feat(resilience): SWF manifest expansion + KIA split + new schema fields (#3391)

* feat(resilience): SWF manifest expansion + KIA split + new schema fields

Phase 1 of plan 2026-04-25-001 (Codex-approved round 5). Manifest-only
data correction; no construct change, no cache prefix bump.

Schema additions (loader-validated, misplacement-rejected):
- top-level: aum_usd, aum_year, aum_verified (primary-source AUM)
- under classification: aum_pct_of_audited (fraction multiplier),
  excluded_overlaps_with_reserves (boolean; documentation-only)

Manifest expansion (13 → 21 funds, 6 → 13 countries):
- UAE: +ICD ($320B verified), +ADQ ($199B verified), +EIA (unverified —
  loaded for documentation, excluded from scoring per data-integrity rule)
- KW: kia split into kia-grf (5%, access=0.9) + kia-fgf (95%,
  access=0.20). Corrects ~18× over-statement of crisis-deployable
  Kuwait sovereign wealth (audit found combined-AUM × 0.7 access
  applied $750B as "deployable" against ~$15B actual GRF stabilization
  capacity).
- CN: +CIC ($1.35T), +NSSF ($400B, statutorily-gated 0.20 tier),
  +SAFE-IC ($417B, excluded — overlaps SAFE FX reserves)
- HK: +HKMA-EF ($498B, excluded — overlaps HKMA reserves)
- KR: +KIC ($182B, IFSWF full member)
- AU: +Future Fund ($192B, pension-locked)
- OM: +OIA ($50B, IFSWF member)
- BH: +Mumtalakat ($19B)
- TL: +Petroleum Fund ($22B, GPFG-style high-transparency)

Re-audits (Phase 1E):
- ADIA access 0.3 → 0.4 (rubric flagged; ruler-discretionary deployment
  empirically demonstrated)
- Mubadala access 0.4 → 0.5 (rubric flagged); transparency 0.6 → 0.7
  (LM=10 + IFSWF full member alignment)

Rubric (docs/methodology/swf-classification-rubric.md):
- New "Statutorily-gated long-horizon" 0.20 access tier added between
  0.1 (sanctions/frozen) and 0.3 (intergenerational/ruler-discretionary).
  Anchored by KIA-FGF (Decree 106 of 1976; Council-of-Ministers + Emir
  decree gate; crossed once in extremis during COVID).

Seeder:
- Two new pure helpers: shouldSkipFundForBuffer (excluded/unverified
  decision) and applyAumPctOfAudited (sleeve fraction multiplier)
- Manifest-AUM bypass: if aum_verified=true AND aum_usd present,
  use that value directly (skip Wikipedia)
- Skip funds with excluded_overlaps_with_reserves=true (no
  double-counting against reserveAdequacy / liquidReserveAdequacy)
- Skip funds with aum_verified=false (load for documentation only)

Tests (+25 net):
- 15 schema-extension tests (misplacement rejection, value-range gates,
  rationale-pairing coherence, backward-compat with pre-PR entries)
- 10 helper tests (shouldSkipFundForBuffer + applyAumPctOfAudited
  predicates and arithmetic; KIA-GRF + KIA-FGF sum equals combined AUM)
- Existing manifest test updated for the kia → kia-grf+kia-fgf split

Full suite: 6,940 tests pass (+50 net), typecheck clean, no new lint.

Predicted ranking deltas (informational, NOT acceptance criteria per
plan §"Hard non-goals"):
- AE sovFiscBuf likely 39 → 47-49 (Phase 1A + 1E)
- KW sovFiscBuf likely 98 → 53-57 (Phase 1B)
- CN, HK (excluded), KR, AU acquire newly-defined sovFiscBuf scores
- GCC ordering shifts toward QA > KW > AE; AE-KW gap likely 6 → ~3-4

Real outcome will be measured post-deploy via cohort audit per plan
§Phase 4.

* fix(resilience): completeness denominator excludes documentation-only funds

PR-3391 review (P1 catch): the per-country `expectedFunds` denominator
counted ALL manifest entries (`funds.length`) including those skipped
from buffer scoring by design — `excluded_overlaps_with_reserves: true`
(SAFE-IC, HKMA-EF) and `aum_verified: false` (EIA). Result: countries
with mixed scorable + non-scorable rosters showed `completeness < 1.0`
even when every scorable fund matched. UAE (4 scorable + EIA) would
show 0.8; CN (CIC + NSSF + SAFE-IC excluded) would show 0.67. The
downstream scorer then derated those countries' coverage based on a
fake-partial signal.

Three call sites all carried the same bug:
- per-country `expectedFunds` in fetchSovereignWealth main loop
- `expectedFundsTotal` + `expectedCountries` in buildCoverageSummary
- `countManifestFundsForCountry` (missing-country path)

All three now filter via `shouldSkipFundForBuffer` to count only
scorable manifest entries. Documentation-only funds neither expected
nor matched — they don't appear in the ratio at all.

Tests added (+4):
- AE complete with all 4 scorable matched (EIA documented but excluded)
- CN complete with CIC + NSSF matched (SAFE-IC documented but excluded)
- Missing-country path returns scorable count not raw manifest count
- Country with ONLY documentation-only entries excluded from expectedCountries

Full suite: 6,944 tests pass (+4 net), typecheck clean.

* fix(resilience): address Greptile P2s on PR #3391 manifest

Three review findings, all in the manifest YAML:

1. **KIA-GRF access 0.9 → 0.7** (rubric alignment): GRF deployment
   requires active Council-of-Ministers authorization (2020 COVID
   precedent demonstrates this), not rule-triggered automatic
   deployment. The rubric's 0.9 tier ("Pure automatic stabilization")
   reserved for funds where political authorization is post-hoc /
   symbolic (Chile ESSF candidate). KIA-GRF correctly fits 0.7
   ("Explicit stabilization with rule") — the same tier the
   pre-split combined-KIA was assigned. Updated rationale clarifies
   the tier choice. Rubric's 0.7 precedent column already lists
   "KIA General Reserve Fund" — now consistent with the manifest.

2. **Duplicate `# ── Australia ──` header before Oman** (copy-paste
   artifact): removed the orphaned header at the Oman section;
   added proper `# ── Australia ──` header above the Future Fund
   entry where it actually belongs (after Timor-Leste).

3. **NSSF `aum_pct_of_audited: 1.0` removed** (no-op): a multiplier
   of 1.0 is identity. The schema field is OPTIONAL and only meant
   for fund-of-funds split entries (e.g. KIA-GRF/FGF). Setting it
   to 1.0 forced the loader to require an `aum_pct_of_audited`
   rationale paragraph with no computational benefit. Both the
   field and the paragraph are now removed; NSSF remains a single-
   sleeve entry that scores its full audited AUM.

Full suite: 6,944 tests pass, typecheck clean.
This commit is contained in:
Elie Habib
2026-04-25 12:02:48 +04:00
committed by GitHub
parent 9c14820c69
commit abdcdb581f
6 changed files with 1171 additions and 31 deletions

View File

@@ -33,20 +33,48 @@ describe('SWF classification manifest — shipped YAML', () => {
);
});
it('lists the first-release set of funds from plan §3.4', () => {
it('lists the first-release set of funds from plan §3.4 (KIA split per Phase 1B)', () => {
// Phase 1B (Plan 2026-04-25-001) split the original `KW:kia` entry
// into `KW:kia-grf` and `KW:kia-fgf` to correctly attribute GRF's
// 0.9 stabilization access to its ~5% sleeve and FGF's 0.20
// statutorily-gated access to the remaining ~95%. Both identifiers
// are now required.
const expected = new Set([
'NO:gpfg',
'AE:adia',
'AE:mubadala',
'SA:pif',
'KW:kia',
'KW:kia-grf',
'KW:kia-fgf',
'QA:qia',
'SG:gic',
'SG:temasek',
]);
const actual = new Set(manifest.funds.map((f) => `${f.country}:${f.fund}`));
for (const required of expected) {
assert.ok(actual.has(required), `plan §3.4 required fund missing from manifest: ${required}`);
assert.ok(actual.has(required), `plan §3.4 + Phase 1B required fund missing from manifest: ${required}`);
}
});
it('Phase 1 (Plan 2026-04-25-001) expansion adds 12 new funds across 7 new + extended countries', () => {
// Phase 1 expansion: UAE adds ICD/ADQ/EIA (3); KW splits kia → kia-grf+kia-fgf
// (1 net since kia is dropped); CN adds CIC/NSSF/SAFE-IC (3); HK adds HKMA-EF
// (1); KR adds KIC (1); AU adds Future Fund (1); OM adds OIA (1); BH adds
// Mumtalakat (1); TL adds Petroleum Fund (1). Net new identifiers: 12 over
// the original 8 + 1 from KIA split. Manifest total ≥ 20.
const required = new Set([
'AE:icd', 'AE:adq', 'AE:eia',
'CN:cic', 'CN:nssf', 'CN:safe-ic',
'HK:hkma-ef',
'KR:kic',
'AU:future-fund',
'OM:oia',
'BH:mumtalakat',
'TL:petroleum-fund',
]);
const actual = new Set(manifest.funds.map((f) => `${f.country}:${f.fund}`));
for (const r of required) {
assert.ok(actual.has(r), `Phase 1 expansion fund missing from manifest: ${r}`);
}
});

View File

@@ -0,0 +1,387 @@
// Schema-extension tests for swf-manifest-loader.mjs (Phase 1).
//
// Pins the new schema fields' canonical placement and rejection rules:
// - top-level (per-fund): aum_usd, aum_year, aum_verified
// - under classification: aum_pct_of_audited, excluded_overlaps_with_reserves
//
// Codex Round 1 #4 mandated a SINGLE canonical placement for each new
// field, with the loader REJECTING misplacement (positive control)
// rather than silently accepting it.
import { test } from 'node:test';
import assert from 'node:assert/strict';
import { validateManifest } from '../scripts/shared/swf-manifest-loader.mjs';
import {
shouldSkipFundForBuffer,
applyAumPctOfAudited,
buildCoverageSummary,
} from '../scripts/seed-sovereign-wealth.mjs';
function makeFund(overrides = {}) {
return {
country: 'AE',
fund: 'test-fund',
display_name: 'Test Fund',
classification: { access: 0.5, liquidity: 0.5, transparency: 0.5 },
rationale: { access: 'a', liquidity: 'l', transparency: 't' },
sources: ['https://example.com/'],
...overrides,
};
}
function makeManifest(funds) {
return {
manifest_version: 1,
last_reviewed: '2026-04-25',
external_review_status: 'REVIEWED',
funds,
};
}
test('REJECTS aum_pct_of_audited placed at fund top level (must be under classification)', () => {
const m = makeManifest([
makeFund({ aum_pct_of_audited: 0.05 }),
]);
assert.throws(() => validateManifest(m), /aum_pct_of_audited must be placed under classification/);
});
test('REJECTS excluded_overlaps_with_reserves placed at fund top level', () => {
const m = makeManifest([
makeFund({ excluded_overlaps_with_reserves: true }),
]);
assert.throws(() => validateManifest(m), /excluded_overlaps_with_reserves must be placed under classification/);
});
test('ACCEPTS aum_pct_of_audited under classification when paired with rationale', () => {
const m = makeManifest([
makeFund({
classification: { access: 0.9, liquidity: 0.8, transparency: 0.4, aum_pct_of_audited: 0.05 },
rationale: { access: 'a', liquidity: 'l', transparency: 't', aum_pct_of_audited: 'GRF is ~5% of audited KIA AUM' },
}),
]);
const out = validateManifest(m);
assert.equal(out.funds[0].classification.aumPctOfAudited, 0.05);
assert.equal(out.funds[0].rationale.aumPctOfAudited, 'GRF is ~5% of audited KIA AUM');
});
test('REJECTS aum_pct_of_audited under classification WITHOUT a rationale paragraph', () => {
const m = makeManifest([
makeFund({
classification: { access: 0.9, liquidity: 0.8, transparency: 0.4, aum_pct_of_audited: 0.05 },
// rationale.aum_pct_of_audited is missing
}),
]);
assert.throws(() => validateManifest(m),
/rationale\.aum_pct_of_audited: required when classification\.aum_pct_of_audited is set/);
});
test('REJECTS aum_pct_of_audited outside (0, 1] range', () => {
// `null` is intentionally NOT in this list — the loader treats null
// as "field absent" (the value is optional), which is correct.
for (const bad of [0, -0.1, 1.5, 'x', NaN]) {
const m = makeManifest([
makeFund({
classification: { access: 0.9, liquidity: 0.8, transparency: 0.4, aum_pct_of_audited: bad },
}),
]);
assert.throws(() => validateManifest(m), /aum_pct_of_audited: expected number in \(0, 1\]/);
}
});
test('ACCEPTS excluded_overlaps_with_reserves: true with paired rationale', () => {
const m = makeManifest([
makeFund({
classification: { access: 0.5, liquidity: 0.7, transparency: 0.3, excluded_overlaps_with_reserves: true },
rationale: { access: 'a', liquidity: 'l', transparency: 't', excluded_overlaps_with_reserves: 'SAFE-IC overlaps PBOC reserves' },
}),
]);
const out = validateManifest(m);
assert.equal(out.funds[0].classification.excludedOverlapsWithReserves, true);
});
test('REJECTS excluded_overlaps_with_reserves: true WITHOUT rationale paragraph', () => {
const m = makeManifest([
makeFund({
classification: { access: 0.5, liquidity: 0.7, transparency: 0.3, excluded_overlaps_with_reserves: true },
}),
]);
assert.throws(() => validateManifest(m),
/rationale\.excluded_overlaps_with_reserves: required when classification\.excluded_overlaps_with_reserves is true/);
});
test('REJECTS excluded_overlaps_with_reserves of non-boolean type', () => {
const m = makeManifest([
makeFund({
classification: { access: 0.5, liquidity: 0.7, transparency: 0.3, excluded_overlaps_with_reserves: 'true' },
}),
]);
assert.throws(() => validateManifest(m), /excluded_overlaps_with_reserves: expected boolean/);
});
test('ACCEPTS aum_usd + aum_year + aum_verified=true together', () => {
const m = makeManifest([
makeFund({
aum_usd: 320_000_000_000,
aum_year: 2024,
aum_verified: true,
}),
]);
const out = validateManifest(m);
assert.equal(out.funds[0].aumUsd, 320_000_000_000);
assert.equal(out.funds[0].aumYear, 2024);
assert.equal(out.funds[0].aumVerified, true);
});
test('REJECTS aum_verified: true without aum_usd', () => {
const m = makeManifest([
makeFund({
aum_verified: true,
aum_year: 2024,
}),
]);
assert.throws(() => validateManifest(m),
/aum_verified=true requires both aum_usd and aum_year to be present/);
});
test('REJECTS aum_verified: true without aum_year', () => {
const m = makeManifest([
makeFund({
aum_verified: true,
aum_usd: 100_000_000_000,
}),
]);
assert.throws(() => validateManifest(m),
/aum_verified=true requires both aum_usd and aum_year to be present/);
});
test('ACCEPTS aum_verified: false (entry loaded for documentation only)', () => {
// No aum_usd / aum_year required when verified=false — the entry
// documents an unverifiable fund that the seeder will skip from
// scoring. This is the EIA / data-integrity-rule path.
const m = makeManifest([
makeFund({
aum_verified: false,
}),
]);
const out = validateManifest(m);
assert.equal(out.funds[0].aumVerified, false);
assert.equal(out.funds[0].aumUsd, undefined);
});
test('REJECTS aum_year out of [2000, 2100]', () => {
// `null` excluded — treated as field-absent, intentional.
for (const bad of [1999, 2101, 0, -1, 'x']) {
const m = makeManifest([
makeFund({
aum_usd: 100_000_000_000,
aum_year: bad,
aum_verified: true,
}),
]);
assert.throws(() => validateManifest(m), /aum_year/);
}
});
test('REJECTS aum_usd of non-positive or non-finite type', () => {
// `null` excluded — treated as field-absent, intentional.
for (const bad of [0, -1, NaN, Infinity, 'big']) {
const m = makeManifest([
makeFund({
aum_usd: bad,
aum_year: 2024,
aum_verified: true,
}),
]);
assert.throws(() => validateManifest(m), /aum_usd/);
}
});
test('Backward-compat: existing entries without new fields still validate', () => {
// The 8 existing entries on origin/main don't carry aum_usd /
// aum_pct / excluded flags. Ensure the schema extension is purely
// additive — existing fields produce a clean parse.
const m = makeManifest([makeFund()]);
const out = validateManifest(m);
assert.equal(out.funds[0].aumUsd, undefined);
assert.equal(out.funds[0].aumVerified, undefined);
assert.equal(out.funds[0].classification.aumPctOfAudited, undefined);
assert.equal(out.funds[0].classification.excludedOverlapsWithReserves, undefined);
});
// ── Seeder-side pure helpers ──────────────────────────────────────
test('shouldSkipFundForBuffer: returns null for a normal fund', () => {
const fund = { classification: { access: 0.5 }, aumVerified: true };
assert.equal(shouldSkipFundForBuffer(fund), null);
});
test('shouldSkipFundForBuffer: skips when excluded_overlaps_with_reserves=true', () => {
const fund = {
classification: { access: 0.5, excludedOverlapsWithReserves: true },
aumVerified: true,
};
assert.equal(shouldSkipFundForBuffer(fund), 'excluded_overlaps_with_reserves');
});
test('shouldSkipFundForBuffer: skips when aum_verified=false', () => {
const fund = {
classification: { access: 0.5 },
aumVerified: false,
};
assert.equal(shouldSkipFundForBuffer(fund), 'aum_unverified');
});
test('shouldSkipFundForBuffer: excluded takes precedence over unverified (single skip reason)', () => {
// If a fund is BOTH excluded (overlaps reserves) AND unverified,
// we surface the excluded reason because that's the more
// architectural concern (double-counting risk).
const fund = {
classification: { excludedOverlapsWithReserves: true },
aumVerified: false,
};
assert.equal(shouldSkipFundForBuffer(fund), 'excluded_overlaps_with_reserves');
});
test('shouldSkipFundForBuffer: returns null when neither flag is set', () => {
// Backward-compat: existing entries on origin/main don't carry
// aumVerified or excludedOverlapsWithReserves. They must NOT skip.
assert.equal(shouldSkipFundForBuffer({ classification: { access: 0.5 } }), null);
});
test('shouldSkipFundForBuffer: handles malformed / null input defensively', () => {
assert.equal(shouldSkipFundForBuffer(null), null);
assert.equal(shouldSkipFundForBuffer(undefined), null);
assert.equal(shouldSkipFundForBuffer({}), null);
});
test('applyAumPctOfAudited: returns AUM unchanged when no multiplier set', () => {
const fund = { classification: { access: 0.5 } };
assert.equal(applyAumPctOfAudited(1_000_000_000_000, fund), 1_000_000_000_000);
});
test('applyAumPctOfAudited: applies the fraction (KIA-GRF case)', () => {
// KIA combined audited AUM = $1.072T; GRF is ~5%
const fund = { classification: { access: 0.9, aumPctOfAudited: 0.05 } };
const out = applyAumPctOfAudited(1_072_000_000_000, fund);
assert.equal(out, 53_600_000_000);
});
test('applyAumPctOfAudited: KIA-GRF + KIA-FGF sum equals combined AUM', () => {
// The split must be conservative — sum of fractional parts equals
// the original audited AUM. Pinned because a future edit that
// changes 5/95 split to e.g. 5/90 would silently drop $50B.
const audited = 1_072_000_000_000;
const grf = applyAumPctOfAudited(audited, { classification: { aumPctOfAudited: 0.05 } });
const fgf = applyAumPctOfAudited(audited, { classification: { aumPctOfAudited: 0.95 } });
assert.equal(grf + fgf, audited);
});
test('applyAumPctOfAudited: ignores out-of-range multipliers (defensive)', () => {
// The loader rejects out-of-range values at parse time; this is a
// belt-and-suspenders runtime check that doesn't multiply by an
// invalid fraction even if the loader's gate is somehow bypassed.
for (const bad of [0, -0.1, 1.5, NaN, 'big']) {
const fund = { classification: { aumPctOfAudited: bad } };
assert.equal(applyAumPctOfAudited(1_000, fund), 1_000);
}
});
// ── buildCoverageSummary regression: completeness denominator ──────
//
// User's PR-3391 review caught a P1: completeness used `funds.length`
// (manifest count) as the denominator, which depresses the ratio for
// countries whose manifest contains documentation-only entries
// (excluded_overlaps_with_reserves OR aum_verified=false). The shipped
// manifest has this state for UAE (EIA unverified) and CN (SAFE-IC
// excluded). These tests pin the corrected denominator: only scorable
// funds count toward expected.
test('buildCoverageSummary: country with all scorable funds matched is "complete" even if manifest also has unverified entries', () => {
// UAE-shape: 4 scorable (ADIA, Mubadala, ICD, ADQ) + 1 unverified (EIA).
// If all 4 scorable matched, country is COMPLETE, not partial.
const manifest = {
funds: [
{ country: 'AE', fund: 'adia', classification: { access: 0.4 } },
{ country: 'AE', fund: 'mubadala',classification: { access: 0.5 } },
{ country: 'AE', fund: 'icd', classification: { access: 0.5 } },
{ country: 'AE', fund: 'adq', classification: { access: 0.5 } },
{ country: 'AE', fund: 'eia', classification: { access: 0.4 }, aumVerified: false },
],
};
const imports = { AE: { importsUsd: 481.9e9 } };
const countries = {
AE: {
// expectedFunds is computed PER-COUNTRY in fetchSovereignWealth using
// shouldSkipFundForBuffer, so this test fixture mirrors the seeder's
// post-fix output (expectedFunds = 4 scorable, completeness = 1.0).
matchedFunds: 4,
expectedFunds: 4,
completeness: 1.0,
},
};
const summary = buildCoverageSummary(manifest, imports, countries);
// Only 4 scorable funds in AE; 1 unverified entry doesn't count.
assert.equal(summary.expectedFunds, 4,
`headline expected funds should exclude documentation-only entries; got ${summary.expectedFunds}`);
const aeStatus = summary.countryStatuses.find((s) => s.country === 'AE');
assert.equal(aeStatus.status, 'complete');
});
test('buildCoverageSummary: excludes excluded_overlaps_with_reserves entries from expectedFundsTotal', () => {
// CN-shape: CIC + NSSF scorable + SAFE-IC excluded.
const manifest = {
funds: [
{ country: 'CN', fund: 'cic', classification: { access: 0.4 } },
{ country: 'CN', fund: 'nssf', classification: { access: 0.20 } },
{ country: 'CN', fund: 'safe-ic', classification: { access: 0.5, excludedOverlapsWithReserves: true } },
],
};
const imports = { CN: { importsUsd: 3.0e12 } };
const countries = {
CN: { matchedFunds: 2, expectedFunds: 2, completeness: 1.0 },
};
const summary = buildCoverageSummary(manifest, imports, countries);
assert.equal(summary.expectedFunds, 2,
`SAFE-IC should NOT count toward expected funds; got ${summary.expectedFunds}`);
const cnStatus = summary.countryStatuses.find((s) => s.country === 'CN');
assert.equal(cnStatus.status, 'complete');
});
test('buildCoverageSummary: missing-country path uses scorable count, not raw manifest count', () => {
// Country with mixed scorable + excluded entries that fails to seed
// entirely (e.g. WB imports missing). The "expected" figure on the
// missing-country status row should reflect SCORABLE funds, not all
// manifest entries — otherwise an operator dashboard shows
// "0/3 funds" when the truth is "0/2 funds, 1 documentation-only".
const manifest = {
funds: [
{ country: 'CN', fund: 'cic', classification: { access: 0.4 } },
{ country: 'CN', fund: 'nssf', classification: { access: 0.20 } },
{ country: 'CN', fund: 'safe-ic', classification: { access: 0.5, excludedOverlapsWithReserves: true } },
],
};
const imports = {}; // CN imports missing → country not seeded
const countries = {}; // no country payload at all
const summary = buildCoverageSummary(manifest, imports, countries);
const cnStatus = summary.countryStatuses.find((s) => s.country === 'CN');
assert.equal(cnStatus.status, 'missing');
assert.equal(cnStatus.expected, 2,
`missing-country expected should be SCORABLE count (2), not all-manifest (3); got ${cnStatus.expected}`);
});
test('buildCoverageSummary: country with ONLY documentation-only entries is excluded from expectedCountries', () => {
// Edge case: hypothetical country where every manifest entry is
// documentation-only (e.g. only EIA-style unverified). Such a
// country has 0 scorable funds → should not appear in
// expectedCountries because there's nothing scorable to expect.
const manifest = {
funds: [
{ country: 'XX', fund: 'placeholder', classification: { access: 0.4 }, aumVerified: false },
],
};
const summary = buildCoverageSummary(manifest, {}, {});
assert.equal(summary.expectedCountries, 0,
`XX has zero scorable funds — should not be in expectedCountries`);
assert.equal(summary.expectedFunds, 0);
});