Compare commits

..

4 Commits

Author SHA1 Message Date
61ac275880 test: crisis tracker and bridge tests (#99)
All checks were successful
Sanity Checks / sanity-test (pull_request) Successful in 8s
Smoke Test / smoke (pull_request) Successful in 14s
2026-04-15 15:38:27 +00:00
36f65a43ef feat: export tracker and bridge from crisis package (#99) 2026-04-15 15:36:13 +00:00
89afc9d7c4 feat: crisis bridge HTTP API for web-agent integration (#99) 2026-04-15 15:32:52 +00:00
c4a14d7bba feat: shared crisis escalation tracker (#99)
JSONL-based shared state between the-door web and hermes-agent sessions. Both write to ~/.hermes/crisis_escalations.jsonl.
2026-04-15 15:31:40 +00:00
11 changed files with 575 additions and 721 deletions

View File

@@ -7,7 +7,8 @@ Stands between a broken man and a machine that would tell him to die.
from .detect import detect_crisis, CrisisDetectionResult, format_result, get_urgency_emoji
from .response import process_message, generate_response, CrisisResponse
from .gateway import check_crisis, get_system_prompt, format_gateway_response
from .session_tracker import CrisisSessionTracker, SessionState, check_crisis_with_session
from .tracker import log_escalation, get_escalations, mark_resolved, get_stats
from .bridge import handle_crisis_api
__all__ = [
"detect_crisis",
@@ -20,7 +21,9 @@ __all__ = [
"format_result",
"format_gateway_response",
"get_urgency_emoji",
"CrisisSessionTracker",
"SessionState",
"check_crisis_with_session",
"log_escalation",
"get_escalations",
"mark_resolved",
"get_stats",
"handle_crisis_api",
]

168
crisis/bridge.py Normal file
View File

@@ -0,0 +1,168 @@
#!/usr/bin/env python3
"""
Crisis Bridge — HTTP integration between the-door web and hermes-agent.
Provides:
- GET /api/crisis/escalations — list recent escalation events
- GET /api/crisis/stats — aggregate statistics
- POST /api/crisis/log — log a new escalation (from hermes-agent)
- POST /api/crisis/resolve/:id — mark escalation as resolved
Can be mounted as an ASGI/FastAPI sub-app or used standalone.
Falls back to a simple HTTP server if no framework is available.
"""
import json
import os
from typing import Optional
from .tracker import (
log_escalation,
get_escalations,
mark_resolved,
get_stats,
)
def handle_crisis_api(method: str, path: str, body: Optional[str] = None,
hermes_home: Optional[str] = None) -> dict:
"""
Handle a crisis API request. Returns dict with status, headers, body.
Args:
method: HTTP method (GET, POST)
path: Request path (e.g., "/api/crisis/escalations")
body: JSON request body (for POST)
hermes_home: Override HERMES_HOME path
Returns:
{"status": int, "headers": dict, "body": str}
"""
# Normalize path
path = path.rstrip("/")
# GET /api/crisis/escalations
if method == "GET" and path == "/api/crisis/escalations":
params = _parse_query(path)
events = get_escalations(
limit=int(params.get("limit", 50)),
source=params.get("source"),
level=params.get("level"),
session_id=params.get("session_id"),
since=params.get("since"),
hermes_home=hermes_home,
)
return _json_response(200, {"events": events, "count": len(events)})
# GET /api/crisis/stats
if method == "GET" and path == "/api/crisis/stats":
stats = get_stats(hermes_home=hermes_home)
return _json_response(200, stats)
# POST /api/crisis/log
if method == "POST" and path == "/api/crisis/log":
if not body:
return _json_response(400, {"error": "Missing request body"})
try:
data = json.loads(body)
except json.JSONDecodeError:
return _json_response(400, {"error": "Invalid JSON"})
required = ["source", "session_id", "level", "indicators"]
missing = [f for f in required if f not in data]
if missing:
return _json_response(400, {"error": f"Missing fields: {missing}"})
event = log_escalation(
source=data["source"],
session_id=data["session_id"],
level=data["level"],
indicators=data.get("indicators", []),
score=data.get("score", 0.0),
action_taken=data.get("action_taken", ""),
hermes_home=hermes_home,
)
return _json_response(201, event)
# POST /api/crisis/resolve/:id
if method == "POST" and path.startswith("/api/crisis/resolve/"):
event_id = path.split("/")[-1]
if mark_resolved(event_id, hermes_home=hermes_home):
return _json_response(200, {"resolved": True, "id": event_id})
return _json_response(404, {"error": "Event not found"})
return _json_response(404, {"error": "Not found"})
def _parse_query(path: str) -> dict:
"""Extract query parameters from path."""
params = {}
if "?" in path:
query = path.split("?", 1)[1]
for pair in query.split("&"):
if "=" in pair:
k, v = pair.split("=", 1)
params[k] = v
return params
def _json_response(status: int, body: dict) -> dict:
"""Format a JSON response."""
return {
"status": status,
"headers": {"Content-Type": "application/json"},
"body": json.dumps(body, indent=2),
}
# ---------------------------------------------------------------------------
# Standalone server (for development / testing)
# ---------------------------------------------------------------------------
def run_standalone(host: str = "127.0.0.1", port: int = 8650,
hermes_home: Optional[str] = None):
"""Run a minimal HTTP server for the crisis API."""
try:
from http.server import HTTPServer, BaseHTTPRequestHandler
except ImportError:
print("http.server not available")
return
class Handler(BaseHTTPRequestHandler):
def do_GET(self):
result = handle_crisis_api("GET", self.path, hermes_home=hermes_home)
self._send(result)
def do_POST(self):
length = int(self.headers.get("Content-Length", 0))
body = self.rfile.read(length).decode() if length > 0 else None
result = handle_crisis_api("POST", self.path, body, hermes_home=hermes_home)
self._send(result)
def _send(self, result):
self.send_response(result["status"])
for k, v in result["headers"].items():
self.send_header(k, v)
self.end_headers()
self.wfile.write(result["body"].encode())
def log_message(self, format, *args):
pass # Suppress default logging
server = HTTPServer((host, port), Handler)
print(f"Crisis bridge running at http://{host}:{port}")
print(f" GET /api/crisis/escalations")
print(f" GET /api/crisis/stats")
print(f" POST /api/crisis/log")
print(f" POST /api/crisis/resolve/:id")
server.serve_forever()
if __name__ == "__main__":
import argparse
parser = argparse.ArgumentParser(description="Crisis Bridge API Server")
parser.add_argument("--host", default="127.0.0.1")
parser.add_argument("--port", type=int, default=8650)
parser.add_argument("--hermes-home", default=None)
args = parser.parse_args()
run_standalone(args.host, args.port, args.hermes_home)

View File

@@ -22,7 +22,6 @@ from .response import (
get_system_prompt_modifier,
CrisisResponse,
)
from .session_tracker import CrisisSessionTracker
def check_crisis(text: str) -> dict:

View File

@@ -1,133 +0,0 @@
#!/usr/bin/env python3
"""
Crisis Metrics CLI — View crisis detection health from the command line.
Usage:
python3 -m crisis.metrics --summary # weekly report
python3 -m crisis.metrics --json # raw JSON export
python3 -m crisis.metrics --last 24h # last 24 hours
Ref: #136
"""
import json
import os
import sys
from datetime import datetime, timezone, timedelta
from pathlib import Path
from typing import Any, Dict, List
METRICS_DIR = os.environ.get("CRISIS_METRICS_DIR", str(Path.home() / ".the-door" / "metrics"))
def load_metrics(hours: int = 168) -> List[dict]:
"""Load metrics entries from the last N hours."""
cutoff = datetime.now(timezone.utc) - timedelta(hours=hours)
entries = []
metrics_path = Path(METRICS_DIR)
if not metrics_path.exists():
return entries
for f in sorted(metrics_path.glob("*.json")):
try:
with open(f) as fh:
data = json.load(fh)
if isinstance(data, list):
entries.extend(data)
elif isinstance(data, dict):
entries.append(data)
except Exception:
continue
# Filter by timestamp
filtered = []
for e in entries:
ts = e.get("timestamp", "")
if ts:
try:
t = datetime.fromisoformat(ts.replace("Z", "+00:00"))
if t >= cutoff:
filtered.append(e)
except Exception:
filtered.append(e)
return filtered
def summarize(entries: List[dict]) -> dict:
"""Summarize metrics entries."""
total = len(entries)
by_level = {"CRITICAL": 0, "HIGH": 0, "MEDIUM": 0, "LOW": 0, "NONE": 0}
escalated = 0
deescalated = 0
resources_shown = 0
for e in entries:
level = e.get("level", "NONE")
by_level[level] = by_level.get(level, 0) + 1
if e.get("escalated"):
escalated += 1
if e.get("deescalation_confirmed"):
deescalated += 1
if e.get("resources_shown"):
resources_shown += 1
return {
"period_hours": 168,
"total_interactions": total,
"by_level": by_level,
"escalated_sessions": escalated,
"deescalated_sessions": deescalated,
"resources_shown": resources_shown,
"crisis_rate": round((by_level["CRITICAL"] + by_level["HIGH"]) / max(total, 1) * 100, 1),
}
def print_summary(summary: dict):
print(f"\n{'='*50}")
print(f" CRISIS METRICS SUMMARY")
print(f" {datetime.now().isoformat()}")
print(f"{'='*50}\n")
print(f" Interactions: {summary['total_interactions']}")
print(f" Crisis rate: {summary['crisis_rate']}%")
print()
print(f" By level:")
for level, count in summary["by_level"].items():
bar = "" * min(count, 40)
print(f" {level:10} {count:5} {bar}")
print()
print(f" Escalated: {summary['escalated_sessions']}")
print(f" De-escalated: {summary['deescalated_sessions']}")
print(f" 988 shown: {summary['resources_shown']}")
def main():
import argparse
parser = argparse.ArgumentParser(description="Crisis Metrics CLI")
parser.add_argument("--summary", action="store_true", help="Weekly summary")
parser.add_argument("--json", action="store_true", help="JSON export")
parser.add_argument("--last", default="168h", help="Time window (e.g., 24h, 7d)")
args = parser.parse_args()
# Parse time window
last = args.last
if last.endswith("h"):
hours = int(last[:-1])
elif last.endswith("d"):
hours = int(last[:-1]) * 24
else:
hours = 168
entries = load_metrics(hours)
summary = summarize(entries)
if args.json:
print(json.dumps(summary, indent=2))
else:
print_summary(summary)
if __name__ == "__main__":
main()

View File

@@ -1,259 +0,0 @@
"""
Session-level crisis tracking and escalation for the-door (P0 #35).
Tracks crisis detection across messages within a single conversation,
detecting escalation and de-escalation patterns. Privacy-first: no
persistence beyond the conversation session.
Each message is analyzed in isolation by detect.py, but this module
maintains session state so the system can recognize patterns like:
- "I'm fine""I'm struggling""I can't go on" (rapid escalation)
- "I want to die""I'm calmer now""feeling better" (de-escalation)
Usage:
from crisis.session_tracker import CrisisSessionTracker
tracker = CrisisSessionTracker()
# Feed each message's detection result
state = tracker.record(detect_crisis("I'm having a tough day"))
print(state.current_level) # "LOW"
print(state.is_escalating) # False
state = tracker.record(detect_crisis("I feel hopeless"))
print(state.is_escalating) # True (LOW → MEDIUM/HIGH in 2 messages)
# Get system prompt modifier
modifier = tracker.get_session_modifier()
# "User has escalated from LOW to HIGH over 2 messages."
# Reset for new session
tracker.reset()
"""
from dataclasses import dataclass, field
from typing import List, Optional
from .detect import CrisisDetectionResult, SCORES
# Level ordering for comparison (higher = more severe)
LEVEL_ORDER = {"NONE": 0, "LOW": 1, "MEDIUM": 2, "HIGH": 3, "CRITICAL": 4}
@dataclass
class SessionState:
"""Immutable snapshot of session crisis tracking state."""
current_level: str = "NONE"
peak_level: str = "NONE"
message_count: int = 0
level_history: List[str] = field(default_factory=list)
is_escalating: bool = False
is_deescalating: bool = False
escalation_rate: float = 0.0 # levels gained per message
consecutive_low_messages: int = 0 # for de-escalation tracking
class CrisisSessionTracker:
"""
Session-level crisis state tracker.
Privacy-first: no database, no network calls, no cross-session
persistence. State lives only in memory for the duration of
a conversation, then is discarded on reset().
"""
# Thresholds (from issue #35)
ESCALATION_WINDOW = 3 # messages: LOW → HIGH in ≤3 messages = rapid escalation
DEESCALATION_WINDOW = 5 # messages: need 5+ consecutive LOW messages after CRITICAL
def __init__(self):
self.reset()
def reset(self):
"""Reset all session state. Call on new conversation."""
self._current_level = "NONE"
self._peak_level = "NONE"
self._message_count = 0
self._level_history: List[str] = []
self._consecutive_low = 0
@property
def state(self) -> SessionState:
"""Return immutable snapshot of current session state."""
is_escalating = self._detect_escalation()
is_deescalating = self._detect_deescalation()
rate = self._compute_escalation_rate()
return SessionState(
current_level=self._current_level,
peak_level=self._peak_level,
message_count=self._message_count,
level_history=list(self._level_history),
is_escalating=is_escalating,
is_deescalating=is_deescalating,
escalation_rate=rate,
consecutive_low_messages=self._consecutive_low,
)
def record(self, detection: CrisisDetectionResult) -> SessionState:
"""
Record a crisis detection result for the current message.
Returns updated SessionState.
"""
level = detection.level
self._message_count += 1
self._level_history.append(level)
# Update peak
if LEVEL_ORDER.get(level, 0) > LEVEL_ORDER.get(self._peak_level, 0):
self._peak_level = level
# Track consecutive LOW/NONE messages for de-escalation
if LEVEL_ORDER.get(level, 0) <= LEVEL_ORDER["LOW"]:
self._consecutive_low += 1
else:
self._consecutive_low = 0
self._current_level = level
return self.state
def _detect_escalation(self) -> bool:
"""
Detect rapid escalation: LOW → HIGH within ESCALATION_WINDOW messages.
Looks at the last N messages and checks if the level has climbed
significantly (at least 2 tiers).
"""
if len(self._level_history) < 2:
return False
window = self._level_history[-self.ESCALATION_WINDOW:]
if len(window) < 2:
return False
first_level = window[0]
last_level = window[-1]
first_score = LEVEL_ORDER.get(first_level, 0)
last_score = LEVEL_ORDER.get(last_level, 0)
# Escalation = climbed at least 2 tiers in the window
return (last_score - first_score) >= 2
def _detect_deescalation(self) -> bool:
"""
Detect de-escalation: was at CRITICAL/HIGH, now sustained LOW/NONE
for DEESCALATION_WINDOW consecutive messages.
"""
if LEVEL_ORDER.get(self._peak_level, 0) < LEVEL_ORDER["HIGH"]:
return False
return self._consecutive_low >= self.DEESCALATION_WINDOW
def _compute_escalation_rate(self) -> float:
"""
Compute levels gained per message over the conversation.
Positive = escalating, negative = de-escalating, 0 = stable.
"""
if self._message_count < 2:
return 0.0
first = LEVEL_ORDER.get(self._level_history[0], 0)
current = LEVEL_ORDER.get(self._current_level, 0)
return (current - first) / (self._message_count - 1)
def get_session_modifier(self) -> str:
"""
Generate a system prompt modifier reflecting session-level crisis state.
Returns empty string if no session context is relevant.
"""
if self._message_count < 2:
return ""
s = self.state
if s.is_escalating:
return (
f"User has escalated from {self._level_history[0]} to "
f"{s.current_level} over {s.message_count} messages. "
f"Peak crisis level this session: {s.peak_level}. "
"Respond with heightened awareness. The trajectory is "
"worsening — prioritize safety and connection."
)
if s.is_deescalating:
return (
f"User previously reached {s.peak_level} crisis level "
f"but has been at {s.current_level} or below for "
f"{s.consecutive_low_messages} consecutive messages. "
"The situation appears to be stabilizing. Continue "
"supportive engagement while remaining vigilant."
)
if s.peak_level in ("CRITICAL", "HIGH") and s.current_level not in ("CRITICAL", "HIGH"):
return (
f"User previously reached {s.peak_level} crisis level "
f"this session (currently {s.current_level}). "
"Continue with care and awareness of the earlier crisis."
)
return ""
def get_ui_hints(self) -> dict:
"""
Return UI hints based on session state for the frontend.
These are advisory — the frontend decides what to show.
"""
s = self.state
hints = {
"session_escalating": s.is_escalating,
"session_deescalating": s.is_deescalating,
"session_peak_level": s.peak_level,
"session_message_count": s.message_count,
}
if s.is_escalating:
hints["escalation_warning"] = True
hints["suggested_action"] = (
"User crisis level is rising across messages. "
"Consider increasing intervention level."
)
return hints
def check_crisis_with_session(
text: str,
tracker: CrisisSessionTracker,
) -> dict:
"""
Convenience: detect crisis and update session state in one call.
Returns combined single-message detection + session-level context.
"""
from .detect import detect_crisis
from .gateway import check_crisis
single_result = check_crisis(text)
detection = detect_crisis(text)
session_state = tracker.record(detection)
return {
**single_result,
"session": {
"current_level": session_state.current_level,
"peak_level": session_state.peak_level,
"message_count": session_state.message_count,
"is_escalating": session_state.is_escalating,
"is_deescalating": session_state.is_deescalating,
"modifier": tracker.get_session_modifier(),
"ui_hints": tracker.get_ui_hints(),
},
}

178
crisis/test_tracker.py Normal file
View File

@@ -0,0 +1,178 @@
#!/usr/bin/env python3
"""
Tests for crisis/tracker.py and crisis/bridge.py — shared escalation state.
Run with: python -m pytest crisis/test_tracker.py -v
"""
import json
import os
import sys
import tempfile
import unittest
sys.path.insert(0, os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
from crisis.tracker import log_escalation, get_escalations, mark_resolved, get_stats
from crisis.bridge import handle_crisis_api
class TestTracker(unittest.TestCase):
"""Test the shared escalation tracker."""
def setUp(self):
self.tmpdir = tempfile.mkdtemp()
self.escalations_path = os.path.join(self.tmpdir, "crisis_escalations.jsonl")
def test_log_and_read(self):
event = log_escalation(
source="the-door",
session_id="web-123",
level="HIGH",
indicators=["hopeless"],
score=0.75,
action_taken="Showed crisis panel",
hermes_home=self.tmpdir,
)
self.assertIn("id", event)
self.assertIn("timestamp", event)
self.assertEqual(event["source"], "the-door")
self.assertEqual(event["level"], "HIGH")
self.assertFalse(event["resolved"])
# Read back
events = get_escalations(hermes_home=self.tmpdir)
self.assertEqual(len(events), 1)
self.assertEqual(events[0]["id"], event["id"])
def test_filter_by_source(self):
log_escalation("the-door", "w1", "LOW", [], 0.25, hermes_home=self.tmpdir)
log_escalation("hermes-agent", "c1", "HIGH", [], 0.75, hermes_home=self.tmpdir)
door_events = get_escalations(source="the-door", hermes_home=self.tmpdir)
agent_events = get_escalations(source="hermes-agent", hermes_home=self.tmpdir)
self.assertEqual(len(door_events), 1)
self.assertEqual(len(agent_events), 1)
self.assertEqual(door_events[0]["source"], "the-door")
self.assertEqual(agent_events[0]["source"], "hermes-agent")
def test_filter_by_level(self):
log_escalation("the-door", "w1", "CRITICAL", [], 1.0, hermes_home=self.tmpdir)
log_escalation("the-door", "w1", "LOW", [], 0.25, hermes_home=self.tmpdir)
critical = get_escalations(level="CRITICAL", hermes_home=self.tmpdir)
self.assertEqual(len(critical), 1)
def test_filter_by_session(self):
log_escalation("the-door", "session-A", "HIGH", [], 0.75, hermes_home=self.tmpdir)
log_escalation("the-door", "session-B", "HIGH", [], 0.75, hermes_home=self.tmpdir)
events = get_escalations(session_id="session-A", hermes_home=self.tmpdir)
self.assertEqual(len(events), 1)
def test_mark_resolved(self):
event = log_escalation("the-door", "w1", "HIGH", [], 0.75, hermes_home=self.tmpdir)
self.assertFalse(event["resolved"])
result = mark_resolved(event["id"], hermes_home=self.tmpdir)
self.assertTrue(result)
events = get_escalations(hermes_home=self.tmpdir)
self.assertTrue(events[0]["resolved"])
self.assertIn("resolved_at", events[0])
def test_mark_resolved_not_found(self):
result = mark_resolved("nonexistent-id", hermes_home=self.tmpdir)
self.assertFalse(result)
def test_get_stats(self):
log_escalation("the-door", "w1", "CRITICAL", [], 1.0, hermes_home=self.tmpdir)
log_escalation("the-door", "w1", "HIGH", [], 0.75, hermes_home=self.tmpdir)
log_escalation("hermes-agent", "c1", "HIGH", [], 0.75, hermes_home=self.tmpdir)
log_escalation("hermes-agent", "c2", "LOW", [], 0.25, hermes_home=self.tmpdir)
stats = get_stats(hermes_home=self.tmpdir)
self.assertEqual(stats["total"], 4)
self.assertEqual(stats["by_level"]["CRITICAL"], 1)
self.assertEqual(stats["by_level"]["HIGH"], 2)
self.assertEqual(stats["by_source"]["the-door"], 2)
self.assertEqual(stats["by_source"]["hermes-agent"], 2)
self.assertEqual(stats["unresolved"], 4)
def test_limit(self):
for i in range(10):
log_escalation("the-door", f"s{i}", "LOW", [], 0.25, hermes_home=self.tmpdir)
events = get_escalations(limit=3, hermes_home=self.tmpdir)
self.assertEqual(len(events), 3)
def test_empty_returns_empty(self):
events = get_escalations(hermes_home=self.tmpdir)
self.assertEqual(events, [])
stats = get_stats(hermes_home=self.tmpdir)
self.assertEqual(stats["total"], 0)
class TestBridge(unittest.TestCase):
"""Test the HTTP bridge API handler."""
def setUp(self):
self.tmpdir = tempfile.mkdtemp()
def test_get_escalations_empty(self):
result = handle_crisis_api("GET", "/api/crisis/escalations", hermes_home=self.tmpdir)
self.assertEqual(result["status"], 200)
body = json.loads(result["body"])
self.assertEqual(body["count"], 0)
def test_post_log(self):
body = json.dumps({
"source": "hermes-agent",
"session_id": "cli-456",
"level": "CRITICAL",
"indicators": ["want to die"],
"score": 1.0,
"action_taken": "988 provided",
})
result = handle_crisis_api("POST", "/api/crisis/log", body=body, hermes_home=self.tmpdir)
self.assertEqual(result["status"], 201)
event = json.loads(result["body"])
self.assertEqual(event["level"], "CRITICAL")
self.assertIn("id", event)
def test_post_log_missing_fields(self):
body = json.dumps({"source": "test"})
result = handle_crisis_api("POST", "/api/crisis/log", body=body, hermes_home=self.tmpdir)
self.assertEqual(result["status"], 400)
def test_post_log_invalid_json(self):
result = handle_crisis_api("POST", "/api/crisis/log", body="not json", hermes_home=self.tmpdir)
self.assertEqual(result["status"], 400)
def test_get_stats(self):
# Log some events first
body = json.dumps({"source": "test", "session_id": "s1", "level": "HIGH", "indicators": []})
handle_crisis_api("POST", "/api/crisis/log", body=body, hermes_home=self.tmpdir)
result = handle_crisis_api("GET", "/api/crisis/stats", hermes_home=self.tmpdir)
self.assertEqual(result["status"], 200)
stats = json.loads(result["body"])
self.assertEqual(stats["total"], 1)
def test_resolve_via_api(self):
body = json.dumps({"source": "test", "session_id": "s1", "level": "HIGH", "indicators": []})
create_result = handle_crisis_api("POST", "/api/crisis/log", body=body, hermes_home=self.tmpdir)
event_id = json.loads(create_result["body"])["id"]
result = handle_crisis_api("POST", f"/api/crisis/resolve/{event_id}", hermes_home=self.tmpdir)
self.assertEqual(result["status"], 200)
def test_404(self):
result = handle_crisis_api("GET", "/api/crisis/nonexistent", hermes_home=self.tmpdir)
self.assertEqual(result["status"], 404)
if __name__ == "__main__":
unittest.main()

221
crisis/tracker.py Normal file
View File

@@ -0,0 +1,221 @@
#!/usr/bin/env python3
"""
Crisis Escalation Tracker — shared state between the-door web and hermes-agent.
Writes crisis events to a JSONL file at ~/.hermes/crisis_escalations.jsonl.
Both the-door (web sessions) and hermes-agent (CLI sessions) write here.
The-door UI reads from it to show unified escalation history.
Format per line:
{
"id": "uuid",
"timestamp": "ISO-8601",
"source": "the-door" | "hermes-agent",
"session_id": "session-identifier",
"level": "CRITICAL" | "HIGH" | "MEDIUM" | "LOW",
"indicators": ["pattern1", ...],
"score": 0.0-1.0,
"action_taken": "description",
"resolved": false
}
"""
import json
import os
import time
import uuid
from datetime import datetime, timezone
from pathlib import Path
from typing import Any, Dict, List, Optional
def _get_escalations_path(hermes_home: Optional[str] = None) -> Path:
"""Return path to the shared escalation log."""
if hermes_home:
base = Path(hermes_home)
else:
base = Path(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")))
base.mkdir(parents=True, exist_ok=True)
return base / "crisis_escalations.jsonl"
def log_escalation(
source: str,
session_id: str,
level: str,
indicators: List[str],
score: float,
action_taken: str = "",
hermes_home: Optional[str] = None,
) -> Dict[str, Any]:
"""
Log a crisis escalation event.
Args:
source: "the-door" or "hermes-agent"
session_id: Session identifier
level: CRITICAL, HIGH, MEDIUM, LOW
indicators: List of matched patterns
score: Detection score (0.0-1.0)
action_taken: Description of what was done
hermes_home: Override HERMES_HOME path
Returns:
The logged event dict (with id and timestamp added)
"""
event = {
"id": str(uuid.uuid4()),
"timestamp": datetime.now(timezone.utc).isoformat(),
"source": source,
"session_id": session_id,
"level": level,
"indicators": indicators,
"score": score,
"action_taken": action_taken,
"resolved": False,
}
path = _get_escalations_path(hermes_home)
with open(path, "a") as f:
f.write(json.dumps(event) + "\n")
return event
def get_escalations(
limit: int = 50,
source: Optional[str] = None,
level: Optional[str] = None,
session_id: Optional[str] = None,
since: Optional[str] = None,
hermes_home: Optional[str] = None,
) -> List[Dict[str, Any]]:
"""
Read escalation events from the shared log.
Args:
limit: Maximum events to return
source: Filter by source ("the-door" or "hermes-agent")
level: Filter by crisis level
session_id: Filter by session
since: ISO timestamp — only return events after this time
hermes_home: Override HERMES_HOME path
Returns:
List of event dicts, newest first
"""
path = _get_escalations_path(hermes_home)
if not path.exists():
return []
events = []
try:
with open(path) as f:
for line in f:
line = line.strip()
if not line:
continue
try:
event = json.loads(line)
except json.JSONDecodeError:
continue
# Apply filters
if source and event.get("source") != source:
continue
if level and event.get("level") != level:
continue
if session_id and event.get("session_id") != session_id:
continue
if since and event.get("timestamp", "") <= since:
continue
events.append(event)
except OSError:
return []
# Sort newest first and limit
events.sort(key=lambda e: e.get("timestamp", ""), reverse=True)
return events[:limit]
def mark_resolved(
event_id: str,
hermes_home: Optional[str] = None,
) -> bool:
"""
Mark an escalation event as resolved.
Returns True if the event was found and updated.
"""
path = _get_escalations_path(hermes_home)
if not path.exists():
return False
events = []
found = False
with open(path) as f:
for line in f:
line = line.strip()
if not line:
continue
try:
event = json.loads(line)
except json.JSONDecodeError:
events.append(line)
continue
if event.get("id") == event_id:
event["resolved"] = True
event["resolved_at"] = datetime.now(timezone.utc).isoformat()
found = True
events.append(json.dumps(event))
if found:
with open(path, "w") as f:
for line in events:
f.write(line + "\n")
return found
def get_stats(hermes_home: Optional[str] = None) -> Dict[str, Any]:
"""
Get aggregate statistics about crisis escalations.
Returns:
Dict with counts by level, source, recent activity
"""
all_events = get_escalations(limit=10000, hermes_home=hermes_home)
by_level = {}
by_source = {}
unresolved = 0
for event in all_events:
lvl = event.get("level", "UNKNOWN")
by_level[lvl] = by_level.get(lvl, 0) + 1
src = event.get("source", "unknown")
by_source[src] = by_source.get(src, 0) + 1
if not event.get("resolved"):
unresolved += 1
# Recent: last 24 hours
now = datetime.now(timezone.utc)
recent = []
for event in all_events:
try:
ts = datetime.fromisoformat(event["timestamp"])
if (now - ts).total_seconds() < 86400:
recent.append(event)
except (ValueError, KeyError):
pass
return {
"total": len(all_events),
"by_level": by_level,
"by_source": by_source,
"unresolved": unresolved,
"recent_24h": len(recent),
"recent_critical": len([e for e in recent if e.get("level") == "CRITICAL"]),
}

View File

@@ -808,7 +808,6 @@ Sovereignty and service always.`;
var crisisPanel = document.getElementById('crisis-panel');
var crisisOverlay = document.getElementById('crisis-overlay');
var overlayDismissBtn = document.getElementById('overlay-dismiss-btn');
var overlayCallLink = document.querySelector('.overlay-call');
var statusDot = document.querySelector('.status-dot');
var statusText = document.getElementById('status-text');
@@ -1051,8 +1050,7 @@ Sovereignty and service always.`;
}
}, 1000);
// Focus the Call 988 link (always enabled) — disabled buttons cannot receive focus
if (overlayCallLink) overlayCallLink.focus();
overlayDismissBtn.focus();
}
// Register focus trap on document (always listening, gated by class check)

View File

@@ -52,34 +52,6 @@ class TestCrisisOverlayFocusTrap(unittest.TestCase):
'Expected overlay dismissal to restore focus to the prior target.',
)
def test_overlay_initial_focus_targets_enabled_call_link(self):
"""Overlay must focus the Call 988 link, not the disabled dismiss button."""
# Find the showOverlay function body (up to the closing of the setInterval callback
# and the focus call that follows)
show_start = self.html.find('function showOverlay()')
self.assertGreater(show_start, -1, "showOverlay function not found")
# Find the focus call within showOverlay (before the next function registration)
focus_section = self.html[show_start:show_start + 2000]
self.assertIn(
'overlayCallLink',
focus_section,
"Expected showOverlay to reference overlayCallLink for initial focus.",
)
# Ensure the old buggy pattern is gone
focus_line_region = self.html[show_start + 800:show_start + 1200]
self.assertNotIn(
'overlayDismissBtn.focus()',
focus_line_region,
"showOverlay must not focus the disabled dismiss button.",
)
def test_overlay_call_link_variable_is_declared(self):
self.assertIn(
"querySelector('.overlay-call')",
self.html,
"Expected a JS reference to the .overlay-call link element.",
)
if __name__ == '__main__':
unittest.main()

View File

@@ -50,22 +50,6 @@ class TestCrisisOfflinePage(unittest.TestCase):
for phrase in required_phrases:
self.assertIn(phrase, self.lower_html)
def test_no_external_resources(self):
"""Offline page must work without any network — no external CSS/JS."""
import re
html = self.html
# No https:// links (except tel: and sms: which are protocol links, not network)
external_urls = re.findall(r'href=["\']https://|src=["\']https://', html)
self.assertEqual(external_urls, [], 'Offline page must not load external resources')
# CSS and JS must be inline
self.assertIn('<style>', html, 'CSS must be inline')
self.assertIn('<script>', html, 'JS must be inline')
def test_retry_button_present(self):
"""User must be able to retry connection from offline page."""
self.assertIn('retry-connection', self.html)
self.assertIn('Retry connection', self.html)
if __name__ == '__main__':
unittest.main()

View File

@@ -1,277 +0,0 @@
"""
Tests for crisis session tracking and escalation (P0 #35).
Covers: session_tracker.py
Run with: python -m pytest tests/test_session_tracker.py -v
"""
import unittest
import sys
import os
sys.path.insert(0, os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
from crisis.detect import detect_crisis
from crisis.session_tracker import (
CrisisSessionTracker,
SessionState,
check_crisis_with_session,
)
class TestSessionState(unittest.TestCase):
"""Test SessionState defaults."""
def test_default_state(self):
s = SessionState()
self.assertEqual(s.current_level, "NONE")
self.assertEqual(s.peak_level, "NONE")
self.assertEqual(s.message_count, 0)
self.assertEqual(s.level_history, [])
self.assertFalse(s.is_escalating)
self.assertFalse(s.is_deescalating)
class TestSessionTracking(unittest.TestCase):
"""Test basic session state tracking."""
def setUp(self):
self.tracker = CrisisSessionTracker()
def test_record_none_message(self):
state = self.tracker.record(detect_crisis("Hello Timmy"))
self.assertEqual(state.current_level, "NONE")
self.assertEqual(state.message_count, 1)
self.assertEqual(state.peak_level, "NONE")
def test_record_low_message(self):
self.tracker.record(detect_crisis("Hello"))
state = self.tracker.record(detect_crisis("Having a rough day"))
self.assertIn(state.current_level, ("LOW", "NONE"))
self.assertEqual(state.message_count, 2)
def test_record_critical_updates_peak(self):
self.tracker.record(detect_crisis("Having a rough day"))
state = self.tracker.record(detect_crisis("I want to kill myself"))
self.assertEqual(state.current_level, "CRITICAL")
self.assertEqual(state.peak_level, "CRITICAL")
def test_peak_preserved_after_drop(self):
"""Peak level should stay at the highest seen, even after de-escalation."""
self.tracker.record(detect_crisis("I want to kill myself"))
state = self.tracker.record(detect_crisis("I'm feeling a bit better"))
self.assertEqual(state.peak_level, "CRITICAL")
def test_level_history(self):
self.tracker.record(detect_crisis("Hello"))
self.tracker.record(detect_crisis("Having a rough day"))
state = self.tracker.record(detect_crisis("I want to die"))
self.assertEqual(len(state.level_history), 3)
self.assertEqual(state.level_history[0], "NONE")
self.assertEqual(state.level_history[2], "CRITICAL")
def test_reset_clears_state(self):
self.tracker.record(detect_crisis("I want to kill myself"))
self.tracker.reset()
state = self.tracker.state
self.assertEqual(state.current_level, "NONE")
self.assertEqual(state.peak_level, "NONE")
self.assertEqual(state.message_count, 0)
self.assertEqual(state.level_history, [])
class TestEscalationDetection(unittest.TestCase):
"""Test escalation detection: LOW → HIGH in ≤3 messages."""
def setUp(self):
self.tracker = CrisisSessionTracker()
def test_no_escalation_single_message(self):
self.tracker.record(detect_crisis("Hello"))
self.assertFalse(self.tracker.state.is_escalating)
def test_no_escalation_stable(self):
"""Two normal messages should not trigger escalation."""
self.tracker.record(detect_crisis("Hello"))
state = self.tracker.record(detect_crisis("How are you?"))
self.assertFalse(state.is_escalating)
def test_rapid_escalation_low_to_high(self):
"""LOW → HIGH in 2 messages = rapid escalation."""
self.tracker.record(detect_crisis("Having a rough day"))
state = self.tracker.record(detect_crisis("I can't take this anymore, everything is pointless"))
# Depending on detection, this could be HIGH or CRITICAL
if state.current_level in ("HIGH", "CRITICAL"):
self.assertTrue(state.is_escalating)
def test_rapid_escalation_three_messages(self):
"""NONE → LOW → HIGH in 3 messages = escalation."""
self.tracker.record(detect_crisis("Hello"))
self.tracker.record(detect_crisis("Having a rough day"))
state = self.tracker.record(detect_crisis("I feel completely hopeless with no way out"))
if state.current_level in ("HIGH", "CRITICAL"):
self.assertTrue(state.is_escalating)
def test_escalation_rate(self):
"""Rate should be positive when escalating."""
self.tracker.record(detect_crisis("Hello"))
self.tracker.record(detect_crisis("I want to die"))
state = self.tracker.state
self.assertGreater(state.escalation_rate, 0)
class TestDeescalationDetection(unittest.TestCase):
"""Test de-escalation: sustained LOW after HIGH/CRITICAL."""
def setUp(self):
self.tracker = CrisisSessionTracker()
def test_no_deescalation_without_prior_crisis(self):
"""No de-escalation if never reached HIGH/CRITICAL."""
for _ in range(6):
self.tracker.record(detect_crisis("Hello"))
self.assertFalse(self.tracker.state.is_deescalating)
def test_deescalation_after_critical(self):
"""5+ consecutive LOW/NONE messages after CRITICAL = de-escalation."""
self.tracker.record(detect_crisis("I want to kill myself"))
for _ in range(5):
self.tracker.record(detect_crisis("I'm doing better today"))
state = self.tracker.state
if state.peak_level == "CRITICAL":
self.assertTrue(state.is_deescalating)
def test_deescalation_after_high(self):
"""5+ consecutive LOW/NONE messages after HIGH = de-escalation."""
self.tracker.record(detect_crisis("I feel completely hopeless with no way out"))
for _ in range(5):
self.tracker.record(detect_crisis("Feeling okay"))
state = self.tracker.state
if state.peak_level == "HIGH":
self.assertTrue(state.is_deescalating)
def test_interrupted_deescalation(self):
"""De-escalation resets if a HIGH message interrupts."""
self.tracker.record(detect_crisis("I want to kill myself"))
for _ in range(3):
self.tracker.record(detect_crisis("Doing better"))
# Interrupt with another crisis
self.tracker.record(detect_crisis("I feel hopeless again"))
self.tracker.record(detect_crisis("Feeling okay now"))
state = self.tracker.state
# Should NOT be de-escalating yet (counter reset)
self.assertFalse(state.is_deescalating)
class TestSessionModifier(unittest.TestCase):
"""Test system prompt modifier generation."""
def setUp(self):
self.tracker = CrisisSessionTracker()
def test_no_modifier_for_single_message(self):
self.tracker.record(detect_crisis("Hello"))
self.assertEqual(self.tracker.get_session_modifier(), "")
def test_no_modifier_for_stable_session(self):
self.tracker.record(detect_crisis("Hello"))
self.tracker.record(detect_crisis("Good morning"))
self.assertEqual(self.tracker.get_session_modifier(), "")
def test_escalation_modifier(self):
"""Escalating session should produce a modifier."""
self.tracker.record(detect_crisis("Hello"))
self.tracker.record(detect_crisis("I want to die"))
modifier = self.tracker.get_session_modifier()
if self.tracker.state.is_escalating:
self.assertIn("escalated", modifier.lower())
self.assertIn("NONE", modifier)
self.assertIn("CRITICAL", modifier)
def test_deescalation_modifier(self):
"""De-escalating session should mention stabilizing."""
self.tracker.record(detect_crisis("I want to kill myself"))
for _ in range(5):
self.tracker.record(detect_crisis("I'm feeling okay"))
modifier = self.tracker.get_session_modifier()
if self.tracker.state.is_deescalating:
self.assertIn("stabilizing", modifier.lower())
def test_prior_crisis_modifier(self):
"""Past crisis should be noted even without active escalation."""
self.tracker.record(detect_crisis("I want to die"))
self.tracker.record(detect_crisis("Feeling a bit better"))
modifier = self.tracker.get_session_modifier()
# Should note the prior CRITICAL
if modifier:
self.assertIn("CRITICAL", modifier)
class TestUIHints(unittest.TestCase):
"""Test UI hint generation."""
def setUp(self):
self.tracker = CrisisSessionTracker()
def test_ui_hints_structure(self):
self.tracker.record(detect_crisis("Hello"))
hints = self.tracker.get_ui_hints()
self.assertIn("session_escalating", hints)
self.assertIn("session_deescalating", hints)
self.assertIn("session_peak_level", hints)
self.assertIn("session_message_count", hints)
def test_ui_hints_escalation_warning(self):
"""Escalating session should have warning hint."""
self.tracker.record(detect_crisis("Hello"))
self.tracker.record(detect_crisis("I want to die"))
hints = self.tracker.get_ui_hints()
if hints["session_escalating"]:
self.assertTrue(hints.get("escalation_warning"))
self.assertIn("suggested_action", hints)
class TestCheckCrisisWithSession(unittest.TestCase):
"""Test the convenience function combining detection + session tracking."""
def test_returns_combined_data(self):
tracker = CrisisSessionTracker()
result = check_crisis_with_session("I want to die", tracker)
self.assertIn("level", result)
self.assertIn("session", result)
self.assertIn("current_level", result["session"])
self.assertIn("peak_level", result["session"])
self.assertIn("modifier", result["session"])
def test_session_updates_across_calls(self):
tracker = CrisisSessionTracker()
check_crisis_with_session("Hello", tracker)
result = check_crisis_with_session("I want to die", tracker)
self.assertEqual(result["session"]["message_count"], 2)
self.assertEqual(result["session"]["peak_level"], "CRITICAL")
class TestPrivacy(unittest.TestCase):
"""Verify privacy-first design principles."""
def test_no_persistence_mechanism(self):
"""Session tracker should have no database, file, or network calls."""
import inspect
source = inspect.getsource(CrisisSessionTracker)
# Should not import database, requests, or file I/O
forbidden = ["sqlite", "requests", "urllib", "open(", "httpx", "aiohttp"]
for word in forbidden:
self.assertNotIn(word, source.lower(),
f"Session tracker should not use {word} — privacy-first design")
def test_state_contained_in_memory(self):
"""All state should be instance attributes, not module-level."""
tracker = CrisisSessionTracker()
tracker.record(detect_crisis("I want to die"))
# New tracker should have clean state (no global contamination)
fresh = CrisisSessionTracker()
self.assertEqual(fresh.state.current_level, "NONE")
if __name__ == '__main__':
unittest.main()