@coreason-ai/coreason-manifest 0.55.1 → 0.55.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/ontology.d.ts +381 -429
- package/package.json +1 -1
package/dist/ontology.d.ts
CHANGED
|
@@ -1202,7 +1202,7 @@ export type Justification = string;
|
|
|
1202
1202
|
*/
|
|
1203
1203
|
export type TopologyClass38 = "constitutional_amendment";
|
|
1204
1204
|
/**
|
|
1205
|
-
* The globally unique decentralized identifier (DID) anchoring the
|
|
1205
|
+
* The globally unique decentralized identifier (DID) anchoring the GuardrailViolationEvent that justified triggering this proposal.
|
|
1206
1206
|
*/
|
|
1207
1207
|
export type DriftEventCid = string;
|
|
1208
1208
|
/**
|
|
@@ -1940,17 +1940,10 @@ export type EnforceFunctionalIsolation = boolean;
|
|
|
1940
1940
|
*
|
|
1941
1941
|
* @minItems 1
|
|
1942
1942
|
*/
|
|
1943
|
-
export type PermittedClassificationTiers = [
|
|
1944
|
-
|
|
1945
|
-
|
|
1946
|
-
|
|
1947
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
|
|
1948
|
-
*
|
|
1949
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
|
|
1950
|
-
*
|
|
1951
|
-
* MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
|
|
1952
|
-
*/
|
|
1953
|
-
export type SemanticClassificationProfile = "public" | "internal" | "confidential" | "restricted";
|
|
1943
|
+
export type PermittedClassificationTiers = [
|
|
1944
|
+
"public" | "internal" | "confidential" | "restricted",
|
|
1945
|
+
...("public" | "internal" | "confidential" | "restricted")[]
|
|
1946
|
+
];
|
|
1954
1947
|
/**
|
|
1955
1948
|
* The declarative whitelist of strictly typed ontological node labels authorized for context projection.
|
|
1956
1949
|
*/
|
|
@@ -2214,40 +2207,6 @@ export type PolicyCid = string;
|
|
|
2214
2207
|
* Whether this policy is currently enforcing data sanitization.
|
|
2215
2208
|
*/
|
|
2216
2209
|
export type Active1 = boolean;
|
|
2217
|
-
/**
|
|
2218
|
-
* Unique identifier for the sanitization rule.
|
|
2219
|
-
*/
|
|
2220
|
-
export type RuleCid = string;
|
|
2221
|
-
/**
|
|
2222
|
-
* AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
|
|
2223
|
-
*
|
|
2224
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
|
|
2225
|
-
*
|
|
2226
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
|
|
2227
|
-
*
|
|
2228
|
-
* MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
|
|
2229
|
-
*/
|
|
2230
|
-
export type SemanticClassificationProfile1 = "public" | "internal" | "confidential" | "restricted";
|
|
2231
|
-
/**
|
|
2232
|
-
* The semantic entity type or declarative regex pattern to identify.
|
|
2233
|
-
*/
|
|
2234
|
-
export type TargetPattern = string;
|
|
2235
|
-
/**
|
|
2236
|
-
* The dynamic regex pattern to target.
|
|
2237
|
-
*/
|
|
2238
|
-
export type TargetRegexPattern = string;
|
|
2239
|
-
/**
|
|
2240
|
-
* Specific JSON paths where this rule should NOT apply.
|
|
2241
|
-
*/
|
|
2242
|
-
export type ContextExclusionZones = string[] | null;
|
|
2243
|
-
/**
|
|
2244
|
-
* The strictly typed string to insert if the action is 'redact'.
|
|
2245
|
-
*/
|
|
2246
|
-
export type ReplacementToken = string | null;
|
|
2247
|
-
/**
|
|
2248
|
-
* The array of sanitization rules to enforce.
|
|
2249
|
-
*/
|
|
2250
|
-
export type Rules = RedactionPolicy[];
|
|
2251
2210
|
/**
|
|
2252
2211
|
* The absolute physical ceiling of tokens allowed in a single ingress payload.
|
|
2253
2212
|
*/
|
|
@@ -3063,7 +3022,7 @@ export type AnyPresentationIntent = SemanticIntent | DraftingIntent | Adjudicati
|
|
|
3063
3022
|
/**
|
|
3064
3023
|
* A discriminated union of state events.
|
|
3065
3024
|
*/
|
|
3066
|
-
export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent |
|
|
3025
|
+
export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt | GuardrailViolationEvent;
|
|
3067
3026
|
/**
|
|
3068
3027
|
* Discriminator for temporal graph crdt.
|
|
3069
3028
|
*/
|
|
@@ -3631,38 +3590,10 @@ export type PriorEventHash15 = string | null;
|
|
|
3631
3590
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3632
3591
|
*/
|
|
3633
3592
|
export type Timestamp15 = number;
|
|
3634
|
-
/**
|
|
3635
|
-
* Discriminator type for a normative drift event.
|
|
3636
|
-
*/
|
|
3637
|
-
export type TopologyClass98 = "normative_drift";
|
|
3638
|
-
/**
|
|
3639
|
-
* The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
|
|
3640
|
-
*/
|
|
3641
|
-
export type TrippedRuleCid = string;
|
|
3642
|
-
/**
|
|
3643
|
-
* The calculated probabilistic delta showing how far the swarm's observed reality is diverging from the static rule.
|
|
3644
|
-
*/
|
|
3645
|
-
export type MeasuredSemanticDrift = number;
|
|
3646
|
-
/**
|
|
3647
|
-
* A cryptographic pointer to the internal scratchpad trace (ThoughtBranchState) definitively proving the rule is obsolete or causing a loop.
|
|
3648
|
-
*/
|
|
3649
|
-
export type ContradictionProofHash = string;
|
|
3650
|
-
/**
|
|
3651
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3652
|
-
*/
|
|
3653
|
-
export type EventCid16 = string;
|
|
3654
|
-
/**
|
|
3655
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3656
|
-
*/
|
|
3657
|
-
export type PriorEventHash16 = string | null;
|
|
3658
|
-
/**
|
|
3659
|
-
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3660
|
-
*/
|
|
3661
|
-
export type Timestamp16 = number;
|
|
3662
3593
|
/**
|
|
3663
3594
|
* Discriminator type for a persistence commit receipt.
|
|
3664
3595
|
*/
|
|
3665
|
-
export type
|
|
3596
|
+
export type TopologyClass98 = "persistence_commit";
|
|
3666
3597
|
/**
|
|
3667
3598
|
* The external cryptographic receipt generated by Iceberg/Delta.
|
|
3668
3599
|
*/
|
|
@@ -3678,19 +3609,19 @@ export type TargetTableUri = string;
|
|
|
3678
3609
|
/**
|
|
3679
3610
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3680
3611
|
*/
|
|
3681
|
-
export type
|
|
3612
|
+
export type EventCid16 = string;
|
|
3682
3613
|
/**
|
|
3683
3614
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3684
3615
|
*/
|
|
3685
|
-
export type
|
|
3616
|
+
export type PriorEventHash16 = string | null;
|
|
3686
3617
|
/**
|
|
3687
3618
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3688
3619
|
*/
|
|
3689
|
-
export type
|
|
3620
|
+
export type Timestamp16 = number;
|
|
3690
3621
|
/**
|
|
3691
3622
|
* Discriminator type for a token burn receipt.
|
|
3692
3623
|
*/
|
|
3693
|
-
export type
|
|
3624
|
+
export type TopologyClass99 = "token_burn";
|
|
3694
3625
|
/**
|
|
3695
3626
|
* A string linking this burn back to the specific ToolInvocationEvent CID.
|
|
3696
3627
|
*/
|
|
@@ -3710,19 +3641,19 @@ export type BurnMagnitude = number;
|
|
|
3710
3641
|
/**
|
|
3711
3642
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3712
3643
|
*/
|
|
3713
|
-
export type
|
|
3644
|
+
export type EventCid17 = string;
|
|
3714
3645
|
/**
|
|
3715
3646
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3716
3647
|
*/
|
|
3717
|
-
export type
|
|
3648
|
+
export type PriorEventHash17 = string | null;
|
|
3718
3649
|
/**
|
|
3719
3650
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3720
3651
|
*/
|
|
3721
|
-
export type
|
|
3652
|
+
export type Timestamp17 = number;
|
|
3722
3653
|
/**
|
|
3723
3654
|
* Discriminator type for a budget exhaustion event.
|
|
3724
3655
|
*/
|
|
3725
|
-
export type
|
|
3656
|
+
export type TopologyClass100 = "budget_exhaustion";
|
|
3726
3657
|
/**
|
|
3727
3658
|
* A string representing the original escrow boundary breached.
|
|
3728
3659
|
*/
|
|
@@ -3734,19 +3665,19 @@ export type FinalBurnReceiptCid = string;
|
|
|
3734
3665
|
/**
|
|
3735
3666
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3736
3667
|
*/
|
|
3737
|
-
export type
|
|
3668
|
+
export type EventCid18 = string;
|
|
3738
3669
|
/**
|
|
3739
3670
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3740
3671
|
*/
|
|
3741
|
-
export type
|
|
3672
|
+
export type PriorEventHash18 = string | null;
|
|
3742
3673
|
/**
|
|
3743
3674
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3744
3675
|
*/
|
|
3745
|
-
export type
|
|
3676
|
+
export type Timestamp18 = number;
|
|
3746
3677
|
/**
|
|
3747
3678
|
* Discriminator type for telemetry events.
|
|
3748
3679
|
*/
|
|
3749
|
-
export type
|
|
3680
|
+
export type TopologyClass101 = "epistemic_telemetry";
|
|
3750
3681
|
/**
|
|
3751
3682
|
* The exact topological action the human operator performed on the projected manifold.
|
|
3752
3683
|
*/
|
|
@@ -3762,16 +3693,16 @@ export type DwellDurationMs = number | null;
|
|
|
3762
3693
|
/**
|
|
3763
3694
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3764
3695
|
*/
|
|
3765
|
-
export type
|
|
3696
|
+
export type EventCid19 = string;
|
|
3766
3697
|
/**
|
|
3767
3698
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3768
3699
|
*/
|
|
3769
|
-
export type
|
|
3700
|
+
export type PriorEventHash19 = string | null;
|
|
3770
3701
|
/**
|
|
3771
3702
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3772
3703
|
*/
|
|
3773
|
-
export type
|
|
3774
|
-
export type
|
|
3704
|
+
export type Timestamp19 = number;
|
|
3705
|
+
export type TopologyClass102 = "cognitive_prediction";
|
|
3775
3706
|
export type SourceChainCid = string;
|
|
3776
3707
|
export type TargetSourceConcept = string;
|
|
3777
3708
|
/**
|
|
@@ -3781,16 +3712,16 @@ export type PredictedTopKTokens = [string, ...string[]];
|
|
|
3781
3712
|
/**
|
|
3782
3713
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3783
3714
|
*/
|
|
3784
|
-
export type
|
|
3715
|
+
export type EventCid20 = string;
|
|
3785
3716
|
/**
|
|
3786
3717
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3787
3718
|
*/
|
|
3788
|
-
export type
|
|
3719
|
+
export type PriorEventHash20 = string | null;
|
|
3789
3720
|
/**
|
|
3790
3721
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3791
3722
|
*/
|
|
3792
|
-
export type
|
|
3793
|
-
export type
|
|
3723
|
+
export type Timestamp20 = number;
|
|
3724
|
+
export type TopologyClass103 = "epistemic_axiom_verification";
|
|
3794
3725
|
export type SourcePredictionCid = string;
|
|
3795
3726
|
export type SequenceSimilarityScore = number;
|
|
3796
3727
|
export type FactScorePassed = boolean;
|
|
@@ -3801,16 +3732,16 @@ export type ZeroTrustReceiptCid1 = string | null;
|
|
|
3801
3732
|
/**
|
|
3802
3733
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3803
3734
|
*/
|
|
3804
|
-
export type
|
|
3735
|
+
export type EventCid21 = string;
|
|
3805
3736
|
/**
|
|
3806
3737
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3807
3738
|
*/
|
|
3808
|
-
export type
|
|
3739
|
+
export type PriorEventHash21 = string | null;
|
|
3809
3740
|
/**
|
|
3810
3741
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3811
3742
|
*/
|
|
3812
|
-
export type
|
|
3813
|
-
export type
|
|
3743
|
+
export type Timestamp21 = number;
|
|
3744
|
+
export type TopologyClass104 = "epistemic_flow_state";
|
|
3814
3745
|
/**
|
|
3815
3746
|
* The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
|
|
3816
3747
|
*/
|
|
@@ -3826,19 +3757,19 @@ export type TerminalRewardFactorized = boolean;
|
|
|
3826
3757
|
/**
|
|
3827
3758
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3828
3759
|
*/
|
|
3829
|
-
export type
|
|
3760
|
+
export type EventCid22 = string;
|
|
3830
3761
|
/**
|
|
3831
3762
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3832
3763
|
*/
|
|
3833
|
-
export type
|
|
3764
|
+
export type PriorEventHash22 = string | null;
|
|
3834
3765
|
/**
|
|
3835
3766
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3836
3767
|
*/
|
|
3837
|
-
export type
|
|
3768
|
+
export type Timestamp22 = number;
|
|
3838
3769
|
/**
|
|
3839
3770
|
* Discriminator type for a causal explanation event.
|
|
3840
3771
|
*/
|
|
3841
|
-
export type
|
|
3772
|
+
export type TopologyClass105 = "causal_explanation";
|
|
3842
3773
|
/**
|
|
3843
3774
|
* The globally unique decentralized identifier (DID) anchoring the collective outcome being explained.
|
|
3844
3775
|
*/
|
|
@@ -3878,19 +3809,19 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
|
|
|
3878
3809
|
/**
|
|
3879
3810
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3880
3811
|
*/
|
|
3881
|
-
export type
|
|
3812
|
+
export type EventCid23 = string;
|
|
3882
3813
|
/**
|
|
3883
3814
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3884
3815
|
*/
|
|
3885
|
-
export type
|
|
3816
|
+
export type PriorEventHash23 = string | null;
|
|
3886
3817
|
/**
|
|
3887
3818
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3888
3819
|
*/
|
|
3889
|
-
export type
|
|
3820
|
+
export type Timestamp23 = number;
|
|
3890
3821
|
/**
|
|
3891
3822
|
* Discriminator type for an intent classification receipt.
|
|
3892
3823
|
*/
|
|
3893
|
-
export type
|
|
3824
|
+
export type TopologyClass106 = "intent_classification";
|
|
3894
3825
|
/**
|
|
3895
3826
|
* The raw, unparsed human natural language instruction.
|
|
3896
3827
|
*/
|
|
@@ -3907,19 +3838,19 @@ export type ConfidenceScore1 = number;
|
|
|
3907
3838
|
* The TaxonomicRoutingPolicy CID that governed this classification.
|
|
3908
3839
|
*/
|
|
3909
3840
|
export type RoutingPolicyCid = string | null;
|
|
3910
|
-
export type
|
|
3841
|
+
export type TopologyClass107 = "semantic_relational_record";
|
|
3911
3842
|
/**
|
|
3912
3843
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3913
3844
|
*/
|
|
3914
|
-
export type
|
|
3845
|
+
export type EventCid24 = string;
|
|
3915
3846
|
/**
|
|
3916
3847
|
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
3917
3848
|
*/
|
|
3918
|
-
export type
|
|
3849
|
+
export type PriorEventHash24 = string | null;
|
|
3919
3850
|
/**
|
|
3920
3851
|
* The precise temporal coordinate of the event realization.
|
|
3921
3852
|
*/
|
|
3922
|
-
export type
|
|
3853
|
+
export type Timestamp24 = number;
|
|
3923
3854
|
/**
|
|
3924
3855
|
* The domain-independent structural classification of the record.
|
|
3925
3856
|
*/
|
|
@@ -3931,19 +3862,19 @@ export type FormalSchemaUrn1 = string | null;
|
|
|
3931
3862
|
/**
|
|
3932
3863
|
* Discriminator for the reification receipt.
|
|
3933
3864
|
*/
|
|
3934
|
-
export type
|
|
3865
|
+
export type TopologyClass108 = "ontological_reification";
|
|
3935
3866
|
/**
|
|
3936
3867
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3937
3868
|
*/
|
|
3938
|
-
export type
|
|
3869
|
+
export type EventCid25 = string;
|
|
3939
3870
|
/**
|
|
3940
3871
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
3941
3872
|
*/
|
|
3942
|
-
export type
|
|
3873
|
+
export type PriorEventHash25 = string | null;
|
|
3943
3874
|
/**
|
|
3944
3875
|
* The precise temporal coordinate of the event realization.
|
|
3945
3876
|
*/
|
|
3946
|
-
export type
|
|
3877
|
+
export type Timestamp25 = number;
|
|
3947
3878
|
/**
|
|
3948
3879
|
* The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
|
|
3949
3880
|
*/
|
|
@@ -3963,19 +3894,19 @@ export type IsLatentInference = boolean;
|
|
|
3963
3894
|
/**
|
|
3964
3895
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3965
3896
|
*/
|
|
3966
|
-
export type
|
|
3897
|
+
export type EventCid26 = string;
|
|
3967
3898
|
/**
|
|
3968
3899
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3969
3900
|
*/
|
|
3970
|
-
export type
|
|
3901
|
+
export type PriorEventHash26 = string | null;
|
|
3971
3902
|
/**
|
|
3972
3903
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3973
3904
|
*/
|
|
3974
|
-
export type
|
|
3905
|
+
export type Timestamp26 = number;
|
|
3975
3906
|
/**
|
|
3976
3907
|
* The type of the resilience payload.
|
|
3977
3908
|
*/
|
|
3978
|
-
export type
|
|
3909
|
+
export type TopologyClass109 = "circuit_breaker_event";
|
|
3979
3910
|
/**
|
|
3980
3911
|
* Signature or summary of the error causing the trip.
|
|
3981
3912
|
*/
|
|
@@ -3983,19 +3914,19 @@ export type ErrorSignature = string;
|
|
|
3983
3914
|
/**
|
|
3984
3915
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3985
3916
|
*/
|
|
3986
|
-
export type
|
|
3917
|
+
export type EventCid27 = string;
|
|
3987
3918
|
/**
|
|
3988
3919
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3989
3920
|
*/
|
|
3990
|
-
export type
|
|
3921
|
+
export type PriorEventHash27 = string | null;
|
|
3991
3922
|
/**
|
|
3992
3923
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3993
3924
|
*/
|
|
3994
|
-
export type
|
|
3925
|
+
export type Timestamp27 = number;
|
|
3995
3926
|
/**
|
|
3996
3927
|
* Discriminator type for an exogenous event.
|
|
3997
3928
|
*/
|
|
3998
|
-
export type
|
|
3929
|
+
export type TopologyClass110 = "exogenous_event";
|
|
3999
3930
|
/**
|
|
4000
3931
|
* Cryptographic identifier for the Black Swan event.
|
|
4001
3932
|
*/
|
|
@@ -4015,19 +3946,19 @@ export type LockedMagnitude = number;
|
|
|
4015
3946
|
/**
|
|
4016
3947
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4017
3948
|
*/
|
|
4018
|
-
export type
|
|
3949
|
+
export type EventCid28 = string;
|
|
4019
3950
|
/**
|
|
4020
3951
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4021
3952
|
*/
|
|
4022
|
-
export type
|
|
3953
|
+
export type PriorEventHash28 = string | null;
|
|
4023
3954
|
/**
|
|
4024
3955
|
* Discriminator type for a log event.
|
|
4025
3956
|
*/
|
|
4026
|
-
export type
|
|
3957
|
+
export type TopologyClass111 = "epistemic_log";
|
|
4027
3958
|
/**
|
|
4028
3959
|
* The UNIX timestamp of the log event.
|
|
4029
3960
|
*/
|
|
4030
|
-
export type
|
|
3961
|
+
export type Timestamp28 = number;
|
|
4031
3962
|
/**
|
|
4032
3963
|
* The severity level of the log event.
|
|
4033
3964
|
*/
|
|
@@ -4040,19 +3971,19 @@ export type TelemetryScalarState = string | number | boolean | null;
|
|
|
4040
3971
|
/**
|
|
4041
3972
|
* The type of the intervention payload.
|
|
4042
3973
|
*/
|
|
4043
|
-
export type
|
|
3974
|
+
export type TopologyClass112 = "verdict";
|
|
4044
3975
|
/**
|
|
4045
3976
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4046
3977
|
*/
|
|
4047
|
-
export type
|
|
3978
|
+
export type EventCid29 = string;
|
|
4048
3979
|
/**
|
|
4049
3980
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4050
3981
|
*/
|
|
4051
|
-
export type
|
|
3982
|
+
export type PriorEventHash29 = string | null;
|
|
4052
3983
|
/**
|
|
4053
3984
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4054
3985
|
*/
|
|
4055
|
-
export type
|
|
3986
|
+
export type Timestamp29 = number;
|
|
4056
3987
|
/**
|
|
4057
3988
|
* The cryptographic nonce uniquely identifying the intervention request.
|
|
4058
3989
|
*/
|
|
@@ -4088,16 +4019,16 @@ export type LivenessChallengeHash = string;
|
|
|
4088
4019
|
/**
|
|
4089
4020
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4090
4021
|
*/
|
|
4091
|
-
export type
|
|
4022
|
+
export type EventCid30 = string;
|
|
4092
4023
|
/**
|
|
4093
4024
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4094
4025
|
*/
|
|
4095
|
-
export type
|
|
4026
|
+
export type PriorEventHash30 = string | null;
|
|
4096
4027
|
/**
|
|
4097
4028
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4098
4029
|
*/
|
|
4099
|
-
export type
|
|
4100
|
-
export type
|
|
4030
|
+
export type Timestamp30 = number;
|
|
4031
|
+
export type TopologyClass113 = "custody_receipt";
|
|
4101
4032
|
/**
|
|
4102
4033
|
* Unique identifier for this chain-of-custody entry.
|
|
4103
4034
|
*/
|
|
@@ -4125,16 +4056,16 @@ export type RedactionTimestampUnixNano = number;
|
|
|
4125
4056
|
/**
|
|
4126
4057
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4127
4058
|
*/
|
|
4128
|
-
export type
|
|
4059
|
+
export type EventCid31 = string;
|
|
4129
4060
|
/**
|
|
4130
4061
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4131
4062
|
*/
|
|
4132
|
-
export type
|
|
4063
|
+
export type PriorEventHash31 = string | null;
|
|
4133
4064
|
/**
|
|
4134
4065
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4135
4066
|
*/
|
|
4136
|
-
export type
|
|
4137
|
-
export type
|
|
4067
|
+
export type Timestamp31 = number;
|
|
4068
|
+
export type TopologyClass114 = "defeasible_attack";
|
|
4138
4069
|
/**
|
|
4139
4070
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
|
|
4140
4071
|
*/
|
|
@@ -4150,16 +4081,16 @@ export type TargetClaimCid = string;
|
|
|
4150
4081
|
/**
|
|
4151
4082
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4152
4083
|
*/
|
|
4153
|
-
export type
|
|
4084
|
+
export type EventCid32 = string;
|
|
4154
4085
|
/**
|
|
4155
4086
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4156
4087
|
*/
|
|
4157
|
-
export type
|
|
4088
|
+
export type PriorEventHash32 = string | null;
|
|
4158
4089
|
/**
|
|
4159
4090
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4160
4091
|
*/
|
|
4161
|
-
export type
|
|
4162
|
-
export type
|
|
4092
|
+
export type Timestamp32 = number;
|
|
4093
|
+
export type TopologyClass115 = "epistemic_rejection";
|
|
4163
4094
|
export type ReceiptCid1 = string;
|
|
4164
4095
|
export type FailedProjectionCid = string;
|
|
4165
4096
|
export type ViolatedAlgebraicConstraint = string;
|
|
@@ -4168,16 +4099,16 @@ export type StochasticMutationGradient = string;
|
|
|
4168
4099
|
/**
|
|
4169
4100
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4170
4101
|
*/
|
|
4171
|
-
export type
|
|
4102
|
+
export type EventCid33 = string;
|
|
4172
4103
|
/**
|
|
4173
4104
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
4174
4105
|
*/
|
|
4175
|
-
export type
|
|
4106
|
+
export type PriorEventHash33 = string | null;
|
|
4176
4107
|
/**
|
|
4177
4108
|
* The precise temporal coordinate of the event realization.
|
|
4178
4109
|
*/
|
|
4179
|
-
export type
|
|
4180
|
-
export type
|
|
4110
|
+
export type Timestamp33 = number;
|
|
4111
|
+
export type TopologyClass116 = "formal_verification_receipt";
|
|
4181
4112
|
/**
|
|
4182
4113
|
* The definitive Boolean evaluating whether the proof succeeded, the program is satisfiable, or the deduction holds true.
|
|
4183
4114
|
*/
|
|
@@ -4196,43 +4127,43 @@ export type FailingContext = string | null;
|
|
|
4196
4127
|
export type ExtractedBindings = {
|
|
4197
4128
|
[k: string]: JsonPrimitiveState;
|
|
4198
4129
|
}[];
|
|
4199
|
-
export type
|
|
4130
|
+
export type TopologyClass117 = "belief_modulation";
|
|
4200
4131
|
export type ReceiptCid2 = string;
|
|
4201
4132
|
/**
|
|
4202
4133
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4203
4134
|
*/
|
|
4204
|
-
export type
|
|
4135
|
+
export type EventCid34 = string;
|
|
4205
4136
|
/**
|
|
4206
4137
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4207
4138
|
*/
|
|
4208
|
-
export type
|
|
4139
|
+
export type PriorEventHash34 = string | null;
|
|
4209
4140
|
/**
|
|
4210
4141
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4211
4142
|
*/
|
|
4212
|
-
export type
|
|
4143
|
+
export type Timestamp34 = number;
|
|
4213
4144
|
export type TargetGraphCid4 = string;
|
|
4214
4145
|
export type SeveredEdgeCids = string[];
|
|
4215
|
-
export type
|
|
4146
|
+
export type TopologyClass118 = "rdf_export_receipt";
|
|
4216
4147
|
export type ExportCid1 = string;
|
|
4217
4148
|
/**
|
|
4218
4149
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4219
4150
|
*/
|
|
4220
|
-
export type
|
|
4151
|
+
export type EventCid35 = string;
|
|
4221
4152
|
/**
|
|
4222
4153
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4223
4154
|
*/
|
|
4224
|
-
export type
|
|
4155
|
+
export type PriorEventHash35 = string | null;
|
|
4225
4156
|
/**
|
|
4226
4157
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4227
4158
|
*/
|
|
4228
|
-
export type
|
|
4159
|
+
export type Timestamp35 = number;
|
|
4229
4160
|
export type SerializedPayload = string;
|
|
4230
4161
|
export type RdfTripleCount = number;
|
|
4231
4162
|
export type Sha256GraphHash = string;
|
|
4232
|
-
export type
|
|
4233
|
-
export type
|
|
4234
|
-
export type
|
|
4235
|
-
export type
|
|
4163
|
+
export type EventCid36 = string;
|
|
4164
|
+
export type PriorEventHash36 = string | null;
|
|
4165
|
+
export type Timestamp36 = number;
|
|
4166
|
+
export type TopologyClass119 = "epistemic_starvation";
|
|
4236
4167
|
/**
|
|
4237
4168
|
* The cryptographic pointer to the specific edge that failed empirical grounding.
|
|
4238
4169
|
*/
|
|
@@ -4245,10 +4176,10 @@ export type FailedCitations = EvidentiaryCitationState[];
|
|
|
4245
4176
|
* The semantic explanation for the starvation (e.g., 'Maximum search retries exhausted').
|
|
4246
4177
|
*/
|
|
4247
4178
|
export type DiagnosticReason = string;
|
|
4248
|
-
export type
|
|
4249
|
-
export type
|
|
4250
|
-
export type
|
|
4251
|
-
export type
|
|
4179
|
+
export type EventCid37 = string;
|
|
4180
|
+
export type PriorEventHash37 = string | null;
|
|
4181
|
+
export type Timestamp37 = number;
|
|
4182
|
+
export type TopologyClass120 = "sparql_query_result";
|
|
4252
4183
|
/**
|
|
4253
4184
|
* A pointer back to the SPARQLQueryIntent that authorized this execution.
|
|
4254
4185
|
*/
|
|
@@ -4260,7 +4191,7 @@ export type ExecutionTimeMs = number;
|
|
|
4260
4191
|
/**
|
|
4261
4192
|
* Discriminator for the OracleExecutionReceipt topology.
|
|
4262
4193
|
*/
|
|
4263
|
-
export type
|
|
4194
|
+
export type TopologyClass121 = "oracle_execution_receipt";
|
|
4264
4195
|
/**
|
|
4265
4196
|
* The SHA-256 hash of the complete execution payload, providing undeniable cryptographic provenance for the Merkle-DAG audit trail.
|
|
4266
4197
|
*/
|
|
@@ -4277,6 +4208,34 @@ export type TokensBurned = number;
|
|
|
4277
4208
|
* An optional cryptographic signature from a Human-in-the-Loop (HITL) operator attesting to the correctness of the execution result. Populated only when the Temporal workflow escalates to manual review.
|
|
4278
4209
|
*/
|
|
4279
4210
|
export type HumanAttestationSignature = string | null;
|
|
4211
|
+
/**
|
|
4212
|
+
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4213
|
+
*/
|
|
4214
|
+
export type EventCid38 = string;
|
|
4215
|
+
/**
|
|
4216
|
+
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4217
|
+
*/
|
|
4218
|
+
export type PriorEventHash38 = string | null;
|
|
4219
|
+
/**
|
|
4220
|
+
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4221
|
+
*/
|
|
4222
|
+
export type Timestamp38 = number;
|
|
4223
|
+
/**
|
|
4224
|
+
* The type of the security violation payload.
|
|
4225
|
+
*/
|
|
4226
|
+
export type TopologyClass122 = "guardrail_violation_event";
|
|
4227
|
+
/**
|
|
4228
|
+
* Unique identifier for the violation event.
|
|
4229
|
+
*/
|
|
4230
|
+
export type ViolationId = string;
|
|
4231
|
+
/**
|
|
4232
|
+
* The HTTP status code returned by the Guardrails proxy.
|
|
4233
|
+
*/
|
|
4234
|
+
export type StatusCode = number;
|
|
4235
|
+
/**
|
|
4236
|
+
* The classification of the violation (e.g., 'pii_leak', 'toxic_content').
|
|
4237
|
+
*/
|
|
4238
|
+
export type ViolationType = string;
|
|
4280
4239
|
/**
|
|
4281
4240
|
* A discriminated union of workflow topologies.
|
|
4282
4241
|
*/
|
|
@@ -4495,24 +4454,6 @@ export type MagnitudeUnit = string;
|
|
|
4495
4454
|
* The declarative array of specialized functional expert clusters (e.g., 'falsifier', 'synthesizer') physically present in this model's architecture.
|
|
4496
4455
|
*/
|
|
4497
4456
|
export type SupportedFunctionalExperts = string[];
|
|
4498
|
-
/**
|
|
4499
|
-
* Unique identifier for the constitutional rule.
|
|
4500
|
-
*/
|
|
4501
|
-
export type RuleCid1 = string;
|
|
4502
|
-
/**
|
|
4503
|
-
* The definitive causal constraint or heuristic boundary enforced by this rule.
|
|
4504
|
-
*/
|
|
4505
|
-
export type Description10 = string;
|
|
4506
|
-
/**
|
|
4507
|
-
* The categorical magnitude of the systemic breach enacted upon rule violation.
|
|
4508
|
-
*/
|
|
4509
|
-
export type Severity = "low" | "medium" | "high" | "critical";
|
|
4510
|
-
/**
|
|
4511
|
-
* The explicit, structurally bounded set of forbidden semantic intents.
|
|
4512
|
-
*
|
|
4513
|
-
* @maxItems 1000
|
|
4514
|
-
*/
|
|
4515
|
-
export type ForbiddenIntents1 = string[];
|
|
4516
4457
|
/**
|
|
4517
4458
|
* Forces non-destructive graph mutations.
|
|
4518
4459
|
*/
|
|
@@ -4611,6 +4552,18 @@ export type DistributionShapeProfile = "gaussian" | "uniform" | "beta";
|
|
|
4611
4552
|
* Directed edges defining the topological sort (chronological flow) of the document.
|
|
4612
4553
|
*/
|
|
4613
4554
|
export type ChronologicalFlowEdges = [unknown, unknown][];
|
|
4555
|
+
/**
|
|
4556
|
+
* The minimal required PRM score improvement across the lookback window to justify continued compute.
|
|
4557
|
+
*/
|
|
4558
|
+
export type ConvergenceDeltaEpsilon = number;
|
|
4559
|
+
/**
|
|
4560
|
+
* The N-step temporal window over which the PRM gradient is calculated.
|
|
4561
|
+
*/
|
|
4562
|
+
export type LookbackWindowSteps = number;
|
|
4563
|
+
/**
|
|
4564
|
+
* The burn-in period before convergence logic is activated.
|
|
4565
|
+
*/
|
|
4566
|
+
export type MinimumReasoningSteps = number;
|
|
4614
4567
|
/**
|
|
4615
4568
|
* A Python 3.14 t-string template definition for dynamic UI grid evaluation.
|
|
4616
4569
|
*/
|
|
@@ -4740,6 +4693,18 @@ export type TestTimeMultiplier = number;
|
|
|
4740
4693
|
* The absolute integer limit on how many times the orchestrator can recursively multiply the compute budget before forcing a SystemFaultEvent.
|
|
4741
4694
|
*/
|
|
4742
4695
|
export type MaxEscalationTiers = number;
|
|
4696
|
+
/**
|
|
4697
|
+
* The Colang specification version.
|
|
4698
|
+
*/
|
|
4699
|
+
export type ColangVersion = "1.0" | "2.0";
|
|
4700
|
+
/**
|
|
4701
|
+
* The raw Colang (.co) state machine configuration.
|
|
4702
|
+
*/
|
|
4703
|
+
export type ColangPayload = string;
|
|
4704
|
+
/**
|
|
4705
|
+
* The categorical magnitude of the systemic breach enacted upon rule violation.
|
|
4706
|
+
*/
|
|
4707
|
+
export type Severity = "low" | "medium" | "high" | "critical";
|
|
4743
4708
|
/**
|
|
4744
4709
|
* Absolute recursive depth limit for DAG deserialization.
|
|
4745
4710
|
*/
|
|
@@ -4874,6 +4839,22 @@ export type SopCid = string;
|
|
|
4874
4839
|
* The exact topological flow between step_cids.
|
|
4875
4840
|
*/
|
|
4876
4841
|
export type ChronologicalFlowEdges1 = [unknown, unknown][];
|
|
4842
|
+
/**
|
|
4843
|
+
* If a ThoughtBranchState's prm_score falls below this threshold, the orchestrator MUST halt its generation.
|
|
4844
|
+
*/
|
|
4845
|
+
export type PruningThreshold = number;
|
|
4846
|
+
/**
|
|
4847
|
+
* The absolute limit on how many times the agent can start a new branch before throwing a SystemFaultEvent.
|
|
4848
|
+
*/
|
|
4849
|
+
export type MaxBacktracksAllowed = number;
|
|
4850
|
+
/**
|
|
4851
|
+
* The specific PRM model used to score the logic (e.g., 'math-prm-v2').
|
|
4852
|
+
*/
|
|
4853
|
+
export type EvaluatorMatrixName = string | null;
|
|
4854
|
+
/**
|
|
4855
|
+
* The strict array of Process Reward Contracts evaluating the logic.
|
|
4856
|
+
*/
|
|
4857
|
+
export type PrmEvaluations = ProcessRewardContract[];
|
|
4877
4858
|
/**
|
|
4878
4859
|
* AGENT INSTRUCTION: Defines the minimum cryptographic isolation perimeter required for this node's thermodynamic execution.
|
|
4879
4860
|
*
|
|
@@ -4972,14 +4953,6 @@ export type CategoricalCohorts = string[];
|
|
|
4972
4953
|
* The valid chronological windows encompassing the artifact.
|
|
4973
4954
|
*/
|
|
4974
4955
|
export type TemporalObservationHorizons = TemporalBoundsProfile2[];
|
|
4975
|
-
/**
|
|
4976
|
-
* Name of the governance policy.
|
|
4977
|
-
*/
|
|
4978
|
-
export type PolicyName = string;
|
|
4979
|
-
/**
|
|
4980
|
-
* The explicit array of constitutional rules included in this policy.
|
|
4981
|
-
*/
|
|
4982
|
-
export type Rules1 = ConstitutionalPolicy[];
|
|
4983
4956
|
/**
|
|
4984
4957
|
* How to flatten SemanticNodeState.
|
|
4985
4958
|
*/
|
|
@@ -5183,7 +5156,6 @@ export type RhetoricalStructureProfile1 = "premise" | "conclusion" | "elaboratio
|
|
|
5183
5156
|
* MCP ROUTING TRIGGERS: Quantitative Risk Assessment, Game Theory, Cybernetic Governance, Structural Circuit Breaker, Utility Theory
|
|
5184
5157
|
*/
|
|
5185
5158
|
export type RiskLevelPolicy = "safe" | "standard" | "critical";
|
|
5186
|
-
export type SanitizationActionIntent = "redact" | "hash" | "drop_event" | "trigger_quarantine";
|
|
5187
5159
|
/**
|
|
5188
5160
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this semantic edge to the Merkle-DAG.
|
|
5189
5161
|
*/
|
|
@@ -5393,7 +5365,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5393
5365
|
ConsensusFederationTopologyManifest?: ConsensusFederationTopologyManifest;
|
|
5394
5366
|
ConsensusPolicy?: ConsensusPolicy;
|
|
5395
5367
|
ConstitutionalAmendmentIntent?: ConstitutionalAmendmentIntent;
|
|
5396
|
-
ConstitutionalPolicy?: ConstitutionalPolicy;
|
|
5397
5368
|
ConstrainedDecodingPolicy?: ConstrainedDecodingPolicy;
|
|
5398
5369
|
ContextExpansionPolicy?: ContextExpansionPolicy;
|
|
5399
5370
|
ContextualSemanticResolutionIntent?: ContextualSemanticResolutionIntent;
|
|
@@ -5429,6 +5400,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5429
5400
|
DocumentLayoutManifest?: DocumentLayoutManifest;
|
|
5430
5401
|
DocumentLayoutRegionState?: DocumentLayoutRegionState;
|
|
5431
5402
|
DraftingIntent?: DraftingIntent;
|
|
5403
|
+
DynamicConvergenceSLA?: DynamicConvergenceSLA;
|
|
5432
5404
|
DynamicLayoutManifest?: DynamicLayoutManifest;
|
|
5433
5405
|
DynamicManifoldProjectionManifest?: DynamicManifoldProjectionManifest1;
|
|
5434
5406
|
DynamicRoutingManifest?: DynamicRoutingManifest;
|
|
@@ -5451,6 +5423,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5451
5423
|
EpistemicEscalationContract?: EpistemicEscalationContract;
|
|
5452
5424
|
EpistemicFlowStateReceipt?: EpistemicFlowStateReceipt;
|
|
5453
5425
|
EpistemicGroundedTaskManifest?: EpistemicGroundedTaskManifest;
|
|
5426
|
+
EpistemicGuardrailsManifest?: EpistemicGuardrailsManifest;
|
|
5454
5427
|
EpistemicHydrationPolicy?: EpistemicHydrationPolicy;
|
|
5455
5428
|
EpistemicLedgerState?: EpistemicLedgerState;
|
|
5456
5429
|
EpistemicLogEvent?: EpistemicLogEvent;
|
|
@@ -5500,10 +5473,10 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5500
5473
|
GlobalGovernancePolicy?: GlobalGovernancePolicy;
|
|
5501
5474
|
GlobalSemanticInvariantProfile?: GlobalSemanticInvariantProfile;
|
|
5502
5475
|
GlobalSemanticProfile?: GlobalSemanticProfile1;
|
|
5503
|
-
GovernancePolicy?: GovernancePolicy;
|
|
5504
5476
|
GradingCriterionProfile?: GradingCriterionProfile;
|
|
5505
5477
|
GrammarPanelProfile?: GrammarPanelProfile1;
|
|
5506
5478
|
GraphFlatteningPolicy?: GraphFlatteningPolicy;
|
|
5479
|
+
GuardrailViolationEvent?: GuardrailViolationEvent;
|
|
5507
5480
|
HTTPTransportProfile?: HTTPTransportProfile;
|
|
5508
5481
|
HardwareEnclaveReceipt?: HardwareEnclaveReceipt;
|
|
5509
5482
|
HierarchicalDOMManifest?: HierarchicalDOMManifest;
|
|
@@ -5562,7 +5535,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5562
5535
|
NeurosymbolicIngestionTopologyManifest?: NeurosymbolicIngestionTopologyManifest;
|
|
5563
5536
|
NeurosymbolicVerificationTopologyManifest?: NeurosymbolicVerificationTopologyManifest;
|
|
5564
5537
|
NodeCIDState?: NodeCIDState;
|
|
5565
|
-
NormativeDriftEvent?: NormativeDriftEvent;
|
|
5566
5538
|
ObservabilityLODPolicy?: ObservabilityLODPolicy;
|
|
5567
5539
|
ObservationEvent?: ObservationEvent;
|
|
5568
5540
|
OntologicalAlignmentPolicy?: OntologicalAlignmentPolicy;
|
|
@@ -5587,6 +5559,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5587
5559
|
PredictionMarketState?: PredictionMarketState;
|
|
5588
5560
|
PresentationManifest?: PresentationManifest;
|
|
5589
5561
|
ProceduralMetadataManifest?: ProceduralMetadataManifest;
|
|
5562
|
+
ProcessRewardContract?: ProcessRewardContract;
|
|
5590
5563
|
ProfileCIDState?: ProfileCIDState;
|
|
5591
5564
|
QoSClassificationProfile?: QoSClassificationProfile;
|
|
5592
5565
|
QuarantineIntent?: QuarantineIntent;
|
|
@@ -5594,7 +5567,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5594
5567
|
RDFExportReceipt?: RDFExportReceipt;
|
|
5595
5568
|
RDFSerializationIntent?: RDFSerializationIntent;
|
|
5596
5569
|
ReasoningEngineeringPolicy?: ReasoningEngineeringPolicy;
|
|
5597
|
-
RedactionPolicy?: RedactionPolicy;
|
|
5598
5570
|
RhetoricalStructureProfile?: RhetoricalStructureProfile1;
|
|
5599
5571
|
RiskLevelPolicy?: RiskLevelPolicy;
|
|
5600
5572
|
RollbackIntent?: RollbackIntent;
|
|
@@ -5608,12 +5580,10 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5608
5580
|
SaeFeatureActivationState?: SaeFeatureActivationState;
|
|
5609
5581
|
SaeLatentPolicy?: SaeLatentPolicy;
|
|
5610
5582
|
SalienceProfile?: SalienceProfile;
|
|
5611
|
-
SanitizationActionIntent?: SanitizationActionIntent;
|
|
5612
5583
|
ScalePolicy?: ScalePolicy;
|
|
5613
5584
|
SchemaDrivenExtractionSLA?: SchemaDrivenExtractionSLA;
|
|
5614
5585
|
SecureSubSessionState?: SecureSubSessionState;
|
|
5615
5586
|
SelfCorrectionPolicy?: SelfCorrectionPolicy;
|
|
5616
|
-
SemanticClassificationProfile?: SemanticClassificationProfile;
|
|
5617
5587
|
SemanticDiscoveryIntent?: SemanticDiscoveryIntent;
|
|
5618
5588
|
SemanticEdgeState?: SemanticEdgeState;
|
|
5619
5589
|
SemanticFirewallPolicy?: SemanticFirewallPolicy;
|
|
@@ -8849,47 +8819,12 @@ export interface ConstrainedDecodingPolicy {
|
|
|
8849
8819
|
export interface SemanticFlowPolicy {
|
|
8850
8820
|
policy_cid: PolicyCid;
|
|
8851
8821
|
active?: Active1;
|
|
8852
|
-
rules?: Rules;
|
|
8853
8822
|
/**
|
|
8854
8823
|
* The active cognitive defense perimeter against adversarial control-flow overrides.
|
|
8855
8824
|
*/
|
|
8856
8825
|
semantic_firewall?: SemanticFirewallPolicy | null;
|
|
8857
8826
|
latent_firewalls?: LatentFirewalls;
|
|
8858
8827
|
}
|
|
8859
|
-
/**
|
|
8860
|
-
* CoReason Shared Kernel Ontology
|
|
8861
|
-
*
|
|
8862
|
-
* AGENT INSTRUCTION: Defines a deterministic Data Sanitization heuristic mapped to a
|
|
8863
|
-
* specific SemanticClassificationProfile (e.g., Bell-LaPadula clearance levels). As a
|
|
8864
|
-
* ...Policy suffix, this object defines rigid mathematical boundaries that the orchestrator
|
|
8865
|
-
* must enforce globally.
|
|
8866
|
-
*
|
|
8867
|
-
* CAUSAL AFFORDANCE: Executes a rigid regex-bounded search-and-replace algorithm via
|
|
8868
|
-
* target_regex_pattern to mutate or mask toxic data payloads, substituting matches with a
|
|
8869
|
-
* safe replacement_token. The action (SanitizationActionIntent) dictates the exact
|
|
8870
|
-
* sanitization method.
|
|
8871
|
-
*
|
|
8872
|
-
* EPISTEMIC BOUNDS: The target_regex_pattern is strictly capped at max_length=200 to
|
|
8873
|
-
* mathematically prevent ReDoS (Regular Expression Denial of Service) CPU exhaustion. A
|
|
8874
|
-
* secondary target_pattern (max_length=2000) provides a broader semantic entity match. The
|
|
8875
|
-
* optional context_exclusion_zones array (max_length=100) is deterministically sorted by
|
|
8876
|
-
* the @model_validator.
|
|
8877
|
-
*
|
|
8878
|
-
* MCP ROUTING TRIGGERS: Data Sanitization, Regular Expression DoS Prevention,
|
|
8879
|
-
* Bell-LaPadula Model, Masking Heuristic, Algorithmic Redaction
|
|
8880
|
-
*/
|
|
8881
|
-
export interface RedactionPolicy {
|
|
8882
|
-
rule_cid: RuleCid;
|
|
8883
|
-
classification: SemanticClassificationProfile1;
|
|
8884
|
-
target_pattern: TargetPattern;
|
|
8885
|
-
target_regex_pattern: TargetRegexPattern;
|
|
8886
|
-
context_exclusion_zones?: ContextExclusionZones;
|
|
8887
|
-
/**
|
|
8888
|
-
* The required algorithmic response when this pattern is detected.
|
|
8889
|
-
*/
|
|
8890
|
-
action: "redact" | "hash" | "drop_event" | "trigger_quarantine";
|
|
8891
|
-
replacement_token?: ReplacementToken;
|
|
8892
|
-
}
|
|
8893
8828
|
/**
|
|
8894
8829
|
* CoReason Shared Kernel Ontology
|
|
8895
8830
|
*
|
|
@@ -11236,26 +11171,6 @@ export interface EpistemicPromotionEvent {
|
|
|
11236
11171
|
crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
|
|
11237
11172
|
compression_ratio: CompressionRatio;
|
|
11238
11173
|
}
|
|
11239
|
-
/**
|
|
11240
|
-
* CoReason Shared Kernel Ontology
|
|
11241
|
-
*
|
|
11242
|
-
* AGENT INSTRUCTION: A cryptographically frozen historical fact tracking the Kullback-Leibler (KL) divergence between the swarm's active behavioral manifold and its foundational ConstitutionalPolicy.
|
|
11243
|
-
*
|
|
11244
|
-
* CAUSAL AFFORDANCE: Emits a deterministic topological signal that the causal graph is experiencing logical friction against the `tripped_rule_cid`, unlocking the injection of a System2RemediationIntent constraint.
|
|
11245
|
-
*
|
|
11246
|
-
* EPISTEMIC BOUNDS: Mathematically bounded by `measured_semantic_drift` (`le=18446744073709551615.0`) and cryptographically tied to `contradiction_proof_hash` (SHA-256 pattern `^[a-f0-9]{64}$`) proving the anomaly.
|
|
11247
|
-
*
|
|
11248
|
-
* MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
|
|
11249
|
-
*/
|
|
11250
|
-
export interface NormativeDriftEvent {
|
|
11251
|
-
event_cid: EventCid15;
|
|
11252
|
-
prior_event_hash?: PriorEventHash15;
|
|
11253
|
-
timestamp: Timestamp15;
|
|
11254
|
-
topology_class?: TopologyClass98;
|
|
11255
|
-
tripped_rule_cid: TrippedRuleCid;
|
|
11256
|
-
measured_semantic_drift: MeasuredSemanticDrift;
|
|
11257
|
-
contradiction_proof_hash: ContradictionProofHash;
|
|
11258
|
-
}
|
|
11259
11174
|
/**
|
|
11260
11175
|
* CoReason Shared Kernel Ontology
|
|
11261
11176
|
*
|
|
@@ -11268,10 +11183,10 @@ export interface NormativeDriftEvent {
|
|
|
11268
11183
|
* MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
|
|
11269
11184
|
*/
|
|
11270
11185
|
export interface PersistenceCommitReceipt {
|
|
11271
|
-
event_cid:
|
|
11272
|
-
prior_event_hash?:
|
|
11273
|
-
timestamp:
|
|
11274
|
-
topology_class?:
|
|
11186
|
+
event_cid: EventCid15;
|
|
11187
|
+
prior_event_hash?: PriorEventHash15;
|
|
11188
|
+
timestamp: Timestamp15;
|
|
11189
|
+
topology_class?: TopologyClass98;
|
|
11275
11190
|
lakehouse_snapshot_cid: LakehouseSnapshotCid;
|
|
11276
11191
|
committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
|
|
11277
11192
|
target_table_uri: TargetTableUri;
|
|
@@ -11288,10 +11203,10 @@ export interface PersistenceCommitReceipt {
|
|
|
11288
11203
|
* MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
|
|
11289
11204
|
*/
|
|
11290
11205
|
export interface TokenBurnReceipt {
|
|
11291
|
-
event_cid:
|
|
11292
|
-
prior_event_hash?:
|
|
11293
|
-
timestamp:
|
|
11294
|
-
topology_class?:
|
|
11206
|
+
event_cid: EventCid16;
|
|
11207
|
+
prior_event_hash?: PriorEventHash16;
|
|
11208
|
+
timestamp: Timestamp16;
|
|
11209
|
+
topology_class?: TopologyClass99;
|
|
11295
11210
|
tool_invocation_cid: ToolInvocationCid;
|
|
11296
11211
|
input_tokens: InputTokens;
|
|
11297
11212
|
output_tokens: OutputTokens;
|
|
@@ -11309,10 +11224,10 @@ export interface TokenBurnReceipt {
|
|
|
11309
11224
|
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
|
|
11310
11225
|
*/
|
|
11311
11226
|
export interface BudgetExhaustionEvent {
|
|
11312
|
-
event_cid:
|
|
11313
|
-
prior_event_hash?:
|
|
11314
|
-
timestamp:
|
|
11315
|
-
topology_class?:
|
|
11227
|
+
event_cid: EventCid17;
|
|
11228
|
+
prior_event_hash?: PriorEventHash17;
|
|
11229
|
+
timestamp: Timestamp17;
|
|
11230
|
+
topology_class?: TopologyClass100;
|
|
11316
11231
|
exhausted_escrow_cid: ExhaustedEscrowCid;
|
|
11317
11232
|
final_burn_receipt_cid: FinalBurnReceiptCid;
|
|
11318
11233
|
}
|
|
@@ -11328,10 +11243,10 @@ export interface BudgetExhaustionEvent {
|
|
|
11328
11243
|
* MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
|
|
11329
11244
|
*/
|
|
11330
11245
|
export interface EpistemicTelemetryEvent {
|
|
11331
|
-
event_cid:
|
|
11332
|
-
prior_event_hash?:
|
|
11333
|
-
timestamp:
|
|
11334
|
-
topology_class?:
|
|
11246
|
+
event_cid: EventCid18;
|
|
11247
|
+
prior_event_hash?: PriorEventHash18;
|
|
11248
|
+
timestamp: Timestamp18;
|
|
11249
|
+
topology_class?: TopologyClass101;
|
|
11335
11250
|
interaction_modality: InteractionModality;
|
|
11336
11251
|
target_node_cid: TargetNodeCid;
|
|
11337
11252
|
dwell_duration_ms?: DwellDurationMs;
|
|
@@ -11352,10 +11267,10 @@ export interface EpistemicTelemetryEvent {
|
|
|
11352
11267
|
* MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
|
|
11353
11268
|
*/
|
|
11354
11269
|
export interface CognitivePredictionReceipt {
|
|
11355
|
-
event_cid:
|
|
11356
|
-
prior_event_hash?:
|
|
11357
|
-
timestamp:
|
|
11358
|
-
topology_class?:
|
|
11270
|
+
event_cid: EventCid19;
|
|
11271
|
+
prior_event_hash?: PriorEventHash19;
|
|
11272
|
+
timestamp: Timestamp19;
|
|
11273
|
+
topology_class?: TopologyClass102;
|
|
11359
11274
|
source_chain_cid: SourceChainCid;
|
|
11360
11275
|
target_source_concept: TargetSourceConcept;
|
|
11361
11276
|
predicted_top_k_tokens: PredictedTopKTokens;
|
|
@@ -11372,10 +11287,10 @@ export interface CognitivePredictionReceipt {
|
|
|
11372
11287
|
* MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
|
|
11373
11288
|
*/
|
|
11374
11289
|
export interface EpistemicAxiomVerificationReceipt {
|
|
11375
|
-
event_cid:
|
|
11376
|
-
prior_event_hash?:
|
|
11377
|
-
timestamp:
|
|
11378
|
-
topology_class?:
|
|
11290
|
+
event_cid: EventCid20;
|
|
11291
|
+
prior_event_hash?: PriorEventHash20;
|
|
11292
|
+
timestamp: Timestamp20;
|
|
11293
|
+
topology_class?: TopologyClass103;
|
|
11379
11294
|
source_prediction_cid: SourcePredictionCid;
|
|
11380
11295
|
sequence_similarity_score: SequenceSimilarityScore;
|
|
11381
11296
|
fact_score_passed: FactScorePassed;
|
|
@@ -11406,10 +11321,10 @@ export interface EpistemicAxiomVerificationReceipt {
|
|
|
11406
11321
|
* Scalar Backpropagation, Acyclic Path
|
|
11407
11322
|
*/
|
|
11408
11323
|
export interface EpistemicFlowStateReceipt {
|
|
11409
|
-
event_cid:
|
|
11410
|
-
prior_event_hash?:
|
|
11411
|
-
timestamp:
|
|
11412
|
-
topology_class?:
|
|
11324
|
+
event_cid: EventCid21;
|
|
11325
|
+
prior_event_hash?: PriorEventHash21;
|
|
11326
|
+
timestamp: Timestamp21;
|
|
11327
|
+
topology_class?: TopologyClass104;
|
|
11413
11328
|
source_trajectory_cid: SourceTrajectoryCid;
|
|
11414
11329
|
estimated_flow_value: EstimatedFlowValue;
|
|
11415
11330
|
terminal_reward_factorized: TerminalRewardFactorized;
|
|
@@ -11435,10 +11350,10 @@ export interface EpistemicFlowStateReceipt {
|
|
|
11435
11350
|
* Macroscopic Explanation, Deterministic Sorting
|
|
11436
11351
|
*/
|
|
11437
11352
|
export interface CausalExplanationEvent {
|
|
11438
|
-
event_cid:
|
|
11439
|
-
prior_event_hash?:
|
|
11440
|
-
timestamp:
|
|
11441
|
-
topology_class?:
|
|
11353
|
+
event_cid: EventCid22;
|
|
11354
|
+
prior_event_hash?: PriorEventHash22;
|
|
11355
|
+
timestamp: Timestamp22;
|
|
11356
|
+
topology_class?: TopologyClass105;
|
|
11442
11357
|
target_outcome_event_cid: TargetOutcomeEventCid;
|
|
11443
11358
|
collective_intelligence: CollectiveIntelligenceProfile;
|
|
11444
11359
|
agent_attributions: AgentAttributions;
|
|
@@ -11499,10 +11414,10 @@ export interface ShapleyAttributionReceipt {
|
|
|
11499
11414
|
* Routing Heuristic, Semantic Wave Collapse
|
|
11500
11415
|
*/
|
|
11501
11416
|
export interface IntentClassificationReceipt {
|
|
11502
|
-
event_cid:
|
|
11503
|
-
prior_event_hash?:
|
|
11504
|
-
timestamp:
|
|
11505
|
-
topology_class?:
|
|
11417
|
+
event_cid: EventCid23;
|
|
11418
|
+
prior_event_hash?: PriorEventHash23;
|
|
11419
|
+
timestamp: Timestamp23;
|
|
11420
|
+
topology_class?: TopologyClass106;
|
|
11506
11421
|
raw_input_string: RawInputString;
|
|
11507
11422
|
classified_intent: ClassifiedIntent;
|
|
11508
11423
|
confidence_score: ConfidenceScore1;
|
|
@@ -11520,10 +11435,10 @@ export interface IntentClassificationReceipt {
|
|
|
11520
11435
|
* MCP ROUTING TRIGGERS: Semantic Relational Record, Payload Injection, Hardware Guillotine, Structured Telemetry
|
|
11521
11436
|
*/
|
|
11522
11437
|
export interface SemanticRelationalVectorState {
|
|
11523
|
-
topology_class?:
|
|
11524
|
-
event_cid:
|
|
11525
|
-
prior_event_hash?:
|
|
11526
|
-
timestamp:
|
|
11438
|
+
topology_class?: TopologyClass107;
|
|
11439
|
+
event_cid: EventCid24;
|
|
11440
|
+
prior_event_hash?: PriorEventHash24;
|
|
11441
|
+
timestamp: Timestamp24;
|
|
11527
11442
|
ontology_class: UpperOntologyClassProfile;
|
|
11528
11443
|
temporal_bounds: TemporalBoundsProfile1;
|
|
11529
11444
|
formal_schema_urn?: FormalSchemaUrn1;
|
|
@@ -11565,10 +11480,10 @@ export interface PayloadInjectionZone {
|
|
|
11565
11480
|
* MCP ROUTING TRIGGERS: Ontological Reification, Bimodal Semantic Transformation, Epistemic Ledger, Traceability Collapse
|
|
11566
11481
|
*/
|
|
11567
11482
|
export interface OntologicalReificationReceipt {
|
|
11568
|
-
topology_class?:
|
|
11569
|
-
event_cid:
|
|
11570
|
-
prior_event_hash?:
|
|
11571
|
-
timestamp:
|
|
11483
|
+
topology_class?: TopologyClass108;
|
|
11484
|
+
event_cid: EventCid25;
|
|
11485
|
+
prior_event_hash?: PriorEventHash25;
|
|
11486
|
+
timestamp: Timestamp25;
|
|
11572
11487
|
source_data_hash: SourceDataHash;
|
|
11573
11488
|
target_namespace: TargetNamespace;
|
|
11574
11489
|
algorithmic_mechanism: TransformationMechanismProfile;
|
|
@@ -11605,10 +11520,10 @@ export interface DempsterShaferBeliefVector2 {
|
|
|
11605
11520
|
* MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
|
|
11606
11521
|
*/
|
|
11607
11522
|
export interface CircuitBreakerEvent {
|
|
11608
|
-
event_cid:
|
|
11609
|
-
prior_event_hash?:
|
|
11610
|
-
timestamp:
|
|
11611
|
-
topology_class?:
|
|
11523
|
+
event_cid: EventCid26;
|
|
11524
|
+
prior_event_hash?: PriorEventHash26;
|
|
11525
|
+
timestamp: Timestamp26;
|
|
11526
|
+
topology_class?: TopologyClass109;
|
|
11612
11527
|
/**
|
|
11613
11528
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
11614
11529
|
*/
|
|
@@ -11636,10 +11551,10 @@ export interface CircuitBreakerEvent {
|
|
|
11636
11551
|
* Energy, Exogenous Perturbation, Epistemic Stress Test
|
|
11637
11552
|
*/
|
|
11638
11553
|
export interface ExogenousEpistemicEvent {
|
|
11639
|
-
event_cid:
|
|
11640
|
-
prior_event_hash?:
|
|
11641
|
-
timestamp:
|
|
11642
|
-
topology_class?:
|
|
11554
|
+
event_cid: EventCid27;
|
|
11555
|
+
prior_event_hash?: PriorEventHash27;
|
|
11556
|
+
timestamp: Timestamp27;
|
|
11557
|
+
topology_class?: TopologyClass110;
|
|
11643
11558
|
shock_cid: ShockCid;
|
|
11644
11559
|
target_node_hash: TargetNodeHash;
|
|
11645
11560
|
bayesian_surprise_score: BayesianSurpriseScore1;
|
|
@@ -11670,10 +11585,10 @@ export interface SimulationEscrowContract {
|
|
|
11670
11585
|
* MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
|
|
11671
11586
|
*/
|
|
11672
11587
|
export interface EpistemicLogEvent {
|
|
11673
|
-
event_cid:
|
|
11674
|
-
prior_event_hash?:
|
|
11675
|
-
topology_class?:
|
|
11676
|
-
timestamp:
|
|
11588
|
+
event_cid: EventCid28;
|
|
11589
|
+
prior_event_hash?: PriorEventHash28;
|
|
11590
|
+
topology_class?: TopologyClass111;
|
|
11591
|
+
timestamp: Timestamp28;
|
|
11677
11592
|
level: Level;
|
|
11678
11593
|
message: Message1;
|
|
11679
11594
|
context_profile?: TelemetryContextProfile;
|
|
@@ -11703,10 +11618,10 @@ export interface TelemetryContextProfile {
|
|
|
11703
11618
|
* MCP ROUTING TRIGGERS: Cryptographic Nonce, State Resumption, Replay Attack Prevention, Wetware Attestation, Liveness Resolution
|
|
11704
11619
|
*/
|
|
11705
11620
|
export interface InterventionReceipt {
|
|
11706
|
-
topology_class?:
|
|
11707
|
-
event_cid:
|
|
11708
|
-
prior_event_hash?:
|
|
11709
|
-
timestamp:
|
|
11621
|
+
topology_class?: TopologyClass112;
|
|
11622
|
+
event_cid: EventCid29;
|
|
11623
|
+
prior_event_hash?: PriorEventHash29;
|
|
11624
|
+
timestamp: Timestamp29;
|
|
11710
11625
|
intervention_request_cid: InterventionRequestCid;
|
|
11711
11626
|
/**
|
|
11712
11627
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -11761,10 +11676,10 @@ export interface WetwareAttestationContract {
|
|
|
11761
11676
|
* MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
|
|
11762
11677
|
*/
|
|
11763
11678
|
export interface CustodyReceipt {
|
|
11764
|
-
event_cid:
|
|
11765
|
-
prior_event_hash?:
|
|
11766
|
-
timestamp:
|
|
11767
|
-
topology_class?:
|
|
11679
|
+
event_cid: EventCid30;
|
|
11680
|
+
prior_event_hash?: PriorEventHash30;
|
|
11681
|
+
timestamp: Timestamp30;
|
|
11682
|
+
topology_class?: TopologyClass113;
|
|
11768
11683
|
custody_cid: CustodyCid;
|
|
11769
11684
|
source_node_cid: SourceNodeCid;
|
|
11770
11685
|
applied_policy_cid: AppliedPolicyCid;
|
|
@@ -11784,10 +11699,10 @@ export interface CustodyReceipt {
|
|
|
11784
11699
|
* MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
|
|
11785
11700
|
*/
|
|
11786
11701
|
export interface DefeasibleAttackEvent {
|
|
11787
|
-
event_cid:
|
|
11788
|
-
prior_event_hash?:
|
|
11789
|
-
timestamp:
|
|
11790
|
-
topology_class?:
|
|
11702
|
+
event_cid: EventCid31;
|
|
11703
|
+
prior_event_hash?: PriorEventHash31;
|
|
11704
|
+
timestamp: Timestamp31;
|
|
11705
|
+
topology_class?: TopologyClass114;
|
|
11791
11706
|
attack_cid: AttackCid;
|
|
11792
11707
|
source_claim_cid: SourceClaimCid;
|
|
11793
11708
|
target_claim_cid: TargetClaimCid;
|
|
@@ -11808,10 +11723,10 @@ export interface DefeasibleAttackEvent {
|
|
|
11808
11723
|
* MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
|
|
11809
11724
|
*/
|
|
11810
11725
|
export interface EpistemicRejectionReceipt {
|
|
11811
|
-
event_cid:
|
|
11812
|
-
prior_event_hash?:
|
|
11813
|
-
timestamp:
|
|
11814
|
-
topology_class?:
|
|
11726
|
+
event_cid: EventCid32;
|
|
11727
|
+
prior_event_hash?: PriorEventHash32;
|
|
11728
|
+
timestamp: Timestamp32;
|
|
11729
|
+
topology_class?: TopologyClass115;
|
|
11815
11730
|
receipt_cid: ReceiptCid1;
|
|
11816
11731
|
failed_projection_cid: FailedProjectionCid;
|
|
11817
11732
|
violated_algebraic_constraint: ViolatedAlgebraicConstraint;
|
|
@@ -11830,10 +11745,10 @@ export interface EpistemicRejectionReceipt {
|
|
|
11830
11745
|
* MCP ROUTING TRIGGERS: System 2 Remediation, Mathematical Truth, Proof Verification, Epistemic Ledger
|
|
11831
11746
|
*/
|
|
11832
11747
|
export interface FormalVerificationReceipt {
|
|
11833
|
-
event_cid:
|
|
11834
|
-
prior_event_hash?:
|
|
11835
|
-
timestamp:
|
|
11836
|
-
topology_class?:
|
|
11748
|
+
event_cid: EventCid33;
|
|
11749
|
+
prior_event_hash?: PriorEventHash33;
|
|
11750
|
+
timestamp: Timestamp33;
|
|
11751
|
+
topology_class?: TopologyClass116;
|
|
11837
11752
|
/**
|
|
11838
11753
|
* Pointer to the specific node or intent that requested this formal verification.
|
|
11839
11754
|
*/
|
|
@@ -11847,11 +11762,11 @@ export interface FormalVerificationReceipt {
|
|
|
11847
11762
|
* CoReason Shared Kernel Ontology
|
|
11848
11763
|
*/
|
|
11849
11764
|
export interface BeliefModulationReceipt {
|
|
11850
|
-
topology_class?:
|
|
11765
|
+
topology_class?: TopologyClass117;
|
|
11851
11766
|
receipt_cid: ReceiptCid2;
|
|
11852
|
-
event_cid:
|
|
11853
|
-
prior_event_hash?:
|
|
11854
|
-
timestamp:
|
|
11767
|
+
event_cid: EventCid34;
|
|
11768
|
+
prior_event_hash?: PriorEventHash34;
|
|
11769
|
+
timestamp: Timestamp34;
|
|
11855
11770
|
target_graph_cid: TargetGraphCid4;
|
|
11856
11771
|
grounded_edges: GroundedEdges;
|
|
11857
11772
|
severed_edge_cids: SeveredEdgeCids;
|
|
@@ -11863,11 +11778,11 @@ export interface GroundedEdges {
|
|
|
11863
11778
|
* CoReason Shared Kernel Ontology
|
|
11864
11779
|
*/
|
|
11865
11780
|
export interface RDFExportReceipt {
|
|
11866
|
-
topology_class?:
|
|
11781
|
+
topology_class?: TopologyClass118;
|
|
11867
11782
|
export_cid: ExportCid1;
|
|
11868
|
-
event_cid:
|
|
11869
|
-
prior_event_hash?:
|
|
11870
|
-
timestamp:
|
|
11783
|
+
event_cid: EventCid35;
|
|
11784
|
+
prior_event_hash?: PriorEventHash35;
|
|
11785
|
+
timestamp: Timestamp35;
|
|
11871
11786
|
serialized_payload: SerializedPayload;
|
|
11872
11787
|
rdf_triple_count: RdfTripleCount;
|
|
11873
11788
|
sha256_graph_hash: Sha256GraphHash;
|
|
@@ -11884,10 +11799,10 @@ export interface RDFExportReceipt {
|
|
|
11884
11799
|
* MCP ROUTING TRIGGERS: Epistemic Starvation, Natural Language Inference, Truth Maintenance System, Defeasible Logic, Belief Mass Depletion
|
|
11885
11800
|
*/
|
|
11886
11801
|
export interface EpistemicStarvationEvent {
|
|
11887
|
-
event_cid:
|
|
11888
|
-
prior_event_hash?:
|
|
11889
|
-
timestamp:
|
|
11890
|
-
topology_class?:
|
|
11802
|
+
event_cid: EventCid36;
|
|
11803
|
+
prior_event_hash?: PriorEventHash36;
|
|
11804
|
+
timestamp: Timestamp36;
|
|
11805
|
+
topology_class?: TopologyClass119;
|
|
11891
11806
|
starved_edge_cid: StarvedEdgeCid;
|
|
11892
11807
|
failed_citations: FailedCitations;
|
|
11893
11808
|
diagnostic_reason: DiagnosticReason;
|
|
@@ -11904,10 +11819,10 @@ export interface EpistemicStarvationEvent {
|
|
|
11904
11819
|
* MCP ROUTING TRIGGERS: SPARQL Result, RDF Bindings, Epistemic Projection, Payload Bounding, Ledger Commit
|
|
11905
11820
|
*/
|
|
11906
11821
|
export interface SPARQLQueryResultReceipt {
|
|
11907
|
-
event_cid:
|
|
11908
|
-
prior_event_hash?:
|
|
11909
|
-
timestamp:
|
|
11910
|
-
topology_class?:
|
|
11822
|
+
event_cid: EventCid37;
|
|
11823
|
+
prior_event_hash?: PriorEventHash37;
|
|
11824
|
+
timestamp: Timestamp37;
|
|
11825
|
+
topology_class?: TopologyClass120;
|
|
11911
11826
|
query_intent_cid: QueryIntentCid;
|
|
11912
11827
|
returned_bindings: ReturnedBindings;
|
|
11913
11828
|
execution_time_ms: ExecutionTimeMs;
|
|
@@ -11930,12 +11845,39 @@ export interface ReturnedBindings {
|
|
|
11930
11845
|
* MCP ROUTING TRIGGERS: Execution Audit, Merkle-DAG Provenance, Thermodynamic Accounting, Oracle Telemetry, Human-in-the-Loop Attestation, Cryptographic Receipt
|
|
11931
11846
|
*/
|
|
11932
11847
|
export interface OracleExecutionReceipt {
|
|
11933
|
-
topology_class?:
|
|
11848
|
+
topology_class?: TopologyClass121;
|
|
11934
11849
|
execution_hash: ExecutionHash;
|
|
11935
11850
|
solver_urn: SolverUrn;
|
|
11936
11851
|
tokens_burned: TokensBurned;
|
|
11937
11852
|
human_attestation_signature?: HumanAttestationSignature;
|
|
11938
11853
|
}
|
|
11854
|
+
/**
|
|
11855
|
+
* CoReason Shared Kernel Ontology
|
|
11856
|
+
*
|
|
11857
|
+
* AGENT INSTRUCTION: Tracks a deterministic security boundary violation emitted by the NeMo Guardrails proxy. This event is a frozen historical fact representing a failed cryptographic or semantic check.
|
|
11858
|
+
*
|
|
11859
|
+
* CAUSAL AFFORDANCE: Triggers an immediate suspension of the active execution trajectory and publishes a high-severity alert to the telemetry broker for remediation.
|
|
11860
|
+
*
|
|
11861
|
+
* EPISTEMIC BOUNDS: The event must include the specific HTTP status code (e.g., 401, 403, 406, 422) and the opaque violation manifest emitted by the proxy.
|
|
11862
|
+
*
|
|
11863
|
+
* MCP ROUTING TRIGGERS: Security, Guardrails, Data Loss Prevention, Policy Violation, Telemetry
|
|
11864
|
+
*/
|
|
11865
|
+
export interface GuardrailViolationEvent {
|
|
11866
|
+
event_cid: EventCid38;
|
|
11867
|
+
prior_event_hash?: PriorEventHash38;
|
|
11868
|
+
timestamp: Timestamp38;
|
|
11869
|
+
topology_class?: TopologyClass122;
|
|
11870
|
+
violation_id: ViolationId;
|
|
11871
|
+
status_code: StatusCode;
|
|
11872
|
+
violation_type: ViolationType;
|
|
11873
|
+
violation_details?: ViolationDetails;
|
|
11874
|
+
}
|
|
11875
|
+
/**
|
|
11876
|
+
* Detailed manifest from the Guardrails proxy.
|
|
11877
|
+
*/
|
|
11878
|
+
export interface ViolationDetails {
|
|
11879
|
+
[k: string]: unknown;
|
|
11880
|
+
}
|
|
11939
11881
|
/**
|
|
11940
11882
|
* CoReason Shared Kernel Ontology
|
|
11941
11883
|
*
|
|
@@ -12346,31 +12288,6 @@ export interface ComputeRateContract1 {
|
|
|
12346
12288
|
cost_per_million_output_tokens: CostPerMillionOutputTokens;
|
|
12347
12289
|
magnitude_unit: MagnitudeUnit;
|
|
12348
12290
|
}
|
|
12349
|
-
/**
|
|
12350
|
-
* CoReason Shared Kernel Ontology
|
|
12351
|
-
*
|
|
12352
|
-
* AGENT INSTRUCTION: Formalizes a discrete normative axiom within a Constitutional AI
|
|
12353
|
-
* framework to prevent instrumental convergence. As a ...Policy suffix, this object defines
|
|
12354
|
-
* rigid mathematical boundaries that the orchestrator must enforce globally.
|
|
12355
|
-
*
|
|
12356
|
-
* CAUSAL AFFORDANCE: Establishes a hard structural boundary that mathematically repels the
|
|
12357
|
-
* swarm's generative trajectory away from forbidden semantic manifolds. Violation severity
|
|
12358
|
-
* is classified via a strict Literal["low", "medium", "high", "critical"] tier.
|
|
12359
|
-
*
|
|
12360
|
-
* EPISTEMIC BOUNDS: Geometrically restricts the state space by blacklisting specific
|
|
12361
|
-
* execution branches via the forbidden_intents array (max_length=1000),
|
|
12362
|
-
* deterministically sorted by @model_validator to preserve RFC 8785 canonical hashing.
|
|
12363
|
-
* The rule_cid is bounded to a 128-char CID.
|
|
12364
|
-
*
|
|
12365
|
-
* MCP ROUTING TRIGGERS: Constitutional AI, Value Alignment, Normative Axiom, Instrumental
|
|
12366
|
-
* Convergence, Semantic Boundary
|
|
12367
|
-
*/
|
|
12368
|
-
export interface ConstitutionalPolicy {
|
|
12369
|
-
rule_cid: RuleCid1;
|
|
12370
|
-
description: Description10;
|
|
12371
|
-
severity: Severity;
|
|
12372
|
-
forbidden_intents: ForbiddenIntents1;
|
|
12373
|
-
}
|
|
12374
12291
|
/**
|
|
12375
12292
|
* CoReason Shared Kernel Ontology
|
|
12376
12293
|
*
|
|
@@ -12617,6 +12534,30 @@ export interface DocumentLayoutManifest {
|
|
|
12617
12534
|
export interface Blocks1 {
|
|
12618
12535
|
[k: string]: DocumentLayoutRegionState;
|
|
12619
12536
|
}
|
|
12537
|
+
/**
|
|
12538
|
+
* CoReason Shared Kernel Ontology
|
|
12539
|
+
*
|
|
12540
|
+
* AGENT INSTRUCTION: Defines the mathematical Optimal Stopping Theory boundaries for Monte
|
|
12541
|
+
* Carlo Tree Search (MCTS) and test-time compute scaling. As an ...SLA suffix, this object
|
|
12542
|
+
* enforces rigid mathematical boundaries that the orchestrator must respect globally.
|
|
12543
|
+
*
|
|
12544
|
+
* CAUSAL AFFORDANCE: Triggers an early termination circuit breaker on reasoning trajectories
|
|
12545
|
+
* when the gradient of the Process Reward Model (PRM) score falls below the epsilon delta,
|
|
12546
|
+
* halting unnecessary probability wave expansion and preserving VRAM.
|
|
12547
|
+
*
|
|
12548
|
+
* EPISTEMIC BOUNDS: Mathematically constrained by convergence_delta_epsilon (ge=0.0, le=1.0)
|
|
12549
|
+
* over a strictly positive lookback_window_steps (gt=0, le=18446744073709551615). Physically mandates
|
|
12550
|
+
* a minimum_reasoning_steps burn-in period (gt=0, le=18446744073709551615) to prevent premature
|
|
12551
|
+
* collapse before the latent space is adequately explored.
|
|
12552
|
+
*
|
|
12553
|
+
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, MCTS, PRM Convergence, Circuit Breaker,
|
|
12554
|
+
* Bellman Equation
|
|
12555
|
+
*/
|
|
12556
|
+
export interface DynamicConvergenceSLA {
|
|
12557
|
+
convergence_delta_epsilon: ConvergenceDeltaEpsilon;
|
|
12558
|
+
lookback_window_steps: LookbackWindowSteps;
|
|
12559
|
+
minimum_reasoning_steps: MinimumReasoningSteps;
|
|
12560
|
+
}
|
|
12620
12561
|
/**
|
|
12621
12562
|
* CoReason Shared Kernel Ontology
|
|
12622
12563
|
*
|
|
@@ -12968,6 +12909,26 @@ export interface EpistemicEscalationContract {
|
|
|
12968
12909
|
test_time_multiplier: TestTimeMultiplier;
|
|
12969
12910
|
max_escalation_tiers: MaxEscalationTiers;
|
|
12970
12911
|
}
|
|
12912
|
+
/**
|
|
12913
|
+
* CoReason Shared Kernel Ontology
|
|
12914
|
+
*
|
|
12915
|
+
* AGENT INSTRUCTION: A declarative proxy that outputs standard NeMo Colang format (.co files)
|
|
12916
|
+
* to configure the NeMo Guardrails reverse-proxy in the Envoy mesh.
|
|
12917
|
+
*
|
|
12918
|
+
* CAUSAL AFFORDANCE: Defines the exact Colang state machine configuration for intercepting
|
|
12919
|
+
* and overriding LLM outputs before they hit the network.
|
|
12920
|
+
*
|
|
12921
|
+
* EPISTEMIC BOUNDS: Bounded by a strict max_length=100000 on the raw Colang payload
|
|
12922
|
+
* to prevent memory exhaustion. The @model_validator deterministically sorts the required
|
|
12923
|
+
* imports.
|
|
12924
|
+
*
|
|
12925
|
+
* MCP ROUTING TRIGGERS: NeMo Guardrails, Colang, Reverse Proxy, Constitutional Alignment, Envoy Mesh
|
|
12926
|
+
*/
|
|
12927
|
+
export interface EpistemicGuardrailsManifest {
|
|
12928
|
+
colang_version?: ColangVersion;
|
|
12929
|
+
colang_payload: ColangPayload;
|
|
12930
|
+
severity?: Severity;
|
|
12931
|
+
}
|
|
12971
12932
|
/**
|
|
12972
12933
|
* CoReason Shared Kernel Ontology
|
|
12973
12934
|
*
|
|
@@ -13198,23 +13159,24 @@ export interface ProceduralMetadataManifest {
|
|
|
13198
13159
|
/**
|
|
13199
13160
|
* CoReason Shared Kernel Ontology
|
|
13200
13161
|
*
|
|
13201
|
-
*
|
|
13202
|
-
*
|
|
13203
|
-
*
|
|
13204
|
-
*
|
|
13162
|
+
* AGENT INSTRUCTION: Encodes a macroscopic Petri net or Directed Acyclic Graph (DAG)
|
|
13163
|
+
* formalizing standard operating procedures into mathematically traversable state
|
|
13164
|
+
* transitions. As a ...Manifest suffix, this defines a frozen, N-dimensional coordinate
|
|
13165
|
+
* state.
|
|
13205
13166
|
*
|
|
13206
|
-
*
|
|
13207
|
-
*
|
|
13208
|
-
*
|
|
13209
|
-
*
|
|
13167
|
+
* CAUSAL AFFORDANCE: Physically bounds the executing agent (target_persona:
|
|
13168
|
+
* ProfileCIDState) to a deterministic sequence of CognitiveStateProfiles, unlocking
|
|
13169
|
+
* the ability for the orchestrator to dynamically evaluate execution
|
|
13170
|
+
* via Process Reward Models (prm_evaluations: list[ProcessRewardContract]) at each
|
|
13171
|
+
* topological node.
|
|
13210
13172
|
*
|
|
13211
|
-
*
|
|
13212
|
-
*
|
|
13213
|
-
*
|
|
13214
|
-
*
|
|
13173
|
+
* EPISTEMIC BOUNDS: The cognitive_steps dictionary is constrained to max_length=1000
|
|
13174
|
+
* to cap memory footprint. The @model_validator reject_ghost_nodes mathematically enforces
|
|
13175
|
+
* referential integrity, guaranteeing that no chronological_flow_edges AND no
|
|
13176
|
+
* structural_grammar_hashes point to an undefined state.
|
|
13215
13177
|
*
|
|
13216
|
-
*
|
|
13217
|
-
*
|
|
13178
|
+
* MCP ROUTING TRIGGERS: Petri Net, Directed Acyclic Graph, Process Reward Model,
|
|
13179
|
+
* Topological Flow, Referential Integrity
|
|
13218
13180
|
*/
|
|
13219
13181
|
export interface EpistemicSOPManifest {
|
|
13220
13182
|
sop_cid: SopCid;
|
|
@@ -13225,6 +13187,7 @@ export interface EpistemicSOPManifest {
|
|
|
13225
13187
|
cognitive_steps: CognitiveSteps;
|
|
13226
13188
|
structural_grammar_hashes: StructuralGrammarHashes;
|
|
13227
13189
|
chronological_flow_edges: ChronologicalFlowEdges1;
|
|
13190
|
+
prm_evaluations?: PrmEvaluations;
|
|
13228
13191
|
}
|
|
13229
13192
|
/**
|
|
13230
13193
|
* Dictionary mapping step_cids to strict causal DAG constraints.
|
|
@@ -13238,6 +13201,26 @@ export interface CognitiveSteps {
|
|
|
13238
13201
|
export interface StructuralGrammarHashes {
|
|
13239
13202
|
[k: string]: string;
|
|
13240
13203
|
}
|
|
13204
|
+
/**
|
|
13205
|
+
* CoReason Shared Kernel Ontology
|
|
13206
|
+
*
|
|
13207
|
+
* AGENT INSTRUCTION: Enforces the Step-Level Verification heuristics for Process Reward Models (PRMs) during non-monotonic reasoning searches and test-time compute.
|
|
13208
|
+
*
|
|
13209
|
+
* CAUSAL AFFORDANCE: Authorizes the orchestrator to physically prune hallucinating ThoughtBranchState vectors from the LatentScratchpadReceipt if their logit probabilities drop below the viable threshold, emulating rigorous Beam Search pruning.
|
|
13210
|
+
*
|
|
13211
|
+
* EPISTEMIC BOUNDS: Strictly bounds the search space geometry via `pruning_threshold` (`ge=0.0, le=1.0`) and mechanically caps State-Space Explosion through `max_backtracks_allowed` (`ge=0, le=18446744073709551615`).
|
|
13212
|
+
*
|
|
13213
|
+
* MCP ROUTING TRIGGERS: Process Reward Model, Beam Search Pruning, Latent Trajectory, State-Space Explosion, A* Search
|
|
13214
|
+
*/
|
|
13215
|
+
export interface ProcessRewardContract {
|
|
13216
|
+
/**
|
|
13217
|
+
* The dynamic circuit breaker that halts the search when PRM variance converges, preventing VRAM waste.
|
|
13218
|
+
*/
|
|
13219
|
+
convergence_sla?: DynamicConvergenceSLA | null;
|
|
13220
|
+
pruning_threshold: PruningThreshold;
|
|
13221
|
+
max_backtracks_allowed: MaxBacktracksAllowed;
|
|
13222
|
+
evaluator_matrix_name?: EvaluatorMatrixName;
|
|
13223
|
+
}
|
|
13241
13224
|
/**
|
|
13242
13225
|
* CoReason Shared Kernel Ontology
|
|
13243
13226
|
*
|
|
@@ -13442,7 +13425,7 @@ export interface GenerativeTaxonomyManifest1 {
|
|
|
13442
13425
|
* Bounding, ESG Constraint, Execution Envelope
|
|
13443
13426
|
*/
|
|
13444
13427
|
export interface GlobalGovernancePolicy {
|
|
13445
|
-
mandatory_license_rule:
|
|
13428
|
+
mandatory_license_rule: EpistemicGuardrailsManifest1;
|
|
13446
13429
|
max_budget_magnitude: MaxBudgetMagnitude1;
|
|
13447
13430
|
/**
|
|
13448
13431
|
* The mathematical CRDT ruleset governing distributed state synchronization.
|
|
@@ -13459,27 +13442,22 @@ export interface GlobalGovernancePolicy {
|
|
|
13459
13442
|
/**
|
|
13460
13443
|
* CoReason Shared Kernel Ontology
|
|
13461
13444
|
*
|
|
13462
|
-
* AGENT INSTRUCTION:
|
|
13463
|
-
*
|
|
13464
|
-
* rigid mathematical boundaries that the orchestrator must enforce globally.
|
|
13445
|
+
* AGENT INSTRUCTION: A declarative proxy that outputs standard NeMo Colang format (.co files)
|
|
13446
|
+
* to configure the NeMo Guardrails reverse-proxy in the Envoy mesh.
|
|
13465
13447
|
*
|
|
13466
|
-
* CAUSAL AFFORDANCE:
|
|
13467
|
-
*
|
|
13468
|
-
* is classified via a strict Literal["low", "medium", "high", "critical"] tier.
|
|
13448
|
+
* CAUSAL AFFORDANCE: Defines the exact Colang state machine configuration for intercepting
|
|
13449
|
+
* and overriding LLM outputs before they hit the network.
|
|
13469
13450
|
*
|
|
13470
|
-
* EPISTEMIC BOUNDS:
|
|
13471
|
-
*
|
|
13472
|
-
*
|
|
13473
|
-
* The rule_cid is bounded to a 128-char CID.
|
|
13451
|
+
* EPISTEMIC BOUNDS: Bounded by a strict max_length=100000 on the raw Colang payload
|
|
13452
|
+
* to prevent memory exhaustion. The @model_validator deterministically sorts the required
|
|
13453
|
+
* imports.
|
|
13474
13454
|
*
|
|
13475
|
-
* MCP ROUTING TRIGGERS:
|
|
13476
|
-
* Convergence, Semantic Boundary
|
|
13455
|
+
* MCP ROUTING TRIGGERS: NeMo Guardrails, Colang, Reverse Proxy, Constitutional Alignment, Envoy Mesh
|
|
13477
13456
|
*/
|
|
13478
|
-
export interface
|
|
13479
|
-
|
|
13480
|
-
|
|
13481
|
-
severity
|
|
13482
|
-
forbidden_intents: ForbiddenIntents1;
|
|
13457
|
+
export interface EpistemicGuardrailsManifest1 {
|
|
13458
|
+
colang_version?: ColangVersion;
|
|
13459
|
+
colang_payload: ColangPayload;
|
|
13460
|
+
severity?: Severity;
|
|
13483
13461
|
}
|
|
13484
13462
|
/**
|
|
13485
13463
|
* CoReason Shared Kernel Ontology
|
|
@@ -13554,32 +13532,6 @@ export interface GlobalSemanticProfile1 {
|
|
|
13554
13532
|
detected_modalities: DetectedModalities;
|
|
13555
13533
|
token_density: TokenDensity;
|
|
13556
13534
|
}
|
|
13557
|
-
/**
|
|
13558
|
-
* CoReason Shared Kernel Ontology
|
|
13559
|
-
*
|
|
13560
|
-
* AGENT INSTRUCTION: Aggregates discrete ConstitutionalPolicy nodes into a cohesive,
|
|
13561
|
-
* version-controlled Normative Alignment Manifold. As a ...Policy suffix, this object
|
|
13562
|
-
* defines rigid mathematical boundaries that the orchestrator must enforce globally.
|
|
13563
|
-
*
|
|
13564
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator to enforce a unified cybernetic governance
|
|
13565
|
-
* model across all swarm trajectories, grounding generative actions in a specific semantic
|
|
13566
|
-
* version (SemanticVersionState).
|
|
13567
|
-
*
|
|
13568
|
-
* EPISTEMIC BOUNDS: The topological integrity of the manifold is mathematically guaranteed
|
|
13569
|
-
* by the @model_validator, which deterministically sorts the rules array by rule_cid to
|
|
13570
|
-
* prevent Byzantine hash fractures across distributed nodes.
|
|
13571
|
-
*
|
|
13572
|
-
* MCP ROUTING TRIGGERS: Cybernetic Governance, Normative Alignment Manifold, Rule
|
|
13573
|
-
* Aggregation, Version Control, RFC 8785 Canonicalization
|
|
13574
|
-
*/
|
|
13575
|
-
export interface GovernancePolicy {
|
|
13576
|
-
policy_name: PolicyName;
|
|
13577
|
-
/**
|
|
13578
|
-
* Semantic version of the governance policy.
|
|
13579
|
-
*/
|
|
13580
|
-
version: string;
|
|
13581
|
-
rules: Rules1;
|
|
13582
|
-
}
|
|
13583
13535
|
/**
|
|
13584
13536
|
* CoReason Shared Kernel Ontology
|
|
13585
13537
|
*
|