Back to Home
jcp-tech icon

DevTools

by jcp-tech

Overview

An AI-powered debugging and system support agent that automates the analysis, investigation, and resolution of software issues in Django/MySQL systems.

Installation

Run Command
uvicorn UI.main:app --reload --host 127.0.0.1 --port 8501

Environment Variables

  • GOOGLE_GENAI_MODEL
  • BASE_PATH
  • TOOLSET_LINK
  • GOOGLE_CLIENT_ID
  • GOOGLE_CLIENT_SECRET
  • GITHUB_PERSONAL_ACCESS_TOKEN
  • MYSQL_HOST
  • MYSQL_PORT
  • MYSQL_DATABASE
  • MYSQL_USER
  • MYSQL_PASSWORD
  • DJANGO_SERVER_URL
  • SESSION_SECRET
  • FIREBASE_API_KEY
  • FRONTEND_URL
  • API_BASE_URL
  • APP_NAME
  • DISABLE_WEB_DRIVER
  • GOOGLE_CLOUD_PROJECT
  • GOOGLE_CLOUD_LOCATION

Security Notes

CRITICAL: The `DevTools/fileEditor.py` tool grants read/write/delete access to files within the repository root. While `_is_safe_path` attempts to restrict this, autonomous file manipulation by an AI agent is a significant security risk, potentially leading to critical data loss, corruption, or arbitrary code execution if exploited or misused. CRITICAL: The `SESSION_SECRET` in `UI/main.py` has a default value of 'CHANGE_ME_LONG_RANDOM'. This must be replaced with a strong, randomly generated secret in production to prevent session hijacking. The `selenium_tools.py` can navigate to arbitrary URLs and capture screenshots, which could expose sensitive data or trigger unwanted actions if untrusted inputs are processed. Reliance on external MCP (Multi-Container Platform) servers (GitHub, GenAI Toolbox) introduces dependencies on their security and configuration. The `videoAnalyzer.py` downloads videos, and the safety of `_download_video_internal` is not detailed, posing a potential risk for arbitrary file downloads.

Similar Servers

Stats

Interest Score30
Security Score3
Cost ClassMedium
Avg Tokens1000
Stars1
Forks0
Last Update2025-11-25

Tags

AI debuggingAgentic workflowDeveloper toolsDjangoMySQLADK