@coreason-ai/coreason-manifest 0.56.0 → 0.58.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/ontology.d.ts +311 -298
- package/package.json +1 -1
package/dist/ontology.d.ts
CHANGED
|
@@ -108,13 +108,9 @@ export type StructuralType = string;
|
|
|
108
108
|
*/
|
|
109
109
|
export type TimeoutAction = "rollback" | "proceed_default" | "terminate";
|
|
110
110
|
/**
|
|
111
|
-
* A Content Identifier (CID) acting as a
|
|
111
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
112
112
|
*/
|
|
113
113
|
export type EventCid = string;
|
|
114
|
-
/**
|
|
115
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
116
|
-
*/
|
|
117
|
-
export type PriorEventHash = string | null;
|
|
118
114
|
/**
|
|
119
115
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
120
116
|
*/
|
|
@@ -603,7 +599,7 @@ export type Rationale = string;
|
|
|
603
599
|
* Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
|
|
604
600
|
*/
|
|
605
601
|
export type HeuristicConfidence = number;
|
|
606
|
-
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask |
|
|
602
|
+
export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask | DoWhyInterventionIntent | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent | FederatedDiscoveryIntent;
|
|
607
603
|
/**
|
|
608
604
|
* Discriminator for temporal edge invalidation.
|
|
609
605
|
*/
|
|
@@ -1373,7 +1369,7 @@ export type EdgeThickness = number;
|
|
|
1373
1369
|
*/
|
|
1374
1370
|
export type SpatialRepulsionScalar = number;
|
|
1375
1371
|
/**
|
|
1376
|
-
* The specific
|
|
1372
|
+
* The specific DoWhy topological relationship between the two variables.
|
|
1377
1373
|
*/
|
|
1378
1374
|
export type EdgeClass = "direct_cause" | "confounder" | "collider" | "mediator";
|
|
1379
1375
|
export type PredicateCurie = string;
|
|
@@ -1510,31 +1506,23 @@ export type UpsamplingConfidenceThreshold = number;
|
|
|
1510
1506
|
* @maxItems 1000
|
|
1511
1507
|
*/
|
|
1512
1508
|
export type JustificationVectors = [string, ...string[]];
|
|
1513
|
-
export type TopologyClass51 = "
|
|
1509
|
+
export type TopologyClass51 = "dowhy_intervention_intent";
|
|
1514
1510
|
/**
|
|
1515
1511
|
* Unique identifier for this causal intervention.
|
|
1516
1512
|
*/
|
|
1517
1513
|
export type TaskCid5 = string;
|
|
1518
1514
|
/**
|
|
1519
|
-
* The
|
|
1520
|
-
*/
|
|
1521
|
-
export type TargetHypothesisCid1 = string;
|
|
1522
|
-
/**
|
|
1523
|
-
* The specific node $X$ in the SCM the agent is forcing to a specific state.
|
|
1524
|
-
*/
|
|
1525
|
-
export type InterventionVariable = string;
|
|
1526
|
-
/**
|
|
1527
|
-
* The exact value or condition forced upon the intervention_variable, isolating it from its historical causes.
|
|
1515
|
+
* The treatment variable (X) to intervene on.
|
|
1528
1516
|
*/
|
|
1529
|
-
export type
|
|
1517
|
+
export type TreatmentVariable = string;
|
|
1530
1518
|
/**
|
|
1531
|
-
* The
|
|
1519
|
+
* The outcome variable (Y) to estimate the effect for.
|
|
1532
1520
|
*/
|
|
1533
|
-
export type
|
|
1521
|
+
export type OutcomeVariable = string;
|
|
1534
1522
|
/**
|
|
1535
|
-
*
|
|
1523
|
+
* Optional explicit common causes (confounders) to adjust for.
|
|
1536
1524
|
*/
|
|
1537
|
-
export type
|
|
1525
|
+
export type CommonCauses = string[];
|
|
1538
1526
|
export type TopologyClass52 = "mcp_client_intent";
|
|
1539
1527
|
/**
|
|
1540
1528
|
* JSON-RPC version.
|
|
@@ -2540,7 +2528,7 @@ export type AgentCid1 = string;
|
|
|
2540
2528
|
/**
|
|
2541
2529
|
* The exact HypothesisGenerationEvent the agent is betting on.
|
|
2542
2530
|
*/
|
|
2543
|
-
export type
|
|
2531
|
+
export type TargetHypothesisCid1 = string;
|
|
2544
2532
|
/**
|
|
2545
2533
|
* The volume of compute budget committed to this position.
|
|
2546
2534
|
*/
|
|
@@ -3034,7 +3022,7 @@ export type AnyPresentationIntent = SemanticIntent | DraftingIntent | Adjudicati
|
|
|
3034
3022
|
/**
|
|
3035
3023
|
* A discriminated union of state events.
|
|
3036
3024
|
*/
|
|
3037
|
-
export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt | GuardrailViolationEvent;
|
|
3025
|
+
export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt | GuardrailViolationEvent | CausalDiscoveryIntent | CausalDiscoveryReceipt | DoWhyEstimationIntent | DoWhyEstimationReceipt | EconMLCATEIntent | HTEEstimationReceipt;
|
|
3038
3026
|
/**
|
|
3039
3027
|
* Discriminator for temporal graph crdt.
|
|
3040
3028
|
*/
|
|
@@ -3061,30 +3049,21 @@ export type AddSet = NodeCIDState[];
|
|
|
3061
3049
|
export type TerminateSet = TemporalEdgeInvalidationIntent[];
|
|
3062
3050
|
export type TopologyClass83 = "mcp_tool_definition";
|
|
3063
3051
|
/**
|
|
3064
|
-
* A Content Identifier (CID) acting as a
|
|
3052
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3065
3053
|
*/
|
|
3066
3054
|
export type EventCid1 = string;
|
|
3067
|
-
/**
|
|
3068
|
-
* The RFC 8785 Canonical hash of the immediate causal ancestor event. Null for genesis nodes.
|
|
3069
|
-
*/
|
|
3070
|
-
export type PriorEventHash1 = string | null;
|
|
3071
3055
|
export type Timestamp1 = number;
|
|
3072
3056
|
export type Name = string;
|
|
3073
3057
|
export type Description9 = string;
|
|
3074
3058
|
export type EventCid2 = string;
|
|
3075
|
-
export type PriorEventHash2 = string | null;
|
|
3076
3059
|
export type Timestamp2 = number;
|
|
3077
3060
|
export type TopologyClass84 = "crosswalk_resolution";
|
|
3078
3061
|
export type ReceiptCid = string;
|
|
3079
3062
|
export type TargetGraphCid3 = string;
|
|
3080
3063
|
/**
|
|
3081
|
-
* A Content Identifier (CID) acting as a
|
|
3064
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3082
3065
|
*/
|
|
3083
3066
|
export type EventCid3 = string;
|
|
3084
|
-
/**
|
|
3085
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3086
|
-
*/
|
|
3087
|
-
export type PriorEventHash3 = string | null;
|
|
3088
3067
|
/**
|
|
3089
3068
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3090
3069
|
*/
|
|
@@ -3114,13 +3093,9 @@ export type RemediationEpochsConsumed = number;
|
|
|
3114
3093
|
*/
|
|
3115
3094
|
export type TransmutedPayloadHash = string;
|
|
3116
3095
|
/**
|
|
3117
|
-
* A Content Identifier (CID) acting as a
|
|
3096
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3118
3097
|
*/
|
|
3119
3098
|
export type EventCid4 = string;
|
|
3120
|
-
/**
|
|
3121
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3122
|
-
*/
|
|
3123
|
-
export type PriorEventHash4 = string | null;
|
|
3124
3099
|
/**
|
|
3125
3100
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3126
3101
|
*/
|
|
@@ -3209,7 +3184,7 @@ export type TemporalDurationMs = number;
|
|
|
3209
3184
|
*/
|
|
3210
3185
|
export type SalienceThresholdBreached = boolean;
|
|
3211
3186
|
/**
|
|
3212
|
-
* A Content Identifier (CID) acting as a
|
|
3187
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3213
3188
|
*/
|
|
3214
3189
|
export type AuditCid = string;
|
|
3215
3190
|
/**
|
|
@@ -3259,13 +3234,9 @@ export type DecayThreshold = number;
|
|
|
3259
3234
|
*/
|
|
3260
3235
|
export type MaxLookbackWindow = number;
|
|
3261
3236
|
/**
|
|
3262
|
-
* A Content Identifier (CID) acting as a
|
|
3237
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3263
3238
|
*/
|
|
3264
3239
|
export type EventCid5 = string;
|
|
3265
|
-
/**
|
|
3266
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3267
|
-
*/
|
|
3268
|
-
export type PriorEventHash5 = string | null;
|
|
3269
3240
|
/**
|
|
3270
3241
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3271
3242
|
*/
|
|
@@ -3311,13 +3282,9 @@ export type TotalLatentTokens = number;
|
|
|
3311
3282
|
*/
|
|
3312
3283
|
export type QuorumSignatures = string[];
|
|
3313
3284
|
/**
|
|
3314
|
-
* A Content Identifier (CID) acting as a
|
|
3285
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3315
3286
|
*/
|
|
3316
3287
|
export type EventCid6 = string;
|
|
3317
|
-
/**
|
|
3318
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3319
|
-
*/
|
|
3320
|
-
export type PriorEventHash6 = string | null;
|
|
3321
3288
|
/**
|
|
3322
3289
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3323
3290
|
*/
|
|
@@ -3328,13 +3295,9 @@ export type Timestamp6 = number;
|
|
|
3328
3295
|
export type TopologyClass90 = "system_fault";
|
|
3329
3296
|
export type TopologyClass91 = "atomic_proposition";
|
|
3330
3297
|
/**
|
|
3331
|
-
* A Content Identifier (CID) acting as a
|
|
3298
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3332
3299
|
*/
|
|
3333
3300
|
export type EventCid7 = string;
|
|
3334
|
-
/**
|
|
3335
|
-
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
3336
|
-
*/
|
|
3337
|
-
export type PriorEventHash7 = string | null;
|
|
3338
3301
|
/**
|
|
3339
3302
|
* The precise temporal coordinate of the event realization.
|
|
3340
3303
|
*/
|
|
@@ -3388,10 +3351,6 @@ export type TopologyClass92 = "post_coordinated_concept";
|
|
|
3388
3351
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3389
3352
|
*/
|
|
3390
3353
|
export type EventCid8 = string;
|
|
3391
|
-
/**
|
|
3392
|
-
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
3393
|
-
*/
|
|
3394
|
-
export type PriorEventHash8 = string | null;
|
|
3395
3354
|
/**
|
|
3396
3355
|
* The precise temporal coordinate of the event realization.
|
|
3397
3356
|
*/
|
|
@@ -3409,7 +3368,6 @@ export type ManifoldAlignmentMetricProfile1 = "gromov_wasserstein" | "earth_move
|
|
|
3409
3368
|
*/
|
|
3410
3369
|
export type IsometryScore = number;
|
|
3411
3370
|
export type EventCid9 = string;
|
|
3412
|
-
export type PriorEventHash9 = string | null;
|
|
3413
3371
|
export type Timestamp9 = number;
|
|
3414
3372
|
export type TopologyClass93 = "artifact_corruption";
|
|
3415
3373
|
/**
|
|
@@ -3419,13 +3377,9 @@ export type ArtifactCid = string;
|
|
|
3419
3377
|
export type CorruptionClass = "drm_locked" | "malformed_bytes" | "ocr_failure" | "unsupported_format";
|
|
3420
3378
|
export type DiagnosticHash = string;
|
|
3421
3379
|
/**
|
|
3422
|
-
* A Content Identifier (CID) acting as a
|
|
3380
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3423
3381
|
*/
|
|
3424
3382
|
export type EventCid10 = string;
|
|
3425
|
-
/**
|
|
3426
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3427
|
-
*/
|
|
3428
|
-
export type PriorEventHash10 = string | null;
|
|
3429
3383
|
/**
|
|
3430
3384
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3431
3385
|
*/
|
|
@@ -3457,29 +3411,17 @@ export type FalsificationConditions = [EmpiricalFalsificationContract, ...Empiri
|
|
|
3457
3411
|
*/
|
|
3458
3412
|
export type Status = "active" | "falsified" | "verified";
|
|
3459
3413
|
/**
|
|
3460
|
-
* The
|
|
3461
|
-
*
|
|
3462
|
-
* @maxItems 1000
|
|
3414
|
+
* The format of the provided causal graph.
|
|
3463
3415
|
*/
|
|
3464
|
-
export type
|
|
3416
|
+
export type GraphFormat = "gml" | "dot" | "dict";
|
|
3465
3417
|
/**
|
|
3466
|
-
* The
|
|
3467
|
-
*
|
|
3468
|
-
* @maxItems 1000
|
|
3418
|
+
* The graph payload, either as a GML/DOT string or JSON-serialized dictionary of nodes and edges.
|
|
3469
3419
|
*/
|
|
3470
|
-
export type
|
|
3420
|
+
export type GraphPayload = string;
|
|
3471
3421
|
/**
|
|
3472
|
-
*
|
|
3473
|
-
*/
|
|
3474
|
-
export type CausalEdges1 = CausalDirectedEdgeState[];
|
|
3475
|
-
/**
|
|
3476
|
-
* A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3422
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3477
3423
|
*/
|
|
3478
3424
|
export type EventCid11 = string;
|
|
3479
|
-
/**
|
|
3480
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3481
|
-
*/
|
|
3482
|
-
export type PriorEventHash11 = string | null;
|
|
3483
3425
|
/**
|
|
3484
3426
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3485
3427
|
*/
|
|
@@ -3503,13 +3445,9 @@ export type RetainedPartialPayload = {
|
|
|
3503
3445
|
*/
|
|
3504
3446
|
export type EpistemicDisposition = "discard" | "retain_as_context" | "mark_as_falsified";
|
|
3505
3447
|
/**
|
|
3506
|
-
* A Content Identifier (CID) acting as a
|
|
3448
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3507
3449
|
*/
|
|
3508
3450
|
export type EventCid12 = string;
|
|
3509
|
-
/**
|
|
3510
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3511
|
-
*/
|
|
3512
|
-
export type PriorEventHash12 = string | null;
|
|
3513
3451
|
/**
|
|
3514
3452
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3515
3453
|
*/
|
|
@@ -3539,13 +3477,9 @@ export type ExpectedUtilitySimulated = number;
|
|
|
3539
3477
|
*/
|
|
3540
3478
|
export type EpistemicRegret = number;
|
|
3541
3479
|
/**
|
|
3542
|
-
* A Content Identifier (CID) acting as a
|
|
3480
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3543
3481
|
*/
|
|
3544
3482
|
export type EventCid13 = string;
|
|
3545
|
-
/**
|
|
3546
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3547
|
-
*/
|
|
3548
|
-
export type PriorEventHash13 = string | null;
|
|
3549
3483
|
/**
|
|
3550
3484
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3551
3485
|
*/
|
|
@@ -3563,13 +3497,9 @@ export type ToolName1 = string;
|
|
|
3563
3497
|
*/
|
|
3564
3498
|
export type AuthorizedBudgetMagnitude = number;
|
|
3565
3499
|
/**
|
|
3566
|
-
* A Content Identifier (CID) acting as a
|
|
3500
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3567
3501
|
*/
|
|
3568
3502
|
export type EventCid14 = string;
|
|
3569
|
-
/**
|
|
3570
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3571
|
-
*/
|
|
3572
|
-
export type PriorEventHash14 = string | null;
|
|
3573
3503
|
/**
|
|
3574
3504
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3575
3505
|
*/
|
|
@@ -3591,13 +3521,9 @@ export type CrystallizedSemanticNodeCid = string;
|
|
|
3591
3521
|
*/
|
|
3592
3522
|
export type CompressionRatio = number;
|
|
3593
3523
|
/**
|
|
3594
|
-
* A Content Identifier (CID) acting as a
|
|
3524
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3595
3525
|
*/
|
|
3596
3526
|
export type EventCid15 = string;
|
|
3597
|
-
/**
|
|
3598
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3599
|
-
*/
|
|
3600
|
-
export type PriorEventHash15 = string | null;
|
|
3601
3527
|
/**
|
|
3602
3528
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3603
3529
|
*/
|
|
@@ -3619,13 +3545,9 @@ export type CommittedTemporalCrdtCid = string;
|
|
|
3619
3545
|
*/
|
|
3620
3546
|
export type TargetTableUri = string;
|
|
3621
3547
|
/**
|
|
3622
|
-
* A Content Identifier (CID) acting as a
|
|
3548
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3623
3549
|
*/
|
|
3624
3550
|
export type EventCid16 = string;
|
|
3625
|
-
/**
|
|
3626
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3627
|
-
*/
|
|
3628
|
-
export type PriorEventHash16 = string | null;
|
|
3629
3551
|
/**
|
|
3630
3552
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3631
3553
|
*/
|
|
@@ -3651,13 +3573,9 @@ export type OutputTokens = number;
|
|
|
3651
3573
|
*/
|
|
3652
3574
|
export type BurnMagnitude = number;
|
|
3653
3575
|
/**
|
|
3654
|
-
* A Content Identifier (CID) acting as a
|
|
3576
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3655
3577
|
*/
|
|
3656
3578
|
export type EventCid17 = string;
|
|
3657
|
-
/**
|
|
3658
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3659
|
-
*/
|
|
3660
|
-
export type PriorEventHash17 = string | null;
|
|
3661
3579
|
/**
|
|
3662
3580
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3663
3581
|
*/
|
|
@@ -3675,13 +3593,9 @@ export type ExhaustedEscrowCid = string;
|
|
|
3675
3593
|
*/
|
|
3676
3594
|
export type FinalBurnReceiptCid = string;
|
|
3677
3595
|
/**
|
|
3678
|
-
* A Content Identifier (CID) acting as a
|
|
3596
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3679
3597
|
*/
|
|
3680
3598
|
export type EventCid18 = string;
|
|
3681
|
-
/**
|
|
3682
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3683
|
-
*/
|
|
3684
|
-
export type PriorEventHash18 = string | null;
|
|
3685
3599
|
/**
|
|
3686
3600
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3687
3601
|
*/
|
|
@@ -3703,13 +3617,9 @@ export type TargetNodeCid = string;
|
|
|
3703
3617
|
*/
|
|
3704
3618
|
export type DwellDurationMs = number | null;
|
|
3705
3619
|
/**
|
|
3706
|
-
* A Content Identifier (CID) acting as a
|
|
3620
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3707
3621
|
*/
|
|
3708
3622
|
export type EventCid19 = string;
|
|
3709
|
-
/**
|
|
3710
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3711
|
-
*/
|
|
3712
|
-
export type PriorEventHash19 = string | null;
|
|
3713
3623
|
/**
|
|
3714
3624
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3715
3625
|
*/
|
|
@@ -3722,13 +3632,9 @@ export type TargetSourceConcept = string;
|
|
|
3722
3632
|
*/
|
|
3723
3633
|
export type PredictedTopKTokens = [string, ...string[]];
|
|
3724
3634
|
/**
|
|
3725
|
-
* A Content Identifier (CID) acting as a
|
|
3635
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3726
3636
|
*/
|
|
3727
3637
|
export type EventCid20 = string;
|
|
3728
|
-
/**
|
|
3729
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3730
|
-
*/
|
|
3731
|
-
export type PriorEventHash20 = string | null;
|
|
3732
3638
|
/**
|
|
3733
3639
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3734
3640
|
*/
|
|
@@ -3742,13 +3648,9 @@ export type FactScorePassed = boolean;
|
|
|
3742
3648
|
*/
|
|
3743
3649
|
export type ZeroTrustReceiptCid1 = string | null;
|
|
3744
3650
|
/**
|
|
3745
|
-
* A Content Identifier (CID) acting as a
|
|
3651
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3746
3652
|
*/
|
|
3747
3653
|
export type EventCid21 = string;
|
|
3748
|
-
/**
|
|
3749
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3750
|
-
*/
|
|
3751
|
-
export type PriorEventHash21 = string | null;
|
|
3752
3654
|
/**
|
|
3753
3655
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3754
3656
|
*/
|
|
@@ -3767,13 +3669,9 @@ export type EstimatedFlowValue = number;
|
|
|
3767
3669
|
*/
|
|
3768
3670
|
export type TerminalRewardFactorized = boolean;
|
|
3769
3671
|
/**
|
|
3770
|
-
* A Content Identifier (CID) acting as a
|
|
3672
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3771
3673
|
*/
|
|
3772
3674
|
export type EventCid22 = string;
|
|
3773
|
-
/**
|
|
3774
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3775
|
-
*/
|
|
3776
|
-
export type PriorEventHash22 = string | null;
|
|
3777
3675
|
/**
|
|
3778
3676
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3779
3677
|
*/
|
|
@@ -3819,13 +3717,9 @@ export type ConfidenceIntervalUpper = number;
|
|
|
3819
3717
|
*/
|
|
3820
3718
|
export type AgentAttributions = ShapleyAttributionReceipt[];
|
|
3821
3719
|
/**
|
|
3822
|
-
* A Content Identifier (CID) acting as a
|
|
3720
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3823
3721
|
*/
|
|
3824
3722
|
export type EventCid23 = string;
|
|
3825
|
-
/**
|
|
3826
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3827
|
-
*/
|
|
3828
|
-
export type PriorEventHash23 = string | null;
|
|
3829
3723
|
/**
|
|
3830
3724
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3831
3725
|
*/
|
|
@@ -3852,13 +3746,9 @@ export type ConfidenceScore1 = number;
|
|
|
3852
3746
|
export type RoutingPolicyCid = string | null;
|
|
3853
3747
|
export type TopologyClass108 = "semantic_relational_record";
|
|
3854
3748
|
/**
|
|
3855
|
-
* A Content Identifier (CID) acting as a
|
|
3749
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3856
3750
|
*/
|
|
3857
3751
|
export type EventCid24 = string;
|
|
3858
|
-
/**
|
|
3859
|
-
* The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
|
|
3860
|
-
*/
|
|
3861
|
-
export type PriorEventHash24 = string | null;
|
|
3862
3752
|
/**
|
|
3863
3753
|
* The precise temporal coordinate of the event realization.
|
|
3864
3754
|
*/
|
|
@@ -3879,10 +3769,6 @@ export type TopologyClass109 = "ontological_reification";
|
|
|
3879
3769
|
* Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
|
|
3880
3770
|
*/
|
|
3881
3771
|
export type EventCid25 = string;
|
|
3882
|
-
/**
|
|
3883
|
-
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
3884
|
-
*/
|
|
3885
|
-
export type PriorEventHash25 = string | null;
|
|
3886
3772
|
/**
|
|
3887
3773
|
* The precise temporal coordinate of the event realization.
|
|
3888
3774
|
*/
|
|
@@ -3904,13 +3790,9 @@ export type TransformationMechanismProfile = "lexical_crosswalk" | "contextual_t
|
|
|
3904
3790
|
*/
|
|
3905
3791
|
export type IsLatentInference = boolean;
|
|
3906
3792
|
/**
|
|
3907
|
-
* A Content Identifier (CID) acting as a
|
|
3793
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3908
3794
|
*/
|
|
3909
3795
|
export type EventCid26 = string;
|
|
3910
|
-
/**
|
|
3911
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3912
|
-
*/
|
|
3913
|
-
export type PriorEventHash26 = string | null;
|
|
3914
3796
|
/**
|
|
3915
3797
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3916
3798
|
*/
|
|
@@ -3924,13 +3806,9 @@ export type TopologyClass110 = "circuit_breaker_event";
|
|
|
3924
3806
|
*/
|
|
3925
3807
|
export type ErrorSignature = string;
|
|
3926
3808
|
/**
|
|
3927
|
-
* A Content Identifier (CID) acting as a
|
|
3809
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3928
3810
|
*/
|
|
3929
3811
|
export type EventCid27 = string;
|
|
3930
|
-
/**
|
|
3931
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3932
|
-
*/
|
|
3933
|
-
export type PriorEventHash27 = string | null;
|
|
3934
3812
|
/**
|
|
3935
3813
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3936
3814
|
*/
|
|
@@ -3956,13 +3834,9 @@ export type BayesianSurpriseScore1 = number;
|
|
|
3956
3834
|
*/
|
|
3957
3835
|
export type LockedMagnitude = number;
|
|
3958
3836
|
/**
|
|
3959
|
-
* A Content Identifier (CID) acting as a
|
|
3837
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3960
3838
|
*/
|
|
3961
3839
|
export type EventCid28 = string;
|
|
3962
|
-
/**
|
|
3963
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3964
|
-
*/
|
|
3965
|
-
export type PriorEventHash28 = string | null;
|
|
3966
3840
|
/**
|
|
3967
3841
|
* Discriminator type for a log event.
|
|
3968
3842
|
*/
|
|
@@ -3985,13 +3859,9 @@ export type TelemetryScalarState = string | number | boolean | null;
|
|
|
3985
3859
|
*/
|
|
3986
3860
|
export type TopologyClass113 = "verdict";
|
|
3987
3861
|
/**
|
|
3988
|
-
* A Content Identifier (CID) acting as a
|
|
3862
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
3989
3863
|
*/
|
|
3990
3864
|
export type EventCid29 = string;
|
|
3991
|
-
/**
|
|
3992
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
3993
|
-
*/
|
|
3994
|
-
export type PriorEventHash29 = string | null;
|
|
3995
3865
|
/**
|
|
3996
3866
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
3997
3867
|
*/
|
|
@@ -4029,13 +3899,9 @@ export type DagNodeNonce = string;
|
|
|
4029
3899
|
*/
|
|
4030
3900
|
export type LivenessChallengeHash = string;
|
|
4031
3901
|
/**
|
|
4032
|
-
* A Content Identifier (CID) acting as a
|
|
3902
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
4033
3903
|
*/
|
|
4034
3904
|
export type EventCid30 = string;
|
|
4035
|
-
/**
|
|
4036
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4037
|
-
*/
|
|
4038
|
-
export type PriorEventHash30 = string | null;
|
|
4039
3905
|
/**
|
|
4040
3906
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4041
3907
|
*/
|
|
@@ -4066,13 +3932,9 @@ export type PostRedactionHash = string;
|
|
|
4066
3932
|
*/
|
|
4067
3933
|
export type RedactionTimestampUnixNano = number;
|
|
4068
3934
|
/**
|
|
4069
|
-
* A Content Identifier (CID) acting as a
|
|
3935
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
4070
3936
|
*/
|
|
4071
3937
|
export type EventCid31 = string;
|
|
4072
|
-
/**
|
|
4073
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4074
|
-
*/
|
|
4075
|
-
export type PriorEventHash31 = string | null;
|
|
4076
3938
|
/**
|
|
4077
3939
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4078
3940
|
*/
|
|
@@ -4091,13 +3953,9 @@ export type SourceClaimCid = string;
|
|
|
4091
3953
|
*/
|
|
4092
3954
|
export type TargetClaimCid = string;
|
|
4093
3955
|
/**
|
|
4094
|
-
* A Content Identifier (CID) acting as a
|
|
3956
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
4095
3957
|
*/
|
|
4096
3958
|
export type EventCid32 = string;
|
|
4097
|
-
/**
|
|
4098
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4099
|
-
*/
|
|
4100
|
-
export type PriorEventHash32 = string | null;
|
|
4101
3959
|
/**
|
|
4102
3960
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4103
3961
|
*/
|
|
@@ -4109,13 +3967,9 @@ export type ViolatedAlgebraicConstraint = string;
|
|
|
4109
3967
|
export type KlDivergenceToValidity = number;
|
|
4110
3968
|
export type StochasticMutationGradient = string;
|
|
4111
3969
|
/**
|
|
4112
|
-
* A Content Identifier (CID) acting as a
|
|
3970
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
4113
3971
|
*/
|
|
4114
3972
|
export type EventCid33 = string;
|
|
4115
|
-
/**
|
|
4116
|
-
* The RFC 8785 Canonical hash of the immediate causal ancestor.
|
|
4117
|
-
*/
|
|
4118
|
-
export type PriorEventHash33 = string | null;
|
|
4119
3973
|
/**
|
|
4120
3974
|
* The precise temporal coordinate of the event realization.
|
|
4121
3975
|
*/
|
|
@@ -4142,13 +3996,9 @@ export type ExtractedBindings = {
|
|
|
4142
3996
|
export type TopologyClass118 = "belief_modulation";
|
|
4143
3997
|
export type ReceiptCid2 = string;
|
|
4144
3998
|
/**
|
|
4145
|
-
* A Content Identifier (CID) acting as a
|
|
3999
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
4146
4000
|
*/
|
|
4147
4001
|
export type EventCid34 = string;
|
|
4148
|
-
/**
|
|
4149
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4150
|
-
*/
|
|
4151
|
-
export type PriorEventHash34 = string | null;
|
|
4152
4002
|
/**
|
|
4153
4003
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4154
4004
|
*/
|
|
@@ -4158,13 +4008,9 @@ export type SeveredEdgeCids = string[];
|
|
|
4158
4008
|
export type TopologyClass119 = "rdf_export_receipt";
|
|
4159
4009
|
export type ExportCid1 = string;
|
|
4160
4010
|
/**
|
|
4161
|
-
* A Content Identifier (CID) acting as a
|
|
4011
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
4162
4012
|
*/
|
|
4163
4013
|
export type EventCid35 = string;
|
|
4164
|
-
/**
|
|
4165
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4166
|
-
*/
|
|
4167
|
-
export type PriorEventHash35 = string | null;
|
|
4168
4014
|
/**
|
|
4169
4015
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4170
4016
|
*/
|
|
@@ -4173,7 +4019,6 @@ export type SerializedPayload = string;
|
|
|
4173
4019
|
export type RdfTripleCount = number;
|
|
4174
4020
|
export type Sha256GraphHash = string;
|
|
4175
4021
|
export type EventCid36 = string;
|
|
4176
|
-
export type PriorEventHash36 = string | null;
|
|
4177
4022
|
export type Timestamp36 = number;
|
|
4178
4023
|
export type TopologyClass120 = "epistemic_starvation";
|
|
4179
4024
|
/**
|
|
@@ -4189,7 +4034,6 @@ export type FailedCitations = EvidentiaryCitationState[];
|
|
|
4189
4034
|
*/
|
|
4190
4035
|
export type DiagnosticReason = string;
|
|
4191
4036
|
export type EventCid37 = string;
|
|
4192
|
-
export type PriorEventHash37 = string | null;
|
|
4193
4037
|
export type Timestamp37 = number;
|
|
4194
4038
|
export type TopologyClass121 = "sparql_query_result";
|
|
4195
4039
|
/**
|
|
@@ -4221,13 +4065,9 @@ export type TokensBurned = number;
|
|
|
4221
4065
|
*/
|
|
4222
4066
|
export type HumanAttestationSignature = string | null;
|
|
4223
4067
|
/**
|
|
4224
|
-
* A Content Identifier (CID) acting as a
|
|
4068
|
+
* A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
|
|
4225
4069
|
*/
|
|
4226
4070
|
export type EventCid38 = string;
|
|
4227
|
-
/**
|
|
4228
|
-
* The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
|
|
4229
|
-
*/
|
|
4230
|
-
export type PriorEventHash38 = string | null;
|
|
4231
4071
|
/**
|
|
4232
4072
|
* Causal Ancestry markers required to resolve decentralized event ordering.
|
|
4233
4073
|
*/
|
|
@@ -4248,6 +4088,90 @@ export type StatusCode = number;
|
|
|
4248
4088
|
* The classification of the violation (e.g., 'pii_leak', 'toxic_content').
|
|
4249
4089
|
*/
|
|
4250
4090
|
export type ViolationType = string;
|
|
4091
|
+
/**
|
|
4092
|
+
* Discriminator for the CausalDiscoveryIntent topology.
|
|
4093
|
+
*/
|
|
4094
|
+
export type TopologyClass124 = "causal_discovery_intent";
|
|
4095
|
+
/**
|
|
4096
|
+
* The URI of the observational dataset.
|
|
4097
|
+
*/
|
|
4098
|
+
export type DatasetUri = string;
|
|
4099
|
+
/**
|
|
4100
|
+
* The algorithm to use for causal discovery.
|
|
4101
|
+
*/
|
|
4102
|
+
export type DiscoveryAlgorithm = "PC" | "FCI";
|
|
4103
|
+
/**
|
|
4104
|
+
* The maximum number of bins for continuous variables.
|
|
4105
|
+
*/
|
|
4106
|
+
export type MaxDiscreteBins = number;
|
|
4107
|
+
/**
|
|
4108
|
+
* Discriminator for the CausalDiscoveryReceipt topology.
|
|
4109
|
+
*/
|
|
4110
|
+
export type TopologyClass125 = "causal_discovery_receipt";
|
|
4111
|
+
/**
|
|
4112
|
+
* Discriminator for the StructuralCausalGraphProfile topology.
|
|
4113
|
+
*/
|
|
4114
|
+
export type TopologyClass126 = "structural_causal_graph";
|
|
4115
|
+
/**
|
|
4116
|
+
* The directed edges of the causal graph.
|
|
4117
|
+
*/
|
|
4118
|
+
export type Edges1 = [unknown, unknown][];
|
|
4119
|
+
/**
|
|
4120
|
+
* The nodes of the causal graph.
|
|
4121
|
+
*/
|
|
4122
|
+
export type Nodes13 = string[];
|
|
4123
|
+
/**
|
|
4124
|
+
* The algorithm that was used.
|
|
4125
|
+
*/
|
|
4126
|
+
export type DiscoveryAlgorithmUsed = string;
|
|
4127
|
+
/**
|
|
4128
|
+
* Discriminator for the DoWhyEstimationIntent topology.
|
|
4129
|
+
*/
|
|
4130
|
+
export type TopologyClass127 = "dowhy_estimation_intent";
|
|
4131
|
+
/**
|
|
4132
|
+
* The treatment variable.
|
|
4133
|
+
*/
|
|
4134
|
+
export type Treatment = string;
|
|
4135
|
+
/**
|
|
4136
|
+
* The outcome variable.
|
|
4137
|
+
*/
|
|
4138
|
+
export type Outcome = string;
|
|
4139
|
+
/**
|
|
4140
|
+
* Discriminator for the DoWhyEstimationReceipt topology.
|
|
4141
|
+
*/
|
|
4142
|
+
export type TopologyClass128 = "dowhy_estimation_receipt";
|
|
4143
|
+
/**
|
|
4144
|
+
* The identified causal estimand.
|
|
4145
|
+
*/
|
|
4146
|
+
export type IdentifiedEstimand = string;
|
|
4147
|
+
/**
|
|
4148
|
+
* The estimated average treatment effect.
|
|
4149
|
+
*/
|
|
4150
|
+
export type AverageTreatmentEffect = number;
|
|
4151
|
+
/**
|
|
4152
|
+
* The p-value of the refutation test.
|
|
4153
|
+
*/
|
|
4154
|
+
export type RefutationPValue = number;
|
|
4155
|
+
/**
|
|
4156
|
+
* Discriminator for the EconMLCATEIntent topology.
|
|
4157
|
+
*/
|
|
4158
|
+
export type TopologyClass129 = "econml_cate_intent";
|
|
4159
|
+
/**
|
|
4160
|
+
* The features to condition the treatment effect on.
|
|
4161
|
+
*/
|
|
4162
|
+
export type Features = string[];
|
|
4163
|
+
/**
|
|
4164
|
+
* Discriminator for the HTEEstimationReceipt topology.
|
|
4165
|
+
*/
|
|
4166
|
+
export type TopologyClass130 = "hte_estimation_receipt";
|
|
4167
|
+
/**
|
|
4168
|
+
* The features conditioned on.
|
|
4169
|
+
*/
|
|
4170
|
+
export type Features1 = string[];
|
|
4171
|
+
/**
|
|
4172
|
+
* The conditional average treatment effect.
|
|
4173
|
+
*/
|
|
4174
|
+
export type CateEstimate = number;
|
|
4251
4175
|
/**
|
|
4252
4176
|
* A discriminated union of workflow topologies.
|
|
4253
4177
|
*/
|
|
@@ -4256,7 +4180,7 @@ export type AnyTransitionEdge = TransitionEdgeProfile | CyclicEdgeProfile;
|
|
|
4256
4180
|
/**
|
|
4257
4181
|
* Discriminator type for an acyclic edge.
|
|
4258
4182
|
*/
|
|
4259
|
-
export type
|
|
4183
|
+
export type TopologyClass131 = "acyclic";
|
|
4260
4184
|
/**
|
|
4261
4185
|
* The coinductive pointer to the destination capability.
|
|
4262
4186
|
*/
|
|
@@ -4288,7 +4212,7 @@ export type ComputeWeightMagnitude = number;
|
|
|
4288
4212
|
/**
|
|
4289
4213
|
* Discriminator type for a cyclic edge.
|
|
4290
4214
|
*/
|
|
4291
|
-
export type
|
|
4215
|
+
export type TopologyClass132 = "cyclic";
|
|
4292
4216
|
/**
|
|
4293
4217
|
* The coinductive pointer to the destination capability.
|
|
4294
4218
|
*/
|
|
@@ -5182,7 +5106,7 @@ export type SubjectNodeCid = string;
|
|
|
5182
5106
|
export type ObjectNodeCid = string;
|
|
5183
5107
|
export type PredicateCurie1 = string;
|
|
5184
5108
|
/**
|
|
5185
|
-
* The
|
|
5109
|
+
* The DoWhy directionality of the semantic relationship.
|
|
5186
5110
|
*/
|
|
5187
5111
|
export type CausalRelationship = "causes" | "confounds" | "correlates_with" | "undirected";
|
|
5188
5112
|
/**
|
|
@@ -5350,7 +5274,10 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5350
5274
|
CapabilityPointerState?: CapabilityPointerState;
|
|
5351
5275
|
CausalAttributionState?: CausalAttributionState;
|
|
5352
5276
|
CausalDirectedEdgeState?: CausalDirectedEdgeState;
|
|
5277
|
+
CausalDiscoveryIntent?: CausalDiscoveryIntent;
|
|
5278
|
+
CausalDiscoveryReceipt?: CausalDiscoveryReceipt;
|
|
5353
5279
|
CausalExplanationEvent?: CausalExplanationEvent;
|
|
5280
|
+
CausalGraphDefinition?: CausalGraphDefinition;
|
|
5354
5281
|
CausalIntervalProfile?: CausalIntervalProfile;
|
|
5355
5282
|
CausalPropagationIntent?: CausalPropagationIntent;
|
|
5356
5283
|
CircuitBreakerEvent?: CircuitBreakerEvent;
|
|
@@ -5408,6 +5335,9 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5408
5335
|
DistributionProfile?: DistributionProfile;
|
|
5409
5336
|
DistributionShapeProfile?: DistributionShapeProfile;
|
|
5410
5337
|
DiversityPolicy?: DiversityPolicy;
|
|
5338
|
+
DoWhyEstimationIntent?: DoWhyEstimationIntent;
|
|
5339
|
+
DoWhyEstimationReceipt?: DoWhyEstimationReceipt;
|
|
5340
|
+
DoWhyInterventionIntent?: DoWhyInterventionIntent;
|
|
5411
5341
|
DocumentKnowledgeGraphManifest?: DocumentKnowledgeGraphManifest;
|
|
5412
5342
|
DocumentLayoutManifest?: DocumentLayoutManifest;
|
|
5413
5343
|
DocumentLayoutRegionState?: DocumentLayoutRegionState;
|
|
@@ -5416,6 +5346,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5416
5346
|
DynamicLayoutManifest?: DynamicLayoutManifest;
|
|
5417
5347
|
DynamicManifoldProjectionManifest?: DynamicManifoldProjectionManifest1;
|
|
5418
5348
|
DynamicRoutingManifest?: DynamicRoutingManifest;
|
|
5349
|
+
EconMLCATEIntent?: EconMLCATEIntent;
|
|
5419
5350
|
EdgeMappingContract?: EdgeMappingContract;
|
|
5420
5351
|
EmbodiedSensoryVectorProfile?: EmbodiedSensoryVectorProfile;
|
|
5421
5352
|
EmpiricalFalsificationContract?: EmpiricalFalsificationContract;
|
|
@@ -5490,6 +5421,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5490
5421
|
GrammarPanelProfile?: GrammarPanelProfile1;
|
|
5491
5422
|
GraphFlatteningPolicy?: GraphFlatteningPolicy;
|
|
5492
5423
|
GuardrailViolationEvent?: GuardrailViolationEvent;
|
|
5424
|
+
HTEEstimationReceipt?: HTEEstimationReceipt;
|
|
5493
5425
|
HTTPTransportProfile?: HTTPTransportProfile;
|
|
5494
5426
|
HardwareEnclaveReceipt?: HardwareEnclaveReceipt;
|
|
5495
5427
|
HierarchicalDOMManifest?: HierarchicalDOMManifest;
|
|
@@ -5508,7 +5440,6 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5508
5440
|
InterventionIntent?: InterventionIntent;
|
|
5509
5441
|
InterventionPolicy?: InterventionPolicy;
|
|
5510
5442
|
InterventionReceipt?: InterventionReceipt;
|
|
5511
|
-
InterventionalCausalTask?: InterventionalCausalTask;
|
|
5512
5443
|
JSONRPCErrorResponseState?: JSONRPCErrorResponseState;
|
|
5513
5444
|
JSONRPCErrorState?: JSONRPCErrorState1;
|
|
5514
5445
|
JsonPrimitiveState?: JsonPrimitiveState;
|
|
@@ -5629,7 +5560,7 @@ export interface CoReasonSharedKernelOntology {
|
|
|
5629
5560
|
StochasticTopologyManifest?: StochasticTopologyManifest;
|
|
5630
5561
|
StrategicThoughtNodeIntent?: StrategicThoughtNodeIntent;
|
|
5631
5562
|
StreamingDisfluencyContract?: StreamingDisfluencyContract;
|
|
5632
|
-
StructuralCausalGraphProfile?:
|
|
5563
|
+
StructuralCausalGraphProfile?: StructuralCausalGraphProfile2;
|
|
5633
5564
|
SubstrateHydrationManifest?: SubstrateHydrationManifest;
|
|
5634
5565
|
SwarmTopologyManifest?: SwarmTopologyManifest;
|
|
5635
5566
|
SyntheticGenerationProfile?: SyntheticGenerationProfile;
|
|
@@ -5824,7 +5755,6 @@ export interface EpistemicProxyStateAny {
|
|
|
5824
5755
|
*/
|
|
5825
5756
|
export interface AdjudicationReceipt {
|
|
5826
5757
|
event_cid: EventCid;
|
|
5827
|
-
prior_event_hash?: PriorEventHash;
|
|
5828
5758
|
timestamp: Timestamp;
|
|
5829
5759
|
topology_class?: TopologyClass1;
|
|
5830
5760
|
rubric_cid: RubricCid;
|
|
@@ -6048,11 +5978,11 @@ export interface AnchoringPolicy {
|
|
|
6048
5978
|
*
|
|
6049
5979
|
* AGENT INSTRUCTION: Defines the discrete formalization of a Gibsonian Affordance within the agent's Reinforcement Learning Action Space ($A$). As a ...Manifest suffix, this is a declarative, frozen N-dimensional coordinate of a capability.
|
|
6050
5980
|
*
|
|
6051
|
-
* CAUSAL AFFORDANCE: Unlocks a specific, localized
|
|
5981
|
+
* CAUSAL AFFORDANCE: Unlocks a specific, localized DoWhy Do-Operator intervention ($do(X=x)$) mapped to an external kinetic capability. Governed by side_effects, permissions, and an optional execution SLA.
|
|
6052
5982
|
*
|
|
6053
5983
|
* EPISTEMIC BOUNDS: The operational perimeter is rigidly confined by `input_schema` and `output_schema` (dictionaries bounded to `max_length=1000` properties). The `is_preemptible` boolean (default=False) establishes a physical Halting Problem limit by authorizing the orchestrator to abort execution mid-flight.
|
|
6054
5984
|
*
|
|
6055
|
-
* MCP ROUTING TRIGGERS: Gibsonian Affordance, MDP Action Space,
|
|
5985
|
+
* MCP ROUTING TRIGGERS: Gibsonian Affordance, MDP Action Space, DoWhy Do-Operator, Capability-Based Security, Halting Problem
|
|
6056
5986
|
*/
|
|
6057
5987
|
export interface SpatialToolManifest {
|
|
6058
5988
|
topology_class?: TopologyClass5;
|
|
@@ -6831,7 +6761,7 @@ export interface VectorEmbeddingState2 {
|
|
|
6831
6761
|
* suffix, this object defines rigid mathematical boundaries that the orchestrator must
|
|
6832
6762
|
* enforce globally.
|
|
6833
6763
|
*
|
|
6834
|
-
* CAUSAL AFFORDANCE: Restricts graph hopping algorithms to explicit
|
|
6764
|
+
* CAUSAL AFFORDANCE: Restricts graph hopping algorithms to explicit PyWhy/DoWhy edge types
|
|
6835
6765
|
* (Literal["causes", "confounds", "correlates_with", "undirected"]), mathematically
|
|
6836
6766
|
* preventing epistemic drift and hallucination during deep multi-hop retrieval.
|
|
6837
6767
|
*
|
|
@@ -6840,7 +6770,7 @@ export interface VectorEmbeddingState2 {
|
|
|
6840
6770
|
* allowed_causal_relationships (min_length=1) to guarantee RFC 8785 canonical hashing.
|
|
6841
6771
|
* Geometric distance preservation is toggled via enforce_isometry (default=True).
|
|
6842
6772
|
*
|
|
6843
|
-
* MCP ROUTING TRIGGERS: Directed Acyclic Graph,
|
|
6773
|
+
* MCP ROUTING TRIGGERS: Directed Acyclic Graph, DoWhy Traversal, Isometry Preservation,
|
|
6844
6774
|
* Random Walk with Restart
|
|
6845
6775
|
*/
|
|
6846
6776
|
export interface TopologicalRetrievalContract {
|
|
@@ -7107,11 +7037,11 @@ export interface QuarantineIntent {
|
|
|
7107
7037
|
*
|
|
7108
7038
|
* AGENT INSTRUCTION: Implements Supervisory Control Theory (Ramadge & Wonham) for Discrete-Event Systems, acting as a formal Mixed-Initiative Control mechanism.
|
|
7109
7039
|
*
|
|
7110
|
-
* CAUSAL AFFORDANCE: Physically halts the active Directed Acyclic Graph (DAG) traversal or Petri Net reachability loop, preventing the swarm from committing a state transition until an explicit, authorized
|
|
7040
|
+
* CAUSAL AFFORDANCE: Physically halts the active Directed Acyclic Graph (DAG) traversal or Petri Net reachability loop, preventing the swarm from committing a state transition until an explicit, authorized DoWhy intervention is negotiated by the human supervisor.
|
|
7111
7041
|
*
|
|
7112
7042
|
* EPISTEMIC BOUNDS: Execution suspension is rigorously bounded by the temporal logic of the `adjudication_deadline` (a float representing a UNIX timestamp) and the attached FallbackSLA. The `proposed_action` schema is clamped against deep recursion constraints.
|
|
7113
7043
|
*
|
|
7114
|
-
* MCP ROUTING TRIGGERS: Supervisory Control Theory, Mixed-Initiative System, Discrete-Event System, Bounded Delay,
|
|
7044
|
+
* MCP ROUTING TRIGGERS: Supervisory Control Theory, Mixed-Initiative System, Discrete-Event System, Bounded Delay, DoWhy Intervention
|
|
7115
7045
|
*/
|
|
7116
7046
|
export interface InterventionIntent {
|
|
7117
7047
|
topology_class?: TopologyClass34;
|
|
@@ -7281,11 +7211,11 @@ export interface FallbackIntent {
|
|
|
7281
7211
|
*
|
|
7282
7212
|
* AGENT INSTRUCTION: A Dictatorial Byzantine Fault Resolution mechanism. It is an absolute, zero-trust kinetic override that violently preempts autonomous algorithmic consensus or prediction market resolution.
|
|
7283
7213
|
*
|
|
7284
|
-
* CAUSAL AFFORDANCE: Forces an absolute
|
|
7214
|
+
* CAUSAL AFFORDANCE: Forces an absolute DoWhy do-operator intervention ($do(X=x)$). Physically shatters the active causal chain of the `target_node_cid` and forcibly injects the `override_action` payload into the state vector, bypassing decentralized voting.
|
|
7285
7215
|
*
|
|
7286
7216
|
* EPISTEMIC BOUNDS: The blast radius is strictly confined to the `target_node_cid`. The orchestrator must mathematically verify the `authorized_node_cid` against the highest-tier W3C DID enterprise clearance before allowing the payload to overwrite the Epistemic Blackboard (`override_action` bounded `max_length=1000`).
|
|
7287
7217
|
*
|
|
7288
|
-
* MCP ROUTING TRIGGERS: Dictatorial Override, Byzantine Fault Resolution,
|
|
7218
|
+
* MCP ROUTING TRIGGERS: Dictatorial Override, Byzantine Fault Resolution, DoWhy Intervention, Causal Shattering, Zero-Trust Override
|
|
7289
7219
|
*/
|
|
7290
7220
|
export interface OverrideIntent {
|
|
7291
7221
|
topology_class?: TopologyClass37;
|
|
@@ -7311,11 +7241,11 @@ export interface OverrideAction {
|
|
|
7311
7241
|
*
|
|
7312
7242
|
* AGENT INSTRUCTION: Represents a non-monotonic structural revision trigger within a Defeasible Logic framework, engineered to adapt the GovernancePolicy to out-of-distribution environments.
|
|
7313
7243
|
*
|
|
7314
|
-
* CAUSAL AFFORDANCE: Triggers an active topological mutation (
|
|
7244
|
+
* CAUSAL AFFORDANCE: Triggers an active topological mutation (DoWhy intervention) to resolve logical friction, applying a strict RFC 6902 JSON Patch (`proposed_patch`) to the underlying alignment manifold.
|
|
7315
7245
|
*
|
|
7316
7246
|
* EPISTEMIC BOUNDS: Cryptographically anchored to the specific `drift_event_cid` (regex bounded CID `^[a-zA-Z0-9_.:-]+$`) that mathematically justified the revision. The payload is constrained to a JSON Schema object (`proposed_patch`).
|
|
7317
7247
|
*
|
|
7318
|
-
* MCP ROUTING TRIGGERS: Defeasible Logic, Non-Monotonic Revision, Out-of-Distribution Adaptation, Normative Drift Resolution,
|
|
7248
|
+
* MCP ROUTING TRIGGERS: Defeasible Logic, Non-Monotonic Revision, Out-of-Distribution Adaptation, Normative Drift Resolution, DoWhy Intervention
|
|
7319
7249
|
*/
|
|
7320
7250
|
export interface ConstitutionalAmendmentIntent {
|
|
7321
7251
|
topology_class?: TopologyClass38;
|
|
@@ -7579,11 +7509,11 @@ export interface EvidentiaryGroundingSLA {
|
|
|
7579
7509
|
* regret simulation.
|
|
7580
7510
|
*
|
|
7581
7511
|
* EPISTEMIC BOUNDS: The edge_class physically restricts topological connections
|
|
7582
|
-
* to the
|
|
7512
|
+
* to the DoWhy Literal automaton ["direct_cause", "confounder", "collider",
|
|
7583
7513
|
* "mediator"]. The source_variable and target_variable are bounded by
|
|
7584
7514
|
* min_length=1 (no max_length) to prevent ghost pointer allocation.
|
|
7585
7515
|
*
|
|
7586
|
-
* MCP ROUTING TRIGGERS: Structural Causal Models,
|
|
7516
|
+
* MCP ROUTING TRIGGERS: Structural Causal Models, PyWhy/DoWhy Causality,
|
|
7587
7517
|
* d-separation, Do-Calculus, Directed Edge
|
|
7588
7518
|
*/
|
|
7589
7519
|
export interface CausalDirectedEdgeState {
|
|
@@ -7786,14 +7716,12 @@ export interface ContextualizedSourceState2 {
|
|
|
7786
7716
|
/**
|
|
7787
7717
|
* CoReason Shared Kernel Ontology
|
|
7788
7718
|
*/
|
|
7789
|
-
export interface
|
|
7719
|
+
export interface DoWhyInterventionIntent {
|
|
7790
7720
|
topology_class?: TopologyClass51;
|
|
7791
7721
|
task_cid: TaskCid5;
|
|
7792
|
-
|
|
7793
|
-
|
|
7794
|
-
|
|
7795
|
-
expected_causal_information_gain: ExpectedCausalInformationGain;
|
|
7796
|
-
execution_cost_budget_magnitude: ExecutionCostBudgetMagnitude2;
|
|
7722
|
+
treatment_variable: TreatmentVariable;
|
|
7723
|
+
outcome_variable: OutcomeVariable;
|
|
7724
|
+
common_causes?: CommonCauses;
|
|
7797
7725
|
}
|
|
7798
7726
|
/**
|
|
7799
7727
|
* CoReason Shared Kernel Ontology
|
|
@@ -8112,9 +8040,9 @@ export interface CognitiveAgentNodeProfile {
|
|
|
8112
8040
|
*/
|
|
8113
8041
|
analogical_policy?: AnalogicalMappingTask | null;
|
|
8114
8042
|
/**
|
|
8115
|
-
* The formal contract authorizing the agent to mutate variables to prove
|
|
8043
|
+
* The formal contract authorizing the agent to mutate variables to prove PyWhy/DoWhy causation.
|
|
8116
8044
|
*/
|
|
8117
|
-
interventional_policy?:
|
|
8045
|
+
interventional_policy?: DoWhyInterventionIntent | null;
|
|
8118
8046
|
/**
|
|
8119
8047
|
* The API-like contract allowing the agent to offload rigid logic to deterministic CPU solvers.
|
|
8120
8048
|
*/
|
|
@@ -9389,7 +9317,7 @@ export interface PredictionMarketState {
|
|
|
9389
9317
|
*/
|
|
9390
9318
|
export interface HypothesisStakeReceipt {
|
|
9391
9319
|
agent_cid: AgentCid1;
|
|
9392
|
-
target_hypothesis_cid:
|
|
9320
|
+
target_hypothesis_cid: TargetHypothesisCid1;
|
|
9393
9321
|
staked_magnitude: StakedMagnitude;
|
|
9394
9322
|
implied_probability: ImpliedProbability;
|
|
9395
9323
|
}
|
|
@@ -10513,7 +10441,6 @@ export interface VectorClock {
|
|
|
10513
10441
|
export interface MCPToolDefinition {
|
|
10514
10442
|
topology_class?: TopologyClass83;
|
|
10515
10443
|
event_cid?: EventCid1;
|
|
10516
|
-
prior_event_hash?: PriorEventHash1;
|
|
10517
10444
|
timestamp?: Timestamp1;
|
|
10518
10445
|
name: Name;
|
|
10519
10446
|
description: Description9;
|
|
@@ -10538,7 +10465,6 @@ export interface Inputschema {
|
|
|
10538
10465
|
*/
|
|
10539
10466
|
export interface CrosswalkResolutionReceipt {
|
|
10540
10467
|
event_cid: EventCid2;
|
|
10541
|
-
prior_event_hash?: PriorEventHash2;
|
|
10542
10468
|
timestamp: Timestamp2;
|
|
10543
10469
|
topology_class?: TopologyClass84;
|
|
10544
10470
|
receipt_cid: ReceiptCid;
|
|
@@ -10583,7 +10509,6 @@ export interface DempsterShaferBeliefVector1 {
|
|
|
10583
10509
|
*/
|
|
10584
10510
|
export interface EpistemicZeroTrustReceipt {
|
|
10585
10511
|
event_cid: EventCid3;
|
|
10586
|
-
prior_event_hash?: PriorEventHash3;
|
|
10587
10512
|
timestamp: Timestamp3;
|
|
10588
10513
|
topology_class?: TopologyClass85;
|
|
10589
10514
|
intent_reference_cid: IntentReferenceCid;
|
|
@@ -10605,7 +10530,6 @@ export interface EpistemicZeroTrustReceipt {
|
|
|
10605
10530
|
*/
|
|
10606
10531
|
export interface ObservationEvent {
|
|
10607
10532
|
event_cid: EventCid4;
|
|
10608
|
-
prior_event_hash?: PriorEventHash4;
|
|
10609
10533
|
timestamp: Timestamp4;
|
|
10610
10534
|
topology_class?: TopologyClass86;
|
|
10611
10535
|
payload: Payload;
|
|
@@ -10799,7 +10723,7 @@ export interface StreamingDisfluencyContract {
|
|
|
10799
10723
|
/**
|
|
10800
10724
|
* CoReason Shared Kernel Ontology
|
|
10801
10725
|
*
|
|
10802
|
-
* AGENT INSTRUCTION: Formalizes Bayesian Belief Updating and
|
|
10726
|
+
* AGENT INSTRUCTION: Formalizes Bayesian Belief Updating and PyWhy/DoWhy Causal Tracing by synthesizing internal cognitive shifts into discrete, hashable facts.
|
|
10803
10727
|
*
|
|
10804
10728
|
* CAUSAL AFFORDANCE: Projects a synthesized conclusion into the shared topology, binding the new belief to `causal_attributions`.
|
|
10805
10729
|
*
|
|
@@ -10809,7 +10733,6 @@ export interface StreamingDisfluencyContract {
|
|
|
10809
10733
|
*/
|
|
10810
10734
|
export interface BeliefMutationEvent {
|
|
10811
10735
|
event_cid: EventCid5;
|
|
10812
|
-
prior_event_hash?: PriorEventHash5;
|
|
10813
10736
|
timestamp: Timestamp5;
|
|
10814
10737
|
topology_class?: TopologyClass89;
|
|
10815
10738
|
payload: Payload1;
|
|
@@ -10849,7 +10772,7 @@ export interface Payload1 {
|
|
|
10849
10772
|
/**
|
|
10850
10773
|
* CoReason Shared Kernel Ontology
|
|
10851
10774
|
*
|
|
10852
|
-
* AGENT INSTRUCTION: Formalizes
|
|
10775
|
+
* AGENT INSTRUCTION: Formalizes PyWhy/DoWhy causal tracing, linking a localized cognitive
|
|
10853
10776
|
* synthesis back to its historical Merkle-DAG origin. As a ...State suffix, this is a
|
|
10854
10777
|
* declarative, frozen snapshot of a causal connection at a point in time.
|
|
10855
10778
|
*
|
|
@@ -10860,7 +10783,7 @@ export interface Payload1 {
|
|
|
10860
10783
|
* probability distribution (ge=0.0, le=1.0). The source_event_cid is locked to a 128-char
|
|
10861
10784
|
* CID regex (^[a-zA-Z0-9_.:-]+$).
|
|
10862
10785
|
*
|
|
10863
|
-
* MCP ROUTING TRIGGERS:
|
|
10786
|
+
* MCP ROUTING TRIGGERS: PyWhy/DoWhy Causal Tracing, Directed Acyclic Graph, Causal Lineage,
|
|
10864
10787
|
* Attention Weighting, Influence Distribution
|
|
10865
10788
|
*/
|
|
10866
10789
|
export interface CausalAttributionState {
|
|
@@ -10870,13 +10793,13 @@ export interface CausalAttributionState {
|
|
|
10870
10793
|
/**
|
|
10871
10794
|
* CoReason Shared Kernel Ontology
|
|
10872
10795
|
*
|
|
10873
|
-
* AGENT INSTRUCTION: Formalizes
|
|
10796
|
+
* AGENT INSTRUCTION: Formalizes PyWhy/DoWhy Structural Causal Models (SCMs) and Variational Free Energy to mathematically quantify and partition irreducible aleatoric noise from actionable epistemic knowledge gaps.
|
|
10874
10797
|
*
|
|
10875
|
-
* CAUSAL AFFORDANCE: Unlocks non-monotonic logic via
|
|
10798
|
+
* CAUSAL AFFORDANCE: Unlocks non-monotonic logic via DoWhy do-operators, computing exactly when to trigger a structural abductive escalation or active inference loop via the `requires_abductive_escalation` flag.
|
|
10876
10799
|
*
|
|
10877
10800
|
* EPISTEMIC BOUNDS: Enforces absolute mathematical float boundaries `[ge=0.0, le=1.0]` on `aleatoric_entropy`, `epistemic_uncertainty`, and `semantic_consistency_score`, mathematically preventing probability wave overflow across all three continuous dimensions.
|
|
10878
10801
|
*
|
|
10879
|
-
* MCP ROUTING TRIGGERS: Structural Causal Models, Active Inference, Variational Free Energy, Aleatoric Entropy,
|
|
10802
|
+
* MCP ROUTING TRIGGERS: Structural Causal Models, Active Inference, Variational Free Energy, Aleatoric Entropy, DoWhy Do-Calculus
|
|
10880
10803
|
*/
|
|
10881
10804
|
export interface CognitiveUncertaintyProfile1 {
|
|
10882
10805
|
aleatoric_noise_ratio: AleatoricNoiseRatio;
|
|
@@ -10924,7 +10847,6 @@ export interface LatentScratchpadReceipt {
|
|
|
10924
10847
|
*/
|
|
10925
10848
|
export interface SystemFaultEvent {
|
|
10926
10849
|
event_cid: EventCid6;
|
|
10927
|
-
prior_event_hash?: PriorEventHash6;
|
|
10928
10850
|
timestamp: Timestamp6;
|
|
10929
10851
|
topology_class?: TopologyClass90;
|
|
10930
10852
|
}
|
|
@@ -10942,7 +10864,6 @@ export interface SystemFaultEvent {
|
|
|
10942
10864
|
export interface AtomicPropositionState {
|
|
10943
10865
|
topology_class?: TopologyClass91;
|
|
10944
10866
|
event_cid: EventCid7;
|
|
10945
|
-
prior_event_hash?: PriorEventHash7;
|
|
10946
10867
|
timestamp: Timestamp7;
|
|
10947
10868
|
proposition_cid: PropositionCid;
|
|
10948
10869
|
rhetorical_role: RhetoricalStructureProfile;
|
|
@@ -10983,7 +10904,6 @@ export interface EmpiricalStatisticalProfile {
|
|
|
10983
10904
|
export interface PostCoordinatedSemanticState {
|
|
10984
10905
|
topology_class?: TopologyClass92;
|
|
10985
10906
|
event_cid: EventCid8;
|
|
10986
|
-
prior_event_hash?: PriorEventHash8;
|
|
10987
10907
|
timestamp: Timestamp8;
|
|
10988
10908
|
concept_cid: ConceptCid;
|
|
10989
10909
|
/**
|
|
@@ -11013,7 +10933,6 @@ export interface ContextualModifiers {
|
|
|
11013
10933
|
*/
|
|
11014
10934
|
export interface ArtifactCorruptionEvent {
|
|
11015
10935
|
event_cid: EventCid9;
|
|
11016
|
-
prior_event_hash?: PriorEventHash9;
|
|
11017
10936
|
timestamp: Timestamp9;
|
|
11018
10937
|
topology_class?: TopologyClass93;
|
|
11019
10938
|
artifact_cid: ArtifactCid;
|
|
@@ -11033,7 +10952,6 @@ export interface ArtifactCorruptionEvent {
|
|
|
11033
10952
|
*/
|
|
11034
10953
|
export interface HypothesisGenerationEvent {
|
|
11035
10954
|
event_cid: EventCid10;
|
|
11036
|
-
prior_event_hash?: PriorEventHash10;
|
|
11037
10955
|
timestamp: Timestamp10;
|
|
11038
10956
|
topology_class?: TopologyClass94;
|
|
11039
10957
|
hypothesis_cid: HypothesisCid;
|
|
@@ -11044,23 +10962,22 @@ export interface HypothesisGenerationEvent {
|
|
|
11044
10962
|
/**
|
|
11045
10963
|
* The formal DAG representing the agent's structural assumptions about the environment.
|
|
11046
10964
|
*/
|
|
11047
|
-
causal_model?:
|
|
10965
|
+
causal_model?: CausalGraphDefinition | null;
|
|
11048
10966
|
}
|
|
11049
10967
|
/**
|
|
11050
10968
|
* CoReason Shared Kernel Ontology
|
|
11051
10969
|
*
|
|
11052
|
-
* AGENT INSTRUCTION:
|
|
10970
|
+
* AGENT INSTRUCTION: Generic graph representation compatible with DoWhy (PyWhy).
|
|
11053
10971
|
*
|
|
11054
|
-
* CAUSAL AFFORDANCE:
|
|
10972
|
+
* CAUSAL AFFORDANCE: Allows DoWhy to initialize a CausalModel using standardized DOT/GML strings or generic node/edge dictionaries.
|
|
11055
10973
|
*
|
|
11056
|
-
* EPISTEMIC BOUNDS:
|
|
10974
|
+
* EPISTEMIC BOUNDS: Bounded to strict constraints on string length for DOT/GML inputs to prevent buffer overflows during DoWhy parsing.
|
|
11057
10975
|
*
|
|
11058
|
-
* MCP ROUTING TRIGGERS:
|
|
10976
|
+
* MCP ROUTING TRIGGERS: DoWhy, PyWhy, Causal Graph, DOT, GML, CausalModel
|
|
11059
10977
|
*/
|
|
11060
|
-
export interface
|
|
11061
|
-
|
|
11062
|
-
|
|
11063
|
-
causal_edges: CausalEdges1;
|
|
10978
|
+
export interface CausalGraphDefinition {
|
|
10979
|
+
graph_format: GraphFormat;
|
|
10980
|
+
graph_payload: GraphPayload;
|
|
11064
10981
|
}
|
|
11065
10982
|
/**
|
|
11066
10983
|
* CoReason Shared Kernel Ontology
|
|
@@ -11075,7 +10992,6 @@ export interface StructuralCausalGraphProfile {
|
|
|
11075
10992
|
*/
|
|
11076
10993
|
export interface BargeInInterruptEvent {
|
|
11077
10994
|
event_cid: EventCid11;
|
|
11078
|
-
prior_event_hash?: PriorEventHash11;
|
|
11079
10995
|
timestamp: Timestamp11;
|
|
11080
10996
|
topology_class?: TopologyClass95;
|
|
11081
10997
|
target_event_cid: TargetEventCid1;
|
|
@@ -11089,17 +11005,16 @@ export interface BargeInInterruptEvent {
|
|
|
11089
11005
|
/**
|
|
11090
11006
|
* CoReason Shared Kernel Ontology
|
|
11091
11007
|
*
|
|
11092
|
-
* AGENT INSTRUCTION: Employs Counterfactual Regret Minimization (CFR) and
|
|
11008
|
+
* AGENT INSTRUCTION: Employs Counterfactual Regret Minimization (CFR) and DoWhy Do-Calculus to execute simulated alternative timelines for policy refinement.
|
|
11093
11009
|
*
|
|
11094
11010
|
* CAUSAL AFFORDANCE: Commits a simulated causal divergence (intervention) into the ledger, mathematically quantifying the opportunity cost (regret) to backpropagate stateless adjustments to the routing policy.
|
|
11095
11011
|
*
|
|
11096
11012
|
* EPISTEMIC BOUNDS: Anchored to `historical_event_cid` (128-char CID). Expected utilities and `epistemic_regret` are physically capped at `le=18446744073709551615.0`. `policy_mutation_gradients` restrict tensor adjustments.
|
|
11097
11013
|
*
|
|
11098
|
-
* MCP ROUTING TRIGGERS: Counterfactual Regret Minimization,
|
|
11014
|
+
* MCP ROUTING TRIGGERS: Counterfactual Regret Minimization, DoWhy Do-Calculus, Opportunity Cost, Alternative Timeline, Policy Gradient Update
|
|
11099
11015
|
*/
|
|
11100
11016
|
export interface CounterfactualRegretEvent {
|
|
11101
11017
|
event_cid: EventCid12;
|
|
11102
|
-
prior_event_hash?: PriorEventHash12;
|
|
11103
11018
|
timestamp: Timestamp12;
|
|
11104
11019
|
topology_class?: TopologyClass96;
|
|
11105
11020
|
historical_event_cid: HistoricalEventCid;
|
|
@@ -11124,11 +11039,10 @@ export interface PolicyMutationGradients {
|
|
|
11124
11039
|
*
|
|
11125
11040
|
* EPISTEMIC BOUNDS: `parameters` payload is volumetrically capped by `enforce_payload_topology`. To prevent infinite compute loops, `authorized_budget_magnitude` is mandated `ge=1`. `zk_proof` serves as mathematical authorization proof.
|
|
11126
11041
|
*
|
|
11127
|
-
* MCP ROUTING TRIGGERS:
|
|
11042
|
+
* MCP ROUTING TRIGGERS: DoWhy Do-Operator, Kinetic Commitment, Active Inference, Thermodynamic Escrow, Zero-Trust Actuation
|
|
11128
11043
|
*/
|
|
11129
11044
|
export interface ToolInvocationEvent {
|
|
11130
11045
|
event_cid: EventCid13;
|
|
11131
|
-
prior_event_hash?: PriorEventHash13;
|
|
11132
11046
|
timestamp: Timestamp13;
|
|
11133
11047
|
topology_class?: TopologyClass97;
|
|
11134
11048
|
tool_name: ToolName1;
|
|
@@ -11194,7 +11108,6 @@ export interface ZeroKnowledgeReceipt1 {
|
|
|
11194
11108
|
*/
|
|
11195
11109
|
export interface EpistemicPromotionEvent {
|
|
11196
11110
|
event_cid: EventCid14;
|
|
11197
|
-
prior_event_hash?: PriorEventHash14;
|
|
11198
11111
|
timestamp: Timestamp14;
|
|
11199
11112
|
topology_class?: TopologyClass98;
|
|
11200
11113
|
source_episodic_event_cids: SourceEpisodicEventCids;
|
|
@@ -11214,7 +11127,6 @@ export interface EpistemicPromotionEvent {
|
|
|
11214
11127
|
*/
|
|
11215
11128
|
export interface PersistenceCommitReceipt {
|
|
11216
11129
|
event_cid: EventCid15;
|
|
11217
|
-
prior_event_hash?: PriorEventHash15;
|
|
11218
11130
|
timestamp: Timestamp15;
|
|
11219
11131
|
topology_class?: TopologyClass99;
|
|
11220
11132
|
lakehouse_snapshot_cid: LakehouseSnapshotCid;
|
|
@@ -11234,7 +11146,6 @@ export interface PersistenceCommitReceipt {
|
|
|
11234
11146
|
*/
|
|
11235
11147
|
export interface TokenBurnReceipt {
|
|
11236
11148
|
event_cid: EventCid16;
|
|
11237
|
-
prior_event_hash?: PriorEventHash16;
|
|
11238
11149
|
timestamp: Timestamp16;
|
|
11239
11150
|
topology_class?: TopologyClass100;
|
|
11240
11151
|
tool_invocation_cid: ToolInvocationCid;
|
|
@@ -11255,7 +11166,6 @@ export interface TokenBurnReceipt {
|
|
|
11255
11166
|
*/
|
|
11256
11167
|
export interface BudgetExhaustionEvent {
|
|
11257
11168
|
event_cid: EventCid17;
|
|
11258
|
-
prior_event_hash?: PriorEventHash17;
|
|
11259
11169
|
timestamp: Timestamp17;
|
|
11260
11170
|
topology_class?: TopologyClass101;
|
|
11261
11171
|
exhausted_escrow_cid: ExhaustedEscrowCid;
|
|
@@ -11274,7 +11184,6 @@ export interface BudgetExhaustionEvent {
|
|
|
11274
11184
|
*/
|
|
11275
11185
|
export interface EpistemicTelemetryEvent {
|
|
11276
11186
|
event_cid: EventCid18;
|
|
11277
|
-
prior_event_hash?: PriorEventHash18;
|
|
11278
11187
|
timestamp: Timestamp18;
|
|
11279
11188
|
topology_class?: TopologyClass102;
|
|
11280
11189
|
interaction_modality: InteractionModality;
|
|
@@ -11298,7 +11207,6 @@ export interface EpistemicTelemetryEvent {
|
|
|
11298
11207
|
*/
|
|
11299
11208
|
export interface CognitivePredictionReceipt {
|
|
11300
11209
|
event_cid: EventCid19;
|
|
11301
|
-
prior_event_hash?: PriorEventHash19;
|
|
11302
11210
|
timestamp: Timestamp19;
|
|
11303
11211
|
topology_class?: TopologyClass103;
|
|
11304
11212
|
source_chain_cid: SourceChainCid;
|
|
@@ -11318,7 +11226,6 @@ export interface CognitivePredictionReceipt {
|
|
|
11318
11226
|
*/
|
|
11319
11227
|
export interface EpistemicAxiomVerificationReceipt {
|
|
11320
11228
|
event_cid: EventCid20;
|
|
11321
|
-
prior_event_hash?: PriorEventHash20;
|
|
11322
11229
|
timestamp: Timestamp20;
|
|
11323
11230
|
topology_class?: TopologyClass104;
|
|
11324
11231
|
source_prediction_cid: SourcePredictionCid;
|
|
@@ -11352,7 +11259,6 @@ export interface EpistemicAxiomVerificationReceipt {
|
|
|
11352
11259
|
*/
|
|
11353
11260
|
export interface EpistemicFlowStateReceipt {
|
|
11354
11261
|
event_cid: EventCid21;
|
|
11355
|
-
prior_event_hash?: PriorEventHash21;
|
|
11356
11262
|
timestamp: Timestamp21;
|
|
11357
11263
|
topology_class?: TopologyClass105;
|
|
11358
11264
|
source_trajectory_cid: SourceTrajectoryCid;
|
|
@@ -11381,7 +11287,6 @@ export interface EpistemicFlowStateReceipt {
|
|
|
11381
11287
|
*/
|
|
11382
11288
|
export interface CausalExplanationEvent {
|
|
11383
11289
|
event_cid: EventCid22;
|
|
11384
|
-
prior_event_hash?: PriorEventHash22;
|
|
11385
11290
|
timestamp: Timestamp22;
|
|
11386
11291
|
topology_class?: TopologyClass106;
|
|
11387
11292
|
target_outcome_event_cid: TargetOutcomeEventCid;
|
|
@@ -11445,7 +11350,6 @@ export interface ShapleyAttributionReceipt {
|
|
|
11445
11350
|
*/
|
|
11446
11351
|
export interface IntentClassificationReceipt {
|
|
11447
11352
|
event_cid: EventCid23;
|
|
11448
|
-
prior_event_hash?: PriorEventHash23;
|
|
11449
11353
|
timestamp: Timestamp23;
|
|
11450
11354
|
topology_class?: TopologyClass107;
|
|
11451
11355
|
raw_input_string: RawInputString;
|
|
@@ -11467,7 +11371,6 @@ export interface IntentClassificationReceipt {
|
|
|
11467
11371
|
export interface SemanticRelationalVectorState {
|
|
11468
11372
|
topology_class?: TopologyClass108;
|
|
11469
11373
|
event_cid: EventCid24;
|
|
11470
|
-
prior_event_hash?: PriorEventHash24;
|
|
11471
11374
|
timestamp: Timestamp24;
|
|
11472
11375
|
ontology_class: UpperOntologyClassProfile;
|
|
11473
11376
|
temporal_bounds: TemporalBoundsProfile1;
|
|
@@ -11512,7 +11415,6 @@ export interface PayloadInjectionZone {
|
|
|
11512
11415
|
export interface OntologicalReificationReceipt {
|
|
11513
11416
|
topology_class?: TopologyClass109;
|
|
11514
11417
|
event_cid: EventCid25;
|
|
11515
|
-
prior_event_hash?: PriorEventHash25;
|
|
11516
11418
|
timestamp: Timestamp25;
|
|
11517
11419
|
source_data_hash: SourceDataHash;
|
|
11518
11420
|
target_namespace: TargetNamespace;
|
|
@@ -11551,7 +11453,6 @@ export interface DempsterShaferBeliefVector2 {
|
|
|
11551
11453
|
*/
|
|
11552
11454
|
export interface CircuitBreakerEvent {
|
|
11553
11455
|
event_cid: EventCid26;
|
|
11554
|
-
prior_event_hash?: PriorEventHash26;
|
|
11555
11456
|
timestamp: Timestamp26;
|
|
11556
11457
|
topology_class?: TopologyClass110;
|
|
11557
11458
|
/**
|
|
@@ -11582,7 +11483,6 @@ export interface CircuitBreakerEvent {
|
|
|
11582
11483
|
*/
|
|
11583
11484
|
export interface ExogenousEpistemicEvent {
|
|
11584
11485
|
event_cid: EventCid27;
|
|
11585
|
-
prior_event_hash?: PriorEventHash27;
|
|
11586
11486
|
timestamp: Timestamp27;
|
|
11587
11487
|
topology_class?: TopologyClass111;
|
|
11588
11488
|
shock_cid: ShockCid;
|
|
@@ -11616,7 +11516,6 @@ export interface SimulationEscrowContract {
|
|
|
11616
11516
|
*/
|
|
11617
11517
|
export interface EpistemicLogEvent {
|
|
11618
11518
|
event_cid: EventCid28;
|
|
11619
|
-
prior_event_hash?: PriorEventHash28;
|
|
11620
11519
|
topology_class?: TopologyClass112;
|
|
11621
11520
|
timestamp: Timestamp28;
|
|
11622
11521
|
level: Level;
|
|
@@ -11650,7 +11549,6 @@ export interface TelemetryContextProfile {
|
|
|
11650
11549
|
export interface InterventionReceipt {
|
|
11651
11550
|
topology_class?: TopologyClass113;
|
|
11652
11551
|
event_cid: EventCid29;
|
|
11653
|
-
prior_event_hash?: PriorEventHash29;
|
|
11654
11552
|
timestamp: Timestamp29;
|
|
11655
11553
|
intervention_request_cid: InterventionRequestCid;
|
|
11656
11554
|
/**
|
|
@@ -11707,7 +11605,6 @@ export interface WetwareAttestationContract {
|
|
|
11707
11605
|
*/
|
|
11708
11606
|
export interface CustodyReceipt {
|
|
11709
11607
|
event_cid: EventCid30;
|
|
11710
|
-
prior_event_hash?: PriorEventHash30;
|
|
11711
11608
|
timestamp: Timestamp30;
|
|
11712
11609
|
topology_class?: TopologyClass114;
|
|
11713
11610
|
custody_cid: CustodyCid;
|
|
@@ -11730,7 +11627,6 @@ export interface CustodyReceipt {
|
|
|
11730
11627
|
*/
|
|
11731
11628
|
export interface DefeasibleAttackEvent {
|
|
11732
11629
|
event_cid: EventCid31;
|
|
11733
|
-
prior_event_hash?: PriorEventHash31;
|
|
11734
11630
|
timestamp: Timestamp31;
|
|
11735
11631
|
topology_class?: TopologyClass115;
|
|
11736
11632
|
attack_cid: AttackCid;
|
|
@@ -11754,7 +11650,6 @@ export interface DefeasibleAttackEvent {
|
|
|
11754
11650
|
*/
|
|
11755
11651
|
export interface EpistemicRejectionReceipt {
|
|
11756
11652
|
event_cid: EventCid32;
|
|
11757
|
-
prior_event_hash?: PriorEventHash32;
|
|
11758
11653
|
timestamp: Timestamp32;
|
|
11759
11654
|
topology_class?: TopologyClass116;
|
|
11760
11655
|
receipt_cid: ReceiptCid1;
|
|
@@ -11776,7 +11671,6 @@ export interface EpistemicRejectionReceipt {
|
|
|
11776
11671
|
*/
|
|
11777
11672
|
export interface FormalVerificationReceipt {
|
|
11778
11673
|
event_cid: EventCid33;
|
|
11779
|
-
prior_event_hash?: PriorEventHash33;
|
|
11780
11674
|
timestamp: Timestamp33;
|
|
11781
11675
|
topology_class?: TopologyClass117;
|
|
11782
11676
|
/**
|
|
@@ -11795,7 +11689,6 @@ export interface BeliefModulationReceipt {
|
|
|
11795
11689
|
topology_class?: TopologyClass118;
|
|
11796
11690
|
receipt_cid: ReceiptCid2;
|
|
11797
11691
|
event_cid: EventCid34;
|
|
11798
|
-
prior_event_hash?: PriorEventHash34;
|
|
11799
11692
|
timestamp: Timestamp34;
|
|
11800
11693
|
target_graph_cid: TargetGraphCid4;
|
|
11801
11694
|
grounded_edges: GroundedEdges;
|
|
@@ -11811,7 +11704,6 @@ export interface RDFExportReceipt {
|
|
|
11811
11704
|
topology_class?: TopologyClass119;
|
|
11812
11705
|
export_cid: ExportCid1;
|
|
11813
11706
|
event_cid: EventCid35;
|
|
11814
|
-
prior_event_hash?: PriorEventHash35;
|
|
11815
11707
|
timestamp: Timestamp35;
|
|
11816
11708
|
serialized_payload: SerializedPayload;
|
|
11817
11709
|
rdf_triple_count: RdfTripleCount;
|
|
@@ -11830,7 +11722,6 @@ export interface RDFExportReceipt {
|
|
|
11830
11722
|
*/
|
|
11831
11723
|
export interface EpistemicStarvationEvent {
|
|
11832
11724
|
event_cid: EventCid36;
|
|
11833
|
-
prior_event_hash?: PriorEventHash36;
|
|
11834
11725
|
timestamp: Timestamp36;
|
|
11835
11726
|
topology_class?: TopologyClass120;
|
|
11836
11727
|
starved_edge_cid: StarvedEdgeCid;
|
|
@@ -11850,7 +11741,6 @@ export interface EpistemicStarvationEvent {
|
|
|
11850
11741
|
*/
|
|
11851
11742
|
export interface SPARQLQueryResultReceipt {
|
|
11852
11743
|
event_cid: EventCid37;
|
|
11853
|
-
prior_event_hash?: PriorEventHash37;
|
|
11854
11744
|
timestamp: Timestamp37;
|
|
11855
11745
|
topology_class?: TopologyClass121;
|
|
11856
11746
|
query_intent_cid: QueryIntentCid;
|
|
@@ -11894,7 +11784,6 @@ export interface OracleExecutionReceipt {
|
|
|
11894
11784
|
*/
|
|
11895
11785
|
export interface GuardrailViolationEvent {
|
|
11896
11786
|
event_cid: EventCid38;
|
|
11897
|
-
prior_event_hash?: PriorEventHash38;
|
|
11898
11787
|
timestamp: Timestamp38;
|
|
11899
11788
|
topology_class?: TopologyClass123;
|
|
11900
11789
|
violation_id: ViolationId;
|
|
@@ -11908,6 +11797,117 @@ export interface GuardrailViolationEvent {
|
|
|
11908
11797
|
export interface ViolationDetails {
|
|
11909
11798
|
[k: string]: unknown;
|
|
11910
11799
|
}
|
|
11800
|
+
/**
|
|
11801
|
+
* CoReason Shared Kernel Ontology
|
|
11802
|
+
*
|
|
11803
|
+
* AGENT INSTRUCTION: A test-time hypothesis representing the intent to discover a causal graph from observational data.
|
|
11804
|
+
* CAUSAL AFFORDANCE: Unlocks the ability to execute SCM construction via PC or FCI algorithms.
|
|
11805
|
+
* EPISTEMIC BOUNDS: Bounded by max_discrete_bins (le=100) to prevent combinatorial explosion.
|
|
11806
|
+
* MCP ROUTING TRIGGERS: Causal Inference, Structural Causal Models, PyWhy, Directed Acyclic Graph, causallearn
|
|
11807
|
+
*/
|
|
11808
|
+
export interface CausalDiscoveryIntent {
|
|
11809
|
+
topology_class?: TopologyClass124;
|
|
11810
|
+
dataset_uri: DatasetUri;
|
|
11811
|
+
discovery_algorithm: DiscoveryAlgorithm;
|
|
11812
|
+
max_discrete_bins?: MaxDiscreteBins;
|
|
11813
|
+
}
|
|
11814
|
+
/**
|
|
11815
|
+
* CoReason Shared Kernel Ontology
|
|
11816
|
+
*
|
|
11817
|
+
* AGENT INSTRUCTION: A cryptographically frozen historical fact representing the result of a causal discovery execution.
|
|
11818
|
+
* CAUSAL AFFORDANCE: Confirms the successful generation of a causal graph from observational data.
|
|
11819
|
+
* EPISTEMIC BOUNDS: Requires a strict causal graph representation.
|
|
11820
|
+
* MCP ROUTING TRIGGERS: Causal Inference, Structural Causal Models, PyWhy, Directed Acyclic Graph, causallearn
|
|
11821
|
+
*/
|
|
11822
|
+
export interface CausalDiscoveryReceipt {
|
|
11823
|
+
topology_class?: TopologyClass125;
|
|
11824
|
+
causal_graph: StructuralCausalGraphProfile;
|
|
11825
|
+
discovery_algorithm_used: DiscoveryAlgorithmUsed;
|
|
11826
|
+
}
|
|
11827
|
+
/**
|
|
11828
|
+
* The structural causal graph discovered.
|
|
11829
|
+
*/
|
|
11830
|
+
export interface StructuralCausalGraphProfile {
|
|
11831
|
+
topology_class?: TopologyClass126;
|
|
11832
|
+
edges?: Edges1;
|
|
11833
|
+
nodes?: Nodes13;
|
|
11834
|
+
}
|
|
11835
|
+
/**
|
|
11836
|
+
* CoReason Shared Kernel Ontology
|
|
11837
|
+
*
|
|
11838
|
+
* AGENT INSTRUCTION: A test-time hypothesis to estimate the causal effect of a treatment on an outcome.
|
|
11839
|
+
* CAUSAL AFFORDANCE: Unlocks back-door/front-door adjustments and returns the Average Treatment Effect (ATE).
|
|
11840
|
+
* EPISTEMIC BOUNDS: Requires a strict causal graph representation and identified treatment/outcome variables.
|
|
11841
|
+
* MCP ROUTING TRIGGERS: Causal Inference, Average Treatment Effect, DoWhy, Causal Estimand
|
|
11842
|
+
*/
|
|
11843
|
+
export interface DoWhyEstimationIntent {
|
|
11844
|
+
topology_class?: TopologyClass127;
|
|
11845
|
+
causal_graph: StructuralCausalGraphProfile1;
|
|
11846
|
+
treatment: Treatment;
|
|
11847
|
+
outcome: Outcome;
|
|
11848
|
+
}
|
|
11849
|
+
/**
|
|
11850
|
+
* The structural causal graph to use for estimation.
|
|
11851
|
+
*/
|
|
11852
|
+
export interface StructuralCausalGraphProfile1 {
|
|
11853
|
+
topology_class?: TopologyClass126;
|
|
11854
|
+
edges?: Edges1;
|
|
11855
|
+
nodes?: Nodes13;
|
|
11856
|
+
}
|
|
11857
|
+
/**
|
|
11858
|
+
* CoReason Shared Kernel Ontology
|
|
11859
|
+
*
|
|
11860
|
+
* AGENT INSTRUCTION: A cryptographically frozen historical fact representing the result of a DoWhy estimation.
|
|
11861
|
+
* CAUSAL AFFORDANCE: Confirms the identified estimand and the estimated Average Treatment Effect (ATE).
|
|
11862
|
+
* EPISTEMIC BOUNDS: The refutation_p_value must be mathematically bounded between 0.0 and 1.0.
|
|
11863
|
+
* MCP ROUTING TRIGGERS: Causal Inference, Average Treatment Effect, DoWhy, Causal Estimand
|
|
11864
|
+
*/
|
|
11865
|
+
export interface DoWhyEstimationReceipt {
|
|
11866
|
+
topology_class?: TopologyClass128;
|
|
11867
|
+
identified_estimand: IdentifiedEstimand;
|
|
11868
|
+
average_treatment_effect: AverageTreatmentEffect;
|
|
11869
|
+
refutation_p_value: RefutationPValue;
|
|
11870
|
+
}
|
|
11871
|
+
/**
|
|
11872
|
+
* CoReason Shared Kernel Ontology
|
|
11873
|
+
*
|
|
11874
|
+
* AGENT INSTRUCTION: A test-time hypothesis to explore varying causal effects across diverse sub-populations.
|
|
11875
|
+
* CAUSAL AFFORDANCE: Unlocks Double Machine Learning (DML) to estimate Conditional Average Treatment Effects (CATE).
|
|
11876
|
+
* EPISTEMIC BOUNDS: Requires a DoWhyEstimationReceipt to guarantee the presence of a validated ATE estimation.
|
|
11877
|
+
* MCP ROUTING TRIGGERS: Causal Inference, Heterogeneous Treatment Effect, Double Machine Learning, EconML
|
|
11878
|
+
*/
|
|
11879
|
+
export interface EconMLCATEIntent {
|
|
11880
|
+
topology_class?: TopologyClass129;
|
|
11881
|
+
base_estimation_receipt: DoWhyEstimationReceipt1;
|
|
11882
|
+
features?: Features;
|
|
11883
|
+
}
|
|
11884
|
+
/**
|
|
11885
|
+
* CoReason Shared Kernel Ontology
|
|
11886
|
+
*
|
|
11887
|
+
* AGENT INSTRUCTION: A cryptographically frozen historical fact representing the result of a DoWhy estimation.
|
|
11888
|
+
* CAUSAL AFFORDANCE: Confirms the identified estimand and the estimated Average Treatment Effect (ATE).
|
|
11889
|
+
* EPISTEMIC BOUNDS: The refutation_p_value must be mathematically bounded between 0.0 and 1.0.
|
|
11890
|
+
* MCP ROUTING TRIGGERS: Causal Inference, Average Treatment Effect, DoWhy, Causal Estimand
|
|
11891
|
+
*/
|
|
11892
|
+
export interface DoWhyEstimationReceipt1 {
|
|
11893
|
+
topology_class?: TopologyClass128;
|
|
11894
|
+
identified_estimand: IdentifiedEstimand;
|
|
11895
|
+
average_treatment_effect: AverageTreatmentEffect;
|
|
11896
|
+
refutation_p_value: RefutationPValue;
|
|
11897
|
+
}
|
|
11898
|
+
/**
|
|
11899
|
+
* CoReason Shared Kernel Ontology
|
|
11900
|
+
*
|
|
11901
|
+
* AGENT INSTRUCTION: A cryptographically frozen historical fact representing the result of an EconML CATE estimation.
|
|
11902
|
+
* CAUSAL AFFORDANCE: Confirms the identified conditional average treatment effect.
|
|
11903
|
+
* EPISTEMIC BOUNDS: The cate_estimate must be mathematically valid.
|
|
11904
|
+
* MCP ROUTING TRIGGERS: Causal Inference, Heterogeneous Treatment Effect, Double Machine Learning, EconML
|
|
11905
|
+
*/
|
|
11906
|
+
export interface HTEEstimationReceipt {
|
|
11907
|
+
topology_class?: TopologyClass130;
|
|
11908
|
+
features?: Features1;
|
|
11909
|
+
cate_estimate: CateEstimate;
|
|
11910
|
+
}
|
|
11911
11911
|
/**
|
|
11912
11912
|
* CoReason Shared Kernel Ontology
|
|
11913
11913
|
*
|
|
@@ -11920,7 +11920,7 @@ export interface ViolationDetails {
|
|
|
11920
11920
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Acyclic Edge, Stochastic Routing, Transition Probability, Directed Graph
|
|
11921
11921
|
*/
|
|
11922
11922
|
export interface TransitionEdgeProfile {
|
|
11923
|
-
topology_class?:
|
|
11923
|
+
topology_class?: TopologyClass131;
|
|
11924
11924
|
target_node_cid?: TargetNodeCid1;
|
|
11925
11925
|
/**
|
|
11926
11926
|
* Dynamic discovery intent for bridging nodes.
|
|
@@ -11964,7 +11964,7 @@ export interface EdgeMappingContract {
|
|
|
11964
11964
|
* MCP ROUTING TRIGGERS: Markov Decision Process, Cyclic Edge, Bellman Equation, Thermodynamic Discounting, Recursive Traversal
|
|
11965
11965
|
*/
|
|
11966
11966
|
export interface CyclicEdgeProfile {
|
|
11967
|
-
topology_class?:
|
|
11967
|
+
topology_class?: TopologyClass132;
|
|
11968
11968
|
target_node_cid?: TargetNodeCid2;
|
|
11969
11969
|
/**
|
|
11970
11970
|
* Dynamic discovery intent for bridging nodes.
|
|
@@ -12432,7 +12432,7 @@ export interface CrystallizationPolicy {
|
|
|
12432
12432
|
*
|
|
12433
12433
|
* AGENT INSTRUCTION: Executes Jon Doyle's Truth Maintenance System (TMS) protocol. As an ...Event suffix, this is an append-only coordinate on the Merkle-DAG representing the active propagation of belief retraction.
|
|
12434
12434
|
*
|
|
12435
|
-
* CAUSAL AFFORDANCE: Applies a
|
|
12435
|
+
* CAUSAL AFFORDANCE: Applies a DoWhy do-operator to mathematically zero-out the probability mass of the `quarantined_event_cids` subgraph, physically halting all execution branches dependent on the `root_falsified_event_cid` to prevent epistemic contagion.
|
|
12436
12436
|
*
|
|
12437
12437
|
* EPISTEMIC BOUNDS: The Shannon Entropy reduction across edges is strictly clamped by `propagated_decay_factor` (`ge=0.0, le=1.0`). Deterministic alignment is guaranteed by a `@model_validator` that physically sorts the `quarantined_event_cids` array. A second validator mathematically rejects root events appearing in quarantine (`reject_root_in_quarantine`).
|
|
12438
12438
|
*
|
|
@@ -12975,13 +12975,13 @@ export interface EpistemicHydrationPolicy {
|
|
|
12975
12975
|
/**
|
|
12976
12976
|
* CoReason Shared Kernel Ontology
|
|
12977
12977
|
*
|
|
12978
|
-
* AGENT INSTRUCTION: Formalizes Event Sourcing
|
|
12978
|
+
* AGENT INSTRUCTION: Formalizes Event Sourcing as the absolute, immutable source of truth for the swarm, fully partitioned from volatile memory. Provenance is delegated to Sigstore (Cosign + Rekor transparency log) via the CI/CD pipeline.
|
|
12979
12979
|
*
|
|
12980
12980
|
* CAUSAL AFFORDANCE: Permanently crystallizes validated events into the `history` log. Applies Truth Maintenance, context eviction, and tracks active `DefeasibleCascadeEvents` and `RollbackIntents`.
|
|
12981
12981
|
*
|
|
12982
12982
|
* EPISTEMIC BOUNDS: The `@model_validator` `_enforce_canonical_sort` deterministically sorts history by timestamp, checkpoints by ID, and active cascades—guaranteeing invariant RFC 8785 canonical hashing. Validation prevents epistemic paradoxes (child before parent).
|
|
12983
12983
|
*
|
|
12984
|
-
* MCP ROUTING TRIGGERS: Event Sourcing,
|
|
12984
|
+
* MCP ROUTING TRIGGERS: Event Sourcing, Sigstore, Rekor Transparency Log, Immutable Ledger, Truth Crystallization, Chronological Sort
|
|
12985
12985
|
*/
|
|
12986
12986
|
export interface EpistemicLedgerState {
|
|
12987
12987
|
history: History;
|
|
@@ -13959,7 +13959,7 @@ export interface ReasoningEngineeringPolicy {
|
|
|
13959
13959
|
* EpistemicProvenanceReceipt, temporal_bounds: TemporalBoundsProfile) extend the edge
|
|
13960
13960
|
* geometry without mandatory overhead.
|
|
13961
13961
|
*
|
|
13962
|
-
* MCP ROUTING TRIGGERS: Structural Causal Models,
|
|
13962
|
+
* MCP ROUTING TRIGGERS: Structural Causal Models, DoWhy Directed Edge, Semantic
|
|
13963
13963
|
* Triplet, Adjacency Matrix, Epistemic Link
|
|
13964
13964
|
*/
|
|
13965
13965
|
export interface SemanticEdgeState {
|
|
@@ -14167,6 +14167,19 @@ export interface StateVectorProfile1 {
|
|
|
14167
14167
|
mutable_matrix?: MutableMatrix;
|
|
14168
14168
|
is_delta?: IsDelta;
|
|
14169
14169
|
}
|
|
14170
|
+
/**
|
|
14171
|
+
* CoReason Shared Kernel Ontology
|
|
14172
|
+
*
|
|
14173
|
+
* AGENT INSTRUCTION: A declarative, frozen snapshot of an N-dimensional coordinate representing a causal graph.
|
|
14174
|
+
* CAUSAL AFFORDANCE: Provides the structural geometry required for back-door and front-door adjustment estimations.
|
|
14175
|
+
* EPISTEMIC BOUNDS: Mathematically defines a Directed Acyclic Graph (DAG) or Acyclic Directed Mixed Graph (ADMG).
|
|
14176
|
+
* MCP ROUTING TRIGGERS: Causal Inference, Structural Causal Models, PyWhy, Directed Acyclic Graph, causallearn
|
|
14177
|
+
*/
|
|
14178
|
+
export interface StructuralCausalGraphProfile2 {
|
|
14179
|
+
topology_class?: TopologyClass126;
|
|
14180
|
+
edges?: Edges1;
|
|
14181
|
+
nodes?: Nodes13;
|
|
14182
|
+
}
|
|
14170
14183
|
/**
|
|
14171
14184
|
* CoReason Shared Kernel Ontology
|
|
14172
14185
|
*
|