Summary
Noēsis is now much closer to a defensible runtime kernel.
The highest-risk integrity gaps around canonical trace handling and checkpoint/resume continuity have been closed. The remaining work is narrower: finishing the authority contract between events.jsonl and persisted state.json, especially for metadata, rollup, and non-execution state slices.
This issue remains open to track that final authority-contract work separately from layout, CLI, and general cleanup.
Current status
Closed
Mostly closed
Still open
Problems
1. events.jsonl corruption was not fail-fast
The canonical trace should be treated as authoritative evidence. This has now been fixed.
Resolved impact
- corrupt traces are no longer silently accepted
- replay and audit tooling no longer read malformed evidence as valid
- append is rejected when the canonical trace is already damaged
2. resume/checkpoint consistency did not validate artifact_manifest_hash
Checkpoint metadata already recorded artifact digest information, but resume validation did not enforce it. This has now been fixed.
Resolved impact
- artifact-set tampering between pause and resume is now rejected
- checkpoint continuity is aligned with the checkpoint contract
3. state.json is not yet fully aligned with events.jsonl authority
This is the remaining open problem.
The runtime is now in much better shape:
plan is reconstructible from trace for current runtime semantics
outcomes.actions is much closer to trace-derived
But several persisted state.json slices are still richer than the event stream, projection-like, or insufficiently classified.
Open impact
events.jsonl is not yet the clearly enforced authority source for all persisted runtime state
- some state fields still behave more like rollups, metadata, or dormant schema surface than canonical trace-backed state
- ADR/runtime contract drift remains open for these remaining slices
Scope
Work items
Trace integrity
Resume/checkpoint integrity
Event authority vs state derivability
Plan / action path
Remaining state-authority slices
Acceptance criteria
Tests
Notes
This issue is intentionally separate from layout, schema, and CLI cleanup because these are kernel trust concerns, not general backlog hygiene.
At this point, the remaining gaps are mostly metadata, rollup semantics, and dormant state surfaces — not the core plan/action execution path.
Summary
Noēsis is now much closer to a defensible runtime kernel.
The highest-risk integrity gaps around canonical trace handling and checkpoint/resume continuity have been closed. The remaining work is narrower: finishing the authority contract between
events.jsonland persistedstate.json, especially for metadata, rollup, and non-execution state slices.This issue remains open to track that final authority-contract work separately from layout, CLI, and general cleanup.
Current status
Closed
events.jsonlcorruption fails hardplanis derivable from trace for current runtime semanticsMostly closed
outcomes.actionsis mostly derivable from traceStill open
episode.started_atepisode.intuition_modeoutcomes.summaryoutcomes.metricsprocess,links, and similar fields as projection metadata or make them trace-backedbeliefs/memorystate surfacesProblems
1.
events.jsonlcorruption was not fail-fastThe canonical trace should be treated as authoritative evidence. This has now been fixed.
Resolved impact
2. resume/checkpoint consistency did not validate
artifact_manifest_hashCheckpoint metadata already recorded artifact digest information, but resume validation did not enforce it. This has now been fixed.
Resolved impact
3.
state.jsonis not yet fully aligned withevents.jsonlauthorityThis is the remaining open problem.
The runtime is now in much better shape:
planis reconstructible from trace for current runtime semanticsoutcomes.actionsis much closer to trace-derivedBut several persisted
state.jsonslices are still richer than the event stream, projection-like, or insufficiently classified.Open impact
events.jsonlis not yet the clearly enforced authority source for all persisted runtime stateScope
events.jsonlandstate.jsonWork items
Trace integrity
events.jsonlrecords as integrity failuresResume/checkpoint integrity
artifact_manifest_hashduring resume/checkpoint consistency checksEvent authority vs state derivability
Plan / action path
events.jsonlRemaining state-authority slices
state.jsonfields are truly trace-authoritativeepisode.started_atepisode.intuition_modeoutcomes.summaryoutcomes.metricsprocessandlinksas trace-backed state or projection metadatabeliefs/memorystate surfacesAcceptance criteria
events.jsonlis surfaced as an integrity failure, not silently ignoredevents.jsonlandstate.jsonhave a clearly enforced authority contractstate.jsonslice is explicitly classified as one of:events.jsonlplus deterministic rulesTests
events.jsonlstate.jsonoutcomes.actionsNotes
This issue is intentionally separate from layout, schema, and CLI cleanup because these are kernel trust concerns, not general backlog hygiene.
At this point, the remaining gaps are mostly metadata, rollup semantics, and dormant state surfaces — not the core plan/action execution path.