@coreason-ai/coreason-manifest 0.56.0 → 0.58.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/ontology.d.ts +311 -298
  2. package/package.json +1 -1
@@ -108,13 +108,9 @@ export type StructuralType = string;
108
108
  */
109
109
  export type TimeoutAction = "rollback" | "proceed_default" | "terminate";
110
110
  /**
111
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
111
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
112
112
  */
113
113
  export type EventCid = string;
114
- /**
115
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
116
- */
117
- export type PriorEventHash = string | null;
118
114
  /**
119
115
  * Causal Ancestry markers required to resolve decentralized event ordering.
120
116
  */
@@ -603,7 +599,7 @@ export type Rationale = string;
603
599
  * Self-evaluated probability of success for this proposed action, fed directly into the UCT exploration-exploitation formula by the Strategic MCTS Oracle.
604
600
  */
605
601
  export type HeuristicConfidence = number;
606
- export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask | InterventionalCausalTask | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent | FederatedDiscoveryIntent;
602
+ export type AnyIntent = TemporalEdgeInvalidationIntent | EpistemicZeroTrustContract | EmpiricalFalsificationContract | FalsificationContract | OntologicalCrosswalkIntent | SemanticIntent | DraftingIntent | AdjudicationIntent | EscalationIntent | SemanticDiscoveryIntent | TaxonomicRestructureIntent | LatentProjectionIntent | LatentSchemaInferenceIntent | HumanDirectiveIntent | ContextualSemanticResolutionIntent | OntologyDiscoveryIntent | SemanticMappingHeuristicIntent | ContinuousSpatialMutationIntent | AgentBidIntent | ComputeProvisioningIntent | TaskAnnouncementIntent | QuarantineIntent | InterventionIntent | FYIIntent | FallbackIntent | OverrideIntent | ConstitutionalAmendmentIntent | SpatialKinematicActionIntent | System2RemediationIntent | SubstrateHydrationManifest | NeurosymbolicInferenceIntent | TopologicalProjectionIntent | FormalLogicPremise | CausalPropagationIntent | RDFSerializationIntent | SPARQLQueryIntent | AnalogicalMappingTask | BoundedJSONRPCIntent | EpistemicTransmutationTask | EpistemicUpsamplingTask | DoWhyInterventionIntent | MCPClientIntent | RollbackIntent | StateMutationIntent | OntologicalNormalizationIntent | FederatedDiscoveryIntent;
607
603
  /**
608
604
  * Discriminator for temporal edge invalidation.
609
605
  */
@@ -1373,7 +1369,7 @@ export type EdgeThickness = number;
1373
1369
  */
1374
1370
  export type SpatialRepulsionScalar = number;
1375
1371
  /**
1376
- * The specific Pearlian topological relationship between the two variables.
1372
+ * The specific DoWhy topological relationship between the two variables.
1377
1373
  */
1378
1374
  export type EdgeClass = "direct_cause" | "confounder" | "collider" | "mediator";
1379
1375
  export type PredicateCurie = string;
@@ -1510,31 +1506,23 @@ export type UpsamplingConfidenceThreshold = number;
1510
1506
  * @maxItems 1000
1511
1507
  */
1512
1508
  export type JustificationVectors = [string, ...string[]];
1513
- export type TopologyClass51 = "interventional_causal_task";
1509
+ export type TopologyClass51 = "dowhy_intervention_intent";
1514
1510
  /**
1515
1511
  * Unique identifier for this causal intervention.
1516
1512
  */
1517
1513
  export type TaskCid5 = string;
1518
1514
  /**
1519
- * The hypothesis containing the SCM being tested.
1520
- */
1521
- export type TargetHypothesisCid1 = string;
1522
- /**
1523
- * The specific node $X$ in the SCM the agent is forcing to a specific state.
1524
- */
1525
- export type InterventionVariable = string;
1526
- /**
1527
- * The exact value or condition forced upon the intervention_variable, isolating it from its historical causes.
1515
+ * The treatment variable (X) to intervene on.
1528
1516
  */
1529
- export type DoOperatorState = string;
1517
+ export type TreatmentVariable = string;
1530
1518
  /**
1531
- * The mathematical proof of entropy reduction yielded specifically by breaking the confounding back-doors.
1519
+ * The outcome variable (Y) to estimate the effect for.
1532
1520
  */
1533
- export type ExpectedCausalInformationGain = number;
1521
+ export type OutcomeVariable = string;
1534
1522
  /**
1535
- * The maximum economic expenditure authorized to run this specific causal intervention.
1523
+ * Optional explicit common causes (confounders) to adjust for.
1536
1524
  */
1537
- export type ExecutionCostBudgetMagnitude2 = number;
1525
+ export type CommonCauses = string[];
1538
1526
  export type TopologyClass52 = "mcp_client_intent";
1539
1527
  /**
1540
1528
  * JSON-RPC version.
@@ -2540,7 +2528,7 @@ export type AgentCid1 = string;
2540
2528
  /**
2541
2529
  * The exact HypothesisGenerationEvent the agent is betting on.
2542
2530
  */
2543
- export type TargetHypothesisCid2 = string;
2531
+ export type TargetHypothesisCid1 = string;
2544
2532
  /**
2545
2533
  * The volume of compute budget committed to this position.
2546
2534
  */
@@ -3034,7 +3022,7 @@ export type AnyPresentationIntent = SemanticIntent | DraftingIntent | Adjudicati
3034
3022
  /**
3035
3023
  * A discriminated union of state events.
3036
3024
  */
3037
- export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt | GuardrailViolationEvent;
3025
+ export type AnyStateEvent = TemporalGraphCRDTManifest | MCPToolDefinition | CrosswalkResolutionReceipt | EpistemicZeroTrustReceipt | ObservationEvent | BeliefMutationEvent | SystemFaultEvent | AtomicPropositionState | PostCoordinatedSemanticState | ArtifactCorruptionEvent | HypothesisGenerationEvent | BargeInInterruptEvent | CounterfactualRegretEvent | ToolInvocationEvent | EpistemicPromotionEvent | PersistenceCommitReceipt | TokenBurnReceipt | BudgetExhaustionEvent | EpistemicTelemetryEvent | CognitivePredictionReceipt | EpistemicAxiomVerificationReceipt | EpistemicFlowStateReceipt | CausalExplanationEvent | IntentClassificationReceipt | SemanticRelationalVectorState | OntologicalReificationReceipt | CircuitBreakerEvent | ExogenousEpistemicEvent | EpistemicLogEvent | InterventionReceipt | AdjudicationReceipt | CustodyReceipt | DefeasibleAttackEvent | EpistemicRejectionReceipt | FormalVerificationReceipt | BeliefModulationReceipt | RDFExportReceipt | EpistemicStarvationEvent | SPARQLQueryResultReceipt | OracleExecutionReceipt | GuardrailViolationEvent | CausalDiscoveryIntent | CausalDiscoveryReceipt | DoWhyEstimationIntent | DoWhyEstimationReceipt | EconMLCATEIntent | HTEEstimationReceipt;
3038
3026
  /**
3039
3027
  * Discriminator for temporal graph crdt.
3040
3028
  */
@@ -3061,30 +3049,21 @@ export type AddSet = NodeCIDState[];
3061
3049
  export type TerminateSet = TemporalEdgeInvalidationIntent[];
3062
3050
  export type TopologyClass83 = "mcp_tool_definition";
3063
3051
  /**
3064
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3052
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3065
3053
  */
3066
3054
  export type EventCid1 = string;
3067
- /**
3068
- * The RFC 8785 Canonical hash of the immediate causal ancestor event. Null for genesis nodes.
3069
- */
3070
- export type PriorEventHash1 = string | null;
3071
3055
  export type Timestamp1 = number;
3072
3056
  export type Name = string;
3073
3057
  export type Description9 = string;
3074
3058
  export type EventCid2 = string;
3075
- export type PriorEventHash2 = string | null;
3076
3059
  export type Timestamp2 = number;
3077
3060
  export type TopologyClass84 = "crosswalk_resolution";
3078
3061
  export type ReceiptCid = string;
3079
3062
  export type TargetGraphCid3 = string;
3080
3063
  /**
3081
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3064
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3082
3065
  */
3083
3066
  export type EventCid3 = string;
3084
- /**
3085
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3086
- */
3087
- export type PriorEventHash3 = string | null;
3088
3067
  /**
3089
3068
  * Causal Ancestry markers required to resolve decentralized event ordering.
3090
3069
  */
@@ -3114,13 +3093,9 @@ export type RemediationEpochsConsumed = number;
3114
3093
  */
3115
3094
  export type TransmutedPayloadHash = string;
3116
3095
  /**
3117
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3096
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3118
3097
  */
3119
3098
  export type EventCid4 = string;
3120
- /**
3121
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3122
- */
3123
- export type PriorEventHash4 = string | null;
3124
3099
  /**
3125
3100
  * Causal Ancestry markers required to resolve decentralized event ordering.
3126
3101
  */
@@ -3209,7 +3184,7 @@ export type TemporalDurationMs = number;
3209
3184
  */
3210
3185
  export type SalienceThresholdBreached = boolean;
3211
3186
  /**
3212
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3187
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3213
3188
  */
3214
3189
  export type AuditCid = string;
3215
3190
  /**
@@ -3259,13 +3234,9 @@ export type DecayThreshold = number;
3259
3234
  */
3260
3235
  export type MaxLookbackWindow = number;
3261
3236
  /**
3262
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3237
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3263
3238
  */
3264
3239
  export type EventCid5 = string;
3265
- /**
3266
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3267
- */
3268
- export type PriorEventHash5 = string | null;
3269
3240
  /**
3270
3241
  * Causal Ancestry markers required to resolve decentralized event ordering.
3271
3242
  */
@@ -3311,13 +3282,9 @@ export type TotalLatentTokens = number;
3311
3282
  */
3312
3283
  export type QuorumSignatures = string[];
3313
3284
  /**
3314
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3285
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3315
3286
  */
3316
3287
  export type EventCid6 = string;
3317
- /**
3318
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3319
- */
3320
- export type PriorEventHash6 = string | null;
3321
3288
  /**
3322
3289
  * Causal Ancestry markers required to resolve decentralized event ordering.
3323
3290
  */
@@ -3328,13 +3295,9 @@ export type Timestamp6 = number;
3328
3295
  export type TopologyClass90 = "system_fault";
3329
3296
  export type TopologyClass91 = "atomic_proposition";
3330
3297
  /**
3331
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3298
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3332
3299
  */
3333
3300
  export type EventCid7 = string;
3334
- /**
3335
- * The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
3336
- */
3337
- export type PriorEventHash7 = string | null;
3338
3301
  /**
3339
3302
  * The precise temporal coordinate of the event realization.
3340
3303
  */
@@ -3388,10 +3351,6 @@ export type TopologyClass92 = "post_coordinated_concept";
3388
3351
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3389
3352
  */
3390
3353
  export type EventCid8 = string;
3391
- /**
3392
- * The RFC 8785 Canonical hash of the immediate causal ancestor.
3393
- */
3394
- export type PriorEventHash8 = string | null;
3395
3354
  /**
3396
3355
  * The precise temporal coordinate of the event realization.
3397
3356
  */
@@ -3409,7 +3368,6 @@ export type ManifoldAlignmentMetricProfile1 = "gromov_wasserstein" | "earth_move
3409
3368
  */
3410
3369
  export type IsometryScore = number;
3411
3370
  export type EventCid9 = string;
3412
- export type PriorEventHash9 = string | null;
3413
3371
  export type Timestamp9 = number;
3414
3372
  export type TopologyClass93 = "artifact_corruption";
3415
3373
  /**
@@ -3419,13 +3377,9 @@ export type ArtifactCid = string;
3419
3377
  export type CorruptionClass = "drm_locked" | "malformed_bytes" | "ocr_failure" | "unsupported_format";
3420
3378
  export type DiagnosticHash = string;
3421
3379
  /**
3422
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3380
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3423
3381
  */
3424
3382
  export type EventCid10 = string;
3425
- /**
3426
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3427
- */
3428
- export type PriorEventHash10 = string | null;
3429
3383
  /**
3430
3384
  * Causal Ancestry markers required to resolve decentralized event ordering.
3431
3385
  */
@@ -3457,29 +3411,17 @@ export type FalsificationConditions = [EmpiricalFalsificationContract, ...Empiri
3457
3411
  */
3458
3412
  export type Status = "active" | "falsified" | "verified";
3459
3413
  /**
3460
- * The nodes in the DAG that the agent can passively measure.
3461
- *
3462
- * @maxItems 1000
3414
+ * The format of the provided causal graph.
3463
3415
  */
3464
- export type ObservedVariables = string[];
3416
+ export type GraphFormat = "gml" | "dot" | "dict";
3465
3417
  /**
3466
- * The unobserved confounders the agent suspects exist.
3467
- *
3468
- * @maxItems 1000
3418
+ * The graph payload, either as a GML/DOT string or JSON-serialized dictionary of nodes and edges.
3469
3419
  */
3470
- export type LatentVariables = string[];
3420
+ export type GraphPayload = string;
3471
3421
  /**
3472
- * The declared topological mapping of causality.
3473
- */
3474
- export type CausalEdges1 = CausalDirectedEdgeState[];
3475
- /**
3476
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3422
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3477
3423
  */
3478
3424
  export type EventCid11 = string;
3479
- /**
3480
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3481
- */
3482
- export type PriorEventHash11 = string | null;
3483
3425
  /**
3484
3426
  * Causal Ancestry markers required to resolve decentralized event ordering.
3485
3427
  */
@@ -3503,13 +3445,9 @@ export type RetainedPartialPayload = {
3503
3445
  */
3504
3446
  export type EpistemicDisposition = "discard" | "retain_as_context" | "mark_as_falsified";
3505
3447
  /**
3506
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3448
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3507
3449
  */
3508
3450
  export type EventCid12 = string;
3509
- /**
3510
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3511
- */
3512
- export type PriorEventHash12 = string | null;
3513
3451
  /**
3514
3452
  * Causal Ancestry markers required to resolve decentralized event ordering.
3515
3453
  */
@@ -3539,13 +3477,9 @@ export type ExpectedUtilitySimulated = number;
3539
3477
  */
3540
3478
  export type EpistemicRegret = number;
3541
3479
  /**
3542
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3480
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3543
3481
  */
3544
3482
  export type EventCid13 = string;
3545
- /**
3546
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3547
- */
3548
- export type PriorEventHash13 = string | null;
3549
3483
  /**
3550
3484
  * Causal Ancestry markers required to resolve decentralized event ordering.
3551
3485
  */
@@ -3563,13 +3497,9 @@ export type ToolName1 = string;
3563
3497
  */
3564
3498
  export type AuthorizedBudgetMagnitude = number;
3565
3499
  /**
3566
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3500
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3567
3501
  */
3568
3502
  export type EventCid14 = string;
3569
- /**
3570
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3571
- */
3572
- export type PriorEventHash14 = string | null;
3573
3503
  /**
3574
3504
  * Causal Ancestry markers required to resolve decentralized event ordering.
3575
3505
  */
@@ -3591,13 +3521,9 @@ export type CrystallizedSemanticNodeCid = string;
3591
3521
  */
3592
3522
  export type CompressionRatio = number;
3593
3523
  /**
3594
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3524
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3595
3525
  */
3596
3526
  export type EventCid15 = string;
3597
- /**
3598
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3599
- */
3600
- export type PriorEventHash15 = string | null;
3601
3527
  /**
3602
3528
  * Causal Ancestry markers required to resolve decentralized event ordering.
3603
3529
  */
@@ -3619,13 +3545,9 @@ export type CommittedTemporalCrdtCid = string;
3619
3545
  */
3620
3546
  export type TargetTableUri = string;
3621
3547
  /**
3622
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3548
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3623
3549
  */
3624
3550
  export type EventCid16 = string;
3625
- /**
3626
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3627
- */
3628
- export type PriorEventHash16 = string | null;
3629
3551
  /**
3630
3552
  * Causal Ancestry markers required to resolve decentralized event ordering.
3631
3553
  */
@@ -3651,13 +3573,9 @@ export type OutputTokens = number;
3651
3573
  */
3652
3574
  export type BurnMagnitude = number;
3653
3575
  /**
3654
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3576
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3655
3577
  */
3656
3578
  export type EventCid17 = string;
3657
- /**
3658
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3659
- */
3660
- export type PriorEventHash17 = string | null;
3661
3579
  /**
3662
3580
  * Causal Ancestry markers required to resolve decentralized event ordering.
3663
3581
  */
@@ -3675,13 +3593,9 @@ export type ExhaustedEscrowCid = string;
3675
3593
  */
3676
3594
  export type FinalBurnReceiptCid = string;
3677
3595
  /**
3678
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3596
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3679
3597
  */
3680
3598
  export type EventCid18 = string;
3681
- /**
3682
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3683
- */
3684
- export type PriorEventHash18 = string | null;
3685
3599
  /**
3686
3600
  * Causal Ancestry markers required to resolve decentralized event ordering.
3687
3601
  */
@@ -3703,13 +3617,9 @@ export type TargetNodeCid = string;
3703
3617
  */
3704
3618
  export type DwellDurationMs = number | null;
3705
3619
  /**
3706
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3620
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3707
3621
  */
3708
3622
  export type EventCid19 = string;
3709
- /**
3710
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3711
- */
3712
- export type PriorEventHash19 = string | null;
3713
3623
  /**
3714
3624
  * Causal Ancestry markers required to resolve decentralized event ordering.
3715
3625
  */
@@ -3722,13 +3632,9 @@ export type TargetSourceConcept = string;
3722
3632
  */
3723
3633
  export type PredictedTopKTokens = [string, ...string[]];
3724
3634
  /**
3725
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3635
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3726
3636
  */
3727
3637
  export type EventCid20 = string;
3728
- /**
3729
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3730
- */
3731
- export type PriorEventHash20 = string | null;
3732
3638
  /**
3733
3639
  * Causal Ancestry markers required to resolve decentralized event ordering.
3734
3640
  */
@@ -3742,13 +3648,9 @@ export type FactScorePassed = boolean;
3742
3648
  */
3743
3649
  export type ZeroTrustReceiptCid1 = string | null;
3744
3650
  /**
3745
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3651
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3746
3652
  */
3747
3653
  export type EventCid21 = string;
3748
- /**
3749
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3750
- */
3751
- export type PriorEventHash21 = string | null;
3752
3654
  /**
3753
3655
  * Causal Ancestry markers required to resolve decentralized event ordering.
3754
3656
  */
@@ -3767,13 +3669,9 @@ export type EstimatedFlowValue = number;
3767
3669
  */
3768
3670
  export type TerminalRewardFactorized = boolean;
3769
3671
  /**
3770
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3672
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3771
3673
  */
3772
3674
  export type EventCid22 = string;
3773
- /**
3774
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3775
- */
3776
- export type PriorEventHash22 = string | null;
3777
3675
  /**
3778
3676
  * Causal Ancestry markers required to resolve decentralized event ordering.
3779
3677
  */
@@ -3819,13 +3717,9 @@ export type ConfidenceIntervalUpper = number;
3819
3717
  */
3820
3718
  export type AgentAttributions = ShapleyAttributionReceipt[];
3821
3719
  /**
3822
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3720
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3823
3721
  */
3824
3722
  export type EventCid23 = string;
3825
- /**
3826
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3827
- */
3828
- export type PriorEventHash23 = string | null;
3829
3723
  /**
3830
3724
  * Causal Ancestry markers required to resolve decentralized event ordering.
3831
3725
  */
@@ -3852,13 +3746,9 @@ export type ConfidenceScore1 = number;
3852
3746
  export type RoutingPolicyCid = string | null;
3853
3747
  export type TopologyClass108 = "semantic_relational_record";
3854
3748
  /**
3855
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3749
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3856
3750
  */
3857
3751
  export type EventCid24 = string;
3858
- /**
3859
- * The RFC 8785 Canonical hash of the immediate causal ancestor, securing the Merkle-DAG.
3860
- */
3861
- export type PriorEventHash24 = string | null;
3862
3752
  /**
3863
3753
  * The precise temporal coordinate of the event realization.
3864
3754
  */
@@ -3879,10 +3769,6 @@ export type TopologyClass109 = "ontological_reification";
3879
3769
  * Cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3880
3770
  */
3881
3771
  export type EventCid25 = string;
3882
- /**
3883
- * The RFC 8785 Canonical hash of the immediate causal ancestor.
3884
- */
3885
- export type PriorEventHash25 = string | null;
3886
3772
  /**
3887
3773
  * The precise temporal coordinate of the event realization.
3888
3774
  */
@@ -3904,13 +3790,9 @@ export type TransformationMechanismProfile = "lexical_crosswalk" | "contextual_t
3904
3790
  */
3905
3791
  export type IsLatentInference = boolean;
3906
3792
  /**
3907
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3793
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3908
3794
  */
3909
3795
  export type EventCid26 = string;
3910
- /**
3911
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3912
- */
3913
- export type PriorEventHash26 = string | null;
3914
3796
  /**
3915
3797
  * Causal Ancestry markers required to resolve decentralized event ordering.
3916
3798
  */
@@ -3924,13 +3806,9 @@ export type TopologyClass110 = "circuit_breaker_event";
3924
3806
  */
3925
3807
  export type ErrorSignature = string;
3926
3808
  /**
3927
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3809
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3928
3810
  */
3929
3811
  export type EventCid27 = string;
3930
- /**
3931
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3932
- */
3933
- export type PriorEventHash27 = string | null;
3934
3812
  /**
3935
3813
  * Causal Ancestry markers required to resolve decentralized event ordering.
3936
3814
  */
@@ -3956,13 +3834,9 @@ export type BayesianSurpriseScore1 = number;
3956
3834
  */
3957
3835
  export type LockedMagnitude = number;
3958
3836
  /**
3959
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3837
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3960
3838
  */
3961
3839
  export type EventCid28 = string;
3962
- /**
3963
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3964
- */
3965
- export type PriorEventHash28 = string | null;
3966
3840
  /**
3967
3841
  * Discriminator type for a log event.
3968
3842
  */
@@ -3985,13 +3859,9 @@ export type TelemetryScalarState = string | number | boolean | null;
3985
3859
  */
3986
3860
  export type TopologyClass113 = "verdict";
3987
3861
  /**
3988
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3862
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
3989
3863
  */
3990
3864
  export type EventCid29 = string;
3991
- /**
3992
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
3993
- */
3994
- export type PriorEventHash29 = string | null;
3995
3865
  /**
3996
3866
  * Causal Ancestry markers required to resolve decentralized event ordering.
3997
3867
  */
@@ -4029,13 +3899,9 @@ export type DagNodeNonce = string;
4029
3899
  */
4030
3900
  export type LivenessChallengeHash = string;
4031
3901
  /**
4032
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3902
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
4033
3903
  */
4034
3904
  export type EventCid30 = string;
4035
- /**
4036
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4037
- */
4038
- export type PriorEventHash30 = string | null;
4039
3905
  /**
4040
3906
  * Causal Ancestry markers required to resolve decentralized event ordering.
4041
3907
  */
@@ -4066,13 +3932,9 @@ export type PostRedactionHash = string;
4066
3932
  */
4067
3933
  export type RedactionTimestampUnixNano = number;
4068
3934
  /**
4069
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3935
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
4070
3936
  */
4071
3937
  export type EventCid31 = string;
4072
- /**
4073
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4074
- */
4075
- export type PriorEventHash31 = string | null;
4076
3938
  /**
4077
3939
  * Causal Ancestry markers required to resolve decentralized event ordering.
4078
3940
  */
@@ -4091,13 +3953,9 @@ export type SourceClaimCid = string;
4091
3953
  */
4092
3954
  export type TargetClaimCid = string;
4093
3955
  /**
4094
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3956
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
4095
3957
  */
4096
3958
  export type EventCid32 = string;
4097
- /**
4098
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4099
- */
4100
- export type PriorEventHash32 = string | null;
4101
3959
  /**
4102
3960
  * Causal Ancestry markers required to resolve decentralized event ordering.
4103
3961
  */
@@ -4109,13 +3967,9 @@ export type ViolatedAlgebraicConstraint = string;
4109
3967
  export type KlDivergenceToValidity = number;
4110
3968
  export type StochasticMutationGradient = string;
4111
3969
  /**
4112
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3970
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
4113
3971
  */
4114
3972
  export type EventCid33 = string;
4115
- /**
4116
- * The RFC 8785 Canonical hash of the immediate causal ancestor.
4117
- */
4118
- export type PriorEventHash33 = string | null;
4119
3973
  /**
4120
3974
  * The precise temporal coordinate of the event realization.
4121
3975
  */
@@ -4142,13 +3996,9 @@ export type ExtractedBindings = {
4142
3996
  export type TopologyClass118 = "belief_modulation";
4143
3997
  export type ReceiptCid2 = string;
4144
3998
  /**
4145
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
3999
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
4146
4000
  */
4147
4001
  export type EventCid34 = string;
4148
- /**
4149
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4150
- */
4151
- export type PriorEventHash34 = string | null;
4152
4002
  /**
4153
4003
  * Causal Ancestry markers required to resolve decentralized event ordering.
4154
4004
  */
@@ -4158,13 +4008,9 @@ export type SeveredEdgeCids = string[];
4158
4008
  export type TopologyClass119 = "rdf_export_receipt";
4159
4009
  export type ExportCid1 = string;
4160
4010
  /**
4161
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4011
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
4162
4012
  */
4163
4013
  export type EventCid35 = string;
4164
- /**
4165
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4166
- */
4167
- export type PriorEventHash35 = string | null;
4168
4014
  /**
4169
4015
  * Causal Ancestry markers required to resolve decentralized event ordering.
4170
4016
  */
@@ -4173,7 +4019,6 @@ export type SerializedPayload = string;
4173
4019
  export type RdfTripleCount = number;
4174
4020
  export type Sha256GraphHash = string;
4175
4021
  export type EventCid36 = string;
4176
- export type PriorEventHash36 = string | null;
4177
4022
  export type Timestamp36 = number;
4178
4023
  export type TopologyClass120 = "epistemic_starvation";
4179
4024
  /**
@@ -4189,7 +4034,6 @@ export type FailedCitations = EvidentiaryCitationState[];
4189
4034
  */
4190
4035
  export type DiagnosticReason = string;
4191
4036
  export type EventCid37 = string;
4192
- export type PriorEventHash37 = string | null;
4193
4037
  export type Timestamp37 = number;
4194
4038
  export type TopologyClass121 = "sparql_query_result";
4195
4039
  /**
@@ -4221,13 +4065,9 @@ export type TokensBurned = number;
4221
4065
  */
4222
4066
  export type HumanAttestationSignature = string | null;
4223
4067
  /**
4224
- * A Content Identifier (CID) acting as a cryptographic Lineage Watermark binding this node to the Merkle-DAG.
4068
+ * A Content Identifier (CID) acting as a unique Lineage Watermark for this event. Cryptographic provenance is established via Sigstore.
4225
4069
  */
4226
4070
  export type EventCid38 = string;
4227
- /**
4228
- * The SHA-256 hash of the temporally preceding event, establishing the Merkle-DAG chain.
4229
- */
4230
- export type PriorEventHash38 = string | null;
4231
4071
  /**
4232
4072
  * Causal Ancestry markers required to resolve decentralized event ordering.
4233
4073
  */
@@ -4248,6 +4088,90 @@ export type StatusCode = number;
4248
4088
  * The classification of the violation (e.g., 'pii_leak', 'toxic_content').
4249
4089
  */
4250
4090
  export type ViolationType = string;
4091
+ /**
4092
+ * Discriminator for the CausalDiscoveryIntent topology.
4093
+ */
4094
+ export type TopologyClass124 = "causal_discovery_intent";
4095
+ /**
4096
+ * The URI of the observational dataset.
4097
+ */
4098
+ export type DatasetUri = string;
4099
+ /**
4100
+ * The algorithm to use for causal discovery.
4101
+ */
4102
+ export type DiscoveryAlgorithm = "PC" | "FCI";
4103
+ /**
4104
+ * The maximum number of bins for continuous variables.
4105
+ */
4106
+ export type MaxDiscreteBins = number;
4107
+ /**
4108
+ * Discriminator for the CausalDiscoveryReceipt topology.
4109
+ */
4110
+ export type TopologyClass125 = "causal_discovery_receipt";
4111
+ /**
4112
+ * Discriminator for the StructuralCausalGraphProfile topology.
4113
+ */
4114
+ export type TopologyClass126 = "structural_causal_graph";
4115
+ /**
4116
+ * The directed edges of the causal graph.
4117
+ */
4118
+ export type Edges1 = [unknown, unknown][];
4119
+ /**
4120
+ * The nodes of the causal graph.
4121
+ */
4122
+ export type Nodes13 = string[];
4123
+ /**
4124
+ * The algorithm that was used.
4125
+ */
4126
+ export type DiscoveryAlgorithmUsed = string;
4127
+ /**
4128
+ * Discriminator for the DoWhyEstimationIntent topology.
4129
+ */
4130
+ export type TopologyClass127 = "dowhy_estimation_intent";
4131
+ /**
4132
+ * The treatment variable.
4133
+ */
4134
+ export type Treatment = string;
4135
+ /**
4136
+ * The outcome variable.
4137
+ */
4138
+ export type Outcome = string;
4139
+ /**
4140
+ * Discriminator for the DoWhyEstimationReceipt topology.
4141
+ */
4142
+ export type TopologyClass128 = "dowhy_estimation_receipt";
4143
+ /**
4144
+ * The identified causal estimand.
4145
+ */
4146
+ export type IdentifiedEstimand = string;
4147
+ /**
4148
+ * The estimated average treatment effect.
4149
+ */
4150
+ export type AverageTreatmentEffect = number;
4151
+ /**
4152
+ * The p-value of the refutation test.
4153
+ */
4154
+ export type RefutationPValue = number;
4155
+ /**
4156
+ * Discriminator for the EconMLCATEIntent topology.
4157
+ */
4158
+ export type TopologyClass129 = "econml_cate_intent";
4159
+ /**
4160
+ * The features to condition the treatment effect on.
4161
+ */
4162
+ export type Features = string[];
4163
+ /**
4164
+ * Discriminator for the HTEEstimationReceipt topology.
4165
+ */
4166
+ export type TopologyClass130 = "hte_estimation_receipt";
4167
+ /**
4168
+ * The features conditioned on.
4169
+ */
4170
+ export type Features1 = string[];
4171
+ /**
4172
+ * The conditional average treatment effect.
4173
+ */
4174
+ export type CateEstimate = number;
4251
4175
  /**
4252
4176
  * A discriminated union of workflow topologies.
4253
4177
  */
@@ -4256,7 +4180,7 @@ export type AnyTransitionEdge = TransitionEdgeProfile | CyclicEdgeProfile;
4256
4180
  /**
4257
4181
  * Discriminator type for an acyclic edge.
4258
4182
  */
4259
- export type TopologyClass124 = "acyclic";
4183
+ export type TopologyClass131 = "acyclic";
4260
4184
  /**
4261
4185
  * The coinductive pointer to the destination capability.
4262
4186
  */
@@ -4288,7 +4212,7 @@ export type ComputeWeightMagnitude = number;
4288
4212
  /**
4289
4213
  * Discriminator type for a cyclic edge.
4290
4214
  */
4291
- export type TopologyClass125 = "cyclic";
4215
+ export type TopologyClass132 = "cyclic";
4292
4216
  /**
4293
4217
  * The coinductive pointer to the destination capability.
4294
4218
  */
@@ -5182,7 +5106,7 @@ export type SubjectNodeCid = string;
5182
5106
  export type ObjectNodeCid = string;
5183
5107
  export type PredicateCurie1 = string;
5184
5108
  /**
5185
- * The Pearlian directionality of the semantic relationship.
5109
+ * The DoWhy directionality of the semantic relationship.
5186
5110
  */
5187
5111
  export type CausalRelationship = "causes" | "confounds" | "correlates_with" | "undirected";
5188
5112
  /**
@@ -5350,7 +5274,10 @@ export interface CoReasonSharedKernelOntology {
5350
5274
  CapabilityPointerState?: CapabilityPointerState;
5351
5275
  CausalAttributionState?: CausalAttributionState;
5352
5276
  CausalDirectedEdgeState?: CausalDirectedEdgeState;
5277
+ CausalDiscoveryIntent?: CausalDiscoveryIntent;
5278
+ CausalDiscoveryReceipt?: CausalDiscoveryReceipt;
5353
5279
  CausalExplanationEvent?: CausalExplanationEvent;
5280
+ CausalGraphDefinition?: CausalGraphDefinition;
5354
5281
  CausalIntervalProfile?: CausalIntervalProfile;
5355
5282
  CausalPropagationIntent?: CausalPropagationIntent;
5356
5283
  CircuitBreakerEvent?: CircuitBreakerEvent;
@@ -5408,6 +5335,9 @@ export interface CoReasonSharedKernelOntology {
5408
5335
  DistributionProfile?: DistributionProfile;
5409
5336
  DistributionShapeProfile?: DistributionShapeProfile;
5410
5337
  DiversityPolicy?: DiversityPolicy;
5338
+ DoWhyEstimationIntent?: DoWhyEstimationIntent;
5339
+ DoWhyEstimationReceipt?: DoWhyEstimationReceipt;
5340
+ DoWhyInterventionIntent?: DoWhyInterventionIntent;
5411
5341
  DocumentKnowledgeGraphManifest?: DocumentKnowledgeGraphManifest;
5412
5342
  DocumentLayoutManifest?: DocumentLayoutManifest;
5413
5343
  DocumentLayoutRegionState?: DocumentLayoutRegionState;
@@ -5416,6 +5346,7 @@ export interface CoReasonSharedKernelOntology {
5416
5346
  DynamicLayoutManifest?: DynamicLayoutManifest;
5417
5347
  DynamicManifoldProjectionManifest?: DynamicManifoldProjectionManifest1;
5418
5348
  DynamicRoutingManifest?: DynamicRoutingManifest;
5349
+ EconMLCATEIntent?: EconMLCATEIntent;
5419
5350
  EdgeMappingContract?: EdgeMappingContract;
5420
5351
  EmbodiedSensoryVectorProfile?: EmbodiedSensoryVectorProfile;
5421
5352
  EmpiricalFalsificationContract?: EmpiricalFalsificationContract;
@@ -5490,6 +5421,7 @@ export interface CoReasonSharedKernelOntology {
5490
5421
  GrammarPanelProfile?: GrammarPanelProfile1;
5491
5422
  GraphFlatteningPolicy?: GraphFlatteningPolicy;
5492
5423
  GuardrailViolationEvent?: GuardrailViolationEvent;
5424
+ HTEEstimationReceipt?: HTEEstimationReceipt;
5493
5425
  HTTPTransportProfile?: HTTPTransportProfile;
5494
5426
  HardwareEnclaveReceipt?: HardwareEnclaveReceipt;
5495
5427
  HierarchicalDOMManifest?: HierarchicalDOMManifest;
@@ -5508,7 +5440,6 @@ export interface CoReasonSharedKernelOntology {
5508
5440
  InterventionIntent?: InterventionIntent;
5509
5441
  InterventionPolicy?: InterventionPolicy;
5510
5442
  InterventionReceipt?: InterventionReceipt;
5511
- InterventionalCausalTask?: InterventionalCausalTask;
5512
5443
  JSONRPCErrorResponseState?: JSONRPCErrorResponseState;
5513
5444
  JSONRPCErrorState?: JSONRPCErrorState1;
5514
5445
  JsonPrimitiveState?: JsonPrimitiveState;
@@ -5629,7 +5560,7 @@ export interface CoReasonSharedKernelOntology {
5629
5560
  StochasticTopologyManifest?: StochasticTopologyManifest;
5630
5561
  StrategicThoughtNodeIntent?: StrategicThoughtNodeIntent;
5631
5562
  StreamingDisfluencyContract?: StreamingDisfluencyContract;
5632
- StructuralCausalGraphProfile?: StructuralCausalGraphProfile;
5563
+ StructuralCausalGraphProfile?: StructuralCausalGraphProfile2;
5633
5564
  SubstrateHydrationManifest?: SubstrateHydrationManifest;
5634
5565
  SwarmTopologyManifest?: SwarmTopologyManifest;
5635
5566
  SyntheticGenerationProfile?: SyntheticGenerationProfile;
@@ -5824,7 +5755,6 @@ export interface EpistemicProxyStateAny {
5824
5755
  */
5825
5756
  export interface AdjudicationReceipt {
5826
5757
  event_cid: EventCid;
5827
- prior_event_hash?: PriorEventHash;
5828
5758
  timestamp: Timestamp;
5829
5759
  topology_class?: TopologyClass1;
5830
5760
  rubric_cid: RubricCid;
@@ -6048,11 +5978,11 @@ export interface AnchoringPolicy {
6048
5978
  *
6049
5979
  * AGENT INSTRUCTION: Defines the discrete formalization of a Gibsonian Affordance within the agent's Reinforcement Learning Action Space ($A$). As a ...Manifest suffix, this is a declarative, frozen N-dimensional coordinate of a capability.
6050
5980
  *
6051
- * CAUSAL AFFORDANCE: Unlocks a specific, localized Pearlian Do-Operator intervention ($do(X=x)$) mapped to an external kinetic capability. Governed by side_effects, permissions, and an optional execution SLA.
5981
+ * CAUSAL AFFORDANCE: Unlocks a specific, localized DoWhy Do-Operator intervention ($do(X=x)$) mapped to an external kinetic capability. Governed by side_effects, permissions, and an optional execution SLA.
6052
5982
  *
6053
5983
  * EPISTEMIC BOUNDS: The operational perimeter is rigidly confined by `input_schema` and `output_schema` (dictionaries bounded to `max_length=1000` properties). The `is_preemptible` boolean (default=False) establishes a physical Halting Problem limit by authorizing the orchestrator to abort execution mid-flight.
6054
5984
  *
6055
- * MCP ROUTING TRIGGERS: Gibsonian Affordance, MDP Action Space, Pearlian Do-Operator, Capability-Based Security, Halting Problem
5985
+ * MCP ROUTING TRIGGERS: Gibsonian Affordance, MDP Action Space, DoWhy Do-Operator, Capability-Based Security, Halting Problem
6056
5986
  */
6057
5987
  export interface SpatialToolManifest {
6058
5988
  topology_class?: TopologyClass5;
@@ -6831,7 +6761,7 @@ export interface VectorEmbeddingState2 {
6831
6761
  * suffix, this object defines rigid mathematical boundaries that the orchestrator must
6832
6762
  * enforce globally.
6833
6763
  *
6834
- * CAUSAL AFFORDANCE: Restricts graph hopping algorithms to explicit Pearlian edge types
6764
+ * CAUSAL AFFORDANCE: Restricts graph hopping algorithms to explicit PyWhy/DoWhy edge types
6835
6765
  * (Literal["causes", "confounds", "correlates_with", "undirected"]), mathematically
6836
6766
  * preventing epistemic drift and hallucination during deep multi-hop retrieval.
6837
6767
  *
@@ -6840,7 +6770,7 @@ export interface VectorEmbeddingState2 {
6840
6770
  * allowed_causal_relationships (min_length=1) to guarantee RFC 8785 canonical hashing.
6841
6771
  * Geometric distance preservation is toggled via enforce_isometry (default=True).
6842
6772
  *
6843
- * MCP ROUTING TRIGGERS: Directed Acyclic Graph, Pearlian Traversal, Isometry Preservation,
6773
+ * MCP ROUTING TRIGGERS: Directed Acyclic Graph, DoWhy Traversal, Isometry Preservation,
6844
6774
  * Random Walk with Restart
6845
6775
  */
6846
6776
  export interface TopologicalRetrievalContract {
@@ -7107,11 +7037,11 @@ export interface QuarantineIntent {
7107
7037
  *
7108
7038
  * AGENT INSTRUCTION: Implements Supervisory Control Theory (Ramadge & Wonham) for Discrete-Event Systems, acting as a formal Mixed-Initiative Control mechanism.
7109
7039
  *
7110
- * CAUSAL AFFORDANCE: Physically halts the active Directed Acyclic Graph (DAG) traversal or Petri Net reachability loop, preventing the swarm from committing a state transition until an explicit, authorized Pearlian intervention is negotiated by the human supervisor.
7040
+ * CAUSAL AFFORDANCE: Physically halts the active Directed Acyclic Graph (DAG) traversal or Petri Net reachability loop, preventing the swarm from committing a state transition until an explicit, authorized DoWhy intervention is negotiated by the human supervisor.
7111
7041
  *
7112
7042
  * EPISTEMIC BOUNDS: Execution suspension is rigorously bounded by the temporal logic of the `adjudication_deadline` (a float representing a UNIX timestamp) and the attached FallbackSLA. The `proposed_action` schema is clamped against deep recursion constraints.
7113
7043
  *
7114
- * MCP ROUTING TRIGGERS: Supervisory Control Theory, Mixed-Initiative System, Discrete-Event System, Bounded Delay, Pearlian Intervention
7044
+ * MCP ROUTING TRIGGERS: Supervisory Control Theory, Mixed-Initiative System, Discrete-Event System, Bounded Delay, DoWhy Intervention
7115
7045
  */
7116
7046
  export interface InterventionIntent {
7117
7047
  topology_class?: TopologyClass34;
@@ -7281,11 +7211,11 @@ export interface FallbackIntent {
7281
7211
  *
7282
7212
  * AGENT INSTRUCTION: A Dictatorial Byzantine Fault Resolution mechanism. It is an absolute, zero-trust kinetic override that violently preempts autonomous algorithmic consensus or prediction market resolution.
7283
7213
  *
7284
- * CAUSAL AFFORDANCE: Forces an absolute Pearlian do-operator intervention ($do(X=x)$). Physically shatters the active causal chain of the `target_node_cid` and forcibly injects the `override_action` payload into the state vector, bypassing decentralized voting.
7214
+ * CAUSAL AFFORDANCE: Forces an absolute DoWhy do-operator intervention ($do(X=x)$). Physically shatters the active causal chain of the `target_node_cid` and forcibly injects the `override_action` payload into the state vector, bypassing decentralized voting.
7285
7215
  *
7286
7216
  * EPISTEMIC BOUNDS: The blast radius is strictly confined to the `target_node_cid`. The orchestrator must mathematically verify the `authorized_node_cid` against the highest-tier W3C DID enterprise clearance before allowing the payload to overwrite the Epistemic Blackboard (`override_action` bounded `max_length=1000`).
7287
7217
  *
7288
- * MCP ROUTING TRIGGERS: Dictatorial Override, Byzantine Fault Resolution, Pearlian Intervention, Causal Shattering, Zero-Trust Override
7218
+ * MCP ROUTING TRIGGERS: Dictatorial Override, Byzantine Fault Resolution, DoWhy Intervention, Causal Shattering, Zero-Trust Override
7289
7219
  */
7290
7220
  export interface OverrideIntent {
7291
7221
  topology_class?: TopologyClass37;
@@ -7311,11 +7241,11 @@ export interface OverrideAction {
7311
7241
  *
7312
7242
  * AGENT INSTRUCTION: Represents a non-monotonic structural revision trigger within a Defeasible Logic framework, engineered to adapt the GovernancePolicy to out-of-distribution environments.
7313
7243
  *
7314
- * CAUSAL AFFORDANCE: Triggers an active topological mutation (Pearlian intervention) to resolve logical friction, applying a strict RFC 6902 JSON Patch (`proposed_patch`) to the underlying alignment manifold.
7244
+ * CAUSAL AFFORDANCE: Triggers an active topological mutation (DoWhy intervention) to resolve logical friction, applying a strict RFC 6902 JSON Patch (`proposed_patch`) to the underlying alignment manifold.
7315
7245
  *
7316
7246
  * EPISTEMIC BOUNDS: Cryptographically anchored to the specific `drift_event_cid` (regex bounded CID `^[a-zA-Z0-9_.:-]+$`) that mathematically justified the revision. The payload is constrained to a JSON Schema object (`proposed_patch`).
7317
7247
  *
7318
- * MCP ROUTING TRIGGERS: Defeasible Logic, Non-Monotonic Revision, Out-of-Distribution Adaptation, Normative Drift Resolution, Pearlian Intervention
7248
+ * MCP ROUTING TRIGGERS: Defeasible Logic, Non-Monotonic Revision, Out-of-Distribution Adaptation, Normative Drift Resolution, DoWhy Intervention
7319
7249
  */
7320
7250
  export interface ConstitutionalAmendmentIntent {
7321
7251
  topology_class?: TopologyClass38;
@@ -7579,11 +7509,11 @@ export interface EvidentiaryGroundingSLA {
7579
7509
  * regret simulation.
7580
7510
  *
7581
7511
  * EPISTEMIC BOUNDS: The edge_class physically restricts topological connections
7582
- * to the Pearlian Literal automaton ["direct_cause", "confounder", "collider",
7512
+ * to the DoWhy Literal automaton ["direct_cause", "confounder", "collider",
7583
7513
  * "mediator"]. The source_variable and target_variable are bounded by
7584
7514
  * min_length=1 (no max_length) to prevent ghost pointer allocation.
7585
7515
  *
7586
- * MCP ROUTING TRIGGERS: Structural Causal Models, Pearlian Causality,
7516
+ * MCP ROUTING TRIGGERS: Structural Causal Models, PyWhy/DoWhy Causality,
7587
7517
  * d-separation, Do-Calculus, Directed Edge
7588
7518
  */
7589
7519
  export interface CausalDirectedEdgeState {
@@ -7786,14 +7716,12 @@ export interface ContextualizedSourceState2 {
7786
7716
  /**
7787
7717
  * CoReason Shared Kernel Ontology
7788
7718
  */
7789
- export interface InterventionalCausalTask {
7719
+ export interface DoWhyInterventionIntent {
7790
7720
  topology_class?: TopologyClass51;
7791
7721
  task_cid: TaskCid5;
7792
- target_hypothesis_cid: TargetHypothesisCid1;
7793
- intervention_variable: InterventionVariable;
7794
- do_operator_state: DoOperatorState;
7795
- expected_causal_information_gain: ExpectedCausalInformationGain;
7796
- execution_cost_budget_magnitude: ExecutionCostBudgetMagnitude2;
7722
+ treatment_variable: TreatmentVariable;
7723
+ outcome_variable: OutcomeVariable;
7724
+ common_causes?: CommonCauses;
7797
7725
  }
7798
7726
  /**
7799
7727
  * CoReason Shared Kernel Ontology
@@ -8112,9 +8040,9 @@ export interface CognitiveAgentNodeProfile {
8112
8040
  */
8113
8041
  analogical_policy?: AnalogicalMappingTask | null;
8114
8042
  /**
8115
- * The formal contract authorizing the agent to mutate variables to prove Pearlian causation.
8043
+ * The formal contract authorizing the agent to mutate variables to prove PyWhy/DoWhy causation.
8116
8044
  */
8117
- interventional_policy?: InterventionalCausalTask | null;
8045
+ interventional_policy?: DoWhyInterventionIntent | null;
8118
8046
  /**
8119
8047
  * The API-like contract allowing the agent to offload rigid logic to deterministic CPU solvers.
8120
8048
  */
@@ -9389,7 +9317,7 @@ export interface PredictionMarketState {
9389
9317
  */
9390
9318
  export interface HypothesisStakeReceipt {
9391
9319
  agent_cid: AgentCid1;
9392
- target_hypothesis_cid: TargetHypothesisCid2;
9320
+ target_hypothesis_cid: TargetHypothesisCid1;
9393
9321
  staked_magnitude: StakedMagnitude;
9394
9322
  implied_probability: ImpliedProbability;
9395
9323
  }
@@ -10513,7 +10441,6 @@ export interface VectorClock {
10513
10441
  export interface MCPToolDefinition {
10514
10442
  topology_class?: TopologyClass83;
10515
10443
  event_cid?: EventCid1;
10516
- prior_event_hash?: PriorEventHash1;
10517
10444
  timestamp?: Timestamp1;
10518
10445
  name: Name;
10519
10446
  description: Description9;
@@ -10538,7 +10465,6 @@ export interface Inputschema {
10538
10465
  */
10539
10466
  export interface CrosswalkResolutionReceipt {
10540
10467
  event_cid: EventCid2;
10541
- prior_event_hash?: PriorEventHash2;
10542
10468
  timestamp: Timestamp2;
10543
10469
  topology_class?: TopologyClass84;
10544
10470
  receipt_cid: ReceiptCid;
@@ -10583,7 +10509,6 @@ export interface DempsterShaferBeliefVector1 {
10583
10509
  */
10584
10510
  export interface EpistemicZeroTrustReceipt {
10585
10511
  event_cid: EventCid3;
10586
- prior_event_hash?: PriorEventHash3;
10587
10512
  timestamp: Timestamp3;
10588
10513
  topology_class?: TopologyClass85;
10589
10514
  intent_reference_cid: IntentReferenceCid;
@@ -10605,7 +10530,6 @@ export interface EpistemicZeroTrustReceipt {
10605
10530
  */
10606
10531
  export interface ObservationEvent {
10607
10532
  event_cid: EventCid4;
10608
- prior_event_hash?: PriorEventHash4;
10609
10533
  timestamp: Timestamp4;
10610
10534
  topology_class?: TopologyClass86;
10611
10535
  payload: Payload;
@@ -10799,7 +10723,7 @@ export interface StreamingDisfluencyContract {
10799
10723
  /**
10800
10724
  * CoReason Shared Kernel Ontology
10801
10725
  *
10802
- * AGENT INSTRUCTION: Formalizes Bayesian Belief Updating and Pearlian Causal Tracing by synthesizing internal cognitive shifts into discrete, hashable facts.
10726
+ * AGENT INSTRUCTION: Formalizes Bayesian Belief Updating and PyWhy/DoWhy Causal Tracing by synthesizing internal cognitive shifts into discrete, hashable facts.
10803
10727
  *
10804
10728
  * CAUSAL AFFORDANCE: Projects a synthesized conclusion into the shared topology, binding the new belief to `causal_attributions`.
10805
10729
  *
@@ -10809,7 +10733,6 @@ export interface StreamingDisfluencyContract {
10809
10733
  */
10810
10734
  export interface BeliefMutationEvent {
10811
10735
  event_cid: EventCid5;
10812
- prior_event_hash?: PriorEventHash5;
10813
10736
  timestamp: Timestamp5;
10814
10737
  topology_class?: TopologyClass89;
10815
10738
  payload: Payload1;
@@ -10849,7 +10772,7 @@ export interface Payload1 {
10849
10772
  /**
10850
10773
  * CoReason Shared Kernel Ontology
10851
10774
  *
10852
- * AGENT INSTRUCTION: Formalizes Pearlian causal tracing, linking a localized cognitive
10775
+ * AGENT INSTRUCTION: Formalizes PyWhy/DoWhy causal tracing, linking a localized cognitive
10853
10776
  * synthesis back to its historical Merkle-DAG origin. As a ...State suffix, this is a
10854
10777
  * declarative, frozen snapshot of a causal connection at a point in time.
10855
10778
  *
@@ -10860,7 +10783,7 @@ export interface Payload1 {
10860
10783
  * probability distribution (ge=0.0, le=1.0). The source_event_cid is locked to a 128-char
10861
10784
  * CID regex (^[a-zA-Z0-9_.:-]+$).
10862
10785
  *
10863
- * MCP ROUTING TRIGGERS: Pearlian Causal Tracing, Directed Acyclic Graph, Causal Lineage,
10786
+ * MCP ROUTING TRIGGERS: PyWhy/DoWhy Causal Tracing, Directed Acyclic Graph, Causal Lineage,
10864
10787
  * Attention Weighting, Influence Distribution
10865
10788
  */
10866
10789
  export interface CausalAttributionState {
@@ -10870,13 +10793,13 @@ export interface CausalAttributionState {
10870
10793
  /**
10871
10794
  * CoReason Shared Kernel Ontology
10872
10795
  *
10873
- * AGENT INSTRUCTION: Formalizes Pearlian Structural Causal Models (SCMs) and Variational Free Energy to mathematically quantify and partition irreducible aleatoric noise from actionable epistemic knowledge gaps.
10796
+ * AGENT INSTRUCTION: Formalizes PyWhy/DoWhy Structural Causal Models (SCMs) and Variational Free Energy to mathematically quantify and partition irreducible aleatoric noise from actionable epistemic knowledge gaps.
10874
10797
  *
10875
- * CAUSAL AFFORDANCE: Unlocks non-monotonic logic via Pearlian do-operators, computing exactly when to trigger a structural abductive escalation or active inference loop via the `requires_abductive_escalation` flag.
10798
+ * CAUSAL AFFORDANCE: Unlocks non-monotonic logic via DoWhy do-operators, computing exactly when to trigger a structural abductive escalation or active inference loop via the `requires_abductive_escalation` flag.
10876
10799
  *
10877
10800
  * EPISTEMIC BOUNDS: Enforces absolute mathematical float boundaries `[ge=0.0, le=1.0]` on `aleatoric_entropy`, `epistemic_uncertainty`, and `semantic_consistency_score`, mathematically preventing probability wave overflow across all three continuous dimensions.
10878
10801
  *
10879
- * MCP ROUTING TRIGGERS: Structural Causal Models, Active Inference, Variational Free Energy, Aleatoric Entropy, Pearlian Do-Calculus
10802
+ * MCP ROUTING TRIGGERS: Structural Causal Models, Active Inference, Variational Free Energy, Aleatoric Entropy, DoWhy Do-Calculus
10880
10803
  */
10881
10804
  export interface CognitiveUncertaintyProfile1 {
10882
10805
  aleatoric_noise_ratio: AleatoricNoiseRatio;
@@ -10924,7 +10847,6 @@ export interface LatentScratchpadReceipt {
10924
10847
  */
10925
10848
  export interface SystemFaultEvent {
10926
10849
  event_cid: EventCid6;
10927
- prior_event_hash?: PriorEventHash6;
10928
10850
  timestamp: Timestamp6;
10929
10851
  topology_class?: TopologyClass90;
10930
10852
  }
@@ -10942,7 +10864,6 @@ export interface SystemFaultEvent {
10942
10864
  export interface AtomicPropositionState {
10943
10865
  topology_class?: TopologyClass91;
10944
10866
  event_cid: EventCid7;
10945
- prior_event_hash?: PriorEventHash7;
10946
10867
  timestamp: Timestamp7;
10947
10868
  proposition_cid: PropositionCid;
10948
10869
  rhetorical_role: RhetoricalStructureProfile;
@@ -10983,7 +10904,6 @@ export interface EmpiricalStatisticalProfile {
10983
10904
  export interface PostCoordinatedSemanticState {
10984
10905
  topology_class?: TopologyClass92;
10985
10906
  event_cid: EventCid8;
10986
- prior_event_hash?: PriorEventHash8;
10987
10907
  timestamp: Timestamp8;
10988
10908
  concept_cid: ConceptCid;
10989
10909
  /**
@@ -11013,7 +10933,6 @@ export interface ContextualModifiers {
11013
10933
  */
11014
10934
  export interface ArtifactCorruptionEvent {
11015
10935
  event_cid: EventCid9;
11016
- prior_event_hash?: PriorEventHash9;
11017
10936
  timestamp: Timestamp9;
11018
10937
  topology_class?: TopologyClass93;
11019
10938
  artifact_cid: ArtifactCid;
@@ -11033,7 +10952,6 @@ export interface ArtifactCorruptionEvent {
11033
10952
  */
11034
10953
  export interface HypothesisGenerationEvent {
11035
10954
  event_cid: EventCid10;
11036
- prior_event_hash?: PriorEventHash10;
11037
10955
  timestamp: Timestamp10;
11038
10956
  topology_class?: TopologyClass94;
11039
10957
  hypothesis_cid: HypothesisCid;
@@ -11044,23 +10962,22 @@ export interface HypothesisGenerationEvent {
11044
10962
  /**
11045
10963
  * The formal DAG representing the agent's structural assumptions about the environment.
11046
10964
  */
11047
- causal_model?: StructuralCausalGraphProfile | null;
10965
+ causal_model?: CausalGraphDefinition | null;
11048
10966
  }
11049
10967
  /**
11050
10968
  * CoReason Shared Kernel Ontology
11051
10969
  *
11052
- * AGENT INSTRUCTION: Formalizes Judea Pearl's Structural Causal Models (SCMs) by mapping the causal topology of observed and latent variables.
10970
+ * AGENT INSTRUCTION: Generic graph representation compatible with DoWhy (PyWhy).
11053
10971
  *
11054
- * CAUSAL AFFORDANCE: Unlocks do-calculus and interventional logic by providing the orchestrator with the explicit DAG required to identify confounders and compute causal effects.
10972
+ * CAUSAL AFFORDANCE: Allows DoWhy to initialize a CausalModel using standardized DOT/GML strings or generic node/edge dictionaries.
11055
10973
  *
11056
- * EPISTEMIC BOUNDS: Variables are constrained by strict bounds (max_length=255). The @model_validator deterministically sorts observed_variables, latent_variables, and causal_edges to mathematically guarantee zero-variance RFC 8785 canonical hashing.
10974
+ * EPISTEMIC BOUNDS: Bounded to strict constraints on string length for DOT/GML inputs to prevent buffer overflows during DoWhy parsing.
11057
10975
  *
11058
- * MCP ROUTING TRIGGERS: Structural Causal Models, Pearlian DAG, Latent Confounder, d-separation, Interventional Topology
10976
+ * MCP ROUTING TRIGGERS: DoWhy, PyWhy, Causal Graph, DOT, GML, CausalModel
11059
10977
  */
11060
- export interface StructuralCausalGraphProfile {
11061
- observed_variables: ObservedVariables;
11062
- latent_variables: LatentVariables;
11063
- causal_edges: CausalEdges1;
10978
+ export interface CausalGraphDefinition {
10979
+ graph_format: GraphFormat;
10980
+ graph_payload: GraphPayload;
11064
10981
  }
11065
10982
  /**
11066
10983
  * CoReason Shared Kernel Ontology
@@ -11075,7 +10992,6 @@ export interface StructuralCausalGraphProfile {
11075
10992
  */
11076
10993
  export interface BargeInInterruptEvent {
11077
10994
  event_cid: EventCid11;
11078
- prior_event_hash?: PriorEventHash11;
11079
10995
  timestamp: Timestamp11;
11080
10996
  topology_class?: TopologyClass95;
11081
10997
  target_event_cid: TargetEventCid1;
@@ -11089,17 +11005,16 @@ export interface BargeInInterruptEvent {
11089
11005
  /**
11090
11006
  * CoReason Shared Kernel Ontology
11091
11007
  *
11092
- * AGENT INSTRUCTION: Employs Counterfactual Regret Minimization (CFR) and Pearlian Do-Calculus to execute simulated alternative timelines for policy refinement.
11008
+ * AGENT INSTRUCTION: Employs Counterfactual Regret Minimization (CFR) and DoWhy Do-Calculus to execute simulated alternative timelines for policy refinement.
11093
11009
  *
11094
11010
  * CAUSAL AFFORDANCE: Commits a simulated causal divergence (intervention) into the ledger, mathematically quantifying the opportunity cost (regret) to backpropagate stateless adjustments to the routing policy.
11095
11011
  *
11096
11012
  * EPISTEMIC BOUNDS: Anchored to `historical_event_cid` (128-char CID). Expected utilities and `epistemic_regret` are physically capped at `le=18446744073709551615.0`. `policy_mutation_gradients` restrict tensor adjustments.
11097
11013
  *
11098
- * MCP ROUTING TRIGGERS: Counterfactual Regret Minimization, Pearlian Do-Calculus, Opportunity Cost, Alternative Timeline, Policy Gradient Update
11014
+ * MCP ROUTING TRIGGERS: Counterfactual Regret Minimization, DoWhy Do-Calculus, Opportunity Cost, Alternative Timeline, Policy Gradient Update
11099
11015
  */
11100
11016
  export interface CounterfactualRegretEvent {
11101
11017
  event_cid: EventCid12;
11102
- prior_event_hash?: PriorEventHash12;
11103
11018
  timestamp: Timestamp12;
11104
11019
  topology_class?: TopologyClass96;
11105
11020
  historical_event_cid: HistoricalEventCid;
@@ -11124,11 +11039,10 @@ export interface PolicyMutationGradients {
11124
11039
  *
11125
11040
  * EPISTEMIC BOUNDS: `parameters` payload is volumetrically capped by `enforce_payload_topology`. To prevent infinite compute loops, `authorized_budget_magnitude` is mandated `ge=1`. `zk_proof` serves as mathematical authorization proof.
11126
11041
  *
11127
- * MCP ROUTING TRIGGERS: Pearlian Do-Operator, Kinetic Commitment, Active Inference, Thermodynamic Escrow, Zero-Trust Actuation
11042
+ * MCP ROUTING TRIGGERS: DoWhy Do-Operator, Kinetic Commitment, Active Inference, Thermodynamic Escrow, Zero-Trust Actuation
11128
11043
  */
11129
11044
  export interface ToolInvocationEvent {
11130
11045
  event_cid: EventCid13;
11131
- prior_event_hash?: PriorEventHash13;
11132
11046
  timestamp: Timestamp13;
11133
11047
  topology_class?: TopologyClass97;
11134
11048
  tool_name: ToolName1;
@@ -11194,7 +11108,6 @@ export interface ZeroKnowledgeReceipt1 {
11194
11108
  */
11195
11109
  export interface EpistemicPromotionEvent {
11196
11110
  event_cid: EventCid14;
11197
- prior_event_hash?: PriorEventHash14;
11198
11111
  timestamp: Timestamp14;
11199
11112
  topology_class?: TopologyClass98;
11200
11113
  source_episodic_event_cids: SourceEpisodicEventCids;
@@ -11214,7 +11127,6 @@ export interface EpistemicPromotionEvent {
11214
11127
  */
11215
11128
  export interface PersistenceCommitReceipt {
11216
11129
  event_cid: EventCid15;
11217
- prior_event_hash?: PriorEventHash15;
11218
11130
  timestamp: Timestamp15;
11219
11131
  topology_class?: TopologyClass99;
11220
11132
  lakehouse_snapshot_cid: LakehouseSnapshotCid;
@@ -11234,7 +11146,6 @@ export interface PersistenceCommitReceipt {
11234
11146
  */
11235
11147
  export interface TokenBurnReceipt {
11236
11148
  event_cid: EventCid16;
11237
- prior_event_hash?: PriorEventHash16;
11238
11149
  timestamp: Timestamp16;
11239
11150
  topology_class?: TopologyClass100;
11240
11151
  tool_invocation_cid: ToolInvocationCid;
@@ -11255,7 +11166,6 @@ export interface TokenBurnReceipt {
11255
11166
  */
11256
11167
  export interface BudgetExhaustionEvent {
11257
11168
  event_cid: EventCid17;
11258
- prior_event_hash?: PriorEventHash17;
11259
11169
  timestamp: Timestamp17;
11260
11170
  topology_class?: TopologyClass101;
11261
11171
  exhausted_escrow_cid: ExhaustedEscrowCid;
@@ -11274,7 +11184,6 @@ export interface BudgetExhaustionEvent {
11274
11184
  */
11275
11185
  export interface EpistemicTelemetryEvent {
11276
11186
  event_cid: EventCid18;
11277
- prior_event_hash?: PriorEventHash18;
11278
11187
  timestamp: Timestamp18;
11279
11188
  topology_class?: TopologyClass102;
11280
11189
  interaction_modality: InteractionModality;
@@ -11298,7 +11207,6 @@ export interface EpistemicTelemetryEvent {
11298
11207
  */
11299
11208
  export interface CognitivePredictionReceipt {
11300
11209
  event_cid: EventCid19;
11301
- prior_event_hash?: PriorEventHash19;
11302
11210
  timestamp: Timestamp19;
11303
11211
  topology_class?: TopologyClass103;
11304
11212
  source_chain_cid: SourceChainCid;
@@ -11318,7 +11226,6 @@ export interface CognitivePredictionReceipt {
11318
11226
  */
11319
11227
  export interface EpistemicAxiomVerificationReceipt {
11320
11228
  event_cid: EventCid20;
11321
- prior_event_hash?: PriorEventHash20;
11322
11229
  timestamp: Timestamp20;
11323
11230
  topology_class?: TopologyClass104;
11324
11231
  source_prediction_cid: SourcePredictionCid;
@@ -11352,7 +11259,6 @@ export interface EpistemicAxiomVerificationReceipt {
11352
11259
  */
11353
11260
  export interface EpistemicFlowStateReceipt {
11354
11261
  event_cid: EventCid21;
11355
- prior_event_hash?: PriorEventHash21;
11356
11262
  timestamp: Timestamp21;
11357
11263
  topology_class?: TopologyClass105;
11358
11264
  source_trajectory_cid: SourceTrajectoryCid;
@@ -11381,7 +11287,6 @@ export interface EpistemicFlowStateReceipt {
11381
11287
  */
11382
11288
  export interface CausalExplanationEvent {
11383
11289
  event_cid: EventCid22;
11384
- prior_event_hash?: PriorEventHash22;
11385
11290
  timestamp: Timestamp22;
11386
11291
  topology_class?: TopologyClass106;
11387
11292
  target_outcome_event_cid: TargetOutcomeEventCid;
@@ -11445,7 +11350,6 @@ export interface ShapleyAttributionReceipt {
11445
11350
  */
11446
11351
  export interface IntentClassificationReceipt {
11447
11352
  event_cid: EventCid23;
11448
- prior_event_hash?: PriorEventHash23;
11449
11353
  timestamp: Timestamp23;
11450
11354
  topology_class?: TopologyClass107;
11451
11355
  raw_input_string: RawInputString;
@@ -11467,7 +11371,6 @@ export interface IntentClassificationReceipt {
11467
11371
  export interface SemanticRelationalVectorState {
11468
11372
  topology_class?: TopologyClass108;
11469
11373
  event_cid: EventCid24;
11470
- prior_event_hash?: PriorEventHash24;
11471
11374
  timestamp: Timestamp24;
11472
11375
  ontology_class: UpperOntologyClassProfile;
11473
11376
  temporal_bounds: TemporalBoundsProfile1;
@@ -11512,7 +11415,6 @@ export interface PayloadInjectionZone {
11512
11415
  export interface OntologicalReificationReceipt {
11513
11416
  topology_class?: TopologyClass109;
11514
11417
  event_cid: EventCid25;
11515
- prior_event_hash?: PriorEventHash25;
11516
11418
  timestamp: Timestamp25;
11517
11419
  source_data_hash: SourceDataHash;
11518
11420
  target_namespace: TargetNamespace;
@@ -11551,7 +11453,6 @@ export interface DempsterShaferBeliefVector2 {
11551
11453
  */
11552
11454
  export interface CircuitBreakerEvent {
11553
11455
  event_cid: EventCid26;
11554
- prior_event_hash?: PriorEventHash26;
11555
11456
  timestamp: Timestamp26;
11556
11457
  topology_class?: TopologyClass110;
11557
11458
  /**
@@ -11582,7 +11483,6 @@ export interface CircuitBreakerEvent {
11582
11483
  */
11583
11484
  export interface ExogenousEpistemicEvent {
11584
11485
  event_cid: EventCid27;
11585
- prior_event_hash?: PriorEventHash27;
11586
11486
  timestamp: Timestamp27;
11587
11487
  topology_class?: TopologyClass111;
11588
11488
  shock_cid: ShockCid;
@@ -11616,7 +11516,6 @@ export interface SimulationEscrowContract {
11616
11516
  */
11617
11517
  export interface EpistemicLogEvent {
11618
11518
  event_cid: EventCid28;
11619
- prior_event_hash?: PriorEventHash28;
11620
11519
  topology_class?: TopologyClass112;
11621
11520
  timestamp: Timestamp28;
11622
11521
  level: Level;
@@ -11650,7 +11549,6 @@ export interface TelemetryContextProfile {
11650
11549
  export interface InterventionReceipt {
11651
11550
  topology_class?: TopologyClass113;
11652
11551
  event_cid: EventCid29;
11653
- prior_event_hash?: PriorEventHash29;
11654
11552
  timestamp: Timestamp29;
11655
11553
  intervention_request_cid: InterventionRequestCid;
11656
11554
  /**
@@ -11707,7 +11605,6 @@ export interface WetwareAttestationContract {
11707
11605
  */
11708
11606
  export interface CustodyReceipt {
11709
11607
  event_cid: EventCid30;
11710
- prior_event_hash?: PriorEventHash30;
11711
11608
  timestamp: Timestamp30;
11712
11609
  topology_class?: TopologyClass114;
11713
11610
  custody_cid: CustodyCid;
@@ -11730,7 +11627,6 @@ export interface CustodyReceipt {
11730
11627
  */
11731
11628
  export interface DefeasibleAttackEvent {
11732
11629
  event_cid: EventCid31;
11733
- prior_event_hash?: PriorEventHash31;
11734
11630
  timestamp: Timestamp31;
11735
11631
  topology_class?: TopologyClass115;
11736
11632
  attack_cid: AttackCid;
@@ -11754,7 +11650,6 @@ export interface DefeasibleAttackEvent {
11754
11650
  */
11755
11651
  export interface EpistemicRejectionReceipt {
11756
11652
  event_cid: EventCid32;
11757
- prior_event_hash?: PriorEventHash32;
11758
11653
  timestamp: Timestamp32;
11759
11654
  topology_class?: TopologyClass116;
11760
11655
  receipt_cid: ReceiptCid1;
@@ -11776,7 +11671,6 @@ export interface EpistemicRejectionReceipt {
11776
11671
  */
11777
11672
  export interface FormalVerificationReceipt {
11778
11673
  event_cid: EventCid33;
11779
- prior_event_hash?: PriorEventHash33;
11780
11674
  timestamp: Timestamp33;
11781
11675
  topology_class?: TopologyClass117;
11782
11676
  /**
@@ -11795,7 +11689,6 @@ export interface BeliefModulationReceipt {
11795
11689
  topology_class?: TopologyClass118;
11796
11690
  receipt_cid: ReceiptCid2;
11797
11691
  event_cid: EventCid34;
11798
- prior_event_hash?: PriorEventHash34;
11799
11692
  timestamp: Timestamp34;
11800
11693
  target_graph_cid: TargetGraphCid4;
11801
11694
  grounded_edges: GroundedEdges;
@@ -11811,7 +11704,6 @@ export interface RDFExportReceipt {
11811
11704
  topology_class?: TopologyClass119;
11812
11705
  export_cid: ExportCid1;
11813
11706
  event_cid: EventCid35;
11814
- prior_event_hash?: PriorEventHash35;
11815
11707
  timestamp: Timestamp35;
11816
11708
  serialized_payload: SerializedPayload;
11817
11709
  rdf_triple_count: RdfTripleCount;
@@ -11830,7 +11722,6 @@ export interface RDFExportReceipt {
11830
11722
  */
11831
11723
  export interface EpistemicStarvationEvent {
11832
11724
  event_cid: EventCid36;
11833
- prior_event_hash?: PriorEventHash36;
11834
11725
  timestamp: Timestamp36;
11835
11726
  topology_class?: TopologyClass120;
11836
11727
  starved_edge_cid: StarvedEdgeCid;
@@ -11850,7 +11741,6 @@ export interface EpistemicStarvationEvent {
11850
11741
  */
11851
11742
  export interface SPARQLQueryResultReceipt {
11852
11743
  event_cid: EventCid37;
11853
- prior_event_hash?: PriorEventHash37;
11854
11744
  timestamp: Timestamp37;
11855
11745
  topology_class?: TopologyClass121;
11856
11746
  query_intent_cid: QueryIntentCid;
@@ -11894,7 +11784,6 @@ export interface OracleExecutionReceipt {
11894
11784
  */
11895
11785
  export interface GuardrailViolationEvent {
11896
11786
  event_cid: EventCid38;
11897
- prior_event_hash?: PriorEventHash38;
11898
11787
  timestamp: Timestamp38;
11899
11788
  topology_class?: TopologyClass123;
11900
11789
  violation_id: ViolationId;
@@ -11908,6 +11797,117 @@ export interface GuardrailViolationEvent {
11908
11797
  export interface ViolationDetails {
11909
11798
  [k: string]: unknown;
11910
11799
  }
11800
+ /**
11801
+ * CoReason Shared Kernel Ontology
11802
+ *
11803
+ * AGENT INSTRUCTION: A test-time hypothesis representing the intent to discover a causal graph from observational data.
11804
+ * CAUSAL AFFORDANCE: Unlocks the ability to execute SCM construction via PC or FCI algorithms.
11805
+ * EPISTEMIC BOUNDS: Bounded by max_discrete_bins (le=100) to prevent combinatorial explosion.
11806
+ * MCP ROUTING TRIGGERS: Causal Inference, Structural Causal Models, PyWhy, Directed Acyclic Graph, causallearn
11807
+ */
11808
+ export interface CausalDiscoveryIntent {
11809
+ topology_class?: TopologyClass124;
11810
+ dataset_uri: DatasetUri;
11811
+ discovery_algorithm: DiscoveryAlgorithm;
11812
+ max_discrete_bins?: MaxDiscreteBins;
11813
+ }
11814
+ /**
11815
+ * CoReason Shared Kernel Ontology
11816
+ *
11817
+ * AGENT INSTRUCTION: A cryptographically frozen historical fact representing the result of a causal discovery execution.
11818
+ * CAUSAL AFFORDANCE: Confirms the successful generation of a causal graph from observational data.
11819
+ * EPISTEMIC BOUNDS: Requires a strict causal graph representation.
11820
+ * MCP ROUTING TRIGGERS: Causal Inference, Structural Causal Models, PyWhy, Directed Acyclic Graph, causallearn
11821
+ */
11822
+ export interface CausalDiscoveryReceipt {
11823
+ topology_class?: TopologyClass125;
11824
+ causal_graph: StructuralCausalGraphProfile;
11825
+ discovery_algorithm_used: DiscoveryAlgorithmUsed;
11826
+ }
11827
+ /**
11828
+ * The structural causal graph discovered.
11829
+ */
11830
+ export interface StructuralCausalGraphProfile {
11831
+ topology_class?: TopologyClass126;
11832
+ edges?: Edges1;
11833
+ nodes?: Nodes13;
11834
+ }
11835
+ /**
11836
+ * CoReason Shared Kernel Ontology
11837
+ *
11838
+ * AGENT INSTRUCTION: A test-time hypothesis to estimate the causal effect of a treatment on an outcome.
11839
+ * CAUSAL AFFORDANCE: Unlocks back-door/front-door adjustments and returns the Average Treatment Effect (ATE).
11840
+ * EPISTEMIC BOUNDS: Requires a strict causal graph representation and identified treatment/outcome variables.
11841
+ * MCP ROUTING TRIGGERS: Causal Inference, Average Treatment Effect, DoWhy, Causal Estimand
11842
+ */
11843
+ export interface DoWhyEstimationIntent {
11844
+ topology_class?: TopologyClass127;
11845
+ causal_graph: StructuralCausalGraphProfile1;
11846
+ treatment: Treatment;
11847
+ outcome: Outcome;
11848
+ }
11849
+ /**
11850
+ * The structural causal graph to use for estimation.
11851
+ */
11852
+ export interface StructuralCausalGraphProfile1 {
11853
+ topology_class?: TopologyClass126;
11854
+ edges?: Edges1;
11855
+ nodes?: Nodes13;
11856
+ }
11857
+ /**
11858
+ * CoReason Shared Kernel Ontology
11859
+ *
11860
+ * AGENT INSTRUCTION: A cryptographically frozen historical fact representing the result of a DoWhy estimation.
11861
+ * CAUSAL AFFORDANCE: Confirms the identified estimand and the estimated Average Treatment Effect (ATE).
11862
+ * EPISTEMIC BOUNDS: The refutation_p_value must be mathematically bounded between 0.0 and 1.0.
11863
+ * MCP ROUTING TRIGGERS: Causal Inference, Average Treatment Effect, DoWhy, Causal Estimand
11864
+ */
11865
+ export interface DoWhyEstimationReceipt {
11866
+ topology_class?: TopologyClass128;
11867
+ identified_estimand: IdentifiedEstimand;
11868
+ average_treatment_effect: AverageTreatmentEffect;
11869
+ refutation_p_value: RefutationPValue;
11870
+ }
11871
+ /**
11872
+ * CoReason Shared Kernel Ontology
11873
+ *
11874
+ * AGENT INSTRUCTION: A test-time hypothesis to explore varying causal effects across diverse sub-populations.
11875
+ * CAUSAL AFFORDANCE: Unlocks Double Machine Learning (DML) to estimate Conditional Average Treatment Effects (CATE).
11876
+ * EPISTEMIC BOUNDS: Requires a DoWhyEstimationReceipt to guarantee the presence of a validated ATE estimation.
11877
+ * MCP ROUTING TRIGGERS: Causal Inference, Heterogeneous Treatment Effect, Double Machine Learning, EconML
11878
+ */
11879
+ export interface EconMLCATEIntent {
11880
+ topology_class?: TopologyClass129;
11881
+ base_estimation_receipt: DoWhyEstimationReceipt1;
11882
+ features?: Features;
11883
+ }
11884
+ /**
11885
+ * CoReason Shared Kernel Ontology
11886
+ *
11887
+ * AGENT INSTRUCTION: A cryptographically frozen historical fact representing the result of a DoWhy estimation.
11888
+ * CAUSAL AFFORDANCE: Confirms the identified estimand and the estimated Average Treatment Effect (ATE).
11889
+ * EPISTEMIC BOUNDS: The refutation_p_value must be mathematically bounded between 0.0 and 1.0.
11890
+ * MCP ROUTING TRIGGERS: Causal Inference, Average Treatment Effect, DoWhy, Causal Estimand
11891
+ */
11892
+ export interface DoWhyEstimationReceipt1 {
11893
+ topology_class?: TopologyClass128;
11894
+ identified_estimand: IdentifiedEstimand;
11895
+ average_treatment_effect: AverageTreatmentEffect;
11896
+ refutation_p_value: RefutationPValue;
11897
+ }
11898
+ /**
11899
+ * CoReason Shared Kernel Ontology
11900
+ *
11901
+ * AGENT INSTRUCTION: A cryptographically frozen historical fact representing the result of an EconML CATE estimation.
11902
+ * CAUSAL AFFORDANCE: Confirms the identified conditional average treatment effect.
11903
+ * EPISTEMIC BOUNDS: The cate_estimate must be mathematically valid.
11904
+ * MCP ROUTING TRIGGERS: Causal Inference, Heterogeneous Treatment Effect, Double Machine Learning, EconML
11905
+ */
11906
+ export interface HTEEstimationReceipt {
11907
+ topology_class?: TopologyClass130;
11908
+ features?: Features1;
11909
+ cate_estimate: CateEstimate;
11910
+ }
11911
11911
  /**
11912
11912
  * CoReason Shared Kernel Ontology
11913
11913
  *
@@ -11920,7 +11920,7 @@ export interface ViolationDetails {
11920
11920
  * MCP ROUTING TRIGGERS: Markov Decision Process, Acyclic Edge, Stochastic Routing, Transition Probability, Directed Graph
11921
11921
  */
11922
11922
  export interface TransitionEdgeProfile {
11923
- topology_class?: TopologyClass124;
11923
+ topology_class?: TopologyClass131;
11924
11924
  target_node_cid?: TargetNodeCid1;
11925
11925
  /**
11926
11926
  * Dynamic discovery intent for bridging nodes.
@@ -11964,7 +11964,7 @@ export interface EdgeMappingContract {
11964
11964
  * MCP ROUTING TRIGGERS: Markov Decision Process, Cyclic Edge, Bellman Equation, Thermodynamic Discounting, Recursive Traversal
11965
11965
  */
11966
11966
  export interface CyclicEdgeProfile {
11967
- topology_class?: TopologyClass125;
11967
+ topology_class?: TopologyClass132;
11968
11968
  target_node_cid?: TargetNodeCid2;
11969
11969
  /**
11970
11970
  * Dynamic discovery intent for bridging nodes.
@@ -12432,7 +12432,7 @@ export interface CrystallizationPolicy {
12432
12432
  *
12433
12433
  * AGENT INSTRUCTION: Executes Jon Doyle's Truth Maintenance System (TMS) protocol. As an ...Event suffix, this is an append-only coordinate on the Merkle-DAG representing the active propagation of belief retraction.
12434
12434
  *
12435
- * CAUSAL AFFORDANCE: Applies a Pearlian do-operator to mathematically zero-out the probability mass of the `quarantined_event_cids` subgraph, physically halting all execution branches dependent on the `root_falsified_event_cid` to prevent epistemic contagion.
12435
+ * CAUSAL AFFORDANCE: Applies a DoWhy do-operator to mathematically zero-out the probability mass of the `quarantined_event_cids` subgraph, physically halting all execution branches dependent on the `root_falsified_event_cid` to prevent epistemic contagion.
12436
12436
  *
12437
12437
  * EPISTEMIC BOUNDS: The Shannon Entropy reduction across edges is strictly clamped by `propagated_decay_factor` (`ge=0.0, le=1.0`). Deterministic alignment is guaranteed by a `@model_validator` that physically sorts the `quarantined_event_cids` array. A second validator mathematically rejects root events appearing in quarantine (`reject_root_in_quarantine`).
12438
12438
  *
@@ -12975,13 +12975,13 @@ export interface EpistemicHydrationPolicy {
12975
12975
  /**
12976
12976
  * CoReason Shared Kernel Ontology
12977
12977
  *
12978
- * AGENT INSTRUCTION: Formalizes Event Sourcing and the Merkle-DAG structure as the absolute, immutable source of truth for the swarm, fully partitioned from volatile memory.
12978
+ * AGENT INSTRUCTION: Formalizes Event Sourcing as the absolute, immutable source of truth for the swarm, fully partitioned from volatile memory. Provenance is delegated to Sigstore (Cosign + Rekor transparency log) via the CI/CD pipeline.
12979
12979
  *
12980
12980
  * CAUSAL AFFORDANCE: Permanently crystallizes validated events into the `history` log. Applies Truth Maintenance, context eviction, and tracks active `DefeasibleCascadeEvents` and `RollbackIntents`.
12981
12981
  *
12982
12982
  * EPISTEMIC BOUNDS: The `@model_validator` `_enforce_canonical_sort` deterministically sorts history by timestamp, checkpoints by ID, and active cascades—guaranteeing invariant RFC 8785 canonical hashing. Validation prevents epistemic paradoxes (child before parent).
12983
12983
  *
12984
- * MCP ROUTING TRIGGERS: Event Sourcing, Merkle-DAG, Immutable Ledger, Truth Crystallization, Chronological Sort
12984
+ * MCP ROUTING TRIGGERS: Event Sourcing, Sigstore, Rekor Transparency Log, Immutable Ledger, Truth Crystallization, Chronological Sort
12985
12985
  */
12986
12986
  export interface EpistemicLedgerState {
12987
12987
  history: History;
@@ -13959,7 +13959,7 @@ export interface ReasoningEngineeringPolicy {
13959
13959
  * EpistemicProvenanceReceipt, temporal_bounds: TemporalBoundsProfile) extend the edge
13960
13960
  * geometry without mandatory overhead.
13961
13961
  *
13962
- * MCP ROUTING TRIGGERS: Structural Causal Models, Pearlian Directed Edge, Semantic
13962
+ * MCP ROUTING TRIGGERS: Structural Causal Models, DoWhy Directed Edge, Semantic
13963
13963
  * Triplet, Adjacency Matrix, Epistemic Link
13964
13964
  */
13965
13965
  export interface SemanticEdgeState {
@@ -14167,6 +14167,19 @@ export interface StateVectorProfile1 {
14167
14167
  mutable_matrix?: MutableMatrix;
14168
14168
  is_delta?: IsDelta;
14169
14169
  }
14170
+ /**
14171
+ * CoReason Shared Kernel Ontology
14172
+ *
14173
+ * AGENT INSTRUCTION: A declarative, frozen snapshot of an N-dimensional coordinate representing a causal graph.
14174
+ * CAUSAL AFFORDANCE: Provides the structural geometry required for back-door and front-door adjustment estimations.
14175
+ * EPISTEMIC BOUNDS: Mathematically defines a Directed Acyclic Graph (DAG) or Acyclic Directed Mixed Graph (ADMG).
14176
+ * MCP ROUTING TRIGGERS: Causal Inference, Structural Causal Models, PyWhy, Directed Acyclic Graph, causallearn
14177
+ */
14178
+ export interface StructuralCausalGraphProfile2 {
14179
+ topology_class?: TopologyClass126;
14180
+ edges?: Edges1;
14181
+ nodes?: Nodes13;
14182
+ }
14170
14183
  /**
14171
14184
  * CoReason Shared Kernel Ontology
14172
14185
  *