Skip to content

Post-hoc coverage analysis: identify what agents actually read vs. what missedΒ #65

@moodmosaic

Description

@moodmosaic

Summary

Hat tip to @nethoxa for sharing the Asymmetric Research blog post. πŸ’―

Currently we partition work before agents run β€” role specialization, lock files, KNOWN_INDEX.md, and SCAN_MODE prevent duplicate effort upfront. But we have no mechanism to verify what agents actually read after a swarm completes. An agent can claim an area via a lock file but silently skip large parts of it.

Inspired by Asymmetric Research's agent-coverage tool which parses session logs to extract per-line read coverage and visualize gaps.

Proposal

Add a post_process step (or standalone script) that:

  1. Parses all agents' JSONL session logs from agent_logs/ β€” extract every Read tool call (file path + line range) and Shell commands that read files (e.g. cat, head, rg)
  2. Builds a coverage map β€” which files/line-ranges were read by which agent
  3. Diffs against the source tree (or a user-supplied target file list) to identify uncovered files and functions
  4. Emits a coverage report β€” summary of covered vs. uncovered areas, per-agent breakdown
  5. (Optional) Generates a follow-up prompt for a cleanup agent pointing at the gaps

Why this matters

  • Agents are probabilistic β€” the blog's data shows repeated runs with identical config produce meaningfully different coverage
  • Upfront partitioning (our current approach) and post-hoc gap analysis (their approach) are complementary
  • This closes the loop: partition before, verify after, re-prompt for what was missed

References

Motivation

We already partition work before agents run (role specialization, lock files, KNOWN_INDEX). But there's no way to verify what agents actually read after a swarm completes. An agent can claim an area and silently skip large parts of it. Post-hoc coverage analysis would close that gap β€” partition before, verify after, re-prompt for what was missed.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions