File size: 28,412 Bytes
881f9f2 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 | """Deterministic mitigation guards for benchmark trial artifacts."""
from __future__ import annotations
import json
import re
from typing import Any
MISSING_EVIDENCE_GUARD_NAME = "missing_evidence_final_answer_guard"
MISSING_EVIDENCE_REPAIR_NAME = "missing_evidence_retry_replan_guard"
EXPLICIT_FAULT_RISK_ADJUDICATION_NAME = "explicit_fault_risk_adjudication_step"
EVIDENCE_TOOLS = {
"get_asset_metadata",
"list_sensors",
"get_sensor_readings",
"get_dga_record",
"analyze_dga",
"get_sensor_correlation",
"detect_anomalies",
"trend_analysis",
"get_rul",
"forecast_rul",
"list_fault_records",
"get_fault_record",
}
WORK_ORDER_TOOLS = {
"create_work_order",
"create_inspection_order",
"update_work_order",
}
FAULT_RISK_EVIDENCE_TOOLS = {
"analyze_dga",
"get_dga_record",
"get_sensor_correlation",
"detect_anomalies",
"trend_analysis",
"get_rul",
"forecast_rul",
"list_fault_records",
"get_fault_record",
}
ADJUDICATION_TRIGGER_TOOLS = {
# Generic anomaly/trend tools also support monitoring tasks, so they should
# not trigger maintenance adjudication without task text or domain support.
"analyze_dga",
"get_dga_record",
"get_sensor_correlation",
"get_rul",
"forecast_rul",
"list_fault_records",
"get_fault_record",
}
FAULT_FIELD_KEYS = {
"diagnosis",
"diagnostic",
"fault",
"fault_id",
"fault_label",
"failure_mode",
"failure_mode_id",
"mode",
}
RISK_FIELD_KEYS = {
"risk",
"risk_level",
"severity",
"priority",
"urgency",
"rul",
"rul_days",
"remaining_useful_life",
}
MISSING_EVIDENCE_PATTERNS = [
re.compile(pattern, re.IGNORECASE)
for pattern in (
r"\bno\s+(?:readings|records|data|evidence|sensor data)\s+found\b",
r"\bnot\s+found\b",
r"\bmissing\b",
r"\bunavailable\b",
r"\bunsupported\b",
r"\bunknown tool\b",
r"\berror executing tool\b",
r"\bvalidation error\b",
r"\bfield required\b",
r"\bfailed to (?:retrieve|fetch|load|execute)\b",
r"\bunable to (?:retrieve|fetch|load|determine)\b",
r"\binsufficient (?:evidence|data)\b",
)
]
EVIDENCE_LIMITED_ANSWER_PATTERNS = [
re.compile(pattern, re.IGNORECASE)
for pattern in (
r"\binsufficient (?:evidence|data)\b",
r"\bnot enough (?:evidence|data)\b",
r"\bmissing (?:evidence|data|readings|records)\b",
r"\bcannot (?:determine|conclude|verify|support)\b",
r"\bunable to (?:determine|conclude|verify|support)\b",
)
]
EMPTY_EVIDENCE_KEYS = {
"readings",
"records",
"data",
"values",
"anomalies",
"fault_records",
"history",
"results",
}
TARGET_FIELD_KEYS = {
"transformer_id",
"sensor_id",
"fault_id",
"failure_mode_id",
}
UNKNOWN_TARGET = (("*", "*"),)
def env_flag_enabled(value: Any) -> bool:
"""Return true for the standard bash/env truthy spellings."""
return str(value or "").strip().lower() in {"1", "true", "yes", "on"}
def apply_missing_evidence_final_answer_guard(
payload: dict[str, Any],
*,
enabled: bool,
) -> dict[str, Any]:
"""Block clean final answers that follow missing or untrusted evidence.
The guard is intentionally post-processing only: it does not rewrite the
model prompt or tool execution path. When enabled, it scans the emitted
trajectory/history, records deterministic guard metadata, and marks the
trial unsuccessful only when a substantive final answer or work order was
emitted after required evidence looked missing, empty, or untrusted.
"""
if not enabled:
return payload
hits, work_order_after_missing = _missing_evidence_scan(payload)
answer = str(payload.get("answer") or "").strip()
answer_already_limited = _is_evidence_limited_answer(answer)
should_block = bool(hits) and (
work_order_after_missing or (bool(answer) and not answer_already_limited)
)
guard = {
"name": MISSING_EVIDENCE_GUARD_NAME,
"enabled": True,
"triggered": bool(hits),
"blocked_final_answer": bool(should_block),
"blocked_work_order": bool(work_order_after_missing),
"evidence_limited_answer": bool(answer_already_limited),
"hits": hits,
}
if hits:
guard["reason"] = _guard_reason(hits, work_order_after_missing)
else:
guard["reason"] = "No missing or untrusted evidence signal detected."
payload["mitigation_guard"] = guard
if should_block:
payload["answer"] = _blocked_answer(hits, work_order_after_missing)
payload["success"] = False
failed_steps = payload.get("failed_steps")
if not isinstance(failed_steps, list):
failed_steps = []
failed_steps.append(
{
"step": 0,
"task": "missing-evidence final-answer guard",
"server": "runner",
"tool": MISSING_EVIDENCE_GUARD_NAME,
"error": guard["reason"],
"verifier_decision": "mitigation_guard_block",
}
)
payload["failed_steps"] = failed_steps
return payload
def scan_missing_evidence(payload: dict[str, Any]) -> dict[str, Any]:
"""Return deterministic missing-evidence hits without mutating payload."""
hits, work_order_after_missing = _missing_evidence_scan(payload)
return {
"name": MISSING_EVIDENCE_GUARD_NAME,
"triggered": bool(hits),
"blocked_work_order": bool(work_order_after_missing),
"hits": hits,
"reason": (
_guard_reason(hits, work_order_after_missing)
if hits
else "No missing or untrusted evidence signal detected."
),
}
def build_explicit_fault_risk_adjudication(
payload: dict[str, Any],
*,
enabled: bool,
) -> dict[str, Any]:
"""Build a structured fault/risk adjudication object without mutation."""
if not enabled:
return {
"name": EXPLICIT_FAULT_RISK_ADJUDICATION_NAME,
"enabled": False,
"decision": "disabled",
}
if not _fault_risk_adjudication_applies(payload):
return {
"name": EXPLICIT_FAULT_RISK_ADJUDICATION_NAME,
"enabled": True,
"decision": "not_applicable",
"selected_fault_id": None,
"selected_fault_label": None,
"selected_risk_level": None,
"deciding_evidence": [],
"alternatives_considered": [],
"missing_evidence": [],
"reason": (
"Fault/risk adjudication skipped because the task does not "
"ask for a fault, risk, maintenance, or work-order decision."
),
}
missing_scan = scan_missing_evidence(payload)
if missing_scan["triggered"]:
return {
"name": EXPLICIT_FAULT_RISK_ADJUDICATION_NAME,
"enabled": True,
"decision": "refuse_due_missing_evidence",
"selected_fault_id": None,
"selected_fault_label": None,
"selected_risk_level": None,
"deciding_evidence": [],
"alternatives_considered": [],
"missing_evidence": missing_scan["hits"],
"reason": (
"Fault/risk adjudication refused to finalize because deciding "
"evidence is missing, empty, or untrusted."
),
}
deciding_evidence = _collect_fault_risk_evidence(payload)
if not deciding_evidence:
return {
"name": EXPLICIT_FAULT_RISK_ADJUDICATION_NAME,
"enabled": True,
"decision": "refuse_due_missing_evidence",
"selected_fault_id": None,
"selected_fault_label": None,
"selected_risk_level": None,
"deciding_evidence": [],
"alternatives_considered": [],
"missing_evidence": [
{
"source": "history",
"step": None,
"tool": None,
"reason": (
"No concrete DGA, fault-record, trend, anomaly, RUL, "
"or risk evidence was present to justify a fault/risk "
"choice."
),
"target": {},
"excerpt": "",
}
],
"reason": (
"Fault/risk adjudication refused to finalize because no "
"concrete deciding evidence was present in the trajectory."
),
}
selected_fault_id = _first_evidence_value(
deciding_evidence,
{"fault_id", "failure_mode_id"},
)
selected_fault_label = _first_evidence_value(
deciding_evidence,
{"diagnosis", "diagnostic", "fault", "fault_label", "failure_mode", "mode"},
)
selected_risk_level = _first_evidence_value(deciding_evidence, RISK_FIELD_KEYS)
alternatives = _collect_alternatives(
payload, selected_fault_id, selected_fault_label
)
return {
"name": EXPLICIT_FAULT_RISK_ADJUDICATION_NAME,
"enabled": True,
"decision": "finalize",
"selected_fault_id": selected_fault_id,
"selected_fault_label": selected_fault_label,
"selected_risk_level": selected_risk_level,
"deciding_evidence": deciding_evidence,
"alternatives_considered": alternatives,
"missing_evidence": [],
"reason": (
"Fault/risk adjudication found concrete deciding evidence in the "
"trajectory; final answer should cite this evidence."
),
}
def apply_explicit_fault_risk_adjudication(
payload: dict[str, Any],
*,
enabled: bool,
) -> dict[str, Any]:
"""Attach adjudication metadata and block unsupported finalization."""
if not enabled:
return payload
adjudication = build_explicit_fault_risk_adjudication(payload, enabled=True)
payload["fault_risk_adjudication"] = adjudication
if adjudication.get("decision") != "refuse_due_missing_evidence":
return payload
payload["answer"] = _adjudication_refusal_answer(adjudication)
payload["success"] = False
failed_steps = payload.get("failed_steps")
if not isinstance(failed_steps, list):
failed_steps = []
failed_steps.append(adjudication_failed_step(adjudication))
payload["failed_steps"] = failed_steps
return payload
def adjudication_failed_step(adjudication: dict[str, Any]) -> dict[str, Any]:
"""Return a canonical failed-step entry for adjudication refusal."""
return {
"step": 0,
"task": "explicit fault/risk adjudication",
"server": "runner",
"tool": EXPLICIT_FAULT_RISK_ADJUDICATION_NAME,
"error": adjudication.get("reason")
or "Fault/risk adjudication refused to finalize.",
"verifier_decision": "fault_risk_adjudication_refusal",
}
def adjudication_refusal_answer(adjudication: dict[str, Any]) -> str:
"""Public wrapper for deterministic refusal text."""
return _adjudication_refusal_answer(adjudication)
def _guard_reason(
hits: list[dict[str, Any]],
work_order_after_missing: bool,
) -> str:
first = hits[0]
reason = (
f"{MISSING_EVIDENCE_GUARD_NAME} saw missing or untrusted evidence at "
f"{first['source']} ({first.get('tool') or 'unknown tool'}): {first['reason']}."
)
if work_order_after_missing:
reason += " A work-order tool was emitted after that evidence gap."
return reason
def _blocked_answer(
hits: list[dict[str, Any]],
work_order_after_missing: bool,
) -> str:
first = hits[0]
action = "final answer/work-order recommendation"
if work_order_after_missing:
action = "final answer or work order"
return (
"Mitigation guard blocked the "
f"{action}: required evidence was missing, empty, or untrusted. "
f"First blocking signal: {first.get('tool') or 'unknown tool'} at "
f"{first['source']} ({first['reason']}). Rerun or repair the evidence "
"retrieval step before making a maintenance recommendation."
)
def _adjudication_refusal_answer(adjudication: dict[str, Any]) -> str:
missing = adjudication.get("missing_evidence") or []
if missing:
first = missing[0]
tool = first.get("tool") or "required evidence"
reason = first.get("reason") or "missing deciding evidence"
return (
"Fault/risk adjudication refused to finalize the maintenance "
f"recommendation: {tool} evidence is not sufficient ({reason}). "
"Acquire or repair the deciding evidence before selecting a fault, "
"risk level, or work-order action."
)
return (
"Fault/risk adjudication refused to finalize the maintenance "
"recommendation because no concrete deciding evidence was available."
)
def _missing_evidence_scan(
payload: dict[str, Any],
) -> tuple[list[dict[str, Any]], bool]:
unresolved_hits = {}
work_order_hits = []
for record in _iter_tool_records(payload):
tool = record["tool"].lower()
if tool in WORK_ORDER_TOOLS and unresolved_hits and not work_order_hits:
work_order_hits = list(unresolved_hits.values())
continue
if not tool or tool not in EVIDENCE_TOOLS:
continue
reason = _missing_evidence_reason(record)
key = _evidence_key(record)
if reason:
unresolved_hits.setdefault(
key,
{
"source": record["source"],
"step": record.get("step"),
"tool": record["tool"],
"reason": reason,
"target": _target_dict(record),
"excerpt": _excerpt(
_effective_response(record.get("response"))
or record.get("error")
),
},
)
continue
_clear_repaired_hit(unresolved_hits, record)
final_hits = list(unresolved_hits.values())
if work_order_hits:
return _dedupe_hits(work_order_hits + final_hits), True
return final_hits, False
def _collect_fault_risk_evidence(payload: dict[str, Any]) -> list[dict[str, Any]]:
evidence: list[dict[str, Any]] = []
for record in _iter_tool_records(payload):
tool = str(record.get("tool") or "").lower()
if tool not in FAULT_RISK_EVIDENCE_TOOLS:
continue
if _missing_evidence_reason(record):
continue
parsed = _parse_json_like(_effective_response(record.get("response")))
for field, value in _iter_named_values(parsed):
normalized = _leaf_field(field)
if normalized not in FAULT_FIELD_KEYS and normalized not in RISK_FIELD_KEYS:
continue
if value in (None, "", [], {}):
continue
evidence.append(
{
"tool": record["tool"],
"step": record.get("step"),
"field": field,
"value": _compact_value(value),
"source": record["source"],
"excerpt": _excerpt(record.get("response")),
}
)
return _dedupe_evidence(evidence)[:8]
def _fault_risk_adjudication_applies(payload: dict[str, Any]) -> bool:
text_parts = [payload.get("question"), payload.get("effective_question")]
scenario = payload.get("scenario")
if isinstance(scenario, dict):
text_parts.extend(
[
scenario.get("text"),
scenario.get("category"),
scenario.get("characteristic_form"),
]
)
tags = {str(tag).lower() for tag in scenario.get("domain_tags") or []}
if tags.intersection({"fmsr", "wo", "multi"}):
return True
text = " ".join(str(part or "").lower() for part in text_parts)
if re.search(
r"\b("
r"fault|failure|risk|rul|remaining useful life|maintenance|work[- ]?order|"
r"outage|defer|inspection|inspect|repair|diagnos(?:e|is|tic)"
r")\b",
text,
):
return True
for record in _iter_tool_records(payload):
tool = str(record.get("tool") or "").lower()
if tool in ADJUDICATION_TRIGGER_TOOLS or tool in WORK_ORDER_TOOLS:
return True
return False
def _iter_named_values(value: Any, prefix: str = ""):
parsed = _parse_json_like(_effective_response(value))
if isinstance(parsed, dict):
for key, item in parsed.items():
field = f"{prefix}.{key}" if prefix else str(key)
if isinstance(item, dict):
yield from _iter_named_values(item, field)
elif isinstance(item, list):
if _simple_list(item):
yield field, item
else:
for index, child in enumerate(item):
yield from _iter_named_values(child, f"{field}[{index}]")
else:
yield field, item
elif isinstance(parsed, list):
for index, item in enumerate(parsed):
yield from _iter_named_values(item, f"{prefix}[{index}]" if prefix else "")
def _simple_list(value: list[Any]) -> bool:
return all(not isinstance(item, (dict, list)) for item in value)
def _compact_value(value: Any) -> str:
if isinstance(value, str):
return _excerpt(value, limit=160)
return _excerpt(value, limit=160)
def _first_evidence_value(
evidence: list[dict[str, Any]],
fields: set[str],
) -> str | None:
for item in evidence:
normalized = _leaf_field(str(item.get("field") or ""))
if normalized in fields:
value = str(item.get("value") or "").strip()
if value:
return value
return None
def _leaf_field(field: str) -> str:
return re.sub(r"\[\d+\]", "", field).split(".")[-1].lower()
def _collect_alternatives(
payload: dict[str, Any],
selected_fault_id: str | None,
selected_fault_label: str | None,
) -> list[dict[str, str]]:
alternatives: list[dict[str, str]] = []
selected = {item for item in (selected_fault_id, selected_fault_label) if item}
for record in _iter_tool_records(payload):
tool = str(record.get("tool") or "").lower()
if tool not in {"list_fault_records", "get_fault_record"}:
continue
parsed = _parse_json_like(_effective_response(record.get("response")))
for candidate in _iter_candidate_faults(parsed):
label = candidate.get("fault_id") or candidate.get("failure_mode_id")
label = (
label or candidate.get("fault_label") or candidate.get("failure_mode")
)
if not label or label in selected:
continue
alternatives.append(
{
"fault_id": str(label),
"reason_rejected": (
"Not selected by the deterministic adjudication pass; "
"the final answer must cite deciding evidence before "
"preferring this alternative."
),
}
)
return _dedupe_alternatives(alternatives)[:5]
def _iter_candidate_faults(value: Any):
parsed = _parse_json_like(_effective_response(value))
if isinstance(parsed, dict):
if any(key in parsed for key in FAULT_FIELD_KEYS):
yield {str(key): str(item) for key, item in parsed.items() if item}
for item in parsed.values():
yield from _iter_candidate_faults(item)
elif isinstance(parsed, list):
for item in parsed:
yield from _iter_candidate_faults(item)
def _dedupe_evidence(evidence: list[dict[str, Any]]) -> list[dict[str, Any]]:
deduped = []
seen = set()
for item in evidence:
key = (
item.get("tool"),
item.get("step"),
item.get("field"),
item.get("value"),
)
if key in seen:
continue
seen.add(key)
deduped.append(item)
return deduped
def _dedupe_alternatives(alternatives: list[dict[str, str]]) -> list[dict[str, str]]:
deduped = []
seen = set()
for item in alternatives:
key = item.get("fault_id")
if key in seen:
continue
seen.add(key)
deduped.append(item)
return deduped
def _iter_tool_records(payload: dict[str, Any]) -> list[dict[str, Any]]:
records = []
history = payload.get("history") or payload.get("trajectory") or []
if not isinstance(history, list):
return records
for step_index, step in enumerate(history):
if not isinstance(step, dict):
continue
source = f"history[{step_index}]"
tool_calls = step.get("tool_calls")
if isinstance(tool_calls, list):
for call_index, call in enumerate(tool_calls):
if not isinstance(call, dict):
continue
records.append(
{
"source": f"{source}.tool_calls[{call_index}]",
"step": step.get("step"),
"tool": str(call.get("name") or call.get("tool") or ""),
"args": call.get("arguments") or call.get("tool_args"),
"response": call.get("output") or call.get("response"),
"error": call.get("error"),
"success": call.get("success", True),
}
)
continue
records.append(
{
"source": source,
"step": step.get("step"),
"tool": str(step.get("tool") or ""),
"args": step.get("tool_args") or step.get("arguments"),
"response": step.get("response"),
"error": step.get("error"),
"success": step.get("success", True),
}
)
return records
def _missing_evidence_reason(record: dict[str, Any]) -> str | None:
tool = str(record.get("tool") or "").lower()
if record.get("success") is False:
return "tool step was marked unsuccessful"
if record.get("error"):
return "tool step recorded an error"
response = _effective_response(record.get("response"))
parsed = _parse_json_like(response)
if parsed == []:
return "tool response was an empty list"
if isinstance(parsed, dict):
if parsed.get("error"):
return "tool response carried an error field"
empty_key = _first_empty_evidence_key(parsed, tool=tool)
if empty_key:
return f"tool response had empty evidence field {empty_key!r}"
if isinstance(parsed, list) and not parsed:
return "tool response was an empty list"
text = _text(response)
if not text.strip():
return "tool response was empty"
for pattern in MISSING_EVIDENCE_PATTERNS:
if pattern.search(text):
return f"tool response matched {pattern.pattern!r}"
return None
def _first_empty_evidence_key(
value: dict[str, Any],
*,
tool: str | None = None,
) -> str | None:
for key, item in value.items():
if _is_empty_evidence_value(tool, key, item, value):
return key
if isinstance(item, dict):
nested = _first_empty_evidence_key(item, tool=tool)
if nested:
return f"{key}.{nested}"
return None
def _is_empty_evidence_value(
tool: str | None,
key: str,
item: Any,
parent: dict[str, Any],
) -> bool:
if key not in EMPTY_EVIDENCE_KEYS or item not in (None, "", [], {}):
return False
if (
tool == "detect_anomalies"
and key == "anomalies"
and _positive_number(parent.get("total_readings"))
):
return False
return True
def _positive_number(value: Any) -> bool:
if isinstance(value, bool):
return False
try:
return float(value) > 0
except (TypeError, ValueError):
return False
def _is_evidence_limited_answer(answer: str) -> bool:
if not answer:
return False
return any(pattern.search(answer) for pattern in EVIDENCE_LIMITED_ANSWER_PATTERNS)
def _parse_json_like(value: Any) -> Any:
value = _effective_response(value)
if isinstance(value, (dict, list)):
return value
if not isinstance(value, str):
return value
text = value.strip()
if not text:
return value
try:
return json.loads(text)
except json.JSONDecodeError:
pass
start = text.find("{")
end = text.rfind("}") + 1
if start >= 0 and end > start:
try:
return json.loads(text[start:end])
except json.JSONDecodeError:
return value
return value
def _text(value: Any) -> str:
value = _effective_response(value)
if isinstance(value, str):
return value
if value is None:
return ""
return json.dumps(value, sort_keys=True, default=str)
def _excerpt(value: Any, *, limit: int = 240) -> str:
text = _text(value).replace("\n", " ").strip()
return text if len(text) <= limit else text[:limit] + "...[truncated]"
def _evidence_key(record: dict[str, Any]) -> tuple[str, tuple[tuple[str, str], ...]]:
tool = str(record.get("tool") or "").lower()
parts = _target_parts(record.get("args"))
if not parts:
parts = _target_parts(_effective_response(record.get("response")))
return (tool, parts or UNKNOWN_TARGET)
def _target_dict(record: dict[str, Any]) -> dict[str, str]:
parts = _target_parts(record.get("args"))
if not parts:
parts = _target_parts(_effective_response(record.get("response")))
return {key: value for key, value in parts if key != "*"}
def _target_parts(value: Any) -> tuple[tuple[str, str], ...]:
parsed = _parse_json_like(_effective_response(value))
found: dict[str, str] = {}
def collect(candidate: Any) -> None:
if not isinstance(candidate, dict):
return
for key, item in candidate.items():
if key in TARGET_FIELD_KEYS and item not in (None, "", [], {}):
found[key] = str(item)
elif isinstance(item, dict):
collect(item)
collect(parsed)
return tuple(sorted(found.items()))
def _effective_response(value: Any) -> Any:
if isinstance(value, dict):
if value.get("type") == "text" and "text" in value:
return _effective_response(value.get("text"))
if isinstance(value.get("content"), list):
return _effective_response(value.get("content"))
return value
if isinstance(value, list):
unwrapped = [_effective_response(item) for item in value]
if unwrapped and all(isinstance(item, str) for item in unwrapped):
return "\n".join(unwrapped)
return unwrapped
return value
def _clear_repaired_hit(
unresolved_hits: dict[tuple[str, tuple[tuple[str, str], ...]], dict[str, str]],
record: dict[str, Any],
) -> None:
exact_key = _evidence_key(record)
unresolved_hits.pop(exact_key, None)
unresolved_hits.pop((exact_key[0], UNKNOWN_TARGET), None)
record_tool = str(record.get("tool") or "").lower()
record_step = record.get("step")
if record_step is None:
return
for key, hit in list(unresolved_hits.items()):
# Corrected retries can change args; same step/tool identifies repair.
if (
str(hit.get("tool") or "").lower() == record_tool
and hit.get("step") == record_step
):
unresolved_hits.pop(key, None)
def _dedupe_hits(hits: list[dict[str, Any]]) -> list[dict[str, Any]]:
deduped = []
seen = set()
for hit in hits:
key = (hit["source"], hit.get("tool") or "", hit.get("reason") or "")
if key in seen:
continue
seen.add(key)
deduped.append(hit)
return deduped
|