@ducci/jarvis 1.0.32 → 1.0.33
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -0,0 +1,119 @@
|
|
|
1
|
+
# Finding 016: File Writing Corruption, Misleading Stderr Nudge, and Repeated-Error Loop
|
|
2
|
+
|
|
3
|
+
**Date:** 2026-03-02
|
|
4
|
+
**Severity:** High — agent burned 10 iterations on the wrong diagnosis; task abandoned
|
|
5
|
+
**Status:** Fixed
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## Observed Session
|
|
10
|
+
|
|
11
|
+
Session `a25fd973-3e92-4902-a96d-536ef0eb3005`. Model: `nvidia/nemotron-3-nano-30b-a3b:free`. User asked to run a ZAP security scanner script.
|
|
12
|
+
|
|
13
|
+
The script (`scan.sh`) failed immediately with `$ZAP_CMD: command not found`. The agent used all 10 iterations investigating PATH issues and gave up without solving the problem or producing a handoff checkpoint.
|
|
14
|
+
|
|
15
|
+
---
|
|
16
|
+
|
|
17
|
+
## Root Cause 1: Shell Script Written with Escaped Dollar Signs
|
|
18
|
+
|
|
19
|
+
### What happened
|
|
20
|
+
|
|
21
|
+
`scan.sh` was written in a prior session by the agent using `exec` with a shell command (echo or heredoc). Multi-layered escaping — JS string → JSON encoding → bash variable expansion — caused every `$` in the script to be written as `\$` in the file.
|
|
22
|
+
|
|
23
|
+
In bash, `"\$VAR"` (backslash-dollar in double quotes) suppresses variable expansion and produces the literal string `$VAR`. The script ran but nothing expanded:
|
|
24
|
+
|
|
25
|
+
```
|
|
26
|
+
bash -x scan.sh http://testphp.vulnweb.com:
|
|
27
|
+
|
|
28
|
+
+ DOMAIN='$1' ← should be 'http://testphp.vulnweb.com'
|
|
29
|
+
+ OUTPUT_DIR='/path/results/$DOMAIN' ← should be '/path/results/http://...'
|
|
30
|
+
+ '$ZAP_CMD' -cmd ... ← tries to run a command literally named '$ZAP_CMD'
|
|
31
|
+
scan.sh: line 27: $ZAP_CMD: command not found
|
|
32
|
+
```
|
|
33
|
+
|
|
34
|
+
Secondary confirmation: the project directory contained folders literally named `$OUTPUT_DIR` and `$RESULTS_DIR`, created by a prior run of the broken script.
|
|
35
|
+
|
|
36
|
+
### Fix
|
|
37
|
+
|
|
38
|
+
Added `write_file` as a seed tool. It calls `fs.promises.writeFile` directly — content arrives as a JSON string and is written to disk verbatim. No shell is involved, so no escaping layer can corrupt dollar signs or backslashes.
|
|
39
|
+
|
|
40
|
+
Added an optional `mode` parameter (e.g. `"755"`) to make scripts executable in the same call.
|
|
41
|
+
|
|
42
|
+
Updated the system prompt with a dedicated "Writing Files" section (peer-level to "exec Safety") stating: use `write_file` for all file creation — never `exec` with `echo`, `printf`, or heredoc.
|
|
43
|
+
|
|
44
|
+
**Files changed:**
|
|
45
|
+
- `src/server/tools.js` — `write_file` added to `SEED_TOOLS`
|
|
46
|
+
- `docs/system-prompt.md` — new "Writing Files" section; removed the buried `echo -e` bullet from exec Safety
|
|
47
|
+
|
|
48
|
+
---
|
|
49
|
+
|
|
50
|
+
## Root Cause 2: Stderr Nudge Misdirected the Model
|
|
51
|
+
|
|
52
|
+
### What happened
|
|
53
|
+
|
|
54
|
+
After every failed tool call with stderr output, the system injected:
|
|
55
|
+
|
|
56
|
+
> *"Examine the stderr field in the tool result carefully — it likely describes the root cause of the failure."*
|
|
57
|
+
|
|
58
|
+
The stderr was `$ZAP_CMD: command not found` — which looks like a PATH problem. The real diagnostic clue was in the **stdout** of `bash -x`: `DOMAIN='$1'` (variable not expanded). By directing the model to stderr, the nudge trained its attention away from the evidence.
|
|
59
|
+
|
|
60
|
+
The model then spent iterations on: explicit PATH overrides, `command -v` checks, `sed -n l`, `cat -A`, `which bash` — all stderr-adjacent investigation — and never examined what the `-x` trace was actually showing.
|
|
61
|
+
|
|
62
|
+
### Fix
|
|
63
|
+
|
|
64
|
+
Changed the stderr nudge to cover both stdout and stderr, with an explicit callout to `bash -x` as a debug tool whose key output is in stdout:
|
|
65
|
+
|
|
66
|
+
```
|
|
67
|
+
[System: A command failed. Examine both the stdout AND stderr fields in the tool result —
|
|
68
|
+
stderr names the error, but stdout (especially from debug commands like bash -x) often shows
|
|
69
|
+
the root cause. Do not retry without first understanding what the full output is telling you.]
|
|
70
|
+
```
|
|
71
|
+
|
|
72
|
+
**File changed:** `src/server/agent.js` — `stderrErrorInIteration` nudge
|
|
73
|
+
|
|
74
|
+
---
|
|
75
|
+
|
|
76
|
+
## Root Cause 3: No Detection for the Same Error Repeating Across Different Commands
|
|
77
|
+
|
|
78
|
+
### What happened
|
|
79
|
+
|
|
80
|
+
The existing loop detector tracks `tool + args + result` triples. Because the model varied its tool calls each iteration (different PATH strings, different diagnostic commands), this never triggered. Meanwhile `$ZAP_CMD: command not found` appeared in stderr across 5+ tool calls from entirely different commands — a strong signal that the diagnosis is wrong, not the approach.
|
|
81
|
+
|
|
82
|
+
Existing detectors that missed this:
|
|
83
|
+
- `loopTracker` — requires identical tool + args + result; missed because args varied
|
|
84
|
+
- `consecutiveFailures` — tracks back-to-back failures; partially reset when some calls succeeded
|
|
85
|
+
- `maxHandoffs` / zero-progress — apply only to checkpoint-reached runs
|
|
86
|
+
|
|
87
|
+
### Fix
|
|
88
|
+
|
|
89
|
+
Added `stderrTracker = new Map()` in `runAgentLoop` (parallel to `loopTracker`). After each failed tool call, the first line of stderr is extracted as the key and its count incremented.
|
|
90
|
+
|
|
91
|
+
When any stderr string reaches `CONSECUTIVE_FAILURE_THRESHOLD` (3), a targeted "step back" nudge is injected, quoting the repeating error, instead of the basic stderr nudge:
|
|
92
|
+
|
|
93
|
+
```
|
|
94
|
+
[System: The error "$ZAP_CMD: command not found" has now appeared 3 times across different
|
|
95
|
+
commands. You are repeatedly diagnosing the wrong thing. Stop, step back, and reconsider
|
|
96
|
+
from scratch — what is this error fundamentally telling you about the state of the system?]
|
|
97
|
+
```
|
|
98
|
+
|
|
99
|
+
Using only the first line of stderr (not the full message) makes the tracker robust to verbose multi-line output where later lines may contain timestamps or variable content.
|
|
100
|
+
|
|
101
|
+
**File changed:** `src/server/agent.js` — `stderrTracker`, `firstStderrLine` extraction, `repeatedStderr` check replacing basic stderr nudge when threshold reached
|
|
102
|
+
|
|
103
|
+
---
|
|
104
|
+
|
|
105
|
+
## Why the Session Never Produced a Checkpoint
|
|
106
|
+
|
|
107
|
+
The model produced a final text response on iteration 10 (it didn't time out — it gave up). This means `!done` was never true after the while loop, so the wrap-up / checkpoint path never ran. The model exhausted its budget investigating PATH and on the last iteration concluded it couldn't solve the problem.
|
|
108
|
+
|
|
109
|
+
Fix 3 (repeated-error nudge) would have fired by iteration 5–6 with the specific message quoting `$ZAP_CMD: command not found`. At that point the model would have had a chance to reconsider what the error was telling it rather than continuing PATH investigation.
|
|
110
|
+
|
|
111
|
+
---
|
|
112
|
+
|
|
113
|
+
## Files Changed
|
|
114
|
+
|
|
115
|
+
| File | Change |
|
|
116
|
+
|------|--------|
|
|
117
|
+
| `src/server/tools.js` | Added `write_file` seed tool |
|
|
118
|
+
| `docs/system-prompt.md` | Added "Writing Files" section; removed `echo -e` bullet from exec Safety |
|
|
119
|
+
| `src/server/agent.js` | Added `stderrTracker`; first-line stderr key extraction; repeated-error nudge overriding basic stderr nudge; broadened stderr nudge wording to cover stdout |
|
package/docs/system-prompt.md
CHANGED
|
@@ -54,7 +54,15 @@ The `exec` tool runs real shell commands on the server. Use it responsibly:
|
|
|
54
54
|
- **Use known paths.** Prefer `process.cwd()`, `$HOME`, or paths you already know over broad searches. Use `which <binary>` to locate executables.
|
|
55
55
|
- **Prefer targeted reads.** Use `grep`, `head`, or `tail` instead of `cat` on files you haven't seen before. Large file output is truncated anyway — a targeted command gives you better signal.
|
|
56
56
|
- **Avoid commands with unbounded runtime.** If a command could run indefinitely or scan an unknown-size tree, scope it first.
|
|
57
|
-
|
|
57
|
+
|
|
58
|
+
## Writing Files
|
|
59
|
+
|
|
60
|
+
Use the `write_file` tool to create or overwrite any file. Never use `exec` with `echo`, `printf`, or heredoc to write files.
|
|
61
|
+
|
|
62
|
+
Shell escaping through `exec` silently corrupts file content: dollar signs become `\$`, backslashes double up, and the resulting file looks correct when printed but is broken at runtime (variables never expand, scripts fail with "command not found"). `write_file` bypasses all shell interpretation — content arrives as a JSON string and lands in the file exactly as written.
|
|
63
|
+
|
|
64
|
+
- For shell scripts: pass `mode: "755"` to make the file executable in the same call.
|
|
65
|
+
- For any other file: omit `mode` or use `"644"`.
|
|
58
66
|
|
|
59
67
|
## Execution Timeouts
|
|
60
68
|
|
package/package.json
CHANGED
package/src/server/agent.js
CHANGED
|
@@ -103,6 +103,7 @@ async function runAgentLoop(client, config, session, prepareMessages) {
|
|
|
103
103
|
let logSummary = '';
|
|
104
104
|
let status = 'ok';
|
|
105
105
|
let consecutiveFailures = 0;
|
|
106
|
+
const stderrTracker = new Map();
|
|
106
107
|
|
|
107
108
|
while (iteration < config.maxIterations) {
|
|
108
109
|
iteration++;
|
|
@@ -199,6 +200,10 @@ async function runAgentLoop(client, config, session, prepareMessages) {
|
|
|
199
200
|
consecutiveFailures++;
|
|
200
201
|
if (resultObj && resultObj.stderr) {
|
|
201
202
|
stderrErrorInIteration = true;
|
|
203
|
+
const firstStderrLine = resultObj.stderr.split('\n')[0].trim();
|
|
204
|
+
if (firstStderrLine) {
|
|
205
|
+
stderrTracker.set(firstStderrLine, (stderrTracker.get(firstStderrLine) || 0) + 1);
|
|
206
|
+
}
|
|
202
207
|
}
|
|
203
208
|
} else {
|
|
204
209
|
consecutiveFailures = 0;
|
|
@@ -236,10 +241,16 @@ async function runAgentLoop(client, config, session, prepareMessages) {
|
|
|
236
241
|
});
|
|
237
242
|
}
|
|
238
243
|
|
|
239
|
-
|
|
244
|
+
const repeatedStderr = [...stderrTracker.entries()].find(([, count]) => count >= CONSECUTIVE_FAILURE_THRESHOLD);
|
|
245
|
+
if (repeatedStderr && !loopDetected) {
|
|
240
246
|
session.messages.push({
|
|
241
247
|
role: 'user',
|
|
242
|
-
content:
|
|
248
|
+
content: `[System: The error "${repeatedStderr[0].slice(0, 200)}" has now appeared ${repeatedStderr[1]} times across different commands. You are repeatedly diagnosing the wrong thing. Stop, step back, and reconsider from scratch — what is this error fundamentally telling you about the state of the system?]`,
|
|
249
|
+
});
|
|
250
|
+
} else if (stderrErrorInIteration && !loopDetected) {
|
|
251
|
+
session.messages.push({
|
|
252
|
+
role: 'user',
|
|
253
|
+
content: '[System: A command failed. Examine both the stdout AND stderr fields in the tool result — stderr names the error, but stdout (especially from debug commands like bash -x) often shows the root cause. Do not retry without first understanding what the full output is telling you.]',
|
|
243
254
|
});
|
|
244
255
|
}
|
|
245
256
|
|
package/src/server/tools.js
CHANGED
|
@@ -347,6 +347,43 @@ const SEED_TOOLS = {
|
|
|
347
347
|
}
|
|
348
348
|
`,
|
|
349
349
|
},
|
|
350
|
+
write_file: {
|
|
351
|
+
definition: {
|
|
352
|
+
type: 'function',
|
|
353
|
+
function: {
|
|
354
|
+
name: 'write_file',
|
|
355
|
+
description: 'Write content directly to a file on the filesystem, bypassing all shell escaping. Use this to create or overwrite any file — shell scripts, config files, code, etc. Content is written exactly as provided: dollar signs, backslashes, and special characters are preserved without modification. Always prefer this over exec+echo, exec+printf, or exec+heredoc for writing files. For shell scripts, pass mode: "755" to make the file executable. Example: write_file({ path: "/path/to/scan.sh", content: "#!/bin/bash\\nDOMAIN=$1\\n...", mode: "755" })',
|
|
356
|
+
parameters: {
|
|
357
|
+
type: 'object',
|
|
358
|
+
properties: {
|
|
359
|
+
path: {
|
|
360
|
+
type: 'string',
|
|
361
|
+
description: 'Absolute or relative path to the file to write. Parent directories are created automatically.',
|
|
362
|
+
},
|
|
363
|
+
content: {
|
|
364
|
+
type: 'string',
|
|
365
|
+
description: 'The content to write to the file. Written as-is — no shell interpretation occurs.',
|
|
366
|
+
},
|
|
367
|
+
mode: {
|
|
368
|
+
type: 'string',
|
|
369
|
+
description: 'Optional Unix file mode in octal string form, e.g. "755" for executable scripts, "644" for regular files. Defaults to "644".',
|
|
370
|
+
},
|
|
371
|
+
},
|
|
372
|
+
required: ['path', 'content'],
|
|
373
|
+
},
|
|
374
|
+
},
|
|
375
|
+
},
|
|
376
|
+
code: `
|
|
377
|
+
const targetPath = path.resolve(args.path);
|
|
378
|
+
await fs.promises.mkdir(path.dirname(targetPath), { recursive: true });
|
|
379
|
+
await fs.promises.writeFile(targetPath, args.content, 'utf8');
|
|
380
|
+
if (args.mode) {
|
|
381
|
+
await fs.promises.chmod(targetPath, parseInt(args.mode, 8));
|
|
382
|
+
}
|
|
383
|
+
const bytes = Buffer.byteLength(args.content, 'utf8');
|
|
384
|
+
return { status: 'ok', path: targetPath, bytes, mode: args.mode || '644' };
|
|
385
|
+
`,
|
|
386
|
+
},
|
|
350
387
|
get_recent_sessions: {
|
|
351
388
|
definition: {
|
|
352
389
|
type: 'function',
|