wolverine-ai 4.3.1 → 4.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "wolverine-ai",
3
- "version": "4.3.1",
3
+ "version": "4.4.0",
4
4
  "description": "Self-healing Node.js server framework powered by AI. Catches crashes, diagnoses errors, generates fixes, verifies, and restarts — automatically.",
5
5
  "main": "src/index.js",
6
6
  "bin": {
@@ -358,6 +358,90 @@ const TOOL_DEFINITIONS = [
358
358
  },
359
359
  },
360
360
  },
361
+ // ── ADVANCED DIAGNOSTICS ──
362
+ {
363
+ type: "function",
364
+ function: {
365
+ name: "verify_node_modules",
366
+ description: "Verify node_modules integrity against package-lock.json. Detects corruption, missing packages, broken bin links.",
367
+ parameters: { type: "object", properties: {}, required: [] },
368
+ },
369
+ },
370
+ {
371
+ type: "function",
372
+ function: {
373
+ name: "inspect_certificate",
374
+ description: "Inspect SSL/TLS certificate for a host or local file. Shows expiry, subject, SAN list, chain validity.",
375
+ parameters: {
376
+ type: "object",
377
+ properties: {
378
+ host: { type: "string", description: "Hostname to check (e.g. api.example.com)" },
379
+ port: { type: "number", description: "Port (default: 443)" },
380
+ },
381
+ required: ["host"],
382
+ },
383
+ },
384
+ },
385
+ {
386
+ type: "function",
387
+ function: {
388
+ name: "inspect_cache",
389
+ description: "Check Redis/cache server health: connectivity, auth, memory usage, connected clients.",
390
+ parameters: {
391
+ type: "object",
392
+ properties: {
393
+ host: { type: "string", description: "Redis host (default: 127.0.0.1)" },
394
+ port: { type: "number", description: "Redis port (default: 6379)" },
395
+ },
396
+ required: [],
397
+ },
398
+ },
399
+ },
400
+ {
401
+ type: "function",
402
+ function: {
403
+ name: "disk_cleanup",
404
+ description: "Find and optionally clean safe-to-delete files (old backups, caches, logs) to free disk space. Dry run by default.",
405
+ parameters: {
406
+ type: "object",
407
+ properties: {
408
+ dry_run: { type: "boolean", description: "If true (default), only report what would be cleaned" },
409
+ },
410
+ required: [],
411
+ },
412
+ },
413
+ },
414
+ {
415
+ type: "function",
416
+ function: {
417
+ name: "check_file_descriptors",
418
+ description: "Check open file descriptor count, limits, and identify potential FD leaks (EMFILE prevention).",
419
+ parameters: { type: "object", properties: {}, required: [] },
420
+ },
421
+ },
422
+ {
423
+ type: "function",
424
+ function: {
425
+ name: "check_event_loop",
426
+ description: "Scan server code for event loop blocking patterns (readFileSync, execSync, large JSON.parse) and check active handles.",
427
+ parameters: { type: "object", properties: {}, required: [] },
428
+ },
429
+ },
430
+ {
431
+ type: "function",
432
+ function: {
433
+ name: "check_websocket",
434
+ description: "Test a WebSocket endpoint by performing a real handshake. Reports connection success, upgrade status, latency.",
435
+ parameters: {
436
+ type: "object",
437
+ properties: {
438
+ url: { type: "string", description: "WebSocket URL (ws:// or wss://)" },
439
+ timeout_ms: { type: "number", description: "Connection timeout (default: 5000)" },
440
+ },
441
+ required: ["url"],
442
+ },
443
+ },
444
+ },
361
445
  // ── TASK MANAGEMENT ──
362
446
  {
363
447
  type: "function",
@@ -645,6 +729,13 @@ class AgentEngine {
645
729
  case "restart_service": return this._restartService(args);
646
730
  case "check_network": return this._checkNetwork(args);
647
731
  case "inspect_env": return this._inspectEnv(args);
732
+ case "verify_node_modules": return this._verifyNodeModules(args);
733
+ case "inspect_certificate": return this._inspectCertificate(args);
734
+ case "inspect_cache": return this._inspectCache(args);
735
+ case "disk_cleanup": return this._diskCleanup(args);
736
+ case "check_file_descriptors": return this._checkFileDescriptors(args);
737
+ case "check_event_loop": return this._checkEventLoop(args);
738
+ case "check_websocket": return this._checkWebsocket(args);
648
739
  case "done": return this._done(args);
649
740
  // Legacy aliases
650
741
  case "list_files": return this._globFiles({ pattern: (args.dir || ".") + "/*" + (args.pattern || "") });
@@ -1244,6 +1335,268 @@ class AgentEngine {
1244
1335
  return { content: lines.join("\n") };
1245
1336
  }
1246
1337
 
1338
+ // ── ADVANCED DIAGNOSTICS ──
1339
+
1340
+ _verifyNodeModules() {
1341
+ try {
1342
+ const lockPath = path.join(this.cwd, "package-lock.json");
1343
+ const pkgPath = path.join(this.cwd, "package.json");
1344
+ if (!fs.existsSync(lockPath)) return { content: "No package-lock.json found. Run: npm install" };
1345
+ const pkg = JSON.parse(fs.readFileSync(pkgPath, "utf-8"));
1346
+ const deps = { ...pkg.dependencies, ...pkg.devDependencies };
1347
+ const missing = [];
1348
+ const broken = [];
1349
+ for (const [name] of Object.entries(deps)) {
1350
+ const modPath = path.join(this.cwd, "node_modules", name);
1351
+ if (!fs.existsSync(modPath)) { missing.push(name); continue; }
1352
+ const modPkg = path.join(modPath, "package.json");
1353
+ if (!fs.existsSync(modPkg)) { broken.push(name + " (no package.json)"); continue; }
1354
+ }
1355
+ // Check .bin links
1356
+ const binDir = path.join(this.cwd, "node_modules", ".bin");
1357
+ let brokenBins = 0;
1358
+ if (fs.existsSync(binDir)) {
1359
+ for (const bin of fs.readdirSync(binDir)) {
1360
+ const target = path.join(binDir, bin);
1361
+ try { fs.readlinkSync(target); } catch { brokenBins++; }
1362
+ }
1363
+ }
1364
+ const rec = missing.length > 5 || broken.length > 3 ? "rm -rf node_modules && npm install" : missing.length > 0 ? "npm install" : "ok";
1365
+ const lines = [
1366
+ `Dependencies: ${Object.keys(deps).length}`,
1367
+ `Missing from disk: ${missing.length > 0 ? missing.join(", ") : "none"}`,
1368
+ `Broken packages: ${broken.length > 0 ? broken.join(", ") : "none"}`,
1369
+ `Broken .bin links: ${brokenBins}`,
1370
+ `Recommendation: ${rec}`,
1371
+ ];
1372
+ return { content: lines.join("\n") };
1373
+ } catch (e) { return { content: `Error: ${e.message}` }; }
1374
+ }
1375
+
1376
+ _inspectCertificate(args) {
1377
+ try {
1378
+ const tls = require("tls");
1379
+ const host = args.host;
1380
+ const port = args.port || 443;
1381
+ return new Promise((resolve) => {
1382
+ const socket = tls.connect({ host, port, servername: host, rejectUnauthorized: false, timeout: 5000 }, () => {
1383
+ const cert = socket.getPeerCertificate();
1384
+ const validTo = new Date(cert.valid_to);
1385
+ const daysLeft = Math.round((validTo - Date.now()) / 86400000);
1386
+ const lines = [
1387
+ `Subject: ${cert.subject?.CN || "unknown"}`,
1388
+ `Issuer: ${cert.issuer?.O || cert.issuer?.CN || "unknown"}`,
1389
+ `Valid: ${cert.valid_from} → ${cert.valid_to}`,
1390
+ `Days until expiry: ${daysLeft}${daysLeft < 30 ? " ⚠️ EXPIRING SOON" : daysLeft < 0 ? " ❌ EXPIRED" : ""}`,
1391
+ `SAN: ${(cert.subjectaltname || "").replace(/DNS:/g, "").split(",").map(s => s.trim()).join(", ") || "none"}`,
1392
+ `Self-signed: ${cert.issuer?.CN === cert.subject?.CN ? "yes" : "no"}`,
1393
+ `Authorized: ${socket.authorized}`,
1394
+ socket.authorizationError ? `TLS error: ${socket.authorizationError}` : "",
1395
+ ].filter(Boolean);
1396
+ socket.destroy();
1397
+ resolve({ content: lines.join("\n") });
1398
+ });
1399
+ socket.on("error", (e) => { resolve({ content: `TLS error for ${host}:${port}: ${e.message}` }); });
1400
+ socket.setTimeout(5000, () => { socket.destroy(); resolve({ content: `Timeout connecting to ${host}:${port}` }); });
1401
+ });
1402
+ } catch (e) { return { content: `Error: ${e.message}` }; }
1403
+ }
1404
+
1405
+ _inspectCache(args) {
1406
+ try {
1407
+ const host = args.host || "127.0.0.1";
1408
+ const port = args.port || 6379;
1409
+ const net = require("net");
1410
+ return new Promise((resolve) => {
1411
+ const client = net.createConnection({ host, port, timeout: 3000 }, () => {
1412
+ let buf = "";
1413
+ client.on("data", (d) => { buf += d.toString(); });
1414
+ client.write("PING\r\nINFO memory\r\nINFO clients\r\nINFO keyspace\r\n");
1415
+ setTimeout(() => {
1416
+ client.destroy();
1417
+ const pong = buf.includes("+PONG");
1418
+ const memMatch = buf.match(/used_memory_human:(\S+)/);
1419
+ const clientMatch = buf.match(/connected_clients:(\d+)/);
1420
+ const lines = [
1421
+ `Reachable: ${pong ? "yes" : "no"}`,
1422
+ `Auth required: ${buf.includes("NOAUTH") ? "yes (failed)" : "no"}`,
1423
+ `Memory: ${memMatch ? memMatch[1] : "unknown"}`,
1424
+ `Connected clients: ${clientMatch ? clientMatch[1] : "unknown"}`,
1425
+ ];
1426
+ resolve({ content: lines.join("\n") });
1427
+ }, 1500);
1428
+ });
1429
+ client.on("error", (e) => { resolve({ content: `Redis ${host}:${port} error: ${e.message}` }); });
1430
+ client.setTimeout(3000, () => { client.destroy(); resolve({ content: `Redis ${host}:${port} timeout` }); });
1431
+ });
1432
+ } catch (e) { return { content: `Error: ${e.message}` }; }
1433
+ }
1434
+
1435
+ _diskCleanup(args) {
1436
+ try {
1437
+ const dryRun = args.dry_run !== false;
1438
+ const os = require("os");
1439
+ const targets = [];
1440
+ let reclaimable = 0;
1441
+ // Old wolverine backups
1442
+ const backupDir = path.join(os.homedir(), ".wolverine-safe-backups", "snapshots");
1443
+ if (fs.existsSync(backupDir)) {
1444
+ const now = Date.now();
1445
+ for (const dir of fs.readdirSync(backupDir)) {
1446
+ const full = path.join(backupDir, dir);
1447
+ try {
1448
+ const stat = fs.statSync(full);
1449
+ const ageDays = (now - stat.mtimeMs) / 86400000;
1450
+ if (ageDays > 7 && stat.isDirectory()) {
1451
+ let size = 0;
1452
+ const walk = (d) => { for (const f of fs.readdirSync(d)) { const p = path.join(d, f); const s = fs.statSync(p); if (s.isDirectory()) walk(p); else size += s.size; } };
1453
+ walk(full);
1454
+ const mb = Math.round(size / 1048576);
1455
+ targets.push({ path: `~/.wolverine-safe-backups/snapshots/${dir}`, size_mb: mb, reason: `${Math.round(ageDays)}d old backup` });
1456
+ reclaimable += mb;
1457
+ }
1458
+ } catch {}
1459
+ }
1460
+ }
1461
+ // npm cache
1462
+ const cacheDir = path.join(this.cwd, "node_modules", ".cache");
1463
+ if (fs.existsSync(cacheDir)) {
1464
+ try {
1465
+ let size = 0;
1466
+ const walk = (d) => { for (const f of fs.readdirSync(d)) { const p = path.join(d, f); try { const s = fs.statSync(p); if (s.isDirectory()) walk(p); else size += s.size; } catch {} } };
1467
+ walk(cacheDir);
1468
+ const mb = Math.round(size / 1048576);
1469
+ if (mb > 1) { targets.push({ path: "node_modules/.cache/", size_mb: mb, reason: "build cache" }); reclaimable += mb; }
1470
+ } catch {}
1471
+ }
1472
+ // Clean if not dry run
1473
+ if (!dryRun && targets.length > 0) {
1474
+ for (const t of targets) {
1475
+ try { execSync(`rm -rf "${t.path.replace("~", os.homedir())}"`, { timeout: 10000 }); } catch {}
1476
+ }
1477
+ }
1478
+ const diskFree = Math.round(parseInt(execSync("df -m . | tail -1 | awk '{print $4}'", { encoding: "utf-8", cwd: this.cwd, timeout: 3000 }).trim() || "0", 10));
1479
+ const lines = [
1480
+ `Disk free: ${diskFree}MB`,
1481
+ `Reclaimable: ${reclaimable}MB (${targets.length} targets)`,
1482
+ dryRun ? "Mode: DRY RUN (pass dry_run=false to clean)" : `Cleaned ${targets.length} targets`,
1483
+ ...targets.map(t => ` ${t.path} (${t.size_mb}MB) — ${t.reason}`),
1484
+ ];
1485
+ return { content: lines.join("\n") };
1486
+ } catch (e) { return { content: `Error: ${e.message}` }; }
1487
+ }
1488
+
1489
+ _checkFileDescriptors() {
1490
+ try {
1491
+ if (process.platform === "win32") return { content: "FD check not available on Windows" };
1492
+ const pid = process.pid;
1493
+ const fdDir = `/proc/${pid}/fd`;
1494
+ let count = 0;
1495
+ try { count = fs.readdirSync(fdDir).length; } catch {}
1496
+ let limits = "";
1497
+ try { limits = execSync(`cat /proc/${pid}/limits | grep 'open files'`, { encoding: "utf-8", timeout: 3000 }).trim(); } catch {}
1498
+ const softMatch = limits.match(/(\d+)\s+(\d+)/);
1499
+ const soft = softMatch ? parseInt(softMatch[1]) : 0;
1500
+ const hard = softMatch ? parseInt(softMatch[2]) : 0;
1501
+ const pct = soft > 0 ? Math.round(count / soft * 100) : 0;
1502
+ const lines = [
1503
+ `Open FDs: ${count}`,
1504
+ `Soft limit: ${soft}`,
1505
+ `Hard limit: ${hard}`,
1506
+ `Usage: ${pct}%${pct > 80 ? " ⚠️ HIGH — risk of EMFILE" : pct > 50 ? " — moderate" : " — ok"}`,
1507
+ ];
1508
+ // Find top consumers
1509
+ try {
1510
+ const top = execSync(`ls -la /proc/${pid}/fd 2>/dev/null | tail -20 | awk '{print $NF}' | sort | uniq -c | sort -rn | head -10`, { encoding: "utf-8", timeout: 3000 }).trim();
1511
+ if (top) lines.push("Top FD targets:", top);
1512
+ } catch {}
1513
+ return { content: lines.join("\n") };
1514
+ } catch (e) { return { content: `Error: ${e.message}` }; }
1515
+ }
1516
+
1517
+ _checkEventLoop() {
1518
+ try {
1519
+ // Static analysis: find blocking patterns in server code
1520
+ const patterns = [
1521
+ { regex: /readFileSync\s*\(/g, name: "fs.readFileSync" },
1522
+ { regex: /writeFileSync\s*\(/g, name: "fs.writeFileSync" },
1523
+ { regex: /execSync\s*\(/g, name: "child_process.execSync" },
1524
+ { regex: /pbkdf2Sync\s*\(/g, name: "crypto.pbkdf2Sync" },
1525
+ { regex: /JSON\.parse\s*\(\s*fs\./g, name: "JSON.parse(fs.read...)" },
1526
+ { regex: /\.forEach\s*\(\s*(async\s*)?\(/g, name: "forEach (blocks with async)" },
1527
+ ];
1528
+ const serverDir = path.join(this.cwd, "server");
1529
+ const findings = [];
1530
+ const walk = (dir) => {
1531
+ if (!fs.existsSync(dir)) return;
1532
+ for (const f of fs.readdirSync(dir)) {
1533
+ if (f === "node_modules" || f.startsWith(".")) continue;
1534
+ const full = path.join(dir, f);
1535
+ const stat = fs.statSync(full);
1536
+ if (stat.isDirectory()) { walk(full); continue; }
1537
+ if (!f.endsWith(".js")) continue;
1538
+ const code = fs.readFileSync(full, "utf-8");
1539
+ for (const p of patterns) {
1540
+ const matches = code.match(p.regex);
1541
+ if (matches) {
1542
+ findings.push(`${path.relative(this.cwd, full)}: ${matches.length}x ${p.name}`);
1543
+ }
1544
+ }
1545
+ }
1546
+ };
1547
+ walk(serverDir);
1548
+ const handles = process._getActiveHandles?.()?.length || "unknown";
1549
+ const requests = process._getActiveRequests?.()?.length || "unknown";
1550
+ const lines = [
1551
+ `Active handles: ${handles}`,
1552
+ `Active requests: ${requests}`,
1553
+ findings.length > 0 ? `\nBlocking patterns found (${findings.length}):` : "No blocking patterns found in server/",
1554
+ ...findings.slice(0, 20),
1555
+ ];
1556
+ return { content: lines.join("\n") };
1557
+ } catch (e) { return { content: `Error: ${e.message}` }; }
1558
+ }
1559
+
1560
+ _checkWebsocket(args) {
1561
+ try {
1562
+ const url = args.url;
1563
+ const timeout = args.timeout_ms || 5000;
1564
+ const urlObj = new (require("url").URL)(url);
1565
+ const isSecure = urlObj.protocol === "wss:";
1566
+ const client = isSecure ? require("https") : require("http");
1567
+ return new Promise((resolve) => {
1568
+ const req = client.request({
1569
+ hostname: urlObj.hostname,
1570
+ port: urlObj.port || (isSecure ? 443 : 80),
1571
+ path: urlObj.pathname + urlObj.search,
1572
+ method: "GET",
1573
+ headers: {
1574
+ "Upgrade": "websocket",
1575
+ "Connection": "Upgrade",
1576
+ "Sec-WebSocket-Key": require("crypto").randomBytes(16).toString("base64"),
1577
+ "Sec-WebSocket-Version": "13",
1578
+ },
1579
+ timeout,
1580
+ }, (res) => {
1581
+ resolve({ content: `HTTP ${res.statusCode} (expected 101 for WS upgrade)\nHeaders: ${JSON.stringify(res.headers, null, 2).slice(0, 500)}` });
1582
+ res.resume();
1583
+ });
1584
+ req.on("upgrade", (res, socket) => {
1585
+ const lines = [
1586
+ `WebSocket upgrade: SUCCESS (101)`,
1587
+ `Protocol: ${res.headers["sec-websocket-protocol"] || "none"}`,
1588
+ `Latency: connected`,
1589
+ ];
1590
+ socket.destroy();
1591
+ resolve({ content: lines.join("\n") });
1592
+ });
1593
+ req.on("error", (e) => { resolve({ content: `WebSocket error for ${url}: ${e.message}` }); });
1594
+ req.on("timeout", () => { req.destroy(); resolve({ content: `WebSocket timeout for ${url} (${timeout}ms)` }); });
1595
+ req.end();
1596
+ });
1597
+ } catch (e) { return { content: `Error: ${e.message}` }; }
1598
+ }
1599
+
1247
1600
  _done(args) {
1248
1601
  console.log(chalk.green(` ✅ Agent done: ${args.summary}`));
1249
1602
  if (this.logger) {
@@ -66,7 +66,7 @@ const SEED_DOCS = [
66
66
  metadata: { topic: "verification" },
67
67
  },
68
68
  {
69
- text: "Wolverine multi-file agent: turn-limited agent loop with 24 tools across 8 categories. Turn budget adapts to error type: simple (TypeError)=4, config/ENOENT=5, complex=8. Each AI call has 90s timeout via Promise.race. FILE: read_file, write_file, edit_file, glob_files, grep_code, list_dir, move_file. SHELL: bash_exec (30s default, 60s cap), git_log, git_diff. DATABASE: inspect_db (tables/schema/SELECT on SQLite), run_db_fix (UPDATE/DELETE/ALTER with auto-backup). DIAGNOSTICS: check_port, check_env, check_memory (RSS/heap/system with OOM detection), list_processes (find zombie/orphan node processes), check_logs (read recent journalctl/log file), check_network (DNS/port/URL reachability), inspect_env (list env var names without values, check if required vars exist). SERVER: restart_service (request graceful restart after fix). DEPS: audit_deps, check_migration. RESEARCH: web_fetch. CONTROL: done.",
69
+ text: "Wolverine multi-file agent: turn-limited agent loop with 31 tools across 9 categories. Turn budget: simple=4, config=5, complex=8. 90s/call timeout. FILE (7): read_file, write_file, edit_file, glob_files, grep_code, list_dir, move_file. SHELL (3): bash_exec, git_log, git_diff. DATABASE (2): inspect_db, run_db_fix. DIAGNOSTICS (7): check_port, check_env, check_memory, list_processes, check_logs, check_network, inspect_env. SERVER (1): restart_service. DEPS (2): audit_deps, check_migration. RESEARCH (1): web_fetch. ADVANCED (7): verify_node_modules (integrity check detects corruption, missing pkgs, broken .bin links), inspect_certificate (TLS cert expiry/SAN/chain for SSL errors), inspect_cache (Redis health — PING, memory, clients), disk_cleanup (safe cleanup of old backups/caches for ENOSPC), check_file_descriptors (FD count/limits for EMFILE), check_event_loop (scan for blocking patterns — readFileSync/execSync/pbkdf2Sync), check_websocket (WS handshake test). CONTROL (1): done.",
70
70
  metadata: { topic: "agent" },
71
71
  },
72
72
  {
@@ -120,6 +120,22 @@ function classifyError(errorMessage, fullStderr) {
120
120
  if (/typeerror|referenceerror|rangeerror/.test(msg)) {
121
121
  return "runtime";
122
122
  }
123
+ // Disk full
124
+ if (/enospc/.test(msg)) {
125
+ return "disk_full";
126
+ }
127
+ // Too many open files
128
+ if (/emfile|enfile/.test(msg)) {
129
+ return "file_descriptors";
130
+ }
131
+ // Connection issues (DB, Redis, external services)
132
+ if (/econnrefused|econnreset|etimedout/.test(msg) && !/eaddrinuse/.test(msg)) {
133
+ return "connection";
134
+ }
135
+ // TLS/SSL certificate errors
136
+ if (/cert_|certificate|self.signed|unable_to_verify/.test(msg)) {
137
+ return "certificate";
138
+ }
123
139
  return "unknown";
124
140
  }
125
141
 
@@ -654,6 +654,44 @@ async function tryOperationalFix(parsed, cwd, logger, sandbox) {
654
654
  }
655
655
  }
656
656
 
657
+ // Pattern 5: ENOSPC — disk full, try automated cleanup
658
+ if (/ENOSPC/.test(msg)) {
659
+ try {
660
+ const os = require("os");
661
+ const backupDir = path.join(os.homedir(), ".wolverine-safe-backups", "snapshots");
662
+ let cleaned = 0;
663
+ if (fs.existsSync(backupDir)) {
664
+ const now = Date.now();
665
+ for (const dir of fs.readdirSync(backupDir)) {
666
+ const full = path.join(backupDir, dir);
667
+ try {
668
+ const stat = fs.statSync(full);
669
+ if (stat.isDirectory() && (now - stat.mtimeMs) > 7 * 86400000) {
670
+ execSync(`rm -rf "${full}"`, { timeout: 10000 });
671
+ cleaned++;
672
+ }
673
+ } catch {}
674
+ }
675
+ }
676
+ try { execSync("npm cache clean --force", { cwd, stdio: "pipe", timeout: 30000 }); cleaned++; } catch {}
677
+ if (cleaned > 0) {
678
+ console.log(chalk.blue(` 🧹 Cleaned ${cleaned} items to free disk space`));
679
+ return { fixed: true, action: `Disk full — cleaned ${cleaned} old backups/caches to free space` };
680
+ }
681
+ } catch {}
682
+ }
683
+
684
+ // Pattern 6: EMFILE — too many open files, try raising ulimit
685
+ if (/EMFILE|ENFILE/.test(msg)) {
686
+ try {
687
+ if (process.platform !== "win32") {
688
+ execSync("ulimit -n 65536 2>/dev/null || true", { cwd, stdio: "pipe", timeout: 3000 });
689
+ console.log(chalk.blue(" 📂 Raised file descriptor limit to 65536"));
690
+ return { fixed: true, action: "EMFILE — raised file descriptor limit (ulimit -n 65536)" };
691
+ }
692
+ } catch {}
693
+ }
694
+
657
695
  return { fixed: false };
658
696
  }
659
697