2745
2500
|
/**
|
|
2746
2501
|
* Threshold limit for dynamic spawning of additional nodes.
|
|
2747
2502
|
*/
|
|
@@ -2823,7 +2578,7 @@ export type Justification9 = string | null;
|
|
|
2823
2578
|
/**
|
|
2824
2579
|
* Discriminator for an Evolutionary topology.
|
|
2825
2580
|
*/
|
|
2826
|
-
export type
|
|
2581
|
+
export type TopologyClass67 = "evolutionary";
|
|
2827
2582
|
/**
|
|
2828
2583
|
* The absolute limit on evolutionary breeding cycles.
|
|
2829
2584
|
*/
|
|
@@ -2883,7 +2638,7 @@ export type Justification10 = string | null;
|
|
|
2883
2638
|
/**
|
|
2884
2639
|
* Discriminator for SMPC Topology.
|
|
2885
2640
|
*/
|
|
2886
|
-
export type
|
|
2641
|
+
export type TopologyClass68 = "smpc";
|
|
2887
2642
|
/**
|
|
2888
2643
|
* The exact cryptographic P2P protocol the nodes must use to evaluate the function.
|
|
2889
2644
|
*/
|
|
@@ -2913,7 +2668,7 @@ export type Justification11 = string | null;
|
|
|
2913
2668
|
/**
|
|
2914
2669
|
* Discriminator for an Evaluator-Optimizer loop.
|
|
2915
2670
|
*/
|
|
2916
|
-
export type
|
|
2671
|
+
export type TopologyClass69 = "evaluator_optimizer";
|
|
2917
2672
|
/**
|
|
2918
2673
|
* The absolute limit on Actor-Critic cycles to prevent infinite compute burn.
|
|
2919
2674
|
*/
|
|
@@ -2937,7 +2692,7 @@ export type Justification12 = string | null;
|
|
|
2937
2692
|
/**
|
|
2938
2693
|
* Discriminator for a Digital Twin topology.
|
|
2939
2694
|
*/
|
|
2940
|
-
export type
|
|
2695
|
+
export type TopologyClass70 = "digital_twin";
|
|
2941
2696
|
/**
|
|
2942
2697
|
* The identifier (expected to be a W3C DID) pointing to the real-world topology it is cloning.
|
|
2943
2698
|
*/
|
|
@@ -2957,7 +2712,7 @@ export type EnforceNoSideEffects = boolean;
|
|
|
2957
2712
|
/**
|
|
2958
2713
|
* Discriminator for federation macro.
|
|
2959
2714
|
*/
|
|
2960
|
-
export type
|
|
2715
|
+
export type TopologyClass71 = "macro_federation";
|
|
2961
2716
|
/**
|
|
2962
2717
|
* The nodes forming the PBFT ring.
|
|
2963
2718
|
*
|
|
@@ -2979,7 +2734,7 @@ export type Justification13 = string | null;
|
|
|
2979
2734
|
/**
|
|
2980
2735
|
* Discriminator for forge macro.
|
|
2981
2736
|
*/
|
|
2982
|
-
export type
|
|
2737
|
+
export type TopologyClass72 = "macro_forge";
|
|
2983
2738
|
/**
|
|
2984
2739
|
* The structural 128-char DID boundary pointing to the foundational semantic deficit vector.
|
|
2985
2740
|
*/
|
|
@@ -3007,7 +2762,7 @@ export type Justification14 = string | null;
|
|
|
3007
2762
|
/**
|
|
3008
2763
|
* Discriminator for the elicitation macro.
|
|
3009
2764
|
*/
|
|
3010
|
-
export type
|
|
2765
|
+
export type TopologyClass73 = "macro_elicitation";
|
|
3011
2766
|
/**
|
|
3012
2767
|
* The anchor to the initial, unstructured MultimodalArtifactReceipt uploaded by the human.
|
|
3013
2768
|
*/
|
|
@@ -3031,7 +2786,7 @@ export type Justification15 = string | null;
|
|
|
3031
2786
|
/**
|
|
3032
2787
|
* Discriminator for the ingestion macro.
|
|
3033
2788
|
*/
|
|
3034
|
-
export type
|
|
2789
|
+
export type TopologyClass74 = "macro_ingestion";
|
|
3035
2790
|
/**
|
|
3036
2791
|
* Target serialization format.
|
|
3037
2792
|
*/
|
|
@@ -3051,7 +2806,7 @@ export type Justification16 = string | null;
|
|
|
3051
2806
|
/**
|
|
3052
2807
|
* Discriminator for a macro neurosymbolic loop.
|
|
3053
2808
|
*/
|
|
3054
|
-
export type
|
|
2809
|
+
export type TopologyClass75 = "macro_neurosymbolic";
|
|
3055
2810
|
/**
|
|
3056
2811
|
* The connectionist agent generating hypotheses.
|
|
3057
2812
|
*/
|
|
@@ -3071,7 +2826,7 @@ export type CritiqueSchemaCid = string | null;
|
|
|
3071
2826
|
/**
|
|
3072
2827
|
* Discriminator for a discourse tree topology.
|
|
3073
2828
|
*/
|
|
3074
|
-
export type
|
|
2829
|
+
export type TopologyClass76 = "discourse_tree";
|
|
3075
2830
|
/**
|
|
3076
2831
|
* Cryptographic identifier for this topology.
|
|
3077
2832
|
*/
|
|
@@ -3084,7 +2839,7 @@ export type DiscourseType = "preamble" | "methodology" | "argumentation" | "find
|
|
|
3084
2839
|
* Explicit pointers linking this discourse block to the specific AtomicPropositionState nodes extracted from its text.
|
|
3085
2840
|
*/
|
|
3086
2841
|
export type ContainedPropositions = NodeCIDState[];
|
|
3087
|
-
export type
|
|
2842
|
+
export type TopologyClass77 = "document_knowledge_graph";
|
|
3088
2843
|
export type GraphCid = string;
|
|
3089
2844
|
export type SourceArtifactCid2 = string;
|
|
3090
2845
|
/**
|
|
@@ -3148,7 +2903,7 @@ export type CiphertextBlob = string;
|
|
|
3148
2903
|
/**
|
|
3149
2904
|
* Discriminator for manifold mapping.
|
|
3150
2905
|
*/
|
|
3151
|
-
export type
|
|
2906
|
+
export type TopologyClass78 = "manifold_mapping";
|
|
3152
2907
|
/**
|
|
3153
2908
|
* Calculated geometric alignment between the semantic embedding and spatial tensor.
|
|
3154
2909
|
*/
|
|
@@ -3166,7 +2921,7 @@ export type Nodes12 = SemanticNodeState[];
|
|
|
3166
2921
|
*/
|
|
3167
2922
|
export type CausalEdges = CausalDirectedEdgeState[];
|
|
3168
2923
|
export type IsomorphismHash = string;
|
|
3169
|
-
export type
|
|
2924
|
+
export type TopologyClass79 = "hierarchical_dom";
|
|
3170
2925
|
export type DomCid = string;
|
|
3171
2926
|
export type RootBlockCid = string;
|
|
3172
2927
|
/**
|
|
@@ -3258,7 +3013,7 @@ export type DomainExtensions4 = {
|
|
|
3258
3013
|
/**
|
|
3259
3014
|
* Discriminator for a Memoized node.
|
|
3260
3015
|
*/
|
|
3261
|
-
export type
|
|
3016
|
+
export type TopologyClass80 = "memoized";
|
|
3262
3017
|
/**
|
|
3263
3018
|
* A discriminated union of presentation UI panels.
|
|
3264
3019
|
*/
|
|
@@ -3267,11 +3022,11 @@ export type AnyPresentationIntent = SemanticIntent | DraftingIntent | Adjudicati
|
|
|
3267
3022
|
/**
|
|
3268
3023
|
* A discriminated union of state events.
|
|
3269
3024
|
*/
|
|
3270
|
-
export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent |
|
|
3025
|
+
export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt | GuardrailViolationEvent;
|
|
3271
3026
|
/**
|
|
3272
3027
|
* Discriminator for temporal graph crdt.
|
|
3273
3028
|
*/
|
|
3274
|
-
export type
|
|
3029
|
+
export type TopologyClass81 = "temporal_graph_crdt";
|
|
3275
3030
|
/**
|
|
3276
3031
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark.
|
|
3277
3032
|
*/
|
|
@@ -3292,40 +3047,40 @@ export type AddSet = NodeCIDState[];
|
|
|
3292
3047
|
* The set of non-monotonic timeline caps.
|
|
3293
3048
|
*/
|
|
3294
3049
|
export type TerminateSet = TemporalEdgeInvalidationIntent[];
|
|
3295
|
-
export type
|
|
3050
|
+
export type TopologyClass82 = "mcp_tool_definition";
|
|
3296
3051
|
/**
|
|
3297
3052
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3298
3053
|
*/
|
|
3299
|
-
export type
|
|
3054
|
+
export type EventCid1 = string;
|
|
3300
3055
|
/**
|
|
3301
3056
|
* The RFC 8785 Canonical hash of the immediate causal ancestor event. Null for genesis nodes.
|
|
3302
3057
|
*/
|
|
3303
|
-
export type
|
|
3304
|
-
export type
|
|
3058
|
+
export type PriorEventHash1 = string | null;
|
|
3059
|
+
export type Timestamp1 = number;
|
|
3305
3060
|
export type Name = string;
|
|
3306
3061
|
export type Description9 = string;
|
|
3307
|
-
export type
|
|
3308
|
-
export type
|
|
3309
|
-
export type
|
|
3310
|
-
export type
|
|
3062
|
+
export type EventCid2 = string;
|
|
3063
|
+
export type PriorEventHash2 = string | null;
|
|
3064
|
+
export type Timestamp2 = number;
|
|
3065
|
+
export type TopologyClass83 = "crosswalk_resolution";
|
|
3311
3066
|
export type ReceiptCid = string;
|
|
3312
3067
|
export type TargetGraphCid3 = string;
|
|
3313
3068
|
/**
|
|
3314
3069
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3315
3070
|
*/
|
|
3316
|
-
export type
|
|
3071
|
+
export type EventCid3 = string;
|
|
3317
3072
|
/**
|
|
3318
3073
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3319
3074
|
*/
|
|
3320
|
-
export type
|
|
3075
|
+
export type PriorEventHash3 = string | null;
|
|
3321
3076
|
/**
|
|
3322
3077
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3323
3078
|
*/
|
|
3324
|
-
export type
|
|
3079
|
+
export type Timestamp3 = number;
|
|
3325
3080
|
/**
|
|
3326
3081
|
* Discriminator for a zero-trust receipt.
|
|
3327
3082
|
*/
|
|
3328
|
-
export type
|
|
3083
|
+
export type TopologyClass84 = "zero_trust_receipt";
|
|
3329
3084
|
/**
|
|
3330
3085
|
* Pointer to the originating EpistemicZeroTrustContract.
|
|
3331
3086
|
*/
|
|
@@ -3349,19 +3104,19 @@ export type TransmutedPayloadHash = string;
|
|
|
3349
3104
|
/**
|
|
3350
3105
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3351
3106
|
*/
|
|
3352
|
-
export type
|
|
3107
|
+
export type EventCid4 = string;
|
|
3353
3108
|
/**
|
|
3354
3109
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3355
3110
|
*/
|
|
3356
|
-
export type
|
|
3111
|
+
export type PriorEventHash4 = string | null;
|
|
3357
3112
|
/**
|
|
3358
3113
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3359
3114
|
*/
|
|
3360
|
-
export type
|
|
3115
|
+
export type Timestamp4 = number;
|
|
3361
3116
|
/**
|
|
3362
3117
|
* Discriminator type for an observation event.
|
|
3363
3118
|
*/
|
|
3364
|
-
export type
|
|
3119
|
+
export type TopologyClass85 = "observation";
|
|
3365
3120
|
/**
|
|
3366
3121
|
* The URN representing the physical silicon architecture generating the root-of-trust quote (e.g., 'urn:coreason:enclave:intel_tdx').
|
|
3367
3122
|
*/
|
|
@@ -3381,7 +3136,7 @@ export type AnyToolchainState = BrowserDOMState | TerminalBufferState;
|
|
|
3381
3136
|
/**
|
|
3382
3137
|
* Discriminator for Causal Actuators representing structural shifts.
|
|
3383
3138
|
*/
|
|
3384
|
-
export type
|
|
3139
|
+
export type TopologyClass86 = "browser";
|
|
3385
3140
|
/**
|
|
3386
3141
|
* Spatial Execution Bounds where the agent interacts.
|
|
3387
3142
|
*/
|
|
@@ -3408,7 +3163,7 @@ export type ScreenshotCid = string | null;
|
|
|
3408
3163
|
/**
|
|
3409
3164
|
* Discriminator for Causal Actuators on structural buffers.
|
|
3410
3165
|
*/
|
|
3411
|
-
export type
|
|
3166
|
+
export type TopologyClass87 = "terminal";
|
|
3412
3167
|
/**
|
|
3413
3168
|
* Capability Perimeters defining context bounds.
|
|
3414
3169
|
*/
|
|
@@ -3432,7 +3187,7 @@ export type SensoryModality = "video" | "audio" | "spatial_telemetry";
|
|
|
3432
3187
|
/**
|
|
3433
3188
|
* The calculated KL divergence between the prior belief and the incoming structural evidence.
|
|
3434
3189
|
*/
|
|
3435
|
-
export type
|
|
3190
|
+
export type BayesianSurpriseScore = number;
|
|
3436
3191
|
/**
|
|
3437
3192
|
* The exact length of the timeline encapsulated by this observation.
|
|
3438
3193
|
*/
|
|
@@ -3494,19 +3249,19 @@ export type MaxLookbackWindow = number;
|
|
|
3494
3249
|
/**
|
|
3495
3250
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3496
3251
|
*/
|
|
3497
|
-
export type
|
|
3252
|
+
export type EventCid5 = string;
|
|
3498
3253
|
/**
|
|
3499
3254
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3500
3255
|
*/
|
|
3501
|
-
export type
|
|
3256
|
+
export type PriorEventHash5 = string | null;
|
|
3502
3257
|
/**
|
|
3503
3258
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3504
3259
|
*/
|
|
3505
|
-
export type
|
|
3260
|
+
export type Timestamp5 = number;
|
|
3506
3261
|
/**
|
|
3507
3262
|
* Discriminator type for a Belief Assertion event.
|
|
3508
3263
|
*/
|
|
3509
|
-
export type
|
|
3264
|
+
export type TopologyClass88 = "belief_mutation";
|
|
3510
3265
|
/**
|
|
3511
3266
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the source event in the Merkle-DAG.
|
|
3512
3267
|
*/
|
|
@@ -3546,32 +3301,32 @@ export type QuorumSignatures = string[];
|
|
|
3546
3301
|
/**
|
|
3547
3302
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3548
3303
|
*/
|
|
3549
|
-
export type
|
|
3304
|
+
export type EventCid6 = string;
|
|
3550
3305
|
/**
|
|
3551
3306
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3552
3307
|
*/
|
|
3553
|
-
export type
|
|
3308
|
+
export type PriorEventHash6 = string | null;
|
|
3554
3309
|
/**
|
|
3555
3310
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3556
3311
|
*/
|
|
3557
|
-
export type
|
|
3312
|
+
export type Timestamp6 = number;
|
|
3558
3313
|
/**
|
|
3559
3314
|
* Discriminator type for a system fault event.
|
|
3560
3315
|
*/
|
|
3561
|
-
export type
|
|
3562
|
-
export type
|
|
3316
|
+
export type TopologyClass89 = "system_fault";
|
|
3317
|
+
export type TopologyClass90 = "atomic_proposition";
|
|
3563
3318
|
/**
|
|
3564
3319
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3565
3320
|
*/
|
|
3566
|
-
export type
|
|
3321
|
+
export type EventCid7 = string;
|
|
3567
3322
|
/**
|
|
3568
3323
|
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
3569
3324
|
*/
|
|
3570
|
-
export type
|
|
3325
|
+
export type PriorEventHash7 = string | null;
|
|
3571
3326
|
/**
|
|
3572
3327
|
* The precise temporal coordinate of the event realization.
|
|
3573
3328
|
*/
|
|
3574
|
-
export type
|
|
3329
|
+
export type Timestamp7 = number;
|
|
3575
3330
|
/**
|
|
3576
3331
|
* A Content Identifier (CID) bounding this specific extracted proposition.
|
|
3577
3332
|
*/
|
|
@@ -3616,19 +3371,19 @@ export type UpperBound = number | null;
|
|
|
3616
3371
|
* Explicit mathematical boundaries extracted from the text that empirically limit the certainty or scope of the proposition.
|
|
3617
3372
|
*/
|
|
3618
3373
|
export type StatisticalQualifiers = EmpiricalStatisticalProfile[];
|
|
3619
|
-
export type
|
|
3374
|
+
export type TopologyClass91 = "post_coordinated_concept";
|
|
3620
3375
|
/**
|
|
3621
3376
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3622
3377
|
*/
|
|
3623
|
-
export type
|
|
3378
|
+
export type EventCid8 = string;
|
|
3624
3379
|
/**
|
|
3625
3380
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
3626
3381
|
*/
|
|
3627
|
-
export type
|
|
3382
|
+
export type PriorEventHash8 = string | null;
|
|
3628
3383
|
/**
|
|
3629
3384
|
* The precise temporal coordinate of the event realization.
|
|
3630
3385
|
*/
|
|
3631
|
-
export type
|
|
3386
|
+
export type Timestamp8 = number;
|
|
3632
3387
|
/**
|
|
3633
3388
|
* The unique geometric coordinate representing this specific assembled concept.
|
|
3634
3389
|
*/
|
|
@@ -3641,10 +3396,10 @@ export type ManifoldAlignmentMetricProfile1 = "gromov_wasserstein" | "earth_move
|
|
|
3641
3396
|
* The exact mathematical fidelity achieved during projection.
|
|
3642
3397
|
*/
|
|
3643
3398
|
export type IsometryScore = number;
|
|
3644
|
-
export type
|
|
3645
|
-
export type
|
|
3646
|
-
export type
|
|
3647
|
-
export type
|
|
3399
|
+
export type EventCid9 = string;
|
|
3400
|
+
export type PriorEventHash9 = string | null;
|
|
3401
|
+
export type Timestamp9 = number;
|
|
3402
|
+
export type TopologyClass92 = "artifact_corruption";
|
|
3648
3403
|
/**
|
|
3649
3404
|
* The genesis artifact that caused the ingestion engine to crash.
|
|
3650
3405
|
*/
|
|
@@ -3654,19 +3409,19 @@ export type DiagnosticHash = string;
|
|
|
3654
3409
|
/**
|
|
3655
3410
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3656
3411
|
*/
|
|
3657
|
-
export type
|
|
3412
|
+
export type EventCid10 = string;
|
|
3658
3413
|
/**
|
|
3659
3414
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3660
3415
|
*/
|
|
3661
|
-
export type
|
|
3416
|
+
export type PriorEventHash10 = string | null;
|
|
3662
3417
|
/**
|
|
3663
3418
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3664
3419
|
*/
|
|
3665
|
-
export type
|
|
3420
|
+
export type Timestamp10 = number;
|
|
3666
3421
|
/**
|
|
3667
3422
|
* Discriminator for a hypothesis generation event.
|
|
3668
3423
|
*/
|
|
3669
|
-
export type
|
|
3424
|
+
export type TopologyClass93 = "hypothesis";
|
|
3670
3425
|
/**
|
|
3671
3426
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this abductive leap to the Merkle-DAG.
|
|
3672
3427
|
*/
|
|
@@ -3708,19 +3463,19 @@ export type CausalEdges1 = CausalDirectedEdgeState[];
|
|
|
3708
3463
|
/**
|
|
3709
3464
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3710
3465
|
*/
|
|
3711
|
-
export type
|
|
3466
|
+
export type EventCid11 = string;
|
|
3712
3467
|
/**
|
|
3713
3468
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3714
3469
|
*/
|
|
3715
|
-
export type
|
|
3470
|
+
export type PriorEventHash11 = string | null;
|
|
3716
3471
|
/**
|
|
3717
3472
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3718
3473
|
*/
|
|
3719
|
-
export type
|
|
3474
|
+
export type Timestamp11 = number;
|
|
3720
3475
|
/**
|
|
3721
3476
|
* Discriminator type for a barge-in interruption event.
|
|
3722
3477
|
*/
|
|
3723
|
-
export type
|
|
3478
|
+
export type TopologyClass94 = "barge_in";
|
|
3724
3479
|
/**
|
|
3725
3480
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the active node generation cycle that was killed in the Merkle-DAG.
|
|
3726
3481
|
*/
|
|
@@ -3738,19 +3493,19 @@ export type EpistemicDisposition = "discard" | "retain_as_context" | "mark_as_fa
|
|
|
3738
3493
|
/**
|
|
3739
3494
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3740
3495
|
*/
|
|
3741
|
-
export type
|
|
3496
|
+
export type EventCid12 = string;
|
|
3742
3497
|
/**
|
|
3743
3498
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3744
3499
|
*/
|
|
3745
|
-
export type
|
|
3500
|
+
export type PriorEventHash12 = string | null;
|
|
3746
3501
|
/**
|
|
3747
3502
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3748
3503
|
*/
|
|
3749
|
-
export type
|
|
3504
|
+
export type Timestamp12 = number;
|
|
3750
3505
|
/**
|
|
3751
3506
|
* Discriminator type for a counterfactual regret event.
|
|
3752
3507
|
*/
|
|
3753
|
-
export type
|
|
3508
|
+
export type TopologyClass95 = "counterfactual_regret";
|
|
3754
3509
|
/**
|
|
3755
3510
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the specific historical state node where the agent mathematically diverged to simulate an alternative path.
|
|
3756
3511
|
*/
|
|
@@ -3774,19 +3529,19 @@ export type EpistemicRegret = number;
|
|
|
3774
3529
|
/**
|
|
3775
3530
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3776
3531
|
*/
|
|
3777
|
-
export type
|
|
3532
|
+
export type EventCid13 = string;
|
|
3778
3533
|
/**
|
|
3779
3534
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3780
3535
|
*/
|
|
3781
|
-
export type
|
|
3536
|
+
export type PriorEventHash13 = string | null;
|
|
3782
3537
|
/**
|
|
3783
3538
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3784
3539
|
*/
|
|
3785
|
-
export type
|
|
3540
|
+
export type Timestamp13 = number;
|
|
3786
3541
|
/**
|
|
3787
3542
|
* Discriminator type for a tool invocation event.
|
|
3788
3543
|
*/
|
|
3789
|
-
export type
|
|
3544
|
+
export type TopologyClass96 = "tool_invocation";
|
|
3790
3545
|
/**
|
|
3791
3546
|
* The exact tool targeted in the CognitiveActionSpaceManifest.
|
|
3792
3547
|
*/
|
|
@@ -3798,19 +3553,19 @@ export type AuthorizedBudgetMagnitude = number;
|
|
|
3798
3553
|
/**
|
|
3799
3554
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3800
3555
|
*/
|
|
3801
|
-
export type
|
|
3556
|
+
export type EventCid14 = string;
|
|
3802
3557
|
/**
|
|
3803
3558
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3804
3559
|
*/
|
|
3805
|
-
export type
|
|
3560
|
+
export type PriorEventHash14 = string | null;
|
|
3806
3561
|
/**
|
|
3807
3562
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3808
3563
|
*/
|
|
3809
|
-
export type
|
|
3564
|
+
export type Timestamp14 = number;
|
|
3810
3565
|
/**
|
|
3811
3566
|
* Discriminator type for an epistemic promotion event.
|
|
3812
3567
|
*/
|
|
3813
|
-
export type
|
|
3568
|
+
export type TopologyClass97 = "epistemic_promotion";
|
|
3814
3569
|
/**
|
|
3815
3570
|
* The strict array of CIDs (Content Identifiers) representing the raw logs being compressed and archived.
|
|
3816
3571
|
*/
|
|
@@ -3826,47 +3581,19 @@ export type CompressionRatio = number;
|
|
|
3826
3581
|
/**
|
|
3827
3582
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3828
3583
|
*/
|
|
3829
|
-
export type
|
|
3830
|
-
/**
|
|
3831
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3832
|
-
*/
|
|
3833
|
-
export type PriorEventHash16 = string | null;
|
|
3834
|
-
/**
|
|
3835
|
-
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3836
|
-
*/
|
|
3837
|
-
export type Timestamp16 = number;
|
|
3838
|
-
/**
|
|
3839
|
-
* Discriminator type for a normative drift event.
|
|
3840
|
-
*/
|
|
3841
|
-
export type TopologyClass100 = "normative_drift";
|
|
3842
|
-
/**
|
|
3843
|
-
* The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
|
|
3844
|
-
*/
|
|
3845
|
-
export type TrippedRuleCid = string;
|
|
3846
|
-
/**
|
|
3847
|
-
* The calculated probabilistic delta showing how far the swarm's observed reality is diverging from the static rule.
|
|
3848
|
-
*/
|
|
3849
|
-
export type MeasuredSemanticDrift = number;
|
|
3850
|
-
/**
|
|
3851
|
-
* A cryptographic pointer to the internal scratchpad trace (ThoughtBranchState) definitively proving the rule is obsolete or causing a loop.
|
|
3852
|
-
*/
|
|
3853
|
-
export type ContradictionProofHash = string;
|
|
3854
|
-
/**
|
|
3855
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3856
|
-
*/
|
|
3857
|
-
export type EventCid17 = string;
|
|
3584
|
+
export type EventCid15 = string;
|
|
3858
3585
|
/**
|
|
3859
3586
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3860
3587
|
*/
|
|
3861
|
-
export type
|
|
3588
|
+
export type PriorEventHash15 = string | null;
|
|
3862
3589
|
/**
|
|
3863
3590
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3864
3591
|
*/
|
|
3865
|
-
export type
|
|
3592
|
+
export type Timestamp15 = number;
|
|
3866
3593
|
/**
|
|
3867
3594
|
* Discriminator type for a persistence commit receipt.
|
|
3868
3595
|
*/
|
|
3869
|
-
export type
|
|
3596
|
+
export type TopologyClass98 = "persistence_commit";
|
|
3870
3597
|
/**
|
|
3871
3598
|
* The external cryptographic receipt generated by Iceberg/Delta.
|
|
3872
3599
|
*/
|
|
@@ -3882,19 +3609,19 @@ export type TargetTableUri = string;
|
|
|
3882
3609
|
/**
|
|
3883
3610
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3884
3611
|
*/
|
|
3885
|
-
export type
|
|
3612
|
+
export type EventCid16 = string;
|
|
3886
3613
|
/**
|
|
3887
3614
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3888
3615
|
*/
|
|
3889
|
-
export type
|
|
3616
|
+
export type PriorEventHash16 = string | null;
|
|
3890
3617
|
/**
|
|
3891
3618
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3892
3619
|
*/
|
|
3893
|
-
export type
|
|
3620
|
+
export type Timestamp16 = number;
|
|
3894
3621
|
/**
|
|
3895
3622
|
* Discriminator type for a token burn receipt.
|
|
3896
3623
|
*/
|
|
3897
|
-
export type
|
|
3624
|
+
export type TopologyClass99 = "token_burn";
|
|
3898
3625
|
/**
|
|
3899
3626
|
* A string linking this burn back to the specific ToolInvocationEvent CID.
|
|
3900
3627
|
*/
|
|
@@ -3914,19 +3641,19 @@ export type BurnMagnitude = number;
|
|
|
3914
3641
|
/**
|
|
3915
3642
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3916
3643
|
*/
|
|
3917
|
-
export type
|
|
3644
|
+
export type EventCid17 = string;
|
|
3918
3645
|
/**
|
|
3919
3646
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3920
3647
|
*/
|
|
3921
|
-
export type
|
|
3648
|
+
export type PriorEventHash17 = string | null;
|
|
3922
3649
|
/**
|
|
3923
3650
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3924
3651
|
*/
|
|
3925
|
-
export type
|
|
3652
|
+
export type Timestamp17 = number;
|
|
3926
3653
|
/**
|
|
3927
3654
|
* Discriminator type for a budget exhaustion event.
|
|
3928
3655
|
*/
|
|
3929
|
-
export type
|
|
3656
|
+
export type TopologyClass100 = "budget_exhaustion";
|
|
3930
3657
|
/**
|
|
3931
3658
|
* A string representing the original escrow boundary breached.
|
|
3932
3659
|
*/
|
|
@@ -3938,19 +3665,19 @@ export type FinalBurnReceiptCid = string;
|
|
|
3938
3665
|
/**
|
|
3939
3666
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3940
3667
|
*/
|
|
3941
|
-
export type
|
|
3668
|
+
export type EventCid18 = string;
|
|
3942
3669
|
/**
|
|
3943
3670
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3944
3671
|
*/
|
|
3945
|
-
export type
|
|
3672
|
+
export type PriorEventHash18 = string | null;
|
|
3946
3673
|
/**
|
|
3947
3674
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3948
3675
|
*/
|
|
3949
|
-
export type
|
|
3676
|
+
export type Timestamp18 = number;
|
|
3950
3677
|
/**
|
|
3951
3678
|
* Discriminator type for telemetry events.
|
|
3952
3679
|
*/
|
|
3953
|
-
export type
|
|
3680
|
+
export type TopologyClass101 = "epistemic_telemetry";
|
|
3954
3681
|
/**
|
|
3955
3682
|
* The exact topological action the human operator performed on the projected manifold.
|
|
3956
3683
|
*/
|
|
@@ -3958,7 +3685,7 @@ export type InteractionModality = "expansion" | "collapse" | "dwell_focus" | "he
|
|
|
3958
3685
|
/**
|
|
3959
3686
|
* The specific TaxonomicNodeState CID that was manipulated.
|
|
3960
3687
|
*/
|
|
3961
|
-
export type
|
|
3688
|
+
export type TargetNodeCid = string;
|
|
3962
3689
|
/**
|
|
3963
3690
|
* The strictly typed temporal bound measuring human attention focus.
|
|
3964
3691
|
*/
|
|
@@ -3966,16 +3693,16 @@ export type DwellDurationMs = number | null;
|
|
|
3966
3693
|
/**
|
|
3967
3694
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3968
3695
|
*/
|
|
3969
|
-
export type
|
|
3696
|
+
export type EventCid19 = string;
|
|
3970
3697
|
/**
|
|
3971
3698
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3972
3699
|
*/
|
|
3973
|
-
export type
|
|
3700
|
+
export type PriorEventHash19 = string | null;
|
|
3974
3701
|
/**
|
|
3975
3702
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3976
3703
|
*/
|
|
3977
|
-
export type
|
|
3978
|
-
export type
|
|
3704
|
+
export type Timestamp19 = number;
|
|
3705
|
+
export type TopologyClass102 = "cognitive_prediction";
|
|
3979
3706
|
export type SourceChainCid = string;
|
|
3980
3707
|
export type TargetSourceConcept = string;
|
|
3981
3708
|
/**
|
|
@@ -3985,16 +3712,16 @@ export type PredictedTopKTokens = [string, ...string[]];
|
|
|
3985
3712
|
/**
|
|
3986
3713
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3987
3714
|
*/
|
|
3988
|
-
export type
|
|
3715
|
+
export type EventCid20 = string;
|
|
3989
3716
|
/**
|
|
3990
3717
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3991
3718
|
*/
|
|
3992
|
-
export type
|
|
3719
|
+
export type PriorEventHash20 = string | null;
|
|
3993
3720
|
/**
|
|
3994
3721
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3995
3722
|
*/
|
|
3996
|
-
export type
|
|
3997
|
-
export type
|
|
3723
|
+
export type Timestamp20 = number;
|
|
3724
|
+
export type TopologyClass103 = "epistemic_axiom_verification";
|
|
3998
3725
|
export type SourcePredictionCid = string;
|
|
3999
3726
|
export type SequenceSimilarityScore = number;
|
|
4000
3727
|
export type FactScorePassed = boolean;
|
|
@@ -4005,57 +3732,16 @@ export type ZeroTrustReceiptCid1 = string | null;
|
|
|
4005
3732
|
/**
|
|
4006
3733
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4007
3734
|
*/
|
|
4008
|
-
export type
|
|
4009
|
-
/**
|
|
4010
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4011
|
-
*/
|
|
4012
|
-
export type PriorEventHash23 = string | null;
|
|
4013
|
-
/**
|
|
4014
|
-
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4015
|
-
*/
|
|
4016
|
-
export type Timestamp23 = number;
|
|
4017
|
-
export type TopologyClass107 = "cognitive_reward_evaluation";
|
|
4018
|
-
/**
|
|
4019
|
-
* The globally unique decentralized identifier (DID) anchoring the LLM's raw generated text trajectory.
|
|
4020
|
-
*/
|
|
4021
|
-
export type SourceGenerationCid = string;
|
|
4022
|
-
/**
|
|
4023
|
-
* The globally unique decentralized identifier (DID) anchoring the origin node.
|
|
4024
|
-
*/
|
|
4025
|
-
export type SourceConceptCid = string;
|
|
4026
|
-
/**
|
|
4027
|
-
* The topological relationship.
|
|
4028
|
-
*/
|
|
4029
|
-
export type DirectedEdgeClass = string;
|
|
4030
|
-
/**
|
|
4031
|
-
* The globally unique decentralized identifier (DID) anchoring destination node.
|
|
4032
|
-
*/
|
|
4033
|
-
export type TargetConceptCid = string;
|
|
4034
|
-
/**
|
|
4035
|
-
* The specific axiomatic claims extracted exclusively from the bounded reasoning block.
|
|
4036
|
-
*/
|
|
4037
|
-
export type ExtractedAxioms = EpistemicAxiomState[];
|
|
4038
|
-
/**
|
|
4039
|
-
* The dense reasoning reward signal derived from the verified axioms.
|
|
4040
|
-
*/
|
|
4041
|
-
export type CalculatedRPath = number;
|
|
4042
|
-
/**
|
|
4043
|
-
* The final computed GRPO advantage signal used to update the policy gradients.
|
|
4044
|
-
*/
|
|
4045
|
-
export type TotalAdvantageScore = number;
|
|
4046
|
-
/**
|
|
4047
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4048
|
-
*/
|
|
4049
|
-
export type EventCid24 = string;
|
|
3735
|
+
export type EventCid21 = string;
|
|
4050
3736
|
/**
|
|
4051
3737
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4052
3738
|
*/
|
|
4053
|
-
export type
|
|
3739
|
+
export type PriorEventHash21 = string | null;
|
|
4054
3740
|
/**
|
|
4055
3741
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4056
3742
|
*/
|
|
4057
|
-
export type
|
|
4058
|
-
export type
|
|
3743
|
+
export type Timestamp21 = number;
|
|
3744
|
+
export type TopologyClass104 = "epistemic_flow_state";
|
|
4059
3745
|
/**
|
|
4060
3746
|
* The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
|
|
4061
3747
|
*/
|
|
@@ -4071,19 +3757,19 @@ export type TerminalRewardFactorized = boolean;
|
|
|
4071
3757
|
/**
|
|
4072
3758
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4073
3759
|
*/
|
|
4074
|
-
export type
|
|
3760
|
+
export type EventCid22 = string;
|
|
4075
3761
|
/**
|
|
4076
3762
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4077
3763
|
*/
|
|
4078
|
-
export type
|
|
3764
|
+
export type PriorEventHash22 = string | null;
|
|
4079
3765
|
/**
|
|
4080
3766
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4081
3767
|
*/
|
|
4082
|
-
export type
|
|
3768
|
+
export type Timestamp22 = number;
|
|
4083
3769
|
/**
|
|
4084
3770
|
* Discriminator type for a causal explanation event.
|
|
4085
3771
|
*/
|
|
4086
|
-
export type
|
|
3772
|
+
export type TopologyClass105 = "causal_explanation";
|
|
4087
3773
|
/**
|
|
4088
3774
|
* The globally unique decentralized identifier (DID) anchoring the collective outcome being explained.
|
|
4089
3775
|
*/
|
|
@@ -4123,19 +3809,19 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
|
|
|
4123
3809
|
/**
|
|
4124
3810
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4125
3811
|
*/
|
|
4126
|
-
export type
|
|
3812
|
+
export type EventCid23 = string;
|
|
4127
3813
|
/**
|
|
4128
3814
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4129
3815
|
*/
|
|
4130
|
-
export type
|
|
3816
|
+
export type PriorEventHash23 = string | null;
|
|
4131
3817
|
/**
|
|
4132
3818
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4133
3819
|
*/
|
|
4134
|
-
export type
|
|
3820
|
+
export type Timestamp23 = number;
|
|
4135
3821
|
/**
|
|
4136
3822
|
* Discriminator type for an intent classification receipt.
|
|
4137
3823
|
*/
|
|
4138
|
-
export type
|
|
3824
|
+
export type TopologyClass106 = "intent_classification";
|
|
4139
3825
|
/**
|
|
4140
3826
|
* The raw, unparsed human natural language instruction.
|
|
4141
3827
|
*/
|
|
@@ -4152,19 +3838,19 @@ export type ConfidenceScore1 = number;
|
|
|
4152
3838
|
* The TaxonomicRoutingPolicy CID that governed this classification.
|
|
4153
3839
|
*/
|
|
4154
3840
|
export type RoutingPolicyCid = string | null;
|
|
4155
|
-
export type
|
|
3841
|
+
export type TopologyClass107 = "semantic_relational_record";
|
|
4156
3842
|
/**
|
|
4157
3843
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4158
3844
|
*/
|
|
4159
|
-
export type
|
|
3845
|
+
export type EventCid24 = string;
|
|
4160
3846
|
/**
|
|
4161
3847
|
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
4162
3848
|
*/
|
|
4163
|
-
export type
|
|
3849
|
+
export type PriorEventHash24 = string | null;
|
|
4164
3850
|
/**
|
|
4165
3851
|
* The precise temporal coordinate of the event realization.
|
|
4166
3852
|
*/
|
|
4167
|
-
export type
|
|
3853
|
+
export type Timestamp24 = number;
|
|
4168
3854
|
/**
|
|
4169
3855
|
* The domain-independent structural classification of the record.
|
|
4170
3856
|
*/
|
|
@@ -4176,19 +3862,19 @@ export type FormalSchemaUrn1 = string | null;
|
|
|
4176
3862
|
/**
|
|
4177
3863
|
* Discriminator for the reification receipt.
|
|
4178
3864
|
*/
|
|
4179
|
-
export type
|
|
3865
|
+
export type TopologyClass108 = "ontological_reification";
|
|
4180
3866
|
/**
|
|
4181
3867
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4182
3868
|
*/
|
|
4183
|
-
export type
|
|
3869
|
+
export type EventCid25 = string;
|
|
4184
3870
|
/**
|
|
4185
3871
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
4186
3872
|
*/
|
|
4187
|
-
export type
|
|
3873
|
+
export type PriorEventHash25 = string | null;
|
|
4188
3874
|
/**
|
|
4189
3875
|
* The precise temporal coordinate of the event realization.
|
|
4190
3876
|
*/
|
|
4191
|
-
export type
|
|
3877
|
+
export type Timestamp25 = number;
|
|
4192
3878
|
/**
|
|
4193
3879
|
* The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
|
|
4194
3880
|
*/
|
|
@@ -4208,19 +3894,19 @@ export type IsLatentInference = boolean;
|
|
|
4208
3894
|
/**
|
|
4209
3895
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4210
3896
|
*/
|
|
4211
|
-
export type
|
|
3897
|
+
export type EventCid26 = string;
|
|
4212
3898
|
/**
|
|
4213
3899
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4214
3900
|
*/
|
|
4215
|
-
export type
|
|
3901
|
+
export type PriorEventHash26 = string | null;
|
|
4216
3902
|
/**
|
|
4217
3903
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4218
3904
|
*/
|
|
4219
|
-
export type
|
|
3905
|
+
export type Timestamp26 = number;
|
|
4220
3906
|
/**
|
|
4221
3907
|
* The type of the resilience payload.
|
|
4222
3908
|
*/
|
|
4223
|
-
export type
|
|
3909
|
+
export type TopologyClass109 = "circuit_breaker_event";
|
|
4224
3910
|
/**
|
|
4225
3911
|
* Signature or summary of the error causing the trip.
|
|
4226
3912
|
*/
|
|
@@ -4228,19 +3914,51 @@ export type ErrorSignature = string;
|
|
|
4228
3914
|
/**
|
|
4229
3915
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4230
3916
|
*/
|
|
4231
|
-
export type
|
|
3917
|
+
export type EventCid27 = string;
|
|
4232
3918
|
/**
|
|
4233
3919
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4234
3920
|
*/
|
|
4235
|
-
export type
|
|
3921
|
+
export type PriorEventHash27 = string | null;
|
|
3922
|
+
/**
|
|
3923
|
+
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3924
|
+
*/
|
|
3925
|
+
export type Timestamp27 = number;
|
|
3926
|
+
/**
|
|
3927
|
+
* Discriminator type for an exogenous event.
|
|
3928
|
+
*/
|
|
3929
|
+
export type TopologyClass110 = "exogenous_event";
|
|
3930
|
+
/**
|
|
3931
|
+
* Cryptographic identifier for the Black Swan event.
|
|
3932
|
+
*/
|
|
3933
|
+
export type ShockCid = string;
|
|
3934
|
+
/**
|
|
3935
|
+
* Regex-bound SHA-256 string targeting a specific Merkle root in the epistemic graph.
|
|
3936
|
+
*/
|
|
3937
|
+
export type TargetNodeHash = string;
|
|
3938
|
+
/**
|
|
3939
|
+
* Strictly bounded mathematical quantification of the epistemic decay or Variational Free Energy.
|
|
3940
|
+
*/
|
|
3941
|
+
export type BayesianSurpriseScore1 = number;
|
|
3942
|
+
/**
|
|
3943
|
+
* The strictly typed boundary requiring locked magnitude to prevent zero-cost griefing of the swarm.
|
|
3944
|
+
*/
|
|
3945
|
+
export type LockedMagnitude = number;
|
|
3946
|
+
/**
|
|
3947
|
+
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3948
|
+
*/
|
|
3949
|
+
export type EventCid28 = string;
|
|
3950
|
+
/**
|
|
3951
|
+
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3952
|
+
*/
|
|
3953
|
+
export type PriorEventHash28 = string | null;
|
|
4236
3954
|
/**
|
|
4237
3955
|
* Discriminator type for a log event.
|
|
4238
3956
|
*/
|
|
4239
|
-
export type
|
|
3957
|
+
export type TopologyClass111 = "epistemic_log";
|
|
4240
3958
|
/**
|
|
4241
3959
|
* The UNIX timestamp of the log event.
|
|
4242
3960
|
*/
|
|
4243
|
-
export type
|
|
3961
|
+
export type Timestamp28 = number;
|
|
4244
3962
|
/**
|
|
4245
3963
|
* The severity level of the log event.
|
|
4246
3964
|
*/
|
|
@@ -4253,19 +3971,19 @@ export type TelemetryScalarState = string | number | boolean | null;
|
|
|
4253
3971
|
/**
|
|
4254
3972
|
* The type of the intervention payload.
|
|
4255
3973
|
*/
|
|
4256
|
-
export type
|
|
3974
|
+
export type TopologyClass112 = "verdict";
|
|
4257
3975
|
/**
|
|
4258
3976
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4259
3977
|
*/
|
|
4260
|
-
export type
|
|
3978
|
+
export type EventCid29 = string;
|
|
4261
3979
|
/**
|
|
4262
3980
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4263
3981
|
*/
|
|
4264
|
-
export type
|
|
3982
|
+
export type PriorEventHash29 = string | null;
|
|
4265
3983
|
/**
|
|
4266
3984
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4267
3985
|
*/
|
|
4268
|
-
export type
|
|
3986
|
+
export type Timestamp29 = number;
|
|
4269
3987
|
/**
|
|
4270
3988
|
* The cryptographic nonce uniquely identifying the intervention request.
|
|
4271
3989
|
*/
|
|
@@ -4301,16 +4019,16 @@ export type LivenessChallengeHash = string;
|
|
|
4301
4019
|
/**
|
|
4302
4020
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4303
4021
|
*/
|
|
4304
|
-
export type
|
|
4022
|
+
export type EventCid30 = string;
|
|
4305
4023
|
/**
|
|
4306
4024
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4307
4025
|
*/
|
|
4308
|
-
export type
|
|
4026
|
+
export type PriorEventHash30 = string | null;
|
|
4309
4027
|
/**
|
|
4310
4028
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4311
4029
|
*/
|
|
4312
|
-
export type
|
|
4313
|
-
export type
|
|
4030
|
+
export type Timestamp30 = number;
|
|
4031
|
+
export type TopologyClass113 = "custody_receipt";
|
|
4314
4032
|
/**
|
|
4315
4033
|
* Unique identifier for this chain-of-custody entry.
|
|
4316
4034
|
*/
|
|
@@ -4338,16 +4056,16 @@ export type RedactionTimestampUnixNano = number;
|
|
|
4338
4056
|
/**
|
|
4339
4057
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4340
4058
|
*/
|
|
4341
|
-
export type
|
|
4059
|
+
export type EventCid31 = string;
|
|
4342
4060
|
/**
|
|
4343
4061
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4344
4062
|
*/
|
|
4345
|
-
export type
|
|
4063
|
+
export type PriorEventHash31 = string | null;
|
|
4346
4064
|
/**
|
|
4347
4065
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4348
4066
|
*/
|
|
4349
|
-
export type
|
|
4350
|
-
export type
|
|
4067
|
+
export type Timestamp31 = number;
|
|
4068
|
+
export type TopologyClass114 = "defeasible_attack";
|
|
4351
4069
|
/**
|
|
4352
4070
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
|
|
4353
4071
|
*/
|
|
@@ -4363,16 +4081,16 @@ export type TargetClaimCid = string;
|
|
|
4363
4081
|
/**
|
|
4364
4082
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4365
4083
|
*/
|
|
4366
|
-
export type
|
|
4084
|
+
export type EventCid32 = string;
|
|
4367
4085
|
/**
|
|
4368
4086
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4369
4087
|
*/
|
|
4370
|
-
export type
|
|
4088
|
+
export type PriorEventHash32 = string | null;
|
|
4371
4089
|
/**
|
|
4372
4090
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4373
4091
|
*/
|
|
4374
|
-
export type
|
|
4375
|
-
export type
|
|
4092
|
+
export type Timestamp32 = number;
|
|
4093
|
+
export type TopologyClass115 = "epistemic_rejection";
|
|
4376
4094
|
export type ReceiptCid1 = string;
|
|
4377
4095
|
export type FailedProjectionCid = string;
|
|
4378
4096
|
export type ViolatedAlgebraicConstraint = string;
|
|
@@ -4381,16 +4099,16 @@ export type StochasticMutationGradient = string;
|
|
|
4381
4099
|
/**
|
|
4382
4100
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4383
4101
|
*/
|
|
4384
|
-
export type
|
|
4102
|
+
export type EventCid33 = string;
|
|
4385
4103
|
/**
|
|
4386
4104
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
4387
4105
|
*/
|
|
4388
|
-
export type
|
|
4106
|
+
export type PriorEventHash33 = string | null;
|
|
4389
4107
|
/**
|
|
4390
4108
|
* The precise temporal coordinate of the event realization.
|
|
4391
4109
|
*/
|
|
4392
|
-
export type
|
|
4393
|
-
export type
|
|
4110
|
+
export type Timestamp33 = number;
|
|
4111
|
+
export type TopologyClass116 = "formal_verification_receipt";
|
|
4394
4112
|
/**
|
|
4395
4113
|
* The definitive Boolean evaluating whether the proof succeeded, the program is satisfiable, or the deduction holds true.
|
|
4396
4114
|
*/
|
|
@@ -4409,43 +4127,43 @@ export type FailingContext = string | null;
|
|
|
4409
4127
|
export type ExtractedBindings = {
|
|
4410
4128
|
[k: string]: JsonPrimitiveState;
|
|
4411
4129
|
}[];
|
|
4412
|
-
export type
|
|
4130
|
+
export type TopologyClass117 = "belief_modulation";
|
|
4413
4131
|
export type ReceiptCid2 = string;
|
|
4414
4132
|
/**
|
|
4415
4133
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4416
4134
|
*/
|
|
4417
|
-
export type
|
|
4135
|
+
export type EventCid34 = string;
|
|
4418
4136
|
/**
|
|
4419
4137
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4420
4138
|
*/
|
|
4421
|
-
export type
|
|
4139
|
+
export type PriorEventHash34 = string | null;
|
|
4422
4140
|
/**
|
|
4423
4141
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4424
4142
|
*/
|
|
4425
|
-
export type
|
|
4143
|
+
export type Timestamp34 = number;
|
|
4426
4144
|
export type TargetGraphCid4 = string;
|
|
4427
4145
|
export type SeveredEdgeCids = string[];
|
|
4428
|
-
export type
|
|
4146
|
+
export type TopologyClass118 = "rdf_export_receipt";
|
|
4429
4147
|
export type ExportCid1 = string;
|
|
4430
4148
|
/**
|
|
4431
4149
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4432
4150
|
*/
|
|
4433
|
-
export type
|
|
4151
|
+
export type EventCid35 = string;
|
|
4434
4152
|
/**
|
|
4435
4153
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4436
4154
|
*/
|
|
4437
|
-
export type
|
|
4155
|
+
export type PriorEventHash35 = string | null;
|
|
4438
4156
|
/**
|
|
4439
4157
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4440
4158
|
*/
|
|
4441
|
-
export type
|
|
4159
|
+
export type Timestamp35 = number;
|
|
4442
4160
|
export type SerializedPayload = string;
|
|
4443
4161
|
export type RdfTripleCount = number;
|
|
4444
4162
|
export type Sha256GraphHash = string;
|
|
4445
|
-
export type
|
|
4446
|
-
export type
|
|
4447
|
-
export type
|
|
4448
|
-
export type
|
|
4163
|
+
export type EventCid36 = string;
|
|
4164
|
+
export type PriorEventHash36 = string | null;
|
|
4165
|
+
export type Timestamp36 = number;
|
|
4166
|
+
export type TopologyClass119 = "epistemic_starvation";
|
|
4449
4167
|
/**
|
|
4450
4168
|
* The cryptographic pointer to the specific edge that failed empirical grounding.
|
|
4451
4169
|
*/
|
|
@@ -4458,10 +4176,10 @@ export type FailedCitations = EvidentiaryCitationState[];
|
|
|
4458
4176
|
* The semantic explanation for the starvation (e.g., 'Maximum search retries exhausted').
|
|
4459
4177
|
*/
|
|
4460
4178
|
export type DiagnosticReason = string;
|
|
4461
|
-
export type
|
|
4462
|
-
export type
|
|
4463
|
-
export type
|
|
4464
|
-
export type
|
|
4179
|
+
export type EventCid37 = string;
|
|
4180
|
+
export type PriorEventHash37 = string | null;
|
|
4181
|
+
export type Timestamp37 = number;
|
|
4182
|
+
export type TopologyClass120 = "sparql_query_result";
|
|
4465
4183
|
/**
|
|
4466
4184
|
* A pointer back to the SPARQLQueryIntent that authorized this execution.
|
|
4467
4185
|
*/
|
|
@@ -4473,7 +4191,7 @@ export type ExecutionTimeMs = number;
|
|
|
4473
4191
|
/**
|
|
4474
4192
|
* Discriminator for the OracleExecutionReceipt topology.
|
|
4475
4193
|
*/
|
|
4476
|
-
export type
|
|
4194
|
+
export type TopologyClass121 = "oracle_execution_receipt";
|
|
4477
4195
|
/**
|
|
4478
4196
|
* The SHA-256 hash of the complete execution payload, providing undeniable cryptographic provenance for the Merkle-DAG audit trail.
|
|
4479
4197
|
*/
|
|
@@ -4490,6 +4208,34 @@ export type TokensBurned = number;
|
|
|
4490
4208
|
* An optional cryptographic signature from a Human-in-the-Loop (HITL) operator attesting to the correctness of the execution result. Populated only when the Temporal workflow escalates to manual review.
|
|
4491
4209
|
*/
|
|
4492
4210
|
export type HumanAttestationSignature = string | null;
|
|
4211
|
+
/**
|
|
4212
|
+
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4213
|
+
*/
|
|
4214
|
+
export type EventCid38 = string;
|
|
4215
|
+
/**
|
|
4216
|
+
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4217
|
+
*/
|
|
4218
|
+
export type PriorEventHash38 = string | null;
|
|
4219
|
+
/**
|
|
4220
|
+
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4221
|
+
*/
|
|
4222
|
+
export type Timestamp38 = number;
|
|
4223
|
+
/**
|
|
4224
|
+
* The type of the security violation payload.
|
|
4225
|
+
*/
|
|
4226
|
+
export type TopologyClass122 = "guardrail_violation_event";
|
|
4227
|
+
/**
|
|
4228
|
+
* Unique identifier for the violation event.
|
|
4229
|
+
*/
|
|
4230
|
+
export type ViolationId = string;
|
|
4231
|
+
/**
|
|
4232
|
+
* The HTTP status code returned by the Guardrails proxy.
|
|
4233
|
+
*/
|
|
4234
|
+
export type StatusCode = number;
|
|
4235
|
+
/**
|
|
4236
|
+
* The classification of the violation (e.g., 'pii_leak', 'toxic_content').
|
|
4237
|
+
*/
|
|
4238
|
+
export type ViolationType = string;
|
|
4493
4239
|
/**
|
|
4494
4240
|
* A discriminated union of workflow topologies.
|
|
4495
4241
|
*/
|
|
@@ -4498,11 +4244,11 @@ export type AnyTransitionEdge = TransitionEdgeProfile | CyclicEdgeProfile;
|
|
|
4498
4244
|
/**
|
|
4499
4245
|
* Discriminator type for an acyclic edge.
|
|
4500
4246
|
*/
|
|
4501
|
-
export type
|
|
4247
|
+
export type TopologyClass123 = "acyclic";
|
|
4502
4248
|
/**
|
|
4503
4249
|
* The coinductive pointer to the destination capability.
|
|
4504
4250
|
*/
|
|
4505
|
-
export type
|
|
4251
|
+
export type TargetNodeCid1 = string | null;
|
|
4506
4252
|
/**
|
|
4507
4253
|
* The RFC 6902 JSON Pointer extracting the Covariant output.
|
|
4508
4254
|
*/
|
|
@@ -4530,11 +4276,11 @@ export type ComputeWeightMagnitude = number;
|
|
|
4530
4276
|
/**
|
|
4531
4277
|
* Discriminator type for a cyclic edge.
|
|
4532
4278
|
*/
|
|
4533
|
-
export type
|
|
4279
|
+
export type TopologyClass124 = "cyclic";
|
|
4534
4280
|
/**
|
|
4535
4281
|
* The coinductive pointer to the destination capability.
|
|
4536
4282
|
*/
|
|
4537
|
-
export type
|
|
4283
|
+
export type TargetNodeCid2 = string | null;
|
|
4538
4284
|
/**
|
|
4539
4285
|
* The algebraic translation matrix mapping the source's Covariant output to the Contravariant input.
|
|
4540
4286
|
*/
|
|
@@ -4616,7 +4362,7 @@ export type EntryPointCid = string;
|
|
|
4616
4362
|
/**
|
|
4617
4363
|
* Unique identifier for this specific separation boundary.
|
|
4618
4364
|
*/
|
|
4619
|
-
export type
|
|
4365
|
+
export type PolicyCid1 = string;
|
|
4620
4366
|
/**
|
|
4621
4367
|
* A topological matrix of tool names or MCP URIs. If an agent mounts one capability in a cluster, all other capabilities in that cluster are mathematically quarantined.
|
|
4622
4368
|
*/
|
|
@@ -4708,24 +4454,6 @@ export type MagnitudeUnit = string;
|
|
|
4708
4454
|
* The declarative array of specialized functional expert clusters (e.g., 'falsifier', 'synthesizer') physically present in this model's architecture.
|
|
4709
4455
|
*/
|
|
4710
4456
|
export type SupportedFunctionalExperts = string[];
|
|
4711
|
-
/**
|
|
4712
|
-
* Unique identifier for the constitutional rule.
|
|
4713
|
-
*/
|
|
4714
|
-
export type RuleCid1 = string;
|
|
4715
|
-
/**
|
|
4716
|
-
* The definitive causal constraint or heuristic boundary enforced by this rule.
|
|
4717
|
-
*/
|
|
4718
|
-
export type Description10 = string;
|
|
4719
|
-
/**
|
|
4720
|
-
* The categorical magnitude of the systemic breach enacted upon rule violation.
|
|
4721
|
-
*/
|
|
4722
|
-
export type Severity = "low" | "medium" | "high" | "critical";
|
|
4723
|
-
/**
|
|
4724
|
-
* The explicit, structurally bounded set of forbidden semantic intents.
|
|
4725
|
-
*
|
|
4726
|
-
* @maxItems 1000
|
|
4727
|
-
*/
|
|
4728
|
-
export type ForbiddenIntents1 = string[];
|
|
4729
4457
|
/**
|
|
4730
4458
|
* Forces non-destructive graph mutations.
|
|
4731
4459
|
*/
|
|
@@ -4824,6 +4552,18 @@ export type DistributionShapeProfile = "gaussian" | "uniform" | "beta";
|
|
|
4824
4552
|
* Directed edges defining the topological sort (chronological flow) of the document.
|
|
4825
4553
|
*/
|
|
4826
4554
|
export type ChronologicalFlowEdges = [unknown, unknown][];
|
|
4555
|
+
/**
|
|
4556
|
+
* The minimal required PRM score improvement across the lookback window to justify continued compute.
|
|
4557
|
+
*/
|
|
4558
|
+
export type ConvergenceDeltaEpsilon = number;
|
|
4559
|
+
/**
|
|
4560
|
+
* The N-step temporal window over which the PRM gradient is calculated.
|
|
4561
|
+
*/
|
|
4562
|
+
export type LookbackWindowSteps = number;
|
|
4563
|
+
/**
|
|
4564
|
+
* The burn-in period before convergence logic is activated.
|
|
4565
|
+
*/
|
|
4566
|
+
export type MinimumReasoningSteps = number;
|
|
4827
4567
|
/**
|
|
4828
4568
|
* A Python 3.14 t-string template definition for dynamic UI grid evaluation.
|
|
4829
4569
|
*/
|
|
@@ -4890,6 +4630,18 @@ export type Justification19 = string;
|
|
|
4890
4630
|
* The foundational premises supporting this claim.
|
|
4891
4631
|
*/
|
|
4892
4632
|
export type Warrants = EvidentiaryWarrantState[];
|
|
4633
|
+
/**
|
|
4634
|
+
* The globally unique decentralized identifier (DID) anchoring the origin node.
|
|
4635
|
+
*/
|
|
4636
|
+
export type SourceConceptCid = string;
|
|
4637
|
+
/**
|
|
4638
|
+
* The topological relationship.
|
|
4639
|
+
*/
|
|
4640
|
+
export type DirectedEdgeClass = string;
|
|
4641
|
+
/**
|
|
4642
|
+
* The globally unique decentralized identifier (DID) anchoring destination node.
|
|
4643
|
+
*/
|
|
4644
|
+
export type TargetConceptCid = string;
|
|
4893
4645
|
export type ChainCid = string;
|
|
4894
4646
|
/**
|
|
4895
4647
|
* @minItems 1
|
|
@@ -4940,7 +4692,19 @@ export type TestTimeMultiplier = number;
|
|
|
4940
4692
|
/**
|
|
4941
4693
|
* The absolute integer limit on how many times the orchestrator can recursively multiply the compute budget before forcing a SystemFaultEvent.
|
|
4942
4694
|
*/
|
|
4943
|
-
export type MaxEscalationTiers = number;
|
|
4695
|
+
export type MaxEscalationTiers = number;
|
|
4696
|
+
/**
|
|
4697
|
+
* The Colang specification version.
|
|
4698
|
+
*/
|
|
4699
|
+
export type ColangVersion = "1.0" | "2.0";
|
|
4700
|
+
/**
|
|
4701
|
+
* The raw Colang (.co) state machine configuration.
|
|
4702
|
+
*/
|
|
4703
|
+
export type ColangPayload = string;
|
|
4704
|
+
/**
|
|
4705
|
+
* The categorical magnitude of the systemic breach enacted upon rule violation.
|
|
4706
|
+
*/
|
|
4707
|
+
export type Severity = "low" | "medium" | "high" | "critical";
|
|
4944
4708
|
/**
|
|
4945
4709
|
* Absolute recursive depth limit for DAG deserialization.
|
|
4946
4710
|
*/
|
|
@@ -5075,6 +4839,18 @@ export type SopCid = string;
|
|
|
5075
4839
|
* The exact topological flow between step_cids.
|
|
5076
4840
|
*/
|
|
5077
4841
|
export type ChronologicalFlowEdges1 = [unknown, unknown][];
|
|
4842
|
+
/**
|
|
4843
|
+
* If a ThoughtBranchState's prm_score falls below this threshold, the orchestrator MUST halt its generation.
|
|
4844
|
+
*/
|
|
4845
|
+
export type PruningThreshold = number;
|
|
4846
|
+
/**
|
|
4847
|
+
* The absolute limit on how many times the agent can start a new branch before throwing a SystemFaultEvent.
|
|
4848
|
+
*/
|
|
4849
|
+
export type MaxBacktracksAllowed = number;
|
|
4850
|
+
/**
|
|
4851
|
+
* The specific PRM model used to score the logic (e.g., 'math-prm-v2').
|
|
4852
|
+
*/
|
|
4853
|
+
export type EvaluatorMatrixName = string | null;
|
|
5078
4854
|
/**
|
|
5079
4855
|
* The strict array of Process Reward Contracts evaluating the logic.
|
|
5080
4856
|
*/
|
|
@@ -5117,7 +4893,6 @@ export type MutableMatrix = {
|
|
|
5117
4893
|
* A flag allowing the output to only return the keys in mutable_matrix that changed, rather than forcing the entire array back up the network.
|
|
5118
4894
|
*/
|
|
5119
4895
|
export type IsDelta = boolean;
|
|
5120
|
-
export type FaultCategoryProfile = "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
|
|
5121
4896
|
/**
|
|
5122
4897
|
* The mathematical dialect and theorem prover used to compile the proof.
|
|
5123
4898
|
*/
|
|
@@ -5178,14 +4953,6 @@ export type CategoricalCohorts = string[];
|
|
|
5178
4953
|
* The valid chronological windows encompassing the artifact.
|
|
5179
4954
|
*/
|
|
5180
4955
|
export type TemporalObservationHorizons = TemporalBoundsProfile2[];
|
|
5181
|
-
/**
|
|
5182
|
-
* Name of the governance policy.
|
|
5183
|
-
*/
|
|
5184
|
-
export type PolicyName = string;
|
|
5185
|
-
/**
|
|
5186
|
-
* The explicit array of constitutional rules included in this policy.
|
|
5187
|
-
*/
|
|
5188
|
-
export type Rules1 = ConstitutionalPolicy[];
|
|
5189
4956
|
/**
|
|
5190
4957
|
* How to flatten SemanticNodeState.
|
|
5191
4958
|
*/
|
|
@@ -5389,7 +5156,6 @@ export type RhetoricalStructureProfile1 = "premise" | "conclusion" | "elaboratio
|
|
|
5389
5156
|
* MCP ROUTING TRIGGERS: Quantitative Risk Assessment, Game Theory, Cybernetic Governance, Structural Circuit Breaker, Utility Theory
|
|
5390
5157
|
*/
|
|
5391
5158
|
export type RiskLevelPolicy = "safe" | "standard" | "critical";
|
|
5392
|
-
export type SanitizationActionIntent = "redact" | "hash" | "drop_event" | "trigger_quarantine";
|
|
5393
5159
|
/**
|
|
5394
5160
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this semantic edge to the Merkle-DAG.
|
|
5395
5161
|
*/
|
|
@@ -5466,7 +5232,7 @@ export type TabularEncodingProfile1 = "feature_wise_attention" | "hyperdimension
|
|
|
5466
5232
|
/**
|
|
5467
5233
|
* Unique identifier for this pre-flight routing policy.
|
|
5468
5234
|
*/
|
|
5469
|
-
export type
|
|
5235
|
+
export type PolicyCid2 = string;
|
|
5470
5236
|
/**
|
|
5471
5237
|
* The deterministic default applied if intent classification falls below the safety threshold.
|
|
5472
5238
|
*/
|
|
@@ -5534,9 +5300,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5534
5300
|
AdjudicationIntent?: AdjudicationIntent;
|
|
5535
5301
|
AdjudicationReceipt?: AdjudicationReceipt;
|
|
5536
5302
|
AdjudicationRubricProfile?: AdjudicationRubricProfile;
|
|
5537
|
-
AdversarialEmulationProfile?: AdversarialEmulationProfile;
|
|
5538
5303
|
AdversarialMarketTopologyManifest?: AdversarialMarketTopologyManifest;
|
|
5539
|
-
AdversarialSimulationProfile?: AdversarialSimulationProfile;
|
|
5540
5304
|
AgentAttestationReceipt?: AgentAttestationReceipt;
|
|
5541
5305
|
AgentBidIntent?: AgentBidIntent;
|
|
5542
5306
|
AlgebraicRefinementContract?: AlgebraicRefinementContract;
|
|
@@ -5577,18 +5341,15 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5577
5341
|
CausalExplanationEvent?: CausalExplanationEvent;
|
|
5578
5342
|
CausalIntervalProfile?: CausalIntervalProfile;
|
|
5579
5343
|
CausalPropagationIntent?: CausalPropagationIntent;
|
|
5580
|
-
ChaosExperimentTask?: ChaosExperimentTask;
|
|
5581
5344
|
CircuitBreakerEvent?: CircuitBreakerEvent;
|
|
5582
5345
|
CognitiveActionSpaceManifest?: CognitiveActionSpaceManifest;
|
|
5583
5346
|
CognitiveAgentNodeProfile?: CognitiveAgentNodeProfile;
|
|
5584
5347
|
CognitiveCritiqueProfile?: CognitiveCritiqueProfile1;
|
|
5585
5348
|
CognitiveDetailedBalanceContract?: CognitiveDetailedBalanceContract;
|
|
5586
5349
|
CognitiveDualVerificationReceipt?: CognitiveDualVerificationReceipt;
|
|
5587
|
-
CognitiveFormatContract?: CognitiveFormatContract1;
|
|
5588
5350
|
CognitiveHumanNodeProfile?: CognitiveHumanNodeProfile;
|
|
5589
5351
|
CognitivePredictionReceipt?: CognitivePredictionReceipt;
|
|
5590
5352
|
CognitiveReasoningTraceState?: CognitiveReasoningTraceState;
|
|
5591
|
-
CognitiveRewardEvaluationReceipt?: CognitiveRewardEvaluationReceipt;
|
|
5592
5353
|
CognitiveRoutingContract?: CognitiveRoutingContract;
|
|
5593
5354
|
CognitiveSamplingPolicy?: CognitiveSamplingPolicy;
|
|
5594
5355
|
CognitiveStateProfile?: CognitiveStateProfile;
|
|
@@ -5604,8 +5365,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5604
5365
|
ConsensusFederationTopologyManifest?: ConsensusFederationTopologyManifest;
|
|
5605
5366
|
ConsensusPolicy?: ConsensusPolicy;
|
|
5606
5367
|
ConstitutionalAmendmentIntent?: ConstitutionalAmendmentIntent;
|
|
5607
|
-
|
|
5608
|
-
ConstrainedDecodingPolicy?: ConstrainedDecodingPolicy1;
|
|
5368
|
+
ConstrainedDecodingPolicy?: ConstrainedDecodingPolicy;
|
|
5609
5369
|
ContextExpansionPolicy?: ContextExpansionPolicy;
|
|
5610
5370
|
ContextualSemanticResolutionIntent?: ContextualSemanticResolutionIntent;
|
|
5611
5371
|
ContextualizedSourceState?: ContextualizedSourceState3;
|
|
@@ -5649,7 +5409,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5649
5409
|
EmpiricalFalsificationContract?: EmpiricalFalsificationContract;
|
|
5650
5410
|
EmpiricalStatisticalProfile?: EmpiricalStatisticalProfile;
|
|
5651
5411
|
EnsembleTopologyProfile?: EnsembleTopologyProfile;
|
|
5652
|
-
EnvironmentalSpoofingProfile?: EnvironmentalSpoofingProfile;
|
|
5653
5412
|
EphemeralNamespacePartitionState?: EphemeralNamespacePartitionState;
|
|
5654
5413
|
EpistemicArgumentClaimState?: EpistemicArgumentClaimState;
|
|
5655
5414
|
EpistemicArgumentGraphState?: EpistemicArgumentGraphState;
|
|
@@ -5664,6 +5423,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5664
5423
|
EpistemicEscalationContract?: EpistemicEscalationContract;
|
|
5665
5424
|
EpistemicFlowStateReceipt?: EpistemicFlowStateReceipt;
|
|
5666
5425
|
EpistemicGroundedTaskManifest?: EpistemicGroundedTaskManifest;
|
|
5426
|
+
EpistemicGuardrailsManifest?: EpistemicGuardrailsManifest;
|
|
5667
5427
|
EpistemicHydrationPolicy?: EpistemicHydrationPolicy;
|
|
5668
5428
|
EpistemicLedgerState?: EpistemicLedgerState;
|
|
5669
5429
|
EpistemicLogEvent?: EpistemicLogEvent;
|
|
@@ -5673,7 +5433,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5673
5433
|
EpistemicProxyState_Any_?: EpistemicProxyStateAny;
|
|
5674
5434
|
EpistemicQuarantineSnapshot?: EpistemicQuarantineSnapshot;
|
|
5675
5435
|
EpistemicRejectionReceipt?: EpistemicRejectionReceipt;
|
|
5676
|
-
EpistemicRewardGradientPolicy?: EpistemicRewardGradientPolicy;
|
|
5677
5436
|
EpistemicRigidityPolicy?: EpistemicRigidityPolicy;
|
|
5678
5437
|
EpistemicSOPManifest?: EpistemicSOPManifest;
|
|
5679
5438
|
EpistemicScanningPolicy?: EpistemicScanningPolicy;
|
|
@@ -5705,8 +5464,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5705
5464
|
FallbackIntent?: FallbackIntent;
|
|
5706
5465
|
FallbackSLA?: FallbackSLA;
|
|
5707
5466
|
FalsificationContract?: FalsificationContract;
|
|
5708
|
-
FaultCategoryProfile?: FaultCategoryProfile;
|
|
5709
|
-
FaultInjectionProfile?: FaultInjectionProfile;
|
|
5710
5467
|
FitnessObjectiveProfile?: FitnessObjectiveProfile;
|
|
5711
5468
|
FormalLogicPremise?: FormalLogicPremise;
|
|
5712
5469
|
FormalVerificationContract?: FormalVerificationContract;
|
|
@@ -5716,10 +5473,10 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5716
5473
|
GlobalGovernancePolicy?: GlobalGovernancePolicy;
|
|
5717
5474
|
GlobalSemanticInvariantProfile?: GlobalSemanticInvariantProfile;
|
|
5718
5475
|
GlobalSemanticProfile?: GlobalSemanticProfile1;
|
|
5719
|
-
GovernancePolicy?: GovernancePolicy;
|
|
5720
5476
|
GradingCriterionProfile?: GradingCriterionProfile;
|
|
5721
5477
|
GrammarPanelProfile?: GrammarPanelProfile1;
|
|
5722
5478
|
GraphFlatteningPolicy?: GraphFlatteningPolicy;
|
|
5479
|
+
GuardrailViolationEvent?: GuardrailViolationEvent;
|
|
5723
5480
|
HTTPTransportProfile?: HTTPTransportProfile;
|
|
5724
5481
|
HardwareEnclaveReceipt?: HardwareEnclaveReceipt;
|
|
5725
5482
|
HierarchicalDOMManifest?: HierarchicalDOMManifest;
|
|
@@ -5744,7 +5501,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5744
5501
|
JsonPrimitiveState?: JsonPrimitiveState;
|
|
5745
5502
|
KinematicDeltaManifest?: KinematicDeltaManifest;
|
|
5746
5503
|
KinematicDerivativeProfile?: KinematicDerivativeProfile;
|
|
5747
|
-
KinematicNoiseProfile?: KinematicNoiseProfile;
|
|
5748
5504
|
KineticBudgetPolicy?: KineticBudgetPolicy;
|
|
5749
5505
|
KineticSeparationPolicy?: KineticSeparationPolicy;
|
|
5750
5506
|
LatentProjectionIntent?: LatentProjectionIntent;
|
|
@@ -5761,7 +5517,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5761
5517
|
MCPResourceManifest?: MCPResourceManifest;
|
|
5762
5518
|
MCPServerManifest?: MCPServerManifest;
|
|
5763
5519
|
MCPToolDefinition?: MCPToolDefinition;
|
|
5764
|
-
MCPTransportProfile?: MCPTransportProfile;
|
|
5765
5520
|
MacroGridProfile?: MacroGridProfile;
|
|
5766
5521
|
ManifestViolationReceipt?: ManifestViolationReceipt;
|
|
5767
5522
|
ManifoldAlignmentMetricProfile?: ManifoldAlignmentMetricProfile2;
|
|
@@ -5780,7 +5535,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5780
5535
|
NeurosymbolicIngestionTopologyManifest?: NeurosymbolicIngestionTopologyManifest;
|
|
5781
5536
|
NeurosymbolicVerificationTopologyManifest?: NeurosymbolicVerificationTopologyManifest;
|
|
5782
5537
|
NodeCIDState?: NodeCIDState;
|
|
5783
|
-
NormativeDriftEvent?: NormativeDriftEvent;
|
|
5784
5538
|
ObservabilityLODPolicy?: ObservabilityLODPolicy;
|
|
5785
5539
|
ObservationEvent?: ObservationEvent;
|
|
5786
5540
|
OntologicalAlignmentPolicy?: OntologicalAlignmentPolicy;
|
|
@@ -5813,7 +5567,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5813
5567
|
RDFExportReceipt?: RDFExportReceipt;
|
|
5814
5568
|
RDFSerializationIntent?: RDFSerializationIntent;
|
|
5815
5569
|
ReasoningEngineeringPolicy?: ReasoningEngineeringPolicy;
|
|
5816
|
-
RedactionPolicy?: RedactionPolicy;
|
|
5817
5570
|
RhetoricalStructureProfile?: RhetoricalStructureProfile1;
|
|
5818
5571
|
RiskLevelPolicy?: RiskLevelPolicy;
|
|
5819
5572
|
RollbackIntent?: RollbackIntent;
|
|
@@ -5827,12 +5580,10 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5827
5580
|
SaeFeatureActivationState?: SaeFeatureActivationState;
|
|
5828
5581
|
SaeLatentPolicy?: SaeLatentPolicy;
|
|
5829
5582
|
SalienceProfile?: SalienceProfile;
|
|
5830
|
-
SanitizationActionIntent?: SanitizationActionIntent;
|
|
5831
5583
|
ScalePolicy?: ScalePolicy;
|
|
5832
5584
|
SchemaDrivenExtractionSLA?: SchemaDrivenExtractionSLA;
|
|
5833
5585
|
SecureSubSessionState?: SecureSubSessionState;
|
|
5834
5586
|
SelfCorrectionPolicy?: SelfCorrectionPolicy;
|
|
5835
|
-
SemanticClassificationProfile?: SemanticClassificationProfile;
|
|
5836
5587
|
SemanticDiscoveryIntent?: SemanticDiscoveryIntent;
|
|
5837
5588
|
SemanticEdgeState?: SemanticEdgeState;
|
|
5838
5589
|
SemanticFirewallPolicy?: SemanticFirewallPolicy;
|
|
@@ -5861,7 +5612,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5861
5612
|
StateMutationIntent?: StateMutationIntent;
|
|
5862
5613
|
StateVectorProfile?: StateVectorProfile1;
|
|
5863
5614
|
StdioTransportProfile?: StdioTransportProfile;
|
|
5864
|
-
SteadyStateHypothesisState?: SteadyStateHypothesisState1;
|
|
5865
5615
|
StochasticNodeState?: StochasticNodeState;
|
|
5866
5616
|
StochasticTopologyManifest?: StochasticTopologyManifest;
|
|
5867
5617
|
StrategicThoughtNodeIntent?: StrategicThoughtNodeIntent;
|
|
@@ -5903,7 +5653,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5903
5653
|
TopologicalFidelityReceipt?: TopologicalFidelityReceipt1;
|
|
5904
5654
|
TopologicalProjectionIntent?: TopologicalProjectionIntent;
|
|
5905
5655
|
TopologicalRetrievalContract?: TopologicalRetrievalContract;
|
|
5906
|
-
TopologicalRewardContract?: TopologicalRewardContract;
|
|
5907
5656
|
TopologyHashReceipt?: TopologyHashReceipt;
|
|
5908
5657
|
TraceContextState?: TraceContextState1;
|
|
5909
5658
|
TransformationMechanismProfile?: TransformationMechanismProfile1;
|
|
@@ -6122,107 +5871,6 @@ export interface GradingCriterionProfile {
|
|
|
6122
5871
|
description: Description;
|
|
6123
5872
|
weight: Weight;
|
|
6124
5873
|
}
|
|
6125
|
-
/**
|
|
6126
|
-
* CoReason Shared Kernel Ontology
|
|
6127
|
-
*
|
|
6128
|
-
* AGENT INSTRUCTION: Aggregates the full Adversarial Emulation geometry, composing
|
|
6129
|
-
* KinematicNoiseProfile (pointer perturbation) and EnvironmentalSpoofingProfile
|
|
6130
|
-
* (browser fingerprint masking) into a unified anti-detection manifold governed by
|
|
6131
|
-
* a generative imitation learning persona. As a ...Profile suffix, this is a
|
|
6132
|
-
* declarative, frozen snapshot of an N-dimensional emulation coordinate.
|
|
6133
|
-
*
|
|
6134
|
-
* CAUSAL AFFORDANCE: Authorizes the orchestrator's Spatial Kinematics engine to
|
|
6135
|
-
* simultaneously inject stochastic pointer noise and spoof environmental telemetry,
|
|
6136
|
-
* achieving a target emulation_fidelity_target score against anti-bot heuristics
|
|
6137
|
-
* while behaviorally mimicking the selected generative_persona.
|
|
6138
|
-
*
|
|
6139
|
-
* EPISTEMIC BOUNDS: The emulation_fidelity_target is strictly clamped to the
|
|
6140
|
-
* normalized probability range (ge=0.0, le=1.0). Both sub-profiles are optional
|
|
6141
|
-
* (default=None), allowing partial emulation geometries. The generative_persona
|
|
6142
|
-
* is locked to a Literal automaton ["hesitant_novice", "fast_expert",
|
|
6143
|
-
* "distracted_browser"].
|
|
6144
|
-
*
|
|
6145
|
-
* MCP ROUTING TRIGGERS: Adversarial Emulation, Anti-Bot Evasion, Imitation
|
|
6146
|
-
* Learning, Browser Fingerprint Spoofing, Emulation Fidelity
|
|
6147
|
-
*/
|
|
6148
|
-
export interface AdversarialEmulationProfile {
|
|
6149
|
-
generative_persona?: GenerativePersona;
|
|
6150
|
-
/**
|
|
6151
|
-
* The stochastic pointer trajectory perturbation profile for human-like motor control emulation.
|
|
6152
|
-
*/
|
|
6153
|
-
kinematic_noise?: KinematicNoiseProfile | null;
|
|
6154
|
-
/**
|
|
6155
|
-
* The browser fingerprint and environmental telemetry spoofing geometry.
|
|
6156
|
-
*/
|
|
6157
|
-
environmental_spoofing?: EnvironmentalSpoofingProfile | null;
|
|
6158
|
-
emulation_fidelity_target: EmulationFidelityTarget;
|
|
6159
|
-
}
|
|
6160
|
-
/**
|
|
6161
|
-
* CoReason Shared Kernel Ontology
|
|
6162
|
-
*
|
|
6163
|
-
* AGENT INSTRUCTION: Implements Stochastic Process Theory (1/f^β spectral noise)
|
|
6164
|
-
* and Hick-Hyman Law cognitive delay modeling to inject human-like motor control
|
|
6165
|
-
* perturbations into pointer trajectories, preventing deterministic bot-detection
|
|
6166
|
-
* via timing analysis. As a ...Profile suffix, this is a declarative, frozen
|
|
6167
|
-
* snapshot of a noise geometry.
|
|
6168
|
-
*
|
|
6169
|
-
* CAUSAL AFFORDANCE: Authorizes the Spatial Kinematics engine to perturb each
|
|
6170
|
-
* SE3TransformProfile along the Bezier trajectory by sampling from the
|
|
6171
|
-
* specified noise distribution, achieving biomechanically plausible jitter with
|
|
6172
|
-
* cognitive delay and corrective submovements.
|
|
6173
|
-
*
|
|
6174
|
-
* EPISTEMIC BOUNDS: The pink_noise_amplitude is strictly clamped to the
|
|
6175
|
-
* normalized range (ge=0.0, le=1.0), preventing trajectory corruption. The
|
|
6176
|
-
* frequency_exponent (1/f^β) is bounded (ge=0.0, le=5.0) to cover the full
|
|
6177
|
-
* spectrum from white noise (β=0) to black noise (β≥2). The noise_class Literal
|
|
6178
|
-
* automaton locks generation to ["pink", "brownian", "gaussian"]. The
|
|
6179
|
-
* velocity_profile is locked to ["minimum_jerk", "constant",
|
|
6180
|
-
* "fractional_brownian"]. target_overshoot_radius_pixels is bounded (ge=0,
|
|
6181
|
-
* le=5000) and hick_hyman_dwell_time_ms is bounded (ge=0, le=18446744073709551615).
|
|
6182
|
-
*
|
|
6183
|
-
* MCP ROUTING TRIGGERS: Stochastic Process, Pink Noise, Brownian Motion,
|
|
6184
|
-
* Motor Control Perturbation, Hick-Hyman Law, Fitts's Law
|
|
6185
|
-
*/
|
|
6186
|
-
export interface KinematicNoiseProfile {
|
|
6187
|
-
noise_class: NoiseClass;
|
|
6188
|
-
velocity_profile?: VelocityProfile;
|
|
6189
|
-
pink_noise_amplitude: PinkNoiseAmplitude;
|
|
6190
|
-
frequency_exponent: FrequencyExponent;
|
|
6191
|
-
target_overshoot_radius_pixels?: TargetOvershootRadiusPixels;
|
|
6192
|
-
hick_hyman_dwell_time_ms?: HickHymanDwellTimeMs;
|
|
6193
|
-
}
|
|
6194
|
-
/**
|
|
6195
|
-
* CoReason Shared Kernel Ontology
|
|
6196
|
-
*
|
|
6197
|
-
* AGENT INSTRUCTION: Defines the deterministic Browser Fingerprint Entropy geometry
|
|
6198
|
-
* for spoofing environmental telemetry vectors (WebGL canvas hashes, User-Agent
|
|
6199
|
-
* strings, timezone offsets, TLS Client Hello fingerprints, and display resolution).
|
|
6200
|
-
* As a ...Profile suffix, this is a declarative, frozen snapshot of a spoofed
|
|
6201
|
-
* environmental coordinate.
|
|
6202
|
-
*
|
|
6203
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator's Spatial Kinematics engine to
|
|
6204
|
-
* project a synthetic browser identity, masking the true computational substrate
|
|
6205
|
-
* from exogenous anti-bot fingerprinting oracles including JA3/JA4 TLS analysis.
|
|
6206
|
-
*
|
|
6207
|
-
* EPISTEMIC BOUNDS: The webgl_entropy_seed_hash is constrained to a 128-char CID
|
|
6208
|
-
* pattern. The user_agent_template is clamped to max_length=2000. The
|
|
6209
|
-
* timezone_offset_minutes is mathematically bounded to the valid UTC range
|
|
6210
|
-
* (ge=-720, le=840). Screen resolution components are bounded (ge=1, le=15360).
|
|
6211
|
-
* The tls_cipher_permutation is locked to a Literal automaton. The
|
|
6212
|
-
* hardware_concurrency_mask is bounded (gt=0, le=256).
|
|
6213
|
-
*
|
|
6214
|
-
* MCP ROUTING TRIGGERS: Browser Fingerprinting, WebGL Canvas Entropy, User-Agent
|
|
6215
|
-
* Spoofing, JA3 TLS Fingerprint, Anti-Fingerprint Evasion
|
|
6216
|
-
*/
|
|
6217
|
-
export interface EnvironmentalSpoofingProfile {
|
|
6218
|
-
tls_cipher_permutation?: TlsCipherPermutation;
|
|
6219
|
-
webgl_entropy_seed_hash: WebglEntropySeedHash;
|
|
6220
|
-
user_agent_template: UserAgentTemplate;
|
|
6221
|
-
hardware_concurrency_mask?: HardwareConcurrencyMask;
|
|
6222
|
-
timezone_offset_minutes: TimezoneOffsetMinutes;
|
|
6223
|
-
screen_resolution_width: ScreenResolutionWidth;
|
|
6224
|
-
screen_resolution_height: ScreenResolutionHeight;
|
|
6225
|
-
}
|
|
6226
5874
|
/**
|
|
6227
5875
|
* CoReason Shared Kernel Ontology
|
|
6228
5876
|
*
|
|
@@ -6252,24 +5900,6 @@ export interface PredictionMarketPolicy {
|
|
|
6252
5900
|
min_liquidity_magnitude: MinLiquidityMagnitude;
|
|
6253
5901
|
convergence_delta_threshold: ConvergenceDeltaThreshold;
|
|
6254
5902
|
}
|
|
6255
|
-
/**
|
|
6256
|
-
* CoReason Shared Kernel Ontology
|
|
6257
|
-
*
|
|
6258
|
-
* AGENT INSTRUCTION: A deterministic red-team configuration injecting Chaos Engineering vectors into a targeted node to map the fragility of the active context boundary. As a ...Profile suffix, this is a declarative snapshot of an attack geometry.
|
|
6259
|
-
*
|
|
6260
|
-
* CAUSAL AFFORDANCE: Authorizes the physical injection of a malicious structural payload (the "Judas Node" vector) to intentionally trip semantic firewalls, data exfiltration blocks, or tool poisoning filters, generating verification assertions.
|
|
6261
|
-
*
|
|
6262
|
-
* EPISTEMIC BOUNDS: The attack surface is rigidly constrained by the Literal automaton attack_vector. The payload is physically bounded by the synthetic_payload limits (max_length=100000), explicitly targeting a specific 128-char CID (target_node_cid).
|
|
6263
|
-
*
|
|
6264
|
-
* MCP ROUTING TRIGGERS: Chaos Engineering, Judas Node, Threat Modeling, Structural Sabotage, Semantic Firewall Validation
|
|
6265
|
-
*/
|
|
6266
|
-
export interface AdversarialSimulationProfile {
|
|
6267
|
-
simulation_cid: SimulationCid;
|
|
6268
|
-
target_node_cid: TargetNodeCid;
|
|
6269
|
-
attack_vector: AttackVector;
|
|
6270
|
-
synthetic_payload: SyntheticPayload;
|
|
6271
|
-
expected_firewall_trip?: ExpectedFirewallTrip;
|
|
6272
|
-
}
|
|
6273
5903
|
/**
|
|
6274
5904
|
* CoReason Shared Kernel Ontology
|
|
6275
5905
|
*
|
|
@@ -8064,99 +7694,11 @@ export interface BoundedJSONRPCIntent {
|
|
|
8064
7694
|
params?: Params1;
|
|
8065
7695
|
id?: Id1;
|
|
8066
7696
|
}
|
|
8067
|
-
/**
|
|
8068
|
-
* CoReason Shared Kernel Ontology
|
|
8069
|
-
*/
|
|
8070
|
-
export interface ChaosExperimentTask {
|
|
8071
|
-
topology_class?: TopologyClass49;
|
|
8072
|
-
experiment_cid: ExperimentCid;
|
|
8073
|
-
hypothesis: SteadyStateHypothesisState;
|
|
8074
|
-
faults: Faults;
|
|
8075
|
-
shocks?: Shocks;
|
|
8076
|
-
}
|
|
8077
|
-
/**
|
|
8078
|
-
* The baseline steady state hypothesis being tested.
|
|
8079
|
-
*/
|
|
8080
|
-
export interface SteadyStateHypothesisState {
|
|
8081
|
-
expected_max_latency: ExpectedMaxLatency;
|
|
8082
|
-
max_loops_allowed: MaxLoopsAllowed;
|
|
8083
|
-
required_tool_usage?: RequiredToolUsage;
|
|
8084
|
-
}
|
|
8085
|
-
/**
|
|
8086
|
-
* CoReason Shared Kernel Ontology
|
|
8087
|
-
*
|
|
8088
|
-
* AGENT INSTRUCTION: Defines a deterministic Byzantine fault vector for Chaos Engineering
|
|
8089
|
-
* perturbation tests. As a ...Profile suffix, this is a declarative, frozen snapshot of an
|
|
8090
|
-
* attack geometry at a specific point in time.
|
|
8091
|
-
*
|
|
8092
|
-
* CAUSAL AFFORDANCE: Instructs the execution engine to physically degrade, throttle, or
|
|
8093
|
-
* corrupt the structural state or network connectivity of the target_node_cid based on the
|
|
8094
|
-
* specific fault_category (FaultCategoryProfile) manifold.
|
|
8095
|
-
*
|
|
8096
|
-
* EPISTEMIC BOUNDS: The severity of the perturbation is constrained above by the intensity
|
|
8097
|
-
* scalar (le=18446744073709551615.0) but unbounded below, permitting negative fault magnitudes. The
|
|
8098
|
-
* blast radius targets either the entire swarm (target_node_cid=None) or a specific node
|
|
8099
|
-
* bounded to a valid 128-char CID regex ^[a-zA-Z0-9_.:-]+$.
|
|
8100
|
-
*
|
|
8101
|
-
* MCP ROUTING TRIGGERS: Chaos Engineering, Byzantine Fault Injection, Perturbation Theory,
|
|
8102
|
-
* Structural Sabotage, Resilience Testing
|
|
8103
|
-
*/
|
|
8104
|
-
export interface FaultInjectionProfile {
|
|
8105
|
-
/**
|
|
8106
|
-
* The specific type of fault to inject.
|
|
8107
|
-
*/
|
|
8108
|
-
fault_category: "pod_kill" | "network_delay" | "cpu_burn" | "time_shift" | "io_fault" | "dns_fault" | "kernel_panic";
|
|
8109
|
-
target_node_cid?: TargetNodeCid1;
|
|
8110
|
-
intensity: Intensity;
|
|
8111
|
-
}
|
|
8112
|
-
/**
|
|
8113
|
-
* CoReason Shared Kernel Ontology
|
|
8114
|
-
*
|
|
8115
|
-
* AGENT INSTRUCTION: Formalizes Nassim Taleb's Black Swan Theory by injecting
|
|
8116
|
-
* Out-of-Distribution (OOD) epistemic shocks into the causal graph. As an ...Event suffix,
|
|
8117
|
-
* this is an append-only coordinate on the Merkle-DAG that the LLM must never hallucinate
|
|
8118
|
-
* a mutation to.
|
|
8119
|
-
*
|
|
8120
|
-
* CAUSAL AFFORDANCE: Forces the active reasoning topology to process a high-entropy
|
|
8121
|
-
* synthetic_payload, actively testing the swarm's non-monotonic truth maintenance,
|
|
8122
|
-
* defeasible reasoning, and overall topological resilience.
|
|
8123
|
-
*
|
|
8124
|
-
* EPISTEMIC BOUNDS: Cryptographically targets a specific Merkle root via target_node_hash
|
|
8125
|
-
* (strict SHA-256 pattern ^[a-f0-9]{64}$) and bounds the Variational Free Energy via
|
|
8126
|
-
* bayesian_surprise_score [ge=0.0, le=1.0, allow_inf_nan=False]. The @model_validator
|
|
8127
|
-
* physically guarantees execution is halted if the attached escrow is not strictly positive.
|
|
8128
|
-
*
|
|
8129
|
-
* MCP ROUTING TRIGGERS: Black Swan Theory, Out-of-Distribution Shock, Variational Free
|
|
8130
|
-
* Energy, Exogenous Perturbation, Epistemic Stress Test
|
|
8131
|
-
*/
|
|
8132
|
-
export interface ExogenousEpistemicEvent {
|
|
8133
|
-
event_cid: EventCid1;
|
|
8134
|
-
prior_event_hash?: PriorEventHash1;
|
|
8135
|
-
timestamp: Timestamp1;
|
|
8136
|
-
topology_class?: TopologyClass50;
|
|
8137
|
-
shock_cid: ShockCid;
|
|
8138
|
-
target_node_hash: TargetNodeHash;
|
|
8139
|
-
bayesian_surprise_score: BayesianSurpriseScore;
|
|
8140
|
-
synthetic_payload: SyntheticPayload1;
|
|
8141
|
-
escrow: SimulationEscrowContract;
|
|
8142
|
-
}
|
|
8143
|
-
/**
|
|
8144
|
-
* Bounded dictionary representing the injected hallucination or observation.
|
|
8145
|
-
*/
|
|
8146
|
-
export interface SyntheticPayload1 {
|
|
8147
|
-
[k: string]: JsonPrimitiveState;
|
|
8148
|
-
}
|
|
8149
|
-
/**
|
|
8150
|
-
* The cryptographic Proof-of-Stake funding the shock.
|
|
8151
|
-
*/
|
|
8152
|
-
export interface SimulationEscrowContract {
|
|
8153
|
-
locked_magnitude: LockedMagnitude;
|
|
8154
|
-
}
|
|
8155
7697
|
/**
|
|
8156
7698
|
* CoReason Shared Kernel Ontology
|
|
8157
7699
|
*/
|
|
8158
7700
|
export interface EpistemicTransmutationTask {
|
|
8159
|
-
topology_class?:
|
|
7701
|
+
topology_class?: TopologyClass49;
|
|
8160
7702
|
task_cid: TaskCid4;
|
|
8161
7703
|
artifact_event_cid: ArtifactEventCid;
|
|
8162
7704
|
target_modalities: TargetModalities;
|
|
@@ -8214,7 +7756,7 @@ export interface OpticalParsingSLA {
|
|
|
8214
7756
|
* CoReason Shared Kernel Ontology
|
|
8215
7757
|
*/
|
|
8216
7758
|
export interface EpistemicUpsamplingTask {
|
|
8217
|
-
topology_class?:
|
|
7759
|
+
topology_class?: TopologyClass50;
|
|
8218
7760
|
source_entity: ContextualizedSourceState2;
|
|
8219
7761
|
target_ontological_granularity: TargetOntologicalGranularity;
|
|
8220
7762
|
upsampling_confidence_threshold: UpsamplingConfidenceThreshold;
|
|
@@ -8232,7 +7774,7 @@ export interface ContextualizedSourceState2 {
|
|
|
8232
7774
|
* CoReason Shared Kernel Ontology
|
|
8233
7775
|
*/
|
|
8234
7776
|
export interface InterventionalCausalTask {
|
|
8235
|
-
topology_class?:
|
|
7777
|
+
topology_class?: TopologyClass51;
|
|
8236
7778
|
task_cid: TaskCid5;
|
|
8237
7779
|
target_hypothesis_cid: TargetHypothesisCid1;
|
|
8238
7780
|
intervention_variable: InterventionVariable;
|
|
@@ -8244,7 +7786,7 @@ export interface InterventionalCausalTask {
|
|
|
8244
7786
|
* CoReason Shared Kernel Ontology
|
|
8245
7787
|
*/
|
|
8246
7788
|
export interface MCPClientIntent {
|
|
8247
|
-
topology_class?:
|
|
7789
|
+
topology_class?: TopologyClass52;
|
|
8248
7790
|
jsonrpc: Jsonrpc2;
|
|
8249
7791
|
method: Method2;
|
|
8250
7792
|
params?: Params2;
|
|
@@ -8255,7 +7797,7 @@ export interface MCPClientIntent {
|
|
|
8255
7797
|
* The mathematically pre-calculated view manifold tailored to the observer's frustum.
|
|
8256
7798
|
*/
|
|
8257
7799
|
export interface DynamicManifoldProjectionManifest {
|
|
8258
|
-
topology_class?:
|
|
7800
|
+
topology_class?: TopologyClass53;
|
|
8259
7801
|
manifest_cid: ManifestCid1;
|
|
8260
7802
|
active_forge_cid: ActiveForgeCid;
|
|
8261
7803
|
ast_gradient_visual_mapping: GrammarPanelProfile;
|
|
@@ -8270,7 +7812,7 @@ export interface DynamicManifoldProjectionManifest {
|
|
|
8270
7812
|
*/
|
|
8271
7813
|
export interface GrammarPanelProfile {
|
|
8272
7814
|
panel_cid: PanelCid;
|
|
8273
|
-
topology_class?:
|
|
7815
|
+
topology_class?: TopologyClass54;
|
|
8274
7816
|
title: Title;
|
|
8275
7817
|
ledger_source_cid: LedgerSourceCid;
|
|
8276
7818
|
/**
|
|
@@ -8336,7 +7878,7 @@ export interface VisualEncodingProfile {
|
|
|
8336
7878
|
* MCP ROUTING TRIGGERS: Grammar of Graphics, Metric Tensor Distortion, Levels of Measurement, Scale Projection, FSM Literal
|
|
8337
7879
|
*/
|
|
8338
7880
|
export interface ScalePolicy {
|
|
8339
|
-
topology_class:
|
|
7881
|
+
topology_class: TopologyClass55;
|
|
8340
7882
|
domain_min?: DomainMin;
|
|
8341
7883
|
domain_max?: DomainMax;
|
|
8342
7884
|
}
|
|
@@ -8368,7 +7910,7 @@ export interface FacetMatrixProfile {
|
|
|
8368
7910
|
*/
|
|
8369
7911
|
export interface GrammarPanelProfile1 {
|
|
8370
7912
|
panel_cid: PanelCid;
|
|
8371
|
-
topology_class?:
|
|
7913
|
+
topology_class?: TopologyClass54;
|
|
8372
7914
|
title: Title;
|
|
8373
7915
|
ledger_source_cid: LedgerSourceCid;
|
|
8374
7916
|
/**
|
|
@@ -8395,7 +7937,7 @@ export interface GrammarPanelProfile1 {
|
|
|
8395
7937
|
*/
|
|
8396
7938
|
export interface InsightCardProfile {
|
|
8397
7939
|
panel_cid: PanelCid1;
|
|
8398
|
-
topology_class?:
|
|
7940
|
+
topology_class?: TopologyClass56;
|
|
8399
7941
|
title: Title1;
|
|
8400
7942
|
markdown_content: MarkdownContent;
|
|
8401
7943
|
/**
|
|
@@ -8415,7 +7957,7 @@ export interface SemanticZoomProfile {
|
|
|
8415
7957
|
* CoReason Shared Kernel Ontology
|
|
8416
7958
|
*/
|
|
8417
7959
|
export interface RollbackIntent {
|
|
8418
|
-
topology_class?:
|
|
7960
|
+
topology_class?: TopologyClass57;
|
|
8419
7961
|
request_cid: RequestCid;
|
|
8420
7962
|
target_event_cid: TargetEventCid;
|
|
8421
7963
|
invalidated_node_cids?: InvalidatedNodeCids;
|
|
@@ -8424,7 +7966,7 @@ export interface RollbackIntent {
|
|
|
8424
7966
|
* CoReason Shared Kernel Ontology
|
|
8425
7967
|
*/
|
|
8426
7968
|
export interface StateMutationIntent {
|
|
8427
|
-
topology_class?:
|
|
7969
|
+
topology_class?: TopologyClass58;
|
|
8428
7970
|
/**
|
|
8429
7971
|
* The strict RFC 6902 JSON Patch operation, acting as a deterministic state vector mutation.
|
|
8430
7972
|
*/
|
|
@@ -8449,7 +7991,7 @@ export interface StateMutationIntent {
|
|
|
8449
7991
|
* MCP ROUTING TRIGGERS: Semantic Crosswalk, ETL Pipeline, Data Normalization, Knowledge Graph Extraction
|
|
8450
7992
|
*/
|
|
8451
7993
|
export interface OntologicalNormalizationIntent {
|
|
8452
|
-
topology_class?:
|
|
7994
|
+
topology_class?: TopologyClass59;
|
|
8453
7995
|
source_artifact_cid: SourceArtifactCid1;
|
|
8454
7996
|
target_ontology_urn: TargetOntologyUrn;
|
|
8455
7997
|
}
|
|
@@ -8482,7 +8024,7 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8482
8024
|
*/
|
|
8483
8025
|
render_material?: SpatialRenderMaterial | null;
|
|
8484
8026
|
description: Description3;
|
|
8485
|
-
topology_class?:
|
|
8027
|
+
topology_class?: TopologyClass60;
|
|
8486
8028
|
hardware?: SpatialHardwareProfile1;
|
|
8487
8029
|
security?: EpistemicSecurityProfile;
|
|
8488
8030
|
/**
|
|
@@ -8531,10 +8073,6 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8531
8073
|
* The mathematical boundary authorizing the agent to spin up Test-Time Compute.
|
|
8532
8074
|
*/
|
|
8533
8075
|
escalation_policy?: EscalationContract | null;
|
|
8534
|
-
/**
|
|
8535
|
-
* The ruleset governing how intermediate thoughts are scored and pruned.
|
|
8536
|
-
*/
|
|
8537
|
-
prm_policy?: ProcessRewardContract | null;
|
|
8538
8076
|
/**
|
|
8539
8077
|
* The formal contract demanding mathematical proof of Expected Information Gain before authorizing tool execution.
|
|
8540
8078
|
*/
|
|
@@ -8559,14 +8097,6 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8559
8097
|
* The declarative contract mathematically binding this agent to a core altruistic objective.
|
|
8560
8098
|
*/
|
|
8561
8099
|
anchoring_policy?: AnchoringPolicy | null;
|
|
8562
|
-
/**
|
|
8563
|
-
* The RL post-training contract forcing the agent to evaluate traces against an implicit graph reward.
|
|
8564
|
-
*/
|
|
8565
|
-
grpo_reward_policy?: EpistemicRewardGradientPolicy | null;
|
|
8566
|
-
/**
|
|
8567
|
-
* The adversarial emulation geometry composing kinematic noise and environmental spoofing for anti-bot trajectory evasion.
|
|
8568
|
-
*/
|
|
8569
|
-
emulation_profile?: AdversarialEmulationProfile | null;
|
|
8570
8100
|
/**
|
|
8571
8101
|
* Authorizes trajectory balance optimization during non-monotonic reasoning.
|
|
8572
8102
|
*/
|
|
@@ -8961,50 +8491,6 @@ export interface EscalationContract {
|
|
|
8961
8491
|
max_latent_tokens_budget: MaxLatentTokensBudget;
|
|
8962
8492
|
max_test_time_compute_ms: MaxTestTimeComputeMs;
|
|
8963
8493
|
}
|
|
8964
|
-
/**
|
|
8965
|
-
* CoReason Shared Kernel Ontology
|
|
8966
|
-
*
|
|
8967
|
-
* AGENT INSTRUCTION: Enforces the Step-Level Verification heuristics for Process Reward Models (PRMs) during non-monotonic reasoning searches and test-time compute.
|
|
8968
|
-
*
|
|
8969
|
-
* CAUSAL AFFORDANCE: Authorizes the orchestrator to physically prune hallucinating ThoughtBranchState vectors from the LatentScratchpadReceipt if their logit probabilities drop below the viable threshold, emulating rigorous Beam Search pruning.
|
|
8970
|
-
*
|
|
8971
|
-
* EPISTEMIC BOUNDS: Strictly bounds the search space geometry via `pruning_threshold` (`ge=0.0, le=1.0`) and mechanically caps State-Space Explosion through `max_backtracks_allowed` (`ge=0, le=18446744073709551615`).
|
|
8972
|
-
*
|
|
8973
|
-
* MCP ROUTING TRIGGERS: Process Reward Model, Beam Search Pruning, Latent Trajectory, State-Space Explosion, A* Search
|
|
8974
|
-
*/
|
|
8975
|
-
export interface ProcessRewardContract {
|
|
8976
|
-
/**
|
|
8977
|
-
* The dynamic circuit breaker that halts the search when PRM variance converges, preventing VRAM waste.
|
|
8978
|
-
*/
|
|
8979
|
-
convergence_sla?: DynamicConvergenceSLA | null;
|
|
8980
|
-
pruning_threshold: PruningThreshold;
|
|
8981
|
-
max_backtracks_allowed: MaxBacktracksAllowed;
|
|
8982
|
-
evaluator_matrix_name?: EvaluatorMatrixName;
|
|
8983
|
-
}
|
|
8984
|
-
/**
|
|
8985
|
-
* CoReason Shared Kernel Ontology
|
|
8986
|
-
*
|
|
8987
|
-
* AGENT INSTRUCTION: Defines the mathematical Optimal Stopping Theory boundaries for Monte
|
|
8988
|
-
* Carlo Tree Search (MCTS) and test-time compute scaling. As an ...SLA suffix, this object
|
|
8989
|
-
* enforces rigid mathematical boundaries that the orchestrator must respect globally.
|
|
8990
|
-
*
|
|
8991
|
-
* CAUSAL AFFORDANCE: Triggers an early termination circuit breaker on reasoning trajectories
|
|
8992
|
-
* when the gradient of the Process Reward Model (PRM) score falls below the epsilon delta,
|
|
8993
|
-
* halting unnecessary probability wave expansion and preserving VRAM.
|
|
8994
|
-
*
|
|
8995
|
-
* EPISTEMIC BOUNDS: Mathematically constrained by convergence_delta_epsilon (ge=0.0, le=1.0)
|
|
8996
|
-
* over a strictly positive lookback_window_steps (gt=0, le=18446744073709551615). Physically mandates
|
|
8997
|
-
* a minimum_reasoning_steps burn-in period (gt=0, le=18446744073709551615) to prevent premature
|
|
8998
|
-
* collapse before the latent space is adequately explored.
|
|
8999
|
-
*
|
|
9000
|
-
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, MCTS, PRM Convergence, Circuit Breaker,
|
|
9001
|
-
* Bellman Equation
|
|
9002
|
-
*/
|
|
9003
|
-
export interface DynamicConvergenceSLA {
|
|
9004
|
-
convergence_delta_epsilon: ConvergenceDeltaEpsilon;
|
|
9005
|
-
lookback_window_steps: LookbackWindowSteps;
|
|
9006
|
-
minimum_reasoning_steps: MinimumReasoningSteps;
|
|
9007
|
-
}
|
|
9008
8494
|
/**
|
|
9009
8495
|
* CoReason Shared Kernel Ontology
|
|
9010
8496
|
*
|
|
@@ -9041,60 +8527,6 @@ export interface MechanisticAuditContract {
|
|
|
9041
8527
|
max_features_per_layer: MaxFeaturesPerLayer;
|
|
9042
8528
|
require_zk_commitments?: RequireZkCommitments;
|
|
9043
8529
|
}
|
|
9044
|
-
/**
|
|
9045
|
-
* CoReason Shared Kernel Ontology
|
|
9046
|
-
*
|
|
9047
|
-
* AGENT INSTRUCTION: Establishes the Group Relative Policy Optimization (GRPO) reward shaping ruleset, mathematically immunizing the swarm against Goodhart's Law and reward hacking.
|
|
9048
|
-
*
|
|
9049
|
-
* CAUSAL AFFORDANCE: Projects a continuous penalty/reward gradient across extracted axiomatic paths, enforcing syntactic compliance through the format contract while simultaneously evaluating semantic/topological validity.
|
|
9050
|
-
*
|
|
9051
|
-
* EPISTEMIC BOUNDS: Prevents reward hacking by scaling the logical validity score (R_path) via the `beta_path_weight` scalar (`ge=0.0, le=1.0`). Gated by a cryptographic `reference_graph_cid` CID.
|
|
9052
|
-
*
|
|
9053
|
-
* MCP ROUTING TRIGGERS: GRPO, Reward Shaping, Goodhart's Law, Policy Gradient, Advantage Estimation
|
|
9054
|
-
*/
|
|
9055
|
-
export interface EpistemicRewardGradientPolicy {
|
|
9056
|
-
policy_cid: PolicyCid;
|
|
9057
|
-
reference_graph_cid: ReferenceGraphCid;
|
|
9058
|
-
format_contract: CognitiveFormatContract;
|
|
9059
|
-
beta_path_weight: BetaPathWeight;
|
|
9060
|
-
/**
|
|
9061
|
-
* The continuous spatial/topological constraints governing path extraction validation.
|
|
9062
|
-
*/
|
|
9063
|
-
topological_scoring?: TopologicalRewardContract | null;
|
|
9064
|
-
}
|
|
9065
|
-
/**
|
|
9066
|
-
* The syntactic constraints the agent must follow to prevent reward zeroing.
|
|
9067
|
-
*/
|
|
9068
|
-
export interface CognitiveFormatContract {
|
|
9069
|
-
require_think_tags?: RequireThinkTags;
|
|
9070
|
-
final_answer_regex?: FinalAnswerRegex;
|
|
9071
|
-
decoding_policy: ConstrainedDecodingPolicy;
|
|
9072
|
-
}
|
|
9073
|
-
/**
|
|
9074
|
-
* The mandatory hardware-level execution limits for token masking.
|
|
9075
|
-
*/
|
|
9076
|
-
export interface ConstrainedDecodingPolicy {
|
|
9077
|
-
enforcement_strategy?: EnforcementStrategy;
|
|
9078
|
-
compiler_backend: CompilerBackend;
|
|
9079
|
-
formal_grammar_string?: FormalGrammarString;
|
|
9080
|
-
terminate_on_eos_leak?: TerminateOnEosLeak;
|
|
9081
|
-
}
|
|
9082
|
-
/**
|
|
9083
|
-
* CoReason Shared Kernel Ontology
|
|
9084
|
-
*
|
|
9085
|
-
* AGENT INSTRUCTION: Enforces Graph Representation Learning (GCN/GAT) constraints to shape the epistemic reward based purely on the topological centrality and spectral connectivity of the extracted axioms.
|
|
9086
|
-
*
|
|
9087
|
-
* CAUSAL AFFORDANCE: Commands the orchestrator to execute deterministic graph traversal algorithms (Random Walk with Restart, Spatial GCN) to compute node reachability and vector similarity before allocating policy gradients.
|
|
9088
|
-
*
|
|
9089
|
-
* EPISTEMIC BOUNDS: Clamps structural relevance geometrically using `min_edge_criticality_score` and `min_semantic_relevance_score` (`ge=0.0, le=1.0`). `aggregation_method` restricts the orchestrator to a strict Literal automaton.
|
|
9090
|
-
*
|
|
9091
|
-
* MCP ROUTING TRIGGERS: Graph Convolutional Networks, Spectral Graph Theory, Random Walk with Restart, Topological Reward Shaping, PageRank
|
|
9092
|
-
*/
|
|
9093
|
-
export interface TopologicalRewardContract {
|
|
9094
|
-
min_edge_criticality_score: MinEdgeCriticalityScore;
|
|
9095
|
-
min_semantic_relevance_score: MinSemanticRelevanceScore;
|
|
9096
|
-
aggregation_method: AggregationMethod;
|
|
9097
|
-
}
|
|
9098
8530
|
/**
|
|
9099
8531
|
* CoReason Shared Kernel Ontology
|
|
9100
8532
|
*
|
|
@@ -9140,7 +8572,7 @@ export interface CognitiveHumanNodeProfile {
|
|
|
9140
8572
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
9141
8573
|
*/
|
|
9142
8574
|
render_material?: SpatialRenderMaterial | null;
|
|
9143
|
-
topology_class?:
|
|
8575
|
+
topology_class?: TopologyClass61;
|
|
9144
8576
|
required_attestation: RequiredAttestation;
|
|
9145
8577
|
/**
|
|
9146
8578
|
* The continuous spatial vector representing the human operator's localized cognitive focus.
|
|
@@ -9188,7 +8620,7 @@ export interface CognitiveSystemNodeProfile {
|
|
|
9188
8620
|
* The mathematical functor blueprint authorizing the runtime to hydrate a specific open-source engine (e.g., SymbolicAI) for this node.
|
|
9189
8621
|
*/
|
|
9190
8622
|
execution_substrate?: ExecutionSubstrateProfile1 | null;
|
|
9191
|
-
topology_class?:
|
|
8623
|
+
topology_class?: TopologyClass62;
|
|
9192
8624
|
}
|
|
9193
8625
|
/**
|
|
9194
8626
|
* CoReason Shared Kernel Ontology
|
|
@@ -9236,7 +8668,7 @@ export interface CompositeNodeProfile {
|
|
|
9236
8668
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
9237
8669
|
*/
|
|
9238
8670
|
render_material?: SpatialRenderMaterial | null;
|
|
9239
|
-
topology_class?:
|
|
8671
|
+
topology_class?: TopologyClass63;
|
|
9240
8672
|
/**
|
|
9241
8673
|
* The encapsulated subgraph to execute.
|
|
9242
8674
|
*/
|
|
@@ -9276,7 +8708,7 @@ export interface DAGTopologyManifest {
|
|
|
9276
8708
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9277
8709
|
*/
|
|
9278
8710
|
observability?: ObservabilityLODPolicy | null;
|
|
9279
|
-
topology_class?:
|
|
8711
|
+
topology_class?: TopologyClass64;
|
|
9280
8712
|
edges?: Edges;
|
|
9281
8713
|
allow_cycles?: AllowCycles;
|
|
9282
8714
|
/**
|
|
@@ -9339,7 +8771,7 @@ export interface StateContract {
|
|
|
9339
8771
|
/**
|
|
9340
8772
|
* The optional hardware-level execution limits for token masking.
|
|
9341
8773
|
*/
|
|
9342
|
-
decoding_policy?:
|
|
8774
|
+
decoding_policy?: ConstrainedDecodingPolicy | null;
|
|
9343
8775
|
}
|
|
9344
8776
|
/**
|
|
9345
8777
|
* A strict JSON Schema dictionary defining the required shape of the shared epistemic blackboard.
|
|
@@ -9358,7 +8790,7 @@ export interface SchemaDefinition {
|
|
|
9358
8790
|
*
|
|
9359
8791
|
* MCP ROUTING TRIGGERS: FSM Logit Masking, Constrained Decoding, Tokenizer Interception, Hardware Execution Boundary, Pushdown Automaton
|
|
9360
8792
|
*/
|
|
9361
|
-
export interface
|
|
8793
|
+
export interface ConstrainedDecodingPolicy {
|
|
9362
8794
|
enforcement_strategy?: EnforcementStrategy;
|
|
9363
8795
|
compiler_backend: CompilerBackend;
|
|
9364
8796
|
formal_grammar_string?: FormalGrammarString;
|
|
@@ -9385,49 +8817,14 @@ export interface ConstrainedDecodingPolicy1 {
|
|
|
9385
8817
|
* Security, Biba Integrity Model, Defense-in-Depth
|
|
9386
8818
|
*/
|
|
9387
8819
|
export interface SemanticFlowPolicy {
|
|
9388
|
-
policy_cid:
|
|
8820
|
+
policy_cid: PolicyCid;
|
|
9389
8821
|
active?: Active1;
|
|
9390
|
-
rules?: Rules;
|
|
9391
8822
|
/**
|
|
9392
8823
|
* The active cognitive defense perimeter against adversarial control-flow overrides.
|
|
9393
8824
|
*/
|
|
9394
8825
|
semantic_firewall?: SemanticFirewallPolicy | null;
|
|
9395
8826
|
latent_firewalls?: LatentFirewalls;
|
|
9396
8827
|
}
|
|
9397
|
-
/**
|
|
9398
|
-
* CoReason Shared Kernel Ontology
|
|
9399
|
-
*
|
|
9400
|
-
* AGENT INSTRUCTION: Defines a deterministic Data Sanitization heuristic mapped to a
|
|
9401
|
-
* specific SemanticClassificationProfile (e.g., Bell-LaPadula clearance levels). As a
|
|
9402
|
-
* ...Policy suffix, this object defines rigid mathematical boundaries that the orchestrator
|
|
9403
|
-
* must enforce globally.
|
|
9404
|
-
*
|
|
9405
|
-
* CAUSAL AFFORDANCE: Executes a rigid regex-bounded search-and-replace algorithm via
|
|
9406
|
-
* target_regex_pattern to mutate or mask toxic data payloads, substituting matches with a
|
|
9407
|
-
* safe replacement_token. The action (SanitizationActionIntent) dictates the exact
|
|
9408
|
-
* sanitization method.
|
|
9409
|
-
*
|
|
9410
|
-
* EPISTEMIC BOUNDS: The target_regex_pattern is strictly capped at max_length=200 to
|
|
9411
|
-
* mathematically prevent ReDoS (Regular Expression Denial of Service) CPU exhaustion. A
|
|
9412
|
-
* secondary target_pattern (max_length=2000) provides a broader semantic entity match. The
|
|
9413
|
-
* optional context_exclusion_zones array (max_length=100) is deterministically sorted by
|
|
9414
|
-
* the @model_validator.
|
|
9415
|
-
*
|
|
9416
|
-
* MCP ROUTING TRIGGERS: Data Sanitization, Regular Expression DoS Prevention,
|
|
9417
|
-
* Bell-LaPadula Model, Masking Heuristic, Algorithmic Redaction
|
|
9418
|
-
*/
|
|
9419
|
-
export interface RedactionPolicy {
|
|
9420
|
-
rule_cid: RuleCid;
|
|
9421
|
-
classification: SemanticClassificationProfile1;
|
|
9422
|
-
target_pattern: TargetPattern;
|
|
9423
|
-
target_regex_pattern: TargetRegexPattern;
|
|
9424
|
-
context_exclusion_zones?: ContextExclusionZones;
|
|
9425
|
-
/**
|
|
9426
|
-
* The required algorithmic response when this pattern is detected.
|
|
9427
|
-
*/
|
|
9428
|
-
action: "redact" | "hash" | "drop_event" | "trigger_quarantine";
|
|
9429
|
-
replacement_token?: ReplacementToken;
|
|
9430
|
-
}
|
|
9431
8828
|
/**
|
|
9432
8829
|
* CoReason Shared Kernel Ontology
|
|
9433
8830
|
*
|
|
@@ -9686,7 +9083,7 @@ export interface CouncilTopologyManifest {
|
|
|
9686
9083
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9687
9084
|
*/
|
|
9688
9085
|
observability?: ObservabilityLODPolicy | null;
|
|
9689
|
-
topology_class?:
|
|
9086
|
+
topology_class?: TopologyClass65;
|
|
9690
9087
|
/**
|
|
9691
9088
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
9692
9089
|
*/
|
|
@@ -9893,7 +9290,7 @@ export interface SwarmTopologyManifest {
|
|
|
9893
9290
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9894
9291
|
*/
|
|
9895
9292
|
observability?: ObservabilityLODPolicy | null;
|
|
9896
|
-
topology_class?:
|
|
9293
|
+
topology_class?: TopologyClass66;
|
|
9897
9294
|
spawning_threshold?: SpawningThreshold;
|
|
9898
9295
|
max_concurrent_agents?: MaxConcurrentAgents;
|
|
9899
9296
|
/**
|
|
@@ -10027,7 +9424,7 @@ export interface EvolutionaryTopologyManifest {
|
|
|
10027
9424
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10028
9425
|
*/
|
|
10029
9426
|
observability?: ObservabilityLODPolicy | null;
|
|
10030
|
-
topology_class?:
|
|
9427
|
+
topology_class?: TopologyClass67;
|
|
10031
9428
|
generations: Generations;
|
|
10032
9429
|
population_size: PopulationSize;
|
|
10033
9430
|
mutation: MutationPolicy;
|
|
@@ -10140,7 +9537,7 @@ export interface SMPCTopologyManifest {
|
|
|
10140
9537
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10141
9538
|
*/
|
|
10142
9539
|
observability?: ObservabilityLODPolicy | null;
|
|
10143
|
-
topology_class?:
|
|
9540
|
+
topology_class?: TopologyClass68;
|
|
10144
9541
|
smpc_protocol: SmpcProtocol;
|
|
10145
9542
|
joint_function_uri: JointFunctionUri;
|
|
10146
9543
|
participant_node_cids: ParticipantNodeCids;
|
|
@@ -10187,7 +9584,7 @@ export interface EvaluatorOptimizerTopologyManifest {
|
|
|
10187
9584
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10188
9585
|
*/
|
|
10189
9586
|
observability?: ObservabilityLODPolicy | null;
|
|
10190
|
-
topology_class?:
|
|
9587
|
+
topology_class?: TopologyClass69;
|
|
10191
9588
|
/**
|
|
10192
9589
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10193
9590
|
*/
|
|
@@ -10237,7 +9634,7 @@ export interface DigitalTwinTopologyManifest {
|
|
|
10237
9634
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10238
9635
|
*/
|
|
10239
9636
|
observability?: ObservabilityLODPolicy | null;
|
|
10240
|
-
topology_class?:
|
|
9637
|
+
topology_class?: TopologyClass70;
|
|
10241
9638
|
target_topology_cid: TargetTopologyCid;
|
|
10242
9639
|
convergence_sla: SimulationConvergenceSLA;
|
|
10243
9640
|
enforce_no_side_effects?: EnforceNoSideEffects;
|
|
@@ -10267,7 +9664,7 @@ export interface SimulationConvergenceSLA {
|
|
|
10267
9664
|
* MCP ROUTING TRIGGERS: Practical Byzantine Fault Tolerance, pBFT, Distributed Consensus, Sybil Resistance, Macro Abstraction
|
|
10268
9665
|
*/
|
|
10269
9666
|
export interface ConsensusFederationTopologyManifest {
|
|
10270
|
-
topology_class?:
|
|
9667
|
+
topology_class?: TopologyClass71;
|
|
10271
9668
|
participant_cids: ParticipantCids;
|
|
10272
9669
|
/**
|
|
10273
9670
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10332,7 +9729,7 @@ export interface CapabilityForgeTopologyManifest {
|
|
|
10332
9729
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10333
9730
|
*/
|
|
10334
9731
|
observability?: ObservabilityLODPolicy | null;
|
|
10335
|
-
topology_class?:
|
|
9732
|
+
topology_class?: TopologyClass72;
|
|
10336
9733
|
target_epistemic_deficit: SemanticDiscoveryIntent1;
|
|
10337
9734
|
/**
|
|
10338
9735
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10486,7 +9883,7 @@ export interface IntentElicitationTopologyManifest {
|
|
|
10486
9883
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10487
9884
|
*/
|
|
10488
9885
|
observability?: ObservabilityLODPolicy | null;
|
|
10489
|
-
topology_class?:
|
|
9886
|
+
topology_class?: TopologyClass73;
|
|
10490
9887
|
raw_human_artifact_cid: RawHumanArtifactCid;
|
|
10491
9888
|
/**
|
|
10492
9889
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10540,7 +9937,7 @@ export interface NeurosymbolicIngestionTopologyManifest {
|
|
|
10540
9937
|
* The dynamic Level of Detail physics bound to this graph.
|
|
10541
9938
|
*/
|
|
10542
9939
|
observability?: ObservabilityLODPolicy | null;
|
|
10543
|
-
topology_class?:
|
|
9940
|
+
topology_class?: TopologyClass74;
|
|
10544
9941
|
/**
|
|
10545
9942
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10546
9943
|
*/
|
|
@@ -10601,7 +9998,7 @@ export interface NeurosymbolicVerificationTopologyManifest {
|
|
|
10601
9998
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10602
9999
|
*/
|
|
10603
10000
|
observability?: ObservabilityLODPolicy | null;
|
|
10604
|
-
topology_class?:
|
|
10001
|
+
topology_class?: TopologyClass75;
|
|
10605
10002
|
proposer_node_cid: ProposerNodeCid;
|
|
10606
10003
|
verifier_node_cid: VerifierNodeCid;
|
|
10607
10004
|
max_revision_loops: MaxRevisionLoops1;
|
|
@@ -10625,7 +10022,7 @@ export interface Nodes11 {
|
|
|
10625
10022
|
* MCP ROUTING TRIGGERS: Discourse Geometry, Rhetorical Flattening, Directed Acyclic Graph, Hierarchical Extraction
|
|
10626
10023
|
*/
|
|
10627
10024
|
export interface DiscourseTreeManifest {
|
|
10628
|
-
topology_class?:
|
|
10025
|
+
topology_class?: TopologyClass76;
|
|
10629
10026
|
manifest_cid: ManifestCid2;
|
|
10630
10027
|
/**
|
|
10631
10028
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10666,7 +10063,7 @@ export interface DiscourseNodeState {
|
|
|
10666
10063
|
* CoReason Shared Kernel Ontology
|
|
10667
10064
|
*/
|
|
10668
10065
|
export interface DocumentKnowledgeGraphManifest {
|
|
10669
|
-
topology_class?:
|
|
10066
|
+
topology_class?: TopologyClass77;
|
|
10670
10067
|
graph_cid: GraphCid;
|
|
10671
10068
|
source_artifact_cid: SourceArtifactCid2;
|
|
10672
10069
|
nodes: Nodes12;
|
|
@@ -10814,7 +10211,7 @@ export interface HomomorphicEncryptionProfile {
|
|
|
10814
10211
|
* MCP ROUTING TRIGGERS: Cross-Modal Isomorphism, Semantic Fusion, Volumetric Projection, Profunctor Optics
|
|
10815
10212
|
*/
|
|
10816
10213
|
export interface ContinuousManifoldMappingContract {
|
|
10817
|
-
topology_class?:
|
|
10214
|
+
topology_class?: TopologyClass78;
|
|
10818
10215
|
/**
|
|
10819
10216
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10820
10217
|
*/
|
|
@@ -10861,7 +10258,7 @@ export interface SE3TransformProfile4 {
|
|
|
10861
10258
|
* MCP ROUTING TRIGGERS: Spatial-Semantic Isomorphism, Document Object Model, Containment DAG, Visual Hierarchy, Rhetorical Bounding
|
|
10862
10259
|
*/
|
|
10863
10260
|
export interface HierarchicalDOMManifest {
|
|
10864
|
-
topology_class?:
|
|
10261
|
+
topology_class?: TopologyClass79;
|
|
10865
10262
|
dom_cid: DomCid;
|
|
10866
10263
|
root_block_cid: RootBlockCid;
|
|
10867
10264
|
blocks: Blocks;
|
|
@@ -11042,7 +10439,7 @@ export interface MemoizedNodeProfile {
|
|
|
11042
10439
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
11043
10440
|
*/
|
|
11044
10441
|
render_material?: SpatialRenderMaterial | null;
|
|
11045
|
-
topology_class?:
|
|
10442
|
+
topology_class?: TopologyClass80;
|
|
11046
10443
|
/**
|
|
11047
10444
|
* The exact SHA-256 fingerprint of the executed topology.
|
|
11048
10445
|
*/
|
|
@@ -11064,7 +10461,7 @@ export interface ExpectedOutputSchema {
|
|
|
11064
10461
|
* MCP ROUTING TRIGGERS: Conflict-Free Replicated Data Types, State-based Semilattice, Eventual Consistency, G-Set
|
|
11065
10462
|
*/
|
|
11066
10463
|
export interface TemporalGraphCRDTManifest {
|
|
11067
|
-
topology_class?:
|
|
10464
|
+
topology_class?: TopologyClass81;
|
|
11068
10465
|
diff_cid: DiffCid;
|
|
11069
10466
|
author_node_cid: AuthorNodeCid;
|
|
11070
10467
|
lamport_timestamp: LamportTimestamp;
|
|
@@ -11084,10 +10481,10 @@ export interface VectorClock {
|
|
|
11084
10481
|
* AGENT INSTRUCTION: A formal Substrate Projection representing an executable Model Context Protocol (MCP) tool.
|
|
11085
10482
|
*/
|
|
11086
10483
|
export interface MCPToolDefinition {
|
|
11087
|
-
topology_class?:
|
|
11088
|
-
event_cid?:
|
|
11089
|
-
prior_event_hash?:
|
|
11090
|
-
timestamp?:
|
|
10484
|
+
topology_class?: TopologyClass82;
|
|
10485
|
+
event_cid?: EventCid1;
|
|
10486
|
+
prior_event_hash?: PriorEventHash1;
|
|
10487
|
+
timestamp?: Timestamp1;
|
|
11091
10488
|
name: Name;
|
|
11092
10489
|
description: Description9;
|
|
11093
10490
|
inputSchema: Inputschema;
|
|
@@ -11110,10 +10507,10 @@ export interface Inputschema {
|
|
|
11110
10507
|
* MCP ROUTING TRIGGERS: Epistemic Provenance, Crosswalk Resolution, Grounding Receipt, Ontology Access Kit, CURIE
|
|
11111
10508
|
*/
|
|
11112
10509
|
export interface CrosswalkResolutionReceipt {
|
|
11113
|
-
event_cid:
|
|
11114
|
-
prior_event_hash?:
|
|
11115
|
-
timestamp:
|
|
11116
|
-
topology_class?:
|
|
10510
|
+
event_cid: EventCid2;
|
|
10511
|
+
prior_event_hash?: PriorEventHash2;
|
|
10512
|
+
timestamp: Timestamp2;
|
|
10513
|
+
topology_class?: TopologyClass83;
|
|
11117
10514
|
receipt_cid: ReceiptCid;
|
|
11118
10515
|
target_graph_cid: TargetGraphCid3;
|
|
11119
10516
|
resolved_curies: ResolvedCuries;
|
|
@@ -11155,10 +10552,10 @@ export interface DempsterShaferBeliefVector1 {
|
|
|
11155
10552
|
* MCP ROUTING TRIGGERS: Cryptographic Ledger, Formal Verification Receipt, Immutable Provenance, Hash Canonicalization, Data Masking
|
|
11156
10553
|
*/
|
|
11157
10554
|
export interface EpistemicZeroTrustReceipt {
|
|
11158
|
-
event_cid:
|
|
11159
|
-
prior_event_hash?:
|
|
11160
|
-
timestamp:
|
|
11161
|
-
topology_class?:
|
|
10555
|
+
event_cid: EventCid3;
|
|
10556
|
+
prior_event_hash?: PriorEventHash3;
|
|
10557
|
+
timestamp: Timestamp3;
|
|
10558
|
+
topology_class?: TopologyClass84;
|
|
11162
10559
|
intent_reference_cid: IntentReferenceCid;
|
|
11163
10560
|
llm_blind_plan_hash: LlmBlindPlanHash;
|
|
11164
10561
|
firewall_breach_detected?: FirewallBreachDetected;
|
|
@@ -11177,10 +10574,10 @@ export interface EpistemicZeroTrustReceipt {
|
|
|
11177
10574
|
* MCP ROUTING TRIGGERS: Bayesian Evidence, Neurosymbolic Binding, Exogenous Truth, Epistemic Grounding, Payload Topological Bounding
|
|
11178
10575
|
*/
|
|
11179
10576
|
export interface ObservationEvent {
|
|
11180
|
-
event_cid:
|
|
11181
|
-
prior_event_hash?:
|
|
11182
|
-
timestamp:
|
|
11183
|
-
topology_class?:
|
|
10577
|
+
event_cid: EventCid4;
|
|
10578
|
+
prior_event_hash?: PriorEventHash4;
|
|
10579
|
+
timestamp: Timestamp4;
|
|
10580
|
+
topology_class?: TopologyClass85;
|
|
11184
10581
|
payload: Payload;
|
|
11185
10582
|
/**
|
|
11186
10583
|
* The specific topological node that appended this observation.
|
|
@@ -11250,7 +10647,7 @@ export interface HardwareEnclaveReceipt {
|
|
|
11250
10647
|
* MCP ROUTING TRIGGERS: Exogenous Perturbation, DOM Topography, Spatial Execution Bound, Accessibility Tree
|
|
11251
10648
|
*/
|
|
11252
10649
|
export interface BrowserDOMState {
|
|
11253
|
-
topology_class?:
|
|
10650
|
+
topology_class?: TopologyClass86;
|
|
11254
10651
|
current_url: CurrentUrl;
|
|
11255
10652
|
viewport_size: ViewportSize;
|
|
11256
10653
|
dom_hash: DomHash;
|
|
@@ -11269,7 +10666,7 @@ export interface BrowserDOMState {
|
|
|
11269
10666
|
* MCP ROUTING TRIGGERS: POSIX Environment, Exogenous Perturbation, TTY Buffer, Causal Actuator, Stream Crystallization
|
|
11270
10667
|
*/
|
|
11271
10668
|
export interface TerminalBufferState {
|
|
11272
|
-
topology_class?:
|
|
10669
|
+
topology_class?: TopologyClass87;
|
|
11273
10670
|
working_directory: WorkingDirectory;
|
|
11274
10671
|
stdout_hash: StdoutHash;
|
|
11275
10672
|
stderr_hash: StderrHash;
|
|
@@ -11288,7 +10685,7 @@ export interface TerminalBufferState {
|
|
|
11288
10685
|
*/
|
|
11289
10686
|
export interface EmbodiedSensoryVectorProfile {
|
|
11290
10687
|
sensory_modality: SensoryModality;
|
|
11291
|
-
bayesian_surprise_score:
|
|
10688
|
+
bayesian_surprise_score: BayesianSurpriseScore;
|
|
11292
10689
|
temporal_duration_ms: TemporalDurationMs;
|
|
11293
10690
|
salience_threshold_breached?: SalienceThresholdBreached;
|
|
11294
10691
|
}
|
|
@@ -11381,10 +10778,10 @@ export interface StreamingDisfluencyContract {
|
|
|
11381
10778
|
* MCP ROUTING TRIGGERS: Bayesian Belief Updating, Causal Tracing, Cognitive Synthesis, Merkle-DAG Coordinate, Non-Monotonic Leap
|
|
11382
10779
|
*/
|
|
11383
10780
|
export interface BeliefMutationEvent {
|
|
11384
|
-
event_cid:
|
|
11385
|
-
prior_event_hash?:
|
|
11386
|
-
timestamp:
|
|
11387
|
-
topology_class?:
|
|
10781
|
+
event_cid: EventCid5;
|
|
10782
|
+
prior_event_hash?: PriorEventHash5;
|
|
10783
|
+
timestamp: Timestamp5;
|
|
10784
|
+
topology_class?: TopologyClass88;
|
|
11388
10785
|
payload: Payload1;
|
|
11389
10786
|
/**
|
|
11390
10787
|
* The specific topological node that synthesized this belief assertion.
|
|
@@ -11496,10 +10893,10 @@ export interface LatentScratchpadReceipt {
|
|
|
11496
10893
|
* MCP ROUTING TRIGGERS: Byzantine Fault Tolerance, Circuit Breaker, Terminal State, Execution Collapse, Fault Isolation
|
|
11497
10894
|
*/
|
|
11498
10895
|
export interface SystemFaultEvent {
|
|
11499
|
-
event_cid:
|
|
11500
|
-
prior_event_hash?:
|
|
11501
|
-
timestamp:
|
|
11502
|
-
topology_class?:
|
|
10896
|
+
event_cid: EventCid6;
|
|
10897
|
+
prior_event_hash?: PriorEventHash6;
|
|
10898
|
+
timestamp: Timestamp6;
|
|
10899
|
+
topology_class?: TopologyClass89;
|
|
11503
10900
|
}
|
|
11504
10901
|
/**
|
|
11505
10902
|
* CoReason Shared Kernel Ontology
|
|
@@ -11513,10 +10910,10 @@ export interface SystemFaultEvent {
|
|
|
11513
10910
|
* MCP ROUTING TRIGGERS: Atomic Proposition, Discourse Extraction, Labeled Property Graph, Verifiable Statement
|
|
11514
10911
|
*/
|
|
11515
10912
|
export interface AtomicPropositionState {
|
|
11516
|
-
topology_class?:
|
|
11517
|
-
event_cid:
|
|
11518
|
-
prior_event_hash?:
|
|
11519
|
-
timestamp:
|
|
10913
|
+
topology_class?: TopologyClass90;
|
|
10914
|
+
event_cid: EventCid7;
|
|
10915
|
+
prior_event_hash?: PriorEventHash7;
|
|
10916
|
+
timestamp: Timestamp7;
|
|
11520
10917
|
proposition_cid: PropositionCid;
|
|
11521
10918
|
rhetorical_role: RhetoricalStructureProfile;
|
|
11522
10919
|
illocutionary_force: IllocutionaryForceProfile;
|
|
@@ -11554,10 +10951,10 @@ export interface EmpiricalStatisticalProfile {
|
|
|
11554
10951
|
* MCP ROUTING TRIGGERS: Post-Coordinated Semantics, Latent Manifold Alignment, Semantic Specificity, Entity Assembly
|
|
11555
10952
|
*/
|
|
11556
10953
|
export interface PostCoordinatedSemanticState {
|
|
11557
|
-
topology_class?:
|
|
11558
|
-
event_cid:
|
|
11559
|
-
prior_event_hash?:
|
|
11560
|
-
timestamp:
|
|
10954
|
+
topology_class?: TopologyClass91;
|
|
10955
|
+
event_cid: EventCid8;
|
|
10956
|
+
prior_event_hash?: PriorEventHash8;
|
|
10957
|
+
timestamp: Timestamp8;
|
|
11561
10958
|
concept_cid: ConceptCid;
|
|
11562
10959
|
/**
|
|
11563
10960
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -11585,10 +10982,10 @@ export interface ContextualModifiers {
|
|
|
11585
10982
|
* MCP ROUTING TRIGGERS: Artifact Contagion Prevention, Terminal Fault, VLM Crash, Malformed Bytes, DRM Lock
|
|
11586
10983
|
*/
|
|
11587
10984
|
export interface ArtifactCorruptionEvent {
|
|
11588
|
-
event_cid:
|
|
11589
|
-
prior_event_hash?:
|
|
11590
|
-
timestamp:
|
|
11591
|
-
topology_class?:
|
|
10985
|
+
event_cid: EventCid9;
|
|
10986
|
+
prior_event_hash?: PriorEventHash9;
|
|
10987
|
+
timestamp: Timestamp9;
|
|
10988
|
+
topology_class?: TopologyClass92;
|
|
11592
10989
|
artifact_cid: ArtifactCid;
|
|
11593
10990
|
corruption_class: CorruptionClass;
|
|
11594
10991
|
diagnostic_hash: DiagnosticHash;
|
|
@@ -11605,10 +11002,10 @@ export interface ArtifactCorruptionEvent {
|
|
|
11605
11002
|
* MCP ROUTING TRIGGERS: Abductive Reasoning, Popperian Falsification, Bayesian Prior, Causal Hypothesis, Epistemic Commitment
|
|
11606
11003
|
*/
|
|
11607
11004
|
export interface HypothesisGenerationEvent {
|
|
11608
|
-
event_cid:
|
|
11609
|
-
prior_event_hash?:
|
|
11610
|
-
timestamp:
|
|
11611
|
-
topology_class?:
|
|
11005
|
+
event_cid: EventCid10;
|
|
11006
|
+
prior_event_hash?: PriorEventHash10;
|
|
11007
|
+
timestamp: Timestamp10;
|
|
11008
|
+
topology_class?: TopologyClass93;
|
|
11612
11009
|
hypothesis_cid: HypothesisCid;
|
|
11613
11010
|
premise_text: PremiseText;
|
|
11614
11011
|
bayesian_prior: BayesianPrior;
|
|
@@ -11647,10 +11044,10 @@ export interface StructuralCausalGraphProfile {
|
|
|
11647
11044
|
* MCP ROUTING TRIGGERS: Asynchronous Interrupt, Generative Severing, Context Switching, Defeasible Disposition, Wave Collapse
|
|
11648
11045
|
*/
|
|
11649
11046
|
export interface BargeInInterruptEvent {
|
|
11650
|
-
event_cid:
|
|
11651
|
-
prior_event_hash?:
|
|
11652
|
-
timestamp:
|
|
11653
|
-
topology_class?:
|
|
11047
|
+
event_cid: EventCid11;
|
|
11048
|
+
prior_event_hash?: PriorEventHash11;
|
|
11049
|
+
timestamp: Timestamp11;
|
|
11050
|
+
topology_class?: TopologyClass94;
|
|
11654
11051
|
target_event_cid: TargetEventCid1;
|
|
11655
11052
|
/**
|
|
11656
11053
|
* The continuous multimodal trigger (e.g., audio spike, user saying 'stop') that justified the interruption.
|
|
@@ -11671,10 +11068,10 @@ export interface BargeInInterruptEvent {
|
|
|
11671
11068
|
* MCP ROUTING TRIGGERS: Counterfactual Regret Minimization, Pearlian Do-Calculus, Opportunity Cost, Alternative Timeline, Policy Gradient Update
|
|
11672
11069
|
*/
|
|
11673
11070
|
export interface CounterfactualRegretEvent {
|
|
11674
|
-
event_cid:
|
|
11675
|
-
prior_event_hash?:
|
|
11676
|
-
timestamp:
|
|
11677
|
-
topology_class?:
|
|
11071
|
+
event_cid: EventCid12;
|
|
11072
|
+
prior_event_hash?: PriorEventHash12;
|
|
11073
|
+
timestamp: Timestamp12;
|
|
11074
|
+
topology_class?: TopologyClass95;
|
|
11678
11075
|
historical_event_cid: HistoricalEventCid;
|
|
11679
11076
|
counterfactual_intervention: CounterfactualIntervention;
|
|
11680
11077
|
expected_utility_actual: ExpectedUtilityActual;
|
|
@@ -11700,10 +11097,10 @@ export interface PolicyMutationGradients {
|
|
|
11700
11097
|
* MCP ROUTING TRIGGERS: Pearlian Do-Operator, Kinetic Commitment, Active Inference, Thermodynamic Escrow, Zero-Trust Actuation
|
|
11701
11098
|
*/
|
|
11702
11099
|
export interface ToolInvocationEvent {
|
|
11703
|
-
event_cid:
|
|
11704
|
-
prior_event_hash?:
|
|
11705
|
-
timestamp:
|
|
11706
|
-
topology_class?:
|
|
11100
|
+
event_cid: EventCid13;
|
|
11101
|
+
prior_event_hash?: PriorEventHash13;
|
|
11102
|
+
timestamp: Timestamp13;
|
|
11103
|
+
topology_class?: TopologyClass96;
|
|
11707
11104
|
tool_name: ToolName1;
|
|
11708
11105
|
parameters: Parameters;
|
|
11709
11106
|
authorized_budget_magnitude: AuthorizedBudgetMagnitude;
|
|
@@ -11766,34 +11163,14 @@ export interface ZeroKnowledgeReceipt1 {
|
|
|
11766
11163
|
* MCP ROUTING TRIGGERS: Hippocampal Consolidation, Knowledge Distillation, Semantic Memory, Shannon Entropy Compression, Epistemic Promotion
|
|
11767
11164
|
*/
|
|
11768
11165
|
export interface EpistemicPromotionEvent {
|
|
11769
|
-
event_cid:
|
|
11770
|
-
prior_event_hash?:
|
|
11771
|
-
timestamp:
|
|
11772
|
-
topology_class?:
|
|
11166
|
+
event_cid: EventCid14;
|
|
11167
|
+
prior_event_hash?: PriorEventHash14;
|
|
11168
|
+
timestamp: Timestamp14;
|
|
11169
|
+
topology_class?: TopologyClass97;
|
|
11773
11170
|
source_episodic_event_cids: SourceEpisodicEventCids;
|
|
11774
11171
|
crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
|
|
11775
11172
|
compression_ratio: CompressionRatio;
|
|
11776
11173
|
}
|
|
11777
|
-
/**
|
|
11778
|
-
* CoReason Shared Kernel Ontology
|
|
11779
|
-
*
|
|
11780
|
-
* AGENT INSTRUCTION: A cryptographically frozen historical fact tracking the Kullback-Leibler (KL) divergence between the swarm's active behavioral manifold and its foundational ConstitutionalPolicy.
|
|
11781
|
-
*
|
|
11782
|
-
* CAUSAL AFFORDANCE: Emits a deterministic topological signal that the causal graph is experiencing logical friction against the `tripped_rule_cid`, unlocking the injection of a System2RemediationIntent constraint.
|
|
11783
|
-
*
|
|
11784
|
-
* EPISTEMIC BOUNDS: Mathematically bounded by `measured_semantic_drift` (`le=18446744073709551615.0`) and cryptographically tied to `contradiction_proof_hash` (SHA-256 pattern `^[a-f0-9]{64}$`) proving the anomaly.
|
|
11785
|
-
*
|
|
11786
|
-
* MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
|
|
11787
|
-
*/
|
|
11788
|
-
export interface NormativeDriftEvent {
|
|
11789
|
-
event_cid: EventCid16;
|
|
11790
|
-
prior_event_hash?: PriorEventHash16;
|
|
11791
|
-
timestamp: Timestamp16;
|
|
11792
|
-
topology_class?: TopologyClass100;
|
|
11793
|
-
tripped_rule_cid: TrippedRuleCid;
|
|
11794
|
-
measured_semantic_drift: MeasuredSemanticDrift;
|
|
11795
|
-
contradiction_proof_hash: ContradictionProofHash;
|
|
11796
|
-
}
|
|
11797
11174
|
/**
|
|
11798
11175
|
* CoReason Shared Kernel Ontology
|
|
11799
11176
|
*
|
|
@@ -11806,10 +11183,10 @@ export interface NormativeDriftEvent {
|
|
|
11806
11183
|
* MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
|
|
11807
11184
|
*/
|
|
11808
11185
|
export interface PersistenceCommitReceipt {
|
|
11809
|
-
event_cid:
|
|
11810
|
-
prior_event_hash?:
|
|
11811
|
-
timestamp:
|
|
11812
|
-
topology_class?:
|
|
11186
|
+
event_cid: EventCid15;
|
|
11187
|
+
prior_event_hash?: PriorEventHash15;
|
|
11188
|
+
timestamp: Timestamp15;
|
|
11189
|
+
topology_class?: TopologyClass98;
|
|
11813
11190
|
lakehouse_snapshot_cid: LakehouseSnapshotCid;
|
|
11814
11191
|
committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
|
|
11815
11192
|
target_table_uri: TargetTableUri;
|
|
@@ -11826,10 +11203,10 @@ export interface PersistenceCommitReceipt {
|
|
|
11826
11203
|
* MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
|
|
11827
11204
|
*/
|
|
11828
11205
|
export interface TokenBurnReceipt {
|
|
11829
|
-
event_cid:
|
|
11830
|
-
prior_event_hash?:
|
|
11831
|
-
timestamp:
|
|
11832
|
-
topology_class?:
|
|
11206
|
+
event_cid: EventCid16;
|
|
11207
|
+
prior_event_hash?: PriorEventHash16;
|
|
11208
|
+
timestamp: Timestamp16;
|
|
11209
|
+
topology_class?: TopologyClass99;
|
|
11833
11210
|
tool_invocation_cid: ToolInvocationCid;
|
|
11834
11211
|
input_tokens: InputTokens;
|
|
11835
11212
|
output_tokens: OutputTokens;
|
|
@@ -11847,10 +11224,10 @@ export interface TokenBurnReceipt {
|
|
|
11847
11224
|
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
|
|
11848
11225
|
*/
|
|
11849
11226
|
export interface BudgetExhaustionEvent {
|
|
11850
|
-
event_cid:
|
|
11851
|
-
prior_event_hash?:
|
|
11852
|
-
timestamp:
|
|
11853
|
-
topology_class?:
|
|
11227
|
+
event_cid: EventCid17;
|
|
11228
|
+
prior_event_hash?: PriorEventHash17;
|
|
11229
|
+
timestamp: Timestamp17;
|
|
11230
|
+
topology_class?: TopologyClass100;
|
|
11854
11231
|
exhausted_escrow_cid: ExhaustedEscrowCid;
|
|
11855
11232
|
final_burn_receipt_cid: FinalBurnReceiptCid;
|
|
11856
11233
|
}
|
|
@@ -11866,12 +11243,12 @@ export interface BudgetExhaustionEvent {
|
|
|
11866
11243
|
* MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
|
|
11867
11244
|
*/
|
|
11868
11245
|
export interface EpistemicTelemetryEvent {
|
|
11869
|
-
event_cid:
|
|
11870
|
-
prior_event_hash?:
|
|
11871
|
-
timestamp:
|
|
11872
|
-
topology_class?:
|
|
11246
|
+
event_cid: EventCid18;
|
|
11247
|
+
prior_event_hash?: PriorEventHash18;
|
|
11248
|
+
timestamp: Timestamp18;
|
|
11249
|
+
topology_class?: TopologyClass101;
|
|
11873
11250
|
interaction_modality: InteractionModality;
|
|
11874
|
-
target_node_cid:
|
|
11251
|
+
target_node_cid: TargetNodeCid;
|
|
11875
11252
|
dwell_duration_ms?: DwellDurationMs;
|
|
11876
11253
|
/**
|
|
11877
11254
|
* Optional 3D trajectory of the human pointer event mapped to the spatial grid.
|
|
@@ -11890,10 +11267,10 @@ export interface EpistemicTelemetryEvent {
|
|
|
11890
11267
|
* MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
|
|
11891
11268
|
*/
|
|
11892
11269
|
export interface CognitivePredictionReceipt {
|
|
11893
|
-
event_cid:
|
|
11894
|
-
prior_event_hash?:
|
|
11895
|
-
timestamp:
|
|
11896
|
-
topology_class?:
|
|
11270
|
+
event_cid: EventCid19;
|
|
11271
|
+
prior_event_hash?: PriorEventHash19;
|
|
11272
|
+
timestamp: Timestamp19;
|
|
11273
|
+
topology_class?: TopologyClass102;
|
|
11897
11274
|
source_chain_cid: SourceChainCid;
|
|
11898
11275
|
target_source_concept: TargetSourceConcept;
|
|
11899
11276
|
predicted_top_k_tokens: PredictedTopKTokens;
|
|
@@ -11910,10 +11287,10 @@ export interface CognitivePredictionReceipt {
|
|
|
11910
11287
|
* MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
|
|
11911
11288
|
*/
|
|
11912
11289
|
export interface EpistemicAxiomVerificationReceipt {
|
|
11913
|
-
event_cid:
|
|
11914
|
-
prior_event_hash?:
|
|
11915
|
-
timestamp:
|
|
11916
|
-
topology_class?:
|
|
11290
|
+
event_cid: EventCid20;
|
|
11291
|
+
prior_event_hash?: PriorEventHash20;
|
|
11292
|
+
timestamp: Timestamp20;
|
|
11293
|
+
topology_class?: TopologyClass103;
|
|
11917
11294
|
source_prediction_cid: SourcePredictionCid;
|
|
11918
11295
|
sequence_similarity_score: SequenceSimilarityScore;
|
|
11919
11296
|
fact_score_passed: FactScorePassed;
|
|
@@ -11923,52 +11300,6 @@ export interface EpistemicAxiomVerificationReceipt {
|
|
|
11923
11300
|
*/
|
|
11924
11301
|
formal_backing_receipt_cid?: NodeCIDState | null;
|
|
11925
11302
|
}
|
|
11926
|
-
/**
|
|
11927
|
-
* CoReason Shared Kernel Ontology
|
|
11928
|
-
*
|
|
11929
|
-
* AGENT INSTRUCTION: The immutable cryptographic receipt of a GRPO Advantage Actor-Critic
|
|
11930
|
-
* evaluation step, permanently logging the mathematically verified advantage score of a
|
|
11931
|
-
* specific generation trajectory. As a ...Receipt suffix, this is an append-only coordinate
|
|
11932
|
-
* on the Merkle-DAG that the LLM must never hallucinate a mutation to.
|
|
11933
|
-
*
|
|
11934
|
-
* CAUSAL AFFORDANCE: Unlocks policy gradient updates by providing the deterministic advantage
|
|
11935
|
-
* signal derived from the extracted_axioms of the source_generation_cid.
|
|
11936
|
-
*
|
|
11937
|
-
* EPISTEMIC BOUNDS: The calculated_r_path is strictly clamped between [ge=0.0, le=1.0], and
|
|
11938
|
-
* the total_advantage_score is capped at le=100.0. The @model_validator physically guarantees
|
|
11939
|
-
* that the extracted_axioms array is deterministically sorted by the composite key
|
|
11940
|
-
* (source_concept_cid, directed_edge_class, target_concept_cid) to preserve RFC 8785 canonical
|
|
11941
|
-
* hashing across the distributed swarm.
|
|
11942
|
-
*
|
|
11943
|
-
* MCP ROUTING TRIGGERS: Advantage Actor-Critic, Policy Gradient Update, Epistemic Reward,
|
|
11944
|
-
* Baseline Normalization, Reinforcement Learning
|
|
11945
|
-
*/
|
|
11946
|
-
export interface CognitiveRewardEvaluationReceipt {
|
|
11947
|
-
event_cid: EventCid23;
|
|
11948
|
-
prior_event_hash?: PriorEventHash23;
|
|
11949
|
-
timestamp: Timestamp23;
|
|
11950
|
-
topology_class?: TopologyClass107;
|
|
11951
|
-
source_generation_cid: SourceGenerationCid;
|
|
11952
|
-
extracted_axioms?: ExtractedAxioms;
|
|
11953
|
-
calculated_r_path: CalculatedRPath;
|
|
11954
|
-
total_advantage_score: TotalAdvantageScore;
|
|
11955
|
-
}
|
|
11956
|
-
/**
|
|
11957
|
-
* CoReason Shared Kernel Ontology
|
|
11958
|
-
*
|
|
11959
|
-
* AGENT INSTRUCTION: Implements First-Order Logic and Resource Description Framework (RDF) triples to mathematically formalize knowledge. As a ...State suffix, this is a declarative, frozen snapshot of a specific causal connection.
|
|
11960
|
-
*
|
|
11961
|
-
* CAUSAL AFFORDANCE: Distills high-entropy natural language token streams into rigid, hashable causal edges (Subject, Predicate, Object), unlocking deterministic querying and Truth Maintenance System (TMS) traversals.
|
|
11962
|
-
*
|
|
11963
|
-
* EPISTEMIC BOUNDS: Source and target concept physical boundaries are strictly locked to 128-char CIDs matching the regex `^[a-zA-Z0-9_.:-]+$`. The `directed_edge_class` is clamped to a `max_length=2000` to prevent dictionary bombing during semantic evaluation.
|
|
11964
|
-
*
|
|
11965
|
-
* MCP ROUTING TRIGGERS: First-Order Logic, RDF Triple, Semantic Distillation, Causal Edge, Directed Graph
|
|
11966
|
-
*/
|
|
11967
|
-
export interface EpistemicAxiomState {
|
|
11968
|
-
source_concept_cid: SourceConceptCid;
|
|
11969
|
-
directed_edge_class: DirectedEdgeClass;
|
|
11970
|
-
target_concept_cid: TargetConceptCid;
|
|
11971
|
-
}
|
|
11972
11303
|
/**
|
|
11973
11304
|
* CoReason Shared Kernel Ontology
|
|
11974
11305
|
*
|
|
@@ -11990,10 +11321,10 @@ export interface EpistemicAxiomState {
|
|
|
11990
11321
|
* Scalar Backpropagation, Acyclic Path
|
|
11991
11322
|
*/
|
|
11992
11323
|
export interface EpistemicFlowStateReceipt {
|
|
11993
|
-
event_cid:
|
|
11994
|
-
prior_event_hash?:
|
|
11995
|
-
timestamp:
|
|
11996
|
-
topology_class?:
|
|
11324
|
+
event_cid: EventCid21;
|
|
11325
|
+
prior_event_hash?: PriorEventHash21;
|
|
11326
|
+
timestamp: Timestamp21;
|
|
11327
|
+
topology_class?: TopologyClass104;
|
|
11997
11328
|
source_trajectory_cid: SourceTrajectoryCid;
|
|
11998
11329
|
estimated_flow_value: EstimatedFlowValue;
|
|
11999
11330
|
terminal_reward_factorized: TerminalRewardFactorized;
|
|
@@ -12019,10 +11350,10 @@ export interface EpistemicFlowStateReceipt {
|
|
|
12019
11350
|
* Macroscopic Explanation, Deterministic Sorting
|
|
12020
11351
|
*/
|
|
12021
11352
|
export interface CausalExplanationEvent {
|
|
12022
|
-
event_cid:
|
|
12023
|
-
prior_event_hash?:
|
|
12024
|
-
timestamp:
|
|
12025
|
-
topology_class?:
|
|
11353
|
+
event_cid: EventCid22;
|
|
11354
|
+
prior_event_hash?: PriorEventHash22;
|
|
11355
|
+
timestamp: Timestamp22;
|
|
11356
|
+
topology_class?: TopologyClass105;
|
|
12026
11357
|
target_outcome_event_cid: TargetOutcomeEventCid;
|
|
12027
11358
|
collective_intelligence: CollectiveIntelligenceProfile;
|
|
12028
11359
|
agent_attributions: AgentAttributions;
|
|
@@ -12083,10 +11414,10 @@ export interface ShapleyAttributionReceipt {
|
|
|
12083
11414
|
* Routing Heuristic, Semantic Wave Collapse
|
|
12084
11415
|
*/
|
|
12085
11416
|
export interface IntentClassificationReceipt {
|
|
12086
|
-
event_cid:
|
|
12087
|
-
prior_event_hash?:
|
|
12088
|
-
timestamp:
|
|
12089
|
-
topology_class?:
|
|
11417
|
+
event_cid: EventCid23;
|
|
11418
|
+
prior_event_hash?: PriorEventHash23;
|
|
11419
|
+
timestamp: Timestamp23;
|
|
11420
|
+
topology_class?: TopologyClass106;
|
|
12090
11421
|
raw_input_string: RawInputString;
|
|
12091
11422
|
classified_intent: ClassifiedIntent;
|
|
12092
11423
|
confidence_score: ConfidenceScore1;
|
|
@@ -12104,10 +11435,10 @@ export interface IntentClassificationReceipt {
|
|
|
12104
11435
|
* MCP ROUTING TRIGGERS: Semantic Relational Record, Payload Injection, Hardware Guillotine, Structured Telemetry
|
|
12105
11436
|
*/
|
|
12106
11437
|
export interface SemanticRelationalVectorState {
|
|
12107
|
-
topology_class?:
|
|
12108
|
-
event_cid:
|
|
12109
|
-
prior_event_hash?:
|
|
12110
|
-
timestamp:
|
|
11438
|
+
topology_class?: TopologyClass107;
|
|
11439
|
+
event_cid: EventCid24;
|
|
11440
|
+
prior_event_hash?: PriorEventHash24;
|
|
11441
|
+
timestamp: Timestamp24;
|
|
12111
11442
|
ontology_class: UpperOntologyClassProfile;
|
|
12112
11443
|
temporal_bounds: TemporalBoundsProfile1;
|
|
12113
11444
|
formal_schema_urn?: FormalSchemaUrn1;
|
|
@@ -12149,10 +11480,10 @@ export interface PayloadInjectionZone {
|
|
|
12149
11480
|
* MCP ROUTING TRIGGERS: Ontological Reification, Bimodal Semantic Transformation, Epistemic Ledger, Traceability Collapse
|
|
12150
11481
|
*/
|
|
12151
11482
|
export interface OntologicalReificationReceipt {
|
|
12152
|
-
topology_class?:
|
|
12153
|
-
event_cid:
|
|
12154
|
-
prior_event_hash?:
|
|
12155
|
-
timestamp:
|
|
11483
|
+
topology_class?: TopologyClass108;
|
|
11484
|
+
event_cid: EventCid25;
|
|
11485
|
+
prior_event_hash?: PriorEventHash25;
|
|
11486
|
+
timestamp: Timestamp25;
|
|
12156
11487
|
source_data_hash: SourceDataHash;
|
|
12157
11488
|
target_namespace: TargetNamespace;
|
|
12158
11489
|
algorithmic_mechanism: TransformationMechanismProfile;
|
|
@@ -12189,16 +11520,59 @@ export interface DempsterShaferBeliefVector2 {
|
|
|
12189
11520
|
* MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
|
|
12190
11521
|
*/
|
|
12191
11522
|
export interface CircuitBreakerEvent {
|
|
12192
|
-
event_cid:
|
|
12193
|
-
prior_event_hash?:
|
|
12194
|
-
timestamp:
|
|
12195
|
-
topology_class?:
|
|
11523
|
+
event_cid: EventCid26;
|
|
11524
|
+
prior_event_hash?: PriorEventHash26;
|
|
11525
|
+
timestamp: Timestamp26;
|
|
11526
|
+
topology_class?: TopologyClass109;
|
|
12196
11527
|
/**
|
|
12197
11528
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
12198
11529
|
*/
|
|
12199
11530
|
target_node_cid: string;
|
|
12200
11531
|
error_signature: ErrorSignature;
|
|
12201
11532
|
}
|
|
11533
|
+
/**
|
|
11534
|
+
* CoReason Shared Kernel Ontology
|
|
11535
|
+
*
|
|
11536
|
+
* AGENT INSTRUCTION: Formalizes Nassim Taleb's Black Swan Theory by injecting
|
|
11537
|
+
* Out-of-Distribution (OOD) epistemic shocks into the causal graph. As an ...Event suffix,
|
|
11538
|
+
* this is an append-only coordinate on the Merkle-DAG that the LLM must never hallucinate
|
|
11539
|
+
* a mutation to.
|
|
11540
|
+
*
|
|
11541
|
+
* CAUSAL AFFORDANCE: Forces the active reasoning topology to process a high-entropy
|
|
11542
|
+
* synthetic_payload, actively testing the swarm's non-monotonic truth maintenance,
|
|
11543
|
+
* defeasible reasoning, and overall topological resilience.
|
|
11544
|
+
*
|
|
11545
|
+
* EPISTEMIC BOUNDS: Cryptographically targets a specific Merkle root via target_node_hash
|
|
11546
|
+
* (strict SHA-256 pattern ^[a-f0-9]{64}$) and bounds the Variational Free Energy via
|
|
11547
|
+
* bayesian_surprise_score [ge=0.0, le=1.0, allow_inf_nan=False]. The @model_validator
|
|
11548
|
+
* physically guarantees execution is halted if the attached escrow is not strictly positive.
|
|
11549
|
+
*
|
|
11550
|
+
* MCP ROUTING TRIGGERS: Black Swan Theory, Out-of-Distribution Shock, Variational Free
|
|
11551
|
+
* Energy, Exogenous Perturbation, Epistemic Stress Test
|
|
11552
|
+
*/
|
|
11553
|
+
export interface ExogenousEpistemicEvent {
|
|
11554
|
+
event_cid: EventCid27;
|
|
11555
|
+
prior_event_hash?: PriorEventHash27;
|
|
11556
|
+
timestamp: Timestamp27;
|
|
11557
|
+
topology_class?: TopologyClass110;
|
|
11558
|
+
shock_cid: ShockCid;
|
|
11559
|
+
target_node_hash: TargetNodeHash;
|
|
11560
|
+
bayesian_surprise_score: BayesianSurpriseScore1;
|
|
11561
|
+
synthetic_payload: SyntheticPayload;
|
|
11562
|
+
escrow: SimulationEscrowContract;
|
|
11563
|
+
}
|
|
11564
|
+
/**
|
|
11565
|
+
* Bounded dictionary representing the injected hallucination or observation.
|
|
11566
|
+
*/
|
|
11567
|
+
export interface SyntheticPayload {
|
|
11568
|
+
[k: string]: JsonPrimitiveState;
|
|
11569
|
+
}
|
|
11570
|
+
/**
|
|
11571
|
+
* The cryptographic Proof-of-Stake funding the shock.
|
|
11572
|
+
*/
|
|
11573
|
+
export interface SimulationEscrowContract {
|
|
11574
|
+
locked_magnitude: LockedMagnitude;
|
|
11575
|
+
}
|
|
12202
11576
|
/**
|
|
12203
11577
|
* CoReason Shared Kernel Ontology
|
|
12204
11578
|
*
|
|
@@ -12211,10 +11585,10 @@ export interface CircuitBreakerEvent {
|
|
|
12211
11585
|
* MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
|
|
12212
11586
|
*/
|
|
12213
11587
|
export interface EpistemicLogEvent {
|
|
12214
|
-
event_cid:
|
|
12215
|
-
prior_event_hash?:
|
|
12216
|
-
topology_class?:
|
|
12217
|
-
timestamp:
|
|
11588
|
+
event_cid: EventCid28;
|
|
11589
|
+
prior_event_hash?: PriorEventHash28;
|
|
11590
|
+
topology_class?: TopologyClass111;
|
|
11591
|
+
timestamp: Timestamp28;
|
|
12218
11592
|
level: Level;
|
|
12219
11593
|
message: Message1;
|
|
12220
11594
|
context_profile?: TelemetryContextProfile;
|
|
@@ -12244,10 +11618,10 @@ export interface TelemetryContextProfile {
|
|
|
12244
11618
|
* MCP ROUTING TRIGGERS: Cryptographic Nonce, State Resumption, Replay Attack Prevention, Wetware Attestation, Liveness Resolution
|
|
12245
11619
|
*/
|
|
12246
11620
|
export interface InterventionReceipt {
|
|
12247
|
-
topology_class?:
|
|
12248
|
-
event_cid:
|
|
12249
|
-
prior_event_hash?:
|
|
12250
|
-
timestamp:
|
|
11621
|
+
topology_class?: TopologyClass112;
|
|
11622
|
+
event_cid: EventCid29;
|
|
11623
|
+
prior_event_hash?: PriorEventHash29;
|
|
11624
|
+
timestamp: Timestamp29;
|
|
12251
11625
|
intervention_request_cid: InterventionRequestCid;
|
|
12252
11626
|
/**
|
|
12253
11627
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -12302,10 +11676,10 @@ export interface WetwareAttestationContract {
|
|
|
12302
11676
|
* MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
|
|
12303
11677
|
*/
|
|
12304
11678
|
export interface CustodyReceipt {
|
|
12305
|
-
event_cid:
|
|
12306
|
-
prior_event_hash?:
|
|
12307
|
-
timestamp:
|
|
12308
|
-
topology_class?:
|
|
11679
|
+
event_cid: EventCid30;
|
|
11680
|
+
prior_event_hash?: PriorEventHash30;
|
|
11681
|
+
timestamp: Timestamp30;
|
|
11682
|
+
topology_class?: TopologyClass113;
|
|
12309
11683
|
custody_cid: CustodyCid;
|
|
12310
11684
|
source_node_cid: SourceNodeCid;
|
|
12311
11685
|
applied_policy_cid: AppliedPolicyCid;
|
|
@@ -12325,10 +11699,10 @@ export interface CustodyReceipt {
|
|
|
12325
11699
|
* MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
|
|
12326
11700
|
*/
|
|
12327
11701
|
export interface DefeasibleAttackEvent {
|
|
12328
|
-
event_cid:
|
|
12329
|
-
prior_event_hash?:
|
|
12330
|
-
timestamp:
|
|
12331
|
-
topology_class?:
|
|
11702
|
+
event_cid: EventCid31;
|
|
11703
|
+
prior_event_hash?: PriorEventHash31;
|
|
11704
|
+
timestamp: Timestamp31;
|
|
11705
|
+
topology_class?: TopologyClass114;
|
|
12332
11706
|
attack_cid: AttackCid;
|
|
12333
11707
|
source_claim_cid: SourceClaimCid;
|
|
12334
11708
|
target_claim_cid: TargetClaimCid;
|
|
@@ -12349,10 +11723,10 @@ export interface DefeasibleAttackEvent {
|
|
|
12349
11723
|
* MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
|
|
12350
11724
|
*/
|
|
12351
11725
|
export interface EpistemicRejectionReceipt {
|
|
12352
|
-
event_cid:
|
|
12353
|
-
prior_event_hash?:
|
|
12354
|
-
timestamp:
|
|
12355
|
-
topology_class?:
|
|
11726
|
+
event_cid: EventCid32;
|
|
11727
|
+
prior_event_hash?: PriorEventHash32;
|
|
11728
|
+
timestamp: Timestamp32;
|
|
11729
|
+
topology_class?: TopologyClass115;
|
|
12356
11730
|
receipt_cid: ReceiptCid1;
|
|
12357
11731
|
failed_projection_cid: FailedProjectionCid;
|
|
12358
11732
|
violated_algebraic_constraint: ViolatedAlgebraicConstraint;
|
|
@@ -12371,10 +11745,10 @@ export interface EpistemicRejectionReceipt {
|
|
|
12371
11745
|
* MCP ROUTING TRIGGERS: System 2 Remediation, Mathematical Truth, Proof Verification, Epistemic Ledger
|
|
12372
11746
|
*/
|
|
12373
11747
|
export interface FormalVerificationReceipt {
|
|
12374
|
-
event_cid:
|
|
12375
|
-
prior_event_hash?:
|
|
12376
|
-
timestamp:
|
|
12377
|
-
topology_class?:
|
|
11748
|
+
event_cid: EventCid33;
|
|
11749
|
+
prior_event_hash?: PriorEventHash33;
|
|
11750
|
+
timestamp: Timestamp33;
|
|
11751
|
+
topology_class?: TopologyClass116;
|
|
12378
11752
|
/**
|
|
12379
11753
|
* Pointer to the specific node or intent that requested this formal verification.
|
|
12380
11754
|
*/
|
|
@@ -12388,11 +11762,11 @@ export interface FormalVerificationReceipt {
|
|
|
12388
11762
|
* CoReason Shared Kernel Ontology
|
|
12389
11763
|
*/
|
|
12390
11764
|
export interface BeliefModulationReceipt {
|
|
12391
|
-
topology_class?:
|
|
11765
|
+
topology_class?: TopologyClass117;
|
|
12392
11766
|
receipt_cid: ReceiptCid2;
|
|
12393
|
-
event_cid:
|
|
12394
|
-
prior_event_hash?:
|
|
12395
|
-
timestamp:
|
|
11767
|
+
event_cid: EventCid34;
|
|
11768
|
+
prior_event_hash?: PriorEventHash34;
|
|
11769
|
+
timestamp: Timestamp34;
|
|
12396
11770
|
target_graph_cid: TargetGraphCid4;
|
|
12397
11771
|
grounded_edges: GroundedEdges;
|
|
12398
11772
|
severed_edge_cids: SeveredEdgeCids;
|
|
@@ -12404,11 +11778,11 @@ export interface GroundedEdges {
|
|
|
12404
11778
|
* CoReason Shared Kernel Ontology
|
|
12405
11779
|
*/
|
|
12406
11780
|
export interface RDFExportReceipt {
|
|
12407
|
-
topology_class?:
|
|
11781
|
+
topology_class?: TopologyClass118;
|
|
12408
11782
|
export_cid: ExportCid1;
|
|
12409
|
-
event_cid:
|
|
12410
|
-
prior_event_hash?:
|
|
12411
|
-
timestamp:
|
|
11783
|
+
event_cid: EventCid35;
|
|
11784
|
+
prior_event_hash?: PriorEventHash35;
|
|
11785
|
+
timestamp: Timestamp35;
|
|
12412
11786
|
serialized_payload: SerializedPayload;
|
|
12413
11787
|
rdf_triple_count: RdfTripleCount;
|
|
12414
11788
|
sha256_graph_hash: Sha256GraphHash;
|
|
@@ -12425,10 +11799,10 @@ export interface RDFExportReceipt {
|
|
|
12425
11799
|
* MCP ROUTING TRIGGERS: Epistemic Starvation, Natural Language Inference, Truth Maintenance System, Defeasible Logic, Belief Mass Depletion
|
|
12426
11800
|
*/
|
|
12427
11801
|
export interface EpistemicStarvationEvent {
|
|
12428
|
-
event_cid:
|
|
12429
|
-
prior_event_hash?:
|
|
12430
|
-
timestamp:
|
|
12431
|
-
topology_class?:
|
|
11802
|
+
event_cid: EventCid36;
|
|
11803
|
+
prior_event_hash?: PriorEventHash36;
|
|
11804
|
+
timestamp: Timestamp36;
|
|
11805
|
+
topology_class?: TopologyClass119;
|
|
12432
11806
|
starved_edge_cid: StarvedEdgeCid;
|
|
12433
11807
|
failed_citations: FailedCitations;
|
|
12434
11808
|
diagnostic_reason: DiagnosticReason;
|
|
@@ -12445,10 +11819,10 @@ export interface EpistemicStarvationEvent {
|
|
|
12445
11819
|
* MCP ROUTING TRIGGERS: SPARQL Result, RDF Bindings, Epistemic Projection, Payload Bounding, Ledger Commit
|
|
12446
11820
|
*/
|
|
12447
11821
|
export interface SPARQLQueryResultReceipt {
|
|
12448
|
-
event_cid:
|
|
12449
|
-
prior_event_hash?:
|
|
12450
|
-
timestamp:
|
|
12451
|
-
topology_class?:
|
|
11822
|
+
event_cid: EventCid37;
|
|
11823
|
+
prior_event_hash?: PriorEventHash37;
|
|
11824
|
+
timestamp: Timestamp37;
|
|
11825
|
+
topology_class?: TopologyClass120;
|
|
12452
11826
|
query_intent_cid: QueryIntentCid;
|
|
12453
11827
|
returned_bindings: ReturnedBindings;
|
|
12454
11828
|
execution_time_ms: ExecutionTimeMs;
|
|
@@ -12471,12 +11845,39 @@ export interface ReturnedBindings {
|
|
|
12471
11845
|
* MCP ROUTING TRIGGERS: Execution Audit, Merkle-DAG Provenance, Thermodynamic Accounting, Oracle Telemetry, Human-in-the-Loop Attestation, Cryptographic Receipt
|
|
12472
11846
|
*/
|
|
12473
11847
|
export interface OracleExecutionReceipt {
|
|
12474
|
-
topology_class?:
|
|
11848
|
+
topology_class?: TopologyClass121;
|
|
12475
11849
|
execution_hash: ExecutionHash;
|
|
12476
11850
|
solver_urn: SolverUrn;
|
|
12477
11851
|
tokens_burned: TokensBurned;
|
|
12478
11852
|
human_attestation_signature?: HumanAttestationSignature;
|
|
12479
11853
|
}
|
|
11854
|
+
/**
|
|
11855
|
+
* CoReason Shared Kernel Ontology
|
|
11856
|
+
*
|
|
11857
|
+
* AGENT INSTRUCTION: Tracks a deterministic security boundary violation emitted by the NeMo Guardrails proxy. This event is a frozen historical fact representing a failed cryptographic or semantic check.
|
|
11858
|
+
*
|
|
11859
|
+
* CAUSAL AFFORDANCE: Triggers an immediate suspension of the active execution trajectory and publishes a high-severity alert to the telemetry broker for remediation.
|
|
11860
|
+
*
|
|
11861
|
+
* EPISTEMIC BOUNDS: The event must include the specific HTTP status code (e.g., 401, 403, 406, 422) and the opaque violation manifest emitted by the proxy.
|
|
11862
|
+
*
|
|
11863
|
+
* MCP ROUTING TRIGGERS: Security, Guardrails, Data Loss Prevention, Policy Violation, Telemetry
|
|
11864
|
+
*/
|
|
11865
|
+
export interface GuardrailViolationEvent {
|
|
11866
|
+
event_cid: EventCid38;
|
|
11867
|
+
prior_event_hash?: PriorEventHash38;
|
|
11868
|
+
timestamp: Timestamp38;
|
|
11869
|
+
topology_class?: TopologyClass122;
|
|
11870
|
+
violation_id: ViolationId;
|
|
11871
|
+
status_code: StatusCode;
|
|
11872
|
+
violation_type: ViolationType;
|
|
11873
|
+
violation_details?: ViolationDetails;
|
|
11874
|
+
}
|
|
11875
|
+
/**
|
|
11876
|
+
* Detailed manifest from the Guardrails proxy.
|
|
11877
|
+
*/
|
|
11878
|
+
export interface ViolationDetails {
|
|
11879
|
+
[k: string]: unknown;
|
|
11880
|
+
}
|
|
12480
11881
|
/**
|
|
12481
11882
|
* CoReason Shared Kernel Ontology
|
|
12482
11883
|
*
|
|
@@ -12489,8 +11890,8 @@ export interface OracleExecutionReceipt {
|
|
|
12489
11890
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Acyclic Edge, Stochastic Routing, Transition Probability, Directed Graph
|
|
12490
11891
|
*/
|
|
12491
11892
|
export interface TransitionEdgeProfile {
|
|
12492
|
-
topology_class?:
|
|
12493
|
-
target_node_cid?:
|
|
11893
|
+
topology_class?: TopologyClass123;
|
|
11894
|
+
target_node_cid?: TargetNodeCid1;
|
|
12494
11895
|
/**
|
|
12495
11896
|
* Dynamic discovery intent for bridging nodes.
|
|
12496
11897
|
*/
|
|
@@ -12533,8 +11934,8 @@ export interface EdgeMappingContract {
|
|
|
12533
11934
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Cyclic Edge, Bellman Equation, Thermodynamic Discounting, Recursive Traversal
|
|
12534
11935
|
*/
|
|
12535
11936
|
export interface CyclicEdgeProfile {
|
|
12536
|
-
topology_class?:
|
|
12537
|
-
target_node_cid?:
|
|
11937
|
+
topology_class?: TopologyClass124;
|
|
11938
|
+
target_node_cid?: TargetNodeCid2;
|
|
12538
11939
|
/**
|
|
12539
11940
|
* Dynamic discovery intent for bridging nodes.
|
|
12540
11941
|
*/
|
|
@@ -12703,7 +12104,7 @@ export interface TransitionMatrix {
|
|
|
12703
12104
|
* MCP ROUTING TRIGGERS: Bipartite Graph Separation, Toxic Capability Quarantine, Finite State Machine, Structural Interlock, Conflict Graph
|
|
12704
12105
|
*/
|
|
12705
12106
|
export interface KineticSeparationPolicy {
|
|
12706
|
-
policy_cid:
|
|
12107
|
+
policy_cid: PolicyCid1;
|
|
12707
12108
|
mutually_exclusive_clusters: MutuallyExclusiveClusters;
|
|
12708
12109
|
enforcement_action: EnforcementAction;
|
|
12709
12110
|
}
|
|
@@ -12756,22 +12157,6 @@ export interface CognitiveDualVerificationReceipt {
|
|
|
12756
12157
|
secondary_verifier_cid: string;
|
|
12757
12158
|
trace_factual_alignment: TraceFactualAlignment;
|
|
12758
12159
|
}
|
|
12759
|
-
/**
|
|
12760
|
-
* CoReason Shared Kernel Ontology
|
|
12761
|
-
*
|
|
12762
|
-
* AGENT INSTRUCTION: Employs Finite State Machine (FSM) Logit Masking and Constrained Decoding to deterministically herd LLM stochasticity into rigorous syntactic structures.
|
|
12763
|
-
*
|
|
12764
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator's inference engine to physically suffocate invalid token probabilities to negative infinity, mechanically ensuring the output conforms to downstream parser requirements.
|
|
12765
|
-
*
|
|
12766
|
-
* EPISTEMIC BOUNDS: Execution constraints are rigidly defined by `require_think_tags` and `final_answer_regex` (`max_length=2000`) to prevent ReDoS CPU exhaustion. The `@model_validator` `resolve_contract_conflicts` prevents unresolvable compilation conflicts in the DFA.
|
|
12767
|
-
*
|
|
12768
|
-
* MCP ROUTING TRIGGERS: FSM Logit Masking, Constrained Decoding, Regular Expression Automaton, Syntactic Boundary, Token Suffocation
|
|
12769
|
-
*/
|
|
12770
|
-
export interface CognitiveFormatContract1 {
|
|
12771
|
-
require_think_tags?: RequireThinkTags;
|
|
12772
|
-
final_answer_regex?: FinalAnswerRegex;
|
|
12773
|
-
decoding_policy: ConstrainedDecodingPolicy;
|
|
12774
|
-
}
|
|
12775
12160
|
/**
|
|
12776
12161
|
* CoReason Shared Kernel Ontology
|
|
12777
12162
|
*
|
|
@@ -12903,31 +12288,6 @@ export interface ComputeRateContract1 {
|
|
|
12903
12288
|
cost_per_million_output_tokens: CostPerMillionOutputTokens;
|
|
12904
12289
|
magnitude_unit: MagnitudeUnit;
|
|
12905
12290
|
}
|
|
12906
|
-
/**
|
|
12907
|
-
* CoReason Shared Kernel Ontology
|
|
12908
|
-
*
|
|
12909
|
-
* AGENT INSTRUCTION: Formalizes a discrete normative axiom within a Constitutional AI
|
|
12910
|
-
* framework to prevent instrumental convergence. As a ...Policy suffix, this object defines
|
|
12911
|
-
* rigid mathematical boundaries that the orchestrator must enforce globally.
|
|
12912
|
-
*
|
|
12913
|
-
* CAUSAL AFFORDANCE: Establishes a hard structural boundary that mathematically repels the
|
|
12914
|
-
* swarm's generative trajectory away from forbidden semantic manifolds. Violation severity
|
|
12915
|
-
* is classified via a strict Literal["low", "medium", "high", "critical"] tier.
|
|
12916
|
-
*
|
|
12917
|
-
* EPISTEMIC BOUNDS: Geometrically restricts the state space by blacklisting specific
|
|
12918
|
-
* execution branches via the forbidden_intents array (max_length=1000),
|
|
12919
|
-
* deterministically sorted by @model_validator to preserve RFC 8785 canonical hashing.
|
|
12920
|
-
* The rule_cid is bounded to a 128-char CID.
|
|
12921
|
-
*
|
|
12922
|
-
* MCP ROUTING TRIGGERS: Constitutional AI, Value Alignment, Normative Axiom, Instrumental
|
|
12923
|
-
* Convergence, Semantic Boundary
|
|
12924
|
-
*/
|
|
12925
|
-
export interface ConstitutionalPolicy {
|
|
12926
|
-
rule_cid: RuleCid1;
|
|
12927
|
-
description: Description10;
|
|
12928
|
-
severity: Severity;
|
|
12929
|
-
forbidden_intents: ForbiddenIntents1;
|
|
12930
|
-
}
|
|
12931
12291
|
/**
|
|
12932
12292
|
* CoReason Shared Kernel Ontology
|
|
12933
12293
|
*
|
|
@@ -13174,6 +12534,30 @@ export interface DocumentLayoutManifest {
|
|
|
13174
12534
|
export interface Blocks1 {
|
|
13175
12535
|
[k: string]: DocumentLayoutRegionState;
|
|
13176
12536
|
}
|
|
12537
|
+
/**
|
|
12538
|
+
* CoReason Shared Kernel Ontology
|
|
12539
|
+
*
|
|
12540
|
+
* AGENT INSTRUCTION: Defines the mathematical Optimal Stopping Theory boundaries for Monte
|
|
12541
|
+
* Carlo Tree Search (MCTS) and test-time compute scaling. As an ...SLA suffix, this object
|
|
12542
|
+
* enforces rigid mathematical boundaries that the orchestrator must respect globally.
|
|
12543
|
+
*
|
|
12544
|
+
* CAUSAL AFFORDANCE: Triggers an early termination circuit breaker on reasoning trajectories
|
|
12545
|
+
* when the gradient of the Process Reward Model (PRM) score falls below the epsilon delta,
|
|
12546
|
+
* halting unnecessary probability wave expansion and preserving VRAM.
|
|
12547
|
+
*
|
|
12548
|
+
* EPISTEMIC BOUNDS: Mathematically constrained by convergence_delta_epsilon (ge=0.0, le=1.0)
|
|
12549
|
+
* over a strictly positive lookback_window_steps (gt=0, le=18446744073709551615). Physically mandates
|
|
12550
|
+
* a minimum_reasoning_steps burn-in period (gt=0, le=18446744073709551615) to prevent premature
|
|
12551
|
+
* collapse before the latent space is adequately explored.
|
|
12552
|
+
*
|
|
12553
|
+
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, MCTS, PRM Convergence, Circuit Breaker,
|
|
12554
|
+
* Bellman Equation
|
|
12555
|
+
*/
|
|
12556
|
+
export interface DynamicConvergenceSLA {
|
|
12557
|
+
convergence_delta_epsilon: ConvergenceDeltaEpsilon;
|
|
12558
|
+
lookback_window_steps: LookbackWindowSteps;
|
|
12559
|
+
minimum_reasoning_steps: MinimumReasoningSteps;
|
|
12560
|
+
}
|
|
13177
12561
|
/**
|
|
13178
12562
|
* CoReason Shared Kernel Ontology
|
|
13179
12563
|
*
|
|
@@ -13201,7 +12585,7 @@ export interface DynamicLayoutManifest {
|
|
|
13201
12585
|
* MCP ROUTING TRIGGERS: Grammar of Graphics, Retinal Variables, UI Rendering, Semantic Zooming, Dynamic Manifold
|
|
13202
12586
|
*/
|
|
13203
12587
|
export interface DynamicManifoldProjectionManifest1 {
|
|
13204
|
-
topology_class?:
|
|
12588
|
+
topology_class?: TopologyClass53;
|
|
13205
12589
|
manifest_cid: ManifestCid1;
|
|
13206
12590
|
active_forge_cid: ActiveForgeCid;
|
|
13207
12591
|
ast_gradient_visual_mapping: GrammarPanelProfile;
|
|
@@ -13324,6 +12708,22 @@ export interface Claims {
|
|
|
13324
12708
|
export interface Attacks {
|
|
13325
12709
|
[k: string]: DefeasibleAttackEvent;
|
|
13326
12710
|
}
|
|
12711
|
+
/**
|
|
12712
|
+
* CoReason Shared Kernel Ontology
|
|
12713
|
+
*
|
|
12714
|
+
* AGENT INSTRUCTION: Implements First-Order Logic and Resource Description Framework (RDF) triples to mathematically formalize knowledge. As a ...State suffix, this is a declarative, frozen snapshot of a specific causal connection.
|
|
12715
|
+
*
|
|
12716
|
+
* CAUSAL AFFORDANCE: Distills high-entropy natural language token streams into rigid, hashable causal edges (Subject, Predicate, Object), unlocking deterministic querying and Truth Maintenance System (TMS) traversals.
|
|
12717
|
+
*
|
|
12718
|
+
* EPISTEMIC BOUNDS: Source and target concept physical boundaries are strictly locked to 128-char CIDs matching the regex `^[a-zA-Z0-9_.:-]+$`. The `directed_edge_class` is clamped to a `max_length=2000` to prevent dictionary bombing during semantic evaluation.
|
|
12719
|
+
*
|
|
12720
|
+
* MCP ROUTING TRIGGERS: First-Order Logic, RDF Triple, Semantic Distillation, Causal Edge, Directed Graph
|
|
12721
|
+
*/
|
|
12722
|
+
export interface EpistemicAxiomState {
|
|
12723
|
+
source_concept_cid: SourceConceptCid;
|
|
12724
|
+
directed_edge_class: DirectedEdgeClass;
|
|
12725
|
+
target_concept_cid: TargetConceptCid;
|
|
12726
|
+
}
|
|
13327
12727
|
/**
|
|
13328
12728
|
* CoReason Shared Kernel Ontology
|
|
13329
12729
|
*
|
|
@@ -13509,6 +12909,26 @@ export interface EpistemicEscalationContract {
|
|
|
13509
12909
|
test_time_multiplier: TestTimeMultiplier;
|
|
13510
12910
|
max_escalation_tiers: MaxEscalationTiers;
|
|
13511
12911
|
}
|
|
12912
|
+
/**
|
|
12913
|
+
* CoReason Shared Kernel Ontology
|
|
12914
|
+
*
|
|
12915
|
+
* AGENT INSTRUCTION: A declarative proxy that outputs standard NeMo Colang format (.co files)
|
|
12916
|
+
* to configure the NeMo Guardrails reverse-proxy in the Envoy mesh.
|
|
12917
|
+
*
|
|
12918
|
+
* CAUSAL AFFORDANCE: Defines the exact Colang state machine configuration for intercepting
|
|
12919
|
+
* and overriding LLM outputs before they hit the network.
|
|
12920
|
+
*
|
|
12921
|
+
* EPISTEMIC BOUNDS: Bounded by a strict max_length=100000 on the raw Colang payload
|
|
12922
|
+
* to prevent memory exhaustion. The @model_validator deterministically sorts the required
|
|
12923
|
+
* imports.
|
|
12924
|
+
*
|
|
12925
|
+
* MCP ROUTING TRIGGERS: NeMo Guardrails, Colang, Reverse Proxy, Constitutional Alignment, Envoy Mesh
|
|
12926
|
+
*/
|
|
12927
|
+
export interface EpistemicGuardrailsManifest {
|
|
12928
|
+
colang_version?: ColangVersion;
|
|
12929
|
+
colang_payload: ColangPayload;
|
|
12930
|
+
severity?: Severity;
|
|
12931
|
+
}
|
|
13512
12932
|
/**
|
|
13513
12933
|
* CoReason Shared Kernel Ontology
|
|
13514
12934
|
*
|
|
@@ -13746,8 +13166,9 @@ export interface ProceduralMetadataManifest {
|
|
|
13746
13166
|
*
|
|
13747
13167
|
* CAUSAL AFFORDANCE: Physically bounds the executing agent (target_persona:
|
|
13748
13168
|
* ProfileCIDState) to a deterministic sequence of CognitiveStateProfiles, unlocking
|
|
13749
|
-
* the ability for the orchestrator to dynamically evaluate execution
|
|
13750
|
-
* Models (prm_evaluations: list[ProcessRewardContract]) at each
|
|
13169
|
+
* the ability for the orchestrator to dynamically evaluate execution
|
|
13170
|
+
* via Process Reward Models (prm_evaluations: list[ProcessRewardContract]) at each
|
|
13171
|
+
* topological node.
|
|
13751
13172
|
*
|
|
13752
13173
|
* EPISTEMIC BOUNDS: The cognitive_steps dictionary is constrained to max_length=1000
|
|
13753
13174
|
* to cap memory footprint. The @model_validator reject_ghost_nodes mathematically enforces
|
|
@@ -13766,7 +13187,7 @@ export interface EpistemicSOPManifest {
|
|
|
13766
13187
|
cognitive_steps: CognitiveSteps;
|
|
13767
13188
|
structural_grammar_hashes: StructuralGrammarHashes;
|
|
13768
13189
|
chronological_flow_edges: ChronologicalFlowEdges1;
|
|
13769
|
-
prm_evaluations
|
|
13190
|
+
prm_evaluations?: PrmEvaluations;
|
|
13770
13191
|
}
|
|
13771
13192
|
/**
|
|
13772
13193
|
* Dictionary mapping step_cids to strict causal DAG constraints.
|
|
@@ -13780,6 +13201,26 @@ export interface CognitiveSteps {
|
|
|
13780
13201
|
export interface StructuralGrammarHashes {
|
|
13781
13202
|
[k: string]: string;
|
|
13782
13203
|
}
|
|
13204
|
+
/**
|
|
13205
|
+
* CoReason Shared Kernel Ontology
|
|
13206
|
+
*
|
|
13207
|
+
* AGENT INSTRUCTION: Enforces the Step-Level Verification heuristics for Process Reward Models (PRMs) during non-monotonic reasoning searches and test-time compute.
|
|
13208
|
+
*
|
|
13209
|
+
* CAUSAL AFFORDANCE: Authorizes the orchestrator to physically prune hallucinating ThoughtBranchState vectors from the LatentScratchpadReceipt if their logit probabilities drop below the viable threshold, emulating rigorous Beam Search pruning.
|
|
13210
|
+
*
|
|
13211
|
+
* EPISTEMIC BOUNDS: Strictly bounds the search space geometry via `pruning_threshold` (`ge=0.0, le=1.0`) and mechanically caps State-Space Explosion through `max_backtracks_allowed` (`ge=0, le=18446744073709551615`).
|
|
13212
|
+
*
|
|
13213
|
+
* MCP ROUTING TRIGGERS: Process Reward Model, Beam Search Pruning, Latent Trajectory, State-Space Explosion, A* Search
|
|
13214
|
+
*/
|
|
13215
|
+
export interface ProcessRewardContract {
|
|
13216
|
+
/**
|
|
13217
|
+
* The dynamic circuit breaker that halts the search when PRM variance converges, preventing VRAM waste.
|
|
13218
|
+
*/
|
|
13219
|
+
convergence_sla?: DynamicConvergenceSLA | null;
|
|
13220
|
+
pruning_threshold: PruningThreshold;
|
|
13221
|
+
max_backtracks_allowed: MaxBacktracksAllowed;
|
|
13222
|
+
evaluator_matrix_name?: EvaluatorMatrixName;
|
|
13223
|
+
}
|
|
13783
13224
|
/**
|
|
13784
13225
|
* CoReason Shared Kernel Ontology
|
|
13785
13226
|
*
|
|
@@ -13984,7 +13425,7 @@ export interface GenerativeTaxonomyManifest1 {
|
|
|
13984
13425
|
* Bounding, ESG Constraint, Execution Envelope
|
|
13985
13426
|
*/
|
|
13986
13427
|
export interface GlobalGovernancePolicy {
|
|
13987
|
-
mandatory_license_rule:
|
|
13428
|
+
mandatory_license_rule: EpistemicGuardrailsManifest1;
|
|
13988
13429
|
max_budget_magnitude: MaxBudgetMagnitude1;
|
|
13989
13430
|
/**
|
|
13990
13431
|
* The mathematical CRDT ruleset governing distributed state synchronization.
|
|
@@ -14001,27 +13442,22 @@ export interface GlobalGovernancePolicy {
|
|
|
14001
13442
|
/**
|
|
14002
13443
|
* CoReason Shared Kernel Ontology
|
|
14003
13444
|
*
|
|
14004
|
-
* AGENT INSTRUCTION:
|
|
14005
|
-
*
|
|
14006
|
-
* rigid mathematical boundaries that the orchestrator must enforce globally.
|
|
13445
|
+
* AGENT INSTRUCTION: A declarative proxy that outputs standard NeMo Colang format (.co files)
|
|
13446
|
+
* to configure the NeMo Guardrails reverse-proxy in the Envoy mesh.
|
|
14007
13447
|
*
|
|
14008
|
-
* CAUSAL AFFORDANCE:
|
|
14009
|
-
*
|
|
14010
|
-
* is classified via a strict Literal["low", "medium", "high", "critical"] tier.
|
|
13448
|
+
* CAUSAL AFFORDANCE: Defines the exact Colang state machine configuration for intercepting
|
|
13449
|
+
* and overriding LLM outputs before they hit the network.
|
|
14011
13450
|
*
|
|
14012
|
-
* EPISTEMIC BOUNDS:
|
|
14013
|
-
*
|
|
14014
|
-
*
|
|
14015
|
-
* The rule_cid is bounded to a 128-char CID.
|
|
13451
|
+
* EPISTEMIC BOUNDS: Bounded by a strict max_length=100000 on the raw Colang payload
|
|
13452
|
+
* to prevent memory exhaustion. The @model_validator deterministically sorts the required
|
|
13453
|
+
* imports.
|
|
14016
13454
|
*
|
|
14017
|
-
* MCP ROUTING TRIGGERS:
|
|
14018
|
-
* Convergence, Semantic Boundary
|
|
13455
|
+
* MCP ROUTING TRIGGERS: NeMo Guardrails, Colang, Reverse Proxy, Constitutional Alignment, Envoy Mesh
|
|
14019
13456
|
*/
|
|
14020
|
-
export interface
|
|
14021
|
-
|
|
14022
|
-
|
|
14023
|
-
severity
|
|
14024
|
-
forbidden_intents: ForbiddenIntents1;
|
|
13457
|
+
export interface EpistemicGuardrailsManifest1 {
|
|
13458
|
+
colang_version?: ColangVersion;
|
|
13459
|
+
colang_payload: ColangPayload;
|
|
13460
|
+
severity?: Severity;
|
|
14025
13461
|
}
|
|
14026
13462
|
/**
|
|
14027
13463
|
* CoReason Shared Kernel Ontology
|
|
@@ -14096,32 +13532,6 @@ export interface GlobalSemanticProfile1 {
|
|
|
14096
13532
|
detected_modalities: DetectedModalities;
|
|
14097
13533
|
token_density: TokenDensity;
|
|
14098
13534
|
}
|
|
14099
|
-
/**
|
|
14100
|
-
* CoReason Shared Kernel Ontology
|
|
14101
|
-
*
|
|
14102
|
-
* AGENT INSTRUCTION: Aggregates discrete ConstitutionalPolicy nodes into a cohesive,
|
|
14103
|
-
* version-controlled Normative Alignment Manifold. As a ...Policy suffix, this object
|
|
14104
|
-
* defines rigid mathematical boundaries that the orchestrator must enforce globally.
|
|
14105
|
-
*
|
|
14106
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator to enforce a unified cybernetic governance
|
|
14107
|
-
* model across all swarm trajectories, grounding generative actions in a specific semantic
|
|
14108
|
-
* version (SemanticVersionState).
|
|
14109
|
-
*
|
|
14110
|
-
* EPISTEMIC BOUNDS: The topological integrity of the manifold is mathematically guaranteed
|
|
14111
|
-
* by the @model_validator, which deterministically sorts the rules array by rule_cid to
|
|
14112
|
-
* prevent Byzantine hash fractures across distributed nodes.
|
|
14113
|
-
*
|
|
14114
|
-
* MCP ROUTING TRIGGERS: Cybernetic Governance, Normative Alignment Manifold, Rule
|
|
14115
|
-
* Aggregation, Version Control, RFC 8785 Canonicalization
|
|
14116
|
-
*/
|
|
14117
|
-
export interface GovernancePolicy {
|
|
14118
|
-
policy_name: PolicyName;
|
|
14119
|
-
/**
|
|
14120
|
-
* Semantic version of the governance policy.
|
|
14121
|
-
*/
|
|
14122
|
-
version: string;
|
|
14123
|
-
rules: Rules1;
|
|
14124
|
-
}
|
|
14125
13535
|
/**
|
|
14126
13536
|
* CoReason Shared Kernel Ontology
|
|
14127
13537
|
*
|
|
@@ -14727,33 +14137,6 @@ export interface StateVectorProfile1 {
|
|
|
14727
14137
|
mutable_matrix?: MutableMatrix;
|
|
14728
14138
|
is_delta?: IsDelta;
|
|
14729
14139
|
}
|
|
14730
|
-
/**
|
|
14731
|
-
* CoReason Shared Kernel Ontology
|
|
14732
|
-
*
|
|
14733
|
-
* AGENT INSTRUCTION: Formalizes the baseline control group definition within
|
|
14734
|
-
* Chaos Engineering, leveraging Queueing Theory to model the expected systemic
|
|
14735
|
-
* equilibrium. As a ...State suffix, this is a declarative, frozen snapshot of
|
|
14736
|
-
* N-dimensional geometry.
|
|
14737
|
-
*
|
|
14738
|
-
* CAUSAL AFFORDANCE: Provides the deterministic baseline against which chaotic
|
|
14739
|
-
* perturbations (e.g., ChaosExperimentTask) are measured, establishing temporal
|
|
14740
|
-
* and procedural expectations for standard execution loops.
|
|
14741
|
-
*
|
|
14742
|
-
* EPISTEMIC BOUNDS: Latency expectations are continuously bounded by
|
|
14743
|
-
* expected_max_latency (ge=0.0, le=18446744073709551615.0). The max_loops_allowed
|
|
14744
|
-
* (le=18446744073709551615) physically caps algorithmic cycles. The optional
|
|
14745
|
-
* required_tool_usage (list[str] | None, default=None,
|
|
14746
|
-
* max_length=1000) is deterministically sorted via @model_validator
|
|
14747
|
-
* sort_arrays to preserve RFC 8785 canonical hashing.
|
|
14748
|
-
*
|
|
14749
|
-
* MCP ROUTING TRIGGERS: Chaos Engineering, Queueing Theory, Steady-State
|
|
14750
|
-
* Equilibrium, Control Group Baseline, Systemic Perturbation
|
|
14751
|
-
*/
|
|
14752
|
-
export interface SteadyStateHypothesisState1 {
|
|
14753
|
-
expected_max_latency: ExpectedMaxLatency;
|
|
14754
|
-
max_loops_allowed: MaxLoopsAllowed;
|
|
14755
|
-
required_tool_usage?: RequiredToolUsage;
|
|
14756
|
-
}
|
|
14757
14140
|
/**
|
|
14758
14141
|
* CoReason Shared Kernel Ontology
|
|
14759
14142
|
*
|
|
@@ -14815,7 +14198,7 @@ export interface GenerativeManifoldSLA1 {
|
|
|
14815
14198
|
* MCP ROUTING TRIGGERS: Softmax Gating, Cognitive Load Theory, Pre-Flight Routing, Dictionary Bombing Prevention, Token Exhaustion Mitigation
|
|
14816
14199
|
*/
|
|
14817
14200
|
export interface TaxonomicRoutingPolicy {
|
|
14818
|
-
policy_cid:
|
|
14201
|
+
policy_cid: PolicyCid2;
|
|
14819
14202
|
intent_to_heuristic_matrix: IntentToHeuristicMatrix;
|
|
14820
14203
|
fallback_heuristic: FallbackHeuristic;
|
|
14821
14204
|
}
|