Skip to content

Contracts Registry (v0) ​

This registry defines canonical JSON payloads between CEO, ACS, and HCS, with version fields and minimal required keys. Keep examples machine‑parsable.

Canonical defaults (applied when fields are omitted) ​

  • Budget (aligned with canonical schema)
    • tokens_max: 2048 (max context generated across all fragments)
    • time_ms: 2500 (wall time budget for ACS+HCS end-to-end)
  • Risk profile
    • level: "medium" (enum: "low", "medium", "high")
  • Privacy mode
    • privacy_mode: "redact" (enum: "allow", "redact", "block")
  • Pacing (HCS specific - draft only)
    • mode: guarded
    • min_chunk_ms: 90
    • max_burst: 3 frames
    • ack_window: 16 (max in-flight frames before backpressure)

Notes

  • If a stricter budget is provided by CEO, ACS/HCS MUST comply and can further tighten (never loosen) constraints.
  • When both tokens_max and time_ms budgets exist, ACS planner prioritizes the tighter constraint first.
  • All examples now conform to canonical schemas in /architecture/orchestration/schemas/.

CEO β†’ ACS: render_request.v0 ​

Required keys: version, id, intent, budgets, request_id (per canonical schema)

json
{
  "version": "v0",
  "id": "550e8400-e29b-41d4-a716-446655440000",
  "intent": "Find authentication issues in React app and suggest debugging steps",
  "budgets": {
    "tokens_max": 2000,
    "time_ms": 2500
  },
  "risk_profile": {
    "level": "medium"
  },
  "privacy_mode": "redact",
  "request_id": "req-550e8400-e29b-41d4-a716-446655440000"
}

CEO β†’ HCS: stream_init.v0 ​

json
{
  "version": "v0",
  "task_id": "string",
  "pacing": "progressive|burst|drip|guarded",
  "client_caps": {"supports_delta": true, "max_chunk_tokens": 500},
  "targets": ["string"]
}

HCS runtime signal.v0 ​

json
{"version": "v0", "signal": "need_atomic|need_micro|pause|resume|speed_up|speed_down|viewport|ack", "seq": 1}

ACS β†’ CEO: render_context_reply.v0 ​

json
{
  "request_id": "req-550e8400-e29b-41d4-a716-446655440000",
  "fragments": [
    {
      "id": "frag_auth_issue_001",
      "lod": "macro",
      "text": "Authentication middleware in Express.js verifies JWT tokens...",
      "entities": ["jwt", "middleware", "authentication"],
      "cost_tokens": 150
    },
    {
      "id": "frag_debug_steps_002", 
      "lod": "micro",
      "text": "To debug JWT issues: 1. Check token expiration, 2. Verify secret key...",
      "entities": ["debugging", "jwt", "troubleshooting"],
      "cost_tokens": 200
    }
  ],
  "kv_policy": {
    "pin": ["auth_middleware.js"],
    "compress": ["old_logs"],
    "evict": ["temp_files"]
  },
  "metrics": {
    "used_tokens": 350,
    "planner_ms": 125,
    "coverage_entities": 0.85
  }
}

Versioning ​

  • v0 is unstable, subject to breaking changes; add version to all payloads
  • For changes: bump minor for additive fields; bump major for removals/renames