Skip to content

Conversation

@ndebard
Copy link
Collaborator

@ndebard ndebard commented Feb 4, 2026

Not ready yet, just wanted a place to keep this for now. Adding some debug/printing so I can see what tools and MCP services agents have access to.

Looks like this when used:

These are the tools the ExecutionAgent sees:
['edit_code', 'read_file', 'run_arxiv_search', 'run_command', 'run_osti_search', 'run_web_search', 'write_code']

And like this:
image

@ndebard
Copy link
Collaborator Author

ndebard commented Feb 5, 2026

@awadell1 suggested this might be very valuable to others. I'm wondering if I shouldn't sit on it and move it to ready for review. Any thoughts? It's not much code, just 1 file addition.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant