@coreason-ai/coreason-manifest 0.55.1 → 0.55.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/ontology.d.ts +444 -462
  2. package/package.json +1 -1
@@ -603,7 +603,7 @@ export type Rationale = string;
603
603
  * Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
604
604
  */
605
605
  export type HeuristicConfidence = number;
606
- export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent;
606
+ export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent | FederatedDiscoveryIntent;
607
607
  /**
608
608
  * Discriminator for temporal edge invalidation.
609
609
  */
@@ -1202,7 +1202,7 @@ export type Justification = string;
1202
1202
  */
1203
1203
  export type TopologyClass38 = "constitutional_amendment";
1204
1204
  /**
1205
- * The globally unique decentralized identifier (DID) anchoring the NormativeDriftEvent that justified triggering this proposal.
1205
+ * The globally unique decentralized identifier (DID) anchoring the GuardrailViolationEvent that justified triggering this proposal.
1206
1206
  */
1207
1207
  export type DriftEventCid = string;
1208
1208
  /**
@@ -1700,6 +1700,18 @@ export type SourceArtifactCid1 = string;
1700
1700
  * The formal URN declaring the target ontological geometry for structural isomorphism.
1701
1701
  */
1702
1702
  export type TargetOntologyUrn = string;
1703
+ /**
1704
+ * Discriminator for the FederatedDiscoveryIntent topology.
1705
+ */
1706
+ export type TopologyClass60 = "federated_discovery_intent";
1707
+ /**
1708
+ * The strict array of strings defining topological limits on the discovered capabilities.
1709
+ */
1710
+ export type DomainFilter = string[];
1711
+ /**
1712
+ * The minimum SRB governance lifecycle phase required for projected capabilities (DRAFT / SRB_APPROVED / CLIENT_APPROVED / PUBLISHED).
1713
+ */
1714
+ export type MinimumEpistemicStatus = string;
1703
1715
  /**
1704
1716
  * A discriminated union of all valid workflow nodes.
1705
1717
  */
@@ -1753,7 +1765,7 @@ export type Description3 = string;
1753
1765
  /**
1754
1766
  * Discriminator for an Agent node.
1755
1767
  */
1756
- export type TopologyClass60 = "agent";
1768
+ export type TopologyClass61 = "agent";
1757
1769
  /**
1758
1770
  * The level of hardware-enforced cryptographic isolation required.
1759
1771
  */
@@ -1940,17 +1952,10 @@ export type EnforceFunctionalIsolation = boolean;
1940
1952
  *
1941
1953
  * @minItems 1
1942
1954
  */
1943
- export type PermittedClassificationTiers = [SemanticClassificationProfile, ...SemanticClassificationProfile[]];
1944
- /**
1945
- * AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
1946
- *
1947
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
1948
- *
1949
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
1950
- *
1951
- * MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
1952
- */
1953
- export type SemanticClassificationProfile = "public" | "internal" | "confidential" | "restricted";
1955
+ export type PermittedClassificationTiers = [
1956
+ "public" | "internal" | "confidential" | "restricted",
1957
+ ...("public" | "internal" | "confidential" | "restricted")[]
1958
+ ];
1954
1959
  /**
1955
1960
  * The declarative whitelist of strictly typed ontological node labels authorized for context projection.
1956
1961
  */
@@ -2089,7 +2094,7 @@ export type DomainExtensions1 = {
2089
2094
  /**
2090
2095
  * Discriminator for a Human node.
2091
2096
  */
2092
- export type TopologyClass61 = "human";
2097
+ export type TopologyClass62 = "human";
2093
2098
  /**
2094
2099
  * The mandatory cryptographic attestation URN required to verify the human operator's identity.
2095
2100
  */
@@ -2119,7 +2124,7 @@ export type DomainExtensions2 = {
2119
2124
  /**
2120
2125
  * Discriminator for a System node.
2121
2126
  */
2122
- export type TopologyClass62 = "system";
2127
+ export type TopologyClass63 = "system";
2123
2128
  /**
2124
2129
  * The semantic boundary defining the objective function or computational perimeter of the execution node.
2125
2130
  */
@@ -2145,7 +2150,7 @@ export type DomainExtensions3 = {
2145
2150
  /**
2146
2151
  * Discriminator for a Composite node.
2147
2152
  */
2148
- export type TopologyClass63 = "composite";
2153
+ export type TopologyClass64 = "composite";
2149
2154
  /**
2150
2155
  * Entropy Penalty applied per edge traversal during a defeasible cascade.
2151
2156
  */
@@ -2214,40 +2219,6 @@ export type PolicyCid = string;
2214
2219
  * Whether this policy is currently enforcing data sanitization.
2215
2220
  */
2216
2221
  export type Active1 = boolean;
2217
- /**
2218
- * Unique identifier for the sanitization rule.
2219
- */
2220
- export type RuleCid = string;
2221
- /**
2222
- * AGENT INSTRUCTION: Implements SPIFFE/SPIRE workload identity bounds and Service Mesh data sensitivity labels, establishing the foundational mathematical axis for Information Flow Control across the distributed swarm via Envoy delegation.
2223
- *
2224
- * CAUSAL AFFORDANCE: Physically authorizes or severs the projection of semantic payloads. In an Envoy-native OPA policy enforcement model, this label acts as the primary metadata selector for decentralized identity verification between a payload and an agent's SPIFFE Verifiable Identity Document (SVID).
2225
- *
2226
- * EPISTEMIC BOUNDS: Constrained to a strict, 4-dimensional string literal space to prevent the hallucination of unauthorized workload labels. The platform delegating to mTLS and OPA for enforcement, removing the requirement for scalar manifest-level dominance checks.
2227
- *
2228
- * MCP ROUTING TRIGGERS: SPIFFE/SPIRE, Envoy Service Mesh, Workload Identity, mTLS Delegation, Epistemic Quarantine
2229
- */
2230
- export type SemanticClassificationProfile1 = "public" | "internal" | "confidential" | "restricted";
2231
- /**
2232
- * The semantic entity type or declarative regex pattern to identify.
2233
- */
2234
- export type TargetPattern = string;
2235
- /**
2236
- * The dynamic regex pattern to target.
2237
- */
2238
- export type TargetRegexPattern = string;
2239
- /**
2240
- * Specific JSON paths where this rule should NOT apply.
2241
- */
2242
- export type ContextExclusionZones = string[] | null;
2243
- /**
2244
- * The strictly typed string to insert if the action is 'redact'.
2245
- */
2246
- export type ReplacementToken = string | null;
2247
- /**
2248
- * The array of sanitization rules to enforce.
2249
- */
2250
- export type Rules = RedactionPolicy[];
2251
2222
  /**
2252
2223
  * The absolute physical ceiling of tokens allowed in a single ingress payload.
2253
2224
  */
@@ -2381,7 +2352,7 @@ export type FoveatedPrivacyEpsilon = number | null;
2381
2352
  /**
2382
2353
  * Discriminator for a DAG topology.
2383
2354
  */
2384
- export type TopologyClass64 = "dag";
2355
+ export type TopologyClass65 = "dag";
2385
2356
  /**
2386
2357
  * The strict, topologically bounded matrix of directed causal edges.
2387
2358
  */
@@ -2465,7 +2436,7 @@ export type Justification7 = string | null;
2465
2436
  /**
2466
2437
  * Discriminator for a Council topology.
2467
2438
  */
2468
- export type TopologyClass65 = "council";
2439
+ export type TopologyClass66 = "council";
2469
2440
  /**
2470
2441
  * The minimum number of adversarial or 'Devil's Advocate' roles required to prevent groupthink.
2471
2442
  */
@@ -2537,7 +2508,7 @@ export type Justification8 = string | null;
2537
2508
  /**
2538
2509
  * Discriminator for a Swarm topology.
2539
2510
  */
2540
- export type TopologyClass66 = "swarm";
2511
+ export type TopologyClass67 = "swarm";
2541
2512
  /**
2542
2513
  * Threshold limit for dynamic spawning of additional nodes.
2543
2514
  */
@@ -2619,7 +2590,7 @@ export type Justification9 = string | null;
2619
2590
  /**
2620
2591
  * Discriminator for an Evolutionary topology.
2621
2592
  */
2622
- export type TopologyClass67 = "evolutionary";
2593
+ export type TopologyClass68 = "evolutionary";
2623
2594
  /**
2624
2595
  * The absolute limit on evolutionary breeding cycles.
2625
2596
  */
@@ -2679,7 +2650,7 @@ export type Justification10 = string | null;
2679
2650
  /**
2680
2651
  * Discriminator for SMPC Topology.
2681
2652
  */
2682
- export type TopologyClass68 = "smpc";
2653
+ export type TopologyClass69 = "smpc";
2683
2654
  /**
2684
2655
  * The exact cryptographic P2P protocol the nodes must use to evaluate the function.
2685
2656
  */
@@ -2709,7 +2680,7 @@ export type Justification11 = string | null;
2709
2680
  /**
2710
2681
  * Discriminator for an Evaluator-Optimizer loop.
2711
2682
  */
2712
- export type TopologyClass69 = "evaluator_optimizer";
2683
+ export type TopologyClass70 = "evaluator_optimizer";
2713
2684
  /**
2714
2685
  * The absolute limit on Actor-Critic cycles to prevent infinite compute burn.
2715
2686
  */
@@ -2733,7 +2704,7 @@ export type Justification12 = string | null;
2733
2704
  /**
2734
2705
  * Discriminator for a Digital Twin topology.
2735
2706
  */
2736
- export type TopologyClass70 = "digital_twin";
2707
+ export type TopologyClass71 = "digital_twin";
2737
2708
  /**
2738
2709
  * The identifier (expected to be a W3C DID) pointing to the real-world topology it is cloning.
2739
2710
  */
@@ -2753,7 +2724,7 @@ export type EnforceNoSideEffects = boolean;
2753
2724
  /**
2754
2725
  * Discriminator for federation macro.
2755
2726
  */
2756
- export type TopologyClass71 = "macro_federation";
2727
+ export type TopologyClass72 = "macro_federation";
2757
2728
  /**
2758
2729
  * The nodes forming the PBFT ring.
2759
2730
  *
@@ -2775,7 +2746,7 @@ export type Justification13 = string | null;
2775
2746
  /**
2776
2747
  * Discriminator for forge macro.
2777
2748
  */
2778
- export type TopologyClass72 = "macro_forge";
2749
+ export type TopologyClass73 = "macro_forge";
2779
2750
  /**
2780
2751
  * The structural 128-char DID boundary pointing to the foundational semantic deficit vector.
2781
2752
  */
@@ -2803,7 +2774,7 @@ export type Justification14 = string | null;
2803
2774
  /**
2804
2775
  * Discriminator for the elicitation macro.
2805
2776
  */
2806
- export type TopologyClass73 = "macro_elicitation";
2777
+ export type TopologyClass74 = "macro_elicitation";
2807
2778
  /**
2808
2779
  * The anchor to the initial, unstructured MultimodalArtifactReceipt uploaded by the human.
2809
2780
  */
@@ -2827,7 +2798,7 @@ export type Justification15 = string | null;
2827
2798
  /**
2828
2799
  * Discriminator for the ingestion macro.
2829
2800
  */
2830
- export type TopologyClass74 = "macro_ingestion";
2801
+ export type TopologyClass75 = "macro_ingestion";
2831
2802
  /**
2832
2803
  * Target serialization format.
2833
2804
  */
@@ -2847,7 +2818,7 @@ export type Justification16 = string | null;
2847
2818
  /**
2848
2819
  * Discriminator for a macro neurosymbolic loop.
2849
2820
  */
2850
- export type TopologyClass75 = "macro_neurosymbolic";
2821
+ export type TopologyClass76 = "macro_neurosymbolic";
2851
2822
  /**
2852
2823
  * The connectionist agent generating hypotheses.
2853
2824
  */
@@ -2867,7 +2838,7 @@ export type CritiqueSchemaCid = string | null;
2867
2838
  /**
2868
2839
  * Discriminator for a discourse tree topology.
2869
2840
  */
2870
- export type TopologyClass76 = "discourse_tree";
2841
+ export type TopologyClass77 = "discourse_tree";
2871
2842
  /**
2872
2843
  * Cryptographic identifier for this topology.
2873
2844
  */
@@ -2880,7 +2851,7 @@ export type DiscourseType = "preamble" | "methodology" | "argumentation" | "find
2880
2851
  * Explicit pointers linking this discourse block to the specific AtomicPropositionState nodes extracted from its text.
2881
2852
  */
2882
2853
  export type ContainedPropositions = NodeCIDState[];
2883
- export type TopologyClass77 = "document_knowledge_graph";
2854
+ export type TopologyClass78 = "document_knowledge_graph";
2884
2855
  export type GraphCid = string;
2885
2856
  export type SourceArtifactCid2 = string;
2886
2857
  /**
@@ -2944,7 +2915,7 @@ export type CiphertextBlob = string;
2944
2915
  /**
2945
2916
  * Discriminator for manifold mapping.
2946
2917
  */
2947
- export type TopologyClass78 = "manifold_mapping";
2918
+ export type TopologyClass79 = "manifold_mapping";
2948
2919
  /**
2949
2920
  * Calculated geometric alignment between the semantic embedding and spatial tensor.
2950
2921
  */
@@ -2962,7 +2933,7 @@ export type Nodes12 = SemanticNodeState[];
2962
2933
  */
2963
2934
  export type CausalEdges = CausalDirectedEdgeState[];
2964
2935
  export type IsomorphismHash = string;
2965
- export type TopologyClass79 = "hierarchical_dom";
2936
+ export type TopologyClass80 = "hierarchical_dom";
2966
2937
  export type DomCid = string;
2967
2938
  export type RootBlockCid = string;
2968
2939
  /**
@@ -3054,7 +3025,7 @@ export type DomainExtensions4 = {
3054
3025
  /**
3055
3026
  * Discriminator for a Memoized node.
3056
3027
  */
3057
- export type TopologyClass80 = "memoized";
3028
+ export type TopologyClass81 = "memoized";
3058
3029
  /**
3059
3030
  * A discriminated union of presentation UI panels.
3060
3031
  */
@@ -3063,11 +3034,11 @@ export type AnyPresentationIntent = SemanticIntent | DraftingIntent | Adjudicati
3063
3034
  /**
3064
3035
  * A discriminated union of state events.
3065
3036
  */
3066
- export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | NormativeDriftEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt;
3037
+ export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt | GuardrailViolationEvent;
3067
3038
  /**
3068
3039
  * Discriminator for temporal graph crdt.
3069
3040
  */
3070
- export type TopologyClass81 = "temporal_graph_crdt";
3041
+ export type TopologyClass82 = "temporal_graph_crdt";
3071
3042
  /**
3072
3043
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark.
3073
3044
  */
@@ -3088,7 +3059,7 @@ export type AddSet = NodeCIDState[];
3088
3059
  * The set of non-monotonic timeline caps.
3089
3060
  */
3090
3061
  export type TerminateSet = TemporalEdgeInvalidationIntent[];
3091
- export type TopologyClass82 = "mcp_tool_definition";
3062
+ export type TopologyClass83 = "mcp_tool_definition";
3092
3063
  /**
3093
3064
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3094
3065
  */
@@ -3103,7 +3074,7 @@ export type Description9 = string;
3103
3074
  export type EventCid2 = string;
3104
3075
  export type PriorEventHash2 = string | null;
3105
3076
  export type Timestamp2 = number;
3106
- export type TopologyClass83 = "crosswalk_resolution";
3077
+ export type TopologyClass84 = "crosswalk_resolution";
3107
3078
  export type ReceiptCid = string;
3108
3079
  export type TargetGraphCid3 = string;
3109
3080
  /**
@@ -3121,7 +3092,7 @@ export type Timestamp3 = number;
3121
3092
  /**
3122
3093
  * Discriminator for a zero-trust receipt.
3123
3094
  */
3124
- export type TopologyClass84 = "zero_trust_receipt";
3095
+ export type TopologyClass85 = "zero_trust_receipt";
3125
3096
  /**
3126
3097
  * Pointer to the originating EpistemicZeroTrustContract.
3127
3098
  */
@@ -3157,7 +3128,7 @@ export type Timestamp4 = number;
3157
3128
  /**
3158
3129
  * Discriminator type for an observation event.
3159
3130
  */
3160
- export type TopologyClass85 = "observation";
3131
+ export type TopologyClass86 = "observation";
3161
3132
  /**
3162
3133
  * The URN representing the physical silicon architecture generating the root-of-trust quote (e.g., 'urn:coreason:enclave:intel_tdx').
3163
3134
  */
@@ -3177,7 +3148,7 @@ export type AnyToolchainState = BrowserDOMState | TerminalBufferState;
3177
3148
  /**
3178
3149
  * Discriminator for Causal Actuators representing structural shifts.
3179
3150
  */
3180
- export type TopologyClass86 = "browser";
3151
+ export type TopologyClass87 = "browser";
3181
3152
  /**
3182
3153
  * Spatial Execution Bounds where the agent interacts.
3183
3154
  */
@@ -3204,7 +3175,7 @@ export type ScreenshotCid = string | null;
3204
3175
  /**
3205
3176
  * Discriminator for Causal Actuators on structural buffers.
3206
3177
  */
3207
- export type TopologyClass87 = "terminal";
3178
+ export type TopologyClass88 = "terminal";
3208
3179
  /**
3209
3180
  * Capability Perimeters defining context bounds.
3210
3181
  */
@@ -3302,7 +3273,7 @@ export type Timestamp5 = number;
3302
3273
  /**
3303
3274
  * Discriminator type for a Belief Assertion event.
3304
3275
  */
3305
- export type TopologyClass88 = "belief_mutation";
3276
+ export type TopologyClass89 = "belief_mutation";
3306
3277
  /**
3307
3278
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the source event in the Merkle-DAG.
3308
3279
  */
@@ -3354,8 +3325,8 @@ export type Timestamp6 = number;
3354
3325
  /**
3355
3326
  * Discriminator type for a system fault event.
3356
3327
  */
3357
- export type TopologyClass89 = "system_fault";
3358
- export type TopologyClass90 = "atomic_proposition";
3328
+ export type TopologyClass90 = "system_fault";
3329
+ export type TopologyClass91 = "atomic_proposition";
3359
3330
  /**
3360
3331
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3361
3332
  */
@@ -3412,7 +3383,7 @@ export type UpperBound = number | null;
3412
3383
  * Explicit mathematical boundaries extracted from the text that empirically limit the certainty or scope of the proposition.
3413
3384
  */
3414
3385
  export type StatisticalQualifiers = EmpiricalStatisticalProfile[];
3415
- export type TopologyClass91 = "post_coordinated_concept";
3386
+ export type TopologyClass92 = "post_coordinated_concept";
3416
3387
  /**
3417
3388
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3418
3389
  */
@@ -3440,7 +3411,7 @@ export type IsometryScore = number;
3440
3411
  export type EventCid9 = string;
3441
3412
  export type PriorEventHash9 = string | null;
3442
3413
  export type Timestamp9 = number;
3443
- export type TopologyClass92 = "artifact_corruption";
3414
+ export type TopologyClass93 = "artifact_corruption";
3444
3415
  /**
3445
3416
  * The genesis artifact that caused the ingestion engine to crash.
3446
3417
  */
@@ -3462,7 +3433,7 @@ export type Timestamp10 = number;
3462
3433
  /**
3463
3434
  * Discriminator for a hypothesis generation event.
3464
3435
  */
3465
- export type TopologyClass93 = "hypothesis";
3436
+ export type TopologyClass94 = "hypothesis";
3466
3437
  /**
3467
3438
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this abductive leap to the Merkle-DAG.
3468
3439
  */
@@ -3516,7 +3487,7 @@ export type Timestamp11 = number;
3516
3487
  /**
3517
3488
  * Discriminator type for a barge-in interruption event.
3518
3489
  */
3519
- export type TopologyClass94 = "barge_in";
3490
+ export type TopologyClass95 = "barge_in";
3520
3491
  /**
3521
3492
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the active node generation cycle that was killed in the Merkle-DAG.
3522
3493
  */
@@ -3546,7 +3517,7 @@ export type Timestamp12 = number;
3546
3517
  /**
3547
3518
  * Discriminator type for a counterfactual regret event.
3548
3519
  */
3549
- export type TopologyClass95 = "counterfactual_regret";
3520
+ export type TopologyClass96 = "counterfactual_regret";
3550
3521
  /**
3551
3522
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the specific historical state node where the agent mathematically diverged to simulate an alternative path.
3552
3523
  */
@@ -3582,7 +3553,7 @@ export type Timestamp13 = number;
3582
3553
  /**
3583
3554
  * Discriminator type for a tool invocation event.
3584
3555
  */
3585
- export type TopologyClass96 = "tool_invocation";
3556
+ export type TopologyClass97 = "tool_invocation";
3586
3557
  /**
3587
3558
  * The exact tool targeted in the CognitiveActionSpaceManifest.
3588
3559
  */
@@ -3606,7 +3577,7 @@ export type Timestamp14 = number;
3606
3577
  /**
3607
3578
  * Discriminator type for an epistemic promotion event.
3608
3579
  */
3609
- export type TopologyClass97 = "epistemic_promotion";
3580
+ export type TopologyClass98 = "epistemic_promotion";
3610
3581
  /**
3611
3582
  * The strict array of CIDs (Content Identifiers) representing the raw logs being compressed and archived.
3612
3583
  */
@@ -3631,34 +3602,6 @@ export type PriorEventHash15 = string | null;
3631
3602
  * Causal Ancestry markers required to resolve decentralized event ordering.
3632
3603
  */
3633
3604
  export type Timestamp15 = number;
3634
- /**
3635
- * Discriminator type for a normative drift event.
3636
- */
3637
- export type TopologyClass98 = "normative_drift";
3638
- /**
3639
- * The Content Identifier (CID) of the specific ConstitutionalPolicy causing logical friction.
3640
- */
3641
- export type TrippedRuleCid = string;
3642
- /**
3643
- * The calculated probabilistic delta showing how far the swarm's observed reality is diverging from the static rule.
3644
- */
3645
- export type MeasuredSemanticDrift = number;
3646
- /**
3647
- * A cryptographic pointer to the internal scratchpad trace (ThoughtBranchState) definitively proving the rule is obsolete or causing a loop.
3648
- */
3649
- export type ContradictionProofHash = string;
3650
- /**
3651
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3652
- */
3653
- export type EventCid16 = string;
3654
- /**
3655
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3656
- */
3657
- export type PriorEventHash16 = string | null;
3658
- /**
3659
- * Causal Ancestry markers required to resolve decentralized event ordering.
3660
- */
3661
- export type Timestamp16 = number;
3662
3605
  /**
3663
3606
  * Discriminator type for a persistence commit receipt.
3664
3607
  */
@@ -3678,15 +3621,15 @@ export type TargetTableUri = string;
3678
3621
  /**
3679
3622
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3680
3623
  */
3681
- export type EventCid17 = string;
3624
+ export type EventCid16 = string;
3682
3625
  /**
3683
3626
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3684
3627
  */
3685
- export type PriorEventHash17 = string | null;
3628
+ export type PriorEventHash16 = string | null;
3686
3629
  /**
3687
3630
  * Causal Ancestry markers required to resolve decentralized event ordering.
3688
3631
  */
3689
- export type Timestamp17 = number;
3632
+ export type Timestamp16 = number;
3690
3633
  /**
3691
3634
  * Discriminator type for a token burn receipt.
3692
3635
  */
@@ -3710,15 +3653,15 @@ export type BurnMagnitude = number;
3710
3653
  /**
3711
3654
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3712
3655
  */
3713
- export type EventCid18 = string;
3656
+ export type EventCid17 = string;
3714
3657
  /**
3715
3658
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3716
3659
  */
3717
- export type PriorEventHash18 = string | null;
3660
+ export type PriorEventHash17 = string | null;
3718
3661
  /**
3719
3662
  * Causal Ancestry markers required to resolve decentralized event ordering.
3720
3663
  */
3721
- export type Timestamp18 = number;
3664
+ export type Timestamp17 = number;
3722
3665
  /**
3723
3666
  * Discriminator type for a budget exhaustion event.
3724
3667
  */
@@ -3734,15 +3677,15 @@ export type FinalBurnReceiptCid = string;
3734
3677
  /**
3735
3678
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3736
3679
  */
3737
- export type EventCid19 = string;
3680
+ export type EventCid18 = string;
3738
3681
  /**
3739
3682
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3740
3683
  */
3741
- export type PriorEventHash19 = string | null;
3684
+ export type PriorEventHash18 = string | null;
3742
3685
  /**
3743
3686
  * Causal Ancestry markers required to resolve decentralized event ordering.
3744
3687
  */
3745
- export type Timestamp19 = number;
3688
+ export type Timestamp18 = number;
3746
3689
  /**
3747
3690
  * Discriminator type for telemetry events.
3748
3691
  */
@@ -3762,15 +3705,15 @@ export type DwellDurationMs = number | null;
3762
3705
  /**
3763
3706
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3764
3707
  */
3765
- export type EventCid20 = string;
3708
+ export type EventCid19 = string;
3766
3709
  /**
3767
3710
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3768
3711
  */
3769
- export type PriorEventHash20 = string | null;
3712
+ export type PriorEventHash19 = string | null;
3770
3713
  /**
3771
3714
  * Causal Ancestry markers required to resolve decentralized event ordering.
3772
3715
  */
3773
- export type Timestamp20 = number;
3716
+ export type Timestamp19 = number;
3774
3717
  export type TopologyClass103 = "cognitive_prediction";
3775
3718
  export type SourceChainCid = string;
3776
3719
  export type TargetSourceConcept = string;
@@ -3781,15 +3724,15 @@ export type PredictedTopKTokens = [string, ...string[]];
3781
3724
  /**
3782
3725
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3783
3726
  */
3784
- export type EventCid21 = string;
3727
+ export type EventCid20 = string;
3785
3728
  /**
3786
3729
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3787
3730
  */
3788
- export type PriorEventHash21 = string | null;
3731
+ export type PriorEventHash20 = string | null;
3789
3732
  /**
3790
3733
  * Causal Ancestry markers required to resolve decentralized event ordering.
3791
3734
  */
3792
- export type Timestamp21 = number;
3735
+ export type Timestamp20 = number;
3793
3736
  export type TopologyClass104 = "epistemic_axiom_verification";
3794
3737
  export type SourcePredictionCid = string;
3795
3738
  export type SequenceSimilarityScore = number;
@@ -3801,15 +3744,15 @@ export type ZeroTrustReceiptCid1 = string | null;
3801
3744
  /**
3802
3745
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3803
3746
  */
3804
- export type EventCid22 = string;
3747
+ export type EventCid21 = string;
3805
3748
  /**
3806
3749
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3807
3750
  */
3808
- export type PriorEventHash22 = string | null;
3751
+ export type PriorEventHash21 = string | null;
3809
3752
  /**
3810
3753
  * Causal Ancestry markers required to resolve decentralized event ordering.
3811
3754
  */
3812
- export type Timestamp22 = number;
3755
+ export type Timestamp21 = number;
3813
3756
  export type TopologyClass105 = "epistemic_flow_state";
3814
3757
  /**
3815
3758
  * The globally unique decentralized identifier (DID) anchoring the partial CognitiveReasoningTraceState.
@@ -3826,15 +3769,15 @@ export type TerminalRewardFactorized = boolean;
3826
3769
  /**
3827
3770
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3828
3771
  */
3829
- export type EventCid23 = string;
3772
+ export type EventCid22 = string;
3830
3773
  /**
3831
3774
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3832
3775
  */
3833
- export type PriorEventHash23 = string | null;
3776
+ export type PriorEventHash22 = string | null;
3834
3777
  /**
3835
3778
  * Causal Ancestry markers required to resolve decentralized event ordering.
3836
3779
  */
3837
- export type Timestamp23 = number;
3780
+ export type Timestamp22 = number;
3838
3781
  /**
3839
3782
  * Discriminator type for a causal explanation event.
3840
3783
  */
@@ -3878,15 +3821,15 @@ export type AgentAttributions = ShapleyAttributionReceipt[];
3878
3821
  /**
3879
3822
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3880
3823
  */
3881
- export type EventCid24 = string;
3824
+ export type EventCid23 = string;
3882
3825
  /**
3883
3826
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3884
3827
  */
3885
- export type PriorEventHash24 = string | null;
3828
+ export type PriorEventHash23 = string | null;
3886
3829
  /**
3887
3830
  * Causal Ancestry markers required to resolve decentralized event ordering.
3888
3831
  */
3889
- export type Timestamp24 = number;
3832
+ export type Timestamp23 = number;
3890
3833
  /**
3891
3834
  * Discriminator type for an intent classification receipt.
3892
3835
  */
@@ -3911,15 +3854,15 @@ export type TopologyClass108 = "semantic_relational_record";
3911
3854
  /**
3912
3855
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3913
3856
  */
3914
- export type EventCid25 = string;
3857
+ export type EventCid24 = string;
3915
3858
  /**
3916
3859
  * The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
3917
3860
  */
3918
- export type PriorEventHash25 = string | null;
3861
+ export type PriorEventHash24 = string | null;
3919
3862
  /**
3920
3863
  * The precise temporal coordinate of the event realization.
3921
3864
  */
3922
- export type Timestamp25 = number;
3865
+ export type Timestamp24 = number;
3923
3866
  /**
3924
3867
  * The domain-independent structural classification of the record.
3925
3868
  */
@@ -3935,15 +3878,15 @@ export type TopologyClass109 = "ontological_reification";
3935
3878
  /**
3936
3879
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3937
3880
  */
3938
- export type EventCid26 = string;
3881
+ export type EventCid25 = string;
3939
3882
  /**
3940
3883
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
3941
3884
  */
3942
- export type PriorEventHash26 = string | null;
3885
+ export type PriorEventHash25 = string | null;
3943
3886
  /**
3944
3887
  * The precise temporal coordinate of the event realization.
3945
3888
  */
3946
- export type Timestamp26 = number;
3889
+ export type Timestamp25 = number;
3947
3890
  /**
3948
3891
  * The undeniable SHA-256 hash of the pre-transmutation artifact, unstructured text chunk, or telemetry row.
3949
3892
  */
@@ -3963,15 +3906,15 @@ export type IsLatentInference = boolean;
3963
3906
  /**
3964
3907
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3965
3908
  */
3966
- export type EventCid27 = string;
3909
+ export type EventCid26 = string;
3967
3910
  /**
3968
3911
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3969
3912
  */
3970
- export type PriorEventHash27 = string | null;
3913
+ export type PriorEventHash26 = string | null;
3971
3914
  /**
3972
3915
  * Causal Ancestry markers required to resolve decentralized event ordering.
3973
3916
  */
3974
- export type Timestamp27 = number;
3917
+ export type Timestamp26 = number;
3975
3918
  /**
3976
3919
  * The type of the resilience payload.
3977
3920
  */
@@ -3983,15 +3926,15 @@ export type ErrorSignature = string;
3983
3926
  /**
3984
3927
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3985
3928
  */
3986
- export type EventCid28 = string;
3929
+ export type EventCid27 = string;
3987
3930
  /**
3988
3931
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3989
3932
  */
3990
- export type PriorEventHash28 = string | null;
3933
+ export type PriorEventHash27 = string | null;
3991
3934
  /**
3992
3935
  * Causal Ancestry markers required to resolve decentralized event ordering.
3993
3936
  */
3994
- export type Timestamp28 = number;
3937
+ export type Timestamp27 = number;
3995
3938
  /**
3996
3939
  * Discriminator type for an exogenous event.
3997
3940
  */
@@ -4015,11 +3958,11 @@ export type LockedMagnitude = number;
4015
3958
  /**
4016
3959
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4017
3960
  */
4018
- export type EventCid29 = string;
3961
+ export type EventCid28 = string;
4019
3962
  /**
4020
3963
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4021
3964
  */
4022
- export type PriorEventHash29 = string | null;
3965
+ export type PriorEventHash28 = string | null;
4023
3966
  /**
4024
3967
  * Discriminator type for a log event.
4025
3968
  */
@@ -4027,7 +3970,7 @@ export type TopologyClass112 = "epistemic_log";
4027
3970
  /**
4028
3971
  * The UNIX timestamp of the log event.
4029
3972
  */
4030
- export type Timestamp29 = number;
3973
+ export type Timestamp28 = number;
4031
3974
  /**
4032
3975
  * The severity level of the log event.
4033
3976
  */
@@ -4044,15 +3987,15 @@ export type TopologyClass113 = "verdict";
4044
3987
  /**
4045
3988
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4046
3989
  */
4047
- export type EventCid30 = string;
3990
+ export type EventCid29 = string;
4048
3991
  /**
4049
3992
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4050
3993
  */
4051
- export type PriorEventHash30 = string | null;
3994
+ export type PriorEventHash29 = string | null;
4052
3995
  /**
4053
3996
  * Causal Ancestry markers required to resolve decentralized event ordering.
4054
3997
  */
4055
- export type Timestamp30 = number;
3998
+ export type Timestamp29 = number;
4056
3999
  /**
4057
4000
  * The cryptographic nonce uniquely identifying the intervention request.
4058
4001
  */
@@ -4088,15 +4031,15 @@ export type LivenessChallengeHash = string;
4088
4031
  /**
4089
4032
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4090
4033
  */
4091
- export type EventCid31 = string;
4034
+ export type EventCid30 = string;
4092
4035
  /**
4093
4036
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4094
4037
  */
4095
- export type PriorEventHash31 = string | null;
4038
+ export type PriorEventHash30 = string | null;
4096
4039
  /**
4097
4040
  * Causal Ancestry markers required to resolve decentralized event ordering.
4098
4041
  */
4099
- export type Timestamp31 = number;
4042
+ export type Timestamp30 = number;
4100
4043
  export type TopologyClass114 = "custody_receipt";
4101
4044
  /**
4102
4045
  * Unique identifier for this chain-of-custody entry.
@@ -4125,15 +4068,15 @@ export type RedactionTimestampUnixNano = number;
4125
4068
  /**
4126
4069
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4127
4070
  */
4128
- export type EventCid32 = string;
4071
+ export type EventCid31 = string;
4129
4072
  /**
4130
4073
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4131
4074
  */
4132
- export type PriorEventHash32 = string | null;
4075
+ export type PriorEventHash31 = string | null;
4133
4076
  /**
4134
4077
  * Causal Ancestry markers required to resolve decentralized event ordering.
4135
4078
  */
4136
- export type Timestamp32 = number;
4079
+ export type Timestamp31 = number;
4137
4080
  export type TopologyClass115 = "defeasible_attack";
4138
4081
  /**
4139
4082
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark for this directed attack edge.
@@ -4150,15 +4093,15 @@ export type TargetClaimCid = string;
4150
4093
  /**
4151
4094
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4152
4095
  */
4153
- export type EventCid33 = string;
4096
+ export type EventCid32 = string;
4154
4097
  /**
4155
4098
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4156
4099
  */
4157
- export type PriorEventHash33 = string | null;
4100
+ export type PriorEventHash32 = string | null;
4158
4101
  /**
4159
4102
  * Causal Ancestry markers required to resolve decentralized event ordering.
4160
4103
  */
4161
- export type Timestamp33 = number;
4104
+ export type Timestamp32 = number;
4162
4105
  export type TopologyClass116 = "epistemic_rejection";
4163
4106
  export type ReceiptCid1 = string;
4164
4107
  export type FailedProjectionCid = string;
@@ -4168,15 +4111,15 @@ export type StochasticMutationGradient = string;
4168
4111
  /**
4169
4112
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4170
4113
  */
4171
- export type EventCid34 = string;
4114
+ export type EventCid33 = string;
4172
4115
  /**
4173
4116
  * The RFC 8785 Canonical hash of the immediate causal ancestor.
4174
4117
  */
4175
- export type PriorEventHash34 = string | null;
4118
+ export type PriorEventHash33 = string | null;
4176
4119
  /**
4177
4120
  * The precise temporal coordinate of the event realization.
4178
4121
  */
4179
- export type Timestamp34 = number;
4122
+ export type Timestamp33 = number;
4180
4123
  export type TopologyClass117 = "formal_verification_receipt";
4181
4124
  /**
4182
4125
  * The definitive Boolean evaluating whether the proof succeeded, the program is satisfiable, or the deduction holds true.
@@ -4201,15 +4144,15 @@ export type ReceiptCid2 = string;
4201
4144
  /**
4202
4145
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4203
4146
  */
4204
- export type EventCid35 = string;
4147
+ export type EventCid34 = string;
4205
4148
  /**
4206
4149
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4207
4150
  */
4208
- export type PriorEventHash35 = string | null;
4151
+ export type PriorEventHash34 = string | null;
4209
4152
  /**
4210
4153
  * Causal Ancestry markers required to resolve decentralized event ordering.
4211
4154
  */
4212
- export type Timestamp35 = number;
4155
+ export type Timestamp34 = number;
4213
4156
  export type TargetGraphCid4 = string;
4214
4157
  export type SeveredEdgeCids = string[];
4215
4158
  export type TopologyClass119 = "rdf_export_receipt";
@@ -4217,21 +4160,21 @@ export type ExportCid1 = string;
4217
4160
  /**
4218
4161
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4219
4162
  */
4220
- export type EventCid36 = string;
4163
+ export type EventCid35 = string;
4221
4164
  /**
4222
4165
  * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4223
4166
  */
4224
- export type PriorEventHash36 = string | null;
4167
+ export type PriorEventHash35 = string | null;
4225
4168
  /**
4226
4169
  * Causal Ancestry markers required to resolve decentralized event ordering.
4227
4170
  */
4228
- export type Timestamp36 = number;
4171
+ export type Timestamp35 = number;
4229
4172
  export type SerializedPayload = string;
4230
4173
  export type RdfTripleCount = number;
4231
4174
  export type Sha256GraphHash = string;
4232
- export type EventCid37 = string;
4233
- export type PriorEventHash37 = string | null;
4234
- export type Timestamp37 = number;
4175
+ export type EventCid36 = string;
4176
+ export type PriorEventHash36 = string | null;
4177
+ export type Timestamp36 = number;
4235
4178
  export type TopologyClass120 = "epistemic_starvation";
4236
4179
  /**
4237
4180
  * The cryptographic pointer to the specific edge that failed empirical grounding.
@@ -4245,9 +4188,9 @@ export type FailedCitations = EvidentiaryCitationState[];
4245
4188
  * The semantic explanation for the starvation (e.g., 'Maximum search retries exhausted').
4246
4189
  */
4247
4190
  export type DiagnosticReason = string;
4248
- export type EventCid38 = string;
4249
- export type PriorEventHash38 = string | null;
4250
- export type Timestamp38 = number;
4191
+ export type EventCid37 = string;
4192
+ export type PriorEventHash37 = string | null;
4193
+ export type Timestamp37 = number;
4251
4194
  export type TopologyClass121 = "sparql_query_result";
4252
4195
  /**
4253
4196
  * A pointer back to the SPARQLQueryIntent that authorized this execution.
@@ -4277,6 +4220,34 @@ export type TokensBurned = number;
4277
4220
  * An optional cryptographic signature from a Human-in-the-Loop (HITL) operator attesting to the correctness of the execution result. Populated only when the Temporal workflow escalates to manual review.
4278
4221
  */
4279
4222
  export type HumanAttestationSignature = string | null;
4223
+ /**
4224
+ * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4225
+ */
4226
+ export type EventCid38 = string;
4227
+ /**
4228
+ * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4229
+ */
4230
+ export type PriorEventHash38 = string | null;
4231
+ /**
4232
+ * Causal Ancestry markers required to resolve decentralized event ordering.
4233
+ */
4234
+ export type Timestamp38 = number;
4235
+ /**
4236
+ * The type of the security violation payload.
4237
+ */
4238
+ export type TopologyClass123 = "guardrail_violation_event";
4239
+ /**
4240
+ * Unique identifier for the violation event.
4241
+ */
4242
+ export type ViolationId = string;
4243
+ /**
4244
+ * The HTTP status code returned by the Guardrails proxy.
4245
+ */
4246
+ export type StatusCode = number;
4247
+ /**
4248
+ * The classification of the violation (e.g., 'pii_leak', 'toxic_content').
4249
+ */
4250
+ export type ViolationType = string;
4280
4251
  /**
4281
4252
  * A discriminated union of workflow topologies.
4282
4253
  */
@@ -4285,7 +4256,7 @@ export type AnyTransitionEdge = TransitionEdgeProfile | CyclicEdgeProfile;
4285
4256
  /**
4286
4257
  * Discriminator type for an acyclic edge.
4287
4258
  */
4288
- export type TopologyClass123 = "acyclic";
4259
+ export type TopologyClass124 = "acyclic";
4289
4260
  /**
4290
4261
  * The coinductive pointer to the destination capability.
4291
4262
  */
@@ -4317,7 +4288,7 @@ export type ComputeWeightMagnitude = number;
4317
4288
  /**
4318
4289
  * Discriminator type for a cyclic edge.
4319
4290
  */
4320
- export type TopologyClass124 = "cyclic";
4291
+ export type TopologyClass125 = "cyclic";
4321
4292
  /**
4322
4293
  * The coinductive pointer to the destination capability.
4323
4294
  */
@@ -4495,24 +4466,6 @@ export type MagnitudeUnit = string;
4495
4466
  * The declarative array of specialized functional expert clusters (e.g., 'falsifier', 'synthesizer') physically present in this model's architecture.
4496
4467
  */
4497
4468
  export type SupportedFunctionalExperts = string[];
4498
- /**
4499
- * Unique identifier for the constitutional rule.
4500
- */
4501
- export type RuleCid1 = string;
4502
- /**
4503
- * The definitive causal constraint or heuristic boundary enforced by this rule.
4504
- */
4505
- export type Description10 = string;
4506
- /**
4507
- * The categorical magnitude of the systemic breach enacted upon rule violation.
4508
- */
4509
- export type Severity = "low" | "medium" | "high" | "critical";
4510
- /**
4511
- * The explicit, structurally bounded set of forbidden semantic intents.
4512
- *
4513
- * @maxItems 1000
4514
- */
4515
- export type ForbiddenIntents1 = string[];
4516
4469
  /**
4517
4470
  * Forces non-destructive graph mutations.
4518
4471
  */
@@ -4611,6 +4564,18 @@ export type DistributionShapeProfile = "gaussian" | "uniform" | "beta";
4611
4564
  * Directed edges defining the topological sort (chronological flow) of the document.
4612
4565
  */
4613
4566
  export type ChronologicalFlowEdges = [unknown, unknown][];
4567
+ /**
4568
+ * The minimal required PRM score improvement across the lookback window to justify continued compute.
4569
+ */
4570
+ export type ConvergenceDeltaEpsilon = number;
4571
+ /**
4572
+ * The N-step temporal window over which the PRM gradient is calculated.
4573
+ */
4574
+ export type LookbackWindowSteps = number;
4575
+ /**
4576
+ * The burn-in period before convergence logic is activated.
4577
+ */
4578
+ export type MinimumReasoningSteps = number;
4614
4579
  /**
4615
4580
  * A Python 3.14 t-string template definition for dynamic UI grid evaluation.
4616
4581
  */
@@ -4740,6 +4705,18 @@ export type TestTimeMultiplier = number;
4740
4705
  * The absolute integer limit on how many times the orchestrator can recursively multiply the compute budget before forcing a SystemFaultEvent.
4741
4706
  */
4742
4707
  export type MaxEscalationTiers = number;
4708
+ /**
4709
+ * The Colang specification version.
4710
+ */
4711
+ export type ColangVersion = "1.0" | "2.0";
4712
+ /**
4713
+ * The raw Colang (.co) state machine configuration.
4714
+ */
4715
+ export type ColangPayload = string;
4716
+ /**
4717
+ * The categorical magnitude of the systemic breach enacted upon rule violation.
4718
+ */
4719
+ export type Severity = "low" | "medium" | "high" | "critical";
4743
4720
  /**
4744
4721
  * Absolute recursive depth limit for DAG deserialization.
4745
4722
  */
@@ -4874,6 +4851,22 @@ export type SopCid = string;
4874
4851
  * The exact topological flow between step_cids.
4875
4852
  */
4876
4853
  export type ChronologicalFlowEdges1 = [unknown, unknown][];
4854
+ /**
4855
+ * If a ThoughtBranchState's prm_score falls below this threshold, the orchestrator MUST halt its generation.
4856
+ */
4857
+ export type PruningThreshold = number;
4858
+ /**
4859
+ * The absolute limit on how many times the agent can start a new branch before throwing a SystemFaultEvent.
4860
+ */
4861
+ export type MaxBacktracksAllowed = number;
4862
+ /**
4863
+ * The specific PRM model used to score the logic (e.g., 'math-prm-v2').
4864
+ */
4865
+ export type EvaluatorMatrixName = string | null;
4866
+ /**
4867
+ * The strict array of Process Reward Contracts evaluating the logic.
4868
+ */
4869
+ export type PrmEvaluations = ProcessRewardContract[];
4877
4870
  /**
4878
4871
  * AGENT INSTRUCTION: Defines the minimum cryptographic isolation perimeter required for this node's thermodynamic execution.
4879
4872
  *
@@ -4972,14 +4965,6 @@ export type CategoricalCohorts = string[];
4972
4965
  * The valid chronological windows encompassing the artifact.
4973
4966
  */
4974
4967
  export type TemporalObservationHorizons = TemporalBoundsProfile2[];
4975
- /**
4976
- * Name of the governance policy.
4977
- */
4978
- export type PolicyName = string;
4979
- /**
4980
- * The explicit array of constitutional rules included in this policy.
4981
- */
4982
- export type Rules1 = ConstitutionalPolicy[];
4983
4968
  /**
4984
4969
  * How to flatten SemanticNodeState.
4985
4970
  */
@@ -5183,7 +5168,6 @@ export type RhetoricalStructureProfile1 = "premise" | "conclusion" | "elaboratio
5183
5168
  * MCP ROUTING TRIGGERS: Quantitative Risk Assessment, Game Theory, Cybernetic Governance, Structural Circuit Breaker, Utility Theory
5184
5169
  */
5185
5170
  export type RiskLevelPolicy = "safe" | "standard" | "critical";
5186
- export type SanitizationActionIntent = "redact" | "hash" | "drop_event" | "trigger_quarantine";
5187
5171
  /**
5188
5172
  * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this semantic edge to the Merkle-DAG.
5189
5173
  */
@@ -5393,7 +5377,6 @@ export interface CoReasonSharedKernelOntology {
5393
5377
  ConsensusFederationTopologyManifest?: ConsensusFederationTopologyManifest;
5394
5378
  ConsensusPolicy?: ConsensusPolicy;
5395
5379
  ConstitutionalAmendmentIntent?: ConstitutionalAmendmentIntent;
5396
- ConstitutionalPolicy?: ConstitutionalPolicy;
5397
5380
  ConstrainedDecodingPolicy?: ConstrainedDecodingPolicy;
5398
5381
  ContextExpansionPolicy?: ContextExpansionPolicy;
5399
5382
  ContextualSemanticResolutionIntent?: ContextualSemanticResolutionIntent;
@@ -5429,6 +5412,7 @@ export interface CoReasonSharedKernelOntology {
5429
5412
  DocumentLayoutManifest?: DocumentLayoutManifest;
5430
5413
  DocumentLayoutRegionState?: DocumentLayoutRegionState;
5431
5414
  DraftingIntent?: DraftingIntent;
5415
+ DynamicConvergenceSLA?: DynamicConvergenceSLA;
5432
5416
  DynamicLayoutManifest?: DynamicLayoutManifest;
5433
5417
  DynamicManifoldProjectionManifest?: DynamicManifoldProjectionManifest1;
5434
5418
  DynamicRoutingManifest?: DynamicRoutingManifest;
@@ -5451,6 +5435,7 @@ export interface CoReasonSharedKernelOntology {
5451
5435
  EpistemicEscalationContract?: EpistemicEscalationContract;
5452
5436
  EpistemicFlowStateReceipt?: EpistemicFlowStateReceipt;
5453
5437
  EpistemicGroundedTaskManifest?: EpistemicGroundedTaskManifest;
5438
+ EpistemicGuardrailsManifest?: EpistemicGuardrailsManifest;
5454
5439
  EpistemicHydrationPolicy?: EpistemicHydrationPolicy;
5455
5440
  EpistemicLedgerState?: EpistemicLedgerState;
5456
5441
  EpistemicLogEvent?: EpistemicLogEvent;
@@ -5491,6 +5476,7 @@ export interface CoReasonSharedKernelOntology {
5491
5476
  FallbackIntent?: FallbackIntent;
5492
5477
  FallbackSLA?: FallbackSLA;
5493
5478
  FalsificationContract?: FalsificationContract;
5479
+ FederatedDiscoveryIntent?: FederatedDiscoveryIntent;
5494
5480
  FitnessObjectiveProfile?: FitnessObjectiveProfile;
5495
5481
  FormalLogicPremise?: FormalLogicPremise;
5496
5482
  FormalVerificationContract?: FormalVerificationContract;
@@ -5500,10 +5486,10 @@ export interface CoReasonSharedKernelOntology {
5500
5486
  GlobalGovernancePolicy?: GlobalGovernancePolicy;
5501
5487
  GlobalSemanticInvariantProfile?: GlobalSemanticInvariantProfile;
5502
5488
  GlobalSemanticProfile?: GlobalSemanticProfile1;
5503
- GovernancePolicy?: GovernancePolicy;
5504
5489
  GradingCriterionProfile?: GradingCriterionProfile;
5505
5490
  GrammarPanelProfile?: GrammarPanelProfile1;
5506
5491
  GraphFlatteningPolicy?: GraphFlatteningPolicy;
5492
+ GuardrailViolationEvent?: GuardrailViolationEvent;
5507
5493
  HTTPTransportProfile?: HTTPTransportProfile;
5508
5494
  HardwareEnclaveReceipt?: HardwareEnclaveReceipt;
5509
5495
  HierarchicalDOMManifest?: HierarchicalDOMManifest;
@@ -5562,7 +5548,6 @@ export interface CoReasonSharedKernelOntology {
5562
5548
  NeurosymbolicIngestionTopologyManifest?: NeurosymbolicIngestionTopologyManifest;
5563
5549
  NeurosymbolicVerificationTopologyManifest?: NeurosymbolicVerificationTopologyManifest;
5564
5550
  NodeCIDState?: NodeCIDState;
5565
- NormativeDriftEvent?: NormativeDriftEvent;
5566
5551
  ObservabilityLODPolicy?: ObservabilityLODPolicy;
5567
5552
  ObservationEvent?: ObservationEvent;
5568
5553
  OntologicalAlignmentPolicy?: OntologicalAlignmentPolicy;
@@ -5587,6 +5572,7 @@ export interface CoReasonSharedKernelOntology {
5587
5572
  PredictionMarketState?: PredictionMarketState;
5588
5573
  PresentationManifest?: PresentationManifest;
5589
5574
  ProceduralMetadataManifest?: ProceduralMetadataManifest;
5575
+ ProcessRewardContract?: ProcessRewardContract;
5590
5576
  ProfileCIDState?: ProfileCIDState;
5591
5577
  QoSClassificationProfile?: QoSClassificationProfile;
5592
5578
  QuarantineIntent?: QuarantineIntent;
@@ -5594,7 +5580,6 @@ export interface CoReasonSharedKernelOntology {
5594
5580
  RDFExportReceipt?: RDFExportReceipt;
5595
5581
  RDFSerializationIntent?: RDFSerializationIntent;
5596
5582
  ReasoningEngineeringPolicy?: ReasoningEngineeringPolicy;
5597
- RedactionPolicy?: RedactionPolicy;
5598
5583
  RhetoricalStructureProfile?: RhetoricalStructureProfile1;
5599
5584
  RiskLevelPolicy?: RiskLevelPolicy;
5600
5585
  RollbackIntent?: RollbackIntent;
@@ -5608,12 +5593,10 @@ export interface CoReasonSharedKernelOntology {
5608
5593
  SaeFeatureActivationState?: SaeFeatureActivationState;
5609
5594
  SaeLatentPolicy?: SaeLatentPolicy;
5610
5595
  SalienceProfile?: SalienceProfile;
5611
- SanitizationActionIntent?: SanitizationActionIntent;
5612
5596
  ScalePolicy?: ScalePolicy;
5613
5597
  SchemaDrivenExtractionSLA?: SchemaDrivenExtractionSLA;
5614
5598
  SecureSubSessionState?: SecureSubSessionState;
5615
5599
  SelfCorrectionPolicy?: SelfCorrectionPolicy;
5616
- SemanticClassificationProfile?: SemanticClassificationProfile;
5617
5600
  SemanticDiscoveryIntent?: SemanticDiscoveryIntent;
5618
5601
  SemanticEdgeState?: SemanticEdgeState;
5619
5602
  SemanticFirewallPolicy?: SemanticFirewallPolicy;
@@ -8025,6 +8008,23 @@ export interface OntologicalNormalizationIntent {
8025
8008
  source_artifact_cid: SourceArtifactCid1;
8026
8009
  target_ontology_urn: TargetOntologyUrn;
8027
8010
  }
8011
+ /**
8012
+ * CoReason Shared Kernel Ontology
8013
+ *
8014
+ * AGENT INSTRUCTION: Encapsulates the geometric parameters for a cross-authority capability discovery query.
8015
+ * Used by the Federated Gateway to route semantic search intents across zero-trust network boundaries.
8016
+ *
8017
+ * CAUSAL AFFORDANCE: Enables the discovery of URN-addressable capabilities that match specific topological and status filters.
8018
+ *
8019
+ * EPISTEMIC BOUNDS: Strictly bounded by the domain_filter array and the minimum_epistemic_status enum.
8020
+ *
8021
+ * MCP ROUTING TRIGGERS: Federated Discovery, Semantic Search, Capability Routing, Zero-Trust Discovery.
8022
+ */
8023
+ export interface FederatedDiscoveryIntent {
8024
+ topology_class?: TopologyClass60;
8025
+ domain_filter: DomainFilter;
8026
+ minimum_epistemic_status?: MinimumEpistemicStatus;
8027
+ }
8028
8028
  /**
8029
8029
  * CoReason Shared Kernel Ontology
8030
8030
  *
@@ -8054,7 +8054,7 @@ export interface CognitiveAgentNodeProfile {
8054
8054
  */
8055
8055
  render_material?: SpatialRenderMaterial | null;
8056
8056
  description: Description3;
8057
- topology_class?: TopologyClass60;
8057
+ topology_class?: TopologyClass61;
8058
8058
  hardware?: SpatialHardwareProfile1;
8059
8059
  security?: EpistemicSecurityProfile;
8060
8060
  /**
@@ -8602,7 +8602,7 @@ export interface CognitiveHumanNodeProfile {
8602
8602
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
8603
8603
  */
8604
8604
  render_material?: SpatialRenderMaterial | null;
8605
- topology_class?: TopologyClass61;
8605
+ topology_class?: TopologyClass62;
8606
8606
  required_attestation: RequiredAttestation;
8607
8607
  /**
8608
8608
  * The continuous spatial vector representing the human operator's localized cognitive focus.
@@ -8650,7 +8650,7 @@ export interface CognitiveSystemNodeProfile {
8650
8650
  * The mathematical functor blueprint authorizing the runtime to hydrate a specific open-source engine (e.g., SymbolicAI) for this node.
8651
8651
  */
8652
8652
  execution_substrate?: ExecutionSubstrateProfile1 | null;
8653
- topology_class?: TopologyClass62;
8653
+ topology_class?: TopologyClass63;
8654
8654
  }
8655
8655
  /**
8656
8656
  * CoReason Shared Kernel Ontology
@@ -8698,7 +8698,7 @@ export interface CompositeNodeProfile {
8698
8698
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
8699
8699
  */
8700
8700
  render_material?: SpatialRenderMaterial | null;
8701
- topology_class?: TopologyClass63;
8701
+ topology_class?: TopologyClass64;
8702
8702
  /**
8703
8703
  * The encapsulated subgraph to execute.
8704
8704
  */
@@ -8738,7 +8738,7 @@ export interface DAGTopologyManifest {
8738
8738
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
8739
8739
  */
8740
8740
  observability?: ObservabilityLODPolicy | null;
8741
- topology_class?: TopologyClass64;
8741
+ topology_class?: TopologyClass65;
8742
8742
  edges?: Edges;
8743
8743
  allow_cycles?: AllowCycles;
8744
8744
  /**
@@ -8849,47 +8849,12 @@ export interface ConstrainedDecodingPolicy {
8849
8849
  export interface SemanticFlowPolicy {
8850
8850
  policy_cid: PolicyCid;
8851
8851
  active?: Active1;
8852
- rules?: Rules;
8853
8852
  /**
8854
8853
  * The active cognitive defense perimeter against adversarial control-flow overrides.
8855
8854
  */
8856
8855
  semantic_firewall?: SemanticFirewallPolicy | null;
8857
8856
  latent_firewalls?: LatentFirewalls;
8858
8857
  }
8859
- /**
8860
- * CoReason Shared Kernel Ontology
8861
- *
8862
- * AGENT INSTRUCTION: Defines a deterministic Data Sanitization heuristic mapped to a
8863
- * specific SemanticClassificationProfile (e.g., Bell-LaPadula clearance levels). As a
8864
- * ...Policy suffix, this object defines rigid mathematical boundaries that the orchestrator
8865
- * must enforce globally.
8866
- *
8867
- * CAUSAL AFFORDANCE: Executes a rigid regex-bounded search-and-replace algorithm via
8868
- * target_regex_pattern to mutate or mask toxic data payloads, substituting matches with a
8869
- * safe replacement_token. The action (SanitizationActionIntent) dictates the exact
8870
- * sanitization method.
8871
- *
8872
- * EPISTEMIC BOUNDS: The target_regex_pattern is strictly capped at max_length=200 to
8873
- * mathematically prevent ReDoS (Regular Expression Denial of Service) CPU exhaustion. A
8874
- * secondary target_pattern (max_length=2000) provides a broader semantic entity match. The
8875
- * optional context_exclusion_zones array (max_length=100) is deterministically sorted by
8876
- * the @model_validator.
8877
- *
8878
- * MCP ROUTING TRIGGERS: Data Sanitization, Regular Expression DoS Prevention,
8879
- * Bell-LaPadula Model, Masking Heuristic, Algorithmic Redaction
8880
- */
8881
- export interface RedactionPolicy {
8882
- rule_cid: RuleCid;
8883
- classification: SemanticClassificationProfile1;
8884
- target_pattern: TargetPattern;
8885
- target_regex_pattern: TargetRegexPattern;
8886
- context_exclusion_zones?: ContextExclusionZones;
8887
- /**
8888
- * The required algorithmic response when this pattern is detected.
8889
- */
8890
- action: "redact" | "hash" | "drop_event" | "trigger_quarantine";
8891
- replacement_token?: ReplacementToken;
8892
- }
8893
8858
  /**
8894
8859
  * CoReason Shared Kernel Ontology
8895
8860
  *
@@ -9148,7 +9113,7 @@ export interface CouncilTopologyManifest {
9148
9113
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9149
9114
  */
9150
9115
  observability?: ObservabilityLODPolicy | null;
9151
- topology_class?: TopologyClass65;
9116
+ topology_class?: TopologyClass66;
9152
9117
  /**
9153
9118
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
9154
9119
  */
@@ -9355,7 +9320,7 @@ export interface SwarmTopologyManifest {
9355
9320
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9356
9321
  */
9357
9322
  observability?: ObservabilityLODPolicy | null;
9358
- topology_class?: TopologyClass66;
9323
+ topology_class?: TopologyClass67;
9359
9324
  spawning_threshold?: SpawningThreshold;
9360
9325
  max_concurrent_agents?: MaxConcurrentAgents;
9361
9326
  /**
@@ -9489,7 +9454,7 @@ export interface EvolutionaryTopologyManifest {
9489
9454
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9490
9455
  */
9491
9456
  observability?: ObservabilityLODPolicy | null;
9492
- topology_class?: TopologyClass67;
9457
+ topology_class?: TopologyClass68;
9493
9458
  generations: Generations;
9494
9459
  population_size: PopulationSize;
9495
9460
  mutation: MutationPolicy;
@@ -9602,7 +9567,7 @@ export interface SMPCTopologyManifest {
9602
9567
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9603
9568
  */
9604
9569
  observability?: ObservabilityLODPolicy | null;
9605
- topology_class?: TopologyClass68;
9570
+ topology_class?: TopologyClass69;
9606
9571
  smpc_protocol: SmpcProtocol;
9607
9572
  joint_function_uri: JointFunctionUri;
9608
9573
  participant_node_cids: ParticipantNodeCids;
@@ -9649,7 +9614,7 @@ export interface EvaluatorOptimizerTopologyManifest {
9649
9614
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9650
9615
  */
9651
9616
  observability?: ObservabilityLODPolicy | null;
9652
- topology_class?: TopologyClass69;
9617
+ topology_class?: TopologyClass70;
9653
9618
  /**
9654
9619
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
9655
9620
  */
@@ -9699,7 +9664,7 @@ export interface DigitalTwinTopologyManifest {
9699
9664
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9700
9665
  */
9701
9666
  observability?: ObservabilityLODPolicy | null;
9702
- topology_class?: TopologyClass70;
9667
+ topology_class?: TopologyClass71;
9703
9668
  target_topology_cid: TargetTopologyCid;
9704
9669
  convergence_sla: SimulationConvergenceSLA;
9705
9670
  enforce_no_side_effects?: EnforceNoSideEffects;
@@ -9729,7 +9694,7 @@ export interface SimulationConvergenceSLA {
9729
9694
  * MCP ROUTING TRIGGERS: Practical Byzantine Fault Tolerance, pBFT, Distributed Consensus, Sybil Resistance, Macro Abstraction
9730
9695
  */
9731
9696
  export interface ConsensusFederationTopologyManifest {
9732
- topology_class?: TopologyClass71;
9697
+ topology_class?: TopologyClass72;
9733
9698
  participant_cids: ParticipantCids;
9734
9699
  /**
9735
9700
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -9794,7 +9759,7 @@ export interface CapabilityForgeTopologyManifest {
9794
9759
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9795
9760
  */
9796
9761
  observability?: ObservabilityLODPolicy | null;
9797
- topology_class?: TopologyClass72;
9762
+ topology_class?: TopologyClass73;
9798
9763
  target_epistemic_deficit: SemanticDiscoveryIntent1;
9799
9764
  /**
9800
9765
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -9948,7 +9913,7 @@ export interface IntentElicitationTopologyManifest {
9948
9913
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
9949
9914
  */
9950
9915
  observability?: ObservabilityLODPolicy | null;
9951
- topology_class?: TopologyClass73;
9916
+ topology_class?: TopologyClass74;
9952
9917
  raw_human_artifact_cid: RawHumanArtifactCid;
9953
9918
  /**
9954
9919
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10002,7 +9967,7 @@ export interface NeurosymbolicIngestionTopologyManifest {
10002
9967
  * The dynamic Level of Detail physics bound to this graph.
10003
9968
  */
10004
9969
  observability?: ObservabilityLODPolicy | null;
10005
- topology_class?: TopologyClass74;
9970
+ topology_class?: TopologyClass75;
10006
9971
  /**
10007
9972
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
10008
9973
  */
@@ -10063,7 +10028,7 @@ export interface NeurosymbolicVerificationTopologyManifest {
10063
10028
  * The dynamic Level of Detail and Spectral Coarsening physics bound to this macroscopic execution graph.
10064
10029
  */
10065
10030
  observability?: ObservabilityLODPolicy | null;
10066
- topology_class?: TopologyClass75;
10031
+ topology_class?: TopologyClass76;
10067
10032
  proposer_node_cid: ProposerNodeCid;
10068
10033
  verifier_node_cid: VerifierNodeCid;
10069
10034
  max_revision_loops: MaxRevisionLoops1;
@@ -10087,7 +10052,7 @@ export interface Nodes11 {
10087
10052
  * MCP ROUTING TRIGGERS: Discourse Geometry, Rhetorical Flattening, Directed Acyclic Graph, Hierarchical Extraction
10088
10053
  */
10089
10054
  export interface DiscourseTreeManifest {
10090
- topology_class?: TopologyClass76;
10055
+ topology_class?: TopologyClass77;
10091
10056
  manifest_cid: ManifestCid2;
10092
10057
  /**
10093
10058
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -10128,7 +10093,7 @@ export interface DiscourseNodeState {
10128
10093
  * CoReason Shared Kernel Ontology
10129
10094
  */
10130
10095
  export interface DocumentKnowledgeGraphManifest {
10131
- topology_class?: TopologyClass77;
10096
+ topology_class?: TopologyClass78;
10132
10097
  graph_cid: GraphCid;
10133
10098
  source_artifact_cid: SourceArtifactCid2;
10134
10099
  nodes: Nodes12;
@@ -10276,7 +10241,7 @@ export interface HomomorphicEncryptionProfile {
10276
10241
  * MCP ROUTING TRIGGERS: Cross-Modal Isomorphism, Semantic Fusion, Volumetric Projection, Profunctor Optics
10277
10242
  */
10278
10243
  export interface ContinuousManifoldMappingContract {
10279
- topology_class?: TopologyClass78;
10244
+ topology_class?: TopologyClass79;
10280
10245
  /**
10281
10246
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
10282
10247
  */
@@ -10323,7 +10288,7 @@ export interface SE3TransformProfile4 {
10323
10288
  * MCP ROUTING TRIGGERS: Spatial-Semantic Isomorphism, Document Object Model, Containment DAG, Visual Hierarchy, Rhetorical Bounding
10324
10289
  */
10325
10290
  export interface HierarchicalDOMManifest {
10326
- topology_class?: TopologyClass79;
10291
+ topology_class?: TopologyClass80;
10327
10292
  dom_cid: DomCid;
10328
10293
  root_block_cid: RootBlockCid;
10329
10294
  blocks: Blocks;
@@ -10504,7 +10469,7 @@ export interface MemoizedNodeProfile {
10504
10469
  * The physics-agnostic visual identity or shader governing the spatial rendering of this node.
10505
10470
  */
10506
10471
  render_material?: SpatialRenderMaterial | null;
10507
- topology_class?: TopologyClass80;
10472
+ topology_class?: TopologyClass81;
10508
10473
  /**
10509
10474
  * The exact SHA-256 fingerprint of the executed topology.
10510
10475
  */
@@ -10526,7 +10491,7 @@ export interface ExpectedOutputSchema {
10526
10491
  * MCP ROUTING TRIGGERS: Conflict-Free Replicated Data Types, State-based Semilattice, Eventual Consistency, G-Set
10527
10492
  */
10528
10493
  export interface TemporalGraphCRDTManifest {
10529
- topology_class?: TopologyClass81;
10494
+ topology_class?: TopologyClass82;
10530
10495
  diff_cid: DiffCid;
10531
10496
  author_node_cid: AuthorNodeCid;
10532
10497
  lamport_timestamp: LamportTimestamp;
@@ -10546,7 +10511,7 @@ export interface VectorClock {
10546
10511
  * AGENT INSTRUCTION: A formal Substrate Projection representing an executable Model Context Protocol (MCP) tool.
10547
10512
  */
10548
10513
  export interface MCPToolDefinition {
10549
- topology_class?: TopologyClass82;
10514
+ topology_class?: TopologyClass83;
10550
10515
  event_cid?: EventCid1;
10551
10516
  prior_event_hash?: PriorEventHash1;
10552
10517
  timestamp?: Timestamp1;
@@ -10575,7 +10540,7 @@ export interface CrosswalkResolutionReceipt {
10575
10540
  event_cid: EventCid2;
10576
10541
  prior_event_hash?: PriorEventHash2;
10577
10542
  timestamp: Timestamp2;
10578
- topology_class?: TopologyClass83;
10543
+ topology_class?: TopologyClass84;
10579
10544
  receipt_cid: ReceiptCid;
10580
10545
  target_graph_cid: TargetGraphCid3;
10581
10546
  resolved_curies: ResolvedCuries;
@@ -10620,7 +10585,7 @@ export interface EpistemicZeroTrustReceipt {
10620
10585
  event_cid: EventCid3;
10621
10586
  prior_event_hash?: PriorEventHash3;
10622
10587
  timestamp: Timestamp3;
10623
- topology_class?: TopologyClass84;
10588
+ topology_class?: TopologyClass85;
10624
10589
  intent_reference_cid: IntentReferenceCid;
10625
10590
  llm_blind_plan_hash: LlmBlindPlanHash;
10626
10591
  firewall_breach_detected?: FirewallBreachDetected;
@@ -10642,7 +10607,7 @@ export interface ObservationEvent {
10642
10607
  event_cid: EventCid4;
10643
10608
  prior_event_hash?: PriorEventHash4;
10644
10609
  timestamp: Timestamp4;
10645
- topology_class?: TopologyClass85;
10610
+ topology_class?: TopologyClass86;
10646
10611
  payload: Payload;
10647
10612
  /**
10648
10613
  * The specific topological node that appended this observation.
@@ -10712,7 +10677,7 @@ export interface HardwareEnclaveReceipt {
10712
10677
  * MCP ROUTING TRIGGERS: Exogenous Perturbation, DOM Topography, Spatial Execution Bound, Accessibility Tree
10713
10678
  */
10714
10679
  export interface BrowserDOMState {
10715
- topology_class?: TopologyClass86;
10680
+ topology_class?: TopologyClass87;
10716
10681
  current_url: CurrentUrl;
10717
10682
  viewport_size: ViewportSize;
10718
10683
  dom_hash: DomHash;
@@ -10731,7 +10696,7 @@ export interface BrowserDOMState {
10731
10696
  * MCP ROUTING TRIGGERS: POSIX Environment, Exogenous Perturbation, TTY Buffer, Causal Actuator, Stream Crystallization
10732
10697
  */
10733
10698
  export interface TerminalBufferState {
10734
- topology_class?: TopologyClass87;
10699
+ topology_class?: TopologyClass88;
10735
10700
  working_directory: WorkingDirectory;
10736
10701
  stdout_hash: StdoutHash;
10737
10702
  stderr_hash: StderrHash;
@@ -10846,7 +10811,7 @@ export interface BeliefMutationEvent {
10846
10811
  event_cid: EventCid5;
10847
10812
  prior_event_hash?: PriorEventHash5;
10848
10813
  timestamp: Timestamp5;
10849
- topology_class?: TopologyClass88;
10814
+ topology_class?: TopologyClass89;
10850
10815
  payload: Payload1;
10851
10816
  /**
10852
10817
  * The specific topological node that synthesized this belief assertion.
@@ -10961,7 +10926,7 @@ export interface SystemFaultEvent {
10961
10926
  event_cid: EventCid6;
10962
10927
  prior_event_hash?: PriorEventHash6;
10963
10928
  timestamp: Timestamp6;
10964
- topology_class?: TopologyClass89;
10929
+ topology_class?: TopologyClass90;
10965
10930
  }
10966
10931
  /**
10967
10932
  * CoReason Shared Kernel Ontology
@@ -10975,7 +10940,7 @@ export interface SystemFaultEvent {
10975
10940
  * MCP ROUTING TRIGGERS: Atomic Proposition, Discourse Extraction, Labeled Property Graph, Verifiable Statement
10976
10941
  */
10977
10942
  export interface AtomicPropositionState {
10978
- topology_class?: TopologyClass90;
10943
+ topology_class?: TopologyClass91;
10979
10944
  event_cid: EventCid7;
10980
10945
  prior_event_hash?: PriorEventHash7;
10981
10946
  timestamp: Timestamp7;
@@ -11016,7 +10981,7 @@ export interface EmpiricalStatisticalProfile {
11016
10981
  * MCP ROUTING TRIGGERS: Post-Coordinated Semantics, Latent Manifold Alignment, Semantic Specificity, Entity Assembly
11017
10982
  */
11018
10983
  export interface PostCoordinatedSemanticState {
11019
- topology_class?: TopologyClass91;
10984
+ topology_class?: TopologyClass92;
11020
10985
  event_cid: EventCid8;
11021
10986
  prior_event_hash?: PriorEventHash8;
11022
10987
  timestamp: Timestamp8;
@@ -11050,7 +11015,7 @@ export interface ArtifactCorruptionEvent {
11050
11015
  event_cid: EventCid9;
11051
11016
  prior_event_hash?: PriorEventHash9;
11052
11017
  timestamp: Timestamp9;
11053
- topology_class?: TopologyClass92;
11018
+ topology_class?: TopologyClass93;
11054
11019
  artifact_cid: ArtifactCid;
11055
11020
  corruption_class: CorruptionClass;
11056
11021
  diagnostic_hash: DiagnosticHash;
@@ -11070,7 +11035,7 @@ export interface HypothesisGenerationEvent {
11070
11035
  event_cid: EventCid10;
11071
11036
  prior_event_hash?: PriorEventHash10;
11072
11037
  timestamp: Timestamp10;
11073
- topology_class?: TopologyClass93;
11038
+ topology_class?: TopologyClass94;
11074
11039
  hypothesis_cid: HypothesisCid;
11075
11040
  premise_text: PremiseText;
11076
11041
  bayesian_prior: BayesianPrior;
@@ -11112,7 +11077,7 @@ export interface BargeInInterruptEvent {
11112
11077
  event_cid: EventCid11;
11113
11078
  prior_event_hash?: PriorEventHash11;
11114
11079
  timestamp: Timestamp11;
11115
- topology_class?: TopologyClass94;
11080
+ topology_class?: TopologyClass95;
11116
11081
  target_event_cid: TargetEventCid1;
11117
11082
  /**
11118
11083
  * The continuous multimodal trigger (e.g., audio spike, user saying 'stop') that justified the interruption.
@@ -11136,7 +11101,7 @@ export interface CounterfactualRegretEvent {
11136
11101
  event_cid: EventCid12;
11137
11102
  prior_event_hash?: PriorEventHash12;
11138
11103
  timestamp: Timestamp12;
11139
- topology_class?: TopologyClass95;
11104
+ topology_class?: TopologyClass96;
11140
11105
  historical_event_cid: HistoricalEventCid;
11141
11106
  counterfactual_intervention: CounterfactualIntervention;
11142
11107
  expected_utility_actual: ExpectedUtilityActual;
@@ -11165,7 +11130,7 @@ export interface ToolInvocationEvent {
11165
11130
  event_cid: EventCid13;
11166
11131
  prior_event_hash?: PriorEventHash13;
11167
11132
  timestamp: Timestamp13;
11168
- topology_class?: TopologyClass96;
11133
+ topology_class?: TopologyClass97;
11169
11134
  tool_name: ToolName1;
11170
11135
  parameters: Parameters;
11171
11136
  authorized_budget_magnitude: AuthorizedBudgetMagnitude;
@@ -11231,31 +11196,11 @@ export interface EpistemicPromotionEvent {
11231
11196
  event_cid: EventCid14;
11232
11197
  prior_event_hash?: PriorEventHash14;
11233
11198
  timestamp: Timestamp14;
11234
- topology_class?: TopologyClass97;
11199
+ topology_class?: TopologyClass98;
11235
11200
  source_episodic_event_cids: SourceEpisodicEventCids;
11236
11201
  crystallized_semantic_node_cid: CrystallizedSemanticNodeCid;
11237
11202
  compression_ratio: CompressionRatio;
11238
11203
  }
11239
- /**
11240
- * CoReason Shared Kernel Ontology
11241
- *
11242
- * AGENT INSTRUCTION: A cryptographically frozen historical fact tracking the Kullback-Leibler (KL) divergence between the swarm's active behavioral manifold and its foundational ConstitutionalPolicy.
11243
- *
11244
- * CAUSAL AFFORDANCE: Emits a deterministic topological signal that the causal graph is experiencing logical friction against the `tripped_rule_cid`, unlocking the injection of a System2RemediationIntent constraint.
11245
- *
11246
- * EPISTEMIC BOUNDS: Mathematically bounded by `measured_semantic_drift` (`le=18446744073709551615.0`) and cryptographically tied to `contradiction_proof_hash` (SHA-256 pattern `^[a-f0-9]{64}$`) proving the anomaly.
11247
- *
11248
- * MCP ROUTING TRIGGERS: Kullback-Leibler Divergence, Normative Drift, Distributional Shift, Semantic Friction, Constitutional Alignment
11249
- */
11250
- export interface NormativeDriftEvent {
11251
- event_cid: EventCid15;
11252
- prior_event_hash?: PriorEventHash15;
11253
- timestamp: Timestamp15;
11254
- topology_class?: TopologyClass98;
11255
- tripped_rule_cid: TrippedRuleCid;
11256
- measured_semantic_drift: MeasuredSemanticDrift;
11257
- contradiction_proof_hash: ContradictionProofHash;
11258
- }
11259
11204
  /**
11260
11205
  * CoReason Shared Kernel Ontology
11261
11206
  *
@@ -11268,9 +11213,9 @@ export interface NormativeDriftEvent {
11268
11213
  * MCP ROUTING TRIGGERS: Event Sourcing, Write-Ahead Logging, Two-Phase Commit, Lakehouse Serialization, State Differential Flush
11269
11214
  */
11270
11215
  export interface PersistenceCommitReceipt {
11271
- event_cid: EventCid16;
11272
- prior_event_hash?: PriorEventHash16;
11273
- timestamp: Timestamp16;
11216
+ event_cid: EventCid15;
11217
+ prior_event_hash?: PriorEventHash15;
11218
+ timestamp: Timestamp15;
11274
11219
  topology_class?: TopologyClass99;
11275
11220
  lakehouse_snapshot_cid: LakehouseSnapshotCid;
11276
11221
  committed_temporal_crdt_cid: CommittedTemporalCrdtCid;
@@ -11288,9 +11233,9 @@ export interface PersistenceCommitReceipt {
11288
11233
  * MCP ROUTING TRIGGERS: Landauer's Principle, Thermodynamic Compute, Token Burn, Resource Exhaustion, Lock-Free Tallying
11289
11234
  */
11290
11235
  export interface TokenBurnReceipt {
11291
- event_cid: EventCid17;
11292
- prior_event_hash?: PriorEventHash17;
11293
- timestamp: Timestamp17;
11236
+ event_cid: EventCid16;
11237
+ prior_event_hash?: PriorEventHash16;
11238
+ timestamp: Timestamp16;
11294
11239
  topology_class?: TopologyClass100;
11295
11240
  tool_invocation_cid: ToolInvocationCid;
11296
11241
  input_tokens: InputTokens;
@@ -11309,9 +11254,9 @@ export interface TokenBurnReceipt {
11309
11254
  * MCP ROUTING TRIGGERS: Optimal Stopping Theory, Escrow Exhaustion, Sybil Resistance, Algorithmic Circuit Breaker, Generation Halting
11310
11255
  */
11311
11256
  export interface BudgetExhaustionEvent {
11312
- event_cid: EventCid18;
11313
- prior_event_hash?: PriorEventHash18;
11314
- timestamp: Timestamp18;
11257
+ event_cid: EventCid17;
11258
+ prior_event_hash?: PriorEventHash17;
11259
+ timestamp: Timestamp17;
11315
11260
  topology_class?: TopologyClass101;
11316
11261
  exhausted_escrow_cid: ExhaustedEscrowCid;
11317
11262
  final_burn_receipt_cid: FinalBurnReceiptCid;
@@ -11328,9 +11273,9 @@ export interface BudgetExhaustionEvent {
11328
11273
  * MCP ROUTING TRIGGERS: Epistemic Regret, Supervisory Control Theory, Human-in-the-Loop, Dwell Time, Spatial Telemetry
11329
11274
  */
11330
11275
  export interface EpistemicTelemetryEvent {
11331
- event_cid: EventCid19;
11332
- prior_event_hash?: PriorEventHash19;
11333
- timestamp: Timestamp19;
11276
+ event_cid: EventCid18;
11277
+ prior_event_hash?: PriorEventHash18;
11278
+ timestamp: Timestamp18;
11334
11279
  topology_class?: TopologyClass102;
11335
11280
  interaction_modality: InteractionModality;
11336
11281
  target_node_cid: TargetNodeCid;
@@ -11352,9 +11297,9 @@ export interface EpistemicTelemetryEvent {
11352
11297
  * MCP ROUTING TRIGGERS: Predictive Distribution, Softmax Logits, Generative Manifold, Probability Wave Collapse, Entropy
11353
11298
  */
11354
11299
  export interface CognitivePredictionReceipt {
11355
- event_cid: EventCid20;
11356
- prior_event_hash?: PriorEventHash20;
11357
- timestamp: Timestamp20;
11300
+ event_cid: EventCid19;
11301
+ prior_event_hash?: PriorEventHash19;
11302
+ timestamp: Timestamp19;
11358
11303
  topology_class?: TopologyClass103;
11359
11304
  source_chain_cid: SourceChainCid;
11360
11305
  target_source_concept: TargetSourceConcept;
@@ -11372,9 +11317,9 @@ export interface CognitivePredictionReceipt {
11372
11317
  * MCP ROUTING TRIGGERS: Entailment Verification, Natural Language Inference, Truth Maintenance System, Epistemic Quarantine, Hallucination Filtering
11373
11318
  */
11374
11319
  export interface EpistemicAxiomVerificationReceipt {
11375
- event_cid: EventCid21;
11376
- prior_event_hash?: PriorEventHash21;
11377
- timestamp: Timestamp21;
11320
+ event_cid: EventCid20;
11321
+ prior_event_hash?: PriorEventHash20;
11322
+ timestamp: Timestamp20;
11378
11323
  topology_class?: TopologyClass104;
11379
11324
  source_prediction_cid: SourcePredictionCid;
11380
11325
  sequence_similarity_score: SequenceSimilarityScore;
@@ -11406,9 +11351,9 @@ export interface EpistemicAxiomVerificationReceipt {
11406
11351
  * Scalar Backpropagation, Acyclic Path
11407
11352
  */
11408
11353
  export interface EpistemicFlowStateReceipt {
11409
- event_cid: EventCid22;
11410
- prior_event_hash?: PriorEventHash22;
11411
- timestamp: Timestamp22;
11354
+ event_cid: EventCid21;
11355
+ prior_event_hash?: PriorEventHash21;
11356
+ timestamp: Timestamp21;
11412
11357
  topology_class?: TopologyClass105;
11413
11358
  source_trajectory_cid: SourceTrajectoryCid;
11414
11359
  estimated_flow_value: EstimatedFlowValue;
@@ -11435,9 +11380,9 @@ export interface EpistemicFlowStateReceipt {
11435
11380
  * Macroscopic Explanation, Deterministic Sorting
11436
11381
  */
11437
11382
  export interface CausalExplanationEvent {
11438
- event_cid: EventCid23;
11439
- prior_event_hash?: PriorEventHash23;
11440
- timestamp: Timestamp23;
11383
+ event_cid: EventCid22;
11384
+ prior_event_hash?: PriorEventHash22;
11385
+ timestamp: Timestamp22;
11441
11386
  topology_class?: TopologyClass106;
11442
11387
  target_outcome_event_cid: TargetOutcomeEventCid;
11443
11388
  collective_intelligence: CollectiveIntelligenceProfile;
@@ -11499,9 +11444,9 @@ export interface ShapleyAttributionReceipt {
11499
11444
  * Routing Heuristic, Semantic Wave Collapse
11500
11445
  */
11501
11446
  export interface IntentClassificationReceipt {
11502
- event_cid: EventCid24;
11503
- prior_event_hash?: PriorEventHash24;
11504
- timestamp: Timestamp24;
11447
+ event_cid: EventCid23;
11448
+ prior_event_hash?: PriorEventHash23;
11449
+ timestamp: Timestamp23;
11505
11450
  topology_class?: TopologyClass107;
11506
11451
  raw_input_string: RawInputString;
11507
11452
  classified_intent: ClassifiedIntent;
@@ -11521,9 +11466,9 @@ export interface IntentClassificationReceipt {
11521
11466
  */
11522
11467
  export interface SemanticRelationalVectorState {
11523
11468
  topology_class?: TopologyClass108;
11524
- event_cid: EventCid25;
11525
- prior_event_hash?: PriorEventHash25;
11526
- timestamp: Timestamp25;
11469
+ event_cid: EventCid24;
11470
+ prior_event_hash?: PriorEventHash24;
11471
+ timestamp: Timestamp24;
11527
11472
  ontology_class: UpperOntologyClassProfile;
11528
11473
  temporal_bounds: TemporalBoundsProfile1;
11529
11474
  formal_schema_urn?: FormalSchemaUrn1;
@@ -11566,9 +11511,9 @@ export interface PayloadInjectionZone {
11566
11511
  */
11567
11512
  export interface OntologicalReificationReceipt {
11568
11513
  topology_class?: TopologyClass109;
11569
- event_cid: EventCid26;
11570
- prior_event_hash?: PriorEventHash26;
11571
- timestamp: Timestamp26;
11514
+ event_cid: EventCid25;
11515
+ prior_event_hash?: PriorEventHash25;
11516
+ timestamp: Timestamp25;
11572
11517
  source_data_hash: SourceDataHash;
11573
11518
  target_namespace: TargetNamespace;
11574
11519
  algorithmic_mechanism: TransformationMechanismProfile;
@@ -11605,9 +11550,9 @@ export interface DempsterShaferBeliefVector2 {
11605
11550
  * MCP ROUTING TRIGGERS: Lyapunov Stability, Control Theory, Circuit Breaker, Cascading Failure, State Equilibrium
11606
11551
  */
11607
11552
  export interface CircuitBreakerEvent {
11608
- event_cid: EventCid27;
11609
- prior_event_hash?: PriorEventHash27;
11610
- timestamp: Timestamp27;
11553
+ event_cid: EventCid26;
11554
+ prior_event_hash?: PriorEventHash26;
11555
+ timestamp: Timestamp26;
11611
11556
  topology_class?: TopologyClass110;
11612
11557
  /**
11613
11558
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -11636,9 +11581,9 @@ export interface CircuitBreakerEvent {
11636
11581
  * Energy, Exogenous Perturbation, Epistemic Stress Test
11637
11582
  */
11638
11583
  export interface ExogenousEpistemicEvent {
11639
- event_cid: EventCid28;
11640
- prior_event_hash?: PriorEventHash28;
11641
- timestamp: Timestamp28;
11584
+ event_cid: EventCid27;
11585
+ prior_event_hash?: PriorEventHash27;
11586
+ timestamp: Timestamp27;
11642
11587
  topology_class?: TopologyClass111;
11643
11588
  shock_cid: ShockCid;
11644
11589
  target_node_hash: TargetNodeHash;
@@ -11670,10 +11615,10 @@ export interface SimulationEscrowContract {
11670
11615
  * MCP ROUTING TRIGGERS: Out-of-Band Telemetry, Asynchronous Logging, Severity Masking, Peripheral Audit, Ephemeral Context
11671
11616
  */
11672
11617
  export interface EpistemicLogEvent {
11673
- event_cid: EventCid29;
11674
- prior_event_hash?: PriorEventHash29;
11618
+ event_cid: EventCid28;
11619
+ prior_event_hash?: PriorEventHash28;
11675
11620
  topology_class?: TopologyClass112;
11676
- timestamp: Timestamp29;
11621
+ timestamp: Timestamp28;
11677
11622
  level: Level;
11678
11623
  message: Message1;
11679
11624
  context_profile?: TelemetryContextProfile;
@@ -11704,9 +11649,9 @@ export interface TelemetryContextProfile {
11704
11649
  */
11705
11650
  export interface InterventionReceipt {
11706
11651
  topology_class?: TopologyClass113;
11707
- event_cid: EventCid30;
11708
- prior_event_hash?: PriorEventHash30;
11709
- timestamp: Timestamp30;
11652
+ event_cid: EventCid29;
11653
+ prior_event_hash?: PriorEventHash29;
11654
+ timestamp: Timestamp29;
11710
11655
  intervention_request_cid: InterventionRequestCid;
11711
11656
  /**
11712
11657
  * A Decentralized Identifier (DID) representing a cryptographically accountable principal within the swarm.
@@ -11761,9 +11706,9 @@ export interface WetwareAttestationContract {
11761
11706
  * MCP ROUTING TRIGGERS: Chain of Custody, Cryptographic Provenance, Merkle-DAG Audit, Non-Repudiation, Data Isomorphism
11762
11707
  */
11763
11708
  export interface CustodyReceipt {
11764
- event_cid: EventCid31;
11765
- prior_event_hash?: PriorEventHash31;
11766
- timestamp: Timestamp31;
11709
+ event_cid: EventCid30;
11710
+ prior_event_hash?: PriorEventHash30;
11711
+ timestamp: Timestamp30;
11767
11712
  topology_class?: TopologyClass114;
11768
11713
  custody_cid: CustodyCid;
11769
11714
  source_node_cid: SourceNodeCid;
@@ -11784,9 +11729,9 @@ export interface CustodyReceipt {
11784
11729
  * MCP ROUTING TRIGGERS: Undercutting Defeater, Dialectical Edge, Truth Maintenance System, Bipartite Mapping, Non-Monotonic Retraction
11785
11730
  */
11786
11731
  export interface DefeasibleAttackEvent {
11787
- event_cid: EventCid32;
11788
- prior_event_hash?: PriorEventHash32;
11789
- timestamp: Timestamp32;
11732
+ event_cid: EventCid31;
11733
+ prior_event_hash?: PriorEventHash31;
11734
+ timestamp: Timestamp31;
11790
11735
  topology_class?: TopologyClass115;
11791
11736
  attack_cid: AttackCid;
11792
11737
  source_claim_cid: SourceClaimCid;
@@ -11808,9 +11753,9 @@ export interface DefeasibleAttackEvent {
11808
11753
  * MCP ROUTING TRIGGERS: Rejection Receipt, Free Energy Feedback, MCTS Backpropagation, Variational Free Energy, Mutation Gradient
11809
11754
  */
11810
11755
  export interface EpistemicRejectionReceipt {
11811
- event_cid: EventCid33;
11812
- prior_event_hash?: PriorEventHash33;
11813
- timestamp: Timestamp33;
11756
+ event_cid: EventCid32;
11757
+ prior_event_hash?: PriorEventHash32;
11758
+ timestamp: Timestamp32;
11814
11759
  topology_class?: TopologyClass116;
11815
11760
  receipt_cid: ReceiptCid1;
11816
11761
  failed_projection_cid: FailedProjectionCid;
@@ -11830,9 +11775,9 @@ export interface EpistemicRejectionReceipt {
11830
11775
  * MCP ROUTING TRIGGERS: System 2 Remediation, Mathematical Truth, Proof Verification, Epistemic Ledger
11831
11776
  */
11832
11777
  export interface FormalVerificationReceipt {
11833
- event_cid: EventCid34;
11834
- prior_event_hash?: PriorEventHash34;
11835
- timestamp: Timestamp34;
11778
+ event_cid: EventCid33;
11779
+ prior_event_hash?: PriorEventHash33;
11780
+ timestamp: Timestamp33;
11836
11781
  topology_class?: TopologyClass117;
11837
11782
  /**
11838
11783
  * Pointer to the specific node or intent that requested this formal verification.
@@ -11849,9 +11794,9 @@ export interface FormalVerificationReceipt {
11849
11794
  export interface BeliefModulationReceipt {
11850
11795
  topology_class?: TopologyClass118;
11851
11796
  receipt_cid: ReceiptCid2;
11852
- event_cid: EventCid35;
11853
- prior_event_hash?: PriorEventHash35;
11854
- timestamp: Timestamp35;
11797
+ event_cid: EventCid34;
11798
+ prior_event_hash?: PriorEventHash34;
11799
+ timestamp: Timestamp34;
11855
11800
  target_graph_cid: TargetGraphCid4;
11856
11801
  grounded_edges: GroundedEdges;
11857
11802
  severed_edge_cids: SeveredEdgeCids;
@@ -11865,9 +11810,9 @@ export interface GroundedEdges {
11865
11810
  export interface RDFExportReceipt {
11866
11811
  topology_class?: TopologyClass119;
11867
11812
  export_cid: ExportCid1;
11868
- event_cid: EventCid36;
11869
- prior_event_hash?: PriorEventHash36;
11870
- timestamp: Timestamp36;
11813
+ event_cid: EventCid35;
11814
+ prior_event_hash?: PriorEventHash35;
11815
+ timestamp: Timestamp35;
11871
11816
  serialized_payload: SerializedPayload;
11872
11817
  rdf_triple_count: RdfTripleCount;
11873
11818
  sha256_graph_hash: Sha256GraphHash;
@@ -11884,9 +11829,9 @@ export interface RDFExportReceipt {
11884
11829
  * MCP ROUTING TRIGGERS: Epistemic Starvation, Natural Language Inference, Truth Maintenance System, Defeasible Logic, Belief Mass Depletion
11885
11830
  */
11886
11831
  export interface EpistemicStarvationEvent {
11887
- event_cid: EventCid37;
11888
- prior_event_hash?: PriorEventHash37;
11889
- timestamp: Timestamp37;
11832
+ event_cid: EventCid36;
11833
+ prior_event_hash?: PriorEventHash36;
11834
+ timestamp: Timestamp36;
11890
11835
  topology_class?: TopologyClass120;
11891
11836
  starved_edge_cid: StarvedEdgeCid;
11892
11837
  failed_citations: FailedCitations;
@@ -11904,9 +11849,9 @@ export interface EpistemicStarvationEvent {
11904
11849
  * MCP ROUTING TRIGGERS: SPARQL Result, RDF Bindings, Epistemic Projection, Payload Bounding, Ledger Commit
11905
11850
  */
11906
11851
  export interface SPARQLQueryResultReceipt {
11907
- event_cid: EventCid38;
11908
- prior_event_hash?: PriorEventHash38;
11909
- timestamp: Timestamp38;
11852
+ event_cid: EventCid37;
11853
+ prior_event_hash?: PriorEventHash37;
11854
+ timestamp: Timestamp37;
11910
11855
  topology_class?: TopologyClass121;
11911
11856
  query_intent_cid: QueryIntentCid;
11912
11857
  returned_bindings: ReturnedBindings;
@@ -11936,6 +11881,33 @@ export interface OracleExecutionReceipt {
11936
11881
  tokens_burned: TokensBurned;
11937
11882
  human_attestation_signature?: HumanAttestationSignature;
11938
11883
  }
11884
+ /**
11885
+ * CoReason Shared Kernel Ontology
11886
+ *
11887
+ * AGENT INSTRUCTION: Tracks a deterministic security boundary violation emitted by the NeMo Guardrails proxy. This event is a frozen historical fact representing a failed cryptographic or semantic check.
11888
+ *
11889
+ * CAUSAL AFFORDANCE: Triggers an immediate suspension of the active execution trajectory and publishes a high-severity alert to the telemetry broker for remediation.
11890
+ *
11891
+ * EPISTEMIC BOUNDS: The event must include the specific HTTP status code (e.g., 401, 403, 406, 422) and the opaque violation manifest emitted by the proxy.
11892
+ *
11893
+ * MCP ROUTING TRIGGERS: Security, Guardrails, Data Loss Prevention, Policy Violation, Telemetry
11894
+ */
11895
+ export interface GuardrailViolationEvent {
11896
+ event_cid: EventCid38;
11897
+ prior_event_hash?: PriorEventHash38;
11898
+ timestamp: Timestamp38;
11899
+ topology_class?: TopologyClass123;
11900
+ violation_id: ViolationId;
11901
+ status_code: StatusCode;
11902
+ violation_type: ViolationType;
11903
+ violation_details?: ViolationDetails;
11904
+ }
11905
+ /**
11906
+ * Detailed manifest from the Guardrails proxy.
11907
+ */
11908
+ export interface ViolationDetails {
11909
+ [k: string]: unknown;
11910
+ }
11939
11911
  /**
11940
11912
  * CoReason Shared Kernel Ontology
11941
11913
  *
@@ -11948,7 +11920,7 @@ export interface OracleExecutionReceipt {
11948
11920
  * MCP ROUTING TRIGGERS: Markov Decision Process, Acyclic Edge, Stochastic Routing, Transition Probability, Directed Graph
11949
11921
  */
11950
11922
  export interface TransitionEdgeProfile {
11951
- topology_class?: TopologyClass123;
11923
+ topology_class?: TopologyClass124;
11952
11924
  target_node_cid?: TargetNodeCid1;
11953
11925
  /**
11954
11926
  * Dynamic discovery intent for bridging nodes.
@@ -11992,7 +11964,7 @@ export interface EdgeMappingContract {
11992
11964
  * MCP ROUTING TRIGGERS: Markov Decision Process, Cyclic Edge, Bellman Equation, Thermodynamic Discounting, Recursive Traversal
11993
11965
  */
11994
11966
  export interface CyclicEdgeProfile {
11995
- topology_class?: TopologyClass124;
11967
+ topology_class?: TopologyClass125;
11996
11968
  target_node_cid?: TargetNodeCid2;
11997
11969
  /**
11998
11970
  * Dynamic discovery intent for bridging nodes.
@@ -12346,31 +12318,6 @@ export interface ComputeRateContract1 {
12346
12318
  cost_per_million_output_tokens: CostPerMillionOutputTokens;
12347
12319
  magnitude_unit: MagnitudeUnit;
12348
12320
  }
12349
- /**
12350
- * CoReason Shared Kernel Ontology
12351
- *
12352
- * AGENT INSTRUCTION: Formalizes a discrete normative axiom within a Constitutional AI
12353
- * framework to prevent instrumental convergence. As a ...Policy suffix, this object defines
12354
- * rigid mathematical boundaries that the orchestrator must enforce globally.
12355
- *
12356
- * CAUSAL AFFORDANCE: Establishes a hard structural boundary that mathematically repels the
12357
- * swarm's generative trajectory away from forbidden semantic manifolds. Violation severity
12358
- * is classified via a strict Literal["low", "medium", "high", "critical"] tier.
12359
- *
12360
- * EPISTEMIC BOUNDS: Geometrically restricts the state space by blacklisting specific
12361
- * execution branches via the forbidden_intents array (max_length=1000),
12362
- * deterministically sorted by @model_validator to preserve RFC 8785 canonical hashing.
12363
- * The rule_cid is bounded to a 128-char CID.
12364
- *
12365
- * MCP ROUTING TRIGGERS: Constitutional AI, Value Alignment, Normative Axiom, Instrumental
12366
- * Convergence, Semantic Boundary
12367
- */
12368
- export interface ConstitutionalPolicy {
12369
- rule_cid: RuleCid1;
12370
- description: Description10;
12371
- severity: Severity;
12372
- forbidden_intents: ForbiddenIntents1;
12373
- }
12374
12321
  /**
12375
12322
  * CoReason Shared Kernel Ontology
12376
12323
  *
@@ -12617,6 +12564,30 @@ export interface DocumentLayoutManifest {
12617
12564
  export interface Blocks1 {
12618
12565
  [k: string]: DocumentLayoutRegionState;
12619
12566
  }
12567
+ /**
12568
+ * CoReason Shared Kernel Ontology
12569
+ *
12570
+ * AGENT INSTRUCTION: Defines the mathematical Optimal Stopping Theory boundaries for Monte
12571
+ * Carlo Tree Search (MCTS) and test-time compute scaling. As an ...SLA suffix, this object
12572
+ * enforces rigid mathematical boundaries that the orchestrator must respect globally.
12573
+ *
12574
+ * CAUSAL AFFORDANCE: Triggers an early termination circuit breaker on reasoning trajectories
12575
+ * when the gradient of the Process Reward Model (PRM) score falls below the epsilon delta,
12576
+ * halting unnecessary probability wave expansion and preserving VRAM.
12577
+ *
12578
+ * EPISTEMIC BOUNDS: Mathematically constrained by convergence_delta_epsilon (ge=0.0, le=1.0)
12579
+ * over a strictly positive lookback_window_steps (gt=0, le=18446744073709551615). Physically mandates
12580
+ * a minimum_reasoning_steps burn-in period (gt=0, le=18446744073709551615) to prevent premature
12581
+ * collapse before the latent space is adequately explored.
12582
+ *
12583
+ * MCP ROUTING TRIGGERS: Optimal Stopping Theory, MCTS, PRM Convergence, Circuit Breaker,
12584
+ * Bellman Equation
12585
+ */
12586
+ export interface DynamicConvergenceSLA {
12587
+ convergence_delta_epsilon: ConvergenceDeltaEpsilon;
12588
+ lookback_window_steps: LookbackWindowSteps;
12589
+ minimum_reasoning_steps: MinimumReasoningSteps;
12590
+ }
12620
12591
  /**
12621
12592
  * CoReason Shared Kernel Ontology
12622
12593
  *
@@ -12968,6 +12939,26 @@ export interface EpistemicEscalationContract {
12968
12939
  test_time_multiplier: TestTimeMultiplier;
12969
12940
  max_escalation_tiers: MaxEscalationTiers;
12970
12941
  }
12942
+ /**
12943
+ * CoReason Shared Kernel Ontology
12944
+ *
12945
+ * AGENT INSTRUCTION: A declarative proxy that outputs standard NeMo Colang format (.co files)
12946
+ * to configure the NeMo Guardrails reverse-proxy in the Envoy mesh.
12947
+ *
12948
+ * CAUSAL AFFORDANCE: Defines the exact Colang state machine configuration for intercepting
12949
+ * and overriding LLM outputs before they hit the network.
12950
+ *
12951
+ * EPISTEMIC BOUNDS: Bounded by a strict max_length=100000 on the raw Colang payload
12952
+ * to prevent memory exhaustion. The @model_validator deterministically sorts the required
12953
+ * imports.
12954
+ *
12955
+ * MCP ROUTING TRIGGERS: NeMo Guardrails, Colang, Reverse Proxy, Constitutional Alignment, Envoy Mesh
12956
+ */
12957
+ export interface EpistemicGuardrailsManifest {
12958
+ colang_version?: ColangVersion;
12959
+ colang_payload: ColangPayload;
12960
+ severity?: Severity;
12961
+ }
12971
12962
  /**
12972
12963
  * CoReason Shared Kernel Ontology
12973
12964
  *
@@ -13198,23 +13189,24 @@ export interface ProceduralMetadataManifest {
13198
13189
  /**
13199
13190
  * CoReason Shared Kernel Ontology
13200
13191
  *
13201
- * AGENT INSTRUCTION: Encodes a macroscopic Petri net or Directed Acyclic Graph (DAG)
13202
- * formalizing standard operating procedures into mathematically traversable state
13203
- * transitions. As a ...Manifest suffix, this defines a frozen, N-dimensional coordinate
13204
- * state.
13192
+ * AGENT INSTRUCTION: Encodes a macroscopic Petri net or Directed Acyclic Graph (DAG)
13193
+ * formalizing standard operating procedures into mathematically traversable state
13194
+ * transitions. As a ...Manifest suffix, this defines a frozen, N-dimensional coordinate
13195
+ * state.
13205
13196
  *
13206
- * CAUSAL AFFORDANCE: Physically bounds the executing agent (target_persona:
13207
- * ProfileCIDState) to a deterministic sequence of CognitiveStateProfiles, unlocking
13208
- * the ability for the orchestrator to dynamically evaluate execution via Process Reward
13209
- * .
13197
+ * CAUSAL AFFORDANCE: Physically bounds the executing agent (target_persona:
13198
+ * ProfileCIDState) to a deterministic sequence of CognitiveStateProfiles, unlocking
13199
+ * the ability for the orchestrator to dynamically evaluate execution
13200
+ * via Process Reward Models (prm_evaluations: list[ProcessRewardContract]) at each
13201
+ * topological node.
13210
13202
  *
13211
- * EPISTEMIC BOUNDS: The cognitive_steps dictionary is constrained to max_length=1000
13212
- * to cap memory footprint. The @model_validator reject_ghost_nodes mathematically enforces
13213
- * referential integrity, guaranteeing that no chronological_flow_edges AND no
13214
- * structural_grammar_hashes point to an undefined state.
13203
+ * EPISTEMIC BOUNDS: The cognitive_steps dictionary is constrained to max_length=1000
13204
+ * to cap memory footprint. The @model_validator reject_ghost_nodes mathematically enforces
13205
+ * referential integrity, guaranteeing that no chronological_flow_edges AND no
13206
+ * structural_grammar_hashes point to an undefined state.
13215
13207
  *
13216
- * MCP ROUTING TRIGGERS: Petri Net, Directed Acyclic Graph, Process Reward Model,
13217
- * Topological Flow, Referential Integrity
13208
+ * MCP ROUTING TRIGGERS: Petri Net, Directed Acyclic Graph, Process Reward Model,
13209
+ * Topological Flow, Referential Integrity
13218
13210
  */
13219
13211
  export interface EpistemicSOPManifest {
13220
13212
  sop_cid: SopCid;
@@ -13225,6 +13217,7 @@ export interface EpistemicSOPManifest {
13225
13217
  cognitive_steps: CognitiveSteps;
13226
13218
  structural_grammar_hashes: StructuralGrammarHashes;
13227
13219
  chronological_flow_edges: ChronologicalFlowEdges1;
13220
+ prm_evaluations?: PrmEvaluations;
13228
13221
  }
13229
13222
  /**
13230
13223
  * Dictionary mapping step_cids to strict causal DAG constraints.
@@ -13238,6 +13231,26 @@ export interface CognitiveSteps {
13238
13231
  export interface StructuralGrammarHashes {
13239
13232
  [k: string]: string;
13240
13233
  }
13234
+ /**
13235
+ * CoReason Shared Kernel Ontology
13236
+ *
13237
+ * AGENT INSTRUCTION: Enforces the Step-Level Verification heuristics for Process Reward Models (PRMs) during non-monotonic reasoning searches and test-time compute.
13238
+ *
13239
+ * CAUSAL AFFORDANCE: Authorizes the orchestrator to physically prune hallucinating ThoughtBranchState vectors from the LatentScratchpadReceipt if their logit probabilities drop below the viable threshold, emulating rigorous Beam Search pruning.
13240
+ *
13241
+ * EPISTEMIC BOUNDS: Strictly bounds the search space geometry via `pruning_threshold` (`ge=0.0, le=1.0`) and mechanically caps State-Space Explosion through `max_backtracks_allowed` (`ge=0, le=18446744073709551615`).
13242
+ *
13243
+ * MCP ROUTING TRIGGERS: Process Reward Model, Beam Search Pruning, Latent Trajectory, State-Space Explosion, A* Search
13244
+ */
13245
+ export interface ProcessRewardContract {
13246
+ /**
13247
+ * The dynamic circuit breaker that halts the search when PRM variance converges, preventing VRAM waste.
13248
+ */
13249
+ convergence_sla?: DynamicConvergenceSLA | null;
13250
+ pruning_threshold: PruningThreshold;
13251
+ max_backtracks_allowed: MaxBacktracksAllowed;
13252
+ evaluator_matrix_name?: EvaluatorMatrixName;
13253
+ }
13241
13254
  /**
13242
13255
  * CoReason Shared Kernel Ontology
13243
13256
  *
@@ -13442,7 +13455,7 @@ export interface GenerativeTaxonomyManifest1 {
13442
13455
  * Bounding, ESG Constraint, Execution Envelope
13443
13456
  */
13444
13457
  export interface GlobalGovernancePolicy {
13445
- mandatory_license_rule: ConstitutionalPolicy1;
13458
+ mandatory_license_rule: EpistemicGuardrailsManifest1;
13446
13459
  max_budget_magnitude: MaxBudgetMagnitude1;
13447
13460
  /**
13448
13461
  * The mathematical CRDT ruleset governing distributed state synchronization.
@@ -13459,27 +13472,22 @@ export interface GlobalGovernancePolicy {
13459
13472
  /**
13460
13473
  * CoReason Shared Kernel Ontology
13461
13474
  *
13462
- * AGENT INSTRUCTION: Formalizes a discrete normative axiom within a Constitutional AI
13463
- * framework to prevent instrumental convergence. As a ...Policy suffix, this object defines
13464
- * rigid mathematical boundaries that the orchestrator must enforce globally.
13475
+ * AGENT INSTRUCTION: A declarative proxy that outputs standard NeMo Colang format (.co files)
13476
+ * to configure the NeMo Guardrails reverse-proxy in the Envoy mesh.
13465
13477
  *
13466
- * CAUSAL AFFORDANCE: Establishes a hard structural boundary that mathematically repels the
13467
- * swarm's generative trajectory away from forbidden semantic manifolds. Violation severity
13468
- * is classified via a strict Literal["low", "medium", "high", "critical"] tier.
13478
+ * CAUSAL AFFORDANCE: Defines the exact Colang state machine configuration for intercepting
13479
+ * and overriding LLM outputs before they hit the network.
13469
13480
  *
13470
- * EPISTEMIC BOUNDS: Geometrically restricts the state space by blacklisting specific
13471
- * execution branches via the forbidden_intents array (max_length=1000),
13472
- * deterministically sorted by @model_validator to preserve RFC 8785 canonical hashing.
13473
- * The rule_cid is bounded to a 128-char CID.
13481
+ * EPISTEMIC BOUNDS: Bounded by a strict max_length=100000 on the raw Colang payload
13482
+ * to prevent memory exhaustion. The @model_validator deterministically sorts the required
13483
+ * imports.
13474
13484
  *
13475
- * MCP ROUTING TRIGGERS: Constitutional AI, Value Alignment, Normative Axiom, Instrumental
13476
- * Convergence, Semantic Boundary
13485
+ * MCP ROUTING TRIGGERS: NeMo Guardrails, Colang, Reverse Proxy, Constitutional Alignment, Envoy Mesh
13477
13486
  */
13478
- export interface ConstitutionalPolicy1 {
13479
- rule_cid: RuleCid1;
13480
- description: Description10;
13481
- severity: Severity;
13482
- forbidden_intents: ForbiddenIntents1;
13487
+ export interface EpistemicGuardrailsManifest1 {
13488
+ colang_version?: ColangVersion;
13489
+ colang_payload: ColangPayload;
13490
+ severity?: Severity;
13483
13491
  }
13484
13492
  /**
13485
13493
  * CoReason Shared Kernel Ontology
@@ -13554,32 +13562,6 @@ export interface GlobalSemanticProfile1 {
13554
13562
  detected_modalities: DetectedModalities;
13555
13563
  token_density: TokenDensity;
13556
13564
  }
13557
- /**
13558
- * CoReason Shared Kernel Ontology
13559
- *
13560
- * AGENT INSTRUCTION: Aggregates discrete ConstitutionalPolicy nodes into a cohesive,
13561
- * version-controlled Normative Alignment Manifold. As a ...Policy suffix, this object
13562
- * defines rigid mathematical boundaries that the orchestrator must enforce globally.
13563
- *
13564
- * CAUSAL AFFORDANCE: Instructs the orchestrator to enforce a unified cybernetic governance
13565
- * model across all swarm trajectories, grounding generative actions in a specific semantic
13566
- * version (SemanticVersionState).
13567
- *
13568
- * EPISTEMIC BOUNDS: The topological integrity of the manifold is mathematically guaranteed
13569
- * by the @model_validator, which deterministically sorts the rules array by rule_cid to
13570
- * prevent Byzantine hash fractures across distributed nodes.
13571
- *
13572
- * MCP ROUTING TRIGGERS: Cybernetic Governance, Normative Alignment Manifold, Rule
13573
- * Aggregation, Version Control, RFC 8785 Canonicalization
13574
- */
13575
- export interface GovernancePolicy {
13576
- policy_name: PolicyName;
13577
- /**
13578
- * Semantic version of the governance policy.
13579
- */
13580
- version: string;
13581
- rules: Rules1;
13582
- }
13583
13565
  /**
13584
13566
  * CoReason Shared Kernel Ontology
13585
13567
  *