ABS Core v4.1.0

Changelog

Product evolution notes for the ABS Core runtime governance project.

Changelog

This changelog distinguishes between:

  • implemented runtime changes,
  • deployment-specific capabilities,
  • early-access items,
  • and product direction.

It should not be read as proof that every item below is production-ready across all deployment models.


v4.0.0 — The Octagon Release (Current Stable)

This major release consolidates the Octagon Architecture as the industrial standard for autonomous agent governance, transitioning from the 7-pillar Heptagon to a complete 8-pillar resilient framework.

  • Octagon Architecture (8 Pillars): Integration of ARCHAEO (Forensic Archaeology) as the 8th central pillar for historical lineage and retroactive intelligence.
  • Production-Ready: Moved from "Beta" to "Production Stable" across all enforcement modules.
  • Unified Global Identity: Consensus on v4.0.0 across all components (Landing, Docs, CLI).
  • Runtime Hardening: Enhanced deterministic integrity for enterprise deployments and WASM-native execution.
  • Sovereign Memory: Implementation of Persistent Context Pack (INV-004) for resilient long-term memory.
  • Emoji Purge: Replaced status emojis with professional [OK]/[WIP] technical markers.
  • LexarAPFS Persistence: Optimized data durability mapping for resilient hardware volumes.

v3.0.0 — Heptagon Protocol (Feb 2026)

This release established the 7-pillar enforcement model (Heptagon) as the basis for agent governance.

  • Protocol Unification: High-availability enterprise engine pilot.
  • WASM Transition: Initial deployment of the Rust-based evaluation kernel for Sidecar nodes.
  • Latency Tiering: Formal distinction between Kernel Logic and Network propagation (< 1.2ms evaluation).
  • Forensic Ledger: Stabilization of the SHA-256 hash-chaining mechanism for audit logs.

v2.0.0 — Edge Core (Nov 2025)

  • Edge Deployment: Transitioned the governance gateway to geo-distributed Cloudflare Workers.
  • Event Persistence: Global persistence strategy for governed execution paths using D1.
  • Early Prototype: Introduction of basic policy enforcement and telemetry.

Reading guide

When reviewing older change entries, use the following interpretation:

  • A named capability may indicate implementation work, partial availability, or product direction.
  • Deployment-sensitive features should not be assumed to exist identically in every customer topology.
  • Security, compliance, and sovereignty claims always depend on the actual runtime path, integration depth, and environment configuration.

On this page