@coreason-ai/coreason-manifest 0.55.1 → 0.55.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/ontology.d.ts +444 -462
- package/package.json +1 -1
package/dist/ontology.d.ts
CHANGED
|
@@ -603,7 +603,7 @@ export type Rationale = string;
|
|
|
603
603
|
* Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
|
|
604
604
|
*/
|
|
605
605
|
export type HeuristicConfidence = number;
|
|
606
|
-
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent;
|
|
606
|
+
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent | FederatedDiscoveryIntent;
|
|
607
607
|
/**
|
|
608
608
|
* Discriminator for temporal edge invalidation.
|
|
609
609
|
*/
|
|
@@ -1202,7 +1202,7 @@ export type Justification = string;
|
|
|
1202
1202
|
*/
|
|
1203
1203
|
export type TopologyClass38 = "constitutional_amendment";
|
|
1204
1204
|
/**
|
|
1205
|
-
* The globally unique decentralized identifier (DID) anchoring the
|
|
1205
|
+
* The globally unique decentralized identifier (DID) anchoring the GuardrailViolationEvent that justified triggering this proposal.
|
|
1206
1206
|
*/
|
|
1207
1207
|
export type DriftEventCid = string;
|
|
1208
1208
|
/**
|
|
@@ -1700,6 +1700,18 @@ export type SourceArtifactCid1 = string;
|
|
|
1700
1700
|
* The formal URN declaring the target ontological geometry for structural isomorphism.
|
|
1701
1701
|
*/
|
|
1702
1702
|
export type TargetOntologyUrn = string;
|
|
1703
|
+
/**
|
|
1704
|
+
* Discriminator for the FederatedDiscoveryIntent topology.
|
|
1705
|
+
*/
|
|
1706
|
+
export type TopologyClass60 = "federated_discovery_intent";
|
|
1707
|
+
/**
|
|
1708
|
+
* The strict array of strings defining topological limits on the discovered capabilities.
|
|
1709
|
+
*/
|
|
1710
|
+
export type DomainFilter = string[];
|
|
1711
|
+
/**
|
|
1712
|
+
* The minimum SRB governance lifecycle phase required for projected capabilities (DRAFT / SRB_APPROVED / CLIENT_APPROVED / PUBLISHED).
|
|
1713
|
+
*/
|
|
1714
|
+
export type MinimumEpistemicStatus = string;
|
|
1703
1715
|
/**
|
|
1704
1716
|
* A discriminated union of all valid workflow nodes.
|
|
1705
1717
|
*/
|
|
@@ -1753,7 +1765,7 @@ export type Description3 = string;
|
|
|
1753
1765
|
/**
|
|
1754
1766
|
* Discriminator for an Agent node.
|
|
1755
1767
|
*/
|
|
1756
|
-
export type
|
|
1768
|
+
export type TopologyClass61 = "agent";
|
|
1757
1769
|
/**
|
|
1758
1770
|
* The level of hardware-enforced cryptographic isolation required.
|
|
1759
1771
|
*/
|
|
@@ -1940,17 +1952,10 @@ export type EnforceFunctionalIsolation = boolean;
|
|
|
1940
1952
|
*
|
|
1941
1953
|
* @minItems 1
|
|
1942
1954
|
*/
|
|
1943
|
-
export type PermittedClassificationTiers = [
|
|
1944
|
-
|
|
1945
|
-
|
|
1946
|
-
|
|
1947
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
|
|
1948
|
-
*
|
|
1949
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
|
|
1950
|
-
*
|
|
1951
|
-
* MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
|
|
1952
|
-
*/
|
|
1953
|
-
export type SemanticClassificationProfile = "public" | "internal" | "confidential" | "restricted";
|
|
1955
|
+
export type PermittedClassificationTiers = [
|
|
1956
|
+
"public" | "internal" | "confidential" | "restricted",
|
|
1957
|
+
...("public" | "internal" | "confidential" | "restricted")[]
|
|
1958
|
+
];
|
|
1954
1959
|
/**
|
|
1955
1960
|
* The declarative whitelist of strictly typed ontological node labels authorized for context projection.
|
|
1956
1961
|
*/
|
|
@@ -2089,7 +2094,7 @@ export type DomainExtensions1 = {
|
|
|
2089
2094
|
/**
|
|
2090
2095
|
* Discriminator for a Human node.
|
|
2091
2096
|
*/
|
|
2092
|
-
export type
|
|
2097
|
+
export type TopologyClass62 = "human";
|
|
2093
2098
|
/**
|
|
2094
2099
|
* The mandatory cryptographic attestation URN required to verify the human operator's identity.
|
|
2095
2100
|
*/
|
|
@@ -2119,7 +2124,7 @@ export type DomainExtensions2 = {
|
|
|
2119
2124
|
/**
|
|
2120
2125
|
* Discriminator for a System node.
|
|
2121
2126
|
*/
|
|
2122
|
-
export type
|
|
2127
|
+
export type TopologyClass63 = "system";
|
|
2123
2128
|
/**
|
|
2124
2129
|
* The semantic boundary defining the objective function or computational perimeter of the execution node.
|
|
2125
2130
|
*/
|
|
@@ -2145,7 +2150,7 @@ export type DomainExtensions3 = {
|
|
|
2145
2150
|
/**
|
|
2146
2151
|
* Discriminator for a Composite node.
|
|
2147
2152
|
*/
|
|
2148
|
-
export type
|
|
2153
|
+
export type TopologyClass64 = "composite";
|
|
2149
2154
|
/**
|
|
2150
2155
|
* Entropy Penalty applied per edge traversal during a defeasible cascade.
|
|
2151
2156
|
*/
|
|
@@ -2214,40 +2219,6 @@ export type PolicyCid = string;
|
|
|
2214
2219
|
* Whether this policy is currently enforcing data sanitization.
|
|
2215
2220
|
*/
|
|
2216
2221
|
export type Active1 = boolean;
|
|
2217
|
-
/**
|
|
2218
|
-
* Unique identifier for the sanitization rule.
|
|
2219
|
-
*/
|
|
2220
|
-
export type RuleCid = string;
|
|
2221
|
-
/**
|
|
2222
|
-
* AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
|
|
2223
|
-
*
|
|
2224
|
-
* CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
|
|
2225
|
-
*
|
|
2226
|
-
* EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
|
|
2227
|
-
*
|
|
2228
|
-
* MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
|
|
2229
|
-
*/
|
|
2230
|
-
export type SemanticClassificationProfile1 = "public" | "internal" | "confidential" | "restricted";
|
|
2231
|
-
/**
|
|
2232
|
-
* The semantic entity type or declarative regex pattern to identify.
|
|
2233
|
-
*/
|
|
2234
|
-
export type TargetPattern = string;
|
|
2235
|
-
/**
|
|
2236
|
-
* The dynamic regex pattern to target.
|
|
2237
|
-
*/
|
|
2238
|
-
export type TargetRegexPattern = string;
|
|
2239
|
-
/**
|
|
2240
|
-
* Specific JSON paths where this rule should NOT apply.
|
|
2241
|
-
*/
|
|
2242
|
-
export type ContextExclusionZones = string[] | null;
|
|
2243
|
-
/**
|
|
2244
|
-
* The strictly typed string to insert if the action is 'redact'.
|
|
2245
|
-
*/
|
|
2246
|
-
export type ReplacementToken = string | null;
|
|
2247
|
-
/**
|
|
2248
|
-
* The array of sanitization rules to enforce.
|
|
2249
|
-
*/
|
|
2250
|
-
export type Rules = RedactionPolicy[];
|
|
2251
2222
|
/**
|
|
2252
2223
|
* The absolute physical ceiling of tokens allowed in a single ingress payload.
|
|
2253
2224
|
*/
|
|
@@ -2381,7 +2352,7 @@ export type FoveatedPrivacyEpsilon = number | null;
|
|
|
2381
2352
|
/**
|
|
2382
2353
|
* Discriminator for a DAG topology.
|
|
2383
2354
|
*/
|
|
2384
|
-
export type
|
|
2355
|
+
export type TopologyClass65 = "dag";
|
|
2385
2356
|
/**
|
|
2386
2357
|
* The strict, topologically bounded matrix of directed causal edges.
|
|
2387
2358
|
*/
|
|
@@ -2465,7 +2436,7 @@ export type Justification7 = string | null;
|
|
|
2465
2436
|
/**
|
|
2466
2437
|
* Discriminator for a Council topology.
|
|
2467
2438
|
*/
|
|
2468
|
-
export type
|
|
2439
|
+
export type TopologyClass66 = "council";
|
|
2469
2440
|
/**
|
|
2470
2441
|
* The minimum number of adversarial or 'Devil's Advocate' roles required to prevent groupthink.
|
|
2471
2442
|
*/
|
|
@@ -2537,7 +2508,7 @@ export type Justification8 = string | null;
|
|
|
2537
2508
|
/**
|
|
2538
2509
|
* Discriminator for a Swarm topology.
|
|
2539
2510
|
*/
|
|
2540
|
-
export type
|
|
2511
|
+
export type TopologyClass67 = "swarm";
|
|
2541
2512
|
/**
|
|
2542
2513
|
* Threshold limit for dynamic spawning of additional nodes.
|
|
2543
2514
|
*/
|
|
@@ -2619,7 +2590,7 @@ export type Justification9 = string | null;
|
|
|
2619
2590
|
/**
|
|
2620
2591
|
* Discriminator for an Evolutionary topology.
|
|
2621
2592
|
*/
|
|
2622
|
-
export type
|
|
2593
|
+
export type TopologyClass68 = "evolutionary";
|
|
2623
2594
|
/**
|
|
2624
2595
|
* The absolute limit on evolutionary breeding cycles.
|
|
2625
2596
|
*/
|
|
@@ -2679,7 +2650,7 @@ export type Justification10 = string | null;
|
|
|
2679
2650
|
/**
|
|
2680
2651
|
* Discriminator for SMPC Topology.
|
|
2681
2652
|
*/
|
|
2682
|
-
export type
|
|
2653
|
+
export type TopologyClass69 = "smpc";
|
|
2683
2654
|
/**
|
|
2684
2655
|
* The exact cryptographic P2P protocol the nodes must use to evaluate the function.
|
|
2685
2656
|
*/
|
|
@@ -2709,7 +2680,7 @@ export type Justification11 = string | null;
|
|
|
2709
2680
|
/**
|
|
2710
2681
|
* Discriminator for an Evaluator-Optimizer loop.
|
|
2711
2682
|
*/
|
|
2712
|
-
export type
|
|
2683
|
+
export type TopologyClass70 = "evaluator_optimizer";
|
|
2713
2684
|
/**
|
|
2714
2685
|
* The absolute limit on Actor-Critic cycles to prevent infinite compute burn.
|
|
2715
2686
|
*/
|
|
@@ -2733,7 +2704,7 @@ export type Justification12 = string | null;
|
|
|
2733
2704
|
/**
|
|
2734
2705
|
* Discriminator for a Digital Twin topology.
|
|
2735
2706
|
*/
|
|
2736
|
-
export type
|
|
2707
|
+
export type TopologyClass71 = "digital_twin";
|
|
2737
2708
|
/**
|
|
2738
2709
|
* The identifier (expected to be a W3C DID) pointing to the real-world topology it is cloning.
|
|
2739
2710
|
*/
|
|
@@ -2753,7 +2724,7 @@ export type EnforceNoSideEffects = boolean;
|
|
|
2753
2724
|
/**
|
|
2754
2725
|
* Discriminator for federation macro.
|
|
2755
2726
|
*/
|
|
2756
|
-
export type
|
|
2727
|
+
export type TopologyClass72 = "macro_federation";
|
|
2757
2728
|
/**
|
|
2758
2729
|
* The nodes forming the PBFT ring.
|
|
2759
2730
|
*
|
|
@@ -2775,7 +2746,7 @@ export type Justification13 = string | null;
|
|
|
2775
2746
|
/**
|
|
2776
2747
|
* Discriminator for forge macro.
|
|
2777
2748
|
*/
|
|
2778
|
-
export type
|
|
2749
|
+
export type TopologyClass73 = "macro_forge";
|
|
2779
2750
|
/**
|
|
2780
2751
|
* The structural 128-char DID boundary pointing to the foundational semantic deficit vector.
|
|
2781
2752
|
*/
|
|
@@ -2803,7 +2774,7 @@ export type Justification14 = string | null;
|
|
|
2803
2774
|
/**
|
|
2804
2775
|
* Discriminator for the elicitation macro.
|
|
2805
2776
|
*/
|
|
2806
|
-
export type
|
|
2777
|
+
export type TopologyClass74 = "macro_elicitation";
|
|
2807
2778
|
/**
|
|
2808
2779
|
* The anchor to the initial, unstructured MultimodalArtifactReceipt uploaded by the human.
|
|
2809
2780
|
*/
|
|
@@ -2827,7 +2798,7 @@ export type Justification15 = string | null;
|
|
|
2827
2798
|
/**
|
|
2828
2799
|
* Discriminator for the ingestion macro.
|
|
2829
2800
|
*/
|
|
2830
|
-
export type
|
|
2801
|
+
export type TopologyClass75 = "macro_ingestion";
|
|
2831
2802
|
/**
|
|
2832
2803
|
* Target serialization format.
|
|
2833
2804
|
*/
|
|
@@ -2847,7 +2818,7 @@ export type Justification16 = string | null;
|
|
|
2847
2818
|
/**
|
|
2848
2819
|
* Discriminator for a macro neurosymbolic loop.
|
|
2849
2820
|
*/
|
|
2850
|
-
export type
|
|
2821
|
+
export type TopologyClass76 = "macro_neurosymbolic";
|
|
2851
2822
|
/**
|
|
2852
2823
|
* The connectionist agent generating hypotheses.
|
|
2853
2824
|
*/
|
|
@@ -2867,7 +2838,7 @@ export type CritiqueSchemaCid = string | null;
|
|
|
2867
2838
|
/**
|
|
2868
2839
|
* Discriminator for a discourse tree topology.
|
|
2869
2840
|
*/
|
|
2870
|
-
export type
|
|
2841
|
+
export type TopologyClass77 = "discourse_tree";
|
|
2871
2842
|
/**
|
|
2872
2843
|
* Cryptographic identifier for this topology.
|
|
2873
2844
|
*/
|
|
@@ -2880,7 +2851,7 @@ export type DiscourseType = "preamble" | "methodology" | "argumentation" | "find
|
|
|
2880
2851
|
* Explicit pointers linking this discourse block to the specific AtomicPropositionState nodes extracted from its text.
|
|
2881
2852
|
*/
|
|
2882
2853
|
export type ContainedPropositions = NodeCIDState[];
|
|
2883
|
-
export type
|
|
2854
|
+
export type TopologyClass78 = "document_knowledge_graph";
|
|
2884
2855
|
export type GraphCid = string;
|
|
2885
2856
|
export type SourceArtifactCid2 = string;
|
|
2886
2857
|
/**
|
|
@@ -2944,7 +2915,7 @@ export type CiphertextBlob = string;
|
|
|
2944
2915
|
/**
|
|
2945
2916
|
* Discriminator for manifold mapping.
|
|
2946
2917
|
*/
|
|
2947
|
-
export type
|
|
2918
|
+
export type TopologyClass79 = "manifold_mapping";
|
|
2948
2919
|
/**
|
|
2949
2920
|
* Calculated geometric alignment between the semantic embedding and spatial tensor.
|
|
2950
2921
|
*/
|
|
@@ -2962,7 +2933,7 @@ export type Nodes12 = SemanticNodeState[];
|
|
|
2962
2933
|
*/
|
|
2963
2934
|
export type CausalEdges = CausalDirectedEdgeState[];
|
|
2964
2935
|
export type IsomorphismHash = string;
|
|
2965
|
-
export type
|
|
2936
|
+
export type TopologyClass80 = "hierarchical_dom";
|
|
2966
2937
|
export type DomCid = string;
|
|
2967
2938
|
export type RootBlockCid = string;
|
|
2968
2939
|
/**
|
|
@@ -3054,7 +3025,7 @@ export type DomainExtensions4 = {
|
|
|
3054
3025
|
/**
|
|
3055
3026
|
* Discriminator for a Memoized node.
|
|
3056
3027
|
*/
|
|
3057
|
-
export type
|
|
3028
|
+
export type TopologyClass81 = "memoized";
|
|
3058
3029
|
/**
|
|
3059
3030
|
* A discriminated union of presentation UI panels.
|
|
3060
3031
|
*/
|
|
@@ -3063,11 +3034,11 @@ export type AnyPresentationIntent = SemanticIntent | DraftingIntent | Adjudicati
|
|
|
3063
3034
|
/**
|
|
3064
3035
|
* A discriminated union of state events.
|
|
3065
3036
|
*/
|
|
3066
|
-
export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent |
|
|
3037
|
+
export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt | GuardrailViolationEvent;
|
|
3067
3038
|
/**
|
|
3068
3039
|
* Discriminator for temporal graph crdt.
|
|
3069
3040
|
*/
|
|
3070
|
-
export type
|
|
3041
|
+
export type TopologyClass82 = "temporal_graph_crdt";
|
|
3071
3042
|
/**
|
|
3072
3043
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark.
|
|
3073
3044
|
*/
|
|
@@ -3088,7 +3059,7 @@ export type AddSet = NodeCIDState[];
|
|
|
3088
3059
|
* The set of non-monotonic timeline caps.
|
|
3089
3060
|
*/
|
|
3090
3061
|
export type TerminateSet = TemporalEdgeInvalidationIntent[];
|
|
3091
|
-
export type
|
|
3062
|
+
export type TopologyClass83 = "mcp_tool_definition";
|
|
3092
3063
|
/**
|
|
3093
3064
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3094
3065
|
*/
|
|
@@ -3103,7 +3074,7 @@ export type Description9 = string;
|
|
|
3103
3074
|
export type EventCid2 = string;
|
|
3104
3075
|
export type PriorEventHash2 = string | null;
|
|
3105
3076
|
export type Timestamp2 = number;
|
|
3106
|
-
export type
|
|
3077
|
+
export type TopologyClass84 = "crosswalk_resolution";
|
|
3107
3078
|
export type ReceiptCid = string;
|
|
3108
3079
|
export type TargetGraphCid3 = string;
|
|
3109
3080
|
/**
|
|
@@ -3121,7 +3092,7 @@ export type Timestamp3 = number;
|
|
|
3121
3092
|
/**
|
|
3122
3093
|
* Discriminator for a zero-trust receipt.
|
|
3123
3094
|
*/
|
|
3124
|
-
export type
|
|
3095
|
+
export type TopologyClass85 = "zero_trust_receipt";
|
|
3125
3096
|
/**
|
|
3126
3097
|
* Pointer to the originating EpistemicZeroTrustContract.
|
|
3127
3098
|
*/
|
|
@@ -3157,7 +3128,7 @@ export type Timestamp4 = number;
|
|
|
3157
3128
|
/**
|
|
3158
3129
|
* Discriminator type for an observation event.
|
|
3159
3130
|
*/
|
|
3160
|
-
export type
|
|
3131
|
+
export type TopologyClass86 = "observation";
|
|
3161
3132
|
/**
|
|
3162
3133
|
* The URN representing the physical silicon architecture generating the root-of-trust quote (e.g., 'urn:coreason:enclave:intel_tdx').
|
|
3163
3134
|
*/
|
|
@@ -3177,7 +3148,7 @@ export type AnyToolchainState = BrowserDOMState | TerminalBufferState;
|
|
|
3177
3148
|
/**
|
|
3178
3149
|
* Discriminator for Causal Actuators representing structural shifts.
|
|
3179
3150
|
*/
|
|
3180
|
-
export type
|
|
3151
|
+
export type TopologyClass87 = "browser";
|
|
3181
3152
|
/**
|
|
3182
3153
|
* Spatial Execution Bounds where the agent interacts.
|
|
3183
3154
|
*/
|
|
@@ -3204,7 +3175,7 @@ export type ScreenshotCid = string | null;
|
|
|
3204
3175
|
/**
|
|
3205
3176
|
* Discriminator for Causal Actuators on structural buffers.
|
|
3206
3177
|
*/
|
|
3207
|
-
export type
|
|
3178
|
+
export type TopologyClass88 = "terminal";
|
|
3208
3179
|
/**
|
|
3209
3180
|
* Capability Perimeters defining context bounds.
|
|
3210
3181
|
*/
|
|
@@ -3302,7 +3273,7 @@ export type Timestamp5 = number;
|
|
|
3302
3273
|
/**
|
|
3303
3274
|
* Discriminator type for a Belief Assertion event.
|
|
3304
3275
|
*/
|
|
3305
|
-
export type
|
|
3276
|
+
export type TopologyClass89 = "belief_mutation";
|
|
3306
3277
|
/**
|
|
3307
3278
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the source event in the Merkle-DAG.
|
|
3308
3279
|
*/
|
|
@@ -3354,8 +3325,8 @@ export type Timestamp6 = number;
|
|
|
3354
3325
|
/**
|
|
3355
3326
|
* Discriminator type for a system fault event.
|
|
3356
3327
|
*/
|
|
3357
|
-
export type
|
|
3358
|
-
export type
|
|
3328
|
+
export type TopologyClass90 = "system_fault";
|
|
3329
|
+
export type TopologyClass91 = "atomic_proposition";
|
|
3359
3330
|
/**
|
|
3360
3331
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3361
3332
|
*/
|
|
@@ -3412,7 +3383,7 @@ export type UpperBound = number | null;
|
|
|
3412
3383
|
* Explicit mathematical boundaries extracted from the text that empirically limit the certainty or scope of the proposition.
|
|
3413
3384
|
*/
|
|
3414
3385
|
export type StatisticalQualifiers = EmpiricalStatisticalProfile[];
|
|
3415
|
-
export type
|
|
3386
|
+
export type TopologyClass92 = "post_coordinated_concept";
|
|
3416
3387
|
/**
|
|
3417
3388
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3418
3389
|
*/
|
|
@@ -3440,7 +3411,7 @@ export type IsometryScore = number;
|
|
|
3440
3411
|
export type EventCid9 = string;
|
|
3441
3412
|
export type PriorEventHash9 = string | null;
|
|
3442
3413
|
export type Timestamp9 = number;
|
|
3443
|
-
export type
|
|
3414
|
+
export type TopologyClass93 = "artifact_corruption";
|
|
3444
3415
|
/**
|
|
3445
3416
|
* The genesis artifact that caused the ingestion engine to crash.
|
|
3446
3417
|
*/
|
|
@@ -3462,7 +3433,7 @@ export type Timestamp10 = number;
|
|
|
3462
3433
|
/**
|
|
3463
3434
|
* Discriminator for a hypothesis generation event.
|
|
3464
3435
|
*/
|
|
3465
|
-
export type
|
|
3436
|
+
export type TopologyClass94 = "hypothesis";
|
|
3466
3437
|
/**
|
|
3467
3438
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this abductive leap to the Merkle-DAG.
|
|
3468
3439
|
*/
|
|
@@ -3516,7 +3487,7 @@ export type Timestamp11 = number;
|
|
|
3516
3487
|
/**
|
|
3517
3488
|
* Discriminator type for a barge-in interruption event.
|
|
3518
3489
|
*/
|
|
3519
|
-
export type
|
|
3490
|
+
export type TopologyClass95 = "barge_in";
|
|
3520
3491
|
/**
|
|
3521
3492
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the active node generation cycle that was killed in the Merkle-DAG.
|
|
3522
3493
|
*/
|
|
@@ -3546,7 +3517,7 @@ export type Timestamp12 = number;
|
|
|
3546
3517
|
/**
|
|
3547
3518
|
* Discriminator type for a counterfactual regret event.
|
|
3548
3519
|
*/
|
|
3549
|
-
export type
|
|
3520
|
+
export type TopologyClass96 = "counterfactual_regret";
|
|
3550
3521
|
/**
|
|
3551
3522
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the specific historical state node where the agent mathematically diverged to simulate an alternative path.
|
|
3552
3523
|
*/
|
|
@@ -3582,7 +3553,7 @@ export type Timestamp13 = number;
|
|
|
3582
3553
|
/**
|
|
3583
3554
|
* Discriminator type for a tool invocation event.
|
|
3584
3555
|
*/
|
|
3585
|
-
export type
|
|
3556
|
+
export type TopologyClass97 = "tool_invocation";
|
|
3586
3557
|
/**
|
|
3587
3558
|
* The exact tool targeted in the CognitiveActionSpaceManifest.
|
|
3588
3559
|
*/
|
|
@@ -3606,7 +3577,7 @@ export type Timestamp14 = number;
|
|
|
3606
3577
|
/**
|
|
3607
3578
|
* Discriminator type for an epistemic promotion event.
|
|
3608
3579
|
*/
|
|
3609
|
-
export type
|
|
3580
|
+
export type TopologyClass98 = "epistemic_promotion";
|
|
3610
3581
|
/**
|
|
3611
3582
|
* The strict array of CIDs (Content Identifiers) representing the raw logs being compressed and archived.
|
|
3612
3583
|
*/
|
|
@@ -3631,34 +3602,6 @@ export type PriorEventHash15 = string | null;
|
|
|
3631
3602
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3632
3603
|
*/
|
|
3633
3604
|
export type Timestamp15 = number;
|
|
3634
|
-
/**
|
|
3635
|
-
* Discriminator type for a normative drift event.
|
|
3636
|
-
*/
|
|
3637
|
-
export type TopologyClass98 = "normative_drift";
|
|
3638
|
-
/**
|
|
3639
|
-
* The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
|
|
3640
|
-
*/
|
|
3641
|
-
export type TrippedRuleCid = string;
|
|
3642
|
-
/**
|
|
3643
|
-
* The calculated probabilistic delta showing how far the swarm's observed reality is diverging from the static rule.
|
|
3644
|
-
*/
|
|
3645
|
-
export type MeasuredSemanticDrift = number;
|
|
3646
|
-
/**
|
|
3647
|
-
* A cryptographic pointer to the internal scratchpad trace (ThoughtBranchState) definitively proving the rule is obsolete or causing a loop.
|
|
3648
|
-
*/
|
|
3649
|
-
export type ContradictionProofHash = string;
|
|
3650
|
-
/**
|
|
3651
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3652
|
-
*/
|
|
3653
|
-
export type EventCid16 = string;
|
|
3654
|
-
/**
|
|
3655
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3656
|
-
*/
|
|
3657
|
-
export type PriorEventHash16 = string | null;
|
|
3658
|
-
/**
|
|
3659
|
-
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3660
|
-
*/
|
|
3661
|
-
export type Timestamp16 = number;
|
|
3662
3605
|
/**
|
|
3663
3606
|
* Discriminator type for a persistence commit receipt.
|
|
3664
3607
|
*/
|
|
@@ -3678,15 +3621,15 @@ export type TargetTableUri = string;
|
|
|
3678
3621
|
/**
|
|
3679
3622
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3680
3623
|
*/
|
|
3681
|
-
export type
|
|
3624
|
+
export type EventCid16 = string;
|
|
3682
3625
|
/**
|
|
3683
3626
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3684
3627
|
*/
|
|
3685
|
-
export type
|
|
3628
|
+
export type PriorEventHash16 = string | null;
|
|
3686
3629
|
/**
|
|
3687
3630
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3688
3631
|
*/
|
|
3689
|
-
export type
|
|
3632
|
+
export type Timestamp16 = number;
|
|
3690
3633
|
/**
|
|
3691
3634
|
* Discriminator type for a token burn receipt.
|
|
3692
3635
|
*/
|
|
@@ -3710,15 +3653,15 @@ export type BurnMagnitude = number;
|
|
|
3710
3653
|
/**
|
|
3711
3654
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3712
3655
|
*/
|
|
3713
|
-
export type
|
|
3656
|
+
export type EventCid17 = string;
|
|
3714
3657
|
/**
|
|
3715
3658
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3716
3659
|
*/
|
|
3717
|
-
export type
|
|
3660
|
+
export type PriorEventHash17 = string | null;
|
|
3718
3661
|
/**
|
|
3719
3662
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3720
3663
|
*/
|
|
3721
|
-
export type
|
|
3664
|
+
export type Timestamp17 = number;
|
|
3722
3665
|
/**
|
|
3723
3666
|
* Discriminator type for a budget exhaustion event.
|
|
3724
3667
|
*/
|
|
@@ -3734,15 +3677,15 @@ export type FinalBurnReceiptCid = string;
|
|
|
3734
3677
|
/**
|
|
3735
3678
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3736
3679
|
*/
|
|
3737
|
-
export type
|
|
3680
|
+
export type EventCid18 = string;
|
|
3738
3681
|
/**
|
|
3739
3682
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3740
3683
|
*/
|
|
3741
|
-
export type
|
|
3684
|
+
export type PriorEventHash18 = string | null;
|
|
3742
3685
|
/**
|
|
3743
3686
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3744
3687
|
*/
|
|
3745
|
-
export type
|
|
3688
|
+
export type Timestamp18 = number;
|
|
3746
3689
|
/**
|
|
3747
3690
|
* Discriminator type for telemetry events.
|
|
3748
3691
|
*/
|
|
@@ -3762,15 +3705,15 @@ export type DwellDurationMs = number | null;
|
|
|
3762
3705
|
/**
|
|
3763
3706
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3764
3707
|
*/
|
|
3765
|
-
export type
|
|
3708
|
+
export type EventCid19 = string;
|
|
3766
3709
|
/**
|
|
3767
3710
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3768
3711
|
*/
|
|
3769
|
-
export type
|
|
3712
|
+
export type PriorEventHash19 = string | null;
|
|
3770
3713
|
/**
|
|
3771
3714
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3772
3715
|
*/
|
|
3773
|
-
export type
|
|
3716
|
+
export type Timestamp19 = number;
|
|
3774
3717
|
export type TopologyClass103 = "cognitive_prediction";
|
|
3775
3718
|
export type SourceChainCid = string;
|
|
3776
3719
|
export type TargetSourceConcept = string;
|
|
@@ -3781,15 +3724,15 @@ export type PredictedTopKTokens = [string, ...string[]];
|
|
|
3781
3724
|
/**
|
|
3782
3725
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3783
3726
|
*/
|
|
3784
|
-
export type
|
|
3727
|
+
export type EventCid20 = string;
|
|
3785
3728
|
/**
|
|
3786
3729
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3787
3730
|
*/
|
|
3788
|
-
export type
|
|
3731
|
+
export type PriorEventHash20 = string | null;
|
|
3789
3732
|
/**
|
|
3790
3733
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3791
3734
|
*/
|
|
3792
|
-
export type
|
|
3735
|
+
export type Timestamp20 = number;
|
|
3793
3736
|
export type TopologyClass104 = "epistemic_axiom_verification";
|
|
3794
3737
|
export type SourcePredictionCid = string;
|
|
3795
3738
|
export type SequenceSimilarityScore = number;
|
|
@@ -3801,15 +3744,15 @@ export type ZeroTrustReceiptCid1 = string | null;
|
|
|
3801
3744
|
/**
|
|
3802
3745
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3803
3746
|
*/
|
|
3804
|
-
export type
|
|
3747
|
+
export type EventCid21 = string;
|
|
3805
3748
|
/**
|
|
3806
3749
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3807
3750
|
*/
|
|
3808
|
-
export type
|
|
3751
|
+
export type PriorEventHash21 = string | null;
|
|
3809
3752
|
/**
|
|
3810
3753
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3811
3754
|
*/
|
|
3812
|
-
export type
|
|
3755
|
+
export type Timestamp21 = number;
|
|
3813
3756
|
export type TopologyClass105 = "epistemic_flow_state";
|
|
3814
3757
|
/**
|
|
3815
3758
|
* The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
|
|
@@ -3826,15 +3769,15 @@ export type TerminalRewardFactorized = boolean;
|
|
|
3826
3769
|
/**
|
|
3827
3770
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3828
3771
|
*/
|
|
3829
|
-
export type
|
|
3772
|
+
export type EventCid22 = string;
|
|
3830
3773
|
/**
|
|
3831
3774
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3832
3775
|
*/
|
|
3833
|
-
export type
|
|
3776
|
+
export type PriorEventHash22 = string | null;
|
|
3834
3777
|
/**
|
|
3835
3778
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3836
3779
|
*/
|
|
3837
|
-
export type
|
|
3780
|
+
export type Timestamp22 = number;
|
|
3838
3781
|
/**
|
|
3839
3782
|
* Discriminator type for a causal explanation event.
|
|
3840
3783
|
*/
|
|
@@ -3878,15 +3821,15 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
|
|
|
3878
3821
|
/**
|
|
3879
3822
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3880
3823
|
*/
|
|
3881
|
-
export type
|
|
3824
|
+
export type EventCid23 = string;
|
|
3882
3825
|
/**
|
|
3883
3826
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3884
3827
|
*/
|
|
3885
|
-
export type
|
|
3828
|
+
export type PriorEventHash23 = string | null;
|
|
3886
3829
|
/**
|
|
3887
3830
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3888
3831
|
*/
|
|
3889
|
-
export type
|
|
3832
|
+
export type Timestamp23 = number;
|
|
3890
3833
|
/**
|
|
3891
3834
|
* Discriminator type for an intent classification receipt.
|
|
3892
3835
|
*/
|
|
@@ -3911,15 +3854,15 @@ export type TopologyClass108 = "semantic_relational_record";
|
|
|
3911
3854
|
/**
|
|
3912
3855
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3913
3856
|
*/
|
|
3914
|
-
export type
|
|
3857
|
+
export type EventCid24 = string;
|
|
3915
3858
|
/**
|
|
3916
3859
|
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
3917
3860
|
*/
|
|
3918
|
-
export type
|
|
3861
|
+
export type PriorEventHash24 = string | null;
|
|
3919
3862
|
/**
|
|
3920
3863
|
* The precise temporal coordinate of the event realization.
|
|
3921
3864
|
*/
|
|
3922
|
-
export type
|
|
3865
|
+
export type Timestamp24 = number;
|
|
3923
3866
|
/**
|
|
3924
3867
|
* The domain-independent structural classification of the record.
|
|
3925
3868
|
*/
|
|
@@ -3935,15 +3878,15 @@ export type TopologyClass109 = "ontological_reification";
|
|
|
3935
3878
|
/**
|
|
3936
3879
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3937
3880
|
*/
|
|
3938
|
-
export type
|
|
3881
|
+
export type EventCid25 = string;
|
|
3939
3882
|
/**
|
|
3940
3883
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
3941
3884
|
*/
|
|
3942
|
-
export type
|
|
3885
|
+
export type PriorEventHash25 = string | null;
|
|
3943
3886
|
/**
|
|
3944
3887
|
* The precise temporal coordinate of the event realization.
|
|
3945
3888
|
*/
|
|
3946
|
-
export type
|
|
3889
|
+
export type Timestamp25 = number;
|
|
3947
3890
|
/**
|
|
3948
3891
|
* The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
|
|
3949
3892
|
*/
|
|
@@ -3963,15 +3906,15 @@ export type IsLatentInference = boolean;
|
|
|
3963
3906
|
/**
|
|
3964
3907
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3965
3908
|
*/
|
|
3966
|
-
export type
|
|
3909
|
+
export type EventCid26 = string;
|
|
3967
3910
|
/**
|
|
3968
3911
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3969
3912
|
*/
|
|
3970
|
-
export type
|
|
3913
|
+
export type PriorEventHash26 = string | null;
|
|
3971
3914
|
/**
|
|
3972
3915
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3973
3916
|
*/
|
|
3974
|
-
export type
|
|
3917
|
+
export type Timestamp26 = number;
|
|
3975
3918
|
/**
|
|
3976
3919
|
* The type of the resilience payload.
|
|
3977
3920
|
*/
|
|
@@ -3983,15 +3926,15 @@ export type ErrorSignature = string;
|
|
|
3983
3926
|
/**
|
|
3984
3927
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3985
3928
|
*/
|
|
3986
|
-
export type
|
|
3929
|
+
export type EventCid27 = string;
|
|
3987
3930
|
/**
|
|
3988
3931
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3989
3932
|
*/
|
|
3990
|
-
export type
|
|
3933
|
+
export type PriorEventHash27 = string | null;
|
|
3991
3934
|
/**
|
|
3992
3935
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3993
3936
|
*/
|
|
3994
|
-
export type
|
|
3937
|
+
export type Timestamp27 = number;
|
|
3995
3938
|
/**
|
|
3996
3939
|
* Discriminator type for an exogenous event.
|
|
3997
3940
|
*/
|
|
@@ -4015,11 +3958,11 @@ export type LockedMagnitude = number;
|
|
|
4015
3958
|
/**
|
|
4016
3959
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4017
3960
|
*/
|
|
4018
|
-
export type
|
|
3961
|
+
export type EventCid28 = string;
|
|
4019
3962
|
/**
|
|
4020
3963
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4021
3964
|
*/
|
|
4022
|
-
export type
|
|
3965
|
+
export type PriorEventHash28 = string | null;
|
|
4023
3966
|
/**
|
|
4024
3967
|
* Discriminator type for a log event.
|
|
4025
3968
|
*/
|
|
@@ -4027,7 +3970,7 @@ export type TopologyClass112 = "epistemic_log";
|
|
|
4027
3970
|
/**
|
|
4028
3971
|
* The UNIX timestamp of the log event.
|
|
4029
3972
|
*/
|
|
4030
|
-
export type
|
|
3973
|
+
export type Timestamp28 = number;
|
|
4031
3974
|
/**
|
|
4032
3975
|
* The severity level of the log event.
|
|
4033
3976
|
*/
|
|
@@ -4044,15 +3987,15 @@ export type TopologyClass113 = "verdict";
|
|
|
4044
3987
|
/**
|
|
4045
3988
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4046
3989
|
*/
|
|
4047
|
-
export type
|
|
3990
|
+
export type EventCid29 = string;
|
|
4048
3991
|
/**
|
|
4049
3992
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4050
3993
|
*/
|
|
4051
|
-
export type
|
|
3994
|
+
export type PriorEventHash29 = string | null;
|
|
4052
3995
|
/**
|
|
4053
3996
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4054
3997
|
*/
|
|
4055
|
-
export type
|
|
3998
|
+
export type Timestamp29 = number;
|
|
4056
3999
|
/**
|
|
4057
4000
|
* The cryptographic nonce uniquely identifying the intervention request.
|
|
4058
4001
|
*/
|
|
@@ -4088,15 +4031,15 @@ export type LivenessChallengeHash = string;
|
|
|
4088
4031
|
/**
|
|
4089
4032
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4090
4033
|
*/
|
|
4091
|
-
export type
|
|
4034
|
+
export type EventCid30 = string;
|
|
4092
4035
|
/**
|
|
4093
4036
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4094
4037
|
*/
|
|
4095
|
-
export type
|
|
4038
|
+
export type PriorEventHash30 = string | null;
|
|
4096
4039
|
/**
|
|
4097
4040
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4098
4041
|
*/
|
|
4099
|
-
export type
|
|
4042
|
+
export type Timestamp30 = number;
|
|
4100
4043
|
export type TopologyClass114 = "custody_receipt";
|
|
4101
4044
|
/**
|
|
4102
4045
|
* Unique identifier for this chain-of-custody entry.
|
|
@@ -4125,15 +4068,15 @@ export type RedactionTimestampUnixNano = number;
|
|
|
4125
4068
|
/**
|
|
4126
4069
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4127
4070
|
*/
|
|
4128
|
-
export type
|
|
4071
|
+
export type EventCid31 = string;
|
|
4129
4072
|
/**
|
|
4130
4073
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4131
4074
|
*/
|
|
4132
|
-
export type
|
|
4075
|
+
export type PriorEventHash31 = string | null;
|
|
4133
4076
|
/**
|
|
4134
4077
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4135
4078
|
*/
|
|
4136
|
-
export type
|
|
4079
|
+
export type Timestamp31 = number;
|
|
4137
4080
|
export type TopologyClass115 = "defeasible_attack";
|
|
4138
4081
|
/**
|
|
4139
4082
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
|
|
@@ -4150,15 +4093,15 @@ export type TargetClaimCid = string;
|
|
|
4150
4093
|
/**
|
|
4151
4094
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4152
4095
|
*/
|
|
4153
|
-
export type
|
|
4096
|
+
export type EventCid32 = string;
|
|
4154
4097
|
/**
|
|
4155
4098
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4156
4099
|
*/
|
|
4157
|
-
export type
|
|
4100
|
+
export type PriorEventHash32 = string | null;
|
|
4158
4101
|
/**
|
|
4159
4102
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4160
4103
|
*/
|
|
4161
|
-
export type
|
|
4104
|
+
export type Timestamp32 = number;
|
|
4162
4105
|
export type TopologyClass116 = "epistemic_rejection";
|
|
4163
4106
|
export type ReceiptCid1 = string;
|
|
4164
4107
|
export type FailedProjectionCid = string;
|
|
@@ -4168,15 +4111,15 @@ export type StochasticMutationGradient = string;
|
|
|
4168
4111
|
/**
|
|
4169
4112
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4170
4113
|
*/
|
|
4171
|
-
export type
|
|
4114
|
+
export type EventCid33 = string;
|
|
4172
4115
|
/**
|
|
4173
4116
|
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
4174
4117
|
*/
|
|
4175
|
-
export type
|
|
4118
|
+
export type PriorEventHash33 = string | null;
|
|
4176
4119
|
/**
|
|
4177
4120
|
* The precise temporal coordinate of the event realization.
|
|
4178
4121
|
*/
|
|
4179
|
-
export type
|
|
4122
|
+
export type Timestamp33 = number;
|
|
4180
4123
|
export type TopologyClass117 = "formal_verification_receipt";
|
|
4181
4124
|
/**
|
|
4182
4125
|
* The definitive Boolean evaluating whether the proof succeeded, the program is satisfiable, or the deduction holds true.
|
|
@@ -4201,15 +4144,15 @@ export type ReceiptCid2 = string;
|
|
|
4201
4144
|
/**
|
|
4202
4145
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4203
4146
|
*/
|
|
4204
|
-
export type
|
|
4147
|
+
export type EventCid34 = string;
|
|
4205
4148
|
/**
|
|
4206
4149
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4207
4150
|
*/
|
|
4208
|
-
export type
|
|
4151
|
+
export type PriorEventHash34 = string | null;
|
|
4209
4152
|
/**
|
|
4210
4153
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4211
4154
|
*/
|
|
4212
|
-
export type
|
|
4155
|
+
export type Timestamp34 = number;
|
|
4213
4156
|
export type TargetGraphCid4 = string;
|
|
4214
4157
|
export type SeveredEdgeCids = string[];
|
|
4215
4158
|
export type TopologyClass119 = "rdf_export_receipt";
|
|
@@ -4217,21 +4160,21 @@ export type ExportCid1 = string;
|
|
|
4217
4160
|
/**
|
|
4218
4161
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4219
4162
|
*/
|
|
4220
|
-
export type
|
|
4163
|
+
export type EventCid35 = string;
|
|
4221
4164
|
/**
|
|
4222
4165
|
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4223
4166
|
*/
|
|
4224
|
-
export type
|
|
4167
|
+
export type PriorEventHash35 = string | null;
|
|
4225
4168
|
/**
|
|
4226
4169
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4227
4170
|
*/
|
|
4228
|
-
export type
|
|
4171
|
+
export type Timestamp35 = number;
|
|
4229
4172
|
export type SerializedPayload = string;
|
|
4230
4173
|
export type RdfTripleCount = number;
|
|
4231
4174
|
export type Sha256GraphHash = string;
|
|
4232
|
-
export type
|
|
4233
|
-
export type
|
|
4234
|
-
export type
|
|
4175
|
+
export type EventCid36 = string;
|
|
4176
|
+
export type PriorEventHash36 = string | null;
|
|
4177
|
+
export type Timestamp36 = number;
|
|
4235
4178
|
export type TopologyClass120 = "epistemic_starvation";
|
|
4236
4179
|
/**
|
|
4237
4180
|
* The cryptographic pointer to the specific edge that failed empirical grounding.
|
|
@@ -4245,9 +4188,9 @@ export type FailedCitations = EvidentiaryCitationState[];
|
|
|
4245
4188
|
* The semantic explanation for the starvation (e.g., 'Maximum search retries exhausted').
|
|
4246
4189
|
*/
|
|
4247
4190
|
export type DiagnosticReason = string;
|
|
4248
|
-
export type
|
|
4249
|
-
export type
|
|
4250
|
-
export type
|
|
4191
|
+
export type EventCid37 = string;
|
|
4192
|
+
export type PriorEventHash37 = string | null;
|
|
4193
|
+
export type Timestamp37 = number;
|
|
4251
4194
|
export type TopologyClass121 = "sparql_query_result";
|
|
4252
4195
|
/**
|
|
4253
4196
|
* A pointer back to the SPARQLQueryIntent that authorized this execution.
|
|
@@ -4277,6 +4220,34 @@ export type TokensBurned = number;
|
|
|
4277
4220
|
* An optional cryptographic signature from a Human-in-the-Loop (HITL) operator attesting to the correctness of the execution result. Populated only when the Temporal workflow escalates to manual review.
|
|
4278
4221
|
*/
|
|
4279
4222
|
export type HumanAttestationSignature = string | null;
|
|
4223
|
+
/**
|
|
4224
|
+
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
4225
|
+
*/
|
|
4226
|
+
export type EventCid38 = string;
|
|
4227
|
+
/**
|
|
4228
|
+
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4229
|
+
*/
|
|
4230
|
+
export type PriorEventHash38 = string | null;
|
|
4231
|
+
/**
|
|
4232
|
+
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4233
|
+
*/
|
|
4234
|
+
export type Timestamp38 = number;
|
|
4235
|
+
/**
|
|
4236
|
+
* The type of the security violation payload.
|
|
4237
|
+
*/
|
|
4238
|
+
export type TopologyClass123 = "guardrail_violation_event";
|
|
4239
|
+
/**
|
|
4240
|
+
* Unique identifier for the violation event.
|
|
4241
|
+
*/
|
|
4242
|
+
export type ViolationId = string;
|
|
4243
|
+
/**
|
|
4244
|
+
* The HTTP status code returned by the Guardrails proxy.
|
|
4245
|
+
*/
|
|
4246
|
+
export type StatusCode = number;
|
|
4247
|
+
/**
|
|
4248
|
+
* The classification of the violation (e.g., 'pii_leak', 'toxic_content').
|
|
4249
|
+
*/
|
|
4250
|
+
export type ViolationType = string;
|
|
4280
4251
|
/**
|
|
4281
4252
|
* A discriminated union of workflow topologies.
|
|
4282
4253
|
*/
|
|
@@ -4285,7 +4256,7 @@ export type AnyTransitionEdge = TransitionEdgeProfile | CyclicEdgeProfile;
|
|
|
4285
4256
|
/**
|
|
4286
4257
|
* Discriminator type for an acyclic edge.
|
|
4287
4258
|
*/
|
|
4288
|
-
export type
|
|
4259
|
+
export type TopologyClass124 = "acyclic";
|
|
4289
4260
|
/**
|
|
4290
4261
|
* The coinductive pointer to the destination capability.
|
|
4291
4262
|
*/
|
|
@@ -4317,7 +4288,7 @@ export type ComputeWeightMagnitude = number;
|
|
|
4317
4288
|
/**
|
|
4318
4289
|
* Discriminator type for a cyclic edge.
|
|
4319
4290
|
*/
|
|
4320
|
-
export type
|
|
4291
|
+
export type TopologyClass125 = "cyclic";
|
|
4321
4292
|
/**
|
|
4322
4293
|
* The coinductive pointer to the destination capability.
|
|
4323
4294
|
*/
|
|
@@ -4495,24 +4466,6 @@ export type MagnitudeUnit = string;
|
|
|
4495
4466
|
* The declarative array of specialized functional expert clusters (e.g., 'falsifier', 'synthesizer') physically present in this model's architecture.
|
|
4496
4467
|
*/
|
|
4497
4468
|
export type SupportedFunctionalExperts = string[];
|
|
4498
|
-
/**
|
|
4499
|
-
* Unique identifier for the constitutional rule.
|
|
4500
|
-
*/
|
|
4501
|
-
export type RuleCid1 = string;
|
|
4502
|
-
/**
|
|
4503
|
-
* The definitive causal constraint or heuristic boundary enforced by this rule.
|
|
4504
|
-
*/
|
|
4505
|
-
export type Description10 = string;
|
|
4506
|
-
/**
|
|
4507
|
-
* The categorical magnitude of the systemic breach enacted upon rule violation.
|
|
4508
|
-
*/
|
|
4509
|
-
export type Severity = "low" | "medium" | "high" | "critical";
|
|
4510
|
-
/**
|
|
4511
|
-
* The explicit, structurally bounded set of forbidden semantic intents.
|
|
4512
|
-
*
|
|
4513
|
-
* @maxItems 1000
|
|
4514
|
-
*/
|
|
4515
|
-
export type ForbiddenIntents1 = string[];
|
|
4516
4469
|
/**
|
|
4517
4470
|
* Forces non-destructive graph mutations.
|
|
4518
4471
|
*/
|
|
@@ -4611,6 +4564,18 @@ export type DistributionShapeProfile = "gaussian" | "uniform" | "beta";
|
|
|
4611
4564
|
* Directed edges defining the topological sort (chronological flow) of the document.
|
|
4612
4565
|
*/
|
|
4613
4566
|
export type ChronologicalFlowEdges = [unknown, unknown][];
|
|
4567
|
+
/**
|
|
4568
|
+
* The minimal required PRM score improvement across the lookback window to justify continued compute.
|
|
4569
|
+
*/
|
|
4570
|
+
export type ConvergenceDeltaEpsilon = number;
|
|
4571
|
+
/**
|
|
4572
|
+
* The N-step temporal window over which the PRM gradient is calculated.
|
|
4573
|
+
*/
|
|
4574
|
+
export type LookbackWindowSteps = number;
|
|
4575
|
+
/**
|
|
4576
|
+
* The burn-in period before convergence logic is activated.
|
|
4577
|
+
*/
|
|
4578
|
+
export type MinimumReasoningSteps = number;
|
|
4614
4579
|
/**
|
|
4615
4580
|
* A Python 3.14 t-string template definition for dynamic UI grid evaluation.
|
|
4616
4581
|
*/
|
|
@@ -4740,6 +4705,18 @@ export type TestTimeMultiplier = number;
|
|
|
4740
4705
|
* The absolute integer limit on how many times the orchestrator can recursively multiply the compute budget before forcing a SystemFaultEvent.
|
|
4741
4706
|
*/
|
|
4742
4707
|
export type MaxEscalationTiers = number;
|
|
4708
|
+
/**
|
|
4709
|
+
* The Colang specification version.
|
|
4710
|
+
*/
|
|
4711
|
+
export type ColangVersion = "1.0" | "2.0";
|
|
4712
|
+
/**
|
|
4713
|
+
* The raw Colang (.co) state machine configuration.
|
|
4714
|
+
*/
|
|
4715
|
+
export type ColangPayload = string;
|
|
4716
|
+
/**
|
|
4717
|
+
* The categorical magnitude of the systemic breach enacted upon rule violation.
|
|
4718
|
+
*/
|
|
4719
|
+
export type Severity = "low" | "medium" | "high" | "critical";
|
|
4743
4720
|
/**
|
|
4744
4721
|
* Absolute recursive depth limit for DAG deserialization.
|
|
4745
4722
|
*/
|
|
@@ -4874,6 +4851,22 @@ export type SopCid = string;
|
|
|
4874
4851
|
* The exact topological flow between step_cids.
|
|
4875
4852
|
*/
|
|
4876
4853
|
export type ChronologicalFlowEdges1 = [unknown, unknown][];
|
|
4854
|
+
/**
|
|
4855
|
+
* If a ThoughtBranchState's prm_score falls below this threshold, the orchestrator MUST halt its generation.
|
|
4856
|
+
*/
|
|
4857
|
+
export type PruningThreshold = number;
|
|
4858
|
+
/**
|
|
4859
|
+
* The absolute limit on how many times the agent can start a new branch before throwing a SystemFaultEvent.
|
|
4860
|
+
*/
|
|
4861
|
+
export type MaxBacktracksAllowed = number;
|
|
4862
|
+
/**
|
|
4863
|
+
* The specific PRM model used to score the logic (e.g., 'math-prm-v2').
|
|
4864
|
+
*/
|
|
4865
|
+
export type EvaluatorMatrixName = string | null;
|
|
4866
|
+
/**
|
|
4867
|
+
* The strict array of Process Reward Contracts evaluating the logic.
|
|
4868
|
+
*/
|
|
4869
|
+
export type PrmEvaluations = ProcessRewardContract[];
|
|
4877
4870
|
/**
|
|
4878
4871
|
* AGENT INSTRUCTION: Defines the minimum cryptographic isolation perimeter required for this node's thermodynamic execution.
|
|
4879
4872
|
*
|
|
@@ -4972,14 +4965,6 @@ export type CategoricalCohorts = string[];
|
|
|
4972
4965
|
* The valid chronological windows encompassing the artifact.
|
|
4973
4966
|
*/
|
|
4974
4967
|
export type TemporalObservationHorizons = TemporalBoundsProfile2[];
|
|
4975
|
-
/**
|
|
4976
|
-
* Name of the governance policy.
|
|
4977
|
-
*/
|
|
4978
|
-
export type PolicyName = string;
|
|
4979
|
-
/**
|
|
4980
|
-
* The explicit array of constitutional rules included in this policy.
|
|
4981
|
-
*/
|
|
4982
|
-
export type Rules1 = ConstitutionalPolicy[];
|
|
4983
4968
|
/**
|
|
4984
4969
|
* How to flatten SemanticNodeState.
|
|
4985
4970
|
*/
|
|
@@ -5183,7 +5168,6 @@ export type RhetoricalStructureProfile1 = "premise" | "conclusion" | "elaboratio
|
|
|
5183
5168
|
* MCP ROUTING TRIGGERS: Quantitative Risk Assessment, Game Theory, Cybernetic Governance, Structural Circuit Breaker, Utility Theory
|
|
5184
5169
|
*/
|
|
5185
5170
|
export type RiskLevelPolicy = "safe" | "standard" | "critical";
|
|
5186
|
-
export type SanitizationActionIntent = "redact" | "hash" | "drop_event" | "trigger_quarantine";
|
|
5187
5171
|
/**
|
|
5188
5172
|
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this semantic edge to the Merkle-DAG.
|
|
5189
5173
|
*/
|
|
@@ -5393,7 +5377,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5393
5377
|
ConsensusFederationTopologyManifest?: ConsensusFederationTopologyManifest;
|
|
5394
5378
|
ConsensusPolicy?: ConsensusPolicy;
|
|
5395
5379
|
ConstitutionalAmendmentIntent?: ConstitutionalAmendmentIntent;
|
|
5396
|
-
ConstitutionalPolicy?: ConstitutionalPolicy;
|
|
5397
5380
|
ConstrainedDecodingPolicy?: ConstrainedDecodingPolicy;
|
|
5398
5381
|
ContextExpansionPolicy?: ContextExpansionPolicy;
|
|
5399
5382
|
ContextualSemanticResolutionIntent?: ContextualSemanticResolutionIntent;
|
|
@@ -5429,6 +5412,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5429
5412
|
DocumentLayoutManifest?: DocumentLayoutManifest;
|
|
5430
5413
|
DocumentLayoutRegionState?: DocumentLayoutRegionState;
|
|
5431
5414
|
DraftingIntent?: DraftingIntent;
|
|
5415
|
+
DynamicConvergenceSLA?: DynamicConvergenceSLA;
|
|
5432
5416
|
DynamicLayoutManifest?: DynamicLayoutManifest;
|
|
5433
5417
|
DynamicManifoldProjectionManifest?: DynamicManifoldProjectionManifest1;
|
|
5434
5418
|
DynamicRoutingManifest?: DynamicRoutingManifest;
|
|
@@ -5451,6 +5435,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5451
5435
|
EpistemicEscalationContract?: EpistemicEscalationContract;
|
|
5452
5436
|
EpistemicFlowStateReceipt?: EpistemicFlowStateReceipt;
|
|
5453
5437
|
EpistemicGroundedTaskManifest?: EpistemicGroundedTaskManifest;
|
|
5438
|
+
EpistemicGuardrailsManifest?: EpistemicGuardrailsManifest;
|
|
5454
5439
|
EpistemicHydrationPolicy?: EpistemicHydrationPolicy;
|
|
5455
5440
|
EpistemicLedgerState?: EpistemicLedgerState;
|
|
5456
5441
|
EpistemicLogEvent?: EpistemicLogEvent;
|
|
@@ -5491,6 +5476,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5491
5476
|
FallbackIntent?: FallbackIntent;
|
|
5492
5477
|
FallbackSLA?: FallbackSLA;
|
|
5493
5478
|
FalsificationContract?: FalsificationContract;
|
|
5479
|
+
FederatedDiscoveryIntent?: FederatedDiscoveryIntent;
|
|
5494
5480
|
FitnessObjectiveProfile?: FitnessObjectiveProfile;
|
|
5495
5481
|
FormalLogicPremise?: FormalLogicPremise;
|
|
5496
5482
|
FormalVerificationContract?: FormalVerificationContract;
|
|
@@ -5500,10 +5486,10 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5500
5486
|
GlobalGovernancePolicy?: GlobalGovernancePolicy;
|
|
5501
5487
|
GlobalSemanticInvariantProfile?: GlobalSemanticInvariantProfile;
|
|
5502
5488
|
GlobalSemanticProfile?: GlobalSemanticProfile1;
|
|
5503
|
-
GovernancePolicy?: GovernancePolicy;
|
|
5504
5489
|
GradingCriterionProfile?: GradingCriterionProfile;
|
|
5505
5490
|
GrammarPanelProfile?: GrammarPanelProfile1;
|
|
5506
5491
|
GraphFlatteningPolicy?: GraphFlatteningPolicy;
|
|
5492
|
+
GuardrailViolationEvent?: GuardrailViolationEvent;
|
|
5507
5493
|
HTTPTransportProfile?: HTTPTransportProfile;
|
|
5508
5494
|
HardwareEnclaveReceipt?: HardwareEnclaveReceipt;
|
|
5509
5495
|
HierarchicalDOMManifest?: HierarchicalDOMManifest;
|
|
@@ -5562,7 +5548,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5562
5548
|
NeurosymbolicIngestionTopologyManifest?: NeurosymbolicIngestionTopologyManifest;
|
|
5563
5549
|
NeurosymbolicVerificationTopologyManifest?: NeurosymbolicVerificationTopologyManifest;
|
|
5564
5550
|
NodeCIDState?: NodeCIDState;
|
|
5565
|
-
NormativeDriftEvent?: NormativeDriftEvent;
|
|
5566
5551
|
ObservabilityLODPolicy?: ObservabilityLODPolicy;
|
|
5567
5552
|
ObservationEvent?: ObservationEvent;
|
|
5568
5553
|
OntologicalAlignmentPolicy?: OntologicalAlignmentPolicy;
|
|
@@ -5587,6 +5572,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5587
5572
|
PredictionMarketState?: PredictionMarketState;
|
|
5588
5573
|
PresentationManifest?: PresentationManifest;
|
|
5589
5574
|
ProceduralMetadataManifest?: ProceduralMetadataManifest;
|
|
5575
|
+
ProcessRewardContract?: ProcessRewardContract;
|
|
5590
5576
|
ProfileCIDState?: ProfileCIDState;
|
|
5591
5577
|
QoSClassificationProfile?: QoSClassificationProfile;
|
|
5592
5578
|
QuarantineIntent?: QuarantineIntent;
|
|
@@ -5594,7 +5580,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5594
5580
|
RDFExportReceipt?: RDFExportReceipt;
|
|
5595
5581
|
RDFSerializationIntent?: RDFSerializationIntent;
|
|
5596
5582
|
ReasoningEngineeringPolicy?: ReasoningEngineeringPolicy;
|
|
5597
|
-
RedactionPolicy?: RedactionPolicy;
|
|
5598
5583
|
RhetoricalStructureProfile?: RhetoricalStructureProfile1;
|
|
5599
5584
|
RiskLevelPolicy?: RiskLevelPolicy;
|
|
5600
5585
|
RollbackIntent?: RollbackIntent;
|
|
@@ -5608,12 +5593,10 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5608
5593
|
SaeFeatureActivationState?: SaeFeatureActivationState;
|
|
5609
5594
|
SaeLatentPolicy?: SaeLatentPolicy;
|
|
5610
5595
|
SalienceProfile?: SalienceProfile;
|
|
5611
|
-
SanitizationActionIntent?: SanitizationActionIntent;
|
|
5612
5596
|
ScalePolicy?: ScalePolicy;
|
|
5613
5597
|
SchemaDrivenExtractionSLA?: SchemaDrivenExtractionSLA;
|
|
5614
5598
|
SecureSubSessionState?: SecureSubSessionState;
|
|
5615
5599
|
SelfCorrectionPolicy?: SelfCorrectionPolicy;
|
|
5616
|
-
SemanticClassificationProfile?: SemanticClassificationProfile;
|
|
5617
5600
|
SemanticDiscoveryIntent?: SemanticDiscoveryIntent;
|
|
5618
5601
|
SemanticEdgeState?: SemanticEdgeState;
|
|
5619
5602
|
SemanticFirewallPolicy?: SemanticFirewallPolicy;
|
|
@@ -8025,6 +8008,23 @@ export interface OntologicalNormalizationIntent {
|
|
|
8025
8008
|
source_artifact_cid: SourceArtifactCid1;
|
|
8026
8009
|
target_ontology_urn: TargetOntologyUrn;
|
|
8027
8010
|
}
|
|
8011
|
+
/**
|
|
8012
|
+
* CoReason Shared Kernel Ontology
|
|
8013
|
+
*
|
|
8014
|
+
* AGENT INSTRUCTION: Encapsulates the geometric parameters for a cross-authority capability discovery query.
|
|
8015
|
+
* Used by the Federated Gateway to route semantic search intents across zero-trust network boundaries.
|
|
8016
|
+
*
|
|
8017
|
+
* CAUSAL AFFORDANCE: Enables the discovery of URN-addressable capabilities that match specific topological and status filters.
|
|
8018
|
+
*
|
|
8019
|
+
* EPISTEMIC BOUNDS: Strictly bounded by the domain_filter array and the minimum_epistemic_status enum.
|
|
8020
|
+
*
|
|
8021
|
+
* MCP ROUTING TRIGGERS: Federated Discovery, Semantic Search, Capability Routing, Zero-Trust Discovery.
|
|
8022
|
+
*/
|
|
8023
|
+
export interface FederatedDiscoveryIntent {
|
|
8024
|
+
topology_class?: TopologyClass60;
|
|
8025
|
+
domain_filter: DomainFilter;
|
|
8026
|
+
minimum_epistemic_status?: MinimumEpistemicStatus;
|
|
8027
|
+
}
|
|
8028
8028
|
/**
|
|
8029
8029
|
* CoReason Shared Kernel Ontology
|
|
8030
8030
|
*
|
|
@@ -8054,7 +8054,7 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8054
8054
|
*/
|
|
8055
8055
|
render_material?: SpatialRenderMaterial | null;
|
|
8056
8056
|
description: Description3;
|
|
8057
|
-
topology_class?:
|
|
8057
|
+
topology_class?: TopologyClass61;
|
|
8058
8058
|
hardware?: SpatialHardwareProfile1;
|
|
8059
8059
|
security?: EpistemicSecurityProfile;
|
|
8060
8060
|
/**
|
|
@@ -8602,7 +8602,7 @@ export interface CognitiveHumanNodeProfile {
|
|
|
8602
8602
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
8603
8603
|
*/
|
|
8604
8604
|
render_material?: SpatialRenderMaterial | null;
|
|
8605
|
-
topology_class?:
|
|
8605
|
+
topology_class?: TopologyClass62;
|
|
8606
8606
|
required_attestation: RequiredAttestation;
|
|
8607
8607
|
/**
|
|
8608
8608
|
* The continuous spatial vector representing the human operator's localized cognitive focus.
|
|
@@ -8650,7 +8650,7 @@ export interface CognitiveSystemNodeProfile {
|
|
|
8650
8650
|
* The mathematical functor blueprint authorizing the runtime to hydrate a specific open-source engine (e.g., SymbolicAI) for this node.
|
|
8651
8651
|
*/
|
|
8652
8652
|
execution_substrate?: ExecutionSubstrateProfile1 | null;
|
|
8653
|
-
topology_class?:
|
|
8653
|
+
topology_class?: TopologyClass63;
|
|
8654
8654
|
}
|
|
8655
8655
|
/**
|
|
8656
8656
|
* CoReason Shared Kernel Ontology
|
|
@@ -8698,7 +8698,7 @@ export interface CompositeNodeProfile {
|
|
|
8698
8698
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
8699
8699
|
*/
|
|
8700
8700
|
render_material?: SpatialRenderMaterial | null;
|
|
8701
|
-
topology_class?:
|
|
8701
|
+
topology_class?: TopologyClass64;
|
|
8702
8702
|
/**
|
|
8703
8703
|
* The encapsulated subgraph to execute.
|
|
8704
8704
|
*/
|
|
@@ -8738,7 +8738,7 @@ export interface DAGTopologyManifest {
|
|
|
8738
8738
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
8739
8739
|
*/
|
|
8740
8740
|
observability?: ObservabilityLODPolicy | null;
|
|
8741
|
-
topology_class?:
|
|
8741
|
+
topology_class?: TopologyClass65;
|
|
8742
8742
|
edges?: Edges;
|
|
8743
8743
|
allow_cycles?: AllowCycles;
|
|
8744
8744
|
/**
|
|
@@ -8849,47 +8849,12 @@ export interface ConstrainedDecodingPolicy {
|
|
|
8849
8849
|
export interface SemanticFlowPolicy {
|
|
8850
8850
|
policy_cid: PolicyCid;
|
|
8851
8851
|
active?: Active1;
|
|
8852
|
-
rules?: Rules;
|
|
8853
8852
|
/**
|
|
8854
8853
|
* The active cognitive defense perimeter against adversarial control-flow overrides.
|
|
8855
8854
|
*/
|
|
8856
8855
|
semantic_firewall?: SemanticFirewallPolicy | null;
|
|
8857
8856
|
latent_firewalls?: LatentFirewalls;
|
|
8858
8857
|
}
|
|
8859
|
-
/**
|
|
8860
|
-
* CoReason Shared Kernel Ontology
|
|
8861
|
-
*
|
|
8862
|
-
* AGENT INSTRUCTION: Defines a deterministic Data Sanitization heuristic mapped to a
|
|
8863
|
-
* specific SemanticClassificationProfile (e.g., Bell-LaPadula clearance levels). As a
|
|
8864
|
-
* ...Policy suffix, this object defines rigid mathematical boundaries that the orchestrator
|
|
8865
|
-
* must enforce globally.
|
|
8866
|
-
*
|
|
8867
|
-
* CAUSAL AFFORDANCE: Executes a rigid regex-bounded search-and-replace algorithm via
|
|
8868
|
-
* target_regex_pattern to mutate or mask toxic data payloads, substituting matches with a
|
|
8869
|
-
* safe replacement_token. The action (SanitizationActionIntent) dictates the exact
|
|
8870
|
-
* sanitization method.
|
|
8871
|
-
*
|
|
8872
|
-
* EPISTEMIC BOUNDS: The target_regex_pattern is strictly capped at max_length=200 to
|
|
8873
|
-
* mathematically prevent ReDoS (Regular Expression Denial of Service) CPU exhaustion. A
|
|
8874
|
-
* secondary target_pattern (max_length=2000) provides a broader semantic entity match. The
|
|
8875
|
-
* optional context_exclusion_zones array (max_length=100) is deterministically sorted by
|
|
8876
|
-
* the @model_validator.
|
|
8877
|
-
*
|
|
8878
|
-
* MCP ROUTING TRIGGERS: Data Sanitization, Regular Expression DoS Prevention,
|
|
8879
|
-
* Bell-LaPadula Model, Masking Heuristic, Algorithmic Redaction
|
|
8880
|
-
*/
|
|
8881
|
-
export interface RedactionPolicy {
|
|
8882
|
-
rule_cid: RuleCid;
|
|
8883
|
-
classification: SemanticClassificationProfile1;
|
|
8884
|
-
target_pattern: TargetPattern;
|
|
8885
|
-
target_regex_pattern: TargetRegexPattern;
|
|
8886
|
-
context_exclusion_zones?: ContextExclusionZones;
|
|
8887
|
-
/**
|
|
8888
|
-
* The required algorithmic response when this pattern is detected.
|
|
8889
|
-
*/
|
|
8890
|
-
action: "redact" | "hash" | "drop_event" | "trigger_quarantine";
|
|
8891
|
-
replacement_token?: ReplacementToken;
|
|
8892
|
-
}
|
|
8893
8858
|
/**
|
|
8894
8859
|
* CoReason Shared Kernel Ontology
|
|
8895
8860
|
*
|
|
@@ -9148,7 +9113,7 @@ export interface CouncilTopologyManifest {
|
|
|
9148
9113
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9149
9114
|
*/
|
|
9150
9115
|
observability?: ObservabilityLODPolicy | null;
|
|
9151
|
-
topology_class?:
|
|
9116
|
+
topology_class?: TopologyClass66;
|
|
9152
9117
|
/**
|
|
9153
9118
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
9154
9119
|
*/
|
|
@@ -9355,7 +9320,7 @@ export interface SwarmTopologyManifest {
|
|
|
9355
9320
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9356
9321
|
*/
|
|
9357
9322
|
observability?: ObservabilityLODPolicy | null;
|
|
9358
|
-
topology_class?:
|
|
9323
|
+
topology_class?: TopologyClass67;
|
|
9359
9324
|
spawning_threshold?: SpawningThreshold;
|
|
9360
9325
|
max_concurrent_agents?: MaxConcurrentAgents;
|
|
9361
9326
|
/**
|
|
@@ -9489,7 +9454,7 @@ export interface EvolutionaryTopologyManifest {
|
|
|
9489
9454
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9490
9455
|
*/
|
|
9491
9456
|
observability?: ObservabilityLODPolicy | null;
|
|
9492
|
-
topology_class?:
|
|
9457
|
+
topology_class?: TopologyClass68;
|
|
9493
9458
|
generations: Generations;
|
|
9494
9459
|
population_size: PopulationSize;
|
|
9495
9460
|
mutation: MutationPolicy;
|
|
@@ -9602,7 +9567,7 @@ export interface SMPCTopologyManifest {
|
|
|
9602
9567
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9603
9568
|
*/
|
|
9604
9569
|
observability?: ObservabilityLODPolicy | null;
|
|
9605
|
-
topology_class?:
|
|
9570
|
+
topology_class?: TopologyClass69;
|
|
9606
9571
|
smpc_protocol: SmpcProtocol;
|
|
9607
9572
|
joint_function_uri: JointFunctionUri;
|
|
9608
9573
|
participant_node_cids: ParticipantNodeCids;
|
|
@@ -9649,7 +9614,7 @@ export interface EvaluatorOptimizerTopologyManifest {
|
|
|
9649
9614
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9650
9615
|
*/
|
|
9651
9616
|
observability?: ObservabilityLODPolicy | null;
|
|
9652
|
-
topology_class?:
|
|
9617
|
+
topology_class?: TopologyClass70;
|
|
9653
9618
|
/**
|
|
9654
9619
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
9655
9620
|
*/
|
|
@@ -9699,7 +9664,7 @@ export interface DigitalTwinTopologyManifest {
|
|
|
9699
9664
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9700
9665
|
*/
|
|
9701
9666
|
observability?: ObservabilityLODPolicy | null;
|
|
9702
|
-
topology_class?:
|
|
9667
|
+
topology_class?: TopologyClass71;
|
|
9703
9668
|
target_topology_cid: TargetTopologyCid;
|
|
9704
9669
|
convergence_sla: SimulationConvergenceSLA;
|
|
9705
9670
|
enforce_no_side_effects?: EnforceNoSideEffects;
|
|
@@ -9729,7 +9694,7 @@ export interface SimulationConvergenceSLA {
|
|
|
9729
9694
|
* MCP ROUTING TRIGGERS: Practical Byzantine Fault Tolerance, pBFT, Distributed Consensus, Sybil Resistance, Macro Abstraction
|
|
9730
9695
|
*/
|
|
9731
9696
|
export interface ConsensusFederationTopologyManifest {
|
|
9732
|
-
topology_class?:
|
|
9697
|
+
topology_class?: TopologyClass72;
|
|
9733
9698
|
participant_cids: ParticipantCids;
|
|
9734
9699
|
/**
|
|
9735
9700
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -9794,7 +9759,7 @@ export interface CapabilityForgeTopologyManifest {
|
|
|
9794
9759
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9795
9760
|
*/
|
|
9796
9761
|
observability?: ObservabilityLODPolicy | null;
|
|
9797
|
-
topology_class?:
|
|
9762
|
+
topology_class?: TopologyClass73;
|
|
9798
9763
|
target_epistemic_deficit: SemanticDiscoveryIntent1;
|
|
9799
9764
|
/**
|
|
9800
9765
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -9948,7 +9913,7 @@ export interface IntentElicitationTopologyManifest {
|
|
|
9948
9913
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
9949
9914
|
*/
|
|
9950
9915
|
observability?: ObservabilityLODPolicy | null;
|
|
9951
|
-
topology_class?:
|
|
9916
|
+
topology_class?: TopologyClass74;
|
|
9952
9917
|
raw_human_artifact_cid: RawHumanArtifactCid;
|
|
9953
9918
|
/**
|
|
9954
9919
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10002,7 +9967,7 @@ export interface NeurosymbolicIngestionTopologyManifest {
|
|
|
10002
9967
|
* The dynamic Level of Detail physics bound to this graph.
|
|
10003
9968
|
*/
|
|
10004
9969
|
observability?: ObservabilityLODPolicy | null;
|
|
10005
|
-
topology_class?:
|
|
9970
|
+
topology_class?: TopologyClass75;
|
|
10006
9971
|
/**
|
|
10007
9972
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10008
9973
|
*/
|
|
@@ -10063,7 +10028,7 @@ export interface NeurosymbolicVerificationTopologyManifest {
|
|
|
10063
10028
|
* The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
|
|
10064
10029
|
*/
|
|
10065
10030
|
observability?: ObservabilityLODPolicy | null;
|
|
10066
|
-
topology_class?:
|
|
10031
|
+
topology_class?: TopologyClass76;
|
|
10067
10032
|
proposer_node_cid: ProposerNodeCid;
|
|
10068
10033
|
verifier_node_cid: VerifierNodeCid;
|
|
10069
10034
|
max_revision_loops: MaxRevisionLoops1;
|
|
@@ -10087,7 +10052,7 @@ export interface Nodes11 {
|
|
|
10087
10052
|
* MCP ROUTING TRIGGERS: Discourse Geometry, Rhetorical Flattening, Directed Acyclic Graph, Hierarchical Extraction
|
|
10088
10053
|
*/
|
|
10089
10054
|
export interface DiscourseTreeManifest {
|
|
10090
|
-
topology_class?:
|
|
10055
|
+
topology_class?: TopologyClass77;
|
|
10091
10056
|
manifest_cid: ManifestCid2;
|
|
10092
10057
|
/**
|
|
10093
10058
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -10128,7 +10093,7 @@ export interface DiscourseNodeState {
|
|
|
10128
10093
|
* CoReason Shared Kernel Ontology
|
|
10129
10094
|
*/
|
|
10130
10095
|
export interface DocumentKnowledgeGraphManifest {
|
|
10131
|
-
topology_class?:
|
|
10096
|
+
topology_class?: TopologyClass78;
|
|
10132
10097
|
graph_cid: GraphCid;
|
|
10133
10098
|
source_artifact_cid: SourceArtifactCid2;
|
|
10134
10099
|
nodes: Nodes12;
|
|
@@ -10276,7 +10241,7 @@ export interface HomomorphicEncryptionProfile {
|
|
|
10276
10241
|
* MCP ROUTING TRIGGERS: Cross-Modal Isomorphism, Semantic Fusion, Volumetric Projection, Profunctor Optics
|
|
10277
10242
|
*/
|
|
10278
10243
|
export interface ContinuousManifoldMappingContract {
|
|
10279
|
-
topology_class?:
|
|
10244
|
+
topology_class?: TopologyClass79;
|
|
10280
10245
|
/**
|
|
10281
10246
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
10282
10247
|
*/
|
|
@@ -10323,7 +10288,7 @@ export interface SE3TransformProfile4 {
|
|
|
10323
10288
|
* MCP ROUTING TRIGGERS: Spatial-Semantic Isomorphism, Document Object Model, Containment DAG, Visual Hierarchy, Rhetorical Bounding
|
|
10324
10289
|
*/
|
|
10325
10290
|
export interface HierarchicalDOMManifest {
|
|
10326
|
-
topology_class?:
|
|
10291
|
+
topology_class?: TopologyClass80;
|
|
10327
10292
|
dom_cid: DomCid;
|
|
10328
10293
|
root_block_cid: RootBlockCid;
|
|
10329
10294
|
blocks: Blocks;
|
|
@@ -10504,7 +10469,7 @@ export interface MemoizedNodeProfile {
|
|
|
10504
10469
|
* The physics-agnostic visual identity or shader governing the spatial rendering of this node.
|
|
10505
10470
|
*/
|
|
10506
10471
|
render_material?: SpatialRenderMaterial | null;
|
|
10507
|
-
topology_class?:
|
|
10472
|
+
topology_class?: TopologyClass81;
|
|
10508
10473
|
/**
|
|
10509
10474
|
* The exact SHA-256 fingerprint of the executed topology.
|
|
10510
10475
|
*/
|
|
@@ -10526,7 +10491,7 @@ export interface ExpectedOutputSchema {
|
|
|
10526
10491
|
* MCP ROUTING TRIGGERS: Conflict-Free Replicated Data Types, State-based Semilattice, Eventual Consistency, G-Set
|
|
10527
10492
|
*/
|
|
10528
10493
|
export interface TemporalGraphCRDTManifest {
|
|
10529
|
-
topology_class?:
|
|
10494
|
+
topology_class?: TopologyClass82;
|
|
10530
10495
|
diff_cid: DiffCid;
|
|
10531
10496
|
author_node_cid: AuthorNodeCid;
|
|
10532
10497
|
lamport_timestamp: LamportTimestamp;
|
|
@@ -10546,7 +10511,7 @@ export interface VectorClock {
|
|
|
10546
10511
|
* AGENT INSTRUCTION: A formal Substrate Projection representing an executable Model Context Protocol (MCP) tool.
|
|
10547
10512
|
*/
|
|
10548
10513
|
export interface MCPToolDefinition {
|
|
10549
|
-
topology_class?:
|
|
10514
|
+
topology_class?: TopologyClass83;
|
|
10550
10515
|
event_cid?: EventCid1;
|
|
10551
10516
|
prior_event_hash?: PriorEventHash1;
|
|
10552
10517
|
timestamp?: Timestamp1;
|
|
@@ -10575,7 +10540,7 @@ export interface CrosswalkResolutionReceipt {
|
|
|
10575
10540
|
event_cid: EventCid2;
|
|
10576
10541
|
prior_event_hash?: PriorEventHash2;
|
|
10577
10542
|
timestamp: Timestamp2;
|
|
10578
|
-
topology_class?:
|
|
10543
|
+
topology_class?: TopologyClass84;
|
|
10579
10544
|
receipt_cid: ReceiptCid;
|
|
10580
10545
|
target_graph_cid: TargetGraphCid3;
|
|
10581
10546
|
resolved_curies: ResolvedCuries;
|
|
@@ -10620,7 +10585,7 @@ export interface EpistemicZeroTrustReceipt {
|
|
|
10620
10585
|
event_cid: EventCid3;
|
|
10621
10586
|
prior_event_hash?: PriorEventHash3;
|
|
10622
10587
|
timestamp: Timestamp3;
|
|
10623
|
-
topology_class?:
|
|
10588
|
+
topology_class?: TopologyClass85;
|
|
10624
10589
|
intent_reference_cid: IntentReferenceCid;
|
|
10625
10590
|
llm_blind_plan_hash: LlmBlindPlanHash;
|
|
10626
10591
|
firewall_breach_detected?: FirewallBreachDetected;
|
|
@@ -10642,7 +10607,7 @@ export interface ObservationEvent {
|
|
|
10642
10607
|
event_cid: EventCid4;
|
|
10643
10608
|
prior_event_hash?: PriorEventHash4;
|
|
10644
10609
|
timestamp: Timestamp4;
|
|
10645
|
-
topology_class?:
|
|
10610
|
+
topology_class?: TopologyClass86;
|
|
10646
10611
|
payload: Payload;
|
|
10647
10612
|
/**
|
|
10648
10613
|
* The specific topological node that appended this observation.
|
|
@@ -10712,7 +10677,7 @@ export interface HardwareEnclaveReceipt {
|
|
|
10712
10677
|
* MCP ROUTING TRIGGERS: Exogenous Perturbation, DOM Topography, Spatial Execution Bound, Accessibility Tree
|
|
10713
10678
|
*/
|
|
10714
10679
|
export interface BrowserDOMState {
|
|
10715
|
-
topology_class?:
|
|
10680
|
+
topology_class?: TopologyClass87;
|
|
10716
10681
|
current_url: CurrentUrl;
|
|
10717
10682
|
viewport_size: ViewportSize;
|
|
10718
10683
|
dom_hash: DomHash;
|
|
@@ -10731,7 +10696,7 @@ export interface BrowserDOMState {
|
|
|
10731
10696
|
* MCP ROUTING TRIGGERS: POSIX Environment, Exogenous Perturbation, TTY Buffer, Causal Actuator, Stream Crystallization
|
|
10732
10697
|
*/
|
|
10733
10698
|
export interface TerminalBufferState {
|
|
10734
|
-
topology_class?:
|
|
10699
|
+
topology_class?: TopologyClass88;
|
|
10735
10700
|
working_directory: WorkingDirectory;
|
|
10736
10701
|
stdout_hash: StdoutHash;
|
|
10737
10702
|
stderr_hash: StderrHash;
|
|
@@ -10846,7 +10811,7 @@ export interface BeliefMutationEvent {
|
|
|
10846
10811
|
event_cid: EventCid5;
|
|
10847
10812
|
prior_event_hash?: PriorEventHash5;
|
|
10848
10813
|
timestamp: Timestamp5;
|
|
10849
|
-
topology_class?:
|
|
10814
|
+
topology_class?: TopologyClass89;
|
|
10850
10815
|
payload: Payload1;
|
|
10851
10816
|
/**
|
|
10852
10817
|
* The specific topological node that synthesized this belief assertion.
|
|
@@ -10961,7 +10926,7 @@ export interface SystemFaultEvent {
|
|
|
10961
10926
|
event_cid: EventCid6;
|
|
10962
10927
|
prior_event_hash?: PriorEventHash6;
|
|
10963
10928
|
timestamp: Timestamp6;
|
|
10964
|
-
topology_class?:
|
|
10929
|
+
topology_class?: TopologyClass90;
|
|
10965
10930
|
}
|
|
10966
10931
|
/**
|
|
10967
10932
|
* CoReason Shared Kernel Ontology
|
|
@@ -10975,7 +10940,7 @@ export interface SystemFaultEvent {
|
|
|
10975
10940
|
* MCP ROUTING TRIGGERS: Atomic Proposition, Discourse Extraction, Labeled Property Graph, Verifiable Statement
|
|
10976
10941
|
*/
|
|
10977
10942
|
export interface AtomicPropositionState {
|
|
10978
|
-
topology_class?:
|
|
10943
|
+
topology_class?: TopologyClass91;
|
|
10979
10944
|
event_cid: EventCid7;
|
|
10980
10945
|
prior_event_hash?: PriorEventHash7;
|
|
10981
10946
|
timestamp: Timestamp7;
|
|
@@ -11016,7 +10981,7 @@ export interface EmpiricalStatisticalProfile {
|
|
|
11016
10981
|
* MCP ROUTING TRIGGERS: Post-Coordinated Semantics, Latent Manifold Alignment, Semantic Specificity, Entity Assembly
|
|
11017
10982
|
*/
|
|
11018
10983
|
export interface PostCoordinatedSemanticState {
|
|
11019
|
-
topology_class?:
|
|
10984
|
+
topology_class?: TopologyClass92;
|
|
11020
10985
|
event_cid: EventCid8;
|
|
11021
10986
|
prior_event_hash?: PriorEventHash8;
|
|
11022
10987
|
timestamp: Timestamp8;
|
|
@@ -11050,7 +11015,7 @@ export interface ArtifactCorruptionEvent {
|
|
|
11050
11015
|
event_cid: EventCid9;
|
|
11051
11016
|
prior_event_hash?: PriorEventHash9;
|
|
11052
11017
|
timestamp: Timestamp9;
|
|
11053
|
-
topology_class?:
|
|
11018
|
+
topology_class?: TopologyClass93;
|
|
11054
11019
|
artifact_cid: ArtifactCid;
|
|
11055
11020
|
corruption_class: CorruptionClass;
|
|
11056
11021
|
diagnostic_hash: DiagnosticHash;
|
|
@@ -11070,7 +11035,7 @@ export interface HypothesisGenerationEvent {
|
|
|
11070
11035
|
event_cid: EventCid10;
|
|
11071
11036
|
prior_event_hash?: PriorEventHash10;
|
|
11072
11037
|
timestamp: Timestamp10;
|
|
11073
|
-
topology_class?:
|
|
11038
|
+
topology_class?: TopologyClass94;
|
|
11074
11039
|
hypothesis_cid: HypothesisCid;
|
|
11075
11040
|
premise_text: PremiseText;
|
|
11076
11041
|
bayesian_prior: BayesianPrior;
|
|
@@ -11112,7 +11077,7 @@ export interface BargeInInterruptEvent {
|
|
|
11112
11077
|
event_cid: EventCid11;
|
|
11113
11078
|
prior_event_hash?: PriorEventHash11;
|
|
11114
11079
|
timestamp: Timestamp11;
|
|
11115
|
-
topology_class?:
|
|
11080
|
+
topology_class?: TopologyClass95;
|
|
11116
11081
|
target_event_cid: TargetEventCid1;
|
|
11117
11082
|
/**
|
|
11118
11083
|
* The continuous multimodal trigger (e.g., audio spike, user saying 'stop') that justified the interruption.
|
|
@@ -11136,7 +11101,7 @@ export interface CounterfactualRegretEvent {
|
|
|
11136
11101
|
event_cid: EventCid12;
|
|
11137
11102
|
prior_event_hash?: PriorEventHash12;
|
|
11138
11103
|
timestamp: Timestamp12;
|
|
11139
|
-
topology_class?:
|
|
11104
|
+
topology_class?: TopologyClass96;
|
|
11140
11105
|
historical_event_cid: HistoricalEventCid;
|
|
11141
11106
|
counterfactual_intervention: CounterfactualIntervention;
|
|
11142
11107
|
expected_utility_actual: ExpectedUtilityActual;
|
|
@@ -11165,7 +11130,7 @@ export interface ToolInvocationEvent {
|
|
|
11165
11130
|
event_cid: EventCid13;
|
|
11166
11131
|
prior_event_hash?: PriorEventHash13;
|
|
11167
11132
|
timestamp: Timestamp13;
|
|
11168
|
-
topology_class?:
|
|
11133
|
+
topology_class?: TopologyClass97;
|
|
11169
11134
|
tool_name: ToolName1;
|
|
11170
11135
|
parameters: Parameters;
|
|
11171
11136
|
authorized_budget_magnitude: AuthorizedBudgetMagnitude;
|
|
@@ -11231,31 +11196,11 @@ export interface EpistemicPromotionEvent {
|
|
|
11231
11196
|
event_cid: EventCid14;
|
|
11232
11197
|
prior_event_hash?: PriorEventHash14;
|
|
11233
11198
|
timestamp: Timestamp14;
|
|
11234
|
-
topology_class?:
|
|
11199
|
+
topology_class?: TopologyClass98;
|
|
11235
11200
|
source_episodic_event_cids: SourceEpisodicEventCids;
|
|
11236
11201
|
crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
|
|
11237
11202
|
compression_ratio: CompressionRatio;
|
|
11238
11203
|
}
|
|
11239
|
-
/**
|
|
11240
|
-
* CoReason Shared Kernel Ontology
|
|
11241
|
-
*
|
|
11242
|
-
* AGENT INSTRUCTION: A cryptographically frozen historical fact tracking the Kullback-Leibler (KL) divergence between the swarm's active behavioral manifold and its foundational ConstitutionalPolicy.
|
|
11243
|
-
*
|
|
11244
|
-
* CAUSAL AFFORDANCE: Emits a deterministic topological signal that the causal graph is experiencing logical friction against the `tripped_rule_cid`, unlocking the injection of a System2RemediationIntent constraint.
|
|
11245
|
-
*
|
|
11246
|
-
* EPISTEMIC BOUNDS: Mathematically bounded by `measured_semantic_drift` (`le=18446744073709551615.0`) and cryptographically tied to `contradiction_proof_hash` (SHA-256 pattern `^[a-f0-9]{64}$`) proving the anomaly.
|
|
11247
|
-
*
|
|
11248
|
-
* MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
|
|
11249
|
-
*/
|
|
11250
|
-
export interface NormativeDriftEvent {
|
|
11251
|
-
event_cid: EventCid15;
|
|
11252
|
-
prior_event_hash?: PriorEventHash15;
|
|
11253
|
-
timestamp: Timestamp15;
|
|
11254
|
-
topology_class?: TopologyClass98;
|
|
11255
|
-
tripped_rule_cid: TrippedRuleCid;
|
|
11256
|
-
measured_semantic_drift: MeasuredSemanticDrift;
|
|
11257
|
-
contradiction_proof_hash: ContradictionProofHash;
|
|
11258
|
-
}
|
|
11259
11204
|
/**
|
|
11260
11205
|
* CoReason Shared Kernel Ontology
|
|
11261
11206
|
*
|
|
@@ -11268,9 +11213,9 @@ export interface NormativeDriftEvent {
|
|
|
11268
11213
|
* MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
|
|
11269
11214
|
*/
|
|
11270
11215
|
export interface PersistenceCommitReceipt {
|
|
11271
|
-
event_cid:
|
|
11272
|
-
prior_event_hash?:
|
|
11273
|
-
timestamp:
|
|
11216
|
+
event_cid: EventCid15;
|
|
11217
|
+
prior_event_hash?: PriorEventHash15;
|
|
11218
|
+
timestamp: Timestamp15;
|
|
11274
11219
|
topology_class?: TopologyClass99;
|
|
11275
11220
|
lakehouse_snapshot_cid: LakehouseSnapshotCid;
|
|
11276
11221
|
committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
|
|
@@ -11288,9 +11233,9 @@ export interface PersistenceCommitReceipt {
|
|
|
11288
11233
|
* MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
|
|
11289
11234
|
*/
|
|
11290
11235
|
export interface TokenBurnReceipt {
|
|
11291
|
-
event_cid:
|
|
11292
|
-
prior_event_hash?:
|
|
11293
|
-
timestamp:
|
|
11236
|
+
event_cid: EventCid16;
|
|
11237
|
+
prior_event_hash?: PriorEventHash16;
|
|
11238
|
+
timestamp: Timestamp16;
|
|
11294
11239
|
topology_class?: TopologyClass100;
|
|
11295
11240
|
tool_invocation_cid: ToolInvocationCid;
|
|
11296
11241
|
input_tokens: InputTokens;
|
|
@@ -11309,9 +11254,9 @@ export interface TokenBurnReceipt {
|
|
|
11309
11254
|
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
|
|
11310
11255
|
*/
|
|
11311
11256
|
export interface BudgetExhaustionEvent {
|
|
11312
|
-
event_cid:
|
|
11313
|
-
prior_event_hash?:
|
|
11314
|
-
timestamp:
|
|
11257
|
+
event_cid: EventCid17;
|
|
11258
|
+
prior_event_hash?: PriorEventHash17;
|
|
11259
|
+
timestamp: Timestamp17;
|
|
11315
11260
|
topology_class?: TopologyClass101;
|
|
11316
11261
|
exhausted_escrow_cid: ExhaustedEscrowCid;
|
|
11317
11262
|
final_burn_receipt_cid: FinalBurnReceiptCid;
|
|
@@ -11328,9 +11273,9 @@ export interface BudgetExhaustionEvent {
|
|
|
11328
11273
|
* MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
|
|
11329
11274
|
*/
|
|
11330
11275
|
export interface EpistemicTelemetryEvent {
|
|
11331
|
-
event_cid:
|
|
11332
|
-
prior_event_hash?:
|
|
11333
|
-
timestamp:
|
|
11276
|
+
event_cid: EventCid18;
|
|
11277
|
+
prior_event_hash?: PriorEventHash18;
|
|
11278
|
+
timestamp: Timestamp18;
|
|
11334
11279
|
topology_class?: TopologyClass102;
|
|
11335
11280
|
interaction_modality: InteractionModality;
|
|
11336
11281
|
target_node_cid: TargetNodeCid;
|
|
@@ -11352,9 +11297,9 @@ export interface EpistemicTelemetryEvent {
|
|
|
11352
11297
|
* MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
|
|
11353
11298
|
*/
|
|
11354
11299
|
export interface CognitivePredictionReceipt {
|
|
11355
|
-
event_cid:
|
|
11356
|
-
prior_event_hash?:
|
|
11357
|
-
timestamp:
|
|
11300
|
+
event_cid: EventCid19;
|
|
11301
|
+
prior_event_hash?: PriorEventHash19;
|
|
11302
|
+
timestamp: Timestamp19;
|
|
11358
11303
|
topology_class?: TopologyClass103;
|
|
11359
11304
|
source_chain_cid: SourceChainCid;
|
|
11360
11305
|
target_source_concept: TargetSourceConcept;
|
|
@@ -11372,9 +11317,9 @@ export interface CognitivePredictionReceipt {
|
|
|
11372
11317
|
* MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
|
|
11373
11318
|
*/
|
|
11374
11319
|
export interface EpistemicAxiomVerificationReceipt {
|
|
11375
|
-
event_cid:
|
|
11376
|
-
prior_event_hash?:
|
|
11377
|
-
timestamp:
|
|
11320
|
+
event_cid: EventCid20;
|
|
11321
|
+
prior_event_hash?: PriorEventHash20;
|
|
11322
|
+
timestamp: Timestamp20;
|
|
11378
11323
|
topology_class?: TopologyClass104;
|
|
11379
11324
|
source_prediction_cid: SourcePredictionCid;
|
|
11380
11325
|
sequence_similarity_score: SequenceSimilarityScore;
|
|
@@ -11406,9 +11351,9 @@ export interface EpistemicAxiomVerificationReceipt {
|
|
|
11406
11351
|
* Scalar Backpropagation, Acyclic Path
|
|
11407
11352
|
*/
|
|
11408
11353
|
export interface EpistemicFlowStateReceipt {
|
|
11409
|
-
event_cid:
|
|
11410
|
-
prior_event_hash?:
|
|
11411
|
-
timestamp:
|
|
11354
|
+
event_cid: EventCid21;
|
|
11355
|
+
prior_event_hash?: PriorEventHash21;
|
|
11356
|
+
timestamp: Timestamp21;
|
|
11412
11357
|
topology_class?: TopologyClass105;
|
|
11413
11358
|
source_trajectory_cid: SourceTrajectoryCid;
|
|
11414
11359
|
estimated_flow_value: EstimatedFlowValue;
|
|
@@ -11435,9 +11380,9 @@ export interface EpistemicFlowStateReceipt {
|
|
|
11435
11380
|
* Macroscopic Explanation, Deterministic Sorting
|
|
11436
11381
|
*/
|
|
11437
11382
|
export interface CausalExplanationEvent {
|
|
11438
|
-
event_cid:
|
|
11439
|
-
prior_event_hash?:
|
|
11440
|
-
timestamp:
|
|
11383
|
+
event_cid: EventCid22;
|
|
11384
|
+
prior_event_hash?: PriorEventHash22;
|
|
11385
|
+
timestamp: Timestamp22;
|
|
11441
11386
|
topology_class?: TopologyClass106;
|
|
11442
11387
|
target_outcome_event_cid: TargetOutcomeEventCid;
|
|
11443
11388
|
collective_intelligence: CollectiveIntelligenceProfile;
|
|
@@ -11499,9 +11444,9 @@ export interface ShapleyAttributionReceipt {
|
|
|
11499
11444
|
* Routing Heuristic, Semantic Wave Collapse
|
|
11500
11445
|
*/
|
|
11501
11446
|
export interface IntentClassificationReceipt {
|
|
11502
|
-
event_cid:
|
|
11503
|
-
prior_event_hash?:
|
|
11504
|
-
timestamp:
|
|
11447
|
+
event_cid: EventCid23;
|
|
11448
|
+
prior_event_hash?: PriorEventHash23;
|
|
11449
|
+
timestamp: Timestamp23;
|
|
11505
11450
|
topology_class?: TopologyClass107;
|
|
11506
11451
|
raw_input_string: RawInputString;
|
|
11507
11452
|
classified_intent: ClassifiedIntent;
|
|
@@ -11521,9 +11466,9 @@ export interface IntentClassificationReceipt {
|
|
|
11521
11466
|
*/
|
|
11522
11467
|
export interface SemanticRelationalVectorState {
|
|
11523
11468
|
topology_class?: TopologyClass108;
|
|
11524
|
-
event_cid:
|
|
11525
|
-
prior_event_hash?:
|
|
11526
|
-
timestamp:
|
|
11469
|
+
event_cid: EventCid24;
|
|
11470
|
+
prior_event_hash?: PriorEventHash24;
|
|
11471
|
+
timestamp: Timestamp24;
|
|
11527
11472
|
ontology_class: UpperOntologyClassProfile;
|
|
11528
11473
|
temporal_bounds: TemporalBoundsProfile1;
|
|
11529
11474
|
formal_schema_urn?: FormalSchemaUrn1;
|
|
@@ -11566,9 +11511,9 @@ export interface PayloadInjectionZone {
|
|
|
11566
11511
|
*/
|
|
11567
11512
|
export interface OntologicalReificationReceipt {
|
|
11568
11513
|
topology_class?: TopologyClass109;
|
|
11569
|
-
event_cid:
|
|
11570
|
-
prior_event_hash?:
|
|
11571
|
-
timestamp:
|
|
11514
|
+
event_cid: EventCid25;
|
|
11515
|
+
prior_event_hash?: PriorEventHash25;
|
|
11516
|
+
timestamp: Timestamp25;
|
|
11572
11517
|
source_data_hash: SourceDataHash;
|
|
11573
11518
|
target_namespace: TargetNamespace;
|
|
11574
11519
|
algorithmic_mechanism: TransformationMechanismProfile;
|
|
@@ -11605,9 +11550,9 @@ export interface DempsterShaferBeliefVector2 {
|
|
|
11605
11550
|
* MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
|
|
11606
11551
|
*/
|
|
11607
11552
|
export interface CircuitBreakerEvent {
|
|
11608
|
-
event_cid:
|
|
11609
|
-
prior_event_hash?:
|
|
11610
|
-
timestamp:
|
|
11553
|
+
event_cid: EventCid26;
|
|
11554
|
+
prior_event_hash?: PriorEventHash26;
|
|
11555
|
+
timestamp: Timestamp26;
|
|
11611
11556
|
topology_class?: TopologyClass110;
|
|
11612
11557
|
/**
|
|
11613
11558
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -11636,9 +11581,9 @@ export interface CircuitBreakerEvent {
|
|
|
11636
11581
|
* Energy, Exogenous Perturbation, Epistemic Stress Test
|
|
11637
11582
|
*/
|
|
11638
11583
|
export interface ExogenousEpistemicEvent {
|
|
11639
|
-
event_cid:
|
|
11640
|
-
prior_event_hash?:
|
|
11641
|
-
timestamp:
|
|
11584
|
+
event_cid: EventCid27;
|
|
11585
|
+
prior_event_hash?: PriorEventHash27;
|
|
11586
|
+
timestamp: Timestamp27;
|
|
11642
11587
|
topology_class?: TopologyClass111;
|
|
11643
11588
|
shock_cid: ShockCid;
|
|
11644
11589
|
target_node_hash: TargetNodeHash;
|
|
@@ -11670,10 +11615,10 @@ export interface SimulationEscrowContract {
|
|
|
11670
11615
|
* MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
|
|
11671
11616
|
*/
|
|
11672
11617
|
export interface EpistemicLogEvent {
|
|
11673
|
-
event_cid:
|
|
11674
|
-
prior_event_hash?:
|
|
11618
|
+
event_cid: EventCid28;
|
|
11619
|
+
prior_event_hash?: PriorEventHash28;
|
|
11675
11620
|
topology_class?: TopologyClass112;
|
|
11676
|
-
timestamp:
|
|
11621
|
+
timestamp: Timestamp28;
|
|
11677
11622
|
level: Level;
|
|
11678
11623
|
message: Message1;
|
|
11679
11624
|
context_profile?: TelemetryContextProfile;
|
|
@@ -11704,9 +11649,9 @@ export interface TelemetryContextProfile {
|
|
|
11704
11649
|
*/
|
|
11705
11650
|
export interface InterventionReceipt {
|
|
11706
11651
|
topology_class?: TopologyClass113;
|
|
11707
|
-
event_cid:
|
|
11708
|
-
prior_event_hash?:
|
|
11709
|
-
timestamp:
|
|
11652
|
+
event_cid: EventCid29;
|
|
11653
|
+
prior_event_hash?: PriorEventHash29;
|
|
11654
|
+
timestamp: Timestamp29;
|
|
11710
11655
|
intervention_request_cid: InterventionRequestCid;
|
|
11711
11656
|
/**
|
|
11712
11657
|
* A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
|
|
@@ -11761,9 +11706,9 @@ export interface WetwareAttestationContract {
|
|
|
11761
11706
|
* MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
|
|
11762
11707
|
*/
|
|
11763
11708
|
export interface CustodyReceipt {
|
|
11764
|
-
event_cid:
|
|
11765
|
-
prior_event_hash?:
|
|
11766
|
-
timestamp:
|
|
11709
|
+
event_cid: EventCid30;
|
|
11710
|
+
prior_event_hash?: PriorEventHash30;
|
|
11711
|
+
timestamp: Timestamp30;
|
|
11767
11712
|
topology_class?: TopologyClass114;
|
|
11768
11713
|
custody_cid: CustodyCid;
|
|
11769
11714
|
source_node_cid: SourceNodeCid;
|
|
@@ -11784,9 +11729,9 @@ export interface CustodyReceipt {
|
|
|
11784
11729
|
* MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
|
|
11785
11730
|
*/
|
|
11786
11731
|
export interface DefeasibleAttackEvent {
|
|
11787
|
-
event_cid:
|
|
11788
|
-
prior_event_hash?:
|
|
11789
|
-
timestamp:
|
|
11732
|
+
event_cid: EventCid31;
|
|
11733
|
+
prior_event_hash?: PriorEventHash31;
|
|
11734
|
+
timestamp: Timestamp31;
|
|
11790
11735
|
topology_class?: TopologyClass115;
|
|
11791
11736
|
attack_cid: AttackCid;
|
|
11792
11737
|
source_claim_cid: SourceClaimCid;
|
|
@@ -11808,9 +11753,9 @@ export interface DefeasibleAttackEvent {
|
|
|
11808
11753
|
* MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
|
|
11809
11754
|
*/
|
|
11810
11755
|
export interface EpistemicRejectionReceipt {
|
|
11811
|
-
event_cid:
|
|
11812
|
-
prior_event_hash?:
|
|
11813
|
-
timestamp:
|
|
11756
|
+
event_cid: EventCid32;
|
|
11757
|
+
prior_event_hash?: PriorEventHash32;
|
|
11758
|
+
timestamp: Timestamp32;
|
|
11814
11759
|
topology_class?: TopologyClass116;
|
|
11815
11760
|
receipt_cid: ReceiptCid1;
|
|
11816
11761
|
failed_projection_cid: FailedProjectionCid;
|
|
@@ -11830,9 +11775,9 @@ export interface EpistemicRejectionReceipt {
|
|
|
11830
11775
|
* MCP ROUTING TRIGGERS: System 2 Remediation, Mathematical Truth, Proof Verification, Epistemic Ledger
|
|
11831
11776
|
*/
|
|
11832
11777
|
export interface FormalVerificationReceipt {
|
|
11833
|
-
event_cid:
|
|
11834
|
-
prior_event_hash?:
|
|
11835
|
-
timestamp:
|
|
11778
|
+
event_cid: EventCid33;
|
|
11779
|
+
prior_event_hash?: PriorEventHash33;
|
|
11780
|
+
timestamp: Timestamp33;
|
|
11836
11781
|
topology_class?: TopologyClass117;
|
|
11837
11782
|
/**
|
|
11838
11783
|
* Pointer to the specific node or intent that requested this formal verification.
|
|
@@ -11849,9 +11794,9 @@ export interface FormalVerificationReceipt {
|
|
|
11849
11794
|
export interface BeliefModulationReceipt {
|
|
11850
11795
|
topology_class?: TopologyClass118;
|
|
11851
11796
|
receipt_cid: ReceiptCid2;
|
|
11852
|
-
event_cid:
|
|
11853
|
-
prior_event_hash?:
|
|
11854
|
-
timestamp:
|
|
11797
|
+
event_cid: EventCid34;
|
|
11798
|
+
prior_event_hash?: PriorEventHash34;
|
|
11799
|
+
timestamp: Timestamp34;
|
|
11855
11800
|
target_graph_cid: TargetGraphCid4;
|
|
11856
11801
|
grounded_edges: GroundedEdges;
|
|
11857
11802
|
severed_edge_cids: SeveredEdgeCids;
|
|
@@ -11865,9 +11810,9 @@ export interface GroundedEdges {
|
|
|
11865
11810
|
export interface RDFExportReceipt {
|
|
11866
11811
|
topology_class?: TopologyClass119;
|
|
11867
11812
|
export_cid: ExportCid1;
|
|
11868
|
-
event_cid:
|
|
11869
|
-
prior_event_hash?:
|
|
11870
|
-
timestamp:
|
|
11813
|
+
event_cid: EventCid35;
|
|
11814
|
+
prior_event_hash?: PriorEventHash35;
|
|
11815
|
+
timestamp: Timestamp35;
|
|
11871
11816
|
serialized_payload: SerializedPayload;
|
|
11872
11817
|
rdf_triple_count: RdfTripleCount;
|
|
11873
11818
|
sha256_graph_hash: Sha256GraphHash;
|
|
@@ -11884,9 +11829,9 @@ export interface RDFExportReceipt {
|
|
|
11884
11829
|
* MCP ROUTING TRIGGERS: Epistemic Starvation, Natural Language Inference, Truth Maintenance System, Defeasible Logic, Belief Mass Depletion
|
|
11885
11830
|
*/
|
|
11886
11831
|
export interface EpistemicStarvationEvent {
|
|
11887
|
-
event_cid:
|
|
11888
|
-
prior_event_hash?:
|
|
11889
|
-
timestamp:
|
|
11832
|
+
event_cid: EventCid36;
|
|
11833
|
+
prior_event_hash?: PriorEventHash36;
|
|
11834
|
+
timestamp: Timestamp36;
|
|
11890
11835
|
topology_class?: TopologyClass120;
|
|
11891
11836
|
starved_edge_cid: StarvedEdgeCid;
|
|
11892
11837
|
failed_citations: FailedCitations;
|
|
@@ -11904,9 +11849,9 @@ export interface EpistemicStarvationEvent {
|
|
|
11904
11849
|
* MCP ROUTING TRIGGERS: SPARQL Result, RDF Bindings, Epistemic Projection, Payload Bounding, Ledger Commit
|
|
11905
11850
|
*/
|
|
11906
11851
|
export interface SPARQLQueryResultReceipt {
|
|
11907
|
-
event_cid:
|
|
11908
|
-
prior_event_hash?:
|
|
11909
|
-
timestamp:
|
|
11852
|
+
event_cid: EventCid37;
|
|
11853
|
+
prior_event_hash?: PriorEventHash37;
|
|
11854
|
+
timestamp: Timestamp37;
|
|
11910
11855
|
topology_class?: TopologyClass121;
|
|
11911
11856
|
query_intent_cid: QueryIntentCid;
|
|
11912
11857
|
returned_bindings: ReturnedBindings;
|
|
@@ -11936,6 +11881,33 @@ export interface OracleExecutionReceipt {
|
|
|
11936
11881
|
tokens_burned: TokensBurned;
|
|
11937
11882
|
human_attestation_signature?: HumanAttestationSignature;
|
|
11938
11883
|
}
|
|
11884
|
+
/**
|
|
11885
|
+
* CoReason Shared Kernel Ontology
|
|
11886
|
+
*
|
|
11887
|
+
* AGENT INSTRUCTION: Tracks a deterministic security boundary violation emitted by the NeMo Guardrails proxy. This event is a frozen historical fact representing a failed cryptographic or semantic check.
|
|
11888
|
+
*
|
|
11889
|
+
* CAUSAL AFFORDANCE: Triggers an immediate suspension of the active execution trajectory and publishes a high-severity alert to the telemetry broker for remediation.
|
|
11890
|
+
*
|
|
11891
|
+
* EPISTEMIC BOUNDS: The event must include the specific HTTP status code (e.g., 401, 403, 406, 422) and the opaque violation manifest emitted by the proxy.
|
|
11892
|
+
*
|
|
11893
|
+
* MCP ROUTING TRIGGERS: Security, Guardrails, Data Loss Prevention, Policy Violation, Telemetry
|
|
11894
|
+
*/
|
|
11895
|
+
export interface GuardrailViolationEvent {
|
|
11896
|
+
event_cid: EventCid38;
|
|
11897
|
+
prior_event_hash?: PriorEventHash38;
|
|
11898
|
+
timestamp: Timestamp38;
|
|
11899
|
+
topology_class?: TopologyClass123;
|
|
11900
|
+
violation_id: ViolationId;
|
|
11901
|
+
status_code: StatusCode;
|
|
11902
|
+
violation_type: ViolationType;
|
|
11903
|
+
violation_details?: ViolationDetails;
|
|
11904
|
+
}
|
|
11905
|
+
/**
|
|
11906
|
+
* Detailed manifest from the Guardrails proxy.
|
|
11907
|
+
*/
|
|
11908
|
+
export interface ViolationDetails {
|
|
11909
|
+
[k: string]: unknown;
|
|
11910
|
+
}
|
|
11939
11911
|
/**
|
|
11940
11912
|
* CoReason Shared Kernel Ontology
|
|
11941
11913
|
*
|
|
@@ -11948,7 +11920,7 @@ export interface OracleExecutionReceipt {
|
|
|
11948
11920
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Acyclic Edge, Stochastic Routing, Transition Probability, Directed Graph
|
|
11949
11921
|
*/
|
|
11950
11922
|
export interface TransitionEdgeProfile {
|
|
11951
|
-
topology_class?:
|
|
11923
|
+
topology_class?: TopologyClass124;
|
|
11952
11924
|
target_node_cid?: TargetNodeCid1;
|
|
11953
11925
|
/**
|
|
11954
11926
|
* Dynamic discovery intent for bridging nodes.
|
|
@@ -11992,7 +11964,7 @@ export interface EdgeMappingContract {
|
|
|
11992
11964
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Cyclic Edge, Bellman Equation, Thermodynamic Discounting, Recursive Traversal
|
|
11993
11965
|
*/
|
|
11994
11966
|
export interface CyclicEdgeProfile {
|
|
11995
|
-
topology_class?:
|
|
11967
|
+
topology_class?: TopologyClass125;
|
|
11996
11968
|
target_node_cid?: TargetNodeCid2;
|
|
11997
11969
|
/**
|
|
11998
11970
|
* Dynamic discovery intent for bridging nodes.
|
|
@@ -12346,31 +12318,6 @@ export interface ComputeRateContract1 {
|
|
|
12346
12318
|
cost_per_million_output_tokens: CostPerMillionOutputTokens;
|
|
12347
12319
|
magnitude_unit: MagnitudeUnit;
|
|
12348
12320
|
}
|
|
12349
|
-
/**
|
|
12350
|
-
* CoReason Shared Kernel Ontology
|
|
12351
|
-
*
|
|
12352
|
-
* AGENT INSTRUCTION: Formalizes a discrete normative axiom within a Constitutional AI
|
|
12353
|
-
* framework to prevent instrumental convergence. As a ...Policy suffix, this object defines
|
|
12354
|
-
* rigid mathematical boundaries that the orchestrator must enforce globally.
|
|
12355
|
-
*
|
|
12356
|
-
* CAUSAL AFFORDANCE: Establishes a hard structural boundary that mathematically repels the
|
|
12357
|
-
* swarm's generative trajectory away from forbidden semantic manifolds. Violation severity
|
|
12358
|
-
* is classified via a strict Literal["low", "medium", "high", "critical"] tier.
|
|
12359
|
-
*
|
|
12360
|
-
* EPISTEMIC BOUNDS: Geometrically restricts the state space by blacklisting specific
|
|
12361
|
-
* execution branches via the forbidden_intents array (max_length=1000),
|
|
12362
|
-
* deterministically sorted by @model_validator to preserve RFC 8785 canonical hashing.
|
|
12363
|
-
* The rule_cid is bounded to a 128-char CID.
|
|
12364
|
-
*
|
|
12365
|
-
* MCP ROUTING TRIGGERS: Constitutional AI, Value Alignment, Normative Axiom, Instrumental
|
|
12366
|
-
* Convergence, Semantic Boundary
|
|
12367
|
-
*/
|
|
12368
|
-
export interface ConstitutionalPolicy {
|
|
12369
|
-
rule_cid: RuleCid1;
|
|
12370
|
-
description: Description10;
|
|
12371
|
-
severity: Severity;
|
|
12372
|
-
forbidden_intents: ForbiddenIntents1;
|
|
12373
|
-
}
|
|
12374
12321
|
/**
|
|
12375
12322
|
* CoReason Shared Kernel Ontology
|
|
12376
12323
|
*
|
|
@@ -12617,6 +12564,30 @@ export interface DocumentLayoutManifest {
|
|
|
12617
12564
|
export interface Blocks1 {
|
|
12618
12565
|
[k: string]: DocumentLayoutRegionState;
|
|
12619
12566
|
}
|
|
12567
|
+
/**
|
|
12568
|
+
* CoReason Shared Kernel Ontology
|
|
12569
|
+
*
|
|
12570
|
+
* AGENT INSTRUCTION: Defines the mathematical Optimal Stopping Theory boundaries for Monte
|
|
12571
|
+
* Carlo Tree Search (MCTS) and test-time compute scaling. As an ...SLA suffix, this object
|
|
12572
|
+
* enforces rigid mathematical boundaries that the orchestrator must respect globally.
|
|
12573
|
+
*
|
|
12574
|
+
* CAUSAL AFFORDANCE: Triggers an early termination circuit breaker on reasoning trajectories
|
|
12575
|
+
* when the gradient of the Process Reward Model (PRM) score falls below the epsilon delta,
|
|
12576
|
+
* halting unnecessary probability wave expansion and preserving VRAM.
|
|
12577
|
+
*
|
|
12578
|
+
* EPISTEMIC BOUNDS: Mathematically constrained by convergence_delta_epsilon (ge=0.0, le=1.0)
|
|
12579
|
+
* over a strictly positive lookback_window_steps (gt=0, le=18446744073709551615). Physically mandates
|
|
12580
|
+
* a minimum_reasoning_steps burn-in period (gt=0, le=18446744073709551615) to prevent premature
|
|
12581
|
+
* collapse before the latent space is adequately explored.
|
|
12582
|
+
*
|
|
12583
|
+
* MCP ROUTING TRIGGERS: Optimal Stopping Theory, MCTS, PRM Convergence, Circuit Breaker,
|
|
12584
|
+
* Bellman Equation
|
|
12585
|
+
*/
|
|
12586
|
+
export interface DynamicConvergenceSLA {
|
|
12587
|
+
convergence_delta_epsilon: ConvergenceDeltaEpsilon;
|
|
12588
|
+
lookback_window_steps: LookbackWindowSteps;
|
|
12589
|
+
minimum_reasoning_steps: MinimumReasoningSteps;
|
|
12590
|
+
}
|
|
12620
12591
|
/**
|
|
12621
12592
|
* CoReason Shared Kernel Ontology
|
|
12622
12593
|
*
|
|
@@ -12968,6 +12939,26 @@ export interface EpistemicEscalationContract {
|
|
|
12968
12939
|
test_time_multiplier: TestTimeMultiplier;
|
|
12969
12940
|
max_escalation_tiers: MaxEscalationTiers;
|
|
12970
12941
|
}
|
|
12942
|
+
/**
|
|
12943
|
+
* CoReason Shared Kernel Ontology
|
|
12944
|
+
*
|
|
12945
|
+
* AGENT INSTRUCTION: A declarative proxy that outputs standard NeMo Colang format (.co files)
|
|
12946
|
+
* to configure the NeMo Guardrails reverse-proxy in the Envoy mesh.
|
|
12947
|
+
*
|
|
12948
|
+
* CAUSAL AFFORDANCE: Defines the exact Colang state machine configuration for intercepting
|
|
12949
|
+
* and overriding LLM outputs before they hit the network.
|
|
12950
|
+
*
|
|
12951
|
+
* EPISTEMIC BOUNDS: Bounded by a strict max_length=100000 on the raw Colang payload
|
|
12952
|
+
* to prevent memory exhaustion. The @model_validator deterministically sorts the required
|
|
12953
|
+
* imports.
|
|
12954
|
+
*
|
|
12955
|
+
* MCP ROUTING TRIGGERS: NeMo Guardrails, Colang, Reverse Proxy, Constitutional Alignment, Envoy Mesh
|
|
12956
|
+
*/
|
|
12957
|
+
export interface EpistemicGuardrailsManifest {
|
|
12958
|
+
colang_version?: ColangVersion;
|
|
12959
|
+
colang_payload: ColangPayload;
|
|
12960
|
+
severity?: Severity;
|
|
12961
|
+
}
|
|
12971
12962
|
/**
|
|
12972
12963
|
* CoReason Shared Kernel Ontology
|
|
12973
12964
|
*
|
|
@@ -13198,23 +13189,24 @@ export interface ProceduralMetadataManifest {
|
|
|
13198
13189
|
/**
|
|
13199
13190
|
* CoReason Shared Kernel Ontology
|
|
13200
13191
|
*
|
|
13201
|
-
*
|
|
13202
|
-
*
|
|
13203
|
-
*
|
|
13204
|
-
*
|
|
13192
|
+
* AGENT INSTRUCTION: Encodes a macroscopic Petri net or Directed Acyclic Graph (DAG)
|
|
13193
|
+
* formalizing standard operating procedures into mathematically traversable state
|
|
13194
|
+
* transitions. As a ...Manifest suffix, this defines a frozen, N-dimensional coordinate
|
|
13195
|
+
* state.
|
|
13205
13196
|
*
|
|
13206
|
-
*
|
|
13207
|
-
*
|
|
13208
|
-
*
|
|
13209
|
-
*
|
|
13197
|
+
* CAUSAL AFFORDANCE: Physically bounds the executing agent (target_persona:
|
|
13198
|
+
* ProfileCIDState) to a deterministic sequence of CognitiveStateProfiles, unlocking
|
|
13199
|
+
* the ability for the orchestrator to dynamically evaluate execution
|
|
13200
|
+
* via Process Reward Models (prm_evaluations: list[ProcessRewardContract]) at each
|
|
13201
|
+
* topological node.
|
|
13210
13202
|
*
|
|
13211
|
-
*
|
|
13212
|
-
*
|
|
13213
|
-
*
|
|
13214
|
-
*
|
|
13203
|
+
* EPISTEMIC BOUNDS: The cognitive_steps dictionary is constrained to max_length=1000
|
|
13204
|
+
* to cap memory footprint. The @model_validator reject_ghost_nodes mathematically enforces
|
|
13205
|
+
* referential integrity, guaranteeing that no chronological_flow_edges AND no
|
|
13206
|
+
* structural_grammar_hashes point to an undefined state.
|
|
13215
13207
|
*
|
|
13216
|
-
*
|
|
13217
|
-
*
|
|
13208
|
+
* MCP ROUTING TRIGGERS: Petri Net, Directed Acyclic Graph, Process Reward Model,
|
|
13209
|
+
* Topological Flow, Referential Integrity
|
|
13218
13210
|
*/
|
|
13219
13211
|
export interface EpistemicSOPManifest {
|
|
13220
13212
|
sop_cid: SopCid;
|
|
@@ -13225,6 +13217,7 @@ export interface EpistemicSOPManifest {
|
|
|
13225
13217
|
cognitive_steps: CognitiveSteps;
|
|
13226
13218
|
structural_grammar_hashes: StructuralGrammarHashes;
|
|
13227
13219
|
chronological_flow_edges: ChronologicalFlowEdges1;
|
|
13220
|
+
prm_evaluations?: PrmEvaluations;
|
|
13228
13221
|
}
|
|
13229
13222
|
/**
|
|
13230
13223
|
* Dictionary mapping step_cids to strict causal DAG constraints.
|
|
@@ -13238,6 +13231,26 @@ export interface CognitiveSteps {
|
|
|
13238
13231
|
export interface StructuralGrammarHashes {
|
|
13239
13232
|
[k: string]: string;
|
|
13240
13233
|
}
|
|
13234
|
+
/**
|
|
13235
|
+
* CoReason Shared Kernel Ontology
|
|
13236
|
+
*
|
|
13237
|
+
* AGENT INSTRUCTION: Enforces the Step-Level Verification heuristics for Process Reward Models (PRMs) during non-monotonic reasoning searches and test-time compute.
|
|
13238
|
+
*
|
|
13239
|
+
* CAUSAL AFFORDANCE: Authorizes the orchestrator to physically prune hallucinating ThoughtBranchState vectors from the LatentScratchpadReceipt if their logit probabilities drop below the viable threshold, emulating rigorous Beam Search pruning.
|
|
13240
|
+
*
|
|
13241
|
+
* EPISTEMIC BOUNDS: Strictly bounds the search space geometry via `pruning_threshold` (`ge=0.0, le=1.0`) and mechanically caps State-Space Explosion through `max_backtracks_allowed` (`ge=0, le=18446744073709551615`).
|
|
13242
|
+
*
|
|
13243
|
+
* MCP ROUTING TRIGGERS: Process Reward Model, Beam Search Pruning, Latent Trajectory, State-Space Explosion, A* Search
|
|
13244
|
+
*/
|
|
13245
|
+
export interface ProcessRewardContract {
|
|
13246
|
+
/**
|
|
13247
|
+
* The dynamic circuit breaker that halts the search when PRM variance converges, preventing VRAM waste.
|
|
13248
|
+
*/
|
|
13249
|
+
convergence_sla?: DynamicConvergenceSLA | null;
|
|
13250
|
+
pruning_threshold: PruningThreshold;
|
|
13251
|
+
max_backtracks_allowed: MaxBacktracksAllowed;
|
|
13252
|
+
evaluator_matrix_name?: EvaluatorMatrixName;
|
|
13253
|
+
}
|
|
13241
13254
|
/**
|
|
13242
13255
|
* CoReason Shared Kernel Ontology
|
|
13243
13256
|
*
|
|
@@ -13442,7 +13455,7 @@ export interface GenerativeTaxonomyManifest1 {
|
|
|
13442
13455
|
* Bounding, ESG Constraint, Execution Envelope
|
|
13443
13456
|
*/
|
|
13444
13457
|
export interface GlobalGovernancePolicy {
|
|
13445
|
-
mandatory_license_rule:
|
|
13458
|
+
mandatory_license_rule: EpistemicGuardrailsManifest1;
|
|
13446
13459
|
max_budget_magnitude: MaxBudgetMagnitude1;
|
|
13447
13460
|
/**
|
|
13448
13461
|
* The mathematical CRDT ruleset governing distributed state synchronization.
|
|
@@ -13459,27 +13472,22 @@ export interface GlobalGovernancePolicy {
|
|
|
13459
13472
|
/**
|
|
13460
13473
|
* CoReason Shared Kernel Ontology
|
|
13461
13474
|
*
|
|
13462
|
-
* AGENT INSTRUCTION:
|
|
13463
|
-
*
|
|
13464
|
-
* rigid mathematical boundaries that the orchestrator must enforce globally.
|
|
13475
|
+
* AGENT INSTRUCTION: A declarative proxy that outputs standard NeMo Colang format (.co files)
|
|
13476
|
+
* to configure the NeMo Guardrails reverse-proxy in the Envoy mesh.
|
|
13465
13477
|
*
|
|
13466
|
-
* CAUSAL AFFORDANCE:
|
|
13467
|
-
*
|
|
13468
|
-
* is classified via a strict Literal["low", "medium", "high", "critical"] tier.
|
|
13478
|
+
* CAUSAL AFFORDANCE: Defines the exact Colang state machine configuration for intercepting
|
|
13479
|
+
* and overriding LLM outputs before they hit the network.
|
|
13469
13480
|
*
|
|
13470
|
-
* EPISTEMIC BOUNDS:
|
|
13471
|
-
*
|
|
13472
|
-
*
|
|
13473
|
-
* The rule_cid is bounded to a 128-char CID.
|
|
13481
|
+
* EPISTEMIC BOUNDS: Bounded by a strict max_length=100000 on the raw Colang payload
|
|
13482
|
+
* to prevent memory exhaustion. The @model_validator deterministically sorts the required
|
|
13483
|
+
* imports.
|
|
13474
13484
|
*
|
|
13475
|
-
* MCP ROUTING TRIGGERS:
|
|
13476
|
-
* Convergence, Semantic Boundary
|
|
13485
|
+
* MCP ROUTING TRIGGERS: NeMo Guardrails, Colang, Reverse Proxy, Constitutional Alignment, Envoy Mesh
|
|
13477
13486
|
*/
|
|
13478
|
-
export interface
|
|
13479
|
-
|
|
13480
|
-
|
|
13481
|
-
severity
|
|
13482
|
-
forbidden_intents: ForbiddenIntents1;
|
|
13487
|
+
export interface EpistemicGuardrailsManifest1 {
|
|
13488
|
+
colang_version?: ColangVersion;
|
|
13489
|
+
colang_payload: ColangPayload;
|
|
13490
|
+
severity?: Severity;
|
|
13483
13491
|
}
|
|
13484
13492
|
/**
|
|
13485
13493
|
* CoReason Shared Kernel Ontology
|
|
@@ -13554,32 +13562,6 @@ export interface GlobalSemanticProfile1 {
|
|
|
13554
13562
|
detected_modalities: DetectedModalities;
|
|
13555
13563
|
token_density: TokenDensity;
|
|
13556
13564
|
}
|
|
13557
|
-
/**
|
|
13558
|
-
* CoReason Shared Kernel Ontology
|
|
13559
|
-
*
|
|
13560
|
-
* AGENT INSTRUCTION: Aggregates discrete ConstitutionalPolicy nodes into a cohesive,
|
|
13561
|
-
* version-controlled Normative Alignment Manifold. As a ...Policy suffix, this object
|
|
13562
|
-
* defines rigid mathematical boundaries that the orchestrator must enforce globally.
|
|
13563
|
-
*
|
|
13564
|
-
* CAUSAL AFFORDANCE: Instructs the orchestrator to enforce a unified cybernetic governance
|
|
13565
|
-
* model across all swarm trajectories, grounding generative actions in a specific semantic
|
|
13566
|
-
* version (SemanticVersionState).
|
|
13567
|
-
*
|
|
13568
|
-
* EPISTEMIC BOUNDS: The topological integrity of the manifold is mathematically guaranteed
|
|
13569
|
-
* by the @model_validator, which deterministically sorts the rules array by rule_cid to
|
|
13570
|
-
* prevent Byzantine hash fractures across distributed nodes.
|
|
13571
|
-
*
|
|
13572
|
-
* MCP ROUTING TRIGGERS: Cybernetic Governance, Normative Alignment Manifold, Rule
|
|
13573
|
-
* Aggregation, Version Control, RFC 8785 Canonicalization
|
|
13574
|
-
*/
|
|
13575
|
-
export interface GovernancePolicy {
|
|
13576
|
-
policy_name: PolicyName;
|
|
13577
|
-
/**
|
|
13578
|
-
* Semantic version of the governance policy.
|
|
13579
|
-
*/
|
|
13580
|
-
version: string;
|
|
13581
|
-
rules: Rules1;
|
|
13582
|
-
}
|
|
13583
13565
|
/**
|
|
13584
13566
|
* CoReason Shared Kernel Ontology
|
|
13585
13567
|
*
|