Capability as First-Class Computational State

by Nick Clark | Published March 27, 2026 | PDF

In conventional systems, capability is implicit in configuration: what the agent can do is whatever its installed code, mounted volumes, and runtime flags happen to permit. The cognition patent rejects that arrangement. Capability is promoted to first-class computational state, meaning it is addressable, queryable, signable, and history-tracked. The agent can name its capabilities, ask about them, prove statements about them, and reconstruct how they have changed over time.


Mechanism

The mechanism, defined in Chapter 6 of the cognition patent, materializes capability as a structured value resident in the agent's canonical state rather than as a property derived from configuration files, environment variables, or installed binaries. The capability state is a typed record whose fields enumerate the agent's compute envelope, its memory envelope, its network reach, its sensor and effector inventory, its credential bindings, and its substrate identity. Each field is populated by a deterministic introspection procedure at substrate attachment and is updated only through governed transitions whose pre- and post-conditions are declared in policy.

Four properties together constitute first-class status. The first is addressability: every capability has a stable identifier that uniquely names it across the agent's lifetime, independent of the substrate that currently realizes it. The identifier is sufficient to refer to the capability in policy expressions, in lineage records, and in messages to other agents. The second is queryability: the agent exposes a typed query interface against the capability state, supporting predicates such as whether a given resource envelope is satisfied, whether a credential is present, and whether a substrate transition would preserve a named capability. Queries are pure functions of the state and the query expression and are themselves recorded in lineage when their results gate downstream decisions.

The third property is signability: the capability state, or any consistent projection of it, may be sealed by a cryptographic signature whose key is bound to the substrate or to an external attestor. A signed capability claim is portable; it can be presented to a counterparty as evidence that the agent possesses the named capability without requiring the counterparty to reproduce the introspection. Signatures are versioned, time-stamped, and revocable through governed procedures. The fourth property is history-tracking: every transition of the capability state is recorded in a durable lineage record that captures the prior state, the transition cause, the post-state, and the policy under which the transition was permitted. The history is append-only and is sufficient to reconstruct the capability state at any prior cycle.

The mechanism replaces implicit-from-configuration with explicit-from-state. Where a conventional system would discover at execution time that a required capability is absent, the present system answers the same question by querying the first-class state at admission time. Where a conventional system would respond to a substrate change by re-reading its configuration files, the present system records a typed transition in the capability state and propagates the change through the declared coupling points. Where a conventional system would have no answer to the question of what its capabilities were last week, the present system reconstructs the answer from the lineage history.

Operating Parameters

The capability state exposes governed parameters along several dimensions. The introspection procedure declares which substrate properties are read, the order in which they are read, and the canonicalization rules under which their values are recorded. Canonicalization ensures that semantically equivalent substrate configurations produce identical capability records, eliminating spurious transitions that would otherwise pollute the history. The query interface declares the predicate language, its evaluation context, and the cost bounds under which queries must complete; queries that exceed their bound are rejected rather than allowed to consume unbounded resources.

Signing parameters include the key identifier, the signature algorithm, the validity window, and the projection function that selects which fields of the capability state are included in the signed claim. Distinct projections support distinct purposes: a credential-projection signature is appropriate for authentication, a resource-projection signature for substrate negotiation, and an inventory-projection signature for governance audit. Lineage parameters include the retention horizon, the redaction rules for fields whose values are sensitive, and the indexing strategy that supports historical reconstruction at acceptable cost.

Operating ranges are bounded to keep the mechanism analyzable. The introspection cycle runs at a bounded frequency. The query interface bounds individual query cost. The signature validity window is bounded above. The lineage retention is bounded by the substrate's durable storage envelope. Each bound is declared in policy, versioned, and recorded in lineage so that capability claims and historical reconstructions remain interpretable across policy revisions.

Alternative Embodiments

In a first embodiment, the capability state is held in a content-addressed store keyed by the cryptographic hash of its canonicalized representation. Equivalent states share an address, and the lineage of transitions is a directed acyclic graph in the store. This embodiment supports efficient deduplication and is appropriate where capability states are large and transitions are frequent.

In a second embodiment, the capability state is replicated across substrates participating in the same agent, with replication mediated by a consensus procedure that admits a transition only when a quorum of substrates can verify the introspection result. This embodiment is appropriate for distributed agents whose substrates may be partially compromised.

In a third embodiment, signed capability claims are exchanged between agents through a structured messaging interface, and the receiving agent verifies the signature and integrates the claim as evidence in its own decision procedures. The claim does not modify the receiving agent's capability state; it modifies the receiving agent's beliefs about the sender's capability state. This embodiment supports multi-agent coordination without requiring shared state.

In a fourth embodiment, the capability state includes uncertainty annotations, and the introspection procedure records confidence intervals rather than point values for properties that cannot be measured exactly. Queries against the state then return interval results, and downstream decision procedures consume the intervals through declared interfaces.

Composition With Other Primitives

First-class capability state composes with confidence governance, which consumes capability tier in computing class admission and interruption thresholds; with integrity-coherence, which expresses constraints over capability fields as part of the effective policy; with discovery traversal, which restricts exploration to actions for which the required capabilities are demonstrably present; and with lineage, which records every transition, every signed claim, and every query result.

The composition with substrate migration is particularly load-bearing. When an agent migrates from one substrate to another, the capability state is recomputed by the introspection procedure on the destination, the resulting state is compared against the pre-migration state, and the structured difference becomes a transition record in lineage. Policies may declare invariants that the difference must satisfy; a migration whose induced difference would violate an invariant is rejected, and the agent remains on the source substrate. Capability awareness is, in this sense, the mechanism through which substrate migration becomes a governable rather than incidental operation.

Distinction From Prior Art

Prior art treats capability as a derived quantity. Operating systems expose capability through file descriptors, mount points, and credentials, but none of these are addressable by stable identifier across substrate transitions, queryable through a typed predicate language, signable as portable claims, or history-tracked in a way that supports reconstruction. Capability-based security literature, including object-capability systems, treats capabilities as unforgeable tokens used at evaluation time, but does not promote the agent's aggregate capability state to a structured value with the four properties enumerated above. Configuration management systems track configuration history but do not equate configuration with capability and do not support runtime queries of the kind required by an executing agent.

The present mechanism differs structurally. It promotes capability to a first-class state value; it requires that the value be addressable, queryable, signable, and history-tracked; and it integrates the value into the agent's decision procedures through declared coupling points. The mechanism is not a richer logging facility or a more careful configuration discipline; it is a placement of capability information in the same structural tier as the agent's other canonical fields and a corresponding insistence that capability questions be answered by querying state rather than by inspecting the substrate.

Worked Examples

Consider an agent that has been migrated from a high-memory training substrate to a low-memory inference substrate. The introspection procedure on the destination produces a capability record in which the memory envelope field is markedly smaller than its prior value. The transition is recorded in lineage with both the prior and post values and with the policy under which the migration was admitted. A subsequent task admission queries the capability state and discovers, before any execution begins, that the task's declared memory requirement exceeds the new envelope. The task is rejected at admission rather than allowed to fail at execution, and the rejection cites the capability query as the cause.

Consider next two agents negotiating a cooperative operation. Agent A presents to agent B a signed capability claim asserting the presence of a particular sensor inventory and a particular credential binding. Agent B verifies the signature against the attesting key, integrates the claim into its decision procedure as evidence about agent A's state, and admits the cooperative operation only if the joint capability is sufficient. The negotiation proceeds without either agent disclosing more than the projection that the signed claim covers, and the audit record on each side captures both the claim and the decision it informed.

Consider finally a forensic reconstruction in which an investigator must determine what capabilities an agent possessed at a specific past cycle. The investigator queries the lineage for the capability state in force at that cycle, retrieves the canonicalized record together with the chain of transitions that produced it, and verifies the chain against the recorded signatures. The reconstruction yields a definite answer to the capability question without requiring access to the substrate that hosted the agent at the time, because the first-class state was sufficient to answer the question on its own.

Disclosure Scope

The disclosure encompasses the typed capability record, the deterministic introspection procedure, the canonicalization rules, the query interface, the signing and projection functions, the history-tracking lineage, and the policy bindings that govern every parameter. It encompasses the alternative embodiments enumerated above and any embodiment in which capability is promoted to a state value possessing the four properties of addressability, queryability, signability, and history-tracking, and is integrated into agent decision procedures through declared coupling points. The disclosure is independent of the specific substrate, of the specific signature algorithm, and of the specific predicate language used for queries.

Nick Clark Invented by Nick Clark Founding Investors:
Anonymous, Devin Wilkie
72 28 14 36 01