From 3c0d412219198e14e6e8872a5a2eb4ddf5dadbfa Mon Sep 17 00:00:00 2001 From: Ed_ Date: Fri, 27 Feb 2026 19:54:12 -0500 Subject: [PATCH] checkpoint --- scripts/mma_exec.py | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/scripts/mma_exec.py b/scripts/mma_exec.py index 0580ff0..23ed3f0 100644 --- a/scripts/mma_exec.py +++ b/scripts/mma_exec.py @@ -178,14 +178,14 @@ def execute_agent(role: str, prompt: str, docs: list[str]) -> str: "Your goal is to implement specific code changes or tests based on the provided task. " \ "You have access to tools for reading and writing files (e.g., read_file, write_file, replace), " \ "codebase investigation (codebase_investigator), and web tools (google_web_search, web_fetch). " \ - "You CAN execute PowerShell scripts or run shell commands via run_shell_command for verification and testing. " \ + "You CAN execute PowerShell scripts via discovered_tool_run_powershell for verification and testing. " \ "Follow TDD and return success status or code changes. No pleasantries, no conversational filler." elif role in ['tier4', 'tier4-qa']: system_directive = "STRICT SYSTEM DIRECTIVE: You are a stateless Tier 4 QA Agent. " \ "Your goal is to analyze errors, summarize logs, or verify tests. " \ "You have access to tools for reading files, exploring the codebase (codebase_investigator), " \ "and web tools (google_web_search, web_fetch). " \ - "You CAN execute PowerShell scripts or run shell commands via run_shell_command for diagnostics. " \ + "You CAN execute PowerShell scripts via discovered_tool_run_powershell for diagnostics. " \ "ONLY output the requested analysis. No pleasantries." else: system_directive = f"STRICT SYSTEM DIRECTIVE: You are a stateless {role}. " \ @@ -208,7 +208,8 @@ def execute_agent(role: str, prompt: str, docs: list[str]) -> str: # Use subprocess with input to pipe the prompt via stdin, avoiding WinError 206. # We use -p 'mma_task' to ensure non-interactive (headless) mode and valid parsing. # Whitelist tools to ensure they are available to the model in headless mode. - allowed_tools = "read_file,write_file,replace,list_directory,glob,grep_search,search_files,get_file_summary,run_shell_command,activate_skill,codebase_investigator,google_web_search,web_fetch" + # Using 'discovered_tool_run_powershell' as it's the confirmed name for shell access. + allowed_tools = "read_file,write_file,replace,list_directory,glob,grep_search,search_files,get_file_summary,discovered_tool_run_powershell,activate_skill,codebase_investigator,google_web_search,web_fetch" ps_command = ( f"if (Test-Path 'C:\\projects\\misc\\setup_gemini.ps1') {{ . 'C:\\projects\\misc\\setup_gemini.ps1' }}; " f"gemini -p 'mma_task' --allowed-tools {allowed_tools} --output-format json --model {model}"