Snapshot date: 2026-03-18
Second-host update:
- a dedicated Debian GNU/Linux 13 VPS validation pass was captured on 2026-03-20
- see
docs/vps-validation-report.mdfor the current second-host evidence, operator-path results, and host-specific caveats
- Host: local Linux workstation
- Distribution: Debian GNU/Linux forky/sid
- Kernel:
6.19.6+deb14-amd64 - Interface under validation: CLI
- Local LLM baseline:
qwen2.5:7b - Local Ollama endpoint validated on this host:
http://127.0.0.1:11435/api
Validated successfully:
python3 -m ruff check .python3 -m mypy srcPYTHONPATH=src python3 -m unittest discover -s testsPYTHONPATH=src python3 -m pytest -qpython3 -m compileall srcPYTHONPATH=src python3 -m master_control --json doctor
Current automated suite size at this snapshot:
- 123 tests
Additional trust-boundary regressions now covered in the automated suite:
- slow-host diagnosis does not infer a service action from the hottest process alone
- top-process selection filters collector noise from the current MC process tree and transient
pshelper processes - service follow-ups preserve
scope=user|system - service restart recommendations require explicit service evidence
- stale service signals degrade to refresh-oriented recommendations instead of risky actions
- service and log follow-ups can reuse structured session context without relying on summary text alone
- diagnostic summaries can complete from fresh observations even when the compact summary is absent
- slow-host diagnosis can use
process_to_unitbeforeservice_statusand still conclude within one turn - slow-host diagnosis can prefer a nearby service-relevant process over generic interpreter noise before
process_to_unit - hot-process recommendations can move from typed process correlation into
service_statuswhen the correlated unit is a valid service target - hot-process recommendations do not repeat process-correlation actions once a no-match state is already known
- non-service
systemdscope correlations do not trigger aservice_statuslookup - failed-service listings can generate a direct
service_statusfollow-up recommendation - unhealthy services now generate a
read_journalfollow-up when matching logs are missing or stale - recent managed config backups can generate rollback recommendations and natural-language rollback planning
- recent managed config writes and restores now generate a
read_config_fileverification follow-up - operator-facing top-process rendering collapses repeated commands so the slow-host lead is less noisy
Validated successfully:
MC_PROVIDER=autoresolves toollamawhenMC_OLLAMA_BASE_URL=http://127.0.0.1:11435/apimc doctorreports the local endpoint as reachable andqwen2.5:7bas installed- conversational planning works through the real local Ollama endpoint
Real chat smokes completed:
mostre o uso de memoriao host esta lentoo host esta lentonow completes through memory, processes, process correlation, and service status when correlation evidence existso host esta lentono longer promotes the transientpscollector artifact as the hottest actionable process on this hosto host esta lentono longer escalates a non-servicesystemdscope correlation intoservice_status
Current trust note for the heuristic path:
o host esta lentocan now use a dedicated typed correlation step before a service lookup- service lookup still requires explicit service evidence, tracked service state, or typed process -> service-unit correlation
- correlations to non-service units such as
.scoperemain evidence, but are no longer treated as valid service targets
Validated successfully on this host:
service_statusagainstollama-local.servicewithscope=userreload_serviceagainst a temporarysystemd --uservalidation unit withCanReload=yesrestart_serviceagainst the same temporarysystemd --uservalidation unit
Observed behavior:
- reload preserved
MainPID - restart changed
MainPID - post-action state remained
active/running
Operational conclusion:
- typed service operations are validated for real
systemd --usertargets - the
scope=userpath is suitable for workstation-safe alpha validation without root
Validated successfully in this environment with a temporary root-scoped validation unit:
service_statusagainstmc-system-validation.servicereload_serviceagainst the same unitrestart_serviceagainst the same unit
Observed behavior:
- reload preserved
MainPID - restart changed
MainPID - post-action state remained
active/running
Operational conclusion:
- typed service operations are validated for real system-scoped targets
- the system validation path requires an elevation mechanism on the target host
Validated successfully on a real managed file:
- target path:
/home/irving/.local/state/master-control/managed-configs/alpha-validation.ini - read via
read_config_file - updated via
write_config_file --confirm - backup created under
<MC_STATE_DIR>/config-backups/ - restored via
restore_config_backup --confirm
Observed behavior:
- write path created a managed backup
- validation succeeded with
ini_parse - restore returned the file to the original content
Validated successfully on this host:
PYTHONPATH=src python3 -m master_control --json tool process_to_unit --arg name=python3PYTHONPATH=src python3 -m master_control --json tool failed_services --arg scope=system --arg limit=5
Observed behavior:
process_to_unitreturned a real user-scopedsystemdunit correlation forpython3failed_servicesreturned a real failed system-scoped unit on this host
Operational conclusion:
- the new read-only diagnostics are useful on a real host, not only in tests
- they expand operator evidence without widening the mutation boundary
Validated successfully:
python3 -m virtualenv <tmp>/venv<tmp>/venv/bin/pip install -e .MC_STATE_DIR=<tmp>/state MC_DB_PATH=<tmp>/state/mc.sqlite3 MC_PROVIDER=heuristic <tmp>/venv/bin/mc doctor
Observed behavior:
- editable install succeeded in the isolated environment
mc doctorbootstrapped a fresh state directory and reported the expected tool inventory
Note:
- on this host, stdlib
python3 -m venvwas unavailable becauseensurepip/python3-venvis not installed python3 -m virtualenvwas used as the clean-environment fallback for the validation baseline
What is validated strongly enough for the narrow local alpha:
- CLI bootstrap
- provider resolution
- local Ollama integration
- structured planning and execution
- structured session context for the core high-risk planner and recommendation flows
- read-only operator diagnostics for process correlation and failed-service listing
- persistent session/audit flow
- managed config workflow
- user-scoped service workflow
- service recommendation trust hardening for the current service/operator boundary
- recommendation evidence and approval guidance for the main operator journeys
- clean-environment install and bootstrap on the validated host profile
What remains outside this narrow local alpha baseline:
- broader production hardening
- daemon/API work and external interfaces
- utility expansion beyond the narrow MVP scope