Skip to content

CMPN-CODECELL/Syrus2026_Buggers

Repository files navigation

Team Name: BUGGERS

Problem Statement: Autonomous Incident-to-Fix Engineering Agent

FixFlow AI

An agentic platform that resolves software incidents end-to-end: from incident ingestion to root-cause analysis, minimal patch generation, sandbox validation, and delivery-ready reporting.


Table of Contents

  1. Project Overview
  2. Problem Statement
  3. System Workflow
  4. Agent Responsibilities
  5. Knowledge Graph Design
  6. Docker Sandbox Validation
  7. MCP Integrations
  8. Reporting and Outputs
  9. Risk Scoring Strategy
  10. Quick Start
  11. Tech Stack
  12. Repository Structure
  13. Configuration

1. Project Overview

FixFlow AI is a multi-agent engineering system that automates the full incident resolution lifecycle:

  • Accept incidents from GitHub and Slack
  • Build structured incident context
  • Analyze code and dependencies
  • Generate a minimal patch
  • Validate changes in an isolated Docker sandbox
  • Produce reports and handoff artifacts for teams

The platform uses a stateful agent graph and a code knowledge graph to improve accuracy, reduce regressions, and support iterative retries when fixes fail validation.


2. Problem Statement

Most incident handling workflows are still manual and slow:

  1. Parse issue text and logs
  2. Identify root cause in a large codebase
  3. Propose a safe fix
  4. Run tests and evaluate regressions
  5. Communicate findings to stakeholders

These steps are difficult to scale, especially for teams handling multiple incidents in parallel. FixFlow AI addresses this by coordinating specialized agents with strict validation and risk-aware output decisions.


3. System Workflow

  1. Incident arrives through GitHub or Slack webhook.
  2. Incident Parser extracts structured fields (severity, stack traces, service, symptoms).
  3. Supervisor routes work to specialist agents.
  4. Codebase Analyst and Knowledge Retriever build root-cause context.
  5. Critic checks fix strategy for quality and minimal scope.
  6. Fix Writer generates a focused patch.
  7. Validation Agent runs sandbox checks and compares baseline vs patched behavior.
  8. Synthesis Agent creates a resolution narrative.
  9. Risk Scorer assigns LOW, MEDIUM, or HIGH risk.
  10. System generates report and integration-ready output.

4. Agent Responsibilities

Agent File Responsibility
Supervisor src/agents/supervisor.py Controls orchestration and retry routing
Incident Parser src/agents/incident_parser.py Converts raw incident text to structured context
Codebase Analyst src/agents/codebase_analyst.py Performs code-level investigation
Knowledge Retriever src/agents/knowledge_retriever.py Pulls historical and graph context
Critic src/agents/critic.py Reviews plans and catches weak reasoning
Fix Writer src/agents/fix_writer.py Generates focused remediation patches
Validation src/agents/validation.py Executes validation and result checks
KG Builder src/agents/kg_builder.py Builds and updates graph artifacts
Synthesis src/agents/synthesis.py Produces consolidated resolution output
Risk Scorer src/agents/risk_scorer.py Determines risk policy for outcomes

5. Knowledge Graph Design

FixFlow uses pluggable graph backends:

  • Neo4j backend for persistent graph queries
  • NetworkX fallback for local/offline operation

Graph components are implemented under src/graph, including backend factory, query interface, and base graph abstractions.

Key graph use cases:

  • Blast radius estimation
  • Historical incident lookup
  • Dependency relationship tracing
  • Context enrichment for better fix planning

6. Docker Sandbox Validation

Validation is performed in isolated containers to prevent host contamination and improve reproducibility.

  • Python sandbox image: docker/python.Dockerfile
  • Node sandbox image: docker/node.Dockerfile
  • Orchestrator: src/sandbox/docker_runner.py

Validation flow:

  1. Capture baseline test result
  2. Apply patch in sandbox context
  3. Re-run tests
  4. Detect regressions and classify outcome

7. MCP Integrations

The system integrates with MCP bridges for external tooling:

  • GitHub integration for issue and PR workflows
  • Slack integration for incident ingestion and notifications

Relevant modules:

  • src/mcp/github_server.py
  • src/mcp/github_tools.py
  • src/mcp/slack_server.py
  • src/mcp/slack_tools.py
  • src/mcp/client_bridge.py

8. Reporting and Outputs

Report generation lives in src/reports/report_generator.py with template support under src/reports/templates.

Output channels include:

  • Incident resolution JSON artifacts (for traceability)
  • PR-friendly markdown summaries
  • Slack message summaries for operational visibility

Sample report data can be found in reports/INC-004_report.json.


9. Risk Scoring Strategy

Risk scoring combines:

  • Scope of code impact
  • Validation confidence
  • Incident severity
  • Change complexity

Policy examples:

  • LOW: suggest automated continuation
  • MEDIUM: human review recommended
  • HIGH: report-only with escalation guidance

10. Quick Start

# 1) Create or activate environment
python -m venv venv
venv\Scripts\activate

# 2) Install dependencies
pip install -r requirements.txt

# 3) (Optional) Start Neo4j via Docker Compose
docker-compose up -d

# 4) Run demo incident flow
python demo.py --incident INC-004 --slack-channel C0AL8NG5J79

# 5) Run batch demo
python demo_batch.py

11. Tech Stack

Component Technology
Orchestration LangGraph
LLM Provider Cerebras Llama 3.3 70B
Graph Neo4j, NetworkX
Sandbox Docker
Integrations MCP tools (GitHub, Slack)
API FastAPI
Reporting Jinja2 templates

12. Repository Structure

src/
    agents/   # Agent implementations and workflow state
    api/      # FastAPI app and webhook routes
    graph/    # Graph backends and query interface
    llm/      # LLM client abstractions and providers
    mcp/      # MCP bridges and platform tool wrappers
    reports/  # Report generation and templates
    sandbox/  # Containerized validation utilities
    utils/    # Shared utilities

tests/      # Test and integration helper scripts
docker/     # Dockerfiles for runtime/sandbox images
reports/    # Generated incident report outputs

13. Configuration

Create an environment file and configure required values.

Suggested variables:

  • CEREBRAS_API_KEY
  • GITHUB_TOKEN
  • SLACK_BOT_TOKEN
  • NEO4J_URI
  • NEO4J_USER
  • NEO4J_PASSWORD

The runtime configuration entrypoint is src/config.py.


About

Repository for Buggers for Syrus-2026

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages