Contracts Registry (v0) β
This registry defines canonical JSON payloads between CEO, ACS, and HCS, with version fields and minimal required keys. Keep examples machineβparsable.
Canonical defaults (applied when fields are omitted) β
- Budget (aligned with canonical schema)
- tokens_max: 2048 (max context generated across all fragments)
- time_ms: 2500 (wall time budget for ACS+HCS end-to-end)
- Risk profile
- level: "medium" (enum: "low", "medium", "high")
- Privacy mode
- privacy_mode: "redact" (enum: "allow", "redact", "block")
- Pacing (HCS specific - draft only)
- mode: guarded
- min_chunk_ms: 90
- max_burst: 3 frames
- ack_window: 16 (max in-flight frames before backpressure)
Notes
- If a stricter budget is provided by CEO, ACS/HCS MUST comply and can further tighten (never loosen) constraints.
- When both tokens_max and time_ms budgets exist, ACS planner prioritizes the tighter constraint first.
- All examples now conform to canonical schemas in
/architecture/orchestration/schemas/
.
CEO β ACS: render_request.v0 β
Required keys: version, id, intent, budgets, request_id (per canonical schema)
json
{
"version": "v0",
"id": "550e8400-e29b-41d4-a716-446655440000",
"intent": "Find authentication issues in React app and suggest debugging steps",
"budgets": {
"tokens_max": 2000,
"time_ms": 2500
},
"risk_profile": {
"level": "medium"
},
"privacy_mode": "redact",
"request_id": "req-550e8400-e29b-41d4-a716-446655440000"
}
CEO β HCS: stream_init.v0 β
json
{
"version": "v0",
"task_id": "string",
"pacing": "progressive|burst|drip|guarded",
"client_caps": {"supports_delta": true, "max_chunk_tokens": 500},
"targets": ["string"]
}
HCS runtime signal.v0 β
json
{"version": "v0", "signal": "need_atomic|need_micro|pause|resume|speed_up|speed_down|viewport|ack", "seq": 1}
ACS β CEO: render_context_reply.v0 β
json
{
"request_id": "req-550e8400-e29b-41d4-a716-446655440000",
"fragments": [
{
"id": "frag_auth_issue_001",
"lod": "macro",
"text": "Authentication middleware in Express.js verifies JWT tokens...",
"entities": ["jwt", "middleware", "authentication"],
"cost_tokens": 150
},
{
"id": "frag_debug_steps_002",
"lod": "micro",
"text": "To debug JWT issues: 1. Check token expiration, 2. Verify secret key...",
"entities": ["debugging", "jwt", "troubleshooting"],
"cost_tokens": 200
}
],
"kv_policy": {
"pin": ["auth_middleware.js"],
"compress": ["old_logs"],
"evict": ["temp_files"]
},
"metrics": {
"used_tokens": 350,
"planner_ms": 125,
"coverage_entities": 0.85
}
}
Versioning β
- v0 is unstable, subject to breaking changes; add
version
to all payloads - For changes: bump minor for additive fields; bump major for removals/renames