Skip to content

System Kernel Taxonomy

System kernels are platform Material Entities in the CK.* namespace. Each follows the same three-loop structure as domain kernels.

Enterprise Kernel Archetypes (v3.4)

v3.4 maps system kernels to four enterprise kernel archetypes:

Enterprise ArchetypeCKP Kernelsqualities.typeEnterprise Role
ExecutorCK.Task, CK.Workflownode:hotReceives formal task description, executes playbook, writes sealed instance with PROV-O trace
RegistrarCK.Discovery, CK.OntologyservicePublishes fleet capability catalog; answers fleet.catalog queries; maintains semantic registries
MonitorCK.ComplianceCheck, CK.ProbeserviceValidates fleet against spec; detects anomalies; executes SHACL reactive rules; health monitoring
Personaliser(domain kernels)node:coldAdapts content per audience profile; writes i-audience-{session}/ instances; serves web/ surface
Universal OperatorCK.AgentagentReads any kernel context, executes tasks, manages conversations -- inhabits any archetype

CK.Agent

CK.Agent is the universal operator -- it can inhabit any archetype by loading the target kernel's context. A LOCAL.* prefix means it runs without SPIFFE and is never deployed to the cluster.

System Kernel Catalog

Kernel ClassPurposeTool FormPrimary DATA Output
CK.CreateScaffolds new CK -- 3 volumes, 3 git repos, 8 awakening files, .ck-guid, apiVersion v3, compliance check on mintbashNew CK directory tree
CK.ArtifactC-P-A triplet: compile tool -> Wasm, push to registry, apply CK custom resourcebashCK custom resource in cluster
CK.ValidateSHACL validation of instances before storage writeWasmproof.json
CK.LinkCreate3-way predicate handshake -- creates PredicateKernelInstanceWasmPredicate storage instance
CK.IndexBuildRebuilds index/ for a given CK's storageWasmUpdated index/ files
CK.QueryFederated query across all CK storage volumes via URN resolver + filesystem scanWasmQuery result set
CK.AuditFinalVerifies git graph integrity, symlinks, proofs across local storagebashAudit report in ledger/
CK.ProjectDefines federated namespace -- the project identity rootbashProject instance in storage/
CK.ComplianceCheckFleet validator -- 13 check types (v3.3 adds check.mutation_frequency)Pythoncheck.report instance (proof.json per check)
CK.TaskTask lifecycle manager -- pending->in_progress->completed; NATS-only mutations; conv_guid as instance folder namePythonstorage/i-task-{conv_guid}/ with sealed data.json
CK.GoalGoal manager -- owner priority, spans multiple CKs, groups tasksPythonGoal instance in storage/ referencing task IDs
CK.DiscoveryFleet discovery -- kernel list, health status, namespace catalogPythonFleet status instance
CK.AgentAgent kernel -- reads fleet context, builds action plans, executes tasks, manages conversations bound to tasks/goalsagentConversation sessions in CK.Task instances

Goal -> Task -> Conversation Hierarchy

v3.2 adds a three-level work management hierarchy spanning the fleet. v3.4 maps this to the enterprise's unlimited autonomous directions model.

Direction = Goal

A Goal IS a direction -- a formally-typed autonomous pursuit with a declared goal state, kernel agents assigned to pursue it, resources allocated by priority, and a termination condition that the compliance engine can evaluate. This is not a JIRA board. It is a machine-executable autonomous pursuit.

LevelKernelBFO TypeStorageKey Properties
GoalCK.GoalBFO:0000040 (continuant)CK.Goal/storage/Owner-assigned priority; spans multiple CKs; groups tasks
TaskCK.TaskBFO:0000040 + lifecycleCK.Task/storage/i-task-{conv_guid}/Targets one CK; build-order within goal; pending->in_progress->completed
ConversationCK.TaskBFO:0000015 (occurrent)task/conversation/c-{conv_id}.jsonlAppend-only; bound to task; resumable -- new file per session
Goal (CK.Goal -- continuant, owner priority, spans CKs)
 +-- Task (CK.Task -- continuant instance with lifecycle)
      +-- manifest.json          status, target_ck, goal_id, priority, order
      +-- conversation_ref.json  { conv_guid, path }
      +-- conversation/          occurrent records
      |    +-- c-{id_1}.jsonl   first session
      |    +-- c-{id_2}.jsonl   resumed session
      +-- ledger.json            state transitions (NATS-driven, append-only)
      +-- data.json             sealed at task.complete (write-once)

Released under the MIT License.