Changelog
Product evolution notes for the ABS Core runtime governance project.
Changelog
This changelog distinguishes between:
- implemented runtime changes,
- deployment-specific capabilities,
- early-access items,
- and product direction.
It should not be read as proof that every item below is production-ready across all deployment models.
v4.0.0 — The Octagon Release (Current Stable)
This major release consolidates the Octagon Architecture as the industrial standard for autonomous agent governance, transitioning from the 7-pillar Heptagon to a complete 8-pillar resilient framework.
- Octagon Architecture (8 Pillars): Integration of ARCHAEO (Forensic Archaeology) as the 8th central pillar for historical lineage and retroactive intelligence.
- Production-Ready: Moved from "Beta" to "Production Stable" across all enforcement modules.
- Unified Global Identity: Consensus on v4.0.0 across all components (Landing, Docs, CLI).
- Runtime Hardening: Enhanced deterministic integrity for enterprise deployments and WASM-native execution.
- Sovereign Memory: Implementation of Persistent Context Pack (INV-004) for resilient long-term memory.
- Emoji Purge: Replaced status emojis with professional [OK]/[WIP] technical markers.
- LexarAPFS Persistence: Optimized data durability mapping for resilient hardware volumes.
v3.0.0 — Heptagon Protocol (Feb 2026)
This release established the 7-pillar enforcement model (Heptagon) as the basis for agent governance.
- Protocol Unification: High-availability enterprise engine pilot.
- WASM Transition: Initial deployment of the Rust-based evaluation kernel for Sidecar nodes.
- Latency Tiering: Formal distinction between Kernel Logic and Network propagation (< 1.2ms evaluation).
- Forensic Ledger: Stabilization of the SHA-256 hash-chaining mechanism for audit logs.
v2.0.0 — Edge Core (Nov 2025)
- Edge Deployment: Transitioned the governance gateway to geo-distributed Cloudflare Workers.
- Event Persistence: Global persistence strategy for governed execution paths using D1.
- Early Prototype: Introduction of basic policy enforcement and telemetry.
Reading guide
When reviewing older change entries, use the following interpretation:
- A named capability may indicate implementation work, partial availability, or product direction.
- Deployment-sensitive features should not be assumed to exist identically in every customer topology.
- Security, compliance, and sovereignty claims always depend on the actual runtime path, integration depth, and environment configuration.