@coreason-ai/coreason-manifest 0.55.1 → 0.55.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/ontology.d.ts +381 -429
  2. package/package.json +1 -1
@@ -1202,7 +1202,7 @@ export type Justification = string;
1202
1202
  */
1203
1203
  export type TopologyClass38 = "constitutional_amendment";
1204
1204
  /**
1205
- * The globally unique decentralized identifier (DID) anchoring the NormativeDriftEvent that justified triggering this proposal.
1205
+ * The globally unique decentralized identifier (DID) anchoring the GuardrailViolationEvent that justified triggering this proposal.
1206
1206
  */
1207
1207
  export type DriftEventCid = string;
1208
1208
  /**
@@ -1940,17 +1940,10 @@ export type EnforceFunctionalIsolation = boolean;
1940
1940
  *
1941
1941
  * @minItems 1
1942
1942
  */
1943
- export type PermittedClassificationTiers = [SemanticClassificationProfile, ...SemanticClassificationProfile[]];
1944
- /**
1945
- * AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
1946
- *
1947
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
1948
- *
1949
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
1950
- *
1951
- * MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
1952
- */
1953
- export type SemanticClassificationProfile = "public" | "internal" | "confidential" | "restricted";
1943
+ export type PermittedClassificationTiers = [
1944
+ "public" | "internal" | "confidential" | "restricted",
1945
+ ...("public" | "internal" | "confidential" | "restricted")[]
1946
+ ];
1954
1947
  /**
1955
1948
  * The declarative whitelist of strictly typed ontological node labels authorized for context projection.
1956
1949
  */
@@ -2214,40 +2207,6 @@ export type PolicyCid = string;
2214
2207
  * Whether this policy is currently enforcing data sanitization.
2215
2208
  */
2216
2209
  export type Active1 = boolean;
2217
- /**
2218
- * Unique identifier for the sanitization rule.
2219
- */
2220
- export type RuleCid = string;
2221
- /**
2222
- * AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
2223
- *
2224
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
2225
- *
2226
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
2227
- *
2228
- * MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
2229
- */
2230
- export type SemanticClassificationProfile1 = "public" | "internal" | "confidential" | "restricted";
2231
- /**
2232
- * The semantic entity type or declarative regex pattern to identify.
2233
- */
2234
- export type TargetPattern = string;
2235
- /**
2236
- * The dynamic regex pattern to target.
2237
- */
2238
- export type TargetRegexPattern = string;
2239
- /**
2240
- * Specific JSON paths where this rule should NOT apply.
2241
- */
2242
- export type ContextExclusionZones = string[] | null;
2243
- /**
2244
- * The strictly typed string to insert if the action is 'redact'.
2245
- */
2246
- export type ReplacementToken = string | null;
2247
- /**
2248
- * The array of sanitization rules to enforce.
2249
- */
2250
- export type Rules = RedactionPolicy[];
2251
2210
  /**
2252
2211
  * The absolute physical ceiling of tokens allowed in a single ingress payload.
2253
2212
  */
@@ -3063,7 +3022,7 @@ export type AnyPresentationIntent = SemanticIntent | DraftingIntent | Adjudicati
3063
3022
  /**
3064
3023
  * A discriminated union of state events.
3065
3024
  */
3066
- export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | NormativeDriftEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt;
3025
+ export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt | GuardrailViolationEvent;
3067
3026
  /**
3068
3027
  * Discriminator for temporal graph crdt.
3069
3028
  */
@@ -3631,38 +3590,10 @@ export type PriorEventHash15 = string | null;
3631
3590
  * Causal Ancestry markers required to resolve decentralized event ordering.
3632
3591
  */
3633
3592
  export type Timestamp15 = number;
3634
- /**
3635
- * Discriminator type for a normative drift event.
3636
- */
3637
- export type TopologyClass98 = "normative_drift";
3638
- /**
3639
- * The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
3640
- */
3641
- export type TrippedRuleCid = string;
3642
- /**
3643
- * The calculated probabilistic delta showing how far the swarm's observed reality is diverging from the static rule.
3644
- */
3645
- export type MeasuredSemanticDrift = number;
3646
- /**
3647
- * A cryptographic pointer to the internal scratchpad trace (ThoughtBranchState) definitively proving the rule is obsolete or causing a loop.
3648
- */
3649
- export type ContradictionProofHash = string;
3650
- /**
3651
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3652
- */
3653
- export type EventCid16 = string;
3654
- /**
3655
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3656
- */
3657
- export type PriorEventHash16 = string | null;
3658
- /**
3659
- * Causal Ancestry markers required to resolve decentralized event ordering.
3660
- */
3661
- export type Timestamp16 = number;
3662
3593
  /**
3663
3594
  * Discriminator type for a persistence commit receipt.
3664
3595
  */
3665
- export type TopologyClass99 = "persistence_commit";
3596
+ export type TopologyClass98 = "persistence_commit";
3666
3597
  /**
3667
3598
  * The external cryptographic receipt generated by Iceberg/Delta.
3668
3599
  */
@@ -3678,19 +3609,19 @@ export type TargetTableUri = string;
3678
3609
  /**
3679
3610
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3680
3611
  */
3681
- export type EventCid17 = string;
3612
+ export type EventCid16 = string;
3682
3613
  /**
3683
3614
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3684
3615
  */
3685
- export type PriorEventHash17 = string | null;
3616
+ export type PriorEventHash16 = string | null;
3686
3617
  /**
3687
3618
  * Causal Ancestry markers required to resolve decentralized event ordering.
3688
3619
  */
3689
- export type Timestamp17 = number;
3620
+ export type Timestamp16 = number;
3690
3621
  /**
3691
3622
  * Discriminator type for a token burn receipt.
3692
3623
  */
3693
- export type TopologyClass100 = "token_burn";
3624
+ export type TopologyClass99 = "token_burn";
3694
3625
  /**
3695
3626
  * A string linking this burn back to the specific ToolInvocationEvent CID.
3696
3627
  */
@@ -3710,19 +3641,19 @@ export type BurnMagnitude = number;
3710
3641
  /**
3711
3642
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3712
3643
  */
3713
- export type EventCid18 = string;
3644
+ export type EventCid17 = string;
3714
3645
  /**
3715
3646
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3716
3647
  */
3717
- export type PriorEventHash18 = string | null;
3648
+ export type PriorEventHash17 = string | null;
3718
3649
  /**
3719
3650
  * Causal Ancestry markers required to resolve decentralized event ordering.
3720
3651
  */
3721
- export type Timestamp18 = number;
3652
+ export type Timestamp17 = number;
3722
3653
  /**
3723
3654
  * Discriminator type for a budget exhaustion event.
3724
3655
  */
3725
- export type TopologyClass101 = "budget_exhaustion";
3656
+ export type TopologyClass100 = "budget_exhaustion";
3726
3657
  /**
3727
3658
  * A string representing the original escrow boundary breached.
3728
3659
  */
@@ -3734,19 +3665,19 @@ export type FinalBurnReceiptCid = string;
3734
3665
  /**
3735
3666
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3736
3667
  */
3737
- export type EventCid19 = string;
3668
+ export type EventCid18 = string;
3738
3669
  /**
3739
3670
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3740
3671
  */
3741
- export type PriorEventHash19 = string | null;
3672
+ export type PriorEventHash18 = string | null;
3742
3673
  /**
3743
3674
  * Causal Ancestry markers required to resolve decentralized event ordering.
3744
3675
  */
3745
- export type Timestamp19 = number;
3676
+ export type Timestamp18 = number;
3746
3677
  /**
3747
3678
  * Discriminator type for telemetry events.
3748
3679
  */
3749
- export type TopologyClass102 = "epistemic_telemetry";
3680
+ export type TopologyClass101 = "epistemic_telemetry";
3750
3681
  /**
3751
3682
  * The exact topological action the human operator performed on the projected manifold.
3752
3683
  */
@@ -3762,16 +3693,16 @@ export type DwellDurationMs = number | null;
3762
3693
  /**
3763
3694
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3764
3695
  */
3765
- export type EventCid20 = string;
3696
+ export type EventCid19 = string;
3766
3697
  /**
3767
3698
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3768
3699
  */
3769
- export type PriorEventHash20 = string | null;
3700
+ export type PriorEventHash19 = string | null;
3770
3701
  /**
3771
3702
  * Causal Ancestry markers required to resolve decentralized event ordering.
3772
3703
  */
3773
- export type Timestamp20 = number;
3774
- export type TopologyClass103 = "cognitive_prediction";
3704
+ export type Timestamp19 = number;
3705
+ export type TopologyClass102 = "cognitive_prediction";
3775
3706
  export type SourceChainCid = string;
3776
3707
  export type TargetSourceConcept = string;
3777
3708
  /**
@@ -3781,16 +3712,16 @@ export type PredictedTopKTokens = [string, ...string[]];
3781
3712
  /**
3782
3713
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3783
3714
  */
3784
- export type EventCid21 = string;
3715
+ export type EventCid20 = string;
3785
3716
  /**
3786
3717
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3787
3718
  */
3788
- export type PriorEventHash21 = string | null;
3719
+ export type PriorEventHash20 = string | null;
3789
3720
  /**
3790
3721
  * Causal Ancestry markers required to resolve decentralized event ordering.
3791
3722
  */
3792
- export type Timestamp21 = number;
3793
- export type TopologyClass104 = "epistemic_axiom_verification";
3723
+ export type Timestamp20 = number;
3724
+ export type TopologyClass103 = "epistemic_axiom_verification";
3794
3725
  export type SourcePredictionCid = string;
3795
3726
  export type SequenceSimilarityScore = number;
3796
3727
  export type FactScorePassed = boolean;
@@ -3801,16 +3732,16 @@ export type ZeroTrustReceiptCid1 = string | null;
3801
3732
  /**
3802
3733
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3803
3734
  */
3804
- export type EventCid22 = string;
3735
+ export type EventCid21 = string;
3805
3736
  /**
3806
3737
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3807
3738
  */
3808
- export type PriorEventHash22 = string | null;
3739
+ export type PriorEventHash21 = string | null;
3809
3740
  /**
3810
3741
  * Causal Ancestry markers required to resolve decentralized event ordering.
3811
3742
  */
3812
- export type Timestamp22 = number;
3813
- export type TopologyClass105 = "epistemic_flow_state";
3743
+ export type Timestamp21 = number;
3744
+ export type TopologyClass104 = "epistemic_flow_state";
3814
3745
  /**
3815
3746
  * The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
3816
3747
  */
@@ -3826,19 +3757,19 @@ export type TerminalRewardFactorized = boolean;
3826
3757
  /**
3827
3758
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3828
3759
  */
3829
- export type EventCid23 = string;
3760
+ export type EventCid22 = string;
3830
3761
  /**
3831
3762
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3832
3763
  */
3833
- export type PriorEventHash23 = string | null;
3764
+ export type PriorEventHash22 = string | null;
3834
3765
  /**
3835
3766
  * Causal Ancestry markers required to resolve decentralized event ordering.
3836
3767
  */
3837
- export type Timestamp23 = number;
3768
+ export type Timestamp22 = number;
3838
3769
  /**
3839
3770
  * Discriminator type for a causal explanation event.
3840
3771
  */
3841
- export type TopologyClass106 = "causal_explanation";
3772
+ export type TopologyClass105 = "causal_explanation";
3842
3773
  /**
3843
3774
  * The globally unique decentralized identifier (DID) anchoring the collective outcome being explained.
3844
3775
  */
@@ -3878,19 +3809,19 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
3878
3809
  /**
3879
3810
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3880
3811
  */
3881
- export type EventCid24 = string;
3812
+ export type EventCid23 = string;
3882
3813
  /**
3883
3814
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3884
3815
  */
3885
- export type PriorEventHash24 = string | null;
3816
+ export type PriorEventHash23 = string | null;
3886
3817
  /**
3887
3818
  * Causal Ancestry markers required to resolve decentralized event ordering.
3888
3819
  */
3889
- export type Timestamp24 = number;
3820
+ export type Timestamp23 = number;
3890
3821
  /**
3891
3822
  * Discriminator type for an intent classification receipt.
3892
3823
  */
3893
- export type TopologyClass107 = "intent_classification";
3824
+ export type TopologyClass106 = "intent_classification";
3894
3825
  /**
3895
3826
  * The raw, unparsed human natural language instruction.
3896
3827
  */
@@ -3907,19 +3838,19 @@ export type ConfidenceScore1 = number;
3907
3838
  * The TaxonomicRoutingPolicy CID that governed this classification.
3908
3839
  */
3909
3840
  export type RoutingPolicyCid = string | null;
3910
- export type TopologyClass108 = "semantic_relational_record";
3841
+ export type TopologyClass107 = "semantic_relational_record";
3911
3842
  /**
3912
3843
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3913
3844
  */
3914
- export type EventCid25 = string;
3845
+ export type EventCid24 = string;
3915
3846
  /**
3916
3847
  * The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
3917
3848
  */
3918
- export type PriorEventHash25 = string | null;
3849
+ export type PriorEventHash24 = string | null;
3919
3850
  /**
3920
3851
  * The precise temporal coordinate of the event realization.
3921
3852
  */
3922
- export type Timestamp25 = number;
3853
+ export type Timestamp24 = number;
3923
3854
  /**
3924
3855
  * The domain-independent structural classification of the record.
3925
3856
  */
@@ -3931,19 +3862,19 @@ export type FormalSchemaUrn1 = string | null;
3931
3862
  /**
3932
3863
  * Discriminator for the reification receipt.
3933
3864
  */
3934
- export type TopologyClass109 = "ontological_reification";
3865
+ export type TopologyClass108 = "ontological_reification";
3935
3866
  /**
3936
3867
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3937
3868
  */
3938
- export type EventCid26 = string;
3869
+ export type EventCid25 = string;
3939
3870
  /**
3940
3871
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
3941
3872
  */
3942
- export type PriorEventHash26 = string | null;
3873
+ export type PriorEventHash25 = string | null;
3943
3874
  /**
3944
3875
  * The precise temporal coordinate of the event realization.
3945
3876
  */
3946
- export type Timestamp26 = number;
3877
+ export type Timestamp25 = number;
3947
3878
  /**
3948
3879
  * The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
3949
3880
  */
@@ -3963,19 +3894,19 @@ export type IsLatentInference = boolean;
3963
3894
  /**
3964
3895
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3965
3896
  */
3966
- export type EventCid27 = string;
3897
+ export type EventCid26 = string;
3967
3898
  /**
3968
3899
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3969
3900
  */
3970
- export type PriorEventHash27 = string | null;
3901
+ export type PriorEventHash26 = string | null;
3971
3902
  /**
3972
3903
  * Causal Ancestry markers required to resolve decentralized event ordering.
3973
3904
  */
3974
- export type Timestamp27 = number;
3905
+ export type Timestamp26 = number;
3975
3906
  /**
3976
3907
  * The type of the resilience payload.
3977
3908
  */
3978
- export type TopologyClass110 = "circuit_breaker_event";
3909
+ export type TopologyClass109 = "circuit_breaker_event";
3979
3910
  /**
3980
3911
  * Signature or summary of the error causing the trip.
3981
3912
  */
@@ -3983,19 +3914,19 @@ export type ErrorSignature = string;
3983
3914
  /**
3984
3915
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3985
3916
  */
3986
- export type EventCid28 = string;
3917
+ export type EventCid27 = string;
3987
3918
  /**
3988
3919
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3989
3920
  */
3990
- export type PriorEventHash28 = string | null;
3921
+ export type PriorEventHash27 = string | null;
3991
3922
  /**
3992
3923
  * Causal Ancestry markers required to resolve decentralized event ordering.
3993
3924
  */
3994
- export type Timestamp28 = number;
3925
+ export type Timestamp27 = number;
3995
3926
  /**
3996
3927
  * Discriminator type for an exogenous event.
3997
3928
  */
3998
- export type TopologyClass111 = "exogenous_event";
3929
+ export type TopologyClass110 = "exogenous_event";
3999
3930
  /**
4000
3931
  * Cryptographic identifier for the Black Swan event.
4001
3932
  */
@@ -4015,19 +3946,19 @@ export type LockedMagnitude = number;
4015
3946
  /**
4016
3947
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4017
3948
  */
4018
- export type EventCid29 = string;
3949
+ export type EventCid28 = string;
4019
3950
  /**
4020
3951
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4021
3952
  */
4022
- export type PriorEventHash29 = string | null;
3953
+ export type PriorEventHash28 = string | null;
4023
3954
  /**
4024
3955
  * Discriminator type for a log event.
4025
3956
  */
4026
- export type TopologyClass112 = "epistemic_log";
3957
+ export type TopologyClass111 = "epistemic_log";
4027
3958
  /**
4028
3959
  * The UNIX timestamp of the log event.
4029
3960
  */
4030
- export type Timestamp29 = number;
3961
+ export type Timestamp28 = number;
4031
3962
  /**
4032
3963
  * The severity level of the log event.
4033
3964
  */
@@ -4040,19 +3971,19 @@ export type TelemetryScalarState = string | number | boolean | null;
4040
3971
  /**
4041
3972
  * The type of the intervention payload.
4042
3973
  */
4043
- export type TopologyClass113 = "verdict";
3974
+ export type TopologyClass112 = "verdict";
4044
3975
  /**
4045
3976
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4046
3977
  */
4047
- export type EventCid30 = string;
3978
+ export type EventCid29 = string;
4048
3979
  /**
4049
3980
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4050
3981
  */
4051
- export type PriorEventHash30 = string | null;
3982
+ export type PriorEventHash29 = string | null;
4052
3983
  /**
4053
3984
  * Causal Ancestry markers required to resolve decentralized event ordering.
4054
3985
  */
4055
- export type Timestamp30 = number;
3986
+ export type Timestamp29 = number;
4056
3987
  /**
4057
3988
  * The cryptographic nonce uniquely identifying the intervention request.
4058
3989
  */
@@ -4088,16 +4019,16 @@ export type LivenessChallengeHash = string;
4088
4019
  /**
4089
4020
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4090
4021
  */
4091
- export type EventCid31 = string;
4022
+ export type EventCid30 = string;
4092
4023
  /**
4093
4024
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4094
4025
  */
4095
- export type PriorEventHash31 = string | null;
4026
+ export type PriorEventHash30 = string | null;
4096
4027
  /**
4097
4028
  * Causal Ancestry markers required to resolve decentralized event ordering.
4098
4029
  */
4099
- export type Timestamp31 = number;
4100
- export type TopologyClass114 = "custody_receipt";
4030
+ export type Timestamp30 = number;
4031
+ export type TopologyClass113 = "custody_receipt";
4101
4032
  /**
4102
4033
  * Unique identifier for this chain-of-custody entry.
4103
4034
  */
@@ -4125,16 +4056,16 @@ export type RedactionTimestampUnixNano = number;
4125
4056
  /**
4126
4057
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4127
4058
  */
4128
- export type EventCid32 = string;
4059
+ export type EventCid31 = string;
4129
4060
  /**
4130
4061
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4131
4062
  */
4132
- export type PriorEventHash32 = string | null;
4063
+ export type PriorEventHash31 = string | null;
4133
4064
  /**
4134
4065
  * Causal Ancestry markers required to resolve decentralized event ordering.
4135
4066
  */
4136
- export type Timestamp32 = number;
4137
- export type TopologyClass115 = "defeasible_attack";
4067
+ export type Timestamp31 = number;
4068
+ export type TopologyClass114 = "defeasible_attack";
4138
4069
  /**
4139
4070
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
4140
4071
  */
@@ -4150,16 +4081,16 @@ export type TargetClaimCid = string;
4150
4081
  /**
4151
4082
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4152
4083
  */
4153
- export type EventCid33 = string;
4084
+ export type EventCid32 = string;
4154
4085
  /**
4155
4086
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4156
4087
  */
4157
- export type PriorEventHash33 = string | null;
4088
+ export type PriorEventHash32 = string | null;
4158
4089
  /**
4159
4090
  * Causal Ancestry markers required to resolve decentralized event ordering.
4160
4091
  */
4161
- export type Timestamp33 = number;
4162
- export type TopologyClass116 = "epistemic_rejection";
4092
+ export type Timestamp32 = number;
4093
+ export type TopologyClass115 = "epistemic_rejection";
4163
4094
  export type ReceiptCid1 = string;
4164
4095
  export type FailedProjectionCid = string;
4165
4096
  export type ViolatedAlgebraicConstraint = string;
@@ -4168,16 +4099,16 @@ export type StochasticMutationGradient = string;
4168
4099
  /**
4169
4100
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4170
4101
  */
4171
- export type EventCid34 = string;
4102
+ export type EventCid33 = string;
4172
4103
  /**
4173
4104
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
4174
4105
  */
4175
- export type PriorEventHash34 = string | null;
4106
+ export type PriorEventHash33 = string | null;
4176
4107
  /**
4177
4108
  * The precise temporal coordinate of the event realization.
4178
4109
  */
4179
- export type Timestamp34 = number;
4180
- export type TopologyClass117 = "formal_verification_receipt";
4110
+ export type Timestamp33 = number;
4111
+ export type TopologyClass116 = "formal_verification_receipt";
4181
4112
  /**
4182
4113
  * The definitive Boolean evaluating whether the proof succeeded, the program is satisfiable, or the deduction holds true.
4183
4114
  */
@@ -4196,43 +4127,43 @@ export type FailingContext = string | null;
4196
4127
  export type ExtractedBindings = {
4197
4128
  [k: string]: JsonPrimitiveState;
4198
4129
  }[];
4199
- export type TopologyClass118 = "belief_modulation";
4130
+ export type TopologyClass117 = "belief_modulation";
4200
4131
  export type ReceiptCid2 = string;
4201
4132
  /**
4202
4133
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4203
4134
  */
4204
- export type EventCid35 = string;
4135
+ export type EventCid34 = string;
4205
4136
  /**
4206
4137
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4207
4138
  */
4208
- export type PriorEventHash35 = string | null;
4139
+ export type PriorEventHash34 = string | null;
4209
4140
  /**
4210
4141
  * Causal Ancestry markers required to resolve decentralized event ordering.
4211
4142
  */
4212
- export type Timestamp35 = number;
4143
+ export type Timestamp34 = number;
4213
4144
  export type TargetGraphCid4 = string;
4214
4145
  export type SeveredEdgeCids = string[];
4215
- export type TopologyClass119 = "rdf_export_receipt";
4146
+ export type TopologyClass118 = "rdf_export_receipt";
4216
4147
  export type ExportCid1 = string;
4217
4148
  /**
4218
4149
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4219
4150
  */
4220
- export type EventCid36 = string;
4151
+ export type EventCid35 = string;
4221
4152
  /**
4222
4153
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4223
4154
  */
4224
- export type PriorEventHash36 = string | null;
4155
+ export type PriorEventHash35 = string | null;
4225
4156
  /**
4226
4157
  * Causal Ancestry markers required to resolve decentralized event ordering.
4227
4158
  */
4228
- export type Timestamp36 = number;
4159
+ export type Timestamp35 = number;
4229
4160
  export type SerializedPayload = string;
4230
4161
  export type RdfTripleCount = number;
4231
4162
  export type Sha256GraphHash = string;
4232
- export type EventCid37 = string;
4233
- export type PriorEventHash37 = string | null;
4234
- export type Timestamp37 = number;
4235
- export type TopologyClass120 = "epistemic_starvation";
4163
+ export type EventCid36 = string;
4164
+ export type PriorEventHash36 = string | null;
4165
+ export type Timestamp36 = number;
4166
+ export type TopologyClass119 = "epistemic_starvation";
4236
4167
  /**
4237
4168
  * The cryptographic pointer to the specific edge that failed empirical grounding.
4238
4169
  */
@@ -4245,10 +4176,10 @@ export type FailedCitations = EvidentiaryCitationState[];
4245
4176
  * The semantic explanation for the starvation (e.g., 'Maximum search retries exhausted').
4246
4177
  */
4247
4178
  export type DiagnosticReason = string;
4248
- export type EventCid38 = string;
4249
- export type PriorEventHash38 = string | null;
4250
- export type Timestamp38 = number;
4251
- export type TopologyClass121 = "sparql_query_result";
4179
+ export type EventCid37 = string;
4180
+ export type PriorEventHash37 = string | null;
4181
+ export type Timestamp37 = number;
4182
+ export type TopologyClass120 = "sparql_query_result";
4252
4183
  /**
4253
4184
  * A pointer back to the SPARQLQueryIntent that authorized this execution.
4254
4185
  */
@@ -4260,7 +4191,7 @@ export type ExecutionTimeMs = number;
4260
4191
  /**
4261
4192
  * Discriminator for the OracleExecutionReceipt topology.
4262
4193
  */
4263
- export type TopologyClass122 = "oracle_execution_receipt";
4194
+ export type TopologyClass121 = "oracle_execution_receipt";
4264
4195
  /**
4265
4196
  * The SHA-256 hash of the complete execution payload, providing undeniable cryptographic provenance for the Merkle-DAG audit trail.
4266
4197
  */
@@ -4277,6 +4208,34 @@ export type TokensBurned = number;
4277
4208
  * An optional cryptographic signature from a Human-in-the-Loop (HITL) operator attesting to the correctness of the execution result. Populated only when the Temporal workflow escalates to manual review.
4278
4209
  */
4279
4210
  export type HumanAttestationSignature = string | null;
4211
+ /**
4212
+ * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4213
+ */
4214
+ export type EventCid38 = string;
4215
+ /**
4216
+ * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4217
+ */
4218
+ export type PriorEventHash38 = string | null;
4219
+ /**
4220
+ * Causal Ancestry markers required to resolve decentralized event ordering.
4221
+ */
4222
+ export type Timestamp38 = number;
4223
+ /**
4224
+ * The type of the security violation payload.
4225
+ */
4226
+ export type TopologyClass122 = "guardrail_violation_event";
4227
+ /**
4228
+ * Unique identifier for the violation event.
4229
+ */
4230
+ export type ViolationId = string;
4231
+ /**
4232
+ * The HTTP status code returned by the Guardrails proxy.
4233
+ */
4234
+ export type StatusCode = number;
4235
+ /**
4236
+ * The classification of the violation (e.g., 'pii_leak', 'toxic_content').
4237
+ */
4238
+ export type ViolationType = string;
4280
4239
  /**
4281
4240
  * A discriminated union of workflow topologies.
4282
4241
  */
@@ -4495,24 +4454,6 @@ export type MagnitudeUnit = string;
4495
4454
  * The declarative array of specialized functional expert clusters (e.g., 'falsifier', 'synthesizer') physically present in this model's architecture.
4496
4455
  */
4497
4456
  export type SupportedFunctionalExperts = string[];
4498
- /**
4499
- * Unique identifier for the constitutional rule.
4500
- */
4501
- export type RuleCid1 = string;
4502
- /**
4503
- * The definitive causal constraint or heuristic boundary enforced by this rule.
4504
- */
4505
- export type Description10 = string;
4506
- /**
4507
- * The categorical magnitude of the systemic breach enacted upon rule violation.
4508
- */
4509
- export type Severity = "low" | "medium" | "high" | "critical";
4510
- /**
4511
- * The explicit, structurally bounded set of forbidden semantic intents.
4512
- *
4513
- * @maxItems 1000
4514
- */
4515
- export type ForbiddenIntents1 = string[];
4516
4457
  /**
4517
4458
  * Forces non-destructive graph mutations.
4518
4459
  */
@@ -4611,6 +4552,18 @@ export type DistributionShapeProfile = "gaussian" | "uniform" | "beta";
4611
4552
  * Directed edges defining the topological sort (chronological flow) of the document.
4612
4553
  */
4613
4554
  export type ChronologicalFlowEdges = [unknown, unknown][];
4555
+ /**
4556
+ * The minimal required PRM score improvement across the lookback window to justify continued compute.
4557
+ */
4558
+ export type ConvergenceDeltaEpsilon = number;
4559
+ /**
4560
+ * The N-step temporal window over which the PRM gradient is calculated.
4561
+ */
4562
+ export type LookbackWindowSteps = number;
4563
+ /**
4564
+ * The burn-in period before convergence logic is activated.
4565
+ */
4566
+ export type MinimumReasoningSteps = number;
4614
4567
  /**
4615
4568
  * A Python 3.14 t-string template definition for dynamic UI grid evaluation.
4616
4569
  */
@@ -4740,6 +4693,18 @@ export type TestTimeMultiplier = number;
4740
4693
  * The absolute integer limit on how many times the orchestrator can recursively multiply the compute budget before forcing a SystemFaultEvent.
4741
4694
  */
4742
4695
  export type MaxEscalationTiers = number;
4696
+ /**
4697
+ * The Colang specification version.
4698
+ */
4699
+ export type ColangVersion = "1.0" | "2.0";
4700
+ /**
4701
+ * The raw Colang (.co) state machine configuration.
4702
+ */
4703
+ export type ColangPayload = string;
4704
+ /**
4705
+ * The categorical magnitude of the systemic breach enacted upon rule violation.
4706
+ */
4707
+ export type Severity = "low" | "medium" | "high" | "critical";
4743
4708
  /**
4744
4709
  * Absolute recursive depth limit for DAG deserialization.
4745
4710
  */
@@ -4874,6 +4839,22 @@ export type SopCid = string;
4874
4839
  * The exact topological flow between step_cids.
4875
4840
  */
4876
4841
  export type ChronologicalFlowEdges1 = [unknown, unknown][];
4842
+ /**
4843
+ * If a ThoughtBranchState's prm_score falls below this threshold, the orchestrator MUST halt its generation.
4844
+ */
4845
+ export type PruningThreshold = number;
4846
+ /**
4847
+ * The absolute limit on how many times the agent can start a new branch before throwing a SystemFaultEvent.
4848
+ */
4849
+ export type MaxBacktracksAllowed = number;
4850
+ /**
4851
+ * The specific PRM model used to score the logic (e.g., 'math-prm-v2').
4852
+ */
4853
+ export type EvaluatorMatrixName = string | null;
4854
+ /**
4855
+ * The strict array of Process Reward Contracts evaluating the logic.
4856
+ */
4857
+ export type PrmEvaluations = ProcessRewardContract[];
4877
4858
  /**
4878
4859
  * AGENT INSTRUCTION: Defines the minimum cryptographic isolation perimeter required for this node's thermodynamic execution.
4879
4860
  *
@@ -4972,14 +4953,6 @@ export type CategoricalCohorts = string[];
4972
4953
  * The valid chronological windows encompassing the artifact.
4973
4954
  */
4974
4955
  export type TemporalObservationHorizons = TemporalBoundsProfile2[];
4975
- /**
4976
- * Name of the governance policy.
4977
- */
4978
- export type PolicyName = string;
4979
- /**
4980
- * The explicit array of constitutional rules included in this policy.
4981
- */
4982
- export type Rules1 = ConstitutionalPolicy[];
4983
4956
  /**
4984
4957
  * How to flatten SemanticNodeState.
4985
4958
  */
@@ -5183,7 +5156,6 @@ export type RhetoricalStructureProfile1 = "premise" | "conclusion" | "elaboratio
5183
5156
  * MCP ROUTING TRIGGERS: Quantitative Risk Assessment, Game Theory, Cybernetic Governance, Structural Circuit Breaker, Utility Theory
5184
5157
  */
5185
5158
  export type RiskLevelPolicy = "safe" | "standard" | "critical";
5186
- export type SanitizationActionIntent = "redact" | "hash" | "drop_event" | "trigger_quarantine";
5187
5159
  /**
5188
5160
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this semantic edge to the Merkle-DAG.
5189
5161
  */
@@ -5393,7 +5365,6 @@ export interface CoReasonSharedKernelOntology {
5393
5365
  ConsensusFederationTopologyManifest?: ConsensusFederationTopologyManifest;
5394
5366
  ConsensusPolicy?: ConsensusPolicy;
5395
5367
  ConstitutionalAmendmentIntent?: ConstitutionalAmendmentIntent;
5396
- ConstitutionalPolicy?: ConstitutionalPolicy;
5397
5368
  ConstrainedDecodingPolicy?: ConstrainedDecodingPolicy;
5398
5369
  ContextExpansionPolicy?: ContextExpansionPolicy;
5399
5370
  ContextualSemanticResolutionIntent?: ContextualSemanticResolutionIntent;
@@ -5429,6 +5400,7 @@ export interface CoReasonSharedKernelOntology {
5429
5400
  DocumentLayoutManifest?: DocumentLayoutManifest;
5430
5401
  DocumentLayoutRegionState?: DocumentLayoutRegionState;
5431
5402
  DraftingIntent?: DraftingIntent;
5403
+ DynamicConvergenceSLA?: DynamicConvergenceSLA;
5432
5404
  DynamicLayoutManifest?: DynamicLayoutManifest;
5433
5405
  DynamicManifoldProjectionManifest?: DynamicManifoldProjectionManifest1;
5434
5406
  DynamicRoutingManifest?: DynamicRoutingManifest;
@@ -5451,6 +5423,7 @@ export interface CoReasonSharedKernelOntology {
5451
5423
  EpistemicEscalationContract?: EpistemicEscalationContract;
5452
5424
  EpistemicFlowStateReceipt?: EpistemicFlowStateReceipt;
5453
5425
  EpistemicGroundedTaskManifest?: EpistemicGroundedTaskManifest;
5426
+ EpistemicGuardrailsManifest?: EpistemicGuardrailsManifest;
5454
5427
  EpistemicHydrationPolicy?: EpistemicHydrationPolicy;
5455
5428
  EpistemicLedgerState?: EpistemicLedgerState;
5456
5429
  EpistemicLogEvent?: EpistemicLogEvent;
@@ -5500,10 +5473,10 @@ export interface CoReasonSharedKernelOntology {
5500
5473
  GlobalGovernancePolicy?: GlobalGovernancePolicy;
5501
5474
  GlobalSemanticInvariantProfile?: GlobalSemanticInvariantProfile;
5502
5475
  GlobalSemanticProfile?: GlobalSemanticProfile1;
5503
- GovernancePolicy?: GovernancePolicy;
5504
5476
  GradingCriterionProfile?: GradingCriterionProfile;
5505
5477
  GrammarPanelProfile?: GrammarPanelProfile1;
5506
5478
  GraphFlatteningPolicy?: GraphFlatteningPolicy;
5479
+ GuardrailViolationEvent?: GuardrailViolationEvent;
5507
5480
  HTTPTransportProfile?: HTTPTransportProfile;
5508
5481
  HardwareEnclaveReceipt?: HardwareEnclaveReceipt;
5509
5482
  HierarchicalDOMManifest?: HierarchicalDOMManifest;
@@ -5562,7 +5535,6 @@ export interface CoReasonSharedKernelOntology {
5562
5535
  NeurosymbolicIngestionTopologyManifest?: NeurosymbolicIngestionTopologyManifest;
5563
5536
  NeurosymbolicVerificationTopologyManifest?: NeurosymbolicVerificationTopologyManifest;
5564
5537
  NodeCIDState?: NodeCIDState;
5565
- NormativeDriftEvent?: NormativeDriftEvent;
5566
5538
  ObservabilityLODPolicy?: ObservabilityLODPolicy;
5567
5539
  ObservationEvent?: ObservationEvent;
5568
5540
  OntologicalAlignmentPolicy?: OntologicalAlignmentPolicy;
@@ -5587,6 +5559,7 @@ export interface CoReasonSharedKernelOntology {
5587
5559
  PredictionMarketState?: PredictionMarketState;
5588
5560
  PresentationManifest?: PresentationManifest;
5589
5561
  ProceduralMetadataManifest?: ProceduralMetadataManifest;
5562
+ ProcessRewardContract?: ProcessRewardContract;
5590
5563
  ProfileCIDState?: ProfileCIDState;
5591
5564
  QoSClassificationProfile?: QoSClassificationProfile;
5592
5565
  QuarantineIntent?: QuarantineIntent;
@@ -5594,7 +5567,6 @@ export interface CoReasonSharedKernelOntology {
5594
5567
  RDFExportReceipt?: RDFExportReceipt;
5595
5568
  RDFSerializationIntent?: RDFSerializationIntent;
5596
5569
  ReasoningEngineeringPolicy?: ReasoningEngineeringPolicy;
5597
- RedactionPolicy?: RedactionPolicy;
5598
5570
  RhetoricalStructureProfile?: RhetoricalStructureProfile1;
5599
5571
  RiskLevelPolicy?: RiskLevelPolicy;
5600
5572
  RollbackIntent?: RollbackIntent;
@@ -5608,12 +5580,10 @@ export interface CoReasonSharedKernelOntology {
5608
5580
  SaeFeatureActivationState?: SaeFeatureActivationState;
5609
5581
  SaeLatentPolicy?: SaeLatentPolicy;
5610
5582
  SalienceProfile?: SalienceProfile;
5611
- SanitizationActionIntent?: SanitizationActionIntent;
5612
5583
  ScalePolicy?: ScalePolicy;
5613
5584
  SchemaDrivenExtractionSLA?: SchemaDrivenExtractionSLA;
5614
5585
  SecureSubSessionState?: SecureSubSessionState;
5615
5586
  SelfCorrectionPolicy?: SelfCorrectionPolicy;
5616
- SemanticClassificationProfile?: SemanticClassificationProfile;
5617
5587
  SemanticDiscoveryIntent?: SemanticDiscoveryIntent;
5618
5588
  SemanticEdgeState?: SemanticEdgeState;
5619
5589
  SemanticFirewallPolicy?: SemanticFirewallPolicy;
@@ -8849,47 +8819,12 @@ export interface ConstrainedDecodingPolicy {
8849
8819
  export interface SemanticFlowPolicy {
8850
8820
  policy_cid: PolicyCid;
8851
8821
  active?: Active1;
8852
- rules?: Rules;
8853
8822
  /**
8854
8823
  * The active cognitive defense perimeter against adversarial control-flow overrides.
8855
8824
  */
8856
8825
  semantic_firewall?: SemanticFirewallPolicy | null;
8857
8826
  latent_firewalls?: LatentFirewalls;
8858
8827
  }
8859
- /**
8860
- * CoReason Shared Kernel Ontology
8861
- *
8862
- * AGENT INSTRUCTION: Defines a deterministic Data Sanitization heuristic mapped to a
8863
- * specific SemanticClassificationProfile (e.g., Bell-LaPadula clearance levels). As a
8864
- * ...Policy suffix, this object defines rigid mathematical boundaries that the orchestrator
8865
- * must enforce globally.
8866
- *
8867
- * CAUSAL AFFORDANCE: Executes a rigid regex-bounded search-and-replace algorithm via
8868
- * target_regex_pattern to mutate or mask toxic data payloads, substituting matches with a
8869
- * safe replacement_token. The action (SanitizationActionIntent) dictates the exact
8870
- * sanitization method.
8871
- *
8872
- * EPISTEMIC BOUNDS: The target_regex_pattern is strictly capped at max_length=200 to
8873
- * mathematically prevent ReDoS (Regular Expression Denial of Service) CPU exhaustion. A
8874
- * secondary target_pattern (max_length=2000) provides a broader semantic entity match. The
8875
- * optional context_exclusion_zones array (max_length=100) is deterministically sorted by
8876
- * the @model_validator.
8877
- *
8878
- * MCP ROUTING TRIGGERS: Data Sanitization, Regular Expression DoS Prevention,
8879
- * Bell-LaPadula Model, Masking Heuristic, Algorithmic Redaction
8880
- */
8881
- export interface RedactionPolicy {
8882
- rule_cid: RuleCid;
8883
- classification: SemanticClassificationProfile1;
8884
- target_pattern: TargetPattern;
8885
- target_regex_pattern: TargetRegexPattern;
8886
- context_exclusion_zones?: ContextExclusionZones;
8887
- /**
8888
- * The required algorithmic response when this pattern is detected.
8889
- */
8890
- action: "redact" | "hash" | "drop_event" | "trigger_quarantine";
8891
- replacement_token?: ReplacementToken;
8892
- }
8893
8828
  /**
8894
8829
  * CoReason Shared Kernel Ontology
8895
8830
  *
@@ -11236,26 +11171,6 @@ export interface EpistemicPromotionEvent {
11236
11171
  crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
11237
11172
  compression_ratio: CompressionRatio;
11238
11173
  }
11239
- /**
11240
- * CoReason Shared Kernel Ontology
11241
- *
11242
- * AGENT INSTRUCTION: A cryptographically frozen historical fact tracking the Kullback-Leibler (KL) divergence between the swarm's active behavioral manifold and its foundational ConstitutionalPolicy.
11243
- *
11244
- * CAUSAL AFFORDANCE: Emits a deterministic topological signal that the causal graph is experiencing logical friction against the `tripped_rule_cid`, unlocking the injection of a System2RemediationIntent constraint.
11245
- *
11246
- * EPISTEMIC BOUNDS: Mathematically bounded by `measured_semantic_drift` (`le=18446744073709551615.0`) and cryptographically tied to `contradiction_proof_hash` (SHA-256 pattern `^[a-f0-9]{64}$`) proving the anomaly.
11247
- *
11248
- * MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
11249
- */
11250
- export interface NormativeDriftEvent {
11251
- event_cid: EventCid15;
11252
- prior_event_hash?: PriorEventHash15;
11253
- timestamp: Timestamp15;
11254
- topology_class?: TopologyClass98;
11255
- tripped_rule_cid: TrippedRuleCid;
11256
- measured_semantic_drift: MeasuredSemanticDrift;
11257
- contradiction_proof_hash: ContradictionProofHash;
11258
- }
11259
11174
  /**
11260
11175
  * CoReason Shared Kernel Ontology
11261
11176
  *
@@ -11268,10 +11183,10 @@ export interface NormativeDriftEvent {
11268
11183
  * MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
11269
11184
  */
11270
11185
  export interface PersistenceCommitReceipt {
11271
- event_cid: EventCid16;
11272
- prior_event_hash?: PriorEventHash16;
11273
- timestamp: Timestamp16;
11274
- topology_class?: TopologyClass99;
11186
+ event_cid: EventCid15;
11187
+ prior_event_hash?: PriorEventHash15;
11188
+ timestamp: Timestamp15;
11189
+ topology_class?: TopologyClass98;
11275
11190
  lakehouse_snapshot_cid: LakehouseSnapshotCid;
11276
11191
  committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
11277
11192
  target_table_uri: TargetTableUri;
@@ -11288,10 +11203,10 @@ export interface PersistenceCommitReceipt {
11288
11203
  * MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
11289
11204
  */
11290
11205
  export interface TokenBurnReceipt {
11291
- event_cid: EventCid17;
11292
- prior_event_hash?: PriorEventHash17;
11293
- timestamp: Timestamp17;
11294
- topology_class?: TopologyClass100;
11206
+ event_cid: EventCid16;
11207
+ prior_event_hash?: PriorEventHash16;
11208
+ timestamp: Timestamp16;
11209
+ topology_class?: TopologyClass99;
11295
11210
  tool_invocation_cid: ToolInvocationCid;
11296
11211
  input_tokens: InputTokens;
11297
11212
  output_tokens: OutputTokens;
@@ -11309,10 +11224,10 @@ export interface TokenBurnReceipt {
11309
11224
  * MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
11310
11225
  */
11311
11226
  export interface BudgetExhaustionEvent {
11312
- event_cid: EventCid18;
11313
- prior_event_hash?: PriorEventHash18;
11314
- timestamp: Timestamp18;
11315
- topology_class?: TopologyClass101;
11227
+ event_cid: EventCid17;
11228
+ prior_event_hash?: PriorEventHash17;
11229
+ timestamp: Timestamp17;
11230
+ topology_class?: TopologyClass100;
11316
11231
  exhausted_escrow_cid: ExhaustedEscrowCid;
11317
11232
  final_burn_receipt_cid: FinalBurnReceiptCid;
11318
11233
  }
@@ -11328,10 +11243,10 @@ export interface BudgetExhaustionEvent {
11328
11243
  * MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
11329
11244
  */
11330
11245
  export interface EpistemicTelemetryEvent {
11331
- event_cid: EventCid19;
11332
- prior_event_hash?: PriorEventHash19;
11333
- timestamp: Timestamp19;
11334
- topology_class?: TopologyClass102;
11246
+ event_cid: EventCid18;
11247
+ prior_event_hash?: PriorEventHash18;
11248
+ timestamp: Timestamp18;
11249
+ topology_class?: TopologyClass101;
11335
11250
  interaction_modality: InteractionModality;
11336
11251
  target_node_cid: TargetNodeCid;
11337
11252
  dwell_duration_ms?: DwellDurationMs;
@@ -11352,10 +11267,10 @@ export interface EpistemicTelemetryEvent {
11352
11267
  * MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
11353
11268
  */
11354
11269
  export interface CognitivePredictionReceipt {
11355
- event_cid: EventCid20;
11356
- prior_event_hash?: PriorEventHash20;
11357
- timestamp: Timestamp20;
11358
- topology_class?: TopologyClass103;
11270
+ event_cid: EventCid19;
11271
+ prior_event_hash?: PriorEventHash19;
11272
+ timestamp: Timestamp19;
11273
+ topology_class?: TopologyClass102;
11359
11274
  source_chain_cid: SourceChainCid;
11360
11275
  target_source_concept: TargetSourceConcept;
11361
11276
  predicted_top_k_tokens: PredictedTopKTokens;
@@ -11372,10 +11287,10 @@ export interface CognitivePredictionReceipt {
11372
11287
  * MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
11373
11288
  */
11374
11289
  export interface EpistemicAxiomVerificationReceipt {
11375
- event_cid: EventCid21;
11376
- prior_event_hash?: PriorEventHash21;
11377
- timestamp: Timestamp21;
11378
- topology_class?: TopologyClass104;
11290
+ event_cid: EventCid20;
11291
+ prior_event_hash?: PriorEventHash20;
11292
+ timestamp: Timestamp20;
11293
+ topology_class?: TopologyClass103;
11379
11294
  source_prediction_cid: SourcePredictionCid;
11380
11295
  sequence_similarity_score: SequenceSimilarityScore;
11381
11296
  fact_score_passed: FactScorePassed;
@@ -11406,10 +11321,10 @@ export interface EpistemicAxiomVerificationReceipt {
11406
11321
  * Scalar Backpropagation, Acyclic Path
11407
11322
  */
11408
11323
  export interface EpistemicFlowStateReceipt {
11409
- event_cid: EventCid22;
11410
- prior_event_hash?: PriorEventHash22;
11411
- timestamp: Timestamp22;
11412
- topology_class?: TopologyClass105;
11324
+ event_cid: EventCid21;
11325
+ prior_event_hash?: PriorEventHash21;
11326
+ timestamp: Timestamp21;
11327
+ topology_class?: TopologyClass104;
11413
11328
  source_trajectory_cid: SourceTrajectoryCid;
11414
11329
  estimated_flow_value: EstimatedFlowValue;
11415
11330
  terminal_reward_factorized: TerminalRewardFactorized;
@@ -11435,10 +11350,10 @@ export interface EpistemicFlowStateReceipt {
11435
11350
  * Macroscopic Explanation, Deterministic Sorting
11436
11351
  */
11437
11352
  export interface CausalExplanationEvent {
11438
- event_cid: EventCid23;
11439
- prior_event_hash?: PriorEventHash23;
11440
- timestamp: Timestamp23;
11441
- topology_class?: TopologyClass106;
11353
+ event_cid: EventCid22;
11354
+ prior_event_hash?: PriorEventHash22;
11355
+ timestamp: Timestamp22;
11356
+ topology_class?: TopologyClass105;
11442
11357
  target_outcome_event_cid: TargetOutcomeEventCid;
11443
11358
  collective_intelligence: CollectiveIntelligenceProfile;
11444
11359
  agent_attributions: AgentAttributions;
@@ -11499,10 +11414,10 @@ export interface ShapleyAttributionReceipt {
11499
11414
  * Routing Heuristic, Semantic Wave Collapse
11500
11415
  */
11501
11416
  export interface IntentClassificationReceipt {
11502
- event_cid: EventCid24;
11503
- prior_event_hash?: PriorEventHash24;
11504
- timestamp: Timestamp24;
11505
- topology_class?: TopologyClass107;
11417
+ event_cid: EventCid23;
11418
+ prior_event_hash?: PriorEventHash23;
11419
+ timestamp: Timestamp23;
11420
+ topology_class?: TopologyClass106;
11506
11421
  raw_input_string: RawInputString;
11507
11422
  classified_intent: ClassifiedIntent;
11508
11423
  confidence_score: ConfidenceScore1;
@@ -11520,10 +11435,10 @@ export interface IntentClassificationReceipt {
11520
11435
  * MCP ROUTING TRIGGERS: Semantic Relational Record, Payload Injection, Hardware Guillotine, Structured Telemetry
11521
11436
  */
11522
11437
  export interface SemanticRelationalVectorState {
11523
- topology_class?: TopologyClass108;
11524
- event_cid: EventCid25;
11525
- prior_event_hash?: PriorEventHash25;
11526
- timestamp: Timestamp25;
11438
+ topology_class?: TopologyClass107;
11439
+ event_cid: EventCid24;
11440
+ prior_event_hash?: PriorEventHash24;
11441
+ timestamp: Timestamp24;
11527
11442
  ontology_class: UpperOntologyClassProfile;
11528
11443
  temporal_bounds: TemporalBoundsProfile1;
11529
11444
  formal_schema_urn?: FormalSchemaUrn1;
@@ -11565,10 +11480,10 @@ export interface PayloadInjectionZone {
11565
11480
  * MCP ROUTING TRIGGERS: Ontological Reification, Bimodal Semantic Transformation, Epistemic Ledger, Traceability Collapse
11566
11481
  */
11567
11482
  export interface OntologicalReificationReceipt {
11568
- topology_class?: TopologyClass109;
11569
- event_cid: EventCid26;
11570
- prior_event_hash?: PriorEventHash26;
11571
- timestamp: Timestamp26;
11483
+ topology_class?: TopologyClass108;
11484
+ event_cid: EventCid25;
11485
+ prior_event_hash?: PriorEventHash25;
11486
+ timestamp: Timestamp25;
11572
11487
  source_data_hash: SourceDataHash;
11573
11488
  target_namespace: TargetNamespace;
11574
11489
  algorithmic_mechanism: TransformationMechanismProfile;
@@ -11605,10 +11520,10 @@ export interface DempsterShaferBeliefVector2 {
11605
11520
  * MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
11606
11521
  */
11607
11522
  export interface CircuitBreakerEvent {
11608
- event_cid: EventCid27;
11609
- prior_event_hash?: PriorEventHash27;
11610
- timestamp: Timestamp27;
11611
- topology_class?: TopologyClass110;
11523
+ event_cid: EventCid26;
11524
+ prior_event_hash?: PriorEventHash26;
11525
+ timestamp: Timestamp26;
11526
+ topology_class?: TopologyClass109;
11612
11527
  /**
11613
11528
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
11614
11529
  */
@@ -11636,10 +11551,10 @@ export interface CircuitBreakerEvent {
11636
11551
  * Energy, Exogenous Perturbation, Epistemic Stress Test
11637
11552
  */
11638
11553
  export interface ExogenousEpistemicEvent {
11639
- event_cid: EventCid28;
11640
- prior_event_hash?: PriorEventHash28;
11641
- timestamp: Timestamp28;
11642
- topology_class?: TopologyClass111;
11554
+ event_cid: EventCid27;
11555
+ prior_event_hash?: PriorEventHash27;
11556
+ timestamp: Timestamp27;
11557
+ topology_class?: TopologyClass110;
11643
11558
  shock_cid: ShockCid;
11644
11559
  target_node_hash: TargetNodeHash;
11645
11560
  bayesian_surprise_score: BayesianSurpriseScore1;
@@ -11670,10 +11585,10 @@ export interface SimulationEscrowContract {
11670
11585
  * MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
11671
11586
  */
11672
11587
  export interface EpistemicLogEvent {
11673
- event_cid: EventCid29;
11674
- prior_event_hash?: PriorEventHash29;
11675
- topology_class?: TopologyClass112;
11676
- timestamp: Timestamp29;
11588
+ event_cid: EventCid28;
11589
+ prior_event_hash?: PriorEventHash28;
11590
+ topology_class?: TopologyClass111;
11591
+ timestamp: Timestamp28;
11677
11592
  level: Level;
11678
11593
  message: Message1;
11679
11594
  context_profile?: TelemetryContextProfile;
@@ -11703,10 +11618,10 @@ export interface TelemetryContextProfile {
11703
11618
  * MCP ROUTING TRIGGERS: Cryptographic Nonce, State Resumption, Replay Attack Prevention, Wetware Attestation, Liveness Resolution
11704
11619
  */
11705
11620
  export interface InterventionReceipt {
11706
- topology_class?: TopologyClass113;
11707
- event_cid: EventCid30;
11708
- prior_event_hash?: PriorEventHash30;
11709
- timestamp: Timestamp30;
11621
+ topology_class?: TopologyClass112;
11622
+ event_cid: EventCid29;
11623
+ prior_event_hash?: PriorEventHash29;
11624
+ timestamp: Timestamp29;
11710
11625
  intervention_request_cid: InterventionRequestCid;
11711
11626
  /**
11712
11627
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -11761,10 +11676,10 @@ export interface WetwareAttestationContract {
11761
11676
  * MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
11762
11677
  */
11763
11678
  export interface CustodyReceipt {
11764
- event_cid: EventCid31;
11765
- prior_event_hash?: PriorEventHash31;
11766
- timestamp: Timestamp31;
11767
- topology_class?: TopologyClass114;
11679
+ event_cid: EventCid30;
11680
+ prior_event_hash?: PriorEventHash30;
11681
+ timestamp: Timestamp30;
11682
+ topology_class?: TopologyClass113;
11768
11683
  custody_cid: CustodyCid;
11769
11684
  source_node_cid: SourceNodeCid;
11770
11685
  applied_policy_cid: AppliedPolicyCid;
@@ -11784,10 +11699,10 @@ export interface CustodyReceipt {
11784
11699
  * MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
11785
11700
  */
11786
11701
  export interface DefeasibleAttackEvent {
11787
- event_cid: EventCid32;
11788
- prior_event_hash?: PriorEventHash32;
11789
- timestamp: Timestamp32;
11790
- topology_class?: TopologyClass115;
11702
+ event_cid: EventCid31;
11703
+ prior_event_hash?: PriorEventHash31;
11704
+ timestamp: Timestamp31;
11705
+ topology_class?: TopologyClass114;
11791
11706
  attack_cid: AttackCid;
11792
11707
  source_claim_cid: SourceClaimCid;
11793
11708
  target_claim_cid: TargetClaimCid;
@@ -11808,10 +11723,10 @@ export interface DefeasibleAttackEvent {
11808
11723
  * MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
11809
11724
  */
11810
11725
  export interface EpistemicRejectionReceipt {
11811
- event_cid: EventCid33;
11812
- prior_event_hash?: PriorEventHash33;
11813
- timestamp: Timestamp33;
11814
- topology_class?: TopologyClass116;
11726
+ event_cid: EventCid32;
11727
+ prior_event_hash?: PriorEventHash32;
11728
+ timestamp: Timestamp32;
11729
+ topology_class?: TopologyClass115;
11815
11730
  receipt_cid: ReceiptCid1;
11816
11731
  failed_projection_cid: FailedProjectionCid;
11817
11732
  violated_algebraic_constraint: ViolatedAlgebraicConstraint;
@@ -11830,10 +11745,10 @@ export interface EpistemicRejectionReceipt {
11830
11745
  * MCP ROUTING TRIGGERS: System 2 Remediation, Mathematical Truth, Proof Verification, Epistemic Ledger
11831
11746
  */
11832
11747
  export interface FormalVerificationReceipt {
11833
- event_cid: EventCid34;
11834
- prior_event_hash?: PriorEventHash34;
11835
- timestamp: Timestamp34;
11836
- topology_class?: TopologyClass117;
11748
+ event_cid: EventCid33;
11749
+ prior_event_hash?: PriorEventHash33;
11750
+ timestamp: Timestamp33;
11751
+ topology_class?: TopologyClass116;
11837
11752
  /**
11838
11753
  * Pointer to the specific node or intent that requested this formal verification.
11839
11754
  */
@@ -11847,11 +11762,11 @@ export interface FormalVerificationReceipt {
11847
11762
  * CoReason Shared Kernel Ontology
11848
11763
  */
11849
11764
  export interface BeliefModulationReceipt {
11850
- topology_class?: TopologyClass118;
11765
+ topology_class?: TopologyClass117;
11851
11766
  receipt_cid: ReceiptCid2;
11852
- event_cid: EventCid35;
11853
- prior_event_hash?: PriorEventHash35;
11854
- timestamp: Timestamp35;
11767
+ event_cid: EventCid34;
11768
+ prior_event_hash?: PriorEventHash34;
11769
+ timestamp: Timestamp34;
11855
11770
  target_graph_cid: TargetGraphCid4;
11856
11771
  grounded_edges: GroundedEdges;
11857
11772
  severed_edge_cids: SeveredEdgeCids;
@@ -11863,11 +11778,11 @@ export interface GroundedEdges {
11863
11778
  * CoReason Shared Kernel Ontology
11864
11779
  */
11865
11780
  export interface RDFExportReceipt {
11866
- topology_class?: TopologyClass119;
11781
+ topology_class?: TopologyClass118;
11867
11782
  export_cid: ExportCid1;
11868
- event_cid: EventCid36;
11869
- prior_event_hash?: PriorEventHash36;
11870
- timestamp: Timestamp36;
11783
+ event_cid: EventCid35;
11784
+ prior_event_hash?: PriorEventHash35;
11785
+ timestamp: Timestamp35;
11871
11786
  serialized_payload: SerializedPayload;
11872
11787
  rdf_triple_count: RdfTripleCount;
11873
11788
  sha256_graph_hash: Sha256GraphHash;
@@ -11884,10 +11799,10 @@ export interface RDFExportReceipt {
11884
11799
  * MCP ROUTING TRIGGERS: Epistemic Starvation, Natural Language Inference, Truth Maintenance System, Defeasible Logic, Belief Mass Depletion
11885
11800
  */
11886
11801
  export interface EpistemicStarvationEvent {
11887
- event_cid: EventCid37;
11888
- prior_event_hash?: PriorEventHash37;
11889
- timestamp: Timestamp37;
11890
- topology_class?: TopologyClass120;
11802
+ event_cid: EventCid36;
11803
+ prior_event_hash?: PriorEventHash36;
11804
+ timestamp: Timestamp36;
11805
+ topology_class?: TopologyClass119;
11891
11806
  starved_edge_cid: StarvedEdgeCid;
11892
11807
  failed_citations: FailedCitations;
11893
11808
  diagnostic_reason: DiagnosticReason;
@@ -11904,10 +11819,10 @@ export interface EpistemicStarvationEvent {
11904
11819
  * MCP ROUTING TRIGGERS: SPARQL Result, RDF Bindings, Epistemic Projection, Payload Bounding, Ledger Commit
11905
11820
  */
11906
11821
  export interface SPARQLQueryResultReceipt {
11907
- event_cid: EventCid38;
11908
- prior_event_hash?: PriorEventHash38;
11909
- timestamp: Timestamp38;
11910
- topology_class?: TopologyClass121;
11822
+ event_cid: EventCid37;
11823
+ prior_event_hash?: PriorEventHash37;
11824
+ timestamp: Timestamp37;
11825
+ topology_class?: TopologyClass120;
11911
11826
  query_intent_cid: QueryIntentCid;
11912
11827
  returned_bindings: ReturnedBindings;
11913
11828
  execution_time_ms: ExecutionTimeMs;
@@ -11930,12 +11845,39 @@ export interface ReturnedBindings {
11930
11845
  * MCP ROUTING TRIGGERS: Execution Audit, Merkle-DAG Provenance, Thermodynamic Accounting, Oracle Telemetry, Human-in-the-Loop Attestation, Cryptographic Receipt
11931
11846
  */
11932
11847
  export interface OracleExecutionReceipt {
11933
- topology_class?: TopologyClass122;
11848
+ topology_class?: TopologyClass121;
11934
11849
  execution_hash: ExecutionHash;
11935
11850
  solver_urn: SolverUrn;
11936
11851
  tokens_burned: TokensBurned;
11937
11852
  human_attestation_signature?: HumanAttestationSignature;
11938
11853
  }
11854
+ /**
11855
+ * CoReason Shared Kernel Ontology
11856
+ *
11857
+ * AGENT INSTRUCTION: Tracks a deterministic security boundary violation emitted by the NeMo Guardrails proxy. This event is a frozen historical fact representing a failed cryptographic or semantic check.
11858
+ *
11859
+ * CAUSAL AFFORDANCE: Triggers an immediate suspension of the active execution trajectory and publishes a high-severity alert to the telemetry broker for remediation.
11860
+ *
11861
+ * EPISTEMIC BOUNDS: The event must include the specific HTTP status code (e.g., 401, 403, 406, 422) and the opaque violation manifest emitted by the proxy.
11862
+ *
11863
+ * MCP ROUTING TRIGGERS: Security, Guardrails, Data Loss Prevention, Policy Violation, Telemetry
11864
+ */
11865
+ export interface GuardrailViolationEvent {
11866
+ event_cid: EventCid38;
11867
+ prior_event_hash?: PriorEventHash38;
11868
+ timestamp: Timestamp38;
11869
+ topology_class?: TopologyClass122;
11870
+ violation_id: ViolationId;
11871
+ status_code: StatusCode;
11872
+ violation_type: ViolationType;
11873
+ violation_details?: ViolationDetails;
11874
+ }
11875
+ /**
11876
+ * Detailed manifest from the Guardrails proxy.
11877
+ */
11878
+ export interface ViolationDetails {
11879
+ [k: string]: unknown;
11880
+ }
11939
11881
  /**
11940
11882
  * CoReason Shared Kernel Ontology
11941
11883
  *
@@ -12346,31 +12288,6 @@ export interface ComputeRateContract1 {
12346
12288
  cost_per_million_output_tokens: CostPerMillionOutputTokens;
12347
12289
  magnitude_unit: MagnitudeUnit;
12348
12290
  }
12349
- /**
12350
- * CoReason Shared Kernel Ontology
12351
- *
12352
- * AGENT INSTRUCTION: Formalizes a discrete normative axiom within a Constitutional AI
12353
- * framework to prevent instrumental convergence. As a ...Policy suffix, this object defines
12354
- * rigid mathematical boundaries that the orchestrator must enforce globally.
12355
- *
12356
- * CAUSAL AFFORDANCE: Establishes a hard structural boundary that mathematically repels the
12357
- * swarm's generative trajectory away from forbidden semantic manifolds. Violation severity
12358
- * is classified via a strict Literal["low", "medium", "high", "critical"] tier.
12359
- *
12360
- * EPISTEMIC BOUNDS: Geometrically restricts the state space by blacklisting specific
12361
- * execution branches via the forbidden_intents array (max_length=1000),
12362
- * deterministically sorted by @model_validator to preserve RFC 8785 canonical hashing.
12363
- * The rule_cid is bounded to a 128-char CID.
12364
- *
12365
- * MCP ROUTING TRIGGERS: Constitutional AI, Value Alignment, Normative Axiom, Instrumental
12366
- * Convergence, Semantic Boundary
12367
- */
12368
- export interface ConstitutionalPolicy {
12369
- rule_cid: RuleCid1;
12370
- description: Description10;
12371
- severity: Severity;
12372
- forbidden_intents: ForbiddenIntents1;
12373
- }
12374
12291
  /**
12375
12292
  * CoReason Shared Kernel Ontology
12376
12293
  *
@@ -12617,6 +12534,30 @@ export interface DocumentLayoutManifest {
12617
12534
  export interface Blocks1 {
12618
12535
  [k: string]: DocumentLayoutRegionState;
12619
12536
  }
12537
+ /**
12538
+ * CoReason Shared Kernel Ontology
12539
+ *
12540
+ * AGENT INSTRUCTION: Defines the mathematical Optimal Stopping Theory boundaries for Monte
12541
+ * Carlo Tree Search (MCTS) and test-time compute scaling. As an ...SLA suffix, this object
12542
+ * enforces rigid mathematical boundaries that the orchestrator must respect globally.
12543
+ *
12544
+ * CAUSAL AFFORDANCE: Triggers an early termination circuit breaker on reasoning trajectories
12545
+ * when the gradient of the Process Reward Model (PRM) score falls below the epsilon delta,
12546
+ * halting unnecessary probability wave expansion and preserving VRAM.
12547
+ *
12548
+ * EPISTEMIC BOUNDS: Mathematically constrained by convergence_delta_epsilon (ge=0.0, le=1.0)
12549
+ * over a strictly positive lookback_window_steps (gt=0, le=18446744073709551615). Physically mandates
12550
+ * a minimum_reasoning_steps burn-in period (gt=0, le=18446744073709551615) to prevent premature
12551
+ * collapse before the latent space is adequately explored.
12552
+ *
12553
+ * MCP ROUTING TRIGGERS: Optimal Stopping Theory, MCTS, PRM Convergence, Circuit Breaker,
12554
+ * Bellman Equation
12555
+ */
12556
+ export interface DynamicConvergenceSLA {
12557
+ convergence_delta_epsilon: ConvergenceDeltaEpsilon;
12558
+ lookback_window_steps: LookbackWindowSteps;
12559
+ minimum_reasoning_steps: MinimumReasoningSteps;
12560
+ }
12620
12561
  /**
12621
12562
  * CoReason Shared Kernel Ontology
12622
12563
  *
@@ -12968,6 +12909,26 @@ export interface EpistemicEscalationContract {
12968
12909
  test_time_multiplier: TestTimeMultiplier;
12969
12910
  max_escalation_tiers: MaxEscalationTiers;
12970
12911
  }
12912
+ /**
12913
+ * CoReason Shared Kernel Ontology
12914
+ *
12915
+ * AGENT INSTRUCTION: A declarative proxy that outputs standard NeMo Colang format (.co files)
12916
+ * to configure the NeMo Guardrails reverse-proxy in the Envoy mesh.
12917
+ *
12918
+ * CAUSAL AFFORDANCE: Defines the exact Colang state machine configuration for intercepting
12919
+ * and overriding LLM outputs before they hit the network.
12920
+ *
12921
+ * EPISTEMIC BOUNDS: Bounded by a strict max_length=100000 on the raw Colang payload
12922
+ * to prevent memory exhaustion. The @model_validator deterministically sorts the required
12923
+ * imports.
12924
+ *
12925
+ * MCP ROUTING TRIGGERS: NeMo Guardrails, Colang, Reverse Proxy, Constitutional Alignment, Envoy Mesh
12926
+ */
12927
+ export interface EpistemicGuardrailsManifest {
12928
+ colang_version?: ColangVersion;
12929
+ colang_payload: ColangPayload;
12930
+ severity?: Severity;
12931
+ }
12971
12932
  /**
12972
12933
  * CoReason Shared Kernel Ontology
12973
12934
  *
@@ -13198,23 +13159,24 @@ export interface ProceduralMetadataManifest {
13198
13159
  /**
13199
13160
  * CoReason Shared Kernel Ontology
13200
13161
  *
13201
- * AGENT INSTRUCTION: Encodes a macroscopic Petri net or Directed Acyclic Graph (DAG)
13202
- * formalizing standard operating procedures into mathematically traversable state
13203
- * transitions. As a ...Manifest suffix, this defines a frozen, N-dimensional coordinate
13204
- * state.
13162
+ * AGENT INSTRUCTION: Encodes a macroscopic Petri net or Directed Acyclic Graph (DAG)
13163
+ * formalizing standard operating procedures into mathematically traversable state
13164
+ * transitions. As a ...Manifest suffix, this defines a frozen, N-dimensional coordinate
13165
+ * state.
13205
13166
  *
13206
- * CAUSAL AFFORDANCE: Physically bounds the executing agent (target_persona:
13207
- * ProfileCIDState) to a deterministic sequence of CognitiveStateProfiles, unlocking
13208
- * the ability for the orchestrator to dynamically evaluate execution via Process Reward
13209
- * .
13167
+ * CAUSAL AFFORDANCE: Physically bounds the executing agent (target_persona:
13168
+ * ProfileCIDState) to a deterministic sequence of CognitiveStateProfiles, unlocking
13169
+ * the ability for the orchestrator to dynamically evaluate execution
13170
+ * via Process Reward Models (prm_evaluations: list[ProcessRewardContract]) at each
13171
+ * topological node.
13210
13172
  *
13211
- * EPISTEMIC BOUNDS: The cognitive_steps dictionary is constrained to max_length=1000
13212
- * to cap memory footprint. The @model_validator reject_ghost_nodes mathematically enforces
13213
- * referential integrity, guaranteeing that no chronological_flow_edges AND no
13214
- * structural_grammar_hashes point to an undefined state.
13173
+ * EPISTEMIC BOUNDS: The cognitive_steps dictionary is constrained to max_length=1000
13174
+ * to cap memory footprint. The @model_validator reject_ghost_nodes mathematically enforces
13175
+ * referential integrity, guaranteeing that no chronological_flow_edges AND no
13176
+ * structural_grammar_hashes point to an undefined state.
13215
13177
  *
13216
- * MCP ROUTING TRIGGERS: Petri Net, Directed Acyclic Graph, Process Reward Model,
13217
- * Topological Flow, Referential Integrity
13178
+ * MCP ROUTING TRIGGERS: Petri Net, Directed Acyclic Graph, Process Reward Model,
13179
+ * Topological Flow, Referential Integrity
13218
13180
  */
13219
13181
  export interface EpistemicSOPManifest {
13220
13182
  sop_cid: SopCid;
@@ -13225,6 +13187,7 @@ export interface EpistemicSOPManifest {
13225
13187
  cognitive_steps: CognitiveSteps;
13226
13188
  structural_grammar_hashes: StructuralGrammarHashes;
13227
13189
  chronological_flow_edges: ChronologicalFlowEdges1;
13190
+ prm_evaluations?: PrmEvaluations;
13228
13191
  }
13229
13192
  /**
13230
13193
  * Dictionary mapping step_cids to strict causal DAG constraints.
@@ -13238,6 +13201,26 @@ export interface CognitiveSteps {
13238
13201
  export interface StructuralGrammarHashes {
13239
13202
  [k: string]: string;
13240
13203
  }
13204
+ /**
13205
+ * CoReason Shared Kernel Ontology
13206
+ *
13207
+ * AGENT INSTRUCTION: Enforces the Step-Level Verification heuristics for Process Reward Models (PRMs) during non-monotonic reasoning searches and test-time compute.
13208
+ *
13209
+ * CAUSAL AFFORDANCE: Authorizes the orchestrator to physically prune hallucinating ThoughtBranchState vectors from the LatentScratchpadReceipt if their logit probabilities drop below the viable threshold, emulating rigorous Beam Search pruning.
13210
+ *
13211
+ * EPISTEMIC BOUNDS: Strictly bounds the search space geometry via `pruning_threshold` (`ge=0.0, le=1.0`) and mechanically caps State-Space Explosion through `max_backtracks_allowed` (`ge=0, le=18446744073709551615`).
13212
+ *
13213
+ * MCP ROUTING TRIGGERS: Process Reward Model, Beam Search Pruning, Latent Trajectory, State-Space Explosion, A* Search
13214
+ */
13215
+ export interface ProcessRewardContract {
13216
+ /**
13217
+ * The dynamic circuit breaker that halts the search when PRM variance converges, preventing VRAM waste.
13218
+ */
13219
+ convergence_sla?: DynamicConvergenceSLA | null;
13220
+ pruning_threshold: PruningThreshold;
13221
+ max_backtracks_allowed: MaxBacktracksAllowed;
13222
+ evaluator_matrix_name?: EvaluatorMatrixName;
13223
+ }
13241
13224
  /**
13242
13225
  * CoReason Shared Kernel Ontology
13243
13226
  *
@@ -13442,7 +13425,7 @@ export interface GenerativeTaxonomyManifest1 {
13442
13425
  * Bounding, ESG Constraint, Execution Envelope
13443
13426
  */
13444
13427
  export interface GlobalGovernancePolicy {
13445
- mandatory_license_rule: ConstitutionalPolicy1;
13428
+ mandatory_license_rule: EpistemicGuardrailsManifest1;
13446
13429
  max_budget_magnitude: MaxBudgetMagnitude1;
13447
13430
  /**
13448
13431
  * The mathematical CRDT ruleset governing distributed state synchronization.
@@ -13459,27 +13442,22 @@ export interface GlobalGovernancePolicy {
13459
13442
  /**
13460
13443
  * CoReason Shared Kernel Ontology
13461
13444
  *
13462
- * AGENT INSTRUCTION: Formalizes a discrete normative axiom within a Constitutional AI
13463
- * framework to prevent instrumental convergence. As a ...Policy suffix, this object defines
13464
- * rigid mathematical boundaries that the orchestrator must enforce globally.
13445
+ * AGENT INSTRUCTION: A declarative proxy that outputs standard NeMo Colang format (.co files)
13446
+ * to configure the NeMo Guardrails reverse-proxy in the Envoy mesh.
13465
13447
  *
13466
- * CAUSAL AFFORDANCE: Establishes a hard structural boundary that mathematically repels the
13467
- * swarm's generative trajectory away from forbidden semantic manifolds. Violation severity
13468
- * is classified via a strict Literal["low", "medium", "high", "critical"] tier.
13448
+ * CAUSAL AFFORDANCE: Defines the exact Colang state machine configuration for intercepting
13449
+ * and overriding LLM outputs before they hit the network.
13469
13450
  *
13470
- * EPISTEMIC BOUNDS: Geometrically restricts the state space by blacklisting specific
13471
- * execution branches via the forbidden_intents array (max_length=1000),
13472
- * deterministically sorted by @model_validator to preserve RFC 8785 canonical hashing.
13473
- * The rule_cid is bounded to a 128-char CID.
13451
+ * EPISTEMIC BOUNDS: Bounded by a strict max_length=100000 on the raw Colang payload
13452
+ * to prevent memory exhaustion. The @model_validator deterministically sorts the required
13453
+ * imports.
13474
13454
  *
13475
- * MCP ROUTING TRIGGERS: Constitutional AI, Value Alignment, Normative Axiom, Instrumental
13476
- * Convergence, Semantic Boundary
13455
+ * MCP ROUTING TRIGGERS: NeMo Guardrails, Colang, Reverse Proxy, Constitutional Alignment, Envoy Mesh
13477
13456
  */
13478
- export interface ConstitutionalPolicy1 {
13479
- rule_cid: RuleCid1;
13480
- description: Description10;
13481
- severity: Severity;
13482
- forbidden_intents: ForbiddenIntents1;
13457
+ export interface EpistemicGuardrailsManifest1 {
13458
+ colang_version?: ColangVersion;
13459
+ colang_payload: ColangPayload;
13460
+ severity?: Severity;
13483
13461
  }
13484
13462
  /**
13485
13463
  * CoReason Shared Kernel Ontology
@@ -13554,32 +13532,6 @@ export interface GlobalSemanticProfile1 {
13554
13532
  detected_modalities: DetectedModalities;
13555
13533
  token_density: TokenDensity;
13556
13534
  }
13557
- /**
13558
- * CoReason Shared Kernel Ontology
13559
- *
13560
- * AGENT INSTRUCTION: Aggregates discrete ConstitutionalPolicy nodes into a cohesive,
13561
- * version-controlled Normative Alignment Manifold. As a ...Policy suffix, this object
13562
- * defines rigid mathematical boundaries that the orchestrator must enforce globally.
13563
- *
13564
- * CAUSAL AFFORDANCE: Instructs the orchestrator to enforce a unified cybernetic governance
13565
- * model across all swarm trajectories, grounding generative actions in a specific semantic
13566
- * version (SemanticVersionState).
13567
- *
13568
- * EPISTEMIC BOUNDS: The topological integrity of the manifold is mathematically guaranteed
13569
- * by the @model_validator, which deterministically sorts the rules array by rule_cid to
13570
- * prevent Byzantine hash fractures across distributed nodes.
13571
- *
13572
- * MCP ROUTING TRIGGERS: Cybernetic Governance, Normative Alignment Manifold, Rule
13573
- * Aggregation, Version Control, RFC 8785 Canonicalization
13574
- */
13575
- export interface GovernancePolicy {
13576
- policy_name: PolicyName;
13577
- /**
13578
- * Semantic version of the governance policy.
13579
- */
13580
- version: string;
13581
- rules: Rules1;
13582
- }
13583
13535
  /**
13584
13536
  * CoReason Shared Kernel Ontology
13585
13537
  *